This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
1) Explain the advantages and disadvantages of static routing.
2) Explain the purpose of different types of static routes.
3) Configure IPv4 and IPv6 static routes by specifying a next-hop address.
4) Configure an IPv4 and IPv6 default routes.
5) Explain the use of legacy classful addressing in network implementation.
6) Explain the purpose of CIDR in replacing classful addressing.
7) Design and implement a hierarchical addressing scheme.
8) Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
9) Configure a floating static route to provide a backup connection.
10) Explain how a router processes packets when a static route is configured.
11) Troubleshoot common static and default route configuration issues.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
1) Explain the advantages and disadvantages of static routing.
2) Explain the purpose of different types of static routes.
3) Configure IPv4 and IPv6 static routes by specifying a next-hop address.
4) Configure an IPv4 and IPv6 default routes.
5) Explain the use of legacy classful addressing in network implementation.
6) Explain the purpose of CIDR in replacing classful addressing.
7) Design and implement a hierarchical addressing scheme.
8) Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
9) Configure a floating static route to provide a backup connection.
10) Explain how a router processes packets when a static route is configured.
11) Troubleshoot common static and default route configuration issues.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
1) Configure a router to route between multiple directly connected networks
2) Describe the primary functions and features of a router.
3) Explain how routers use information in data packets to make forwarding decisions in a small- to medium-sized business network.
4) Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.
5) Compare ways in which a router builds a routing table when operating in a small- to medium-sized business network.
6) Explain routing table entries for directly connected networks.
7) Explain how a router builds a routing table of directly connected networks.
8) Explain how a router builds a routing table using static routes.
9) Explain how a router builds a routing table using a dynamic routing protocol.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
1) Configure a router to route between multiple directly connected networks
2) Describe the primary functions and features of a router.
3) Explain how routers use information in data packets to make forwarding decisions in a small- to medium-sized business network.
4) Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.
5) Compare ways in which a router builds a routing table when operating in a small- to medium-sized business network.
6) Explain routing table entries for directly connected networks.
7) Explain how a router builds a routing table of directly connected networks.
8) Explain how a router builds a routing table using static routes.
9) Explain how a router builds a routing table using a dynamic routing protocol.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Once upon a time Marketing was about Storytelling. Today, marketers are using content strategy to drive awareness, branding and demand generation.
Which makes storytelling even more important, today.
Căn hộ The Krista - căn hộ cao cấp thiết kế phong cách singapore tại TP.HCM, giá gốc chủ đầu tư 19tr/m2 + ưu đãi hấp dẫn. Hotline phòng kinh doanh Chủ Đầu Tư: 0989.72.12.18 - 090951.21.79 để được tư vấn và nhận ưu đãi tốt nhất từ Capitaland
website: http://canhothekristahcm.com/
Ms Susan Moug's keynote speech 'The Promotion of Physical Activity - Everyone's Responsibility' at the SCPN's 'Be Active Against Cancer' conference, Tuesday 4th February 2014.
Dr Anna Campbell's keynote speech 'The Importance of Staying Active after a Cancer Diagnosis' at the SCPN's 'Be Active Against Cancer' conference, Tuesday 4th February 2014.
Millainen on hyvä briiffi? Hyvin tehty briiffi säästää yrityksen resursseja ja johtaa selkeästi parempiin tuloksiin. Katso esitys ja lue vinkin blogista.
Operating Systems
Shell - The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
Kernel - Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Hardware - The physical part of a computer including underlying electronics.
Cisco IOS Access
GUI
A GUI allows the user to interact with the system using an environment of graphical icons, menus, and windows.
A GUI is more user-friendly and requires less knowledge of the underlying command structure that controls the system.
Examples of these are: Windows, macOS, Linux KDE, Apple iOS, and Android.
GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI.
PC operating system enables a user to do the following:
Use a mouse to make selections and run programs
Enter text and text-based commands
CLI-based network operating system enables a network technician to do the following:
Use a keyboard to run CLI-based network programs
Use a keyboard to enter text and text-based commands
View output on a monitor
Console – A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.
Secure Shell (SSH) – Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)
Telnet – Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords, and commands are sent over the network in plaintext.)
Cisco Internetworking Operating System (ios)Netwax Lab
Cisco IOS (originally Internetwork Operating
System) is software used on most Cisco Systems
routers and current Cisco network switches.
(Earlier switches ran CatOS.) IOS is a package of
routing, switching, internetworking and
telecommunications functions integrated into a
multitasking operating system.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1. CIS 81 Fundamentals of Networking
Chapter 2: Configuring a Network
Operating System
Rick Graziani
Cabrillo College
graziani@cabrillo.edu
Fall 2013
2. Chapter 2 - Objectives
Explain the purpose of Cisco IOS.
Explain how to access and navigate Cisco IOS to configure
network devices.
Describe the command structure of Cisco IOS software.
Configure hostnames on a Cisco IOS device using the CLI.
Use Cisco IOS commands to limit access to device
configurations.
Use Cisco IOS commands to save the running
configuration.
Explain how devices communicate across network media.
Configure a host device with an IP address.
Verify connectivity between two end devices.
2
3. Cisco IOS
Operating Systems
All networking equipment depend on operating systems:
End users (PCs, laptops, smart phones, tablets)
Switches
Routers
Wireless access points
Firewalls
Cisco Internetwork Operating System (IOS)
Collection of network operating systems used on Cisco devices
3
5. Cisco IOS
Purpose of OS
PC operating systems (Windows 8, Linux & OS X) perform technical
functions that enable
• Use of a input and output devices
• Manage processes and programs
• Manage file systems, security, hardware, etc.
Switch or router IOS provides options to
• Same functions as host operating systems
• Configure interfaces
• Enable routing and switching functions
All networking devices come with a default IOS (switches, routers,
firewalls)
Possible to upgrade the IOS version or feature set 5
6. Cisco IOS
Location of the Cisco IOS
IOS stored in Flash
Non-volatile storage – not lost when power is lost
Can be changed or overwritten as needed
Can be used to store multiple versions of IOS
IOS copied from flash to volatile RAM when booted
Quantity of flash and RAM memory determines IOS that
can be used
6
10. 10
running-config
IOS (running)
startup-config IOS
ios (partial)
Bootup program
Where is the permanent configuration file stored used during boot-up? NVRAM (B)
Where is the diagnostics software stored executed by hardware modules? ROM (D)
Where is the backup (partial) copy of the IOS stored? ROM (D)
Where is IOS permanently stored before it is copied into RAM? FLASH (C)
Where are all changes to the configuration immediately stored? RAM (A)
A B C D
13. Cisco IOS
CCO Account Benefits and IOS Files
This video introduces Cisco Connection Online (CCO). CCO has a wealth of
information available regarding Cisco products and services. 13
14. Accessing a Cisco IOS Device
Console Access Method
Most common methods to access the Command Line Interface
Console
Telnet or SSH
AUX port
14
15. Accessing a Cisco IOS Device
Console Access Method
Console port
Device is accessible even if no networking services
have been configured (out-of-band)
Need a special console cable (aka rollover cable)
Allows configuration commands to be entered
Should be configured with passwords to prevent
unauthorized access
Device should be located in a secure room so console
port can not be easily accessed
15
16. 16
Establishing a HyperTerminal session (next week)
Connect PC using the RJ-45/mini-USB to Serial/USB rollover cable.
Configure the terminal or PC terminal emulation software for:
9600 baud
8 data bits
no parity
1 stop bit
no flow control
Rollover cable
Console port
Com1 or Com2 serial port
Or USB port with USB-to-Serial adapter
Terminal or a
PC with
terminal
emulation
software
Router
18. 18
Establishing a Terminal/Serial/Console session
Important: A console connection is not
the same as a network connection!
=
• PuTTY
• Tera Term
• SecureCRT
• HyperTerminal
• OS X Terminal
• Zoc
Dumb Terminal
19. Accessing a Cisco IOS Device
Telnet, SSH, and AUX Access Methods
Telnet
Method for remotely accessing the CLI over a network
Require active networking services and one active interface that
is configured
Secure Shell (SSH) – Preferred over Telnet
Remote login similar to Telnet but utilizes more security
Stronger password authentication
Uses encryption when transporting data
Aux Port (not used too much)
Out-of-band connection
Uses telephone line
Can be used like console port
19
20. 20
C:> ssh
C:> ping
Ethernet Connection
Network connection needed
When can you use a network connection to
connect to the router?
What software/command do you need?
What cable and ports do you use?
When should you not use a network
connection to configure the router?
When there is a network
connection to the router (telnet).
TCP/IP, Terminal prompt (DOS),
Tera Term, etc.
PC & Router: Ethernet NIC
Ethernet straight-through cable
When the change may
disconnect the telnet connection.
NIC
21. Accessing a Cisco IOS Device
Terminal Emulation Programs
Software available for
connecting to a networking
device (usually same as
terminal/serial/console
connection):
PuTTY
Tera Term
SecureCRT
HyperTerminal
OS X Terminal
Zoc
21
25. Navigating the IOS
Global Configuration Mode and Submodes
Global configuration mode and interface configuration modes can
only be reached from the privileged EXEC mode. 25
27. Navigating the IOS
Navigating between IOS Modes (cont.)
Switch> user mode
Switch> enable go to privilege mode
Switch# configure terminal go to global configuration mode
Switch(config)# interface vlan 1 go to interface mode
Switch(config-if)# exit
Switch(config)# exit
Switch# config t Shortened commands and parameters
Switch(config)# vlan 1 go to VLAN configuration mode
Switch(config-vlan)# end go to privilege-EXEC mode
Switch# disable
Switch> enable
Switch# config t
Switch(config)# line vty 0 4 go to interface (line) mode
Switch(config-line)# exit
Switch(config)#
27
28. 28
Common Commands for Switches and Routers
Switch> user mode
Switch> enable
Switch# privilege mode
Switch# configure terminal
Switch(config)# exit
Switch# config t
Switch(config)# hostname name
Switch(config)# enable secret password privilege password
Switch(config)# line console 0 console password
Switch(config-line)# password password
Switch(config-line)# login
Switch(config)# line vty 0 4 telnet password
Switch(config-line)# password password
Switch(config-line)# login
Switch(config)# banner motd # message # banner
Switch(config)# interface type number configure interface
Switch(config-if)# description description
29. 29
Making your life easier!
Switch# enable
Switch(config)# line console 0 Console port
Switch(config-line)# logging synchronous IOS will not
Switch(config-line)# exec-timeout 0 0 password
Switch(config)# no ip domain-lookup password
Switch(config-line)# login
Switch(config)# banner motd # message # banner
Switch(config)# interface type number configure interface
Switch(config-if)# description description
32. The Command Structure
Cisco IOS Command Reference
IOS Command Conventions
The general syntax for a command is the command followed by any
appropriate keywords (defined) and arguments (undefined).
An argument is generally not a predefined word.
An argument is a value or variable defined by the user.
Switch(config-if)# description string
Boldface text indicates commands and keywords that are typed as
shown
Italic text indicates an argument for which you supply the value. For the
description command, the argument is a string value.
The string value can be any text string of up to 80 characters.
Example:
Switch(config-if)# description MainHQ Office Switch
32
33. The Command Structure
Cisco IOS Command Reference
For the ping command:
Switch> ping IP-address
Switch> ping 10.10.10.5
The command is ping and the user defined argument is the
10.10.10.5.
Similarly, the syntax for entering the traceroute command is:
Switch> traceroute IP-address
Switch> traceroute 192.168.254.254
The command is traceroute and the user defined argument is the
192.168.254.254.
33
38. The Command Structure
Hot Keys and Shortcuts
Tab - Completes the remainder of a partially typed command or
keyword
Ctrl-R - Redisplays a line
Ctrl-A – Moves cursor to the beginning of the line
Ctrl-Z - Exits configuration mode and returns to user EXEC
Down Arrow - Allows the user to scroll forward through former
commands
Up Arrow - Allows the user to scroll backward through former
commands
Ctrl-Shift-6 - Allows the user to interrupt an IOS process such
as ping or traceroute.
Ctrl-C - Aborts the current command and exits the configuration
mode
38
42. Hostnames
Why the Switch
Let’s focus on
Creating a two PC network connected via a switch
Setting a name for the switch
Limiting access to the device configuration
Configuring banner messages
Saving the configuration
42
43. Hostnames
Device Names
Hostnames allow devices to be identified by network administrators
over a network or the Internet.
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
Without names, network
devices are difficult to
identify for configuration
purposes.
43
45. Limiting Access to Device Configurations
Securing Device Access
The passwords introduced here are:
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged EXEC mode
Console password - Limits device access using the console connection
VTY password - Limits device access over Telnet
Note: In most of the labs in this course, we will be using simple
passwords such as cisco or class.
45
46. Limiting Access to Device Configurations
Securing Privileged EXEC Access
use the enable secret command, not the older enable password
command
enable secret provides greater security because the password is
encrypted
class
46
47. Limiting Access to Device Configurations
Securing User EXEC Access
Console port must be secured
• reduces the chance of unauthorized personnel physically
plugging a cable into the device and gaining device
access
vty lines allow access to a Cisco device via Telnet
• number of vty lines supported varies with the type of
device and the IOS version
47
48. Limiting Access to Device Configurations
Encrypting Password Display
service password-
encryption
prevents
passwords from
showing up as plain
text when viewing the
configuration
purpose of this
command is to keep
unauthorized
individuals from
viewing passwords
in the configuration
file
once applied,
removing the
encryption service
does not reverse the
encryption
48
49. Limiting Access to Device Configurations
Banner Messages
Important part of the legal process in the event that someone is
prosecuted for breaking into a device
Wording that implies that a login is "welcome" or "invited" is not
appropriate
Switch(config)# banner motd # This is a secure system Authorized
Access Only!!! #
Sw-Floor3(config)#
49
50. Saving Configurations
Configuration Files
Switch# show running-config
Switch# copy running-config startup-config
<Changes made>
Switch# delete vlan.dat
Delete filename [vlan.dat]?
Delete flash:vlan.dat? [confirm]
Switch# erase startup-config
Switch# reload
System configuration has been modified. Save? [yes/no]: n
Proceed with reload? [confirm]
50
53. Ports and Addresses
IP Addressing in the Large
Each end device on a
network must be
configured with an IP
address
Structure of an IPv4
address is called
dotted decimal
IP address displayed in
decimal notation, with
four decimal numbers
between 0 and 255
With the IP address, a
subnet mask is also
necessary
IP addresses can be
assigned to both
physical ports and
virtual interfaces
IPv4 and IPv6
addresses will be
discussed in more
detail later
53
54. Ports and Addresses
Interfaces and Ports
Terms are used interchangeably
Some interfaces can be can be configured with an IP address such as:
NIC (Ethernet interface) on a host/computer
Router’s Ethernet or Serial interfaces
Switches have ports (interfaces) but do not typically have IP addresses
assigned to them
Used to connect devices on LANs that do have IP addresses such as
hosts, routers, printers.
54
55. Addressing Devices
Configuring a Switch Virtual Interface
Allows the network administrator to communicate (SSH, telnet, ping) with the
switch.
It is OPTIONAL
“Layer 2” switches do NOT need an IP address to forward Ethernet frames.
IP address - together with subnet mask, uniquely identifies end device on
internetwork (more later)
Subnet mask - determines which part of a larger network is used by an IP address
interface VLAN 1 - interface configuration mode
ip address 192.168.10.2 255.255.255.0 - configures the IP address and subnet
mask for the switch
no shutdown - administratively enables the interface
Switch still needs to have physical ports configured and VTY lines to enable
remote management 55
60. Verifying Connectivity
Test the Loopback Address on an End Device
C:> ping 127.0.0.1
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 60
63. Configuring a Network Operating System
Chapter 2 Summary
Services provided by the Cisco IOS accessed using a command-
line interface (CLI)
• accessed by either the console port, the AUX port, or through
telnet or SSH
• can make configuration changes to Cisco IOS devices
• a network technician must navigate through various hierarchical
modes of the IOS
Cisco IOS routers and switches support a similar operating system
Introduced the initial settings of a Cisco IOS switch device
• setting a name
• limiting access to the device configuration
• configuring banner messages
• saving the configuration
63
66. CIS 81 Fundamentals of Networking
Chapter 2: Configuring a Network
Operating System
Rick Graziani
Cabrillo College
graziani@cabrillo.edu
Fall 2013
Editor's Notes
Chapter 2 Objectives
2.1.1.1
2.1.1.2 Purpose of OS
In this course, you will focus primarily on Cisco IOS Release 15.x
2.1.1.3 Location of the Cisco IOS
2.1.1.4 IOS Functions
Each feature or service has an associated collection of configuration commands that allow a network technician to implement the feature or service.
The services provided by the Cisco IOS are generally accessed using a command-line interface (CLI).
Step 1: POST (Power On Self Test)
Executes diagnostics from ROM on several hardware components, including the CPU,RAM, NVRAM
Step 2: Loading Bootstrap Program
Copied from ROM into RAM
Executed by CPU
Main task is to locate the Cisco IOS and load it into RAM
Step 3: Locating the IOS
Typically stored in flash memory, but it can be stored in other places such as a TFTP server.
If a full IOS image cannot be located, a scaled-down version of the IOS is copied from ROM
This version of IOS is used to help diagnose any problems and to try to load a complete version of the IOS into RAM.
Step 4: Loading the IOS
Some of the older Cisco routers ran the IOS directly from flash
Current models copy
the IOS into RAM for execution
Might see a string of pound signs (#) while the image decompresses.
Step 5: Locating the Config File
Bootstrap program searches for the startup configuration file (startup-config), in NVRAM.
This file has the previously saved configuration commands and parameters,
Step 6: Loading the Config File
If a startup configuration file is found in NVRAM, the IOS loads it into RAM as the running-config file and executes the commands.
If the startup configuration file cannot be located, prompt the user to enter setup mode
If setup mode not used, a default running-config file is created
2.1.1.3 Location of the Cisco IOS
2.1.2.1 Console Access Method
2.1.2.1 Console Access Method
Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.
In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.
Take the following steps to connect a terminal to the console port on the router:
Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter.
Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.
Take the following steps to connect a terminal to the console port on the router:
Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter.
Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.
Important: A console connection is not the same as a network connection!
2.1.2.2 Telnet, SSH, and AUX Access Methods
2.1.2.3 Terminal Emulation Programs
There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include:
PuTTY
Tera Term
SecureCRT
HyperTerminal
OS X Terminal
There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection.
Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes
2.1.3.1 In hierarchical order from most basic to most specialized, the major modes are:
User executive (User EXEC) mode
Privileged executive (Privileged EXEC) mode
Global configuration mode
Other specific configuration modes, such as Interface configuration mode.
Each mode has a distinctive prompt
2.1.3.1 In hierarchical order from most basic to most specialized, the major modes are:
User executive (User EXEC) mode
Privileged executive (Privileged EXEC) mode
Global configuration mode
Other specific configuration modes, such as Interface configuration mode.
Each mode has a distinctive prompt
2.1.3.2 Primary Modes
The two primary modes of operation are user EXEC mode and privileged EXEC mode. Tthe privileged EXEC mode has a higher level of authority in what it allows the user to do with the device.
User EXEC Mode
The user EXEC mode has limited capabilities but is useful for some basic operations. This mode is the first mode encountered upon entrance into the CLI of an IOS device.
This is often referred to as view-only mode. The user EXEC level does not allow the execution of any commands that might change the configuration of the device.
By default, there is no authentication required to access the user EXEC mode from the console. However, it is a good practice to ensure that authentication is configured during the initial configuration.
The user EXEC mode is identified by the CLI prompt that ends with the &gt; symbol. This is an example that shows the &gt; symbol in the prompt: Switch&gt;
Privileged EXEC Mode
The execution of configuration and management commands requires that the network administrator use the privileged EXEC mode, or a more specific mode in the hierarchy.
The privileged EXEC mode can be identified by the prompt ending with the #symbol. Switch#
By default, privileged EXEC mode does not require authentication.
Global configuration mode and all other more specific configuration modes can only be reached from the privileged EXEC mode.
2.1.3.3 Global Configuration Mode and Submodes
Global configuration mode and interface configuration modes can only be reached from the privileged EXEC mode.
From global config, CLI configuration changes are made that affect the operation of the device as a whole.
Switch# configure terminal
Switch(config)#
From the global config mode, the user can enter different subconfiguration modes. Each of these modes allows the configuration of a particular part or function of the IOS device.
Interface mode - to configure one of the network interfaces (Fa0/0, S0/0/0)
Line mode - to configure one of the physical or virtual lines (console, AUX, VTY)
To exit a specific configuration mode and return to global configuration mode, enter exit at a prompt. To leave configuration mode completely and return to privileged EXEC mode, enter end or use the key sequence Ctrl-Z.
As commands are used and modes are changed, the prompt changes to reflect the current context.
2.1.3.4 Navigating between IOS Modes
The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively.
2.1.3.5 Navigating between IOS Modes (Continued)
To move from the global configuration mode to the privileged EXEC mode, you enter the command exit.
To move from any submode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command.
To move from any submode of the privileged EXEC mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.
To move from any submode of the global configuration mode to another “immediate” submode of the global configuration mode, simply enter the corresponding command that is normally entered from global configuration mode
2.1.3.4 Navigating between IOS Modes
The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively.
2.1.4.1 IOS Command Structure
Each IOS command has a specific format or syntax and can only be executed at the appropriate mode.
The commands are not case-sensitive. Following the command are one or more keywords and arguments.
Unlike a keyword, an argument is generally not a predefined word. An argument is a value or variable defined by the user
Switch&gt; ping IP address
Switch&gt; ping 10.10.10.5
The command is ping and the user defined argument is the 10.10.10.5.
Similarly, the syntax for entering thetraceroute command is:
Switch&gt; traceroute IP address
Switch&gt; traceroute 192.168.254.254
The command is traceroute and the user defined argument is the 192.168.254.254.
2.1.4.2 Cisco IOS Command Reference
The Command Reference is a fundamental resource that network engineers use to check various characteristics of a given IOS command.
2.1.4.2 Cisco IOS Command Reference
The Command Reference is a fundamental resource that network engineers use to check various characteristics of a given IOS command.
2.1.4.3 Context Sensitive Help
The IOS has several forms of help available:
Context-sensitive help
Command Syntax Check
Hot Keys and Shortcuts
2.1.4.4 Command Syntax Check
There are three different types of error messages:
Ambiguous command
Incomplete command
Incorrect command
2.1.4.4 Command Syntax Check
There are three different types of error messages:
Ambiguous command
Incomplete command
Incorrect command
2.1.4.4 Command Syntax Check
There are three different types of error messages:
Ambiguous command
Incomplete command
Incorrect command
2.1.4.5 Hot Keys and Shortcuts
Tab - This is a good technique to use when you are learning because it allows you to see the full word used for the command or keyword.
Ctrl-Z - Because the IOS has a hierarchical mode structure, you may find yourself several levels down. Rather than exit each mode individually, use Ctrl-Z to return directly to the privileged EXEC prompt at the top level.
Ctrl-Shift-6 - Using the escape sequence. When an IOS process is initiated from the CLI, such as a ping or traceroute, the command runs until it is complete or is interrupted. While the process is running, the CLI is unresponsive. To interrupt the output and interact with the CLI, press Ctrl-Shift-6.
Commands and keywords can be abbreviated to the minimum number of characters that -identify a unique selection.
2.1.4.6 IOS Examination Commands
Use theshow ? command to get a list of available commands in a given context, or mode.
A typical show command can provide information about the configuration, operation, and status of parts of a Cisco device.
A very commonly used show command is show interfaces. This command displays statistics for all interfaces on the device. To view the statistics for a specific interface, enter the show interfaces command followed by the specific interface type and slot/port number.
Some other show commands frequently used by network technicians include:
show startup-config - Displays the saved configuration located in NVRAM.
show running-config - Displays the contents of the currently running configuration file.
2.1.4.7 The show version Command
This command displays information about the currently loaded IOS version, along with hardware and device information.
Software Version - IOS software version (stored in flash)
Bootstrap Version - Bootstrap version (stored in Boot ROM)
System up-time - Time since last reboot
System restart info - Method of restart (e.g., power cycle, crash)
Software image name - IOS filename stored in flash
Router Type and Processor type - Model number and processor type
Memory type and allocation (Shared/Main) - Main Processor RAM and Shared Packet I/O buffering
Software Features - Supported protocols / feature sets
Hardware Interfaces - Interfaces available on the device
Configuration Register - Sets bootup specifications, console speed setting, and related parameters
2.1.4.7 The show version Command
This command displays information about the currently loaded IOS version, along with hardware and device information.
Software Version - IOS software version (stored in flash)
Bootstrap Version - Bootstrap version (stored in Boot ROM)
System up-time - Time since last reboot
System restart info - Method of restart (e.g., power cycle, crash)
Software image name - IOS filename stored in flash
Router Type and Processor type - Model number and processor type
Memory type and allocation (Shared/Main) - Main Processor RAM and Shared Packet I/O buffering
Software Features - Supported protocols / feature sets
Hardware Interfaces - Interfaces available on the device
Configuration Register - Sets bootup specifications, console speed setting, and related parameters
2.2.1.1 Why the Switch
2.2.1.2 Device Names
2.2.1.4 Configuring Hostnames
2.2.2.1 Securing Device Access
Consider these key points when choosing passwords:
Use passwords that are more than eight characters in length.
Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences in passwords.
Avoid using the same password for all devices.
Avoid using common words such as password or administrator, because these are easily guessed
2.2.2.2 Securing Privileged EXEC Access
2.2.2.3 Securing User EXEC Access
2.2.2.4 Encrypting Password Display
2.2.2.5 Banner Messages
2.2.3.1 Configuration Files
Switch# erase startup-config
After the command is issued, the switch will prompt you for confirmation:
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
Confirm is the default response. To confirm and erase the startup configuration file, press . Pressing any other key will abort the process.
2.2.3.2 Capturing Text]
Restoring Text Configurations
A configuration file can be copied from storage to a device. When copied into the terminal, the IOS executes each line of the configuration text as a command. This means that the file will require editing to ensure that encrypted passwords are in plain text and that non-command text such as &quot;--More--&quot; and IOS messages are removed. This process is discussed in the lab.
Further, at the CLI, the device must be set at the global configuration mode to receive the commands from the text file being copied.
When using HyperTerminal, the steps are:
Locate the file to be copied into the device and open the text document.
Copy all of the text.
On the Edit menu, click paste to host.
When using TeraTerm, the steps are:
On the File menu, click Send file.
Locate the file to be copied into the device and click Open.
TeraTerm will paste the file into the device.
2.2.3.2 Capturing Text]
Restoring Text Configurations
A configuration file can be copied from storage to a device. When copied into the terminal, the IOS executes each line of the configuration text as a command. This means that the file will require editing to ensure that encrypted passwords are in plain text and that non-command text such as &quot;--More--&quot; and IOS messages are removed. This process is discussed in the lab.
Further, at the CLI, the device must be set at the global configuration mode to receive the commands from the text file being copied.
When using HyperTerminal, the steps are:
Locate the file to be copied into the device and open the text document.
Copy all of the text.
On the Edit menu, click paste to host.
When using TeraTerm, the steps are:
On the File menu, click Send file.
Locate the file to be copied into the device and click Open.
TeraTerm will paste the file into the device.
2.3.1.1 IP Addressing in the Large
2.3.1.2 Interfaces and Ports
Some of the differences between various types of media include:
The distance the media can successfully carry a signal.
The environment in which the media is to be installed.
The amount of data and the speed at which it must be transmitted.
The cost of the media and installation
2.3.2.1 Configuring a Switch Virtual Interface
2.3.2.2 Manual IP Address Configuration for End Devices
2.3.2.3 Automatic IP Address Configuration for End Devices
2.3.2.4 IP Address Conflicts
2.3.2.4 IP Address Conflicts
2.3.3.1 Test the Loopback Address on an End Device