SlideShare a Scribd company logo
CIS 81 Fundamentals of Networking
Chapter 2: Configuring a Network
Operating System
Rick Graziani
Cabrillo College
graziani@cabrillo.edu
Fall 2013
Chapter 2 - Objectives
Explain the purpose of Cisco IOS.
Explain how to access and navigate Cisco IOS to configure
network devices.
Describe the command structure of Cisco IOS software.
Configure hostnames on a Cisco IOS device using the CLI.
Use Cisco IOS commands to limit access to device
configurations.
Use Cisco IOS commands to save the running
configuration.
Explain how devices communicate across network media.
Configure a host device with an IP address.
Verify connectivity between two end devices.
2
Cisco IOS
Operating Systems
All networking equipment depend on operating systems:
 End users (PCs, laptops, smart phones, tablets)
 Switches
 Routers
 Wireless access points
 Firewalls
Cisco Internetwork Operating System (IOS)
 Collection of network operating systems used on Cisco devices
3
Cisco IOS
Operating Systems
4
Cisco IOS
Purpose of OS
 PC operating systems (Windows 8, Linux & OS X) perform technical
functions that enable
• Use of a input and output devices
• Manage processes and programs
• Manage file systems, security, hardware, etc.
 Switch or router IOS provides options to
• Same functions as host operating systems
• Configure interfaces
• Enable routing and switching functions
 All networking devices come with a default IOS (switches, routers,
firewalls)
 Possible to upgrade the IOS version or feature set 5
Cisco IOS
Location of the Cisco IOS
IOS stored in Flash
 Non-volatile storage – not lost when power is lost
 Can be changed or overwritten as needed
 Can be used to store multiple versions of IOS
 IOS copied from flash to volatile RAM when booted
 Quantity of flash and RAM memory determines IOS that
can be used
6
Cisco IOS
IOS Functions
Major functions performed or enabled by Cisco routers and switches
include:
7
8
Router/Switch Bootup Process (more in later course)
9
Bootup Process
running-config
IOS (running)
startup-config IOS
ios (partial)
Bootup program
10
running-config
IOS (running)
startup-config IOS
ios (partial)
Bootup program
Where is the permanent configuration file stored used during boot-up? NVRAM (B)
Where is the diagnostics software stored executed by hardware modules? ROM (D)
Where is the backup (partial) copy of the IOS stored? ROM (D)
Where is IOS permanently stored before it is copied into RAM? FLASH (C)
Where are all changes to the configuration immediately stored? RAM (A)
A B C D
11
running-config
IOS (running)
startup-config IOS
ios (partial)
Bootup program
?
?
?
?
?
?
?
12
running-config
IOS (running)
startup-config IOS
ios (partial)
Bootup program
startup-config
IOS
Bootup program
ios (partial)
running-config
IOS (running)
A B C D
B A D
C D A
Cisco IOS
CCO Account Benefits and IOS Files
This video introduces Cisco Connection Online (CCO). CCO has a wealth of
information available regarding Cisco products and services. 13
Accessing a Cisco IOS Device
Console Access Method
Most common methods to access the Command Line Interface
 Console
 Telnet or SSH
 AUX port
14
Accessing a Cisco IOS Device
Console Access Method
Console port
Device is accessible even if no networking services
have been configured (out-of-band)
Need a special console cable (aka rollover cable)
Allows configuration commands to be entered
Should be configured with passwords to prevent
unauthorized access
Device should be located in a secure room so console
port can not be easily accessed
15
16
Establishing a HyperTerminal session (next week)
 Connect PC using the RJ-45/mini-USB to Serial/USB rollover cable.
 Configure the terminal or PC terminal emulation software for:
 9600 baud
 8 data bits
 no parity
 1 stop bit
 no flow control
Rollover cable
Console port
Com1 or Com2 serial port
Or USB port with USB-to-Serial adapter
Terminal or a
PC with
terminal
emulation
software
Router
17
Terminal
(Serial)
Settings)
Configure the terminal or PC terminal emulation software for:
 9600 baud
 8 data bits
 no parity
 1 stop bit
 no flow control.
18
Establishing a Terminal/Serial/Console session
 Important: A console connection is not
the same as a network connection!
=
• PuTTY
• Tera Term
• SecureCRT
• HyperTerminal
• OS X Terminal
• Zoc
Dumb Terminal
Accessing a Cisco IOS Device
Telnet, SSH, and AUX Access Methods
Telnet
 Method for remotely accessing the CLI over a network
 Require active networking services and one active interface that
is configured
Secure Shell (SSH) – Preferred over Telnet
 Remote login similar to Telnet but utilizes more security
 Stronger password authentication
 Uses encryption when transporting data
Aux Port (not used too much)
 Out-of-band connection
 Uses telephone line
 Can be used like console port
19
20
C:> ssh
C:> ping
Ethernet Connection
Network connection needed
When can you use a network connection to
connect to the router?
What software/command do you need?
What cable and ports do you use?
When should you not use a network
connection to configure the router?
When there is a network
connection to the router (telnet).
TCP/IP, Terminal prompt (DOS),
Tera Term, etc.
PC & Router: Ethernet NIC
Ethernet straight-through cable
When the change may
disconnect the telnet connection.
NIC
Accessing a Cisco IOS Device
Terminal Emulation Programs
Software available for
connecting to a networking
device (usually same as
terminal/serial/console
connection):
PuTTY
Tera Term
SecureCRT
HyperTerminal
OS X Terminal
Zoc
21
Navigating the IOS
Cisco IOS Modes of Operation
22
Navigating the IOS
Cisco IOS Modes of Operation
enable
configure terminal
interface < >
router < >
line < >
23
Navigating the IOS
Primary Modes
enable
enable
24
Navigating the IOS
Global Configuration Mode and Submodes
Global configuration mode and interface configuration modes can
only be reached from the privileged EXEC mode. 25
Navigating the IOS
Navigating between IOS Modes
Similar IOS commands for switches and routers
26
Navigating the IOS
Navigating between IOS Modes (cont.)
Switch> user mode
Switch> enable go to privilege mode
Switch# configure terminal go to global configuration mode
Switch(config)# interface vlan 1 go to interface mode
Switch(config-if)# exit
Switch(config)# exit
Switch# config t Shortened commands and parameters
Switch(config)# vlan 1 go to VLAN configuration mode
Switch(config-vlan)# end go to privilege-EXEC mode
Switch# disable
Switch> enable
Switch# config t
Switch(config)# line vty 0 4 go to interface (line) mode
Switch(config-line)# exit
Switch(config)#
27
28
Common Commands for Switches and Routers
Switch> user mode
Switch> enable
Switch# privilege mode
Switch# configure terminal
Switch(config)# exit
Switch# config t
Switch(config)# hostname name
Switch(config)# enable secret password privilege password
Switch(config)# line console 0 console password
Switch(config-line)# password password
Switch(config-line)# login
Switch(config)# line vty 0 4 telnet password
Switch(config-line)# password password
Switch(config-line)# login
Switch(config)# banner motd # message # banner
Switch(config)# interface type number configure interface
Switch(config-if)# description description
29
Making your life easier!
Switch# enable
Switch(config)# line console 0 Console port
Switch(config-line)# logging synchronous IOS will not
Switch(config-line)# exec-timeout 0 0 password
Switch(config)# no ip domain-lookup password
Switch(config-line)# login
Switch(config)# banner motd # message # banner
Switch(config)# interface type number configure interface
Switch(config-if)# description description
Navigating the IOS
Navigating between IOS Modes
30
The Command Structure
IOS Command Structure
31
The Command Structure
Cisco IOS Command Reference
IOS Command Conventions
The general syntax for a command is the command followed by any
appropriate keywords (defined) and arguments (undefined).
An argument is generally not a predefined word.
An argument is a value or variable defined by the user.
Switch(config-if)# description string
Boldface text indicates commands and keywords that are typed as
shown
Italic text indicates an argument for which you supply the value. For the
description command, the argument is a string value.
The string value can be any text string of up to 80 characters.
Example:
Switch(config-if)# description MainHQ Office Switch
32
The Command Structure
Cisco IOS Command Reference
 For the ping command:
Switch> ping IP-address
Switch> ping 10.10.10.5
 The command is ping and the user defined argument is the
10.10.10.5.
 Similarly, the syntax for entering the traceroute command is:
Switch> traceroute IP-address
Switch> traceroute 192.168.254.254
 The command is traceroute and the user defined argument is the
192.168.254.254.
33
The Command Structure
Context Sensitive Help
34
The Command Structure
Command Syntax Check
35
The Command Structure
Command Syntax Check
36
The Command Structure
Command Syntax Check
37
The Command Structure
Hot Keys and Shortcuts
 Tab - Completes the remainder of a partially typed command or
keyword
 Ctrl-R - Redisplays a line
 Ctrl-A – Moves cursor to the beginning of the line
 Ctrl-Z - Exits configuration mode and returns to user EXEC
 Down Arrow - Allows the user to scroll forward through former
commands
 Up Arrow - Allows the user to scroll backward through former
commands
 Ctrl-Shift-6 - Allows the user to interrupt an IOS process such
as ping or traceroute.
 Ctrl-C - Aborts the current command and exits the configuration
mode
38
The Command Structure
IOS Examination Commands
39
The Command Structure
The show version Command
40
The Command Structure
Navigating the IOS
41
Hostnames
Why the Switch
Let’s focus on
Creating a two PC network connected via a switch
Setting a name for the switch
Limiting access to the device configuration
Configuring banner messages
Saving the configuration
42
Hostnames
Device Names
Hostnames allow devices to be identified by network administrators
over a network or the Internet.
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
Without names, network
devices are difficult to
identify for configuration
purposes.
43
Hostnames
Configuring Hostnames
Switch(config)# hostname Sw-Floor-3
Sw-Floor3(config)#
Switch(config)# hostname Sw-Floor-2
Sw-Floor2(config)#
Switch(config)# hostname Sw-Floor-1
Sw-Floor1(config)#
44
Limiting Access to Device Configurations
Securing Device Access
The passwords introduced here are:
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged EXEC mode
Console password - Limits device access using the console connection
VTY password - Limits device access over Telnet
Note: In most of the labs in this course, we will be using simple
passwords such as cisco or class.
45
Limiting Access to Device Configurations
Securing Privileged EXEC Access
 use the enable secret command, not the older enable password
command
 enable secret provides greater security because the password is
encrypted
class
46
Limiting Access to Device Configurations
Securing User EXEC Access
 Console port must be secured
• reduces the chance of unauthorized personnel physically
plugging a cable into the device and gaining device
access
 vty lines allow access to a Cisco device via Telnet
• number of vty lines supported varies with the type of
device and the IOS version
47
Limiting Access to Device Configurations
Encrypting Password Display
service password-
encryption
prevents
passwords from
showing up as plain
text when viewing the
configuration
purpose of this
command is to keep
unauthorized
individuals from
viewing passwords
in the configuration
file
once applied,
removing the
encryption service
does not reverse the
encryption
48
Limiting Access to Device Configurations
Banner Messages
 Important part of the legal process in the event that someone is
prosecuted for breaking into a device
 Wording that implies that a login is "welcome" or "invited" is not
appropriate
Switch(config)# banner motd # This is a secure system Authorized
Access Only!!! #
Sw-Floor3(config)#
49
Saving Configurations
Configuration Files
Switch# show running-config
Switch# copy running-config startup-config
<Changes made>
Switch# delete vlan.dat
Delete filename [vlan.dat]?
Delete flash:vlan.dat? [confirm]
Switch# erase startup-config
Switch# reload
System configuration has been modified. Save? [yes/no]: n
Proceed with reload? [confirm]
50
Saving Configurations
Capturing Text
51
Saving Configurations
Capturing Text
52
Ports and Addresses
IP Addressing in the Large
 Each end device on a
network must be
configured with an IP
address
 Structure of an IPv4
address is called
dotted decimal
 IP address displayed in
decimal notation, with
four decimal numbers
between 0 and 255
 With the IP address, a
subnet mask is also
necessary
 IP addresses can be
assigned to both
physical ports and
virtual interfaces
 IPv4 and IPv6
addresses will be
discussed in more
detail later
53
Ports and Addresses
Interfaces and Ports
 Terms are used interchangeably
 Some interfaces can be can be configured with an IP address such as:
 NIC (Ethernet interface) on a host/computer
 Router’s Ethernet or Serial interfaces
 Switches have ports (interfaces) but do not typically have IP addresses
assigned to them
 Used to connect devices on LANs that do have IP addresses such as
hosts, routers, printers.
54
Addressing Devices
Configuring a Switch Virtual Interface
 Allows the network administrator to communicate (SSH, telnet, ping) with the
switch.
 It is OPTIONAL
 “Layer 2” switches do NOT need an IP address to forward Ethernet frames.
 IP address - together with subnet mask, uniquely identifies end device on
internetwork (more later)
 Subnet mask - determines which part of a larger network is used by an IP address
interface VLAN 1 - interface configuration mode
 ip address 192.168.10.2 255.255.255.0 - configures the IP address and subnet
mask for the switch
 no shutdown - administratively enables the interface
 Switch still needs to have physical ports configured and VTY lines to enable
remote management 55
Addressing Devices
Manual IP Address Configuration for End Devices
56
More later!
Addressing Devices
Automatic IP Address Configuration for End Devices
57
More later!
Addressing Devices
IP Address Conflicts
58
More later!
In Class Lab
59
Verifying Connectivity
Test the Loopback Address on an End Device
C:> ping 127.0.0.1
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 60
Verifying Connectivity
Testing the Interface Assignment
61
Verifying Connectivity
Testing End-to-End Connectivity
62
Configuring a Network Operating System
Chapter 2 Summary
 Services provided by the Cisco IOS accessed using a command-
line interface (CLI)
• accessed by either the console port, the AUX port, or through
telnet or SSH
• can make configuration changes to Cisco IOS devices
• a network technician must navigate through various hierarchical
modes of the IOS
 Cisco IOS routers and switches support a similar operating system
 Introduced the initial settings of a Cisco IOS switch device
• setting a name
• limiting access to the device configuration
• configuring banner messages
• saving the configuration
63
64
DEMO
65
In Class Lab
CIS 81 Fundamentals of Networking
Chapter 2: Configuring a Network
Operating System
Rick Graziani
Cabrillo College
graziani@cabrillo.edu
Fall 2013

More Related Content

What's hot

Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer
TanjilurRahman6
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
Heba_a
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
Nil Menon
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
ccna cheat_sheet
ccna cheat_sheetccna cheat_sheet
ccna cheat_sheet
Guntaka Reddy
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
NetProtocol Xpert
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
Kishore Kumar
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 

What's hot (20)

Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
 
Routage
RoutageRoutage
Routage
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
ccna cheat_sheet
ccna cheat_sheetccna cheat_sheet
ccna cheat_sheet
 
Ccna command
Ccna commandCcna command
Ccna command
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Router commands
Router commandsRouter commands
Router commands
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 

Viewers also liked

operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS device
scooby_doo
 
PlateRunner Users Guide 11-27-07
PlateRunner Users Guide 11-27-07PlateRunner Users Guide 11-27-07
PlateRunner Users Guide 11-27-07Dixie Pomerat
 
Return of the storyteller
Return of the storytellerReturn of the storyteller
Return of the storyteller
Deble
 
Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...
Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...
Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...
Scottish Cancer Prevention Network
 
Värdet av strukturerade och meningsfulla sammanhang
Värdet av strukturerade och meningsfulla sammanhangVärdet av strukturerade och meningsfulla sammanhang
Värdet av strukturerade och meningsfulla sammanhang
skrivlyft
 
Can ho-the-krista-capitaland
Can ho-the-krista-capitalandCan ho-the-krista-capitaland
Can ho-the-krista-capitaland
Bình An Pearl
 
The Promotion of Physical Activity - Everyone's Responsibility | Susan Moag
The Promotion of Physical Activity - Everyone's Responsibility | Susan MoagThe Promotion of Physical Activity - Everyone's Responsibility | Susan Moag
The Promotion of Physical Activity - Everyone's Responsibility | Susan Moag
Scottish Cancer Prevention Network
 
CC_Social_Media_Kit_9-11-15
CC_Social_Media_Kit_9-11-15CC_Social_Media_Kit_9-11-15
CC_Social_Media_Kit_9-11-15Erin Zaranec
 
The Importance of Staying Active after a Cancer Diagnosis | Dr Anna Campbell
The Importance of Staying Active after a Cancer Diagnosis | Dr Anna CampbellThe Importance of Staying Active after a Cancer Diagnosis | Dr Anna Campbell
The Importance of Staying Active after a Cancer Diagnosis | Dr Anna Campbell
Scottish Cancer Prevention Network
 
TFPL Learning Directory
TFPL Learning DirectoryTFPL Learning Directory
TFPL Learning DirectoryMaria Naylor
 
Learning Course Directory
Learning Course DirectoryLearning Course Directory
Learning Course DirectoryMaria Naylor
 
Cholesterol tăng cao gây ra những bệnh nguy hiểm
Cholesterol tăng cao gây ra những bệnh nguy hiểmCholesterol tăng cao gây ra những bệnh nguy hiểm
Cholesterol tăng cao gây ra những bệnh nguy hiểmbernardine385
 
ER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoring
ER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoringER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoring
ER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoringVanita Leah Falcao
 
Promoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil Hamlet
Promoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil HamletPromoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil Hamlet
Promoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil Hamlet
Scottish Cancer Prevention Network
 
Maternity-Entitlement-Report_CES_29.05
Maternity-Entitlement-Report_CES_29.05Maternity-Entitlement-Report_CES_29.05
Maternity-Entitlement-Report_CES_29.05Vanita Leah Falcao
 
Promoting Health and Well-being for Cancer Prevention | Sylvia Mudie
Promoting Health and Well-being for Cancer Prevention | Sylvia MudiePromoting Health and Well-being for Cancer Prevention | Sylvia Mudie
Promoting Health and Well-being for Cancer Prevention | Sylvia Mudie
Scottish Cancer Prevention Network
 
Briiffi - millainen on hyvä briiffi?
Briiffi - millainen on hyvä briiffi?Briiffi - millainen on hyvä briiffi?
Briiffi - millainen on hyvä briiffi?
Ammattijohtaja.fi / Puranen Consulting Oy
 
Passive weight lifter assistance system for hydraulic trucks
Passive weight lifter assistance system for hydraulic trucksPassive weight lifter assistance system for hydraulic trucks
Passive weight lifter assistance system for hydraulic trucksVenkat S Arya
 

Viewers also liked (20)

operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS device
 
PlateRunner Users Guide 11-27-07
PlateRunner Users Guide 11-27-07PlateRunner Users Guide 11-27-07
PlateRunner Users Guide 11-27-07
 
Return of the storyteller
Return of the storytellerReturn of the storyteller
Return of the storyteller
 
Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...
Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...
Overview of the 4th Edition of the European Code Against Cancer | Prof Annie ...
 
Värdet av strukturerade och meningsfulla sammanhang
Värdet av strukturerade och meningsfulla sammanhangVärdet av strukturerade och meningsfulla sammanhang
Värdet av strukturerade och meningsfulla sammanhang
 
Can ho-the-krista-capitaland
Can ho-the-krista-capitalandCan ho-the-krista-capitaland
Can ho-the-krista-capitaland
 
The Promotion of Physical Activity - Everyone's Responsibility | Susan Moag
The Promotion of Physical Activity - Everyone's Responsibility | Susan MoagThe Promotion of Physical Activity - Everyone's Responsibility | Susan Moag
The Promotion of Physical Activity - Everyone's Responsibility | Susan Moag
 
CC_Social_Media_Kit_9-11-15
CC_Social_Media_Kit_9-11-15CC_Social_Media_Kit_9-11-15
CC_Social_Media_Kit_9-11-15
 
The Importance of Staying Active after a Cancer Diagnosis | Dr Anna Campbell
The Importance of Staying Active after a Cancer Diagnosis | Dr Anna CampbellThe Importance of Staying Active after a Cancer Diagnosis | Dr Anna Campbell
The Importance of Staying Active after a Cancer Diagnosis | Dr Anna Campbell
 
TFPL Learning Directory
TFPL Learning DirectoryTFPL Learning Directory
TFPL Learning Directory
 
Learning Course Directory
Learning Course DirectoryLearning Course Directory
Learning Course Directory
 
Cholesterol tăng cao gây ra những bệnh nguy hiểm
Cholesterol tăng cao gây ra những bệnh nguy hiểmCholesterol tăng cao gây ra những bệnh nguy hiểm
Cholesterol tăng cao gây ra những bệnh nguy hiểm
 
ER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoring
ER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoringER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoring
ER133_PDSToGoPortabilityofRightsthroughReal-timeMonitoring
 
Promoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil Hamlet
Promoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil HamletPromoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil Hamlet
Promoting Health and Wellbeing - Vision, Practice and Reality | Dr Neil Hamlet
 
Maternity-Entitlement-Report_CES_29.05
Maternity-Entitlement-Report_CES_29.05Maternity-Entitlement-Report_CES_29.05
Maternity-Entitlement-Report_CES_29.05
 
Ploy Story
Ploy StoryPloy Story
Ploy Story
 
Promoting Health and Well-being for Cancer Prevention | Sylvia Mudie
Promoting Health and Well-being for Cancer Prevention | Sylvia MudiePromoting Health and Well-being for Cancer Prevention | Sylvia Mudie
Promoting Health and Well-being for Cancer Prevention | Sylvia Mudie
 
Briiffi - millainen on hyvä briiffi?
Briiffi - millainen on hyvä briiffi?Briiffi - millainen on hyvä briiffi?
Briiffi - millainen on hyvä briiffi?
 
Passive weight lifter assistance system for hydraulic trucks
Passive weight lifter assistance system for hydraulic trucksPassive weight lifter assistance system for hydraulic trucks
Passive weight lifter assistance system for hydraulic trucks
 
Kkf manual arabic
Kkf manual arabicKkf manual arabic
Kkf manual arabic
 

Similar to Cis81 ccna1v5-2-configuring networkoperatingsystem

ITN_Module_2.pptx
ITN_Module_2.pptxITN_Module_2.pptx
ITN_Module_2.pptx
AshiruMUmar
 
Basics to Configure NW Device
Basics to Configure NW DeviceBasics to Configure NW Device
Basics to Configure NW Device
Haitham El-Ghareeb
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptxCCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptx
NguyenLe340487
 
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptx
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptxCh2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptx
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptx
RIFQIABDULAZIZ6
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glanceVikas Raut
 
Ccna configuracion y comandos
Ccna configuracion y comandosCcna configuracion y comandos
Ccna configuracion y comandosAlfonso Saucedo
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorialIT Tech
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
Netwax Lab
 
OSWAN.pptx
OSWAN.pptxOSWAN.pptx
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
VISHNU N
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
anilinvns
 
Basic about-router
Basic about-routerBasic about-router
Basic about-router
saurabh goel
 
lab2_2.pptx
lab2_2.pptxlab2_2.pptx
lab2_2.pptx
RobelTsada
 
Day 5.2 startingarouter
Day 5.2 startingarouterDay 5.2 startingarouter
Day 5.2 startingarouter
CYBERINTELLIGENTS
 
Cisco config
Cisco configCisco config
Cisco config
Ayas Tincem
 

Similar to Cis81 ccna1v5-2-configuring networkoperatingsystem (20)

ITN_Module_2.pptx
ITN_Module_2.pptxITN_Module_2.pptx
ITN_Module_2.pptx
 
Basics to Configure NW Device
Basics to Configure NW DeviceBasics to Configure NW Device
Basics to Configure NW Device
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptxCCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptx
 
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptx
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptxCh2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptx
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptx
 
Introduction to routers
Introduction to routersIntroduction to routers
Introduction to routers
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
 
Ccna configuracion y comandos
Ccna configuracion y comandosCcna configuracion y comandos
Ccna configuracion y comandos
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
OSWAN.pptx
OSWAN.pptxOSWAN.pptx
OSWAN.pptx
 
Mod11
Mod11Mod11
Mod11
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
 
Basic about-router
Basic about-routerBasic about-router
Basic about-router
 
lab2_2.pptx
lab2_2.pptxlab2_2.pptx
lab2_2.pptx
 
Day 5.2 startingarouter
Day 5.2 startingarouterDay 5.2 startingarouter
Day 5.2 startingarouter
 
Cisco config
Cisco configCisco config
Cisco config
 
Cisco config
Cisco configCisco config
Cisco config
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 

Recently uploaded (16)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 

Cis81 ccna1v5-2-configuring networkoperatingsystem

  • 1. CIS 81 Fundamentals of Networking Chapter 2: Configuring a Network Operating System Rick Graziani Cabrillo College graziani@cabrillo.edu Fall 2013
  • 2. Chapter 2 - Objectives Explain the purpose of Cisco IOS. Explain how to access and navigate Cisco IOS to configure network devices. Describe the command structure of Cisco IOS software. Configure hostnames on a Cisco IOS device using the CLI. Use Cisco IOS commands to limit access to device configurations. Use Cisco IOS commands to save the running configuration. Explain how devices communicate across network media. Configure a host device with an IP address. Verify connectivity between two end devices. 2
  • 3. Cisco IOS Operating Systems All networking equipment depend on operating systems:  End users (PCs, laptops, smart phones, tablets)  Switches  Routers  Wireless access points  Firewalls Cisco Internetwork Operating System (IOS)  Collection of network operating systems used on Cisco devices 3
  • 5. Cisco IOS Purpose of OS  PC operating systems (Windows 8, Linux & OS X) perform technical functions that enable • Use of a input and output devices • Manage processes and programs • Manage file systems, security, hardware, etc.  Switch or router IOS provides options to • Same functions as host operating systems • Configure interfaces • Enable routing and switching functions  All networking devices come with a default IOS (switches, routers, firewalls)  Possible to upgrade the IOS version or feature set 5
  • 6. Cisco IOS Location of the Cisco IOS IOS stored in Flash  Non-volatile storage – not lost when power is lost  Can be changed or overwritten as needed  Can be used to store multiple versions of IOS  IOS copied from flash to volatile RAM when booted  Quantity of flash and RAM memory determines IOS that can be used 6
  • 7. Cisco IOS IOS Functions Major functions performed or enabled by Cisco routers and switches include: 7
  • 8. 8 Router/Switch Bootup Process (more in later course)
  • 10. 10 running-config IOS (running) startup-config IOS ios (partial) Bootup program Where is the permanent configuration file stored used during boot-up? NVRAM (B) Where is the diagnostics software stored executed by hardware modules? ROM (D) Where is the backup (partial) copy of the IOS stored? ROM (D) Where is IOS permanently stored before it is copied into RAM? FLASH (C) Where are all changes to the configuration immediately stored? RAM (A) A B C D
  • 11. 11 running-config IOS (running) startup-config IOS ios (partial) Bootup program ? ? ? ? ? ? ?
  • 12. 12 running-config IOS (running) startup-config IOS ios (partial) Bootup program startup-config IOS Bootup program ios (partial) running-config IOS (running) A B C D B A D C D A
  • 13. Cisco IOS CCO Account Benefits and IOS Files This video introduces Cisco Connection Online (CCO). CCO has a wealth of information available regarding Cisco products and services. 13
  • 14. Accessing a Cisco IOS Device Console Access Method Most common methods to access the Command Line Interface  Console  Telnet or SSH  AUX port 14
  • 15. Accessing a Cisco IOS Device Console Access Method Console port Device is accessible even if no networking services have been configured (out-of-band) Need a special console cable (aka rollover cable) Allows configuration commands to be entered Should be configured with passwords to prevent unauthorized access Device should be located in a secure room so console port can not be easily accessed 15
  • 16. 16 Establishing a HyperTerminal session (next week)  Connect PC using the RJ-45/mini-USB to Serial/USB rollover cable.  Configure the terminal or PC terminal emulation software for:  9600 baud  8 data bits  no parity  1 stop bit  no flow control Rollover cable Console port Com1 or Com2 serial port Or USB port with USB-to-Serial adapter Terminal or a PC with terminal emulation software Router
  • 17. 17 Terminal (Serial) Settings) Configure the terminal or PC terminal emulation software for:  9600 baud  8 data bits  no parity  1 stop bit  no flow control.
  • 18. 18 Establishing a Terminal/Serial/Console session  Important: A console connection is not the same as a network connection! = • PuTTY • Tera Term • SecureCRT • HyperTerminal • OS X Terminal • Zoc Dumb Terminal
  • 19. Accessing a Cisco IOS Device Telnet, SSH, and AUX Access Methods Telnet  Method for remotely accessing the CLI over a network  Require active networking services and one active interface that is configured Secure Shell (SSH) – Preferred over Telnet  Remote login similar to Telnet but utilizes more security  Stronger password authentication  Uses encryption when transporting data Aux Port (not used too much)  Out-of-band connection  Uses telephone line  Can be used like console port 19
  • 20. 20 C:> ssh C:> ping Ethernet Connection Network connection needed When can you use a network connection to connect to the router? What software/command do you need? What cable and ports do you use? When should you not use a network connection to configure the router? When there is a network connection to the router (telnet). TCP/IP, Terminal prompt (DOS), Tera Term, etc. PC & Router: Ethernet NIC Ethernet straight-through cable When the change may disconnect the telnet connection. NIC
  • 21. Accessing a Cisco IOS Device Terminal Emulation Programs Software available for connecting to a networking device (usually same as terminal/serial/console connection): PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal Zoc 21
  • 22. Navigating the IOS Cisco IOS Modes of Operation 22
  • 23. Navigating the IOS Cisco IOS Modes of Operation enable configure terminal interface < > router < > line < > 23
  • 24. Navigating the IOS Primary Modes enable enable 24
  • 25. Navigating the IOS Global Configuration Mode and Submodes Global configuration mode and interface configuration modes can only be reached from the privileged EXEC mode. 25
  • 26. Navigating the IOS Navigating between IOS Modes Similar IOS commands for switches and routers 26
  • 27. Navigating the IOS Navigating between IOS Modes (cont.) Switch> user mode Switch> enable go to privilege mode Switch# configure terminal go to global configuration mode Switch(config)# interface vlan 1 go to interface mode Switch(config-if)# exit Switch(config)# exit Switch# config t Shortened commands and parameters Switch(config)# vlan 1 go to VLAN configuration mode Switch(config-vlan)# end go to privilege-EXEC mode Switch# disable Switch> enable Switch# config t Switch(config)# line vty 0 4 go to interface (line) mode Switch(config-line)# exit Switch(config)# 27
  • 28. 28 Common Commands for Switches and Routers Switch> user mode Switch> enable Switch# privilege mode Switch# configure terminal Switch(config)# exit Switch# config t Switch(config)# hostname name Switch(config)# enable secret password privilege password Switch(config)# line console 0 console password Switch(config-line)# password password Switch(config-line)# login Switch(config)# line vty 0 4 telnet password Switch(config-line)# password password Switch(config-line)# login Switch(config)# banner motd # message # banner Switch(config)# interface type number configure interface Switch(config-if)# description description
  • 29. 29 Making your life easier! Switch# enable Switch(config)# line console 0 Console port Switch(config-line)# logging synchronous IOS will not Switch(config-line)# exec-timeout 0 0 password Switch(config)# no ip domain-lookup password Switch(config-line)# login Switch(config)# banner motd # message # banner Switch(config)# interface type number configure interface Switch(config-if)# description description
  • 30. Navigating the IOS Navigating between IOS Modes 30
  • 31. The Command Structure IOS Command Structure 31
  • 32. The Command Structure Cisco IOS Command Reference IOS Command Conventions The general syntax for a command is the command followed by any appropriate keywords (defined) and arguments (undefined). An argument is generally not a predefined word. An argument is a value or variable defined by the user. Switch(config-if)# description string Boldface text indicates commands and keywords that are typed as shown Italic text indicates an argument for which you supply the value. For the description command, the argument is a string value. The string value can be any text string of up to 80 characters. Example: Switch(config-if)# description MainHQ Office Switch 32
  • 33. The Command Structure Cisco IOS Command Reference  For the ping command: Switch> ping IP-address Switch> ping 10.10.10.5  The command is ping and the user defined argument is the 10.10.10.5.  Similarly, the syntax for entering the traceroute command is: Switch> traceroute IP-address Switch> traceroute 192.168.254.254  The command is traceroute and the user defined argument is the 192.168.254.254. 33
  • 34. The Command Structure Context Sensitive Help 34
  • 35. The Command Structure Command Syntax Check 35
  • 36. The Command Structure Command Syntax Check 36
  • 37. The Command Structure Command Syntax Check 37
  • 38. The Command Structure Hot Keys and Shortcuts  Tab - Completes the remainder of a partially typed command or keyword  Ctrl-R - Redisplays a line  Ctrl-A – Moves cursor to the beginning of the line  Ctrl-Z - Exits configuration mode and returns to user EXEC  Down Arrow - Allows the user to scroll forward through former commands  Up Arrow - Allows the user to scroll backward through former commands  Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute.  Ctrl-C - Aborts the current command and exits the configuration mode 38
  • 39. The Command Structure IOS Examination Commands 39
  • 40. The Command Structure The show version Command 40
  • 42. Hostnames Why the Switch Let’s focus on Creating a two PC network connected via a switch Setting a name for the switch Limiting access to the device configuration Configuring banner messages Saving the configuration 42
  • 43. Hostnames Device Names Hostnames allow devices to be identified by network administrators over a network or the Internet. Some guidelines for naming conventions are that names should: Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length Without names, network devices are difficult to identify for configuration purposes. 43
  • 44. Hostnames Configuring Hostnames Switch(config)# hostname Sw-Floor-3 Sw-Floor3(config)# Switch(config)# hostname Sw-Floor-2 Sw-Floor2(config)# Switch(config)# hostname Sw-Floor-1 Sw-Floor1(config)# 44
  • 45. Limiting Access to Device Configurations Securing Device Access The passwords introduced here are: Enable password - Limits access to the privileged EXEC mode Enable secret - Encrypted, limits access to the privileged EXEC mode Console password - Limits device access using the console connection VTY password - Limits device access over Telnet Note: In most of the labs in this course, we will be using simple passwords such as cisco or class. 45
  • 46. Limiting Access to Device Configurations Securing Privileged EXEC Access  use the enable secret command, not the older enable password command  enable secret provides greater security because the password is encrypted class 46
  • 47. Limiting Access to Device Configurations Securing User EXEC Access  Console port must be secured • reduces the chance of unauthorized personnel physically plugging a cable into the device and gaining device access  vty lines allow access to a Cisco device via Telnet • number of vty lines supported varies with the type of device and the IOS version 47
  • 48. Limiting Access to Device Configurations Encrypting Password Display service password- encryption prevents passwords from showing up as plain text when viewing the configuration purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file once applied, removing the encryption service does not reverse the encryption 48
  • 49. Limiting Access to Device Configurations Banner Messages  Important part of the legal process in the event that someone is prosecuted for breaking into a device  Wording that implies that a login is "welcome" or "invited" is not appropriate Switch(config)# banner motd # This is a secure system Authorized Access Only!!! # Sw-Floor3(config)# 49
  • 50. Saving Configurations Configuration Files Switch# show running-config Switch# copy running-config startup-config <Changes made> Switch# delete vlan.dat Delete filename [vlan.dat]? Delete flash:vlan.dat? [confirm] Switch# erase startup-config Switch# reload System configuration has been modified. Save? [yes/no]: n Proceed with reload? [confirm] 50
  • 53. Ports and Addresses IP Addressing in the Large  Each end device on a network must be configured with an IP address  Structure of an IPv4 address is called dotted decimal  IP address displayed in decimal notation, with four decimal numbers between 0 and 255  With the IP address, a subnet mask is also necessary  IP addresses can be assigned to both physical ports and virtual interfaces  IPv4 and IPv6 addresses will be discussed in more detail later 53
  • 54. Ports and Addresses Interfaces and Ports  Terms are used interchangeably  Some interfaces can be can be configured with an IP address such as:  NIC (Ethernet interface) on a host/computer  Router’s Ethernet or Serial interfaces  Switches have ports (interfaces) but do not typically have IP addresses assigned to them  Used to connect devices on LANs that do have IP addresses such as hosts, routers, printers. 54
  • 55. Addressing Devices Configuring a Switch Virtual Interface  Allows the network administrator to communicate (SSH, telnet, ping) with the switch.  It is OPTIONAL  “Layer 2” switches do NOT need an IP address to forward Ethernet frames.  IP address - together with subnet mask, uniquely identifies end device on internetwork (more later)  Subnet mask - determines which part of a larger network is used by an IP address interface VLAN 1 - interface configuration mode  ip address 192.168.10.2 255.255.255.0 - configures the IP address and subnet mask for the switch  no shutdown - administratively enables the interface  Switch still needs to have physical ports configured and VTY lines to enable remote management 55
  • 56. Addressing Devices Manual IP Address Configuration for End Devices 56 More later!
  • 57. Addressing Devices Automatic IP Address Configuration for End Devices 57 More later!
  • 58. Addressing Devices IP Address Conflicts 58 More later!
  • 60. Verifying Connectivity Test the Loopback Address on an End Device C:> ping 127.0.0.1 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 60
  • 61. Verifying Connectivity Testing the Interface Assignment 61
  • 63. Configuring a Network Operating System Chapter 2 Summary  Services provided by the Cisco IOS accessed using a command- line interface (CLI) • accessed by either the console port, the AUX port, or through telnet or SSH • can make configuration changes to Cisco IOS devices • a network technician must navigate through various hierarchical modes of the IOS  Cisco IOS routers and switches support a similar operating system  Introduced the initial settings of a Cisco IOS switch device • setting a name • limiting access to the device configuration • configuring banner messages • saving the configuration 63
  • 66. CIS 81 Fundamentals of Networking Chapter 2: Configuring a Network Operating System Rick Graziani Cabrillo College graziani@cabrillo.edu Fall 2013

Editor's Notes

  1. Chapter 2 Objectives
  2. 2.1.1.1
  3. 2.1.1.2 Purpose of OS In this course, you will focus primarily on Cisco IOS Release 15.x
  4. 2.1.1.3 Location of the Cisco IOS
  5. 2.1.1.4 IOS Functions Each feature or service has an associated collection of configuration commands that allow a network technician to implement the feature or service. The services provided by the Cisco IOS are generally accessed using a command-line interface (CLI).
  6. Step 1: POST (Power On Self Test) Executes diagnostics from ROM on several hardware components, including the CPU,RAM, NVRAM Step 2: Loading Bootstrap Program Copied from ROM into RAM Executed by CPU Main task is to locate the Cisco IOS and load it into RAM Step 3: Locating the IOS Typically stored in flash memory, but it can be stored in other places such as a TFTP server. If a full IOS image cannot be located, a scaled-down version of the IOS is copied from ROM This version of IOS is used to help diagnose any problems and to try to load a complete version of the IOS into RAM. Step 4: Loading the IOS Some of the older Cisco routers ran the IOS directly from flash Current models copy the IOS into RAM for execution Might see a string of pound signs (#) while the image decompresses. Step 5: Locating the Config File Bootstrap program searches for the startup configuration file (startup-config), in NVRAM. This file has the previously saved configuration commands and parameters, Step 6: Loading the Config File If a startup configuration file is found in NVRAM, the IOS loads it into RAM as the running-config file and executes the commands. If the startup configuration file cannot be located, prompt the user to enter setup mode If setup mode not used, a default running-config file is created
  7. 2.1.1.3 Location of the Cisco IOS
  8. 2.1.2.1 Console Access Method
  9. 2.1.2.1 Console Access Method Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.   In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.
  10. Take the following steps to connect a terminal to the console port on the router: Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter. Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.
  11. Take the following steps to connect a terminal to the console port on the router: Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter. Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.
  12. Important: A console connection is not the same as a network connection!
  13. 2.1.2.2 Telnet, SSH, and AUX Access Methods
  14. 2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes
  15. 2.1.3.1 In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt
  16. 2.1.3.1 In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt
  17. 2.1.3.2 Primary Modes The two primary modes of operation are user EXEC mode and privileged EXEC mode. Tthe privileged EXEC mode has a higher level of authority in what it allows the user to do with the device. User EXEC Mode The user EXEC mode has limited capabilities but is useful for some basic operations. This mode is the first mode encountered upon entrance into the CLI of an IOS device. This is often referred to as view-only mode. The user EXEC level does not allow the execution of any commands that might change the configuration of the device. By default, there is no authentication required to access the user EXEC mode from the console. However, it is a good practice to ensure that authentication is configured during the initial configuration. The user EXEC mode is identified by the CLI prompt that ends with the &amp;gt; symbol. This is an example that shows the &amp;gt; symbol in the prompt: Switch&amp;gt; Privileged EXEC Mode The execution of configuration and management commands requires that the network administrator use the privileged EXEC mode, or a more specific mode in the hierarchy. The privileged EXEC mode can be identified by the prompt ending with the #symbol. Switch# By default, privileged EXEC mode does not require authentication. Global configuration mode and all other more specific configuration modes can only be reached from the privileged EXEC mode.
  18. 2.1.3.3 Global Configuration Mode and Submodes Global configuration mode and interface configuration modes can only be reached from the privileged EXEC mode. From global config, CLI configuration changes are made that affect the operation of the device as a whole. Switch# configure terminal Switch(config)# From the global config mode, the user can enter different subconfiguration modes. Each of these modes allows the configuration of a particular part or function of the IOS device. Interface mode - to configure one of the network interfaces (Fa0/0, S0/0/0) Line mode - to configure one of the physical or virtual lines (console, AUX, VTY) To exit a specific configuration mode and return to global configuration mode, enter exit at a prompt. To leave configuration mode completely and return to privileged EXEC mode, enter end or use the key sequence Ctrl-Z. As commands are used and modes are changed, the prompt changes to reflect the current context.
  19. 2.1.3.4 Navigating between IOS Modes The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively.
  20. 2.1.3.5 Navigating between IOS Modes (Continued) To move from the global configuration mode to the privileged EXEC mode, you enter the command exit. To move from any submode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command. To move from any submode of the privileged EXEC mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.  To move from any submode of the global configuration mode to another “immediate” submode of the global configuration mode, simply enter the corresponding command that is normally entered from global configuration mode
  21. 2.1.3.4 Navigating between IOS Modes The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively.
  22. 2.1.4.1 IOS Command Structure Each IOS command has a specific format or syntax and can only be executed at the appropriate mode. The commands are not case-sensitive. Following the command are one or more keywords and arguments. Unlike a keyword, an argument is generally not a predefined word. An argument is a value or variable defined by the user Switch&amp;gt; ping IP address Switch&amp;gt; ping 10.10.10.5 The command is ping and the user defined argument is the 10.10.10.5. Similarly, the syntax for entering thetraceroute command is: Switch&amp;gt; traceroute IP address Switch&amp;gt; traceroute 192.168.254.254 The command is traceroute and the user defined argument is the 192.168.254.254.
  23. 2.1.4.2 Cisco IOS Command Reference The Command Reference is a fundamental resource that network engineers use to check various characteristics of a given IOS command. 
  24. 2.1.4.2 Cisco IOS Command Reference The Command Reference is a fundamental resource that network engineers use to check various characteristics of a given IOS command. 
  25. 2.1.4.3 Context Sensitive Help The IOS has several forms of help available: Context-sensitive help Command Syntax Check Hot Keys and Shortcuts
  26. 2.1.4.4 Command Syntax Check There are three different types of error messages: Ambiguous command Incomplete command Incorrect command
  27. 2.1.4.4 Command Syntax Check There are three different types of error messages: Ambiguous command Incomplete command Incorrect command
  28. 2.1.4.4 Command Syntax Check There are three different types of error messages: Ambiguous command Incomplete command Incorrect command
  29. 2.1.4.5 Hot Keys and Shortcuts Tab - This is a good technique to use when you are learning because it allows you to see the full word used for the command or keyword. Ctrl-Z -  Because the IOS has a hierarchical mode structure, you may find yourself several levels down. Rather than exit each mode individually, use Ctrl-Z to return directly to the privileged EXEC prompt at the top level. Ctrl-Shift-6 - Using the escape sequence. When an IOS process is initiated from the CLI, such as a ping or traceroute, the command runs until it is complete or is interrupted. While the process is running, the CLI is unresponsive. To interrupt the output and interact with the CLI, press Ctrl-Shift-6. Commands and keywords can be abbreviated to the minimum number of characters that -identify a unique selection. 
  30. 2.1.4.6 IOS Examination Commands Use theshow ? command to get a list of available commands in a given context, or mode. A typical show command can provide information about the configuration, operation, and status of parts of a Cisco device. A very commonly used show command is show interfaces. This command displays statistics for all interfaces on the device. To view the statistics for a specific interface, enter the show interfaces command followed by the specific interface type and slot/port number. Some other show commands frequently used by network technicians include: show startup-config - Displays the saved configuration located in NVRAM. show running-config - Displays the contents of the currently running configuration file.
  31. 2.1.4.7 The show version Command This command displays information about the currently loaded IOS version, along with hardware and device information. Software Version - IOS software version (stored in flash) Bootstrap Version - Bootstrap version (stored in Boot ROM) System up-time - Time since last reboot System restart info - Method of restart (e.g., power cycle, crash) Software image name - IOS filename stored in flash Router Type and Processor type - Model number and processor type Memory type and allocation (Shared/Main) - Main Processor RAM and Shared Packet I/O buffering Software Features - Supported protocols / feature sets Hardware Interfaces - Interfaces available on the device Configuration Register - Sets bootup specifications, console speed setting, and related parameters
  32. 2.1.4.7 The show version Command This command displays information about the currently loaded IOS version, along with hardware and device information. Software Version - IOS software version (stored in flash) Bootstrap Version - Bootstrap version (stored in Boot ROM) System up-time - Time since last reboot System restart info - Method of restart (e.g., power cycle, crash) Software image name - IOS filename stored in flash Router Type and Processor type - Model number and processor type Memory type and allocation (Shared/Main) - Main Processor RAM and Shared Packet I/O buffering Software Features - Supported protocols / feature sets Hardware Interfaces - Interfaces available on the device Configuration Register - Sets bootup specifications, console speed setting, and related parameters
  33. 2.2.1.1 Why the Switch
  34. 2.2.1.2 Device Names
  35. 2.2.1.4 Configuring Hostnames
  36. 2.2.2.1 Securing Device Access Consider these key points when choosing passwords: Use passwords that are more than eight characters in length. Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences in passwords. Avoid using the same password for all devices. Avoid using common words such as password or administrator, because these are easily guessed
  37. 2.2.2.2 Securing Privileged EXEC Access
  38. 2.2.2.3 Securing User EXEC Access
  39. 2.2.2.4 Encrypting Password Display
  40. 2.2.2.5 Banner Messages
  41. 2.2.3.1 Configuration Files Switch# erase startup-config After the command is issued, the switch will prompt you for confirmation: Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] Confirm is the default response. To confirm and erase the startup configuration file, press . Pressing any other key will abort the process.
  42. 2.2.3.2 Capturing Text] Restoring Text Configurations A configuration file can be copied from storage to a device. When copied into the terminal, the IOS executes each line of the configuration text as a command. This means that the file will require editing to ensure that encrypted passwords are in plain text and that non-command text such as &amp;quot;--More--&amp;quot; and IOS messages are removed. This process is discussed in the lab. Further, at the CLI, the device must be set at the global configuration mode to receive the commands from the text file being copied. When using HyperTerminal, the steps are: Locate the file to be copied into the device and open the text document. Copy all of the text. On the Edit menu, click paste to host. When using TeraTerm, the steps are: On the File menu, click Send file. Locate the file to be copied into the device and click Open. TeraTerm will paste the file into the device.
  43. 2.2.3.2 Capturing Text] Restoring Text Configurations A configuration file can be copied from storage to a device. When copied into the terminal, the IOS executes each line of the configuration text as a command. This means that the file will require editing to ensure that encrypted passwords are in plain text and that non-command text such as &amp;quot;--More--&amp;quot; and IOS messages are removed. This process is discussed in the lab. Further, at the CLI, the device must be set at the global configuration mode to receive the commands from the text file being copied. When using HyperTerminal, the steps are: Locate the file to be copied into the device and open the text document. Copy all of the text. On the Edit menu, click paste to host. When using TeraTerm, the steps are: On the File menu, click Send file. Locate the file to be copied into the device and click Open. TeraTerm will paste the file into the device.
  44. 2.3.1.1 IP Addressing in the Large
  45. 2.3.1.2 Interfaces and Ports Some of the differences between various types of media include: The distance the media can successfully carry a signal. The environment in which the media is to be installed. The amount of data and the speed at which it must be transmitted. The cost of the media and installation
  46. 2.3.2.1 Configuring a Switch Virtual Interface
  47. 2.3.2.2 Manual IP Address Configuration for End Devices
  48. 2.3.2.3 Automatic IP Address Configuration for End Devices
  49. 2.3.2.4 IP Address Conflicts
  50. 2.3.2.4 IP Address Conflicts
  51. 2.3.3.1 Test the Loopback Address on an End Device
  52. 2.3.3.2 Testing the Interface Assignment
  53. 2.3.3.3 Testing End-to-End Connectivity
  54. 2.4.1.3 Summary
  55. 2.4.1.3 Summary
  56. 2.4.1.3 Summary