Modul 04-Network Operating System PDF
Modul 04-Network Operating System PDF
Operating System
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
IOS Bootcamp
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
IOS Bootcamp
Cisco IOS
Operating Systems
• PC OS allows users to interact with the computer
• User-computer interaction in PC OSs are often done
via mouse, keyboard and monitor
• Cisco IOS is also an Operating System
• Cisco IOS allows users to interact with Cisco devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
IOS Bootcamp
Cisco IOS Access
Access Methods
• Console
• Auxiliary
• Virtual Terminal (Telnet / SSH)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
IOS Bootcamp
Navigate the IOS
Cisco IOS Modes of Operation
• Initial configuration must be done via console connection
• Configuration is then done via various CLI command modes.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
IOS Bootcamp
The Command Structure
Basic IOS Command Structure
• The general syntax for a command is the command followed by any
appropriate keywords and arguments.
• Keyword - a specific parameter defined in the operating system
• Argument - not predefined; a value or variable defined by the user
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Basic Device Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Basic Device Configuration
Hostnames
Device Names
• Hostnames allow devices to be identified by network administrators over a
network or the Internet.
• Very important and should also be displayed in the topology.
Configure Hostnames
• IOS hostnames should:
• Start with a letter
• Contain no spaces
• End with letter or digit
• Use only letters, digits or dashes
• Be less than 64 characters in length
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Basic Device Configuration
Limit Access to Device Configurations
Secure Device Access
• Secure privileged EXEC and user EXEC access with a
password.
• Secure virtual terminal lines with a password.
Configure Passwords
• Use strong passwords.
• Avoid re-using passwords
Encrypt Passwords
• Cisco IOS displays passwords in plain text by default.
• Passwords should be encrypted.
Banner Messages
• Important part of the legal process in the event that someone is
prosecuted for breaking into a device.
• Wording that implies that a login is "welcome" or "invited" is not
appropriate.
• Often used for legal notification because it is displayed to all
connected terminals.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Basic Device Configuration
Save Configurations
Save the Running Configuration File
• File stored in NVRAM that contains all of the
commands that will be used upon startup or reboot
• NVRAM does not lose its contents when the device is
powered off.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Address Schemes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Address Schemes
Ports and Addresses
IP Addresses
• Each end device on a network must be configured with an
IP address.
• Enable devices to establish end-to-end communication on
the Internet.
• The structure of an IPv4 address is called dotted decimal
notation and is represented by four decimal numbers
between 0 and 255.
• IPv6 is the most recent version of IP and the replacement
for the more common IPv4.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Address Schemes
Verifying Connectivity
Interface Addressing Verification
• Cisco IOS supports commands to
allow IP configuration verification.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Lab Basic Cisco Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16