SlideShare a Scribd company logo
CCNA Guide to Cisco Networking Fundamentals  Chapter 5 Router and IOS Basics
Objectives Describe the benefits of network segmentation with routers Understand the elements of the Cisco router user interface Configure the HyperTerminal program to interface with the Cisco router Describe the various router configuration modes CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Objectives (continued) Describe the various router passwords Understand the enhanced editing features of the Cisco IOS Compare router components to typical PC components CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Benefits of Routing Routers provide Packet filtering Connections between local networks Traffic control Wide area network (WAN) connections Routers operate at the Network layer of the OSI reference model Because of Network layer addressing, routers can direct packets to both local and remote segments CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Cisco Router User Interface Cisco Internetwork Operating System (IOS) Provides a command-line interface (CLI) Allows network operators to check the status of the router and network administrators to manage and configure the router You can access a router in several different ways Console port  (also known as the  console ) Auxiliary port (AUX) Virtual terminals (VTY) Trivial File Transfer Protocol (TFTP) server CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Connecting via Terminal Programs When configuring the router through the console or AUX ports You must first make the physical connection Then, you can access the router through a terminal program Steps to configure HyperTerminal: Open the HyperTerminal application Click File on the menu bar, and then click New Connection Enter a name for the connection CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Connecting via Terminal Programs (continued) Steps to configure HyperTerminal: (continued) Configure how you will connect to the router via the Connect To dialog box If you are connecting to the router through the AUX port, you would provide the router phone number here If connecting to the router through the console port, click the “Connect using” list box and choose the COM port to which the RJ-45 to DB-9 connector is attached Configure the following settings for the COM port: Bits per second, 9600; Data bits, 8; Parity, None; Stop bits, 1; Flow control, None CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
System Configuration Dialog If the router has not been configured previously, or if the startup file has been erased The Cisco IOS will prompt you to run the initial configuration dialog after the router boots The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
User Interface CCNA Guide to Cisco Networking Fundamentals, Fourth Edition The initial prompt consists of two parts: The host name of the router followed by the greater than symbol (>) Default:   router> User EXEC mode  (or  user mode ) When the prompt displayed is the greater than symbol Network operator can check router status and review several of the router settings
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
User Interface (continued) The question mark activates  context-sensitive Help  on the Cisco router User mode does not allow you to configure the router To do this, you must go into the  privileged EXEC mode To enter privileged EXEC, you can type the  enable  command at the user mode prompt Next, you may be prompted for a password Greater than symbol (>) changes to a pound sign (#) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
User Interface (continued) You can do a few things at this prompt Setup: the  setup  command will cause the router to enter the system configuration dialog Copy: configurations can be copied from TFTP servers to the router and therefore change the router configuration Erase: configuration files as well as the entire IOS can be erased CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuration Modes Global configuration mode Accessed by typing configure terminal at the enable mode prompt Interface configuration mode Allows you to configure the Ethernet and serial interfaces on your router Line configuration mode Allows you to configure the virtual terminals, console, and AUX lines that let you access the router CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuration Modes (continued) Typing  exit  will take you back one level Typing  end  or pressing the Ctrl+Z keys will take you all the way back to the enable prompt Often, you can discover abbreviated commands by simply trying them The router will show you the point at which you entered an incorrect character CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuration Modes (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords (continued) Enable Password and Enable Secret Password configuration You can set both passwords from the global configuration mode prompt Because it is encrypted, the enable secret password is more secure than the enable password You can type  no enable secret  and  no enable password  at the global configuration mode prompt To remove the enable secret and enable passwords CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords (continued) Setting Line passwords Line passwords are the first line of defense against unauthorized intrusion into the router You can set passwords for each line used to configure the router Configure the console line password Enter line configuration mode You can also configure passwords on the five virtual terminal lines that exist on every router In much the same way as on the console port CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Enhanced Editing By default, the router supports enhanced editing features that allow you to modify lengthy commands The enhanced editing commands let you jump to the beginning or end of a command line You can also jump forward or back, character by character, or word by word You can turn off the enhanced editing features by typing  terminal no editing  at either the user EXEC or the privileged EXEC prompts You can turn on terminal editing by typing  terminal editing CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Enhanced Editing (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Command History Command history Allows you to retrieve previously typed commands You can see up to 10 previously typed commands by typing  show history   From either the user EXEC or privileged EXEC mode To modify the number of commands stored by the router, you can use the terminal command Up to 256 previous commands Type  terminal history size  n CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuring Router Identification Router host name Default host name is  router To set the router host name, type  hostname  followed by the name that you want to set Configure a banner A banner is a message that you can configure to display each time someone attempts to log in to the router Enter global configuration mode by typing  config t Then type banner  motd , followed by a space and a delimiting character CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuring Router Identification (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuring Router Identification (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuring Router Identification (continued) Configure an interface description Use the description command The interface description helps you remember which network the interface services CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Configuring the Time and Date Use the  clock set  command in enable mode to configure the time You must be in global configuration mode to configure the time zone CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Router Components This section discusses the hardware elements of the router: ROM Flash memory NVRAM RAM/DRAM Interfaces CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
ROM Read-only memory (ROM) Loads the bootstrap program that initializes the router’s basic hardware components Not modified during normal operations, but it can be upgraded with special plug-in chips The content of ROM is maintained even when the router is rebooted The ROM monitor firmware runs when the router is turned on or rebooted CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Flash Memory Flash memory A type of erasable, programmable, read-only memory (EPROM) Not typically modified during normal operations However, it can be upgraded or erased when necessary The content of flash memory is maintained even when the router is rebooted Flash memory  Contains the working copy of the current Cisco IOS Is the component that initializes the IOS for normal router operations CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
NVRAM Nonvolatile random access memory (NVRAM)   A special type of RAM that is not cleared when the router is rebooted The startup configuration file for the router is stored in NVRAM by default This is the first file created by the person who sets up the router The Cisco IOS uses the configuration file in NVRAM during the router boot process CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
RAM/DRAM Random access memory (RAM) Also known as  dynamic random access memory (DRAM) A  volatile  hardware component Its information is not maintained in the event of a router reboot Changes to the router’s running configuration take place in RAM/DRAM CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
RAM/DRAM (continued) The IOS contains commands to view each of the router’s components show running-config show memory show buffers show startup-config Copy running-config startup-config Abbreviated as  Copy run start CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Interfaces A router can ship with a variety of configurable interfaces A common interface is Ethernet0 Other types of interfaces include: Token Ring Basic Rate Interface (BRI) Asynchronous Transfer Mode (ATM) Fiber Distributed Data Interface (FDDI) Channel Interface Processor (CIP) for Systems Network Architecture (SNA) High-Speed Serial Interface (HSSI) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Summary Cisco routers use the Cisco IOS to provide an interface for network operators and administrators The first mode entered is user EXEC ( router>  prompt) and the next mode is privileged EXEC ( router#  prompt) In user EXEC, you can accomplish basic tasks To actually configure the router, privileged EXEC mode must be accessed The privileged EXEC mode is often called enable mode CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Summary (continued) The enable, enable secret, and VTY passwords are set during initial configuration if the system configuration dialog is used When configured, the enable secret password supersedes the enable password The components of a router include ROM, flash memory, NVRAM, RAM/DRAM, and interfaces ROM stores a limited version of the Cisco IOS and routines for checking the hardware during system boot CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Summary (continued) Flash memory stores the Cisco IOS that is loaded by default during system boot NVRAM stores the startup copy of the router configuration file that is loaded by default during system boot RAM/DRAM stores the working copy (running configuration) of the router configuration Interfaces provide connectivity to various types of LANs and WANs CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Ad

More Related Content

What's hot (20)

CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
Madhan Banda
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
Nettech India Thane @ 9870803004/5
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
sushmil123
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheet
vannastart
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccna
ernestlithur
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
Mansour Naslcheraghi
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switch
ADDY50
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
VISHNU N
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric VanderburgCCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
Eric Vanderburg
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
ernestlithur
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
Ajaigururaj R
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
Raja Mazhar
 
CCNA- Router on stick, VLAN and Trunking
CCNA- Router on stick, VLAN and TrunkingCCNA- Router on stick, VLAN and Trunking
CCNA- Router on stick, VLAN and Trunking
Rafat Khandaker
 
Chapter8ccna
Chapter8ccnaChapter8ccna
Chapter8ccna
ernestlithur
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
Madhan Banda
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
sushmil123
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheet
vannastart
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switch
ADDY50
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
VISHNU N
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric VanderburgCCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
Eric Vanderburg
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
Raja Mazhar
 
CCNA- Router on stick, VLAN and Trunking
CCNA- Router on stick, VLAN and TrunkingCCNA- Router on stick, VLAN and Trunking
CCNA- Router on stick, VLAN and Trunking
Rafat Khandaker
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 

Viewers also liked (18)

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
OriginalGSM
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
Cornelius Micah
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission Fundamentals
Aisu
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
Ashita Agrawal
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
Kenan Spahi
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
dkaya
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
OriginalGSM
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
Cornelius Micah
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission Fundamentals
Aisu
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
Ashita Agrawal
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
Kenan Spahi
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
dkaya
 
Ad

Similar to CCNA Router and IOS Basics (20)

CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
Vikas Raut
 
4040187-Ccna-Notes.pptslide share scam side
4040187-Ccna-Notes.pptslide share scam side4040187-Ccna-Notes.pptslide share scam side
4040187-Ccna-Notes.pptslide share scam side
santoshp1925
 
4040187-Ccna-Notes.pptnotew for all users
4040187-Ccna-Notes.pptnotew for all users4040187-Ccna-Notes.pptnotew for all users
4040187-Ccna-Notes.pptnotew for all users
santoshp1925
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
Chapter4ccna
Chapter4ccnaChapter4ccna
Chapter4ccna
robertoxe
 
Chapter4ccna
Chapter4ccnaChapter4ccna
Chapter4ccna
ernestlithur
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
guest35417d
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Suchit Aher
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
Sripati Mahapatra
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
Netwax Lab
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
Betselove
 
Chapter 04 - Router Conf
Chapter 04 - Router ConfChapter 04 - Router Conf
Chapter 04 - Router Conf
phanleson
 
Mod11
Mod11Mod11
Mod11
Alam Garcia
 
How to configure cisco router password
How to configure cisco router passwordHow to configure cisco router password
How to configure cisco router password
IT Tech
 
Chapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptxChapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptx
desalewminale
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
Nghiep Lam
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
Vikas Raut
 
4040187-Ccna-Notes.pptslide share scam side
4040187-Ccna-Notes.pptslide share scam side4040187-Ccna-Notes.pptslide share scam side
4040187-Ccna-Notes.pptslide share scam side
santoshp1925
 
4040187-Ccna-Notes.pptnotew for all users
4040187-Ccna-Notes.pptnotew for all users4040187-Ccna-Notes.pptnotew for all users
4040187-Ccna-Notes.pptnotew for all users
santoshp1925
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
Chapter4ccna
Chapter4ccnaChapter4ccna
Chapter4ccna
robertoxe
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
Netwax Lab
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
Betselove
 
Chapter 04 - Router Conf
Chapter 04 - Router ConfChapter 04 - Router Conf
Chapter 04 - Router Conf
phanleson
 
How to configure cisco router password
How to configure cisco router passwordHow to configure cisco router password
How to configure cisco router password
IT Tech
 
Chapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptxChapter 2-Bascs of Switch & Router (1).pptx
Chapter 2-Bascs of Switch & Router (1).pptx
desalewminale
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
Nghiep Lam
 
Ad

More from Dsunte Wilson (16)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 

Recently uploaded (20)

Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 

CCNA Router and IOS Basics

  • 1. CCNA Guide to Cisco Networking Fundamentals Chapter 5 Router and IOS Basics
  • 2. Objectives Describe the benefits of network segmentation with routers Understand the elements of the Cisco router user interface Configure the HyperTerminal program to interface with the Cisco router Describe the various router configuration modes CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 3. Objectives (continued) Describe the various router passwords Understand the enhanced editing features of the Cisco IOS Compare router components to typical PC components CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 4. Benefits of Routing Routers provide Packet filtering Connections between local networks Traffic control Wide area network (WAN) connections Routers operate at the Network layer of the OSI reference model Because of Network layer addressing, routers can direct packets to both local and remote segments CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 5. Cisco Router User Interface Cisco Internetwork Operating System (IOS) Provides a command-line interface (CLI) Allows network operators to check the status of the router and network administrators to manage and configure the router You can access a router in several different ways Console port (also known as the console ) Auxiliary port (AUX) Virtual terminals (VTY) Trivial File Transfer Protocol (TFTP) server CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 6. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 7. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 8. Connecting via Terminal Programs When configuring the router through the console or AUX ports You must first make the physical connection Then, you can access the router through a terminal program Steps to configure HyperTerminal: Open the HyperTerminal application Click File on the menu bar, and then click New Connection Enter a name for the connection CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 9. Connecting via Terminal Programs (continued) Steps to configure HyperTerminal: (continued) Configure how you will connect to the router via the Connect To dialog box If you are connecting to the router through the AUX port, you would provide the router phone number here If connecting to the router through the console port, click the “Connect using” list box and choose the COM port to which the RJ-45 to DB-9 connector is attached Configure the following settings for the COM port: Bits per second, 9600; Data bits, 8; Parity, None; Stop bits, 1; Flow control, None CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 10. System Configuration Dialog If the router has not been configured previously, or if the startup file has been erased The Cisco IOS will prompt you to run the initial configuration dialog after the router boots The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 11. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 12. User Interface CCNA Guide to Cisco Networking Fundamentals, Fourth Edition The initial prompt consists of two parts: The host name of the router followed by the greater than symbol (>) Default: router> User EXEC mode (or user mode ) When the prompt displayed is the greater than symbol Network operator can check router status and review several of the router settings
  • 13. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 14. User Interface (continued) The question mark activates context-sensitive Help on the Cisco router User mode does not allow you to configure the router To do this, you must go into the privileged EXEC mode To enter privileged EXEC, you can type the enable command at the user mode prompt Next, you may be prompted for a password Greater than symbol (>) changes to a pound sign (#) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 15. User Interface (continued) You can do a few things at this prompt Setup: the setup command will cause the router to enter the system configuration dialog Copy: configurations can be copied from TFTP servers to the router and therefore change the router configuration Erase: configuration files as well as the entire IOS can be erased CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 16. Configuration Modes Global configuration mode Accessed by typing configure terminal at the enable mode prompt Interface configuration mode Allows you to configure the Ethernet and serial interfaces on your router Line configuration mode Allows you to configure the virtual terminals, console, and AUX lines that let you access the router CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 17. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 18. Configuration Modes (continued) Typing exit will take you back one level Typing end or pressing the Ctrl+Z keys will take you all the way back to the enable prompt Often, you can discover abbreviated commands by simply trying them The router will show you the point at which you entered an incorrect character CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 19. Configuration Modes (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 20. Plethora of Passwords CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 21. Plethora of Passwords (continued) Enable Password and Enable Secret Password configuration You can set both passwords from the global configuration mode prompt Because it is encrypted, the enable secret password is more secure than the enable password You can type no enable secret and no enable password at the global configuration mode prompt To remove the enable secret and enable passwords CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 22. Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 23. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 24. Plethora of Passwords (continued) Setting Line passwords Line passwords are the first line of defense against unauthorized intrusion into the router You can set passwords for each line used to configure the router Configure the console line password Enter line configuration mode You can also configure passwords on the five virtual terminal lines that exist on every router In much the same way as on the console port CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 25. Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 26. Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 27. Plethora of Passwords (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 28. Enhanced Editing By default, the router supports enhanced editing features that allow you to modify lengthy commands The enhanced editing commands let you jump to the beginning or end of a command line You can also jump forward or back, character by character, or word by word You can turn off the enhanced editing features by typing terminal no editing at either the user EXEC or the privileged EXEC prompts You can turn on terminal editing by typing terminal editing CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 29. Enhanced Editing (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 30. Command History Command history Allows you to retrieve previously typed commands You can see up to 10 previously typed commands by typing show history From either the user EXEC or privileged EXEC mode To modify the number of commands stored by the router, you can use the terminal command Up to 256 previous commands Type terminal history size n CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 31. Configuring Router Identification Router host name Default host name is router To set the router host name, type hostname followed by the name that you want to set Configure a banner A banner is a message that you can configure to display each time someone attempts to log in to the router Enter global configuration mode by typing config t Then type banner motd , followed by a space and a delimiting character CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 32. Configuring Router Identification (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 33. Configuring Router Identification (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 34. Configuring Router Identification (continued) Configure an interface description Use the description command The interface description helps you remember which network the interface services CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 35. Configuring the Time and Date Use the clock set command in enable mode to configure the time You must be in global configuration mode to configure the time zone CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 36. Router Components This section discusses the hardware elements of the router: ROM Flash memory NVRAM RAM/DRAM Interfaces CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 37. ROM Read-only memory (ROM) Loads the bootstrap program that initializes the router’s basic hardware components Not modified during normal operations, but it can be upgraded with special plug-in chips The content of ROM is maintained even when the router is rebooted The ROM monitor firmware runs when the router is turned on or rebooted CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 38. Flash Memory Flash memory A type of erasable, programmable, read-only memory (EPROM) Not typically modified during normal operations However, it can be upgraded or erased when necessary The content of flash memory is maintained even when the router is rebooted Flash memory Contains the working copy of the current Cisco IOS Is the component that initializes the IOS for normal router operations CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 39. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 40. NVRAM Nonvolatile random access memory (NVRAM) A special type of RAM that is not cleared when the router is rebooted The startup configuration file for the router is stored in NVRAM by default This is the first file created by the person who sets up the router The Cisco IOS uses the configuration file in NVRAM during the router boot process CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 41. RAM/DRAM Random access memory (RAM) Also known as dynamic random access memory (DRAM) A volatile hardware component Its information is not maintained in the event of a router reboot Changes to the router’s running configuration take place in RAM/DRAM CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 42. RAM/DRAM (continued) The IOS contains commands to view each of the router’s components show running-config show memory show buffers show startup-config Copy running-config startup-config Abbreviated as Copy run start CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 43. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 44. Interfaces A router can ship with a variety of configurable interfaces A common interface is Ethernet0 Other types of interfaces include: Token Ring Basic Rate Interface (BRI) Asynchronous Transfer Mode (ATM) Fiber Distributed Data Interface (FDDI) Channel Interface Processor (CIP) for Systems Network Architecture (SNA) High-Speed Serial Interface (HSSI) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 45. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 46. Summary Cisco routers use the Cisco IOS to provide an interface for network operators and administrators The first mode entered is user EXEC ( router> prompt) and the next mode is privileged EXEC ( router# prompt) In user EXEC, you can accomplish basic tasks To actually configure the router, privileged EXEC mode must be accessed The privileged EXEC mode is often called enable mode CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 47. Summary (continued) The enable, enable secret, and VTY passwords are set during initial configuration if the system configuration dialog is used When configured, the enable secret password supersedes the enable password The components of a router include ROM, flash memory, NVRAM, RAM/DRAM, and interfaces ROM stores a limited version of the Cisco IOS and routines for checking the hardware during system boot CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 48. Summary (continued) Flash memory stores the Cisco IOS that is loaded by default during system boot NVRAM stores the startup copy of the router configuration file that is loaded by default during system boot RAM/DRAM stores the working copy (running configuration) of the router configuration Interfaces provide connectivity to various types of LANs and WANs CCNA Guide to Cisco Networking Fundamentals, Fourth Edition