SlideShare a Scribd company logo
Introduction to Networks v5.1
Chapter 2:
Configure a Network Operating
System
Jupriyadi, S.Kom., M.T.
July 2020
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
2.0 Introduction
2.1 IOS Bootcamp
2.2 Basic Device Configuration
2.3 Address Schemes
2.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Explain the purpose of Cisco IOS.
• Explain how to access a Cisco IOS device for configuration purposes.
• Explain how to navigate Cisco IOS to configure network devices.
• Describe the command structure of Cisco IOS software.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
• PC operating systems enable a user to:
• Use a mouse to make selections and run programs.
• Enter text and text-based commands.
• View output on a monitor.
• Cisco IOS enables a network technician to:
• Use a keyboard to run CLI-based network programs.
• Use a keyboard to enter text and text-based commands.
• View output on a monitor.
• All networking devices come with a default IOS.
• It is possible to upgrade the IOS version or feature set.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
PuTTY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Tera Term
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
SecureCRT
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
• A console connection must be established before initial configuration
of a Cisco device.
• After being consoled in, the network technician will have to navigate
through various command modes of the IOS CLI.
• The Cisco IOS modes use a hierarchical structure and are quite
similar for both switches and routers.
• Video Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Global Configuration Mode
• To configure the device must enter this mode with configure terminal
command
• Example: Switch(config)#
• CLI configuration changes are made that affect the operation of the
device as a whole
• From this mode, the user can enter different sub-configuration modes
Two common sub-configuration modes include:
• Line Configuration Mode - Used to configure console, SSH, Telnet, or
AUX access. Example: Switch(config-line)#
• Interface Configuration Mode - Used to configure a switch port or
router network interface. Example: Switch(config-if)#
• Video Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Exit
End or Ctrl+Z
Video Available
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Video Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Video Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
• Tab – Completes the remainder of a partially typed command or keyword
• Ctrl-R – Redisplays a line
• Ctrl-A – Moves cursor to the beginning of the line
• Ctrl-Z – Exits configuration mode and returns to user EXEC
• Down Arrow – Allows the user to scroll forward through former commands
• Up Arrow – Allows the user to scroll backward through former commands
• Ctrl-Shift-6 – Allows the user to interrupt an IOS process such as ping
or traceroute.
• Ctrl-C – Aborts the current command and exits the configuration mode
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Upon completion of this section, you should be able to:
• Configure hostnames on a Cisco IOS device using the CLI.
• Use Cisco IOS commands to limit access to device configurations.
• Use IOS commands to save the running configuration.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Guidelines to Choose a Hostname
Configuring Device Names
Hostnames allow devices to be
identified by network administrators
over a network or the Internet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Syntax Checker Available
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Privileged EXEC Password Example
User EXEC Password Example
VTY Line Password Example
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
• Use the enable secret command, not the older enable password
command.
• The enable secret command provides greater security because the
password is encrypted.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Console port must be secured.
• Reduces the chance of unauthorized personnel physically plugging
a cable into the device and gaining device access.
VTY lines allow access to a Cisco device via Telnet.
• The number of VTY lines supported varies with the type of device
and the IOS version.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
service password-
encryption
• Prevents passwords
from showing up as
plain text when
viewing the
configuration.
• Purpose of this
command is to keep
unauthorized
individuals from
viewing passwords in
the configuration file.
• After this command is
applied, removing the
encryption service
does not reverse the
encryption
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
• These are an important
part of the legal process
in the event that
someone is prosecuted
for breaking into a device.
• Wording that implies that
a login is "welcome" or
"invited" is not
appropriate.
• Often used for legal
notification because it is
displayed to all
connected terminals.
• Video Available
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
• Startup
configuration –File stored
in NVRAM that contains all
of the commands that will
be used upon startup or
reboot. NVRAM does not
lose its contents when the
device is powered off.
• Running configuration –
File stored in RAM that
reflects the current
configuration, modifying
affects the operation of a
Cisco device immediately.
RAM loses all of its
content when the device is
powered off or restarted.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
• Restore the device to its previous configuration by removing the
changed commands individually.
• Copy the startup configuration file to the running configuration with
the copy startup-config running-config privileged EXEC mode
command.
• Reload the device with the reload command from privileged EXEC
mode.
• Switch# reload
System configuration has been modified. Save? [yes/no]: n
Proceed with reload? [confirm]
• Video Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Using PuTTY to Capture Console Session
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
• All session output will be
captured to the file
specified, MySwitchLogs.
• Execute the show
running-config or show
startup-config command
at the privileged EXEC
prompt. Text displayed in
the terminal window will
be placed into the
chosen file.
Enabling Session Logging in PuTTY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Disabling Session Logging in PuTTY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Chapter Objectives:
• Explain how devices communicate across network media.
• Configure a host device with an IP address.
• Verify connectivity between two end devices.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Connecting End Devices
Configuring a Static IP
Address on a Host
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
• Network communications depend on end user device interfaces, networking
device interfaces, and the cables that connect them.
• Types of network media include twisted-pair copper cables, fiber-optic cables,
coaxial cables, or wireless.
• Different types of network media have different features and benefits.
• Ethernet is the most common local area network (LAN) technology.
• Ethernet ports are found on end user devices, switch devices, and other
networking devices.
• Cisco IOS switches have physical ports for devices to connect to, but they also
have one or more switch virtual interfaces (SVIs). No physical hardware on the
device is associated with it. It is created in software.
• SVI provides a means to remotely manage a switch over a network.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Manually Assigning IPv4
Address InformationEthernet Adapter Properties
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Assigning Dynamic Addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Verifying Windows PC IP Configuration
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
• IP address - Together with subnet mask, uniquely identifies end device on internetwork
• Subnet mask - Determines which part of a larger network is used by an IP address
• interface VLAN 1 - Interface configuration mode
• ip address 192.168.10.2 255.255.255.0 - Configures the IP address and subnet mask for
the switch
• no shutdown - Administratively enables the interface
• Switch still needs to have physical ports configured and VTY lines to enable remote
management
Video
Available
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Video
Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Video
Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Chapter Objectives:
• Explain the features and functions of Cisco IOS Software.
• Configure initial settings on a network device using the Cisco IOS software.
• Given an IP addressing scheme, configure IP address parameters on end
devices to provide end-to-end connectivity in a small to medium-sized business
network.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 54
Thank you.

More Related Content

What's hot (20)

PDF
Linux System Monitoring basic commands
Mohammad Rafiee
 
PPT
Active directory ii
deshvikas
 
PPTX
Windows Server 2019.pptx
masbulosoke
 
PDF
Server Virtualization
rjain51
 
PPTX
Virtualization & cloud computing
Soumyajit Basu
 
PPTX
Software Defined Network - SDN
Venkata Naga Ravi
 
PDF
Introduction to Software Defined Networking (SDN)
rjain51
 
PDF
Secure your network - Segmentation and segregation
Magnus Jansson
 
PDF
NVMe over Fabric
singh.gurjeet
 
PPTX
System Center Configuration Manager 2012 Overview
Amit Gatenyo
 
PPT
What is Virtualization
Israel Marcus
 
PPTX
DATA CENTER
Shekar Reddy
 
PPTX
Networking Basics and Cisco
Shoaib Iqbal
 
PPTX
Windows server 2012 r2
bryan barrios
 
PDF
NVMe overview
Michael Wang
 
PPT
Storage Technology Overview
nomathjobs
 
PDF
TCP/IP Stack Configuration with Configuration Assistant for IBM z/OS CS
zOSCommserver
 
PPT
Wireless sensor network and its application
Roma Vyas
 
PPT
Virtualization
Birju Tank
 
PPTX
Storage basics
Luis Juan Koffler
 
Linux System Monitoring basic commands
Mohammad Rafiee
 
Active directory ii
deshvikas
 
Windows Server 2019.pptx
masbulosoke
 
Server Virtualization
rjain51
 
Virtualization & cloud computing
Soumyajit Basu
 
Software Defined Network - SDN
Venkata Naga Ravi
 
Introduction to Software Defined Networking (SDN)
rjain51
 
Secure your network - Segmentation and segregation
Magnus Jansson
 
NVMe over Fabric
singh.gurjeet
 
System Center Configuration Manager 2012 Overview
Amit Gatenyo
 
What is Virtualization
Israel Marcus
 
DATA CENTER
Shekar Reddy
 
Networking Basics and Cisco
Shoaib Iqbal
 
Windows server 2012 r2
bryan barrios
 
NVMe overview
Michael Wang
 
Storage Technology Overview
nomathjobs
 
TCP/IP Stack Configuration with Configuration Assistant for IBM z/OS CS
zOSCommserver
 
Wireless sensor network and its application
Roma Vyas
 
Virtualization
Birju Tank
 
Storage basics
Luis Juan Koffler
 

Similar to Chapter 2 Configure a Network Operating System (20)

PPTX
CCNASv2_InstructorPPT_CH2.pptx
mohamedabdelwahed68
 
PPTX
Basic Switch & End Device Configuration_Module 2_ITNv7.pptx
FauziaNingrum
 
PPTX
CCNA_ITN_Chp2_.pptx
NguyenLe340487
 
PPTX
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
PDF
ITN_Module_2 - Basic Switch and End Device Configuration.pdf
syujatkj5
 
PPTX
ITN_Module_2.pptx
Ashok R
 
PPTX
Introduction_To_Network_ITN_Module_2.pptx
IlmanZuhriYadi1
 
PPTX
ITN_Module_2.pptx
argost1003
 
PPT
Ex 1 chapter11-configure-network-tony_chen
Đô GiẢn
 
PPTX
Ccna sv2 instructor_ppt_ch2
SalmenHAJJI1
 
PPTX
ITN_Module_2 NETWORKING 1 PPT FOR IT STUDENT.pptx
crystaljhoyl
 
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
Waqas Ahmed Nawaz
 
PDF
It nv51 instructor_ppt_ch6
newbie2019
 
PDF
02_Configure_a_Network_Operating_System.pdf
shwan it
 
PPTX
Network Security v1.0 You have - Module 4.pptx
roanmhammed
 
PPTX
04 ccna sv2 instructor_ppt_ch5
Babaa Naya
 
PPTX
Itn6 instructor materials_chapter2
limenih muluneh
 
PPTX
ITN_Module_2.pptx
AshiruMUmar
 
PPTX
PC LEESOON 6.pptx
MLG College of Learning, Inc
 
PPTX
Ccna sv2 instructor_ppt_ch8
Babaa Naya
 
CCNASv2_InstructorPPT_CH2.pptx
mohamedabdelwahed68
 
Basic Switch & End Device Configuration_Module 2_ITNv7.pptx
FauziaNingrum
 
CCNA_ITN_Chp2_.pptx
NguyenLe340487
 
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
ITN_Module_2 - Basic Switch and End Device Configuration.pdf
syujatkj5
 
ITN_Module_2.pptx
Ashok R
 
Introduction_To_Network_ITN_Module_2.pptx
IlmanZuhriYadi1
 
ITN_Module_2.pptx
argost1003
 
Ex 1 chapter11-configure-network-tony_chen
Đô GiẢn
 
Ccna sv2 instructor_ppt_ch2
SalmenHAJJI1
 
ITN_Module_2 NETWORKING 1 PPT FOR IT STUDENT.pptx
crystaljhoyl
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
Waqas Ahmed Nawaz
 
It nv51 instructor_ppt_ch6
newbie2019
 
02_Configure_a_Network_Operating_System.pdf
shwan it
 
Network Security v1.0 You have - Module 4.pptx
roanmhammed
 
04 ccna sv2 instructor_ppt_ch5
Babaa Naya
 
Itn6 instructor materials_chapter2
limenih muluneh
 
ITN_Module_2.pptx
AshiruMUmar
 
PC LEESOON 6.pptx
MLG College of Learning, Inc
 
Ccna sv2 instructor_ppt_ch8
Babaa Naya
 
Ad

More from newbie2019 (20)

PDF
Digital forensic principles and procedure
newbie2019
 
PDF
Fundamental digital forensik
newbie2019
 
PDF
Pendahuluan it forensik
newbie2019
 
PDF
Chapter 15 incident handling
newbie2019
 
PDF
Chapter 14 sql injection
newbie2019
 
PDF
Chapter 13 web security
newbie2019
 
PDF
NIST Framework for Information System
newbie2019
 
PDF
Nist.sp.800 37r2
newbie2019
 
PDF
Chapter 12 iso 27001 awareness
newbie2019
 
PDF
Chapter 10 security standart
newbie2019
 
PDF
Chapter 8 cryptography lanjutan
newbie2019
 
PDF
Pertemuan 7 cryptography
newbie2019
 
PDF
Chapter 6 information hiding (steganography)
newbie2019
 
PDF
Vulnerability threat and attack
newbie2019
 
PDF
Chapter 4 vulnerability threat and attack
newbie2019
 
PDF
C02
newbie2019
 
PDF
Chapter 3 security principals
newbie2019
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
PDF
Chapter 1 introduction
newbie2019
 
Digital forensic principles and procedure
newbie2019
 
Fundamental digital forensik
newbie2019
 
Pendahuluan it forensik
newbie2019
 
Chapter 15 incident handling
newbie2019
 
Chapter 14 sql injection
newbie2019
 
Chapter 13 web security
newbie2019
 
NIST Framework for Information System
newbie2019
 
Nist.sp.800 37r2
newbie2019
 
Chapter 12 iso 27001 awareness
newbie2019
 
Chapter 10 security standart
newbie2019
 
Chapter 8 cryptography lanjutan
newbie2019
 
Pertemuan 7 cryptography
newbie2019
 
Chapter 6 information hiding (steganography)
newbie2019
 
Vulnerability threat and attack
newbie2019
 
Chapter 4 vulnerability threat and attack
newbie2019
 
Chapter 3 security principals
newbie2019
 
Chapter 2 konsep dasar keamanan
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
Chapter 1 introduction
newbie2019
 
Ad

Recently uploaded (20)

PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PPTX
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PPTX
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
community health nursing question paper 2.pdf
Prince kumar
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 

Chapter 2 Configure a Network Operating System

  • 1. Introduction to Networks v5.1 Chapter 2: Configure a Network Operating System Jupriyadi, S.Kom., M.T. July 2020
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 2.0 Introduction 2.1 IOS Bootcamp 2.2 Basic Device Configuration 2.3 Address Schemes 2.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Explain the purpose of Cisco IOS. • Explain how to access a Cisco IOS device for configuration purposes. • Explain how to navigate Cisco IOS to configure network devices. • Describe the command structure of Cisco IOS software.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 • PC operating systems enable a user to: • Use a mouse to make selections and run programs. • Enter text and text-based commands. • View output on a monitor. • Cisco IOS enables a network technician to: • Use a keyboard to run CLI-based network programs. • Use a keyboard to enter text and text-based commands. • View output on a monitor. • All networking devices come with a default IOS. • It is possible to upgrade the IOS version or feature set.
  • 7. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 7
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 PuTTY
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Tera Term
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 SecureCRT
  • 12. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 12
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 • A console connection must be established before initial configuration of a Cisco device. • After being consoled in, the network technician will have to navigate through various command modes of the IOS CLI. • The Cisco IOS modes use a hierarchical structure and are quite similar for both switches and routers. • Video Available
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Global Configuration Mode • To configure the device must enter this mode with configure terminal command • Example: Switch(config)# • CLI configuration changes are made that affect the operation of the device as a whole • From this mode, the user can enter different sub-configuration modes Two common sub-configuration modes include: • Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access. Example: Switch(config-line)# • Interface Configuration Mode - Used to configure a switch port or router network interface. Example: Switch(config-if)# • Video Available
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Exit End or Ctrl+Z Video Available
  • 18. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 18
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Video Available
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 Video Available
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 • Tab – Completes the remainder of a partially typed command or keyword • Ctrl-R – Redisplays a line • Ctrl-A – Moves cursor to the beginning of the line • Ctrl-Z – Exits configuration mode and returns to user EXEC • Down Arrow – Allows the user to scroll forward through former commands • Up Arrow – Allows the user to scroll backward through former commands • Ctrl-Shift-6 – Allows the user to interrupt an IOS process such as ping or traceroute. • Ctrl-C – Aborts the current command and exits the configuration mode
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 Upon completion of this section, you should be able to: • Configure hostnames on a Cisco IOS device using the CLI. • Use Cisco IOS commands to limit access to device configurations. • Use IOS commands to save the running configuration.
  • 25. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Guidelines to Choose a Hostname Configuring Device Names Hostnames allow devices to be identified by network administrators over a network or the Internet.
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 Syntax Checker Available
  • 28. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 Privileged EXEC Password Example User EXEC Password Example VTY Line Password Example
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31 • Use the enable secret command, not the older enable password command. • The enable secret command provides greater security because the password is encrypted.
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 Console port must be secured. • Reduces the chance of unauthorized personnel physically plugging a cable into the device and gaining device access. VTY lines allow access to a Cisco device via Telnet. • The number of VTY lines supported varies with the type of device and the IOS version.
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 service password- encryption • Prevents passwords from showing up as plain text when viewing the configuration. • Purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file. • After this command is applied, removing the encryption service does not reverse the encryption
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 • These are an important part of the legal process in the event that someone is prosecuted for breaking into a device. • Wording that implies that a login is "welcome" or "invited" is not appropriate. • Often used for legal notification because it is displayed to all connected terminals. • Video Available
  • 35. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 • Startup configuration –File stored in NVRAM that contains all of the commands that will be used upon startup or reboot. NVRAM does not lose its contents when the device is powered off. • Running configuration – File stored in RAM that reflects the current configuration, modifying affects the operation of a Cisco device immediately. RAM loses all of its content when the device is powered off or restarted.
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 • Restore the device to its previous configuration by removing the changed commands individually. • Copy the startup configuration file to the running configuration with the copy startup-config running-config privileged EXEC mode command. • Reload the device with the reload command from privileged EXEC mode. • Switch# reload System configuration has been modified. Save? [yes/no]: n Proceed with reload? [confirm] • Video Available
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38 Using PuTTY to Capture Console Session
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 • All session output will be captured to the file specified, MySwitchLogs. • Execute the show running-config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file. Enabling Session Logging in PuTTY
  • 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40 Disabling Session Logging in PuTTY
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 Chapter Objectives: • Explain how devices communicate across network media. • Configure a host device with an IP address. • Verify connectivity between two end devices.
  • 42. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 42
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43 Connecting End Devices Configuring a Static IP Address on a Host
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44 • Network communications depend on end user device interfaces, networking device interfaces, and the cables that connect them. • Types of network media include twisted-pair copper cables, fiber-optic cables, coaxial cables, or wireless. • Different types of network media have different features and benefits. • Ethernet is the most common local area network (LAN) technology. • Ethernet ports are found on end user devices, switch devices, and other networking devices. • Cisco IOS switches have physical ports for devices to connect to, but they also have one or more switch virtual interfaces (SVIs). No physical hardware on the device is associated with it. It is created in software. • SVI provides a means to remotely manage a switch over a network.
  • 45. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 45
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46 Manually Assigning IPv4 Address InformationEthernet Adapter Properties
  • 47. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47 Assigning Dynamic Addresses
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48 Verifying Windows PC IP Configuration
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49 • IP address - Together with subnet mask, uniquely identifies end device on internetwork • Subnet mask - Determines which part of a larger network is used by an IP address • interface VLAN 1 - Interface configuration mode • ip address 192.168.10.2 255.255.255.0 - Configures the IP address and subnet mask for the switch • no shutdown - Administratively enables the interface • Switch still needs to have physical ports configured and VTY lines to enable remote management Video Available
  • 50. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 50
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51 Video Available
  • 52. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52 Video Available
  • 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53 Chapter Objectives: • Explain the features and functions of Cisco IOS Software. • Configure initial settings on a network device using the Cisco IOS software. • Given an IP addressing scheme, configure IP address parameters on end devices to provide end-to-end connectivity in a small to medium-sized business network.
  • 54. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 54