Chapter 2: Basic Switch And End Device Configuration

3y ago
100 Views
4 Downloads
1.56 MB
52 Pages
Last View : 21d ago
Last Download : 3m ago
Upload by : Victor Nelms
Transcription

Module 2: Basic Switch andEnd Device ConfigurationIntroductions to Networks v7.0(ITN)

Module ObjectivesModule Title: Basic Switch and End Device ConfigurationModule Objective: Implement initial settings including passwords, IP addressing, and defaultgateway parameters on a network switch and end devices.Topic TitleCisco IOS AccessTopic ObjectiveExplain how to access a Cisco IOS device for configurationpurposes.IOS NavigationExplain how to navigate Cisco IOS to configure network devices.The Command StructureDescribe the command structure of Cisco IOS software.Basic Device Configuration Configure a Cisco IOS device using CLI.Save ConfigurationsUse IOS commands to save the running configuration.Ports and AddressesExplain how devices communicate across network media.Configure IP AddressingConfigure a host device with an IP address.Verify ConnectivityCisco and/or its affiliates. All rights reserved.Verify connectivity between two end 2016devices.Cisco Confidential2

2.1 Cisco IOS Access 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential3

Cisco IOS AccessOperating Systems Shell - The user interface that allowsusers to request specific tasks fromthe computer. These requests can bemade either through the CLI or GUIinterfaces. Kernel - Communicates between thehardware and software of a computerand manages how hardwareresources are used to meet softwarerequirements. Hardware - The physical part of acomputer including underlyingelectronics. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential4

Cisco IOS AccessGUI A GUI allows the user to interact with thesystem using an environment ofgraphical icons, menus, and windows. A GUI is more user-friendly and requiresless knowledge of the underlyingcommand structure that controls thesystem. Examples of these are: Windows,macOS, Linux KDE, Apple iOS andAndroid. GUIs can fail, crash, or simply notoperate as specified. For these reasons,network devices are typically accessedthrough a CLI. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential5

Cisco IOS AccessPurpose of an OSPC operating system enables a user to dothe following: Use a mouse to make selectionsand run programs Enter text and text-basedcommands View output on a monitorCLI-based network operating system enables anetwork technician to do the following: Use a keyboard to run CLI-basednetwork programsUse a keyboard to enter text andtext-based commandsView output on a monitor 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential6

Cisco IOS AccessAccess Methods Console – A physical management portused to access a device in order toprovide maintenance, such asperforming the initial configurations. Secure Shell (SSH) – Establishes asecure remote CLI connection to adevice, through a virtual interface, over anetwork. (Note: This is the recommendedmethod for remotely connecting to adevice.) Telnet – Establishes an insecure remoteCLI connection to a device over thenetwork. (Note: User authentication,passwords and commands are sent over thenetwork in plaintext.) 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential7

Cisco IOS AccessTerminal Emulation Programs Terminal emulation programs are used to connect to a network device by either a consoleport or by an SSH/Telnet connection. There are several terminal emulation programs to chose from such as PuTTY, Tera Termand SecureCRT. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential8

2.2 IOS Navigation 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential9

IOS NavigationPrimary Command ModesUser EXEC Mode: Allows access to only a limitednumber of basic monitoringcommands Identified by the CLI promptthat ends with the symbolPrivileged EXEC Mode: Allows access to allcommands and features Identified by the CLI promptthat ends with the # symbol 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential10

IOS NavigationConfiguration Mode and Subconfiguration ModesGlobal Configuration Mode: Used to accessconfiguration options on thedeviceLine Configuration Mode: Used to configure console,SSH, Telnet or AUX accessInterface Configuration Mode: Used to configure a switchport or router interface 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential11

IOS NavigationVideo – IOS CLI Primary Command ModesThis video will cover the following: User EXEC mode Privilege EXEC mode Global Config mode 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential12

IOS NavigationNavigation Between IOS Modes Privileged EXEC Mode: To move from user EXEC mode to privilegeEXEC mode, use the enabled command. Global Configuration Mode: To move in and out of global configurationmode, use the configure terminalcommand. To return to privilege EXECmode, use the exit command. Line Configuration Mode: To move in and out of line configurationmode, use the line command followed bythe management line type. To return toglobal configuration mode, use the exitcommand. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential13

IOS NavigationNavigation Between IOS Modes (Cont.)Subconfiguration Modes: To move out of any subconfiguration mode toget back to global configuration mode, usethe exit command. To return to privilegeEXEC mode, use the end command or keycombination Ctrl Z. To move directly from one subconfigurationmode to another, type in the desiredsubconfiguration mode command. In theexample, the command prompt changes from(config-line)# to (config-if)#. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential14

IOS NavigationVideo – Navigation Between IOS ModesThis video will cover the following: enable disable configure terminal exit end Control Z on keyboard Other commands to enter sub configuration modes 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential15

2.3 The Command Structure 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential16

The Command StructureBasic IOS Command Structure Keyword – This is a specific parameter defined in the operating system (in the figure, ipprotocols). Argument - This is not predefined; it is a value or variable defined by the user (in thefigure, 192.168.10.5). 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential17

The Command StructureIOS Command Syntax CheckA command might require one or more arguments. To determine the keywordsand arguments required for a command, refer to the command syntax. Boldface text indicates commands and keywords that are entered as shown. Italic text indicates an argument for which the user provides the value.ConventionDescriptionboldfaceBoldface text indicates commands and keywords that you enterliterally as shown.italicsItalic text indicates arguments for which you supply values.[x]Square brackets indicate an optional element (keyword orargument).{x}Braces indicate a required element (keyword or argument).[x {y z }]Braces and vertical lines within square brackets indicate a requiredchoice within an optional element. Spaces are used to clearlydelineate parts of the command. 2016 Cisco and/or its affiliates. All rights reserved.Cisco Confidential18

The Command StructureIOS Command Syntax Check (Cont.) The command syntax provides the pattern, or format, that must be used whenentering a command. The command is ping and the user-definedargument is the ip-address of thedestination device. For example, ping10.10.10.5. The command is traceroute and theuser-defined argument is the ipaddress of the destination device. Forexample, traceroute 192.168.254.254. If a command is complex with multiple arguments, you may see it represented like this: 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential19

The Command StructureIOS Help FeaturesThe IOS has two forms of help available: context-sensitive help and commandsyntax check. Context-sensitive help enables you toquickly find answers to these questions: Which commands are available in each commandmode? Which commands start with specific characters orgroup of characters? Which arguments and keywords are available toparticular commands? Command syntax check verifies thata valid command was entered bythe user. If the interpreter cannot understand thecommand being entered, it will providefeedback describing what is wrong withthe command. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential20

The Command StructureHot Keys and Shortcuts The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, andtroubleshooting easier. Commands and keywords can be shortened to the minimum number of charactersthat identify a unique selection. For example, the configure command can beshortened to conf because configure is the only command that begins with conf. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential22

The Command StructureHot Keys and Shortcuts (Cont.) The table below is a brief list of keystrokes to enhance command line editing.KeystrokeDescriptionTabCompletes a partial command name entry.BackspaceErases the character to the left of the cursor.Left Arrow or Ctrl BMoves the cursor one character to the left.Right Arrow or Ctrl F Moves the cursor one character to the right.Up Arrow or Ctrl PRecalls the commands in the history buffer,beginning with the most recent commands. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential23

The Command StructureHot Keys and Shortcuts (Cont.) When a command output produces more textthan can be displayed in a terminal window,the IOS will display a “--More--” prompt. Thetable below describes the keystrokes that canbe used when this prompt is displayed.KeystrokeDescription The table below lists commands that canbe used to exit out of an operation.KeystrokeDescriptionEnter KeyDisplays the next line.Ctrl-CWhen in any configuration mode, ends theconfiguration mode and returns to privileged EXECmode.Space BarDisplays the next screen.Ctrl-ZWhen in any configuration mode, ends theconfiguration mode and returns to privileged EXECmode.Any other keyEnds the display string, returning toprivileged EXEC mode.Ctrl-Shift-6All-purpose break sequence used to abort DNSlookups, traceroutes, pings, etc.Note: To see more hot keys and shortcuts refer to 2.3.5. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential24

The Command StructurePacket Tracer – Navigate the IOSIn this Packet Tracer, you will do the following: Establish Basic Connections, Access the CLI, and Explore Help Explore EXEC Modes Set the Clock 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential26

The Command StructureLab – Navigate the IOS by Using Tera Term for ConsoleConnectivityIn this lab, you complete the following objectives: Access a Cisco Switch through the Serial Console Port Display and Configure Basic Device Settings (Optional) Access a Cisco Router Using a Mini-USB Console Cable 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential27

2.4 Basic Device Configuration 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential28

Basic Device ConfigurationDevice Names The first configuration command on any device should be togive it a unique hostname. By default, all devices are assigned a factory default name.For example, a Cisco IOS switch is "Switch.” Guideline for naming devices: Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in lengthNote: To return the switch to the defaultprompt, use the no hostname globalconfig command. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential29

Basic Device ConfigurationPassword Guidelines The use of weak or easily guessed passwords are a security concern. All networking devices should limit administrative access by securing privileged EXEC,user EXEC, and remote Telnet access with passwords. In addition, all passwords shouldbe encrypted and legal notifications provided. Password Guidelines: Use passwords that are more than eightcharacters in length. Use a combination of upper and lowercaseletters, numbers, special characters, and/ornumeric sequences. Avoid using the same password for all devices. Do not use common words because they areeasily guessed.Note: Most of the labs in this course use simplepasswords such as cisco or class. These passwordsare considered weak and easily guessable and shouldbe avoided in production environments. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential30

Basic Device ConfigurationConfigure PasswordsSecuring user EXEC mode access: First enter line console configuration modeusing the line console 0 command in globalconfiguration mode. Next, specify the user EXEC mode passwordusing the password password command. Finally, enable user EXEC access usingthe login command.Securing privileged EXEC mode access: First enter global configuration mode. Next, use the enable secret password command. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential31

Basic Device ConfigurationConfigure Passwords (Cont.)Securing VTY line access: First enter line VTY configuration modeusing the line vty 0 15 command inglobal configuration mode. Next, specify the VTY password usingthe password password command. Finally, enable VTY access usingthe login command. Note: VTY lines enable remote access using Telnet or SSH to the device. Many Ciscoswitches support up to 16 VTY lines that are numbered 0 to 15. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential32

Basic Device ConfigurationEncrypt Passwords The startup-config and running-config filesdisplay most passwords in plaintext. To encrypt all plaintext passwords, use Use the show running-config commandto verify that the passwords on the deviceare now encrypted.the service password-encryption global configcommand. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential33

Basic Device ConfigurationBanner Messages A banner message is important to warnunauthorized personnel from attemptingto access the device. To create a banner message of the dayon a network device, use the bannermotd # the message of the day # globalconfig command.The banner will be displayed on attempts to access the device.Note: The “#” in the command syntax is calledthe delimiting character. It is entered beforeand after the message. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential34

2.5 Save Configurations 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential36

Save ConfigurationsConfiguration Files There are two system files that store the device configuration: startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will beused by the device upon startup or reboot. Flash does not lose its contents when the device is powered off. running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying arunning configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of itscontent when the device is powered off or restarted. To save changes made to the running configuration to the startup configuration file, use the copy running-configstartup-config privileged EXEC mode command. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential37

Save ConfigurationsAlter the Running ConfigurationsIf changes made to the running config do nothave the desired effect and the running-confighas not yet been saved, you can restore thedevice to its previous configuration. To do thisyou can: Remove the changed commands individually. Reload the device using the reload commandin privilege EXEC mode. Note: This will causethe device to briefly go offline, leading tonetwork downtime.If the undesired changes were saved to thestartup-config, it may be necessary to clear allthe configurations using the erase startupconfig command in privilege EXEC mode. After erasing the startup-config, reload thedevice to clear the running-config file fromRAM. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential38

Save ConfigurationsCapture Configuration to a Text FileConfiguration files can also be saved andarchived to a text document. Step 1. Open terminal emulation software,such as PuTTY or Tera Term, that is alreadyconnected to a switch. Step 2. Enable logging in to the terminalsoftware and assign a name and file location tosave the log file. The figure displays that Allsession output will be captured to the filespecified (i.e., MySwitchLogs). 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential40

Save ConfigurationsCapture Configuration to a Text File (Cont.) Step 3. Execute the show running-config or show startup-config command atthe privileged EXEC prompt. Text displayed inthe terminal window will be placed into thechosen file. Step 4. Disable logging in the terminalsoftware. The figure shows how to disablelogging by choosing the None session loggingoptionNote: The text file created can be used as a record ofhow the device is currently implemented. The file couldrequire editing before being used to restore a savedconfiguration to a device. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential41

2.6 Ports and Addresses 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential43

Ports and AddressesIP Addresses The use of IP addresses is the primary means ofenabling devices to locate one another andestablish end-to-end communication on theinternet. The structure of an IPv4 address is called dotteddecimal notation and is represented by fourdecimal numbers between 0 and 255. An IPv4 subnet mask is a 32-bit value thatdifferentiates the network portion of the addressfrom the host portion. Coupled with the IPv4address, the subnet mask determines to whichsubnet the device is a member. The default gateway address is the IP address ofthe router that the host will use to access remotenetworks, including the internet. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential44

Ports and AddressesIP Addresses (Cont.) IPv6 addresses are 128 bits in length andwritten as a string of hexadecimal values.Every four bits is represented by a singlehexadecimal digit; for a total of 32hexadecimal values. Groups of fourhexadecimal digits are separated by a colon“:”. IPv6 addresses are not case-sensitive andcan be written in either lowercase oruppercase.Note: IP in this course refers to both the IPv4 and IPv6protocols. IPv6 is the most recent version of IP and isreplacing the more common IPv4. 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential45

Ports and AddressesInterfaces and Ports Network communications depend on enduser device interfaces, networking deviceinterfaces, and the cables that connectthem. Types of network media include twisted-pair copper cables, fiber-optic cables,coaxial cables, or wireless. Different types of network media havedifferent features and benefits. Some ofthe differences between various types ofmedia include: Distance the media can successfully carry a signal Environment in which the media is to be installed Amount of data and the speed at which it must betransmitted Cost of the media and installation 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential46

2.7 Configure IP Addressing 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential47

Configure IP Addre

When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode. Ctrl-Z When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode. Ctrl-Shift-6 All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc. Keystroke Description Enter Key Displays the next line.

Related Documents:

Part One: Heir of Ash Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 .

TO KILL A MOCKINGBIRD. Contents Dedication Epigraph Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Part Two Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18. Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26

DEDICATION PART ONE Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 PART TWO Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 .

[2] basic-5ess.AT&T 5ESS switch type for the US/Canada [3] basic-dms100.Northern DMS -100 switch type for US/Canada [4] basic-net3.NET3 switch type for UK and Europe [5] basic-ni.National ISDN switch type [6] basic-ts013.TS013 switch type for Australia [7] ntt.NTT switch type for Japan [8]

Thermal magnetic switch DIP (Dual In-line Package) Encapsulated switches Switch with delayed opening Double switch bipolar Time switch Timer Electronic limiter Mercury switch Inclination or motion detector Closed switch Switch delay when opening and closing Double limit switch

134-1400 LS EP Switch 265-1002 134-1402 LS EP Switch 265-1006 Original Part No. Mfg. Description Part No. 134-1403 LS EP Switch 265-1005 134-1404 LS EP Switch 265-1002 134-1405 LS EP Switch 265-1004 134-1406 LS EP Switch 265-1003 134-1407 LS EP Switch 265-1006 134-1452 LS Pressure Elec. Switch 134-1451 134-1456 LS Pressure Elec. Switch 134-1451 .

About the husband’s secret. Dedication Epigraph Pandora Monday Chapter One Chapter Two Chapter Three Chapter Four Chapter Five Tuesday Chapter Six Chapter Seven. Chapter Eight Chapter Nine Chapter Ten Chapter Eleven Chapter Twelve Chapter Thirteen Chapter Fourteen Chapter Fifteen Chapter Sixteen Chapter Seventeen Chapter Eighteen

18.4 35 18.5 35 I Solutions to Applying the Concepts Questions II Answers to End-of-chapter Conceptual Questions Chapter 1 37 Chapter 2 38 Chapter 3 39 Chapter 4 40 Chapter 5 43 Chapter 6 45 Chapter 7 46 Chapter 8 47 Chapter 9 50 Chapter 10 52 Chapter 11 55 Chapter 12 56 Chapter 13 57 Chapter 14 61 Chapter 15 62 Chapter 16 63 Chapter 17 65 .