Configure A Network Operating System: Introduction To Networks v5.1
Configure A Network Operating System: Introduction To Networks v5.1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Upon completion of this section, you should be able to:
• Explain the purpose of Cisco IOS.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
• PC operating systems enable a user to:
• Use a mouse to make selections and run programs.
• Enter text and text-based commands.
• View output on a monitor.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
PuTTY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Tera Term
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
SecureCRT
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
• A console connection must be established before initial configuration of a
Cisco device.
• After being consoled in, the network technician will have to navigate
through various command modes of the IOS CLI.
• The Cisco IOS modes use a hierarchical structure and are quite
similar for both switches and routers.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Global Configuration Mode
• To configure the device must enter this mode with configure terminal
command
• Example: Switch(config)#
• CLI configuration changes are made that affect the operation of the
device as a whole
• From this mode, the user can enter different sub-configuration modes
Two common sub-configuration modes include:
• Line Configuration Mode - Used to configure console, SSH, Telnet, or
AUX access. Example: Switch(config-line)#
• Interface Configuration Mode - Used to configure a switch port or
router network interface. Example: Switch(config-if)#
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Exit
End or Ctrl+Z
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
• Tab – Completes the remainder of a partially typed command or keyword
• Ctrl-R – Redisplays a line
• Down Arrow – Allows the user to scroll forward through former commands
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Upon completion of this section, you should be able to:
• Configure hostnames on a Cisco IOS device using the CLI.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Guidelines to Choose a Hostname
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Syntax Checker Available
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Privileged EXEC Password Example
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
• Use the enable secret command, not the older enable password
command.
• The enable secret command provides greater security because the
password is encrypted.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Console port must be secured.
• Reduces the chance of unauthorized personnel physically plugging a
cable into the device and gaining device access.
VTY lines allow access to a Cisco device via Telnet.
• The number of VTY lines supported varies with the type of device and
the IOS version.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
service password-
encryption
• Prevents passwords
from showing up as
plain text when
viewing the
configuration.
• Purpose of this
command is to keep
unauthorized
individuals from
viewing passwords in
the configuration file.
• After this command is
applied, removing the
encryption service
does not reverse the
encryption
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
• These are an important
part of the legal process
in the event that someone
is prosecuted for
breaking into a device.
• Wording that implies that
a login is "welcome" or
"invited" is not
appropriate.
• Often used for legal
notification because it is
displayed to all
connected terminals.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
• Startup configuration –
File stored in NVRAM that
contains all of the
commands that will be used
upon startup or reboot.
NVRAM does not lose its
contents when the device is
powered off.
• Running configuration –
File stored in RAM that
reflects the current
configuration, modifying
affects the operation of a
Cisco device immediately.
RAM loses all of its content
when the device is powered
off or restarted.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
• Restore the device to its previous configuration by removing the changed
commands individually.
• Copy the startup configuration file to the running configuration with the
copy startup-config running-config privileged EXEC mode
command.
• Reload the device with the reload command from privileged EXEC
mode.
• Switch# reload
System configuration has been modified. Save? [yes/no]: n
Proceed with reload? [confirm]
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Using PuTTY to Capture Console Session
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Enabling Session Logging in PuTTY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Disabling Session Logging in PuTTY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Chapter Objectives:
• Explain how devices communicate across network media.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Configuring a Static IP
Connecting End Devices Address on a Host
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
• Network communications depend on end user device interfaces, networking
device interfaces, and the cables that connect them.
• Types of network media include twisted-pair copper cables, fiber-optic cables,
coaxial cables, or wireless.
• Different types of network media have different features and benefits.
• Ethernet is the most common local area network (LAN) technology.
• Ethernet ports are found on end user devices, switch devices, and other
networking devices.
• Cisco IOS switches have physical ports for devices to connect to, but they also have
one or more switch virtual interfaces (SVIs). No physical hardware on the device is
associated with it. It is created in software.
• SVI provides a means to remotely manage a switch over a network.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Manually Assigning IPv4
Ethernet Adapter Properties Address Information
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Assigning Dynamic Addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Verifying Windows PC IP Configuration
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
• IP address - Together with subnet mask, uniquely identifies end device on internetwork
• ip address 192.168.10.2 255.255.255.0 - Configures the IP address and subnet mask for the
switch
• no shutdown - Administratively enables the interface
• Switch still needs to have physical ports configured and VTY lines to enable remote
management
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Chapter Objectives:
• Explain the features and functions of Cisco IOS Software.
• Configure initial settings on a network device using the Cisco IOS software.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Thank you.