0 ratings0% found this document useful (0 votes) 693 views36 pagesBasic Router and Switch Configuration - CCNAv7 Module 2
This PDF covers the concpets related to Cisco IOS, Navigating the IOS, CLI Commands, Basic device configuration and Switch SVI commands.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
pia CCNA-1
Introduction to Networks
Module 2: Basic Switch and End Device
Configuration
| Mukesh Chinta
Aasistont Professor
Dept of CSE, VRSEC
ice NetAcad Tastrutor _|Module Objectives
Module Title: Basic Switch and End Device Configuration
Module Objective: Implement initial settings including passwords, IP addressing, and
default gateway parameters ona network switch and end devices.
Explain how to access a Ciseo IOS device for configuration purposes.
Explain how to navigate Cisco 10S to configure network devices.
Describe the command structure of Cisco 10S software.
Configure a Cisco 108 device using CLL
Use 10S commands to save the running configuration.
Explain how devices communicate across network media
Configure a host device with an IP address
etify connectivity between two end devices.To watch this lecture on Youtube,
Subscribe to my Channel @
https‘//youtube.com/channel/UCqQ6FQ62fpld40Jp9BFHtDg
Or type in MUKESH CHINTAin youtube..
If you like the content that | am discussing, Click Like. If you have any
issues related to the content, feel free to contact me.
Good suggestions are always welcome!!!2.1 Cisco |OS AccessCisco IOS (Internetwork Operating System) Access
Operating Systems
* The portion of the OS that interacts directly with computer hardware is known as the kernel.
The portion that interfaces with applications and the user is known as the shell.
* The user can interact with the shell using a commandine interface (CLD or a graphical user
interface (GUD)
Shell - The user interface that allows users to
request specific tasks from the computer. These
requests can be made either through the CLI or
GUI interfaces.
Kernel - Communicates between the hardware
and software of a computer and manages how
hardware resources are used to meet software
requirements.
Hardware - The physical part of a computer
including underlying electronics.Cisco IOS Access
CLI & GUI
> A GUL allows the user to interact with the system using
an environment of graphical icons, menus, and
windows
>A GUI is more user-friendly and requires less
knowledge of the underlying command structure that
controls the system.
> Examples of these are: Windows, macOS, Linux KDE,
Apple iOS and Android.
GUIs can fail, crash, or simply not operate as
specified. For these reasons, network devices are
typically accessed through a CLL
> CLi-based network operating system enables a network technician
to Use a keyboard to mun CLE-based network programs, Use a
Keyboard to enter text and text-based commands and View output on
monitor.
> The CLI is less resource intensive and very stable when
comipared to a GUTCisco |OS Access
Access Methods
2
All switches should be configured and secured. 4
+ Console — A physical management port
used to access a device in order to
provide maintenance, such as performing
the initial configurations
+ Secure Shell (SSH) — Establishes a
secure remote CLI connection to a
device, through a virtual interface, over a
network. (Note: This is the recommended
method for remotely connecting to a
device.)
+ Telnet — Establishes an insecure remote
CLI connection to a device over the
network. (Note: User authentication,
passwords and commands are sent over
the'network in plaintext.)nal Emulation Programs
Terminal emulation programs are used to connect to a network device by either a console port
or by an SSH/Telnet connection
+ There are several terminal emulation programs to chose from such as PuTTY, Tera Term and
SecureCRT.
[arr cntpm 7] [a
= Tome Most)
Cie Sat One 501 One SHistory
eras ToPports: 22
L - ‘SSH version: $SH2 v
= Protocot [UNSPEC =
seria
OK cancel Help2.2 IOS Navigation10S Navigation
Primary Command Modes
As a security feature, the Cisco OS software separates management access into the following two
command modes:
Default Device
Prompt
‘Command Mode Description
+ Mode allows access to only a limited number of basic monitoring
commands.
User Exec Mode + Its often referred to as "view-only* mode,
+ Mode allows access to all commands and features.
+ The user can use any monitoring commands and execute configuration
‘and management commands. R
Privileged EXEC Mode10S Navigation
Configuration Mode and Subconfiguration Modes
To configure the device, the user must enter global configuration
mode, which is commonly called global config mode.
> Global configuration mode is identified by a prompt that ends with
(config)# after the device name, such as Switch(config)#.
From global config mode, the user can enter different
subconfiguration modes. Each of these modes allows the
configuration of a particular part or function of the IOS device.
Two common subconfiguration modes include:
Line Configuration Mode - Used to configure console, SSH,
Telnet, or AUX access.
* Interface Configuration Mode - Used to configure a switch
port or router network interface.
areaoa
Various commands are used to move in and out of command prompts. To move from
user EXEC mode to privileged EXEC mode, use the enable command. Use the disable
privileged EXEC mode command to return to user EXEC mode:
*To move out of any subconfiguration
mode to get back to global configuration
mode, use the exit command.
=To return to privilege EXEC mode, use
the end command or key combination
Ctrl +Z
To move directly from one subconfiguration mode to another, type in the desired
subconfiguration mode command. In the example, the command prompt changes
from (config-line)# to (config-if)#.
CNet. eres Cae ae2.3 The Command StructureSwitch>show ip protocols
‘Command Keyword or
Argument
Switch>ping 192.168.10.5
* Keyword — This is a specific parameter defined in the operating system (in the figure, ip
protocols).
+ Argument - This is not predefined; it is a value or variable defined by the user (in the
figure, 192.168.10.5).Eee oe Ye Sed
The Command Structure
10S Command Syntax Check
A command might require one or more arguments. To determine the keywords and arguments
required for a command, refer to the command syntax.
* Boldface text indicates commands and keywords that are entered as shown.
+ Italic text indicates an argument for which the user provides the value.
Crean sical
boldface
italics
il
oy
kYyIzH
Boldface text indicates commands and keywords that you enter literally as
shown.
Italic text indicates arguments for which you supply values
‘Square brackets indicate an optional element (keyword or argument).
Braces indicate a required element (keyword or argument).
Braces and vertical lines within square brackets indicate a required choice
within an optional element. Spaces are used to clearly delineate parts of
the command.af ora
= The command syntax provides the pattern, or format, that must be used when
entering a command
+The command is ping and the user-defined
argument is the ip-address of the destination device.
For example, ping 10.10.10.5.
*The command is traceroute and the user-defined
argument is the jp-address of the destination device
For example, traceroute 192.168.254.254.
+ Ifa command is complex with multiple arguments, you may see it represented like this:
eee oe ere re eee Rec Merry)The Command Structure
IOS Help Features
The IOS has two forms of help available: context-sensitive help and command syntax check
* Context-sensitive help enables you to
quickly find answers to these questions:
Which commands are available in each
command mode?
Which commands start with specific characters
or group of characters?
> Which arguments and keywords are available to
particular commands?
+ Command syntax check verifies that a
valid command was entered by the
user.
Ff the interpreter camot understand the
command being entered, it will provide
feedback describing what is wrong with the
command.
eee SETS TS Teresa Ey
Pape yC EC MEC Meas RtsThe Command Structure
Hot Keys and Shortcuts
+ The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting
easier.
+ Commands and keywords can be shortened to the minimum number of characters that identify a unique
selection. For example, the configure command can be shortened to conf because configure is the only
command that begins with conf,
cere
Tab Completes a partial command name entry.
Backspace Erases the character to the left of the cursor.
Left Arrow or CtrH#B Moves the cursor one character to the left
Right Arrow or Ctri#¥ Moves the cursor one charaeter to the right.
Up Arrow or Ctrl#P Recalls the commands in the history buffer, beginning with the most recent commands.The Command Structure
Hot Keys and Shortcuts (Cont.)
When a command output produces more text
than can be displayed in a terminal window,
the IOS will display a “-More--” prompt. The
table below describes the keystrokes that can tee at aed re commanes that can
be used when this prompt is displayed. jeused }o'extoutoran operauon,
[Keystroke Description SEE
Kiekey _ |Onpina Hence! tie. Sree er eee ee Rr
EXEC mode
a When in any configuration mode, ends. the
configuration mode and returns to privileged
EXEC mode.
Ends the display string, returning .
Any otherkey |t rivileged EXEC mode bee eee tees eg2.4 Basic Device Configuration| es |
Basic Device Configuration
Device Names
©The first configuration command on any device should be to give it a unique hostname.
By default, all devices are assigned a factory default name. For example, a Cisco |OS
Speco est rts aes ee
itch (config) # hostname Sw-Floor-1
ak Crete
+ Guideline for naming devices:
Start with a letter
“Contain no spaces Sw-Fleor-3
End with a letter or digit
“Use only letters, digits, and dashes
«@Be less than 64 characters in length Sw-Fleor2
Note: To return the switch to the
default prompt, use the no
hostname global config command.
SweFloor-1asi vice Configuration
Password Guidelines
» The use of weak or easily gue
d passwords are a security concern.
EXEC, user
net_access with passwords. In. addition, all passwords should be
> All networking devices should limit administrative access by securing privileged
EXEC, and remote
encrypted and legal notifications provided.
Password Guidelines:
=> Use passwords that are more than eight
characters in length
=> Use a combination of upper and lowercase
letters, numbers, special characters, and/or Note: Most of the labs in this course use simple
numeric sequences. passwords such as cisco or class. These
> avoid using the same password for all devices. passwords are considered weak and easily
Do not use common words because they are 9u2SSableand should be avoided in production
=> y environments.
easily guessedes Ee
=
Configure Passwords
First enter line console configuration mode using the line
console 0 command in global configuration mode.
Next, specify the user EXEC mode password using
the password password command.
Finally, enable user. EXEC access using
the login command.
1 (config-1ine) #
nfig-line) #
Sp Umcaecrry
or-1 (config)# enable secret cli
Sees]
First enter global configuration mode.
Next, use the enable seeret password command.
First enter line VIY configuration mode using the line
vty 0 15 command in global configuration mode.
‘Next, specify the VTY — password using
the password password command.
Finally, enable VTY access using the login command,
SCTE
Satie ELIS
eC Sety aS
onfig-line)# 1
otto ccna!Encrypt Passwords
The startup-config and running-config files
display most passwords in plaintext.
ypt all plaintext passwords, use
the service password-encryption global
config command.
Covet rhea
1 (config) #
Concrete mts
od
>Use the show running-config
command to verify that the
passwords on the device are now
encrypted.
eet
EUBasic Device Configuration
Banner Messages
=A banner message is important to
warn unauthorized personnel from
attempting to a the device.
= To create a banner message of the day
on a network device, use the banner
motd # the message of the
day # global config command.
Note: The “#” in the command syntax is
called the delimiting character. it is
entered before and after the message.
Tes oast Ree rarc ae
Floor # banner motd #Authorized
‘The banner will be displayed on attempts to access the device.
J2.5 Save ConfigurationsSave Configurations
Configuration Files
There are two system files that store the device configuration:
VE SEI
startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands
that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is
powered off.
running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration
Modifying a runing configuration affects the operation of a Cisco device immediately. RAM is volatile
memory. It loses all of its content when the device is powered off or restarted.
=
To save changes made to the mnning configuration to the startup configuration file, use the copy running-
config startup-config privileged EXEC mode command.
Paneer eeerer rst
ottSave Configurations
Alter the Running Configurations
If changes made to the running config do not have
the desired effect and the running-config has not
yet been saved, you can restore the device to its
previous configuration. To do this you can:
* Remove the changed commands individually.
* Reload the device using the reload command in
privilege EXEC mode, Note: This will cause the device
to briefly go offline, leading to network downtime.
If the undesired changes were saved to the
startup-config, it may be necessary to clear all the
configurations using the erase startup-config
command in privilege EXEC mode.
* After erasing the startup-config, reload the device to
clear the running-config file from RAM
caters)
oer nscris)2.6 Ports and AddressesPorts and Addresses
IP Addresses
® The use of IP addresses is the primary means of enabling devices to locate
one anotherand establish end-to-end communication on the internet.
> The structure of an IPv4 address is called dotted decimal notation and is
represented by four decimal numbers between 0 and 255. (Ex: 10.10.10.1}
® An [Pv subnet mask is a 32-bit value that differentiates the network portion
of the address from the host portion. Coupled with the IPv4 address, the
subnet mask determines to which subnet the device is a member
> The default gateway address is the IP address of the router that the host will
use to access remote networks, including the intemet.
> IPv6 addresses are 128 bits in length and written as a string of hexadecimal
values. Every four bits is represented by a single hexadecimal digit; for a total
of 32 hexadecimal values, Groups of four hexadecimal digits are separated by
acolon®”. 2001:db8:1234:152c:12b4:5678:d334:9af
> IPV6 addresses are not case-sensitive and can be written in either lowercase
or uppercase.
a5 ee2.7 Configure IP AddressingConfigure IP Addressing
Manual IP Address Configuration for End Devices
» End devices on the network need an IP address in order
to communicate with other devices on the network.
IPv4 address information can be entered into end
devices manually, or automatically using Dynamic Host
Configuration Protocol (DHCP).
+ To manually configure an IPv4 address on a Windows PC, open
the Control Panel > Network Sharing Center > Change
adapter settings and choose the adapter. Next right-click and
select Properties to display the Local Area Connection
Properties
+ Next, click Properties to open the Internet Protocol Version 4 aaa
(TCP/IPv4) Properties window. Then configure the IPv4 ——
address and subnet mask information, and default gateway essing and configuration
options are similarto IPv4Configure IP Addressing
Automatic IP Address Configuration for End Devices
* DHCP enables automatic IPv4 address configuration for
every end device that is DHCP-enabled.
* End devices are typically by default using DHCP for
automatic IPv4 address configuration.
“To configure DHCP on a Windows PC, open the Control
Panel > Network Sharing Center > Change adapter
settings and choose the adapter. Next right-click and
select Properties to display the Local Area Connection
Properties.
‘Next, click Properties to open the Internet Protocol
Version 4 (ICP/IPv4) Properties window, then
select Obtain an IP address automatically and Obtain
DNS server address automatically.
eaae een reer apa
Ouse eon ase
Oe fn oh rer ee
Note: IP\6 uses DHCP.6 and SLAAC (Stateless Address
‘Autoconfiguration) for dynamic address allocation.Configure IP Addressing
Switch Virtual Interface Configuration
To access the switch remotely, an IP address and a subnet mask must be
configured on the SVI.
To configure an SVI on a switch:
+ Enter the interface vlan 1 command in global configuration mode.
+ Next assign an IPv4 address using the ip address ip-address subnet-mask command.
+ Finally, enable the virtual interface using the no shutdown command.
Pate eet eos Tete
Switch (config)# interface vlan 1
Switch (config-if)# ip address 192.168.1.20 255.255.255.0
Switch (config-if)# no shutdownTo watch this lecture on Youtube,
Subscribe to my Channel @
https://youtube.com/channel/UCqQ6FQ62fpld40Jp9BFHtDg
Or type in MUKESH CHINTAin youtube..
If you like the content that | am discussing, Click Like. If you have any
issues related to the content, feel free to contact me.
Good suggestions are always welcome!!!Remember to check the
Packet Tracer Demo
Video to practically
implement the concepts
discussed in this
module.
You might also like
Symmetric Encryption, DES, AES, MAC, Hash Algorithms, HMAC
Symmetric Encryption, DES, AES, MAC, Hash Algorithms, HMAC
76 pages