Lecture Two
Basics of Network Devices
BY Basha K | Faculty of Computing and Software Engineering
Topic to be Covered
♣ Internetwork operating Systems
♣ Concepts of IOS
♣ CLI Configuration Manager.
♣ Devices Interfaces
♣ IOS mode of operations
OPERATING SYSTEMS
All networking equipment dependent on operating systems
End users (PCs, laptops, smart phones, tablets)
Switches
Routers
Wireless access points
Firewalls
Basics
Internetwork Operating System (IOS)
Collection of network operating systems used on devices
3
PURPOSE OF OS
P C operating systems (Windows 8 & O S X) perform technical
functions that enable
• File, memory and process management,
• Handling input and output, and
• Controlling peripheral devices such as disk drives and printer
• Switch or router I O S provides options to
Configure interfaces
Enable routing and switching functions
All networking devices come with a default I O S
Basics
Possible to upgrade the I O S version or feature set
4
LOCATION OF THE IOS
IOS stored in Flash
Non-volatile storage – not lost when power is lost
Can be changed or overwritten as needed
Can be used to store multiple versions of IOS
IOS copied from flash to volatile RAM
Basics
Quantity of flash and RAM memory determines IOS
that can be used
5
IOS FUNCTIONS
Major functions performed or enabled by routers and switches include
Routing
Qos
Security
Addressing
Interfaces
Basics
Managing resources etc.
6
DEVICE INTERFACES
• Networking devices have several types of interfaces
associated with them.
1. Fast Ethernet interface :is used for connecting cables that
terminate with L A N devices such as computers and switches.
2. Serial interface : is used for connecting WAN devices to the
CSU/DSU
3. Console interface : is the primary interface for initial
configuration of a router or switch
4. Auxiliary interface: The auxiliary (AUX) interface is used for
remote management of the router.
Typically, a modem is connected to the A U X interface for dialup
Basics
•
access.
8
CONSOLE ACCESS METHOD
Most common methods to access the Command Line Interface(CLI)
Console
Telnet or S S H
A U X port
Basics
9
CONSOLE ACCESS METHOD…
Console port
D evice is accessible even if no networking services have been
configured (out-of-band)
Need a special console cable
Allows configuration commands to be entered
Should be configured with passwords to prevent unauthorized
access
Device should be located in a secure room so console port can not be
easily accessed
Basics
10
TELNET, SSH, AND AUX ACCESS METHODS
Telnet
Method for remotely accessing the C L I over a network
Require active networking services and one active interface that is
configured
Secure Shell (SSH)
Remote login similar to Telnet but utilizes more security
Stronger password authentication
Uses encryption when transporting data
Aux Port
Out-of-band connection
Uses telephone line
C a n be used like console port
Basics
11
TERMINAL EMULATION PROGRAMS
Software available for
connecting to a networking
device
PuTT Y
Tera Term
Secure C RT
HyperTerminal
O S X Terminal
Basics
12
For simulation we use Packet tracer to configure logical devices
IOS MODES OF OPERATION
In hierarchical order from most basic to most specialized, the
major modes are:
User executive (User E X E C ) mode
Privileged executive (Privileged E X E C ) mode
Global configuration mode
Other specific configuration modes, such as Interface
configuration mode.
Basics
Each mode has a distinctive prompt
13
NAVIGATING THE IOS
PRIMARY MODES
Basics
14
PRIMARY MODES
The two primary modes of operation are user E X E C mode and
privileged E X E C mode.
The privileged E X E C mode has a higher level of authority in what it
allows the user to do with the device.
User E X E C Mode
The user E X E C mode has limited capabilities but is useful for some
basic operations.
This mode is the first mode encountered upon entrance into the C L I of
an I O S device.
This is often referred to as view-only mode.
Basics
The user E X E C level does not allow the execution of any
commands that might change the configuration of the device. 15
CONT…
By default, there is no authentication required to access the user
E X E C mode from the console.
However, it is a good practice to ensure that authentication is
configured during the initial configuration.
The user E X E C mode is identified by the C L I prompt that
ends with the > symbol.
This is an example that shows the > symbol in the prompt: Switch>
Privileged E X E C Mode
The execution of configuration and management commands requires
Basics
that the network administrator use the privileged E X E C mode, or a
more specific mode in the hierarchy.
16
CONT...
The privileged E X E C mode can be identified by the
prompt ending with the #symbol. Switch#
By default, privileged E X E C mode does not require
authentication.
Global configuration mode and all other more specific
Basics
configuration modes can only be reached from the
privileged E X E C mode. 17
NAVIGATING THE IOS
GLOBAL CONFIGURATION MODE AND SUBMODES
Basics
18
GLOBAL CONFIGURATION MODE AND SUBMODES
Global configuration mode and interface configuration
modes can only be reached from the privileged E X E C
mode.
From global config, C L I configuration changes are made
that affect the operation of the device as a whole.
Basics
Switch# configure terminal
19
Switch(config)#
CONT.
From the global config mode, the user can enter different sub
configuration modes.
Each of these modes allows the configuration of a particular part or
function of the I O S device.
Interface mode - to configure one of the network interfaces
(Fa0/0, S0/0/0)
L i n e mode - to configure one of the physical or virtual lines
(console, A U X , VTY)
As commands are used and modes are changed, the prompt
Basics
changes to reflect the current context.
20
NAVIGATING BETWEEN IOS MODES (CONTINUED)
To move from the global configuration mode to the privileged
E X E C mode, you enter the command exit.
To move from any submode of the global configuration mode
to the mode one step above it in the hierarchy of modes, enter
the exit command.
To move from any submode of the privileged E X E C mode
to the privileged EXEC mode, enter the end
command .
Basics
21
THE COMMAND STRUCTURE
IOS COMMAND STRUCTURE
Basics
22
IOS COMMAND STRUCTURE…
Each I O S command has a specific format or syntax and can only be
executed at the appropriate mode.
The commands are not case-sensitive.
Following the command are one or more keywords and arguments.
Unlike a keyword, an argument is generally not a predefined word.
An argument is a value or variable defined by the user
Switch> ping I P address
Switch> ping 10.10.10.5
The command is ping and the user defined argument
Basics
is the 10.10.10.5.
20
CONT...
Similarly, the syntax for entering the traceroute command is:
Switch> traceroute I P address
Switch> traceroute 192.168.254.254
The command is traceroute and the user defined argument is the
192.168.254.254.
Basics
24
THE COMMAND STRUCTURE
IOS EXAMINATION COMMANDS
Basics
25
IOS EXAMINATION COMMANDS…
Use the show ? command to get a list of available
commands in a given context, or mode.
A typical show command can provide information about the
configuration, operation, and status of parts of a device.
Some other show commands frequently used by network
technicians include:
⚫ show startup-config - Displays the saved configuration
located in N V R A M .
⚫ show running-config - Displays the contents of the
Basics
currently running configuration file.
26
HOSTNAMES
WHY THE SWITCH
Let’s focus on
1. Creating a two P C network connected via a switch
2. Setting a name for the switch
3. Limiting access to the device configuration
4. Configuring banner messages
5. Saving the configuration
Basics
27
1. HOSTNAMES
DEVICE NAMES
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
Without names, network devices
are difficult to identify for
Basics
configuration purposes.
28
HOSTNAMES
HOSTNAMES
Hostnames allow
devices to be identified
by network
administrators over a
network or the Internet.
Basics
29
2. LIMITING ACCESS TO DEVICE CONFIGURATIONS
SECURING DEVICE ACCESS
The passwords introduced here are:
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged
EXEC mode
Console password - Limits device access using the console
connection
VTY password - Limits device access over Telnet(Remote login)
Basics
30
SECURING DEVICE ACCESS
Consider these key points when choosing passwords:
Use passwords that are more than eight characters in length.
Use a combination of upper and lowercase letters,
numbers, special characters, and/or numeric sequences in
passwords.
Avoid using the same password for all devices.
Avoid using common words such as password or
Basics
administrator, because these are easily guessed
31
LIMITING ACCESS TO DEVICE CONFIGURATIONS
SECURING PRIVILEGED EXEC ACCESS
Use the enable secret
command,
not the older enable password
command
enable secret provides
greater security
because the password is
encrypted
o In order to remove
password Use disable
commands
Basics
32
LIMITING ACCESS TO DEVICE CONFIGURATIONS
SECURING USER EXEC ACCESS
Console port must be secured
• Reduces the chance of unauthorized personnel physically plugging a
cable into the device and gaining device access
• vty lines allow access to a device via Telnet
• Number of vty lines supported varies with the type of device and the
IOS version
Service password-encryption
• Prevents passwords from showing up as plain text when viewing the configuration
• Purpose of this command is to keep unauthorized
individuals
Basics
from viewing passwords in the configuration file once applied.30
LIMITING ACCESS TO DEVICE CONFIGURATIONS
BANNER MESSAGES
Important part of the
legal process in the
event that someone is
prosecuted for
breaking into a device
wording that implies
that a login is
"welcome" or "invited" is
not appropriate
often used for legal
notification because it
is displayed to all
connected terminals
Basics
31
3.SAVING CONFIGURATIONS
CONFIGURATION FILES
Switch# reload
⚫System configuration has
been modified. Save?
[yes/no]: n
⚫Proceed with reload?
[confirm]
Startup configuration is
removed by using
the erase startup-
config
⚫Switch# erase startup-
config
On a switch you must
also issue the delete
vlan.dat
⚫ Switch# delete
Basics
vlan.dat
⚫ Delete filename
[vlan.dat]?
[confirm]
⚫ Delete 32
flash:vlan.dat?
CONFIGURATION FILES
Switch# erase startup-config
After the command is issued, the switch will
prompt
you for confirmation:
Erasing the nvram file system remove all
will configuration files! Continue?
[confirm]
Confirm is the default response.
To confirm and erase the startup configuration file, press .
Pressing any other key will abort the process.
Basics
36
The End!
Q?
Basics
37