Podcast
Questions and Answers
What is the first step when copying an IOS image to a device using TFTP?
What is the first step when copying an IOS image to a device using TFTP?
What command is used to verify free flash space on the device before an IOS image transfer?
What command is used to verify free flash space on the device before an IOS image transfer?
During the IOS image transfer process, what information is the user prompted to provide?
During the IOS image transfer process, what information is the user prompted to provide?
What does the boot system command do during device startup?
What does the boot system command do during device startup?
Signup and view all the answers
What is the primary purpose of having multiple boot system commands in sequence?
What is the primary purpose of having multiple boot system commands in sequence?
Signup and view all the answers
What command is used to verify the current working directory when accessing NVRAM?
What command is used to verify the current working directory when accessing NVRAM?
Signup and view all the answers
Which command would you use to list the contents of the NVRAM directory?
Which command would you use to list the contents of the NVRAM directory?
Signup and view all the answers
What is the purpose of the startup-configuration file in NVRAM?
What is the purpose of the startup-configuration file in NVRAM?
Signup and view all the answers
Which command is equivalent for viewing file systems on a Cisco 2960 Switch?
Which command is equivalent for viewing file systems on a Cisco 2960 Switch?
Signup and view all the answers
How can configuration files be backed up using Tera Term?
How can configuration files be backed up using Tera Term?
Signup and view all the answers
What should be done first to save a configuration file in Tera Term?
What should be done first to save a configuration file in Tera Term?
Signup and view all the answers
What type of images can be uploaded and downloaded with the Cisco 2960 switch?
What type of images can be uploaded and downloaded with the Cisco 2960 switch?
Signup and view all the answers
If you want to access the files stored in NVRAM, what command must you use first?
If you want to access the files stored in NVRAM, what command must you use first?
Signup and view all the answers
What is Tera Term primarily used for in relation to configuration files?
What is Tera Term primarily used for in relation to configuration files?
Signup and view all the answers
Which of the following best describes the startup-configuration file?
Which of the following best describes the startup-configuration file?
Signup and view all the answers
What is the primary function of the software clock on a router or switch?
What is the primary function of the software clock on a router or switch?
Signup and view all the answers
Why is it important to synchronize time across all devices on a network?
Why is it important to synchronize time across all devices on a network?
Signup and view all the answers
Which of the following methods can be used to set the date and time on a router or switch?
Which of the following methods can be used to set the date and time on a router or switch?
Signup and view all the answers
What command is used to manually set the time on a router?
What command is used to manually set the time on a router?
Signup and view all the answers
What message indicates that the system clock has been updated on a router?
What message indicates that the system clock has been updated on a router?
Signup and view all the answers
What can occur if devices on a network are not synchronized in terms of their time settings?
What can occur if devices on a network are not synchronized in terms of their time settings?
Signup and view all the answers
What is a potential risk of manually configuring the date and time on a router?
What is a potential risk of manually configuring the date and time on a router?
Signup and view all the answers
What problem might arise from configuring time settings on devices independently, without using NTP?
What problem might arise from configuring time settings on devices independently, without using NTP?
Signup and view all the answers
What is the initial step to enter ROMMON mode on a Cisco device?
What is the initial step to enter ROMMON mode on a Cisco device?
Signup and view all the answers
What command is used to set the configuration register for password recovery?
What command is used to set the configuration register for password recovery?
Signup and view all the answers
What happens after setting the configuration register to 0x2142?
What happens after setting the configuration register to 0x2142?
Signup and view all the answers
Which command should be entered after changing the configuration register to start the device?
Which command should be entered after changing the configuration register to start the device?
Signup and view all the answers
During the password recovery process, what mode does the device display after executing the break sequence?
During the password recovery process, what mode does the device display after executing the break sequence?
Signup and view all the answers
What should you do to restart the device after setting the configuration register?
What should you do to restart the device after setting the configuration register?
Signup and view all the answers
What is the purpose of copying the startup-config to the running-config?
What is the purpose of copying the startup-config to the running-config?
Signup and view all the answers
What information is typically omitted in the output displayed in ROMMON mode?
What information is typically omitted in the output displayed in ROMMON mode?
Signup and view all the answers
If a user interrupts the boot process and enters ROMMON mode, what prompt is displayed?
If a user interrupts the boot process and enters ROMMON mode, what prompt is displayed?
Signup and view all the answers
What is the main reason for utilizing ROMMON mode in Cisco devices?
What is the main reason for utilizing ROMMON mode in Cisco devices?
Signup and view all the answers
What is the primary function of SNMP agents?
What is the primary function of SNMP agents?
Signup and view all the answers
Which UDP port does the SNMP manager use to poll the SNMP agents?
Which UDP port does the SNMP manager use to poll the SNMP agents?
Signup and view all the answers
What are the two primary SNMP manager requests?
What are the two primary SNMP manager requests?
Signup and view all the answers
What role does the Management Information Base (MIB) play in the SNMP system?
What role does the Management Information Base (MIB) play in the SNMP system?
Signup and view all the answers
In the context of SNMP, what does the 'set' action do?
In the context of SNMP, what does the 'set' action do?
Signup and view all the answers
What is the purpose of SNMP traps?
What is the purpose of SNMP traps?
Signup and view all the answers
Who has access to the Management Information Base (MIB)?
Who has access to the Management Information Base (MIB)?
Signup and view all the answers
What is one of the main components of the SNMP system?
What is one of the main components of the SNMP system?
Signup and view all the answers
Which statement describes the SNMP manager's responsibilities?
Which statement describes the SNMP manager's responsibilities?
Signup and view all the answers
What does the get-request do in SNMP?
What does the get-request do in SNMP?
Signup and view all the answers
The boot system command is used to load a new IOS image during bootup from the router's RAM.
The boot system command is used to load a new IOS image during bootup from the router's RAM.
Signup and view all the answers
Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are used for network device discovery.
Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are used for network device discovery.
Signup and view all the answers
The command 'show clock detail' provides in-depth information about the system clock settings.
The command 'show clock detail' provides in-depth information about the system clock settings.
Signup and view all the answers
The Network Time Protocol (NTP) helps devices synchronize their time settings independently without a central reference.
The Network Time Protocol (NTP) helps devices synchronize their time settings independently without a central reference.
Signup and view all the answers
The Management Information Base (MIB) is exclusively accessible to SNMP agents.
The Management Information Base (MIB) is exclusively accessible to SNMP agents.
Signup and view all the answers
The command 'cdp enable' activates the Cisco Discovery Protocol on the device.
The command 'cdp enable' activates the Cisco Discovery Protocol on the device.
Signup and view all the answers
The command 'ntp server ip-address' is used to configure the NTP settings on a Cisco device.
The command 'ntp server ip-address' is used to configure the NTP settings on a Cisco device.
Signup and view all the answers
Stratum levels in NTP indicate the number of hops away from a time source.
Stratum levels in NTP indicate the number of hops away from a time source.
Signup and view all the answers
The software clock on a router or switch begins counting when the system is powered off.
The software clock on a router or switch begins counting when the system is powered off.
Signup and view all the answers
NTP is used for synchronizing the time across all devices in a network.
NTP is used for synchronizing the time across all devices in a network.
Signup and view all the answers
It is impossible to determine the order of events if the time is not synchronized between devices on a network.
It is impossible to determine the order of events if the time is not synchronized between devices on a network.
Signup and view all the answers
A router's clock can only be set manually and cannot be configured automatically.
A router's clock can only be set manually and cannot be configured automatically.
Signup and view all the answers
The command 'clock set 20:36:00 nov 15 2019' is used to manually configure the date and time on a Cisco router.
The command 'clock set 20:36:00 nov 15 2019' is used to manually configure the date and time on a Cisco router.
Signup and view all the answers
When the system clock of a router is updated, it displays a message indicating the previous time setting.
When the system clock of a router is updated, it displays a message indicating the previous time setting.
Signup and view all the answers
Configuring time settings independently on devices can lead to accurate time reporting.
Configuring time settings independently on devices can lead to accurate time reporting.
Signup and view all the answers
The primary source of time for a Cisco device is generated from external servers only.
The primary source of time for a Cisco device is generated from external servers only.
Signup and view all the answers
Using the NTP method to set the clock on a router eliminates the need for manual configuration.
Using the NTP method to set the clock on a router eliminates the need for manual configuration.
Signup and view all the answers
The message '%SYS-6-CLOCKUPDATE' indicates a failure in updating the system clock.
The message '%SYS-6-CLOCKUPDATE' indicates a failure in updating the system clock.
Signup and view all the answers
The command to copy a configuration file from a TFTP server is copy running-config tftp.
The command to copy a configuration file from a TFTP server is copy running-config tftp.
Signup and view all the answers
The USB feature on a Cisco router only supports USB 2.0 flash drives.
The USB feature on a Cisco router only supports USB 2.0 flash drives.
Signup and view all the answers
Using the dir command allows users to view the contents of the USB flash drive.
Using the dir command allows users to view the contents of the USB flash drive.
Signup and view all the answers
The USB file system on a Cisco router is referred to as usbflash1:.
The USB file system on a Cisco router is referred to as usbflash1:.
Signup and view all the answers
To verify that the USB drive is present, the show file systems command is used.
To verify that the USB drive is present, the show file systems command is used.
Signup and view all the answers
The copy run usbflash0:/ command is used to backup the configuration to the USB drive.
The copy run usbflash0:/ command is used to backup the configuration to the USB drive.
Signup and view all the answers
The command requires the user to specify the directory when copying files to a USB flash drive.
The command requires the user to specify the directory when copying files to a USB flash drive.
Signup and view all the answers
The command to restore a configuration from a TFTP server includes pressing Enter to confirm the filename each time.
The command to restore a configuration from a TFTP server includes pressing Enter to confirm the filename each time.
Signup and view all the answers
The ip address provided for the TFTP server must always be in the 192.168.x.x range.
The ip address provided for the TFTP server must always be in the 192.168.x.x range.
Signup and view all the answers
The optional name during the TFTP restoration process can be anything chosen by the user.
The optional name during the TFTP restoration process can be anything chosen by the user.
Signup and view all the answers
CDP is a Layer 2 protocol specific to Cisco devices.
CDP is a Layer 2 protocol specific to Cisco devices.
Signup and view all the answers
CDP operates independently of the media and protocol used in the network.
CDP operates independently of the media and protocol used in the network.
Signup and view all the answers
CDP sends periodic advertisements to connected devices that share information about their interfaces.
CDP sends periodic advertisements to connected devices that share information about their interfaces.
Signup and view all the answers
LLDP is the sole protocol used for mapping network topologies.
LLDP is the sole protocol used for mapping network topologies.
Signup and view all the answers
SNMP is solely responsible for managing file systems on a network device.
SNMP is solely responsible for managing file systems on a network device.
Signup and view all the answers
The command 'show running-config' can be executed after capture has been initiated.
The command 'show running-config' can be executed after capture has been initiated.
Signup and view all the answers
A configuration can only be restored from a text file by using the Tera Term application.
A configuration can only be restored from a text file by using the Tera Term application.
Signup and view all the answers
In Tera Term, selecting 'Close' after capture ensures that the file is verified for corruption.
In Tera Term, selecting 'Close' after capture ensures that the file is verified for corruption.
Signup and view all the answers
Encrypted passwords need to be converted to plaintext in the configuration file before pasting it into the device.
Encrypted passwords need to be converted to plaintext in the configuration file before pasting it into the device.
Signup and view all the answers
The command 'copy running-config tftp' is used to back up the startup configuration.
The command 'copy running-config tftp' is used to back up the startup configuration.
Signup and view all the answers
To paste a configuration into a device using Tera Term, you do not need to enter global configuration mode.
To paste a configuration into a device using Tera Term, you do not need to enter global configuration mode.
Signup and view all the answers
When using Tera Term, you must first choose a file from the File menu to send it to the device.
When using Tera Term, you must first choose a file from the File menu to send it to the device.
Signup and view all the answers
Non-command text such as 'IOS messages' should be retained in the configuration file before pasting.
Non-command text such as 'IOS messages' should be retained in the configuration file before pasting.
Signup and view all the answers
Enabling the device involves adding 'enable' and 'configure terminal' at the beginning of the configuration file.
Enabling the device involves adding 'enable' and 'configure terminal' at the beginning of the configuration file.
Signup and view all the answers
The file's content during Tera Term operation is applied directly as commands in the CLI.
The file's content during Tera Term operation is applied directly as commands in the CLI.
Signup and view all the answers
Study Notes
Network Discovery
- CDP and LLDP are used to discover devices on a network
- CDP is a Cisco proprietary protocol
- LLDP is a standard protocol and is interoperable between vendors
Time and Calendar Services
- Routers and switches have an internal clock that starts when they boot
- This internal clock is the primary time source
- It is important to synchronize time across all devices on a network
- This can be achieved by manually configuring the date and time or by using NTP
Network Time Protocol (NTP)
- NTP is a protocol that synchronizes the time on network devices
- It ensures that consistent time is maintained across devices
- NTP uses a hierarchical structure of servers to maintain accuracy
- This helps in troubleshooting and event analysis
Router and Switch File Maintenance
- There are different file systems on routers and switches
- The primary file systems are NVRAM, flash, and RAM
- NVRAM stores the startup configuration, which is loaded when the device boots
- Flash stores the operating system and other configuration files
- RAM is used for temporary storage
Router File Systems
- The
cd
command changes the directory in the file system - The
pwd
command displays the current working directory - The
dir
command lists the contents of the current directory
Switch File Systems
- The
show file systems
command displays a list of the file systems on a switch - The
flash
file system on Cisco Catalyst switches can be used to copy configuration files and archive software images
Back Up Configuration
- Configuration files can be saved to a text file using tools like Tera Term
- This allows you to create a backup of the configuration for later use
Password Recovery Example
- The ROMMON mode can be accessed by using a break sequence during the boot process
- The
confreg
command can be used to set the configuration register to 0x2142 - This disables the startup configuration from loading during startup
- This allows you to recover the password by copying the startup configuration to the running configuration
Simple Network Management Protocol (SNMP)
- SNMP is a protocol used to manage network devices
- It allows network administrators to monitor and configure devices remotely
- SNMP uses three key elements: the SNMP manager, the SNMP agent, and the Management Information Base (MIB)
- The SNMP manager sends requests to the SNMP agent, which retrieves information from the MIB
- The SNMP agent can also send trap messages to the SNMP manager to report events
Introduction to SNMP
- The SNMP manager is part of a Network Management System (NMS)
- It can collect information from an SNMP agent using the “get” action and can change configurations using the “set” action
- SNMP agents can forward information to the SNMP manager using “traps”
- The SNMP agent and MIB reside on SNMP client devices
- MIBs store data about the device and its operations
SNMP Operation
- SNMP agents store data about the device in the MIB
- The SNMP manager uses the agent to access information in the MIB
- There are two primary types of SNMP requests: “get” and “set”
- The “get” request retrieves information from the MIB
- The “set” request changes the value of a variable in the MIB
IOS Image Management
- The
show flash
command can be used to check the free space on the device flash - The
copy tftp flash
command copies an IOS image from a TFTP server to the device flash - The
boot system
command specifies the location and image name to load during startup - The
boot system
command can be used to create a fault-tolerant boot plan with multiple images
Copy an IOS Image to a Device Example
- Ping the TFTP server to test connectivity
- Ensure that there is sufficient flash space on the new image file
- Copy the IOS image from the TFTP server to the device using the
copy tftp flash
command - The user will be prompted for the IP address of the TFTP server, the source filename, and the destination filename
Device Discovery with CDP
- CDP is a Cisco protocol that is used to gather information about Cisco devices connected on the same data link
- CDP is media and protocol independent
- CDP runs on all Cisco devices
- CDP sends periodic advertisements to connected devices
- Advertisements include device type, device name, and number and type of interfaces
- CDP is used to map a network topology
Device Discovery with LLDP
- LLDP is a standard protocol that discovers devices and gathers information about them
- LLDP can be used to map a network topology
NTP
- NTP synchronizes time across devices on a network
- NTP is used to determine the order of events and the cause of an event
- NTP can be manually set or configured using Network Time Protocol
- The software clock in a router or switch starts when the system boots
- When the time is not synchronized between devices, it will be impossible to determine the order of events and the cause of an event
SNMP
- SNMP is used for network management tasks
- SNMP uses MIBs to manage devices
- SNMP uses OIDs to identify objects in the MIB
- SNMP offers several request types: get-request, get-next-request, get-bulk-request, set-request, and get-response
- SNMP uses a manager and an agent to manage devices
- The SNMP manager sends requests to the SNMP agent
- The SNMP agent receives the requests and queries the MIB
- The SNMP agent sends the response back to the manager
Syslog
- Syslog is a protocol for logging events on a network
- Syslog uses a server to collect logs from multiple devices
- Syslog messages contain information about the event, the device, and the time
- Syslog is used to monitor network activity and troubleshoot problems
Router and Switch File Maintenance
- Router and Switch File Maintenance uses various methods to back up and restore IOS configuration files
- Routines include Text file restoration, TFTP server, USB connections
Router and Switch File Maintenance: Using a Text File to Restore a Configuration
- Can be easily copied and pasted into a device
- Requires editing to remove non-command text
- Requires editing to include commands: 'enable' and 'configure terminal'
- Can be restored from a text file using Tera Term
Router and Switch File Maintenance: Using TFTP to Back Up and Restore a Configuration
- A network protocol that allows for file transfers
- To back up a configuration to a TFTP server:
- Enter the copy running-config tftp command
- Enter the IP address of the host where the configuration file will be stored
- Enter the name to assign to the configuration file
- Press Enter to confirm each choice
- To restore a configuration from a TFTP server:
- Enter the copy tftp running-config command
- Enter the IP address of the host where the configuration file is stored
- Enter the name to assign to the configuration file
- Press Enter to confirm each choice
Router and Switch File Maintenance: Using USB to Back Up and Restore a Configuration
- Procedure:
- Issue the show file systems command to verify that the USB drive is there and confirm its name
- Use the copy run usbflash0:/ command to copy the configuration file to the USB flash drive
- Be sure to use the name of the flash drive, as indicated in the file system
- The slash is optional but indicates the root directory of the USB flash drive
- The IOS will prompt for the filename
- USB ports enable certain models of Cisco routers to support USB flash drives
- USB flash provides secondary storage and an additional boot device
IOS Image Management
- IOS Image Management upgrades the IOS image installed on a router
- To upgrade to the copied IOS image after that image is saved on the router's flash memory, configure the router to load the new image during bootup by using the boot system command
Cisco Discovery Protocol (CDP)
- CDP is a Cisco proprietary protocol used to gather information about Cisco devices on the same data link
- CDP runs on all Cisco devices such as routers, switches, and access servers
- CDP runs on all Cisco Devices
- To enable CDP, use the command:
cdp enable
- To disable CDP, use the command:
no cdp enable
- To see CDP neighbors, use the command:
show cdp neighbors
- To see detailed information about the CDP neighbors, use the command:
show cdp neighbors detail
Link Layer Discovery Protocol (LLDP)
- LLDP is a Layer 2 protocol used to discover devices connected to a network
- LLDP is a standard protocol, unlike Cisco's CDP
- To enable LLDP, use the command:
lldp run
- To disable LLDP, use the command:
no lldp run
- To see LLDP neighbors, use the command:
show lldp neighbors
- To see detailed information about the LLDP neighbors, use the command:
show lldp neighbors detail
Network Time Protocol (NTP)
- NTP is a protocol used to synchronize clocks on devices on a network
- To configure a device as an NTP client, use the command:
ntp server ip-address
- To view NTP status, use the command:
show ntp status
- To view NTP associations, use the command:
show ntp associations
- The stratum level of an NTP server indicates its accuracy
- Stratum 1 servers are directly connected to a time source, such as an atomic clock
- Stratum 2 servers are connected to a stratum 1 server
- Stratum 3 servers are connected to a stratum 2 server, and so on
- To manually set the clock on a router, use the command:
clock set hh:mm:ss mm dd yyyy
- To see the clock status on a router, use the command:
show clock
- To see more clock details, use the command:
show clock detail
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers key concepts of network discovery protocols such as CDP and LLDP, as well as time synchronization using NTP. Additionally, it touches on the file systems used in routers and switches, emphasizing the importance of configuration storage. Test your understanding of these fundamental networking principles.