Podcast
Questions and Answers
What is the first step when copying an IOS image to a device using TFTP?
What is the first step when copying an IOS image to a device using TFTP?
- Check the configuration file in NVRAM
- Copy the IOS image file from the TFTP server
- Ping the TFTP server (correct)
- Verify the amount of free flash space
What command is used to verify free flash space on the device before an IOS image transfer?
What command is used to verify free flash space on the device before an IOS image transfer?
- check flash space
- show version
- show flash: (correct)
- verify flash
During the IOS image transfer process, what information is the user prompted to provide?
During the IOS image transfer process, what information is the user prompted to provide?
- Source file name and DNS server address
- IP address of the remote host and destination file name (correct)
- IP address of the router and source file name
- Source file name and destination directory
What does the boot system command do during device startup?
What does the boot system command do during device startup?
What is the primary purpose of having multiple boot system commands in sequence?
What is the primary purpose of having multiple boot system commands in sequence?
What command is used to verify the current working directory when accessing NVRAM?
What command is used to verify the current working directory when accessing NVRAM?
Which command would you use to list the contents of the NVRAM directory?
Which command would you use to list the contents of the NVRAM directory?
What is the purpose of the startup-configuration file in NVRAM?
What is the purpose of the startup-configuration file in NVRAM?
Which command is equivalent for viewing file systems on a Cisco 2960 Switch?
Which command is equivalent for viewing file systems on a Cisco 2960 Switch?
How can configuration files be backed up using Tera Term?
How can configuration files be backed up using Tera Term?
What should be done first to save a configuration file in Tera Term?
What should be done first to save a configuration file in Tera Term?
What type of images can be uploaded and downloaded with the Cisco 2960 switch?
What type of images can be uploaded and downloaded with the Cisco 2960 switch?
If you want to access the files stored in NVRAM, what command must you use first?
If you want to access the files stored in NVRAM, what command must you use first?
What is Tera Term primarily used for in relation to configuration files?
What is Tera Term primarily used for in relation to configuration files?
Which of the following best describes the startup-configuration file?
Which of the following best describes the startup-configuration file?
What is the primary function of the software clock on a router or switch?
What is the primary function of the software clock on a router or switch?
Why is it important to synchronize time across all devices on a network?
Why is it important to synchronize time across all devices on a network?
Which of the following methods can be used to set the date and time on a router or switch?
Which of the following methods can be used to set the date and time on a router or switch?
What command is used to manually set the time on a router?
What command is used to manually set the time on a router?
What message indicates that the system clock has been updated on a router?
What message indicates that the system clock has been updated on a router?
What can occur if devices on a network are not synchronized in terms of their time settings?
What can occur if devices on a network are not synchronized in terms of their time settings?
What is a potential risk of manually configuring the date and time on a router?
What is a potential risk of manually configuring the date and time on a router?
What problem might arise from configuring time settings on devices independently, without using NTP?
What problem might arise from configuring time settings on devices independently, without using NTP?
What is the initial step to enter ROMMON mode on a Cisco device?
What is the initial step to enter ROMMON mode on a Cisco device?
What command is used to set the configuration register for password recovery?
What command is used to set the configuration register for password recovery?
What happens after setting the configuration register to 0x2142?
What happens after setting the configuration register to 0x2142?
Which command should be entered after changing the configuration register to start the device?
Which command should be entered after changing the configuration register to start the device?
During the password recovery process, what mode does the device display after executing the break sequence?
During the password recovery process, what mode does the device display after executing the break sequence?
What should you do to restart the device after setting the configuration register?
What should you do to restart the device after setting the configuration register?
What is the purpose of copying the startup-config to the running-config?
What is the purpose of copying the startup-config to the running-config?
What information is typically omitted in the output displayed in ROMMON mode?
What information is typically omitted in the output displayed in ROMMON mode?
If a user interrupts the boot process and enters ROMMON mode, what prompt is displayed?
If a user interrupts the boot process and enters ROMMON mode, what prompt is displayed?
What is the main reason for utilizing ROMMON mode in Cisco devices?
What is the main reason for utilizing ROMMON mode in Cisco devices?
What is the primary function of SNMP agents?
What is the primary function of SNMP agents?
Which UDP port does the SNMP manager use to poll the SNMP agents?
Which UDP port does the SNMP manager use to poll the SNMP agents?
What are the two primary SNMP manager requests?
What are the two primary SNMP manager requests?
What role does the Management Information Base (MIB) play in the SNMP system?
What role does the Management Information Base (MIB) play in the SNMP system?
In the context of SNMP, what does the 'set' action do?
In the context of SNMP, what does the 'set' action do?
What is the purpose of SNMP traps?
What is the purpose of SNMP traps?
Who has access to the Management Information Base (MIB)?
Who has access to the Management Information Base (MIB)?
What is one of the main components of the SNMP system?
What is one of the main components of the SNMP system?
Which statement describes the SNMP manager's responsibilities?
Which statement describes the SNMP manager's responsibilities?
What does the get-request do in SNMP?
What does the get-request do in SNMP?
The boot system command is used to load a new IOS image during bootup from the router's RAM.
The boot system command is used to load a new IOS image during bootup from the router's RAM.
Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are used for network device discovery.
Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are used for network device discovery.
The command 'show clock detail' provides in-depth information about the system clock settings.
The command 'show clock detail' provides in-depth information about the system clock settings.
The Network Time Protocol (NTP) helps devices synchronize their time settings independently without a central reference.
The Network Time Protocol (NTP) helps devices synchronize their time settings independently without a central reference.
The Management Information Base (MIB) is exclusively accessible to SNMP agents.
The Management Information Base (MIB) is exclusively accessible to SNMP agents.
The command 'cdp enable' activates the Cisco Discovery Protocol on the device.
The command 'cdp enable' activates the Cisco Discovery Protocol on the device.
The command 'ntp server ip-address' is used to configure the NTP settings on a Cisco device.
The command 'ntp server ip-address' is used to configure the NTP settings on a Cisco device.
Stratum levels in NTP indicate the number of hops away from a time source.
Stratum levels in NTP indicate the number of hops away from a time source.
The software clock on a router or switch begins counting when the system is powered off.
The software clock on a router or switch begins counting when the system is powered off.
NTP is used for synchronizing the time across all devices in a network.
NTP is used for synchronizing the time across all devices in a network.
It is impossible to determine the order of events if the time is not synchronized between devices on a network.
It is impossible to determine the order of events if the time is not synchronized between devices on a network.
A router's clock can only be set manually and cannot be configured automatically.
A router's clock can only be set manually and cannot be configured automatically.
The command 'clock set 20:36:00 nov 15 2019' is used to manually configure the date and time on a Cisco router.
The command 'clock set 20:36:00 nov 15 2019' is used to manually configure the date and time on a Cisco router.
When the system clock of a router is updated, it displays a message indicating the previous time setting.
When the system clock of a router is updated, it displays a message indicating the previous time setting.
Configuring time settings independently on devices can lead to accurate time reporting.
Configuring time settings independently on devices can lead to accurate time reporting.
The primary source of time for a Cisco device is generated from external servers only.
The primary source of time for a Cisco device is generated from external servers only.
Using the NTP method to set the clock on a router eliminates the need for manual configuration.
Using the NTP method to set the clock on a router eliminates the need for manual configuration.
The message '%SYS-6-CLOCKUPDATE' indicates a failure in updating the system clock.
The message '%SYS-6-CLOCKUPDATE' indicates a failure in updating the system clock.
The command to copy a configuration file from a TFTP server is copy running-config tftp.
The command to copy a configuration file from a TFTP server is copy running-config tftp.
The USB feature on a Cisco router only supports USB 2.0 flash drives.
The USB feature on a Cisco router only supports USB 2.0 flash drives.
Using the dir command allows users to view the contents of the USB flash drive.
Using the dir command allows users to view the contents of the USB flash drive.
The USB file system on a Cisco router is referred to as usbflash1:.
The USB file system on a Cisco router is referred to as usbflash1:.
To verify that the USB drive is present, the show file systems command is used.
To verify that the USB drive is present, the show file systems command is used.
The copy run usbflash0:/ command is used to backup the configuration to the USB drive.
The copy run usbflash0:/ command is used to backup the configuration to the USB drive.
The command requires the user to specify the directory when copying files to a USB flash drive.
The command requires the user to specify the directory when copying files to a USB flash drive.
The command to restore a configuration from a TFTP server includes pressing Enter to confirm the filename each time.
The command to restore a configuration from a TFTP server includes pressing Enter to confirm the filename each time.
The ip address provided for the TFTP server must always be in the 192.168.x.x range.
The ip address provided for the TFTP server must always be in the 192.168.x.x range.
The optional name during the TFTP restoration process can be anything chosen by the user.
The optional name during the TFTP restoration process can be anything chosen by the user.
CDP is a Layer 2 protocol specific to Cisco devices.
CDP is a Layer 2 protocol specific to Cisco devices.
CDP operates independently of the media and protocol used in the network.
CDP operates independently of the media and protocol used in the network.
CDP sends periodic advertisements to connected devices that share information about their interfaces.
CDP sends periodic advertisements to connected devices that share information about their interfaces.
LLDP is the sole protocol used for mapping network topologies.
LLDP is the sole protocol used for mapping network topologies.
SNMP is solely responsible for managing file systems on a network device.
SNMP is solely responsible for managing file systems on a network device.
The command 'show running-config' can be executed after capture has been initiated.
The command 'show running-config' can be executed after capture has been initiated.
A configuration can only be restored from a text file by using the Tera Term application.
A configuration can only be restored from a text file by using the Tera Term application.
In Tera Term, selecting 'Close' after capture ensures that the file is verified for corruption.
In Tera Term, selecting 'Close' after capture ensures that the file is verified for corruption.
Encrypted passwords need to be converted to plaintext in the configuration file before pasting it into the device.
Encrypted passwords need to be converted to plaintext in the configuration file before pasting it into the device.
The command 'copy running-config tftp' is used to back up the startup configuration.
The command 'copy running-config tftp' is used to back up the startup configuration.
To paste a configuration into a device using Tera Term, you do not need to enter global configuration mode.
To paste a configuration into a device using Tera Term, you do not need to enter global configuration mode.
When using Tera Term, you must first choose a file from the File menu to send it to the device.
When using Tera Term, you must first choose a file from the File menu to send it to the device.
Non-command text such as 'IOS messages' should be retained in the configuration file before pasting.
Non-command text such as 'IOS messages' should be retained in the configuration file before pasting.
Enabling the device involves adding 'enable' and 'configure terminal' at the beginning of the configuration file.
Enabling the device involves adding 'enable' and 'configure terminal' at the beginning of the configuration file.
The file's content during Tera Term operation is applied directly as commands in the CLI.
The file's content during Tera Term operation is applied directly as commands in the CLI.
Study Notes
Network Discovery
- CDP and LLDP are used to discover devices on a network
- CDP is a Cisco proprietary protocol
- LLDP is a standard protocol and is interoperable between vendors
Time and Calendar Services
- Routers and switches have an internal clock that starts when they boot
- This internal clock is the primary time source
- It is important to synchronize time across all devices on a network
- This can be achieved by manually configuring the date and time or by using NTP
Network Time Protocol (NTP)
- NTP is a protocol that synchronizes the time on network devices
- It ensures that consistent time is maintained across devices
- NTP uses a hierarchical structure of servers to maintain accuracy
- This helps in troubleshooting and event analysis
Router and Switch File Maintenance
- There are different file systems on routers and switches
- The primary file systems are NVRAM, flash, and RAM
- NVRAM stores the startup configuration, which is loaded when the device boots
- Flash stores the operating system and other configuration files
- RAM is used for temporary storage
Router File Systems
- The
cd
command changes the directory in the file system - The
pwd
command displays the current working directory - The
dir
command lists the contents of the current directory
Switch File Systems
- The
show file systems
command displays a list of the file systems on a switch - The
flash
file system on Cisco Catalyst switches can be used to copy configuration files and archive software images
Back Up Configuration
- Configuration files can be saved to a text file using tools like Tera Term
- This allows you to create a backup of the configuration for later use
Password Recovery Example
- The ROMMON mode can be accessed by using a break sequence during the boot process
- The
confreg
command can be used to set the configuration register to 0x2142 - This disables the startup configuration from loading during startup
- This allows you to recover the password by copying the startup configuration to the running configuration
Simple Network Management Protocol (SNMP)
- SNMP is a protocol used to manage network devices
- It allows network administrators to monitor and configure devices remotely
- SNMP uses three key elements: the SNMP manager, the SNMP agent, and the Management Information Base (MIB)
- The SNMP manager sends requests to the SNMP agent, which retrieves information from the MIB
- The SNMP agent can also send trap messages to the SNMP manager to report events
Introduction to SNMP
- The SNMP manager is part of a Network Management System (NMS)
- It can collect information from an SNMP agent using the “get” action and can change configurations using the “set” action
- SNMP agents can forward information to the SNMP manager using “traps”
- The SNMP agent and MIB reside on SNMP client devices
- MIBs store data about the device and its operations
SNMP Operation
- SNMP agents store data about the device in the MIB
- The SNMP manager uses the agent to access information in the MIB
- There are two primary types of SNMP requests: “get” and “set”
- The “get” request retrieves information from the MIB
- The “set” request changes the value of a variable in the MIB
IOS Image Management
- The
show flash
command can be used to check the free space on the device flash - The
copy tftp flash
command copies an IOS image from a TFTP server to the device flash - The
boot system
command specifies the location and image name to load during startup - The
boot system
command can be used to create a fault-tolerant boot plan with multiple images
Copy an IOS Image to a Device Example
- Ping the TFTP server to test connectivity
- Ensure that there is sufficient flash space on the new image file
- Copy the IOS image from the TFTP server to the device using the
copy tftp flash
command - The user will be prompted for the IP address of the TFTP server, the source filename, and the destination filename
Device Discovery with CDP
- CDP is a Cisco protocol that is used to gather information about Cisco devices connected on the same data link
- CDP is media and protocol independent
- CDP runs on all Cisco devices
- CDP sends periodic advertisements to connected devices
- Advertisements include device type, device name, and number and type of interfaces
- CDP is used to map a network topology
Device Discovery with LLDP
- LLDP is a standard protocol that discovers devices and gathers information about them
- LLDP can be used to map a network topology
NTP
- NTP synchronizes time across devices on a network
- NTP is used to determine the order of events and the cause of an event
- NTP can be manually set or configured using Network Time Protocol
- The software clock in a router or switch starts when the system boots
- When the time is not synchronized between devices, it will be impossible to determine the order of events and the cause of an event
SNMP
- SNMP is used for network management tasks
- SNMP uses MIBs to manage devices
- SNMP uses OIDs to identify objects in the MIB
- SNMP offers several request types: get-request, get-next-request, get-bulk-request, set-request, and get-response
- SNMP uses a manager and an agent to manage devices
- The SNMP manager sends requests to the SNMP agent
- The SNMP agent receives the requests and queries the MIB
- The SNMP agent sends the response back to the manager
Syslog
- Syslog is a protocol for logging events on a network
- Syslog uses a server to collect logs from multiple devices
- Syslog messages contain information about the event, the device, and the time
- Syslog is used to monitor network activity and troubleshoot problems
Router and Switch File Maintenance
- Router and Switch File Maintenance uses various methods to back up and restore IOS configuration files
- Routines include Text file restoration, TFTP server, USB connections
Router and Switch File Maintenance: Using a Text File to Restore a Configuration
- Can be easily copied and pasted into a device
- Requires editing to remove non-command text
- Requires editing to include commands: 'enable' and 'configure terminal'
- Can be restored from a text file using Tera Term
Router and Switch File Maintenance: Using TFTP to Back Up and Restore a Configuration
- A network protocol that allows for file transfers
- To back up a configuration to a TFTP server:
- Enter the copy running-config tftp command
- Enter the IP address of the host where the configuration file will be stored
- Enter the name to assign to the configuration file
- Press Enter to confirm each choice
- To restore a configuration from a TFTP server:
- Enter the copy tftp running-config command
- Enter the IP address of the host where the configuration file is stored
- Enter the name to assign to the configuration file
- Press Enter to confirm each choice
Router and Switch File Maintenance: Using USB to Back Up and Restore a Configuration
- Procedure:
- Issue the show file systems command to verify that the USB drive is there and confirm its name
- Use the copy run usbflash0:/ command to copy the configuration file to the USB flash drive
- Be sure to use the name of the flash drive, as indicated in the file system
- The slash is optional but indicates the root directory of the USB flash drive
- The IOS will prompt for the filename
- USB ports enable certain models of Cisco routers to support USB flash drives
- USB flash provides secondary storage and an additional boot device
IOS Image Management
- IOS Image Management upgrades the IOS image installed on a router
- To upgrade to the copied IOS image after that image is saved on the router's flash memory, configure the router to load the new image during bootup by using the boot system command
Cisco Discovery Protocol (CDP)
- CDP is a Cisco proprietary protocol used to gather information about Cisco devices on the same data link
- CDP runs on all Cisco devices such as routers, switches, and access servers
- CDP runs on all Cisco Devices
- To enable CDP, use the command:
cdp enable
- To disable CDP, use the command:
no cdp enable
- To see CDP neighbors, use the command:
show cdp neighbors
- To see detailed information about the CDP neighbors, use the command:
show cdp neighbors detail
Link Layer Discovery Protocol (LLDP)
- LLDP is a Layer 2 protocol used to discover devices connected to a network
- LLDP is a standard protocol, unlike Cisco's CDP
- To enable LLDP, use the command:
lldp run
- To disable LLDP, use the command:
no lldp run
- To see LLDP neighbors, use the command:
show lldp neighbors
- To see detailed information about the LLDP neighbors, use the command:
show lldp neighbors detail
Network Time Protocol (NTP)
- NTP is a protocol used to synchronize clocks on devices on a network
- To configure a device as an NTP client, use the command:
ntp server ip-address
- To view NTP status, use the command:
show ntp status
- To view NTP associations, use the command:
show ntp associations
- The stratum level of an NTP server indicates its accuracy
- Stratum 1 servers are directly connected to a time source, such as an atomic clock
- Stratum 2 servers are connected to a stratum 1 server
- Stratum 3 servers are connected to a stratum 2 server, and so on
- To manually set the clock on a router, use the command:
clock set hh:mm:ss mm dd yyyy
- To see the clock status on a router, use the command:
show clock
- To see more clock details, use the command:
show clock detail
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers key concepts of network discovery protocols such as CDP and LLDP, as well as time synchronization using NTP. Additionally, it touches on the file systems used in routers and switches, emphasizing the importance of configuration storage. Test your understanding of these fundamental networking principles.