Podcast
Questions and Answers
Which of the following is an example of an intermediary or interconnecting device?
Which of the following is an example of an intermediary or interconnecting device?
- IP Camera
- Smartphone
- Router (correct)
- Laptop
The Cisco Internetwork Operating System (IOS) is stored in RAM and is lost when the device is powered off.
The Cisco Internetwork Operating System (IOS) is stored in RAM and is lost when the device is powered off.
False (B)
What command is used to save the changes made in running configuration to the NVRAM?
What command is used to save the changes made in running configuration to the NVRAM?
copy running-config startup-config
The _________ command is used to remotely access a device's CLI, but is less secure than SSH due to its lack of encryption.
The _________ command is used to remotely access a device's CLI, but is less secure than SSH due to its lack of encryption.
Match the following Cisco IOS modes with their descriptions:
Match the following Cisco IOS modes with their descriptions:
Which command is used to enter global configuration mode from privileged EXEC mode?
Which command is used to enter global configuration mode from privileged EXEC mode?
The disable
command is used to switch from user EXEC mode to privileged EXEC mode.
The disable
command is used to switch from user EXEC mode to privileged EXEC mode.
In Cisco IOS, what command can be used to get a list of available commands or options for a specific command?
In Cisco IOS, what command can be used to get a list of available commands or options for a specific command?
The IOS command show ______
displays the MAC address table on a switch.
The IOS command show ______
displays the MAC address table on a switch.
Match the hotkey/shortcut with their function in Cisco IOS:
Match the hotkey/shortcut with their function in Cisco IOS:
Which of the following commands is used to view a device's current configuration file?
Which of the following commands is used to view a device's current configuration file?
The startup configuration file is stored in RAM.
The startup configuration file is stored in RAM.
What command is used to erase the startup configuration on a Cisco device?
What command is used to erase the startup configuration on a Cisco device?
To prevent unauthorized access, the _________ should be configured with passwords.
To prevent unauthorized access, the _________ should be configured with passwords.
Match the password type with its function in Cisco IOS:
Match the password type with its function in Cisco IOS:
Which command is used to encrypt all cleartext passwords stored in the configuration file?
Which command is used to encrypt all cleartext passwords stored in the configuration file?
The banner motd
command is used to display a message to users before they log into the device.
The banner motd
command is used to display a message to users before they log into the device.
What command is used to assign an IP address and subnet mask to an interface in Cisco IOS?
What command is used to assign an IP address and subnet mask to an interface in Cisco IOS?
To enable an interface, use the no ______
command.
To enable an interface, use the no ______
command.
Match the ping result indicator with its meaning:
Match the ping result indicator with its meaning:
What is the purpose of establishing a network baseline?
What is the purpose of establishing a network baseline?
A ping sweep is used to collect running configuration files from multiple devices.
A ping sweep is used to collect running configuration files from multiple devices.
Which command, when performed from a Windows command prompt, is used to trace the route to a destination?
Which command, when performed from a Windows command prompt, is used to trace the route to a destination?
The loopback address, _________, is used to test the internal configuration of a device.
The loopback address, _________, is used to test the internal configuration of a device.
Which command displays the ARP table of a device?
Which command displays the ARP table of a device?
A console connection requires an active Layer 3 address on the device.
A console connection requires an active Layer 3 address on the device.
What is the file extension of the Cisco IOS image file?
What is the file extension of the Cisco IOS image file?
The Cisco IOS is designed as a ________ operating system.
The Cisco IOS is designed as a ________ operating system.
Match the following concepts:
Match the following concepts:
The console port on a network switch is typically accessible even if:
The console port on a network switch is typically accessible even if:
The Secure Shell (SSH) protocol offers weaker password authentication compared to Telnet.
The Secure Shell (SSH) protocol offers weaker password authentication compared to Telnet.
To configure hostname on the device, which mode in the CLI we should use?
To configure hostname on the device, which mode in the CLI we should use?
To negate the effects of a command, preface the command with the _________ keyword.
To negate the effects of a command, preface the command with the _________ keyword.
Match the command with the router mode:
Match the command with the router mode:
VTY lines allow access to a router via:
VTY lines allow access to a router via:
By default, Cisco routers are DCE devices.
By default, Cisco routers are DCE devices.
What is the first step to back up configuration with Text Capture (HyperTerminal)?
What is the first step to back up configuration with Text Capture (HyperTerminal)?
If you are performing a trace from a Windows computer, you should use the _________ command.
If you are performing a trace from a Windows computer, you should use the _________ command.
Match the following command with its meaning:
Match the following command with its meaning:
The address for a switch is assigned to
The address for a switch is assigned to
Ping uses the ICMP protocol to check for connectivity.
Ping uses the ICMP protocol to check for connectivity.
What is the default hostname assigned to a router?
What is the default hostname assigned to a router?
Flashcards
End Devices
End Devices
Devices such as PCs, laptops, tablets, smartphones, IP Cameras, IP Phones, Servers, etc.
Intermediary Devices
Intermediary Devices
Devices such as Routers, Switches, Wireless Access Points and Firewalls.
Network Operating System
Network Operating System
The operating system on a network device.
Cisco IOS
Cisco IOS
Signup and view all the flashcards
Command Line Interface (CLI)
Command Line Interface (CLI)
Signup and view all the flashcards
Console Access
Console Access
Signup and view all the flashcards
Console Port
Console Port
Signup and view all the flashcards
Telnet
Telnet
Signup and view all the flashcards
Secure Shell (SSH)
Secure Shell (SSH)
Signup and view all the flashcards
Running Configuration File
Running Configuration File
Signup and view all the flashcards
Startup Configuration File
Startup Configuration File
Signup and view all the flashcards
User Executive Mode
User Executive Mode
Signup and view all the flashcards
Privileged Executive Mode
Privileged Executive Mode
Signup and view all the flashcards
Global Configuration Mode
Global Configuration Mode
Signup and view all the flashcards
Specific Configuration Modes
Specific Configuration Modes
Signup and view all the flashcards
Ping
Ping
Signup and view all the flashcards
Traceroute
Traceroute
Signup and view all the flashcards
Context-Sensitive Help
Context-Sensitive Help
Signup and view all the flashcards
Command Syntax Check
Command Syntax Check
Signup and view all the flashcards
Show Version
Show Version
Signup and view all the flashcards
Show Running-Config
Show Running-Config
Signup and view all the flashcards
Show Startup-Config
Show Startup-Config
Signup and view all the flashcards
Save Configuration Command
Save Configuration Command
Signup and view all the flashcards
Configure Hostname
Configure Hostname
Signup and view all the flashcards
Console Password
Console Password
Signup and view all the flashcards
Enable Password
Enable Password
Signup and view all the flashcards
Enable Secret Password
Enable Secret Password
Signup and view all the flashcards
VTY Password
VTY Password
Signup and view all the flashcards
MOTD Banner
MOTD Banner
Signup and view all the flashcards
Backup to TFTP
Backup to TFTP
Signup and view all the flashcards
Erase Startup-Config
Erase Startup-Config
Signup and view all the flashcards
Configure Ethernet Interface
Configure Ethernet Interface
Signup and view all the flashcards
Interface Description
Interface Description
Signup and view all the flashcards
Ping Command
Ping Command
Signup and view all the flashcards
Local Loopback Test
Local Loopback Test
Signup and view all the flashcards
Tracert
Tracert
Signup and view all the flashcards
Traceroute
Traceroute
Signup and view all the flashcards
ARP Command
ARP Command
Signup and view all the flashcards
Show MAC Address-Table
Show MAC Address-Table
Signup and view all the flashcards
Study Notes
Basic Switch and End Device Configuration
- Chapter 2 outlines the basic configuration of switches and end devices.
Device Types
- End devices include PCs, laptops, tablets, smartphones, IP Cameras, IP Phones, and Servers.
- Intermediary or Interconnecting Devices include Routers, Switches, Wireless Access Points and Firewalls.
- The operating system enables the hardware to function.
- The operating system on a network device is a Network Operating System.
Cisco IOS
- Cisco Internetwork Operating System (IOS) is the system software in Cisco devices.
- Services are often accessed via a command line interface (CLI).
- The IOS file is several megabytes in size.
- IOS file is stored in Flash memory, which is non-volatile.
- IOS is copied into RAM when the device is powered on.
CLI Access Methods
- CLI environment can be accessed via console (CTY), Telnet/SSH, or AUX port.
Console Access
- Console uses a low speed serial connection to connect a computer/terminal to the console port on the router/switch.
- The console port is a management port which provides out-of-band access to a router.
- The console port can be accessed even with no networking services configured.
- The console should be configured with passwords which prevent unauthorized device access.
Telnet and SSH
- Telnet allows remote CLI session access.
- The network device needs at least one active interface configured with a Layer 3 address like an IPv4 address.
- A Telnet client can access vty sessions running on the Cisco device.
- Telnet sessions use a password for minimum authentication.
- Secure Shell (SSH) protocol is more secure than Telnet, which provides password authentication and utilizes encryption.
AUX Port
- CLI sessions can be established via telephone dialup using a modem connected to a router's AUX port.
- Not all routers have an auxiliary port.
Configuration Files
- There are two types of configuration files: running and startup.
- The running configuration file is used during the current operation which is stored in RAM.
- The startup configuration file is loaded when the device is restarted and stored in NVRAM, loading into RAM at restart.
- Configuration files are stored remotely on a server like a TFTP server as a backup.
Cisco IOS Modes
- Cisco IOS is designed as a modal operating system.
- User Executive mode prompt is >, for first entrance into the CLI.
- Privileged executive mode prompt is #, also called "enable" mode, used for configuration and management command execution.
- "enable" and "disable" change the CLI between user EXEC and privileged EXEC modes, respectively.
- To switch between User and Privileged Modes, type "Router>enable".
- If password authentication is configured, type "Router>enable" then "Password" then "Router#".
- Disable command returns from privileged EXEC to user EXEC mode.
Other Configuration Modes
- Global configuration mode which has a (config)# prompt, is used to do global configurations.
- Pass from privileged mode to global config mode by using "Router#configure terminal".
- Specific configuration modes which have a (config-if)# prompt, does specific configurations to the device.
- To configure interface fa0/1 is "Router(config)#interface fa0/1" then the prompt changes to "Router(config-if)#".
- To exit a specific configuration mode, enter "exit" at the prompt.
- To completely leave configuration mode, enter "end" or use the key sequence Ctrl-Z.
Ping and Trace Commands
- Ping is executed with "Router>ping IP address" or "Router>ping 10.10.10.5".
- Traceroute is executed with "Switch>traceroute IP address" or "Switch>traceroute 192.168.254.254".
Help Features
- Context-sensitive help lists commands and arguments and is accessed by entering a question mark (?) at any prompt.
- Command Syntax Check has three error messages: Ambiguous command, Incomplete command, and Incorrect command.
Hot Keys and Shortcuts
- Tab completes the command or keyword
- Ctrl-R redisplays a line
- Ctrl-Z exits configuration mode.
- Down Arrow allows user to scroll forward through former commands.
- Up Arrow allows user to scroll backward through former commands.
- Ctrl-Shift-6 interrupts an IOS process, like ping or traceroute.
- Ctrl-C aborts the current command and exits the configuration mode.
Show Command
- Show command is the examination command.
- "#show version" shows the Software Version (IOS version stored in flash).
- "#show version" shows the Bootstrap Version which is stored in Boot ROM.
- "#show version" shows the System up-time which is the time since last reboot.
- "#show version" shows the System restart info which is the method of restart.
- "#show version" shows the Software image name which is the IOS filename stored in flash.
- "#show version" shows Router Type and Processor type which is the model number and processor type
- "#show version" shows Memory type and allocation (Shared/Main) which is the main Processor RAM and Shared Packet I/O buffering
- "#show version" shows Software Features which refers to supported protocols / feature sets.
- "#show version" shows Hardware Interfaces which are the interfaces available on router.
- "#show version" shows Configuration Register which sets bootup specifications and console speed setting.
- "show arp" displays the ARP table of the device.
- "show mac-address-table" displays the MAC table of a switch.
- "show startup-config" displays the saved configuration located in NVRAM.
- "show running-config" displays the contents of the currently running configuration file.
- When a command returns more output than can be displayed on a single screen, press the Spacebar to view the next portion or press the Enter key for only the next line.
Save Configuration
- The running configuration is saved to the startup configuration file with the command "Router#copy running-config startup-config".
Configure Hostname
- Routers use a factory-assigned hostname value of "Router", while switches use "Switch".
- To configure a hostname:
- Router#configure terminal
- Router(config)#
- Router(config)#hostname AtlantaHQ
- AtlantaHQ(config)#
- To negate the effects of a command, preface the command with the no keyword: AtlantaHQ(config)# no hostname
Configuring Passwords and Banners
- Types of Passwords include console, enable, vty, and enable secret.
- Console password configuration:
- Switch(config)#line console 0
- Switch(config-line)#password password
- Switch(config-line)#login
- Zero represents the first console interface for a router.
- To configure an Enable password: Router(config)#enable password password
- To configure an Enable secret password: Router(config)#enable secret password
- vty lines allow access to a router via Telnet where Cisco devices support 5 VTY lines numbered 0 to 4 by default.
- To configure a password for vty lines:
- Router(config)#line vty 0 4
- Router(config-line)#password password
- Router(config-line)#login
- Enable password encryption using the command "(config)#service password-encryption"
- This command enables encryption of passwords when configured.
- A common banner is the MOTD (message of the day).
- To configure MOTD: Switch(config)#banner motd # message #
Backing up Configurations Offline
- Running and startup configuration files can be stored to a TFTP server.
- The command is #copy running-config tftp, will require the IP address of the host to be entered.
- It is necessary to assign a name to the configuration file.
Removing Startup Configuration
- The following will remove the startup configuration: Router#erase startup-config
- After removing the startup configuration from NVRAM, reload the device.
Backup Configurations with Text Capture using HyperTerminal
- On the Transfer menu, click Capture Text.
- Choose a location.
- Click Start to begin capturing text.
- Execute the show running-config or show startup-config command at the privileged EXEC prompt.
- Check output to verify it was not corrupted.
Backup Configurations with Text Capture (TeraTerm)
- On the File menu, click Log.
- TeraTerm will begin capturing text and choose the location.
- Execute the show running-config or show startup-config command at the privileged EXEC prompt
- Select Close in the TeraTerm: Log window, when the capture is complete.
- Check the output to verify that it was not corrupted.
Restoring Text Configurations
- The device is set in global configuration mode to receive commands.
- To restore with HyperTerminal:
- Locate the file and open the text document.
- Copy the text.
- On the Edit menu, click paste to host.
- To restore with TeraTerm:
- On the File menu, click Send file.
- Locate the file and click Open.
- TeraTerm will paste the file into the device.
Configuring Interfaces
- Every router interface has a unique IPv4 address and subnet mask.
- To configure an Ethernet interface:
- Router(config)#interface FastEthernet 0/0
- Router(config-if)#ip address ip_address netmask
- Router(config-if)#no shutdown
Serial Interfaces
- Serial interfaces need a clock signal to control communications timing.
- The DCE device like a CSU/DSU provides the clock in most environments.
- Cisco routers are DTE devices by default, but are configured as DCE devices.
- Configuration:
- Router(config)#interface Serial 0/0/0
- Router(config-if)#clock rate 56000
- Router(config-if)#no shutdown
Interface Description
- Interface description indicates the purpose.
- Configuration:
- HQ-switch1(config)#interface fa0/0
- HQ-switch1(config-if)#description Connects to main
- switch in Building A
Switch Interface Configuration
- To manage a switch via Telnet or SSH, assign an IP address.
- A switch address is assigned to a virtual VLAN interface where VLAN 1 is used most of the time.
- It is necesary to define a the "ip default-gateway" command so the switch can communicate outside the local network.
Ping Command
- The Ping command effectively tests connectivity.
- Ping uses the ICMP protocol to check for connectivity (Echo Request and Echo Reply).
- Results:
- ! indicates receipt of an ICMP echo reply
- . indicates a timed out while waiting for a reply
- U indicates an ICMP unreachable message was received
Ping Testing
- Test 1: Local Loopback (verifies the proper operation of the protocol stack while 127.0.0.1 is called a loopback address. "C:>ping 127.0.0.1"
- Test 2: Local NIC (verifies that the NIC driver and most of the NIC hardware have worked correctly "C:>ping 192.168.23.3")
- Test 3: Ping Local Gateway. "C:>ping 192.168.23.254"
- Test 4: Ping Remote Host "C:>ping 192.168.11.1"
Trace Command
- Use tracert when running a trace from Windows.
- Use traceroute when running a trace from a router CLI.
Basic Network Baselines
- Establishing a network baseline is effective for monitoring and troubleshooting network performance.
- A baseline studies the network to ensure it's working as designed.
- Begin a baseline by copying/pasting results from ping, trace, or commands into a text file, stamping it with the date and saving it.
ARP Command
- The arp command maps physical addresses to known IPv4 addresses.
- C:\host1>arp –a which lists all devices in the ARP cache showing the IPv4/physical address/addressing type.
- The router cache can be cleared with "arp-d" to allow the repopulation of the cache.
Ping Sweep
- ping sweep employs a range of IP addresses to collect MAC addresses.
- A range of hosts is specified to ping with one command.
- Ping Sweep network data is generated in two ways: a table of responding hosts and IP/MAC addresses.
- A ping sweep makes an ARP request to get the MAC address when each ping is attempted, while activating each host with recent access and ensure that ARP is current.
Show MAC Table
- "Sw1-2950#show mac address-table" which displays how many hosts are connected to a switch.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.