Basic Switch and End Device Configuration Part I PDF
Document Details
Tags
Summary
This document provides a comprehensive introduction to configuring Cisco IOS devices. It covers topics such as accessing devices, navigating the command-line interface (CLI), and using IOS commands. The document is likely to be part of a training course or textbook.
Full Transcript
CHAPTER 2 BASIC SWITCH AND END DEVICE CONFIGURATION PART-I Chapter Objectives PART-I Explain how to access a Cisco IOS device for configuration purposes. Explain how to navigate Cisco IOS to configure network devices. Describe the command structure of Cisco IOS software...
CHAPTER 2 BASIC SWITCH AND END DEVICE CONFIGURATION PART-I Chapter Objectives PART-I Explain how to access a Cisco IOS device for configuration purposes. Explain how to navigate Cisco IOS to configure network devices. Describe the command structure of Cisco IOS software. PART-II Configure a Cisco IOS device using CLI. Use IOS commands to save the running configuration. Configure a host device with an IP address. Operating Systems Shell - The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. Kernel - Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Hardware - The physical part of a computer including underlying electronics. GUI A GUI allows the user to interact with the system using an environment of graphical icons, menus, and windows. A GUI is more user-friendly and requires less knowledge of the underlying command structure that controls the system. Examples of these are: Windows, macOS, Linux KDE, Apple iOS and Android. GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a GUI Example CLI. Purpose of an OS PC operating system enables a user to do the CLI-based network operating system following: enables a network technician to do the Use a mouse to make selections and following: run programs Use a keyboard to run CLI-based Enter text and text-based commands network programs View output on a monitor Use a keyboard to enter text and text-based commands View output on a monitor Access Methods Console – A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations. Secure Shell (SSH) – Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.) Telnet – Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.) Terminal Emulation Programs Terminal emulation programs are used to connect to a network device by either a console port or by an SSH/Telnet connection. There are several terminal emulation programs to chose from such as PuTTY, Tera Term and SecureCRT. Primary Command Modes User EXEC Mode: Allows access to only a limited number of basic monitoring commands Identified by the CLI prompt that ends with the > symbol Privileged EXEC Mode: Allows access to all commands and features Identified by the CLI prompt that ends with the # symbol Configuration Mode and Subconfiguration Modes Global Configuration Mode: Used to access configuration options on the device Line Configuration Mode: Used to configure console, SSH, Telnet or AUX access Interface Configuration Mode: Used to configure a switch port or router interface Navigation Between IOS Modes Privileged EXEC Mode: To move from user EXEC mode to privilege EXEC mode, use the enable command. Global Configuration Mode: To move in and out of global configuration mode, use the configure terminal command. To return to privilege EXEC mode, use the exit command. Line Configuration Mode: To move in and out of line configuration mode, use the line command followed by the management line type. To return to global configuration mode, use the exit command. Navigation Between IOS MODES (Contd.) Subconfiguration Modes: To move out of any subconfiguration mode to get back to global configuration mode, use the exit command. To return to privilege EXEC mode, use the end command or key combination Ctrl +Z. To move directly from one subconfiguration mode to another, type in the desired subconfiguration mode command. In the example, the command prompt changes from (config-line)# to (config-if)#. Basic IOS Command Structure General Syntax for a Command Keyword – This is a specific parameter defined in the operating system (in the figure, ip protocols). Argument - This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5). IOS Command Syntax Check A command might require one or more arguments. To determine the keywords and arguments required for a command, refer to the command syntax. Boldface text indicates commands and keywords that are entered as shown. Italic text indicates an argument for which the user provides the value. Convention Description boldface Boldface text indicates commands and keywords that you enter literally as shown. italics Italic text indicates arguments for which you supply values. [x] Square brackets indicate an optional element (keyword or argument). {x} Braces indicate a required element (keyword or argument). [x {y | z }] Braces and vertical lines within square brackets indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command. IOS Command Syntax Check (Contd.) The command syntax provides the pattern, or format, that must be used when entering a command. The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5. The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254. If a command is complex with multiple arguments, you may see it represented like this: IOS Help Features Context-sensitive help enables you to Command syntax check verifies that a quickly find answers to these questions: valid command was entered by the Which commands are available in user. each command mode? If the interpreter cannot Which commands start with specific understand the command being characters or group of characters? entered, it will provide feedback Which arguments and keywords are describing what is wrong with the command. available to particular commands? Hot Keys and Shortcuts The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting easier. Commands and keywords can be shortened to the minimum number of characters that identify a unique selection. For example, the configure command can be shortened to conf because configure is the only command that begins with conf. Hot Keys and Shortcuts (Contd.) The table below is a brief list of keystrokes to enhance command line editing. Keystroke Description Tab Completes a partial command name entry. Backspace Erases the character to the left of the cursor. Left Arrow or Ctrl+B Moves the cursor one character to the left. Right Arrow or Ctrl+F Moves the cursor one character to the right. Up Arrow or Ctrl+P Recalls the commands in the history buffer, beginning with the most recent commands. Hot Keys and Shortcuts (Contd.) When a command output produces more The table below lists commands that can text than can be displayed in a terminal be used to exit out of an operation. window, the IOS will display a “-- More--” prompt. The table below describes the keystrokes that can be used when this prompt is displayed. Keystroke Description Keystroke Description When in any configuration mode, ends the Ctrl-C configuration mode and returns to privileged Enter Key Displays the next line. EXEC mode. When in any configuration mode, ends the Ctrl-Z configuration mode and returns to privileged Space Bar Displays the next screen. EXEC mode. Ctrl-Shift-6 All-purpose break sequence used to abort Ends the display string, returning to DNS lookups, traceroutes, pings, etc. Any other key privileged EXEC mode.