Chapter 2 Configuring A Network Operating System
Chapter 2 Configuring A Network Operating System
Router - Forwards data packets to and receives data packets from the Internet
Switch - Connects end devices using network cables
Wireless access point - Consists of a radio transmitter capable of connecting end
devices wirelessly
Firewall appliance - Secures outgoing traffic and restricts incoming traffic
Console
Telnet or SSH
AUX port
The console port can be used when the networking services have failed and remote access of
the Cisco IOS device is not possible.
Telnet
Telnet is a method for remotely establishing a CLI session of a device, through a virtual
interface, over a network. Unlike the console connection, Telnet sessions require active
networking services on the device. The network device must have at least one active
interface configured with an Internet address, such as an IPv4 address. Cisco IOS devices
include a Telnet server process that allows users to enter configuration commands from a
Telnet client. In addition to supporting the Telnet server process, the Cisco IOS device also
contains a Telnet client. This allows a network administrator to telnet from the Cisco device
CLI to any other device that supports a Telnet server process.
SSH
The Secure Shell (SSH) protocol provides a remote login similar to Telnet, except that it uses
more secure network services. SSH provides stronger password authentication than Telnet and
uses encryption when transporting session data. This keeps the user ID, password, and the
details of the management session private. As a best practice, use SSH instead of Telnet
whenever possible.
Most versions of Cisco IOS include an SSH server. In some devices, this service is enabled by
default. Other devices require the SSH server to be enabled manually. IOS devices also include
an SSH client that can be used to establish SSH sessions with other devices.
AUX
An older way to establish a CLI session remotely is via a telephone dialup connection using a
modem connected to the auxiliary (AUX) port of a router, which is highlighted in the figure.
Similar to the console connection, the AUX method is also an out-of-band connection and does
not require any networking services to be configured or available on the device. In the event
that network services have failed, it may be possible for a remote administrator to access the
switch or router over a telephone line.
The AUX port can also be used locally, like the console port, with a direct connection to a
computer running a terminal emulation program. However, the console port is preferred over
the AUX port for troubleshooting because it displays startup, debugging, and error messages
by default.
Note: Cisco Catalyst switches do not support an auxiliary connection.
There are a number of excellent terminal emulation programs available for connecting to a
networking device either by a serial connection over a console port or by a Telnet/SSH
connection. Some of these include:
PuTTY (Figure 1)
The user EXEC mode allows only a limited number of basic monitoring commands. This is
often referred to as view-only mode. The user EXEC level does not allow the execution of any
commands that might change the configuration of the device. Switch>
The privileged EXEC mode. Switch#
Global Configuration Mode. Switch# configure terminal. Switch(config)#. From global
configuration mode, CLI configuration changes are made that affect the operation of the
device as a whole.
Moving Between the User EXEC and Privileged EXEC Modes. Switch> enable.
Switch# disable
Moving from and to Global Configuration Mode and Submodes. Exit. Ctrl+Z.
immediate submode Switch(config-if)#, without having to exit line configuration mode.
THE COMMAND STRUCTURE. THE COMMAND REFERENCE.
BASIC IOS COMMAND STRUCTURE
Syntax - the most detailed version of the syntax for a command that can be found
Default - the manner in which the command is implemented on a device with a default
configuration
Mode - the configuration mode on the device where the command is entered
History - descriptions of how the command is implemented relative to the IOS version
Examples - useful examples that illustrate common scenarios that use the command
The IOS generally only provides negative feedback, as shown in Figure 1. If the interpreter
understands the command, the requested action is executed and the CLI returns to the
appropriate prompt.
Hot Keys and Shortcuts
Down Arrow - Allows the user to scroll forward through former commands
Ctrl-Z - Exits the configuration mode and returns to privileged EXEC mode
Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute
HOSTNAMES
Hostnames are configured on the active networking device. If the device name is not explicitly
configured, a factory-assigned default device name is used by Cisco IOS. The default name for
a Cisco IOS switch is "Switch."
Some guidelines for naming conventions are that names should:
The hostnames used in the device IOS preserve capitalization and lowercase characters.
Therefore, it allows you to capitalize a name as you ordinarily would. This contrasts with most
Internet naming schemes, where uppercase and lowercase characters are treated identically.
Hostnames allow devices to be identified by network administrators over a network or the
Internet.
Additionally, use strong passwords that are not easily guessed. The use of weak or easily
guessed passwords continues to be a security issue in many facets of the business world.
Consider these key points when choosing passwords:
SAVING CONFIGURATIONS
After making changes to a running configuration file, consider these distinct options:
The command to save the running configuration to startup configuration file is:
Switch# copy running-config startup-config
After being executed, the running configuration file updates the startup configuration file.
Switch# reload Reload saved startup-config
Switch# erase startup-config - The startup configuration is removed by using the erase
startup-config command
Backup Configurations with Text Capture
Configuration files can be saved and archived to a text document using Tera Term.
The steps are:
The text in the file will be applied as commands in the CLI and become the running
configuration on the device. This is a convenient method for manually configuring a device.
ADDRESS SCHEMES
Ports and Addresses
Network communications depend on end user device interfaces, networking device interfaces,
and the cables that connect them.
Some of the differences between various types of media include:
Ethernet port, the cable must have the correct connector, an RJ-45
Cisco IOS switches have physical ports for devices to connect to, but also have one or more
switch virtual interfaces (SVIs). These are virtual interfaces, because there is no physical
hardware on the device associated with it; an SVI is created in software. The virtual interface
provides a means to remotely manage a switch over a network using IPv4. Each switch comes
with one SVI appearing in the default configuration "out-of-the-box." The default SVI is
interface VLAN1.
Addressing Devices
To access the switch remotely, an IP address and a subnet mask must be configured on the
SVI:
IP address - Together with subnet mask, uniquely identifies end device on the
internetwork
interface vlan 1 - Used to navigate to the interface configuration mode from the
global configuration mode
The switch will still need to have one or more physical ports configured, as well as the VTY
lines, to complete the configuration which enables remote management of the switch.
Practice configuring a switch virtual interface by entering commands in the figure.