Introduction To Networks - Basic Device Configuration
Introduction To Networks - Basic Device Configuration
2.4.1
Device Names
You have learned a great deal about the Cisco IOS, navigating the IOS, and the command structure.
Now, you are ready to congure devices! The rst conguration command on any device should be to
give it a unique device name or hostname. By default, all devices are assigned a factory default name.
For example, a Cisco IOS switch is "Switch."
The problem is if all switches in a network were left with their default names, it would be dicult to
identify a specic device. For instance, how would you know that you are connected to the right device
when accessing it remotely using SSH? The hostname provides conrmation that you are connected to
the correct device.
The default name should be changed to something more descriptive. By choosing names wisely, it is
easier to remember, document, and identify network devices. Here are some important naming
guidelines for hosts:
An organization must choose a naming convention that makes it easy and intuitive to identify a specic
device. The hostnames used in the device IOS preserve capitalization and lowercase characters. For
example, the gure shows that three switches, spanning three dierent oors, are interconnected
together in a network. The naming convention that was used incorporated the location and the purpose
of each device. Network documentation should explain how these names were chosen so additional
devices can be named accordingly.
Sw-Floor-3
https://contenthub.netacad.com/itn/2.4.8 1/8
4/13/2020 Introduction to Networks -Basic Device Configuration
Sw-Floor-2
Sw-Floor-1
When network devices are named, they are easy to identify for conguration purposes.
When the naming convention has been identied, the next step is to use the CLI to apply the names to
When
the devices. network
As shown devices
in the example, are
from the named,
privileged EXECthey
mode,are easy
access to identify
the global for
conguration co
mode by entering the congure terminal command. Notice the change in the command prompt.
From global conguration mode, enter the command hostname followed by the name of the switch
and press Enter. Notice the change in the command prompt name.
Note: To return the switch to the default prompt, use the no hostname global cong command.
Always make sure the documentation is updated each time a device is added or modied. Identify
devices in the documentation by their location, purpose, and address.
2.4.2
Password Guidelines
The use of weak or easily guessed passwords continues to be the biggest security concern of
organizations. Network devices, including home wireless routers, should always have passwords
congured to limit administrative access.
Cisco IOS can be congured to use hierarchical mode passwords to allow dierent access privileges to
a network device.
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and
remote Telnet access with passwords. In addition, all passwords should be encrypted and legal
notications provided.
https://contenthub.netacad.com/itn/2.4.8 2/8
4/13/2020 Introduction to Networks -Basic Device Configuration
When choosing passwords, use strong passwords that are not easily guessed. There are some key
points to consider when choosing passwords:
Use an internet search to nd a password generator. Many will allow you to set the length, character
set, and other parameters.
Note: Most of the labs in this course use simple passwords such as cisco or class. These passwords
are considered weak and easily guessable and should be avoided in production environments. We only
use these passwords for convenience in a classroom setting, or to illustrate conguration examples.
2.4.3
Congure Passwords
When you initially connect to a device, you are in user EXEC mode. This mode is secured using the
console.
To secure user EXEC mode access, enter line console conguration mode using the line console 0
global conguration command, as shown in the example. The zero is used to represent the rst (and in
most cases the only) console interface. Next, specify the user EXEC mode password using the
password password command. Finally, enable user EXEC access using the login command.
Console access will now require a password before allowing access to the user EXEC mode.
To have administrator access to all IOS commands including conguring a device, you must gain
privileged EXEC mode access. It is the most important access method because it provides complete
access to the device.
To secure privileged EXEC access, use the enable secret password global cong command, as shown
in the example.
https://contenthub.netacad.com/itn/2.4.8 3/8
4/13/2020 Introduction to Networks -Basic Device Configuration
Virtual terminal (VTY) lines enable remote access using Telnet or SSH to the device. Many Cisco
switches support up to 16 VTY lines that are numbered 0 to 15.
To secure VTY lines, enter line VTY mode using the line vty 0 15 global cong command. Next, specify
the VTY password using the password password command. Lastly, enable VTY access using the login
command.
2.4.4
Encrypt Passwords
The startup-cong and running-cong les display most passwords in plaintext. This is a security threat
because anyone can discover the passwords if they have access to these les.
To encrypt all plaintext passwords, use the service password-encryption global cong command as
shown in the example.
The command applies weak encryption to all unencrypted passwords. This encryption applies only to
passwords in the conguration le, not to passwords as they are sent over the network. The purpose of
this command is to keep unauthorized individuals from viewing passwords in the conguration le.
Use the show running-cong command to verify that passwords are now encrypted.
Sw-Floor-1(config)# end
Sw-Floor-1# show running-config
https://contenthub.netacad.com/itn/2.4.8 4/8
4/13/2020 Introduction to Networks -Basic Device Configuration
!
line con 0
password 7 094F471A1A0A
login
!
line vty 0 4
password 7 03095A0F034F38435B49150A1819
login
!
!
end
2.4.5
Banner Messages
Although requiring passwords is one way to keep unauthorized personnel out of a network, it is vital to
provide a method for declaring that only authorized personnel should attempt to access the device. To
do this, add a banner to the device output. Banners can be an important part of the legal process in the
event that someone is prosecuted for breaking into a device. Some legal systems do not allow
prosecution, or even the monitoring of users, unless a notication is visible.
To create a banner message of the day on a network device, use the banner motd # the message of
the day # global cong command. The “#” in the command syntax is called the delimiting character. It
is entered before and after the message. The delimiting character can be any character as long as it
does not occur in the message. For this reason, symbols such as the "#" are often used. After the
command is executed, the banner will be displayed on all subsequent attempts to access the device
until the banner is removed.
The following example shows the steps to congure the banner on Sw-Floor-1.
2.4.6
Click Play in the gure to view a video demonstration of how to secure administrative access to a
switch.
https://contenthub.netacad.com/itn/2.4.8 5/8
4/13/2020 Introduction to Networks -Basic Device Configuration
6:56
2.4.7
Switch#
Reset
https://contenthub.netacad.com/itn/2.4.8 6/8
4/13/2020 Introduction to Networks -Basic Device Configuration
Show Me
Show All
2.4.8
Check your understanding of basic device conguration by choosing the BEST answer to
the following questions.
hostname Sw-Floor-2
name Sw-Floor-2
enable class
secret class
service password-encryption
3. Which command enables password authentication for user EXEC mode access on a switch?
enable secret
login
secret
service password-encryption
enable secret
login
secret Introduction to Networks v7.0
service password-encryption
https://contenthub.netacad.com/itn/2.4.8 7/8
4/13/2020 Introduction to Networks -Basic Device Configuration
Check Show Me
Reset
2.3 2.5
The Command Structure Save Congurations
https://contenthub.netacad.com/itn/2.4.8 8/8