0% found this document useful (0 votes)
22 views3 pages

Day4 - Intro To The CLI

The document provides information about connecting to and configuring Cisco devices through the command line interface. It discusses how to connect to a device's console port, navigate different command modes, manage configuration files, and set passwords. The document also reviews key commands and concepts.

Uploaded by

ozy.almondry2021
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views3 pages

Day4 - Intro To The CLI

The document provides information about connecting to and configuring Cisco devices through the command line interface. It discusses how to connect to a device's console port, navigate different command modes, manage configuration files, and set passwords. The document also reviews key commands and concepts.

Uploaded by

ozy.almondry2021
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

##Intro to the CLI

- Command-Line interface: using it to configure Cisco devices.


- GUI (Graphical User Interface)

-------------------
#How to Connect to a Cisco device? (Console Port)

Steps:
1. Using a Rollover Cable that connecting like this:
- pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6 and ect.
2. Access it by the terminal emulator like (PuTTY) is a popular choice and
you can get it at (putty.org)
- Select serial to connected to the CLI
- The speed is known as baud rate which is (9,600 bits per second)
- Data bits = 8
- STOP bits = 1
- parity is to dedcet errors so the defualt of as none
- flow control as none

Notes:
- user EXEC mode is indicated by the 'greater than sign' next to the host
name of the devise and is also called user mode.
- If you enter the 'enable' command in user EXEC mode, you will be placed in
privileged EXEC mode and insted of > a # would be displayed.
- Privileged EXEC mode is: providing a complete access to view the device's
configuration, restart the device, ect.
- And you cannot change the configuration, but can change the time on the
device, save configuration file, ect.

- Global Configuration Mode: conf t to enter the global mood.


- 'enable password' command

------------------------
#Configuration files

- There are two separate configuration files kept on the device at once.
1. Running-config = the current, active configuration file one the device.
As you enter command in the CLI, you edit the active
configuration.
to do that write in the CLI 'show running-config'

2. Startup-config = the configuration file that will be loaded upon restart


of the device.
to do that write in the CLI 'show startup-config'

- Methods to Save the configuration file and that would be in the privileged mood:
- First method: write
- Second method: write memory
- Third method: copy running-config startup-config

- 'Service password-encryption' command to levelup the password security:


- 'conf t' to enter the global mode.
- service password-encryption command, however the problem is too easy to
break this encryption method by a wbesite

- The More Secure Method is to use the 'enable secret' coomand:


- enable secret command 'Cisco' is the password.
- do sh run (show running-config)
- Canceling/Deleting commands:
- typing a 'no sevice password-encryption'
- 'do sh run'

-------------------
#Summary:

- If you enable service password-encryption...

• current passwords will be encrypted.


• future passwords will be encrypted.
• the enable secret will not be effected.

- If you disable service password-encryption...

• current passwords will not be decrypted.


• future passwords will not be encrypted.
• the enable secret will not be effected

----------------------------
#Modes Review

Router> = user EXEC mode


Router# = privilged EXEC mode
Router(config)# = global confiugration mode

-----------------------------
#Commands Review

- Router>enable
##used to enter privileged EXEC mode

- Router#configure terminal
##used to enter global configuration mode

- Router(config)# enable password ‘password’


##configures a password to protect privileged exec mode

- Router(config)#service password-encryption
##encrypts the enable password (and other passwords)

- Router(config)#enable secret password


##configures a more secure, always-encrypted enable password

- Router(config)#run privileged-exec-level-command
##executes a privileged-exec level command from global configuration mode

- Router(config)#no command
##removes the command

- Router(config)#show running-config
##displays the current, active configurtion file

- Router(config)#show startup-config
##displays the saved configuration file which will be loaded if the device is
restarted

- Router(config)#write
##saves the configuration

- Router(config)#write memory
##saves the configuration

- Router(config)#copy running-config startup-config


##saves the configuration

-----------------------------
Q/A

What kind of cable is used to connect to a Cisco device via the RJ45 console port?

a) Rollover cable (A)


b) Crossover cable
c) USB cable

You type enable to enter privileged exec mode on your Cisco router, however the
password you enter is not accepted. What could be the problem?

a) service password-encryption is enabled.


b) service password-encryption is disabled.
c) Caps Lock is on (A)

- Caps Lock is on:


- Passwords are case-sensitive, so if caps lock is on it could cause you to
enter an incorrect password even if you think you're entering it correctly

You might also like