0% found this document useful (0 votes)
11 views14 pages

Lecture 2.1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views14 pages

Lecture 2.1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Basic Switch and End Device Configuration - 2.

1
lecture

Contents of the presentation:


Basic Switch and End Device
Configuration
Cybersecurity Protocols

1
2
3 01 {
4
5 [ Operating System ]
6
All end devices and network devices require an operating
7
system (OS). As shown in the figure, the part of the OS that
8
directly interacts with the computer hardware is called the
9 kernel. The part that provides communication between
10 applications and the user is called the shell. The user interacts
11 with the shell through a command-line interface (CLI) or a
12 graphical user interface (GUI).
13
14
}
Computer Networks
LinkedIn hh.kz

1
2
What is the ‘Soft’ {
3 Software
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Access ‘methods’ {
3 The switch will forward traffic by default and does not
4 need to be explicitly configured to operate. For example,
5 two configured nodes connected to the same new switch
6 will be able to communicate.
7
8 Regardless of the default behavior of the new switch, all
9 switches must be configured and secured.
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Access ‘methods’ {
3
4
5 1.Console
6
7 2.Secure Shell (SSH)
8
9 protocol
10
11 3.Telnet
12
13
14 }
Computer Networks
LinkedIn hh.kz

1 Console {
2
3
4 This is a physical management port that provides out-of-band
5 access to the Cisco device. Out-of-band access is provided
6 through a dedicated administrative channel, which is used solely
7 for device maintenance purposes. The advantage of using the
8 console port is that the device can be accessed even without
9 configuring network services, for example, during the initial
10 setup of a network device. Connecting to the console requires a
11 computer with terminal emulation software and a special console
12 cable to connect to the device.
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Secure Shell (SSH){
3
4 Secure Shell (SSH) protocol is a method that allows you to
5 remotely establish a secure CLI connection through a
6 virtual interface over a network. Unlike a console
7 connection, SSH connections must have network services
8
active on the device, including an active interface with a
9
10
configured address. Most versions of Cisco IOS contain an
11 SSH server and an SSH client that you can use to SSH
12 connect to other devices.
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Telnet {
3
4 Telnet is an insecure protocol that allows you to remotely
5 start a CLI session through a virtual interface over a
6 network. Unlike SSH, Telnet does not provide a secure
7 encrypted connection and should only be used in a lab
8
environment. User authentication data, passwords and
9
commands are transmitted over the network in plain text.
10
11
It's best to use SSH instead of Telnet. Cisco IOS includes
12 both a Telnet server and a Telnet client.
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Terminal emulation programs
3 {
4
5 There are several terminal emulation programs that
6 are used to connect to network devices using a serial
7
connection through the console port or through an
8
9
SSH/Telnet connection. These programs help you work
10 more efficiently by adjusting the size of windows,
11 changing font sizes, and changing color schemes.
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Terminal emulation programs {
3
Putty
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Terminal emulation programs {
3
Tera Term
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Terminal emulation programs {
3
SecureCRT
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Thank you for your ‘Attention’ {
3
4
5
6 Do you have any
7 questions?
8
9
[email protected]
10
11
+7 775 584 4838
12
13
14 }
Computer Networks
LinkedIn hh.kz

1
2
Questions and ‘Answers’ {
3
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks

You might also like