Lecture 2.1
Lecture 2.1
1
lecture
1
2
3 01 {
4
5 [ Operating System ]
6
All end devices and network devices require an operating
7
system (OS). As shown in the figure, the part of the OS that
8
directly interacts with the computer hardware is called the
9 kernel. The part that provides communication between
10 applications and the user is called the shell. The user interacts
11 with the shell through a command-line interface (CLI) or a
12 graphical user interface (GUI).
13
14
}
Computer Networks
LinkedIn hh.kz
1
2
What is the ‘Soft’ {
3 Software
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Access ‘methods’ {
3 The switch will forward traffic by default and does not
4 need to be explicitly configured to operate. For example,
5 two configured nodes connected to the same new switch
6 will be able to communicate.
7
8 Regardless of the default behavior of the new switch, all
9 switches must be configured and secured.
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Access ‘methods’ {
3
4
5 1.Console
6
7 2.Secure Shell (SSH)
8
9 protocol
10
11 3.Telnet
12
13
14 }
Computer Networks
LinkedIn hh.kz
1 Console {
2
3
4 This is a physical management port that provides out-of-band
5 access to the Cisco device. Out-of-band access is provided
6 through a dedicated administrative channel, which is used solely
7 for device maintenance purposes. The advantage of using the
8 console port is that the device can be accessed even without
9 configuring network services, for example, during the initial
10 setup of a network device. Connecting to the console requires a
11 computer with terminal emulation software and a special console
12 cable to connect to the device.
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Secure Shell (SSH){
3
4 Secure Shell (SSH) protocol is a method that allows you to
5 remotely establish a secure CLI connection through a
6 virtual interface over a network. Unlike a console
7 connection, SSH connections must have network services
8
active on the device, including an active interface with a
9
10
configured address. Most versions of Cisco IOS contain an
11 SSH server and an SSH client that you can use to SSH
12 connect to other devices.
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Telnet {
3
4 Telnet is an insecure protocol that allows you to remotely
5 start a CLI session through a virtual interface over a
6 network. Unlike SSH, Telnet does not provide a secure
7 encrypted connection and should only be used in a lab
8
environment. User authentication data, passwords and
9
commands are transmitted over the network in plain text.
10
11
It's best to use SSH instead of Telnet. Cisco IOS includes
12 both a Telnet server and a Telnet client.
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Terminal emulation programs
3 {
4
5 There are several terminal emulation programs that
6 are used to connect to network devices using a serial
7
connection through the console port or through an
8
9
SSH/Telnet connection. These programs help you work
10 more efficiently by adjusting the size of windows,
11 changing font sizes, and changing color schemes.
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Terminal emulation programs {
3
Putty
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Terminal emulation programs {
3
Tera Term
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Terminal emulation programs {
3
SecureCRT
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Thank you for your ‘Attention’ {
3
4
5
6 Do you have any
7 questions?
8
9
[email protected]
10
11
+7 775 584 4838
12
13
14 }
Computer Networks
LinkedIn hh.kz
1
2
Questions and ‘Answers’ {
3
4
5
6
7
8
9
10
11
12
13
14 }
Computer Networks