0% found this document useful (0 votes)
91 views27 pages

Introduction To CLI: Network Basics

Cisco Confidential Purpose of OS PC operating systems (Windows 8 and OS X) perform technical functions that enable Use of a mouse View output Enter text Switch or router IOS provides options to Configure interfaces enable routing and switching functions All networking devices come with a default IOS Possible to upgrade the IOS version or feature set (c) 2008 Cisco Systems, Inc. All rights reserved.

Uploaded by

gurkansengul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views27 pages

Introduction To CLI: Network Basics

Cisco Confidential Purpose of OS PC operating systems (Windows 8 and OS X) perform technical functions that enable Use of a mouse View output Enter text Switch or router IOS provides options to Configure interfaces enable routing and switching functions All networking devices come with a default IOS Possible to upgrade the IOS version or feature set (c) 2008 Cisco Systems, Inc. All rights reserved.

Uploaded by

gurkansengul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Introduction to CLI

Network Basics

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

2.1 IOS Bootcamp

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Cisco IOS

Purpose of OS
PC operating systems (Windows 8 & OS X) perform technical
functions that enable
Use of a mouse
View output
Enter text
Switch or router IOS provides options to
Configure interfaces
Enable routing and switching functions
All networking devices come with a default IOS
Possible to upgrade the IOS version or feature set

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Cisco IOS

Location of the Cisco IOS


IOS stored in Flash

Non-volatile storage not lost when power is lost


Can be changed or overwritten as needed
Can be used to store multiple versions of IOS
IOS copied from flash to volatile RAM
Quantity of flash and RAM memory determines IOS that can be used

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Cisco IOS

IOS Functions
Major functions performed or enabled by Cisco routers and
switches include:

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Accessing a Cisco IOS Device

Console Access Method


The most common methods to access the Command Line Interface
Console
Telnet or SSH
AUX port

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Accessing a Cisco IOS Device

Console Access Method


Console port
Device is accessible even if no networking services have been
configured (out-of-band)
Need a special console cable
Allows configuration commands to be entered
Should be configured with passwords to prevent unauthorized access
Device should be located in a secure room so console port can not
be easily accessed

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Navigating the IOS

Cisco IOS Modes of Operation

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Navigating the IOS

Primary Modes

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Navigating the IOS

Global Configuration Mode and Submodes

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

Navigating the IOS

Navigating between IOS Modes

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Navigating the IOS

Navigating between IOS Modes (cont.)

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

The Command Structure

IOS Command Structure

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

The Command Structure

Context Sensitive Help

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14

The Command Structure

Command Syntax Check

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15

The Command Structure

Hot Keys and Shortcuts


Tab - Completes the remainder of a partially typed command or
keyword
Ctrl-R - Redisplays a line
Ctrl-A - Moves cursor to the beginning of the line
Ctrl-Z - Exits configuration mode and returns to user EXEC
Down Arrow - Allows the user to scroll forward through former
commands
Up Arrow - Allows the user to scroll backward through former
commands
Ctrl-Shift-6 - Allows the user to interrupt an IOS process such
as ping or traceroute
Ctrl-C - Aborts the current command and exits the configuration
mode
Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

16

The Command Structure

The show version Command

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17

2.2 Getting Basic

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18

Hostnames

Why the Switch


Lets focus on

Presentation_ID

Creating a two PC network connected via a switch


Setting a name for the switch
Limiting access to the device configuration
Configuring banner messages
Saving the configuration

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Hostnames

Device Names
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit

Use only letters, digits, and dashes


Be less than 64 characters in length

Without names, network


devices are difficult to
identify for configuration
purposes.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

20

Hostnames

Configuring Hostnames
Hostnames allow
devices to be
identified by
network
administrators
over a network or
the Internet

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

21

Limiting Access to Device Configurations

Securing Device Access


The passwords introduced here are:
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged EXEC
mode
Console password - Limits device access using the console
connection
VTY password - Limits device access over Telnet

Note: In most of the labs in this course, we will be using simple


passwords such as cisco or class.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

22

Limiting Access to Device Configurations

Securing Privileged EXEC Access


use the enable secret command, not the
older enable password command
enable secret provides greater security because
the password is encrypted

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

23

Limiting Access to Device Configurations

Securing User EXEC Access

Console port must be secured


reduces the chance of unauthorized personnel
physically plugging a cable into the device and gaining
device access
vty lines allow access to a Cisco device via Telnet
number of vty lines supported varies with the type of
device and the IOS version
Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

24

Limiting Access to Device Configurations

Encrypting Password Display


service passwordencryption
prevents passwords
from showing up as
plain text when
viewing the
configuration
purpose of this
command is to keep
unauthorized
individuals from
viewing passwords in
the configuration file
once applied,
removing the
encryption service
does not reverse the
encryption

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

25

Limiting Access to Device Configurations

Banner Messages
important part of
the legal process
in the event that
someone is
prosecuted for
breaking into a
device
wording that
implies that a
login is "welcome"
or "invited" is not
appropriate
often used for
legal notification
because it is
displayed to all
connected
terminals

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

26

Saving Configurations

Configuration Files
Switch# reload
System configuration
has been modified.
Save? [yes/no]: n
Proceed with reload?
[confirm]

startup configuration is
removed by using
the erase startup-config
Switch# erase startup-config

On a switch also issue


the delete vlan.dat
Switch# delete vlan.dat
Delete filename [vlan.dat]?
Delete flash:vlan.dat?
[confirm]

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

27

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy