Chapter 2-Basic Switch and End Device Configuration 4
Chapter 2-Basic Switch and End Device Configuration 4
• Keyword – This is a specific parameter defined in the operating system (in the figure, ip
protocols).
• Argument - This is not predefined; it is a value or variable defined by the user (in the
figure, 192.168.10.5).
IOS Command Syntax Check
A command might require one or more arguments. To determine the keywords and arguments
required for a command, refer to the command syntax.
• Boldface text indicates commands and keywords that are entered as shown.
• Italic text indicates an argument for which the user provides the value.
Convention Description
Boldface text indicates commands and keywords that you enter literally as
boldface
shown.
italics Italic text indicates arguments for which you supply values.
[x] Square brackets indicate an optional element (keyword or argument).
{x} Braces indicate a required element (keyword or argument).
Braces and vertical lines within square brackets indicate a required choice within
[x {y | z }]
an optional element. Spaces are used to clearly delineate parts of the command.
IOS Command Syntax Check (Contd.)
• The command syntax provides the pattern, or format, that must be used when entering a
command.
• The command is ping and the user-defined argument is the ip-address of the destination
device. For example, ping 10.10.10.5.
• The command is traceroute and the user-defined argument is the ip-address of the destination
device. For example, traceroute 192.168.254.254.
• If a command is complex with multiple arguments, you may see it represented like this:
IOS Help Features
Context-sensitive help enables you to Command syntax check verifies that a
quickly find answers to these questions: valid command was entered by the
• Which commands are available in user.
each command mode? • If the interpreter cannot
• Which commands start with specific understand the command being
characters or group of characters? entered, it will provide feedback
describing what is wrong with the
• Which arguments and keywords are
command.
available to particular commands?
Hot Keys and Shortcuts
• The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and
troubleshooting easier.
• Commands and keywords can be shortened to the minimum number of characters that identify
a unique selection. For example, the configure command can be shortened
to conf because configure is the only command that begins with conf.
Hot Keys and Shortcuts (Contd.)
• The table below is a brief list of keystrokes to enhance command line editing.
Keystroke Description
Left Arrow or Ctrl+B Moves the cursor one character to the left.
Right Arrow or Ctrl+F Moves the cursor one character to the right.
Recalls the commands in the history buffer, beginning with the most recent
Up Arrow or Ctrl+P
commands.
Hot Keys and Shortcuts (Contd.)
• When a command output produces more • The table below lists commands that can
text than can be displayed in a terminal be used to exit out of an operation.
window, the IOS will display a “--
More--” prompt. The table below
describes the keystrokes that can be used
when this prompt is displayed.
Keystroke Description Keystroke Description
When in any configuration mode, ends the
Enter Key Displays the next line. Ctrl-C configuration mode and returns to privileged
EXEC mode.
When in any configuration mode, ends the
Space Bar Displays the next screen. Ctrl-Z configuration mode and returns to privileged
EXEC mode.
Ends the display string, returning to All-purpose break sequence used to abort
Any other key Ctrl-Shift-6
privileged EXEC mode. DNS lookups, traceroutes, pings, etc.
Device Names
• The first configuration command on any device should be to give it a unique hostname.
• By default, all devices are assigned a factory default name. For example, a Cisco IOS switch is
"Switch.”
• Guideline for naming devices:
• Start with a letter
• Contain no spaces
• End with a letter or digit
• Use only letters, digits, and dashes
Note: To return the switch to the default
• Be less than 64 characters in length prompt, use the no hostname global config
command.
Password Guidelines
• The use of weak or easily guessed passwords are a security concern.
• All networking devices should limit administrative access by securing privileged EXEC, user
EXEC, and remote Telnet access with passwords. In addition, all passwords should be
encrypted and legal notifications provided.
• Password Guidelines:
Use passwords that are more than eight
characters in length.
Use a combination of upper and
lowercase letters, numbers, special
Note: Most of the labs in this course use
characters, and/or numeric sequences.
simple passwords such as cisco or class.
Avoid using the same password for all These passwords are considered weak and
devices. easily guessable and should be avoided in
Do not use common words because they production environments.
are easily guessed.
Configure Passwords
Securing user EXEC mode access:
• First enter line console configuration mode
using the line console 0 command in global
configuration mode.
• Next, specify the user EXEC mode password
using the password password command.
• Finally, enable user EXEC access using
the login command.
• Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco
switches support up to 16 VTY lines that are numbered 0 to 15.
Encrypt Passwords
• The startup-config and running-config
files display most passwords in plaintext.
• To encrypt all plaintext passwords, use
the service password-encryption global
config command.