ICND110S04 3. Start Router Basics
ICND110S04 3. Start Router Basics
Routing
Routers
Cisco 2800 Series Routers
Any interface listed with OK? value "NO" does not have a valid configuration
The enable password is used when you do not specify an enable secret
password, with some older software versions, and some boot images.
Enter enable password: SanFran3
hostname RouterX
enable secret 5 $1$aNMG$kV3mxjlWDRGXmfwjEBNAf1
enable password cisco
line vty 0 4
password sanjose interface FastEthernet0/0
no snmp-server media-type 100BaseX
! half-duplex
ip routing ip address 10.2.2.11 255.255.255.0
no clns routing no mop enabled
no bridge 1 !
! interface FastEthernet0/1
shutdown
no ip address
!
interface Serial0/0/0
shutdown
no ip address
!
interface Serial0/0/1
shutdown
no ip address
dialer-list 1 protocol ip permit
!
end
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
RouterX>?
Exec commands:
access-enable Create a temporary Access-List entry
access-profile Apply user-profile to interface
clear Reset functions
connect Open a terminal connection
disable Turn off privileged commands
disconnect Disconnect an existing network connection
enable Turn on privileged commands
exit Exit from the EXEC
help Description of the interactive help system
lat Open a lat connection
lock Lock the terminal
login Log in as a particular user
logout Exit from the EXEC
-- More --
This product contains cryptographic features and is subject to United States and local country laws
governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors
and users are responsible for compliance with U.S. and local country laws. By using this product you agree
to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return
this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
RouterX#
Summary
RouterX#
RouterX#copy running-config startup-config
Destination filename [startup-config]?
Building configuration…
RourterX#
RouterX(config)#line console 0
RouterX(config-line)#exec-timeout 20 30
RouterX(config)#line console 0
RouterX(config-line)#logging synchronous
RouterX(config-if)#exit
RouterX#configure terminal
RouterX(config)#interface serial 0
RouterX(config-if)#shutdown
%LINK-5-CHANGED: Interface Serial0, changed state to administratively down
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to down
RouterX#configure terminal
RouterX(config)#interface serial 0
RouterX(config-if)#no shutdown
%LINK-3-UPDOWN: Interface Serial0, changed state to up
%LINEPROTO-5-UPDOWN: Line Protocol on Interface Serial0, changed state to up
RouterX#show interfaces
Ethernet0 is up, line protocol is up
Hardware is Lance, address is 00e0.1e5d.ae2f (bia 00e0.1e5d.ae2f)
Internet address is 10.1.1.11/24
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
Encapsulation ARPA, loopback not set, keepalive set (10 sec)
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:07, output 00:00:08, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
81833 packets input, 27556491 bytes, 0 no buffer
Received 42308 broadcasts, 0 runts, 0 giants, 0 throttles
1 input errors, 0 CRC, 0 frame, 0 overrun, 1 ignored, 0 abort
0 input packets with dribble condition detected
55794 packets output, 3929696 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 4 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Interpreting the Interface Status
Verifying a Serial Interface Configuration
Summary
From the privileged EXEC mode, you can enter the global
configuration mode, providing access to other configuration
modes such as the interface configuration mode or line
configuration mode.
The main function of a router is to relay packets from one network
device to another. To do this, the characteristics of the interfaces
through which the packets are received and sent must be defined.
Interface characteristics, such as the IP address and bandwidth,
are configured using the interface configuration mode.
Summary (Cont.)
192.168.4.2
Host-to-Host Packet Delivery (3 of 17)
Host-to-Host Packet Delivery (4 of 17)
Host-to-Host Packet Delivery (5 of 17)
Host-to-Host Packet Delivery (6 of 17)
Host-to-Host Packet Delivery (7 of 17)
Host-to-Host Packet Delivery (8 of 17)
Host-to-Host Packet Delivery (9 of 17)
Host-to-Host Packet Delivery (10 of 17)
Host-to-Host Packet Delivery (11 of 17)
Destination Next Hop Interface
Router#
ping [[protocol {host-name | system-address}]
To diagnose basic network connectivity, use the ping command in
user EXEC or privileged EXEC mode.
traceroute
Router#
traceroute [protocol] destination
To discover the routes that packets will actually take when traveling
to their destination address, use the traceroute command in user
EXEC or privileged EXEC mode.
Summary
If the hosts are not on the same segment, the frame is sent to the
default gateway.
Packets sent to the default gateway will have the local host
source and remote host destination IP address.
Frames sent to the default gateway will have the local host
source and the default gateway MAC address.
A router will change the Layer 2 address as needed, but will not
change the Layer 3 address.
The show ip arp command displays the mapping between
network addresses and MAC addresses that the router has
learned.
Cisco IOS connectivity tools include ping and traceroute.
Understanding Cisco Router
Security
Common Threats to Physical
Installations
Hardware threats
Environmental threats
Electrical threats
Maintenance threats
Configuring a Router Password
Configuring the Login Banner
RouterX# banner login " Access for authorized users only. Please enter your
username and password. "
Telnet vs. SSH Access
Telnet
– Most common access method
– Insecure
SSH
– Encrypted
– IP domain must be defined
– key must be generated
!--- The username command create the username and password for the SSH session
username cisco password 0 cisco
ip domain-name mydomain.com
ip ssh version 2
line vty 0 4
login local
transport input ssh
Summary
Toolbar
Router
Information
Configuration
Overview
Cisco SDM Wizards
LAN configuration: Configure LAN interfaces and
DHCP
WAN configuration: Configure PPP, Frame Relay, and
HDLC WAN interfaces
Firewall
VPN
Security audit: Perform a router security audit, with a
button for router lockdown
IPS: Intrusion prevention system
QoS: Quality of service
Summary
RouterX#ping 10.1.1.10
RouterX#trace 192.168.101.101
The Cisco IOS DHCP server is a full DHCP server that can be
configured using Cisco SDM.
Cisco IOS commands provide a set of tools for remote accessing
and testing, as follows:
– Telnet
– SSH
– ping
– traceroute