NDC Chapter 1-1
NDC Chapter 1-1
NDC Chapter 1-1
Outlines
Definitions of Network Devices
• Router
• Functions of routers
These interfaces are used to connect a combination of both Local Area Networks
(LANs) and Wide Area Networks (WANs).
The router uses its routing table to determine the best path to forward the packet.
determining the best path to send packets and forwarding packets toward their
destination.
Router Components
Hardware Components
• Mini IOS
• Sequence
• Ex. Serial Ethernet, Fast Ethernet, Token Ring, ATM, ISDN BRI, Loopback interfaces
etc.
• Lines identify ports that allow us to connect into, and then configure, Cisco devices.
• Example Console ports, Auxiliary ports and VTY (telnet) ports and identified like
Console 0
9/15/2023 Network Devices Configurtion ppt. 8
9/15/2023 Network Devices Configurtion ppt. 9
Categories of router interfaces
Categories of interfaces Interfaces Function of interface
LAN interfaces Ethernet , Fast Used to connect router
Ethernet Ports, to LAN network
Gigabit
• The opposite side of the rollover cable connects to a PC’s serial port
using a serial terminal adapter.
• The auxiliary port functions the same with console except it support modem
commands providing dial-in access to Cisco devices.
9/15/2023 Network Devices Configurtion ppt. 11
• Telnet, and now SSH, are the most common methods of
remote access to routers and switches.
1. Performing the POST: After the POST has been completed, the
router executes the bootstrap program.
The main task of the bootstrap program is to locate the Cisco IOS
and load it into RAM.
A TFTP server is usually used as a backup server for IOS but it can
also be used as a central point for storing and loading the IOS.
Router>?
To obtain a list of commands that begin with a particular character sequence, type
in
Router#co?
• Hostname is case sensitive. The host name is used in prompts and default
configuration filenames. For instance the first router R1 can be renamed as
INUR1 as follow.
• INUR1(config) #
• To display the system clock, use the show clock EXEC command.
Example
a. Console Password
• INUR1 (config-line)#login
• INUR1 (config-line)#login
ACKNOWLEDGEMENT.
abbreviated as DORA
with the “ip helper-address …” command, the router will accept that
broadcast message and cover it into a unicast packet and forward it to the
DHCP Server.
9/15/2023 Network Devices Configurtion ppt. 35
When a DHCP address conflict occurs
• During the IP assignment process, the DHCP Server uses ping to
test the availability of an IP before issuing it to the client.
• If no one replies then the DHCP Server believes that IP has not been
allocated and it can safely assign that IP to a client.
INUR1>enable
INUR1#show running-config
Saving
INUR1>enable
INUR1#write
INUR1>enable
INUR1#erase startup-config
9/15/2023 Network Devices Configurtion ppt. 40
no and do commands
• Use the command without the keyword no to reenable a disabled
feature or to enable a feature that is disabled by default
Example
INUR1(config)#int fa0/0
INUR1(config-if)#no ip address
INUR1(config)#line console 0
INUR1(config-line)#logging synchronous
9/15/2023 Network Devices Configurtion ppt. 41
15. Remote Device Management (telnet & SSH)
• SSH i.e. Secure Shell and Telnet are the network protocols that serves the same
purpose that is to provide remote access to the system in order to establish some
sort of communication between the systems.
SSH encrypts the data/packets being transferred between the systems so it cannot
be Decoded by the Hackers.
SSH uses authentication which ensures that the source of the data is still the same
system and not another
SSH uses public and private keys, to identify hosts and users (authentication).
Router(config)#line vty 0
Router(config-line)#password inu123
Router(config-line)#login
Router(config-line)#motd-banner
Router(config-line)#exit
Router(config)#
9/15/2023 Network Devices Configurtion ppt. 49
Testing SSH Connectivity
Open
Password:
Router>enable
Password:
Router#configure terminal
Router(config)#
Connection established successfully and the connection is secured with Secure Shell.