Networking
Networking
Networking
Network Trends Explain how trends such as BYOD, online collaboration, video, and cloud computing
are changing the way we interact.
Network Security Identify some basic security threats and solution for all networks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
1.1 Networks Affect Our
Lives
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Networking Today
Networks Connect Us
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Networking Today
Video – The Cisco Networking Academy Learning Experience
Cisco Networking Academy: learn how we use technology to make the world a better place.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Networking Today
No Boundaries
• World without boundaries
• Global communities
• Human network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
1.2 Network Components
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Network Components
Host Roles
Every computer on a network is
called a host or end device.
Servers are computers that provide
information to end devices:
• email servers
• web servers Server Description
Type
• file server
Email Email server runs email server software.
Clients are computers that send Clients use client software to access email.
requests to the servers to retrieve
Web Web server runs web server software.
information: Clients use browser software to access web pages.
• web page from a web server
• email from an email server File File server stores corporate and user files.
The client devices access these files.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Components
Peer-to-Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of
network design is only recommended for very small networks.
Advantages Disadvantages
Easy to set up No centralized administration
Less complex Not as secure
Lower cost Not scalable
Used for simple tasks: transferring files and sharing Slower performance
printers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Components
End Devices
An end device is where a message originates from or where it is received. Data originates with an
end device, flows through the network, and arrives at an end device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Network Components
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include switches, wireless
access points, routers, and firewalls.
Management of data as it flows through a network is also the role of an intermediary
device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Components
Network Media
Communication across a network is carried through a medium which allows a message to
travel from source to destination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
1.3 Network Representations and
Topologies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Representations and Topologies
Network Representations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Representations and Topologies
Topology Diagrams
Physical topology diagrams illustrate the Logical topology diagrams illustrate devices,
physical location of intermediary devices ports, and the addressing scheme of the
and cable installation. network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
1.4 Common Types of Networks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Common Types of Networks
Networks of Many Sizes
• Small Home Networks – connect a few
computers to each other and the Internet
• Small Office/Home Office – enables
computer within a home or remote office
to connect to a corporate network
Small Home SOHO • Medium to Large Networks – many
locations with hundreds or thousands of
interconnected computers
• World Wide Networks – connects
hundreds of millions of computers world-
wide – such as the internet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Common Types of Networks
LANs and WANs (cont.)
A LAN is a network infrastructure that spans A WAN is a network infrastructure that spans
a small geographical area. a wide geographical area.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between LANs.
devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Common Types of Networks
The Internet
The internet is a worldwide collection of
interconnected LANs and WANs.
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual
or group. The following groups were
developed to help maintain structure on
the internet:
• IETF
• ICANN
• IAB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Common Types of Networks
Intranets and Extranets
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
1.5 Internet Connections
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Internet Connections
Internet Access Technologies There are many ways to connect users
and organizations to the internet:
• Popular services for home users
and small offices include
broadband cable, broadband digital
subscriber line (DSL), wireless
WANs, and mobile services.
• Organizations need faster
connections to support IP phones,
video conferencing and data center
storage.
• Business-class interconnections
are usually provided by service
providers (SP) and may include:
business DSL, leased lines, and
Metro Ethernet.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Internet Connections
Home and Small Office Internet Connections
Connection Description
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Internet Connections
Businesses Internet Connections
Corporate business connections may Type of Description
require: Connection
Dedicated These are reserved circuits within
• higher bandwidth Leased Line the service provider’s network that
• dedicated connections connect distant offices with private
voice and/or data networking.
• managed services
Ethernet This extends LAN access technology
WAN into the WAN.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Internet Connections
The Converging Network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Internet Connections
The Converging Network (Cont.)
Converged data networks carry
multiple services on one link including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same
network infrastructure. The network
infrastructure uses the same set of
rules and standards.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Internet Connections
Video – Download and Install Packet Tracer
This video will demonstrate the download and install process of Packet Tracer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Internet Connections
Video – Getting Started in Cisco Packet Tracer
This video will cover the following:
• Navigate the Packet Tracer interface
• Customize the Packet Tracer Interface
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Internet Connections
Packet Tracer – Network Representation
In this Packet tracer you will do the following:
• The network model in this activity incorporates many of the technologies that you will
master in your CCNA studies.
Note: It is not important that you understand everything you see and do in this activity.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
1.6 Reliable Networks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Reliable Network
Network Architecture
Network Architecture refers to the
technologies that support the infrastructure
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Reliable Network
Fault Tolerance
A fault tolerant network limits the impact of
a failure by limiting the number of affected
devices. Multiple paths are required for
fault tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated
circuits.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Reliable Network
Scalability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Reliable Network
Quality of Service
Voice and live video transmissions
require higher expectations for those
services being delivered.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Reliable Network There are two main types of network
Network Security security that must be addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to
the devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended
recipients can read the data
• Integrity – assurance that the data has
not be altered with during transmission
• Availability – assurance of timely and
reliable access to data for authorized
users
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
1.7 Network Trends
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Network Trends
Recent Trends
The role of the network must adjust
and continually transform in order to
be able to keep up with new
technologies and end user devices as
they constantly come to the market.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Network Trends
Bring Your Own Device (BYOD)
Bring Your Own Device allows users to use their own devices
giving them more opportunities and
greater flexibility.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Network Trends
Online Collaboration
▪ Collaborate and work with others
over the network on joint projects.
▪ Collaboration tools including Cisco
WebEx (shown in the figure) gives
users a way to instantly connect and
interact.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Network Trends
Video Communication
• Video calls are made to anyone, regardless of where they are located.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Network Trends
Video – Cisco WebEx for Huddles
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Network Trends
Cloud Computing
Cloud computing allows us to store personal files or backup our data on servers over the internet.
• Applications can also be accessed using the Cloud.
• Allows businesses to deliver to any device anywhere in the world.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Network Trends
Cloud Computing (Cont.)
Four types of Clouds:
• Public Clouds
• Available to the general public through a pay-per-use model or for free.
• Private Clouds
• Intended for a specific organization or entity such as the government.
• Hybrid Clouds
• Made up of two or more Cloud types – for example, part custom and part public.
• Each part remains a distinctive object but both are connected using the same architecture.
• Custom Clouds
• Built to meet the needs of a specific industry, such as healthcare or media.
• Can be private or public.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Network Trends
Technology Trends in the Home
• Smart home technology is a
growing trend that allows
technology to be integrated into
every-day appliances which
allows them to interconnect with
other devices.
• Ovens might know what time to
cook a meal for you by
communicating with your calendar
on what time you are scheduled
to be home.
• Smart home technology is
currently being developed for all
rooms within a house.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Network Trends • Powerline networking can
Powerline Networking allow devices to connect to a
LAN where data network
cables or wireless
communications are not a
viable option.
• Using a standard powerline
adapter, devices can connect
to the LAN wherever there is
an electrical outlet by
sending data on certain
frequencies.
• Powerline networking is
especially useful when
wireless access points
cannot reach all the devices
in the home.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Network Trends
Wireless Broadband
In addition to DSL and cable, wireless is
another option used to connect homes
and small businesses to the internet.
• More commonly found in rural
environments, a Wireless Internet Service
Provider (WISP) is an ISP that connects
subscribers to designated access points or
hotspots.
• Wireless broadband is another solution for
the home and small businesses.
• Uses the same cellular technology used by a
smart phone.
• An antenna is installed outside the house
providing wireless or wired connectivity for
devices in the home.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
1.8 Network Security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Network Security
Security Threats • Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service that
is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques in
order to secure data and mitigate
threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Network Security
External Threats:
Security Threats (Cont.)
• Viruses, worms, and Trojan
horses
• Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Network Security
Security Solutions (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
1.9 The IT Professional
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
The IT Professional
The Cisco Certified Network Associate
CCNA (CCNA) certification:
• demonstrates that you have a knowledge of
foundational technologies
• ensures you stay relevant with skills needed
for the adoption of next-generation
technologies.
The new CCNA focus:
• IP foundation and security topics
• Wireless, virtualization, automation, and
network programmability.
New DevNet certifications at the
associate, specialist and professional
levels, to validate your software
development skills.
Specialist certification validate your skills
in line with your job role and interests.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
The IT Professional
Networking Jobs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
The IT Professional
Lab – Researching IT and Networking Job Opportunities
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Module Practice and Quiz
What did I learn in this module?
• Through the use of networks, we are connected like never before.
• All computers that are connected to a network and participate directly in network
communication are classified as hosts.
• Diagrams of networks often use symbols to represent the different devices and
connections that make up a network.
• A diagram provides an easy way to understand how devices connect in a large network.
• The two types of network infrastructures are Local Area Networks (LANs), and Wide Area
Networks (WANs).
• SOHO internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone.
• Business internet connections include Dedicated Leased Line, Metro Ethernet, Business
DSL, and Satellite.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Module Practice and Quiz
What did I learn in this module? (Cont.)
• Network architecture refers to the technologies that support the infrastructure and the
programmed services and rules, or protocols, that move data across the network.
• There are four basic characteristics of network architecture: Fault Tolerance, Scalability,
Quality of Service (QoS), and Security.
• Recent networking trends that affect organizations and consumers: Bring Your Own Device
(BYOD), online collaboration, video communications, and cloud computing.
• There are several common external and internal threats to networks.
• Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but
they also have other security requirements: Dedicated firewall systems, Access control lists
(ACL), Intrusion prevention systems (IPS), and Virtual private networks (VPN)
• The Cisco Certified Network Associate (CCNA) certification demonstrates your knowledge of
foundational technologies.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Module 2: Basic Switch and
End Device Configuration
Introductions to Networks v7.0
(ITN)
Module Objectives
Module Title: Basic Switch and End Device Configuration
Module Objective: Implement initial settings including passwords, IP addressing, and default gateway
parameters on a network switch and end devices.
The Command Structure Describe the command structure of Cisco IOS software.
Ports and Addresses Explain how devices communicate across network media.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Cisco IOS Access
Operating Systems
• Shell - The user interface that allows
users to request specific tasks from
the computer. These requests can be
made either through the CLI or GUI
interfaces.
• Kernel - Communicates between the
hardware and software of a computer
and manages how hardware
resources are used to meet software
requirements.
• Hardware - The physical part of a
computer including underlying
electronics.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Cisco IOS Access
GUI
• A GUI allows the user to interact with the
system using an environment of
graphical icons, menus, and windows.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Cisco IOS Access
Purpose of an OS
PC operating system enables a user to do CLI-based network operating system enables a
the following: network technician to do the following:
• Use a mouse to make selections • Use a keyboard to run CLI-based
and run programs network programs
• Use a keyboard to enter text and
• Enter text and text-based
text-based commands
commands
• View output on a monitor
• View output on a monitor
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Cisco IOS Access
Access Methods
• Console – A physical management port
used to access a device in order to
provide maintenance, such as
performing the initial configurations.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
2.2 IOS Navigation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
IOS Navigation
Primary Command Modes
User EXEC Mode:
• Allows access to only a limited
number of basic monitoring
commands
• Identified by the CLI prompt
that ends with the > symbol
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
IOS Navigation
Configuration Mode and Subconfiguration Modes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
IOS Navigation
Navigation Between IOS Modes
▪ Privileged EXEC Mode:
• To move from user EXEC mode to privilege
EXEC mode, use the enabled command.
▪ Global Configuration Mode:
• To move in and out of global configuration
mode, use the configure terminal
command. To return to privilege EXEC
mode, use the exit command.
▪ Line Configuration Mode:
• To move in and out of line configuration
mode, use the line command followed by
the management line type. To return to
global configuration mode, use the exit
command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
IOS Navigation
Navigation Between IOS Modes (Cont.)
Subconfiguration Modes:
• To move out of any subconfiguration mode to
get back to global configuration mode, use
the exit command. To return to privilege
EXEC mode, use the end command or key
combination Ctrl +Z.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
IOS Navigation
Video – Navigation Between IOS Modes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
2.3 The Command Structure
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
The Command Structure
Basic IOS Command Structure
• Keyword – This is a specific parameter defined in the operating system (in the figure, ip
protocols).
• Argument - This is not predefined; it is a value or variable defined by the user (in the
figure, 192.168.10.5).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
The Command Structure
IOS Command Syntax Check
A command might require one or more arguments. To determine the keywords
and arguments required for a command, refer to the command syntax.
• Boldface text indicates commands and keywords that are entered as shown.
• Italic text indicates an argument for which the user provides the value.
Convention Description
Boldface text indicates commands and keywords that you enter literally as
boldface
shown.
italics Italic text indicates arguments for which you supply values.
Braces and vertical lines within square brackets indicate a required choice
[x {y | z }] within an optional element. Spaces are used to clearly delineate parts of the
command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
The Command Structure
IOS Command Syntax Check (Cont.)
▪ The command syntax provides the pattern, or format, that must be used when
entering a command.
▪ If a command is complex with multiple arguments, you may see it represented like this:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
The Command Structure
IOS Help Features
The IOS has two forms of help available: context-sensitive help and command
syntax check.
• Context-sensitive help enables you to • Command syntax check verifies that
quickly find answers to these questions: a valid command was entered by
• Which commands are available in each command the user.
mode? • If the interpreter cannot understand the
• Which commands start with specific characters or command being entered, it will provide
group of characters? feedback describing what is wrong with
the command.
• Which arguments and keywords are available to
particular commands?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
The Command Structure
Video – Context Sensitive Help and Command Syntax Checker
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
The Command Structure
Hot Keys and Shortcuts
• The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and
troubleshooting easier.
• Commands and keywords can be shortened to the minimum number of characters
that identify a unique selection. For example, the configure command can be
shortened to conf because configure is the only command that begins with conf.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
The Command Structure
Hot Keys and Shortcuts (Cont.)
▪ The table below is a brief list of keystrokes to enhance command line editing.
Keystroke Description
Left Arrow or Ctrl+B Moves the cursor one character to the left.
Right Arrow or Ctrl+F Moves the cursor one character to the right.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
The Command Structure
Hot Keys and Shortcuts (Cont.)
• When a command output produces more text
than can be displayed in a terminal window, • The table below lists commands that can
the IOS will display a “--More--” prompt. The be used to exit out of an operation.
table below describes the keystrokes that can
be used when this prompt is displayed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
The Command Structure
Video – Hot Keys and Shortcuts
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
The Command Structure
Packet Tracer – Navigate the IOS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
The Command Structure
Lab – Navigate the IOS by Using Tera Term for Console
Connectivity
In this lab, you complete the following objectives:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
2.4 Basic Device Configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Basic Device Configuration
Device Names
• The first configuration command on any device should be to
give it a unique hostname.
• By default, all devices are assigned a factory default name.
For example, a Cisco IOS switch is "Switch.”
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Basic Device Configuration
Password Guidelines
• The use of weak or easily guessed passwords are a security concern.
• All networking devices should limit administrative access by securing privileged EXEC,
user EXEC, and remote Telnet access with passwords. In addition, all passwords should
be encrypted and legal notifications provided.
• Password Guidelines:
• Use passwords that are more than eight
characters in length.
• Use a combination of upper and lowercase
letters, numbers, special characters, and/or
numeric sequences. Note: Most of the labs in this course use simple
passwords such as cisco or class. These passwords
• Avoid using the same password for all devices. are considered weak and easily guessable and should
• Do not use common words because they are be avoided in production environments.
easily guessed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
Basic Device Configuration
Configure Passwords
Securing user EXEC mode access:
• First enter line console configuration mode
using the line console 0 command in global
configuration mode.
• Next, specify the user EXEC mode password
using the password password command.
• Finally, enable user EXEC access using
the login command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Basic Device Configuration
Configure Passwords (Cont.)
Securing VTY line access:
• First enter line VTY configuration mode
using the line vty 0 15 command in
global configuration mode.
• Next, specify the VTY password using
the password password command.
• Finally, enable VTY access using
the login command.
▪ Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco
switches support up to 16 VTY lines that are numbered 0 to 15.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
Basic Device Configuration
Encrypt Passwords
▪ The startup-config and running-config files ▪ Use the show running-config command
display most passwords in plaintext. to verify that the passwords on the device
are now encrypted.
▪ To encrypt all plaintext passwords, use
the service password-encryption global config
command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
Basic Device Configuration
Banner Messages
▪ A banner message is important to warn
unauthorized personnel from attempting
to access the device.
▪ To create a banner message of the day
on a network device, use the banner The banner will be displayed on attempts to access the device.
motd # the message of the day # global
config command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
Basic Device Configuration
Video – Secure Administrative Access to a Switch
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
2.5 Save Configurations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
Save Configurations
Configuration Files
▪ There are two system files that store the device configuration:
• startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be
used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
• running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a
running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its
content when the device is powered off or restarted.
• To save changes made to the running configuration to the startup configuration file, use the copy running-config
startup-config privileged EXEC mode command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
Save Configurations
Alter the Running Configurations
If changes made to the running config do not
have the desired effect and the running-config
has not yet been saved, you can restore the
device to its previous configuration. To do this
you can:
• Remove the changed commands individually.
• Reload the device using the reload command
in privilege EXEC mode. Note: This will cause
the device to briefly go offline, leading to
network downtime.
If the undesired changes were saved to the
startup-config, it may be necessary to clear all
the configurations using the erase startup-
config command in privilege EXEC mode.
• After erasing the startup-config, reload the
device to clear the running-config file from
RAM.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
Save Configurations
Video – Alter the Running Configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Save Configurations
Capture Configuration to a Text File
Configuration files can also be saved and
archived to a text document.
• Step 1. Open terminal emulation software,
such as PuTTY or Tera Term, that is already
connected to a switch.
• Step 2. Enable logging in to the terminal
software and assign a name and file location to
save the log file. The figure displays that All
session output will be captured to the file
specified (i.e., MySwitchLogs).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
Save Configurations
Capture Configuration to a Text File (Cont.)
• Step 3. Execute the show running-
config or show startup-config command at
the privileged EXEC prompt. Text displayed in
the terminal window will be placed into the
chosen file.
• Step 4. Disable logging in the terminal
software. The figure shows how to disable
logging by choosing the None session logging
option
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
Save Configurations
Packet Tracer – Configure Initial Switch Settings
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
2.6 Ports and Addresses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
Ports and Addresses
IP Addresses
• The use of IP addresses is the primary means of
enabling devices to locate one another and
establish end-to-end communication on the
internet.
• The structure of an IPv4 address is called dotted
decimal notation and is represented by four
decimal numbers between 0 and 255.
• An IPv4 subnet mask is a 32-bit value that
differentiates the network portion of the address
from the host portion. Coupled with the IPv4
address, the subnet mask determines to which
subnet the device is a member.
• The default gateway address is the IP address of
the router that the host will use to access remote
networks, including the internet.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103
Ports and Addresses
IP Addresses (Cont.)
• IPv6 addresses are 128 bits in length and
written as a string of hexadecimal values.
Every four bits is represented by a single
hexadecimal digit; for a total of 32
hexadecimal values. Groups of four
hexadecimal digits are separated by a colon
“:”.
• IPv6 addresses are not case-sensitive and
can be written in either lowercase or
uppercase.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
Ports and Addresses
Interfaces and Ports
• Network communications depend on end
user device interfaces, networking device
interfaces, and the cables that connect
them.
• Types of network media include twisted-
pair copper cables, fiber-optic cables,
coaxial cables, or wireless.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105
2.7 Configure IP Addressing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106
Configure IP Addressing
Manual IP Address Configuration for End Devices
• End devices on the network need an IP address in
order to communicate with other devices on the
network.
• IPv4 address information can be entered into end
devices manually, or automatically using Dynamic
Host Configuration Protocol (DHCP).
• To manually configure an IPv4 address on a Windows
PC, open the Control Panel > Network Sharing
Center > Change adapter settings and choose the
adapter. Next right-click and select Properties to
display the Local Area Connection Properties.
• Next, click Properties to open the Internet Protocol
Version 4 (TCP/IPv4) Properties window. Then
configure the IPv4 address and subnet mask
information, and default gateway. Note: IPv6 addressing and configuration
options are similar to IPv4.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107
Configure IP Addressing
Automatic IP Address Configuration for End Devices
• DHCP enables automatic IPv4 address
configuration for every end device that is
DHCP-enabled.
• End devices are typically by default
using DHCP for automatic IPv4 address
configuration.
• To configure DHCP on a Windows PC, open
the Control Panel > Network Sharing
Center > Change adapter settings and
choose the adapter. Next right-click and
select Properties to display the Local Area
Connection Properties.
• Next, click Properties to open the Internet
Protocol Version 4 (TCP/IPv4)
Properties window, then select Obtain an Note: IPv6 uses DHCPv6 and SLAAC (Stateless Address
IP address automatically and Obtain DNS Autoconfiguration) for dynamic address allocation.
server address automatically.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
Configure IP Addressing
Switch Virtual Interface Configuration
To access the switch remotely, an IP address and a subnet mask must be configured on
the SVI.
To configure an SVI on a switch:
• Enter the interface vlan 1 command in global configuration mode.
• Next assign an IPv4 address using the ip address ip-address subnet-mask command.
• Finally, enable the virtual interface using the no shutdown command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109
Configure IP Addressing
Packet Tracer – Implement Basic Connectivity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110
2.8 Verify Connectivity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111
Verify Connectivity
Video – Test the Interface Assignment
▪ Use the terminal emulation program and accept the defaults to bring you to the command line
▪ Use the global configuration mode and the interface configuration mode to enter the no shutdown
command
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112
Verify Connectivity
Video – Test End-to-End Connectivity
This video will cover the use of the ping command to test connectivity on both switches and both
PCs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113
Module Practice and Quiz
Packet Tracer – Basic Switch and End Device Configuration
In this Packet Tracer, you will do the following:
▪ Use Cisco IOS commands to specify or limit access to the device configurations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114
Module Practice and Quiz
Lab – Basic Switch and End Device Configuration
• Configure PC Hosts
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115
Module Practice and Quiz
What did I learn in this module?
• All end devices and network devices require an operating system (OS).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116