Politeknik Seberang Perai: Network Configuration
Politeknik Seberang Perai: Network Configuration
Politeknik Seberang Perai: Network Configuration
Chapter 4:
NETWORK CONFIGURATION
Understand IOS
*
IOS ??
INTERCONNECTED OPERATING SYSTEM
Objectives
Upon completion of this subtopic, you will be able
to:
Define IOS
3
Operating Systems
All networking equipment dependent on operating systems
The operating system enables the hardware to function.
Operating systems are used on virtually all end user and
network devices connected to the Internet.
End user devices include devices such as smart phones,
tablets, PCs, and laptops.
The operating system on a network device is known as a
network operating system.
4
Operating Systems
Internetwork Operating System (IOS) is a generic
term for the collection of network operating
systems used on networking devices.
5
Operating Systems (cont.)
6
Purpose of OS
PC operating systems (Windows 8 and OS X) perform
technical functions that enable:
Use of a mouse
View output
Enter text
8
IOS Functions
These are the major functions performed or enabled by
Cisco routers and switches.
9
Accessing a Cisco IOS Device
Terminal Emulation
Programs
Software available
for connecting to a
networking device:
PuTTY
Tera Term
SecureCRT
HyperTerminal
OS X Terminal
10
Navigating the IOS
11
Navigating the IOS
Primary Modes
12
Navigating the IOS
13
Navigating the IOS
14
Navigating the IOS
15
Command-Line Interface (CLI)
• The user can interact with the shell using either the
command-line interface (CLI) or graphical user
interface (GUI).
• When using the CLI, the user interacts directly with
the system in a text-based environment by entering
commands on the keyboard at a command prompt.
• The system executes the command, often
providing textual output.
The Command Structure
17
The Command Structure
Context-Sensitive Help
18
The Command Structure
19
CLASS ACTIVITY
Find out the function and the format of the
commands below when using it via CLI:
1.show
2.hostname
3.motd
5.ip address
20
The Command Structure
The show version Command
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Hostnames
Configuring Device Names
Hostnames allow
devices to be
identified by network
administrators over
a network or the
Internet.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Hostnames
Configuring Hostnames
23
Limiting Access to Device Configurations
Banner Messages
Important part of
the legal process in
the event that
someone is
prosecuted for
breaking into a
device
Wording that
implies that a login
is "welcome" or
"invited" is not
appropriate
Often used for
legal notification
because it is
displayed to all
connected
terminals
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Saving Configurations
Configuration Files Switch# reload
System configuration has
been modified. Save?
[yes/no]: n
Proceed with reload?
[confirm]
Startup configuration is
removed by using the erase
startup-config
Switch# erase startup-
config
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Addressing Devices
Configuring a Switch Virtual Interface
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
THANK YOU
RECAP!
http:\\www.padlet.com\wahidahpsp\dfn2
113
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27