74
Presentation_ID 1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2 Chapter 2 A Configuring a Network Operating System

ITE PC v4.0 Chapter 1 - AT shareatshare.weebly.com/.../ne_chapter2a_configuring_a_network_os.pdf · Configuring a Network Operating System . Chapter 2 Objectives. ... Accessing a

Embed Size (px)

Citation preview

Presentation_ID 1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 2

Chapter 2 A Configuring a Network Operating System

Presenter
Presentation Notes
Chapter 2 Objectives

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 2 - Objectives

Upon completion of this chapter you will be able to:

Explain the purpose of the Cisco IOS.

Explain how to access and navigate Cisco IOS to configure network devices.

Describe the command structure of the Cisco IOS software.

Configure hostnames on a Cisco IOS device using the CLI.

Use Cisco IOS commands to limit access to device configurations.

Use Cisco IOS commands to save the running configuration.

Explain how devices communicate across network media.

Configure a host device with an IP address.

Verify connectivity between two end devices.

Presenter
Presentation Notes
Chapter 2 Objectives

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 2 – Cisco IOS

IOS stands for Internetwork Operating System

It is a family of software used on most Cisco Systems routers and current Cisco network switches.

IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system.

Presenter
Presentation Notes
Chapter 2 Objectives

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 2 - Scope

2.0 Introduction

2.1 IOS Bootcamp

2.2 Getting Basic

2.3 Addressing Schemes

2.4 Summary

Presenter
Presentation Notes
Chapter 2 Objectives

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 5

2.1 IOS Bootcamp

Presenter
Presentation Notes
2.1 IOS Bootcamp

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems All networking equipment are dependent on Operating Systems The OS on home routers is usually called firmware Cisco IOS – A collection of network operating systems used on

Cisco devices

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems

An OS consists of: • Shell • Kernel • Hardware

The shell allows users to interact with the system via CLI and GUI

CLI – Command Line Interface GUI – Graphical User Interface

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems

The kernel allows communication

between software and hardware.

It also manages hardware resources

to meet software requirements

Hardware refers to the physical

part of a computer,

including all underlying electronics

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Purpose of OS PC operating systems (Windows 8 and OS X) perform technical

functions that enable: Use of a mouse Viewing of output on video display units Entering of text using input devices

Switch or router IOS provides options to: Configure interfaces Enable routing and switching functions

All networking devices come with a default IOS Possible to upgrade the IOS version or feature set In this course, primary focus is Cisco IOS Release 15.x

Presenter
Presentation Notes
2.1.1.2 Purpose of OS

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Location of the Cisco IOS Cisco IOS is stored in Flash Non-volatile storage - data not lost when electrical power is lost Data can be changed or overwritten as needed Can be used to store multiple versions of IOS IOS copied from flash to volatile RAM Quantity of flash and RAM memory determines IOS that can be used

Presenter
Presentation Notes
2.1.1.3 Location of the Cisco IOS

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS IOS Functions These are the major functions performed or enabled by Cisco routers and switches.

• Security • Routing • QoS • Addressin

g • Managing

Resources • Interface

Presenter
Presentation Notes
2.1.1.4 IOS Functions

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Routing Routing is the process of selecting best paths in a network.

Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks.

QoS Quality of Service (QoS) refers to the capability of a network to provide better service to selected network traffic

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device – Console Access Methods

Cisco devices have no displays built in. To access and interact with them, we need to

connect them to video display units.

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Most common methods to access the CLI (Command Line Interface) environment are: Console Port Method Telnet or SSH (Secure SHell) Method (remote) AUX port Method (remote)

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Console Access Methods Console RJ-45 Port Method Device is accessible even if no networking services have been

configured (out-of-band) Need a special console cable Allows configuration commands to be entered Should be configured with passwords to prevent unauthorized access Device should be located in a secure room so console port cannot be

easily accessed

Presenter
Presentation Notes
2.1.2.1 Console Access Method Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.   In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Out-of-Band

Out-of-band access allows you to see your equipment without network connections.

Out-of-band means ‘outside normal band’

It provides you with a backup path in case of network communication failure.

For instance, an equipment operates on LAN. When network is down, you can use your smartphone to access the equipment.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Console Access Methods Console Port with Laptop connected for CLI to be displayed

Presenter
Presentation Notes
2.1.2.1 Console Access Method Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.   In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Telnet Method Telnet Method Method for remotely accessing the CLI over a network Require active networking services and one active interface that is

configured

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device SSH Method

Secure Shell (SSH) Remote login similar to Telnet, but utilizes more security Stronger password authentication Uses encryption when transporting data

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device AUX Access Method

Aux Port Out-of-band connection is available Dial-up modem is connected to Aux port Modem uses telephone line Does not require configuring of network services Can be used like console port – connect directly to a PC/laptop

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Terminal Emulation

Terminal emulation is the ability to make one computer terminal, typically a PC, appear to look like another, usually older type of terminal.

For example, a terminal emulation software is needed on Windows 10 to display a program that runs on Windows 3.1

Presenter
Presentation Notes
2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Terminal Emulation Programs

Software available for connecting to a networking device:

PuTTY

Tera Term

SecureCRT

HyperTerminal

OS X Terminal

Presenter
Presentation Notes
2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Command Modes

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Cisco IOS Command Modes

IOS provides group of commands used for monitoring, configuring and maintaining cisco devices. For security and easy administration, IOS commands are divided in the set of different command modes. Each command mode has its own set of commands. Which commands are available to use, depends upon the mode you are in.

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Cisco IOS Command Modes

Primary Modes • User EXEC Mode • Privileged EXEC Mode Other Modes • Global Configuration Mode • Interface Configuration Mode • Sub Interface Configuration Mode • Setup Mode • ROM Monitor Mode

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Cisco IOS Modes of Operation

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Primary Modes

Presenter
Presentation Notes
2.1.3.2 Primary Modes The two primary modes of operation are user EXEC mode and privileged EXEC mode. Tthe privileged EXEC mode has a higher level of authority in what it allows the user to do with the device. User EXEC Mode The user EXEC mode has limited capabilities but is useful for some basic operations. This mode is the first mode encountered upon entrance into the CLI of an IOS device. This is often referred to as view-only mode. The user EXEC level does not allow the execution of any commands that might change the configuration of the device. By default, there is no authentication required to access the user EXEC mode from the console. However, it is a good practice to ensure that authentication is configured during the initial configuration. The user EXEC mode is identified by the CLI prompt that ends with the > symbol. This is an example that shows the > symbol in the prompt: Switch> Privileged EXEC Mode The execution of configuration and management commands requires that the network administrator use the privileged EXEC mode, or a more specific mode in the hierarchy. The privileged EXEC mode can be identified by the prompt ending with the #symbol. Switch# By default, privileged EXEC mode does not require authentication. Global configuration mode and all other more specific configuration modes can only be reached from the privileged EXEC mode.

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Global Configuration Mode and Submodes

Presenter
Presentation Notes
2.1.3.3 Global Configuration Mode and Submodes Global configuration mode and interface configuration modes can only be reached from the privileged EXEC mode. From global config, CLI configuration changes are made that affect the operation of the device as a whole. Switch# configure terminal Switch(config)# From the global config mode, the user can enter different subconfiguration modes. Each of these modes allows the configuration of a particular part or function of the IOS device. Interface mode - to configure one of the network interfaces (Fa0/0, S0/0/0) Line mode - to configure one of the physical or virtual lines (console, AUX, VTY) To exit a specific configuration mode and return to global configuration mode, enter exit at a prompt. To leave configuration mode completely and return to privileged EXEC mode, enter end or use the key sequence Ctrl-Z. As commands are used and modes are changed, the prompt changes to reflect the current context.

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Navigating Between IOS Modes

The commands ‘enable’ switches to Privileged EXEC mode. ‘disable’ switches back to EXEC mode.

Presenter
Presentation Notes
2.1.3.4 Navigating between IOS Modes The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively.

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Navigating the IOS Navigating Between IOS Modes (cont.)

Presenter
Presentation Notes
2.1.3.5 Navigating between IOS Modes (cont.) To move from the global configuration mode to the privileged EXEC mode, you enter the command exit. To move from any submode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command. To move from any submode of the privileged EXEC mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.  To move from any submode of the global configuration mode to another “immediate” submode of the global configuration mode, simply enter the corresponding command that is normally entered from global configuration mode

Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

END OF CHAPTER 2A

Presenter
Presentation Notes
2.1.3.5 Navigating between IOS Modes (cont.) To move from the global configuration mode to the privileged EXEC mode, you enter the command exit. To move from any submode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command. To move from any submode of the privileged EXEC mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.  To move from any submode of the global configuration mode to another “immediate” submode of the global configuration mode, simply enter the corresponding command that is normally entered from global configuration mode

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

REVIEW

1. IOS stands for _______________________.

Presenter
Presentation Notes
Chapter 2 Objectives

Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

REVIEW

1. IOS stands for Internetwork Operating System

It is a family of software used on most Cisco Systems routers and current Cisco network switches.

Presenter
Presentation Notes
Chapter 2 Objectives

Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 2. The OS on home routers is usually called _________.

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 2. The OS on home routers is usually called firmware.

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

3. An OS consists of: • ? • ? • ?

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

3. An OS consists of: • Shell • Kernel • Hardware

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

4. The shell allows users to interact with the system via CLI

and GUI

CLI stands for ______________ GUI stands for ______________

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

4. The shell allows users to interact with the system via CLI

and GUI

CLI – Command Line Interface GUI – Graphical User Interface

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems

5. The kernel allows communication

between ________ and __________

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems

5. The kernel allows communication

between software and hardware.

It also manages hardware resources

to meet software requirements

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems

6. Hardware refers to the

___________of a computer, including all underlying electronics

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Operating Systems

6. Hardware refers to the

physical parts of a computer, including all underlying electronics

Presenter
Presentation Notes
2.1.1.1 Operating Systems

Presentation_ID 44 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Review 7. Cisco IOS is stored in _______ storage

Presenter
Presentation Notes
2.1.1.3 Location of the Cisco IOS

Presentation_ID 45 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Review 7. Cisco IOS is stored in Flash storage

Presenter
Presentation Notes
2.1.1.3 Location of the Cisco IOS

Presentation_ID 46 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Review 8. Non-volatile means _________________________________.

Presenter
Presentation Notes
2.1.1.3 Location of the Cisco IOS

Presentation_ID 47 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Review 8. Non-volatile means data are not lost when electrical power is lost.

Presenter
Presentation Notes
2.1.1.3 Location of the Cisco IOS

Presentation_ID 48 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Review 9. What are the 6 functions performed or enabled by Cisco routers and switches?

Presenter
Presentation Notes
2.1.1.4 IOS Functions

Presentation_ID 49 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco IOS Review 9. What are the 6 functions performed or enabled by Cisco routers and switches?

• Security • Routing • QoS • Addressin

g • Managing

Resources • Interface

Presenter
Presentation Notes
2.1.1.4 IOS Functions

Presentation_ID 50 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 10. What is the meaning of routing?

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 51 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

Routing is the process of selecting best paths in a network.

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 52 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

11. Does Cisco devices have display units?

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 53 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

11. Does Cisco devices have display units?

No

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 54 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 12. Three methods to access the CLI (Command Line Interface) environment of Cisco devices are: ? ? ?

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 55 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 12. Three methods to access the CLI (Command Line Interface) environment of Cisco devices are: Console Port Method Telnet or SSH (Secure SHell) Method (remote) AUX port Method (remote)

Presenter
Presentation Notes
2.1.2.1 Console Access Method

Presentation_ID 56 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 13. The Console Port is a ________ port. It can be connected to another _______ port using a _______ cable.

Presenter
Presentation Notes
2.1.2.1 Console Access Method Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.   In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.

Presentation_ID 57 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 13. The Console Port is a RJ-45 port. It can be connected to another RJ-45 port using a rollover cable.

Presenter
Presentation Notes
2.1.2.1 Console Access Method Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.   In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.

Presentation_ID 58 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 14. Telnet Method is a Method for ____________________.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 59 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review 14. Telnet Method is a Method for remotely accessing the CLI over a

network

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 60 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

15. Secure Shell (SSH) method is similar to Telnet method, but uses _____________ and stronger _________ authentication. It also uses ____________ when transporting data.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 61 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

15. Secure Shell (SSH) method is similar to Telnet method, but uses more security and stronger password authentication. It also uses encryption when transporting data

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 62 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

16. For the Aux Port Method, a __________ modem or a _________ can be used. _________ connection is available.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 63 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

16. For the Aux Port Method, a dial-up modem or a laptop can be used. Out-of-band connection is available.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 64 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Review

17. ‘Out-of-band’ is a feature of a device that allows you to see your equipment without ______________.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 65 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Review

17. ‘Out-of-band’ is a feature of a device that allows you to see your equipment without network connections.

Presenter
Presentation Notes
2.1.2.2 Telnet, SSH, and AUX Access Methods

Presentation_ID 66 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Accessing a Cisco IOS Device Terminal Emulation

Terminal emulation is the ability to make ____________________________.

Presenter
Presentation Notes
2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes

Presentation_ID 67 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

18. Terminal emulation is the ability to make one computer terminal look like another type of terminal.

For example, a terminal emulation software is needed on Windows 10 to display a program that runs on Windows 3.1

Presenter
Presentation Notes
2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes

Presentation_ID 68 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

19. What are some terminal emulation software?

Presenter
Presentation Notes
2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes

Presentation_ID 69 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

19. What are some terminal emulation software?

PuTTY

Tera Term

SecureCRT

HyperTerminal

OS X Terminal

Presenter
Presentation Notes
2.1.2.3 Terminal Emulation Programs There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Some of these include: PuTTY Tera Term SecureCRT HyperTerminal OS X Terminal There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by an SSH connection. Each network technician tends to have a favorite terminal emulation program that they use exclusively. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes

Presentation_ID 70 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

20. Cisco IOS has a few command modes. Name two Primary Modes.

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 71 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

20. Cisco IOS has a few command modes. Name two Primary Modes • User EXEC Mode • Privileged EXEC Mode

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 72 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

21. Cisco IOS has a few command modes. Name five other modes.

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 73 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Review

21. Cisco IOS has a few command modes. Name five other modes. Other Modes • Global Configuration Mode • Interface Configuration Mode • Sub Interface Configuration Mode • Setup Mode • ROM Monitor Mode

Presenter
Presentation Notes
2.1.3.1 Cisco IOS Modes of Operations In hierarchical order from most basic to most specialized, the major modes are: User executive (User EXEC) mode Privileged executive (Privileged EXEC) mode Global configuration mode Other specific configuration modes, such as Interface configuration mode. Each mode has a distinctive prompt

Presentation_ID 74 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

END OF CHAPTER 2A

Presenter
Presentation Notes
2.1.3.5 Navigating between IOS Modes (cont.) To move from the global configuration mode to the privileged EXEC mode, you enter the command exit. To move from any submode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command. To move from any submode of the privileged EXEC mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.  To move from any submode of the global configuration mode to another “immediate” submode of the global configuration mode, simply enter the corresponding command that is normally entered from global configuration mode