Professional Documents
Culture Documents
Chapter 2 - Configuring A Network Operating System
Chapter 2 - Configuring A Network Operating System
Configuring a Network
Operating System
Introduction to Networks
Presentation_ID
Cisco Confidential
Chapter 2 - Objectives
Explain the purpose of Cisco IOS.
Explain how to access and navigate Cisco IOS to configure network
devices.
Describe the command structure of Cisco IOS software.
Configure hostnames on a Cisco IOS device using the CLI.
Use Cisco IOS commands to limit access to device configurations.
Presentation_ID
Cisco Confidential
Chapter 2
2.1 IOS Bootcamp
2.2 Getting Basic
2.3 Address Schemes
2.4 Summary
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Cisco IOS
Operating Systems
All networking equipment dependent on operating systems
Presentation_ID
Cisco Confidential
Cisco IOS
Operating Systems
Presentation_ID
Cisco Confidential
Cisco IOS
Purpose of OS
PC operating systems (Windows 8 & OS X) perform technical
functions that enable
Use of a mouse
View output
Enter text
Switch or router IOS provides options to
Configure interfaces
Enable routing and switching functions
All networking devices come with a default IOS
Presentation_ID
Cisco Confidential
Cisco IOS
Presentation_ID
Cisco Confidential
Cisco IOS
IOS Functions
Major functions performed or enabled by Cisco routers and
switches include:
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
10
Presentation_ID
Cisco Confidential
11
Aux Port
Out-of-band connection
Uses telephone line
Can be used like console port
Presentation_ID
Cisco Confidential
12
PuTTY
Tera Term
SecureCRT
HyperTerminal
OS X Terminal
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Primary Modes
Presentation_ID
Cisco Confidential
15
Presentation_ID
Cisco Confidential
16
Presentation_ID
Cisco Confidential
17
Presentation_ID
Cisco Confidential
18
Presentation_ID
Cisco Confidential
19
Cisco Confidential
20
Presentation_ID
Cisco Confidential
21
Presentation_ID
Cisco Confidential
22
Cisco Confidential
23
Presentation_ID
Cisco Confidential
24
Presentation_ID
Cisco Confidential
25
Presentation_ID
Cisco Confidential
26
Hostnames
Presentation_ID
Cisco Confidential
27
Hostnames
Device Names
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
Without names, network
devices are difficult to
identify for configuration
purposes.
Presentation_ID
Cisco Confidential
28
Hostnames
Hostnames
Hostnames allow
devices to be
identified by
network
administrators
over a network or
the Internet.
Presentation_ID
Cisco Confidential
29
Hostnames
Configuring Hostnames
Presentation_ID
Cisco Confidential
30
Cisco Confidential
31
Presentation_ID
Cisco Confidential
32
Presentation_ID
Cisco Confidential
33
Cisco Confidential
34
Banner Messages
important part of
the legal process in
the event that
someone is
prosecuted for
breaking into a
device
wording that
implies that a login
is "welcome" or
"invited" is not
appropriate
often used for legal
notification
because it is
displayed to all
connected
terminals
Presentation_ID
Cisco Confidential
35
Saving Configurations
Configuration Files
Switch# reload
System configuration has
been modified. Save?
[yes/no]: n
Proceed with reload?
[confirm]
Startup configuration is
removed by using
the erase startup-config
Switch# erase startup-config
Presentation_ID
Cisco Confidential
36
Saving Configurations
Capturing Text
Presentation_ID
Cisco Confidential
37
Presentation_ID
Cisco Confidential
38
Cisco Confidential
39
Presentation_ID
Cisco Confidential
40
Addressing Devices
Presentation_ID
Cisco Confidential
41
Addressing Devices
Presentation_ID
Cisco Confidential
42
Addressing Devices
Presentation_ID
Cisco Confidential
43
Addressing Devices
IP Address Conflicts
Presentation_ID
Cisco Confidential
44
Verifying Connectivity
Presentation_ID
Cisco Confidential
45
Verifying Connectivity
Presentation_ID
Cisco Confidential
46
Verifying Connectivity
Presentation_ID
Cisco Confidential
47
Chapter 2 Summary
Services provided by the Cisco IOS accessed using a command-line
interface (CLI)
accessed by either the console port, the AUX port, or through
telnet or SSH
can make configuration changes to Cisco IOS devices
a network technician must navigate through various hierarchical
modes of the IOS
Cisco IOS routers and switches support a similar operating system
Introduced the initial settings of a Cisco IOS switch device
setting a name
limiting access to the device configuration
configuring banner messages
saving the configuration
Presentation_ID
Cisco Confidential
48
Chapter 2 Summary
Presentation_ID
Cisco Confidential
49
Chapter 2 Summary
Presentation_ID
Cisco Confidential
50
Presentation_ID
Cisco Confidential
51