Что такое findslide.org?

FindSlide.org - это сайт презентаций, докладов, шаблонов в формате PowerPoint.


Для правообладателей

Обратная связь

Email: Нажмите что бы посмотреть 

Яндекс.Метрика

Презентация на тему Exploration 1

Содержание

Upon completion of this chapter, you will be able to:Define the role of the Internetwork Operating System (IOS).Define the purpose of a configuration file.Identify several classes of devices that have the IOS embedded.Identify the factors contributing
Exploration 1Chapter 11Configuring and Testing Your NetworkZhamanov AzamatSuleyman Demirel University, 2011 Upon completion of this chapter, you will be able to:Define the role Question What is Router?Suleyman Demirel University, 2011 Router is a ComputerSuleyman Demirel University, 2011 CISCO IOS - Cisco Internetwork Operating SystemSuleyman Demirel University, 2011 CISCO IOSCLI – Command Line InterfaceThe IOS file itself is several megabytes CLI – Command Line InterfaceSuleyman Demirel University, 2011 Accessing to RouterSuleyman Demirel University, 2011 Access MethodsSuleyman Demirel University, 2011 Access with ConsoleAlso known as CTY lineIs a management portAccessible even if Access with ConsoleSuleyman Demirel University, 2011 Examples of Console use are: The initial configuration of the network deviceDisaster Access with TelnetMethod for recovery accessing a CLI session is to telnet Access with SSH (Secure Shell)Secure method for remote device accessProvides stronger password Telnet/SSH ConfigurationSuleyman Demirel University, 2011Connection by IP addressIP address:202.22.22.11 Access with AUX portCLI session remotely is via telephone dialup connection using Aux ConfigurationSuleyman Demirel University, 2011Connection by Subscriber Phone NumberPhone number: +7 717 Types of Configuration FilesRunning configuration fileStartup configuration fileSuleyman Demirel University, 2011 Configuration FilesSuleyman Demirel University, 2011 CISCO IOS ModesUser executive modePrivileged executive modeGlobal configuration modeOther specific configuration modesSuleyman Demirel University, 2011 CISCO IOS ModesSuleyman Demirel University, 2011 CISCO IOS ModesSuleyman Demirel University, 2011 CISCO IOS ModesSuleyman Demirel University, 2011 User Executive ModeEXEC mode is view-only modeDoesn’t allow execution of any commands Privileged EXEC ModeThe execution of configuration and management commands requires that the Switching between EXEC and Privileged EXEC modesSuleyman Demirel University, 2011 Structure of CommandSuleyman Demirel University, 2011 Using CLI Help Context-Sensitive HelpSuleyman Demirel University, 2011 Command Syntax CheckSuleyman Demirel University, 2011 Hot Keys and ShortcutsTab - Completes the remainder of the command or Structure of IOSSuleyman Demirel University, 2011 Global Configuration ModeSuleyman Demirel University, 2011 Basic Configurations Using CISCO IOSSome guidelines for naming conventions are that names Giving names for devicesSuleyman Demirel University, 2011 Password for ConsoleSuleyman Demirel University, 2011 The passwords introduced here are:Console password - limits device access using the Consider these key points when choosing passwords:Use passwords that are more than Different types of PasswordsSuleyman Demirel University, 2011 Encryption of Passwordsservice password-encryptionSuleyman Demirel University, 2011 Banner MessageSuleyman Demirel University, 2011 Managing Configuration Filesrouter#copy running-config startup-configrrase startup-configSuleyman Demirel University, 2011 Configuring InterfacesSuleyman Demirel University, 2011 Configuration of FastEthernet interface on RouterSuleyman Demirel University, 2011 Configuration of Serial interface on RouterSuleyman Demirel University, 2011 Interface DescriptionSuleyman Demirel University, 2011 Q/ASuleyman Demirel University, 2011
Слайды презентации

Слайд 2 Upon completion of this chapter, you will be

Upon completion of this chapter, you will be able to:Define the

able to:
Define the role of the Internetwork Operating System

(IOS).
Define the purpose of a configuration file.
Identify several classes of devices that have the IOS embedded.
Identify the factors contributing to the set of IOS commands available to a device.
Identify the IOS modes of operation.
Identify the basic IOS commands.
Compare and contrast the basic show commands.

Suleyman Demirel University, 2011


Слайд 3 Question
What is Router?
Suleyman Demirel University, 2011

Question What is Router?Suleyman Demirel University, 2011

Слайд 4 Router is a Computer
Suleyman Demirel University, 2011

Router is a ComputerSuleyman Demirel University, 2011

Слайд 5 CISCO IOS - Cisco Internetwork Operating System
Suleyman Demirel

CISCO IOS - Cisco Internetwork Operating SystemSuleyman Demirel University, 2011

University, 2011


Слайд 6 CISCO IOS
CLI – Command Line Interface

The IOS file

CISCO IOSCLI – Command Line InterfaceThe IOS file itself is several

itself is several megabytes in size and is stored

in semi-permanent memory area called FLASH.

In many Routers IOS is copied into RAM and the device is powered on and the IOS runs from RAM.

Suleyman Demirel University, 2011


Слайд 7 CLI – Command Line Interface
Suleyman Demirel University, 2011

CLI – Command Line InterfaceSuleyman Demirel University, 2011

Слайд 8 Accessing to Router
Suleyman Demirel University, 2011

Accessing to RouterSuleyman Demirel University, 2011

Слайд 9 Access Methods
Suleyman Demirel University, 2011

Access MethodsSuleyman Demirel University, 2011

Слайд 10 Access with Console
Also known as CTY line
Is a

Access with ConsoleAlso known as CTY lineIs a management portAccessible even

management port
Accessible even if no network services have been

configure on the device

Suleyman Demirel University, 2011


Слайд 11 Access with Console
Suleyman Demirel University, 2011

Access with ConsoleSuleyman Demirel University, 2011

Слайд 12 Examples of Console use are:
The initial configuration of

Examples of Console use are: The initial configuration of the network

the network device
Disaster recovery procedures and troubleshooting where remote

access is not possible
Password recovery procedures

Suleyman Demirel University, 2011


Слайд 13 Access with Telnet
Method for recovery accessing a CLI

Access with TelnetMethod for recovery accessing a CLI session is to

session is to telnet to the router
Telnet sessions require

active networking services on the device
The network device must have at least one active interface configured with a Layer 3 address

Suleyman Demirel University, 2011


Слайд 14 Access with SSH (Secure Shell)
Secure method for remote

Access with SSH (Secure Shell)Secure method for remote device accessProvides stronger

device access
Provides stronger password authentication
Encrypts all communications between the

client and the IOS device

Suleyman Demirel University, 2011


Слайд 15 Telnet/SSH Configuration
Suleyman Demirel University, 2011
Connection by IP address
IP

Telnet/SSH ConfigurationSuleyman Demirel University, 2011Connection by IP addressIP address:202.22.22.11

address:202.22.22.11


Слайд 16 Access with AUX port
CLI session remotely is via

Access with AUX portCLI session remotely is via telephone dialup connection

telephone dialup connection using a modem connected to the

router’s AUX port
Doesn’t require any configured interfaces

Suleyman Demirel University, 2011


Слайд 17 Aux Configuration
Suleyman Demirel University, 2011
Connection by Subscriber Phone

Aux ConfigurationSuleyman Demirel University, 2011Connection by Subscriber Phone NumberPhone number: +7

Number
Phone number: +7 717 2 77 22 11
Phone number:

+7 777 2 77 22 11

Слайд 18 Types of Configuration Files
Running configuration file
Startup configuration file
Suleyman

Types of Configuration FilesRunning configuration fileStartup configuration fileSuleyman Demirel University, 2011

Demirel University, 2011


Слайд 19 Configuration Files
Suleyman Demirel University, 2011

Configuration FilesSuleyman Demirel University, 2011

Слайд 20 CISCO IOS Modes
User executive mode
Privileged executive mode
Global configuration

CISCO IOS ModesUser executive modePrivileged executive modeGlobal configuration modeOther specific configuration modesSuleyman Demirel University, 2011

mode
Other specific configuration modes
Suleyman Demirel University, 2011


Слайд 21 CISCO IOS Modes
Suleyman Demirel University, 2011

CISCO IOS ModesSuleyman Demirel University, 2011

Слайд 22 CISCO IOS Modes
Suleyman Demirel University, 2011

CISCO IOS ModesSuleyman Demirel University, 2011

Слайд 23 CISCO IOS Modes
Suleyman Demirel University, 2011

CISCO IOS ModesSuleyman Demirel University, 2011

Слайд 24 User Executive Mode
EXEC mode is view-only mode
Doesn’t allow

User Executive ModeEXEC mode is view-only modeDoesn’t allow execution of any

execution of any commands that might change the configuration

of device
By default, there is no authentication required to access the EXEC mode from the console
It is good practice to ensure that authentication is configured during the initial configuration

Suleyman Demirel University, 2011


Слайд 25 Privileged EXEC Mode
The execution of configuration and management

Privileged EXEC ModeThe execution of configuration and management commands requires that

commands requires that the network administrator use the privileged

EXEC mode, or a specific mode further down the hierarchy.

Suleyman Demirel University, 2011


Слайд 26 Switching between EXEC and Privileged EXEC modes
Suleyman Demirel

Switching between EXEC and Privileged EXEC modesSuleyman Demirel University, 2011

University, 2011


Слайд 27 Structure of Command
Suleyman Demirel University, 2011

Structure of CommandSuleyman Demirel University, 2011

Слайд 28 Using CLI Help Context-Sensitive Help
Suleyman Demirel University, 2011

Using CLI Help Context-Sensitive HelpSuleyman Demirel University, 2011

Слайд 29 Command Syntax Check
Suleyman Demirel University, 2011

Command Syntax CheckSuleyman Demirel University, 2011

Слайд 30 Hot Keys and Shortcuts
Tab - Completes the remainder

Hot Keys and ShortcutsTab - Completes the remainder of the command

of the command or keyword
Ctrl-R - Redisplays a line
Ctrl-Z

- Exits configuration mode and returns to the EXEC
Down Arrow - Allows user to scroll forward through former commands
Up Arrow - Allows user to scroll backward through former commands
Ctrl-C - Aborts the current command and exits the configuration mode

Suleyman Demirel University, 2011


Слайд 31 Structure of IOS
Suleyman Demirel University, 2011

Structure of IOSSuleyman Demirel University, 2011

Слайд 32 Global Configuration Mode
Suleyman Demirel University, 2011

Global Configuration ModeSuleyman Demirel University, 2011

Слайд 33 Basic Configurations Using CISCO IOS
Some guidelines for naming

Basic Configurations Using CISCO IOSSome guidelines for naming conventions are that

conventions are that names should:
Start with a letter
Not contain

a space
End with a letter or digit
Have characters of only letters, digits, and dashes
Be 63 characters or fewer
Without name it is difficult to identify devices

Suleyman Demirel University, 2011


Слайд 34 Giving names for devices
Suleyman Demirel University, 2011

Giving names for devicesSuleyman Demirel University, 2011

Слайд 35 Password for Console
Suleyman Demirel University, 2011

Password for ConsoleSuleyman Demirel University, 2011

Слайд 36 The passwords introduced here are:
Console password - limits

The passwords introduced here are:Console password - limits device access using

device access using the console connection
Enable password - limits

access to the privileged EXEC mode
Enable secret password - encrypted, limits access to the privileged EXEC mode
VTY password - limits device access using Telnet

Suleyman Demirel University, 2011


Слайд 37 Consider these key points when choosing passwords:
Use passwords

Consider these key points when choosing passwords:Use passwords that are more

that are more than 8 characters in length.
Use a

combination of upper and lowercase and/or numeric sequences in passwords.
Avoid using the same password for all devices.
Avoid using common words such as password or administrator, because these are easily guessed.

Suleyman Demirel University, 2011


Слайд 38 Different types of Passwords
Suleyman Demirel University, 2011

Different types of PasswordsSuleyman Demirel University, 2011

Слайд 39 Encryption of Passwords
service password-encryption
Suleyman Demirel University, 2011

Encryption of Passwordsservice password-encryptionSuleyman Demirel University, 2011

Слайд 40 Banner Message
Suleyman Demirel University, 2011

Banner MessageSuleyman Demirel University, 2011

Слайд 41 Managing Configuration Files
router#copy running-config startup-config
rrase startup-config

Suleyman Demirel University,

Managing Configuration Filesrouter#copy running-config startup-configrrase startup-configSuleyman Demirel University, 2011

2011


Слайд 42 Configuring Interfaces
Suleyman Demirel University, 2011

Configuring InterfacesSuleyman Demirel University, 2011

Слайд 43 Configuration of FastEthernet interface on Router
Suleyman Demirel University,

Configuration of FastEthernet interface on RouterSuleyman Demirel University, 2011

2011


Слайд 44 Configuration of Serial interface on Router
Suleyman Demirel University,

Configuration of Serial interface on RouterSuleyman Demirel University, 2011

2011


Слайд 45 Interface Description
Suleyman Demirel University, 2011

Interface DescriptionSuleyman Demirel University, 2011

  • Имя файла: exploration-1.pptx
  • Количество просмотров: 102
  • Количество скачиваний: 0