ICS26014 Module02
ICS26014 Module02
Device Configuration
Module Objectives
Module Objective: Implement initial settings including passwords, IP addressing, and default gateway
parameters on a network switch and end devices.
The Command Structure Describe the command structure of Cisco IOS software.
Ports and Addresses Explain how devices communicate across network media.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
PC operating system enables a user to do the CLI-based network operating system enables a
following: network technician to do the following:
• Use a mouse to make • Use a keyboard to run CLI-based
selections and run programs
network programs
• Enter text and text-based
commands • Use a keyboard to enter text and
• View output on a monitor text-based commands
• View output on a monitor
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Cisco IOS Access
Access Methods
• Terminal emulation programs are used to connect to a network device by either a console
port or by an SSH/Telnet connection.
• There are several terminal emulation programs to chose from such as PuTTY, Tera Term
and SecureCRT.
2.2 IOS Navigation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
IOS Navigation
Primary Command Modes
User EXEC Mode:
• Allows access to only a
limited number of basic
monitoring commands
• Identified by the CLI
prompt that ends with the >
symbol
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
• Keyword – This is a specific parameter defined in the operating system (in the
figure, ip protocols).
• Argument - This is not predefined; it is a value or variable defined by the user
(in the figure, 192.168.10.5).
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
The Command Structure
IOS Command Syntax Check
boldface Boldface text indicates commands and keywords that you enter literally as shown.
italics Italic text indicates arguments for which you supply values.
Braces and vertical lines within square brackets indicate a required choice within an
[x {y | z }]
optional element. Spaces are used to clearly delineate parts of the command.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
The Command Structure
IOS Command Syntax Check (Cont.)
▪ The command syntax provides the pattern, or format, that must be used when
entering a command.
▪ The command is ping and the user-
defined argument is the ip-address of
the destination device. For Structure
The Command
example, ping 10.10.10.5.
IOS Command Syntax Check (Cont.)
▪ If a command is complex with multiple arguments, you may see it represented like this:
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
The IOS has two forms of help available: context-sensitive help and command
syntax check.
• The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and
troubleshooting easier.
• Commands and keywords can be shortened to the minimum number of characters that
identify a unique selection. For example, the configure command can be shortened
to conf because configure is the only command that begins with conf.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
▪ The table below is a brief list of keystrokes to enhance command line editing.
Keystroke Description
Left Arrow or Ctrl+B Moves the cursor one character to the left.
Right Arrow or Ctrl+F Moves the cursor one character to the right.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Basic Device Configuration
Device Names
• Password Guidelines:
• Use passwords that are more than eight
characters in length.
• Use a combination of upper and lowercase
letters, numbers, special characters, and/or
numeric sequences. Note: Most of the labs in this course use simple
• Avoid using the same password for all devices. passwords such as cisco or class. These passwords
are considered weak and easily guessable and should
• Do not use common words because they are be avoided in production environments.
easily guessed.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
▪ Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco
switches support up to 16 VTY lines that are numbered 0 to 15.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Basic Device Configuration
Encrypt Passwords
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Save Configurations
Configuration Files
▪ There are two system files that store the device configuration:
Save Configurations
Alter the Running Configurations
If changes made to the running config do not
have the desired effect and the running-config
has not yet been saved, you can restore the
device to its previous configuration. To do this
you can:
• Remove the changed commands
individually.
• Reload the device using the reload
command in privilege EXEC mode.
Note: This will cause the device to
briefly go offline, leading to network
downtime.
If the undesired changes were saved to the
startup-config, it may be necessary to clear all
the configurations using the erase startup-
config command in privilege EXEC mode.
• After erasing the startup-config,
reload the device to clear the
running-config file from RAM.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Save Configurations
Capture Configuration to a Text File
Save Configurations
Capture Configuration to a Text File (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Ports and Addresses
IP Addresses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Configure IP Addressing
Manual IP Address Configuration for End Devices
Configure IP Addressing
Automatic IP Address Configuration for End Devices
• DHCP enables automatic IPv4 address
configuration for every end device that is
DHCP-enabled.
• End devices are typically by default using
DHCP for automatic IPv4 address
configuration.
• To configure DHCP on a Windows
PC, open the Control Panel >
Network Sharing Center >
Change adapter settings and
choose the adapter. Next right-
click and select Properties to
display the Local Area
Connection Properties.
• Next, click Properties to open
the Internet Protocol Version 4 Note: IPv6 uses DHCPv6 and SLAAC (Stateless Address
(TCP/IPv4) Properties window, Autoconfiguration) for dynamic address allocation.
then select Obtain an IP address
automatically and Obtain DNS
server address automatically.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Configure IP Addressing
Switch Virtual Interface Configuration
To access the switch remotely, an IP address and a subnet mask must be
configured on the SVI.
To configure an SVI on a switch:
• Enter the interface vlan 1 command in global configuration mode.
• Next assign an IPv4 address using the ip address ip-address subnet-
mask command.
• Finally, enable the virtual interface using the no shutdown command.
2.8 Verify Connectivity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Verify Connectivity
Video – Test the Interface Assignment
This video will cover the following:
▪ Use the terminal emulation program and accept the defaults to bring you to the command line
▪ Use the global configuration mode and the interface configuration mode to enter the no shutdown
command
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Verify Connectivity
Video – Test End-to-End Connectivity
This video will cover the use of the ping command to test connectivity on both switches and both PCs.
2.9 Module Practice and Quiz
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
• All end devices and network devices require an operating system (OS).
• Cisco IOS software separates management access into the following
two command modes: User EXEC Mode and Privileged EXEC Mode.
• Global configuration mode is accessed before other specific
configuration modes. From global config mode, the user can enter
different subconfiguration modes.
• Each IOS command has a specific format or syntax and can only be
executed in the appropriate mode.
• Basic device configurations- hostname, password, encrypt passwords
and banner.
• There are two system files that store the device configuration: startup-
config and running-config.
• IP addresses enable devices to locate one another and establish end-
to-end communication on the internet. Each end device on a network
must be configured with an IP address.
INSTITUTE
COLLEGE OFOF INFORMATION
INFORMATION ANDAND COMPUTING
COMPUTING SCIENCES
SCIENCES
Let’s play