05 - Basic Device Configuration
05 - Basic Device Configuration
05 - Basic Device Configuration
1
Basic Device Conguration
Networking Today
2.4.1
Basic Switch and End Device
2 Conguration
Device Names
2.0 Introduction
2.1 Cisco IOS Access You have learned a great deal about the Cisco IOS, navigating the IOS, and the command structure. Now, you are ready to
congure devices! The rst conguration command on any device should be to give it a unique device name or hostname. By
default, all devices are assigned a factory default name. For example, a Cisco IOS switch is "Switch."
2.1.1 Operating Systems
The problem is if all switches in a network were left with their default names, it would be dicult to identify a specic device. For
2.1.2 GUI instance, how would you know that you are connected to the right device when accessing it remotely using SSH? The hostname
provides conrmation that you are connected to the correct device.
2.1.3 Purpose of an OS
The default name should be changed to something more descriptive. By choosing names wisely, it is easier to remember,
document, and identify network devices. Here are some important naming guidelines for hosts:
2.1.4 Access Methods
Start with a letter
Contain no spaces
2.1.5 Terminal Emulation Programs
End with a letter or digit
Use only letters, digits, and dashes
Check Your Understanding - Cisco
2.1.6 Be less than 64 characters in length
IOS Access
An organization must choose a naming convention that makes it easy and intuitive to identify a specic device. The hostnames
2.2 IOS Navigation used in the device IOS preserve capitalization and lowercase characters. For example, the gure shows that three switches,
spanning three dierent oors, are interconnected together in a network. The naming convention that was used incorporated the
2.2.1 Primary Command Modes location and the purpose of each device. Network documentation should explain how these names were chosen so additional
devices can be named accordingly.
Conguration Mode and
2.2.2
Subconguration Modes
2.2.3
Video - IOS CLI Primary Command Sw-Floor-3
Modes
2.3.2 IOS Command Syntax Check When network devices are named, they are easy to identify for conguration purposes.
From global conguration mode, enter the command hostname followed by the name of the switch and press Enter. Notice the
2.3.7 Packet Tracer - Navigate the IOS change in the command prompt name.
Lab - Navigate the IOS by Using Note: To return the switch to the default prompt, use the no hostname global cong command.
2.3.8
Tera Term for Console Connectivity
Always make sure the documentation is updated each time a device is added or modied. Identify devices in the documentation
2.4 Basic Device Conguration by their location, purpose, and address.
Cisco IOS can be congured to use hierarchical mode passwords to allow dierent access privileges to a network device.
Video - Secure Administrative
2.4.6
Access to a Switch
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access
Syntax Checker - Basic Device with passwords. In addition, all passwords should be encrypted and legal notications provided.
2.4.7
Conguration
When choosing passwords, use strong passwords that are not easily guessed. There are some key points to consider when
Check Your Understanding - Basic choosing passwords:
2.4.8
Device Conguration
Use passwords that are more than eight characters in length.
Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences.
2.5 Save Congurations
Avoid using the same password for all devices.
Do not use common words because they are easily guessed.
2.6 Ports and Addresses
Use an internet search to nd a password generator. Many will allow you to set the length, character set, and other parameters.
2.7 Congure IP Addressing
Note: Most of the labs in this course use simple passwords such as cisco or class. These passwords are considered weak and
easily guessable and should be avoided in production environments. We only use these passwords for convenience in a
2.8 Verify Connectivity classroom setting, or to illustrate conguration examples.
2.4.3
3 Protocols and Models
Congure Passwords
4 Physical Layer
When you initially connect to a device, you are in user EXEC mode. This mode is secured using the console.
5 Number Systems
To secure user EXEC mode access, enter line console conguration mode using the line console 0 global conguration
command, as shown in the example. The zero is used to represent the rst (and in most cases the only) console interface. Next,
specify the user EXEC mode password using the password password command. Finally, enable user EXEC access using the
6 Data Link Layer
login command.
9 Address Resolution
Console access will now require a password before allowing access to the user EXEC mode.
To have administrator access to all IOS commands including conguring a device, you must gain privileged EXEC mode access.
10 Basic Router Conguration It is the most important access method because it provides complete access to the device.
To secure privileged EXEC access, use the enable secret password global cong command, as shown in the example.
11 IPv4 Addressing
Sw-Floor-1# configure terminal
Sw-Floor-1(config)# enable secret class
12 IPv6 Addressing Sw-Floor-1(config)# exit
Sw-Floor-1#
13 ICMP Virtual terminal (VTY) lines enable remote access using Telnet or SSH to the device. Many Cisco switches support up to 16 VTY
lines that are numbered 0 to 15.
14 Transport Layer To secure VTY lines, enter line VTY mode using the line vty 0 15 global cong command. Next, specify the VTY password using
the password password command. Lastly, enable VTY access using the login command.
2.4.4
Encrypt Passwords
The startup-cong and running-cong les display most passwords in plaintext. This is a security threat because anyone can
discover the passwords if they have access to these les.
To encrypt all plaintext passwords, use the service password-encryption global cong command as shown in the example.
The command applies weak encryption to all unencrypted passwords. This encryption applies only to passwords in the
conguration le, not to passwords as they are sent over the network. The purpose of this command is to keep unauthorized
individuals from viewing passwords in the conguration le.
Use the show running-cong command to verify that passwords are now encrypted.
Sw-Floor-1(config)# end
Sw-Floor-1# show running-config
!
(Output omitted)
!
line con 0
password 7 094F471A1A0A
login
!
line vty 0 4
password 7 094F471A1A0A
login
line vty 5 15
password 7 094F471A1A0A
login
!
!
end
2.4.5
Banner Messages
Although requiring passwords is one way to keep unauthorized personnel out of a network, it is vital to provide a method for
declaring that only authorized personnel should attempt to access the device. To do this, add a banner to the device output.
Introduction to Networks Banners can be an important part of the legal process in the event that someone is prosecuted for breaking into a device. Some
legal systems do not allow prosecution, or even the monitoring of users, unless a notication is visible.
To create a banner message of the day on a network device, use the banner motd # the message of the day # global cong
1 Networking Today command. The “#” in the command syntax is called the delimiting character. It is entered before and after the message. The
delimiting character can be any character as long as it does not occur in the message. For this reason, symbols such as the "#"
are often used. After the command is executed, the banner will be displayed on all subsequent attempts to access the device
Basic Switch and End Device until the banner is removed.
2 Conguration
The following example shows the steps to congure the banner on Sw-Floor-1.
2.0 Introduction
2.5 Save Congurations Check your understanding of basic device conguration by choosing the BEST answer to the following questions.
2.6 Ports and Addresses 1. What is the command to assign the name “Sw-Floor-2” to a switch?
hostname Sw-Floor-2
2.7 Congure IP Addressing
host name Sw-Floor-2
2.9 Module Practice and Quiz 2. How is the privileged EXEC mode access secured on a switch?
enable class
4 service password-encryption
Physical Layer
3. Which command enables password authentication for user EXEC mode access
5 on a switch?
Number Systems
enable secret
secret
7 service password-encryption
Ethernet Switching
login
9 Address Resolution secret
service password-encryption
10 Basic Router Conguration
5. Which is the command to congure a banner to be displayed when connecting
to a switch?
11 IPv4 Addressing
banner $ Keep out $ Check
banner motd $ Keep out $
12 IPv6 Addressing Show Me
display $ Keep out $
14 Transport Layer
2.3 2.5
The Command Structure Save Congurations
15 Application Layer
Network Security
16
Fundamentals