Basic Switch and End Device Configuration
Basic Switch and End Device Configuration
Basic Switch and End Device Configuration
Configuration
Dmytro Zubov, PhD
[email protected]
Naryn, 12:21pm, Sept 8, 2022
Lessons learnt last time
• Operating Systems
• Shell - The user interface that
allows users to request specific
tasks from the computer. These
requests can be made either
through the CLI or GUI interfaces.
• Kernel - Communicates between
the hardware and software of a
computer and manages how
hardware resources are used to
meet software requirements.
• Hardware - The physical part of a
computer including underlying
electronics.
Cisco IOS Access
• Access Methods
• Console – A physical management port
used to access a device in order to
provide maintenance, such as performing
the initial configurations.
• Secure Shell (SSH) – Establishes a secure
remote CLI connection to a device,
through a virtual interface, over a
network. (Note: This is the
recommended method for remotely
connecting to a device)
• Telnet – Establishes an insecure remote
CLI connection to a device over the
network. (Note: User authentication,
passwords and commands are sent over
the network in plaintext)
Cisco IOS Access
boldface Boldface text indicates commands and keywords that you enter literally as shown.
italics Italic text indicates arguments for which you supply values.
Braces and vertical lines within square brackets indicate a required choice within an
[x {y | z }]
optional element. Spaces are used to clearly delineate parts of the command.
The Command Structure
• In-class practice:
- Use the file “ProblemSolvingSessionCN2.pka” from this week
tutorial assignment
- Switch the CLI mode: from the user EXEC mode to the privileged
EXEC mode
- Switch the CLI mode: from the the privileged EXEC mode to the
configuration mode
- … and backward … :)
The Command Structure
• In-class practice:
Basic Device Configuration
• Device Names
- The first configuration command on any device should
be to give it a unique hostname
- By default, all devices are assigned a factory default
name. For example, a Cisco IOS switch is "Switch.”
- Guideline for naming devices:
• Start with a letter
• Contain no spaces
• End with a letter or digit Note: To return the switch to the
• Use only letters, digits, and default prompt, use the
dashes no hostname
global config command.
• Be less than 64 characters in
length
Recommendation: Pls use
Basic Device Configuration password “cisco” in the
class assignments :)
• Password Guidelines
- The use of weak or easily guessed passwords are a security concern
- All networking devices should limit administrative access by securing privileged EXEC,
user EXEC, and remote Telnet access with passwords. In addition, all passwords should be
encrypted and legal notifications provided
- Password Guidelines:
• Use passwords that are more than eight
characters in length
• Use a combination of upper and lowercase
letters, numbers, special characters, and/or
numeric sequences Note: Most of the assignments in this course
use simple passwords such as cisco or class.
• Avoid using the same password for all These passwords are considered weak and
devices easily guessable and should be avoided in
• Do not use common words because they are production environments.
easily guessed
Basic Device Configuration
• Configure Passwords
- Securing user EXEC mode access:
▪ First enter line console configuration
mode using the line console 0
command in global configuration mode
▪ Next, specify the user EXEC mode
password using
the password password command.
▪ Finally, enable user EXEC access using
the login command
▪ Note: VTY lines enable remote access using Telnet or SSH to the
device. Many Cisco switches support up to 16 VTY lines that are
numbered 0 to 15.
Basic Device Configuration
• Encrypt Passwords
- The startup-config and running- - Use the
config files display most passwords show running-config
in plaintext command to verify that the
- To encrypt all plaintext passwords on the device are
passwords, use the now encrypted
service password-encryption
global config command
Basic Device Configuration
• Banner Messages
- A banner message is
important to warn
unauthorized personnel from
attempting to access the The banner will be displayed on attempts
device to access the device:
- To create a banner message
of the day on a network
device, use the banner motd
# the message of the
day # global config command
Note: The “#” in the command syntax is called the delimiting character. It is
entered before and after the message.
Basic Device Configuration
• Configuration Files
- There are two system files that store the device configuration:
▪ startup-config : This is the saved configuration file that is stored in NVRAM. It contains
all the commands that will be used by the device upon startup or reboot. Flash does
not lose its contents when the device is powered off.
▪ running-config : This is stored in Random Access Memory (RAM). It reflects the current
configuration. Modifying a running configuration affects the operation of a Cisco
device immediately. RAM is volatile memory. It loses all of its content when the device
is powered off or restarted.
▪ To save changes made to the running configuration to the startup configuration file,
use the copy running-config startup-config privileged EXEC mode command.
Save Configurations
• IP Addresses
- The use of IP addresses is the primary means
of enabling devices to locate one another and
establish end-to-end communication on the
internet
- The structure of an IPv4 address is called
dotted decimal notation and is represented by
four decimal numbers between 0 and 255
- An IPv4 subnet mask is a 32-bit value that
differentiates the network portion of the
address from the host portion. Coupled with the
IPv4 address, the subnet mask determines to
which subnet the device is a member.
- The default gateway address is the IP address
of the router that the host will use to access
remote networks, including the Internet
Ports and Addresses
• IP Addresses (cont.)
- IPv6 addresses are 128 bits in length
and written as a string of hexadecimal
values. Every four bits is represented by
a single hexadecimal digit; for a total of
32 hexadecimal values. Groups of four
hexadecimal digits are separated by a
colon “:”.
- IPv6 addresses are not case-sensitive
and can be written in either lowercase or
uppercase.
Note: IP in this course refers to both the IPv4 and IPv6 protocols. IPv6 is the most
recent version of IP and is replacing the more common IPv4.
Ports and Addresses
• Configure IP Addressing
Configure IP Addressing
• Verify Connectivity
Verify Connectivity