SIS - Security Lab Introductory Session University of Pittsburgh 2006.

Slides:



Advertisements
Similar presentations
Configuring a Router Harold Hernandez, MS, CCNI. 3.1 Configuring a Router Name a router Set passwords Examine show commands Configure a serial interface.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved..
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 6 – Switch Configuration Switch Configuration Starting the.
Objectives Overview Define an operating system
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Cisco Router. Overview Understanding and configuring the Cisco Internetwork Operating System (IOS) Connecting to a router Bringing up a router Logging.
1 CCNA 2 v3.1 Module 3. 2 CCNA 2 Module 3 Configuring a Router.
Introduction to the Cisco IOS
PIX Firewall. Stateful Packet Filter Runs on its own Operating System Assigning varying security levels to interfaces (0 – 100) Access Control Lists Extensive.
CCNA 2 v3.1 Module 2.
Cisco Devices CONFIGURING CISCO SWITCH AND ROUTER.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
1 © 2002, Cisco Systems, Inc. All rights reserved. Router boot procedure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Routers A router is a computer Computers have four basic components:
1 Semester 2 Module 3 Configuring a Router Yuda college of business James Chen
Basic Router Configuration Warren Toomey GCIT. Introduction A Cisco router is simply a computer that receives packets and forwards them on based on what.
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Chapter 6 Router Configuration Sem 2V2. Configuration files can come from the console NVRAM TFTP server. The router has several modes:  privileged mode.
Configuring a network os
ActEyes IP Cam Training Part 1: Camera Setup. Network Setup Overview Each IP Cam on the network will need its own IP address to be assigned. This address.
Starting the switch Configuring the Switch
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 3 Configuring a Router.
Explain the purpose of an operating system
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Cisco ASA 5505 Joseph Cicero Northeast Wisconsin Technical College.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
Configuring a Router. Router user interface The Cisco IOS software uses a command-line interface (CLI) as the traditional console environment. This environment.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Module 3 Configuring a Router.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Sybex CCNA Chapter 6: Cisco’s IOS Instructor & Todd Lammle.
Will learn to use router modes and configuration methods to update a router's configuration file with current and prior versions of Cisco Internetwork.
Introduction to Routers
CCNA2 Chapter 2 Cisco IOS Software. Cisco’s operating system is called Cisco Internetwork Operating System (IOS) IOS provides the following network services:
1 Pertemuan 5 Configuring a Router. Discussion Topics CLI command modes Configuring a router name Configuring router passwords Examining the show commands.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Configuration Modes and TFTP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
SIS - Security Lab Introductory Session University of Pittsburgh 2008.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Configuring a Router MM Clements. Copyright This Week Command line interface Router configuration Modes for configuration Interface.
Chapter 2: Configure a Network Operating System
2016/2/211 資訊網路專題 Router & Practice. 2016/2/212 Router Basics Computers have four basic components: a CPU, memory, interfaces, and a bus. –A router also.
Cisco router configuration basics. overview router configuration controls the operation of the router: interface address and netmask routing information.
Cisco S2 C6 Router Configuration 1. Router Boot Up Router uses following from config-startup when it boots –Cisco IOS software version –Router identification.
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
© 2001, Cisco Systems, Inc. CSPFA 2.0—6-1 Chapter 6 Configuring Multiple Interfaces.
Cisco Routers & IOS Introduction. Router Interface ● Serial cable ● Command line interface ● Efficient ● Fast ● Universal across all Cisco equipment ●
Configuring Network Devices
Instructor Materials Chapter 8 Configuring Cisco Devices
Introduction to Networking
Configuring a Router Module 3 Semester 2.
Lecture9: Embedded Network Operating System: cisco IOS
Module 3 Configuring a Router.
資訊網路專題 Router & Practice
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

SIS - Security Lab Introductory Session University of Pittsburgh 2006

Agenda Description of lab infrastructure Equipment configuration basics Text based connection / configuration Graphical configuration environment Cabling description Useful commands Cisco IOS Windows / Linux Recommendations

Lab Infrastructure

Equipment configuration

Equipment configuration (2)

Equipment configuration (3)

Access modes The PIX firewalls (and other CISCO equipment) have four administrative access modes: Unprivileged mode: Available at first access. Provides a restricted, limited view of system settings. (Prompt = ‘>’) Privileged mode: Allows you to change system settings. (Prompt = ‘#’) Configuration mode: Enables you to change system configurations. (Prompt = ‘(config)#’ Monitor mode: Special mode that allows you to update system configuration image over the network (using a TFTP server)

Access modes (2) To access privilege mode enable To access configuration mode configure terminal Use the exit command to exit from one mode to the previous one

Firewalls System or group of systems that manage access between two networks Internet RouterFirewall DMZ Inside Network Outside Network

PIX Firewalls Proprietary operating system Stateful inspection Protocol and application inspection User-based authentication Virtual private networking Web-based management Stateful failover capabilities

Graphical configuration environment (PIX 501 Firewall) Important: To access the GUI configuration environment on the PIX 501 use a PC connected to the PIX and a browser with the MICROSOFT JAVA VM enabled !! Activate GUI environment via browser

Viewing / Saving configurations There are two configuration memories, running- configuration and startup-configuration show running-config displays the current configuration in the RAM memory of the equipment. Any configuration changes are written to the running- configuration write memory saves the current running-configuration to the flash memory startup-configuration show configure shows the configuration that is in flash memory show history displays previously entered commands

Cabling description Networking ports for each computer are numbered Correspondence (see picture) Move the patch cords to where you need them if they are not properly set.

Basic CISCO IOS commands ip address if_name ip_address [netmask] ip address ethernet show ip address Displays the IP adresses assigned to all interfaces show interface allows you to view the network interface information and status ping ip_address To determine reachability of a system

Basic Windows/Linux networking commands ipconfig (windows) / ifconfig (linux) To obtain ip configuration information of a PC ping netstat –r To obtain routing configuration and statistics netstat Gives you information on active ports and established connections on a system

Lab procedures Lab assignments will be given a couple of days in advance to the start of the lab working period Lab working periods = 1 or 2 weeks Lab groups should be composed of two persons (no more, no less) Use sign-up sheet to schedule the time in which you will be using lab equipment Lab reports can be written in any format but should include answers to the questions presented in the assignment and equipment configuration files

Important recommendations Never change a password (you’ll be held accountable) unless its for your own user account Discharge often – get rid of static electricity build up before touching equipment For questions: Check CISCO web site Ask GSA:

Questions ??