IS 340 Review Router 101 Brigham Young University-Idaho.

Slides:



Advertisements
Similar presentations
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 1 WANs and Routers.
Advertisements

Chapter 9: Access Control Lists
1 Pertemuan 4 Starting a Router. Discussion Topics Initial startup of Cisco routers Router LED indicators The initial router bootup Establish a console.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—6-1 Access Control Lists Introducing ACL Operation.
1 CCNA 2 v3.1 Module 3. 2 CCNA 2 Module 3 Configuring a Router.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 1 WANs and Routers.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
CISCO ROUTER BY Mark Sullivan Nancy Tung Xiao Yan Wu.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
What is Router? Router is a device which makes communication between two or more networks present in different geographical locations. Routers are data.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 5 WANs and Routers/ Introduction to Routers.
Routers A router is a computer Computers have four basic components:
1 Chapter 2 ROUTER FUNDAMENTALS By: Tassos Tassou.
1 Semester 2 Module 3 Configuring a Router Yuda college of business James Chen
1 Semester 2 Module 1 WANs and Routers Yuda college of business James Chen
CISCO NETWORKING ACADEMY Chabot College ELEC Hyperterminal Access to Routers.
Module 2 Chapter 1:WAN’s and Routers. Topics 1.1 WANs 1.2 Routers.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 10 IP Addressing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 1 WANs and Routers.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 3 Configuring a Router.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 3 Configuring a Router.
Access Control List ACL. Access Control List ACL.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 1 WANs and Routers.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 1 WANs and Routers.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 1 WANs and Routers Presented by: Terren L. Bichard.
Access Control Lists (ACLs)
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
CISCO NETWORKING ACADEMY Chabot College ELEC telnet.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
1. 2 Router is a device which makes communication between two or more networks present in different geographical locations. Routers are data forwarding.
1 Version 3.1 Module 1 WANs and Routers. 2 Version 3.1 WANS WAN operates at the physical layer and the data link layer of the OSI reference model. Provide.
Configuring a Router. Router user interface The Cisco IOS software uses a command-line interface (CLI) as the traditional console environment. This environment.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
Access Control List ACL’s 5/26/ What Is an ACL? An ACL is a sequential collection of permit or deny statements that apply to addresses or upper-layer.
Semester 3 Chapter 6 ACLs. Overview Router can provide basic traffic filtering capability Access Control Lists can prevent packets from passing through.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Configuring Routers I’ve got to program a router! What do I have to do.
Configuring Routers Oh No! I’ve got to program a router! What do I have to do.
SW REVERSE JEOPARDY Chapter 1 CCNA2 SW Start-up Routing table Routing table Router parts Router parts Choosing a path Choosing a path Addressing Pot.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Restricting Access in the network
ACCESS CONTROL LIST.
Semester 2v2 Chapter 8: IP Addressing. Describe how IP addressing is important in routing. IP addresses are specified in 32-bit dotted-decimal format.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 3 Configuring a Router.
Router Basics MM Clements.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
1 Pertemuan 2 Routers. Discussion Topics Introduction to WANs Router physical characteristics Router external connections Management port connections.
1 Pertemuan 12 Cabeling WANs. Discussion Topics WAN physical layer WAN serial connections Routers and serial connections Routers and ISDN BRI connections.
1 CCNA 2 v3.1 Module 2 Introduction to Routers Claes Larsen, CCAI.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 1 WANs and Routers.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Cisco Routers.
Router is a device which provides communication possible between two or more different networks. To allow communication between two or more different.
Introduction to networking (Yarnfield) Configure a router.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
CISCO CERTIFIED NETWORK ASSOCIATE
CCENT Study Guide Chapter 12 Security.
Chapter 6 – Routing.
Access Control Lists Last Update
Access Control Lists CCNA 2 v3 – Module 11
CCNA 2 v3.1 Module 1 WANs and Routers
Routers & Cisco IOS.
Introduction to Cisco IOS -(Internetwork Operating System)
Lecture9: Embedded Network Operating System: cisco IOS
Routers and Routing Basics Review
Cisco Routers Presented By Dr. Waleed Alseat Mutah University.
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

IS 340 Review Router 101 Brigham Young University-Idaho

Network Layer Path Determination

Internal Configuration Components

Internal Components of a 2600 Router

External Connections on a 2600 Router

Connecting Console Interfaces 1. Configure terminal emulation software on the PC for the following: The appropriate com port 9600 baud 8 data bits 1 stop bit No parity No flow control 2. Connect a rollover cable to the router console port (RJ-45 connector). 3. Connect the other end of the rollover cable to the RJ-45 to DB-9 adapter 4. Attach the female DB-9 adapter to a PC.

Computer or Terminal Console Connection

Modem Connection to Console or Auxiliary Port

Router User Interface

Operating Environments

Steps in Router Initialization

Router User Interface Modes

The User Interface Error Indicator

Using Help

Using IOS Command history

Configuring a Router Name A router should be given a unique name as one of the first configuration tasks. This task is accomplished in global configuration mode using the following commands: Router(config)#hostname Tokyo Tokyo(config)#

Configuring Router Passwords

Host Name Resolutions  Host name resolution is the process that a computer system uses to associate a host name with an IP address.  Host names, unlike DNS names, are significant only on the router on which they are configured.

Configuring Host Tables

Viewing the Host Table LAB_A(config)#ip host LAB_A LAB_A(config)#ip host LAB_B LAB_A(config)#ip host LAB_C LAB_A(config)#ip host LAB_D LAB_A(config)#ip host LAB_E LAB_A(config)# LAB_A#show hosts Default domain is not set Name/address lookup uses domain service Name servers are Host Flags Age Type Address(es) LAB_B (perm, OK) 0 IP LAB_C (perm, OK) 0 IP LAB_E (perm, OK) 0 IP LAB_A (perm, OK) 0 IP LAB_D (perm, OK) 0 IP LAB_A#

Using the copy Command

Using the copy tftp running- config Command

What are ACLs? ACLs are lists of instructions you apply to a router's interface to tell the router what kinds of packets to accept and what kinds to deny.

ACLs must be defined on a per-protocol, per direction, or per port basis  ACL must be defined for each interface  ACL must be defined for each protocol enabled on the interface  ACLs control traffic in one direction at a time on an interface

How ACLs Work

How ACL’s Work

Protocols with ACLs Specified by Numbers

Wildcard Masks  Don’t confuse with subnet masks  0 mean match with IP number  255 means accept any number in this range

Standard ACLs

Extended ACLs

Extended IP Access List Examples (continued)

Placing ACLs  Standard ACLs should be placed close to the destination.  Extended ACLs should be placed close to the source.