Download presentation
Presentation is loading. Please wait.
Published byGrant Lyons Modified over 8 years ago
1
Chapter 7 Operating Cisco Routers © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 1
2
Class Agenda 10/2/15 Learning Objectives Unit 3: Presentation and Discussions Chapter 7 to 11 Discussion on Lab Activities. Discussion on Assignments. Break Times. 10 Minutes break in every 1 Hour. Note: Submit all Assignment and labs due today.
3
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 3: Slide 3 Unit 3 IP Subnetting and Basic Router Configuration Chapters 7-11 NT2640.U3.PS1
4
Installing Cisco Routers Routers network layer device and are capable to forward packets end-to-end through a network. Routers connect to various physical network links, like Ethernet, serial links, and Frame Relay © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 4
5
Detailed Cabling Diagram for the Same Enterprise Network © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 5
6
Model 1841 Cisco Integrated Services Router (ISR) © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 6
7
Router Installation Step 1: Connect any LAN cables to the LAN ports. Step 2: Connect CSU/DSU from teleco to router’s serial interface if applicable. Step 4: Connect the router’s console port to a PC (using a rollover cable), as needed, to configure the router. Step 5: Connect a power cable from a power outlet to the power port on the router. Step 6: Turn on the router. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 7
8
SOHO Network, Using Cable Internet with an Integrated Device © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 8
9
Accessing the CLI Cisco IOS Software, the operating system (OS) that runs on Cisco enterprise-class routers, implements and controls logic and functions performed by a Cisco router. Besides controlling the router’s performance and behavior, Cisco IOS also defines an interface for humans called the CLI. The router CLI can be accessed through three popular methods—the console, Telnet, and Secure Shell (SSH). The console is a physical port built specifically to allow access to the CLI. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 9
10
Console Connection to a Router © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 10
11
Password Security for CLI Access By default, a Cisco router is very secure as long as the router is locked inside a room. By default, a router allows only console access, but no Telnet or SSH access. You can set a password for the router with password command. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 11
12
User and Privileged Modes © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 12
13
CLI Help Features What You EnterWhat Help You Get ?Help for all commands available in this mode. helpText describing how to get help. No actual command help is given. command ?Text help describing all the first parameter options for the command. com?A list of commands that start with com. command parm?This style of help lists all parameters beginning with parm. (Notice that there is no space between parm and the ?.) command parm If you press the Tab key midword, the CLI either spells the rest of this parameter at the command line or does nothing. If the CLI does nothing, it means that this string of characters represents more than one possible next parameter, so the CLI does not know which one to spell out. command parm1 ?If a space is inserted before the question mark, the CLI lists all the next parameters and gives a brief explanation of each. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 13
14
Key Sequences for Command Edit and Recall Keyboard Command What Happens Up arrow or Ctrl-pThis displays the most recently used command. If you press it again, the next most recent command appears, until the history buffer is exhausted. (The p stands for previous.) Down arrow or Ctrl-nIf you have gone too far back into the history buffer, these keys take you forward to the more recently entered commands. (The n stands for next.) Left arrow or Ctrl-bThis moves the cursor backward in the currently displayed command without deleting characters. (The b stands for back.) Right arrow or Ctrl-fThis moves the cursor forward in the currently displayed command without deleting characters. (The f stands for forward.) BackspaceThis moves the cursor backward in the currently displayed command, deleting characters. Ctrl-aThis moves the cursor directly to the first character of the currently displayed command. Ctrl-eThis moves the cursor directly to the end of the currently displayed command. Ctrl-rThis redisplays the command line with all characters. It’s useful when messages clutter the screen. Ctrl-dThis deletes a single character. Esc-bThis moves back one word. Esc-fThis moves forward one word. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 14
15
CLI Configuration Mode Versus Exec Modes © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 15
16
Storing Router Configuration Files RAM: RAM is used by the router just as it is used by any other computer ROM: Stores a bootstrap like BIOS in computers. Loads the IOS. Flash memory: Flash memory can be used to store any other files, including backup copies of configuration files. Is removable. Act as the Secondary memory house the IOS software. NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 16
17
Cisco Router Memory Types © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 17
18
Copying and Erasing Configuration Files Locations for Copying and Results from Copy Operations © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 18
19
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 3: Slide 19 Perspectives on IPv4 Subnetting and Subnet Mask Conversion Chapters 8 & 9 NT2640-U2-PS1 Chapter 1 19
20
Subnets PC A and B in One Subnet, PC C in a Different Subnet © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 20
21
Subnet Size Concepts © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 21
22
Chapter 9 Subnet Mask Conversion © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 22
23
Example Conversions – Binary to Prefix Binary MaskLogicPrefix Mask 11111111 11111111 11000000 00000000 Count 8 + 8 + 2 = 18 binary 1s/18 11111111 11111111 11111111 11110000 Count 8 + 8 + 8 + 4 = 28 binary 1s/28 11111111 11111000 00000000 00000000 Count 8 + 5 = 13 binary 1s/13 © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 23
24
The Nine Possible Values in One Octet of a Subnet Mask Binary Mask Octet Decimal Equivalent Number of Binary 1s 00000000 00 10000000 1281 11000000 1922 11100000 2243 11110000 2404 11111000 2485 11111100 2526 11111110 2547 11111111 2558 © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 24
25
Example Conversions – Binary to Decimal Binary MaskLogicDecimal Mask 11111111 11111111 11000000 00000000 11111111 maps to 255 11000000 maps to 192 00000000 maps to 0 255.255.192.0 11111111 11111111 11111111 11110000 11111111 maps to 255 11110000 maps to 240 255.255.255.240 11111111 11111000 00000000 00000000 11111111 maps to 255 11111000 maps to 248 00000000 maps to 0 255.248.0.0 © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 25
26
Chapters 10 and 11 Analyzing Existing Subnet Mask and Operating Cisco Routers © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 26
27
Variable Length Subnet Masks “VLSM” To create multiple sizes of subnets in one class A, B, or C network, the engineer must create some subnets using one mask, some with another, and so on. Different masks means different numbers of host bits, making the 2 H – 2 formula create a different number of hosts in each subnet. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 27
28
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 1: Slide 28 Break 10 Min.
29
Chapter 11 Cisco Router Configuration © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 29
30
As you might imagine, both routers and switches need some of the same configuration settings. Both need a name. Both need some passwords to secure access to the CLI. To reach a router’s enable mode, a user must reach user mode either from the console or from a Telnet or SSH session, and then use the enable command. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 30
31
Configuring Simple Password Security By default, switches and routers allow a console user to immediately access user mode after logging in, with no password required. By default, the enable command allows console users into enable mode without requiring a password, but Telnet users are rejected without even a chance to supply a password. Regardless of these defaults, it makes sense to password protect enable mode using the enable secret global configuration command. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 31
32
The Two Enable Mode Passwords The enable command moves you from user EXEC mode (with a prompt of hostname>) to privileged EXEC mode (with a prompt of hostname#). A router or switch can be configured to require a password to reach enable mode. If the global configuration command enable password actual-password is used, it defines the password required when using the enable EXEC command. This password is listed as clear text in the configuration file by default. If the global configuration command enable secret actual-password is used, it defines the password required when using the enable EXEC command. This password is listed as a hidden MD5 hash value in the configuration file. If both commands are used, the password set in the enable secret command defines which password is required. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 32
33
Complete Cisco IOS Software Upgrade Process © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 33
34
Loading the Cisco IOS © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 34
35
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 3: Slide 35 Summary In this unit, we discussed: Identifying and Analyzing IP Subnet Needs Converting from Binary to Dotted Decimal Converting from Binary to Prefix Notation The Calculation Process for IP Subnets with Classful and Classless Masks The Basic Configuration Process for Cisco IOS Devices Cisco IOS Router-Specific Items
36
© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: : Unit 1: Slide 36 Break 10 Min.
37
Lab Hands on Activity using Simulator © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 3: Slide 37
38
NT2640 IP Networking Unit 3 Assignment and Lab
39
Unit 3 Assignment Assignment will be given in class Due Date: 10/10/2015 Read Assignment-Chapter 7 to 11 © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 39
40
Lab Activities Use the Simulator to complete Unit 2 and Unit 3 Lab should be completed in class. Follow the step by step instruction provided by the lab manual. © 2011 ITT Educational Services Inc. NT-2640 Wan Technologies: Unit 2: Slide 40
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.