Thursday, December 29, 2016

Lab - Configuring a Switch Management Address

In this lab, you will complete the following objectives: Part 1: Configure a Basic Network Device Part 2: Verify and Test Network Connectivity Lab - Configuring a Switch Management Address ...

Lab - Building a Simple Network

In this lab, you will complete the following objectives: Part 1: Set Up the Network Topology (Ethernet only) Part 2: Configure PC Hosts Part 3: Configure and Verify Basic Switch Settings Lab - Building a Simple Network ...

Wednesday, December 28, 2016

Packet Tracer - Implementing Basic Connectivity

In this activity, you will first perform basic switch configurations. Then you will implement basic connectivity by configuring IP addressing on switches and PCs. When the IP addressing configuration is complete, you will use various show commands to verify configurations and use the ping command to verify basic connectivity between devices. Packet Tracer - Implementing Basic Connectivity Instructions Packet Tracer - Implementing Basic Connectivity – PKA ...

Syntax Checker - Configuring a Switch Virtual Interface

Use the Syntax Checker in the figure to practice configuring a switch virtual interfa...

Switch Virtual Interface Configuration

To access the switch remotely, an IP address and a subnet mask must be configured on the SVI. To configure an SVI on a switch, use the interface vlan 1 global configuration command. Vlan 1 is not an actual physical interface but a virtual one. Next assign an IPv4 address using the ip address ip-address subnet-mask interface configuration command. Finally, enable the virtual interface using the no shutdown interface configuration command. After these commands are configured, the switch has all the IPv4 elements ready for communication over the network. Click Play in the figure to...

Monday, December 26, 2016

Packet Tracer - Configuring Initial Switch Settings

In this activity, you will perform basic switch configurations. You will secure access to the command-line interface (CLI) and console ports using encrypted and plain text passwords. You will learn how to configure messages for users logging into the switch. These banners are also used to warn unauthorized users that access is prohibited. Packet Tracer - Configuring Initial Switch Settings Instructions Packet Tracer - Configuring Initial Switch Settings - PKA ...

Capture Configuration to a Text File

Configuration files can also be saved and archived to a text document. This sequence of steps ensures that a working copy of the configuration file is available for editing or reuse later. For example, assume that a switch has been configured, and the running configuration has been saved on the device. Open a terminal emulation software such as PuTTY or Tera Term (Figure 1) connected to a switch. Enable logging in the terminal software, such as PuTTY or Tera Term, and assign a name and file location to save the log file. Figure 2 displays that All session...

Saturday, December 24, 2016

Save the Running Configuration File

There are two system files that store the device configuration: startup-config - The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot. NVRAM does not lose its contents when the device is powered off. running-config - The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when...

Banner Messages

Although requiring passwords is one way to keep unauthorized personnel out of a network, it is vital to provide a method for declaring that only authorized personnel should attempt to gain entry into the device. To do this, add a banner to the device output. Banners can be an important part of the legal process in the event that someone is prosecuted for breaking into a device. Some legal systems do not allow prosecution, or even the monitoring of users, unless a notification is visible. To create a banner message of the day on a network device, use the banner motd # the message of the day # global ...

Thursday, December 22, 2016

Secure Device Access

The use of weak or easily guessed passwords continues to be a security issue in many facets of the business world. Network devices, including home wireless routers, should always have passwords configured to limit administrative access. Cisco IOS can be configured to use hierarchical mode passwords to allow different access privileges to a network device. All networking devices should limit access as listed in Figure 1. Use strong passwords that are not easily guessed. Consider the key points listed in Figure 2. Note: Most...

Configure Hostnames

Once the naming convention has been identified, the next step is to apply the names to the devices using the CLI. As shown in Figure 1, from the privileged EXEC mode, access the global configuration mode by entering the configure terminal command. Notice the change in the command prompt. From global configuration mode, enter the command hostname followed by the name of the switch and press Enter. Notice the change in the command prompt name. Note: To remove the configured hostname and return the switch to the default prompt, use the no hostname global...

Wednesday, December 21, 2016

Lab - Establishing a Console Session with Tera Term

In this lab, you will complete the following objectives: Part 1: Access a Cisco Switch through the Serial Console Port Part 2: Display and Configure Basic Device Settings Part 3: (Optional) Access a Cisco Router Using a Mini-USB Console Cable Lab - Establishing a Console Session with Tera Term ...

Hotkeys and Shortcuts

The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting easier, as shown in the figure. Commands and keywords can be shortened to the minimum number of characters that identify a unique selection. For example, the configure command can be shortened to conf because configure is the only command that begins with conf. An even shorter version of con will not work because more than one command begins with con. Keywords can also be shortene...

Sunday, December 18, 2016

IOS Command Syntax

A command might require one or more arguments. To determine the keywords and arguments required for a command, refer to the command syntax. The syntax provides the pattern or format that must be used when entering a command. As identified in the table in the figure, boldface text indicates commands and keywords that are entered as shown. Italic text indicates an argument for which the user provides the value. For instance, the syntax for using the description command is description string. The argument is a string value provided by the user. The description command is typically...

Friday, December 16, 2016

Navigate Between IOS Modes

Various commands are used to move in and out of command prompts. To move from user EXEC mode to privileged EXEC mode, use the enable command. Use the disable privileged EXEC mode command to return to user EXEC mode. Note: Privileged EXEC mode is sometimes called enable mode. To move in and out of global configuration mode, use the configure terminal privileged EXEC mode command. To return to the privileged EXEC mode, enter the exit global config mode command. There are many different sub-configuration modes. For example, to enter line sub-configuration...

Thursday, December 15, 2016

Primary Command Modes

As a security feature, the Cisco IOS software separates management access into the following two command modes: User EXEC Mode - This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol. Privileged EXEC Mode - To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global...

Terminal Emulation Programs

There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by a SSH/Telnet connection. Some of these include: PuTTY (Figure 1) Tera Term (Figure 2) SecureCRT (Figure 3) OS X Terminal These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color scheme...

Purpose of OS

Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to: Use a mouse to make selections and run programs Enter text and text-based commands View output on a monitor A CLI-based network operating system like the Cisco IOS on a switch or router enables a network technician to: Use a keyboard to run CLI-based network programs Use a keyboard to enter text and text-based commands View...

Monday, December 5, 2016

Class Activity - It Is Just an Operating System

In this activity, imagine that you are employed as an engineer for a car manufacturing company. The company is currently working on a new car model. This model will have selected functions that can be controlled by the driver giving specific voice commands. Design a set of commands used by this voice-activated control system, and identify how they are going to be executed. The functions of the car that can be controlled by voice commands are: Lights Wipers Radio Telephone set ...

Chapter 1: Exploring the Network

Networks and the Internet have changed the way we communicate, learn, work, and even play. Networks come in all sizes. They can range from simple networks consisting of two computers to networks connecting millions of devices. The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks’. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests. The network infrastructure is the platform that supports the network. It provides the stable and reliable...

Sunday, December 4, 2016

Class Activity – Draw Your Concept of the Internet Now

Draw Your Concept of the Internet Now In this activity, you will use the knowledge you have acquired throughout Chapter 1, and the modeling activity document that you prepared at the beginning of this chapter. You may also refer to the other activities completed in this chapter, including Packet Tracer activities. Draw a map of the Internet as you see it now. Use the icons presented in the chapter for media, end devices, and intermediary devices. In your revised drawing, you may wish to include some of the following: WANs...

Thursday, December 1, 2016

CCNA

As the use of these integrated, expanding networks increase, so does the need for training for individuals who implement and manage network solutions. This training must begin with the routing and switching foundation. Achieving Cisco Certified Network Associate (CCNA) certification is the first step in helping an individual prepare for a career in networking. CCNA certification validates an individual’s ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum...
Page 1 of 2112345Next

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting