CCNA1-ITNv7 - Module 02 - Basic Switch and End Device Configuration config

Arthur Salmon
23 Dec 202029:33

Summary

TLDRThis video script from an 'Introduction to Networking' course covers fundamental Cisco IOS navigation and device configuration. It introduces the concept of operating systems in networking devices, the transition from graphical to command line interfaces, and the importance of secure shell (SSH) for remote access. The script details the process of configuring basic settings on Cisco devices, including device naming, password security, and interface configuration. It also explains how to save configurations and verify connectivity using commands like ping and trace route. The course emphasizes practical skills, with a focus on hands-on lab exercises to reinforce learning.

Takeaways

  • πŸ’» Cisco IOS is the operating system used on Cisco networking devices, providing a command-line interface for device management.
  • πŸ”Œ To access the command line on Cisco devices, use a console cable or remotely via SSH for secure access.
  • πŸ“ˆ The script introduces different modes of Cisco IOS, including User EXEC, Privileged EXEC, and Global Configuration modes, each with varying levels of access and commands.
  • πŸ› οΈ Basic commands and navigation within Cisco IOS are crucial for configuring and managing Cisco devices.
  • πŸ”‘ Passwords can be set and encrypted for secure access to Cisco devices, with best practices for password strength emphasized.
  • 🏷️ The script explains how to configure device names and banners for identification and security purposes.
  • πŸ’Ύ Saving configurations is essential to retain settings after a device reboot, which is done by copying the running configuration to the startup configuration.
  • πŸ”Œ The importance of physical connections via copper, fiber, or wireless interfaces is highlighted, along with the need for appropriate network interface cards.
  • πŸ“ Static IP addressing is discussed, including how to manually assign IP addresses to devices for network communication.
  • πŸ” Verification of connectivity and device configuration is done using commands like ping and traceroute, ensuring devices can communicate effectively on a network.

Q & A

  • What is the main focus of the 'Introduction to Networking' course, specifically in the context of the CCNA version 7 curriculum?

    -The main focus of the 'Introduction to Networking' course, as per the CCNA version 7 curriculum, is to cover basic switch and device configuration, including understanding Cisco IOS, navigating the command line structure, configuring basic Cisco devices, saving configurations, and verifying communication between devices on a LAN.

  • What is the role of an operating system in networking devices?

    -In networking devices, the operating system manages the communication between the hardware and the software, providing a kernel that allows user interaction with the hardware. It facilitates interaction with the device, making it easier through graphical or command line interfaces.

  • How has the method of connecting to Cisco routers evolved from Telnet to a more secure alternative?

    -The method of connecting to Cisco routers has evolved from using Telnet, which transmits data in plain text and is not secure, to Secure Shell (SSH), which establishes a remote command line with encryption, assuming it has been set up correctly.

  • What is the significance of different modes in Cisco IOS, and how do they affect the operations of a device?

    -Different modes in Cisco IOS, such as User EXEC mode, Privileged EXEC mode, and Global Configuration mode, are significant because they determine the level of access and commands available to the user. User EXEC mode provides limited access, while Privileged EXEC mode allows more options. Global Configuration mode is used for making broader changes to the device's settings.

  • How can one navigate between different modes in Cisco IOS?

    -To navigate between different modes in Cisco IOS, one would use commands like 'enable' to move from User EXEC mode to Privileged EXEC mode, 'configure terminal' to enter Global Configuration mode, and 'exit' or 'end' to move back to a previous mode or to exit a configuration mode.

  • What are some command line navigation tips and shortcuts mentioned in the script?

    -Some command line navigation tips and shortcuts include using 'conf t' or 'configure terminal' to enter configuration mode, 'end' or 'control z' to return to Privileged EXEC mode from a sub-interface, and using 'tab' to auto-complete commands. Additionally, 'control c' can abort configurations, and 'shift 6' can be used as an all-purpose break sequence.

  • What is the importance of naming networking devices and what are the guidelines for doing so?

    -Naming networking devices is important for identification and management purposes. The guidelines for naming include starting with a letter, having no spaces, ending with a letter or digit, and allowing only letters, digits, and dashes within the name, which should be between 1 and 64 characters in length.

  • How does one configure a password for secure access in Cisco devices?

    -To configure a password for secure access in Cisco devices, one would use commands like 'password' for plain text or 'secret' for hashed passwords within the appropriate configuration mode, such as 'line console 0' or 'line vty 0' for virtual terminals.

  • What is the purpose of setting a banner message in a Cisco device, and how is it done?

    -The purpose of setting a banner message in a Cisco device is to display a legal or informational message upon login, typically indicating that only authorized personnel should access the device. It is set using the 'banner motd' command, followed by the message enclosed in delimiter characters.

  • How can one save configurations in a Cisco device to ensure they persist after a reboot?

    -To save configurations in a Cisco device so they persist after a reboot, one would use the 'copy running-config startup-config' command from Privileged EXEC mode, which saves the current running configuration to the startup configuration that is loaded upon reboot.

  • What are the different types of physical media connections discussed in the script, and how do they relate to the networking devices?

    -The script discusses copper-based connections using Ethernet cables with RJ45 connectors, fiber optic connections with various media types and plugins, and wireless connections requiring a wireless NIC. These physical media connections relate to networking devices by providing the necessary interfaces for connectivity.

Outlines

00:00

🌐 Introduction to Cisco IOS and Networking Devices

The paragraph introduces the course on networking, specifically the CCNA version 7 curriculum. It focuses on basic switch and device configuration, covering topics like Cisco IOS navigation, command line structure, configuring Cisco devices, saving configurations, port communication, and verifying communication between devices on a LAN. The instructor emphasizes the importance of understanding the operating system of networking devices, comparing it to client operating systems like Windows or Linux, and introduces the concept of command line interfaces as a stable alternative to graphical interfaces. The lesson also explains how to access the command line through console cables and the transition from Telnet to SSH for security reasons.

05:00

πŸ” Navigating Cisco IOS Modes and Commands

This section delves into the different modes of Cisco IOS, highlighting the distinction between User EXEC mode (indicated by a '>') and Privileged EXEC mode (indicated by a '#'). The paragraph explains that the mode determines the range of commands available to the user. It also covers global configuration mode and how to navigate between these modes using commands like 'enable' and 'configure terminal'. The importance of understanding where certain commands can be issued is stressed, and the paragraph provides examples of how to move between different configuration modes. The concept of command structure is introduced, explaining the use of keywords, arguments, and the significance of spacing in commands.

10:01

πŸ›  Command Line Interface (CLI) Navigation and Configuration

The paragraph discusses the process of configuring networking devices using the command line interface. It explains how to access the global configuration mode and the importance of naming devices for easier identification. The paragraph provides guidelines for setting device names and emphasizes the need for secure password practices, suggesting the use of a combination of uppercase, lowercase, numbers, and special characters. It also touches on the difference between plain text and encrypted passwords, using the commands 'password' and 'secret' respectively. Additionally, the paragraph introduces the concept of setting banners for legal messages and the use of command shortcuts and hotkeys for efficient navigation.

15:02

πŸ’Ύ Saving Configurations and Understanding Device Interfaces

This section explains the importance of saving configurations to prevent loss of settings upon device reboot. It outlines the process of saving the running configuration to the startup configuration using the 'copy run start' command. The paragraph also discusses how to erase the startup configuration and the necessity of reloading the device for changes to take effect. Furthermore, it covers the basics of device interfaces, differentiating between copper, fiber, and wireless connections, and the requirement for appropriate Network Interface Cards (NICs) for each type of connection.

20:04

πŸ“‘ Configuring IP Addresses and Physical Media Connections

The paragraph focuses on assigning IP addresses to devices, either statically or dynamically, and the role of DHCP in dynamic address assignment. It provides a brief overview of how to manually configure IP addresses on devices like Windows PCs and how to assign IP addresses to switches for management purposes. The paragraph also discusses the physical aspects of connecting devices, including the use of Ethernet cables for copper connections, fiber cables for fiber optic connections, and the need for wireless NICs for wireless connections. It sets the stage for verifying connectivity through commands like 'ping' and 'trace route' in subsequent lessons.

25:07

πŸ”¬ Lab Setup and Review of Module Learnings

The final paragraph summarizes the module's content, which includes an understanding of Cisco IOS structure, navigation, and the physical mediums for connecting devices. It also reviews the basics of IP addressing and the allocation of static and dynamic IP addresses to devices. The paragraph concludes with a mention of an upcoming lab where students will apply the learned skills to configure switches and routers, set up topologies, and reinforce the concepts covered in the module. The instructor invites questions and thanks the audience for their attention.

Mindmap

Keywords

πŸ’‘CCNA

CCNA stands for Cisco Certified Network Associate, which is an entry-level certification program for networking professionals. In the context of the video, the course is designed to prepare individuals for the CCNA version 7 curriculum, focusing on fundamental networking concepts and skills.

πŸ’‘Cisco IOS

Cisco IOS, now known as Cisco Internetwork Operating System, is the software used on most Cisco Systems' network equipment. It is the backbone of Cisco networking devices, providing the command-line interface for device configuration and management. The video discusses the importance of understanding Cisco IOS for basic device navigation and configuration.

πŸ’‘Command Line Interface (CLI)

The Command Line Interface is a text-based interface used to interact with computer systems. In the video, the CLI is emphasized as the primary method for managing Cisco networking devices, contrasting with graphical user interfaces. It is where commands are issued to configure and troubleshoot network devices.

πŸ’‘Console Cable

A console cable is a specific type of cable used to connect a computer directly to a networking device for management purposes. The video mentions the use of a console cable to access the command line interface of Cisco devices, which is crucial for initial setup and troubleshooting.

πŸ’‘SSH (Secure Shell)

SSH is a protocol used to securely access a remote computer. The video explains that SSH replaced Telnet for connecting to Cisco routers because it provides encryption, making the connection more secure against eavesdropping and other network attacks.

πŸ’‘User EXEC Mode

User EXEC mode is a restricted command mode in Cisco IOS that allows only limited commands to be executed. The video describes this mode as the starting point for users, where they can perform basic operations like pinging a device or viewing basic information.

πŸ’‘Privileged EXEC Mode

Privileged EXEC mode is an advanced command mode in Cisco IOS that provides access to a broader set of commands than User EXEC mode. The video explains that to enter this mode, users must issue the 'enable' command, which is necessary for more complex configurations and management tasks.

πŸ’‘Global Configuration Mode

Global Configuration Mode is a command mode in Cisco IOS used to configure settings that apply to the entire device. The video mentions that to enter this mode, one would use the 'configure terminal' command, which is essential for making widespread changes to the device's configuration.

πŸ’‘Port Security

Port security is a feature used to restrict unauthorized devices from connecting to a switch port. The video touches on this concept as part of the broader discussion on switch configuration, emphasizing the importance of securing network access points.

πŸ’‘IP Addressing

IP addressing refers to the method of assigning unique identifiers (IP addresses) to devices on a network. The video discusses static IP addressing, where an administrator manually assigns IP addresses to devices, as opposed to dynamic addressing, which is typically assigned via DHCP.

πŸ’‘Packet Tracer

Packet Tracer is a network simulation tool used for educational purposes. The video mentions Packet Tracer as a tool that can be used to practice and reinforce the concepts learned, such as device configuration and network setup.

Highlights

Introduction to Networking course, focusing on CCNA version 7 curriculum.

Module 2 covers basic switch and device configuration.

Discussion on basic Cisco IOS navigation and command line structure.

How to configure a basic Cisco device and save configurations.

Explaining port communication and medium.

Guidance on configuring addresses for host devices.

Verification of communication between devices on a LAN.

Operating systems for networking devices compared to client OS like Windows 10 or macOS.

Difference between graphical user interfaces and command line interfaces.

Cisco networking devices typically use command line only.

Accessing the command line through console cables and terminal emulators like Telnet and SSH.

Explanation of different modes in Cisco IOS and their significance.

Navigating between user exec mode, privileged exec mode, and global configuration mode.

Command structure and syntax in IOS.

Hotkeys and shortcuts for efficient command line navigation.

Configuring devices in global configuration mode.

Setting device names and password guidelines.

Saving configurations to prevent loss after device restart.

Configuring host devices with ports and IP addresses.

Differences in physical media connections: copper, fiber optic, and wireless.

Basic IP addressing for communication between devices.

Upcoming lab exercises to reinforce learned concepts.

Summary of module learning outcomes, covering Cisco IOS structure, navigation, and device mediums.

Transcripts

play00:01

welcome to my introduction to networking

play00:03

course typically

play00:04

abbreviated it in this will be

play00:08

for the ccna version 7

play00:11

curriculum

play00:15

welcome to module 2 basic switch and in

play00:18

device configuration

play00:20

we're going to be talking about basic

play00:23

basic

play00:23

cisco ios ios and navigation the command

play00:27

line structure

play00:28

how to configure a basic cisco device

play00:31

how to save

play00:32

the configuration we're going to talk

play00:34

about some basic

play00:36

port communication and medium

play00:39

talk about how to configure addresses

play00:41

for host devices

play00:42

and then how we can verify communication

play00:45

between those two devices

play00:47

on a lan so we have a lot to cover in

play00:50

this chapter

play00:51

most of this is going to be basic layer

play00:53

2 and basic

play00:55

navigation of the devices so let's go

play00:58

and jump right in

play00:59

first section is cisco ios

play01:04

so when we think a computer or computing

play01:07

device

play01:09

there is some type of operating system

play01:11

that runs that hardware

play01:14

and typically the hardware is the

play01:15

physical part

play01:17

then the kernel is the communication

play01:19

between the hardware and the software

play01:22

and then there is the shell the software

play01:24

portion

play01:25

we the user interact with the shell or

play01:28

software

play01:29

so we have to have something that will

play01:31

manage between

play01:32

us and the hardware and that's where

play01:35

that kernel comes into play

play01:38

more often than not we think of like a

play01:40

client operating system like windows 10

play01:42

or

play01:43

a mac os or linux os

play01:46

but that's not the only thing

play01:50

networking devices do have their own

play01:53

operating system

play01:55

while windows 10 has a gui a graphical

play01:58

user interface

play02:00

sometimes these guise may fail so

play02:04

we actually have a command line version

play02:07

that works just as well

play02:09

it's not as graphical but you don't have

play02:12

to worry about the graphical portion

play02:14

crashing and then you losing the ability

play02:17

to interact with it

play02:20

so with that we have certain versions of

play02:23

linux that are both graphical

play02:25

and command line so it just kind of

play02:27

depends on what you're looking for

play02:29

and the stability that you are looking

play02:31

for as well

play02:34

the purpose of an operating system is

play02:36

again to allow us to interact with the

play02:38

hardware

play02:38

but to make it easier so if we're

play02:40

dealing with a graphical

play02:42

interface we have a mouse we have a

play02:44

keyboard we can move the mouse we can do

play02:46

things

play02:47

while we also have a text portion of the

play02:50

operating system

play02:52

we have a command line that we can also

play02:54

navigate to and from

play02:55

if necessary well

play02:59

in certain operating systems they don't

play03:02

have a graphical interface

play03:04

so you can actually choose not to deal

play03:07

with a graphical user interface

play03:09

if necessary most cisco networking

play03:13

devices that we will be dealing with

play03:15

are strictly command line only so how do

play03:18

we access the command line

play03:20

we access it through a console cable

play03:24

this is a traditional console cable up

play03:26

here it's a db9 on one side

play03:29

and an rj45 with the correct pin out

play03:32

on the other we used to use

play03:36

a program called telnet to

play03:39

actually connect to a cisco router

play03:41

however telnet's all plain text

play03:44

and it's not shown to be secure so that

play03:46

was replaced with

play03:48

secure shell ssh and this establishes

play03:52

again a remote command line but this

play03:55

allows for encryption

play03:58

assuming that it has been set up both

play04:01

secure shell

play04:02

and telnet can be used when connecting

play04:05

to the

play04:06

networking devices console ports the

play04:09

console port is a management port

play04:12

that is used to lo and behold

play04:16

manage the actual device but that means

play04:18

you have to have physical access

play04:20

to the device so these types of programs

play04:24

like telnet and ssh are actually called

play04:26

terminal emulators they allow us to

play04:30

emulate a terminal to the device so once

play04:33

we've actually connected

play04:34

to the device we have to understand our

play04:38

ios navigation

play04:41

one of the big things is the different

play04:44

modes and that's going to be an

play04:46

important thing

play04:47

starting out because how the devices

play04:49

operate is really depending on the mode

play04:52

that they are in

play04:53

here we have a device name like router

play04:56

switch and a carriage

play04:58

this is called the exact mode or the

play05:00

user exec mode

play05:01

and this allows us very limited access

play05:04

to what we can

play05:05

do again you'll notice the carrot

play05:09

versus our privilege exact mode which

play05:12

will be a

play05:12

pound this allows us access to greater

play05:17

options so here i dragged a

play05:21

router center in packet tracer i brought

play05:24

a router up and running

play05:26

and i just want to access the terminal

play05:29

so you'll notice we have just our router

play05:31

and our carrots

play05:32

do question mark that's what we can do

play05:35

we can do ping

play05:36

we can do disable we can do some basic

play05:38

show commands

play05:39

and that's it if i type enable

play05:42

we'll go to our privileged exact mode

play05:46

and you'll notice the amount of commands

play05:48

we can do

play05:49

are tremendously the list we can do is

play05:54

way longer so again depending on the

play05:57

mode that we're operating in

play05:59

we can do different things and this will

play06:02

become second nature to you

play06:03

as we use the devices more because

play06:07

it's just it becomes muscle memory at

play06:09

that point

play06:11

after that we have our global

play06:12

configuration

play06:14

you'll notice it will go to a config

play06:17

if we are configuring a line specific

play06:21

item like a console

play06:22

or a virtual terminal we will get a line

play06:26

if we are looking at a interface

play06:30

we will be actually at a sub command the

play06:33

config

play06:34

hyphen if these are just some of the

play06:38

interfaces not all of them

play06:41

so as we dive deeper into the devices

play06:45

we will actually be reviewing additional

play06:49

config line syntax and whatnot

play06:54

so again there are there is no video for

play06:58

this but there is a difference between

play06:59

the user exec mode privilege exact mode

play07:01

on our global configuration mode

play07:03

and how we navigate between them as well

play07:07

as

play07:07

how we issue commands each one of them

play07:12

so how do we navigate between them if we

play07:16

are at

play07:16

a user mode and we want to go to a

play07:19

privileged exact mode

play07:21

we will do an enable that allows us to

play07:23

go to our

play07:24

privileged exec mode if we want to

play07:27

exit out we would type exit how do we go

play07:31

to our global configuration we could

play07:34

type configure terminal

play07:35

hit enter that takes us from our

play07:38

privilege exec mode and puts us in our

play07:40

global configuration mode

play07:42

that would be this guy right here if we

play07:44

want to go back to our privileged exact

play07:46

mode we would do exit and it would

play07:48

take us back to our privileged exec mode

play07:50

if we want to configure

play07:52

a line console for example

play07:55

in our global configuration we would

play07:58

type line

play07:59

control 0 and that will allow us to go

play08:02

to our

play08:03

line some commands can only be issued at

play08:07

certain locations

play08:09

so depending at where you are located

play08:11

are you in the config mode are you in

play08:13

the config

play08:14

tech line mode are you in the config if

play08:16

mode

play08:17

certain commands can only be issued in

play08:19

certain areas so we do need to keep that

play08:21

in mind

play08:22

as we are talking about the navigation

play08:24

of the ios

play08:26

so again learning basic line and

play08:30

console navigation so

play08:33

if we are looking at a line console

play08:36

again we have that sub interface

play08:39

we can return to the privileged exec

play08:41

mode by doing end

play08:42

or by doing a control z

play08:47

and will take us all the way back

play08:51

exit takes us one step out

play08:54

so if we were in the config tag line and

play08:57

we type

play08:58

exit it will take us back to the config

play09:00

and takes us

play09:01

all the way back to our privileged exec

play09:03

mode the control z

play09:05

is one that you do want to know i have

play09:07

seen that pop up on a few exams before

play09:09

just fyi so to move directly from one

play09:13

sub

play09:13

configuration console to another you can

play09:16

actually

play09:17

navigate navigate that way so if we're

play09:20

at the

play09:21

config tag if and we type

play09:24

line console 0 hit enter it will take us

play09:27

directly to the config

play09:28

dash line so some of those are just

play09:32

going to be

play09:33

times playing with the command line for

play09:35

us to get familiar with but don't

play09:36

stress too much we actually do have a

play09:39

lab coming up that will help us

play09:41

go through that i have prepared other

play09:44

videos

play09:45

that walk us through the navigation so

play09:48

you should be good with that

play09:50

so let's talk about the command

play09:53

structure

play09:54

as we issue commands we should have a

play09:56

prompt

play09:58

that will be like the switch and

play10:01

whatever mode we're in

play10:03

next would be the command there should

play10:06

be a space

play10:08

and there will be either a keyword or an

play10:10

argument

play10:12

again spacing is important but you need

play10:14

to be careful

play10:16

if you do two spaces for example

play10:19

it will think the second space is part

play10:21

of the argument

play10:23

so the command line is pretty strict on

play10:27

how we do certain things

play10:32

so basic uh syntax

play10:37

would be if it's bold it's required

play10:40

if it's italian a size it may not be

play10:44

some are going to be optional

play10:47

some may not so for example

play10:51

if we are looking at a

play10:56

help section ping space notice ping is

play11:00

in bold

play11:01

ip address is not and it's italicized

play11:04

it's letting us know that ping is the

play11:07

command and that's the argument

play11:10

if we do switch port security aging

play11:13

this is a

play11:17

an actual printout of the command set

play11:21

notice we have static we have time we

play11:24

have time that is not italicized

play11:27

and not bolded and then we have type and

play11:29

the type would be either absolute or

play11:31

inactive

play11:33

so part of this is learning how we could

play11:37

decode our command line

play11:41

this is an example of a multi-argument

play11:44

command

play11:45

where these are singular argument

play11:47

commands

play11:50

ios does have a nice help feature if you

play11:53

do a question mark

play11:55

it will print out the commands if you

play11:57

already have part of a command written

play11:59

and you do question mark

play12:00

it will be the next part of the command

play12:04

if you fat finger something or if you

play12:06

try to issue a command at the wrong

play12:09

level you will actually get an invalid

play12:11

input

play12:13

i have already prepared videos and

play12:16

linked them as well

play12:17

in the help or in the chat so

play12:21

again some of these videos you can watch

play12:23

later

play12:25

so hot keys and shortcuts you don't

play12:28

always have to type out the entire

play12:29

command

play12:30

to go from the privileged execs to

play12:32

configuration is configure terminal or

play12:35

conf t however if

play12:38

there could be multiple commands with

play12:40

the same amount of letters

play12:42

you'll get a ambiguous command here we

play12:45

have a router

play12:46

and we're issuing a co in command well

play12:48

there are two commands that start with

play12:50

con

play12:50

configure and connect so this is

play12:53

ambiguous

play12:54

it doesn't know which one you're trying

play12:56

to do if you did c-o-n-f

play12:59

it would know it's configure if you did

play13:01

c-o-n-n

play13:02

it would know that you're typing in

play13:03

connect so it really just depends

play13:06

so there's a few other tips things like

play13:09

typing out a command

play13:10

you can hit tab and it will actually

play13:12

complete out the rest of the command

play13:14

assuming it's not ambiguous

play13:16

backspace will erase your character you

play13:19

can

play13:19

move the cursor up and down characters

play13:22

by the left arrow right arrow

play13:24

up arrow up arrow actually will show you

play13:26

the history

play13:27

and you can actually go up multiple

play13:29

commands that you previously typed uh

play13:34

other

play13:34

shortcuts are things like control z

play13:36

which we've already talked about

play13:38

control c when in a configuration mode

play13:41

will in the configuration mode and

play13:43

kick you back out to the privileged

play13:45

exact mode

play13:47

shift 6 will be an all-purpose brake

play13:50

sequence

play13:51

so that you uh can break up

play13:54

or kill like a dns lookup or a trace

play13:57

route or a ping

play13:58

if any of them get stuck

play14:01

space bar again uh if we if we have a

play14:04

multi-screen help

play14:06

space bar will show next screen

play14:10

enter hit someone uh at a time one line

play14:13

at a time

play14:14

so again just some of this is going to

play14:16

be hit and miss

play14:18

while we are practicing our different

play14:20

commands

play14:21

again we've done videos on the shortcut

play14:23

keys

play14:25

we have a packet tracer file as well

play14:30

and we have one to do basic navigation

play14:34

so let's go ahead let's jump directly

play14:36

into

play14:37

how we can configure the devices now

play14:41

not just look at navigation

play14:44

so again most of the configuration is

play14:46

going to be done at

play14:47

the global configuration mode so how do

play14:50

we get there

play14:51

we log into the device we go from the

play14:54

user exact mode

play14:55

type enable that gets us to our

play14:57

privileged exact mode

play14:59

that would be the pound sign

play15:02

from there we gotta get to our global

play15:04

configuration mode

play15:05

so conf t or configure terminal hit

play15:08

enter

play15:09

that lets us log into the configuration

play15:12

mode

play15:12

so we need to first thing we're going to

play15:14

do is probably name the device

play15:16

that way it's not just called switch or

play15:19

router we need to give it a

play15:20

meaningful name so when we are naming

play15:24

devices

play15:25

it has to start with a letter has no

play15:28

spaces

play15:29

and it must end with a letter or a digit

play15:33

only letters digits and dashes can be

play15:37

present and it can be between

play15:40

1 and 64 characters in length

play15:46

we can also set passwords most the time

play15:49

in the cisco curriculum we are using

play15:51

cisco

play15:52

or class however these are really weak

play15:54

passwords

play15:55

so we need to not use them in

play15:58

real world so some good password

play16:02

guidelines is use passwords that are

play16:04

greater than eight characters in length

play16:06

combination of uppercase lowercase

play16:08

special characters and numbers

play16:10

avoid using the same password for all

play16:12

devices avoid

play16:13

using passwords that are not encrypted

play16:16

on the device

play16:17

if we are assuming we're using passwords

play16:20

for network devices

play16:21

but i mean for this example that's kind

play16:23

of what we're doing don't use commonly

play16:25

guessed words

play16:26

either so again we're talking

play16:30

about how to best

play16:34

use the information that we do have so

play16:36

if we all

play16:37

know that a common password is password

play16:40

we probably want to steer clear of it so

play16:43

let's talk how do we configure passwords

play16:46

well we can configure a plain text

play16:48

password by using the command

play16:50

password and then the

play16:53

password we want to set however this is

play16:56

not

play16:57

very secure so here we have a

play17:00

we're configuring a basic password for

play17:02

the align console 0

play17:04

we set the password to cisco we set it

play17:06

to login

play17:09

we can uh when we go to actually connect

play17:13

this is going to be the password we

play17:14

connect with we have

play17:17

the ability to also configure the

play17:19

terminal with the password as well

play17:21

we would do enable and then we would

play17:23

either do password or secret

play17:25

and then the password that if we do the

play17:28

word password

play17:29

here it's a plain text password if we do

play17:32

the word

play17:32

secret it will actually hash

play17:36

our password

play17:39

if we're talking how to configure a

play17:40

switch we also have a virtual terminal

play17:44

so we also want to set our passwords for

play17:47

our virtual terminal again you go to

play17:49

that line

play17:50

you type in the password space whatever

play17:52

password you want

play17:53

and so forth so we talked about

play17:56

encrypting passwords

play17:58

here we actually have

play18:02

encrypted passwords even though we did

play18:05

not

play18:05

encrypt the passwords we used the word

play18:07

the command password

play18:09

and then we did cisco for example well

play18:12

why are these hashed values they're

play18:15

hashed values because we did a

play18:17

password encryption service that

play18:20

actually

play18:20

turned on encryption for all passwords

play18:24

so that makes these passwords cached

play18:27

even though we didn't hash them to begin

play18:29

with

play18:30

this service does it for us

play18:33

so now that we've talked about naming

play18:35

and passwords

play18:37

let's talk about how to set a banner

play18:39

when you log into the device

play18:41

here is a message how do we set that

play18:45

message

play18:46

we do that by typing banner motd

play18:49

a special character type the message end

play18:52

with the same special character

play18:56

that allows us to set our messages

play18:59

and this should be some form of legal

play19:01

message saying

play19:03

authorized personnel only or

play19:06

something of that nature the

play19:09

pound signs here are delimiter factors

play19:12

or demeter

play19:13

uh characters they don't have to be

play19:15

count a pound

play19:16

but whatever you start with you need to

play19:18

end with

play19:21

again there's a video covering that

play19:23

which has already been posted

play19:25

so let's talk how do we save our

play19:26

configuration

play19:29

if you are doing the configuration it is

play19:33

stored as a

play19:34

running configuration the issue is if

play19:38

the device restarts anything

play19:41

that's running that hasn't been saved

play19:43

will not

play19:46

be there so we need to actually save the

play19:49

running configuration we save it to the

play19:53

startup configuration the

play19:56

startup configuration will be the config

play19:58

that the device will actually load

play20:01

the running config will be the actual

play20:03

configuration

play20:04

as you've modified it if you've not

play20:07

saved

play20:08

the running configuration and it is

play20:10

rebooted

play20:11

whatever startup configuration is there

play20:14

is what will

play20:15

load so how do we save it

play20:18

in a global config we can do a

play20:23

sorry not in global config if

play20:28

we make the any modification in our

play20:29

global configuration

play20:31

we should be saving our config we do the

play20:34

saving by going to our privileged exact

play20:35

mode

play20:36

and typing copy run

play20:40

running hyphen config space startup

play20:42

config

play20:43

or you can do the shorter version which

play20:46

is copy run

play20:47

start hit enter and it will save the

play20:50

configuration

play20:54

if there are changes made to the running

play20:56

configuration

play20:57

and it's not saved when there is a

play21:00

reboot it the

play21:02

changes aren't there if you issue a

play21:05

reload

play21:06

the reload will actually restart the

play21:08

device

play21:10

and the reload will actually load the

play21:12

startup configuration

play21:14

if you want to delete the startup

play21:16

configuration again from our privileged

play21:18

exact mode

play21:19

you would type erase startup config and

play21:22

that will

play21:23

blank out the startup config

play21:26

once you've erased the startup config

play21:30

you need to reload or restart the router

play21:33

the device

play21:34

so that it will load a blank

play21:36

configuration

play21:37

because again when the device is turned

play21:40

on it's

play21:40

whatever configuration it has in memory

play21:43

is known as the running config

play21:45

so even if you erase the startup config

play21:48

the device is still running the running

play21:51

configuration

play21:52

until you reload it

play21:56

again there is a video which we're not

play21:58

going to be covering

play22:00

so again how do we uh

play22:04

how do we actually save our output we

play22:07

can actually if we're using putty

play22:09

you can log all of the information

play22:12

in the terminal session you can actually

play22:15

go through and copy and paste it into a

play22:17

text document

play22:22

you can do session logging you can

play22:24

disable logging

play22:26

kind of just depends on what you want we

play22:28

have packet tracer outlining how to do

play22:31

the basic configuration and how to do

play22:32

the saving

play22:33

and how to configure a switch

play22:37

moving on we're going to talk about how

play22:38

to configure our in devices

play22:40

with ports and ip addresses

play22:44

so again ipaddresser outside the scope

play22:46

of this video

play22:47

so let's just assume we're given our ip

play22:49

addresses and we can issue them

play22:51

manually if we're talking with windows

play22:55

10 would go to our network configuration

play22:58

and we would use

play22:59

the use the following addresses then

play23:01

you'd manually type in the addresses

play23:05

if we're talking ipv6 we again would be

play23:08

given the ipv6 address

play23:10

and the default gateway and our prefix

play23:13

and we would use those pieces of

play23:16

information

play23:18

again ipv4 and ipv6 are discussed in a

play23:22

later module

play23:23

so here we're just talking our logical

play23:26

addressing

play23:27

for communication

play23:30

moving on let's talk about ports and

play23:33

interfaces

play23:34

so how do we plug things in so

play23:37

we have copper based switches and these

play23:40

will use

play23:41

ethernet cables the ethernet has an rj45

play23:45

on the end

play23:46

these are copper they're twisted copper

play23:49

all the way through

play23:50

if we have a fiber optic connection we

play23:52

actually have fiber cable

play23:54

and fiber has multiple different types

play23:56

of media types

play23:58

and plugins kind of just depends on what

play24:01

type of device we have

play24:03

and what plug that we actually have

play24:05

connected to that device

play24:08

next we have wireless we have a lot of

play24:11

wireless devices

play24:13

so one thing they all have in common is

play24:16

if we're dealing with copper we have to

play24:18

have some type of network interface card

play24:20

with the appropriate interface a nic

play24:24

nic if we have a fiber optic we have to

play24:26

have a fiber optic

play24:28

nick with again the appropriate

play24:29

interface

play24:31

if we have wireless we'll have a

play24:33

wireless nic

play24:35

that allows us to connect to that medium

play24:39

using the choice of media

play24:42

so to connect to a wireless network we

play24:44

have to have a wireless card

play24:46

to connect to a fiber network we have to

play24:47

have a fiber card

play24:49

if we have to connect to a copper based

play24:51

network we have to have a

play24:53

well fire an ethernet card

play24:56

which i mean most network cards are

play24:58

going to be rj45

play25:00

which would be this copper connection

play25:02

just because

play25:03

that's the basic standard

play25:06

so again the three types copper fiber

play25:09

wireless

play25:10

copper is going to be the most prevalent

play25:12

and that's going to be

play25:14

some type of ethernet cable with a rj45

play25:18

if you're looking at like a phone cable

play25:20

an rj45 looks very similar

play25:23

to that but a phone cable is an rj11

play25:28

it's slightly

play25:29

smaller than a rj45 connection

play25:35

so once we actually have a physical

play25:38

connection let's say with copper

play25:40

how do things communicate they actually

play25:42

have to have a logical address assigned

play25:45

hence the next section being configuring

play25:47

the ip addresses

play25:49

so again back to this screen so how do

play25:52

we get to this screen

play25:54

well first we're assuming we have to

play25:57

manually configure the addresses

play25:59

we are assuming no dynamic address

play26:01

assignment

play26:02

is available meaning there is no dhcp

play26:05

server

play26:06

running on the network so

play26:10

how do we get to the screen if you're in

play26:12

windows we'd go to control panel

play26:14

networking sharing center would be

play26:16

looking at some type of an adapter

play26:18

setting

play26:18

and we would be looking at the

play26:20

properties of our network adapter from

play26:24

there we'd be going to the ipv4 settings

play26:27

and that is where we can manually set

play26:29

our ip address

play26:30

subnet default gateway and dns

play26:34

if we actually do have dhcp

play26:38

we would leave them as a pin

play26:40

automatically

play26:42

and that would be all we need to do

play26:45

if we're talking ipv6 ipv6

play26:49

actually has a

play26:52

dynamic address association without dhcp

play26:56

that's outside the scope of this video

play27:01

for some reason we're going to talk

play27:02

about giving a switch an ip address this

play27:04

early in the course

play27:06

so we can actually configure aip address

play27:09

to a layer 2 switch

play27:11

so for management capability so if we

play27:14

go to our switch go to our global

play27:17

configuration mode

play27:19

and we go to interface vlan 1 that's a

play27:22

virtual interface

play27:24

and we can assign an ip address to that

play27:27

switch

play27:28

by typing ip address type in the address

play27:31

of the switch that we want to give it

play27:33

and the appropriate subnet mask that

play27:36

should be the same

play27:37

ip address network that that switch is

play27:40

attached to

play27:43

we actually have a lab doing basic

play27:45

configuration

play27:47

configuring the switches configuring the

play27:50

pcs and setting up a switch virtual

play27:52

interface

play27:55

lastly once everything is set up we need

play27:57

to

play27:58

verify connectivity so how we do

play28:02

that is by doing certain commands like

play28:05

ping and trace route which

play28:08

again is outside the scope of this video

play28:10

which we'll be covering in our next

play28:12

video

play28:13

so now that we've covered basic device

play28:15

configuration

play28:16

and we've talked about how to configure

play28:19

addresses and how

play28:20

physical media connections and things of

play28:22

that nature

play28:24

we should have the ability to do some

play28:26

basic

play28:28

configuration so we're going to have a

play28:30

lab where we configure

play28:31

basic commands

play28:35

or basic features of a switch and router

play28:38

using basic cisco ios commands

play28:42

we're going to set up topologies set up

play28:44

our pcs

play28:45

configure a very basic level switch

play28:48

configuration

play28:51

to reinforce kind of what we've learned

play28:55

what did we learn in this module we

play28:56

learned about the overall

play28:58

structure of the cisco ios we learned

play29:01

about

play29:02

how to navigate the ios and we've

play29:04

learned about

play29:05

the device mediums that will allow us to

play29:08

connect

play29:09

our in devices to other networking

play29:12

devices

play29:13

again copper fiber optic or wireless and

play29:15

we talked about basic ip addressing

play29:18

and how to allocate them both statically

play29:20

and dynamically

play29:22

to in devices and that

play29:25

is it for this lecture or this module

play29:28

if you have any questions please reach

play29:31

out thank you

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
NetworkingCCNACisco IOSDevice ConfigurationCommand LineSwitchesRoutersIP AddressingNetwork DevicesBasic Setup