01 Intro to CLI.pptx
-
Upload
gurkansengul -
Category
Documents
-
view
217 -
download
0
Transcript of 01 Intro to CLI.pptx
-
8/10/2019 01 Intro to CLI.pptx
1/27
2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Introduction to CLI
Network Basics
-
8/10/2019 01 Intro to CLI.pptx
2/27
Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2.1 IOS Bootcamp
-
8/10/2019 01 Intro to CLI.pptx
3/27
Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
Purposeof OS
PC operating systems (Windows 8 & OS X) perform technicalfunctions that enable
Use of a mouse
View output
Enter text
Switch or router IOS provides options to
Configure interfaces
Enable routing and switching functions
All networking devices come with a default IOS
Possible to upgrade the IOS version or feature set
-
8/10/2019 01 Intro to CLI.pptx
4/27
Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
Location of the Cisco IOS
IOS stored in Flash Non-volatile storagenot lost when power is lost
Can be changed or overwritten as needed
Can be used to store multiple versions of IOS
IOS copied from flash to volatile RAM
Quantity of flash and RAM memory determines IOS that can be used
-
8/10/2019 01 Intro to CLI.pptx
5/27
Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS
IOS Functions
Major functions performed or enabled by Cisco routers andswitches
include:
-
8/10/2019 01 Intro to CLI.pptx
6/27
Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS Device
Console Access Method
The most common methods to access the Command Line Interface
Console
Telnet or SSH
AUX port
-
8/10/2019 01 Intro to CLI.pptx
7/27Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Accessing a Cisco IOS Device
Console Access Method
Console port Device is accessible even if no networking services have been
configured (out-of-band)
Need a special console cable
Allows configuration commands to be entered
Should be configured with passwords to prevent unauthorized access
Device should be located in a secure room so console port can notbe easily accessed
-
8/10/2019 01 Intro to CLI.pptx
8/27
-
8/10/2019 01 Intro to CLI.pptx
9/27Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Primary Modes
-
8/10/2019 01 Intro to CLI.pptx
10/27Presentation_ID 10 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Global Configuration Mode and Submodes
-
8/10/2019 01 Intro to CLI.pptx
11/27Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Navigating between IOS Modes
-
8/10/2019 01 Intro to CLI.pptx
12/27Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Navigating the IOS
Navigating between IOS Modes (cont.)
-
8/10/2019 01 Intro to CLI.pptx
13/27Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
IOS Command Structure
-
8/10/2019 01 Intro to CLI.pptx
14/27Presentation_ID 14 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
Context Sensitive Help
-
8/10/2019 01 Intro to CLI.pptx
15/27Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
Command Syntax Check
-
8/10/2019 01 Intro to CLI.pptx
16/27Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Command Structure
Hot Keys and Shortcuts
Tab- Completes the remainder of a partially typed command orkeyword
Ctrl-R- Redisplays a line
Ctrl-A -Moves cursor to the beginning of the line
Ctrl-Z- Exits configuration mode and returns to user EXEC
Down Arrow- Allows the user to scroll forward through formercommands
Up Arrow- Allows the user to scroll backward through former
commands Ctrl-Shift-6- Allows the user to interrupt an IOS process such
as ping or traceroute
Ctrl-C- Aborts the current command and exits the configurationmode
-
8/10/2019 01 Intro to CLI.pptx
17/27
-
8/10/2019 01 Intro to CLI.pptx
18/27Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2.2 Getting Basic
-
8/10/2019 01 Intro to CLI.pptx
19/27Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Why the Switch
Lets focus on Creating a two PC network connected via a switch
Setting a name for the switch
Limiting access to the device configuration
Configuring banner messages Saving the configuration
-
8/10/2019 01 Intro to CLI.pptx
20/27Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Device Names
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
Without names, networkdevices are difficult to
identify for configuration
purposes.
-
8/10/2019 01 Intro to CLI.pptx
21/27Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hostnames
Configuring Hostnames
Hostnames allowdevices to beidentified bynetworkadministratorsover a network orthe Internet
-
8/10/2019 01 Intro to CLI.pptx
22/27
-
8/10/2019 01 Intro to CLI.pptx
23/27
-
8/10/2019 01 Intro to CLI.pptx
24/27Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Securing User EXEC Access
Console port must be secured
reduces the chance of unauthorized personnel
physically plugging a cable into the device and gainingdevice access
vty lines allow access to a Cisco device via Telnet
number of vty lines supported varies with the type of
device and the IOS version
-
8/10/2019 01 Intro to CLI.pptx
25/27
Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Encrypting Password Display
service password-encryption
prevents passwordsfrom showing up asplain text whenviewing theconfiguration
purpose of thiscommand is to keepunauthorizedindividuals fromviewing passwords inthe configuration file
once applied,removing theencryption servicedoes not reverse theencryption
-
8/10/2019 01 Intro to CLI.pptx
26/27
Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Limiting Access to Device Configurations
Banner Messages
important part ofthe legal processin the event thatsomeone isprosecuted forbreaking into adevice
wording thatimplies that alogin is "welcome"or "invited" is notappropriate
often used for
legal notificationbecause it isdisplayed to allconnectedterminals
-
8/10/2019 01 Intro to CLI.pptx
27/27
Saving Configurations
Configuration Files Switch# reload
System configurationhas been modified.Save? [yes/no]: n
Proceed with reload?[confirm]
startup configuration isremoved by usingthe erase startup-configSwitch# erase startup-config
On a switch also issue
the delete vlan.datSwitch# delete vlan.dat
Delete filename [vlan.dat]?
Delete flash:vlan.dat?[confirm]