01 Intro to CLI.pptx

download 01 Intro to CLI.pptx

of 27

Transcript of 01 Intro to CLI.pptx

  • 8/10/2019 01 Intro to CLI.pptx

    1/27

    2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

    Introduction to CLI

    Network Basics

  • 8/10/2019 01 Intro to CLI.pptx

    2/27

    Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    2.1 IOS Bootcamp

  • 8/10/2019 01 Intro to CLI.pptx

    3/27

    Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Cisco IOS

    Purposeof OS

    PC operating systems (Windows 8 & OS X) perform technicalfunctions that enable

    Use of a mouse

    View output

    Enter text

    Switch or router IOS provides options to

    Configure interfaces

    Enable routing and switching functions

    All networking devices come with a default IOS

    Possible to upgrade the IOS version or feature set

  • 8/10/2019 01 Intro to CLI.pptx

    4/27

    Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Cisco IOS

    Location of the Cisco IOS

    IOS stored in Flash Non-volatile storagenot lost when power is lost

    Can be changed or overwritten as needed

    Can be used to store multiple versions of IOS

    IOS copied from flash to volatile RAM

    Quantity of flash and RAM memory determines IOS that can be used

  • 8/10/2019 01 Intro to CLI.pptx

    5/27

    Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Cisco IOS

    IOS Functions

    Major functions performed or enabled by Cisco routers andswitches

    include:

  • 8/10/2019 01 Intro to CLI.pptx

    6/27

    Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing a Cisco IOS Device

    Console Access Method

    The most common methods to access the Command Line Interface

    Console

    Telnet or SSH

    AUX port

  • 8/10/2019 01 Intro to CLI.pptx

    7/27Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing a Cisco IOS Device

    Console Access Method

    Console port Device is accessible even if no networking services have been

    configured (out-of-band)

    Need a special console cable

    Allows configuration commands to be entered

    Should be configured with passwords to prevent unauthorized access

    Device should be located in a secure room so console port can notbe easily accessed

  • 8/10/2019 01 Intro to CLI.pptx

    8/27

  • 8/10/2019 01 Intro to CLI.pptx

    9/27Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Navigating the IOS

    Primary Modes

  • 8/10/2019 01 Intro to CLI.pptx

    10/27Presentation_ID 10 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Navigating the IOS

    Global Configuration Mode and Submodes

  • 8/10/2019 01 Intro to CLI.pptx

    11/27Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Navigating the IOS

    Navigating between IOS Modes

  • 8/10/2019 01 Intro to CLI.pptx

    12/27Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Navigating the IOS

    Navigating between IOS Modes (cont.)

  • 8/10/2019 01 Intro to CLI.pptx

    13/27Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Command Structure

    IOS Command Structure

  • 8/10/2019 01 Intro to CLI.pptx

    14/27Presentation_ID 14 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Command Structure

    Context Sensitive Help

  • 8/10/2019 01 Intro to CLI.pptx

    15/27Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Command Structure

    Command Syntax Check

  • 8/10/2019 01 Intro to CLI.pptx

    16/27Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Command Structure

    Hot Keys and Shortcuts

    Tab- Completes the remainder of a partially typed command orkeyword

    Ctrl-R- Redisplays a line

    Ctrl-A -Moves cursor to the beginning of the line

    Ctrl-Z- Exits configuration mode and returns to user EXEC

    Down Arrow- Allows the user to scroll forward through formercommands

    Up Arrow- Allows the user to scroll backward through former

    commands Ctrl-Shift-6- Allows the user to interrupt an IOS process such

    as ping or traceroute

    Ctrl-C- Aborts the current command and exits the configurationmode

  • 8/10/2019 01 Intro to CLI.pptx

    17/27

  • 8/10/2019 01 Intro to CLI.pptx

    18/27Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    2.2 Getting Basic

  • 8/10/2019 01 Intro to CLI.pptx

    19/27Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Hostnames

    Why the Switch

    Lets focus on Creating a two PC network connected via a switch

    Setting a name for the switch

    Limiting access to the device configuration

    Configuring banner messages Saving the configuration

  • 8/10/2019 01 Intro to CLI.pptx

    20/27Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Hostnames

    Device Names

    Some guidelines for naming conventions are that names should:

    Start with a letter

    Contain no spaces

    End with a letter or digit

    Use only letters, digits, and dashes

    Be less than 64 characters in length

    Without names, networkdevices are difficult to

    identify for configuration

    purposes.

  • 8/10/2019 01 Intro to CLI.pptx

    21/27Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Hostnames

    Configuring Hostnames

    Hostnames allowdevices to beidentified bynetworkadministratorsover a network orthe Internet

  • 8/10/2019 01 Intro to CLI.pptx

    22/27

  • 8/10/2019 01 Intro to CLI.pptx

    23/27

  • 8/10/2019 01 Intro to CLI.pptx

    24/27Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Limiting Access to Device Configurations

    Securing User EXEC Access

    Console port must be secured

    reduces the chance of unauthorized personnel

    physically plugging a cable into the device and gainingdevice access

    vty lines allow access to a Cisco device via Telnet

    number of vty lines supported varies with the type of

    device and the IOS version

  • 8/10/2019 01 Intro to CLI.pptx

    25/27

    Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Limiting Access to Device Configurations

    Encrypting Password Display

    service password-encryption

    prevents passwordsfrom showing up asplain text whenviewing theconfiguration

    purpose of thiscommand is to keepunauthorizedindividuals fromviewing passwords inthe configuration file

    once applied,removing theencryption servicedoes not reverse theencryption

  • 8/10/2019 01 Intro to CLI.pptx

    26/27

    Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Limiting Access to Device Configurations

    Banner Messages

    important part ofthe legal processin the event thatsomeone isprosecuted forbreaking into adevice

    wording thatimplies that alogin is "welcome"or "invited" is notappropriate

    often used for

    legal notificationbecause it isdisplayed to allconnectedterminals

  • 8/10/2019 01 Intro to CLI.pptx

    27/27

    Saving Configurations

    Configuration Files Switch# reload

    System configurationhas been modified.Save? [yes/no]: n

    Proceed with reload?[confirm]

    startup configuration isremoved by usingthe erase startup-configSwitch# erase startup-config

    On a switch also issue

    the delete vlan.datSwitch# delete vlan.dat

    Delete filename [vlan.dat]?

    Delete flash:vlan.dat?[confirm]