NDC Chapter 2
NDC Chapter 2
1
Network Devices
• Network devices are components used to connect
computers or other electronic devices together so that they
can share files or resources like printers or fax machines.
• Router
• Functions of routers
The router uses its routing table to determine the best path to
forward and send packets toward their destination the packet.
Router Components
Hardware Components
5
Router memory…
ROM: maintain instructions of POST diagnosis
• Mini IOS
• Ex. Serial Ethernet, Fast Ethernet, Token Ring, ATM, ISDN, Loopback
interfaces etc.
• Lines identify ports that allow us to connect into, and then configure, Cisco devices.
• Example Console ports, Auxiliary ports and VTY (telnet) ports and identified like
Console 0
8
9
Categories of router interfaces
Categories of interfaces Interfaces Function of interface
LAN interfaces Ethernet , Fast Used to connect router
Ethernet Ports, to LAN
Gigabit network
10
Using Lines to Configure the IOS
• The console port is generally a RJ-45 connector, and requires a rollover
cable to connect.
• The opposite side of the rollover cable connects to a PC’s serial port using
a serial terminal adapter.
• The auxiliary port functions the same with console except it support modem
commands providing dial-in access to Cisco devices. 11
• Telnet, and now SSH, are the most common
methods of remote access to routers and switches.
14
3. Locating and Loading Cisco IOS:
The IOS is typically stored in flash memory, but can
also be stored in other places such as a TFTP (Trivial File
Transfer Protocol) server.
If a full IOS image cannot be located, a scaled-down
version of the IOS is copied from ROM into RAM.
A TFTP server is usually used as a backup server for IOS
but it can also be used as a central point for storing and
loading the IOS. 15
4. Locating and Loading the Configuration File: After
the IOS is loaded, the bootstrap program searches for the
startup configuration file, known as startup-config, in
NVRAM.
Parameters including: interface addresses, routing
information, passwords…
If the startup configuration file, startup-config, is located
in NVRAM, it is copied into RAM as the running
configuration file, running-config.
16
Basics configuration of router and switch
• Most of the router manufacturers provide SDM
(Security Device Manager) software along with
the router to enable users configure the router
graphically.
18
Most commonly used mode
19
User EXEC Mode:
When you are connected to the router, you are started in user EXEC mode. The
user
Enter the command disable to exit from the privileged EXEC mode and return to
user EXEC mode. 20
Configuration Mode
• To enter configuration mode, enter the command configure
terminal and exit by pressing Ctrl-Z.
Basic Router/Switch Configuration- use the hole
configuration for the following topology
21
1. Getting Help
In any command mode, you can get a list of available commands by entering a
Router>?
To obtain a list of commands that begin with a particular character sequence, type in
Router#co?
• you didn’t configure any host name but we can disable the DNS
lookup from your cisco device.
• Example:
• Router>enable
• Router(config)#no ip domain-lookup
• Router(config)#exit 23
3. Rename the Router
• To specify or modify the host name for the router, global
configuration command HOSTNAME is used.
• DTUR1(config) #
Example
26
6. Setting Passwords
a. Console Password
• DTUR1 (config-line)#login
27
Next b. Vty lines password
• Virtual terminal lines (vty) are used to allow remote access
to the router (by telneting through its interfaces). The
router has five virtual terminal lines by default.
• DTUR1 (config-line)#login
28
Privileged Access Password
• Can have leading spaces, but they are ignored. However, intermediate
and trailing spaces are recognized
30
7. Bring up an interface
• show ip interface brief at the user privilege mode on cisco routers
The description "T1 line to DTUR1- 128 Kb/s" appears in the output of the following
EXEC commands: show startup-config, show interfaces, and show running-config
ACKNOWLEDGEMENT.
abbreviated as DORA
Router(dhcp-config)#default-router 10.1.1.1
Router(dhcp-config)#dns-server 10.1.1.2
Router(dhcp-config)#domain-name DTU.com
Router(dhcp-config)#exit
DTUR1>enable
DTUR1#show running-config
Saving
DTUR1>enable
DTUR1#write/Wr
Erasing startup configurations
DTUR1>enable
DTUR1#erase startup-config 40
no and do commands
• Use the command without the keyword no to reenable a
disabled feature or to enable a feature that is disabled by
default
Example
DTUR1(config)#int fa0/0
DTUR1(config-if)#no ip address
Disabling Logging synchronous messages
DTUR1(config)#line console 0
DTUR1(config-line)#logging synchronous 41
15. Remote Device Management (telnet & SSH)
• SSH i.e. Secure Shell and Telnet are the network protocols that serves the
same purpose that is to provide remote access to the system in order to
establish some sort of communication between the systems.
SSH encrypts the data/packets being transferred between the systems so it
cannot be Decoded by the Hackers.
In Public network mostly SSH is used for remote connection
SSH uses authentication which ensures that the source of the data is still the
same system and not another
SSH uses public and private keys, to identify hosts and users (authentication).
44
Cont..
Router#configure terminal
Router(config)#banner motd #Welcome to DTU Router#
Router(config)#enable password dtu123
Router(config)#interface fastethernet0/0
Router(config-if)#ip address 192.168.0.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#line vty 0 4
Router(config-line)#password dtuvty123
Router(config-line)#login
Router(config-line)#logging synchronous
Router(config-line)#exec-timeout 30
Router(config-line)#motd-banner 45
Testing Telnet Connectivity
PC>telnet 192.168.0.1
Password:
Router>enable
Password:
Router#
Router(config)#
If you don’t, just follow and generate the encryption keys for securing
the ssh session.
Router(config)#line vty 0
Router(config-line)#password dtu123
Router(config-line)#login
Router(config-line)#motd-banner
Router(config-line)#exit
Router(config)# 49
Testing SSH Connectivity
Open
Password:
Router>enable
Password:
Router#configure terminal
Router(config)#
52
Places to store and display syslog
messages
Place to store syslog Command to use
messages
Internal buffer (inside a switch or logging buffered [size]
router)
Syslog server Logging
53
Cont.
• seq no:timestamp%FACILTY-SEVERITY-MNEMONIC: message text
• Timestamp: Date and time of the message or event. This information appears
only if the service timestamps global configuration command is configured.
• FACILITY: This tells the protocol, module, or process that generated the message.
• Some examples are SYS for the operating system, IF for an interface…