Chapter 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Privileged EXEC Mode

+ Mode allows access to all commands and features + The user can use any monitoring commands and execute configuration and management commands

PuTTY Tera Term SecureCRT OS X Terminal

4 Terminal Emulation Programs:

Use a keyboard to run CLI-based network programs Use a keyboard to enter text and text-based commands View output on a monitor

A CLI-based network operating system like the Cisco IOS on a switch or router enables a network technician to:

network operating system

A ___________ enables device hardware to function and provides an interface for users to interact.

Ctrl-Shift-6

All-Purpose break sequence. Use to abort DNS lookups, traceroutes, pings

Prompt>command (keyword or argument) Ex: Switch>show ip protocols Ex: Switch>ping 192.168.10.5

Basic IOS Command structure

Telnet

Best practice dictates to use SSH instead of ______ for remote management CLI connections.

device name

By default, every prompt begins with the ______. Following the name, the remainder of the prompt indicates the mode.

Cisco IOS

Cisco Internetwork Operating System

login

Command that enables a password after it has been set with the command "password"

Tab

Completes a partial command name entry

prompt ending in #

Default Device Prompt for Privileged EXEC Mode

prompt ending in >

Default Device Prompt for User Exec Mode

(config)#

Global configuration mode is identified by a prompt that ends with _____ after the device name

start with a letter contain no spaces end with a letter or digit use only letters, digits and dashes be less than 64 characters in length

Hostnames should:

service password-encryption from the global config

How do you encrypt passwords in the configuration file?

From global config mode, Password [enter a password]

How do you put a password for console access to user EXEC mode?

From global config Enter command: line VTY [VTY line range] Enter: password [password] Enter: login

How do you secure a VTY line?

From global config Enter command: line console [console number] Enter: password [password] Enter: login

How do you secure a console line?

banner motd # [message] #

How do you set a banner?

show running-config

If you wanted to see the running configuration file what command would you use?

show startup-config (sh start)

If you wanted to see the startup configuration file what command would you use?

1. reload 2. copy startup-config running-config

If you were making change to the configuration file, and wanted to revert back to the startup-config what are two commands you can use to do so?

By setting a banner motd

In addition to requiring passwords, what is another vital method for declairing that only authroized personnel should attempt to gain entry into a device?

User Exec Mode

Mode allows access to only a limited number of basic monitoring commands It is often referred to as "view only" mode

Use a mouse to make selections and run programs Enter text and text-based commands View output on a monitor

Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to:

enable

Privileged EXEC mode is sometimes called ______ mode.

Up Arrow or Ctrl-P

Recalls command in the history buffer, beginning with the most recent commands

Secure Shell (SSH)

Recommended method for remote management because it provides a secure connection.

Ctrl-R or Ctrl-I or Ctrl-L

Redisplays the system prompt and command line after a console message is received.

hierarchical structure

The Cisco IOS modes use a _____ and are quite similar for both switches and routers.

type of device being used and the required features

The IOS version is dependent on the

CLI, GUI

The ____ is less resource intensive and very stable when compared to a _____.

Console

The advantage of using a ____ port is that the device is accessible even if no networking services have been configured.

Switch(config-if)#

The default prompt for interface configuration mode of a switch is ____

the brief amount of time the device will be offline, causing network downtime.

The downside to using the reload command to remove an unsaved running configuration is ?

startup-config

The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot.

running-config

The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately.

web browser-based GUI.

The most common method for configuring a home router is by using a

From privileged EXEC mode command: erase startup-config

The startup configuration is removed by using the ___ command

command-line interface (CLI) or a graphical user interface (GUI).

The user can interact with the shell using a ____ or _____

Terminal Emulation Programs

These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes.

question mark, ?,

To access context-sensitive help, simply enter a ____ at the CLI.

Global Configuration Mode, which is commonly called global config mode.

To configure the device, the user must enter _____

Exit

To exit a sub-configuration mode and return to global configuration mode, use the ____ command.

end, CTRL+Z

To move from any sub-configuration mode to the privileged EXEC mode, enter the ____ command or enter the key combination _____.

enable

To move from user EXEC mode to privileged EXEC mode, use the ____ command.

configure terminal

To move in and out of global configuration mode, use the _____ privileged EXEC mode command.

no hostname from global config

To remove the configured hostname and return the switch to the default prompt

From privilege exec mode: copy running-config startup-config

To save changes made to the running configuration to the startup configuration file use the _____ command.

enable secret [password] from global config mode

To secure privileged EXEC access is what command?

Line Configuration Mode Interface Configuration Mode

Two common sub-configuration modes include:

Secure Shell (SSH)

Unlike a console connection, ____ connections require active networking services on the device including an active interface configured with an address.

disable

Use the _____ privileged EXEC mode command to return to user EXEC mode.

Interface Configuration Mode -

Used to configure a switch port or router network interface.

Line Configuration Mode -

Used to configure console, SSH, Telnet, or AUX access.

Telnet

User authentication, passwords, and commands are sent over the network in plaintext.

RAM (Random Access Memory)

Volatile memory. It loses all of its content when the device is powered off or restarted.

startup-config running-config

What are the two system files that store the device configuration?

show running-config from privileged EXEC made

What command verifies that passwords are now encrypted in the configuration file

They both set a password, but "enable secret" encrypts the password.

What is the difference between the effects of the two commands "enable secret" and "enable password"?

(NVRAM) Non-Volatile Random Access Memory

What type of ram does not does its contents when the device is powered off.

unique device name or hostname.

When configuring a networking device, one of the first steps is configuring a

Ctrl-C

When in any configuration mode, ends the configuration mode and returns to privaleged EXEC mode. When in setup mode, aborts back to the command prompt

Ctrl-Z

When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode

ipconfig

Windows command that shows the IP configuration settings on a PC

GUIs , CLI

____ can also fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a _____

Virtual Terminal (VTY) Lines

____ enable remote access to devices

GUIs , CLI

____ may not always be able to provide all of the features available at the ____

SVI

a logical interface used to remotely manage a switch over an IPv4 network

console

a physical port of a Cisco device that provides access to the device via a dedicated management channel, also known as out-of-band access

DHCP

a protocol that dynamically leases IPv4 addresses to DHCP-enabled end devices

Secure Shell (SSH)

a protocol to establish a remote secure CLI connection over the network

keyword

a specific parameter defined in the operating system parameter with a predefined value to be used by an IOS command

GUI

a user-friendly interface that provides an interaction between a user and an OS through a graphical environment

Telnet

an insecure method of remotely establishing a CLI session through a virtual interface, over a network.

Cisco Internetwork Operating System (IOS)

collection of network operating systems used by Cisco networking devices.

traceroute

command to check the path that a packet takes to reach a destination

configure terminal

command to enter Global Configuration Mode

interface vlan 1

command to enter Interface sub-configuration mode

enable

command to enter Privilege EXEC Mode

hostname

command to name a device

ping

command to verify connectivity between the source (the device where the command is issued) and the destination (IP address used as argument)

Switch(config-line)#

default prompt for line configuration mode of a switch is ______

Context-sensitive help

enables you to quickly find which commands are available in each command mode, which commands start with specific characters or group of characters, and which arguments and keywords are available to particular commands.

startup configuration

file that is stored in NVRAM and that contains the configuration that has been saved on a device to be used upon startup or reboot

running configuration

file that is stored in RAM and that contains the configuration that is being done on a device

GUI

more user-friendly and requires less knowledge of the underlying command structure that controls the system.

argument

not predefined; a value or variable defined by the user parameter that has to be supplied by the user to an IOS command

exit

o return to the privileged EXEC mode, enter the ___ global config mode command.

firmware

operating system on home routers

shell

portion of operating system that interacts with applications and the user

kernel

portion of operating system that interfaces directly with computer hardware

Command-Line Interface (CLI)

requires very little overhead to operate. However, it does require that the user have knowledge of the underlying structure that controls the system.

Cisco IOS

term that represents the operating systems used by Cisco networking devices

line, management line type, number line console 0

to enter line sub-configuration mode, you use the _____ command followed by the ____ and _____ you wish to access.

Command-Line Interface (CLI)

user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt. The system executes the command, often providing textual output.

Command syntax check

verifies that a valid command was entered by the user. if the interpreter cannot understand the command being entered, it will provide feedback describing what is wrong with the command.

Startup-config running-config

what 2 config files display most passwords in plaintext?

From privileged EXEC mode: reload

you can restore the device to its previous configuration by using the _____ command to restore the startup-config.


Kaugnay na mga set ng pag-aaral

biol5c final (everything else :'))

View Set

HEE 302 Chapters 1-7 True and False

View Set

GA Infratemporal Fossa and Oral Cavity

View Set

Thomas Hobbes - Leviathan - Book 1, Ch. 1-3

View Set

Blood vessels and their functions

View Set

Cognition Mastery Quiz prepU quiz

View Set

Physiological and Psychological Responses to Stress - Mental Health

View Set