CCNA Chapter 2

Ace your homework & exams now with Quizwiz!

How do you set motd banner?

1. Enter Global config mode 2. Enter banner command "banner motd # (message) #

How do you configure a hostname on a device?

1. Enter private exec mode 2. enter global config mode (config t) 3. enter the command: hostname (insert name here) 4. After the command is executed, the prompt will change to it.

How do you save a running config file?

1. From priv exec mode, enter: Switch# copy running-config startup-config

How do you set the VTY password?

1. Get into priv exec "enable" 2. Enter global config mode 3. Enter line configuration mode for VTY for 15 lines "line vty 0 15" 4. Set password "password (password)" 5. Login

How do you secure the privileged EXEC access?

1. Get into priv exec mode 2. Set password using "enable secret (password)" command

How do you address the switch for vlan to allow for remote accessing?

1. interface vlan 1 - Used to navigate to the interface configuration mode from the global configuration mode 2. ip address 192.168.10.2 255.255.255.0 - Configures the IP address and subnet mask for the switch (this is just one of many possible combinations for an IP address and subnet mask) 3. no shutdown - Administratively enables the interface to an active status

Command Line Interface

A CLI (command line interface) is a user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line, receives a response back from the system, and then enters another command, and so forth.

What configurations are required for a cisco switch for it to function?

A Cisco IOS switch is one of the simplest devices that can be configured on a network. This is because there are no configurations that are required prior to the device functioning. At its most basic, a switch can be plugged in with no configuration, but it will still switch data between connected devices.

Interface Mode

A sub config mode that configures network interfaces (Fa0/0, S0/0/0

Line Mode

A sub-config for configuring one of the physical or virtual lines (console, AUX, VTY)

Subnet Mask

A subnet mask is a special type of IPv4 address that, coupled with the IP address, determines which particular subnet of a larger network the device is a member.

SVI

A switch virtual interface (SVI) is a VLAN of switch ports represented by one interface to a routing or bridging system. There is no physical interface for the VLAN and the SVI provides the Layer 3 processing for packets from all switch ports associated with the VLAN.

What is a virtual interface?

A virtual interface means that there is no physical hardware on the device associated with it.

What is the AUX method of connecting to a cisco device?

Auxiliary Port -It is an older method that establishes a CLI session remotely via a telephone dial up connection using a modem connected the auxiliary (AUX) port of a router. It is similar to console in that it doesn't need networking services to be configured or available.

What is the firmware on computers?

BIOS

BIOS

Basic Input Output System

Is there any authentication required to access the user exec mode or privileged?

By default, there is no authentication required to access the user or privileged EXEC mode from the console. However, it is a good practice to ensure that authentication is configured during the initial configuration.

The operating system used for Cisco devices?

Cisco IOS

What are the several ways to access the CLI environment on a Cisco IOS Device?

Console, Telnet or SSH, and AUX port.

What are the three forms of help available when using CLI?

Context-Sensitive Help Command Syntax Check Hot Keys and Shortcuts

How do you solve conflict between static IP addresses and DHCP addressing?

Convert the network device with the static IP address to a DHCP client; or on the DHCP server, exclude the static IP address of the end device from the DHCP scope.

What does the command show startup-config do?

Displays the saved configuration located in NVRAM.

What is the structure of an IPv4 called?

Dotted decimal notation and it is represented with four decimal numbers between 0 and 255.

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network. DHCP assigns an IP address when a system is started, for example.

EEPROM

EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is a type of non-volatile memory used in computers and other electronic devices to store small amounts of data that must be saved when power is removed, e.g., calibration tables or device configuration.

What are cisco modes?

Each mode has a distinctive prompt and is used to accomplish particular tasks with a specific set of commands that are available only to that mode. For example, global configuration mode allows a technician to configure settings on the device that affects the device as a whole, such as configuring a name for the device.

What the two types of commands use for securing priv exec?

Enable secret and enable password. It is recommended to use the enable secret command. The enable secret command provides greater security because the password is encrypted.

Enable Secret

Encrypted, limits access to the privileged EXEC mode

What command do you use to return to priviliged EXEC mode?

Enter "end" or use Ctrl-Z

What command do you use to leave global config?

Exit

Flash Memory

Flash memory is an electronic non-volatile computer storage medium that can be electrically erased and reprogrammed.

How do you secure User EXEC access for console?

For console: 1. Get into priv exec mode 2. Enter global config mode (config t) 3. Enter the line configuration mode for the console "Line console 0" (0 being the console line you are configuring and most switches only have 1) 4. Set password (password "insert password") 5. Require authentication upon login: login

What are the console access security features?

For many IOS devices, console access does not require any form of security, by default. However, the console should be configured with passwords to prevent unauthorized device access. In the event that a password is lost, there is a special set of procedures for bypassing the password and accessing the device.

How do you reach global config mode?

Global configuration mode and all other more specific configuration modes can only be reached from the privileged EXEC mode.

Hardware

Hardware: The physical part of a computer including underlying electronics.

History (characteristic)

History - descriptions of how the command is implemented relative to the IOS version

What happens when you show running config without entering the service password-encryption command?

If you execute the show running-config or show startup-config command prior to the service password-encryption command being executed, the unencrypted passwords are visible in the configuration output.

GUI

In computing, a graphical user interface is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.

IOS

Internetworking Operating System

What are some guidelines for naming?

It should start with a letter, contain no spaces, be less than 64 characters and use only letters digits and dashes.

What is Privileged EXEC

It the mode used for detailed examination of your device. It allows all monitoring commands as well as execution of config and management commands

Kernel

Kernel: Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

Enable Password

Limits access to the privileged EXEC mode.

VTY Password

Limits device access over Telnet

Console password

Limits device access using the console connection

Mode (characteristic)

Mode - the configuration mode on the device where the command is entered

Are commands case sensitive?

No

Nonvolatile

Non-volatile storage is computer memory that can get back stored information even when not powered

Can you configure with user EXEC mode?

Not really. The user EXEC mode allows only a limited number of basic monitoring commands. This is often referred to as view-only mode. The user EXEC level does not allow the execution of any commands that might change the configuration of the device.

Where is the location of an IOS File (Cisco)?

On a memory area called flash.

Where is the configuration file stored?

On the NVRAM

What is the biggest disadvantage of telnet?

One of the greatest disadvantages of this protocol is that all data, including usernames and passwords, is sent in clear text, which is a potential security risk.

OS

Operating System - An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.

Out-of-Band Access

Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.

What is the basic IOS Command Structure?

Prompt - Command - Space - Argument Example: Switch>ping 192.169.10.5 The prompt is the switch, the ping is the command, and the ip is the keyword argument.

What are some examples of terminal emulators?

PuTTY, Tera Term, etc.

What do you do after erasing the startup config from nvram?

Reload the device to erase running config from the RAM

What are your three options after changing a configuration file?

Return the device to its original configuration. Remove all configurations from the device. Make the changed configuration the new startup configuration.

What does global config look like when you enter the mode?

Router (config)# Switch (config)#

What is the main difference between Telnet and SSH?

SSH is encrypted and has better

Shell

Shell: The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

What is the basic examination command?

Show

What does show version show?

Software version - IOS software version (stored in flash) Bootstrap version - Bootstrap version (stored in Boot ROM) System up-time - Time since last reboot System restart info - Method of restart (e.g., power cycle, crash) Software image name - IOS filename stored in flash Router type and processor type - Model number and processor type Memory type and allocation (shared/main) - Main Processor RAM and Shared Packet I/O buffering Software features - Supported protocols/feature sets Hardware interfaces - Interfaces available on the device Configuration register - Sets bootup specifications, console speed setting, and related parameters

What command do you use to take a device from privileged EXEC mode to global config mode?

Switch# config t

What port does SSH use by default?

TCP Port 22

What port does Telnet use by default?

TCP Port 23

What is Telnet (Cisco Devices)?

Telnet is a protocol for remotely establishing a CLI session of a device, through a virtual interface, over a network.

DNS

The DNS server address is the IP address of the Domain Name System (DNS) server, which is used to translate IP addresses to web addresses, such as www.cisco.com. All devices on the Internet are assigned and reached via an IP address. However, it is easier for people to remember names over numbers. Therefore, websites are given names for simplicity. The DNS server is used to maintain the mapping between the IP addresses and names of various devices.

SSH

The Secure Shell (SSH) protocol provides a remote login similar to Telnet, except that it uses more secure network services. SSH provides stronger password authentication than Telnet and uses encryption when transporting session data. This keeps the user ID, password, and the details of the management session private. As a best practice, use SSH instead of Telnet whenever possible.Shell Protocol

Console

The console port is a management port that provides out-of-band access to Cisco device The advantage of using a console port is that the device is accessible even if no networking services have been configured, such as when performing an initial configuration of the networking device.

What do you use to config a device: AUX or Console?

The console port is preferred over the AUX port for troubleshooting because it displays startup, debugging, and error messages by default.

Context Sensitive Help

The context-sensitive help provides a list of commands and the arguments associated with those commands within the context of the current mode. To access context-sensitive help, enter a question mark, ?, at any prompt. There is an immediate response without the need to use the Enter key.

What is the default gateway?

The default gateway address is the IP address of the router interface used for network traffic to exit the local network.

What command is use to move between User EXEC and Privileged EXEC?

The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively.

Default (characteristic)

The manner in which the command is implemented on a device with a default configuration

Syntax (characteristic)

The most detailed version of the syntax for a command that can be found

What must a network device have in order to be configured with Telnet?

The network device must have at least one active interface configured with an Internet address, such as an IPv4 address. Cisco IOS devices include a Telnet server process that allows users to enter configuration commands from a Telnet client

Global Config Mode

The primary configuration mode is called global configuration or global config. From global configuration mode, CLI configuration changes are made that affect the operation of the device as a whole. The global configuration mode is accessed before accessing specific configuration modes.

If you press exit in privileged EXEC mode what happens?

The session ends.

User EXEC Modes

The user EXEC mode has limited capabilities but is useful for some basic operations. The user EXEC mode is at the most basic level of the modal hierarchical structure. This mode is the first mode encountered upon entrance into the CLI of an IOS device.

What does a VTY line allow people to do?

The vty lines allow access to a Cisco device via Telnet. By default, many Cisco switches support up to 16 vty lines that are numbered 0 to 15.

Show Version

This command displays information about the currently loaded IOS version, along with hardware and device information. If you are logged into a router or switch remotely, the show version command is an excellent means of quickly finding useful summary information about the particular device to which you are connected.

What does the command "show interface" do?

This command displays statistics for all interfaces on the device. To view the statistics for a specific interface, enter the show interfaces command followed by the specific interface type and slot/port number.

How do you encrypt plain text files?

Through the service password encryption command. The service password-encryption command applies weak encryption to all unencrypted passwords. This encryption applies only to passwords in the configuration file, not to passwords as they are sent over media. The purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file.

How do you configure DHCP on a PC?

To configure DHCP on a Windows PC, you only need to select "Obtain an IP address automatically" and "Obtain DNS server address automatically".

How do you move between submodes?

To move from any submode of the global configuration mode to another "immediate" submode of the global configuration mode, simply enter the corresponding command that is normally entered from global configuration mode.

How do you move from any of the sub modes of the global config to the mode one step above it?

To move from any submode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command.

How do you move from any submode right back to privileged exec?

To move from any submode of the privileged EXEC mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.

How do you undo the effects of a command?

To undo the effects of a command, preface the command with the no keyword. For example, to remove the name of a device, use: Sw-Floor-1 (config)# no hostname Switch(config)#

Firmware

Traditionally, firmware is CPU code that resides on a unmodifiable ROM that is necessary for a hardware device to boot and load an operating system. Basically, it is the programming on hardware separate of the actual OS system the interacts between the hardware and the OS. This also can be simply a name for things embedded permanently in devices like a remote control, basic toy game, etc.

How can you tell the difference from User EXEC mode and Privileged?

User Exec Has - Switch> while privileged Has Switch#

What is the hierarchical order for modes from most basic to most specialized?

User Executive, Privileged Executive, Global Config Mode and other random config modes.

How is configuration initially done to a cisco device?

Using the console port, you attach a special networking cable that connects the Cisco router to the computer. You then use terminal emulation software to configure it.

What are static IP addresses used for usually?

Usually static IP addresses are used with servers and printers in a small- to medium-sized business network, while employee devices use DHCP-allocated IP address information.

Volatile

Volatile memory, contrary to non-volatile memory, is computer memory that requires power to maintain the stored information; it retains its contents while powered on but when the power is interrupted the stored data is immediately lost.

The More Prompt

When a command returns more output than can be displayed on a single screen, the --More-- prompt appears at the bottom of the screen. When a --More-- prompt appears, press the Space bar to view the next portion of output. To display only the next line, press the Enter key. If any other key is pressed, the output is cancelled and you are returned to the prompt.

What happens to the OS when you turn on the computer (Where does it load from)?

When a computer is powered on, it loads the OS, normally from a disk drive, into RAM.

What is the basic structure of command prompts?

When using the CLI, the mode is identified by the command-line prompt that is unique to that mode. By default, every prompt begins with the device name. Following the name, the remainder of the prompt indicates the mode. For example, the default prompt for the global configuration mode on a switch would be: Switch(config)#

Does cisco IOS contain a telnet client?

Yes

How do you reach special (sub config) configuration modes?

You can reach it from global config mode.

What must you do to a switch when erasing the config in addition to the erase startup-config command to return it to default settings?

You must delete the vlan.dat.file. 1. Enter priv exec 2. Enter the command "delete (filename - vlan.dat)

What type of software do you need to configure a Cisco device?

You need a terminal emulation program for connecting to a networking device, done either by a serial connection over a console port or by a Telnet/SSH connection.

How do you clear all the configurations on a device?

You use the "erase startup-config" at Priv Exec mode

When should the console be used to access a Cisco IOS device?

You use the console when either you are initially configuring a device or when the networking services have failed and remote access is not possible.

How do initiate a reload?

by using the command "reload" from priv exec

Usage Guidelines (characteristic)

guidelines describing specifically how to implement the command

How do you display the IP configuration on a PC?

ipconfig

Command for showing running config?

show running-config


Related study sets

Section A Question Set: Basic Accounting Concepts

View Set

Chapter 8 - Strategy Formulation and Implementation

View Set

Conservation Biology (chapters 1-3)

View Set

Chapter 64: Arthritis and Connective Tissue Diseases

View Set