Chapter 2 Notes PDF

Title Chapter 2 Notes
Course Networking Essentials
Institution University of Technology Sydney
Pages 13
File Size 602.5 KB
File Type PDF
Total Downloads 29
Total Views 144

Summary

Chapter 2 summary of Cisco Networking Textbook. ...


Description

Chapter 2: Configure a Network Operating System -

-

Even network devices such as routers, switches, access points and firewalls need operating systems as they are all computer based. A Network operating system o Enables device hardware to function o Provides an interface for users to interact The Cisco Internetwork Operating System (IOS) o Is a generic term for the collection of network operating systems used by Cisco networking devices

Operating Systems -

All end devices and network devices require an OS

-

As seen in the figure above: o The Kernel is the portion of the OS that interacts directly with the computer hardware o The Shell interfaces with applications and the user  Users can interact with the shell using  A Command-Line Interface (CLI)  Or a Graphical User Interface (GUI)

CLI

1

-

When using a CLI the user directly interacts with the system in a text-based environment by entering commands on the keyboard at a command prompt o The system executes the command and, often provides textual output o The CLI requires little overhead to operate o Stable in comparison to GUIs o It does however, require knowledge of the underlying structure that controls the system

-

Allow the user to interact the with the system using an environment of graphical icons, menus and windows o E.g. Windows, OS C, iOS or Android o More user friendly (less knowledge required)  More popularly used as a result Cons: o Do not provide all the features of the CLI o Fail, crash or simply not work as specified For these reasons, network devices are typically accessed through a CLI

GUI

-

-

Purpose of OS -

-

-

Through a GUI, a PC user is able to: o Use a mouse to make selections/run programs o Enter text/text-based commands o View output on a monitor A CLI-based network OS (like Cisco IOS) on a switch/router enables a network technician to: o Use a keyboard to run CLI-Based network programs o Use a keyboard to enter text/text-based commands o View output on a monitor Cisco networking devices run particular versions of the Cusco IOS o The IOS version is dependent of the type of device being used and its features  While all devices come with a default IOS and feature set, it is possible to upgrade the IOS to obtain additional capabilities o In this course you will focus primarily on Cisco IOS Release 15.x.

Access Methods -

-

Even without configuration, a Cisco IOS switch can be used to gain connectivity between connected PCs o However, configuring initial settings are a recommended best practice The most common ways to access the CLI environment and configure the device are: o Console  A ‘physical management’ port  Provides out-of-band access to a Cisco device  Out-of-band access refers to access via a dedicated management channel that is used fr device maintenance purposes only  ADV:  The device is accessible even if no networking services have been configured

2

o

Terminal emulation software can be used to input configuration commands for setting up the device

Secure Shell (SSH)  A method for establishing a secure CLI connection through a virtual interface –over a network  Unlike console connections, SSH connections require active networking services on the device  (including an active interface configured with an address)  Recommended for remote management  As it provides a secure connection o (encrypted password authentication and transport of session data) o Telnet  An insecure method of remotely establishing a CLI session through a virtual interface over a network  Unlike SSH, Telnet does not provide a securely encrypted connection  Authentication, passwords and commands are sent in plaintext over the network  Best practice dictates use of SSH over Telnet for remote management CLI connections Terminal Emulation Programs o Used for connecting to a networking device either by serial connection over a console or by remote SSH/Telnet connection o Some examples are:  PuTTY  Tera Term  Secure CRT  OS X Terminal o These programs allow you to enhance productivity by adjusting window sizes, font sizes and colour schemes o

-

-

Cisco Modes of Operation o To initially configure a Cisco device, a console connection must be established  Once consoled in, the network technician will navigate through various command modes of the IOS CLI.  The Cisco IOS modes use a hierarchical structure and both switches and routers are similar o Primary Command Modes 3

The Cisco IOS software separates management access into the following two command modes as a security feature:  User EXEC Mode o Limited Capabilities o Useful for basic operations o It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device o The user EXEC mode is identified by the CLI prompt that ends with the > symbol  Privileged EXEC Mode o Needed to execute configuration commands o Higher configuration modes (i.e. global configuration mode) can only be reached from this mode o Can be identified by the prompt ending with the # symbol Configuration Command Modes 

o

 



To configure the device, the user must enter Global Configuration Mode (commonly called ‘global config mode’) From global config mode, CLI configuration changes are made that affect the operation of the device as a whole  Identified by a prompt that ends with (config)# after the device name o E.g. Switch(config)# Accessed before other specific configuration modes  From global config mode, the user can enter different subconfiguration modes  Each of these allows the configuration of a particular part/function of the device  Two common sub-configuration modes include o Line Configuration Mode  Used to configure console, SSH, Telnet or AUX access  default prompt is Switch(config-line)# o Interface Configuration Mode 4



o

Used to configure a switch port or router network interface Default prompt = Switch(config-if)#

 Navigate between IOS Modes  Various commands are sued to move in and out of command prompts  To move from user EXEC mode to privileged EXEC mode:  Use the enable command  Use the disable command for the opposite  To move in and out of global config mode  Use the configure terminal privileged EXEC mode command  To return to privileged EXEC mode enter the exit global config mode command  There are many sub-configuration modes  E.g. to enter line sub-configuration mode: o Use the line command o Followed by the management line type and number you want to access  To exit a sub-configuration mode and return to global config mode o Use the exit command  To move from any sub-configuration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command.  To move from any sub-configuration mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z  You can also move from one sub-configuration mode to another o E.g.

Switch(config-line)# interface FastEthernet 0/1 Switch(config-if)#

Basic Device Configuration Device Names -

-

-

When configuring a networking device, one of the first setps is configuring a unique device name or hostname. Hostnames should: o Start with a letter o Have no spaces o End with a letter or digit o Only use letters/digits/dashes o Be less than 64 characters Hostnames that appear in CLI prompts can be used in various authentication processes between devices o Should be used on topology diagrams If this is not explicitly configured, a factory default name is used by the Cisco IOS o E.g. the default name for a Cisco IOS switch is “Switch”

5

If all network devices remained on their default names it would be confusing and difficult to tell them apart By choosing hostnames wisely, it is easier to remember/document/identify network devices Configuring Hostnames: o The next step is to apply the names to the device using the CLI o

-

as seen above, from the privileged EXEC mode, access the global config mode by entering the configure terminal command  From global config mode, enter the command hostname followed by the name of the switch and hit enter  (Note: to remove the configured hostname and return the switch to the default prompt use the no hostname global config command) o Always make sure the documentation is updated each time a device is added/modified  Identify devices in the documentation by the location>purpose>address Secure Device Access o Network devices should always have passwords configured to limit administrative access o Cisco IOS can be configured to use hierarchical mode passwords to allow different access privileges to a network device  All network devices should limit access as follows:  Securing Administrative Access o Secure privileged EXEC access with a password o Secure user EXEC access with a password o Secure remote Telnet access with a password  Other Tasks o Encrypt all passwords o Provide legal notification  Use strong passwords o More than 8 characters o Combination of upper and lowercase letters/numbers/special characters and/or numeric sequences o Avoid using same password for all devices o Configuring Passwords  The most important password to configure is access to the privileged EXEC mode  To secure privileged EXEC access, use the enable secret password global config command 

-

6



To secure the user EXEC access, the console port must be configured:

Enter line console configuration mode using the line console 0 global config command  The 0 is used to represent the first console interface o Next, specify the user EXEC mode password using the password password command o Finally, enable user EXEC access using the login command o Console access will now require a password before gaining access to the user EXEC mode VTY (Virtual Terminal) lines enable remote access to the device  To secure VTY lines used for SSH and Telnet: o Enter line VTY mode using theh line vty 0 15 global config command  (Many Cisco switchs support up to 16 VTY lines numbered 0-15) o Next, specify the VTY password using the password password command o Lastly, enable VTY access using the login command o



7

o

Encrypt Passwords  The startup-config and running-config files display most passwords in plaintext  This is a security threat since anyone can see the passwords used if they have access to these files  To encrypt passwords:  Use the service password-encryption global config command o (this applies weak encryption to all unencrypted passwords) o This encryption applies only to passwords in the configuration file, not to passwords as they are sent over the network

o

Banner Messages  Although passwords are one way to keep unauthorized personnel out of a network, it is vital to provide a method for declaring that only authorized personnel should attempt to gain entry into the device.  To do this, add a banner to the device output  (Note: Banners can be an important part of the legal process in the event that someone is prosecuted for breaking into a device.)  To create a banner message of the day on a network device:  Use the banner motd # the message of the day # global config command  The ‘#’ in the command syntax is called the delimiting character o This character can be any character as long as it does not occur in the message o For this reason, special characters like # are often used  After the command is executed, the banner will be displayed on all subsequent attempts ot access the device until the banner is removed  Wording is very important 8

The exact content or wording of a banner depends on the local laws and corporate policies  The banner should clearly state only authorized personnel are allowed to access the device o Any wording that implies a login is “welcome”/”invited” is inappropriate  The banner can also include scheduled system shutdowns and other information that affects all network users. Save Configurations o Save the running configuration file  There are two system files that store the device configuration:  Startup-config o The file stored in Non-volatile Random Access Memory (NVRAM) o Contains all the commands that will be used by the device upon startup o NVRAM does not lose its contents when the device is powered off  Running-config o The file stored in Random Access Memory (RAM) o Reflects the current configuration o Modifying a running configuration affects the operation of a Cisco device immediately o RAM is volatile memory (it loses all of its content when the device is powered off)  As shown in the below diagram,  Use the show running-config privileged EXEC mode command to view the running configuration file  To view the startup configuration file, use the show startup-config privileged EXEC command  If power to the devices is lost, all configuration changes will be lost unless they are saved. o To save changes to the running configuration to the startup configuration 

-

9



o

o

Use the copy running-config startup-config privileged EXEC mode command

Alter the Running configuration  If changes made to the running configuration d not have the desired effect and the running-config file has not yet been saved, you can restore the device to its previous configuration by removing the changed commands individually or reload the device using the reload privileged EXEC mode command to restore the startup config.  The downside to using the reload command to remove an unsaved running configuration is the brief amount of time the device will be offline – causing network downtime  While initiating a reload, the IOS will detect that the running config changes were not saved to the startup config. o As a result, the IOS will show a prompt asking to save the changes  To discard the changes, enter n or no  Alternatively, if undesired changes were saved to the startup configuration – it may be necessary to clear all the configurations  This requires erasing the startup configuration and restarting the device.  The startup configuration is removed by using the erase startupconfig privileged EXEC mode command o After this command is issued a prompt for confirmation is displayed – press enter to accept Capture Configuration to a Text File  Configuration files can also be saved and archived to a text document

10

Ensures that a working copy of the configuration files is available for editing or reuse later For example, assume a switch has been configured and the running configuration has been saved on the device  Open a terminal emulation software such as PuTTY or Tera Term connected to a switch  Enable logging (E.g. ‘all session output’) in the terminal software and assign a name and file location to save the log file  Execute the show running-config or show startup-config command at the privileged EXEC prompt o Text then displayed in the terminal window will be placed into the chosen file The text file created can be used as a record of how the device is currently implemented To restore a configuration file to a device  Enter global config mode  Copy and paste the text file into the terminal windows connected to the switch o The text in the file will be applied as commands in the CLI and become the running configuration on the device 



 

Address Schemes Ports and Addresses -

-

IP Addresses o The use of IP addresses is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.  Each end device on a networt must be configured with an IP address. o IPv4 (Internet Protocol Version 4)  the structure of an IPv4 address is called dotted decimal notation and is represented by four decimal numbers between 0 and 255  IPv4 addresses are assigned to individual devices connected to a network  With IPv4, a subnet mask is also necessary  A subnet mask is a special type of IPv4 address o It determines which particular subnet the device is a member  IP addresses can be assigned to both physical ports and virtual interfaces on devices  A virtual interface means that there is no physical hardware on the device associated with it. Interfaces and Ports o Each physical interface has specifications, or standards that define them.  A cable connecting to the interface must be designed to match the physical standards of the interface.  Types of media vary from twisted-pair copper cables, fibre-optic cables to wireless  Different types of network media have different features and benefits  Some differences include 11

Distance the media can successfully carry a signal Environment in which the media is to be installed Amount of data and the speed at which it must be transmitted o Cost of the media and installation Not only does each link on the internet require a specific network media type, but each link also requires a particular network technology.  E.g. Ethernet is the most common LAN technology used today  Ethernet ports are found on end-user devices, switch and other networking devices that can physically connect to the network  Cisco IOS Layer 2 switches have physical ports for devices to connect  These ports do not support Layer 3 IP addresses o Therefore, switches have one or more switch virtual interfaces (SVIs)  These are virtual interfaces as there is no physical hardware on the device  An SVI is created in software o The virtual interface provides a means to remotely manage a switch over a network using IPv4  Each switch comes with one SVI by default  The default SVI is interface VLAN1 Manual IP Address Configuration for End Devices  IP address information can be entered into end devices manually, or automatically using Dynamic Host Configuration Protocol (DHCP)  To manually configure an IP address on a Windows host: o Control Panel>Network Sharing Center> Change adapter settings>choose the adapter o Right click and click properties to display the local area connection properties o Highlighting Internet Protocol Version 4 (TCP/IPv4) and clicking properties will allow you to configure the IPv4 address, subnet mask information and default gateway.  Note: The DNS server addresses are the IP addresses of the Domain Name System (DNS) servers which are used to translate IP addresses to domain names. Automatic IP Address Configuration for End Devices  PCs typically default to using DHCP for automatic IP address configuration  DHCP is a technology that is used in almost every network  It is so popular because it does so much work that without it would be very labour-intensive  In a network, DHCP enables automatic IPv4 address configuration for all end devices with DHCP enabled.  To configure DHCP on a windows PC:  You only need to select “Obtain DNS server automatically” o After this, your pc will search out a DHCP server and be assigned the address settings necessary for the network o o o

o

o

o

12

It is possible to display the IP configuration settings on a windows pc by using the ipconfig command at that command prompt. o This output shows the IP address, subnet mask and gateway info received from the DHCP server o Switch Virtual Interface (SVI) Configuration  To access a switch remotely, an IP address and a subnet mask bust be configured on the SVI  To configure an SVI on a switch: o Use the interface vlan 1 global config command  (Vlan 1 is not an actual physical interface, but a virtual one) o Assign an IPv4 address using the ip address ip-address subnet-mask interface configuration command o Enable the virtual ...


Similar Free PDFs