Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

02.1 - Cisco IOS Access

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

 Introduction to Networks v7.0


    
1.3.2 Topology Diagrams
1 Networking Today   /  Basic Switch and End Device Conguration /  Cisco IOS Access

Check Your Understanding -


1.3.3 Network Representations and
Topologies
Cisco IOS Access
1.4 Common Types of Networks 

2.1.1
1.4.1 Networks of Many Sizes

1.4.2 LANs and WANs


Operating Systems 

1.4.3 The Internet


All end devices and network devices require an operating system (OS). As shown in the gure, the portion of the OS that
interacts directly with computer hardware is known as the kernel. The portion that interfaces with applications and the user is
1.4.4 Intranets and Extranets known as the shell. The user can interact with the shell using a command-line interface (CLI) or a graphical user interface (GUI).

Check Your Understanding -


1.4.5
Common Types of Networks
Shell
1.5 Internet Connections 

Kernel
1.5.1 Internet Access Technologies

Home and Small Oce Internet Hardware


1.5.2
Connections
User
Interface
1.5.3 Businesses Internet Connections

1.5.4 The Converging Network

Video - Download and Install


1.5.5
Packet Tracer

Video - Getting Started in Cisco


1.5.6
Packet Tracer

Packet Tracer - Network


1.5.7
Representation

1.6 Reliable Networks  Shell - The user interface that allows users to request specic tasks from the computer. These requests can be made
either through the CLI or GUI interfaces.
Kernel - Communicates between the hardware and software of a computer and manages how hardware resources are
1.6.1 Network Architecture
used to meet software requirements.
Hardware - The physical part of a computer including underlying electronics.
1.6.2 Fault Tolerance

1.6.3 Scalability
When using a CLI, the user interacts directly with the system in a text-based environment by entering commands on the
keyboard at a command prompt, as shown in the example. The system executes the command, often providing textual output.
1.6.4 Quality of Service The CLI requires very little overhead to operate. However, it does require that the user have knowledge of the underlying
command structure that controls the system.

1.6.5 Network Security


analyst@secOps ~]$ ls
Check Your Understanding - Desktop Downloads lab.support.files second_drive
1.6.6 [analyst@secOps ~]$
Reliable Networks

1.7 Network Trends 

1.7.1 Recent Trends 2.1.2

1.7.2 Bring Your Own Device (BYOD) GUI 

1.7.3 Online Collaboration


A GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an
1.7.4 Video Communications environment of graphical icons, menus, and windows. The GUI example in the gure is more user-friendly and requires less
knowledge of the underlying command structure that controls the system. For this reason, most users rely on GUI environments.

1.7.5 Video - Cisco Webex for Huddles

1.7.6 Cloud Computing

1.7.7 Technology Trends in the Home

1.7.8 Powerline Networking

1.7.9 Wireless Broadband

Check Your Understanding -


1.7.10
Network Trends

1.8 Network Security 

1.8.1 Security Threats

1.8.2 Security Solutions

Check Your Understanding -


1.8.3
Network Security

1.9 The IT Professional 


However, GUIs may not always be able to provide all the features available with the CLI. GUIs can also fail, crash, or simply not
operate as specied. For these reasons, network devices are typically accessed through a CLI. The CLI is less resource intensive
1.9.1 CCNA
and very stable when compared to a GUI.

1.9.2 Networking Jobs The family of network operating systems used on many Cisco devices is called the Cisco Internetwork Operating System (IOS).
Cisco IOS is used on many Cisco routers and switches regardless of the type or size of the device. Each device router or switch
Lab - Research IT and Networking type uses a dierent version of Cisco IOS. Other Cisco operating systems include IOS XE, IOS XR, and NX-OS.
1.9.3
Job Opportunities
Note: The operating system on home routers is usually called rmware. The most common method for conguring a home
router is by using a web browser-based GUI.
1.10 Module Practice and Quiz 

1.10.1 What did I learn in this module?

2.1.3
1.10.2 Module Quiz - Networking Today

Purpose of an OS 
Basic Switch and End Device
2 Conguration 

Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to do the
2.0 Introduction 
following:

2.0.1 Why should I take this module? Use a mouse to make selections and run programs
Enter text and text-based commands
What will I learn to do in this View output on a monitor
2.0.2
module?
A CLI-based network operating system (e.g., the Cisco IOS on a switch or router) enables a network technician to do the
2.1 Cisco IOS Access  following:

Use a keyboard to run CLI-based network programs


2.1.1 Operating Systems
Use a keyboard to enter text and text-based commands
View output on a monitor
2.1.2 GUI
Cisco networking devices run particular versions of the Cisco IOS. The IOS version is dependent on the type of device being
2.1.3 Purpose of an OS used and the required features. While all devices come with a default IOS and feature set, it is possible to upgrade the IOS
version or feature set to obtain additional capabilities.

2.1.4 Access Methods The gure displays a list of IOS software releases for a Cisco Catalyst 2960 Switch.

2.1.5 Terminal Emulation Programs Cisco Software Download Example


Check Your Understanding - Cisco
2.1.6
IOS Access

2.2 IOS Navigation 

2.3 The Command Structure 

2.4 Basic Device Conguration 

2.5 Save Congurations 

2.6 Ports and Addresses 

2.7 Congure IP Addressing 

2.8 Verify Connectivity 

2.9 Module Practice and Quiz 

3 Protocols and Models 

2.1.4

4 Physical Layer 
Access Methods 

5 Number Systems 
A switch will forward trac by default and does not need to be explicitly congured to operate. For example, two congured
hosts connected to the same new switch would be able to communicate.
6 Data Link Layer 
Regardless of the default behavior of a new switch, all switches should be congured and secured.

7 Ethernet Switching  Method Description

This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band
access refers to access via a dedicated management channel that is used for device maintenance
8 Network Layer  purposes only. The advantage of using a console port is that the device is accessible even if no
Console
networking services are congured, such as performing the initial conguration. A computer running
terminal emulation software and a special console cable to connect to the device are required for a
9 Address Resolution  console connection.

SSH is an in-band and recommended method for remotely establishing a secure CLI connection,
through a virtual interface, over a network. Unlike a console connection, SSH connections require active
10 Basic Router Conguration  Secure Shell (SSH) networking services on the device, including an active interface congured with an address. Most
versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH
sessions with other devices.
11 IPv4 Addressing  Telnet is an insecure, in-band method of remotely establishing a CLI session, through a virtual
interface, over a network. Unlike SSH, Telnet does not provide a secure, encrypted connection and
Telnet should only be used in a lab environment. User authentication, passwords, and commands are sent
12 IPv6 Addressing  over the network in plaintext. The best practice is to use SSH instead of Telnet. Cisco IOS includes both
a Telnet server and Telnet client.

13 ICMP  Note: Some devices, such as routers, may also support a legacy auxiliary port that was used to establish a CLI session remotely
over a telephone connection using a modem. Similar to a console connection, the AUX port is out-of-band and does not require
networking services to be congured or available.
14 Transport Layer 

15 Application Layer  2.1.5

16
Network Security Terminal Emulation Programs 

Fundamentals 

17 There are several terminal emulation programs you can use to connect to a networking device either by a serial connection over
Build a Small Network 
a console port, or by an SSH/Telnet connection. These programs allow you to enhance your productivity by adjusting window
sizes, changing font sizes, and changing color schemes.

 Click each program name to see a screen capture of the interface.


1.3.2 Topology Diagrams
1 Networking Today 
Check Your Understanding - PuTTY Tera Term SecureCRT
1.3.3 Network Representations and
Topologies

1.4 Common Types of Networks 

1.4.1 Networks of Many Sizes

1.4.2 LANs and WANs

1.4.3 The Internet

1.4.4 Intranets and Extranets

Check Your Understanding -


1.4.5
Common Types of Networks

1.5 Internet Connections 

1.5.1 Internet Access Technologies

Home and Small Oce Internet


1.5.2
Connections

1.5.3 Businesses Internet Connections

1.5.4 The Converging Network

Video - Download and Install


1.5.5
Packet Tracer

Video - Getting Started in Cisco


1.5.6
Packet Tracer

Packet Tracer - Network


1.5.7
Representation

1.6 Reliable Networks 

1.6.1 Network Architecture

1.6.2 Fault Tolerance

  
1.6.3 Scalability

1.6.4 Quality of Service


2.1.6

1.6.5 Network Security


Check Your Understanding - Cisco IOS Access 
Check Your Understanding -
1.6.6
Reliable Networks

1.7 Network Trends 


 Check your understanding of Cisco IOS Access by choosing the BEST answer to the following questions.

1.7.1 Recent Trends


1. Which access method would be most appropriate if you were in the equipment
1.7.2 Bring Your Own Device (BYOD) room with a new switch that needs to be congured?

Console
1.7.3 Online Collaboration
Telnet/SSH

1.7.4 Video Communications Aux

2. Which access method would be most appropriate if your manager gave you a
1.7.5 Video - Cisco Webex for Huddles
special cable and told you to use it to congure the switch?

1.7.6 Cloud Computing Console

Telnet/SSH
1.7.7 Technology Trends in the Home
Aux

1.7.8 Powerline Networking


3. Which access method would be the most appropriate in-band access to the
IOS over a network connection?
1.7.9 Wireless Broadband
Console
Check Your Understanding -
1.7.10 Telnet/SSH
Network Trends
Aux
1.8 Network Security 
4. Which access method would be the most appropriate if you call your manager
to tell him you cannot access your router in another city over the internet and
1.8.1 Security Threats
he provides you with the information to access the router through a telephone
connection?
1.8.2 Security Solutions Check
Console
Check Your Understanding -
Telnet/SSH
Show Me
1.8.3
Network Security
Aux
Reset
1.9 The IT Professional 

1.9.1 CCNA

 
2.0 2.2
Introduction IOS Navigation
1.9.2 Networking Jobs

Lab - Research IT and Networking


1.9.3
Job Opportunities

1.10 Module Practice and Quiz 

1.10.1 What did I learn in this module?

1.10.2 Module Quiz - Networking Today

Basic Switch and End Device


2 Conguration 

2.0 Introduction 

2.0.1 Why should I take this module?

What will I learn to do in this


2.0.2
module?

2.1 Cisco IOS Access 

2.1.1 Operating Systems

2.1.2 GUI

2.1.3 Purpose of an OS

2.1.4 Access Methods

2.1.5 Terminal Emulation Programs

Check Your Understanding - Cisco


2.1.6
IOS Access

2.2 IOS Navigation 

2.3 The Command Structure 

2.4 Basic Device Conguration 

2.5 Save Congurations 

2.6 Ports and Addresses 

2.7 Congure IP Addressing 

2.8 Verify Connectivity 

2.9 Module Practice and Quiz 

3 Protocols and Models 

4 Physical Layer 

5 Number Systems 

6 Data Link Layer 

7 Ethernet Switching 

8 Network Layer 

9 Address Resolution 

10 Basic Router Conguration 

11 IPv4 Addressing 

12 IPv6 Addressing 

13 ICMP 

14 Transport Layer 

15 Application Layer 

Network Security
16 
Fundamentals

17 Build a Small Network 

You might also like