Chapter 2 Flashcards
Operating Systems
*All networking equipment dependent on operating systems
-The operating system on home routers is usually called firmware
-Cisco IOS – Collection of network operating systems used on Cisco devices
Operating Systems
*Shell provides the user interface and allows interaction between user and kernel. This can be command line or graphical
*Kernel is the core of the operating system that interacts with the hardware.
Location of the Cisco IOS
Cisco IOS stored in Flash
-Non-volatile
-Can be overwritten
-IOS copied from flash to
RAM to run
-IOS with new features can
be installed if device has
enough Flash and RAM
Console Access Method
Console Port
-Device is accessible even if not configured
-Allows configuration
commands to be entered
-Should be configured
with passwords to
prevent unauthorized
access
-Device should be in a secure room so console port can’t be accessed
Telnet, SSH, and AUX Access Methods
Telnet
*Method for remotely
accessing the CLI over a
network
*Require one active
configured interface
*Clear text is sent
between end device and
intermediary device
Secure Shell (SSH)
*Remote login similar to
Telnet, but uses
encryption
Aux Port
*Uses telephone line
(dialup)
Terminal Emulation Programs
Software available for connecting to a networking device:
*PuTTY
*Tera Term
*HyperTerminal
Cisco (IOS) modes
In order from most basic to most specialized, the major modes are:
User executive (User EXEC) mode – the intermediary device always boots into this mode
Privileged executive (Privileged EXEC) mode
Global configuration mode
Other specific configuration modes, such as Interface configuration mode.
Each mode has a distinctive prompt
Global Configuration Mode and Submodes
The show version Command
This command displays information about the currently loaded IOS version, along with hardware and device information.
Software Version- IOS software version (stored in flash)
Bootstrap Version- Bootstrap version (stored in Boot ROM)
System up-time- Time since last reboot
System restart info- method of restart (e.g., power cycle, crash)
Software image name- IOS filename stored in flash
Router Type and Processor type- Model number and processor type
Memory type and allocation (Shared/Main)- Main Processor RAM and Shared Packet I/O buffering
Software Features- Supported protocols / feature sets
Hardware Interfaces- Interfaces available on the device
Configuration Register- Sets bootup specifications, console speed setting, and related parameters
The startup config and the running config
Cisco Commands - Check Configuration
Configuration changes made in the running configuration will affect the operation of the switch/router immediately!
If router is rebooted or reloaded, running config is lost!
Configuration Files
Startup config is saved using the copy running-config startup-config command
Startup configuration is removed by using theerase startup-config
Switch#erase startup-config
Setting Passwords
enable password– Limits access to the privileged EXEC mode
enable secret – Encrypted, limits access to the privileged EXEC mode
Encrypting Password Display
service password-encryption
Prevents passwords from showing up as plain text when viewing the configuration
Banner Messages
*Important part of the
legal process in the event
that someone is
prosecuted for breaking
into a device
*Wording implying a login
is “welcome” is not
appropriate