Chapter 2 - Basic End Device/Switch Configuration Flashcards
1
Q
What Methods are There for Accessing the Command Line Interface (CLI)?
A
- Secure Shell (SSH): a secure, remote in-band management to a virtual interface (uses encryption)
- Telnet: an insecure equivalent, can be used for initial device setup (uses plaintext)
- Console: a physical management port providing out-of-band access via a computer terminal emulation program
2
Q
What Configuration Modes are There?
A
- User EXEC: automatically in this mode
- Privileged EXEC: accessed by entering ‘enable’
- Global Config: accessed by entering ‘config t’
- Specific Config: could be for an interface so ‘interface [port/ip address]’
3
Q
What are the IOS Hotkeys?
A
- Tab: completes command
- Ctrl-R: re-displays a line
- Ctrl-Z: exits config mode, back to prov. EXEC mode
- Down/Up: scroll through former commands
- Ctrl-Shift-6: interrupt an IOS process
- Ctrl-C: aborts current command and exits config mode
4
Q
How is Access Limited on a Device?
A
- Enable Password: limits access to the privileged EXEC mode
- Enable Secret: encrypted and limits access to the privileged EXEC mode
- Console Password: limits device access using the console connection
- VTY Password: limits device remote access using Telnet/SSH