Chapter 2.2: Configuring a Network Operating System: Getting Basic Flashcards
How are switches and routers similar?
2.2.1.1
- They support similar modal operating system,
- They support similar command structures,
- They support many of the same commands
- They have identical initial configuration steps when implementing them into a network
What are characteristics of a switch?
- It is one of the simplest devices that can be configured on a network.
- There is no configurations that are prior to the device function.
- Can be plugged in with no configuration but still switch data between connected devices
- One of the fundamental devices used in the creation of a small network.
What will happen if two pcs are connected via a switch?
The two pc’s will have instant connectivity with one another.
What are initial settings on a switch (4 steps)?
- setting a name for the switch
Limiting access to the device configuration
Configuring banner messages
Saving the configuration
What is the first step when configuring a network device?
2.2.1.2
Configuring a unique device name (hostname) which allows devices to be identified by network administrators over a network or the Internet
What happens on the CLI when a device has a configured hostname?
The hostname appears in the CLI prompts.
When can hostnames be used and where else should hostnames used?
(Hostnames can be used on network devices)
Hostnames can be used in various authentication processes between devices and should be used on topology diagrams.
What is a device default name on Cisco IOS?
For switch it is Switch.
When can Hostnames be configured?
Hostnames are configured on active networking devices.
Why is assigning hostnames important?
If there is more than one switch, someone accessing the device remotely it will be difficult to know which host they are configuring or maintaining because the command prompt will show Switch> on the command line for all the switches.
What is a naming convention with regard to naming hosts?
Naming devices in a consistent and useful way. It should span the company or location.
When should you create a naming convention?
You should create a naming convention at the same time as an addressing scheme to allow for continuity within an organization.
What are the guidelines for naming conventions?
Names should:
- Start with a letter
- Contain no spaces
- End with a letter or digit
- Use only letters, digits, and dashes
- Be less than 64 characters in length
How does IOS treat capitalization and lowercase letters in hostnames?
Cisco IOS preserve capitalization and lowercase in the hostname.
What should you consider when creating a naming convention for switches?
2.2.1.3
The location of the devices
The purpose of the devices
For example, in the figure we have named the three switches as Sw-Floor-1, Sw-Floor-2, and Sw-Floor-3.
Where do you include the naming conventions?
Network documentation: This should include the names, the reasons for choosing the names.
This helps ensure continuity in the naming convention as devices are added.
How do you configure an IOS hostname?
2.2.1.4
(practice @2.2.1.4)
From the privileged EXEC mode, access the global configuration mode by entering the configure terminal command:
Switch# configure terminal
After the command is executed, the prompt will change to:
Switch(config)#
As shown in the figure, in the global configuration mode, enter the hostname:
Switch(config)# hostname Sw-Floor-1
After the command is executed, the prompt will change to:
Sw-Floor-1 (config)#
What must you do each time a device is added or modified?
Always make sure that your documentation is updated each time a device is added or modified. Identify devices in the documentation by their location, purpose, and address.
How do you remove a hostname?
use the “no hostname” command in the global configuration setting. The prompt will revert to the default hostname.
Sw-Floor-1 (config)# no hostname
Switch(config)#
What are four ways to limit device access?
2.2.2.1
Secure privileged EXEC access
Secure user Exec access
Secure Telnet access
Encrypt all passwords
How do you limit access to privileged EXEC mode?
Enable password
Enable secret
How do you limit device access using the console connection?
Console password
How do you limit access via telnet?
VTY password
How do you encrypt password? (may need more info)
enable secret
What is the primary devense against unauthorized access to network devices?
Passwords
Aside from passwords, what is another good practice to limit access to network devices
Physically limiting access by placing them in closets and locked racks.
What is a good practice regarding passwords and level access?
use different STRONG authentication passwords for each level of access to protect the network infrastructure from unauthorized access.
What are some keypoints when choosing passwords?
- Use passwords that are more than 8 characters in length
- Use a combination of upper and lowercase letters, numbers, special characters and/or number sequences in passwords
- Avoid using the same password for all devices
- Avoid using common words such as password or administrator because these are easily guessed.