Chapter 2.2: Configuring a Network Operating System: Getting Basic Flashcards

1
Q

How are switches and routers similar?

2.2.1.1

A
  • They support similar modal operating system,
  • They support similar command structures,
  • They support many of the same commands
  • They have identical initial configuration steps when implementing them into a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are characteristics of a switch?

A
  • It is one of the simplest devices that can be configured on a network.
  • There is no configurations that are prior to the device function.
  • Can be plugged in with no configuration but still switch data between connected devices
  • One of the fundamental devices used in the creation of a small network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What will happen if two pcs are connected via a switch?

A

The two pc’s will have instant connectivity with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are initial settings on a switch (4 steps)?

A
  • setting a name for the switch
    Limiting access to the device configuration
    Configuring banner messages
    Saving the configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the first step when configuring a network device?

2.2.1.2

A

Configuring a unique device name (hostname) which allows devices to be identified by network administrators over a network or the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens on the CLI when a device has a configured hostname?

A

The hostname appears in the CLI prompts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When can hostnames be used and where else should hostnames used?

A

(Hostnames can be used on network devices)

Hostnames can be used in various authentication processes between devices and should be used on topology diagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a device default name on Cisco IOS?

A

For switch it is Switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When can Hostnames be configured?

A

Hostnames are configured on active networking devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is assigning hostnames important?

A

If there is more than one switch, someone accessing the device remotely it will be difficult to know which host they are configuring or maintaining because the command prompt will show Switch> on the command line for all the switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a naming convention with regard to naming hosts?

A

Naming devices in a consistent and useful way. It should span the company or location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should you create a naming convention?

A

You should create a naming convention at the same time as an addressing scheme to allow for continuity within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the guidelines for naming conventions?

A

Names should:

  • Start with a letter
  • Contain no spaces
  • End with a letter or digit
  • Use only letters, digits, and dashes
  • Be less than 64 characters in length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does IOS treat capitalization and lowercase letters in hostnames?

A

Cisco IOS preserve capitalization and lowercase in the hostname.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should you consider when creating a naming convention for switches?
2.2.1.3

A

The location of the devices
The purpose of the devices

For example, in the figure we have named the three switches as Sw-Floor-1, Sw-Floor-2, and Sw-Floor-3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where do you include the naming conventions?

A

Network documentation: This should include the names, the reasons for choosing the names.

This helps ensure continuity in the naming convention as devices are added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do you configure an IOS hostname?

2.2.1.4

A

(practice @2.2.1.4)
From the privileged EXEC mode, access the global configuration mode by entering the configure terminal command:

Switch# configure terminal

After the command is executed, the prompt will change to:

Switch(config)#

As shown in the figure, in the global configuration mode, enter the hostname:

Switch(config)# hostname Sw-Floor-1

After the command is executed, the prompt will change to:

Sw-Floor-1 (config)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What must you do each time a device is added or modified?

A

Always make sure that your documentation is updated each time a device is added or modified. Identify devices in the documentation by their location, purpose, and address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you remove a hostname?

A

use the “no hostname” command in the global configuration setting. The prompt will revert to the default hostname.

Sw-Floor-1 (config)# no hostname

Switch(config)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are four ways to limit device access?

2.2.2.1

A

Secure privileged EXEC access
Secure user Exec access
Secure Telnet access
Encrypt all passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do you limit access to privileged EXEC mode?

A

Enable password

Enable secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do you limit device access using the console connection?

A

Console password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do you limit access via telnet?

A

VTY password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do you encrypt password? (may need more info)

A

enable secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the primary devense against unauthorized access to network devices?

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Aside from passwords, what is another good practice to limit access to network devices

A

Physically limiting access by placing them in closets and locked racks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a good practice regarding passwords and level access?

A

use different STRONG authentication passwords for each level of access to protect the network infrastructure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some keypoints when choosing passwords?

A
  • Use passwords that are more than 8 characters in length
  • Use a combination of upper and lowercase letters, numbers, special characters and/or number sequences in passwords
  • Avoid using the same password for all devices
  • Avoid using common words such as password or administrator because these are easily guessed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How do you secure privileged EXEC access?

A

Type “enable secret” followed by a password

Ex
Switch(config)# enable secret supersecretpassword
30
Q

What are the differences between “enable password” and “enable secret”?

A

Enable secret is encrypted and therefore more secure.

31
Q

At minimum, what must be secured on network devices.

2.2.2.3

A

The console port must be secured because it reduces the chance of unauthorized personnel physically plugging a cable into the device and gaining device access.

32
Q

What are the commands in global configuration mode to set a password for the console line?

A

Switch(config)# line console 0

Switch(config-line)# password cisco

Switch(config-line)# login

33
Q

What does the command “line console 0” in the following section refer to?

Switch(config)# line console 0
Switch(config-line)# password cisco
Switch(config-line)# login

A

It is used to enter line configuration mode for the console. The zero is used to represent the first (and most cases the only) console interface.

34
Q

What does the command “password cisco” in the following section refer to?

Switch(config)# line console 0
Switch(config-line)# password cisco
Switch(config-line)# login

A

This specifies a password for the console line.

35
Q

What does the command “login” in the following section refer to?

Switch(config)# line console 0
Switch(config-line)# password cisco
Switch(config-line)# login

A

The login command requires authentication upon login (when login is enabled and a password is set).

36
Q

The IOS includes the login command for what lines?

A

VTY.

37
Q

What does the login command on the VTY lines do?

A

they prevent Telnet access to the device without authentication.

38
Q

What would happen if the login command on the VTY lines were removed?

A

It would remove the requirement for authentication and unauthorized persons could connect across the network to the line using Telnet. This would be a major security risk

39
Q

What is the command that prevents passwords from showing up as plain text when viewing the configuration files?
2.2.2.4

A

service password-encryption (practice 2.2.2.4)

40
Q

What does service password-encryption do?

A

It causes the encryption of its passwords to occur when a password is configured.
It applies weak encryption to all unencrypted.
passwords.
The encryption applies only to passwords in the configuration file, not to passwords as they are sent over media.

41
Q

What is the purpose of service password-encryption? give an example

A

This prevents unauthorized individuals from viewing passwords in the configuration file.

If you execute the show running-config or show startup-config command prior to the service password-encryption command being executed, the unencrypted passwords are visible in the configuration output. The service password-encryption can then be executed and the encryption will be applied to the passwords. Once the encryption has been applied, removing the encryption service does not reverse the encryption.

42
Q

What is the method to declare that only authorized personnel should attempt to gain entry into the device.
2.2.2.5

A

Add a banner message

43
Q

How are banners useful as a part of the legal process?

A

Some legal systems do not allow prosecution or even monitoring of users unless a notification is visible. The banner serves as this notification.

44
Q

What are some examples of information to be included in a banner?

A

A banner should only detail that only authorized personnel are allowed to access the device and can include scheduled system shutdowns and other information that affects all network users.

“Use of the device is specifically for authorized personnel.”
“Activity may be monitored.”
“Legal action will be pursued for any unauthorized use.”
Exact wording may depend on local laws and corporate policy.

45
Q

What type of wording should be avoided in a banner and why?

A

“Welcome” or “Invited” because if a person disrupts the network after gaining unauthorized entry, proving liability will be difficult if there is the appearance of an invitation.

46
Q

What is a common type of banner for the IOS?

A

Message of the day (MOTD)

47
Q

What is MOTD?

A

Message of the day

48
Q

What is MOTD often used for?

A

Legal notification because it is displayed to all connected terminals

49
Q

What is the command for MOTD?

A

banner motd
To use type “banner motd” followed by a space and a delimiting character. Then one or more lines of text and a second occurrence of the delimiting character to denote the end of the message. Delimiting characters are not included in the message.

Switch(config)# banner motd # This is the message of the day #

50
Q

What can be used a a delimiting character?

A

Any character that is not used in the message. It is usually the # symbol.

51
Q

What happens once the command “banner motd” is used?

A

The banner will be displayed on all subsequent attempts to access the device until the banner is moved.

52
Q

What is the running configuration file?

2.2.3.1

A

The running configuration file reflects the current configuration applied to a Cisco IOS device.

It contains the commands used to determine how the device operates on the network

53
Q

What does modifying a running configuration do?

A

It affects the operation of a Cisco device immediately.

54
Q

Where is the running configuration file stored and what does that mean?

A

It is stored on the working memory of the device, or random access memory (RAM).
This means that the running configuration file is temporarily active while the Cisco device is running (powered on) . If the power to the device is lost or the device is restarted, all configuration changes will be lost unless they have been saved.

55
Q

What are your options after making changes to a running configuration file?

A
  • Return the device to its original configuration
  • Remove all configurations from the device
  • Make the changed configuration the new startup configuration
56
Q

What is the startup configuration file

A

It reflects the configuration that will be used by the device upon reboot.

57
Q

Where is the startup configuration file stored

A

NVRAM

58
Q

What prevents changes from being lost due to power failure or deliberate restart?

A

saving running configuration modifications to the start up configuration file.

59
Q

What should you do before commiting to changes on the running configuration

A

You can use the show running-config command to see the running configuration file and verify them to be correct.

60
Q

How do you save changes from the running configuration file to the start up configuration file?

A

use the copy running-config startup-config command at the privileged EXEC mode prompt
(practice 2.2.3.1 figure 2)

copy running-config startup-config

61
Q

Which mode do you save running configuration file to the start up configuration file

A

privileged EXEC mode

62
Q

how do you replace the running configuration mode with the startup configuration mode?

A

restart the device by using the “reload” command at the privileged EXEC mode prompt.

When initiating a reload, the IOS will detect that the running config has changes that were not saved to startup configuration. A prompt will appear to ask whether to save the changes made. To discard the changes, enter n or no.

An additional prompt will appear to confirm the reload. To confirm, press Enter. Pressing any other key will abort the process.

63
Q

How do you clear up undesired changes saved to the start up configuration?

A

Erasing the startup configuration using the “erase startup-config” command at the privileged EXEC mode, confirming by pressing enter (cancel by pressing any other key), and restarting the device “reload” (practice on 2.2.3.1 figure 2)

erase startup-config

64
Q

Why must you use the erase command judiciously?

A

the command can erase any file on the device including the IOS itself or other critical files.

65
Q

In order to return a device to its default “out of the box” configuration (like a factory reset) what must you also aside from erasing the startup configuration file?

A

you must erase the vlan.dat file with the “delete vlan.dat” command in the privileged EXEC mode. (practice 2.2.3.1)

66
Q

Why should you save configuration files to a text document?

2.2.3.2

A

This ensures that a working copy of the configuration files is available for editing or reuse later.

67
Q

What is used to save and archive configuration files to a text document?

A

Tera Term

68
Q

What are the steps to save a configuration file into a text document

A

On the File menu, click Log.
Choose the location. Tera Term will begin capturing text.
After capture has been started, execute the show running-config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file.
When the capture is complete, select Close in the Tera Term: Log window.
View the output to verify that it was not corrupted.

69
Q

What should you modify before copying a configuration file from storage to a device?

A
  • Change encrypted passwords to plain text and remove parameter (either number 5 or 7)
  • Remove non-command text such as more and IOS messages.
70
Q

Using Tera Term, what are the steps for copying a configuration file from storage to device?

A

Enter global configuration mode.

Edit text to remove non commands and save.
On file menu click send file
Locate the file to be copied into the device and click open
(Tera Term will paste the file into the device

71
Q

What happens when a saved configuration in a file are pasted into a device as text?

A

The text is applied as commands and it becomes the running configuration on the device.

72
Q

Labs

A

Practice:2.2.1.4, 2.2.2.4, 2.2.3.1
Labs: 2.2.3.3