Module 2: Basic Switch and End Device Configuration Flashcards
What is Secure Shell (SSH)
Secure Shell (SSH)
Establishes a secure remote CLI connection to a device, through a virtual interface, over a network.
- Note: This is the recommended method for remotely connecting to a device
What is Telnet
Telnet
Establishes an insecure remote CLI connection to a device over the network
- Note: User authentication, passwords and commands are sent over the network in plaintext
Give examples of Terminal Emulation Programs
Terminal Emulation Programs
Used to connect to a network device by either a console port or by an SSH/Telnet connection
There are Several Terminal Emulation Programs
- PuTTY
- Tera Term
- SecureCRT
What is User EXEC Mode? and What kind of commands can be accessed in User EXEC Mode?
User EXEC Mode allows access to only a limited number of basic monitoring commands and is identified by the CLI prompt that ends with the > symbol.
In User EXEC Mode, only a limited number of basic monitoring commands can be accessed.
What is Privileged EXEC Mode? and What kind of commands can be accessed in Privileged EXEC Mode?
Privileged EXEC Mode allows access to all commands and features and is identified by the CLI prompt that ends with the # symbol.
In Privileged EXEC Mode, all commands and features can be accessed.
What is Global Configuration Mode used for?
Global Configuration Mode is used to access configuration options on the device.
What is Line Configuration Mode used for?
Line Configuration Mode is used to configure console, SSH, Telnet, or AUX access.
What is Interface Configuration Mode used for?
Interface Configuration Mode is used to configure a switch port or router interface.
What is the function of the Ctrl-Shift-6 hotkey or shortcut in networking?
All-purpose break sequences used to abort DNS lookups, traceroutes, pings, etc
What is the guideline for naming devices
Guideline for naming devices
- Start with a letter
- Contain no spaces
- End with a letter or digit
- Use only letters, digits, and dashes
- Be less than 64 characters in length
What is the password Guidelines - Characters
Password Guidelines - Characters
Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences
Password Guidelines - Avoid
Avoid using the same password for all devices
How can you secure User EXEC Mode access in networking devices?
You can secure User EXEC Mode access in networking devices by following these steps:
1 Enter line console configuration mode using the “line console 0” command in global configuration mode.
2 Specify the user EXEC mode password using the “password password” command.
3 Enable user EXEC access using the “login” command.
What are the steps to secure Privileged EXEC mode access in networking devices?
The steps to secure Privileged EXEC mode access in networking devices are:
1 Enter global configuration mode.
2 Use the “enable secret password” command.
What are the steps to secure VTY line access in networking devices?
The steps to secure VTY line access in networking devices are:
1 Enter line VTY configuration mode using the “line vty 0 15” command in global configuration mode.
2 Specify the VTY password using the “password password” command.
3 Finally, enable VTY access using the “login” command.
How can you encrypt passwords in the startup-config and running-config files in networking devices?
You can encrypt passwords in the startup-config and running-config files in networking devices by following these steps:
To encrypt all plaintext passwords, use the “service password-encryption” global config command.
Use the “show running-config” command to verify that the passwords on the device are now encrypted.