Introduction to Networking

Slides:



Advertisements
Similar presentations
Configuring a Router Harold Hernandez, MS, CCNI. 3.1 Configuring a Router Name a router Set passwords Examine show commands Configure a serial interface.
Advertisements

1 Passwords and Banners Cisco Devices Packet Tracer.
CCNA2-1 Chapter 1 Introduction to Routing and Packet Forwarding CLI Configuration and Addressing.
CCNA 2 v3.1 Module 2.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
What is Router? Router is a device which makes communication between two or more networks present in different geographical locations. Routers are data.
CSE 304 COMPUTER NETWORK LAB LECTURE 01 Md. Mamunur Rashid Akand Lecturer, Department of CSE, BUBT.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Configuring a Network Operating System Introduction to Networks.
Basic Router Configuration Warren Toomey GCIT. Introduction A Cisco router is simply a computer that receives packets and forwards them on based on what.
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
Configuring a network os
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Cisco Routers Objectives –How to log into a Cisco router and determine basic settings. Contents –Differences in available methods of access. –Different.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
User Access to Router Securing Access.
Ch.2 – Introduction to Routers
1 Version 3.0 Module 6 Switch Configuration. 2 Version 3.0 Switches Contain: –CPU –RAM –Operating System.
Module 3 Configuring a Router.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
Will learn to use router modes and configuration methods to update a router's configuration file with current and prior versions of Cisco Internetwork.
Ch.2 – Introduction to Routers CCNA 2 version 3.0 Rick Graziani Cabrillo College.
Introduction to Routers
Routers 1st semester
Configuration Modes and TFTP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
Chapter 2: Configure a Network Operating System
Cisco S2 C6 Router Configuration 1. Router Boot Up Router uses following from config-startup when it boots –Cisco IOS software version –Router identification.
 Router Configurations part1 2 nd semester
COMPUTER NETWORK AND DESIGN
+ Lecture#3: Configuring a Network Operating System Asma AlOSAIMI.
Chapter 6.  Upon completion of this chapter, you should be able to:  Configure switches  Configure VLANs  Verify configuration settings  Troubleshoot.
1 Dr. Tom Hicks Computer Science Department Trinity University 1.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
Cisco Routers & IOS Introduction. Router Interface ● Serial cable ● Command line interface ● Efficient ● Fast ● Universal across all Cisco equipment ●
LAN Connections.
Operating Cisco IOS Software
Lecture#3: Configuring a Network Operating System
Instructor Materials Chapter 8 Configuring Cisco Devices
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
CS 380 Switch/Router Lab Project Introduction
Configuring a Network Operating System –
© 2002, Cisco Systems, Inc. All rights reserved.
INITIAL CONFIGURATION.
Instructor Materials Chapter 2: Configure a Network Operating System
CISCO CERTIFIED NETWORK ASSOCIATE
Chapter 2: Configure a Network Operating System
Understanding Switch Security
Introduction to Cisco IOS -(Internetwork Operating System)
Router Startup and Setup
Cisco S2 C5 Router Startup.
Chapter 5: Switch Configuration
Cisco Switching Basics
Chapter 2: Basic Switching Concepts and Configuration
Securing Access.
Understanding Switch Security
Chapter 5: Switch Configuration
Chapter 2: Configure a Network Operating System
Understanding Cisco Router Security
Chapter 5: Switch Configuration
Instructor & Todd Lammle
Instructor & Todd Lammle
Fundamentals of Computer Networks
Router Startup and Setup
Introduction to Cisco IOS -(Internetwork Operating System)
Lecture9: Embedded Network Operating System: cisco IOS
資訊網路專題 Router & Practice
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

Introduction to Networking Switch Access

Unmanaged and Managed Switches There are two main types of switches Unmanaged switches are low-end switches designed for ease-of-use and situations where default settings are sufficient Managed switches are more advanced and must be configured to use Managed switches not only allow for more customization but also allow for greater security measures Managed switches need a separate PC in order to be configured, and are able to be managed two in ways Out-of-Band management In-Band management

Out-of-Band Management Out-of-Band management is when we use a dedicated switch port in order to connect a computer to our router This is done using a rollover cable (also called a console cable) The initial configuration to the router must be done this way, since the router will need to be set up with an IP address and authentication information to use In-Band management

In-Band Management In-Band management is when we use a standard network connection to access the switch This will require us to use a remote access protocol, like Telnet, SSH, or a browser-based application When using a browser based-configuration, HTTPS is much more secure than HTTP, since HTTP will transmit data such as authentication information as plain text. Telnet should be avoided in favor of SSH for the same reason

Rollover Cable Rollover cables allow a managed switch to connect through its console port One end will connect to the switch through an RJ45 connection and the other end will connect to the PC with a serial connection Since serial ports are an older technology, many console cables have a USB connection instead When using these, you would need to install a USB driver to communicate with the switch

Terminal Emulation Software After creating a physical connection to the switch, you must create a logical connection as well PuTTY, SecureCRT are two popular emulation softwares out of many By default a Cisco switch will not have authentication information set on it, therefore they will not need a username or password the first time it is accessed Cisco switches (one of the most popular brands) have two modes when access them by terminal

User Mode and Privileged Mode When first entering the system you will be in user mode It is designated by having “>” as the text prompt User mode allows you to see basic information, but not configure settings or access sensitive information The command to switch modes is “enable” Privileged mode allows for customization and full access to switch data It is designated with “#” as the text prompt

Running-config vs Startup-config Running-config is the current configuration for the switch Once the switch turns off and its RAM is cleared, the running configuration is lost Startup-config is the configuration for the switch that gets loaded up when the switch is turned on If we want any changes to be permanent they have to be loaded into startup configuration

User mode passwords There are many different user mode passwords available for us to set, but we’re going to focus on two differentiated on how the switch is being accessed Console password This is the password to access the switch from the console port Virtual terminal passwords This is the password to access the switch using In-Band management remotely

Enable Mode Passwords We may want a separate password for privileged mode to protect our switch from being configured from a non-authorized user Enable Mode Password This password will restrict access to enable mode, but it is unencrypted Enable Mode Secret Password This password will restrict access to enable mode, and is encrypted If both enable mode secret password and enable mode password are set, the secret password will take priority and be necessary. Because of this, the secret password is usually set alone

Initial Terminal Settings for a Cisco Switch When initially connecting to a Cisco switch, make sure you use the following settings