Training Cisco Certified Network Associate (CCNA )

Slides:



Advertisements
งานนำเสนอที่คล้ายกัน
E-COMMERCE WEBSITE Smartzap Co., Ltd.. Company Profile บริษัท สมาร์ทแซป จำกัด ก่อตั้งเมื่อปี 2543 (13 ปี ) ในช่วงยุค Internet เพิ่ง เริ่มต้น เป็นบริษัทที่ดำเนินงานทางด้าน.
Advertisements

Liang, Introduction to Java Programming, Sixth Edition, (c) 2007 Pearson Education, Inc. All rights reserved Java Programming Language.
คำสั่ง DISPLAY รูปแบบที่ 1 DISPLAY identifier-1, identifier-2 … literal-1 literal-2 [ UPON mnemonic-name ]  ตัวอย่าง DISPLAY STUDENT-NAME. DISPLAY.
Thanyapon S., ThaiAdmin Trainer Team Chap CCNA.
Set is a basic term in Mathematics. There is no precise definition for term “set”, But roughly speaking, a set is a collection of objects, Things or symbols,
Over the Net Solution. Serial Over the Net SN0108/SN0116 8/16 Port Serial Over the Net Front Rear.
Arithmetic Verb Template. ADD MOVE ZERO TO NO. ADD 1 TO NO. 0 1.
ขั้นตอนวิธีและเครื่องมือในการพัฒนาโปรแกรม (ต่อ)
Braille OCR Mobile Application
Over the Net Solution. Power Over the Net PN7320 Power Over the Net.
รู้จักกับเทคโนโลยี RFID เบื้องต้น
Emergency Response System for Elderly and PWDs: Design & Development
นายรังสฤษดิ์ตั้งคณา รหัส นายวสันต์ ชานุชิต รหัส อาจารย์ที่ปรึกษาโครงการ ผศ. ดร. ดารณี หอมดี อาจารย์ที่ปรึกษาโครงการร่วม ดร. วาธิส.
TCP/IP.
อาจารย์ มธ. อธิบายการใช้ โมเดลของ
ระบบการจัดเก็บในคลังสินค้า
1 วิชาสัมมนา MII การวิเคราะห์ประสิทธิภาพของโมไบล์ไอพี เวอร์ชั่นหกสำหรับระบบปฏิบัติการลีนุกส์ Performance Analysis Of Mobile IPv6 For Linux Testbed System.
: Chapter 1: Introduction 1 Montri Karnjanadecha ac.th/~montri Image Processing.
Color Standards A pixel color is represented as a point in 3-D space. Axis may be labeled as independent colors such as R, G, B or may use other independent.
Computer Network (TCP/IP Overview)
บทที่ 12 Virtual Private Networks
ITEC4610 Network Switching and Routing
NETE0516 Operating Systems
Chapter 19 Network Layer: Logical Addressing
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
Course Software Engineering SE Overview and Introduction.
Computer Graphics.
คำสั่ง READ รูปแบบ READ file-name RECORD [INTO identifier] [AT END imperative- statement] ตัวอย่าง READ STUDENT-FILE AT END GO TO END-PROCESS. READ CUSTOMER-FILE.
Firewall IPTABLES.
Network programming Asst. Prof. Dr. Choopan Rattanapoka
การออกแบบและพัฒนาซอฟต์แวร์ บทที่ 7 การทดสอบโปรแกรม
Sripatum University IS516 การสื่อสารคอมพิวเตอร์และเครือข่าย
Sawit Soothipunt Senior Product Manager Microsoft (Thailand) Limited.
Page: 1 โครงสร้างคอมพิวเตอร์ และภาษาแอสเซมบลี้ ผศ. บุรินทร์ รุจจน พันธุ์.. ปรับปรุง 19 ตุลาคม 2555 Introduction to Batch.
Chapter 8 Local Area Networks - Internetworking
โดย นรฤทธิ์ สุนทรศารทูล สถาบันเทคโนโลยีพระจอมเกล้าเจ้าคุณทหารลาดกระบัง
การติดตั้งอุปกรณ์ปลายทาง
Algorithm Efficiency There are often many approaches (algorithms) to solve a problem. How do we choose between them? At the heart of computer program.
วิธีการ Auto ship.
Introduction to Earned Value Analysis.
iWaLL โดย 1. นายวีกิจ สัจจะมโนรมย์
Java Programming Language สาขาวิชาระบบสารสนเทศ คณะบริหารธุรกิจ มหาวิทยาลัยเทคโนโลยีราชมงคลกรุงเทพ.
STACK ADT By Pantharee S.. Stack Model  A list with the restriction that insertions deletions can be performed in only one position (LIFO)  Push – insert.
1-1: Software Project Management การจัดการโครงงานซอฟต์แวร์ Software Project Management การจัดการโครงงานซอฟต์แวร์ ความหมายการจัดการโครงงาน.
การสร้าง WebPage ด้วย Java Script Wachirawut Thamviset.
Chapter 3 Simple Supervised learning
Chapter 1/1 Arrays. Introduction Data structures are classified as either linear or nonlinear Linear structures: elements form a sequence or a linear.
05/04/60 3 Copyrights by Ranet Co.,Ltd. All rights reserved.
Protocol ทำเราท์เตอร์เป็นเซิร์ฟเวอร์แจกไอพี Dynamic Host Configuration
Microprocessor and Interfacing PIC Flash Memory Segments 2K
Bitcoin Mining. Hello, I’m Pawaris and I love Bitcoin.
 Mr.Nitirat Tanthavech.  HTML forms are used to pass data to a server.  A form can contain input elements like text fields, checkboxes, radio-buttons,
Santi Sa-Nguansup CCIE #8615. P.2 Understanding the Flow of IP Datagrams โครงการพัฒนาบุคลากรสำหรับการ บริหารจัดการเครือข่าย คณะวิศวกรรมศาสตร์ มหาวิทยาลัยมหิดล.
CCNA Configuration Mr.Thongrob Auxsorn.
1 LAN Implementation Sanchai Yeewiyom School of Information & Communication Technology Naresuan University, Phayao Campus.
OSI 7 LAYER.
OSI Network Layer TCP/IP Internet Layer วิชาการสื่อสารข้อมูลและเครือข่าย นายวุฒิชัย คำมีสว่าง.
การสื่อสารข้อมูล.
2.1 Spanning Tree Protocol
Routing Protocol and Concepts
Chapter 8: Single-Area OSPF
เครือข่ายคอมพิวเตอร์
บทที่ 3 โพรโตคอล ทีซีพีและไอพี TCP / IP
Wireless Network เครือข่ายไร้สาย
แบบจำลองเครือข่าย (Network Models)
TCP/IP Protocol นำเสนอโดย นส.จารุณี จีนชาวนา
เครือข่ายคอมพิวเตอร์
Boson Netsim Simulator ภาควิชาวิศวกรรมไฟฟ้าและคอมพิวเตอร์
อินเทอร์เน็ตเบื้องต้น
การออกแบบระบบ System Design.
ใบสำเนางานนำเสนอ:

Training Cisco Certified Network Associate (CCNA 640-802) Mr.Kriangsak Namkot jodoi@jodoi.com jodoi1819@hotmail.com http://www.jodoi.com

Day 1 Internetworking Introduction to TCP/IP Subnetting,Variable Length Subnet Masks(VLSMs),and Troubleshooting TCP/IP Internetworking Operating System(IOS) and Security Device Manager(SDM) Managing a cisco internetwork LAB Configuration

Introduction to CCNA Exam

General Certifications

General Certifications

CCNA Certification

Cisco Icons and Symbols

Internetworking เป็นการเชื่อมโยงระบบเครือข่ายเข้าด้วยกัน เพื่อให้เครื่องในแต่ละเครือข่ายสามารถติดต่อถึงกันได้ Internet เป็นตัวอย่างหนึ่งของการทำ Internetworking สามารถเชื่อมโยงเครือข่ายทั้งโลกเข้าด้วยกัน โดยใช้โปรโตคอล TCP/IP Intranet เป็นการประยุกต์ใช้ Internet เฉพาะภายในองค์กร

Defining Components of the Network Home Office Mobile Users Internet Note: The two connections between the same sites are for redundency. Emphasize: The type of connections typical in a home office may be asynchronous dial-up or ISDN BRI. Mobile users only use dial-up. Branch offices and Central sites have the connections just stated. In addition they may have leased lines and packet switched services, to list just a few. Branch Office Main Office

Defining the Components of a Network (cont.) Branch Office Floor 2 Emphasize: Breaking up the corporate network into smaller components makes network design and management more managable. Transition: The next few pages a heirarchical model used in network design. Server Farm ISDN Floor 1 Telecommuter Remote Campus

Network Structure Defined by Hierarchy Core Layer Distribution Layer Purpose: This page introduces the hierarchical model. Emphasize: This model has evolved from real-life experience in configuring very large networks. Campus network designs have traditionally placed basic network-level intelligence and services at the center of the network and shared bandwidth at the user level. Over the past few years distributed network services and switching has migrated to the user level. One approach to ensure a level of network performance is to segment the network into layers of functionality. These layers of functionality are defined by the following layers: Access Distribution Core Layer. This model permits enables designers to define building blocks that interconnect users and services. It is important to remember that the hierarchical model refers to conceptual layers that provide functionality. The actual demarcation between layers does not necessarily have to be a physical link. This demarcation can also refer to the backplane of a particular device Transition: The following describes the access layer of the hierarchical model. Access Layer

OSI Model Overview

OSI Model Overview Application (Upper) Layers Presentation Session Transport Layer Layer 2 of 2: Purpose: This figure orients the students to the next set of concepts. Emphasize: The Data Link layer of the OSI reference model is implemented by Switches and Bridges. These devices encapsulate date in “frames”. The Network layer of the OSI reference model is implemented by Routers. These devices encapsulate data in ‘packets’. The Transport layer of the OSI reference model is implemented by various protocols; one of which is TCP. TCP uses ports and encapsulates the data in ‘segments’. Network Layer Data Flow Layers Data Link Physical

Role of Application Layers EXAMPLES Telnet FTP ASCII EBCDIC JPEG Operating System/ Application Access Scheduling Application User Interface How data is presented Special processing such as encryption Presentation Keeping different applications’ data separate Session Slide 4 of 4: Purpose: This figure orients the students to the entire OSI model stack. Emphasize: The lower layers sit below the upper three layers. The remainder of this course is focused on the lower layers. Transition: The following discusses the physical layer of the OSI reference model. Transport Layer Network Layer Data Link Physical

Role of Data Flow Layers Application Presentation EXAMPLES Session Reliable or unreliable delivery Error correction before retransmit TCP UDP SPX Transport Provide logical addressing which routers use for path determination IP IPX Network Slide 5 of 5: Purpose: This figure reviews the entire OSI model stack. Emphasize: The upper layers sit above the lower layers. Transition: The following discusses encapsulation and de-encalsulation. Combines bits into bytes and bytes into frames Access to media using MAC address Error detection not correction 802.3 / 802.2 HDLC Data Link Move bits between devices Specifies voltage, wire speed and pin-out cables EIA/TIA-232 V.35 Physical

Encapsulating Data PDU Segment Transport Network Packet Application (Protocol Data Unit) Presentation PDU Session Upper Layer Data Segment Transport TCP Header Upper Layer Data Network Packet IP Header Data Purpose: This figure illustrates encapsulation. Emphasize: The protocol data units (PDUs) are the terms used in the industry and in this course to describe data at the different layers. Encapuslation is a key concept that illustrates how data is formatted prior to being sent across a link. This example is an illustration is Ethernet (or token ring) at the data link and physical layer and TCP/IP at the network and transport layers. Transition: The following discusses de-encalsulation. LLC Header Data FCS Data Link Frame MAC Header Data FCS Physical Bits 0101110101001000010

Introduction to TCP/IP Department of Defense (DoD)

Introduction to TCP/IP

Introduction to TCP/IP TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal Datagram Protocol or Unreliable Datagram Protocol.

Introduction to TCP/IP

Introduction to TCP/IP

IP Address Private IP

IP Address http://www.jodoi.com/IP/ip4.html เมื่อเราได้ IP Address มา 1 ชุด สิ่งที่จะต้องบอกได้จาก IP Address ที่ได้มาคือ 1. Network IP คือ IP Address อะไร 2. Broadcast IP คือ IP Address อะไร 3. Range host IP ที่สามารถนำมาใช้งานได้ หรือ จำนวน host Per Subnet 4. Subnet Mask คือ IP Address อะไร 5. จำนวน Subnet Ex.1 192.168.22.50/30 Ex.2 192 .168.5.33/27 which IP address should be assigned to the PC host ? A.192.168.5.5 B.192.168.5.32 C. 192.168.5.40 D. 192.168.5.63 E. 192.168.5.75

IP Address Ex.3 ข้อใดบ้างเป็น IP ที่ใช้งานได้จริง 10.10.10.0/13 244.0.0.1/24 10.159.255.255/12 10.127.255.255/13 10.179.0.255/15

IP Address 4.Which of the following addresses can be assigned to network hosts when given a subnet mask of 255.255.255.224?(select three options.) 201.45.116.159 134.178.18.62 192.168.16.91 92.11.178.93 217.63.12.24 15.234.118.63

IP Subnet-Zero

Classless Inter-Domain Routing

Variable Length Subnet Masks ( VLSM ) เครือข่ายที่เราใช้งานกันอยู่ไม่จำเป็นจะต้องมีขนาดเท่ากันเสมอไป เช่น LAN ต้องการ IP สำหรับอุปกรณ์มากกว่า 2 เครื่อง การเชื่อมต่อแบบจุดต่อจุด (Point-to-Point) ต้องการแค่ 2 IP ก็เพียงพอ VLSM จะยอมให้มีการแบ่ง Subnet ได้มากกว่า 1 ครั้งสำหรับแต่ละชุด IP เพื่อให้ได้ขนาด IP ตามที่ต้องการ VLSM จะช่วยลดจำนวนการจัดสรร IP ลง เป็นการใช้งาน IP อย่างมีประสิทธิภาพ VLSM ยังช่วยให้ Router ทำงานได้เร็วขึ้นเนื่องจากขนาดของ Routing Table เล็กลง

Variable Length Subnet Masks ( VLSM )

Summarization Summarization, also called route aggregation, allows routing protocols to advertise many networks as one addres

Summarization

Cisco IOS Software EXEC Mode There are two main EXEC modes for entering commands. Slide 1 of 2 Purpose: This slide describes the user EXEC mode. Emphasize: Present the operational aspects of user EXEC mode. Tell your students that this command level allows them to access only a limited amount of basic monitoring commands. Emphasize that they need to look carefully at the command prompter to make sure that they are in the appropriate mode for the command that they want to enter into the network device. If your class can remember this, this will eliminate (or at least reduce) the number of times that you have to point out that a lab step is failing because the student is in user mode rather than in enabled mode. Transition: An introduction of privileged (or enabled) mode.

Cisco IOS Software EXEC Mode (Cont.) Slide 2 of 2 Purpose: This slide describes the privileged EXEC mode. Emphasize: As you present the introductory material on privileged (also called “enabled”) mode, emphasize that this mode is the entry mode for all other configuration modes. Tell your students that they will need this mode for ICND labs and most of the network administration that they do back on the job. Use the analogy of “the price of admission.” You must enter enable followed by the correct enable password; otherwise, you will not get into the network device; and will have to stay outside in user mode where you can only see a few basic things about the network device. Note: This slide ends the introductory material that is common to the network devices covered in ICND. Transition: Material specific to the initial startup of the Catalyst switch.

Overview of Router Modes Emphasize: Here is a list of some of the configuration modes available. For a complete list of the router configuration modes, refer to the Cisco Documentation CD-ROM.

Saving Configurations wg_ro_c# wg_ro_c#copy running-config startup-config Destination filename [startup-config]? Building configuration… Emphasize: Copying to NVRAM overwrites the contents in NVRAM. Copies the current configuration to NVRAM

Configuring Router Identification Slide 2 of 2 Emphasize: Layer 2—The interface description command allows you to enter a one-line descriptive statement for each interface. This description is displayed in the output from the show interfaces command and appears in the show running-config and show startup-config listings. Sets the local identity or message for the accessed router or interface

Configuring a Router Password Layer 2 of 2 Emphasize: The router has one enable password. Remember that this is your only protection. Whoever owns this password can do anything with the router, so be careful about communicating this password to others. To provide an additional layer of security, particularly for passwords that cross the network or are stored on a TFTP server, you can use either the enable password or enable secret commands. Both commands accomplish the same thing; that is, they allow you to establish an encrypted password that users must enter to access enable mode (the default), or any privilege level you specify. Cisco recommends that you use the enable secret command because it uses an improved encryption algorithm. Use the enable password command only if you boot an older image of the Cisco IOS software, or if you boot older boot ROMs that do not recognize the enable secret command. If you configure the enable secret password, it is used instead of the enable password, not in addition to it. Cisco supports password encryption. Turn on password encryption using the service password-encryption command. Then enter the desired passwords for encryption. Immediately, on the next line, enter the no service password-encryption command. Only those passwords that are set between the two commands will be encrypted. If you enter service password-encryption and then press Ctrl-Z to exit, all passwords will be encrypted. Note: Password recovery is not covered in the course materials. Refer the students to the IMCR class.

Other Console-Line Commands Router(config)#line console 0 Router(config-line)#exec-timeout 0 0 Prevents console session timeout Router(config)#line console 0 Router(config-line)#logging synchronous Emphasize: If the student enters no exec by mistake, the console port EXEC mode will be disabled once the student is logged out of the current session. If this happens, you have to break into the router using ROM monitor to recover (set the config reg to 0x2142 so it will ignore NVRAM). Redisplays interrupted console input

Configuring an Interface Router(config)#interface type number Router(config-if)# type includes serial, ethernet, token ring, fddi, hssi, loopback, dialer, null, async, atm, bri, tunnel, and so on number is used to identify individual interfaces Router(config)#interface type slot/port Router(config-if)# Purpose: This slide shows the interface configuration mode. Emphasize: The top line is the format of the command used in fixed-port routers. The type field shows the interface type, which can be Ethernet, Token Ring, or another interface. The number field is the number of the interface. For example, if the router has two Ethernet interfaces, and one is known as Ethernet0, the other will be called Ethernet1. The second command is used on the Cisco 7000 and 7200 series routers, which can accept multiple interface cards with multiple ports on each card. In this case, the first number is the number of the card, or slot number. The second number is the port on the card. For example, on the second interface card, the first Ethernet interface is specified as Ethernet 2/0. If you have Cisco 7000 and 7500 series routers with VIP cards, you define an interface by slot, port adapters, and port numbers. Port adapters are assigned either a 0 or 1 number. Use the exit command to leave the current configuration mode. For modular routers, selects an interface Router(config-if)#exit Quits from current interface configuration mode

Configuring a Serial Interface Enter Global Configuration Mode Router#configure terminal Router(config)# Router(config)#interface serial 0 Router(config-if)# Specify Interface Set Clock Rate (on DCE interfaces only) Router(config-if)#clock rate 64000 Router(config-if)# Layer 2 of 2 Purpose: This slide shows two configuration parameters for the serial interface. Emphasize: Layer 2— Issue the clock rate command with the desired speed. On serial links, one side of the link acts as the DCE and the other side of the link acts as the DTE. By default, Cisco routers are DTE devices, but can be configured as DCE devices. In a “back-to-back” cable configuration where a modem is not used, one end must provide the clocking signal. You must specify a clock rate for the DCE interface end in this type of environment. Desired clock rate is in bits per second. Be sure to enter the complete clock speed. For example, a clock rate of 56000 cannot be abbreviated to 56. If you are using an EIA/TIA-232 cable, using a high clock rate may cause errors on the line. Use the show controller serial 0 command to verify if the router has a DCE or DTE cable connected to it. Note, the router only reads the DCE/DTE cable information at startup. The bandwidth command overrides the default bandwidth (1.544M). The bandwidth parameter (in kbps) is used to calculate statistics like load and it is used by routing protocols such as IGRP. We will learn more about routing protocols in Chapter 9, “Determining IP Routes.” To return to privileged EXEC mode, enter exit until the privileged EXEC prompt appears. Note: In the lab, the core router has the DCE cables and the workgroup router has the DTE cable. Router(config-if)#bandwidth 64 Router(config-if)#exit Router(config)#exit Router# Set Bandwidth (recommended)

Ethernet media-type Command Router(config)#interface ethernet 2 Router(config-if)#media-type 10baset Selects the media-type connector for the Ethernet interface Purpose: This slide shows examples of the commands used to configure other types of interfaces. Note: The 2500 series router will auto-sense between the AUI or the 10BaseT port. Routers like the 4000 series router default to the AUI port and you have to use the media-type command to specify 10BaseT.

Disabling or Enabling an Interface Router#configure terminal Router(config)#interface serial 0 Router(config-if)#shutdown %LINK-5-CHANGED: Interface Serial0, changed state to administratively down %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to down Administratively turns off an interface Router#configure terminal Router(config)#interface serial 0 Router(config-if)#no shutdown %LINK-3-UPDOWN: Interface Seria0, changed state to up %LINEPROTO-5-UPDOWN: Line Protocol on Interface Serial0, changed state to up Emphasize: The Catalyst 1900 switch also uses the shut and no shut command. Enables an interface that is administratively shut down

Configuring the Router IP Address wg_ro_c#configure terminal wg_ro_c(config)#interface ethernet 0 wg_ro_c(config-if)#ip address 192.168.1.1 255.255.255.0 wg_ro_c(config-if)#no shutdown wg_ro_c(config-if)#exit

Router show interfaces Command Ethernet0 is up, line protocol is up Hardware is Lance, address is 00e0.1e5d.ae2f (bia 00e0.1e5d.ae2f) Internet address is 10.1.1.11/24 MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255 Encapsulation ARPA, loopback not set, keepalive set (10 sec) ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:07, output 00:00:08, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 81833 packets input, 27556491 bytes, 0 no buffer Received 42308 broadcasts, 0 runts, 0 giants, 0 throttles 1 input errors, 0 CRC, 0 frame, 0 overrun, 1 ignored, 0 abort 0 input packets with dribble condition detected 55794 packets output, 3929696 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 4 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Purpose: This slide presents the show interfaces command, which indicates whether the network is operating at the physical and data link layers. The command output is interpreted later in this chapter. Emphasize: The top line of the output tells us that the line is up. A few lines down, the output provides the IP address, and below that some characteristics like BW for bandwidth, and DLY for delay. On the next line down, we find an encapsulation type of ARPA. ARPA means Ethernet II, which is the default IP encapsulation type for Ethernet interfaces on Cisco routers. A runt is an Ethernet frame that is too small to be legal (less than 64 bytes), and a giant is an Ethernet frame that is too big (greater than 1518 bytes).

Interpreting the Interface Status Purpose: This slide explains how to interpret the show interfaces serial command output. Emphasize: The show interfaces serial command output indicates that the serial interface is up and the line protocol is up. The first parameter refers to the hardware layer and essentially reflects whether the interface is receiving the Carrier Detect signal from the other end. The second parameter refers to the data link layer. This parameter reflects whether the data link layer protocol keepalives are being received. If both the interface and the line protocol are up, the connection is operational. If the hardware is up and the line protocol is down, a connection problem exist such as no clocking, wrong encapsulation type, or no keepalives. If both the line protocol and the interface are down, a cable might never have been attached to the router. On the serial cable, you can plug in the cable upside-down, causing the pins on the serial cable to break. There is one more possibility. If the information says “administratively down,” you have manually disabled (shut) the interface. Cisco offers a hardware class (IMCR) that discusses the router hardware in more detail.

Verifying a Serial Interface Configuration Router#show interface serial 0 Serial0 is up, line protocol is up Hardware is HD64570 Internet address is 10.140.4.2/24 MTU 1500 bytes, BW 64 Kbit, DLY 20000 usec, rely 255/255, load 1/255 Encapsulation HDLC, loopback not set, keepalive set (10 sec) Last input 00:00:09, output 00:00:04, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0 (size/max/drops); Total output drops: 0 Queueing strategy: weighted fair Output queue: 0/1000/64/0 (size/max total/threshold/drops) Conversations 0/1/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec (output omitted) BW 64 Kbit, Purpose: This slide shows how to verify the changes you make to an interface. Emphasize: Notice the bandwidth has been changed to 64K from the default of 1.544M.

Serial Interface show controller Command Router#show controller serial 0 HD unit 0, idb = 0x121C04, driver structure at 0x127078 buffer size 1524 HD unit 0, V.35 DTE cable . V.35 DTE Cable Emphasize: This command requires a space between the word serial and the interface number. The router only checks for the cable type at powerup. Shows the cable type of serial cables

Config DHCP

Setting Secure Shell (SSH)

Setting Secure Shell (SSH)

Doing the do Command

Using the Pipe

Cisco’s Security Device Manager

Cisco’s Security Device Manager Now we can consider another industry first from Cisco. We were the first to market with an Intrusion Prevention System, or IPS, in a router, providing an inline ability to mitigate network attacks by dropping attack packets. Cisco IPS can be used it for combating worms and viruses in real time, utilizing the signature database of Cisco IDS Sensors; a wide range of attack and worm signatures are already available – over 740 and growing! And note that the signature names and numbers are identical to those in Cisco IDS appliances, making management and administration easier. And with Cisco SDM, you have a powerful and flexible GUI to manage signatures and actions. Having IPS built into the router gives Cisco a significant competitive advantage. Visibility and control of the network is expanded without having to add a separate device, with all the associated management and support costs. IPS can be used where it may previously have been uneconomic to deploy a dedicated IDS sensor to mitigate the impact of worms, viruses and trojans.

Cisco’s Security Device Manager Now let’s look at Threat Defence. The Cisco IOS Firewall integrates robust firewall functionality and intrusion prevention for every network perimeter. It is an uncompromising Enterprise class EAL 4-certified firewall that enables scalable deployment to meet the bandwidth and performance requirements of the branch office, typically in the 125 Mbps to 1.1Gbps range. In many ways, the Cisco IOS Firewall is superior to Firewall appliances. It adds greater depth and flexibility to existing Cisco IOS security solutions, such as authentication, encryption, and failover, by delivering state-of-the-art security features: stateful packet inspection of IPv4 and IPv6, application-based filtering, protocol anomaly detection, dynamic per-user authentication and authorization, VRF aware, URL Filtering and others. The Transparent Firewall function allows customers to deploy a Firewall without making address changes. In addition, when it is combined with Cisco IOS IPsec and Cisco IOS Technologies, such as L2TP tunneling and Quality of Service (QoS), Cisco IOS Firewall provides a complete, integrated virtual private network (VPN) solution. Remember, this is a real Firewall: it is ICSA certified and has an easy GUI for managing the policy table.

Managing a cisco internetwork เปรียบเหมือน windows (OS) เปรียบเหมือน hard disk Flash NVRAM RAM เก็บ IOS เก็บ config เก็บ config แต่ยังไม่ save ROM เปรียบเหมือน Bios บน PC

Router Power-On/Bootup Sequence Perform power-on self test (POST). Load and run bootstrap code. Find the Cisco IOS software. Load the Cisco IOS software. Find the configuration. Load the configuration. Run the configured Cisco IOS software. Emphasize: In a later slide, there is a very detailed flowchart of the router startup process.

Finding the Cisco IOS Software Note: There is a detailed flowchart of the router startup process on the next slide.

Loading the Cisco IOS Software from Flash Memory Note: The 2500 series routers do not operate this way. The 2500 series routers normally run Cisco IOS from Flash. The Cisco IOS in Flash is not compressed but it is relocatable. Relocatable means the Cisco IOS image can be run from Flash or from RAM. The 2500 can run from RAM if you use the boot system tftp command to boot the Cisco IOS image. The Rxboot mode is also run from RAM on the 2500 routers. The flash memory file is decompressed into RAM.

Loading the Configuration Emphasize: Using the default config register value (0x2102), the router will load the config from NVRAM at startup. Load and execute the configuration from NVRAM. If no configuration is present in NVRAM, enter setup mode.

Determining the Current Configuration Register Value wg_ro_a#show version Cisco Internetwork Operating System Software IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(3), RELEASE SOFTWARE (fc1) Copyright (c) 1986-1999 by cisco Systems, Inc. Compiled Mon 08-Feb-99 18:18 by phanguye Image text-base: 0x03050C84, data-base: 0x00001000 ROM: System Bootstrap, Version 11.0(10c), SOFTWARE BOOTFLASH: 3000 Bootstrap Software (IGS-BOOT-R), Version 11.0(10c), RELEASE SOFTWARE (fc1) wg_ro_a uptime is 20 minutes System restarted by reload System image file is "flash:c2500-js-l_120-3.bin" --More-- Configuration register is 0x2102 Emphasize: Use the show version command to display the value of the config register setting. When you change the config register, you will see the change from the show version output: Configuration register is 0x2102 (will be 0x2142 at next reload). The new config register value will be used at the next reload. Configuration register value in show version

Configuration Register Values Configuration register bits 3, 2, 1, and 0 set boot option. Check the configuration register value with show version. Layer 4 of 4 Emphasize: Layer 4—Finishes with the third case, a boot field setting in the range of 0x2 to 0xF. The entry of a configuration register value in the 0x2 to 0xF range is significant. When the router attempts to boot from the net (Netboot), the bootstrap program generates a Cisco IOS filename based on the value of the boot field. For example, with the setting 0x2, the default Cisco IOS filename generated will be cisco2-xxxx, where xxxx refers to a processor name (for example, 2500). Again, refer students to the IMCR course for details. You use the config-register command to change the value. Notice that the bottom lines of the show version output indicates what value the config register will be on the next reload.

Configuration Register Values รหัสของ bootstrap ทั่วไป 0x2102 มีได้ 3 ค่า คือ 0 = Rommon [>] 1 = Rx-boot [router(boot)] 2 = IOS [router>] เอามาเขียนเป็นเลขฐานสอง 0010 0001 0 0 = 9600 0 1 = 4800 1 0 = 2400 1 1 = 1200 มีได้ 2 ค่าคือ 0 = load config จาก NVRAM 4 = skip การ load config

Password Recovery

show version Command Router#show version Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-JS-M), Version 12.0(7a), RELEASE SOFTWARE (fc1) Copyright (c) 1986-2002 by cisco Systems, Inc. Compiled Tue 05-Feb-02 01:48 by pwade Image text-base: 0x80008088, data-base: 0x80B0404C ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) Router uptime is 1 minute System restarted by reload System image file is "flash:c2600-js-mz.120-7a.bin" cisco 2610 (MPC860) processor (revision 0x300) with 53248K/12288K bytes of memory. Processor board ID JAD06090BMD (2719249260) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. Basic Rate ISDN software, Version 1.1. 1 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 1 ISDN Basic Rate interface(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write) Configuration register is 0x2102 Note: The current state of the Flash memory is in read-only mode. It is running Cisco IOS from Flash. This router has a total of 16 MB of Flash memory. The Flash contains one Cisco IOS image and there is 6.69 MB of available space left in Flash.

show flash Command wg_ro_a#show flash System flash directory: File Length Name/status 1 10084696 c2500-js-l_120-3.bin [10084760 bytes used, 6692456 available, 16777216 total] 16384K bytes of processor board System flash (Read ONLY) Note: The current state of the Flash memory is in read-only mode. It is running Cisco IOS from Flash. This router has a total of 16 MB of Flash memory. The Flash contains one Cisco IOS image and there is 6.69 MB of available space left in Flash.