SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
CCNA4.com

Basic Cisco Router Configuration and Management
ROUTER COMPONENTS

RAM
Random-Access Memory similar to the function as RAM in PCs. This is where the IOS runs
its processes. It also contains the running configuration, routing and other tables as well as
packet buffers.

ROM
This Read-Only Memory stores a older 'lite' IOS used to boot the router for the very first time,
or when the Flash memory is erased or corrupted.

FLASH
This piece of 'flash-able' memory stores the IOS image, the operating system of the router.

NVRAM
In contradiction to normal RAM, Non-Volatile Random-Access Memory is a special type of
memory that doesn't lose its content when the router's power is turned off. It stores the startup
configuration and the configuration register.

Config register
The NVRAM has a special location that contains the 16-bit configuration register. Every time
the router boots it reads this value. The config-register value is a hexadecimal value ranging
from from 0x0000 to 0xFFFF and can be set byusing the config-register command. The most
important portion of the configuration register to understand for the exam is the boot field (bit
0 through 3, hexadecimal range 0x0000-0x000F). The boot field value is used to specify from
which location the IOS image should be loaded or bypassed even during startup.

      Boot field Meaning

      0x0 The router will enter ROM monitor mode and remain at the system bootstrap
       prompt.

      0x1 The IOS image stored in ROM will be loaded.

      0x2-0xF The router will boot as normal and load the default IOS image stored in Flash
       and enables boot system commands.


The remaining 12 bits of the configuration register are used for various functions such as
enabling/disabling the Break function, setting the Console line speed, bypassing NVRAM,
and controlling the broadcast address. To change the configuration register you have to enter
be in global configuration mode. Use the command configure terminal often abbreviated to
conf t in privileged EXEC mode to enter global config mode. You can enter privileged EXEC
mode using the enable command. When you enter the correct password the prompt will
change to Router# (where "Router" is the hostname of the router).

Once you are in global config mode use the following command to change configuration
register value:
Router(config)#config-register 0x2102
where 0x2102 is an example of a config-register value.

CCNA4.com
CCNA4.com

You can view the current configuration setting by using the Router#show version command.
The last line of the output will display the current value and if it is different, the value after
reboot:
Configuration register is 0x2142 (will be 0x2102 at next reload)


Router start-up sequence

A router boots similar to a regular computer as it first performs a power on self test (POST)
for the hardware, next loads bootstrap code from ROM, loads the IOS image from Flash into
RAM, performs a hardware inventory, and finally the router locates and loads a configuration
file. You can reboot a router by using the power switch or the reload command.


Initial router configuration

As mentioned earlier, the router configuration is stored in NVRAM. This is the place where
the router will search for a configuration file. Alternatively, you can configure the router to
load a configuration file from a TFTP server. If the router cannot locate a configuration file
(on a new router for example) it will start setup and it will ask if you want to enter the initial
configuration dialog. If you answer with No, you'll be taken to the command prompt and
you'll be able to configure the router manually. If you answer with Yes, you'll be taken
through a list of questions allowing you to configure the router e.g. set a hostname and enable
password and secret, configure routed and routing protocols, and assign addresses to
interfaces. You can initiate this configuration dialog at any time by using the setup command.


Manage configuration files

A Cisco router contains two configurations: the startup configuration (usually stored in
NVRAM) and the running configuration (stored in RAM). When you makes changes to the
router configuration by entering global configuration mode by using the config terminal
command, the changes are made to the running configuration.

To copy the currently running active configuration to NVRAM, i.o.w. to save a changed
running configuration to the startup configuration so it will be used the next time you reload
the router, use the following command:
Router#copy running-config startup-config

The following command loads the startup configuration stored in NVRAM into RAM and
makes it the active running configuration.
Router#copy startup-config running-config

You can also copy the running configuration to a TFTP server using the following command:
Router#copy running-config tftp 222.222.222.1
This can be done with the startup configuration as well:
Router#copy startup-config tftp 222.222.222.1

You can view the running configuration using the command:
Router#show running-config
And view the startup config using the command:

CCNA4.com
CCNA4.com
Router#show startup-config

You can use the erase command to delete the content of NVRAM:
Router#erase startup-config


Load, backup, and upgrade IOS

Instead of using the IOS stored in flash, you can load it from a TFTP server, or you can load
the limited IOS from ROM. This can be configured in the configuration file using the
following commands in global configuration mode:

To load Cisco IOS software from Flash memory use the following command:
Router(Config)#boot system flash
Although this is default behavior, using this command can be useful especially when you have
multiple IOS images stored in FLASH. If you do not specify a filename, the first
locatedimage will be loaded.

To load Cisco IOS software from a TFTP server use the following command:
Router(Config)#boot system tftp

To load Cisco IOS software from ROM use the following command:
Router(Config)#boot system rom
Note that this will load the limited IOS version and will likely prevent normal operation.

You can use a combination of these commands to provide some redundancy. You can even
specify multiple TFTP servers. Make sure you place them in the correct order, flash first, tftp
as backup, and rom as last resort. The configuration register's boot field must be set to 0x2
through 0xF, in order for the router to check the configuration file in NVRAM for boot
system commands.

To backup the IOS stored in Flash to an TFTP server use the following command:
Router#copy flash tftp 222.222.222.1 c2600-js-l_121-5.bin

To upgrade the IOS stored in Flash use the following command:
Router#copy tftp flash

You will be prompted for an IP address of the TFTP server (defaults to the broadcast address
255.255.255.255) and a filename.

To delete the content stored in Flash use the command:
Router#erase flash


CONNECTING TO A ROUTER
There are multiple ways to establish connectivity to a router to perform configuration tasks:

- Console port
Cisco routers are equipped with a Console port, which is an RJ-45 port on most routers but on
some high-end routers it's a DB-25 connector. You can connect a terminal (a notebook or a
PC for example) to the console port using a RJ-45 roll-over cable with RJ-45, DB-9, or DB-
25 connectors on the ends. A common example is a cable with a RJ-45 connector connecting

CCNA4.com
CCNA4.com
to the router's console port and a DB-9 connector on the other end connecting to the PC's
COM port. When you connect a PC to the router's console port you can use a terminal
emulator to configure the router. When you start a session the following should appear:

Router con0 is now available.
Press RETURN to get started


- Auxilary port
Many Cisco routers are also equipped with an Auxilary port, which can be used to connect a
modem and allow for remote adminstration of the router.

Managing a router using the ports mentioned above is called out-of-band management.
For more information about how to physically connect to the Console and Auxilary port
check the Cabling Guide for Console and AUX Ports and Configuring a Modem on the AUX
Port for EXEC Dialin Connectivity at Cisco.com.


- Telnet
Once your router is configured with an IP address, a Telnet connection is the most common
way to connect to a router to manually configure and monitor it. Cisco IOS, the router's
operating system, has a build-in Telnet server and a Telnet client. This allows you to connect
to a router using a telnet client from a PC but from another Cisco router as well. This type of
connection using the same network the router operates in is also known as in-band
management. Telnet sends username and password credentials in clear text and should be
replaced with SSH connections if supported.


ROUTER MODES

User EXEC mode

This is the mode you enter once you are connected, and if required, logged on to the router. In
this mode you can perform non-disruptive troubleshooting, for example, view the routing
table and status of components. You can NOT view or modify the configuration in User
EXEC mode.

When you connect to the router and press the key (Press RETURN to get started) you'll be
prompted for a password:

User Access Verification
Password:

When you enter the correct console, telnet or AUX password password (depending on how
you connect to the router) and press the User EXEC mode command prompt will appear.

Router>

"Router" is the default hostname for all Cisco routers. The > indicates you are in User EXEC
mode.

To exit User EXEC mode and quit the session with the command-line executive use one of

CCNA4.com
CCNA4.com
the following commands:
Router>logout
or
Router>exit


Privileged EXEC mode

This is similar to logging on as an adminstrator in Windows 2000 for example. When you are
in this mode, you can view and modify the configuration.

Router>enable
Password:

After submitting the correct enable password (or enable secret, which we'll discuss later on)
and pressing the key the command prompt will change again:

Router#

The # indicates you are in Privileged EXEC mode.

To exit Privileged EXEC mode and return to User EXEC mode use the following command:
Router#disable

To exit Privileged EXEC mode and quit the session with the router, use one of the following
commands:
Router#logout
or
Router#exit


Global Configuration mode

To actually change the running configuration, you'll have to enter global configuration mode
by using the command configure terminal (to configure the running configuration), or the
command configure memory (to configure the startup config) in Privileged EXEC mode.
Global configuration mode allows you to configure settings that affect the entire router, hence
its name 'global'. To show you how this works we are going to change the hostname of the
router as an example:

Router#configure terminal (usually abbreviated to conf t)
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Rnewyork1
Rnewyork1(config)#

As you can see the change immediately takes effect by looking at the prompt, which now
reflects the new name.

To exit global configuration mode and return to User EXEC mode use one of the following
commands:
Rnewyork1(config)#end
or

CCNA4.com
CCNA4.com
Rnewyork1(config)#exit
Or use the key combination CTRL-Z

You can use the following command to save the configuration to NVRAM so it will be used
next time the router starts:
Rnewyork1#copy running-config startup


Interface Configuration mode

You need to enter interface configuration mode when you want to configure settings specific
to an interface, such as assigning an IP address. To enter interface configuration mode you
must use the interface command and provide the name and number of an existing interface.
Following are some examples:

Router(config)#interface ethernet 0
Router(config-if)#

Router(config)#interface serial 2
Router(config-if)#

As you can see in the first example, the first possible interface is 0, the second Ethernet
interface on a router would be Ethernet 1, also noticable is the change in the prompt.
These commands are usually abbreviated, for example to int e1 or int s0

To exit interface configuration mode and return to global configuration mode, enter the
following command:
Router(config-if)#exit

To exit interface configuration mode and return to Privileged EXEC mode, use the key
combination CTRL-Z
or
Router(config-if)#end

Other configuration modes include:
Sub-interface configuration mode Router(config-subif)
Router configuration mode Router(config-router)
Line configuration mode Router(config-line)


CONFIGURING ROUTER PASSWORDS

This section decribes the four main passwords that are directly related to managing and
configuring the router.

Console password
Use the following commands to configure the console password. The first command is used to
enter Line configuration mode. The second configures the password "cisco123", and the third
command configures the console line to require a login.

Router(config)#line con 0
Router(config-line)#password cisco123

CCNA4.com
CCNA4.com
Router(config-line)#login


Telnet password
Use the following commands to configure a password for Telnet access:

Router(config)#line vty 0 4
Router(config-line)#password cisco123
Router(config-line)#login


Auxilary password
Use the following commands to configure the auxilary port password:

Router(config)#line aux 1
Router(config-line)#password cisco123
Router(config-line)#login


Enable password and enable secret

The enable password and enable secret are local passwords used to control access to
Privileged EXEC mode. The difference between these two is that the enable password is
stored in clear-text in the configuration file, and the enable secret is encrypted using
irreversible MD5 encryption.
For example, in the configuration file an enable password could be:
enable password cisco123
and and enable secret could be:
enable secret 5 $1$iSuI$i7TiENAn69392tYvh5wwZ1

The enable secret password overrides the regular enable password, except when and old IOS
image is used that doesn't support the encrypted enable secret.

To configure an enable password, go to global config mode and issue the following
command:
Router(config)#enable password cisco123
where cisco123 is just an example for a password.

To configure an enable secret, go to global config mode and issue the following command:
Router(config)#enable secret cisco456
where cisco456 is just an example for a password.

If you do not set an enable password or enable secret, you don't have to enter a password
when you type the enable command, but you will end up having problems connecting to the
router using telnet for example, you won't be able to enter Privileged EXEC mode.

By default all password except the enable secret are stored as clear-text in the configuration
file. When you have backups on TFTP servers or floppy disks even, this might be an
important issue. This can be solved using the following command to provide some encryption
the passwords:
Router(config)#service password-encryption
The irreversible MD5 encryption used to encrypt the enable secret is much stronger than the

CCNA4.com
CCNA4.com
rather simple encryption used by the service password-encryption, which can be decrypted by
publicly available tools.


Context-sensitive help facility

An IOS feature that helps with using the correct command syntax. For example, when you
type a command but you do not know the full syntax, you can type a ? behind it and a list with
possible options (in that particular mode) will appear:

Router#show ?
access-expression List access expression
access-lists List access lists
accounting Accounting data for active sessions
aliases Display alias commands
appletalk AppleTalk information
arap Show Appletalk Remote Access statistics
arp ARP table
async Information on terminal lines used as router interfaces
backup Backup status
bridge Bridge Forwarding/Filtering Database [verbose]
buffers Buffer pool statistics
cdp CDP information
clock Display the system clock
compress Show compression statistics
configuration Contents of Non-Volatile memory
controllers Interface controller status
debugging State of each debugging option
decnet DECnet information
dhcp Dynamic Host Configuration Protocol status
dialer Dialer parameters and statistics
dnsix Shows Dnsix/DMDP information
dxi atm-dxi information
entry Queued terminal entries
--More--

You don't need to press the key after the ?, and when the end of the list is reached the
command will be after the prompt again without the ? so you can continue typing the correct
option. (When a list like this does not fit in the maximum allowed lines, --More-- will be
displayed on the last line, press the key to scroll down per line or the to scroll down to the
next screen.)

When you type a single ? or just the command help a list with all possible commands will be
displayed.


Command history and editing features

This refers to another set of useful features which are meant to make working with the
command line interface a little bit more convinient.

By default the 10 previously issued commands are remembered. These commands can be

CCNA4.com
CCNA4.com
retrieved to use them again by pressing CTRL-P or the up arrow key. You can modify the
command- lines history buffer size using the following command:
Router#terminal history size 25
This will set the amount to 25.

You can view the history using the following command:
Router#show history

Some other useful key combinations:
CTRL-P (or UP arrow key) Displays the previous command in the history buffer.
CTRL-N (or DOWN arrow key) Displays the next command in the history buffer.
CTRL-A Jumps to the beginning of the command line.
CTRL-E Jumps to the end of the command line.
CTRL-B (or LEFT arrow key) Moves the cursor back one character.
CTRL-F (or RIGHT arrow key) Moves the cursor forward one character.
Ctrl-W Deletes the last word typed.

The arrow keys function only on ANSI-compatible terminals such as VT100s. You can
configure your terminal emulator to use VT100 emulation.

Another useful feature to assist with the command syntax is auto-complete. For example,
when you type a command partly but you don't know how to spell a particular option, you can
let IOS complete it by pressing the TAB key:

Router#show cdp nei<TAB>
Router#show cdp neighbors

This only works when the given part is enough to determine a single particular option. For
example, the command Router#show access does not result in because it could be
Router#show access-expressionRouter#show access-lists as well.

These enhanced editing features are enabled by default. If you wish to disable them, use the
following command:
Router(config)#no terminal editing


                                                                     Author: Johan Hiemstra


Read more




CCNA4.com

Weitere ähnliche Inhalte

Mehr von CCNAResources

Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 SwitchingCCNAResources
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip RoutingCCNAResources
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless ResourcesCCNAResources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANsCCNAResources
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)CCNAResources
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)CCNAResources
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)CCNAResources
 

Mehr von CCNAResources (10)

Quick Guide VLANs
Quick Guide   VLANsQuick Guide   VLANs
Quick Guide VLANs
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 Switching
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip Routing
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless Resources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANs
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 

Kürzlich hochgeladen

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Basic Cisco Router Configuration And Management

  • 1. CCNA4.com Basic Cisco Router Configuration and Management ROUTER COMPONENTS RAM Random-Access Memory similar to the function as RAM in PCs. This is where the IOS runs its processes. It also contains the running configuration, routing and other tables as well as packet buffers. ROM This Read-Only Memory stores a older 'lite' IOS used to boot the router for the very first time, or when the Flash memory is erased or corrupted. FLASH This piece of 'flash-able' memory stores the IOS image, the operating system of the router. NVRAM In contradiction to normal RAM, Non-Volatile Random-Access Memory is a special type of memory that doesn't lose its content when the router's power is turned off. It stores the startup configuration and the configuration register. Config register The NVRAM has a special location that contains the 16-bit configuration register. Every time the router boots it reads this value. The config-register value is a hexadecimal value ranging from from 0x0000 to 0xFFFF and can be set byusing the config-register command. The most important portion of the configuration register to understand for the exam is the boot field (bit 0 through 3, hexadecimal range 0x0000-0x000F). The boot field value is used to specify from which location the IOS image should be loaded or bypassed even during startup.  Boot field Meaning  0x0 The router will enter ROM monitor mode and remain at the system bootstrap prompt.  0x1 The IOS image stored in ROM will be loaded.  0x2-0xF The router will boot as normal and load the default IOS image stored in Flash and enables boot system commands. The remaining 12 bits of the configuration register are used for various functions such as enabling/disabling the Break function, setting the Console line speed, bypassing NVRAM, and controlling the broadcast address. To change the configuration register you have to enter be in global configuration mode. Use the command configure terminal often abbreviated to conf t in privileged EXEC mode to enter global config mode. You can enter privileged EXEC mode using the enable command. When you enter the correct password the prompt will change to Router# (where "Router" is the hostname of the router). Once you are in global config mode use the following command to change configuration register value: Router(config)#config-register 0x2102 where 0x2102 is an example of a config-register value. CCNA4.com
  • 2. CCNA4.com You can view the current configuration setting by using the Router#show version command. The last line of the output will display the current value and if it is different, the value after reboot: Configuration register is 0x2142 (will be 0x2102 at next reload) Router start-up sequence A router boots similar to a regular computer as it first performs a power on self test (POST) for the hardware, next loads bootstrap code from ROM, loads the IOS image from Flash into RAM, performs a hardware inventory, and finally the router locates and loads a configuration file. You can reboot a router by using the power switch or the reload command. Initial router configuration As mentioned earlier, the router configuration is stored in NVRAM. This is the place where the router will search for a configuration file. Alternatively, you can configure the router to load a configuration file from a TFTP server. If the router cannot locate a configuration file (on a new router for example) it will start setup and it will ask if you want to enter the initial configuration dialog. If you answer with No, you'll be taken to the command prompt and you'll be able to configure the router manually. If you answer with Yes, you'll be taken through a list of questions allowing you to configure the router e.g. set a hostname and enable password and secret, configure routed and routing protocols, and assign addresses to interfaces. You can initiate this configuration dialog at any time by using the setup command. Manage configuration files A Cisco router contains two configurations: the startup configuration (usually stored in NVRAM) and the running configuration (stored in RAM). When you makes changes to the router configuration by entering global configuration mode by using the config terminal command, the changes are made to the running configuration. To copy the currently running active configuration to NVRAM, i.o.w. to save a changed running configuration to the startup configuration so it will be used the next time you reload the router, use the following command: Router#copy running-config startup-config The following command loads the startup configuration stored in NVRAM into RAM and makes it the active running configuration. Router#copy startup-config running-config You can also copy the running configuration to a TFTP server using the following command: Router#copy running-config tftp 222.222.222.1 This can be done with the startup configuration as well: Router#copy startup-config tftp 222.222.222.1 You can view the running configuration using the command: Router#show running-config And view the startup config using the command: CCNA4.com
  • 3. CCNA4.com Router#show startup-config You can use the erase command to delete the content of NVRAM: Router#erase startup-config Load, backup, and upgrade IOS Instead of using the IOS stored in flash, you can load it from a TFTP server, or you can load the limited IOS from ROM. This can be configured in the configuration file using the following commands in global configuration mode: To load Cisco IOS software from Flash memory use the following command: Router(Config)#boot system flash Although this is default behavior, using this command can be useful especially when you have multiple IOS images stored in FLASH. If you do not specify a filename, the first locatedimage will be loaded. To load Cisco IOS software from a TFTP server use the following command: Router(Config)#boot system tftp To load Cisco IOS software from ROM use the following command: Router(Config)#boot system rom Note that this will load the limited IOS version and will likely prevent normal operation. You can use a combination of these commands to provide some redundancy. You can even specify multiple TFTP servers. Make sure you place them in the correct order, flash first, tftp as backup, and rom as last resort. The configuration register's boot field must be set to 0x2 through 0xF, in order for the router to check the configuration file in NVRAM for boot system commands. To backup the IOS stored in Flash to an TFTP server use the following command: Router#copy flash tftp 222.222.222.1 c2600-js-l_121-5.bin To upgrade the IOS stored in Flash use the following command: Router#copy tftp flash You will be prompted for an IP address of the TFTP server (defaults to the broadcast address 255.255.255.255) and a filename. To delete the content stored in Flash use the command: Router#erase flash CONNECTING TO A ROUTER There are multiple ways to establish connectivity to a router to perform configuration tasks: - Console port Cisco routers are equipped with a Console port, which is an RJ-45 port on most routers but on some high-end routers it's a DB-25 connector. You can connect a terminal (a notebook or a PC for example) to the console port using a RJ-45 roll-over cable with RJ-45, DB-9, or DB- 25 connectors on the ends. A common example is a cable with a RJ-45 connector connecting CCNA4.com
  • 4. CCNA4.com to the router's console port and a DB-9 connector on the other end connecting to the PC's COM port. When you connect a PC to the router's console port you can use a terminal emulator to configure the router. When you start a session the following should appear: Router con0 is now available. Press RETURN to get started - Auxilary port Many Cisco routers are also equipped with an Auxilary port, which can be used to connect a modem and allow for remote adminstration of the router. Managing a router using the ports mentioned above is called out-of-band management. For more information about how to physically connect to the Console and Auxilary port check the Cabling Guide for Console and AUX Ports and Configuring a Modem on the AUX Port for EXEC Dialin Connectivity at Cisco.com. - Telnet Once your router is configured with an IP address, a Telnet connection is the most common way to connect to a router to manually configure and monitor it. Cisco IOS, the router's operating system, has a build-in Telnet server and a Telnet client. This allows you to connect to a router using a telnet client from a PC but from another Cisco router as well. This type of connection using the same network the router operates in is also known as in-band management. Telnet sends username and password credentials in clear text and should be replaced with SSH connections if supported. ROUTER MODES User EXEC mode This is the mode you enter once you are connected, and if required, logged on to the router. In this mode you can perform non-disruptive troubleshooting, for example, view the routing table and status of components. You can NOT view or modify the configuration in User EXEC mode. When you connect to the router and press the key (Press RETURN to get started) you'll be prompted for a password: User Access Verification Password: When you enter the correct console, telnet or AUX password password (depending on how you connect to the router) and press the User EXEC mode command prompt will appear. Router> "Router" is the default hostname for all Cisco routers. The > indicates you are in User EXEC mode. To exit User EXEC mode and quit the session with the command-line executive use one of CCNA4.com
  • 5. CCNA4.com the following commands: Router>logout or Router>exit Privileged EXEC mode This is similar to logging on as an adminstrator in Windows 2000 for example. When you are in this mode, you can view and modify the configuration. Router>enable Password: After submitting the correct enable password (or enable secret, which we'll discuss later on) and pressing the key the command prompt will change again: Router# The # indicates you are in Privileged EXEC mode. To exit Privileged EXEC mode and return to User EXEC mode use the following command: Router#disable To exit Privileged EXEC mode and quit the session with the router, use one of the following commands: Router#logout or Router#exit Global Configuration mode To actually change the running configuration, you'll have to enter global configuration mode by using the command configure terminal (to configure the running configuration), or the command configure memory (to configure the startup config) in Privileged EXEC mode. Global configuration mode allows you to configure settings that affect the entire router, hence its name 'global'. To show you how this works we are going to change the hostname of the router as an example: Router#configure terminal (usually abbreviated to conf t) Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Rnewyork1 Rnewyork1(config)# As you can see the change immediately takes effect by looking at the prompt, which now reflects the new name. To exit global configuration mode and return to User EXEC mode use one of the following commands: Rnewyork1(config)#end or CCNA4.com
  • 6. CCNA4.com Rnewyork1(config)#exit Or use the key combination CTRL-Z You can use the following command to save the configuration to NVRAM so it will be used next time the router starts: Rnewyork1#copy running-config startup Interface Configuration mode You need to enter interface configuration mode when you want to configure settings specific to an interface, such as assigning an IP address. To enter interface configuration mode you must use the interface command and provide the name and number of an existing interface. Following are some examples: Router(config)#interface ethernet 0 Router(config-if)# Router(config)#interface serial 2 Router(config-if)# As you can see in the first example, the first possible interface is 0, the second Ethernet interface on a router would be Ethernet 1, also noticable is the change in the prompt. These commands are usually abbreviated, for example to int e1 or int s0 To exit interface configuration mode and return to global configuration mode, enter the following command: Router(config-if)#exit To exit interface configuration mode and return to Privileged EXEC mode, use the key combination CTRL-Z or Router(config-if)#end Other configuration modes include: Sub-interface configuration mode Router(config-subif) Router configuration mode Router(config-router) Line configuration mode Router(config-line) CONFIGURING ROUTER PASSWORDS This section decribes the four main passwords that are directly related to managing and configuring the router. Console password Use the following commands to configure the console password. The first command is used to enter Line configuration mode. The second configures the password "cisco123", and the third command configures the console line to require a login. Router(config)#line con 0 Router(config-line)#password cisco123 CCNA4.com
  • 7. CCNA4.com Router(config-line)#login Telnet password Use the following commands to configure a password for Telnet access: Router(config)#line vty 0 4 Router(config-line)#password cisco123 Router(config-line)#login Auxilary password Use the following commands to configure the auxilary port password: Router(config)#line aux 1 Router(config-line)#password cisco123 Router(config-line)#login Enable password and enable secret The enable password and enable secret are local passwords used to control access to Privileged EXEC mode. The difference between these two is that the enable password is stored in clear-text in the configuration file, and the enable secret is encrypted using irreversible MD5 encryption. For example, in the configuration file an enable password could be: enable password cisco123 and and enable secret could be: enable secret 5 $1$iSuI$i7TiENAn69392tYvh5wwZ1 The enable secret password overrides the regular enable password, except when and old IOS image is used that doesn't support the encrypted enable secret. To configure an enable password, go to global config mode and issue the following command: Router(config)#enable password cisco123 where cisco123 is just an example for a password. To configure an enable secret, go to global config mode and issue the following command: Router(config)#enable secret cisco456 where cisco456 is just an example for a password. If you do not set an enable password or enable secret, you don't have to enter a password when you type the enable command, but you will end up having problems connecting to the router using telnet for example, you won't be able to enter Privileged EXEC mode. By default all password except the enable secret are stored as clear-text in the configuration file. When you have backups on TFTP servers or floppy disks even, this might be an important issue. This can be solved using the following command to provide some encryption the passwords: Router(config)#service password-encryption The irreversible MD5 encryption used to encrypt the enable secret is much stronger than the CCNA4.com
  • 8. CCNA4.com rather simple encryption used by the service password-encryption, which can be decrypted by publicly available tools. Context-sensitive help facility An IOS feature that helps with using the correct command syntax. For example, when you type a command but you do not know the full syntax, you can type a ? behind it and a list with possible options (in that particular mode) will appear: Router#show ? access-expression List access expression access-lists List access lists accounting Accounting data for active sessions aliases Display alias commands appletalk AppleTalk information arap Show Appletalk Remote Access statistics arp ARP table async Information on terminal lines used as router interfaces backup Backup status bridge Bridge Forwarding/Filtering Database [verbose] buffers Buffer pool statistics cdp CDP information clock Display the system clock compress Show compression statistics configuration Contents of Non-Volatile memory controllers Interface controller status debugging State of each debugging option decnet DECnet information dhcp Dynamic Host Configuration Protocol status dialer Dialer parameters and statistics dnsix Shows Dnsix/DMDP information dxi atm-dxi information entry Queued terminal entries --More-- You don't need to press the key after the ?, and when the end of the list is reached the command will be after the prompt again without the ? so you can continue typing the correct option. (When a list like this does not fit in the maximum allowed lines, --More-- will be displayed on the last line, press the key to scroll down per line or the to scroll down to the next screen.) When you type a single ? or just the command help a list with all possible commands will be displayed. Command history and editing features This refers to another set of useful features which are meant to make working with the command line interface a little bit more convinient. By default the 10 previously issued commands are remembered. These commands can be CCNA4.com
  • 9. CCNA4.com retrieved to use them again by pressing CTRL-P or the up arrow key. You can modify the command- lines history buffer size using the following command: Router#terminal history size 25 This will set the amount to 25. You can view the history using the following command: Router#show history Some other useful key combinations: CTRL-P (or UP arrow key) Displays the previous command in the history buffer. CTRL-N (or DOWN arrow key) Displays the next command in the history buffer. CTRL-A Jumps to the beginning of the command line. CTRL-E Jumps to the end of the command line. CTRL-B (or LEFT arrow key) Moves the cursor back one character. CTRL-F (or RIGHT arrow key) Moves the cursor forward one character. Ctrl-W Deletes the last word typed. The arrow keys function only on ANSI-compatible terminals such as VT100s. You can configure your terminal emulator to use VT100 emulation. Another useful feature to assist with the command syntax is auto-complete. For example, when you type a command partly but you don't know how to spell a particular option, you can let IOS complete it by pressing the TAB key: Router#show cdp nei<TAB> Router#show cdp neighbors This only works when the given part is enough to determine a single particular option. For example, the command Router#show access does not result in because it could be Router#show access-expressionRouter#show access-lists as well. These enhanced editing features are enabled by default. If you wish to disable them, use the following command: Router(config)#no terminal editing Author: Johan Hiemstra Read more CCNA4.com