SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Chapter 6

   IOS
Basic Configuration
• Hyper Terminal
• Included with Windows
  – Baud Rate: 9600
  – Data Bits: 8
  – Parity: None
  – Stop Bits: 1
  – Flow Control: None
Other Terminal Programs
•   Hyperterm
•   Teraterm
•   Minicom
•   securecrt
Getting Involved
•   Router# clock set 11:15:11 25 april 2011
•   Show history
•   Show terminal
•   Terminal history size ?
Gathering Basic Information
• Show version
Basic Configuration
• Hostname <name>
• Banner motd x unauthorized access prohibited
  x
• Enable password
• Enable secret
Auxiliary Password
•   Conf t
•   Line aux 0
•   Password 5678
•   login
Console Password
• Line console 0
• Password 5678
• Login

• Additional commands
  – Exec-timeout ?
  – Logging synchronous
Telnet Password
• Line vty 0 ?
• Password 5678
• login
Secure Shell
1. set your hostname: hostname ccna
2. Set domain name: ip domain-name ccna.com
3. Set username: username haitham password
   5678
4. Generate encryption key: crypto key generate
   rsa general-keys modulus 1024
5. Ssh version 2
6. Line vty 0 ?
7. Transport input ssh telnet
Encrypting Passwords
• Show running-config
• Service password-encryption
• No service password-encryption
Descriptions
•   Conf t
•   Interface
•   Description bla bla bla
•   Do show run
    – What does do mean?
Router Interfaces
• Move through interfaces
• Move from interface to another
Bringing Up an Interface
•   Conf t
•   Interface ?
•   No shutdown
•   Ip address # #
Using the pipe |
• Pipe means: Output Modifier
• Show run | begin interface
• Show ip route | include #
Serial Interface Commands
• DCE vs. DTE ‘find the clock symbol’
• Add clocking to DCE only
    – Does it really matter?
•   Conf t
•   Int serial ?
•   Clock rate ?
•   Show controllers
    – Command that shows DCE connection 
Viewing, Saving, and Erasing
              Configurations
•   Show running-config
•   Show startup-config
•   Copy running-config startup-config
•   Erase start-up config
•   Reload
    – Take care 
• Erase running-config
Verifying Settings
• Ping #destination-ip
• Ping
    – Called: extended ping
• Traceroute #destination-ip
    – No map this time 
•   telnet #destination-ip
•   Show interface #interface-id
•   Show ip interface
•   Show ip interface brief
•   Show protocols
•   Show controllers #serial-id
Internal Components
• Bootstrap:
  – Stored in ROM, used to bring router up during
    initialization. Boot the router, load the IOS.
• POST:
  – Stored in ROM, used to check the basic
    functionality of the router hardware and
    determines which interfaces are present
Internal Components
• RAM:
  – Hold packet buffers, ARP cache, routing tables,
    running-config, most routers expand IOS from flash to
    RAM on boot
• ROM:
  – Start and maintain the router. Hold Boot Strap, and
    POST
• Flash Memory:
  – Store CISCO IOS by default. It is not erased when
    router is reloaded.
Internal Components
• NVRAM:
  – Hold the router and switch configuration. Not
    erased when device is reloaded. Does not store
    IOS. Configuration Register is stored in NVRAM.
• Configuration Register
  – Control how the router boots up. This value can
    be found as the last line in #show version. Default:
    0x2102 -> load IOS from flash and load
    configuration from NVRAM
Router Boot Sequence
When router boots up, it performs sequence of
steps, called: Boot Sequence.
1. Router performs POST
2. Locate IOS. Bootstrap loads IOS.
Configuration Register Bits
Changing Configuration Register Value
• Main Reasons:
  – Force system into the ROM monitor mode
  – Select boot source
  – Enable or disable Break function
  – Control Broadcast addresses
  – Set console terminal baud rate
  – Load OS from ROM
  – Enable booting from TFTP
Important
• Don’t try this on real device…
  – Unless you have to!
•   Router(config)#config-register 0x2101
•   Show version
•   Show flash
•   Config-register 0x2102
•   Reload

• Now What?
Recovering Passwords
• The default configuration register value is
  0x2102, meaning that bit 6 is off. With the
  default setting, the router will look for and
  load a router configuration stored in NVRAM
  (startup-config). To recover a password, you
  need to turn on bit 6. Doing this will tell the
  router to ignore the NVRAM contents. The
  configuration register value to turn on bit 6 is
  0x2142.
main steps to password recovery
1. Boot the router and interrupt the boot sequence by
performing a break, which will take the router into ROM
monitor mode.
2. Change the configuration register to turn on bit 6 (with the
value 0x2142).
3. Reload the router.
4. Enter privileged mode.
5. Copy the startup-config file to running-config.
6. Change the password.
7. Reset the configuration register to the default value.
8. Save the router configuration.
9. Reload the router (optional).
1. Break the Boot Sequence
• Ctrl + Break
• While loading!
• Rommon: Rom Monitor Mode
Configure the Register
• Cisco ISR/2600:
  – Rommon 1> confreg 0x2142
  – Rommon 1> reload


• Cisco 2500:
  – >o/r 0x2142
Reload the Router
• Cisco ISR/2600:
  – Rommon 1> reset


• Cisco 2500:
  – >I
Change Configuration
• Copy startup-config running-config
• Copy start run
  – Same command 
Reset Configuration
• Conf t
• Config-register 0x2102

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7VISHNU N
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOSanilinvns
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_configarjuntrk
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorialIT Tech
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccnarobertoxe
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet3Anetwork com
 
Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Dhruv Sharma
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheetEZREIG OMAR
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsAlejandro Marin
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8VISHNU N
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASADhruv Sharma
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commandsRobin Rohit
 

Was ist angesagt? (20)

CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOS
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
 
Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0
 
test
testtest
test
 
Router commands
Router commandsRouter commands
Router commands
 
Chapter4ccna
Chapter4ccnaChapter4ccna
Chapter4ccna
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheet
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
 
ccna cheat_sheet
ccna cheat_sheetccna cheat_sheet
ccna cheat_sheet
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commands
 
Cisco Ios advanced
Cisco Ios advancedCisco Ios advanced
Cisco Ios advanced
 
Cisco Commands
Cisco CommandsCisco Commands
Cisco Commands
 

Andere mochten auch

ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...
ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...
ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...Twig Lane Group, LLC
 
Buffalo Social Media Summit Presentation
Buffalo Social Media Summit PresentationBuffalo Social Media Summit Presentation
Buffalo Social Media Summit PresentationChris Treadaway
 
2013 Jean Fares Couture collection look book
2013 Jean Fares Couture collection look book2013 Jean Fares Couture collection look book
2013 Jean Fares Couture collection look bookNorma HAYEK
 
Way out cafe - amazing vegan desserts!
Way out cafe - amazing vegan desserts!Way out cafe - amazing vegan desserts!
Way out cafe - amazing vegan desserts!Heena Modi
 
Biggie in her new home
Biggie in her new homeBiggie in her new home
Biggie in her new homeHeena Modi
 
Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.
Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.
Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.Norma HAYEK
 
The making of handbags
The making of handbagsThe making of handbags
The making of handbagsHeena Modi
 
July 10th 2014 - to use with members from multiple Unions
July 10th 2014 - to use with members from multiple UnionsJuly 10th 2014 - to use with members from multiple Unions
July 10th 2014 - to use with members from multiple UnionsHeena Modi
 
Zanzibar, The old days
Zanzibar, The old daysZanzibar, The old days
Zanzibar, The old daysHeena Modi
 
Design Gives You Wings For Good
Design Gives You Wings For GoodDesign Gives You Wings For Good
Design Gives You Wings For GoodZago
 
Porting the QALL-ME framework to Romanian
Porting the QALL-ME framework to RomanianPorting the QALL-ME framework to Romanian
Porting the QALL-ME framework to RomanianConstantin Orasan
 
Synerjix Core Team Consulting - tailor made for a Challenging Economy
Synerjix Core Team Consulting - tailor made for a Challenging EconomySynerjix Core Team Consulting - tailor made for a Challenging Economy
Synerjix Core Team Consulting - tailor made for a Challenging EconomyBenaud Jacob
 
Greens - a gorgeous setting with delicious vegan treats on the menu!
Greens - a gorgeous setting with delicious vegan treats on the menu!Greens - a gorgeous setting with delicious vegan treats on the menu!
Greens - a gorgeous setting with delicious vegan treats on the menu!Heena Modi
 
Fond memories of Zanzibar
Fond memories of ZanzibarFond memories of Zanzibar
Fond memories of ZanzibarHeena Modi
 
Dining in salzburg
Dining in salzburgDining in salzburg
Dining in salzburgHeena Modi
 

Andere mochten auch (20)

ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...
ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...
ICC/Decision Services...Beyond Customer Service...What Mystery Shopping Can D...
 
Buffalo Social Media Summit Presentation
Buffalo Social Media Summit PresentationBuffalo Social Media Summit Presentation
Buffalo Social Media Summit Presentation
 
2013 Jean Fares Couture collection look book
2013 Jean Fares Couture collection look book2013 Jean Fares Couture collection look book
2013 Jean Fares Couture collection look book
 
Way out cafe - amazing vegan desserts!
Way out cafe - amazing vegan desserts!Way out cafe - amazing vegan desserts!
Way out cafe - amazing vegan desserts!
 
Biggie in her new home
Biggie in her new homeBiggie in her new home
Biggie in her new home
 
Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.
Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.
Jean Fares Pret-A-Porter, 2013 collection: Behind the scenes.
 
Dairy farms
Dairy farmsDairy farms
Dairy farms
 
The making of handbags
The making of handbagsThe making of handbags
The making of handbags
 
July 10th 2014 - to use with members from multiple Unions
July 10th 2014 - to use with members from multiple UnionsJuly 10th 2014 - to use with members from multiple Unions
July 10th 2014 - to use with members from multiple Unions
 
Zanzibar, The old days
Zanzibar, The old daysZanzibar, The old days
Zanzibar, The old days
 
Wordprobs3
Wordprobs3Wordprobs3
Wordprobs3
 
Design Gives You Wings For Good
Design Gives You Wings For GoodDesign Gives You Wings For Good
Design Gives You Wings For Good
 
Porting the QALL-ME framework to Romanian
Porting the QALL-ME framework to RomanianPorting the QALL-ME framework to Romanian
Porting the QALL-ME framework to Romanian
 
Synerjix Core Team Consulting - tailor made for a Challenging Economy
Synerjix Core Team Consulting - tailor made for a Challenging EconomySynerjix Core Team Consulting - tailor made for a Challenging Economy
Synerjix Core Team Consulting - tailor made for a Challenging Economy
 
Greens - a gorgeous setting with delicious vegan treats on the menu!
Greens - a gorgeous setting with delicious vegan treats on the menu!Greens - a gorgeous setting with delicious vegan treats on the menu!
Greens - a gorgeous setting with delicious vegan treats on the menu!
 
Fond memories of Zanzibar
Fond memories of ZanzibarFond memories of Zanzibar
Fond memories of Zanzibar
 
Dining in salzburg
Dining in salzburgDining in salzburg
Dining in salzburg
 
Dallas SMC Presentation
Dallas SMC PresentationDallas SMC Presentation
Dallas SMC Presentation
 
Painted Hands
Painted HandsPainted Hands
Painted Hands
 
Utagoe intro
Utagoe introUtagoe intro
Utagoe intro
 

Ähnlich wie IOS-Basic Configuration

Ähnlich wie IOS-Basic Configuration (20)

Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna 2
Ccna 2Ccna 2
Ccna 2
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna day2-140715152313-phpapp02
Ccna day2-140715152313-phpapp02Ccna day2-140715152313-phpapp02
Ccna day2-140715152313-phpapp02
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
introduction-to-cisco-routers.ppt
introduction-to-cisco-routers.pptintroduction-to-cisco-routers.ppt
introduction-to-cisco-routers.ppt
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
 
C C N A Day2
C C N A  Day2C C N A  Day2
C C N A Day2
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Manejo de redes
Manejo de redesManejo de redes
Manejo de redes
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
 
CCNA complete.ppt
CCNA complete.pptCCNA complete.ppt
CCNA complete.ppt
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
Introduction to-cisco-routers
Introduction to-cisco-routersIntroduction to-cisco-routers
Introduction to-cisco-routers
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS device
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 

Mehr von Haitham El-Ghareeb (20)

مختصر وحدة التعلم الذاتي 2015
مختصر وحدة التعلم الذاتي 2015مختصر وحدة التعلم الذاتي 2015
مختصر وحدة التعلم الذاتي 2015
 
وحدة التعلم الذاتي 2015
وحدة التعلم الذاتي 2015وحدة التعلم الذاتي 2015
وحدة التعلم الذاتي 2015
 
NoSQL Databases, Not just a Buzzword
NoSQL Databases, Not just a Buzzword NoSQL Databases, Not just a Buzzword
NoSQL Databases, Not just a Buzzword
 
EMC Academic Alliance Presentation
EMC Academic Alliance PresentationEMC Academic Alliance Presentation
EMC Academic Alliance Presentation
 
DSA - 2012 - Conclusion
DSA - 2012 - ConclusionDSA - 2012 - Conclusion
DSA - 2012 - Conclusion
 
Lecture 9 - DSA - Python Data Structures
Lecture 9 - DSA - Python Data StructuresLecture 9 - DSA - Python Data Structures
Lecture 9 - DSA - Python Data Structures
 
Data Structures - Lecture 8 - Study Notes
Data Structures - Lecture 8 - Study NotesData Structures - Lecture 8 - Study Notes
Data Structures - Lecture 8 - Study Notes
 
Lect07
Lect07Lect07
Lect07
 
Lecture 07 Data Structures - Basic Sorting
Lecture 07 Data Structures - Basic SortingLecture 07 Data Structures - Basic Sorting
Lecture 07 Data Structures - Basic Sorting
 
LectureNotes-06-DSA
LectureNotes-06-DSALectureNotes-06-DSA
LectureNotes-06-DSA
 
LectureNotes-05-DSA
LectureNotes-05-DSALectureNotes-05-DSA
LectureNotes-05-DSA
 
LectureNotes-04-DSA
LectureNotes-04-DSALectureNotes-04-DSA
LectureNotes-04-DSA
 
LectureNotes-03-DSA
LectureNotes-03-DSALectureNotes-03-DSA
LectureNotes-03-DSA
 
LectureNotes-02-DSA
LectureNotes-02-DSALectureNotes-02-DSA
LectureNotes-02-DSA
 
LectureNotes-01-DSA
LectureNotes-01-DSALectureNotes-01-DSA
LectureNotes-01-DSA
 
Lecture-05-DSA
Lecture-05-DSALecture-05-DSA
Lecture-05-DSA
 
Learn Latex
Learn LatexLearn Latex
Learn Latex
 
Research Methodologies - Lecture 02
Research Methodologies - Lecture 02Research Methodologies - Lecture 02
Research Methodologies - Lecture 02
 
DSA-Lecture-05
DSA-Lecture-05DSA-Lecture-05
DSA-Lecture-05
 
DSA - Lecture 04
DSA - Lecture 04DSA - Lecture 04
DSA - Lecture 04
 

Kürzlich hochgeladen

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 

Kürzlich hochgeladen (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 

IOS-Basic Configuration

  • 1. Chapter 6 IOS
  • 2. Basic Configuration • Hyper Terminal • Included with Windows – Baud Rate: 9600 – Data Bits: 8 – Parity: None – Stop Bits: 1 – Flow Control: None
  • 3. Other Terminal Programs • Hyperterm • Teraterm • Minicom • securecrt
  • 4. Getting Involved • Router# clock set 11:15:11 25 april 2011 • Show history • Show terminal • Terminal history size ?
  • 6. Basic Configuration • Hostname <name> • Banner motd x unauthorized access prohibited x • Enable password • Enable secret
  • 7. Auxiliary Password • Conf t • Line aux 0 • Password 5678 • login
  • 8. Console Password • Line console 0 • Password 5678 • Login • Additional commands – Exec-timeout ? – Logging synchronous
  • 9. Telnet Password • Line vty 0 ? • Password 5678 • login
  • 10. Secure Shell 1. set your hostname: hostname ccna 2. Set domain name: ip domain-name ccna.com 3. Set username: username haitham password 5678 4. Generate encryption key: crypto key generate rsa general-keys modulus 1024 5. Ssh version 2 6. Line vty 0 ? 7. Transport input ssh telnet
  • 11. Encrypting Passwords • Show running-config • Service password-encryption • No service password-encryption
  • 12. Descriptions • Conf t • Interface • Description bla bla bla • Do show run – What does do mean?
  • 13. Router Interfaces • Move through interfaces • Move from interface to another
  • 14. Bringing Up an Interface • Conf t • Interface ? • No shutdown • Ip address # #
  • 15. Using the pipe | • Pipe means: Output Modifier • Show run | begin interface • Show ip route | include #
  • 16. Serial Interface Commands • DCE vs. DTE ‘find the clock symbol’ • Add clocking to DCE only – Does it really matter? • Conf t • Int serial ? • Clock rate ? • Show controllers – Command that shows DCE connection 
  • 17. Viewing, Saving, and Erasing Configurations • Show running-config • Show startup-config • Copy running-config startup-config • Erase start-up config • Reload – Take care  • Erase running-config
  • 18. Verifying Settings • Ping #destination-ip • Ping – Called: extended ping • Traceroute #destination-ip – No map this time  • telnet #destination-ip • Show interface #interface-id • Show ip interface • Show ip interface brief • Show protocols • Show controllers #serial-id
  • 19. Internal Components • Bootstrap: – Stored in ROM, used to bring router up during initialization. Boot the router, load the IOS. • POST: – Stored in ROM, used to check the basic functionality of the router hardware and determines which interfaces are present
  • 20. Internal Components • RAM: – Hold packet buffers, ARP cache, routing tables, running-config, most routers expand IOS from flash to RAM on boot • ROM: – Start and maintain the router. Hold Boot Strap, and POST • Flash Memory: – Store CISCO IOS by default. It is not erased when router is reloaded.
  • 21. Internal Components • NVRAM: – Hold the router and switch configuration. Not erased when device is reloaded. Does not store IOS. Configuration Register is stored in NVRAM. • Configuration Register – Control how the router boots up. This value can be found as the last line in #show version. Default: 0x2102 -> load IOS from flash and load configuration from NVRAM
  • 22. Router Boot Sequence When router boots up, it performs sequence of steps, called: Boot Sequence. 1. Router performs POST 2. Locate IOS. Bootstrap loads IOS.
  • 24. Changing Configuration Register Value • Main Reasons: – Force system into the ROM monitor mode – Select boot source – Enable or disable Break function – Control Broadcast addresses – Set console terminal baud rate – Load OS from ROM – Enable booting from TFTP
  • 25. Important • Don’t try this on real device… – Unless you have to!
  • 26. Router(config)#config-register 0x2101 • Show version • Show flash • Config-register 0x2102 • Reload • Now What?
  • 27. Recovering Passwords • The default configuration register value is 0x2102, meaning that bit 6 is off. With the default setting, the router will look for and load a router configuration stored in NVRAM (startup-config). To recover a password, you need to turn on bit 6. Doing this will tell the router to ignore the NVRAM contents. The configuration register value to turn on bit 6 is 0x2142.
  • 28. main steps to password recovery 1. Boot the router and interrupt the boot sequence by performing a break, which will take the router into ROM monitor mode. 2. Change the configuration register to turn on bit 6 (with the value 0x2142). 3. Reload the router. 4. Enter privileged mode. 5. Copy the startup-config file to running-config. 6. Change the password. 7. Reset the configuration register to the default value. 8. Save the router configuration. 9. Reload the router (optional).
  • 29. 1. Break the Boot Sequence • Ctrl + Break • While loading! • Rommon: Rom Monitor Mode
  • 30. Configure the Register • Cisco ISR/2600: – Rommon 1> confreg 0x2142 – Rommon 1> reload • Cisco 2500: – >o/r 0x2142
  • 31. Reload the Router • Cisco ISR/2600: – Rommon 1> reset • Cisco 2500: – >I
  • 32. Change Configuration • Copy startup-config running-config • Copy start run – Same command 
  • 33. Reset Configuration • Conf t • Config-register 0x2102