Sie sind auf Seite 1von 49

Module 11

Configuring and Testing


Networks
introduction

This module will cover four basic concepts required for setting up and testing a
network. The first is what you need to know before you configure devices. This
involves knowing the functions of the Internetwork Operating System found on most
Cisco devices, learning to communicate with the IOS using the Command Line
Interface (CLI) and physically connecting to the devices. The second is knowing the
basics of device configuration including securing the device, naming devices, and
enabling interfaces so the device can become more than a big box. The third is
knowing the basic tools for verifying network connectivity such as ping and
traceroute; and finally, the need for and how to monitor and document a network.

Lesson 1 : what to know before configuring devices

After studying this lesson, you should be able to:

 Define the following key terms: IOS, CLI, SSH and modal operating system.
 Describe the Internetwork Operating Systems (IOS).
 Explain configuration file types.
 Explain how to access the IOS and how to work with Cisco IOS modes.
Module 11 – Configuring and Testing Your Network

Configuring Cisco Devices: IOS Basics

• As with a computer, a router or switch cannot function without an operating system.


Cisco calls its operating system the Cisco Internetwork Operating System or Cisco
IOS.

• The Cisco IOS provides the following network services:

o Basic routing and switching functions


o Reliable and secure access to networked resources
o Network scalability

Figure 11.1 Router

• The IOS is stored in flash memory. It is a non-volatile memory that can be


overwritten if necessary. The IOS may need to be changed for several reasons: to
provide additional functionality, to replace a corrupted IOS or because the IOS has
accidentally been erased, which often happens in the lab environment.

• The Cisco IOS is accessed using the Command Line Interface (CLI). The features
accessible via the CLI vary based on the version of the IOS and the type of device.

Figure 11.2
Cisco IOS

Cisco IOS Access Methods

There are several ways to access the CLI environment. The most usual methods are:

a. Console

• The CLI can be accessed through a console session, also known as the CTY line.

Module in CCNA 101 – CISCO 1 95


Module 11 – Configuring and Testing Your Network

• Console uses low speed serial connection directly connect computer to console
port on the router or switch.

• The console port is accessible even if no networking services have been


configured on the device.

• Examples of console use are:

o The initial configuration of the network device

o Disaster recovery procedures and troubleshooting where remote access is


not possible

o Password recovery procedures

• For many IOS devices, console access does not require any form of security, by
default.

• Take the following steps to connect a terminal to the console port on the router:

o Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-
45 to DB-9 or RJ-45 to DB-25 adapter.

o Configure the terminal or PC terminal emulation software for 9600 baud,


8 data bits, no parity, 1 stop bit, and no flow control.

Figure 11.3 Access Method Using Console Port

Module in CCNA 101 – CISCO 1 96


Module 11 – Configuring and Testing Your Network

b. Telnet or SSH

• Telnet is a method for remotely accessing a CLI session.

o Telnet sessions require networking services on the device.

o The network device must have at least one active interface configured with a
Layer 3 address, such as an IPv4 address.

o Telnet client can access the VTY sessions on the Cisco device.

o For security reasons, the IOS requires that the Telnet session use a
password, as a minimum authentication method.

• Secure Shell (SSH) protocol is a more secure method for remote device access.

o This protocol provides remote login similar to Telnet, except that it utilizes
more secure network services. SSH provides stronger password
authentication than Telnet and uses encryption when transporting session
data.

o This keeps the user ID, password, and the details of the management
session private. As a best practice, always use SSH in place of Telnet
whenever possible.

o Most newer versions of the IOS contain an SSH server.

o IOS devices also include an SSH client that can be used to establish SSH
sessions with other devices.

o Similarly, you can use a remote computer with an SSH client to start a secure
CLI session.

c. AUX port

• Another way to establish a CLI session remotely is via a telephone dialup


connection using a modem connected to the router's AUX port. Similar to the
console connection, this method does not require any networking services to be
configured or available on the device.

• The AUX port can also be used locally, like the console port, with a direct
connection to a computer running a terminal emulation program. The console
port is required for the configuration of the router, but not all routers have an
auxiliary port.

• The console port is also preferred over the auxiliary port for troubleshooting
because it displays router startup, debugging, and error messages by default.

Module in CCNA 101 – CISCO 1 97


Module 11 – Configuring and Testing Your Network

Figure 11.4 Cisco IOS Access Methods

Router Components

The main internal components of a router are:

a. Random Access Memory (RAM)

• Stores routing tables

• Holds ARP cache

• Holds fast-switching cache

• Performs packet buffering as shared RAM

• Maintains packet-hold queues

• Provides temporary memory for the configuration file of a router while


the router is powered on

• Loses content when a router is powered down or restarted

b. Nonvolatile Random Access Memory (NVRAM)

• Provides storage for the startup configuration file

• Retains content when a router is powered down or restarted

c. Flash Memory (Flash)

• Holds the IOS image

• Allows software to be updated without removing and replacing chips


on the processor

Module in CCNA 101 – CISCO 1 98


Module 11 – Configuring and Testing Your Network

• Retains content when a router is powered down or restarted

• Can store multiple versions of IOS software

• Is a type of electrically erasable programmable read-only memory


(EEPROM)

d. Read Only Memory (ROM)

• Maintains instructions for power-on self test (POST) diagnostics

• Stores the bootstrap program and the basic operating system


software

• Requires replacing pluggable chips on the motherboard for software


upgrades

e. Console

• The console port provides physical access for the initial configuration
of the router or configuration changes

f. Interfaces

• Connect routers to a network for packet entry and exit

• They can be on the motherboard or on a separate module

Figure 11.5
Router Components

Configuration Files

Network devices depend upon two types of software:

a. Operating system (IOS) - The operating system facilitates the basic operation
of the device's hardware components.

Module in CCNA 101 – CISCO 1 99


Module 11 – Configuring and Testing Your Network

b. Configuration file - Configuration files contain the Cisco IOS commands used
to customize the functionality of a Cisco device. A Cisco network device
contains two configuration files:

• The running configuration file - used during the current operation of


the device. It is stored in RAM and it is used to operate the device.
Changes to the running configuration will immediately affect the
operation of the Cisco device. The running configuration is lost if the
power is turned off.

• The startup configuration file - used as the backup configuration and


is loaded when the device is started. The startup configuration file is
used during system startup to configure the device. It is stored in
NVRAM. When the device is turned off, the file remains intact.

The startup-config files are loaded into RAM each time the router is started or
reloaded. Once the configuration file is loaded into RAM, it is considered the running
configuration

Cisco IOS Modes

• The Cisco IOS is a modal operating system.

o The term modal describes a system where there are different modes of
operation, each having its own operation.

o The CLI uses a hierarchical structure for the modes.

• In order from top to bottom, the major modes are:

o User executive mode

o Privileged executive mode

o Global configuration mode

o Other specific configuration modes

• Each mode is to accomplish particular tasks and has specific commands that are
available in that mode.

• When using the CLI, the mode is identified by the command-line prompt that is
unique to that mode. The prompt is composed of the words and symbols on the line
to the left of the entry area. The word prompt is used because the system is
prompting you to make an entry

Module in CCNA 101 – CISCO 1 100


Module 11 – Configuring and Testing Your Network

• Listed on the table are the Cisco IOS modes for routers and switches.

Mode Description Prompts

User EXEC • Limited commands Router>


• “View Only” Mode

Privileged EXEC • Configuration commands such as Router#


debugging and testing
• File manipulation

Global Configuration • Commands for the router Router(config)#


• Entry to other modes

Interface • Commands to configure an Router(config-if)#


Configuration interface

Line Configuration • Commands to configure console Router(config-line)#


and telnet/ssh access

Other modes • Specific service configuration Router(config-mode)#


(NAT / DHCP)

• By default, every prompt begins with the device name.

o Following the name, the remainder of the prompt indicates the mode.

o For example, the default prompt for the global configuration mode on a
router would be:

Router(config)#

Figure 11.6
The CISCO
IOS modes

Module in CCNA 101 – CISCO 1 101


Module 11 – Configuring and Testing Your Network

Moving Between User and Privileged EXEC

• Use enable command to move from User to Privileged EXEC.

• Use disable or end command to move back.

Figure 11.7 Using the enable and disable command

Basic IOS Command Structure

Each IOS command has specific format or syntax and is executed at the appropriate
prompt.

• The commands are not case-sensitive.

• Following the command are one or more keywords and arguments.

• For example:

Switch#show running-config

o The command show is followed by the keyword running-config. The keyword


specifies that the running configuration is to be displayed as the output.

Switch(config-if)#description MainHQ Office Switch

o The command is: description. The argument is: MainHQ Office Switch. The user
defines the argument. For this command, the argument can be any text string of
up to 80 characters.

• After entering each complete command, including any keywords and arguments,
press the <Enter> key to submit the command to the command interpreter.

Module in CCNA 101 – CISCO 1 102


Module 11 – Configuring and Testing Your Network

Figure 11.8 IOS Command Structure

Using CLI Help

The IOS has several forms of Help available:

a. Context-Sensitive Help - provides a list of commands and the arguments


associated with those commands within the context of the current mode.

• To access context-sensitive help, enter a question mark, ?, at any prompt.

• There is an immediate response without the need to use the <Enter> key.

• This can be used when you are unsure of the name for a command.

• For example, to list the commands available at the user EXEC level

Router>?

Figure 11.8 Output of the Command ? at the User Exec Level

• After entering a character sequence, if a question mark is immediately entered


(without a space) the IOS will display a list of keywords that start with the
characters. For example: Router>sh?

Module in CCNA 101 – CISCO 1 103


Module 11 – Configuring and Testing Your Network

• A final type of context-sensitive help is used to determine which options, keywords,


or arguments are matched with a specific command (with a space).For example:

Router> show ?

Figure 11.9 Output of the Command sh? and show ?

b. Command Syntax Check - When a command is submitted by pressing the <Enter>


key, the command line interpreter parses the command from left to right to
determine what action is being requested. The IOS generally only provides negative
feedback.

• If the interpreter understands the command, the requested action is


executed.

• If the interpreter cannot understand the command being entered, it will


provide feedback describing what is wrong with the command.

• There are three different types of error messages:

o Ambiguous command - Not enough character to recognize the


command. For example:

Module in CCNA 101 – CISCO 1 104


Module 11 – Configuring and Testing Your Network

o Incomplete command - Good start on the command, but needs more


argument. For example:

o Incorrect command - Part or the whole command is wrong. For


example:

c. Hot Keys and Shortcuts - The IOS CLI provides hot keys and shortcuts.

o Tab - To complete the remainder of commands. When enough of the


keyword has been entered, press the Tab key and the CLI will display the
rest of the keyword.

o Ctrl-R - Redisplay the line. When the IOS is returning a message just as
you are typing. You can use Ctrl-R to refresh the line and avoid to retype.

o Ctrl-Z - Exit configuration mode. You may find yourself several levels
down. Rather than exit each mode individually, use Ctrl-Z to return
directly to the privileged EXEC prompt at the top level.

o Up and Down arrows - Using previous commands.

o Use up arrow key (Ctrl P) to display the previously commands.

o Use down arrow key (Ctrl N) to scroll forward through the history
to display the more recent commands.

o Ctrl-Shift-6 - Using the escape sequence. It allows the user to interrupt


process such as ping or traceroute.

o Ctrl-C - It interrupts the entry of a command and exits the configuration


mode. This is useful when entering a command you may decide that you
wish to cancel the command.

• Abbreviated commands or keywords. Commands and keywords can be


abbreviated to the minimum number of characters that identifies a unique

Module in CCNA 101 – CISCO 1 105


Module 11 – Configuring and Testing Your Network

selection. For example, the configure command can be abbreviated to conf


because configure is the only command that begins with conf.

Router#configure terminal

Router#conf t

• In CLI line editing, Backspace key most often used. Note that the Delete key is
NOT recognized to delete invalid characters.

• At the ----More---- Prompt: When a command returns more output than can be
displayed on a single screen, the --More-- prompt appears at the bottom of the
screen.

o Press the Spacebar key to view the next portion of output.

o Press the Enter key to display only the next line.

o If any other key is pressed, the output is cancelled and you are returned
to the prompt.

• Use Break Key, if you wish to abort a process or command.

IOS Examination Commands

In order to verify and troubleshoot network operation, we must examine the operation
of the devices. The basic examination command is the show command.

Figure 11.10 Using show command

Module in CCNA 101 – CISCO 1 106


Module 11 – Configuring and Testing Your Network

Listed below are the different show commands.

• show interfaces – Displays statistics for all interfaces on the device. To view the
statistics for a specific interface, enter the show interfaces command followed
by the specific interface slot/port number.

Router#show interfaces serial 0/1

• show version - Displays information about the currently loaded software


version, along with hardware information.

o Software Version - IOS software version (stored in flash)

o Bootstrap Version - Bootstrap version (stored in Boot ROM)

o System up-time - Time since last reboot

o System restart info - Method of restart (e.g., power cycle, crash)

o Software image name - IOS filename stored in flash

o Router Type and Processor type - Model number and processor type

o Memory type and allocation (Shared/Main) - Main Processor RAM and


Shared Packet I/O buffering

o Software Features - Supported protocols / feature sets

o Hardware Interfaces - Interfaces available on router

o Configuration Register - Sets bootup specifications, console speed


setting, and related parameters.

• show arp - Displays the ARP table of the device.

• show mac-address-table - (switch only) Displays the MAC table of a switch.

• show startup-config - Displays the saved configuration located in NVRAM.

• show running-config - Displays the contents of the currently running


configuration file or the configuration for a specific interface, or map class
information.

• show ip interfaces - Displays IPv4 statistics for all interfaces on a router.

• show ip interface brief - This is useful to get a quick summary of the


interfaces and their operational state.

Module in CCNA 101 – CISCO 1 107


Module 11 – Configuring and Testing Your Network

Figure 11.11 Output of the show version command

Figure 11.12 Output of the show flash command

Module in CCNA 101 – CISCO 1 108


Module 11 – Configuring and Testing Your Network

Figure 11.13 Output of the show ip interface brief command

IOS Configuration Modes

a. Global Configuration Mode - The primary mode is called global configuration.

• The following CLI command is used to take the device from privileged
EXEC mode to the global configuration mode:

Router#configure terminal

• Once the command is executed, the prompt changes to show that the
router is in global configuration mode.

Router(config)#

b. Specific Configuration Modes - There are many different configuration modes.

• Each mode configure of a particular function.

o Interface mode - to configure the interfaces (Fa0/0, S0/0/0,..)

o Line mode - to configure the lines (console, AUX, VTY,..)

o Router mode - to configure the routing protocols

• To exit a specific configuration mode and return to global configuration


mode, enter Exit command at a prompt.

• To leave configuration mode completely and return to privileged EXEC


mode, enter End command or use the Ctrl-Z.

Module in CCNA 101 – CISCO 1 109


Module 11 – Configuring and Testing Your Network

Figure 11.14 Configuration Modes

Lesson 1 Review Questions

Direction. Answer the following questions.

1. What is Cisco IOS?

2. What are several ways to access the CLI environment?

3. Why type of security precautions be taken to protect the router?

4. Differentiate running config and startup config.

5. In the CLI what are, in order from top to bottom, the major modes? List some of the
available commands for each.

6. The IOS has several forms of help available. What are they?

Module in CCNA 101 – CISCO 1 110


Module 11 – Configuring and Testing Your Network

LESSON 2 : The Basics of Configuring devices

After studying this lesson, you should be able to:

 Define the following key terms: console password, enable password, enable secret,
vty password, service password-encryption, Cisco Level 7 encryption, banner, TFTP
server and interface description.
 Explain how to name and secure devices.
 Explain how to manage configuration files.
 Describe how to configure router interfaces.

Naming Devices

• Devices need names, in order to avoid confusion during network


configuration and maintenance. In addition, without names, network devices
are difficult to identify for configuration purposes.

• If the hostname is not explicitly configured, a router uses the factory


assigned default hostname "Router". A switch has a factory-assigned default
hostname, "Switch".

• Host name appears as the CLI prompt.

• Naming convention makes maintenance easier.

o Start with a letter


o No spaces
o End with letter or digit
o Only letters, digits and dashes
o Maximum of 63 characters
• The hostnames used in the device IOS preserve capitalization and lower case
characters.

Module in CCNA 101 – CISCO 1 111


Module 11 – Configuring and Testing Your Network

Figure 11.15 Configuration Modes

In this example, the router’s hostname is set to “AtlantaHQ”. Notice that the
hostname appears in the prompt. To exit global mode, use the Exit command.

To negate the effects of a command, preface the command with the no keyword.
For example, to remove the name of a device, use:

AtlantaHQ(config)# no hostname

Router(config)#

Notice that the device uses the default hostname "Router" again.

Limiting Device Access

• Passwords are the primary defense against unauthorized access to network


devices.

• Every device should have locally configured passwords to limit access.

o Console password: Limits device access using the console connection

o Enable password: Limits access to the privileged EXEC mode

o Enable secret password: Encrypted, limits access to the privileged EXEC


mode

o VTY password: Limits device access using Telnet / SSH

• The use of easily guessed passwords is a security issue. Consider these key
points when choosing passwords:

o Use passwords that are more than 8 characters in length.

Module in CCNA 101 – CISCO 1 112


Module 11 – Configuring and Testing Your Network

o Use a combination of upper and lowercase and/or numeric sequences in


passwords.

o Avoid using the same password for all devices.

o Avoid using common words such as password or administrator, because


these are easily guessed.

Console Password

 The console port of a device has special privileges. The console port of network
devices must be secured. This reduces the chance of unauthorized personnel
physically plugging a cable into the device and gaining device access.

 The following are used to set a console password:

o The zero is used to represent the first (and in most cases only) console
interface for a router.

o The command, password specifies a password. In this example, console


password is set to “cisco”.

o The login command configures the router to require authentication upon


login. When login is enabled and a password set, there will be a prompt to
enter a password.

 Once these three commands are executed, a password prompt will appear each
time a user attempts to gain access to the console port.

 Notice that password characters are not displayed when entered.

Enable and Enable Secret Passwords

 To provide additional security, use enable password or enable secret command


to establish authentication before accessing privileged EXEC (enable) mode.

Module in CCNA 101 – CISCO 1 113


Module 11 – Configuring and Testing Your Network

 The following commands are used to set the passwords:

o In this example the enable password is set to “cisco” and the enable secret
password is “class”.

o What is the difference between the enable password and enable secret? In
enable password, privileged EXEC password is seen on clear text. On the
other hand, the command enable secret encrypts the privileged EXEC
password. If both privileged EXEC password is configured, the router/ switch
will use the enable secret password.

Strongly encrypted
password

VTY Password

 The VTY lines allow access to a router via Telnet. By default, many Cisco
devices support five VTY lines that are numbered 0 to 4.

 A password needs to be set for all available VTY lines. The same password can
be set for all connections. However, it is often desirable that a unique password
be set for one line to provide a fall-back for administrative entry to the device if
the other connections are in use.

 The following commands are used to set a VTY password:

o In this example, VTY password is set to “cisco”.

Module in CCNA 101 – CISCO 1 114


Module 11 – Configuring and Testing Your Network

Encrypting Password Display

 Another useful command prevents passwords from showing up as plain text when
viewing the configuration files. This is the service password-encryption command.
This command causes the encryption of passwords to occur when a password is
configured.

 The service password-encryption command applies weak encryption to all


unencrypted passwords. This encryption does not apply to passwords as they are
sent over media only in the configuration. The purpose of this command is to keep
unauthorized individuals from viewing passwords in the configuration file.

 Once the encryption has been applied, removing the encryption service does not
reverse the encryption

Encrypted passwords using


the service-password
encryption command

 Service password-encryption uses a Cisco Level 7 encryption which is very easy to


decrypt. However, the enable secret <password> uses a stronger encryption
method and cannot be easily hacked.

Module in CCNA 101 – CISCO 1 115


Module 11 – Configuring and Testing Your Network

Login Banner

 Banners can be an important part of the legal process in the event that someone is
prosecuted for breaking into a device. Some legal systems do not allow prosecution,
or even the monitoring of users, unless a notification is visible.

 Here are some examples information to include in a banner:

o "Use of the device is specifically for authorized personnel."

o "Activity may be monitored."

o "Legal action will be pursued for any unauthorized use."

 In configuring a banner message, any wording that implies that a login is "welcome"
or "invited" is not appropriate.

 The IOS provides multiple types of banners. One common banner is the message of
the day (MOTD). The following command is used to configure a banner MOTD.

o The banner motd command requires the use of delimiters to identify the
content of the banner message.

o One or more lines of text are entered to represent the banner message.

o A second occurrence of the delimiting character denotes the end of the


message.

The banner message of the


day (MOTD) is displayed
before entering the console
password.

Configuring Interfaces

Because the purpose of a router is to interconnect different networks, each interface


on a router has its own unique IPv4 address. The address assigned to each interface exists
in a separate network devoted to the interconnection of routers.

Module in CCNA 101 – CISCO 1 116


Module 11 – Configuring and Testing Your Network

a. Ethernet Interfaces

 Router’s Ethernet interfaces are used as the gateways for the end devices on the
LANs directly connected to the router. Each Ethernet interface must have an IP
address and subnet mask to route IP packets.

 To configure an Ethernet interface follow these steps:

IP address Netmask

Figure 11.16 Configuring Ethernet Interfaces

 By default, interfaces are disabled. To enable an interface, enter no shutdown


command.

 If an interface needs to be disabled for maintenance or troubleshooting, use the


shutdown command.

b. Serial Interfaces

 Serial interfaces are used to connect WANs to router. Each connected serial
interface must have an IP address and subnet mask to route IP packets.

 To configure an Ethernet interface follow these steps:

Module in CCNA 101 – CISCO 1 117


Module 11 – Configuring and Testing Your Network

This serial interface is a DCE because


it provides a clocking signal.

Figure 11.17 Configuring Serial Interfaces

 Serial interfaces require a clock signal to control the timing of the communications.

o In most environments, a DCE device such as a CSU/DSU will provide the


clock.

o By default, Cisco routers are DTE devices, but they can be configured as DCE
devices.

Description of an Interface

 A description of what an interface does or where it is connected should be part of


the configuration of each interface.

o The interface description will appear in the output of these commands: show
startup-config, show running-config, and show interfaces.

 To create a description, use the command description.

Interface description used for internal


documentation

Module in CCNA 101 – CISCO 1 118


Module 11 – Configuring and Testing Your Network

Configuring a Switch Interface

 A LAN switch is an intermediary device that interconnects segments within a


network. Therefore, the physical interfaces on the switch do not have IP addresses.

o Switch interfaces are also enabled by default. We can assign descriptions but
do not have to enable the interface.

 In order to be able to manage a switch, we assign addresses to the device. With an


IP address assigned to the switch, it acts like a host device.

o The address for a switch is assigned to a virtual interface represented as a


Virtual LAN interface (VLAN).

o In most cases, this is the interface VLAN 1. We enable this interface with no
shutdown command.

 Like any other host, the switch needs a gateway address to communicate outside of
the local network. We assign this gateway with the ip default-gateway command.

Figure 11.18 Configuring Switch Interface

Managing Configuration Files

After making changes to a configuration, consider three options:

a. Make the changed configuration the new startup configuration

 Because the running configuration is stored in RAM, it is temporarily active


while the Cisco device is powered on.

 Saving the running configuration to the startup configuration in NVRAM


preserves the changes as the new startup configuration.

Module in CCNA 101 – CISCO 1 119


Module 11 – Configuring and Testing Your Network

 The following command is used to save the running configuration as startup


configuration. Enter the command at the privileged EXEC level.

or

b. Return the device to its original configuration

 If changes made to the running configuration do not have the desired effect,
it is necessary to restore the previous configuration.

 Assuming that we have not overwritten the startup configuration with the
changes, we can replace the running configuration with the startup
configuration.

 This is best done by using the reload command at the privileged EXEC level.

 When initiating a reload, a prompt will appear to ask whether to save the
changes made. To discard the changes, enter n or no.

c. Removing All Configurations

 If undesired changes are saved to the startup configuration, this requires


erasing the startup configuration and restarting the device.

 The following command is used to erase the startup configuration. Enter the
command at the privileged EXEC level:

Module in CCNA 101 – CISCO 1 120


Module 11 – Configuring and Testing Your Network

 Reload the device to remove the current running configuration file

Figure 11.19
Router’s
Configuration Files

Figure 11.20 Replacing running-config with startup-config

Module in CCNA 101 – CISCO 1 121


Module 11 – Configuring and Testing Your Network

Backing Up Configurations - Offline

 Configuration files should be stored as backup files in the event of a problem.

o Configuration files can be stored on a Trivial File Transfer Protocol (TFTP)


server, a CD, a USB memory stick, or a floppy disk stored in a safe place.

o A configuration file should also be included in the network documentation.

Backup Configuration on TFTP Server

 A TFTP server will allow image and configuration uploads and downloads over the
network.

 The TFTP server can be another router, or it can be a host system.

 Use either the copy running-config tftp or copy startup-config tftp command and
follow these steps:

1. Enter the copy running-config tftp command.

2. Enter the IP address of the host where the configuration file will be stored.

3. Enter the name to assign to the configuration file.

4. Answer yes to confirm each choice.

 See the figure to view this process.

Figure 11.21
Backup configuration on
a TFTP server

Module in CCNA 101 – CISCO 1 122


Module 11 – Configuring and Testing Your Network

Backup Configurations with Text Capture (HyperTerminal)

 Configuration files can be saved/archived to a text document. This sequence of steps


ensures that a working copy of the configuration files is available for editing or reuse
later.

 When using HyperTerminal, follow these steps:

1. On the Transfer menu, click Capture Text.

2. Choose the location.

3. Click Start to begin capturing text.

4. Once capture has been started, execute the show running-config or show startup-
config command at the privileged EXEC prompt. Text displayed in the terminal
window will be placed into the chosen file.

5. Stop the capture process.

6. View the output to verify that it was not corrupted.

 See the figure for an example.

Figure 11.22 Backup Configurations with HyperTerminal

Module in CCNA 101 – CISCO 1 123


Module 11 – Configuring and Testing Your Network

Backup Configurations with Text Capture (TeraTerm)

 Configuration files can be saved/archived to a text document using TeraTerm.

1. On the File menu, click Log.

2. Choose the location. TeraTerm will begin capturing text.

3. Once capture has been started, execute the show running-config or show startup-
config command at the privileged EXEC prompt. Text displayed in the terminal
window will be placed into the chosen file.

4. When the capture is complete, select Close in the TeraTerm: Log window.

5. View the output to verify that it was not corrupted.

Figure 11.23 Backup Configurations with TeraTerm

Restoring Text Configurations

 A configuration file can be copied from storage to a device. When copied into the
terminal, the IOS executes each line of the configuration text as a command.

Module in CCNA 101 – CISCO 1 124


Module 11 – Configuring and Testing Your Network

o This means that the file will require editing to ensure that encrypted
passwords are in plain text and that non-command text such as "--More--"
and IOS messages are removed.

o Further, at the CLI, the device must be set at the global configuration mode
to receive the commands from the text file being copied.

 When using HyperTerminal, the steps are:

1. Locate the file to be copied into the device and open the text document.

2. Copy all of the text.

3. On the Edit menu, click paste to host.

 When using TeraTerm, the steps are:

1. On the File menu, click Send file.

2. Locate the file to be copied into the device and click Open.

3. TeraTerm will paste the file into the device.

 The text in the file will be applied as commands in the CLI and become the running
configuration on the device.

Lesson 2 Review Questions

Direction. Answer the following questions.

1. Why is it important to give each device a specific name?

2. What are the most common device passwords?

3. Differentiate enable password command and enable secret command.

4. What are the steps & commands needed to configure a router’s Ethernet ports?

5. What is the reason for adding a description to an interface?

6. Where can back-ups of configuration files be stored?

Module in CCNA 101 – CISCO 1 125


Module 11 – Configuring and Testing Your Network

LESSON 3: Verifying connectivity

After studying this lesson, you should be able to:

 Define the following key terms: ping, tracert and traceroute.


 Explain how to use ping for network testing.
 Explain tracing and interpreting results.

Verifying Connectivity

A network is only useful if every device on the network is configured properly and
working as required. Test and verification commands allow a network engineer to document
the health of the network.

When testing a network it is best to work in a planned sequence of steps to establish


valid connections rather than to randomly jump from one place to the next. Start with an
individual device, move to the segment or LAN that the device is on and then verify
connectivity with remote hosts.

The Ping Command

 Using the ping command is an effective way to test connectivity.

o Ping uses the ICMP protocol to check for connectivity.

o Starting with the individual device and then extending to the LAN and, finally,
to remote networks.

o By using the ping command in this ordered sequence, problems can be


isolated.

Figure 11.24
Testing the
Network Using
Ping command

Module in CCNA 101 – CISCO 1 126


Module 11 – Configuring and Testing Your Network

 IOS Ping Indicators. A ping from the IOS will yield to one of several indications for
each ICMP echo that was sent. The most common indicators are:

o ! - indicates receipt of an ICMP echo reply

o . - indicates a timed out while waiting for a reply

o U - an ICMP unreachable message was received

 Testing the Loopback

– As a first step to verify the IP configuration on the local host.

Figure 11.25 Testing the Loopback Address (127.0.0.1)

If ping is successful, it means that the protocol stack on the PC is functioning


properly from the network through the physical layer.

Test The Router Interface Assignment

a. Verifying the Router Interfaces

 One of the most used commands is show ip interface brief. This provides a
summary of the key information for all the interfaces.

o the output shows all interfaces attached on the router,

o the IP address, if any, assigned to each interface,

o the operational status of the interface.

Module in CCNA 101 – CISCO 1 127


Module 11 – Configuring and Testing Your Network

Figure 11.26 Output of show ip interface brief command

Looking at the line for the FastEthernet 0/0 interface,

o The IP address is 192.168.254.254.

o The up in the Status column shows it is operational at Layer 1.

o The up in the Protocol column shows that the Layer 2 is operational.

Notice that the Serial 0/0/1 interface has not been enabled.

o This is indicated by administratively down in the Status column.

o This interface can be enabled with the no shutdown command.

b. Testing Router Connectivity

– As with an end device, we can verify the Layer 3 connectivity with the ping
and traceroute commands.

– You can see sample outputs from a ping to a host in the local LAN and a
trace to a remote host across the WAN the next figure.

Figure 11.27 Using ping and traceroute


command
Module in CCNA 101 – CISCO 1 128
Module 11 – Configuring and Testing Your Network

Test The Switch Interface Assignment

a. Verifying the Switch Interfaces

 You can see the use of the show ip interface brief to verify the switch
interfaces.

Figure 11.28 Using show ip interface brief command to verify switch interfaces

o The IP address for the switch is applied to a VLAN interface.


o The Vlan1 interface is assigned an IP address 192.168.254.250.
o The interface has been enabled and is operational.
o The FastEthernet0/1 interface is down. This indicates that no
device is connected to the interface or the network interface of
the devices that is connected is not operational.
o The FastEthernet0/2 and FastEthernet0/3 interfaces are
operational. This is indicated by both the Status and Protocol
being shown as up.
b. Testing Switch Connectivity

 Like other hosts, the switch can test its Layer 3 connectivity with the ping
and traceroute commands.

Figure 11.29 Using ping and traceroute command to test connectivity


command
Module in CCNA 101 – CISCO 1 129
Module 11 – Configuring and Testing Your Network

 Two important things to keep in mind are:

o An IP address is not required for a switch to perform its job of frame


forwarding.

o The switch requires a gateway to communicate outside its local network.

Testing Interface Assignment

 The next step in the testing sequence is to verify that the NIC address is bound to
the IPv4 address and that the NIC is ready to transmit signals across the media.

Figure 11.30 Testing the Local NIC Assignment

 In this example, assume that the IPv4 address is 10.0.0.5.

o At the command line, enter the following:

C:\>ping 10.0.0.5

o A successful reply would resemble:

Reply from 10.0.0.5: bytes=32 time<1ms TTL=128


Reply from 10.0.0.5: bytes=32 time<1ms TTL=128
Reply from 10.0.0.5: bytes=32 time<1ms TTL=128
Reply from 10.0.0.5: bytes=32 time<1ms TTL=128
Ping statistics for 10.0.0.5:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

o If this test fails, it is likely that there are issues with the NIC hardware and
software driver that may require reinstallation of either or both.

Module in CCNA 101 – CISCO 1 130


Module 11 – Configuring and Testing Your Network

Testing Local Network

 Successfully pinging remote hosts verifies that both the local host and the remote
host are configured correctly.

o If a host responds with Destination Unreachable, and continue to ping the


other hosts on the LAN.

o Another failure message is Request Timed Out. This indicates that no


response was made to the ping attempt.

Figure 11.31 Testing the Local Network

 Successfully pinging another host on the same subnet verifies that both the local
host and the other host are configured correctly.

Testing Gateway Connectivity

 The next step in the testing sequence is to use the ping command to verify that a
local host can connect with a gateway address.

o This is extremely important because the gateway is the host's entry and exit
to the wider network.

o If the gateway IP address is not available, use the ipconfig command to


discover the gateway IP address.

Module in CCNA 101 – CISCO 1 131


Module 11 – Configuring and Testing Your Network

Figure 11.32 Testing the Gateway

 If the gateway test fails,

o Verify the gateway address with the network administrator to ensure that the
proper address is being tested.

o If all devices are configured properly, check the physical cabling to ensure
that it is secure and properly connected.

Testing Remote Connectivity

 Once verification of the local LAN and gateway is complete, testing can proceed to
remote devices.

 The verification tests should begin within the local network and progress outward to
the remote devices.

o Ping 192.168.0.253, the outside interface of the local network gateway


router.

o Ping 192.168.0.254, the outside IP address of the remote router.

Module in CCNA 101 – CISCO 1 132


Module 11 – Configuring and Testing Your Network

Figure 11.33 Testing Remote Host Connectivity

 Check for Router Remote Connectivity

o To test the communication to the remote network, you can ping a known
host on this remote network.

o If you cannot ping the host on the remote network from a router, you should
first check the routing table. If there is no route to reach this network, you
will need to identify why the route does not exist.

Tracing and Interpreting Trace Results

 The next step in the testing is to perform a trace. A trace returns a list of hops as a
packet is routed through a network.

o When performing the trace from Windows, use tracert.

o When performing the trace from router, use traceroute.

Module in CCNA 101 – CISCO 1 133


Module 11 – Configuring and Testing Your Network

Figure 11.34 Using tracert command

In this example, trace requests to the next hop timed out, meaning the failure is
therefore in the internetwork beyond the LAN.

Lesson 3 Review Questions

Direction. Answer the following questions.

1. What is the purpose of the ping command?

2. What does pinging the loopback test?

3. What is the difference between the show ip interfaces & the show ip interface brief
commands?

4. What is the gateway?

5. What is the purpose of a trace, and what commands are used?

Module in CCNA 101 – CISCO 1 134


Module 11 – Configuring and Testing Your Network

LESSON 4. Monitoring and documenting networks

After studying this lesson, you should be able to:

 Define the following key terms: network baseline, and MAC table.
 Explain how to monitor and document the network.
 Describe network baselines.

Network Baseline

 One of the most effective tools for monitoring and troubleshooting network
performance is to establish a network baseline. This process provides a snapshot of
the network at regular intervals to insure it is running as designed.

o A baseline is a process for studying the network at regular intervals to ensure


that the network is working as designed.

o It is more than a single report detailing the health of the network at a certain
point in time.

o Creating an effective network performance baseline is accomplished over a


period of time.

o Measuring performance at varying times and loads will assist in creating a


better picture of overall network performance.

 One method for starting a baseline is to copy and paste the results from an executed
ping, trace, or other relevant command into a text file.

Basic Network Baselines

 One common method for capturing baseline information is to copy the output from
the command line window and paste it into a text file.

 Run the same test over a period of days and save the data each time. An
examination of the files will begin to reveal patterns in network performance and
provide the baseline for future troubleshooting.

Module in CCNA 101 – CISCO 1 135


Module 11 – Configuring and Testing Your Network

Figure 11.35 Performing Network Baselines

IOS Capture

 Capturing ping command output can also be completed from the IOS prompt.

 When using HyperTerminal for access, the steps are:

1. On the Transfer menu, click Capture Text.

2. Choose Browse to locate or type the name of the saving the file.

3. Click Start to begin capturing text

4. Execute the ping command in the user EXEC mode or at the privileged
EXEC prompt. The router will place the text displayed on the terminal in the
location chosen.

5. View the output to verify that it was not corrupted.

6. On the Transfer menu, click Capture Text, and then click Stop Capture.

 Data generated using either the computer prompt or the router prompt can
contribute to the baseline.

Module in CCNA 101 – CISCO 1 136


Module 11 – Configuring and Testing Your Network

Capturing and Interpreting Trace Information

 As previously discussed, trace can be used to trace the steps, or hops, between
hosts. This output can be captured and used in the same way that ping output is
used.

o Sometimes the security settings at the destination network will prevent the
trace from reaching the final destination. However, we can still capture a
baseline of the hops along the path.

 To trace the route from your computer to cisco.com, enter this command in a
command line:

C:\>tracert www.cisco.com

 The steps for saving the trace output are identical to the steps for saving ping
output: Select the text from the command window and paste it into a text file.

Router Capture

 Capturing the traceroute output can also be done from the router prompt. When
using HyperTerminal, the steps used are:

1. On the Transfer menu, click Capture Text.

2. Choose a use Browse to locate or type the name of the saving the file.

3. Click Start to begin capturing text

4. Execute the traceroute command in the user EXEC mode or at the


privileged EXEC prompt. The router will place the text displayed on the
terminal in the location chosen.

5. View the output to verify that it was not corrupted.

6. On the Transfer menu, click Capture Text, and then click Stop Capture.

 Store the text files generated by these tests in a safe location, along with the rest of
the network documentation.

Learning About the Nodes on the Network

 If an appropriate addressing scheme exists, identifying IPv4 addresses for devices in


a network should be a simple task.

 Identifying the physical (MAC) addresses, however, can be a daunting task.

Module in CCNA 101 – CISCO 1 137


Module 11 – Configuring and Testing Your Network

o You would need access to all of the devices and sufficient time to view the
information, one host at a time.

o Because this is not a practical option in many cases, there is an alternate


means of MAC address identification using the arp command.

o The arp command provides for the mapping of physical addresses to known
IPv4 addresses.

C:\>arp –a

Figure 11.36 Mapping Physical Address to IPv4 Address

 The ARP cache can be cleared by using the arp -d command, in the event the
network administrator wants to repopulate the cache with updated information.

o Note: The ARP cache is only populated with information from devices that
have been recently accessed. To ensure that the ARP cache is populated,
ping a device so that it will have an entry in the ARP table.

Switch Connections

 One additional tool that can be helpful is a mapping of how hosts are connected to a
switch.

o This mapping can be obtained by issuing the show mac-address-table


command.

Sw1-2950#show mac-address-table

Module in CCNA 101 – CISCO 1 138


Module 11 – Configuring and Testing Your Network

o This table in the figure lists the MAC address of the hosts that are connected
to this switch.

o Like other output in the command window, this information can be copied
and pasted into a file.

Figure 11.37 Displaying the Switch MAC Table

 An analysis of this table also reveals that interface Fa0/23 is either a shared segment
or is connected to another switch.

o Several MAC addresses are representing multiple nodes.

o This is an indication that a port is connected to another intermediary device


such as a hub, wireless access point, or another switch

Lesson 4 Review Questions


Direction. Answer the following questions.

1. What is network baseline?

2. What type of info can be found in the ARP cache?

3. What might be an indicator that a switch port is on a shared segment or is


connected to another switch?

Module in CCNA 101 – CISCO 1 139


Module 11 – Configuring and Testing Your Network

Module 11 Quiz

Directions. On the space provided before each number, choose the letter of the correct
answer.

________1. How would you configure the name “Didcot” on a new router?
A. Router>enable
Router#hostname Didcot

B. Router>configure
Router(config)#hostname Didcot

C. Router>enable
Router#config t
Router(config)#hostname Didcot

D. Router>enable
Router#configure hostname Didcot

________2. How would you configure a password to restrict console access?


A. Didcot#line con 0 C. Didcot(config)# line con 0
Didcot(config)# password cisco Didcot(config-line)#password cisco
Didcot(config)#login Didcot(config-line)# login

B. Didcot(config)#line con 0 D. Didcot(config)# int con 0


Didcot(config)# password cisco Didcot(config-if)# password cisco
Didcot(config)# login Didcot(config-if)# login

________3. What is true about the command Didcot(config)#enable secret class?


A. It protects log-in to the router with an encrypted password.
B. It protects access to privileged exec mode with an encrypted password.
C. It protects access to user exec mode with an encrypted password.
D. It protects access to privileged exec mode with an unencrypted password.

________4. What is the purpose of the command service password-encryption?

A. It applies weak encryption to the enable secret password.


B. It applies weak encryption to passwords that are entered later and would not
be encrypted by default.
C. It forces the administrator to enter a password in encrypted form at log-on.
D. It applies strong encryption to passwords that would otherwise have weak
encryption.

Module in CCNA 101 – CISCO 1 140


Module 11 – Configuring and Testing Your Network

________5. Which command will show the configuration currently held in NVRAM?
A. show RAM C. show running-config
B. show startup-config D. show version

________6. Which command will show information about the IOS?


A. show RAM C. show running-config
B. show startup-config D. show version

________7. What command will remove the saved configuration in the NVRAM?
A. delete nvram C. erase running-config
B. erase startup-config D. delete startup-config

________8. An interface was configured as follows:


Didcot(config)#int fa 0/0
Didcot(config-if)#ip address 192.168.4.8 255.255.255.0
Didcot(config-if)#exit
A ping to this interface fails. What is most likely to be the problem?

A. The command was given at the wrong prompt and has not taken effect.
B. The interface is administratively shut down.
C. The command int fa 0/0 is ambiguous and needs to be given in full.
D. The subnet mask is not valid.

________9. Which command would be the best choice to identify the problem in the
previous question?
A. show int fa 0/0 C. show version
B. show interfaces serial D. show startup-config

________10. Which mode will let you give the show run command?
A. user EXEC mode C. router configuration mode
B. privileged EXEC mode D. global configuration mode

________11. When would you need to configure a clock rate on the interface of a lab
router?
A. When the interface is a DTE serial interface.
B. When the interface is a DCE serial interface.
C. When the interface is a FastEthernet interface.
D. When the interface is connected to another router

Module in CCNA 101 – CISCO 1 141


Module 11 – Configuring and Testing Your Network

________12. Which command will show the intermediate routers along a path?
A. Ping C. show ip route
B. arp D. traceroute

________13. Which switch command will show a list of matching MAC addresses and switch
port numbers?
A. show mac-address-table C. show interfaces
B. show mac addresses D. show mac interfaces

________14. Where is a switch IP address normally configured?


A. On interface 0/1
B. On interface VLAN1
C. On interface vty 1
D. A switch cannot have an IP address.

________15. What command do you give to activate a physical switch port?


A. no shutdown C. interface up
B. activate D. No command is needed.

Module in CCNA 101 – CISCO 1 142

Das könnte Ihnen auch gefallen