CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the OS code that interacts directly with the computer hardware is known as the kernel. 6. The portion that interfaces with the applications and user is known as the shell. 7. Give 5 examples for GUI OS MS Windows, MAC OS X, Linux, Apple ios, Android, and more. 8. The operating system on home routers is usually called firmware. 9. The network operating system used on Cisco devices is called the Cisco Internetwork Operating System (IOS). 2.1.1.3 10. The IOS file itself is several megabytes in size and is stored in a semi-permanent memory area called flash. 11. Flash memory provides non-volatile storage. 12. IOS is copied from flash into random access memory (RAM) when the device is powered on. 13. A power cycle is when a device is purposely or accidently powered off and then powered back on. 14. figure shows a compact flash card. 15. What are the major functions performed or enabled by Cisco routers and switches include: Providing network security IP addressing of virtual and physical interfaces Enabling interface-specific configurations to optimize connectivity of the respective media Routing Enabling quality of service (QoS) technologies Supporting network management technologies 2.1.2.1 16. The three most common methods to access the CLI environment are: Console Telnet or SSH AUX port 17. The console port is a management port that provides out-of-band access to Cisco device. 18. When performing an initial configuration, a computer running terminal emulation software is connected to the console port of the device using a special cable. 2.1.2.2 19. Telnet is a method for remotely establishing a CLI session of a device, through a virtual interface, over a network.
20. The Secure Shell (SSH) protocol provides a remote login similar to Telnet, except that it uses more secure network services. It provides stronger password authentication than Telnet and uses encryption when transporting session data. 2.1.2.3 21. Name some terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by a Telnet/SSH connection. PuTTY (Figure 1) Tera Term (Figure 2) SecureCRT (Figure 3) HyperTerminal OS X Terminal 22. Do Activity 2.1.2.4 2.1.3.1 23. Answer the following questions from the IOS mode structure figure below:
a) List the commands used in User executive (User EXEC) mode: b) List the commands used in Privileged executive (Privileged EXEC) mode: c) List the commands used in Global configuration mode: 2.1.3.2 24. The two primary modes of operation are user EXEC mode and privileged EXEC mode. 25. Switch> is a user EXEC mode 26. Switch# is a Privileged EXEC Mode 2.1.3.3 27. The primary configuration mode is called global configuration or global config. 28. Which CLI command is used to take the device from privileged EXEC mode to the global configuration mode and to allow entry of configuration commands from a terminal: Switch# configure terminal 29. Switch(config)# is a global configuration mode 30. Label the different modes in the following figure:
31. Line mode - to configure one of the physical or virtual lines (console, AUX, VTY) 32. Interface mode - to configure one of the network interfaces (Fa0/0, S0/0/0) 33. To exit a specific configuration mode and return to global configuration mode, enter exit at a prompt. 34. To leave configuration mode completely and return to privileged EXEC mode, enter end or use the key sequence Ctrl-Z. 2.1.3.4 35. The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively. 36. In order to access the privileged EXEC mode, use the enable command 37. The privileged EXEC mode is sometimes called the enable mode. 2.1.3.5 38. To quit from the global configuration mode and return to the privileged EXEC mode, enter the exit command. 2.1.4.1 39. Ping command is used to check the connectivity 40. Traceroute command is used to display the path from source to destination 41. The IOS has several forms of help available such as: a) Context-Sensitive Help b) Command Syntax Check c) Hot Keys and Shortcuts 42. Write the shortcut keys for the following functions? 2.1.4.5 a) Tab - Completes the remainder of a partially typed command or keyword b) Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute c) Ctrl-A - Moves to the beginning of the line d) Ctrl-E - Moves to the end of the line e) Ctrl-R - Redisplays a line f) Down Arrow, Ctrl-N - Allows the user to scroll forward through former commands g) Up Arrow, Ctrl-P - Allows the user to scroll backward through former commands h) Ctrl-C - Exits the configuration mode or aborts the current command i) Ctrl-Z - Exits the configuration mode and returns to user EXEC 2.1.4.6 43. show startup-config - Displays the saved configuration located in NVRAM. 44. show running-config - Displays the contents of the currently running configuration file. 45. When a command returns more output than can be displayed on a single screen, the --More-- prompt appears at the bottom of the screen. 2.1.4.7
46. show version command displays information about the currently loaded IOS version, along with hardware and device information. 2.2.1.2 47. Name some guidelines for naming conventions in Switch or Router: Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length 2.2.1.4 48. Configure the switch hostname to be Sw-Floor-1 Switch# 2.2.2.1 49. Name the different passwords the IOS uses in its hierarchical modes to help with device security: Enable password - Limits access to the privileged EXEC mode Enable secret - Encrypted, limits access to the privileged EXEC mode Console password - Limits device access using the console connection VTY password - Limits device access over Telnet 2.2.2.2 50. The enable secret command provides greater security because the password is encrypted. 51. Show the commands to set encrypted password class on privilege EXEC mode starting from the user EXEC mode below: Sw-Floor-1> 52. Write the command to move from Global config mode to Privileged EXEC mode: Sw-Floor-1(config)#exit 53. Write the command to move from Privileged EXEC mode to user EXEC mode: Sw-Floor-1#disable 54. Write the command to check the encrypted password: Sw-Floor-1> enable Password: Sw-Floor-1# 2.2.2.3
55. Write the commands to set a password for the console line: Switch(config)# line console 0 Switch(config-line)# password cisco Switch(config-line)# login 56. By default, many Cisco switches support up to 16 vty lines that are numbered 0 to 15. 57. Write the commands to set a password for the vty lines: Switch(config)# line vty 0 15 Switch(config-line)# password cisco Switch(config-line)# login 2.2.2.4 58. The command prevents passwords from showing up as plain text when viewing the configuration files is the service password-encryption command. 59. Enter the command to encrypt plain text password when viewing configuration files: Switch(config)# service password-encryption 60. One common banner is the message of the day (MOTD) which is often used for legal notification because it is displayed to all connected terminals. 61. Configure MOTD using the banner motd command from global configuration mode. 62. Write the command to display a banner This is a secured system. Authorized access ONLY!!! Switch(config)# banner motd # This is a secured system. Authorized access ONLY!!! # 2.2.3.1 63. The running configuration file reflects the current configuration applied to a Cisco IOS device 64. The running configuration file is stored in the working memory of the device, or random access memory (RAM). 65. The startup configuration file reflects the configuration that will be used by the device upon reboot. 66. The startup configuration file is stored in NVRAM. 67. Use the copy running-config startup-config command at the privileged EXEC mode 68. Give the command to save the running configuration to startup configuration file. Switch# copy running-config startup-config 69. To erase the startup configuration file use erase NVRAM:startup-config or erase startup-config at the privileged EXEC mode prompt: 70. Specify the command To erase the startup configuration file below:
Switch# erase startup-config 71. What command would you give on a switch in addition to the erase startup-config command in order to return the device to its default "out-of-the-box" configuration (comparable to a factory reset): Switch# delete vlan.dat 72. Give the steps of saving to a Text File in a Tera Term 2.2.3.2 73. Give the steps of saving to a Text File in a Hyper Terminal 2.3.1.1 74. Each end device on a network must be configured with IP addresses. 75. List some examples of end devices: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones Security cameras Smart phones Mobile handheld devices (such as wireless barcode scanners) 76. The structure of an IPv4 address is called dotted decimal notation and is represented with four decimal numbers between 0 and 255. 77. IPv4 addresses are logical in nature, in that they provide information about the location of the device. 78. A subnet mask is a special type of IPv4 address that, coupled with the IP address, determines which particular subnet of a larger network the device is a member. 79. Virtual interface means that there is no physical hardware on the device associated with it. 2.3.1.2 80. What are Types of network media: twisted-pair copper cables, fiber-optic cables, coaxial cables, or wireless. 81. Ethernet is the most common local area network (LAN) technology used today. 82. RJ-45 connector is used to connect devices using an Ethernet port.
83. Cisco IOS switches have physical ports for devices to connect to, but also have one or more virtual interfaces called switch virtual interfaces (SVIs). 84. The default SVI is interface is called VLAN1. 2.3.2.1 85. IP address uniquely identifies end device on the internetwork 86. Subnet mask determines which part of a larger network is used by an IP address 87. no shutdown command Administratively enables the interface to an active state 2.3.2.2 88. Domain Name System (DNS) server is used to translate IP addresses to web addresses 89. The DNS server is used to maintain the mapping between the IP addresses and names of various devices 2.3.2.3 90. DHCP allows end devices to have IP information automatically configured. 91. It is possible to display the IP configuration settings on a Windows PC by using the ipconfig command at the command prompt. 2.3.3.1 92. The ping command is used to verify the internal IP configuration on a local host. 93. Device test is accomplished by using the ping command on a reserved address called the loopback (127.0.0.1) 94. Pinging 127.0.0.1 causes the device to ping itself 95. Successful ping request verifies that the network interface card, drivers, and the TCP/IP implementation are all functioning correctly. 2.3.3.2 96. Use the show ip interface brief command to verify the condition of the switch interface. 97. Write the command to enable IP connectivity to S1, using IP address 192.168.10.2: Switch(config#)#Interface vlan 1 Switch(config#)#Ip address 192.168.10.2 255.255.255.0 Switch(config#)#No shutdown