Intro. to Networks



Name __________________________________________________________ Date ________________

Chapter 2 – Configuring a Network Operating System

Study Guide

Tips for success: While answering the questions read Chapter 2, review the summary, and complete the practice Quiz.

After completion of this chapter, you should be able to:

▪ Explain the purpose of Cisco IOS.

▪ Explain how to access and navigate Cisco IOS to configure network devices.

▪ Describe the command structure of Cisco IOS software.

▪ Configure hostnames on a Cisco IOS device using the CLI.

▪ Use Cisco IOS commands to limit access to device configurations.

▪ Use Cisco IOS commands to save the running configuration.

▪ Explain how devices communicate across network media.

▪ Configure a host device with an IP address.

▪ Verify connectivity between two end devices.

1. Define each part of the OS:

a. Kernel –Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

b. Shell – The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

2. Where is the Cisco IOS stored on a Router?

3. Characteristics of Flash memory: For the purposes of network maintenance and planning, it is important to determine the flash and RAM requirements for each device, including the maximum flash and RAM configurations.

4. Watch Video 2.1.1.5 – CCO Accounts and IOS Image Exploration

5. What are three ways a user can access the Cisco IOS?

Console

Telnet or SSH

AUX port

6. What is the key difference between Telnet and SSH?

Telnet is a method for remotely establishing a CLI session of a device, through a virtual interface, over a network. Unlike the console connection, Telnet sessions require active networking services on the device.

The Secure Shell (SSH) protocol provides a remote login similar to Telnet, except that it uses more secure network services. SSH provides stronger password authentication than Telnet and uses encryption when transporting session data.

7. Complete Activity 2.1.2.4 – Accessing Devices

8. Give an example of commands or tasks that can be done in each mode:

a. User Exec – Router>

b. Privilege Exec – Router#

c. Global – Router(config)#

d. Interface – Router(Config-if)#

e. Line – Router (config-line)#

f. Router – Router(config-router)#

9. What command is used to go from User to Privilege mode? en

10. What command is used to go from Privilege to User mode? exit

11. Watch Video 2.1.3.6 – Navigating the IOS

12. How do you access context-sensitive help features? List some examples of how it is used:

to list the commands available at the user EXEC level, enter a question mark, ?, at the Switch> prompt.

13. What is the purpose of using the “show” command? Give three examples of how it is used.

This command displays information about the currently loaded IOS version, along with hardware and device information. If you are logged into a router or switch remotely, the show version command is an excellent means of quickly finding useful summary information about the particular device to which you are connected.

14. List some best practices when naming network devices:

15. What is the purpose of configuring Hostnames on network devices? What is the syntax used to configure hostnames?

the most detailed version of the syntax for a command that can be found

16. What is the purpose of each of the following passwords?

a. Console – limits device access using the console connection

b. Enable – Limits access to the privileged EXEC mode

c. Enable secret – Encrypted, limits access to the privileged EXEC mode

d. VTY – Limits device access over Telnet

17. What command is used to encrypt all passwords? service password-encryption

18. Compare and Contrast:

|Startup-Config |Running-Config |

| |The running configuration file is stored in the working memory of the device, or |

|startup-config command prior to the service password-encryption command being |random access memory (RAM). This means that the running configuration file is |

|executed, the unencrypted passwords are visible in the configuration output. The |temporarily active while the Cisco device is running (powered on). |

|service password-encryption can then be executed and the encryption will be | |

|applied to the passwords. | |

19. What command is used to save the current config file you are working on to NVRAM? the copy running-config startup-config command

20. Match the definition with the correct Show command:

|__F__ Show running-config |This file is in NVRAM and will become the running-config in the event of a power cycle. |

|___C__ Show startup-config |Will cause the startup-config to be erased. |

|____A_ Copy running-config startup-config |Shows the config file in RAM. This file will be immediately changed if you make any changes to the |

| |router. |

|___E__ Reload |This copies the configuration in NVRAM to RAM. |

|__D___ Copy startup-config running-config |This will cause the device to reload the startup-config into RAM. |

|__B___ Erase startup-config |This copies the current configuration in RAM to NVRAM. |

21. What is the role of IP Addresses on routers, specifically the address assigned to the Ethernet Interfaces?

Each physical interface has specifications, or standards, that define it; a cable connecting to the interface must be designed to match the physical standards of the interface. Types of network media include twisted-pair copper cables, fiber-optic cables, coaxial cables, or wireless. Different types of network media have different features and benefits

22. What is the purpose of assigning an IP Address to VLAN 1 on a Switch?

Used to navigate to the interface configuration mode from the global configuration mode

23. What are the benefits of using DHCP on a network verses manually configuring devices?

DHCP enables automatic IPv4 address configuration for every end device in a network with DHCP enabled. Imagine the amount of time that would be consumed if every time you connected to the network you had to manually enter the IP address, the subnet mask, the default gateway, and the DNS server.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download