1 / 33

A router uses the following information from the configuration file when it starts up

Will learn to use router modes and configuration methods to update a router's configuration file with current and prior versions of Cisco Internetwork Operating System (IOS) software. A router uses the following information from the configuration file when it starts up.

makya
Download Presentation

A router uses the following information from the configuration file when it starts up

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Will learn to use router modes and configuration methods to update a router's configuration file with current and prior versions of Cisco Internetwork Operating System (IOS) software.

  2. A router uses the following information from the configuration file when it starts up

  3. Router configuration information can be generated by several means. • Privileged EXEC configure command to configure from a virtual (remote) terminal, a modem connection, or a console terminal. • allows you to enter changes to an existing configuration at any time. • Privileged EXEC configure command to loads a configuration from a network TFTP server, which allows you to maintain and store configuration information at a central site.

  4. Configuration commands: • configure terminal-- configures manually from the console terminal • configure memory-- loads configuration information from NVRAM • copy tftp running-config-- loads configuration information from a network TFTP server into RAM • show running-config -- displays the current configuration in RAM

  5. copy running-config startup-config -- stores the current configuration from RAM into NVRAM • copy running-config tftp -- stores the current configuration from RAM on a network TFTP server • show startup-config -- displays the saved configuration, which is the contents of NVRAM • erase startup-config -- erases the contents of NVRAM

  6. Store the current configuration in RAM, on a network TFTP server • Enter copy running-config tftp • Enter the IP address of the host that you want to use to store the configuration file. • Enter the name for the configuration file. • Confirm your choices by answering yes each time.

  7. Load the configuration file stored on one of your network servers. Enter configuration mode copy tftp running-config Select a host or network configuration file. Network config file contains commands that apply to all routers and terminal servers on the network. The host config file contains commands that apply to one router in particular.

  8. At the system prompt, enter the optional IP address of the remote host from which you are retrieving the configuration file.  At the system prompt, enter the name of the configuration file or accept the default name. The filename convention is UNIX-based. The default filename is hostname-config for the host file and network-configfor the network  configuration file.

  9. Use DOS naming conventions Confirm the configuration filename and the server address that the system supplies. Notice in the figure that the router prompt changes to tokyoimmediately. This is evidence that the reconfiguration happens as soon as the new file is downloaded

  10. Commands to manage the contents of NVRAM: • configure memory -- Loads configuration information from NVRAM. • erase startup-config -- Erases the contents of NVRAM. • copy running-config startup-config -- Stores the current configuration into NVRAM (as the startup or backup configuration). • show startup-config -- Displays the saved configuration, which is the contents of NVRAM

  11. Global configuration commands apply to features that affect the system as a whole. You use the privileged EXEC command configureto enter global configuration mode. When you enter this command, the EXEC prompts you for the source of the configuration commands You can then specify the terminal, NVRAM, or a file stored on a network server as the source.

  12. Commands to enable a particular routing or interface function begin with global configuration commands

  13. To configure a routing protocol (indicated by the prompt config-router) you first enter a global router protocol command type

  14. To configure an interface (indicated by the prompt config-if) you first enter the global interface type and number command

  15. After a routing protocol is enabled by a global command, the router configuration mode prompt Router (config-router)# is displayed as shown in the figure. You type a question mark (?) to list the routing protocol configuration sub-commands.

  16. The Figure shows commands that are examples of how to complete common interface tasks. The first set of commands is associated with interfaces. On serial links, one side must provide a clocking signal, a DCE; the other side is a DTE.

  17. The second set of commands is associated with the Cisco 4000 series routers. On the Cisco 4000, there are two connections on the outside of the box for Ethernet interfaces-an attachment unit interface (AUI) connector and a 10BASE-T connector. The default is AUI, so you must specify media-type 10BASE-T if you want to use the other connection.

  18. By default, Cisco routers are DTE devices, but in some cases they can be used as DCE devices. If you are using an interface to provide clocking, you must specify a rate with the clockrate command. The bandwidth command overrides the default bandwidth that is displayed in the show interfaces command and is used by some routing protocols such as IGRP.

  19. You can secure your system by using passwords to restrict access. Passwords can be established both on individual lines and in the privileged EXEC mode.

  20. line console 0 -- establishes a password on the console terminal • line vty 0 4-- establishes password protection on incoming Telnet sessions • enable password -- restricts access to privileged EXEC mode • enable secret password (from the system configuration dialog to set up global parameters -- uses a Cisco proprietary encryption process to alter the password character string

  21. You can further protect passwords from being displayed by using the service password-encryption command. This encryption algorithm does not match the Data Encryption Standard (DES).

More Related