routers and routing basics ccna 2 n.
Download
Skip this Video
Download Presentation
Routers and Routing Basics CCNA 2

Loading in 2 Seconds...

play fullscreen
1 / 37

Routers and Routing Basics CCNA 2 - PowerPoint PPT Presentation


  • 211 Views
  • Uploaded on

Routers and Routing Basics CCNA 2 . Chapter 3. 1. Configuring a Router. Configuring a Router for Basic Routing Reviewing the Configuration Modes Configuring Ethernet and Serial Interfaces Configuring Hostnames and Passwords Examining Operational Status Using show Commands

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Routers and Routing Basics CCNA 2' - charleen


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
configuring a router
Configuring a Router

Configuring a Router for Basic Routing

Reviewing the Configuration Modes

Configuring Ethernet and Serial Interfaces

Configuring Hostnames and Passwords

Examining Operational Status Using show Commands

Changing the Configuration

Documenting the Router Configuration

Configuring Interface Descriptions

Configuring Login Banners

Configuring Local Host Tables

Backing Up the Configuration

Summary

2

configuring a router for basic routing
Configuring a Router for Basic Routing

Internetwork with Two Routers

Used in Basic Router Configuration

3

reviewing the configuration modes
Reviewing the Configuration Modes

Step 1 The user logs in from the console, moves to enable mode, and then enters configuration mode by using the configure terminal privileged mode EXEC command.

Step 2 The user changes the hostname using the hostname fred global configuration command.

Step 3 The user incorrectly tries to use the ip address 172.16.1.251 255.255.255.0

command. This command is an interface mode subcommand that must be issued from interface mode.

Step 4 The user moves to interface configuration mode using the interface

Fastethernet 0/0 command and then correctly uses the ip address interface

subcommand.

Step 5 The user presses Ctrl-z to exit configuration mode, moving back to enable mode.

4

configuring clock rate on a serial link
Configuring Clock Rate on a Serial Link
  • Clock rate command includes the speed in bits per second (bps), but a Router supports only specific speeds like 1200, 2400, 9600, 19,200, 38,400, 56,000, 64,000, 72,000, 125,000, 148,000, 500,000, 800,000, 100,0000, 1,300,000, 2,000,000, or 4,000,000 bps.
    • It is set only on the DCE router
  • Routers do not allow just any speed.
  • For example, the clock rate 64000 command would be accepted, but the clock rate 65000 command would be rejected.
  • To find the speeds supported on a particular type of router, use the clock rate ? command in serial interface configuration mode.

7

configuring routes
Configuring Routes

Routing Tables on Routers R1 and R2—Connected Routes Only

8

configuring routes continued
Configuring Routes(Continued)

Routing Tables on Routers R1 and R2—Connected Routes Only

9

user and enable mode passwords
User and Enable Mode Passwords

Console, Aux, VTY, and Enable Passwords

12

two commands that can define the enable password
Two commands that can define the enable password
  • If only one of the two commands (enable secret or enable password) is configured, but not both, IOS expects the user to enter the password as defined in that single configuration command.
  • If both the enable secret and enable password commands are configured, the router expects the password as defined in the enable secret command. The router will not accept the password defined in the enable password command.
  • If neither the enable secret nor enable password command is configured, the behavior varies. If the user is at the console, the router automatically allows the user access to enable mode. If the user is not at the console, the router rejects the enable command.

14

changing the configuration
Changing the Configuration

What to Do if the Configuration Is Incorrect

  • After configuration changes have been made, you should look at the running configuration using the show running-config command.
  • For the simple changes reenter the command in the correct configuration mode.
  • If a command was configured but was not needed, get into the same configuration mode and issue the same command prefaced by the word no.

20

changing the configuration continued2
Changing the Configuration(Continued)
  • To remove the password and login commands from the console line, use the word no in front.
    • Router1(config-if)#Line con 0
    • Router1(config-line)#no password height
    • Router1(config-line)#no login
  • Start over completely by erasing the startup-config file using the erase startup-config command and then reloading the router.
  • Use copy startup-config running-config command or the copy tftp running-config command to copy the configuration file from a TFTP server, respectively, into the running-config file.
  • Copy running-config startup-config command should be used to save a copy of the new configuration in the startup-config file in NVRAM.

23

documenting the router configuration
Documenting the Router Configuration
  • The network should be well documented by the network

engineers.

  • Engineers should define a standard for their internetworks about how the routers (and switches) are configured.
  • The creation of standards for network consistency helps

reduce network complexity, unplanned downtime, and

events that may affect network performance.

24

backing up the configuration
Backing Up the Configuration

Movement of files using

the copy command

between tree locations:

  • The running configuration file in RAM
  • The startup configuration file in NVRAM
  • A TFTP server in the network

30

where to keep the backup configuration files
Where to Keep the Backup Configuration Files

Three places in which you might want

to save the configuration files:

  • A TFTP server
  • A network (file) server
  • A disk in a safe place

33