SlidePub
Home
Categories
Login
Register
Home
Technology
Introduction to Cisco configuration and network
Introduction to Cisco configuration and network
AngieloBecenia1
5 views
38 slides
Sep 14, 2025
Slide
1
of 38
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
About This Presentation
Introduction to Cisco configuration and network
Size:
1.21 MB
Language:
en
Added:
Sep 14, 2025
Slides:
38 pages
Slide Content
Slide 1
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-1
Operating Cisco
IOS Software
Slide 2
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2
An Overview of Cisco Device Startup
Slide 3
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3
External Configuration Sources
Configurations can come from many sources.
Configurations will act in device memory.
Slide 4
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4
CLI is used to enter commands.
Operations vary on different
internetworking devices.
Users type or paste entries in the console
command modes.
Command modes have distinctive
prompts.
Enter key instructs device to parse and
execute the command.
Two primary EXEC modes are user mode
and privileged mode.
Cisco IOS User Interface Functions
Slide 5
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5
There are two main EXEC modes for entering
commands.
Cisco IOS Software EXEC Mode (User)
Slide 6
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6
Cisco IOS Software EXEC Mode
(Privileged)
Slide 7
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7
Switch Command-Line Help Facilities
Slide 8
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8
Context-Sensitive Help
Slide 9
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9
Context-Sensitive Help (Cont.)
Slide 10
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10
SwitchX>Shape the future of internetworking by creating unpreced
Shape the future of internetworking by creating
unprecedented value for customers, employees, and
partners.
Enhanced Editing Commands
Slide 11
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11
Enhanced Editing Commands (Cont.)
Slide 12
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12
Router Command History
Slide 13
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-13
Viewing the Configuration
Slide 14
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-14
Displays the current and saved configuration
show running-config and show startup-
config Commands
Slide 15
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-15
Configuring a Switch Password
Slide 16
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-16
Configuring the Login Banner
Defines and enables a customized banner to be displayed before
the username and password login prompts.
SwitchX# banner login " Access for authorized users only. Please enter your
username and password. "
Slide 17
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-17
Telnet vs. SSH Access
Telnet
–Most common access method
–Insecure
SSH-encrypted
!– The username command create the username and password for the SSH session
Username cisco password cisco
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
line vty 0 4
login local
transport input ssh
Slide 18
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-18
Cisco Catalyst 2960 Series
SwitchX(config-if)#switchport port-security [ mac-address
mac-address | mac-address sticky [mac-address] | maximum
value | violation {restrict | shutdown}]
SwitchX(config)#interface fa0/2
SwitchX(config-if)#switchport mode access
SwitchX(config-if)#switchport port-security
SwitchX(config-if)#switchport port-security maximum 1
SwitchX(config-if)#switchport port-security mac-address sticky
SwitchX(config-if)#switchport port-security violation shutdown
Configuring Port Security
Slide 19
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-19
SwitchX#show port-security [interface interface-id] [address] [ |
{begin | exclude | include} expression]
SwitchX#show port-security interface fastethernet 0/5
Port
Security : Enabled
Port
Status : Secure-up
Violation
Mode : Shutdown
Aging
Time : 20 mins
Aging
Type : Absolute
SecureStatic
Address Aging : Disabled
Maximum
MAC Addresses : 1
Total
MAC Addresses : 1
Configured
MAC Addresses : 0
Sticky
MAC Addresses : 0
Last
Source Address : 0000.0000.0000
Security
Violation Count : 0
Verifying Port Security
on the Catalyst 2960 Series
Slide 20
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-20
SwitchX#sh port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
--------------------------------------------------------------------------
Fa0/5 1 1 0 Shutdown
---------------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024
SwitchX#sh port-security address
Secure Mac Address Table
-------------------------------------------------------------------
Vlan Mac Address Type Ports Remaining Age
(mins)
---- ----------- ---- ----- -------------
1 0008.dddd.eeee SecureConfigured Fa0/5 -
-------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024
Verifying Port Security
on the Catalyst 2960 Series (Cont.)
Slide 21
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-21
Disabling an Interface (Port)
shutdown
SwitchX(config-int)#
To disable an interface, use the shutdown command in interface
configuration mode.
To restart a disabled interface, use the no form of this command.
Slide 22
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-22
Overview of Cisco IOS
Configuration Modes
Slide 23
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-23
Commands Review Discussion
What does the command accomplish?
From what configuration mode is the command executed?
Slide 24
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-24
Cisco IOS File System and Devices
Slide 25
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-25
Managing Cisco IOS Images
Slide 26
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-26
Verify that flash memory has room for the
Cisco IOS image.
Verifying Memory and Deciphering
Image Filenames
RouterX#sh flash
-#- --length-- -----date/time------ path
1 14951648 Feb 22 2007 21:38:56 +00:00 c2800nm-ipbase-mz.124-5a.bin
2 1823 Dec 14 2006 08:24:54 +00:00 sdmconfig-2811.cfg
3 4734464 Dec 14 2006 08:25:24 +00:00 sdm.tar
4 833024 Dec 14 2006 08:25:38 +00:00 es.tar
5 1052160 Dec 14 2006 08:25:54 +00:00 common.tar
6 1038 Dec 14 2006 08:26:08 +00:00 home.shtml
7 102400 Dec 14 2006 08:26:22 +00:00 home.tar
8 491213 Dec 14 2006 08:26:40 +00:00 128MB.sdf
41836544 bytes available (22179840 bytes used)
Slide 27
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-27
Back up current files prior to updating flash memory.
Creating a Software Image Backup
RouterX#copy flash tftp:
Source filename []? c2800nm-ipbase-mz.124-5a.binAddress or name of remote host []? 10.1.1.1
Destination filename [c2800nm-ipbase-mz.124-5a.bin]
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<output omitted>
12094416 bytes copied in 98.858 secs (122341 bytes/sec)
RouterX#
Slide 28
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-28
Upgrading the Image from the Network
RouterX#copy tftp flash:
Address or name of remote host [10.1.1.1]?
Source filename []? c2800nm-ipbase-mz.124-5a.bin
Destination filename [c2800nm-ipbase-mz.124-5a.bin]
Accessing tftp://10.1.1.1/c2600-js-mz.122-21a.bin...
Erase flash: before copying? [confirm]
Erasing the flash filesystem will remove all files! Continue? [confirm]
Erasing device... eeeeeeeeee (output omitted) ...erased
Erase of flash: complete
Loading c2800nm-ipbase-mz.124-5a.bin from 10.1.1.1 (via Ethernet0/0): !!!!!!!!!!!!!!!
(output omited)
[OK - 12094416 bytes]
Verifying checksum... OK (0x45E2)
12094416 bytes copied in 120.465 secs (100398 bytes/sec)
RouterX
Slide 29
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-29
Device Configuration Files
Slide 30
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-30
Cisco IOS copy Command
NVRAM
Terminal
TFTP server
Erase start
Slide 31
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-31
Cisco IOS copy Command Example
Slide 32
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-32
copy run tftp and copy tftp run Commands
RouterX#copy running-config: tftp:
Address or name of remote host []? 10.1.1.1
Destination filename [running-config]? wgroa.cfg
.!!
1684 bytes copied in 13.300 secs (129 bytes/sec)
RouterX#copy tftp: running-config:
Address or name of remote host []? 10.1.1.1
Source filename []? wgroa.cfg
Destination filename [running-config]?
Accessing tftp://10.1.1.1/wgroa.cfg...
Loading wgroa.cfg from 10.1.1.1 (via Ethernet0): !
[OK - 1684/3072 bytes]
1684 bytes copied in 17.692 secs (99 bytes/sec)
Slide 33
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-33
show and debug Commands
Slide 34
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-34
Considerations When Using debug
Commands
May generate output in a variety of formats that may not identify
the problem
Require high overhead, possibly disrupting network device
operation
Useful for obtaining information about network traffic and router
status
Slide 35
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-35
Commands Related to debug
service timestamps debug datetime msec
RouteX(config)#
Adds a time stamp to a debug or log message
no debug all
RouteX#
Disables all debug commands
show processes
RouteX#
Displays the CPU utilization for each process
RouteX#
terminal monitor
Displays debug output on your current vty session
Slide 36
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-36
Summary
Cisco IOS software is the embedded software architecture in all
Cisco IOS devices and is also the operating system of Catalyst
switches. Its functions include carrying the chosen network
protocols, connectivity, security, scalability, and reliability.
A switch or IOS device can be configured from a local terminal
connected to the console port or from a remote terminal
connected via a modem connection to the auxiliary port.
The CLI is used by network administrators to monitor and
configure various Cisco IOS devices. CLI also offers a help facility
to aid network administrators with the verification and
configuration commands.
Slide 37
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-37
Summary (Cont.)
The CLI supports two EXEC modes: user and privileged. The
privileged EXEC mode provides more functionality than the user
EXEC mode.
The Cisco IOS devices uses Cisco IOS software with extensive
command-line input help facilities, including context-sensitive
help.
The Cisco IOS CLI includes an enhanced editing mode that
provides a set of editing key functions.
The Cisco IOS devices CLI provides a history or record of
commands that have been entered. This feature, called the
command history, is particularly useful to help recall long or
complex commands or entries.
Slide 38
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-38
Tags
Categories
Technology
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
5
Slides
38
Age
80 days
Related Slideshows
11
8-top-ai-courses-for-customer-support-representatives-in-2025.pptx
JeroenErne2
48 views
10
7-essential-ai-courses-for-call-center-supervisors-in-2025.pptx
JeroenErne2
47 views
13
25-essential-ai-courses-for-user-support-specialists-in-2025.pptx
JeroenErne2
37 views
11
8-essential-ai-courses-for-insurance-customer-service-representatives-in-2025.pptx
JeroenErne2
34 views
21
Know for Certain
DaveSinNM
22 views
17
PPT OPD LES 3ertt4t4tqqqe23e3e3rq2qq232.pptx
novasedanayoga46
26 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-38)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better