SlideShare una empresa de Scribd logo
1 de 25
Network Management




               CMC Limited
Objectives
•   Understand different features of Access List.
•   Explain standard and extended IP Access Lists.
•   Understand IOS software and how to load IOS
    software.
•   Understand how to backup and restore Cisco IOS.
•   Understand how to backup and restore Cisco
    configuration.
•   Understand Cisco Discovery Protocol.




                                     CMC Limited
Access List
 An access list is essentially a list of conditions that control
 access both to and form a network segment. Access lists
 can filter unwanted packets and be used to implement
 security policies.

 The IP and IPX access lists work similarly – they're both
 packet filters.




                                             CMC Limited
Access List contd..

There are a few important rules a packet follows when it's
being compared with an access list:

 •   It's always compared with each line of the access list in
     sequential order.
 •   It's compared with lines of the access list only until a
     match is made. Once the packet matches a line of the
     access list, it's acted upon, and no further comparisons
     take place.
 •   There is an implicit “deny" at the end of each access list-
     this means that if a packet doesn't match up to any lines
     in the access list, it'll be discarded.




                                            CMC Limited
Access List contd..
There are two types of access lists used with IP and IPX:

  •   Standard access lists: These use only the source IP
      address in an IP packet to filter the network.
  •   Extended access lists: These check for both source
      and destination IP address, protocol field in the
      Network layer header, and port number at the
      Transport layer header.




                                            CMC Limited
Access List contd..

Once you create an access list, you apply it to an interface
with either an inbound or outbound list:
 •   Inbound access lists: Packets are processed through
     the access list before being routed to the outbound
     interface.
 •   Outbound access lists: Packets are routed to the
     outbound interface and then processed through the
     access list.




                                            CMC Limited
Access List contd..
Standard IP Access Lists
 Standard IP access lists filter the network by using the
 source IP address in an IP packet. You create a standard IP
 access list by using the access-list numbers 1-99.

 You can specify access lists by names for the protocols
 listed below:

     •   Apollo Domain
     •   IP
     •   IPX
     •   ISO CLNS
     •   NetBIOS IPX
     •   Source-route bridging NetBIOS

                                           CMC Limited
Standard IP Access Lists contd..

RouterA(config)#access-list ?

<1-99>            IP standard access list
<100-199>         IP extended access list
<1000-1099> IPX SAP access list
<1100-1199> Extended 48-bit MAC address access      list
<1200-1299> IPX summary address access list
<200-299>         Protocol type-code access list
<300-399>         DECnet access list
<400-499>         XNS standard access list
<500-599>         XNS extended access list
<600-699>         Appletalk access list
<700-799>         48-bit MAC address access list
<800-899>         IPX standard access list
<900-999>         IPX extended access list




                                       CMC Limited
Standard IP Access Lists contd..
Wildcards

 •   Wildcards are used with access lists to specify a host,
     network, or part of a network.
 •   Block size: Some of the different block sizes available
     are 64, 32, 16, 8, and 4.
 •   When you need to specify a range of addresses, you
     choose the next-largest block size for your needs.
 •   Wildcards are used with the host or network address to
     tell the router a range of available addresses to filter. To
     specify a host, the address would look like this:
     172.16.30.5 0.0.0.0




                                              CMC Limited
Access List contd..
Extended IP Access Lists
 Extended IP access lists give more detailed control
 compared to standard lists which only allow you to deny or
 permit traffic from a certain source.

 Extended lists allow you to permit or deny particular TCP/IP
 traffic based on the Transport protocol being used (TCP or
 UDP) and the service or application (e.g. SMTP, Telnet)
 from source addresses and destination addresses.




                                           CMC Limited
IOS Software
Cisco IOS Software provides a wide range of functionality -
from basic connectivity, security, and network management
to technically advanced services that enable businesses to
deploy applications such as real-time trading, interactive
support, on-demand media, and unified messaging.

The functionality of Cisco IOS Software is the result of an
evolution. First-generation networking devices could only
store and forward data packets. Today, Cisco IOS software
can recognize, classify, and prioritize network traffic,
optimize routing, support voice and video applications, and
much more.



                                          CMC Limited
IOS Software contd..

Cisco network platforms and the Cisco IOS Software
running on them are a unified system - one that is a firm
foundation for building Internet applications.




                                         CMC Limited
IOS Software contd..

Each time you switch on the router, it goes through power-
on self-test (POST) diagnostics to verify basic operation of
the CPU, memory and network interfaces.

The system bootstrap software in ROM (boot image)
executes and searches for valid router operating system
software (Cisco IOS image).

There are three places to find the Cisco IOS image to load:

   •   Flash memory
   •   TFTP server
   •   ROM



                                           CMC Limited
IOS Software contd..
Default (Normal) Boot Sequence
 After power on router does POST. Bootstrap starts IOS load.

 Check the startup-config file in NVRAM for boot-system
 commands (normally there aren't any). Then load IOS from
 Flash.

Boot System Commands
 Router(config)# boot system flash IOS_filename
 Router(config)#boot    system       tftp     IOS_filename
 tftp_server_ip_address
 Router(config)# boot system rom
 Router#copy running-config startup-config


                                            CMC Limited
IOS Software contd..

Configuration Register Command
 Router(config)# config-register 0x10x
 where that last x is 0 - F in hex
 When the last x is:
 0 = boot into ROM Monitor mode
 1 = boot the ROM IOS
 2 - 15 = look in startup config file in NVRAM
 To check the boot field setting, and to verify the config-
 register command, use the show version command.



                                             CMC Limited
Backing Up and Restoring Cisco IOS
Before you upgrade or restore a Cisco IOS, you should copy
the existing file to a TFTP host as a backup in case the new
image does not work.

Verify Flash Memory
 By using the show flash command you can verify the
 amount of flash memory and the file or files being stored in
 flash memory.
Router#sh flash
System flash directory:
File Length       Name/status
1     8121000     c2500-js-l.112-18.bin
[8121064 bytes used, 8656152 available, 16777216 total]
16384K bytes of processor board System flash (Read ONLY)
Router#

                                           CMC Limited
Backing Up and Restoring Cisco IOS contd..

Back Up Cisco IOS
 To back up the Cisco IOS to a TFTP host, you use the copy
 flash tftp command. This command requires only the
 source filename and the IP address of the TFTP host.




                                          CMC Limited
Back Up Cisco IOS contd..
Router#copy flash tftp
System flash directory:
File Length       Name/status
1     8121000     c2500-js-l.112-18.bin
[8121064 bytes used, 8656152 available, 16777216 total]
Address or name of remote host [255.255.255.255]?
192.168.0.120
Source file name?c2500-js-l.112-18.bin
Destination file name [c2500-js-l.l12-18.bin]?[Enter]
Verifying checksum for 'c2500-js-l.l12-18.bin')file #1)
...OK
Copy '/c2500-js-l.112-18' from Flash to server
  as '/c2500-js-l.112-18'? [yes/no]y
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!! [output cut]
Upload to server done
Flash copy took 00:02:30 [hh:mm:ss]
Router#

                                        CMC Limited
Backing Up and Restoring Cisco IOS contd..

Restoring or Upgrading the Cisco Router IOS
 You may need to restore the Cisco IOS to flash memory to
 replace an original file that has been damaged or to
 upgrade the IOS.

 You can download the file from a TFTP host to flash
 memory by using the copy tftp flash command.

 Router#copy tftp flash




                                         CMC Limited
Backing Up and Restoring the Cisco
Configuration
Any changes that you make to the router configuration are
stored in the running-config file.

If you do not perform a copy run start command after you
make a change to running-config, that change will be gone if
the router reboots or gets powered down.




                                          CMC Limited
Backing Up and Restoring the Cisco Configuration
  contd..
Backing Up the Cisco Router Configuration
 To copy the router's configuration from a router to a TFTP
 host, you can use either the copy running-config tftp or
 copy startup-config tftp command.


 Verifying the Current Configuration

 To verify the configuration in DRAM, use the show running-
 config command as follows:

 Router#sh run



                                          CMC Limited
Backing Up the Cisco Router Configuration
         contd..
Verifying the Stored Configuration

Next, you should check the configuration stored in NVRAM.
To see this, use the show startup-config command as
follows:

Router#sh start

Copying the Current Configuration to NVRAM

Router#copy run start




                                         CMC Limited
Backing Up the Cisco Router Configuration
        contd..
Copying the Configuration to a TFTP Host

Once the file is copied to NVRAM, you can make a second
backup to a TFTP host by using the copy running-config
tftp command, as follows:

Router#copy run tftp




                                        CMC Limited
Backing Up and Restoring the Cisco Configuration
  contd..
Restoring the Cisco Router Configuration
 If you copied the router's configuration to a TFTP host as a
 second backup, you can restore the configuration using the
 copy tftp running-config command or the copy tftp
 startup-config command, as shown below.

 Router#copy tftp run

Erasing the Configuration
 To delete the startup-config file on a Cisto router, use the
 command erase startup-config, as follows:

 Router#erase startup-config

                                           CMC Limited
Cisco Discovery Protocol (CDP)
CDP is a proprietary protocol designed by Cisco to help
administrators collect information about both locally attached
and remote devices.

The show cdp command shows information about two CDP
global parameters that can be configured on Cisco devices:

 •   CDP timer is how often CDP packets are transmitted
     to all active interfaces.
 •   CDP holdtime is the amount of time that the device
     will hold packets received from neighbor devices.




                                            CMC Limited

Más contenido relacionado

La actualidad más candente

Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Netwax Lab
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6Irsandi Hasan
 
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM India Smarter Computing
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkAhmed Habib
 
Juniper SRX Quickstart 12.1R3 by Thomas Schmidt
Juniper SRX Quickstart 12.1R3 by Thomas SchmidtJuniper SRX Quickstart 12.1R3 by Thomas Schmidt
Juniper SRX Quickstart 12.1R3 by Thomas SchmidtNam Nguyen
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewzOSCommserver
 
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lanละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น LanVientiane, Laos
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8Waqas Ahmed Nawaz
 
Solarwinds port requirement
Solarwinds port requirementSolarwinds port requirement
Solarwinds port requirementEzahir Amer
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 

La actualidad más candente (20)

Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
 
Asterisk: the future is at REST
Asterisk: the future is at RESTAsterisk: the future is at REST
Asterisk: the future is at REST
 
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
Juniper SRX Quickstart 12.1R3 by Thomas Schmidt
Juniper SRX Quickstart 12.1R3 by Thomas SchmidtJuniper SRX Quickstart 12.1R3 by Thomas Schmidt
Juniper SRX Quickstart 12.1R3 by Thomas Schmidt
 
Nat 03
Nat 03Nat 03
Nat 03
 
Dedicated servers
Dedicated serversDedicated servers
Dedicated servers
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
 
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lanละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
 
Netflow
NetflowNetflow
Netflow
 
Solarwinds port requirement
Solarwinds port requirementSolarwinds port requirement
Solarwinds port requirement
 
Ccna2 project
Ccna2 projectCcna2 project
Ccna2 project
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Iuwne10 S05 L02
Iuwne10 S05 L02Iuwne10 S05 L02
Iuwne10 S05 L02
 

Similar a Chapter 9

Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemBetselove
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training PresentationTalvinder Singh
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgEric Vanderburg
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)NetProtocol Xpert
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
Basic about-router
Basic about-routerBasic about-router
Basic about-routersaurabh goel
 
Ccna configuracion y comandos
Ccna configuracion y comandosCcna configuracion y comandos
Ccna configuracion y comandosAlfonso Saucedo
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10Waqas Ahmed Nawaz
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pixangelitoh11
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslIT Tech
 

Similar a Chapter 9 (20)

Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
CCNA
CCNACCNA
CCNA
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training Presentation
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Cisco Ios advanced
Cisco Ios advancedCisco Ios advanced
Cisco Ios advanced
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
C C N A Day2
C C N A  Day2C C N A  Day2
C C N A Day2
 
Basic about-router
Basic about-routerBasic about-router
Basic about-router
 
Ccna configuracion y comandos
Ccna configuracion y comandosCcna configuracion y comandos
Ccna configuracion y comandos
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcsl
 

Más de Suchit Aher (10)

Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter5
Chapter5Chapter5
Chapter5
 
Chapter4
Chapter4Chapter4
Chapter4
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter2
Chapter2Chapter2
Chapter2
 
Chapter1
Chapter1Chapter1
Chapter1
 
Product no
Product noProduct no
Product no
 

Chapter 9

  • 1. Network Management CMC Limited
  • 2. Objectives • Understand different features of Access List. • Explain standard and extended IP Access Lists. • Understand IOS software and how to load IOS software. • Understand how to backup and restore Cisco IOS. • Understand how to backup and restore Cisco configuration. • Understand Cisco Discovery Protocol. CMC Limited
  • 3. Access List An access list is essentially a list of conditions that control access both to and form a network segment. Access lists can filter unwanted packets and be used to implement security policies. The IP and IPX access lists work similarly – they're both packet filters. CMC Limited
  • 4. Access List contd.. There are a few important rules a packet follows when it's being compared with an access list: • It's always compared with each line of the access list in sequential order. • It's compared with lines of the access list only until a match is made. Once the packet matches a line of the access list, it's acted upon, and no further comparisons take place. • There is an implicit “deny" at the end of each access list- this means that if a packet doesn't match up to any lines in the access list, it'll be discarded. CMC Limited
  • 5. Access List contd.. There are two types of access lists used with IP and IPX: • Standard access lists: These use only the source IP address in an IP packet to filter the network. • Extended access lists: These check for both source and destination IP address, protocol field in the Network layer header, and port number at the Transport layer header. CMC Limited
  • 6. Access List contd.. Once you create an access list, you apply it to an interface with either an inbound or outbound list: • Inbound access lists: Packets are processed through the access list before being routed to the outbound interface. • Outbound access lists: Packets are routed to the outbound interface and then processed through the access list. CMC Limited
  • 7. Access List contd.. Standard IP Access Lists Standard IP access lists filter the network by using the source IP address in an IP packet. You create a standard IP access list by using the access-list numbers 1-99. You can specify access lists by names for the protocols listed below: • Apollo Domain • IP • IPX • ISO CLNS • NetBIOS IPX • Source-route bridging NetBIOS CMC Limited
  • 8. Standard IP Access Lists contd.. RouterA(config)#access-list ? <1-99> IP standard access list <100-199> IP extended access list <1000-1099> IPX SAP access list <1100-1199> Extended 48-bit MAC address access list <1200-1299> IPX summary address access list <200-299> Protocol type-code access list <300-399> DECnet access list <400-499> XNS standard access list <500-599> XNS extended access list <600-699> Appletalk access list <700-799> 48-bit MAC address access list <800-899> IPX standard access list <900-999> IPX extended access list CMC Limited
  • 9. Standard IP Access Lists contd.. Wildcards • Wildcards are used with access lists to specify a host, network, or part of a network. • Block size: Some of the different block sizes available are 64, 32, 16, 8, and 4. • When you need to specify a range of addresses, you choose the next-largest block size for your needs. • Wildcards are used with the host or network address to tell the router a range of available addresses to filter. To specify a host, the address would look like this: 172.16.30.5 0.0.0.0 CMC Limited
  • 10. Access List contd.. Extended IP Access Lists Extended IP access lists give more detailed control compared to standard lists which only allow you to deny or permit traffic from a certain source. Extended lists allow you to permit or deny particular TCP/IP traffic based on the Transport protocol being used (TCP or UDP) and the service or application (e.g. SMTP, Telnet) from source addresses and destination addresses. CMC Limited
  • 11. IOS Software Cisco IOS Software provides a wide range of functionality - from basic connectivity, security, and network management to technically advanced services that enable businesses to deploy applications such as real-time trading, interactive support, on-demand media, and unified messaging. The functionality of Cisco IOS Software is the result of an evolution. First-generation networking devices could only store and forward data packets. Today, Cisco IOS software can recognize, classify, and prioritize network traffic, optimize routing, support voice and video applications, and much more. CMC Limited
  • 12. IOS Software contd.. Cisco network platforms and the Cisco IOS Software running on them are a unified system - one that is a firm foundation for building Internet applications. CMC Limited
  • 13. IOS Software contd.. Each time you switch on the router, it goes through power- on self-test (POST) diagnostics to verify basic operation of the CPU, memory and network interfaces. The system bootstrap software in ROM (boot image) executes and searches for valid router operating system software (Cisco IOS image). There are three places to find the Cisco IOS image to load: • Flash memory • TFTP server • ROM CMC Limited
  • 14. IOS Software contd.. Default (Normal) Boot Sequence After power on router does POST. Bootstrap starts IOS load. Check the startup-config file in NVRAM for boot-system commands (normally there aren't any). Then load IOS from Flash. Boot System Commands Router(config)# boot system flash IOS_filename Router(config)#boot system tftp IOS_filename tftp_server_ip_address Router(config)# boot system rom Router#copy running-config startup-config CMC Limited
  • 15. IOS Software contd.. Configuration Register Command Router(config)# config-register 0x10x where that last x is 0 - F in hex When the last x is: 0 = boot into ROM Monitor mode 1 = boot the ROM IOS 2 - 15 = look in startup config file in NVRAM To check the boot field setting, and to verify the config- register command, use the show version command. CMC Limited
  • 16. Backing Up and Restoring Cisco IOS Before you upgrade or restore a Cisco IOS, you should copy the existing file to a TFTP host as a backup in case the new image does not work. Verify Flash Memory By using the show flash command you can verify the amount of flash memory and the file or files being stored in flash memory. Router#sh flash System flash directory: File Length Name/status 1 8121000 c2500-js-l.112-18.bin [8121064 bytes used, 8656152 available, 16777216 total] 16384K bytes of processor board System flash (Read ONLY) Router# CMC Limited
  • 17. Backing Up and Restoring Cisco IOS contd.. Back Up Cisco IOS To back up the Cisco IOS to a TFTP host, you use the copy flash tftp command. This command requires only the source filename and the IP address of the TFTP host. CMC Limited
  • 18. Back Up Cisco IOS contd.. Router#copy flash tftp System flash directory: File Length Name/status 1 8121000 c2500-js-l.112-18.bin [8121064 bytes used, 8656152 available, 16777216 total] Address or name of remote host [255.255.255.255]? 192.168.0.120 Source file name?c2500-js-l.112-18.bin Destination file name [c2500-js-l.l12-18.bin]?[Enter] Verifying checksum for 'c2500-js-l.l12-18.bin')file #1) ...OK Copy '/c2500-js-l.112-18' from Flash to server as '/c2500-js-l.112-18'? [yes/no]y !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!! [output cut] Upload to server done Flash copy took 00:02:30 [hh:mm:ss] Router# CMC Limited
  • 19. Backing Up and Restoring Cisco IOS contd.. Restoring or Upgrading the Cisco Router IOS You may need to restore the Cisco IOS to flash memory to replace an original file that has been damaged or to upgrade the IOS. You can download the file from a TFTP host to flash memory by using the copy tftp flash command. Router#copy tftp flash CMC Limited
  • 20. Backing Up and Restoring the Cisco Configuration Any changes that you make to the router configuration are stored in the running-config file. If you do not perform a copy run start command after you make a change to running-config, that change will be gone if the router reboots or gets powered down. CMC Limited
  • 21. Backing Up and Restoring the Cisco Configuration contd.. Backing Up the Cisco Router Configuration To copy the router's configuration from a router to a TFTP host, you can use either the copy running-config tftp or copy startup-config tftp command. Verifying the Current Configuration To verify the configuration in DRAM, use the show running- config command as follows: Router#sh run CMC Limited
  • 22. Backing Up the Cisco Router Configuration contd.. Verifying the Stored Configuration Next, you should check the configuration stored in NVRAM. To see this, use the show startup-config command as follows: Router#sh start Copying the Current Configuration to NVRAM Router#copy run start CMC Limited
  • 23. Backing Up the Cisco Router Configuration contd.. Copying the Configuration to a TFTP Host Once the file is copied to NVRAM, you can make a second backup to a TFTP host by using the copy running-config tftp command, as follows: Router#copy run tftp CMC Limited
  • 24. Backing Up and Restoring the Cisco Configuration contd.. Restoring the Cisco Router Configuration If you copied the router's configuration to a TFTP host as a second backup, you can restore the configuration using the copy tftp running-config command or the copy tftp startup-config command, as shown below. Router#copy tftp run Erasing the Configuration To delete the startup-config file on a Cisto router, use the command erase startup-config, as follows: Router#erase startup-config CMC Limited
  • 25. Cisco Discovery Protocol (CDP) CDP is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. The show cdp command shows information about two CDP global parameters that can be configured on Cisco devices: • CDP timer is how often CDP packets are transmitted to all active interfaces. • CDP holdtime is the amount of time that the device will hold packets received from neighbor devices. CMC Limited