1 / 32

IS 340 Review

IS 340 Review. Router 101 Brigham Young University-Idaho. Network Layer Path Determination. Internal Configuration Components. Internal Components of a 2600 Router. External Connections on a 2600 Router. Connecting Console Interfaces.

yenk
Télécharger la présentation

IS 340 Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IS 340 Review Router 101 Brigham Young University-Idaho

  2. Network Layer Path Determination

  3. Internal Configuration Components

  4. Internal Components of a 2600 Router

  5. External Connections on a 2600 Router

  6. Connecting Console Interfaces • Configure terminal emulation software on the PC for the following: • The appropriate com port • 9600 baud • 8 data bits • 1 stop bit • No parity • No flow control • Connect a rollover cable to the router console port (RJ-45 connector). • Connect the other end of the rollover cable to the RJ-45 to DB-9 adapter • Attach the female DB-9 adapter to a PC.

  7. Computer or Terminal Console Connection

  8. Modem Connection to Console or Auxiliary Port

  9. Router User Interface

  10. Operating Environments

  11. Steps in Router Initialization

  12. Router User Interface Modes

  13. The User Interface Error Indicator

  14. Using Help

  15. Using IOS Command history

  16. Configuring a Router Name A router should be given a unique name as one of the first configuration tasks. This task is accomplished in global configuration mode using the following commands: Router(config)#hostname TokyoTokyo(config)#

  17. Configuring Router Passwords

  18. Host Name Resolutions • Host name resolution is the process that a computer system uses to associate a host name with an IP address. • Host names, unlike DNS names, are significant only on the router on which they are configured.

  19. Configuring Host Tables

  20. Viewing the Host Table LAB_A(config)#ip host LAB_A 192.5.5.1 205.7.5.1 201.100.11.1 LAB_A(config)#ip host LAB_B 219.17.100.2 199.6.13.1 201.100.11.2 LAB_A(config)#ip host LAB_C 223.8.151.1 204.204.7.1 199.6.13.2 LAB_A(config)#ip host LAB_D 210.93.105.1 204.204.7.2 LAB_A(config)#ip host LAB_E 210.93.105.2 LAB_A(config)# LAB_A#show hosts Default domain is not set Name/address lookup uses domain service Name servers are 255.255.255.255 Host Flags Age Type Address(es) LAB_B (perm, OK) 0 IP 219.17.100.2 199.6.13.1 201.100.11.2 LAB_C (perm, OK) 0 IP 223.8.151.1 204.204.7.1 199.6.13.2 LAB_E (perm, OK) 0 IP 210.93.105.2 LAB_A (perm, OK) 0 IP 192.5.5.1 205.7.5.1 201.100.11.1 LAB_D (perm, OK) 0 IP 210.93.105.1 204.204.7.2 LAB_A#

  21. Using the copy Command

  22. Using the copy tftp running-config Command

  23. What are ACLs? • ACLs are lists of instructions you apply to a router's interface to tell the router what kinds of packets to accept and what kinds to deny.

  24. ACLs must be defined on a per-protocol, per direction, or per port basis • ACL must be defined for each interface • ACL must be defined for each protocol enabled on the interface • ACLs control traffic in one direction at a time on an interface

  25. How ACLs Work

  26. How ACL’s Work

  27. Protocols with ACLs Specified by Numbers

  28. Wildcard Masks • Don’t confuse with subnet masks • 0 mean match with IP number • 255 means accept any number in this range

  29. Standard ACLs

  30. Extended ACLs

  31. Extended IP Access List Examples (continued)

  32. Placing ACLs • Standard ACLs should be placed close to the destination. • Extended ACLs should be placed close to the source.

More Related