This chapter provides procedures for configuring the basic parameters of your Cisco router, including
global parameter settings, routing protocols, interfaces, and command-line access. It also describes the
default configuration on startup.Individual router models may not support every feature described throughout this guide. Features not
supported by a particular router are indicated whenever possible
This software configuration guide provides instructions for using the Cisco command-line interface (CLI) to configure features of the following Cisco 1800 series integrated services fixed-configuration routers: •Cisco 1801, Cisco 1802, and Cisco 1803 DSL Access Routers •Cisco 1811 and Cisco 1812 Ethernet Access Routers
This preface describes the intended audience, the organization of this guide, and the text and command conventions used throughout the guide. The preface includes the following topics:...
Objectives: Set Up the Topology and Initialize Devices, Configure Devices and Verify Connectivity, Configure Router to Allow CCP Access, (Optional) Install and Set Up CCP on PC-A, Configure R1 Settings Using CCP, Use CCP Utilities.
This chapter define the role of the Internetwork Operating System, use Cisco CLI commands to perform basic router and switch configuration and verification, given a network addressing scheme, select, apply, and verify appropriate addressing parameters to a host,... inviting you refer.
After studying this chapter you will be able to: Define the role of the Internetwork Operating System (IOS), use Cisco CLI commands to perform basic router and switch configuration and verification, given a network addressing scheme, select, apply, and verify appropriate addressing parameters to a host,... inviting you refer.
Cable a network similar to the one shown in the diagram. Any router that meets the interface
requirements displayed on the above diagram may be used. For example, router series 800, 1600,
1700, 2500 and 2600 or any such combination can be used. Please refer to the chart at the end of
the lab to correctly identify the interface identifiers to be used based on the equipment in the lab. The
configuration output used in this lab is produced from 1721 series routers. Any other router used may
produce slightly different output.
This chapter presents the basics of configuring the 1900 and 2950 Catalyst switches
as well as Cisco routers. As you continue throughout this book, you will build upon
these fundamental and important concepts for accessing, configuring, and managing
your Cisco devices. I am making the assumption that you have never configured a Cisco device
before and therefore will begin with the very basics by explaining the operating system that these
devices use, the advantages that Cisco’s operating system provides, and how to use some basic
operating system commands to configure your Cisco device....
"Secure Router Configuration - IOS 15.1" aims at providing network security engineers with the knowledge and skills needed to secure Cisco IOS router based networks. Readers of this book will be able to secure the network environment using existing Cisco IOS Software features, as well as install and configure components of the Cisco IOS Software, such as zone-based policy firewall and Cisco IOS Intrusion Prevention System (IPS).
You should also install and configure a TFTP server in your lab
network. This is fairly easy to do, and any PC or laptop can function
as your TFTP server for the purposes of this lab. For more
information about finding TFTP software, see Backing Up Router
Configuration Files in the Basic Router Maintenance and
Troubleshooting section of the Basic Router Operation Tutorial.
In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).
In this chapter, you learned to: Describe the general methods used to mitigate security threats to Enterprise networks, configure Basic Router Security, explain how to disable unused Cisco router network services and interfaces, explain how to use Cisco SDM, manage Cisco IOS devices.
Calculating the subnet addressing for the lab using the VLSM technique and note all information needed on the topology.
2. Perform Basic Router Configurations all Routers.
3. In each LAN, configure the second usable host address for PC1 and the last usable host address for PC2.
4. Enable routing on HQ, BRANCH1, and BRANCH2 by using the dynamic routing protocol as EIGRP.(Using wildcard mask, AS number = 1).
For many years I have been a consultant for different companies and have written books on switch and router
configurations and troubleshooting. During my years as a consultant I have had to either install, administer, or
troubleshoot switching problems and configurations for switches without a good handbook. I have constantly
gone through bookstores looking for a book on Cisco switch troubleshooting and configurations that didn’t
deal with a Cisco curriculum. Guess what? I couldn’t find one!