Additionally, remind students to use strong passwords that are not easily guessed. From a security standpoint, requiring only one password is analogous to locking the doors to a house while leaving the windows open. Use passwords that are more than 8 characters Use combination of upper & lowercase letters, numbers, special characters Avoid using the same password for all devices Avoid using common words such as password or administrator Explain it is good practice to require different passwords for each of these levels of access. console password – password to limit device access using the console connection enable password – password to limit access to the privileged EXEC mode (after you type enable) enable secret password – encrypted password to limit access to the privileged EXEC mode (after you type enable) VTY password – password to limit device access using telnet Encrypt all passwords- service password-encryption Set passwords & encrypt them Enable password Enable secret password Console password Vty password Encrypt all passwords On the board, write the 4 types of passwords students will be learning to configure in the PT Activity. Some guidelines for naming conventions are that names should: Start with a letter (Capitalization counts) Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in lengthġ7 Configure hostname Must be in privileged modeġ8 Limit access to device Put switch in a secure location What could these switches be named? Sw-Floor1, etc. Hostnames allow devices to be identified by network administrators over a network or the Internet. Setting a name for the switch Limiting access to the device configuration Configuring banner messages Saving the configurationġ6 Hostnames What are the default hostnames? Demo all modes, sh?, cl?, clock set ?, clock set 19:22:00 ?, show ?, description of an interface, ping, and tracerouteġ2 example Complete this in Packet Tracer.ġ4 activity Packet Tracer Lab 2.1.4.6- Navigating the IOSġ5 What we’ll do… Create a two PC network connected via a switch Switch# configure terminal (config t) Switch(config)# interface xxx (int) Switch(config-if)# Switch(config)# line xxx Switch(config-line)# Switch(config-line)#exit (goes back one mode) Ctrl+Z or end= (goes back to privileged mode) Switch# disable (goes back to user mode) Do all of this in PT. USER is what you first see when you boot up.ġ1 Getting between modes Switch> enable (en) PuTTY (Figure 1) Tera Term (Figure 2) SecureCRT (Figure 3) HyperTerminal OS X Terminal Current Windows (Vista & up) do not include them Older Windows had HyperTerminal. Telnet remote access (plain-text) One active interface must be configured Secure Shell (SSH) remote access (encrypted) Once you connect, you get in with a terminal emulation program. Serial port to RJ45 USB to Mini-B (newer option)Ħ Telnet, ssh, aux In-band management Browser-based config Means direct maintenance access only Use when nothing is configured yet Use when next to switch Need a PC w/ terminal emulation software & console cable Configure a password to this port There is a recovery method if you forget password. Nothing to configure Managed Configure settings, security, switching modes, etc.ĥ Console Port Out-of-band management Use when nothing is configured yet Presentation on theme: "Switch management Chapter 6."- Presentation transcript:Ģ objectives Upon completion of this chapter, you should be able to:Ĭonfigure switches Configure VLANs Verify configuration settings Troubleshoot problemsģ Types of switches Unmanaged Managed Plug in and connect devices
0 Comments
Leave a Reply. |