Improvement of CCNA-2 operation IOS and shortcut keys and remote connection

1. Build a basic small local area network by operating the switch
2. Shortcut keys to improve the IOS operation mode
3. Preliminary understanding of the ghost of IP

TCP/IP protocol stack
encapsulation and decapsulation (dressing and undressing)
to understand, understand, master, master, research
Application Engineer
1. Build a basic small local area network by operating the switch, similar to the network management
fool switch (VLAN1)! --->Medium LAN
SW1#show vlan brief //Verify the brief information of VLAN

SW1(config-vlan)#name QYT //vlan1 is used as the default VLAN and cannot be modified
%Default VLAN 1 may not have its name changed.
The device is empty, why are there VLANs 10 and 20?
On Cisco equipment, the VLAN information may be stored in different locations. The
real machine saves the vlan information in the vlan.dat file of the flash card.
Learn to use the help command, and you will get started with half a foot. Everyone learns to use question marks for
complete help and partial help
SW1#clock set 20:19?
hh:mm:ss //Command format, also called keywords

SW1#clock set 20:19 ?
% Unrecognized command, why is it not recognized?
SW1#clock set 20:22:30 April 16
% Incomplete command.
SW1#clock set 20:22:30 April 16 2018 ?
<cr> //represents carriage return ~ execute
SW1(config)#clock timezone BJ +8 // Set the time zone to BK +8 and
save:
Branch#copy running-config startup-config //Equal to wr, save the running file to the non-volatile register (nvram) to
Destination filename [startup-config]?
Building configuration.. .
[OK]
The configuration on the Cisco router device is saved in nvram; the low-end switch configuration is saved in flash (dir)--->Under the condition of not destroying the original configuration, crack the password of the switch
Branch#reload //Restart command

Shortcut key--->Hand speed
tab //Complete command
ctrl+a //Cursor to the beginning of the line
ctrl+e //Cursor to the end of the line
ctrl+U //Erase a line
ctrl+shift+6 //Interrupt the test, such as ping
ctrl+c //Do not execute the command, exit to privileged mode
ctrl+z //After executing the command, exit to privileged mode
Branch#terminal length 0 //Display all configuration
pipes |, more accurate positioning configuration and display
sh run | section
log function in securecrt, file -> log file

Operation:
Fiber of ×××: single mode, multimode?
Use vlan1 to realize terminal communication
PC1:
PC1(config)#int e0/1
PC1(config-if)#ip add
PC1(config-if)#ip address 10.1.10.1 ?
ABCD IP subnet mask

PC1(config-if)#ip address 10.1.10.1 255.255.255.248
PC1(config-if)#no shu
PC2:
PC2(config)#int e0/1
PC2(config-if)#no shu
PC2(config-if)#ip address 10.1.10.6 255.255.255.248
PC2#show ip route //验证路由表
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route

    • replicated route, % - next hop override

Gateway of last resort is not set

  10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks

C 10.1.10.0/29 is directly connected, Ethernet0/1
L 10.1.10.6/32 is directly connected, Ethernet0/1
PC1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route

    • replicated route, % - next hop override

Gateway of last resort is not set

  10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks

C 10.1.10.0/29 is directly connected, Ethernet0/1
L 10.1.10.1/32 is directly connected, Ethernet0/1
PC1#ping 10.1.10.6
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.10.6 , timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
PC1#
If the configuration of sw1 and sw2 is not restored, PC1 and PC2 cannot communicate

PC2(config)#line vty 0 4
PC2(config-line)#password qyt
PC2(config-line)#transport input telnet

PC2(config)#enable secret ?
0 Specifies an UNENCRYPTED password will follow
5 Specifies a MD5 HASHED secret will follow
8 Specifies a PBKDF2 HASHED secret will follow
9 Specifies a SCRYPT HASHED secret will follow
LINE The UNENCRYPTED (cleartext) 'enable' secret
level Set exec level password

PC2(config)#enable secret qytang123 //The secret level is higher than the password, and the secret password takes effect
PC2(config)#enable password qytang

PC2#terminal monitor //Display logs on the remote management terminal
PC2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
PC2(config)#hostname PC-TEST
PC-TEST(config)#
PC- TEST#
*Apr 15 10:15:11.661: %SYS-5-CONFIG_I: Configured from console by vty0 (10.1.10.1) //Learn more about configuration changes and whether the configuration takes effect through the log
:
1) Pass The VLAN1 of the 2 switches realizes the communication between PC1 and PC2 (using the address I configured)
2) The secret password is configured on PC2
3) During remote management, the log is displayed

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324508013&siteId=291194637