• Tidak ada hasil yang ditemukan

Bab II Konfigurasi Sistem Operasi Jaringan

N/A
N/A
Protected

Academic year: 2018

Membagikan "Bab II Konfigurasi Sistem Operasi Jaringan"

Copied!
68
0
0

Teks penuh

(1)

Konfgurasi Sistem

Operasi Jaringan

(2)

TUJUAN

Menjelaskan tujuan Cisco IOS.

Jelaskan cara mengakses dan menavigasi Cisco IOS untuk mengkonfgurasi

perangkat jaringan.

Jelaskan struktur komando perangkat lunak Cisco IOS.

Konfgurasi nama host pada perangkat Cisco IOS menggunakan CLI.

Gunakan Cisco IOS perintah untuk membatasi akses ke konfgurasi perangkat. Gunakan Cisco IOS perintah untuk menyimpan menjalankan konfgurasi.

Jelaskan bagaimana perangkat berkomunikasi melalui jaringan media. Mengkonfgurasi perangkat host dengan alamat IP.

(3)

Semua peralatan jaringan tergantung pada sistem operasi:

End devices(PC, laptop, smart phone, tablet)

switches router

Titik akses nirkabel frewall

Cisco Internetwork Operating System (IOS)

Koleksi sistem operasi jaringan yang digunakan pada perangkat Cisco

Cisco IOS

(4)

Cisco IOS

(5)

Sistem operasi PC (Windows 8, Linux & OS X) melakukan fungsi teknis yang

memungkinkan

Penggunaan perangkat input dan output Mengelola proses dan program

Mengelola fle sistem, keamanan, perangkat keras, dll

Switch atau router IOS menyediakan opsi untuk

Fungsi yang sama seperti sistem operasi host Konfgurasi interface

Aktifkan routing dan beralih fungsi

Semua perangkat jaringan datang dengan default IOS (switch, router, frewall) Kemungkinan untuk meng-upgrade iOS versi atau ftur set

Cisco IOS

(6)

IOS tersimpan dalam fash

penyimpanan Non-volatile - tidak hilang bila daya hilang Dapat diubah atau ditimpa sesuai kebutuhan

Dapat digunakan untuk menyimpan beberapa versi IOS IOS disalin dari fash ke RAM stabil ketika boot

Jumlah fash dan memori RAM menentukan IOS yang dapat digunakan Cisco IOS

(7)

Cisco IOS

IOS Functions

(8)

8

(9)

9

Bootup Process

running-config IOS (running)

startup-config IOS

ios (partial)

(10)
(11)

11

running-config IOS (running)

startup-config IOS

ios (partial)

Bootup program

Where is the permanent configuration file stored used during boot-up? NVRAM (B)

Where is the diagnostics software stored executed by hardware modules? ROM (D)

Where is the backup (partial) copy of the IOS stored? ROM (D)

Where is IOS permanently stored before it is copied into RAM? FLASH (C)

Where are all changes to the configuration immediately stored? RAM (A)

(12)
(13)

13 running-config IOS (running) startup-config IOS ios (partial) Bootup program startup-config IOS Bootup program ios (partial) running-config IOS (running)

A

B

C

D

B

A

D

(14)

Cisco IOS

CCO Account Benefts and IOS

Files

This video introduces Cisco Connection Online (CCO). CCO has a wealth of information available regarding Cisco products and services.

(15)

Accessing a Cisco IOS Device

Console Access Method

Most common methods to access the Command Line Interface  Console

Telnet or SSHAUX port

(16)

Accessing a Cisco IOS Device

Console Access Method

Console port

Device is accessible even

if no networking

services

have been confgured (out-of-band)

Need a special console cable (aka

rollover

cable

)

Allows confguration commands to be entered

Should be confgured with

passwords

to prevent

unauthorized access

Device should be

located in a secure room

so

console port can not be easily accessed

(17)

Port Console

Perangkat dapat diakses bahkan jika tidak ada layanan jaringan telah

dikonfgurasi (out-of-band)

Butuh kabel konsol khusus (alias kabel rollover)

Memungkinkan konfgurasi perintah yang akan dimasukkan

Harus dikonfgurasi dengan password untuk mencegah akses yang

tidak sah

Perangkat harus ditempatkan di ruang yang aman sehingga port

(18)
(19)

19

Establishing a HyperTerminal session (next

week)

Connect PC using the RJ-45/mini-USB to Serial/USB rollover cable. Confgure the terminal or PC terminal emulation software for:

9600 baud8 data bitsno parity1 stop bit

no fow control

Rollover cable

Console port

Com1 or Com2 serial port

Or USB port with USB-to-Serial adapter

Terminal or a

PC with

terminal

emulation

software

(20)

20

Terminal

(Serial)

Settings)

Confgure the terminal or PC terminal emulation software for:

9600 baud

8 data bitsno parity1 stop bit

(21)

21

Establishing a Terminal/Serial/Console session

Important: A console connection is not

the same as a network connection!

=

• PuTTY

• Tera Term

• SecureCRT

• HyperTerminal

• OS X Terminal

• Zoc

(22)

Accessing a Cisco IOS Device

Telnet, SSH, and AUX Access

Methods

Telnet

Method for remotely accessing the CLI over a network

Require active networking services and one active interface

that is confgured

Secure Shell (SSH) – Preferred over Telnet

Remote login similar to Telnet but utilizes more securityStronger password authentication

Uses encryption when transporting data

Aux Port (not used too much)Out-of-band connection

Uses telephone line

Can be used like console port

(23)

23

C:\> ssh C:\> ping

Ethernet Connection

Network connection needed

When can you use a network connection to

connect to the router?

What software/command do you need?

What cable and ports do you use?

When should you not use a network

connection to configure the router?

When there is a network

connection to the router (telnet). TCP/IP, Terminal prompt (DOS), Tera Term, etc.

PC & Router: Ethernet NIC Ethernet straight-through cable

When the change may

disconnect the telnet connection.

(24)

Accessing a Cisco IOS Device

Terminal Emulation Programs

Software available for

connecting to a networking device (usually same as terminal/serial/console connection):

 PuTTY  Tera TermSecureCRTHyperTerminalOS X Terminal  Zoc

(25)

Navigating the IOS

(26)

Navigating the IOS

Cisco IOS Modes of Operation

enable

configure terminal

interface < > router < > line < >

(27)

Navigating the IOS

Primary Modes

enable enable

(28)

Navigating the IOS

Global Confguration Mode and

Submodes

Global configuration mode and interface configuration modes can only be reached from the privileged EXEC mode.

(29)

Navigating the IOS

Navigating between IOS Modes

Similar IOS commands for switches and routers

(30)

Navigating the IOS

Navigating between IOS Modes

(cont.)

Switch> user mode

Switch> enable go to privilege mode

Switch# configure terminal go to global configuration mode

Switch(config)# interface vlan 1 go to interface mode

Switch(config-if)# exit

Switch(config)# exit

Switch# config t Shortened commands and parameters

Switch(config)# vlan 1 go to VLAN configuration mode

Switch(config-vlan)# end go to privilege-EXEC mode

Switch# disable

Switch> enable

Switch# config t

Switch(config)# line vty 0 4 go to interface (line) mode

Switch(config-line)# exit

Switch(config)#

(31)

31

Common Commands for Switches and Routers

Switch>Switch> enableuser mode

Switch# privilege mode

Switch# configure terminal

Switch(config)# exit

Switch# config t

Switch(config)# hostname name

Switch(config)# enable secret password privilege password

Switch(config)# line console 0 console password

Switch(config-line)# password password

Switch(config-line)# login

Switch(config)# line vty 0 4 telnet password

Switch(config-line)# password password

Switch(config-line)# login

Switch(config)# banner motd # message # banner

Switch(config)# interface type number configure interface

(32)

32

Making your life easier!

Switch# enable

Switch(config)# line console 0 Console port

Switch(config-line)# logging synchronous IOS will not

Switch(config-line)# exec-timeout 0 0 password

Switch(config)# no ip domain-lookup password

Switch(config-line)# login

Switch(config)# banner motd # message # banner

Switch(config)# interface type number configure interface

(33)

Navigating the IOS

Navigating between IOS Modes

(34)

The Command Structure

(35)

The Command Structure

Cisco IOS Command Reference

IOS Command Conventions

The general syntax for a command is the command followed by any appropriate keywords (defned) and arguments (undefned).

An argument is generally not a predefned word.

An argument is a value or variable defned by the user.

Switch(config-if)# description string

Boldface text indicates commands and keywords that are typed as shown

Italic text indicates an argument for which you supply the value. For the description command, the argument is a string value.

The string value can be any text string of up to 80 characters.  Example:

Switch(config-if)# description MainHQ Office Switch

(36)

The Command Structure

Cisco IOS Command Reference

 For the ping command:

Switch> ping IP-address

Switch> ping 10.10.10.5

The command is ping and the user defned argument is the 10.10.10.5.

Similarly, the syntax for entering the traceroute command is:

Switch> traceroute IP-address

Switch> traceroute 192.168.254.254

 The command is traceroute and the user defned argument is the

192.168.254.254.

(37)

The Command Structure

Context Sensitive Help

(38)

The Command Structure

Command Syntax Check

(39)

The Command Structure

Command Syntax Check

(40)

The Command Structure

Command Syntax Check

(41)

The Command Structure

Hot Keys and Shortcuts

Tab - Completes the remainder of a partially typed command or

keyword

Ctrl-R - Redisplays a line

Ctrl-A – Moves cursor to the beginning of the line

Ctrl-Z - Exits confguration mode and returns to user EXEC

Down Arrow - Allows the user to scroll forward through former

commands

Up Arrow - Allows the user to scroll backward through former

commands

Ctrl-Shift-6 - Allows the user to interrupt an IOS process such

as ping or traceroute.

Ctrl-C - Aborts the current command and exits the confguration

mode

(42)

The Command Structure

IOS Examination Commands

(43)

The Command Structure

The show version Command

(44)

The Command Structure

Navigating the IOS

(45)

Hostnames

Why the Switch

Let’s focus on

Creating a two PC network connected via a switchSetting a name for the switch

Limiting access to the device confgurationConfguring banner messages

Saving the confguration

(46)

Hostnames

Device Names

Hostnames allow devices to be identifed by network administrators over a network or the Internet.

Some guidelines for naming conventions are that names should:  Start with a letter

Contain no spaces

 End with a letter or digit

Use only letters, digits, and dashes  Be less than 64 characters in length

Without names, network devices are difficult to identify for configuration purposes.

(47)

Hostnames

Confguring

Hostnames

Switch(config)# hostname Sw-Floor-3

Sw-Floor3(config)#

Switch(config)# hostname Sw-Floor-2

Sw-Floor2(config)#

Switch(config)# hostname Sw-Floor-1

Sw-Floor1(config)#

(48)

Limiting Access to Device

Confgurations

Securing Device Access

The passwords introduced here are:

Enable password

- Limits access to the privileged EXEC mode

Enable secret

- Encrypted, limits access to the privileged EXEC mode

Console password

- Limits device access using the console connection

VTY password

- Limits device access over Telnet

Note: In most of the labs in this course, we will be using simple passwords such as cisco or class.

(49)

Limiting Access to Device Confgurations

Securing Privileged EXEC Access

use the enable secret command, not the older enable

password command

enable secret  provides greater security because the password

is encrypted class

(50)

Limiting Access to Device Confgurations

Securing User EXEC Access

Console port

must be secured

• reduces the chance of unauthorized personnel physically

plugging a cable into the device and gaining device

access

vty lines

allow access to a Cisco device via Telnet

• number of vty lines supported varies with the type of

device and the IOS version

(51)

Limiting Access to Device Confgurations

Encrypting Password Display

service password-encryptionprevents

passwords from showing up as plain text when viewing the

confguration 

purpose of this

command is to

keep unauthorized individuals from

viewing

passwords in the confguration fle

once applied,

removing the

encryption service does not reverse the encryption

(52)

Limiting Access to Device Confgurations

Banner Messages

Important part of the legal process in the event that someone is

prosecuted for breaking into a device

Wording that implies that a login is "welcome" or "invited" is not

appropriate

Switch(config)# banner motd # This is a secure system Authorized Access Only!!! #

Sw-Floor3(config)#

(53)

Saving Confgurations

Confguration Files

Switch# show running-config

Switch# copy running-config startup-config

<Changes made>

Switch# delete vlan.dat

Delete filename [vlan.dat]?

Delete flash:vlan.dat? [confirm] Switch# erase startup-config

Switch# reload

System configuration has been modified. Save? [yes/no]: n

Proceed with reload? [confirm]

(54)

Saving Confgurations

Capturing Text

(55)

Saving Confgurations

Capturing Text

(56)

Ports and Addresses

IP Addressing in the Large

Each end device on a

network must be

confgured with an IP address

Structure of an IPv4

address is called

dotted decimal

IP address displayed in

decimal notation, with

four decimal

numbers between 0 and 255

With the IP address, a subnet mask is also necessary

IP addresses can be

assigned to both

physical ports and virtual interfacesIPv4 and IPv6

addresses will be discussed in more detail later

(57)

Ports and Addresses

Interfaces and Ports

Terms are used interchangeably

Some interfaces can be can be confgured with an IP address such

as:

NIC (Ethernet interface) on a host/computerRouter’s Ethernet or Serial interfaces

Switches have ports (interfaces) but do not typically have IP addresses

assigned to them

Used to connect devices on LANs that do have IP addresses such as

hosts, routers, printers.

(58)

Addressing Devices

Confguring a Switch Virtual

Interface

Allows the network administrator to communicate (SSH, telnet, ping) with the

switch.

It is OPTIONAL

“Layer 2” switches do NOT need an IP address to forward Ethernet frames.IP address - together with subnet mask, uniquely identifes end device on

internetwork (more later)

Subnet mask - determines which part of a larger network is used by an IP

address interface VLAN 1 - interface confguration mode

ip address 192.168.10.2 255.255.255.0 - confgures the IP address and

subnet mask for the switch

no shutdown - administratively enables the interface

Switch still needs to have physical ports confgured and VTY lines to enable

remote management

(59)

Addressing Devices

Manual IP Address Confguration for End Devices

59

(60)

Addressing Devices

Automatic IP Address Confguration for End Devices

60

(61)

Addressing Devices

IP Address Conficts

61

(62)
(63)

Verifying Connectivity

Test the Loopback Address on an End Device

C:\> ping 127.0.0.1

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

(64)

Verifying Connectivity

Testing the Interface Assignment

(65)

Verifying Connectivity

Testing End-to-End Connectivity

(66)

Confguring a Network Operating System

Chapter 2 Summary

Services provided by the Cisco IOS accessed using a command-line interface (CLI)

accessed by either the console port, the AUX port, or through telnet or

SSH

can make confguration changes to Cisco IOS devices

a network technician must navigate through various hierarchical

modes of the IOS

 Cisco IOS routers and switches support a similar operating system  Introduced the initial settings of a Cisco IOS switch device

setting a name

limiting access to the device confgurationconfguring banner messages

saving the confguration

(67)

67

(68)

68

Referensi

Dokumen terkait

Tabel 4.4 Rekapitulasi Nilai Kompetensi Kecerdasan Ekologis Siklus I

Konsep algoritma genetika yang telah diaplikasikan pada proses penjadwalan kegiatan perkuliahan semester ganjil kurikulum 2012 di Jurusan Mate- matika FMIPA UNSRI dapat

Tujuan penelitian ini adalah untuk menjelaskan pengaruh pemberian ekstrak hipofisis ikan mas terha- dap pematangan gonad ikan sidat tropis betina ( Anguilla bicolor bicolor)..

Menjawab pertanyaan tentang materi : Bahaya Merokok, Miras, Narkotika, Psikotropika yang terdapat pada buku pegangan peserta didik atau lembar kerja yang

Pujisyukur peneliti panjatkan kepada Allah SWT, karena limpahan rahmat dan hidayah-Nya skripsi dengan judul “Penerapan Model Pembelajaran Kolaboratif Teknik Buzz Group

[r]

PENDIDIKAN TERAKHIR / TAHUN4. NIP /

Yang menjadi permasalahan dalam penelitian ini adalah “Apa tema-tema yang sering dimuat dalam rubrik Herview pada halaman For Her di Jawa Pos edisi Desember 2010