Transcript for:
Basic Configuration of Network Devices

welcome back to the introduction to networks by cisco course this is the module 2 and if you would like to look at the module 1 video i will leave the link in the description and it is already posted on my youtube channel in this module we will look at basic switch and end device configuration any videos and associated labs in this module are removed from this particular video however i will add those links below so that you can go ahead and watch them to learn how these configurations work let's go ahead and look at our module objectives in this module we will learn how we can implement initial settings such as passwords ip addressing and default gateway parameters on a network device such as a switch we will learn cisco ios access ios navigation command structure basic device configuration save configurations port and addresses and how you can configure ip addressing and how we can verify connectivity let's look at cisco ios access the cisco ios access is a type of um operating system the cisco ios is basically kind of an operating system that is operating on cisco devices before we understand how operating systems work on cisco devices in this case ios let's look at the components of the operating systems we have the shell which is the user interface that allow users to request specific tasks from the computer these requests can be made through either cli or gui interfaces gui is the graphical user interface that you interact such as even on your windows machines cli is like the command prompt on your windows machine but in the in linux for example it would be the terminal versus having that you know graphical user interaction modules i sometimes describe the shell like a animal shell shell is the mods outside part of the operating system configurations and it protects the kernel and the hardware just like a shell that and the animals use to protect themselves the next one is the kernel the kernel facilitates the communication between hardware and software of the computer and it managed how the hardware resources are used to meet software requirements so you can look at kernel as a intermediary uh thing between the shell and the hardware and finally the hardware is the part of the computer that includes electronics and physical components this could be a computer and in this particular course they are mostly routers and switches so let's look at what is a gui a gui allow the user to interact with the system using environment of graphical icons menus and windows a gui is more user-friendly and requires a less knowledge of the underlying command structure that controls the system and examples of gui could be windows mac os linux kde the apple ios android etc however the gui can fail crash or simply not operate as specified for these reasons having a gui on network devices are not very ideal and instead we use the cli and remember the gui what it all what it's all doing is basically giving the user an easy interface to interact with the computer instead of doing all the commands through cli so whenever you click on an icon on an item on a gui it's basically executing the cli commands behind the screen let's look at the purpose of an os pc operating systems enable a user to do the following use a mouse to make selections and run programs enter text and text based commands the cli based network operating systems enable a network technician to do the things that they need to do just like a user who is using a pc but in this case a network engineer or technicians using the the cisco devices get the opportunity to interact with the device using the cli instead of the gui the cli that we use on cisco devices use a keyboard to run the cli based network programs use a keyboard to enter text and text based commands and view output on a monitor and a typical cli looks just like this this shown on the left right hand side and the gui you you guys have pro most of you are familiar with what the gui look like on the left hand side so on cisco ios how do you access the cli whether it's a switch router or a access point device and with some configurations in it there are a couple of ways to access the cisco ios console ssh shell or the telnet the console provides out-of-band access to cisco device a typical physical management port used to access the device in order to provide maintenance such as performing the initial configurations just to give you give you a heads up the out of band access in it industry means basically you can access the device even before doing the initial configurations such as the ip addresses and port uh port forwarding and other port configurations which you need to have in order to do ssh and telnet so the console is the one that is initially used by all network engineers and technicians to set up a cisco device the console cable uh look like this on the right hand side it will have the console port connections on here and a connection using rj45 type uh connector on the other end which you can connect your laptop or a desktop to access your cisco device so the cisco device goes in here and your computer goes on this side the next one is the secure ssh or secure cell ssh is a in-band connection and it's established a secure remote cli connection to a device through a virtual interface over the network this is the recommended method by cisco as well as other it professionals because it provide remote connection to your cisco devices with a secure line the ssh access can be done through a program such as party and it looks like this on the right hand side and once you enter your information here and you press connection like when you connect it connect to it it'll give you this the ssh window where you can interact with your cisco device telnet is a little bit of older program a connection type it is also an in-band connection it establishes however an insecure remote cli connection to a device even though both ssh and telnet allow over the network connections remote connections to the device the user authentication passwords and commands sent over then telnet is not encrypted the way that it is encrypted in ssh they are all sending plain text and typically on most cisco devices the telnet is basically disabled you can enable telnet for testing purposes or you enable it for a short term basis because in general in the industry we always use ssh over telnet the terminal emulation programs programs that are used to connect to a network device by either a console port or by ssh or telnet connection there are several terminal emulation programs to choose as i mentioned before the party and the other one is teratem and securi crt and bunch of other programs most of these programs works on windows machines but there are other programs also works on linux as well as i o mac os party for example do work on there's a version for linux as well so these are like the um the terminal programs that can be used to connect to your cisco device let's look at the ways that you can navigate the cisco ios the primary command modes include the user executive mode and privilege executive mode the use of executive mode allow access to only a limited number of basic monitoring commands and it is identified by the cli prompt that has this you know this symbol this particular symbol so for example it will have that symbol right here in the router or the switch so this is the device name and you have that symbol and you start typing right on here privilege executive mode allow access to all commands and features it is identified by the number symbol or this hashtag symbol and you have that right here and then you you start typing over here if you are configuring your device you will be in the privilege executive mode and you can secure privilege executive mode with a password and a username sorry yeah and with the password and i will explain that later the configuration mode and sub configuration modes allow you to do different uh setups uh different uh entries on your cisco ios device the global configuration mode which has a uh this number sign used to access configuration options on the device the line configuration mode is used to configure things like ssh telnet or aux access such as it will allow you to configure that particular section of the the configuration you will see on your cisco ios console that you know you'll have the name of the device and you'll have config dash line and then you have the this pound or hashtag key and that's where you do the line configuration the interface configuration mode will have that if config dash if as opposed to config dash line and it is used to configure a switch or a port interface for example if you want to open a port you will say no shutdown for example uh you'll go uh you know you'll enter i p addresses uh for that port for example and how you enter this uh configure is by going int then you'll enter the the switchboard that you need to access again i will do separate videos on demonstrations on how you can do all of these different modes and how you can navigate through them and i will leave a link below in the description in this video so you can go ahead and watch that but just for now just remember there are three different types of modes global configuration line configuration and interface configuration next we will look at how we can navigate between ios modes to go into the privileged executive mode what you need to do you will first log into your cisco device and you'll end up with switch with this symbol and you enter en or enable en is the short form i usually use en but you can use enabled as a complete form and you enter enable and then press enter and it will get you from executive mode to privilege executive mode to enter global configuration mode uh what you need to do is to move in and out of to out of that mode is to use the configure terminal command to return to the privileged executive mode you will use the exceed command so basically you go enable it will get into the switch sorry it will get into the um privilege executive mode and if you go exit out of it you can exit back into here as well but if you want going to configuration mode configure terminal mode you can go config t or configure terminal and it'll get you into this mod this one so in this particular slide it doesn't actually show you that so i'm going to repeat that again to get into privilege executive mode you're going to go enable if you want to exit out of it you can enter exit here and you'll get back to the the the switch main screen if you go want to go into the global configuration mode after you enter enable you enter configure terminal or config t and press enter and it will get you to the global configuration mode to exit out of global configuration mode you just enter exit and and then that will get you back into the privileged executive mode to get into line configuration mode uh what you need to do is to enter line console and then enter the client console number and then press enter and it will get you to the line configuration mode again in order to exit out of that you had to you can enter exit and press enter and it will get back into line console and i know this can be confusing when you are a new student and you're looking at this slide and you're scratching your head like oh that's really confusing uh but i what i will do is i will post a video with all these uh navigations so that you can get a better idea and as you learn more cisco ios navigation and configurations this becomes a second nature and you'll be really fast at going back and forth between these modes and you don't have to worry about it but for this particular module and if you are taking this course with cisco for quizzes remember these three different configurations and how to go in and out of it next we'll look at the sub configuration modes the sub configuration modes basically uh you know allow you to you know go in between different modes by entering into the cli to move out of any sub configuration mode to ge and get back to the configuration mod as always it is always the key term is the exit exit exit and press enter it will get back you to where you are to return to the privilege executive mode directly from a sub configuration mode you can use the n command or the ctrl c on your keyboard to move directly from one sub configuration mode to another just type in the desired subject configuration mode into the command in the example for example here they have the the interface it going from line console to the interface so the the in this cisco example they first enter the line console and in the lines console after they do whatever they want to do or you know they decided they don't want to change anything online console you then you can you can directly enter interface uh ethernet and then go into the uh you know next sub configuration without uh exiting back on to the uh the other com other mode if you have the cisco ios courses registered you will be able to watch these original ios cisco navigation videos directly from cisco but because some of you don't have that my privilege privilege of having that courses registered i will post some videos on my youtube channel later let's look at the command structure of cisco ios the basic ios command structure include the prompt command space keyword or keyword or argument what really important here is the keyword and the argument the keyword is a term that specify parameter defined in the operating systems for example in this section example they use the ip protocols the argument is not something that is predefined it is a value or variable defined by the user but it doesn't mean you can enter whatever you want uh you know there are some restrictions on what kind of variables that can be defined in the argument for example if i went show ip and then enter my name here sanuja for example it's going to give you an error obviously but it is not predefined in a way that the cisco device doesn't know 192.168.10 until you enter it but the device do know what is a ping for example device do know what is show for example so the keyword is a specific parameter defined in the ios system of ios operating system the argument is not predefined it's a it is a value or a variable defined by the user but however there are some limitations on what you can enter there for example like i said it has to be ping host name or a ping ip address you can just enter random stuff here so that's not very clearly defined on this slide but i'm just telling you that so that you know that the ios command syntax can you know there are certain checks in them a command might require one or more arguments to determine the keywords and arguments required for a command uh you know you need to refer to the command syntax you can just like mention in the previous slide you can't just enter whatever you want there are some limitations there are some structures that you need to follow the ball face text indicates the command and keywords that are entered as shown and the italic text indicates an argument for which the user provides the value so let's look at this table that's what they are talking about up here so um for the next uh few slides remember whenever you see the ball face uh like a bolded text it is an indication of commands and keywords that you enter literally as shown and the italics are the text that includes arguments which you have to supply different values and this x square bracket indicates the optional elements and the arguments and the braces indicates the required elements and this indicates the basically the different choices available uh within that optional elements and spaces are used to clearly uh you know separate those parts into you know separate sections so that's what we're going to do for the next few slides so let's go ahead so the command syntax provides the pattern or a format that must be used when entering a command so basically standardize how we interact with cisco devices which make it easy for network engineers students and everybody to interact with these devices so that everybody on the same page and in this example we're going to look at the ping command so the user enter the ping command and then the argument associated with it with it which is the ip address or the host name in this case the ip address is an ip address within your network that you're trying to ping from this cisco device in this example for example it could be like 10.10.10.5 or it could be like 192.168. for example and another example of this would be like traceroute command traceroute command is the command it built into the ios but the argument associated with it in this case the ip address is the destination of that trace route device and that is defined by the user in this case it's trace route 192 168 254 254 we'll do a trace route using this cisco device to that one nine two one six eight two five two five four two five four device if a command is complex with multiple arguments you may see it represented just like this for example switch port port security aging will have multiple variables that you can enter static the time the type etc etc in this course you will not be learning about switchbot security as of yet so just remember some complex commands are available on cisco devices to do certain things if you don't remember some of the commands there are some help features available on the ios you don't have to memorize everything but you need to know what all of those commands do but even if you forget what though they do there's a there are some helpful features built into the ios so there are two forms of help variables the context sensitive help and command sign text check the context sensitive help enable you to quickly find answers to these questions for example which commands are available in each command mode which commands start with a specific characters or group of characters which commands in sorry which which arguments and keywords are available to particular commands for example ping command have multiple arguments uh and you can enter ping and then the question mark and it will give you some information about uh you know what you can do for like i mentioned it's not just you can not only ping an ip address but you can do also a hostname and if you if you was if you forgot that like if you weren't sure about that you can do ping question mark and it will give you that information saying hey you can use the ip address or the host name the command sign text check verifies that a valid command was entered by the user so what it does is the cisco ios has a built-in interpreter and that interpreter try to understand the command that you entered and it provides sometimes very valuable feedback describing that there is something wrong with it like for example in this particular command this user have enter interface fast ethernet 0 1 and it has this arrow right here showing that something went wrong that there's something in incorrect right here please check so that can be helpful when you enter a command and there was a mistake in it next we will look at hotkeys and shortcuts the ios cli provides hotkeys and shortcuts that make configuring monitoring and troubleshooting easier and i use these shortcuts all the time it make it faster easier and it saves some time the commands and keywords can be shortened to a minimum number of characters that identify a unique section for example configure command can be shown to conf because configure is the only command that begins with conf i always use the conf t for example to enter configuration terminal and that's what is shown here right here is conf t and it goes to configuration terminal the hotkeys and shortcuts can be completed using the tab so you can enter conf and hit tab and it will auto complete the rest of the command even though you do not need to do that in order to enter that command you can just go conf t and press enter it will go forward but you can do conf tab and t tab and it'll give you like configure terminal and then you can press enter the backspace erases characters to the left of the cursor just like any other operating system just like windows or a mac the left arrow or ctrl b moves the cursor one character to the left so if you are in the middle of entering a command for example if you are entering um you know conf t and you enter m by mistake here for something you can go back here and then change that letter for in this case and the right arrow do the opposite of that it move the character to the right and up arrow or ctrl p recalls the command in the history buffer beginning with the most recent command this is a really helpful time saving thing that i do when i configure cisco devices so basically if you're entering the same information for example ip address and you're entering the ip address on multiple interfaces you can simply go up and down arrow and you can go to the previous command and just delete the ip address only and then enter it the new one and then press enter so that will give you an easy way to go move up and down without re-entering the similar commands over and over again and again i will show you a video demonstration on how you can go about doing these things but not in this particular video but it will be a separate one and when a command output produces more text than uh that can be displayed on a terminal because terminal window may be too small the ios will display the term more it's a prompt to the user and the table below described the keystroke that can be used uh when that prompt is displayed so if you see you know if you enter something like for example uh do show run which will have lots of information about your entire uh running configuration it will have this thing on the bill on the bottom same more if you hit enter key it will display the next line so it'll go just go to the move to the next line but if you hit the space bar it'll just display the next entire screen so it will move from one screen to the next screen if you enter any other key it ends the display string and return to the privilege executive mode the table below also lists the command that can be used to exit out of that kind of operation so ctrl c when the any configuration mode it end you know it ends the configuration mode and returns a privilege executive mode so if you are in a configuration mode you are configuring it a port for example and you want to exit it you can do ctrl c and you'll exit out of it ctrl c is whenever you are in any configuration mode it ends the configuration mode and returns to privilege executive mode as well and control shift six it's all purpose break sequence that used to abort like a dns lookup trace route and ping so let's say you decided to ping a device and it's taking way too long to ping and you decided you know what that device is not working i need to move on because the cisco ios is trying to ping and it's still sending those icmp pin packets the only way you can exit out of that is to enter ctrl shift and number six and we'll get you out of that and i will go through all these shortcuts and everything in my demo a video that i'll be posting later so don't worry about that too much but remember that there are these multiple hotkeys and shortcuts available and i will post a video later to show those you know shortcuts so that you have a better idea about how to use them next we will look at the basic device configuration the device names are names that can be used to identify your ios device on a network the first configuration cover on any device should be to give it a unique host name not only to give a unique name so you can identify them you can actually use them to ping it as well for like testing connectivity by default all devices are assigned a factory default name so on all ios switches it will say just switch so the guideline we give for typically naming a device start with a letter contain no spaces end with a letter or a digit and only use letters digits and dashes and be less than 64 characters in length for example this guy started with switch and he went into the configure terminal and he went hostname and enter a host name for that device it's called sw dash flow dash one it makes sense it's basically saying this is a switch on flow one and now this switch name the hostname has been changed from switch to ho sfws dash flow dash one now to return the switch to the default prompt you know you can use no hostname and that will actually delete whatever the host name you entered whenever you are setting up a cisco device or a simulating a cisco device on a cisco packet tracer or emulating it on the evg or some other software i would highly recommend that you change the the hostname first before moving on to doing anything else it will make it easier for you to identify the device when you have multiple devices and multiple terminals open in terms of password guidelines um the use of weak or easily guess passwords a security concern in a production environment but even in a lab environment get used to using uh complex passwords and secure so that you are always you know used to having that complex cities in passwords all networking ui devices should limit administrative access by securing privilege executive user executive and remote telnet access with passwords in addition all passwords should be encrypted and legal notifications should be provided basically a message when somebody tried to enter your device password guidelines are typical guidelines that we give for many you know components on any network use password that are more than eight characters in length use combination of upper and lower cases letters numbers special characters and non-numeric sequences avoid using the same password for all devices like don't use like same password for example canada canada canada on every single thing instead you know use different passwords for different devices do not use common words uh they are easily can be guess just like i mentioned if you're in canada and you put canada as a password that is a pretty bad password but in lab environment when you are working with cisco uh modules and if you register for a course most of the passwords are very simple typically it is cisco or class and these passwords are considered extremely weak and easily guessable but it should not be used in the production environment so it is okay to use in the lab environment but do not use in the production environment as you go through the the learning process i actually recommend using stronger passwords so you get used to using it even in the lab environment to configure password you have to enter the you know the password for a couple of items so first look at securing the user executive mode access first enter the console line console configuration mod using the line console 0 the line console 0 is the configuration mode for that user executive mode then you can specify the password by entering password and then whatever the password you need to enter for example on the right hand side you see this guy went into configuration terminal line console 0 and then password and then he enter the password he would like to have so in this case the password gonna be cisco then you enter login and end make sure you enter this command login so that will actually enter that password into the system and now you will have that you know cisco as the password for configuration terminal to secure the privilege executive mode uh first you need to enter the configuration mode the global configuration mode next use the enable secret and then enter the password so you what you do is config t or configuration terminal and you go enable secret and then your password gonna be in this case class and in this case instead of going to login you're gonna press enter exit and enter and that will register class as the privileged executive mode password again i will demonstrate this on a different video so you can have a better idea about how to navigate through these steps to secure vty lines what you need to do is you need to go and access the configure terminal and then enter the vty line configuration mode to do that typically we use the line vty 0 to 15 command in the global configuration mode then we can specify the vty password using just like before just password and then you can enter the password uh you would like to use in this case cisco and remember in this case you had to enter login so that it will register that password and then you can end and that will give you the line vty access password please note the vty lines enable remote access using telnet or ssh to the device many cisco switches support up to 16 vty lines that are number zero to 15. however if you have more than uh 15 uh what you do more than 16 i mean what you do actually you go line vty 0 20 or 0 24 etc etc that will encompasses all the line vtys that you need to encrypt that password so not enter that password for next we will look at the encrypt passwords so for encryption of password we need to understand that the startup config and running config files displayed passwords in plain text but by using cisco built-in encryption you can hide that plain text to encrypt all plain text passwords use the service password encryption global configuration command so how it works is basically you log into your uh cisco ios device and then go move into the configure terminal and just enter service password dash encryption and press enter and that will encrypt all the password within this device then if you use a show running config command you will see that the passwords on device on on this device are now encrypted please keep in mind the cisco ios uses the same encryption algorithm to encrypt this password and these are actually not really secured if somebody were to copy these numbers and reverse engineered back the password so this is just to prevent someone from just accessing uh your ios device and just reading out the passwords based on the uh displays the information but they are not like they're not highly secured like you know if somebody were to give these numbers and characters and they use the reverse engineered cisco ios encryption algorithm they can reverse engineer the password so these are just just to prevent people from quickly reading the password not necessarily like preventing a like you know hacker or something you know next we're going to look at the banner message so what's a banner message a banner message is a important message that can be displayed on the terminal to your user so it basically wants unauthorized personnel from attempting to access the device and when somebody try to access the configure terminal they will get that message for example authorized access only for example in this here the shown on the right hand side so to create a banner message what you need to do is to use the banner message motd and then enter the message between the pound in the goblet global configuration command the pound symbol in the command syntax is called a delimitating character and it is entered before and after the message and in this example this user entered the configuration mode and went banner motd and put that pound symbol and put authorized access only and put the pound symbol in the back end so that the system knows the message has ended and press enter which will result in this message displaying when somebody try to enter the configuration mode and it will give you authorized access only you can enter whatever the numbers or letters you like and the banner message can be multiple lines and can contain lots of information or it could be a simple line like just authorized access only next we're going to look at how you can save all these configurations you just did on your packet tracer or on your cisco ios device the configuration files can be divided into a couple of different categories and there are two system file categories or files that stored the device configuration the startup config is the save configuration file that is stored in nvram and it can contains all the commands that will be used by the you device upon startup or reboot flash does not lose its contents when the device is powered off in other words that is where the kind of a permanent data is stored in the startup config the running config is stored in the random access memory or ram it reflects the current configuration or whatever the configuration you just entered into the cisco ios device modifying a running config affects the operation of the cisco device immediately however the ram is a volatile memory if the device loses power it loses all the configurations that you just entered to the ram so it is important when you are configuring something that you always save it on the startup config when you have something working and work working correctly on your running config when i'm setting up any c score devices i enter my configurations especially complex configurations and then i'll see if it works before we i go ahead and enter into the startup config because with the running config you can always delete it erase it by just disconnecting the power to the ios device to save changes made to a running configuration to the startup configuration file so that it will be available and saved on the device uh what you need to do is just type the command copy running config startup config privilege executive mode command like for example in here show startup config will show all the startup configurations and um you know this is this will make sure that your running configuration commands are saved onto the startup config to alter the running configurations you can do couple of things on your ios if changes are made to the running config do not have the desired effect in other words you enter something that is incorrect or wrong ip address or something went wrong as long as that is not has not yet been saved you can restore the device to its previous configuration by doing a couple of things one of the things you can do is remove the change commands individually or you can reload the device using the reload command in the privileged executive mode but please keep in mind this reload command will cause the device to briefly go offline and lead into a network downtime it's just like pulling a power out of the ios so that you have get everything reset if the undesired changes were saved to the startup config it may be necessary to clear all the configurations using the erase startup config command in the privileged executive mode and to do that basically use that exactly that the erase startup config and after erasing the startup config the reload the device to clear the running config file from the ram and that will get you back into where you were before next we will look at capture configuration to a text file like how you can capture the configuration to a text file the configuration files can be saved and archived to a text document because cisco ios uses io the cli it basically interpret your text command to configure their uh devices you can literally copy and paste those comma configurations from one cisco ios device to another as long as those are compatible devices to copy to a text document you can open the terminal emulator software such as party or terra term that is connected to a switch enable the logging into the terminal software and assign a name and a file location to the save the log file the configure displays all the sessions output will be captured to the file specified so in other words basically it will go and save in that log file right here so on the right hand side will show you how you do it in putty on packet tracer you can simply go do show run and highlight everything and copy and paste it to a text file when you are doing your uh emulated labs but in when you are using simulator lab such as you know evg or actual device you have to use the party to save those text files and the next step we're gonna do is execute show running config or show startup config command at the privilege executive mode and the text in displayed terminal window will be placed into that chosen file so only thing you do is that you know set up the file name and we'll find the choose the location and on the terminal use run the show startup config and it'll get saved in there to disable logging in the terminal software the basically in on the right hand side you will show it you change this uh option this session logging to none so if you go back we have the session logging as all session outputs and we're going to say none to stop it from saving those text files the text file created can be used as a record of how the device is currently implemented the file could require uh editing before being used or restore a save device uh you know configuration so in other words like you can use this file to save your implementations and if it actually works you can actually copy those commands to your next device as well let's look at ports and addresses ip addresses so what are they so ip addresses is a type of type of addresses that are used to communicate between network devices so the use of ip addresses is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet or internal networks the structure of an ip address is called the dotted decimal notation and it is represented by four decimal numbers between 0 to 255 this is specific to ipv4 and ipv4 subnet mask is 32 bit value that differentiates the network portion of the address from the host portion coupled with the ipv4 address the subnet must determine to which subnet the device is a member i will not go into deep uh into depth about you know subnet mask and how subnetworks and how ip addresses are created in ipv4 we will look at subnetting and how these are done in on a separate video it will require a couple of minutes of explaining uh an in-depth analysis otherwise if you are new to uh network engineering and network system if you're a student it will be a little bit harder to comprehend what is a subnet mask so i will do a separate complete video on that and i'll post a link below but for now just remember ipv4 has a subnet mask which is a 32 bit value which is right here this is a two five five two five five two five five zero for this address one nine two one six eight one dot ten and then finally we have the default gateway address which is the ip address of the router that the host will use to access remote networks including the internet so basically the default gateway is the guy who allow routing of messages the packets between your cisco device or the end device and the outside world or other devices ipv6 addresses are 128 bits in length and written as a string of hexadecimal values every 4 bits is represented by a single hexadecimal digit for a total of 32 hexadecimal values groups of four hexadecimal digits are separated by a colon so this is an example of a ipv6 address again i will do a separate video on how ipv6 addresses are done and for now just remember that has 128 bits in ipv6 and in ipv4 we have 32 bits this will show up on quizzes uh with the cisco and netacad academy or cisco exams that you will be taking with this particular course so remember ipv4 is the 32-bit version an ipv6 is 128-bit version and it has more addresses than the ipv4 the ipv4 um sorry the ipv6 addresses are not case sensitive and can be written in either lowercase or uppercase when there are letters involved remember ipv4 can don't have letters ipv6 do so it has to do with the fact that it is 128 bits you just need to remember the hexadecimal and how it works and i will explain that later on a different video note ip in this course refers to both ipv4 and ipv6 protocols ipv6 is the most recent version of ip and is replacing the most common ipv4 as we move forward with multiple devices being used globally and the in this slide doesn't explain the reason why we have ipv6 is that we have pretty much ran out of ipv4 addresses right now for global use interfaces and ports network communications depend on end user device interfaces networking device interfaces and cables that connect them types of network media include twisted pair copper cables fiber optic cables coaxial cable or wireless as we mentioned in module one all of these types of cables can be used uh when you're communicating from your home uh to the internet different types of network media have different features and benefits some of these differences between various types of media include the distance the media can successfully carry a signal such as a fiber optic cable can carry a long distance a signal without degenerating it compared to a metal wire environment in which the cable is to be installed the copper cables are more more rigid but like more versatile compared to fiber optics sometimes in a certain environment the amount of data and the speed at which it must be transmitted fiber optics has a much higher bandwidth and data transmission capabilities compared to copper cable and metal wires and the cost of the media and the installation the installation process of copper cables are much easier and the cost is far less for both materials as well as the labor compared to fiber optics the material and labor cost are much higher let's look at how we configure ip addressing manual ip address configuration for end devices is not something that typically use on most end devices but they are used in devices such as servers and those critical infrastructure that requires a static ip address typically the servers containing services such as web services and email services for example the end devices on the network need an ip address in order to communicate with each other uh you know on the network so ip address is like your home address you know by knowing where you you by knowing your home address i would know where you live on a google map for example ip address does exactly the same thing but for network devices ip4 address information can be entered into end devices manually or automatically using dynamic host configuration protocol or dhcp to enter uh manually uh ipv4 on a windows machine pc most people know uh you know are familiar with the windows operating systems you basically go to the control panel network sharing center change adapter settings and choose the adapter settings just like here shown on the right hand side then you click on the properties open internet protocols and then you know in there you can select what you need to do for ipv4 you can do the same thing for ipv6 as well and that's how you do it on a windows machine typically these mesh windows machines are set on the obtain and ip address automatically which basically uh doing is that them using dora which i explained later on in this course to go and request an ip address from a dhcp pool and just you know hooking up to into the network um that way so that the user the end user doesn't have to do any of these configurations so that's what we're going to talk about next so the automatic ip address configuration for end devices or are now called dsm done to something called the dscp dhcp stand for dynamic host configuration protocol which enable automatic ipv for address configuration for every end device that is dhcp enabled so by switching this from using the static to automatic and also the dns you can either put a static automatic it'll obtain not only dscpip address it can also obtain the dns from the same server the end devices are typically by default set to dscp for ipv4 configuration and again the same place that we went to change the ip configuration and windows machine is the same place you go to change switch this from the manual to dhcp and please note the ipv6 however uses something called the dhcp v6 or slack which is a statelet stateless address auto configuration for dynamic address allocation just remember for your exams dscp use a dscp server to hand out ip addresses automatically to ipv4 devices the dhcp v6 and slack or stateless address auto configuration is used by ipv6 devices to obtain this similar automatic ip addresses for their end devices switch uh virtual interface configuration is the one we're going to look at next so to access the switch uh remotely an ip address and subnet mask must be configured on the s vi or the switch virtual interface to configure an svi on a switch what you do you enter the interface vlan 1 command in google configuration mode next assign ipv4 address using the ip address and then uh the the user input associated with it like for example in here in on bottom you so you see that it there in configuration terminal mode and interface vlan 1 and then you go ip address then you enter the ip address and the subnet mask in this ipd address it's 192.1681.20 and the subnet mask of 255252550 which is associated with this ip address and then you go no shutdown what the no shutdown command gonna do it gonna enable that interface vlan 1 which by default will be disabled finally we have come to the end of this module and i will quickly go over what we learned in this module for those of you who are registered with cisco netacad or with 10 organizations to do these particular courses to obtain your badges and certifications uh these are the key things that you need to remember for your quizzes and exams in this module we learn all end devices and network devices require an operating system known as in this particular i uh a particular scenario ios because we are using cisco devices the cisco ios software separates management access into couple of categories two categories user executive mode and privilege executive one you should know how to enter them and how to exceed them and what commands can be used on some of them like you know basic commands that we just went over global configuration mode is accessed before other specific configuration modes from global configuration mode the user can enter different sub configuration modes such as line vty for example each ios command has a specific format or syntax and can only be executed in the appropriate mode so you can just go and enter random things at a random places it will give you an error message and some of these messages are very helpful so you need to make sure that the specific format and syntax is followed basic device configurations such as hostname password encrypt passwords and banner we just went over how to do that there are two system files that store the device configuration startup config and running config and you should know how to go about saving your files into startup config from the running config ip addresses enable devices to locate one another and establish end-to-end communication on the internet or within a network each end device on a network must be configured with an ip address either ipv4 or ipv6 otherwise it cannot communicate within your network that's everything for today for this module as i mentioned before i will post bunch of videos uh showing in some configurations which i will do on cisco packet tracer that will cover the items that we covered in this particular module that will give you a better idea of how to use these commands and configure ios devices please subscribe and thumbs up this video and i will post future videos uh for next few modules within next few days two weeks uh so that you will have the complete set of videos for this particular course set until next time have a nice day