Skip to content

Commit

Permalink
sections
Browse files Browse the repository at this point in the history
fixes #11 coincidentally
  • Loading branch information
Haroenv committed Apr 5, 2016
1 parent 0456bea commit 87ece1c
Show file tree
Hide file tree
Showing 7 changed files with 109 additions and 27 deletions.
43 changes: 35 additions & 8 deletions _chapters/basic.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,14 @@
title: Basic configuration
order: 1
---
## Reset devices

### Router
<section>

### Reset devices

<section>

#### Router

Enter these commands in [privileged EXEC mode](#command-modes) to reset the router.This will delete the startup configuration and restart the router respectively.

Expand All @@ -13,7 +18,10 @@ erase startup-config
reload
```

### Switch
</section>
<section>

#### Switch
The process for a switch is almost identical. Enter these commands in [privileged EXEC mode](#command-modes) to reset the switch.

```
Expand All @@ -24,22 +32,41 @@ reload

The `delete vlan.dat` command is necessary to delete the VLAN configuration.

## Save configuration
</section>

</section>
<section>

### Save configuration

You can save the current configuration by copying it to the startup configuration as follows: `copy running-config startup-config` in [privileged EXEC mode](#privileged-exec-mode).

## Name device
</section>
<section>

### Name device

You can name a cisco device by entering the `hostname [name]` command in [global configuration mode](#global-configuration-mode).

## Message of the day
</section>
<section>

### Message of the day

You can set a message of the day using the `banner motd "[message]"` (or with the `"` as any identical character) command in [global configuration mode](#global-configuration-mode).

## Disable DNS-lookup
</section>
<section>

### Disable DNS-lookup

You can disable DNS-lookup using the `no ip domain-lookup` command in [global configuration mode](#global-configuration-mode).

## IP Address
</section>
<section>

### IP Address

You can set the IP address of any [interface](#interfaceline-configuration-mode), by entering `ip address [ip-address] [subnet mask]`. On a switch this is usually done on a certain VLAN, on a router this can be done in the `loopback [number]` interface. The default gateway is given by `ip default-gateway [ip-address]`.

</section>
37 changes: 30 additions & 7 deletions _chapters/management.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,9 @@ title: Management interfaces
order: 3
---

## Console
<section>

### Console

To enable a password for a login through the console port, enter in [global configuration mode](#global-configuration-mode):

Expand All @@ -14,7 +16,10 @@ line con 0
logging synchronous
```

## Telnet
</section>
<section>

### Telnet

To configure telnet (vty or virtual terminal) with password protection, enter in [global configuration mode](#global-configuration-mode):

Expand All @@ -24,7 +29,10 @@ line vty 0 15
login
```

## SSH
</section>
<section>

### SSH

To configure SSH (Secure SHell) with password protection, enter in [global configuration mode](#global-configuration-mode):

Expand All @@ -47,11 +55,16 @@ ip ssh time-out [seconds]
ip ssh authentication-retries [retries-number]
```

## Security
</section>
<section>

### Security

Password protection on management interfaces is always recommended but extra security measures can be taken.

### Password restrictions
<section>

#### Password restrictions
You can force extra restrictions on passwords by entering these commands in [global configuration mode](#global-configuration-mode):

```
Expand All @@ -61,9 +74,19 @@ security password min-length [minimum-chars]

The first line will block access for [seconds-blocked] if the user attemps to login [attempts-number] times within [seconds]. The second line restricts password length to [minimum-chars] or longer.

### Password encryption
</section>
<section>

#### Password encryption

To enable password encryption, enter `service password-encryption` in [global configuration mode](#global-configuration-mode). If you do not enable password encryption all password will be stored in clear text in the configuration file.

### Timeout
</section>
<section>

#### Timeout
You can add a timeout for inactive users. To do this, in the [line configuration mode](#interfaceline-configuration-mode) of the line you want to configure, enter: `exec-timeout [minutes]`

</section>
<section>
<section>
22 changes: 18 additions & 4 deletions _chapters/modes.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,28 +5,42 @@ order: 2

Cisco networking devices have several command modes, each of them has a different command set, to go back to a lower (less privileged) command mode use the `exit` command.

## User EXEC Mode

<section>

### User EXEC Mode

After you access the device, you are automatically in user EXEC command mode. The EXEC commands available at the user level are a subset of those available at the privileged level. This is the least privileged command mode. User EXEC mode is denoted by a `>`.

## Privileged EXEC Mode
</section>
<section>

### Privileged EXEC Mode

The privileged command set includes those commands contained in user EXEC mode as well as commands that configure operating parameters. Privileged access should be password-protected to prevent unauthorised use, you can achieve this by entering the `enable secret [password]` command in [global configuration mode](#global-configuration-mode). It is highly recommend to also enable [password encryption](#password-encryption). Privileged EXEC mode is denoted by a `#`.

To access privileged EXEC mode, enter the `enable` command from user EXEC mode.

## Global Configuration Mode
</section>
<section>

### Global Configuration Mode

Configuration mode commands apply to features that affect the device as a whole. Global configuration mode is denoted by `(config)#`.

From privileged EXEC mode you can reach global configuration mode by entering the `configure terminal` command.

To execute a command that's usually only available from privileged EXEC or User EXEC mode, like `show ip interface brief`, you have to preced it by `do`. [^1]

## Interface/Line Configuration Mode
</section>
<section>

### Interface/Line Configuration Mode

Interface/Line configuration mode commands let you configure specific interfaces/lines on the router. Interface configuration mode is denoted by `(config-if)#` and line configuration mode by `(config-line)#`.

From global configuration mode you can reach interface configuration mode by entering the `interface [interface-name]` command. Similarly to reach line configuration mode you can enter the `line [line-name]` command.

You can go back to the privileged EXEC mode from this mode by entering the command `end`.

</section>
11 changes: 9 additions & 2 deletions _chapters/rip.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,9 @@ title: RIP
order: 7
---

## Between networks with no subinterfaces
<section>

### Between networks with no subinterfaces

If you want to make sure networks can communicate with eachother you'll have to configure RIP. [^2]

Expand All @@ -12,11 +14,16 @@ Choicing RIP version | `version 2`
Disable auto-summary | `no auto-summary`
Putting RIP for a | `network xxx.xxx.xxx.x` ( network 172.16.30.0 )

## Between networks with subinterfaces
</section>
<section>

### Between networks with subinterfaces

If you're having a whole subnetworking ( vlan's ) on one end of your router you'll need some more settings

Making your port a passive interface | `passive-interface gigabitEthernet0/*`
Going to surtain subinterface | `Interface g0/*.*` ( for example int gigabitEthernet0/0.10, using vlan 10 )
Making vlan able to send through | `encapsulation dot1Q *` ( for encapsulation dot1Q 10, for vlan 10 )
Connecting network | `ip address xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx` ( for example ip address 172.16.30.254 255.255.255.0 )

</section>
16 changes: 13 additions & 3 deletions _chapters/vlan.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,9 @@ order: 6

A VLAN is a virtual local area network, which is defined by a switch. This can be used to make sure that different devices don't have access to devices with for example a different set of permissions.

## Making a new VLAN
<section>

### Making a new VLAN

in [global configuration mode](#global-configuration-mode), you can make a new VLAN using the command `vlan {number}`. After that you give it the name using `name {the name of the VLAN}`; the state to active and don't shut down.

Expand All @@ -16,7 +18,10 @@ no shutdown

> TO DO: everything to configure a VLAN
## VLAN Trunking
</section>
<section>

### VLAN Trunking

In some cases you might want devices to be on the same VLAN, even though they aren't connected to the same Switch. You can solve this by adding a router to one of the switches and setting up a VLAN trunk like this:
For adding a VLAN trunk you need to go to an interface, for example f0/24.
Expand All @@ -35,7 +40,10 @@ switchport trunk native vlan 99
no shutdown
```

## Port-Security
</section>
<section>

### Port-Security

In some cases you want your device to be secure from overloading. For example you bandwidth, you want to make sure that the connections on your port has some bandwidth. Because if you have 100 devices on one port, the bandwidth has to be shared. With only 1 device on your port you have the whole bandwidth for that device. Another reason would be the Availability of the port, because if 100 devices have to communicate through 1 port, you'll have a huge que of actions your port has to finish.

Expand All @@ -44,3 +52,5 @@ If you want a maximum of dynamic max-addresses you can use `switchport port-secu
`switchport port-security violation protect` | Drops all the packets from the insecure hosts at the port-security process level but does not increment the security-violation count.
`switchport port-security violation restrict` | Drops all the packets from the insecure hosts at the port-security process level and increments the security-violation count.
`switchport port-security violation shutdown` | Shuts down the port if there is a security violation.

</section>
1 change: 1 addition & 0 deletions _config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ title: CCNA Summary
markdown: kramdown
kramdown:
input: GFM
toc_levels: "2,3"
sass:
style: compressed
collections:
Expand Down
6 changes: 3 additions & 3 deletions index.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,13 +25,13 @@ Fork this on [GitHub](https://github.com/haroenv/ccna-summary/blob/gh-pages/inde

{% assign chapters = site.chapters | sort: 'order' %}
{% for chapter in chapters %}
<!-- <section> -->
<section>

# {{chapter.order}}. {{chapter.title}}
## {{chapter.order}}. {{chapter.title}}

{{chapter.content}}

<!-- </section> -->
</section>
{% endfor %}

# Footnotes
Expand Down

0 comments on commit 87ece1c

Please sign in to comment.