Save configurations alter the running conf cisco

Info icon This preview shows pages 67–74. Sign up to view the full content.

Save Configurations Alter the Running Configuration
Image of page 67

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

68 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Connect to the switch using PuTTY or Tera Term. Enable logging and assign a name and file location to save the log file. Generate text to be captured as text displayed in the terminal window will also be placed into the chosen file. Disable logging in the terminal software by choosing None in the Session logging option. Configuration files can also be saved and archived to a text document for editing or reuse later. For example, assume a switch has been configured and the running config has been saved. Save Configurations Capture Configuration to a Text File Execute the show running-config or show startup-config command at the privileged EXEC prompt.
Image of page 68
69 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The text file created can be used as a record of how the device is currently implemented and be used to restore a configuration. The file would require editing before being used to restore a saved configuration to a device. To restore a configuration file to a device: Enter global configuration mode on the device. Copy and paste the text file into the terminal window connected to the switch. The text in the file will be applied as commands in the CLI and become the running configuration on the device. Save Configurations Capture Configuration to a Text File (Cont.)
Image of page 69

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

70 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2.3 Address Schemes
Image of page 70
71 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ports and Addresses IP Addressing Overview Each end device on a network (e.g., PCs, laptops, servers, printers, VoIP phones, security cameras, …) require an IP configuration consisting of: IP address Subnet mask Default gateway (optional for some devices) IPv4 addresses are displayed in dotted decimal format consisting of: 4 decimal numbers 0 and 255 Separated by decimal points (dots) E.g., 192.168.1.10, 255.255.255.0, 192.168.1.1
Image of page 71

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

72 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ports and Addresses Interfaces and Ports Cisco IOS Layer 2 switches have physical ports for devices to connect. However, these ports do not support Layer 3 IP addresses. To remotely connect to and manage a Layer 2 switch, it must be configured with one or more switch virtual interfaces (SVIs). Each switch has a default VLAN 1 SVI. Note : A Layer 2 switch does not need an IP address to operate. The SVI IP address is only used to remotely manage a switch.
Image of page 72
73 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Open the Control Panel > Network Sharing Center > Change adapter settings and click on the adapter. Configure the IPv4 address and subnet mask information, and default gateway and then click OK . To manually configure an IP address on a Windows host: Configure IP Addressing Manual IP Address Configuration for End Devices Right-click on the adapter and select Properties to display the Local Area Connection Properties window.
Image of page 73

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 74
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '15
  • Computer network, IP address, Cisco Confidential,  Network infrastructure