Information Technology Reference
In-Depth Information
Privileged Exec Mode
The second level of full access is the privileged exec level—more commonly known as enable
mode. At this level, the user is allowed to show system settings and status, enter into configu-
ration mode, and run debug commands. The command prompt in enable mode is the router's
name followed by a # symbol:
Router#
Configuration Mode
In enable mode, you can enter configuration mode with the configure terminal command. You
use configuration mode for interface, router, and line configuration:
routerlab#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
routerlab(config)#
If an interface is configured, the prompt changes as follows:
router1(config)#interface ethernet 0
router1(config-if)#
If a routing protocol is configured, the prompt changes as follows:
router1(config)#router rip
router1(config-router)#exit
router1(config)#router eigrp 100
router1(config-router)#
If a console or virtual type terminal (vty) line is configured, the prompt changes as follows:
router1(config)#line con 0
router1(config-line)#exit
router1(config)#line vty 2
router1(config-line)#
If a route map is configured, the prompt changes as follows:
router1(config)#route-map ccie
router1(config-route-map)#
Be familiar with how the router prompt changes when in configuration mode. There might be
test questions where the correct answer depends on the router prompt presented.
Initial Configuration Dialog
At bootup, the router prompts the user to enter into the system configuration dialog if the router
has no configuration (because it is new or because the configuration file was erased [by the
write erase command]). In Example 3-8, the router output shows a sample of the configuration
dialog. If you enter the dialog, a series of questions walk you through the configuration of the
router. In Example 3-8, you enter the basic network management configuration. The first level
of configuration is global configuration of the hostname, the exec password, and the enable
password. Then, the network management interface is configured with an IP address and mask.
A configuration file is created that is saved into NVRAM.
Search WWH ::




Custom Search