7.7 Describe network programmability in enterprise network architecture

7.7 Describe network programmability in enterprise network architecture 7.7.a Function of a controller A SDN controller’s function is to concentrate the control plane of the entire network and attached routers into a single device. This means that the whole network can be orchestrated and controlled from a single point. 7.7.b Separation of control plane and …

7.6 Use Cisco IOS tools to troubleshoot and resolve problems

7.6 Use Cisco IOS tools to troubleshoot and resolve problems 7.6.a Ping and traceroute with extended option Extended pings and traceroutes can be performed to verify the internal routing table of the device. For example you can ping from and interarea interface by simply typing “ping” only and specifying a source address Router#ping Protocol [ip]: …

7.5 Perform device maintenance

7.5 Perform device maintenance 7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify) To use MD5 to verify an image: R1#verify /md5 flash0:<imagename> <md5sum> To send an image via SCP (secure copy over SSH): Run this command from your Linux/BSD machine: desktop$ scp <imagename> <username>@<host>:flash0:<imagename> To copy via FTP/TFTP: R1#: copy ftp://username:pass@<host>/path …

7.4 Configure and verify initial device configuration

Hostname: en> R1# conf t R1(config)#hostname ? WORD This system’s network name R1(config)#hostname router1 Enable secret: router1(config)#enable secret router1(config)#enable secret cisco Show config: router1#:show run Login Banner: router1#:conf t router1(config)#banner ! Enter TEXT message. End with the character ‘!’. Unauthorised Access Prohited.!