2.
Communication Entity
Source
Medium
Destination
Protocols
message encoding
message formatting and encapsulation
message size
message timing
message delivery
Model
OSI
TCP/IP
Application
Transport
Internet
Network Access
Communication Process
Segmentation
Multiplexing
Encapsulation
De-encapsulation
Protocol data unit (PDU)
Data - Application layer
Segment - Transport layer
Packet - Internet layer
Frame - Network access layer
Bits - Physical layer
Address
Data Link
Ethernet (MAC)
Network
IP (IPv4, IPv6)
Internetwork Operating System
Store in Flash Memory
Load into Memory
Command-line Interface (CLI)
Access Method
Out of Band
Console
AUX
In Band
Telnet
SSH
Terminal Emulation Program
Putty
Teraterm
Access Mode
User (EXEC) mode
Privileged (EXEC) mode
Global configuration mode
Specific mode (interface/line configuration)
Hostnames allow devices to be identified by network administrators over a network or the Internet. Passwords are the primary defense against unauthorized access to network devices.
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged EXEC mode
Console password - Limits device access using the console connection
VTY password - Limits device access over Telnet







Last updated
Was this helpful?