From the course: Cisco Certified Support Technician (CCST) Networking Cert Prep
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Working in the CLI
From the course: Cisco Certified Support Technician (CCST) Networking Cert Prep
Working in the CLI
(upbeat jingle) - [Instructor] Let's continue with our look at Cisco IOS by seeing how to navigate the CLI, the command-line interface. And in this video, we're going to do a demonstration of how to move between different configuration modes, maybe global configuration mode and interface configuration mode. And there's a great help feature built into Cisco IOS and it's context-sensitive, and I'll demonstrate that for you. And also, if we don't want to have to type out a big long command, there's a Tab autocomplete feature that comes in really, really handy. And as we're looking at the config, we might want to filter that and focus in on a specific portion of the configuration. So we're going to take a look at ways to filter the output as we give some of our show commands. Now, let's jump into a live interface and take a look at how to move between different configuration modes. Here, we're sitting on router R1, and we know that we're in privilege mode because we have a pound sign…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
IP version 4 (IPv4) addressing3m 9s
-
(Locked)
Binary numbering6m 5s
-
(Locked)
Binary practice exercise #11m 23s
-
(Locked)
Binary practice exercise #22m 37s
-
(Locked)
IPv4 address format8m 37s
-
Public vs. private IPv4 addresses4m 57s
-
(Locked)
Network address translation12m 20s
-
(Locked)
IPv4 autoconfiguration4m 39s
-
(Locked)
IPv4 traffic flows4m 19s
-
(Locked)
-
-
(Locked)
IPv4 subnetting2m 39s
-
The need for subnetting6m 43s
-
(Locked)
Calculating available subnets3m 45s
-
(Locked)
Calculating available hosts3m 56s
-
(Locked)
Subnetting practice exercise #14m 8s
-
(Locked)
Subnetting practice exercise #23m 32s
-
(Locked)
Calculating usable ranges of IPv4 addresses6m 52s
-
(Locked)
Subnetting practice exercise #34m 13s
-
(Locked)
Using a subnet calculator4m 2s
-
(Locked)
-
-
(Locked)
IP version 6 (IPv6) addressing3m 16s
-
(Locked)
Hexadecimal numbering7m 31s
-
(Locked)
IPv6 address format3m 57s
-
(Locked)
Shortening an IPv6 address3m 7s
-
(Locked)
IPv6 address shortening exercise2m
-
(Locked)
EUI-64 address2m 56s
-
(Locked)
IPv6 autoconfiguration2m 26s
-
(Locked)
IPv6 traffic flows2m 39s
-
(Locked)
-
-
(Locked)
Physically connecting network devices1m 6s
-
(Locked)
Coax cables and connectors4m 17s
-
Twisted pair cables and connectors6m 29s
-
(Locked)
Ethernet standards for copper cables3m 50s
-
(Locked)
Straight through vs. crossover cables5m 16s
-
(Locked)
Fiber optic cables4m 2s
-
(Locked)
Fiber optic connectors2m 52s
-
(Locked)
Ethernet standards for fiber optic cabling4m 5s
-
(Locked)
-
-
(Locked)
Wirelessly connecting network devices2m 12s
-
Wireless access points5m 41s
-
(Locked)
Frequency bands7m 37s
-
(Locked)
Wireless standards4m 39s
-
(Locked)
Transmission methods7m 57s
-
(Locked)
Spatial streams1m 28s
-
(Locked)
Channel bonding3m 44s
-
(Locked)
Wireless interference2m 2s
-
(Locked)
Internet of things (IoT)7m 41s
-
(Locked)
Cellular networks4m 59s
-
(Locked)
-
-
(Locked)
Network infrastructure1m 30s
-
(Locked)
Ethernet clients4m 32s
-
(Locked)
MAC addresses4m 40s
-
(Locked)
Ethernet switch operation7m
-
(Locked)
VLANs3m 31s
-
Router operation6m 59s
-
(Locked)
Identifying ports8m 45s
-
(Locked)
Interpreting LED indicators6m 30s
-
(Locked)
Interconnecting a network4m 16s
-
(Locked)
-
-
(Locked)
Cisco IOS4m 22s
-
(Locked)
Cisco IOS privilege levels7m 21s
-
(Locked)
Working in the CLI8m 53s
-
(Locked)
Examining router and switch configurations8m 31s
-
(Locked)
Password-protecting Cisco routers and switches4m 42s
-
(Locked)
Configuring a router interface4m
-
(Locked)
Working with configuration files8m 11s
-
(Locked)
-
-
(Locked)
Diagnosing network issues1m 46s
-
(Locked)
Troubleshooting methodology7m 46s
-
(Locked)
Help desk best practices8m 20s
-
(Locked)
Diagnostic commands7m 24s
-
(Locked)
Options for accessing network devices8m 35s
-
(Locked)
Packet analyzers4m 39s
-
(Locked)
Overview of Wireshark4m 33s
-
(Locked)
Working with Wireshark7m 57s
-
(Locked)
-
-
(Locked)
Network security2m 16s
-
(Locked)
Threats vs. vulnerabilities2m 15s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
Denial of service attacks5m 43s
-
(Locked)
Other common attacks9m 10s
-
(Locked)
Three goals of network security4m 45s
-
(Locked)
Security appliances7m 40s
-
(Locked)
Encryption9m 23s
-
(Locked)
Securing user accounts8m 41s
-
(Locked)
Multifactor authentication2m 13s
-
(Locked)
Wireless security options10m 10s
-
(Locked)
Securing a home wireless router8m 23s
-
(Locked)