1 00:00:00,240 --> 00:00:01,170 In this video, 2 00:00:01,170 --> 00:00:03,210 we're going to cover the network platform commands 3 00:00:03,210 --> 00:00:05,370 for the exam that you need to be aware of. 4 00:00:05,370 --> 00:00:07,620 Now, when I mention the term network platforms, 5 00:00:07,620 --> 00:00:09,540 I'm talking about things like routers, switches, 6 00:00:09,540 --> 00:00:10,560 and firewalls. 7 00:00:10,560 --> 00:00:11,490 And for the exam, 8 00:00:11,490 --> 00:00:14,130 I want you to know the show interface, show config, 9 00:00:14,130 --> 00:00:15,510 and show route commands 10 00:00:15,510 --> 00:00:16,980 and how we use them in maintaining 11 00:00:16,980 --> 00:00:18,750 and troubleshooting our networks. 12 00:00:18,750 --> 00:00:21,150 So what is a network platform? 13 00:00:21,150 --> 00:00:23,280 Well, I know this sounds like a really funny term 14 00:00:23,280 --> 00:00:24,750 that CompTIA uses here, 15 00:00:24,750 --> 00:00:26,280 but when they refer to a network platform 16 00:00:26,280 --> 00:00:27,120 and the objectives, 17 00:00:27,120 --> 00:00:29,130 what they're really referring to is any router, 18 00:00:29,130 --> 00:00:30,420 switch, or firewall, 19 00:00:30,420 --> 00:00:32,880 regardless of the brand or manufacturer. 20 00:00:32,880 --> 00:00:34,440 This is because CompTIA exams 21 00:00:34,440 --> 00:00:36,360 are considered vendor neutral exams. 22 00:00:36,360 --> 00:00:38,490 So we're not asking you just about Cisco. 23 00:00:38,490 --> 00:00:41,040 We could be asking about a Cisco router, a Juniper switch, 24 00:00:41,040 --> 00:00:42,510 or a Sidewinder firewall. 25 00:00:42,510 --> 00:00:43,710 It doesn't really matter. 26 00:00:43,710 --> 00:00:46,020 They're all considered network platforms. 27 00:00:46,020 --> 00:00:47,880 Now, each device manufacturer 28 00:00:47,880 --> 00:00:50,070 does create their own command line interface 29 00:00:50,070 --> 00:00:51,990 that's going to be used to configure, monitor, 30 00:00:51,990 --> 00:00:53,730 and troubleshoot their devices, 31 00:00:53,730 --> 00:00:55,290 but they're all pretty similar 32 00:00:55,290 --> 00:00:57,270 in their actual functions and commands, 33 00:00:57,270 --> 00:00:59,310 and most of them are based off Cisco 34 00:00:59,310 --> 00:01:01,200 because they were one of the first really big 35 00:01:01,200 --> 00:01:03,090 router and switch companies out there. 36 00:01:03,090 --> 00:01:05,910 For this lesson, we're going to focus on show interface, 37 00:01:05,910 --> 00:01:07,890 show config, and show route. 38 00:01:07,890 --> 00:01:10,620 These three terms are specific to Cisco devices, 39 00:01:10,620 --> 00:01:12,360 but similar commands exist 40 00:01:12,360 --> 00:01:14,430 for other manufacturers like Juniper 41 00:01:14,430 --> 00:01:16,470 and Sidewinder devices as well. 42 00:01:16,470 --> 00:01:18,060 For the show interface command, 43 00:01:18,060 --> 00:01:20,790 you could use show interfaces with an S on it, 44 00:01:20,790 --> 00:01:23,640 on a Juniper device or CF interface, 45 00:01:23,640 --> 00:01:25,350 which stands for "configure interface" 46 00:01:25,350 --> 00:01:26,880 on a Sidewinder firewall. 47 00:01:26,880 --> 00:01:28,710 It'll give you the same type of thing. 48 00:01:28,710 --> 00:01:31,620 Now for the show config command on a Cisco device, 49 00:01:31,620 --> 00:01:34,350 you could use show configuration on a Juniper device 50 00:01:34,350 --> 00:01:37,410 or CF config on a Sidewinder device. 51 00:01:37,410 --> 00:01:39,060 Now for the show route command, 52 00:01:39,060 --> 00:01:41,730 you would still use show route on Juniper devices, 53 00:01:41,730 --> 00:01:45,780 but you'd use CF route status on a Sidewinder firewall. 54 00:01:45,780 --> 00:01:48,300 So let's take a look at these three specifically 55 00:01:48,300 --> 00:01:51,360 show interface, show config, and show route, 56 00:01:51,360 --> 00:01:53,820 and what type of information you can get from them. 57 00:01:53,820 --> 00:01:55,950 First, we have show interface. 58 00:01:55,950 --> 00:01:58,650 The show interface command is going to display the statistics 59 00:01:58,650 --> 00:02:00,870 for a network interface on the device. 60 00:02:00,870 --> 00:02:03,030 Now, if you look at the specific interface, 61 00:02:03,030 --> 00:02:04,890 instead of all of the different interfaces 62 00:02:04,890 --> 00:02:07,020 you'd want to enter show interface 63 00:02:07,020 --> 00:02:09,810 and then use the ethernet interface you want to look at. 64 00:02:09,810 --> 00:02:13,770 For example, show interface ethernet 1/1. 65 00:02:13,770 --> 00:02:17,430 This would display only the statistics for ethernet 1/1, 66 00:02:17,430 --> 00:02:20,730 that specific interface and port on that switcher router. 67 00:02:20,730 --> 00:02:22,950 Now, when you use the show interface command, 68 00:02:22,950 --> 00:02:25,140 you can see if the interface is up or down, 69 00:02:25,140 --> 00:02:26,970 if the line protocol is up or down, 70 00:02:26,970 --> 00:02:29,070 in some key statistics that'll help you determine 71 00:02:29,070 --> 00:02:30,900 if there's any network issues. 72 00:02:30,900 --> 00:02:33,060 First, you should look at whether the internet address 73 00:02:33,060 --> 00:02:34,140 is a valid address 74 00:02:34,140 --> 00:02:36,720 or do you have an APIPA address that was assigned 75 00:02:36,720 --> 00:02:38,670 because you had a DHCP issue. 76 00:02:38,670 --> 00:02:40,110 If you see an APIPA address, 77 00:02:40,110 --> 00:02:42,720 that means you need to investigate your DHCP. 78 00:02:42,720 --> 00:02:44,460 Second, you should look at the bandwidth 79 00:02:44,460 --> 00:02:46,350 and see if it matches your cable type. 80 00:02:46,350 --> 00:02:48,090 In this example, the bandwidth is set 81 00:02:48,090 --> 00:02:52,230 to 10,000 kilobits per second or 10 megabits per second. 82 00:02:52,230 --> 00:02:53,430 This means the interface 83 00:02:53,430 --> 00:02:55,530 thinks it's using a Cat 3 cable. 84 00:02:55,530 --> 00:02:56,760 Now, if this is incorrect 85 00:02:56,760 --> 00:02:59,550 and you're actually using a Cat 5 or a Cat 6 cable, 86 00:02:59,550 --> 00:03:01,200 that cable may be damaged, 87 00:03:01,200 --> 00:03:02,850 which is why the device is only reporting 88 00:03:02,850 --> 00:03:05,370 that it's capable of 10 megabits per second. 89 00:03:05,370 --> 00:03:08,070 Third, you want to look at your MTU size. 90 00:03:08,070 --> 00:03:11,130 By default, this is going to be set to 1500 bytes, 91 00:03:11,130 --> 00:03:13,320 but if you're using a storage area network, 92 00:03:13,320 --> 00:03:15,000 you might want to use jumbo frames 93 00:03:15,000 --> 00:03:18,570 and use something as large as up to 9,000 bytes in size. 94 00:03:18,570 --> 00:03:21,240 This is going to depend on what network you're looking at. 95 00:03:21,240 --> 00:03:24,090 Also, you should check to see if there's any runts, giants, 96 00:03:24,090 --> 00:03:25,740 or errors in the statistics, 97 00:03:25,740 --> 00:03:28,470 as these are all indications of potential problems. 98 00:03:28,470 --> 00:03:30,570 Finally, you should check for collisions. 99 00:03:30,570 --> 00:03:32,850 If you're running full duplex on a switch or router, 100 00:03:32,850 --> 00:03:34,350 there should not be any collisions 101 00:03:34,350 --> 00:03:37,110 because each switch port is its own collision domain. 102 00:03:37,110 --> 00:03:40,440 In this example, I see there are 432 collisions, 103 00:03:40,440 --> 00:03:42,660 which indicates there's an issue on this switch port, 104 00:03:42,660 --> 00:03:44,070 or maybe somebody's connected 105 00:03:44,070 --> 00:03:46,290 a hub to that switch port downstream. 106 00:03:46,290 --> 00:03:48,480 Now, next we have the show config. 107 00:03:48,480 --> 00:03:50,130 Now, show config is a command 108 00:03:50,130 --> 00:03:52,230 that's used to display the current system configuration 109 00:03:52,230 --> 00:03:53,430 to your screen. 110 00:03:53,430 --> 00:03:55,170 When you use the show config command, 111 00:03:55,170 --> 00:03:56,790 there are no options or arguments. 112 00:03:56,790 --> 00:03:57,810 It's just going to be entered 113 00:03:57,810 --> 00:04:00,300 as show config and you'll hit enter. 114 00:04:00,300 --> 00:04:02,850 Now for the exam, you do not need to understand 115 00:04:02,850 --> 00:04:05,160 each and every line of this configuration. 116 00:04:05,160 --> 00:04:07,140 If you move into being a network administrator 117 00:04:07,140 --> 00:04:08,040 and you decide to take your 118 00:04:08,040 --> 00:04:11,730 Cisco Certified Network Associate Certification or CCNA, 119 00:04:11,730 --> 00:04:12,870 you're going to be expected to know 120 00:04:12,870 --> 00:04:14,220 each and every line of this. 121 00:04:14,220 --> 00:04:16,079 But for now, you should be able to read 122 00:04:16,079 --> 00:04:19,170 through this configuration and identify some key areas. 123 00:04:19,170 --> 00:04:20,940 First, we have the shared secrets 124 00:04:20,940 --> 00:04:21,779 that are being stored towards 125 00:04:21,779 --> 00:04:23,640 the beginning of the configuration file, 126 00:04:23,640 --> 00:04:25,350 as well as some basic items that allow us 127 00:04:25,350 --> 00:04:26,760 to configure things like our prompt 128 00:04:26,760 --> 00:04:28,320 and our message of the day. 129 00:04:28,320 --> 00:04:30,480 Next, we get into some system settings 130 00:04:30,480 --> 00:04:31,770 such as the system baud rate, 131 00:04:31,770 --> 00:04:34,740 which is currently set to 9,600 bits per second 132 00:04:34,740 --> 00:04:37,110 when I'm communicating over a console port. 133 00:04:37,110 --> 00:04:39,960 Next, we have some SNMP settings including enabling 134 00:04:39,960 --> 00:04:42,060 or disabling some of the traps for this device 135 00:04:42,060 --> 00:04:44,520 so it can report back to an SNMP manager. 136 00:04:44,520 --> 00:04:46,740 In this case, they're all disabled. 137 00:04:46,740 --> 00:04:48,930 Next, we're going to have some IP settings 138 00:04:48,930 --> 00:04:50,730 such as those two interfaces I have: 139 00:04:50,730 --> 00:04:51,656 sc0 140 00:04:51,656 --> 00:04:53,010 and sl0. 141 00:04:53,010 --> 00:04:54,990 You can see that sc0 is being set up 142 00:04:54,990 --> 00:04:56,910 to use a Class B private IP 143 00:04:56,910 --> 00:05:00,810 of 172.16.25.142, 144 00:05:00,810 --> 00:05:03,540 and a route was set to allow traffic out the gateway router 145 00:05:03,540 --> 00:05:07,140 at 172.16.10.201. 146 00:05:07,140 --> 00:05:09,870 Now, next, we have our VMPS, 147 00:05:09,870 --> 00:05:12,210 which is the VLAN Management Policy Server. 148 00:05:12,210 --> 00:05:16,800 In this case, we have it set to a TFTP server at 1.1.1.1, 149 00:05:16,800 --> 00:05:18,600 and it is set to enable. 150 00:05:18,600 --> 00:05:20,910 Next, we have our DNS set up for this device, 151 00:05:20,910 --> 00:05:23,070 and this is set up to use two DNS servers, 152 00:05:23,070 --> 00:05:27,150 a primary one at 198.92.30.32, 153 00:05:27,150 --> 00:05:31,740 and a backup at 171.69.2.132. 154 00:05:31,740 --> 00:05:35,040 Both of these are enabled and our DNS domain is cisco.com 155 00:05:35,040 --> 00:05:37,080 because this is a sample configuration file 156 00:05:37,080 --> 00:05:39,090 that was created for use by Cisco. 157 00:05:39,090 --> 00:05:41,640 Next, we have our TACACS+ configuration, 158 00:05:41,640 --> 00:05:42,780 including its servers, 159 00:05:42,780 --> 00:05:44,280 the number of invalid attempts allowed, 160 00:05:44,280 --> 00:05:45,720 and the timeout period. 161 00:05:45,720 --> 00:05:47,430 After that, we have the configuration 162 00:05:47,430 --> 00:05:49,680 for an older protocol known as IPX, 163 00:05:49,680 --> 00:05:52,020 and this device is set to allow IPX traffic 164 00:05:52,020 --> 00:05:54,090 to be bridged into this network. 165 00:05:54,090 --> 00:05:56,280 Next, we have the VTP settings, 166 00:05:56,280 --> 00:05:58,350 which are going to allow us to be in server mode. 167 00:05:58,350 --> 00:06:01,710 Remember, VTP is the VLAN trunking protocol, 168 00:06:01,710 --> 00:06:04,860 and this is a proprietary protocol used by Cisco devices 169 00:06:04,860 --> 00:06:07,050 to exchange VLAN information. 170 00:06:07,050 --> 00:06:09,840 After that, we have some spanning tree protocol settings, 171 00:06:09,840 --> 00:06:12,032 specifically, that we've enabled STP 172 00:06:12,032 --> 00:06:14,490 and we have a max age set at 20. 173 00:06:14,490 --> 00:06:18,000 After that, we have CGMP, which is set to enable. 174 00:06:18,000 --> 00:06:19,710 Now, CGMP is not something 175 00:06:19,710 --> 00:06:21,630 we've talked about before in this course, 176 00:06:21,630 --> 00:06:23,880 but this is a Cisco specific thing. 177 00:06:23,880 --> 00:06:26,700 CGMP is the Cisco Group Management Protocol; 178 00:06:26,700 --> 00:06:30,390 It's an older form of IGMP used by Cisco switches. 179 00:06:30,390 --> 00:06:31,680 Next we have syslog, 180 00:06:31,680 --> 00:06:34,080 and in this case, it's set to enable for the console 181 00:06:34,080 --> 00:06:36,120 and it's set to disabled for the server. 182 00:06:36,120 --> 00:06:38,220 All the logging levels are set here as well, 183 00:06:38,220 --> 00:06:40,560 and you can see they're either 2 or 5. 184 00:06:40,560 --> 00:06:42,870 Anything above those numbers would not be forwarded 185 00:06:42,870 --> 00:06:44,460 or logged by Syslog. 186 00:06:44,460 --> 00:06:46,770 Now, after that, we have the NTP section, 187 00:06:46,770 --> 00:06:49,050 which configures our network time protocol server 188 00:06:49,050 --> 00:06:50,130 that we're going to use, 189 00:06:50,130 --> 00:06:51,540 including what time zone we're in 190 00:06:51,540 --> 00:06:54,750 and if we're going to enable NTP clients or not. 191 00:06:54,750 --> 00:06:56,490 After that, we have a permit list, 192 00:06:56,490 --> 00:06:58,320 which is essentially an ACL. 193 00:06:58,320 --> 00:07:01,440 In this case, the permit list is set to disable. 194 00:07:01,440 --> 00:07:04,170 Finally, we have the first module in our device, 195 00:07:04,170 --> 00:07:06,810 a 2-port 100BaseTX device, 196 00:07:06,810 --> 00:07:08,970 so this is a fast ethernet device. 197 00:07:08,970 --> 00:07:11,040 Here you could see what has been enabled and disabled 198 00:07:11,040 --> 00:07:13,500 on this particular module or interface. 199 00:07:13,500 --> 00:07:16,380 As I said, you don't need to be an expert on any of this. 200 00:07:16,380 --> 00:07:18,150 I just wanted to show you what it looked like 201 00:07:18,150 --> 00:07:19,770 inside of a configuration file 202 00:07:19,770 --> 00:07:21,990 when you use the show config command. 203 00:07:21,990 --> 00:07:24,000 Our third command is show route. 204 00:07:24,000 --> 00:07:25,890 The show route command is going to be used to display 205 00:07:25,890 --> 00:07:29,270 the current state of the routing table on the device. 206 00:07:29,270 --> 00:07:30,630 More accurately, we're normally going to enter this command 207 00:07:30,630 --> 00:07:33,150 as show IP route and hitting enter. 208 00:07:33,150 --> 00:07:34,920 This is because we normally want to see the routes 209 00:07:34,920 --> 00:07:36,720 associated with IP based networks 210 00:07:36,720 --> 00:07:38,130 for most of our networks. 211 00:07:38,130 --> 00:07:40,920 Most of us aren't running any networks that aren't IP based. 212 00:07:40,920 --> 00:07:43,050 For example, you're probably not running an IPX 213 00:07:43,050 --> 00:07:45,000 or AppleTalk network anymore. 214 00:07:45,000 --> 00:07:47,010 Now, here's an example of a router that I have 215 00:07:47,010 --> 00:07:49,200 that I've entered show IP route on. 216 00:07:49,200 --> 00:07:51,120 Here you can see first we have a legend 217 00:07:51,120 --> 00:07:53,640 that shows us all the different codes and what they mean. 218 00:07:53,640 --> 00:07:56,070 Then we see the gateway of last resort, 219 00:07:56,070 --> 00:07:57,210 which is our default gateway 220 00:07:57,210 --> 00:07:59,160 that we're going to use if we can't route traffic 221 00:07:59,160 --> 00:08:01,530 to any of the other routes that are listed below. 222 00:08:01,530 --> 00:08:02,850 As you look at those routes, 223 00:08:02,850 --> 00:08:05,010 you can see they're written in three columns. 224 00:08:05,010 --> 00:08:06,240 The first column indicates 225 00:08:06,240 --> 00:08:07,860 how the route is going to be derived. 226 00:08:07,860 --> 00:08:11,700 Is it from IGRP, RIP, OSPF, directly connected, 227 00:08:11,700 --> 00:08:15,150 a static route, EGP derived, or BGP derived. 228 00:08:15,150 --> 00:08:16,710 Then we have our second column, 229 00:08:16,710 --> 00:08:18,450 and this tells us the type of route it is 230 00:08:18,450 --> 00:08:20,240 when we learn it through OSPF. 231 00:08:20,240 --> 00:08:22,920 In this example, we have three of these type of routes, 232 00:08:22,920 --> 00:08:27,180 and they're listed as E2 for OSPF external type two routes. 233 00:08:27,180 --> 00:08:29,640 Then we have the address of the remote network 234 00:08:29,640 --> 00:08:32,669 such as 150.150.0.0, 235 00:08:32,669 --> 00:08:35,340 and then we see a pair numbers inside some brackets. 236 00:08:35,340 --> 00:08:38,490 In this example, it's one 60/five. 237 00:08:38,490 --> 00:08:41,370 This means 160 is the administrative distance 238 00:08:41,370 --> 00:08:42,750 of the information source, 239 00:08:42,750 --> 00:08:45,150 and five is the metric for this route. 240 00:08:45,150 --> 00:08:48,120 Next, we see the via and an IP address, 241 00:08:48,120 --> 00:08:49,710 which is the address of the next router 242 00:08:49,710 --> 00:08:51,150 to the remote network. 243 00:08:51,150 --> 00:08:52,950 After that, we see a time, 244 00:08:52,950 --> 00:08:55,200 and this is the last time the route was updated. 245 00:08:55,200 --> 00:08:57,540 It's written in hours, minutes, and seconds, 246 00:08:57,540 --> 00:09:00,090 so this first route is only one minute old. 247 00:09:00,090 --> 00:09:01,590 Finally, we have the interface used 248 00:09:01,590 --> 00:09:03,690 for a specified network in this route. 249 00:09:03,690 --> 00:09:05,935 In this case, Ethernet2 is designated as the path 250 00:09:05,935 --> 00:09:08,610 for sending traffic to this particular network. 251 00:09:08,610 --> 00:09:11,700 So as you can see from the show IP route command 252 00:09:11,700 --> 00:09:15,120 that OSPF routes have an administrative distance of 160 253 00:09:15,120 --> 00:09:16,830 and a metric of only 5. 254 00:09:16,830 --> 00:09:19,770 The EGP routes have an administrative distance of 200 255 00:09:19,770 --> 00:09:22,740 and a metric of either 128 or 129. 256 00:09:22,740 --> 00:09:25,410 This tells me that the router trust the OSPF routes 257 00:09:25,410 --> 00:09:28,140 more than a trust the EGP routes, right? 258 00:09:28,140 --> 00:09:29,670 Now, this makes sense if you think back 259 00:09:29,670 --> 00:09:31,830 to our previous discussions on router protocols, 260 00:09:31,830 --> 00:09:33,060 administrative distances, 261 00:09:33,060 --> 00:09:35,580 and the believability of these metrics. 262 00:09:35,580 --> 00:09:38,520 All right, let's look one more time at the show IP route, 263 00:09:38,520 --> 00:09:40,500 but this time on a different router. 264 00:09:40,500 --> 00:09:43,170 Here you can see a router that has fewer routes. 265 00:09:43,170 --> 00:09:45,360 In this router, I only have four routes. 266 00:09:45,360 --> 00:09:48,900 My default route of 160.89.0.0 267 00:09:48,900 --> 00:09:50,550 and then three subnets. 268 00:09:50,550 --> 00:09:52,020 Here you can see the connected route 269 00:09:52,020 --> 00:09:55,050 is showing it's possibly being down on Ethernet0. 270 00:09:55,050 --> 00:09:57,720 Next, we see two IGRP derived routes, 271 00:09:57,720 --> 00:10:01,260 and they're using I as level 2 as their route type. 272 00:10:01,260 --> 00:10:03,240 These routes have a lower administrative distance 273 00:10:03,240 --> 00:10:06,360 than the OSPF and EGP routes that we looked at earlier, 274 00:10:06,360 --> 00:10:09,003 but their metric is a bit higher than an OSPF one 275 00:10:09,003 --> 00:10:10,710 that we saw before. 276 00:10:10,710 --> 00:10:12,390 Now if you wanted to get additional details 277 00:10:12,390 --> 00:10:14,130 on any of these specific routes, 278 00:10:14,130 --> 00:10:15,990 you could enter show IP route 279 00:10:15,990 --> 00:10:17,820 and the IP address for that network 280 00:10:17,820 --> 00:10:20,490 to get additional details, including its routing metrics, 281 00:10:20,490 --> 00:10:22,500 reliability, the delay on the network, 282 00:10:22,500 --> 00:10:24,960 and even the hop count, as you can see here. 283 00:10:24,960 --> 00:10:27,150 So in summary, you need to remember 284 00:10:27,150 --> 00:10:29,370 that show interface gives you the statistics 285 00:10:29,370 --> 00:10:30,360 for an interface, 286 00:10:30,360 --> 00:10:32,100 that show config is used to display 287 00:10:32,100 --> 00:10:33,750 the current configuration device, 288 00:10:33,750 --> 00:10:35,250 and show route is going to be used 289 00:10:35,250 --> 00:10:37,110 to get information from the routes learned 290 00:10:37,110 --> 00:10:38,660 by a particular network device.