Pertemuan 6 Finishing the Configuration 1 Discussion Topics • • • • • • • • • Importance of configuration standards Interface descriptions Configuring interface description Login banners Configuring message-of-the-day (MOTD) Host name resolution Configuring host tables Configuration backup and documentation Backing up configuration files 2 Importance of Configuration Standards Configuring Interface Descriptions An interface description should identify important information such as a router, a circuit number, or a specific network segment. Login Banners Configuring Message-of-theDay (MOTD) Host Name Resolution Host Table Configuration Configuration Backup and Documentation The copy running-config tftp Command The copy tftp running-config Command Copying, editing, and pasting configurations • A TFTP server will allow image and configuration uploads and downloads over the network. • The TFTP server can be another router, or it can be a host system. 12 Copying, editing, and pasting configurations • The TFTP host can be any system that has TFTP software loaded and operating and able to receive files from the TCP/IP network. 13 Copying, editing, and pasting configurations running-config RAM IOS (running) startup-config IOS copy flash tftp copy tftp flash copy startup-config tftp copy tftp startup-config copy running-config tftp copy tftp running-config 14 Copying, editing, and pasting configurations • Troubleshooting: Be sure you can ping the TFTP server. 15 TFTP Software and Servers Router# copy flash tftp • • • When using Windows, the TFTP server software must be running. The copy can be performed from the console port or from a telnet session. The telnet session can be performed on the same computer where the TFTP server is running (or to a different computer). 16 TFTP Software and Servers • TFTP software either comes free with the OS (Linux/Unix) or can be downloaded for free. 17 TFTP Software and Servers • Just double click on the shortcut… • Remember, TFTP is “Trivial” FTP: – No authentication – No login – No choice for directory – Uses UDP and verified via a TFTP checksum (not TCP ACKs) 18