From the course: Cisco Certified Support Technician (CCST) Networking Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Cisco IOS privilege levels
From the course: Cisco Certified Support Technician (CCST) Networking Cert Prep
Cisco IOS privilege levels
(gentle music) - [Instructor] Cisco IOS gives us a variety of commands. However, we might not want every user to have access to each command. For example, maybe we want somebody at the help desk to be able to issue some show commands, maybe help diagnose an issue, but maybe they're not trained to go configure an advanced routing protocol. What we can do is use privilege levels to dictate which commands are available to which users, and that's what we're going to be checking out in this video. Specifically, we have 16 different privilege levels that we can assign commands to, and those are numbered in the range of zero through 15. There are three of these that we have by default, and if we want, we can populate the other three default privilege levels we have. First we have level zero. This only supports five commands. There's not much we can do here except go to a different privilege level, get some basic help, or exit. When we first log into a router or a switch, however, we're in…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
IP version 4 (IPv4) addressing3m 9s
-
(Locked)
Binary numbering6m 5s
-
(Locked)
Binary practice exercise #11m 23s
-
(Locked)
Binary practice exercise #22m 37s
-
(Locked)
IPv4 address format8m 37s
-
Public vs. private IPv4 addresses4m 57s
-
(Locked)
Network address translation12m 20s
-
(Locked)
IPv4 autoconfiguration4m 39s
-
(Locked)
IPv4 traffic flows4m 19s
-
(Locked)
-
-
(Locked)
IPv4 subnetting2m 39s
-
The need for subnetting6m 43s
-
(Locked)
Calculating available subnets3m 45s
-
(Locked)
Calculating available hosts3m 56s
-
(Locked)
Subnetting practice exercise #14m 8s
-
(Locked)
Subnetting practice exercise #23m 32s
-
(Locked)
Calculating usable ranges of IPv4 addresses6m 52s
-
(Locked)
Subnetting practice exercise #34m 13s
-
(Locked)
Using a subnet calculator4m 2s
-
(Locked)
-
-
(Locked)
IP version 6 (IPv6) addressing3m 16s
-
(Locked)
Hexadecimal numbering7m 31s
-
(Locked)
IPv6 address format3m 57s
-
(Locked)
Shortening an IPv6 address3m 7s
-
(Locked)
IPv6 address shortening exercise2m
-
(Locked)
EUI-64 address2m 56s
-
(Locked)
IPv6 autoconfiguration2m 26s
-
(Locked)
IPv6 traffic flows2m 39s
-
(Locked)
-
-
(Locked)
Physically connecting network devices1m 6s
-
(Locked)
Coax cables and connectors4m 17s
-
Twisted pair cables and connectors6m 29s
-
(Locked)
Ethernet standards for copper cables3m 50s
-
(Locked)
Straight through vs. crossover cables5m 16s
-
(Locked)
Fiber optic cables4m 2s
-
(Locked)
Fiber optic connectors2m 52s
-
(Locked)
Ethernet standards for fiber optic cabling4m 5s
-
(Locked)
-
-
(Locked)
Wirelessly connecting network devices2m 12s
-
Wireless access points5m 41s
-
(Locked)
Frequency bands7m 37s
-
(Locked)
Wireless standards4m 39s
-
(Locked)
Transmission methods7m 57s
-
(Locked)
Spatial streams1m 28s
-
(Locked)
Channel bonding3m 44s
-
(Locked)
Wireless interference2m 2s
-
(Locked)
Internet of things (IoT)7m 41s
-
(Locked)
Cellular networks4m 59s
-
(Locked)
-
-
(Locked)
Network infrastructure1m 30s
-
(Locked)
Ethernet clients4m 32s
-
(Locked)
MAC addresses4m 40s
-
(Locked)
Ethernet switch operation7m
-
(Locked)
VLANs3m 31s
-
Router operation6m 59s
-
(Locked)
Identifying ports8m 45s
-
(Locked)
Interpreting LED indicators6m 30s
-
(Locked)
Interconnecting a network4m 16s
-
(Locked)
-
-
(Locked)
Cisco IOS4m 22s
-
(Locked)
Cisco IOS privilege levels7m 21s
-
(Locked)
Working in the CLI8m 53s
-
(Locked)
Examining router and switch configurations8m 31s
-
(Locked)
Password-protecting Cisco routers and switches4m 42s
-
(Locked)
Configuring a router interface4m
-
(Locked)
Working with configuration files8m 11s
-
(Locked)
-
-
(Locked)
Diagnosing network issues1m 46s
-
(Locked)
Troubleshooting methodology7m 46s
-
(Locked)
Help desk best practices8m 20s
-
(Locked)
Diagnostic commands7m 24s
-
(Locked)
Options for accessing network devices8m 35s
-
(Locked)
Packet analyzers4m 39s
-
(Locked)
Overview of Wireshark4m 33s
-
(Locked)
Working with Wireshark7m 57s
-
(Locked)
-
-
(Locked)
Network security2m 16s
-
(Locked)
Threats vs. vulnerabilities2m 15s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
Denial of service attacks5m 43s
-
(Locked)
Other common attacks9m 10s
-
(Locked)
Three goals of network security4m 45s
-
(Locked)
Security appliances7m 40s
-
(Locked)
Encryption9m 23s
-
(Locked)
Securing user accounts8m 41s
-
(Locked)
Multifactor authentication2m 13s
-
(Locked)
Wireless security options10m 10s
-
(Locked)
Securing a home wireless router8m 23s
-
(Locked)