CCNA Revision PDF
CCNA Revision PDF
Amos
BASICS
OSI 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 - Physical Protocols FTP, Telnet, etc HTML TCP, UDP IP, IPv6, Router PPP, Frame-Relay, etc NICs, Switch Repeater, Hub Devices
802.11 Wireless RSTP = 802.1w 802.5 Token Ring STP = 802.1d 802.ab 1G Ethernet (1000 BASE-SX), uses CSMA/CD 802.3z 1G Ethernet (1000 BASE-T), uses CSMA,CD 802.3u 100MB Ethernet (100 BASE-TX) 802.3ae 10G Ethernet, approved in 2002.
Private IP Addresses:
10.0.0.0 172.16.0.0 192.168.0.0 10.255.255.255 172.31.255.255 192.168.255.255
Page 1
Password Recovery Reboot Router CTRL + Break To interrupt boot process. confreg 0x2142 reset
Boot Process POST Locate IOS using bootstrap. Load IOS Load Configuration file into running config.
Default Sequence for Loading an OS Flash TFTP Server ROM (mini IOS or Bootloader or RXBoot)
Default Sequence for Loading the Configuration File. NVRAM TFTP Server Setup Dialog
Runt A packet size smaller than the mediums minimum packet size. Usually anything less than 64kb. Can be caused by collisions, faulty NICs, duplex mismatch, and 802.1q & ISL mismatch.
Troubleshooting Steps:
1. Ping loopback/diagnostics IP address 127.0.0.1 2. Ping local PC IP address Shows TCP/IP stack is properly installed. 3. Ping Default Gateway 4. Ping remote server.
Page 2
CISCO IOS
Router Modes
User exec mode Router> Privileged exec mode Router# Global Configuration mode Router(config)# Specific Configuration mode e.g. Router(config-if)# Setup mode Would you like to enter the initial configuration dialog? [yes,no]:
Banner Types
MOTD Banner Login Banner Prompt time-out Banner
Line Configurations:
Auxiliary, Console, Telnet line con 0 password amos login exec-timeout 0 prevents the console from timing out logging synchronous stops annoying console messages from popping up and disrupting the configs youre trying to type terminal monitor Allows you 2view the debug output of or router you are telnetted into.
Page 3
Pipe
sh run | begin interface Means show the running config beginning with info on interfaces. sh ip route | include 192.168.3.32 Find this IP in the routing table sh run | redirect Can be used to redirect output to a URL.
Other Commands
ping 10.1.1.1 or, for an Extended PING just type ping followed by the return key and you can determine the following PING variables: a. Datagram size, b. Timeout value, c. Protocol, d. Source IP address e. traceroute 10.1.1.1 telnet 10.1.1.1 (or just 10.1.1.1 automatically understood 2b a telnet command). a. sh sessions Allows you to see all the multiple telnet connections open b. ctrl + shift + 6 + x.- Returns to current router c. resume 2, or 3 etc Resumes connection to one of open sessions. d. Disconnect 2, or 3 etc sh processes This command shows CPU utilization to determine if the device will be able to handle the debug command for instance.
Page 4
Static Routing
Page 5
Routing Protocols:
Route Source Connected Interface Static Route EIGRP IGRP OSPF RIP External EIGRP Unknown Administrative Distance 0 1 90 100 110 120 170 255 never used
Distance Vector Routing Protocols RIP & IGRP (Send & receive routing info to directly connected routers periodically). Link state OSPF & IS-IS. (Send and receive routing info 2 all routers in the Autonomous System (AS), have 3 tables in the routing table.) Hybrid EIGRP
RIP Timers
1. Route update timer Self explanatory and occurs every 30s. 2. Route invalid Timer a router waits 180s b4 specifying a route as invalid.
Page 6
3. Hold down timer 180s 4. Route flush Timer 240s. The time between a route becoming invalid & the time it is removed from the routing table. RIPv2 uses multicast 224.0.0.9
IGRP
1. Maximum hop count of 255 (100 by default). 2. Uses a composite metric of bandwidth and delay by default but can also use MTU, reliability & load. 3. Updates every 90secs.
EIGRP
Uses multicast 224.0.0.10. All routing protocols are able to provide Load Balancing for equal cost paths. But only IGRP & EIGRP can load balance unequal cost paths (using the variance command). 1. Fastest convergence time of all the routing protocols. 2. Uses bandwidth and delay (cumulative line delay) as metric. Can also use load, reliability, & MTU size. 3. Supports VLSM (Variable Length Subnet Masks) & CIDR (Cisco Inter Domain Routing.) 4. Supports discontiguous networks using the no auto-summary command. 5. Supports IPv6 using Protocol-Dependent Modules (PDMs). 6. Classless 7. Efficient neighbor discovery Uses Hellos & Acknowledgements.
Page 7
CCNA Revision Notes By C. T. Amos 8. Communication via RTP (Reliable Transport Protocol) 9. Best path selection using DUAL (Diffusing Update Algorythm)
Features:
Feasible Distance Best path/metric to a destination. Neighbor Table Each PDM has its neighbor table. Topology Table Feasible Successor Backup route stored in the Topology table. EIGRP has 6 feasible successors by default. Successor Best route. Stored in the Routing table and backed up by the feasible successor. EIGRP is able to redistribute manually and automatically.
EIGRP Tables:
Neighborship Table Topology Table Routing Table
Configuration Examples:
router eigrp 10 passive-interface s0/0/1 preventing EIGRP from sending routing info out particular interfaces.
no auto summary required for discontiguous networks. Also necessary so the specific networks can be advertized, not just the 172.16.0.0/16 summary. Redistribution: So EIGRP and another routing protocol such as RIP can communicate.
Page 8
EIGRP Commands.
sh ip route eigrp sh ip eigrp topology debug eigrp pockets debug ip notification Only has data if there is a problem with the network sh ip eigrp nei H Address Interface I 10.1.1.2 S0/0/1
Hold 14
Page 9
Features:
ASBR Autonomous System Border Router - Connects 1 OSPF AS to another. ABR Area Border Router Connects a router to a backbone router or Area 0. Link A router interface. Router ID (RID) Highest IP address of all interfaces on a router, or the highest loopback IP add if the router has one. Designated Router (DR) The router elected to receive and disseminate routing info to other routers on a network.
Page 10
CCNA Revision Notes By C. T. Amos BDR Backup Designated Router. Broadcast / Multi-access Networks e.g. Ethernet. The DR & BDR are elected on these networks. Non-Broadcast Multi-access Networks (NBMA) e.g. Frame Relay, X25, & ATM. Also elect a DR and BDR. Point-to-Multipoint No DR & BDR elected. Point-to-Point Here 2 routers can be directly connected either physically or virtually using Frame Relay circuits. OSPF uses Wildcards. OSPF uses the cost metric, & its accumulated over all the exit interfaces to a given destination. 10N = 100Mbps = a Cost of 1. 10Mbps = a Cost of 10 64Kbps = 1563 Process ID
OSPF commands:
network 10.0.0.0 0.0.255.255 area 2 This wild card means from 10.0.0.0 to 10.0.255.255 sh ip ospf Gives the RID & Area number. sh ip ospf database shows the RIDs of all the routers in the AS. sh ip ospf int f0/1 shows the IP add, RID, Process ID, Cost, Network type, DR/BDR. sh ip ospf nei sh ip protocols debug ip ospf packet debug ip ospf hello debug ip ospf adj
Page 11
Then reload router The loopback add will be the RID but will not override the router-id command: router ospf 1 router-id 10.1.2.23
Setting Priority:
int f0/1 ip ospf priority 2
Page 12
SWITCHING
Switching works through the use of ASIC (Application Specific Integrated Circuits).
Switch Characteristics
1. Address Learning When MAC addresses are learned, theyre placed in a MAC Forward/Filter Table. 2. Forward Filter 3. Loop Avoidance
Features:
STP Uses the Spanning Tree Algorithm (STA) Root Bridge The Bridge/Switch with the lowest Bridge ID Bridge ID Combination of MAC add plus priority Non-Root Bridge BPDU Bridge Protocol Data Units. Messages sent to & from each switch containing STP info. Root Port The port directly connected to the root bridge. Designated Port Forwarding port. Has lowest cost on a switch. Blocked Port Will not forward frames but will listen. Used 2prevent loops.
Disabled Does not participate in STP but receives BPDUs. Forward Delay Period of time from listening state to learning state, 15s by default.
Security
sp portfast sp bpdu guard enable Guards against creating loops if a switch is connected to this port. sp bpdu filter enable Prevents port from receiving BPDU packets. sp portfast default Enables portfast on all access ports.
EtherChannel:
For bundling multiple links into 1. The multiple connections to devices can be used simultaneously, thus increasing bandwidth.
Page 14
Redundancy is still present. int port-channel 1 int range f0/1 2 switchport mode trunk Creates a trunk port used between switches. switchport nonegotiate Prevents switches from auto detecting the type of link. channel-group 1 mode desirable
VLANS
A Vlan is a logical segmentation of a network. It is a broadcast domain and a router is therefore required for inter Vlan communication.
Features:
Static Vlans Self explanatory Dynamic Vlans This requires a database of MAC & IP addresses and info about which Vlan they belong to. Requires VMPS to function. VMPS VLAN Management Policy Server. Maps MAC addresses to Vlans. Access Port Belongs one particular Vlan and does not look at source addresses. Trunk Port a. Belongs to all Vlans and carries Vlan info. b. Can use DTP (Dynamic Trunking Port) for negotiation of port mode.
Page 15
CCNA Revision Notes By C. T. Amos c. Vlan traffic is multiplexed over a trunk port. Frame Tagging A frame is tagged with info about the Vlan its destined to. PVID Default Port Vlan ID. Identifier that passes through native Vlan or Vlan 1, on the trunk port.
Vlan Trunking Protocol Offers Vlan trunking over mixed networks e.g. Ethernet & ATM, etc. Dynamically reports additions of extra Vlans. Learns normal range Vlans (1-1005) but no Extended Vlans (1006 - 4094).
VTP Modes
VTP Server Creates, edits, and deletes VTP database info. Save database in NVRAM. VTP Client Updates and forwards updates but does not save them. VTP Transparent Mode No new Vlan updates are saved. Forwards updates but does not look at them or save them in its database. vtp mode server vtp domain amos vtp password cisco VTP Pruning Means Vlan X broadcast is not sent to switch without Vlan X on it. Vlans 1 to 1001 can be pruned: int f0/1 switchport trunk pruning vlan 3 4 Do sh int trunk
This command configured on one switch will automatically b enabled on the entire network.
Page 16
CCNA Revision Notes By C. T. Amos Assigning Vlans conf t vlan 2 name marketing do sh vlan Assiging Ports int f0/1 switchport mode access switchport access vlan 3 Trunking int f0/1 switchport trunk encapsulation dot1q (or isl) switchport mode trunk
VLAN3
VLAN2 On the Switch: Int f0/1 Switchport mode trunk Switchport trunk encapsulation dot1q On the Router: int f0/1.2 encapsulation dot1q 2 ip add 10.1.1.1 255.255.255.0 int f0/1.3 encapsulation dot1q 3 ip add 10.1.2.1 255.255.255.0
Page 17
SECURITY:
a. Cisco IOS Firewall b. Access Lists (ACLs) c. NAT
Rules For Regulating ACLs For Traffic From The Internet To The LAN
Rule 1 - Deny entry from any addresses from the internal network Rule 2 - Deny any local host addresses (127.0.0.0/8) Rule 3 Deny any reserved private addresses Rule 4 Deny any multicast IP add range (224.0.0.0/4)
ACL Numbers :
0 -99 = Standard 100 199 = Extended 1300 1999 = Expanded std 2000 2699 = Expanded extended
Configuration Examples:
access-list 10 deny any similar to access-list 10 deny 0.0.0.0 255.255.255.255 access-list 10 deny 10.1.1.1 Denies a single IP address access-list 10 deny 10.1.1.0 0.0.3.255 Using wildcards access-list 10 permit any Required because of the implicit deny. int f0/1 ip access group 10 out sh access-list 10 sh ip access-list sh ip int
Extended ACLs
Page 19
Advanced ACLs:
Named ACLs Switch Port ACLs Time-Based ACLs
Named ACLs:
conf t ip access-list standard BlockFinance deny 10.0.0.8 0.0.0.7 permit any exit int f0/1 ip access-group BlockFinance out
Time-Based ACLs:
conf t time-range no-http periodic weekend 06:00 to 12:00 exit
Page 20
CCNA Revision Notes By C. T. Amos time-range tcp-yes periodic weekend 06:00 to 12:00 exit ip access-list extended time deny tcp any any eq www time-range no-http permit tcp any any time-range tcp-yes int f0/1 ip access-group time in do sh time range
Remark:
ip access-list extended no_telnet remark deny all of sales from telnetting to marketing deny tcp 10.0.1.0 0.0.0.255 10.0.2.0 0.0.0.255 eq 23 permit any any
NAT
Static NAT Dynamic NAT Overloading (PAT)
NAT IP Addresses:
Inside local Outside Local Inside Global Outside Global sh ip nat translation debug ip nat netwmask 255.255.255.0 = prefix-length 24
Page 21
Dynamic NAT:
ip nat pool amos 176.0.0.2 176.0.0.254 netmask 255.255.255.0 ip nat inside source list 1 pool amos int f0/1 ip add 10.0.0.1 255.255.255.0 ip nat inside int s0/0/1 ip add 176.0.0.1 255.255.255.0 ip nat outside access-list 1 permit 10.0.0.0 0.0.0.255
PAT (NAT Overload) - Mapping of multiple IP adds to a single IP add using different
ports. ip nat pool amos 176.0.0.1 176.0.0.1 netmask 255.255.255.0 ip nat inside source list 1 pool amos overload int f0/1 ip nat inside int s0/0/1 ip add176.0.0.1 255.255.255.0 ip nat outside access-list 1 permit 10.0.0.0 0.0.0.255
Page 22
WIRELESS
802.11 Wireless Standard
1 ) 802.11b
2.4GHz, DSSS (Direct Sequence Spread Spectrum). 3 non overlapping channels, About 25 users per cell, Up 350 feet (105m) at 1Mbps & 11Mbps at 150 feet (45m),
2 ) 802.11g
2.4GHz DSSS & OFDM (Orthogonal Frequency Division Multiplexing) 3 non overlapping channels About 20 users per cell Up to 300 feet at 6 Mbps
3) 802.11a(h)
Tech has lower market penetration 5GHz OFDM 802.11h has up to 23 non overlapping channels & 802.11a has 12.. 15 users per cell Up to 200 feet at 6Mbps
802.11h Features:
TPC (Transmit Power Control) Alters power watts to change cell range and has been used by Cellular companies for some time. DFS (Dynamic Frequency Selection) Avoids radar in order to eliminate interference coz radar uses the 2.4GHz range as well, & so does Bluetooth & Microwaves.
4 ) 802.11n
Latest Wireless technology 2.4GHz & 5GHz MIMO (Multiple Input Multiple Output) Uses 4 antennas, 2 for receiving and 2 for sending. Can also have up to 8 antennas. Up to 250Mbps maximum link speed.
Page 23
Features:
ESS (Extended Service Set) Has 2 or more BSS with the same SSID. o The AP has its own BSSID, usually its MAC address. SSID Service Set ID BSID Basis Service Set ID IBSS (Independent Basic Service Set) An ad hoc connection mode that allows computers to connect directly to each other without the use of an Access Point. Usually for SOHOs. Infrastructure Mode (Either BSS or ESS) Requires at least 1 access mode. BSA (Basic Service Area) Contains 1 cell & 1 Access Point. ESA (Extended Service Area) Has more than 1 cell & each cell has a different channel. o It should have at least 10-15% overlap & 15-50% for Voice.
Wireless Security:
WFP Wireless Encryption Protocol or Wired Equivalent Privacy. Uses the RC4 encryption algorithm. WPA Wi-Fi Protection Access. Uses a 128 bit key. o WPA Enterprise Uses a Radius Server o WPA Personal Also known as WPA-PSK ()Pre Shared Key. Does not use a server. WPA2 Uses AES-CCMP encryption.
Page 24
IPv6
Has 4 times more possible IP addresses 128 bits long 64 bits for the add, 16 for the Subnet mask, & 48 for the global prefix. No Broadcasts. Anycast Multiple computers with the same IP add,when an anycast packet is sent it will be delivered to the closest computer.
Mixed IPv4 & IPv6 Network 0:0:0:0:0:0:192.168.0.1 Auto Configuration: A device assigns itself a globally or locally unique IP add by 1st looking at the router and then converting its own MAC add. For example: Router MAC add 0060.d673.1987 Append with FFFE
conf t ipv6 unicast-routing Enables IPv6 int f0/1 ipv6 add 2001:db8:3c4d:1::/64 eui-64 - This allows the router to use its MAC add & pad it 2mak the interface ID.
DHCPv6
IPv6 dhcp pool cisco Domain-name amos.com
Page 25
Routing Protocols
RIP
ripng ipv6 router rip 1 - The 1 is the process ID or tag. int f0/1 ipv6 router rip 1 enable - Now enabled in interface mode.
EIGRPv6
ipv6 router eigrp 10 no shut int f0/1 ipv6 eigrp 10
OSPFv3
ipv6 router ospf 1 router-id 1.1.1.1 Every router has 2b assigned a router id. int f0/1 ipv6 ospf 1 area 0
Migration Strategies
Dual Stacking Uses both IPv4 & IPv6 6 to 4 Tunneling Traversing through an IPv4 Network NAT-PT (Protocol Translation)
A ) Dual Stacking
ipv6 unicast-routing int f0/1 ipv6 add 2001:db8:3c4d:1::/64 eui-64 ip add 10.0.0.1 255.255.255.0
B ) 6 to 4 Tunneling
Router 1 (Has 2b a Dual Stack Router) int tunnel 0 ipv6 add 2001:db8:1:1::1/64 tunnel source 10.0.0.1 tunnel destination 10.0.1.1 tunnel mode ipv6ip
Page 26
C ) NAT-PT
Instead of local to global address translation, we have IPv4 to IPv6, IPv6 t0 IPv4, etc. Uses Static NAT, Dynamic NAT, & NAPT-PT. NAPT-PT (Network Address Port Translation Port Translation) Maps multiple IPv6 adds to 1 IPv4 add.
Page 27
WANs
Usually involves an SP (Service Provider).
WAN Terms:
CPE Customer Premises Equipment. Owned by subscriber. Demarcation Point Where the SPs equipment end a& the CPE begins, usually with a CSU/DSU. Local Loop This connects the demarcation point 2the closest switching office called the CO (Central Office). CO Connects the customers network to the providers switching network. Also called POP (Point of Presence). Toll Network Trunk line or collection of switches & facilities owned by the ISP.
PPPoE a PPP frame encapsulated in an Ethernet frame. Has lower MTU size than Ethernet & if firewall is not properly configured this can cause a great deal of problems. PPPoA PPP over ATM CABLE Also be called HFC (Hybrid Fibre-Coaxial) DSL Digital Subscriber Line. Deployed at the last mile or local loop, between the CPE & DSLAM (DSL Access Multiplexer) which has connections to other clients as well. ADSL uses ATM. MPLS Multiprotocol Label Switching. Imposes labels to packets & makes forwarding packets faster through the service providers network since theres no routing decisions made based on the IP adds. MPLS is WAN tech that operates at layer 3 & therefore has more capabilities than other WAN technologies, e.g. it can assign different priority levels to packets from SP clients. ATM Uses cells instead of packets. An ATM Switch is called a DSLAM.
Types of Connectors
V.35 Used to connect to a CSU/DSU EIA/TIA 332 EIA/TIA 449 EIA 530
PPP
Uses LCP (Link Control Protocol) to establish sessions, & NCP (Network Control Protocol) for multiple layer 3 protocols. LCP does authentication using PAP or CHAP. Allows callback but both the client & remote router have 2b configured for it 1st. PAP Password Authentication Protocol. Authenticates only once, when the session is created, & the password is sent in clear text. CHAP Challenge Handshake Authentication Protocol. More secure, checks periodically that the devices communicating are the correct ones. int s0/0/1 encapsulation ppp
Page 29
CCNA Revision Notes By C. T. Amos ppp authentication chap pap PAP will act as backup exit hostname router1 username router2 password amos username has 2b the hostname of the other communication router / device.
PPPoE
int f0/1 pppoe enable group global pppoe-client dial-pool-number 1 int dialer 0 ip add negotiated Logical interface ip add negotiatied Instruction to use DHCP ip mtu 1452 encapsulation ppp dialer pool 1 dialer-group 1 ppp authentication chap callin ppp chap hostname amos pp chap password cisco
Frame Relay
Access Rate The max speed of the link. Can be 1.54Mbps. CIR Committed information rate. Max speed the SP will allow a client. Can be 256Kbps. The default encapsulation for Frame Relay is Cisco and this can be changed as follows: int s0/0/1
Page 30
CCNA Revision Notes By C. T. Amos encapsulation frame-relay ietf - Internet Engineering Task Force encapsulation. encapsulation frame-relay - Uses the default cisco encapsulation. PVC Permanent Virtual Circuit SVC Switched Virtual Circuit
Router B Configuration PVC int s0/0/1 encapsulation frame-relay ietf frame-relay lmi-type ansi ip add 10.0.0.1 255.255.255.0
SVC int s0/0/1 encapsulation frame-relay ietf frame-relay lmi-type ansi ip add 10.0.0.1 255.255.255.0
Page 31
CCNA Revision Notes By C. T. Amos frame-relay lmi-type ansi etc no ip split-horizons - A prevents the router from advertising a Frame Relay route back 2the router from which it received path data. Point-to-Point Subinterfaces Each subinterface has a unique DLCI & subnet. Multipoint Subinterfaces All the subinterfaces are in the same subnet but each has a unique DLCI. DLCI Data Link Connection Identifiers. Values used to identify specific virtual circuits & route traffic to the correct destination. IARP (Inverse ARP) Used to map DLCIs toIP addresses. int s0/0/1 frame-relay interface-dlci 16 LMI (Link Management Interface) Auto detected on latest Cisco IOS versions LMI messages are sent on DLCI 0 A signaling standard that communicates PVC status between communication devices & has Keep Alives, etc. Keep alives keep the PVCs up & ensure they dont shut down due to inactivity. DE Discard Eligibility. This bit is set to 1 (on) when data exceeds the CIR & the network is congested. FECN Forward Explicit Congestion Notification Listen destination DTE, the route just traversed is congested. BECN Backward Explicit Congestion Notification Listen source DTE, the network is congested. int s0/0/1 encapsulation frame-relay - Uses default of cisco not IETF. int s0/0/1.2 point-to-point frame-relay lmi-type ansi - Instead of Ansi, the default of cisco cld have been used. frame-relay interface-dlci 101
Page 32
CCNA Revision Notes By C. T. Amos Subinterfaces make it possible to have multiple virtual circuits on a single serial interface. They operate like separate physical interfaces. sh frame-relay lmi sh frame-relay pvc Shows network congestion as well as all PVCs & DLCI numbers. sh frame-relay map This shows whether IARP is able to map a remote IP add 2 its DLCI #.
VPNs
Allow creation of private networks over the internet. 3 Types of VPNs: Remote Access VPNs Site to Site VPNs (Intranet) Extranet VPNs For providing limited access to suppliers, partners, etc, e.g. connecting a Bank to SAP. The Difference between a VPN & Frame Relay is that frame relay traffic traverses a private network (the service providers network) & VPN traffic traverses a public network (Internet). A VPN can also have higher bandwidth than Frame Relay or PPP connection coz it can make use of any access to the internet e.g. 3G & DSL.
VPN Protocols
GRE (Generic Routing Encapsulation) - A Cisco proprietary protocol that can work with non-IP traffic. PPPT (Point to Point Tunneling Protocol) Microsoft proprietary L2TP (Layer 2 Tunneling Protocol) - Created by Microsoft & Cisco & combines the capabilities of L2F (Layer 2 Forwarding) & PPTP. IPsec Most secure. A suite of protocols & algorithms that allows for secure data transmission. Functions on Layer 3 & works only with IP based networks.
Page 33
Page 34