CCNA Study Notes
CCNA Study Notes
Types of Networks
Peer to Peer - A peer to peer network is one in which lacks a dedicated server and
every computer acts as both a client and a server. This is a good networking solution when
there are 10 or less users that are in close proximity to each other. A peer to peer network
can be a security nightmare, because the people setting permissions for shared resources
will be users rather than administrators and the right people may not have access to the
right resources. More importantly the wrong people may have access to the wrong
resources, thus, this is only recommended in situations where security is not an issue.
Client/Server - This type of network is designed to support a large number of users
and uses dedicated server/s to accomplish this. Clients log in to the server/s in order to run
applications or obtain files. Security and permissions can be managed by 1 or more
administrators which cuts down on network users medling with things that they shouldn't
be. This type of network also allows for convenient backup services, reduces network traffic
and provides a host of other services that comes with the network operating system(NOS).
Centralized - This is also a client/server based model that is most often seen in UNIX
environments, but the clients are "dumb terminals". This means that the client may not
have a floppy drive, hard disk or CDROM and all applications and processing occur on the
server/s. As you can imagine, this requires fast and expensive server/s. Security is very
high on this type of network.
Network Topologies
Bus - This topology is an old one and essentially has each of the computers on the
network daisy-chained to each other. This type of network is usually peer-to-peer and uses
Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network
adapter and then connecting cables to the T-connectors on the computers on the right and
left. At both ends of the chain, the network must be terminated with a 50 ohm impedance
terminator. If a failure occurs with a host, it will prevent the other computers from
communicating with each other. Missing terminators or terminators with an incorrect
impedance will also cause problems.
As you can see if computer #1 sends a packet to computer #4, it must pass through
computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES: Excess network traffic, a failure may affect many users, problems are
difficult to troubleshoot.
Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires
that all devices are connected to a hub.
ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy
to modify.
DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you
were to burn down the phone company's central office, then anyone connected to it
wouldn't be able to make any phone calls.
Ring - The ring topology looks the same as the star, except that it uses special hubs and
ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures
affect many users.
Hybrid - Hybrid topologies are combinations of the above and are common on very
large networks. For example, a star bus network has hubs connected in a row (like a bus
network) and has computers connected to each hub as in the star topology.
Mesh - In a true mesh topology every node has a connection to every other node in the
network. A full mesh network can be very expensive, but provides redundancy in case of a
failure between links.
Wireless - As the name implies, wireless networks allow computers to comunicate
without the use of cables. IEEE 802.11b defines two pieces of equipment, a wireless station,
which is usually a PC or a Laptop with a wireless network interface card (NIC), and an
Access Point (AP),which acts as a bridge between the wireless stations and Distribution
System (DS) or wired networks. An 802.11b wireless network adapter can operate in two
modes, Ad-Hoc and Infrastructure. In infrastructure mode, all your traffic passes through a
wireless ?access point?. In Ad-hoc mode your computers talk directly to each other and do
not need an access point at all. 802.11b delivers data throughput of 11 Mbps.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and
no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and
cordless phones.
CABLING
The table below lists some of the various cable types.
Cable Type Also Known As Connector Maximum Length Speed
RG-8 or RG-11,
10Base5 AUI/DIX 500 meters(1640 ft) 10 mbps
Thicknet coax
10Base2 RG-58, thinnet coax BNC connector 185 meters(607 ft) 10 mbps
10BaseT Cat 3, 4, 5 twisted pair RJ-45 100 meters(328 ft) 10 mbps
100Base-TX Cat 5 twisted pair RJ-45 100 meters(328 ft) 100 mbps
2 Kilometers(6562
100Base-FX Fiber Optic ST, SC 200 mbps
feet)
1000Base-T - Gigabit
CAT5/CAT5e RJ-45 100 meters(328 ft) 1 gbps
Ethernet
This next table lists the transmission speeds of the various cable types.
Transmission Medium Transmission Speed
Thicknet 10mbps
Thinnet 10 mbps
cat 2 twisted pair 4 mbps
cat 3 twisted pair 10 mbps
cat 4 twisted pair 16 mbps
cat 5 twisted pair 1000 mbps
Fiber Optic 100 mbps - 1 gbps
802.11b 11 mbps
• Repeater: - Boosts signals in order to allow a signal to travel farther and prevent
attenuation. Attentuation is the degradation of a signal as it travels farther from its
origination. Repeaters do not filter packets and will forward broadcasts. Both
segments must use the same access method, which means that you can't connect a
token ring segment to an Ethernet segment. Repeaters can connect different cable
types.
• Bridge - Functions the same as a repeater, but can also divide a network in order to
reduce traffic problems. A bridge can also connect unlike network segments (ie.
token ring and ethernet). Bridges create routing tables based on the source address.
If the bridge can't find the source address it will forward the packets to all segments.
Bridging methods:
o Spanning Tree - Prevents looping where there exists more than one path
between segments
• Switch - A switch prevents traffic jams by ensuring that data goes straight from its
origin to its proper destination, with no wandering in between. Switches remember
the address of every node on the network, and anticipate where data needs to go. It
only operates with the computers on the same LAN. It isn't smart enough to send
data out to the internet, or across a WAN. These functions require a router.
• Router - A router is similar to a switch, but it can also connect different logical
networks or subnets and enable traffic that is destined for the networks on the other
side of the router to pass through. Routers can connect networks that use disimilar
protocols. Routers also typically provide improved security functions over a switch.
Unroutable protocols can't be fowarded.
o Half Duplex - Half duplex means that signals can be passed in either direction,
but not in both simultaneously. Half-duplex modems can work in full-duplex
mode.
o Full Duplex - Full duplex means that signals can be passed in either direction
simultaneously.
Modems can also be classified by their speed which is measured by the BAUD rate.
One baud is one electronic state change per second. Since a single state change can
involve more than a single bit of data, the Bits Per Second(BPS) unit of measurement
has replaced it as a better expression of data transmission speed. Common modem
speeds are V.34 at 28.8 kbps, V.34+ at 33.6 kbps and V.90 at 56 Kbps.
• ISDN Adapter - ISDN service is an older, but still viable technology offered by
phone companies in some parts of the U.S. ISDN requires an ISDN adapter instead
of a modem, and a phone line with a special connection that allows it to send and
receive digital signals.
• Proxy - A proxy server acts as a middle-man between clients and the Internet
providing security, administrative control, and caching services. When a user makes
a request for an internet service and it passes filtering requirements, the proxy
server looks in its local cache of previously downloaded web pages. If the item is
found in cache, the proxy server forwards it to the client. This reduces bandwidth
through the gateway. If the page is not in the cache, the proxy server uses Network
Address Translation (NAT) to use one of its own IP addresses to request the page
from the appropriate server.
• Data Link - The Data Link layer is the interface between the upper "software" layers
and the lower "hardware" Physical layer. One of its main tasks is to create and
interpret different frame types based on the network type in use. The Data Link layer
is divided into two sub-layers: the Media Access Control (MAC) sub-layer and the
Logical Link Control (LLC) sub-layer.
o MAC sub-layer enables multiple devices to share the same medium. MAC sub-
layer maintains physical device (MAC) addresses for communicating locally
(the MAC address of the nearest router is used to send information onto a
WAN).
• Network - The Network layer addresses messages and translates logical addresses
and names into physical addresses. It also manages data traffic and congestion
involved in packet switching and routing. It enables the option of specifying a service
address (sockets, ports) to point the data to the correct program on the destination
computer.
• Transport - The Transport layer provides flow control, error handling, and is
involved in correction of transmission/reception problems. It also breaks up large
data files into smaller packets, combines small packets into larger ones for
transmission, and reassembles incoming packets into the original sequence.
• Session - The Session layer handles security and name recognition to enable two
applications on different computers to communicate over the network. Manages
dialogs between computers by using simplex(rare), half-duplex or full-duplex. The
phases involved in a session dialog are as follows: establishment, data-transfer and
termination.
Frame Types
A frame type is the format of the packet that your Operating System will use to
communicate over your network. Below is a table of the different types:
802.1 Internetworking
Logical link control - LLC adds header information that identifies the upper layer
802.2
protocols sending the frame.
Ethernet - Media Access Control (MAC) sub-layer uses Carrier Sense Multiple Access
802.3
with Collision Detection(CSMA/CD)
802.4 Token bus LAN
802.5 Token Ring BUS
802.6 Metropolitan Area network (MAN)
802.7 Broadband
802.8 Fiber optic
802.9 Integrated voice/Data
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority. Like 100VG-Any LAN
Protocols
Protocols are the special set of rules that end points use in a telecommunication connection
when they communicate. These rules allow computers with dissimilar operating sytems,
network topologies, hardware, etc. to communicate. Next is a description of some of the
more common protocols:
• TCP/IP - TCP/IP is the protocol suite of the internet and will be covered in the next
section.
• IPX/SPX - These protocols were developed by Novell and are/were used with Novell
Netware. IPX is the fastest routable protocol and is not connection oriented. IPX
addresses are up to 8 characters in hexadecimal format. SPX is connection oriented.
• NetBeui - Stands for "NetBIOS Extended User Interface". It is the standard protocol
used by Microsoft's operating systems. It is NetBEUI that allows the "shares'
between machines. In reference to the NetBIOS distinction, NetBIOS is the
applications programming interface and NetBEUI is the transport protocol. NetBEUI is
a non-routable protocol meaning it will not allow communication through a router.
• Appletalk - AppleTalk is the name given to the set of protocol and networking
standards created by Apple Computer for use with the Macintosh family of
computers. AppleTalk is routable and automatically handles such things as assigning
of workstation and network addresses, message routing between networks, etc.
TCP/IP
TCP/IP Protocol Suite The TCP/IP protocol suite is made of many other protocols that
perform different functions. Below is a list of some of them:
• TCP - TCP breaks data into manageable packets and tracks information such as
source and destination of packets. It is able to reroute packets and is responsible for
guaranteed delivery of the data.
• SMTP - Used to reliably send and receive mail over the Internet.
• FTP - File transfer protocol is used for transferring files between remote systems.
Must resolve host name to IP address to establish communication. It is connection
oriented (i.e. verifies that packets reach destination).
• ARP - provides IP-address to MAC address resolution for IP packets. A MAC address
is your computer's unique hardware number and appears in the form 00-A0-F1-27-
64-E1 (for example). Each computer stores an ARP cache of other computers ARP-IP
combinations.
• POP3 - Post Office Protocol. A POP3 mail server holds mail until the workstation is
ready to receive it.
• IMAP - Like POP3, Internet Message Access Protocol is a standard protocol for
accessing e-mail from your local server. IMAP (the latest version is IMAP4) is a
client/server protocol in which e-mail is received and held for you by your Internet
server.
• TELNET - Provides a virtual terminal or remote login across the network that is
connection-based. The remote server must be running a Telnet service for clients to
connect.
• HTTP - The Hypertext Transfer Protocol is the set of rules for exchanging files (text,
graphic images, sound, video, and other multimedia files) on the World Wide Web. It
is the protocol controlling the transfer and addressing of HTTP requests and
responses.
• HTTPS - Signifies that a web page is using the Secure Sockets Layer (SSL) protocol
and is providing a secure connection. This is used for secure internet business
transactions.
• NTP - Network Time Protocol is a protocol that is used to synchronize computer clock
times in a network of computers.
• SNMP - Stands for Simple Network Management Protocol and is used for monitoring
and status information on a network. SNMP can be used to monitor any device that is
SNMP capable and this can include computers, printers, routers, mainframes,
gateways and many more.
TCP/IP Ports
Ports are what an application uses when communicating between a client and server
computer. Some common ports are:
• 21 FTP
• 23 TELNET
• 25 SMTP
• 69 TFTP
• 80 HTTP
• 110 POP3
TCP/IP Addressing
Every IP address can be broken down into 2 parts, the Network ID(netid) and the Host
ID(hostid). All hosts on the same network must have the same netid. Each of these hosts
must have a hostid that is unique in relation to the netid. IP addresses are divided into 4
octets with each having a maximum value of 255. We view IP addresses in decimal notation
such as 124.35.62.181, but it is actually utilized as binary data.
NOTE: 127.x.x.x is reserved for loopback testing on the local system and is not used on live
systems. The following address ranges are reserved for private networks:
10.0.0.0 - 10.254.254.254
172.16.0.0 - 172.31.254.254
192.168.0.0 - 192.168.254.254
IP addresses can be class A, B or C. Class A addresses are for networks with a large number
of hosts. The first octet is the netid and the 3 remaining octets are the hostid. Class B
addresses are used in medium to large networks with the first 2 octets making up the netid
and the remaining 2 are the hostid. Class C is for smaller networks with the first 3 octets
making up the netid and the last octet comprising the hostid. The Network ID and the Host
ID are determined by a subnet mask. The default subnet masks are as follows:
CLASS DEFAULT SUBNET # OF SUBNETS # OF HOSTS PER SUBNET
Class A 255.0.0.0 126 16,777,214
Class B 255.255.0.0 16,384 65,534
Class C 255.255.255.0 2,097,152 254
What if you wanted more than 1 subnet? Subnetting allows you to create multiple logical
networks that exist within a single Class A, B, or C network. If you don't subnet, you will
only be able to use one network from your Class A, B, or C network. When subnetting is
employed, the multiple networks are connected with a router which enables data to find its
way between networks. On the client side, a default gateway is assigned in the TCP/IP
properties. The default gateway tells the client the IP address of the router that will allow
their computer to communicate with clients on other networks.
IPv6
The previous information on TCP/IP has referred to IPv4, however, this addressing scheme
has run out of available IP addresses due to the large influx of internet users and expanding
networks. As a result, the powers that be had to create a new addressing scheme to deal
with this situation and developed IPv6. This new addressing scheme utilizes a 128 bit
address (instead of 32) and utilizes a hex numbering method in order to avoid long
addresses such as 132.64.34.26.64.156.143.57.1.3.7.44.122.111.201.5. The hex address
format will appear in the form of 3FFE:B00:800:2::C for example.
DHCP
DHCP stands for Dynamic Host Configuration Protocol and provides a solution that
automatically assigns IP addresses to computers on a network. When a client is configured
to receive an IP address automatically, It will send out a broadcast to the DHCP server
requesting an address. The server will then issue a "lease" and assign it to that client. The
time period that a lease will last can be specified on the server. Some of the benefits of
DHCP include the following:
• Prevents users from making up their own IP addresses.
• Prevents incorrect gateway or subnet masks from being entered by your helpdesk.
• Handy in situations where you have a large sales staff that only have to work 1 day a
week. On that one day they bring their laptops and they can just plug them into the
network and they are all set.
DHCP clients will attempt to renew their leases when %50 of the lease has expired. The
client will send a message to the server that assigned the lease. Assuming the DHCP server
isn't on fire or anything it will return a message with the new lease. If the server is
unavailable, then the client can continue functioning as it has %50 remaining still. The client
will continue as normal until the lease reaches %87.5 used at which time it broadcast to all
DHCP servers and attempt to get a new lease. If the client receives a rejection message or
the lease expires then the client must start all over again and will get a different IP address.
If the lease expires and the client is unable to get a new one then the user will not be able
to communicate over the network.
NETBIOS
There are several different methods of resovling names to IP addresses. Before getting into
the different methods, it is important to understand the role of NetBIOS. When talking
about Netbios, we typically refer to the concept of Netbios name which is the name assigned
to your computer. Netbios allows applications to talk to each other using protocols such as
TCP/IP that support Netbios. Netbios is typically seen in other forms such as Netbeui and
NetBT. These are the main functions that Netbios serves:
• Starting and stopping sessions.
• Name registration
• NETBIOS Name Server - When using a Netbios name server, the cache is checked
first and if the name is not found the destination host's name is sent to the name
server. After the name server resolves the name to an IP address, it is returned to
the source host. When the source host receives the information it uses ARP to
resolve the IP address of the destination host to it's MAC address. Microsoft uses
WINS as a NETBIOS name server.
• LMHOSTS File - An lmhosts file is a text file that is used to manually configure
Netbios names. In order to work, each entry in the lmhosts file must be unique, have
a valid IP address for the Netbios name and be spelled correctly. On large networks
configuring LMHOSTS files on all clients is not feasible, so these are not used much
anymore.
• Hosts File - The hosts file is a little different than the lmhosts file in that it will
resolve both local and remote names. If the host name can't be resolved and no
other alternative name resolution processes are in place, the user will receive an
error. Once the host name is parsed from the host file, ARP takes over and attempts
to resolve the IP address to a MAC address. Like the lmhosts method, this is static
name resolution.
DNS
TCP/IP networks used to use hosts files to resolve IP addresses to host names or domain
names. Networks began growing to the point where the administration and the traffic
needed to maintain this file became unbearable and DNS was born. A DNS client(aka
resolver) sends requests to the DNS nameserver which responds with the requested info,
another server to query or a failure message. This process is very similar to calling
information. You call them with a name, they check their database and give you the phone
number. There are a variety of roles a nameserver can satisfy within the zone that they are
responsible for:
• Primary Nameserver - Gathers DNS information from local files and is a focal point
for adding hosts and domains.
• Secondary Nameserver - Gathers the data for its' zone(s) from another DNS
server. Secondary nameservers provide redundancy, traffic on primary server and
quicker access for locations that are remote in regards to the primary server.
• Caching Only Nameserver - These do not have a zone that they are responsible
for. Their databases only contain info that is received from resolutions that it has
made since the server was last started.
Nameservers are distributed into tiers called domains.
Domains:
Microsoft discusses domains in terms of a hierarchical "domain name space" which they
refer to as being like a tree structure. There are several different domain levels as listed
below:
• Root level domains - The top of the tree.
• Top level domains - These are divided into different categories. Com, net, mil, edu,
org and gov are the most common.
• Second level domains - These domains make up the rest of networks as all sub-
domains are categorized under this heading. So if you visit Intel's site, you are
visiting the sub-domain intel.com. Within intel.com many other sub-domains may
also exist.
• Hosts - Hosts are the final level in the hierarchy as they are the individual
computers that occupy or comprise a domain.
DNS Records:
Below are some of the common DNS records and their purpose:
• A - The A-record is used for hosts on a network. It is used to translate human
friendly domain names such as "www.mcmcse.com" into an IP-addresses such as
206.67.72.48.
• CNAME - CNAME (canonical name) records are used to create aliases. Often
computers on the Internet have multiple functions such as web server, FTP server,
mail server etc. To mask this, CNAME-records can be used to give a single computer
multiple names (aliases). For example computer "xyz.com" may be both a web-
server and an ftp-server, so two CNAME-records are defined: "www.xyz.com" =
"xyz.com" and "ftp.xyz.com" = "xyz.com".
• PTR - PTR (pointer) records map IP addresses to domain names which is the reverse
of A-records.
NAT/ICS
NAT stands for Network Address Translation and is a commonly used IP translation and
mapping technology. Using a device (such as a router) or piece of software that implements
NAT allows an entire home or office network to share a single internet connection over a
single IP address. A single cable modem, DSL modem, or even 56k modem could connect all
the computers to the internet simultaneously. Additionally, NAT keeps your home network
fairly secure from hackers. NAT is built in to the most common Internet Connection Sharing
technologies around. Microsoft's implementation of NAT is called Internet Connection
Sharing (ICS) and is supported by Windows 98SE and Windows 2000. ICS is a NAT based
routing application, designed to share an Internet connection among multiple computers
connected via a LAN. ICS can handle both dial-up and broadband based Internet
connections. ICS can handle networks with clients running any operating system, as long as
the OS supports the TCP/IP protocol. The clients can have their TCP/IP information assigned
manually or they can run as DHCP clients, obtaining their TCP/IP settings from ICS' built-in
DHCP server.
Troubleshooting TCP/IP
TCP/IP offers several tools that are helpful in the troubleshooting process and provide
information to help locate and correct problems. Some of these are listed below:
• ARP - Provides a mapping from the logical 32-bit TCP/IP address to the physical 48-
bit MAC address (i.e. translates a IP address into MAC address).
• TELNET - Provides a virtual terminal or remote login across the network that is
connection-based and handles its own session negotiation. The remote server must
be running a Telnet service for clients to connect. Defaults settings are Port 23 VT100
terminal emulation.
• TRACERT - By sending out ICMP packets, it determines the path taken by a data
packet to reach it?s destination and can help determine at what point a network
connection is now longer active. Can help troubleshoot network response time
issues.
• NETSTAT - Displays in-depth detail about TCP/IP protocol status and statistics.
• IPCONFIG - Below are the ipconfig switches that can be used at a command
prompt.
- ipconfig /all will display all of your IP settings.
- ipconfig /renew forces the DHCP server, if available to renew a lease.
- ipconfig /release forces the release of a lease.
• PING - Uses ICMP to verify a connection to a remote host by sending echo requests
and "listening" for reply packets.
• NSLOOKUP - This tool queries a DNS database for information about DNS objects
and can be used to troubleshoot name resolution problems.
General troubleshooting strategy includes the following steps:
1. Establish the symptoms
5. Implement a solution
2. Ping own IP address - Verifies that a valid IP address was entered for this computer.
3. Ping default gateway - Typically this would be the near side of a router. If you can
ping this address, then you should be able to ping other hosts on your same subnet.
4. Ping far side of router - This will verify that the routing table is correct.
5. Ping remote host - If this works then it would appear that there are valid
communications.
6. If you are unable to connect to a host via host or domain name, see if you can
connect to it using its IP address. If so, then you are likely having name resolution
problems and should check your DNS configuration.
For the exam troubleshooting section, you will need to know how to solve various problems
based on information such as PING/TRACERT/IPCONFIG output, topology type, operating
system, network configuration, visual indicators (link lights, collision lights), etc. There will
most likely be diagrams that you will have to glean information from.
WAN Technologies
This section outlines some common WAN technologies you will need to know:
• Packet and Circuit Switching - Packet switching refers to protocols in which
messages are divided into packets before they are sent. Each packet is then
transmitted individually and can even follow different routes to its destination. Once
all the packets forming a message arrive at the destination, they are recompiled into
the original message. Most modern Wide Area Network (WAN) protocols, including
TCP/IP and Frame Relay are based on packet-switching technologies. In contrast,
normal telephone service is based on a circuit-switching technology, in which a
dedicated line is allocated for transmission between two parties. Circuit-switching is
ideal when data must be transmitted quickly and must arrive in the same order in
which it is sent. This is the case with most real-time data, such as live audio and
video. Packet switching is more efficient and robust for data that can withstand some
delays in transmission, such as e-mail messages and Web pages.
• FDDI - Fiber Distributed Data Interface (FDDI) is an appealing choice for high-speed
data networking. Essentially, it is a very high-speed token ring network connected by
optical fibers. With a data transfer rate of 100Mbps, the ring can support up to 500
nodes with as much as 2 km of spacing between adjacent nodes.
• ATM - ATM stands for Asynchronous Transfer Mode and is a high-speed, packet-
switching technique that uses short fixed length packets called cells. ATM can
transmit voice, video, and data over a variable-speed LAN and WAN connections at
speeds ranging from 1.544Mbps to as high as 622Mbps. ATM is capable of supporting
a wide range of traffic types such as voice, video, image and data.
• Frame Relay - Frame relay is a secure, private network that utilizes a logical path or
?virtual circuit? to allocate bandwidth for high performance transmissions. Frame
relay is the premier high-speed packet-switching protocol communicating data,
imaging, and voice between multiple locations. Frame relay is available in a range of
bandwidths from 56 Kbps to full T1 (1.54 Mbps).
• PPTP - The Point to Point Tunneling Protocol (PPTP) provides for the secure transfer
of data from a remote client to a private server by creating a multi-protocol Virtual
Private Network(VPN) by encapsulating PPP packets into IP datagrams. Setting Up
PPTP requires a PPTP Client, PPTP Server and a Network Access Server(NAS). PPTP
does not support the Appletalk protocol.
• SSL - SSL (Secure Sockets Layer) uses a technique called public-key cryptography to
provide encrypted connections. This enables you to move information across the
Internet with confidence that it will not be intercepted or modified in transit. This is
heavily used in e-commerce and can be identified by a URL that begins with HTTPS.
• Kerberos - This form of security has been evolving in the Unix world for a long time
and is now becoming a standard. Kerberos provides mutual authentication between a
client and a server or between servers before a network connection is opened
between them. Rather than sharing a password, computers share a cryptographic
key, and they use knowledge of this key to verify each other's identities. Kerberos
security only works with computers running Kerberos security software.
Network Management
This section discusses network management, storage and recovery concepts:
• VLAN - A virtual LAN is a local area network with a definition that maps workstations
on some other basis than geographic location (for example, by department, type of
user, or primary application). The virtual LAN controller can change or add
workstations and manage loadbalancing and bandwidth allocation more easily than
with a physical picture of the LAN. Network management software keeps track of
relating the virtual picture of the local area network with the actual physical picture.
• TDR (Time Domain Reflectometer): Sends a signal down a cable and measures
the distance that the signal travelled before bouncing back(like sonar). Used to find
opens and shorts in cables.
• Protocol Analyzers - This tool is used to monitor network traffic and display packet
and protocol statistics and information.
• Crimping Tools - Crimping tools are used to connect cabling to their appropriate
connectors. There are different crimping tools for different types of connections.
• Punch Down Tool - A punch down tool is used to connect cabling such as telephone
and ethernet to wall jacks.
CCNA Study Notes for Exam 640-607
OSI Model
LAN Design
Network Devices
Bridging/Switching
VLANs
Lan Protocols
TCP/IP
IPX/SPX
WAN Protocols
Frame Relay
ISDN
ATM
PPP
Cisco IOS
Security
Routing
RIP
OSPF
IGRP and EIGRP
Other Routing Info
Additional Links
OSI Model:
The OSI model is a layered model and a conceptual standard used for defining standards to
promote multi-vendor integration as well as maintain constant interfaces and isolate
changes of implementation to a single layer. It is NOT application or protocol specific. In
order to pass any Cisco exam, you need to know the OSI model inside and out.
IP, IPX,
Handles addressing, translates logical addresses and names to physical Router and
Network NWLink,
addresses, routing and traffic management. brouter
NetBEUI
Packages raw bits into frames making it transmitable across a network
link and includes a cyclical redundancy check(CRC). It consists of the
LLC sublayer and the MAC sublayer. The MAC sublayer is important
Switch, bridge
**Data Link to remember, as it is responsible for appending the MAC address of None
and brouter
the next hop to the frame header. On the contrary, LLC sublayer uses
Destination Service Access Points and Source Service Access Points
to create links for the MAC sublayers.
Physical layer works with the physical media for transmitting and
receiving data bits via certain encoding schemes. It also includes Multiplexer
Physical None
specifications for certain mechanical connection features, such as the and repeater
adaptor connector.
The table above mentions the term "MAC Address". A MAC address is a 48 bit address for
uniquely identifying devices on the network. Something likes 00-00-12-33-FA-BC, we call
this way of presenting the address a 12 hexadecimal digits format. The first 6 digits specify
the manufacture, while the remainders are for the host itself. ARP Protocol is used to
determine the IP to MAC mapping. And of course, MAC addresses cannot be duplicated in
the network or problems will occur.
Data encapsulation takes place in the OSI model. It is the process in which the information
in a protocol is wrapped in the data section of another protocol. The process can be broken
down into the following steps:
User information -> data -> segments -> packets/datagrams -> frames -> bits.
When discussing the OSI model it is important to keep in mind the differences between
"Connection-oriented" and "Connectionless" communications. A connection oriented
communication has the following characteristics:
A session is guaranteed.
Acknowledgements are issued and received at the transport layer, meaning if the
sender does not receive an acknowledgement before the timer expires, the packet is
retransmitted.
Phrases in a connection-oriented service involves Call Setup, Data transfer and Call
termination.
All traffic must travel along the same static path.
A failure along the static communication path can fail the connection.
A guaranteed rate of throughput occupies resources without the flexibility of dynamic
allocation.
Reliable = SLOW (this is always the case in networking).
(Note: Connectionless communication does have some reliability PROVIDED by upper layer
Protocols.)
LAN Design:
Ethernet
When we talk about a LAN, Ethernet is the most popular physical layer LAN technology
today. Its standard is defined by the Institute for Electrical and Electronic Engineers as IEEE
Standard 802.3, but was originally created by Digital Intel Xerox (DIX). According to IEEE,
information for configuring an Ethernet as well as specifying how elements in an Ethernet
network interact with one another is clearly defined in 802.3.
For half-duplex Ethernet 10BaseT topologies, data transmissions occur in one direction at a
time, leading to frequent collisions and data retransmission. In contrast, full-duplex devices
use separate circuits for transmitting and receiving data and as a result, collisions are
largely avoided. A collision is when two nodes are trying to send data at the same time. On
an Ethernet network, the node will stop sending when it detects a collision, and will wait for
a random amount of time before attempting to resend, known as a jam signal. Also, with
full-duplex transmissions the available bandwidth is effectively doubled, as we are using
both directions simultaneously. You MUST remember: to enjoy full-duplex transmission, we
need a switch port, not a hub, and NICs that are capable of handling full duplex. Ethernet?s
media access control method is called Carrier sense multiple access/ collision dectect
(CSMA/CD). Because of Ethernets collision habits it is also known as the ?best effort
delivery system.? Ethernet cannot carry data over 1518 bytes, anything over that is broken
down into ?travel size packets.?
Fast Ethernet
For networks that need higher transmission speeds, there is the Fast Ethernet standard
called IEEE 802.3u that raises the Ethernet speed limit to 100 Mbps! Of course, we need
new cabling to support this high speed. In 10BaseT network we use Cat3 cable, but in
100BaseT network we need Cat 5 cables. The three types of Fast Ethernet standards are
100BASE-TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and
100BASE-T4 which utilizes an extra two wires for use with level 3 UTP cable.
Gigabit Ethernet
Gigabit Ethernet is an emerging technology that will provide transmission speeds of
1000mbps. It is defined by the IEEE standard The 1000BASE-X (IEEE 802.3z). Just like all
other 802.3 transmission types, it uses Ethernet frame format, full-duplex and media access
control technology.
Token Ring
Token Ring is an older standard that isn't very widely used anymore as most have migrated
to some form of Ethernet or other advanced technology. Ring topologies can have
transmission rates of either 4 or 16mbps. Token passing is the access method used by token
ring networks, whereby, a 3bit packet called a token is passed around the network. A
computer that wishes to transmit must wait until it can take control of the token, allowing
only one computer to transmit at a time. This method of communication aims to prevent
collisions. Token Ring networks use multistation access units (MSAUs) instead of hubs on an
Ethernet network. For extensive information on Token Ring, visit Cisco's website.
Network Devices:
In a typical LAN, there are various types of network devices available as outlined below.
• Hub Repeat signals received on each port by broadcasting to all the other connected
ports.
• Repeaters Used to connect two or more Ethernet segments of any media type, and
to provide signal amplification for a segment to be extended. In a network that uses
repeater, all members are contending for transmission of data onto a single network.
We like to call this single network a collision domain. Effectively, every user can only
enjoy a percentage of the available bandwidth. Ethernet is subject to the "5-4-3" rule
regarding repeater placement, meaning we can only have five segments connected
using four repeaters with only three segments capable of accommodating hosts.
• Bridge A layer 2 device used to connect different networks types or networks of the
same type. It maps the Ethernet addresses of the nodes residing on each segment
and allows only the necessary traffic to pass through the bridge. Packet destined to
the same segment is dropped. This "store-and-forward" mechanism inspects the
whole Ethernet packet before making a decision. Unfortunately, it cannot filter out
broadcast traffic. Also, it introduces a 20 to 30 percent latency when processing the
frame. Only 2 networks can be linked with a bridge.
• Switch Can link up four, six, eight or even more networks. Cut-through switches run
faster because when a packet comes in, it forwards it right after looking at the
destination address only. A store-and-forward switch inspects the entire packet
before forwarding. Most switches cannot stop broadcast traffic. Switches are layer 2
devices.
• Routers Can filter out network traffic also. However, they filter based on the protocol
addresses defined in OSI layer 3(the network layer), not based on the Ethernet
packet addresses. Note that protocols must be routable in order to pass through the
routers. A router can determine the most efficient path for a packet to take and send
packets around failed segments.
• Brouter Has the best features of both routers and bridges in that it can be
configured to pass the unroutable protocols by imitating a bridge, while not passing
broadcast storms by acting as a router for other protocols.
Bridging/Switching:
Bridge - A layer 2 device used to connect different networks types or networks of the
same type. It maps the Ethernet addresses of the nodes residing on each segment and
allows only the necessary traffic to pass through the bridge. Packet destined to the same
segment is dropped. This "store-and-forward" mechanism inspects the whole Ethernet
packet before making a decision. Unfortunately, it cannot filter out broadcast traffic. Also, it
introduces a 20 to 30 percent latency when processing the frame. Only 2 networks can be
linked with a bridge.
Switch - Switches are layer 2 devices that can link up four, six, eight or even more
networks. Switches are the only devices that allow for microsegmentation. Cut-through
switches run faster because when a packet comes in, it forwards it right after looking at the
destination address only. A store-and-forward switch inspects the entire packet before
forwarding. Most switches cannot stop broadcast traffic. Switches are considered dedicated
data link device because they are close to a 100 % of the bandwidth. While bridging does
most of its work by hardware, switches use fabric/software to handle most of its work.
Store-and-forward - The entire frame is received before any forwarding takes place. The
destination and/or the source addresses are read and filters are applied before the frame is
forwarded. Latency occurs while the frame is being received; the latency is greater with
larger frames because the entire frame takes longer to read. Error detection is high because
of the time available to the switch to check for errors while waiting for the entire frame to
be received. This method discards frames smaller than 64 bytes (runts) and frames larger
than 1518 bytes (giants).
Cut-Through - The switch reads the destination address before receiving the entire frame.
The frame is then forwarded before the entire frame arrives. This mode decreases the
latency of the transmission and has poor error detection. This method has two forms, Fast-
forward and fragment-free.
• Fast-forward switching - Fast-forward switching offers the lowest level of latency
by immediately forwarding a packet after receiving the destination address. Because
fast-forward switching does not check for errors, there may be times when frames
are relayed with errors. Although this occurs infrequently and the destination
network adapter discards the fault frame upon receipt. In networks with high
collision rates, this can negatively affect available bandwidth.
• Fragment Free Switching - Use the fragment-free option to reduce the number of
collisions frames forwarded with errors. In fast-forward mode, latency is measured
from the first bit received to the first bit transmitted, or first in, first out (FIFO).
Fragment-free switching filters out collision fragments, which are the majority of
packets errors, before forwarding begins. In a properly functioning network, collision
fragments must be smaller then 64 bytes. Anything greater than 64 byes is a valid
packet and is usually received without error. Fragment-free switching waits until the
received packet has been determined not to be a collision fragment before
forwarding the packet. In fragment-free, latency is measured as FIFO.
Spanning-Tree Protocol - Allows duplicate switched/bridged paths without incurring the
latency effects of loops in the network.
VLANs:
A VLAN is a logical grouping of devices or users. These devices or users can be grouped by
function, department application and so on, regardless of their physical segment location.
VLAN configuration is done at the switch via switching fabric. A VLAN can be used to reduce
collisions by separating broadcast domains within the switch. In other words, VLANs create
separate broadcast domains in a switched network. Frame tagging at layer 2 does this.
Frame tagging is a gaining recognition as the standard for implementing VLANs, and is
recognized by IEEE 802.1q. Frame tagging uniquely assigns a VLAN ID to each frame. This
identifier is understood and examined by each switch prior to any broadcasts or
transmissions to other switches, routers, and end-stations devices. When the frame exits
the network backbone, the switch removes the identifier before the frame is transmitted to
the target end station. This effectively creates an environment with fewer collisions. The key
to this is that ports in a VLAN share broadcasts, while ports not in that VLAN cannot share
the broadcasts. Thus users in the same physical location can be members of different
VLANs. We can plug existing hubs into a switch port and assign them a VLAN of their own to
segregates users on the hubs. Frame filtering examines particular information about each
frame. A filtering table is developed for each switch; this provides a high level of
administrative control because it can examine many attributes of each frame. Frame
filtering is slowly being erased and replaced by the frame tagging method.
VLANs can be complicated to set up. VLANs use layer 2 addressing, meaning that routers
are required between separate VLANs. The advantage of deploying layer 2 addresses is that
layer 2 addressing is faster to process. It is also quite common for administrators to set up
multiple VLANs with multiple access lists to control access. Layer 3 routing provides the
ability for multiple VLANs to communicate with each other, which means that users in
different locations can reside on the same VLAN. This is a flexible approach to network
design.
VLANs are configured on the switch three ways, port centric, static and dynamically. In port-
centric VLANs, all the nodes connected to ports in the same VLAN are assigned the same
VLAN ID. Packets do not ?leak? into other domains, and are easily administered and provide
great security between VLANs. Some say that static configured VLANs are the same as port
centric, because static VLANs use the port centric method for assigning them to switch
ports. Dynamic VLANs are ports on a switch that can automatically determine their VLAN
assignments. Dynamic VLAN functions are based on MAC addresses, logical addressing, or
protocol type of the data packets. When a station is initially connected to an unassigned
switch port, the appropriate switch checks the MAC entry in the management database and
dynamically configures the port with the corresponding VLAN configuration. The major high
points of this method are less administration overhead, of course only after the first
administration of the database within the VLAN management software.
VLAN Switching
VLAN Considerations
Lan Protocols:
The following sections will introduce the core LAN protocols that you will need to know for
the exam.
TCP/IP:
Every IP address can be broken down into 2 parts, the Network ID(netid) and the Host
ID(hostid). All hosts on the same network must have the same netid. Each of these hosts
must have a hostid that is unique in relation to the netid. IP addresses are divided into 4
octets with each having a maximum value of 255. We view IP addresses in decimal notation
such as 124.35.62.181, but it is actually utilized as binary data so one must be able to
convert addresses back and forth.
The following table explains how to convert binary into decimal and visa versa:
Decimal Binary When converting binary data to decimal, a
128 10000000 "0" is equal to 0. "1" is equal to the number
that corresponds to the field it is in. For
64 01000000 example, the number 213 would be
32 00100000 11010101 in binary notation. This is
16 00010000 calculated as follows:
8 00001000 128+64+0+16+0+4+0+1=213. Remember
that this only represents 1 octet of 8 bits,
4 00000100
while a full IP address is 32 bits made up of
2 00000010 4 octets. This being true, the IP address
213.128.68.130 would look like 11010101
1 00000001
10000000 01000100 10000010.
A subnet mask blocks out a portion of an IP address and is used to differentiate between
the hostid and netid. The default subnet masks are as follows:
Class Default Subnet # of Subnets # of Hosts Per Subnet
Class A 255.0.0.0 126 16,777,214
Class B 255.255.0.0 16,384 65,534
Class C 255.255.255.0 2,097,152 254
In these cases, the part of the IP address blocked out by 255 is the netid.
In the table above, the it shows the default subnet masks. What subnet mask do you use
when you want more that 1 subnet? Lets say, for example, that you want 8 subnets and will
be using a class C address. The first thing you want to do is convert the number of subnets
into binary, so our example would be 00001000. Moving from left to right, drop all zeros
until you get to the first "1". For us that would leave 1000. It takes 4 bits to make 8 in
binary so we add a "1" to the first 4 high order bits of the 4th octet of the subnet
mask(since it is class C) as follows: 11111111.11111111.11111111.11110000 =
255.255.255.240. There is our subnet mask.
Lets try another one...Lets say that you own a chain of stores that sell spatulas in New York
and you have stores in 20 different neighborhoods and you want to have a separate subnet
on your network for each neighborhood. It will be a class B network. First, we convert 20 to
binary - 00010100. We drop all zeros before the first "1" and that leaves 10100. It takes 5
bits to make 20 in binary so we add a "1" to the first 5 high order bits which gives:
11111111.11111111.11111000.00000000 = 255.255.248.0. The following table shows a
comparison between the different subnet masks.
Mask # of Subnets Class A Hosts Class B Hosts Class C Hosts
192 2 4,194,302 16,382 62
224 6 2,097,150 8,190 30
240 14 1,048,574 4,094 14
248 30 524,286 2,046 6
252 62 262,142 1,022 2
254 126 131,070 510 Invalid
255 254 65,534 254 Invalid
Note: 127.x.x.x is reserved for loopback testing on the local system and is not used on live
systems.
TCP/IP Ports - Ports are what an application uses when communicating between a client and
server computer. Some common TCP/IP ports are:
20 FTP-DATA
21 FTP
23 TELNET
25 SMTP
69 TFTP
70 GOPHER
80 HTTP
110 POP3
137 NetBIOS name service
138 NetBIOS datagram service
139 NetBIOS
161 SNMP
You need to understand Buffering, Source quench messages and Windowing. Buffering
allows devices to temporarily store bursts of excess data in memory. However, if data keep
arriving at high speed, buffers can go overflow. In this case, we use source quench
messages to request the sender to slow down.
Windowing is for flow-control purpose. It requires the sending device to send a few packets
to the destination device and wait for the acknowledgment. Once received, it sends the
same amount of packets again. If there is a problem on the receiving end, obviously no
acknowledgement will ever come back. The sending source will then retransmits at a slower
speed. This is like trial and error, and it works. Note that the window size should never be
set to 0 - a zero window size means to stop transmittion completely.
3COM?s IP addressing tutorial is just superior. It covers basic IP addressing options as well
as subnetting and VLSM/CIDR.
IPX/SPX:
IPX will also be an important issue to consider in network management given the fact there
many companies still use Netware servers. There are two parts to every IPX Network
address - the Network ID and the Host ID. The first 8 hex digits represent the network ID,
while the remaining hex digits represent the host ID, which is most likely the same as the
MAC address, meaning we do not need to manually assign node addresses. Note that valid
hexadecimal digits range from 0 through 9, and hexadecimal letters range from A through F.
FFFFFFFF in hexadecimal notation = 4292967295 in decimal.
WAN Protocols:
In general, there are three broad types of WAN access technology. With Leased Lines, we
have point-to-point dedicated connection that uses pre-established WAN path provided by
the ISP. With Circuit Switching such as ISDN, a dedicated circuit path exist only for the
duration of the call. Compare to traditional phone service, ISDN is more reliable and is
faster. With Packet Switching, all network devices share a single point-to-point link to
transport packets across the carrier network - this is known as virtual circuits.
Frame Relay:
Frame Relay has the following characteristics:
successor to X.25
has less overhead than X.25 because it relies on upper layer protocols to perform error
checking.
Speed in between the range of 56 Kbps to 2.078 Mbps.
uses Data Link Connection Identifiers(DLCI) to identify virtual circuits, with DLCI
number between 16 and 1007.
uses Local Management Interfaces(LMI) to provide info on the DLCI values as well as
the status of virtual circuits. Cisco routers support Cisco(Default), ANSI and Q933a.
to set up frame relay, we need to set the encapsulation to frame-relay in either the
Cisco(Default) mode or the IETF mode, although Cisco encapsulation is required to connect
two Cisco devices.
LMI type is configurable, but by default it is being auto-sensed.
generally transfer data with permanent virtual circuits (PVCs), although we can use
switched virtual circuits (SVCs) as well.
SVC is for transferring data intermittently.
PVC does not have overhead of establishing and terminating a circuit each time
communication is needed.
Committed Information Rate(CIR) is the guaranteed minimum transfer rate of a
connection
Cisco has a web page that describes the configuration and troubleshooting of Frame relay at
http://www.cisco.com/warp/public/125/13.html
ISDN:
ISDN has the following characteristics:
Works at the Physical, Data Link, and Network Layers.
Often used in backup DDR Dial on Demand Routing.
Makes use of existing telephone.
Supports simultaneous data and voice.
Max speed at 125 Kbps with PPP Multilink.
Call setup and data transfer is faster than typical modems.
BRI has 2 x 64 1Kbps B Channels for data and one 16 Kbps D Channel for control
PRI has 23 x B Channels and one D Channel in the US, or 30 x B Channel and one D
Channel in Europe.
E protocol specifies ISDN on existing telephone network
I protocol specifies Concepts, terminology, and Services
Q protocol specifies switching and signaling
ISDN Reference Points include R(between non ISDN equipment and TA), S(between
user terminals and NT2), T(between NTI and NT2 devices) and U(between NTI devices and
Line Termination Equipment in North America)
router always connected by the U interface into NT1
BRI interface is considered Terminal Equipment type 1 TE1
TE1 is built into the ISDN standards
Needs to have Terminal Adapter TA to use TE2
Cisco has a web page with links about the configuration and troubleshooting of ISDN here
ATM:
ATM stands for Asynchronous Transfer Mode and is a high-speed, packet-switching
technique that uses short fixed length packets called cells which are about 53 bits in length.
ATM can transmit voice, video, and data over a variable-speed LAN and WAN connections at
speeds ranging from 1.544Mbps to as high as 622Mbps. I recently read that the new
standard may be 2Gbps. ATM's speed is derived from the use of short fixed length cells,
which reduce delays, and the variance of delay for delay-sensitive services such as voice
and video. ATM is capable of supporting a wide range of traffic types such as voice, video,
image and data.
PPP:
As an improvement to Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP) was
mainly for the transfer of data over slower serial interfaces. It is better than SLIP because it
provides multiprotocol support, error correction as well as password protection. It is a Data
Link Layer protocol used to encapsulate higher protocols to pass over synchronous or
asynchronous communication lines. PPP is capable of operating across any DTE/DCE device,
most commonly modems, as long as they support duplex circuits. There are 3 components
to PPP:
HDLC(High-level Data Link Control) - Encapsulates the data during transmission and is
a link layer protocol which is also the default Cisco encapsulation protocol for synchronous
serial links. HDLC is supposed to be an open standard, but Cisco's version is proprietary,
meaning it can only function with Cisco routers.
LCP(Link Control Protocol) - Establishes, tests and configures the data link connection.
NCPs(Network Control Protocols) - Used to configure the different communication
protocols, allowing them on the same line simultaneously. Microsoft uses 3 NCPs for the 3
protocols at the Network Layer (IP, IPX and NetBEUI)
PPP communication occurs in the following manner: PPP sends LCP frames to test and
configure the data link. Next, authentication protocols are negotiated to determine what sort
of validation is used for security. Below are 2 common authentication protocols:
PAP is similar to a network login but passwords are sent as clear text. It is normally
only used on FTP sites.
CHAP uses encryption and is a more secure way of sending passwords.
Then NCP frames are used to setup the network layer protocols to be used. Finally, HDLC is
used to encapsulate the data stream as it passes through the PPP connection.
Point-to-Point Tunneling Protocol(PPTP) provides for the secure transfer of data from a
remote client to a private server by creating a multi-protocol Virtual Private Network(VPN)
by encapsulating PPP packets into IP datagrams. There are 3 steps to setup a secure
communication channel:
1. PPP connection and communication to the remote network are established.
2. PPTP creates a control connection between the client and remote PPTP server
There is a very helpful web site with detailed tutorials on ISDN, Frame Relay, X.25, ATM and
other serial WAN technologies located here.
Cisco IOS:
Cisco routers use the Internetworking Operating System(IOS) which stores the configuration
information in Non-Volatile RAM(NVRAM) and the IOS itself is stored in flash. The IOS can
be accessed via Telnet, console connection(such as hyperterminal) or dialin connection. You
can also configure the router as a web server and then access a web-based configuration
panel via http.
There are a variety of sources for booting include Flash memory, TFTP and ROM. It is always
recommended that new image of IOS be loaded on a TFTP server first, and then copy the
image from the TFTP server to the flash memory as a backup mechanism. The copy
command such as "copy tftp flash" allows us to copy the IOS image from TFTP server to the
Flash memory. And of course, we can always do the reverse. Now, we need to inform the
router to boot from the correct source. The following commands are examples of what we
should type in depending on the situation. Typically, it is a good idea to specify multiple boot
options as a fall back mechanism.
After the boot up process we can prepare to login. The User EXEC is the first mode we
encounter. It gives us a prompt of "Router>". To exit this mode means to log out
completely, this can be done with the logout command. If we want to proceed to the
Privileged EXEC, we need to use the enable EXEC command. Once entered, the prompt will
be changed to ?Router#". To go back to user EXEC mode, we need to use the disable
command. Note that all the configuration works requires the administrator to be in the
Privileged mode first. Put it this way, Privileged EXEC mode includes support for all
commands in user mode plus those that provide access to global and system settings.
The setup command facility is for making major changes to the existing configurations, such
as adding a protocol suite, modifying a major addressing scheme changes, or configuring a
newly installed interface.
If you aren't big on reading manuals, finding out the way to access help information is a
MUST. To display a list of commands available for each command mode, we can type in a ?
mark. IOS also provides context-sensitive help feature to make life easier. In order to pass
this exam, you will need to be able to find your away around the IOS. We will list some the
information here, but there is too much to list all of it. You will definitely need access to a
router or get the software listed at the beginning of this study guide so that you can
practice.
You will find most of the IOS commands at the following 2 links:
Router and Switch Commands
http://www.cisco.com/warp/cpropub/45/tutorial.htm
Security:
Access Lists allow us to implement some level of security on the network by inspecting and
filtering traffic as it enters or exits an interface. Each router can have many access lists of
the same or different types. However, only one can be applied in each direction of an
interface at a time (keep in mind that inbound and outbound traffic is determined from the
router's perspective). The two major types of access lists that deserve special attention are
the IP Access Lists and the IPX Access Lists.
Standard IP access lists can be configured to permit or deny passage through a router
based on the source host's IP address. Extended IP access list uses destination address, IP
protocol and port number to extend the filtering capabilities. Access can be configured to be
judged based on a specific destination address or range of addresses, on an IP protocol such
as TCP or UDP, or on port information such as http, ftp, telnet or snmp. We use access list
number to differentiate the type of access list. In standard IP access lists we have numbers
from 1 through 99, and in extended IP access lists we have numbers from 100 through 199:
1-99 Standard IP
100-199 Extended IP
300-399 DECnet
600-699 Appletalk
When dealing with Access Control Lists or preparing for your CCNA exam, you have to deal
with a 32-bit wild card address in dotted-decimal form, known as your inverse mask. By
Cisco?s definition it is called inverse, but you can think of it as the ?reverse? of your subnet
mask in most cases. When dealing with your wild card mask, you have two values that you
are working with. Like subnetting you have a 0 as "off" and a 1 as the "on" value. Wild
cards deal with the 0 value as ?match? and the 1 value as "ignore". What do I mean by
ignore or match? If you have studied ACLs you should know that your goal is to set criteria
to deny or permit and that is where your Inverse mask comes into play. It tells the router
which values to seek out when trying to deny or permit in your definition. If you have dealt
with subnetting you know that most of your address ended with an even number. With your
inverse mask you will end up with an odd number. There are several different ways to come
up with your inverse mask; the easiest is to subtract your subnet mask from the all routers
broadcast address of 255.255.255.255.
Example: You have a subnet mask of 255.255.255.0. To get your wild card mask all you
have to do is:
255.255.255.255.
-255.255.255.0
0.0.0.255
Then you can apply it to the definition, whether using a standard or extended ACL.
Standard example:
Router(config)# access-list 3 deny 170.10.1.0 0.0.0.255
How you would read this list. With this wild card you told the router to ?match? the first
three octets and you don?t care what?s going on in the last octet.
Extended example:
Router(config)# access-list 103 permit 178.10.2.0 0.0.0.255 170.10.1.0 0.0.0.255 eq 80
How you would read this list? With this wild card you have told the router to match The first
three octets and you don?t care what?s going on in the last octet.
Thank of it this way. If you had broken the decimal form down to binary. The wild card mask
would look like this. 00000000.00000000.00000000.11111111 As you know the ?1? means
ignore and ?0? means match. So in that last octet it could have been any value on that
subnet line ranging from 0-255.
Routing:
There are 2 main types of routing, which are static and dynamic, the third type of routing is
called Hybrid. Static routing involves the cumbersome process of manually configuring and
maintaining route tables by an administrator. Dynamic routing enables routers to "talk" to
each other and automatically update their routing tables. This process occurs through the
use of broadcasts. Next is an explanation of the various routing protocols.
RIP:
Routing Information Protocol(RIP) is a distance vector dynamic routing protocol. RIP
measures the distance from source to destination by counting the number of hops(routers
or gateways) that the packets must travel over. RIP sets a maximum of 15 hops and
considers any larger number of hops unreachable. RIP's real advantage is that if there are
multiple possible paths to a particular destination and the appropriate entries exist in the
routing table, it will choose the shortest route. Routers can talk to each other, however, in
the real routing world, there are so many different routing technologies available, that it is
not as simple as just enabling Routing Information Protocol (RIP).
OSPF:
Open Shortest Path First (OSPF) is a link-state routing protocol that converges faster than a
distance vector protocol such as RIP. What is convergence? This is the time required for all
routers to complete building the routing tables. RIP uses ticks and hop counts as
measurement, while OSPF also uses metrics that takes bandwidth and network congestion
into making routing decisions. RIP transmits updates every 30 seconds, while OSPF
transmits updates only when there is a topology change. OSPF builds a complete topology
of the whole network, while RIP uses second handed information from the neighboring
routers. To summarize, RIP is easier to configure, and is suitable for smaller networks. In
contrast, OSPF requires high processing power, and is suitable if scalability is the main
concern.
We can tune the network by adjusting various timers. Areas that are tunable include: the
rate at which routing updates are sent, the interval of time after which a route is declared
invalid, the interval during which routing information regarding better paths is suppressed,
the amount of time that must pass before a route is removed from the routing table, and
the amount of time for which routing updates will be postponed. Of course, different setting
is needed in different situation. In any case, we can use the "show ip route" command to
display the contents of routing table as well as how the route was discovered.
For commands and methods to configure OSPF read Configuring OSPF on Cisco Routers
(Note: RIPv2, OSPF and EIGRP include the subnet mask in routing updates which allows for
VLSM (Variable Length Subnet Mask), hence VLSM is not supported by RIP-1 or IGRP.)
For more information about IGRP, read Configuring IGRP
For a detailed guideline on configuring EIGRP, read Configuring IP Enhanced IGRP
Route poisoning intentionally configure a router not to receive update messages from a
neighboring router, and sets the metric of an unreachable network to 16. This way, other
routers can no longer update the originating router's routing tables with faulty information.
Hold-downs prevent routing loops by disallowing other routers to update their routing tables
too quickly after a route goes down. Instead, route can be updated only when the hold-
down timer expires, if another router advertises a better metric, or if the router that
originally advertised the unreachable network advertises that the network has become
reachable again. Note that hold down timers need to work together with route poisoning in
order to be effective.
Split horizon simply prevents a packet from going out the same router interface that it
entered. Poison Reverse overrides split horizon by informing the sending router that the
destination is inaccessible, while Triggered Updates send out updates whenever a change in
the routing table occurs without waiting for the preset time to expire.
This reference guide provides router and switch commands to help you prepare for Cisco's
CCNA certification exam. This guide covers IOS version 11 and higher. We will try to get
VLSM and Supernetting commands added for the new 640-801 CCNA exam.
ROUTER COMMANDS
Router Commands
Show Commands
Catalyst Commands
TERMINAL CONTROLS:
Config# terminal editing - allows for enhanced editing commands
Config# terminal monitor - shows output on telnet session
Config# terminal ip netmask-format hexadecimal|bit-count|decimal - changes the format
of subnet masks
HOST NAME:
Config# hostname ROUTER_NAME
BANNER:
Config# banner motd # TYPE MESSAGE HERE # - # can be substituted for any character,
must start and finish the message
DESCRIPTIONS:
Config# description THIS IS THE SOUTH ROUTER - can be entered at the Config-if level
CLOCK:
Config# clock timezone Central -6
# clock set hh:mm:ss dd month yyyy - Example: clock set 14:35:00 25 August 2003
BOOT SYSTEM:
Config# boot system tftp FILENAME SERVER_IP - Example: boot system tftp
2600_ios.bin 192.168.14.2
Config# boot system ROM
Config# boot system flash - Then - Config# reload
CDP:
Config# cdp run - Turns CDP on
Config# cdp holdtime 180 - Sets the time that a device remains. Default is 180
Config# cdp timer 30 - Sets the update timer.The default is 60
Config# int Ethernet 0
Config-if# cdp enable - Enables cdp on the interface
Config-if# no cdp enable - Disables CDP on the interface
Config# no cdp run - Turns CDP off
HOST TABLE:
Config# ip host ROUTER_NAME INT_Address - Example: ip host lab-a 192.168.5.1
-or-
Config# ip host RTR_NAME INT_ADD1 INT_ADD2 INT_ADD3 - Example: ip host lab-a
192.168.5.1 205.23.4.2 199.2.3.2 - (for e0, s0, s1)
CLEARING COUNTERS:
# clear interface Ethernet 0 - Clears counters on the specified interface
# clear counters - Clears all interface counters
# clear cdp counters - Clears CDP counters
STATIC ROUTES:
Config# ip route Net_Add SN_Mask Next_Hop_Add - Example: ip route 192.168.15.0
255.255.255.0 205.5.5.2
Config# ip route 0.0.0.0 0.0.0.0 Next_Hop_Add - Default route
-or-
Config# ip default-network Net_Add - Gateway LAN network
IP ROUTING:
Config# ip routing - Enabled by default
Config# router rip
-or-
Config# router igrp 100
Config# interface Ethernet 0
Config-if# ip address 122.2.3.2 255.255.255.0
Config-if# no shutdown
IPX ROUTING:
Config# ipx routing
Config# interface Ethernet 0
Config# ipx maximum-paths 2 - Maximum equal metric paths used
Config-if# ipx network 222 encapsulation sap - Also Novell-Ether, SNAP, ARPA on
Ethernet. Encapsulation HDLC on serial
Config-if# no shutdown
ACCESS LISTS:
IP Standard 1-99
IP Extended 100-199
IPX Standard 800-899
IPX Extended 900-999
IPX SAP Filters 1000-1099
IP STANDARD:
Config# access-list 10 permit 133.2.2.0 0.0.0.255 - allow all src ip?s on network
133.2.2.0
-or-
Config# access-list 10 permit host 133.2.2.2 - specifies a specific host
-or-
Config# access-list 10 permit any - allows any address
IP EXTENDED:
Config# access-list 101 permit tcp 133.12.0.0 0.0.255.255 122.3.2.0 0.0.0.255 eq telnet
-protocols: tcp, udp, icmp, ip (no sockets then), among others
-source then destination address
-eq, gt, lt for comparison
-sockets can be numeric or name (23 or telnet, 21 or ftp, etc)
-or-
Config# access-list 101 deny tcp any host 133.2.23.3 eq www
-or-
Config# access-list 101 permit ip any any
IPX STANDARD:
Config# access-list 801 permit 233 AA3 - source network/host then destination
network/host
-or-
Config# access-list 801 permit -1 -1 - ?-1? is the same as ?any? with network/host
addresses
IPX EXTENDED:
Config# access-list 901 permit sap 4AA all 4BB all
- Permit protocol src_add socket dest_add socket
-?all? includes all sockets, or can use socket numbers
-or-
Config# access-list 901 permit any any all any all
-Permits any protocol with any address on any socket to go anywhere
PPP SETUP:
Config-if# encapsulation ppp
Config-if# ppp authentication chap pap
-order in which they will be used
-only attempted with the authentification listed
-if one fails, then connection is terminated
Config-if# exit
Config# username Lab-b password 123456
-username is the router that will be connecting to this one
-only specified routers can connect
-or-
Config-if# ppp chap hostname ROUTER
Config-if# ppp chap password 123456
-if this is set on all routers, then any of them can connect to any other
-set same on all for easy configuration
ISDN SETUP:
Config# isdn switch-type basic-5ess - determined by telecom
Config# interface serial 0
Config-if# isdn spid1 2705554564 - isdn ?phonenumber? of line 1
Config-if# isdn spid2 2705554565 - isdn ?phonenumber? of line 2
Config-if# encapsulation PPP - or HDLC, LAPD
3. Configure Interface
Config-if# ip address 192.3.5.5 255.255.255.0
Config-if# no shutdown
Config-if# encapsulation ppp
Config-if# dialer-group 1 - applies dialer-list to this interface
Config-if# dialer map ip 192.3.5.6 name Lab-b 5551212
connect to lab-b at 5551212 with ip 192.3.5.6 if there is interesting traffic
can also use ?dialer string 5551212? instead if there is only one router to connect
to
5. Other Options
Config-if# hold-queue 75 - queue 75 packets before dialing
Config-if# dialer load-threshold 125 either
-load needed before second line is brought up
-?125? is any number 1-255, where % load is x/255 (ie 125/255 is about 50%)
-can check by in, out, or either
Config-if# dialer idle-timeout 180
-determines how long to stay idle before terminating the session
-default is 120
FRAME RELAY SETUP:
Config# interface serial 0
Config-if# encapsulation frame-relay - cisco by default, can change to ietf
Config-if# frame-relay lmi-type cisco - cisco by default, also ansi, q933a
Config-if# bandwidth 56
SHOW COMMANDS
CATALYST COMMANDS
For Native IOS - Not CatOS
SWITCH ADDRESS:
Config# ip address 192.168.10.2 255.255.255.0
Config# ip default-gateway 192.168.10.1
DUPLEX MODE:
Config# interface Ethernet 0/5 - ?fastethernet? for 100 Mbps ports
Config-if# duplex full - also, half | auto | full-flow-control
SWITCHING MODE:
Config# switching-mode store-and-forward - also, fragment-free
Config-if# port secure max-mac-count 5 - allows only 5 mac addresses mapped to this
port
VLANS:
Config# vlan 10 name FINANCE
Config# interface Ethernet 0/3
Config-if# vlan-membership static 10
TRUNK LINKS:
Config-if# trunk on - also, off | auto | desirable | nonegotiate
Config-if# no trunk-vlan 2
-removes vlan 2 from the trunk port
-by default, all vlans are set on a trunk port
CONFIGURING VTP:
Config# delete vtp - should be done prior to adding to a network
Config# vtp server - the default is server, also client and transparent
Config# vtp domain Camp - name doesn?t matter, just so all switches use the same
Config# vtp password 1234 - limited security
Config# vtp pruning enable - limits vtp broadcasts to only switches affected
Config# vtp pruning disable
FLASH UPGRADE:
Config# copy tftp://192.5.5.5/configname.ios opcode - ?opcode? for ios upgrade, ?
nvram? for startup config
CLI Architecture
A Cisco IOS router command line interface can be accessed through either a
console connection, modem connection, or a telnet session. Regardless of which
connection method is used, access to the IOS command line interface is generally
referred to as an EXEC session.
As a security feature, Cisco IOS separates EXEC sessions into two different
access levels - user EXEC level and privileged EXEC level. User EXEC level
allows a person to access only a limited amount of basic monitoring commands.
Privileged EXEC level allows a person to access all router commands (e.g.
configuration and management) and can be password protected to allow only
authorized users the ability to configure or maintain the router.
For example, when an EXEC session is started, the router will display a
"Router>" prompt. The right arrow (>) in the prompt indicates that the router is at
the user EXEC level. The user EXEC level does not contain any commands that
might control (e.g. reload or configure) the operation of the router. To list the
commands available at the user EXEC level, type a question mark (?) at the
Router> prompt. (This feature is referred to as context sensitive help.)
Critical commands (e.g. configuration and management) require that the user be
at the privileged EXEC level. To change to the privileged EXEC level, type
"enable" at the Router> prompt. If an enable password is configured, the router
will then prompt for that password. When the correct enable password is entered,
the router prompt will change to "Router#" indicating that the user is now at the
privileged EXEC level. To switch back to user EXEC level, type "disable" at the
Router# prompt. Typing a question mark (?) at the privileged EXEC level will
now reveal many more command options than those available at the user EXEC
level. The text below illustrates the process of changing EXEC levels.
Router> enable
Password: [enable password]
Router# disable
Router>
Note: For security reasons, the router will not echo the password that is entered.
Also, be advised that if configuring a router via telnet, the password is sent in
clear text. Telnet does not offer a method to secure packets.
Once an EXEC session is established, commands within Cisco IOS are
hierarchically structured. In order to successfully configure the router, it is
important to understand this hierarchy. To illustrate this hierarchy, Figure 1
provides a simple high-level schematic diagram of some IOS commands.
Figure 1 - IOS CLI hierarchy
Command options and applications vary depending on position within this
hierarchy. Referring to the diagram in figure 1, configuration command options
will not be available until the user has navigated to the configuration branch of the
IOS CLI structure. Once in the configuration branch, a user may enter system
level configuration commands that apply to the entire router at the global
configuration level. Interface specific configuration commands are available once
the user has switched to the particular interface configuration level. More detailed
information and examples on how to navigate through the IOS CLI hierarchy are
offered in the Router Configuration section.
To assist users in navigation through IOS CLI, the command prompt will change
to reflect the position of a user within the command hierarchy. This allows users
to easily identify where within the command structure they are at any given
moment. Table 2 is a summary of command prompts and the corresponding
location within the command structure.
Table 2 - IOS Command Prompt Summary
Router> - User EXEC mode
Router# - Privileged EXEC mode
- Configuration mode (notice the # sign indicates this is only accessible at privileged
Router(config)#
EXEC mode.)
Router(config-if)# - Interface level within configuration mode.
Router(config-
- Routing engine level within configuration mode.
router)#
Router(config-line)# - Line level (vty, tty, async) within configuration mode.
Router Configuration
Entering Configurations
Perhaps the best way to illustrate IOS CLI navigation is by walking through a
simple router configuration. The comments in the example do not attempt to
explain the meaning of each individual command, but rather intend to display
where configuration commands are entered within the IOS command structure.
Pay particular attention to how the command prompt changes as the user
navigates through the IOS CLI hierarchy. Also notice that global parameters are
configured at the global configuration level (indicated by the "Router(config)#"
prompt) whereas interface specific commands are entered after switching to the
particular interface (indicated by the "Router(config-if)#" prompt). Global
parameters and interface parameters are discussed further in the Displaying
Configurations section under Router Management.
Router> enable - switches to privileged EXEC level
Router# configure terminal - switches to global configuration level
Router(config)# enable secret cisco - configures router with an enable secret
(global)
Router(config)# ip route 0.0.0.0 0.0.0.0
20.2.2.3 - configures a static IP route (global)
Router(config)# interface ethernet0 - switches to configure the ethernet0 interface
Router(config-if)# ip address 10.1.1.1 - configures an IP address on ethernet0
255.0.0.0 (interface)
Router(config-if)# no shutdown - activates ethernet0 (interface)
Router(config-if)# exit - exits back to global configuration level
Router(config)# interface serial0 - switches to configure the serial0 interface
Router(config-if)# ip address 20.2.2.2 - configures an IP address on serial0
255.0.0.0 (interface)
Router(config-if)# no shutdown - activates serial0 (interface)
Router(config-if)# exit - exits back to global configuration level
Router(config)# router rip - switches to configure RIP routing engine
Router(config-router)# network 10.0.0.0 - adds network 10.0.0.0 to RIP engine
(routing engine)
Router(config-router)# network 20.0.0.0 - adds network 20.0.0.0 to RIP engine
(routing engine)
Router(config-router)# exit - exits back to global configuration level
Router(config)# exit - exits out of configuration level
Router# copy running-config startup-
config - saves configuration into NVRAM
Router# disable - disables privileged EXEC level
Router> - indicates user is back to user EXEC level
In the above example, notice how the exit command is used to back up a level
within the IOS hierarchy. For example, if in the interface configuration level (i.e.
Router (config-if)# prompt), typing exit will put the user back in the global
configuration level (i.e. Router (config)# prompt).
Taking Interfaces Out Of Shutdown
Routers ship from the factory with all interfaces deactivated. Deactivated
interfaces are referred to as being in a shutdown state. Before an interface can be
used, it must be taken out of the shutdown state. To take an interface out of
shutdown, type "no shutdown" at the appropriate interface configuration level.
The example above includes these commands for both the ethernet and serial
interfaces.
Removing Commands / Resetting Default Values
IOS provides an easy way to remove commands from a configuration. To remove
a command from the configuration, simply navigate to the proper location and
type "no" followed by the command to be removed. The following example
displays how to remove an IP address from the ethernet0 interface.
Router> enable - switches to privileged EXEC level
Router# configure terminal - switches to global configuration level
Router(config)# interface ethernet0 - switches to configure the ethernet0 interface
Router(config-if)# no ip address - removes IP address
Router(config-if)# exit - exits back to global configuration level
Router(config)# exit - exits out of configuration level
Router# disable - disables privileged EXEC level
Router> - prompt indicates user is back to user EXEC level
Some configuration commands in IOS are enabled by default and assigned a
certain default value. When left at the default value, these commands will not be
displayed when the configuration is listed. If the value is altered from the default
setting, issuing a "no" form of the command will restore the value to the default
setting.
Saving Configurations
A Cisco IOS router stores configurations in two locations - RAM and NVRAM.
The running configuration is stored in RAM and is used by the router during
operation. Any configuration changes to the router are made to the running-
configuration and take effect immediately after the command is entered. The
startup-configuration is saved in NVRAM and is loaded into the router's running-
configuration when the router boots up. If a router loses power or is reloaded,
changes to the running configuration will be lost unless they are saved to the
startup-configuration. To save the running-configuration to the startup
configuration, type the following from privileged EXEC mode (i.e. at the
"Router#" prompt.)
Router# copy running-config startup-config
Router Management
IOS supports many different types of show commands. This section covers a few
of the common show commands used to both manage and troubleshoot a router.
The scope of this document is not to instruct how to use these commands to
troubleshoot a router, but to make the user aware that these management options
exist. For specific information about troubleshooting a network using these
commands, refer to the appropriate
troubleshooting document.
Displaying Configurations
To display the running-configuration, type the following command in privileged
EXEC mode:
Router#show running-config
To display the startup-configuration that is stored in NVRAM, type the following
command in privileged EXEC mode:
Router#show startup-config
The following is the show running-config output from the example used in the
Router Configuration section.
Current configuration:
!
version 11.2
!
hostname cisco
!
enable password cisco
!
interface Ethernet0
ip address 10.1.1.1 255.0.0.0
!
interface Serial0
ip address 20.2.2.2 255.0.0.0
!
router rip
network 10.0.0.0
network 20.0.0.0
!
ip route 0.0.0.0 0.0.0.0 20.2.2.3
!
line vty 0 4
password telnet
login
!
end
When displaying a configuration, the exclamation marks (!) function as line
separators to make reading easier. Referring to the above example, notice how
commands entered at the interface configuration level appear indented underneath
the respective interface (e.g. interface Ethernet0). Likewise, commands entered
underneath the routing engine configuration level appear indented underneath the
routing engine (e.g. router rip). Global level commands are not indented. This
type of display allows a user to easily identify which configuration parameters are
set at the global configuration level and which are set at the various configuration
sub-levels.
Note: If an interface was in a shutdown state, the word 'shutdown' would appear
indented under the particular interface in shutdown state. Also, commands that
are enabled by default are not displayed in the configuration listing.
Displaying Software Version And More
The show version command provides a lot of information in addition to the
version of software that is running on the router. The following information can
be collected with the show version command:
Software Version - IOS software version (stored in flash)
Bootstrap Version - Bootstrap version (stored in Boot ROM)
System up-time - Time since last reboot
System restart info - Method of restart (e.g. power cycle, crash)
Software image name - IOS filename stored in flash
Router Type and Processor type - Model number and processor type
- Main Processor RAM
Memory type and allocation (Shared/Main)
- Shared Packet I/O buffering
Software Features - Supported protocols / feature sets
Hardware Interfaces - Interfaces available on router
Configuration Register - Bootup specifications, console speed setting, etc.
gems_hcl>en
gems_hcl#sh int ser0
Serial0 is up, line protocol is up
Hardware is PowerQUICC Serial
Description: LL link to HCL infinet,Chennai
Internet address is 10.194.2.78/30
Backup interface BRI0, failure delay 5 sec, secondary disable delay 5 sec,
kickin load not set, kickout load not set
MTU 1500 bytes, BW 832 Kbit, DLY 20000 usec,
reliability 255/255, txload 75/255, rxload 28/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
Last input 00:00:03, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/11/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 624 kilobits/sec
5 minute input rate 92000 bits/sec, 44 packets/sec
5 minute output rate 246000 bits/sec, 54 packets/sec
75769 packets input, 27930029 bytes, 0 no buffer
Received 290 broadcasts, 0 runts, 0 giants, 0 throttles
1 input errors, 0 CRC, 1 frame, 0 overrun, 0 ignored, 0 abort
88311 packets output, 42938899 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 output buffer failures, 0 output buffers swapped out
0 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
camsindia#sh run
Building configuration...
Current configuration:
!
version 12.1
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname camsindia
!
enable secret 5 $1$IpjB$rmQoorXaA8uJN35k2ULZF1
!
username camsindia password 7 1322121F0509107E6D757E6275
username gokulnath password 7 135743405B5B547D
username mvk password 7 0023160B0A5E1F5249701A1F
!
!
!
!
memory-size iomem 25
ip subnet-zero
ip name-server 202.71.144.67
ip name-server 202.71.128.225
ip name-server 202.71.128.33
ip name-server 202.71.136.167
!
isdn switch-type basic-net3
!
!
!
interface Serial0
backup delay 10 5
backup interface BRI0
ip address 202.71.149.50 255.255.255.252
!
interface BRI0
ip address negotiated
ip nat outside
encapsulation ppp
no ip route-cache
dialer idle-timeout 3000
dialer string 52197877
dialer-group 1
isdn switch-type basic-net3
ppp pap sent-username camsisdn password 7 121A041A010509107E28252520
ppp multilink
!
interface FastEthernet0
ip address 202.71.148.161 255.255.255.240
ip nat inside
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 202.71.149.49
ip route 0.0.0.0 0.0.0.0 BRI0
ip route 192.168.0.0 255.255.255.0 202.71.148.162
ip route 202.71.148.163 255.255.255.255 202.71.148.162
ip route 202.71.148.164 255.255.255.255 202.71.148.162
ip route 202.71.148.165 255.255.255.255 202.71.148.162
no ip http server
!
access-list 1 permit any
access-list 101 permit icmp any any
access-list 101 permit tcp 202.71.149.0 0.0.0.255 host 202.71.149.50 eq telnet
access-list 101 permit tcp 192.168.2.0 0.0.0.255 host 202.71.149.50 eq telnet
access-list 101 deny ip any host 202.71.149.50
access-list 101 permit ip any any
access-list 101 permit tcp host 202.71.148.162 any eq www
access-list 101 permit tcp any any
access-list 102 permit tcp 202.71.149.0 0.0.0.255 host 202.71.149.50 eq telnet
access-list 102 permit tcp 192.168.2.0 0.0.0.255 host 202.71.149.50 eq telnet
access-list 105 permit icmp any any
access-list 105 permit tcp 192.168.0.0 0.0.224.255 any eq smtp
access-list 105 permit tcp 192.168.0.0 0.0.224.255 any eq pop3
access-list 105 permit tcp 192.168.0.0 0.0.224.255 any eq www
access-list 105 permit tcp 192.168.0.0 0.0.224.255 any eq domain
access-list 105 permit tcp 192.168.0.0 0.0.224.255 any eq 443
access-list 105 permit udp 192.168.0.0 0.0.224.255 host 192.168.25.100 eq 1604
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 192.168.25.100 eq 1494
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 192.168.25.100 eq 8080
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 202.71.148.162 eq 256
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 202.71.148.162 eq 900
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 202.71.148.162 eq 259
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 202.71.148.162 eq 18208
access-list 105 permit tcp 192.168.0.0 0.0.224.255 host 202.71.148.162 eq 18181
access-list 110 deny icmp any host 202.71.148.163 echo-reply
access-list 110 deny icmp any host 202.71.148.162 echo-reply
access-list 110 permit ip any any
access-list 130 deny ip 10.0.0.0 0.255.255.255 any
access-list 130 deny ip 172.16.0.0 0.15.255.255 any
access-list 130 deny ip 192.168.0.0 0.0.255.255 any
access-list 130 deny udp any host 202.71.148.162 eq 18264
access-list 130 deny tcp any host 202.71.148.162 eq 18264
access-list 130 permit tcp any host 202.71.148.162 eq domain
access-list 130 permit udp any host 202.71.148.162 eq domain
access-list 130 permit tcp any host 202.71.148.162 eq 18208
access-list 130 permit tcp any host 202.71.148.162 eq 18181
access-list 130 permit udp any host 202.71.148.162 eq 18208
access-list 130 permit udp any host 202.71.148.162 eq 18181
access-list 130 permit udp any host 202.71.148.162 eq 18234
access-list 130 permit udp any host 202.71.148.162 eq 18233
access-list 130 permit tcp any host 202.71.148.162 eq 18234
access-list 130 permit tcp any host 202.71.148.162 eq 18233
access-list 130 permit tcp any host 202.71.148.162 eq 18211
access-list 130 permit tcp any host 202.71.148.162 eq 18191
access-list 130 permit udp any host 202.71.148.162 eq 18211
access-list 130 permit udp any host 202.71.148.162 eq 18191
access-list 130 permit tcp any host 202.71.148.162 eq 500
access-list 130 permit tcp any host 202.71.148.162 eq 256
access-list 130 permit tcp any host 202.71.148.162 eq 900
access-list 130 permit tcp any host 202.71.148.162 eq 259
access-list 130 permit tcp any host 202.71.148.162 eq 257
access-list 130 permit tcp any host 202.71.148.162 eq 258
access-list 130 permit tcp any host 202.71.148.162 eq 1494
access-list 130 permit tcp any host 202.71.148.162 eq 9999
access-list 130 permit udp any host 202.71.148.162 eq 1604
access-list 130 permit tcp any host 202.71.148.162 eq 264
access-list 130 permit tcp any host 202.71.148.162 eq 265
access-list 130 permit tcp any host 202.71.148.162 eq 18231
access-list 130 permit udp any host 202.71.148.162 eq isakmp
access-list 130 permit udp any host 202.71.148.162 eq 259
access-list 130 permit tcp any host 202.71.148.162 eq 18263
access-list 130 permit tcp any host 202.71.148.162 eq 18262
access-list 130 permit udp any host 202.71.148.162 eq 18263
access-list 130 permit udp any host 202.71.148.162 eq 18262
access-list 130 permit tcp any host 202.71.148.162 eq smtp
access-list 130 permit tcp any host 202.71.148.163 eq smtp
access-list 130 permit tcp any host 202.71.148.162 eq pop3
access-list 130 permit tcp any host 202.71.148.162 eq www
access-list 130 permit tcp any host 202.71.148.162 eq 443
access-list 130 permit tcp any host 202.71.148.163 eq 443
access-list 130 permit tcp any host 202.71.148.162 eq 8443
access-list 130 permit tcp any host 202.71.148.163 eq 8443
access-list 130 permit icmp any any
access-list 130 permit ip any any
access-list 150 deny tcp any host 202.71.148.162 eq 165
access-list 150 permit tcp any any
dialer-list 1 protocol ip permit
!
line con 0
exec-timeout 3 0
transport input none
line aux 0
line vty 0 4
exec-timeout 3 0
password 7 1322121F0509107E6A046B626373
login
!
end