0% found this document useful (0 votes)
62 views

CCNA-Quick-Reference

Uploaded by

343testuser1
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

CCNA-Quick-Reference

Uploaded by

343testuser1
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CCNA (200-301) Quick Reference Sheets

The PDUs of the Bottom Four Layers


NETWORKING FUNDAMENTALS
Segments
3 Tier Network Design Packets
• Access layer: Provides workgroup/user Frames
access to the network; as a result, this layer Bits
is sometimes called the workstation layer Protocols at Various Layers of the OSI Model
• Distribution layer: Provides policy-based Layer Examples
Application FTP, HTTP, SMTP
connectivity and controls the boundary Presentation JPEG, MPEG
Session NetBIOS, PPTP
between the access and core layers Transport TCP, UDP
• Core layer: Provides fast transport between Network IP, ICMP
Data Link PPP, ATM
distribution switches within the enterprise Physical Ethernet, USB

campus; this is sometimes called the


backbone layer TCP vs UDP
2 Tier Spine-Leaf Design UDP is connectionless; UDP has very little overhead;
This simple 2 tier model is featured in Cisco ACI UDP is often used for voice and video traffic forms;
topologies. It features a spine layer where these UDP can multiplex using port numbers to work with
core devices connect in a full mesh to every single multiple applications.
leaf node. TCP is connection-oriented; TCP has more overhead
The OSI and TCP/IP Models than UDP; TCP uses features like flow control,
sequencing, and acknowledgements to ensure
OSI model - the layers are: reliable and ordered delivery of segments; TCP can
Application multiplex using port numbers to work with multiple
Presentation applications.
Session
Transport
Network APPLICATIONS THAT USE TCP/UDP
Data Link
TCP UDP
Physical
HTTP DHCP
TCP/IP model - the layers are: FTP RIP
Telnet SNMP
Application
SSH TFTP
Transport SMTP NTP
Internet
Network Interface

Page | 1 lammle.com
IP CONNECTIVITY IP SERVICES
Default Admin Distances (Cisco) Inside Source Dynamic PAT

Connected 0 configure terminal


access-list 1 permit 192.168.1.0 0.0.0.255
Static 1 ip nat inside source list 1 interface gi0/0
EIGRP summary 5 overload
EBGP 20 interface gi0/1
ip nat inside
Internal EIGRP 90 interface gi0/0
IGRP 100 ip nat outside
OSPF 110
IS-IS 115
RIP 120 DHCP Server on Cisco Router
External EIGRP 170
configure terminal
IBGP 200 ip dhcp excluded-address 10.1.1.1 10.1.1.10
Unknown 255 ip dhcp pool CCNAPOOL
network 10.1.1.0/24
Configuring a Default Static Route default-router 10.1.1.1
dns-server 8.8.8.8
configure terminal option 150 ip 10.1.1.2
ip route 0.0.0.0 0.0.0.0 10.10.10.2

Configuring a DHCP Relay Agent


Configuring an IPv6 Static Route
configure terminal
configure terminal interface gi0/0
ipv6 route 2001:aaa::/64 serial0/0 ip helper-address 10.1.1.1

Configuring a Floating Static Route Configuring the NTP Server


configure terminal configure terminal
ip route 10.0.0.0 255.0.0.0 10.0.0.1 121 ntp master 3

A Sample OSPF Configuration (Network Command) Configuring the NTP Client

configure terminal ntp server 10.1.1.1


router ospf 1
network 10.0.0.0 0.255.255.255 area 0
SECURITY FUNDAMENTALS
A Sample OSPF Configuration (Interface Level) Wireless LAN Security

configure terminal WEP: WEP is no longer considered acceptable as a


interface gi0/0 security solution. This technique is “hacked” with
ip ospf 1 area 0 relative ease.
WPA: WPA was the first attempt at replacing WEP.
There were some security issues discovered with
this technology that gave rise (quickly) to WPA2.

Page | 3 lammle.com
WPA2: WPA2 is considered strong enough for use REST APIs: These APIs are often used for cloud and
today. It replaced TKIP (which had weaknesses) SDN technologies. They ensure that you can
with CCMP. Like WPA, it uses AES for encryption. retrieve data using “standard” URLs understood by
TKIP is still present in the protocol, but only for web browsers and Internet technologies.
backward compatibility with WPA. JSON: This is a very friendly way to represent data
WPA3: Like WPA2, this latest version of the in a human readable form. JSON presents data as a
security protocol permits you to configure a series of attribute-value pairs. It is very similar to
“personal” or home version, compared to a XML, but even more easily readable by us humans.
stronger “enterprise” version. Puppet, Chef, and Ansible: These tools allow you
to easily manage network devices from a central
Common Cybersecurity Threats location. The tools use different techniques. For
example, Puppet uses an agent on the various
Computer Viruses network devices, while Ansible is often celebrated
Malware as it is agent-less.
Trojans
Adware and spyware
Worms CRUD:
DDoS Create
Phishing Read
Rootkit Update
SQL injection attack Delete
Main-in-the-middle
Ransomware
Data exfiltration

Configuring an Extended ACL


ip access-list extended MYACL
deny tcp 192.168.8.0 0.0.0.255 any eq 443
permit ip any any

Configuring Static Port Security


interface gi0/10
switchport mode access
switchport port-security maximum 2
switchport port-security mac-address
f116.3e20.58f1
switchport port-security mac-address
f116.32e1.45a1

AUTOMATION AND
PROGRAMMABILITY
Controller-based networking: Software defined
networking (SDN) often features the use of a
central controller that implements the control
plane functions required by the network. The
devices that are controlled in SDN can focus on the
forwarding of traffic. The SDN approach fosters
efficient, automated, highly controlled networks.

Page | 4 lammle.com

You might also like