Ccna
Ccna
200-120
A KNOWLEDGE
In the process of getting your CCNA certification you are sure to increase your knowledge and understanding of the concepts. Even if you have
years and years of experience in the field, you would definitely increase your knowledge and skills.
As they say, nothing can replace real world experience, but books are also equally important for keeping up-to-date with the new advancements
in the industry. In the process of getting certified you would be bombarded with many advancements of the industry thus increasing your overall
knowledge.
C CAREER ADVANCEMENTS
CCNA Certification increases your chances of promotion. You could expect to move up in the hierarchy of your organization.
D SALARY INCREMENT
Your next salary increment could be just around the corner after getting your certification. One of my friend got as much
as 100% increase in his salary after getting his certification. You would tell that 100% increase is just unreal, yes it is
possible, if you have good track record and are willing to switch jobs.
Pay Scale - Salary Search: CCNA Certification
E STEPPING STONE FOR MANY OTHER CERTIFICATIONS
CCNA certificate is a prerequisite for many other Cisco certification. CCNA concentration like CCNA Voice, CCNA Security, CCNA Wireless
and many other professional level certifications require a valid CCNA certificate. Also some of the colleges give as much as 6 credits if you hold
a valid CCNA certificate and want to do higher level studies.
F RESPECT
Getting a CCNA certificates commands a certain amount of respect from your colleagues and employer. Some of your colleagues would have also
tried to get certified, but could not get certified. So, this achievement of yours deserves a back-patting.
G EMPLOYER BENEFITS
Many employers like to employ certified people because it demands a well standing in the ever-increasing and competitive IT field. That is the reason
many employers bear the cost of certification. It's a kind of mutual give and take.
H ON TRACK
After getting certified you would be on the right track to go for many other professional level certifications. Getting the first certification is always hard
but once you take the first step, the journey to the thousand miles at least gets started.
I PERSONAL SATISFACTION
You always wanted to get certified, so after you receive your certification letter and other stuff, a sense of personal satisfaction, gratification, and relief
is felt.
NETWORK FOUNDATIONS
Network
Are basically all the components hardware's and software's required in connecting your computers
over a short and large distance. The goal of a network is to establish communications throughout an
organization.
COMPONENTS
(1) Pc & Server-: Are end point devices responsible for sending and receiving of data over A
network.
(2) APPLICATIONS-: A set of programs written to perform certain operations. Network Aware and
Non- network Aware
Network aware app.-: is that application that can be use over a network e.g. Telnet, HTTP, IP.
Non-network aware-: Are 2 B installed before use e.g. Ms App.
(3) Network Connections-: Devices for connectivity's, this binding blocks include the network
interface card (NIC), cabling and connector.
(4) Hubs & Switches-: End devices point of attachment on the network.
(
5) Routers-: Connect multiple networks and find the best way to reach each network.
Qos
These allow management of priorities data crossing the network.
TOPOLOGY
It’s how devices (computers of networking devices) are connected together on the network
TYPES OF TOPOLOGY
(1) Point-2-Point-: When two devices are connected side by side:AB
A B
(2) BUS-: When two or more devices are connected to a common device or median
A B C
(3) STAR-: When two or more devices are connected true a central device.AC
A C
B D
(4) RING TOPOLOGY-: Is a kind of topology where means for redundancy is provide.
(5) DUAL RING-: It’s a replicate of ring topology with double redundancy provided. It’s reliable in terms of service providing.
(6) MESH TOPOLOGY-: This is where each computer is directly connected to every other computer on the network.
D
B
TYPES OF NETWORK
(1) Local Area Network (LAN)-: Is a kind of network connection covering a small
geographical area such as homes, offices or group of buildings.
(2) Wide Area Network (WAN)-: Is a kind of network covering a large geographical area
such as city, state, nation or globe.
(3) Metropolitan (MAN)-: Is use to connect two or more LAN within a metropolitan.
Connection by is very high.
C
(5) EXTRANET-: Is an inter-connection of two network or more autonomous system. AllB
the users are not an insider.
(6) INTERNET-: Is an inter-connection of every network or one network. The users are
net known.
(7) Storage Area Network (SAN)-: Is a collection of storage areas to form one large
virtual memory.
(8) Virtual Private Network (VPN)-: Is an act of creating a secure network through an
unsecured network like the internet.
Internet
App. Dev.
INTERPRETING A NETWORK DIAGRAM
Internet
WAN
LAN
Router
Switch
Switch
LAN
WAN
Router
Router Switch PC
Server
PC
CISCO HIERARCHICAL
DESIGN
SERVER
IN CHARGE OF
PROCESSING
6500
CORE
IN CHARGE OF
3650 SEGMENTING
DISTRIBUTION
2950
ACCESS
OPEN STANDARD FOR INTERCONNECT (OSI).
OSI is a set of rules or guidelines set to guide software developers in writing
software's, to encourage inter-operability. It’s a model developed to allowed
different operating system i.e. different vendors working together.
4 TRANSPORT TO
5 NETWORK NEED
6 DATA-LINK DATA
7 PHYSICAL PROCESSING
Sender--------------------Receiver
* Half duplex mode-: In this mode, data flow is in two directions, but not simultaneously i.e. they can
inter change information or data, but not at the same time e.g. walkie talkie or mobile phone.
* Full duplex mode-: In this mode, data flow is in both directions simultaneously i.e. that means that
both can send and receive at the same time e.g. computer on the internet
A B
TRANSPORT LAYER
This layer is responsible for connection initiation; it’s responsible
for data transversion from one network to another. It uses flow
control, error detection, and connect you either reliable (TCP
connection oriented) or unreliable (UDP connection less oriented).
Transport layer uses flow control by creating a temporary memory
called “BUFFER” to handle data transversion. It uses the 3-way
Hand-shake also.
A TCP 3-way hand-shake is always the initial communication
between two devices.
Packet 1
CTL: SYN
SEQ: 1000
Packet 3
CTL: ACK
SEQ: 1001
ACK: 501
192.168.1.20
WELL KNOWN PORT NO
TCP UDP
Telnet – 23
FTP– 21 DNS - 53
HTTP – 80 TFTP =
69
HTTPS – 443
DNS – 53
Ping- 0
POP3-110
SNMT-161
IKE-500
NETWORK LAYER
This layer is responsible for data routing and physical addressing.
Routing is movement of data from source to destination effectively, this entails on
time delivery and in good condition, to Route means to choose the part for which
a data will be taken or delivered to it destination. Routing can be Static or
Dynamic.
Static routing is a manual and it entails the routing table been updated manually
“Routing table is referred to a logical map built by a router to route data”.
Dynamic routing entails the routing table been updated automatically. Network
layer also have to do with physical addressing. It also has 2 components:
(1) Network Components-: its use to identify a network.
(2) Host components-: it is use to identify each member of a network e.g. IP,
IPX, APPLE TALK.
DATA-LINK LAYER
This layer handles the logical topologies and addressing. Logical topology is how
data flows through the cable in a network. Logical addressing in Data makes use
of the MAC addressing
OR
It defines the physical topology of your network using MAC, physical addressing
internet address. It performs error detection but leave error correction for upper
layer, it also form frame from bit receive from layer one i.e. 0101, there are a lot of
protocol for file encapsulation e.g. PPP-: Port to-Port Protocol, high level data link
control, frame relay, link access procedure balance.
PHYSICAL LAYER
This layer handles the physical entity in cable connection types,
it forms bit from electrical signal it can also convert bits to electronic signs.
PRESENTATION
Telnet, SMTP, POP3,
APPLICATION FTP, NNTP, HTTP,
SESSION SNMP, DNS, SSH….
DATA-LINK
NETWORK INTERFACE Ethernet , PPP, ADSL
PHYSICAL
PRESENTATION
SESSION
TRANSPORT
NETWORK
LLC(sub-layer 2)
DATA-LINK
MAC(sub-layer 1)
Category 5, RJ-45,
PHYSICAL 10base2,etc….
Developed in the 1970s, Ethernet has become the fabric of LANs around the world. Ethernet is a physical and Data-
Link layer standard, when matched to the OSI model. Ethernet was designed to use a method of transmission
known as Carrier Sense, Multiple Access with Collision Detection(CSMA/CD) . This standard defines the rules
Ethernet must live by when communicating. Based on the Ethernet standard, only one device connected to an
Ethernet segment is able to send or receive at a time, otherwise a collision occurs and the data must re-sent. The
rules of CSMA/CD follow this flow:
1. Send the network device package’s data into a frame to be sent.
2. The network device listens to the Ethernet wire to see if another device is already transmitting.
3. If a device is transmitting, wait until it finishes. If the line is idle, send the data.
1. ipcopnfig
The ipconfig command line utility allows you to verify a clients MAC address, IP address, subnet mask, default gateway
and DNS server information. To run this utility, simply open a command line and type ipconfig.
The following are common arguments attached to the ipconfig command:
. ipconfig /all – using this argument, you will be able to see additional information ( such as MAC address and DNS
Servers) about the device’s TCP/IP configuration.
. ipconfig / release – this argument allows you to release an IP address the PC has obtained via DHCP.
. ipconfig /renew - this argument allows you to request a new IP address from a DHCP server.
2. ping
If there were a flathead screwdriver in network word, the ping command would be it. The ping command tests network
connectivity to a remote device. To execute the ping command, simply type ping<hostname or IP address>
The are three common arguments used with the ping command:
. ping –t < hostname or IP address> - by using the –t flag, the ping will repeat continuously until stopped by using the
^c (ctrl + c ) break string.
. ping –a <IP address> -the –a flag causes ping to perform a reverse DNS lookup on an IP address. For example,
issuing the command ping –a 74.125.19.104 would return the google.com DNS name associated with the IP address.
. ping –l <size in byte> <hostname or IP address)- by default, a ping packet is very small. You can increase the size by
using the –I argument for example, you could type ping –l 1200 www.google.com to send packet 1200 bytes in size to
google.com. This is useful when stress-testing connections or servers.
3. tracert
The traceroute command (implemented as tracert in Microsoft Windows) is an enhanced version of a ping that shows
every router you are passing through on the way to your destination. The syntax is as simple as typing tracert<hostname
or IP address>.
There is only one common argument for the tracert command:
. Tracert –d <hostname or IP address>- the –d argument prevents traceroute from resolving IP addresses to
hostnames. For example, ip68-2-2-29.ph.ph.cox.net is a hostname, 68.2.2.29 is the IP address. This speeds up the
traceroute command considerably.
4. Nslookup
The nslookup command allows you to send multiple queries to a DNS server. There are many cases in network
troubleshooting where problems originate because a DNS server has incorrect name-to-IP-address mapping in it
database. nslookup can help diagnose these issues. The following is an example of using nslookup to query a local
DNS server: >nslookup google.com
When you enter a domain name to resolve, nslookup will provide the name and IP address of the DNS server resolving
the name (adtec.home.local/172.30.100.100 in this case) and the IP address(es) of the domain name you are resolving.
Notice that the DNS server provided four IP addresses for www.google.com. This because google has a large enough
web presence to have redundant servers supporting its domain name. There are many options that can be used with the
nslookup command; two of them have common relevance to cisco technicians. Keep in mind that both of these
commands are entered after you have entered the base nslookup command:
. Server <DNS server name or IP address> - the server selection option allows you to change DNS servers used for
the DNS lookups. For example, in the nslookup output above, I was using the server “adtec.home.local”. Perhaps I
suspected that the adtec server was returning incorrect information. Using the server command, I could redirect my DNS
requests to a different server.
Tip: the DNS server 4.2.2.2 is a well-known public DNS server.
. ls <domain name> - There may be times where you want to see all the DNS records associated with a certain domain.
For example, google.com contains DNS records for www, mail, images and so on. Typing ls google.com can display all
these DNS records. Please keep in mind that many DNS server restrict this command because of the secure information
it can display.
5. arp
Whenever a network device attempts to communicate, it will need to have both the Layer 3 (IP address) and Layer 2
(MAC address) of it destination. The ARP command allows you to verify all of the Layer 2 to Layer 3 address mappings
( known as Address Resolution Protocol or ARP mappings) a network client has stored in it cache (memory). For
example, if the network client 192.168.150.21 attempt ed to communicate with 192.168.150.1, it would need to send an
ARP broadcast to determine the MAC address for 192.168.150.1. Using the arp command-line utility, you are able to
verify these mappings: >arp –a
The following are common arguments for use with the arp command:
. arp –a – the –a argument displays all entries currently in the arp table.
.arp –d- the –d argument manually deletes entries out of the arp table. By default, Windows will remember IP to MAC
address mappings for 10 minutes. In a network where IP addresses are changing (usually due to network maintenance
or upgrades), it may be beneficial to flush the arp cache and allow it to dynamically rebuild. Use the arp –d* syntax to
remove all entries from the arp cache.
CABLES These are medians for networking.
CATEGORIES
Management Cable(s)-: The management cable is use to you device console,
it’s basically use for configuring, verifying and troubleshooting.
TYPES OF MANAGEMENT
(1) OUT-OF-BAND MANAGEMENT-: It requires cable e.g. ROLLOVER cable,
is when you are managing cable devices through the console cable.
(2) IN-BAND MANAGEMENT-: When managing devices through the network
e.g. straight and cross over cable.
TYPES OF CABLES
(1) SERIAL CABLE-: It’s use to connect from one establishment to another. It
has two pins.
(2) CROSS-OVER CABLE-: Use to connect like devices e.g. Switch 2 Switch,
Pc 2 Pc, Pc 2 Router, Router 2 Router, and Switch 2 Hub.
(3) CONSOLE/ROLLOVER CABLE-: This cable is exclusive to Cisco devices
i.e. Cisco Routers, Switches and PCS. It is use to connect a pc to the console
port of the router or switch.
(4) STRAIGHT-THROUGH-: It is use to connect unlike devices e.g. PC 2
Switch, Router 2 Switch, Printer 2 Hub, PC 2 Hub, Server 2 Switch.
CABLE TERMINATION
The twisted pair cable has 4 twists of 8 cables i.e. the 8 cables are twisted in two’s.
4 of the cables are meant for most important data transfer while the other 4 cables are
meant for cross talk i.e. they handle interference of the most important cables, 2 are
meant for sending data, while the other 2 are meant for receiving data.
Blue 3 Blue 3
White of blue 4 White of Blue 4
Brown 5 Brown 5
A B
Green 1 Blue 3
White of Green 2 White of Blue 6
Blue 3 Green 1
White of Brown 4 White of Brown 4
Brown 5 Brown 5
White of Blue 6 White of Green 2
Orange 7 Orange 7
White of Orange 8 White of Orange 8
Note: Active pins are (1-3) and (2-6).
SERIAL
It’s use to connect from one establishment to another. It has two pins.
HOW TO KNOW WHICH CABLE TO USE
DCE-: Data Communication Equipment
DTE-: Data Terminal Equipment
DCE-: Switches, Hubs, Bridges.
DTE-: PCS, Servers, Routers.
ROUTING AND SWITCHES
(1) PC NIC Port to Switch Port -: STRAIGHT
(2) PC Comport to Switch console port -: Rolled (console)
(3) PC NIC Port to PC NIC Port -: Cross
(4) PC NIC Port to Hub ethernet Port -: Straight
(5) PC NIC Port to Router ethernet Port -: Cross
(6) Router Serial Port to Router Serial Port -: Serial
(7) Hub ethernet Port to Switch ethernet Port -: Cross
(8) Servers NIC Port to Router ethernet Port -: Cross
TYPES OF NETWORK TO BE DESIGN
FLATE NETWORK-: Is that network that can’t grow
SCALABLE NETWORK-: Is that network that can grow with IP address design
IPV4 ADDRESSING TYPES
UNICAST-: Is that IPV4 address use to access one device on a network, machine
is use e.g. 192.168.1.1/24
MULTICAST-: Is an IPV4 to access group of devices on a network. It uses more
than one machine e.g. 224.0.1.1
BROADCAST-: Is use to access all the devices on a network e.g.
192.168.1.255/24
COLLISION DOMAIN-: Is a domain where only one device can speak at a time. 1
switch port is a collision domain. The no of ports determine the no of domain 24P-
24cd-: 1 broadcasting domain.
BROADCASTING DOMAIN-: It’s a domain where if one machine speaks all other
machine on the network or domain here it.
Hub is one collision domain and broadcast domain.
IPV4 ADDRESSING
Ipv4 addressing is a 32-bit system of addressing. Address like the one below is an IPV4 address.
00000000 00000000 00000000 00000000
The 32 bits is divided into 4 octets, each octet contain 8-bits. Also each octet is separated by a period
(s)
The chains of zeros up can be written AS: 00000000.00000000.00000000.00000000
Another operation that can be performed on the IPV4 address to make it easier to manage is
conversion from binary to decimal.
1 1 0 1 1 0 0 0
2^ 7 = 128 11011000.01001101.10000101.11111001 (32 bits)
IPV4 ADDRESSING CLASSIFICATION
The creator of TCP/IP divided the protocol into three major classes of
addresses that we can use on our network today.
Subnet First Octet Number of
Mask Value Host per
Network
172.16.0.2
192.168.1.1
10.0.1.0
172.16.0.1
192.168.1.51 10.0.1.11
192.168.1.0 10.0.0.0
172.16.0.0 255.0.0.0
255.255.255.0
255.255.0.0
Please keep in mind that this network diagram is horrific for many reasons but is
primarily used to demonstrate the limitation of classful addressing. If you look, the
network on the right, the 10.0.0.0 class A subnet is in use. This subnet provides
more than 16m address and yet a few of them are being used. Since the 10.0.0.0
network has been used behind R2, it cannot be used any where else in the
network.
Today, just about every network in existence uses classless addressing. In this form
of addressing, the original class of addressing is only used as a guide. You can take
the original subnet Mask attached to the address and subnet it further down to a
more manageable size. For example I could take the class A 10.0.0.0 network and
apply a class C subnet mask to it. This basic form subnetting would provide 65,536
subnets (networks) that I could apply to my organization with 254 host per. Subnet.
The following figure gives an example of using this of classless addressing.
Classless routing protocol advertise the subnet mask with the advertisement
10.0.1.10 10.0.3.10
10.0.2.2
10.0.1.1
10.0.3.1
10.0.2.1
10.0.1.11 10.0.3.11
While “easy” subnetting like that show in the previous example is used most often in the real world
corporate environments, all Cisco Certificate example expect you to know how to handle different
subnetting.
(1) Classification by the number of Octets used for network/Host portion.
It employed Network.Host.Host.Host
It employed Network.Network.Host.Host
It employed Network.Network.Network.Host
(2) Classification by numerical value of the first and last value of the Octet.
1-126 0-: Is all network address i.e. 0.0.0.0
128-191 127-: Reserved for troubleshooting internally(loop back address)
192-223 255-: All host address, it’s a broadcast address.
(3) PUBLIC and PRIVATE IPV4 ADDRESS.
Private IPV4 address is that address that can’t route packet through the internet successfully while
public is that address that can route packet
Private IPV4 Addresses
Class work
192.172.3.10 Public
202.10.10.10 Public
172.16.200.199 Private
166.17.1.1 Public
192.168.250.11 Private
11.11.11.11 Public
10.255.255.10 Private
80.28.0.116 Public
172.31.0.250 Public
10.1.1.1 Private
127.0.0.1-: Is a default host address. packet internet grouper (ping)-: use to pin address
ping 127.0.0.1
SUB-NETTING
Subnetting is the act of dividing one large network into smaller sub-networks.
TERMS
1. Network Address-: You have your network address when all the bits in the host portion switch off.
2. Broadcast Address-: You have your broadcast address when the entire host is switch ON.
3. Sub-net Mask-: A subnet mask allows IP networks to be subdivided for security and performance purposes or
Is the boundary between the network portion and Host of IPV4 address.
216 = 1 10 1 1000
Decimal
77 = 01001101
CLASS C SUB-NETTING
Network scenario #1
This organization has purchased the class c address
192.168.1.0 and would like to use it to address the
network.
192.168.1.0 NETWORK 50 USERS
LA DC
50
20
NY
30
1 1 1 0 0 0 0 0
128 64 32 16 8 4 2 1
0 0 0 0 0 1 0 1
50 = 00110010
6 Bits
(2) RESERVE REQUIRED BITS IN A SUBNET MASK AND FIND INCREMENTAL VALUE
255.255.255.0=11111111.11111111.11111111.00000000
11
64 /26
(3) USE INCREMENT TO FIND NETWORK RANGES
Practice Example: 2
255.255.192.0(18)
172.16.0.0 Network address
255.255.192.0 Subnet mask
class A sub-netting
Practice Example 1: 255.255.240.0 (/20)
(1) When reverse engineering a problem, all you need to do is break the subnet
Mask back into binary and find the increment that was used.
255.255.255.240=11111111.11111111.11111111.11110000
(2) As before, the last possible network is your increment. In this case, the increment is 16.
(3) Use the increment to find the network ranges until you pass the given IP address:
192.168.1.0
192.168.1.16
192.168.1.32
192.168.1.48
192.168.1.64 (Passed given IP address 192.168.1.58)
(4) Now, fill in the end ranges to find the answer to the scenario:
192.168.1.0-192.168.1.15
192.168.1.16-192.168.1.31
192.168.1.32-192.168.1.47
192.168.1.48-192.168.1.63 (IP address 192.168.1.58 belongs to the range).
OTHER FACTS ON SUB-NETTING
(1) Subnet mask can be represented in decimal notation or bits notation. Example:
255.255.255.240=11111111.11111111.11111111.11110000
There are 28 network bits in this subnet Mask, so we can write it as /28
Bits notation is usually combined with 4 addresses, so writing 192.168.1.0/28 tells
you what the network is and what the current subnet Mask use is in.
(2) There may be times where you are required to know how many hosts can exist
on a network when given a certain subnet Mask. Example: 255.255.0.0 to a custom
subnet Mask of 255.255.254.0. You can find this by using the formula (2^x)-2, where
x represent the number of host bits:
255.255.254.0=11111111.11111111.11111110.00000000
As you can see, there are 9 host bits in this subnet Mask, so you can use the
formula (2^9)-2 to find that there are 510 valid host IP address per network.
(3) There may be times where you are required to know how many subnets exist
when given a certain subnet Mask. Example: 255.255.0.0 to a custom subnet Mask
of 255.255.254.0. You can find this by using the formula (2^x), where x is the
number of subnet bits.
255.255.254.0=11111111.11111111.11111110.00000000
As you can see, there are 7 subnet bits (1s added to the original Class B subnet
Mask), so you can use the formula (2^7) to find that there are 128 subnets.
(4) Because the Cisco exam does not allow you to use a calculator, finding the
power of two can be time consuming. So, you already know the first 8 powers of two
off the top of your head, to find anything larger, just start from 2^7 and keep
multiplying by 2 (i.e. 2^8=256, 2^9=512 and so on).
VARIABLE LENGTH SUBNET MASKING (VLSM)
VLSM is use to combined multiples subnet problems into one. With VLSM, you can
change subnet masks where ever you want in your organization. You must use a
routing protocol that support VLSM
IGRP OSPF
IS-IS
EIGRP
BGP
SUMMARIZATION
breaking down a large network
NVRAM RAM
ROM FLASH
IOS (Internet work o/s
FLASH
By default, the Cisco IOS is stored in a compressed bin format in the flash
RAM
During the boot process, the switch decompressed and copies the entries IOS into RAM, this enable the IOS to operate much
faster.
NVRAM
Non-Volatile RAM-: information are copy from RAM to NVRAM, Ram is like buffer while the NVRAM permanent those
information. Basically start up config. Or copy run start.
IOS FOUNDATION
The Cisco internetwork Operating System (IOS) is the operating system that power the vast
majority of Cisco routers and switches. Learning the operation of this command-line interface is
critical to your survival in the Cisco realm. Cisco has designed this command-line interface to be
easy to use and navigate once you have learned the foundations. This section is focused on just
that: learning the foundations of working with the Cisco IOS. Think of this as being similar to
getting a training course on how to work with Microsoft words.
User Mode
Router>enable
Privileged Mode
Router#configure terminal
ORALBOSS ORALBOSS
192.168.2.1
192.168.3.3
192.168.1.4
192.168.1.1 192.168.1.3 192.168.3.1 192.168.3.3
192.168.1.1 192.168.2.2
R1 192.168.2.1 R2 192.168.3.1
192.168.1.4 192.168.3.4
CONFIGURING INTERFACES
Oralb (config) # interface f0/0
Oralb (config)if) # IP address 192.168.1.1 225.255.255.0
Oralb (config-if) # no shutdown
Oralb (config-if) # exit
Oralb (config) # interface solo
Oralb (config-if) # IP address 192.168.2.1 225.255.255.252
Oralb (config-if) # clock rate 64000
Oralb (config-if) # no shutdown
Oralb (config-if) #end
Oralb #copy run start
TO VIEW THE INTERFACE CONFIGURATION
Oralb# show interfaces fastethernet 0/0
R2>en
R2#config t
R2 (config) # IP route 10.1.1.0 255.255.255.0 10.1.2.0
R2 (config) #end
R2#copy run start
Notice first that we are adding two separate routes on two separate routers. We tell R1
“to reach 192.168.3.0 /24 network, go to IP address 192.168.2.1 (which is R2). “We tell
R2, “to reach the 192.168.1.0 network, go to the IP address 192.168.1.1 (which is R1)”
Statistic routing is one of the simplest methods you can use to configure routing on small
networks but inefficient when the network grow.
DEFAULT ROUTE CONFIGURATION
200.5.1.1/30 Interne
t
ISP
200.5.2/30
R1
Your router R1 on the left needs to be able to route traffic to the internet. To accomplish this, you can enter the
following config.
This statement tells R1 to send all traffic that does not have a more specific destination in the routing table off
to the ISP router.
DYNAMIC ROUTING: A form of routing that allows the routers to communicate and exchange network
information.
SOME FACTS TO NOTE
Dynamic Routing uses interior gateway protocol (IGP) which work inside the network of an organization & Exterior
routing protocols (EGPS) which works on the internet, connecting organization together.
LINK STATE ROUTING POROTOCOL-: Send route updates only when changes occur to the routing table. In a
well design network update are constrained to where the network changes occurred.
DISTANCE VECTOR ROUTING PROTOCOL-: Send the entire routing table on a specific time interval. In the
case of RIP, the interval is once every 30 seconds. Changes to the routing table replicate to routers in the
network.
HYBRID ROUTING PROTOCOL-: It combines the best features of distance vector and link state routing
protocols into a single routing protocol, unfortunately, they are PROPRIETARY.
CLASSFUL ROUTING-: Do not send subnet mask information in routing updates. If R1 were running a classful
routing update about the 10.1.1.0/24 network to R2, it will only send an update containing “10.1.1.0” (no/24 mask
allach). Because of this all routers must use the same subnet mask for the network.
CLASSLESS ROUTING-: It sends subnet mask information in routing updates. Using the same scenario, R1 would
advertise the 10.1.1.0/24 network to R2, so R2 is not left to guess on the subnet mask.
EIGRP Classless 90
IS-IS 115
IGRP 100
DYNAMIC ROUTING RIPV2 CONFIGURATION
By default, R1 is able to reach the 192.168.1.0/24 & 192.168.2.0/24
networks since they are directly connected; it is not able to reach the
192.168.3.0/24 network. Likewise, R2 is not able to reach the
192.168.1.0/24 network. If you were to configure RIPV2 to solve this
scenario, you could use the following syntax:
R1(config)# router rip
R1(config)# version 2
R1(config)# network 192.168.1.0
R1(config)# network 192.168.2.0
R2(config)# router rip
R2(config-router)# version 2
R2(config-router)# network 192.168.3.0
R2(config-router)# network 192.168.2.0
STEPS TO FOLLOW
Enables RIP to advertise these network
Enables RIP to run on any interface belonging to that network
VERIFYING COMMAND
(1) Show IP route – verifies the current entries in
the routing table.
Show IP Protocols – verifies the status of all routing protocols active
On the router.
(3)Debug IP rip – allows you to see RIP updates they are
Sent and received.
DYNAMIC ROUTING WITH EIGRP
Enhance Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietary protocol that was designed to
provide the simplistic configuration of distance vector routing protocols along with the advanced features of
the link state routing protocols.
UNIQUE FEATURES
1) FAST, EFFICIENT ROUTING ALGORITHM
EIGRP uses the Diffusing Updates Algorithm (DUAL), which allows it to quickly identify backup paths in the
network, should a primary route fail. DUAL is far more processor and memory efficient than the (SPF)
algorithm, which powers the OSPF, and IS-IS link state routing protocols.
2) ROUTING FOR MULTIPLE NETWORK-LAYER-PROTOCOLS
EIGRP can route for other network layer protocols such as IPX, IPV6 and AppleTalk.
3) AUTO OR MANUAL ROUTE SUMMARIZATION
EIGRP can increase routing table efficiency by summarizing multiple,
more specific routing table entries into a breader, summarized route
entry. Through the auto-summarization feature or manually at any paths
in the network.
4) UNEQUAL LOAD BALANCING
While other routing protocols can only load balance over equal Cost links,
EIGRP can load balance accurately over unequal cost links. For example if
an organization had a 3mbps and 1.5 mbps link connecting between offices,
EIGRP could accurately use both link at the same time, sending double the
amount of data over the 3mbps links.
5) MULTICAST SUPPORT
All EIGRP routing information is exchange between Neighbors using multicast,
This is more efficient than using broadcast or multiple uni-cast messages.
6) SOPHISTICATED METRIC
EIGRP uses configured band width and delay on interfaces to find the best
way around the network. Other routing protocols only use a single metric, such
as Hop count (RIP) or Cost (OSPF).
EIGRPSUPPORTS THREE MEMORY-RESIDENT TABLES
(1) NEIGHBOR TABLE
Contains a list of all Neighbors relationship an EIGRP router has formed with other routers
(2) TOPOLOGY TABLE
Contains a list of all routes that exist in the network. The primary routes are identified as successor
routes, the backup routes are identify as feasible successor routes.
(3) ROUTING TABLE
Contains the list of the best routes in the network, these route were identified as successor routes in
the topology table.
EIGRP CONFIGURATION
192.168.2.0/24
.1 .2
192.168.1.0/24 192.168.3.0/24
R1
R2
INITIAL CONFIGURATION
R1(config)# router eigrp 90
R1(config-router)# network 192.168.1.0
R1(config-router)# network 192.168.2.0
R2(config)# router eigrp 90
R2(config-router)# network 192.168.3.0
R2(config-router)# network 172.168.2.0
This number represents the autonomous system. In order for routers to exchange
routing information, they must be a part of the same autonomous system.
In order to support some of the advanced features of other routing protocols, Cisco also
gives you the opportunity to support or use wild card masks (also known as inverse mask)
with your network statements.
Wild card mask gives you the ability to specify exactly what interfaces you would like to use
with the EIGRP routing protocol.
Example
R1(config-router)# network 192.168.1.0 0.0.0.255
R2(config-router)# network 192.168.1.0 0.0.0.255
This instructs R1 and R2 to run EIGRP on any interface that starts with 192.168.1 rather just
any interface that start with 192.16. This allows us to be more specific.
In general, where ever you see zero in a wild card mask, it means “look this numbers.”
Where ever you see 255(or binary 1s) in a wild card mask, it means “ignore this no.” for
example: “Look at these”
“Ignore these”
(2) Show IP eigrp neighbors- verifies the currently formed neighbors also running EIGRP & their status
(3) Show IP eigrp topology- displays the contents of the EIGRP topology table.
Finally, EIGRP supports secure authentication of all neighbors. This prevents a rogue (intrusive,
typically configured by a hacker) or invalid router from forming a neighbor relationship and infecting
your routing table with invalid routes. To configure authentication, you must first create a key chain
in global configuration mode:
R1(config)# key chain EIGRP-Au
R1(config-keychain)# key 1
R1(config-keychain-key)# key-string & up3
R1(config-keychain-key)# accept-lifetime 8:00:00: Jan 1 2011
8:00:00 Jun 1 2011
R1(config-keychain-key) # send-lifetime 8:00:00 Jan 1 2011
8:00:00 Jun 1 2011
R1(config-keychain-key)# exit
R1(config-keychain)# key 2
R1(config-keychain-key)# key-string mds
R1(config-keychain-key)# accept-lifetime 8:00:00 Jun 1 2011
8:00:00 Dec. 31 2011
R1(config-keychain-key)# send-lifetime 8:00:00 Jun 1 2011
8:00:00 Dec. 31 2011
The previous key chain configuration would need to be replicated on R2. After you have created the
key chain with any number of keys, you need to apply it on the interface where the EIGRP
neighbors are located:
R1(config)# Int S1
R1(config-if)# IP authentication mode eigrp 90 mds
R1(config-if)# IP authentication key-chain eigrp 90 Eigrp-Au
The first command applied above enables EIGRP authentication MDS hashing (a very secure way of exchanging password). The
second command links in the EIGRP-AU key chain we created in global configuration mode. This configuration would need to be
mirrored on R2 in order for the authentication to work successfully. Keep in mind that EIGRP neighbor relationship will stop between
R1 and R2.
OSPF DYNAMIC ROUTING
OSPF is a link-state routing protocol and uses Dijkstra’s shortest path first
(SPF) algorithm to determine its best path to each network. It’s open-
standard, classless routing protocol that converges quickly and uses cost
as a metric. It has administrative distance of 110. OSPF network must
contain an area 0 (Backbone area), and may contain other areas, area 0 is
designed as a transit area, and other areas should be attached directly to
area 0 and only to area 0. The SPF algorithm runs within areas, and inter-
areas are passed between areas. OSPF areas typically contain a maximum
of 50-100 routers depending on network volubility.
The first responsibility of a link-state router is to create a database that
reflects the structure of the network.
0
Area 0 EIGR
OSPF AREAS P
R 5
ASBR
Area Border Router
R 4 Area 2
R 3
Area 1
R 2 R 1
OSPF ROUTER ROLES/AREAS
1. BACKBONE ROUTERS have at least one interface assigned to area 0. R3, R4, and R5 are backbone routers.
2. INTERNAL ROUTERS has all interfaces in one area. R1,R2 and R5 are all internal area routers.
3. AREA BOARDER ROUTER (ABR) has interfaces in two or more areas. R3 and R4 are ABR.
4. AUTONOMOUS SYSTEM BOUNDARY ROUTER (ASBR) has interfaces inside and outside the OSPF routing
domain. R3 also functions as an ASBR because it has an interface in an EIGRP routing domain.
DIVIDING AN OSPF NETWORK INTO AREAS DOES THE FOLLOWING
Minimizes the number of routing table entries.
Enforces the concepts of hierarchical network designed.
Minimizes the impact of a topology change.
Contains LSA flooding to a reasonable area.
TERMS
ADJACENCY-: It’s where neighbor ship is form. Information are kept like router id and cost. Also routes changing of
routes.
NEIGHBOR-: Associate routers, they send periodic multicast packets to introduce them-self to other routers. They
become neighbors when they see their own router id included in the neighbor field of the hellos from another router.
TOPOLOGY TABLE-: Contains the information of all the routers in OSPF network.
NEIGHBOR TABLE-: Contains neighbor information.
DESIGNATED ROUTER-: Is responsible for creating and flooding a network LSA (type 2) advertising the multi-
access link.
Non DR (DR OTHER) routers communicate with DRs using the IP address 224.0.0.6. The DRs use IP address
224.0.0.5 to pass information to another routers.
BACKUP DESIGNATED ROUTER-: It takes over the network as DR when DR is down.
DR AND BDR ELECTION PROCESS
1. A router starting the OSPF process listens for hellos. If none are head within the dead time (10 seconds/40 with
p2p) (30/120 non broadcast multi-access int.), it will declares itself the DR.
2. If hellos from any other routers are heard, the router with the highest OSPF priority is elected DR, and the
election process starts again for BDR. A priority of zero removes a router from the election.
3. If two or more routers have the same OSPF priority, the router with the highest RID is elected DR, and the
election process starts again for BDR.
LINK STATE ADVERTISEMENT (LSA)
Is constructed by the router to include the information such as RIDs of, Cost to each neighbors. Each router in the routing domain shares it’s LSAs with
all other routers. Each router keeps the complete set of LSAs in a table-the link state database (LSDB).
OSPF CONFIGURATION (INTIAL CONFIG.)
192.168.2.0/30
.1 .2
192.168.1.0/24 192.168.3.0/24
R1
R2
Area 0 (Backbone)
R1(config)# router OSPF 1
R1(config-router)# router-id 1.1.1.1
R1(config-router)# network 192.168.2.0 0.0.0.255 area 0
R1(config-router)# network 192.168.1.0 0.0.0.255 area 0
VERIFIES COMMAND
R2# show IP Protocols
R2# show IP route
R2# Show IP ospf neighbor
ACCESS CONTROL LIST (ACL) IP
It’s a list of permit and denies statements that identify traffic.
TYPES OF ACCESS CONTROL LIST
1. STANDARD ACL {1-99}
Standard access control list are able to permit or deny traffic based on
Source IP address information only.
f0/0 S0/0
Interne
t
f0/0
S0/0 f0/0
S0/0
R1 R2
s0/0
F0/0 s0/0 F0/0
R1 R2
Network 1 Network 2
192.168.1.0/24 192.168.1.128/24
The first 3 lines of access list 100 is focused on permitting the host on network 2 to access the
server on network 1 using HTTP(TCP Port 80), HTTPS(TCP Port 443) and FTP(TCP Port 21).
These ports are placed at the end of the access list command since they are destination port
numbers.
NOW, THE ACCESS LIST NEEDS TO BE APPLIED
R2(config)# interface fa 0/0
R2(config-if)# IP access-group 100 in
NAMED ACLS
These ACLS can be standard or extended in nature, but they have the advantages of using a
logical name and being editable by sequence numbers.
STP
PORT RULES
Root Port-: is the port that leads back to the root or connect with root bridge
A RP RP C
AP AP 32768.ccc.ccc.ccc
32768. bbb.bbb.bbb
CONFIGURING STP
S(config)# spanning-tree Vlan 1 priority 32768
Your second step in configuring STP is to enable Port fast on ports connected to end
devices.
S(config)# interface range fa 0/1-22
S(config-if range)# spanning-tree portfast
TO VERIFIES
S# Show Spanning-tree or # Sh SP
HR IT
3rd floor
2nd floor
1st floor
HR IT
CREATING A VLAN
Switch > config t
Switch (config)# Vlan 10
Switch (config-Vlan)# name SALES
Switch (config-Vlan)# exit
Switch (config)# Vlan 20
Switch (config-Vlan)# name MARKETING
Switch (config-Vlan)# exit
Switch (config)# 30
Witch (config-Vlan)# ENGINEERING
SHOW COMMAND
Switch# Show interface fa 0/23 Switchport
INTER-VLAN ROUTING
VLANs divide the network into smaller broadcast domains, but also prohibit
communication between domains. To enable communication between these
groups-without also passing broadcasts-routing is used.
Trunk fa/0
Fa%.10
VLAN 20
172.16.10.1/24
Fa%.20
172.16.20.1/24
The following would be a router on a stick configuration for the VLANs use
previously created (10, 20, 30).
Router (config) interface fa0/0.10
Router (config-sub if)# encapsulation dot1q 10
Router (config-sub if)# IP address 172.16.10.1 255.255.255.0
Router (config-sub if)# exit
Router (config)# interface fa0/0.20
Router (config-sub if)# encapsulation dot1q 20
Router (config-sub if)# IP address 172.16.20.1 255.255.255.0
Router (config-sub if)# exit
Router (config)# interface fa0/0.30
Router (config-sub if)# encapsulation dot1q 30
Router (config-sub if)# IP address 172.16.30.1 255.255.255.0
Router (config)# exit
The command ENCAPSULATION DOT 1Q (VLAN) applied to each sub-interface assigns a VLAN member to
each sub-interface.
F0/0 S0/0
Internet
R1
192.168.1.100/24 ----------------- 200.50.63.122
R1 (config)# IP nat inside source static 192.168.1.100 202.50.63.122
R1 (config)# interface fa 0/0
R1 (config)# IP address 192.168.1.1 255.255.255.0
R1 (config)# IP nat inside
R1 (config)# exit
R1 (config)# interface S0/0
R1 (config-if)# IP address 192.168.1.221 255.255.255.252
R1 (config-if)# IP nat outside
2. DYNAMIC NAT
Defines a translation of one pool of IP address to another. It allows you to
translate a pool of IP addresses, in the diagram below; the group of internal
(private) IP addresses is being translated to external (public) IP addresses.
F0/0 S0/0
Internet
R1
192.168.1.0/24 202.50.63.0/24
Keep in mind that this is a 1:1 mapping; this is not an example of many hosts sharing a
single IP address (known as NAT overload or PAT). This would keep you from creating
more than 200 static translation to map each private IP address to a public address.
R1 (config)# access-list 50 permit 192.168.1.0 0.0.0.255
R1 (config)# IP nat pool External 202.50.63.1 202.50.63.254
Net mask 255.255.255.0
R1 (config)# IP nat inside source list 50 pool External
R1 (config)# interface Fa 0/0
R1 (config)# IP address 192.168.1.1 255.255.255.0
R1 (config)# IP nat inside
R1 (config)# exit
R1 (config)# interface S0/0
R1 (config-if)# IP address 198.53.12.221 255.255.255.252
R1 (config-if)# IP nat Outside
R1
R1 (config)# access-list 50 permit 192.168.1.0 0.0.0.255
R1 (config)# IP nat pool External 202.50.63.1 Net mask 255.255.255.0
R1 (config)# IP nat inside source list 50 pool External overload
R1 (config)# interface fa 0/0
R1 (config-if)# IP address 192.168.1.1 255.255.255.0
R1 (config-if)# IP nat inside
R1 (config-if)# Exit
R1 (config)# interface S0/0
R1 (config-if)# IP address 198.168.12.221 255.255.255.252
R1 (config-if)# IP nat Outside
VERIFIES COMMAND
R1# Show IP nat translations
R1# Show IP nat Statistics
VLAN TRUNKING PROTOCOL (VTP)
VTP is use or is a protocol that helps to advertise VLAN configuration to other
switch in the same domain.
VTP MODES
1. SERVER MODE- On this mode you will be able to create Vlan, modify and
deletes, it’s the default mode, it update it database.
2. CLIENT MODE- It can’t create nor modify it database but it can advertise
3. TRANSPARENT MODE- It can create, modify and delete but can’t update it
database but can relay i.e. give others
VTP Domain must have the same password & Domain name
DHCP SERVER
DHCP CONFIGURATION
Router1(config)# IP dhcp excluded-address 192.168.1.1 192.168.1.5
Router1(config)# IP dhcp pool Oralboss Server
Router1(dhcp-config)# network 192.168.1.0 255.255.255.0
Router1(config-if)# Default-router 192.168.1.1
Router1(config-if)# Dns-Server 4.2.2.2
Router1(config)# int f0/0
Router1(config)# IP address dhcp
Router1(config)# Int f0/0
Router1(config)# IP address 192.168.1.1 255.255.255.0
Router1(config)# no shu
Router1(config)# end
Router1# copy run start
Router2(config)# IP dhcp excluded-address 192.168.2.1 192.168.2.5
Router2(config)# IP dhcp pool Oralboss
Router2(dhcp-config)# network 192.168.2.0 255.255.255.0
Router2(config-if)# Default-router 192.168.2.1
Router2(config-if)# Dns-Server 5.3.3.3
Router2(config)# int f0/0
Router2(config)# IP address dhcp
Router2(config)# int f0/0
Router2(config)# IP address 192.168.2.1 255.255.255.0
Router2(config)# no shu
Router2(config)# end
Router2# copy run start
WIRELESS LAN
Network connectivity without wires.
Wlan transmit and receive data using radio frequency or infrared signals, sent through an access point
(AP). WLAN uses an institute of Electrical and Electronic Engineers (IEEE) standard that defines the
physical and data link specification, including the use of Media Access control (MAC) address.
Radio waves have unique potential issues. They are susceptible to interference, multipath distortion and
noise. Their coverage are can be blocked by building features, such as Elevators.
WLAN shots have no physical network connection. They are often mobile and often battery-powered.
SERVICE SET
Defines connection between two or more wireless devices
SERVICE SET ID
It’s a string of clear text used to identify service set.
WIRELESS LAN MODELS
INDEPENDENT BASIC SERVICE SET (IBSS)
It’s used to define wireless connection between two or more devices that are connected directly without the
assistance Access Point (AP).
A B
AP2
AP1
000
000
D
C
A B
UNDERSTANDING WLAN STANDARDS
Since WLANs represents network standards and RF usage, there are multiple standard organizations that manage
WLAN development.
International Telecommunication Union-Radio Communication Sector (ITU-R): This organization handles the regulation
of the RF aspects of WLAN communication.
Institute of Electrical and Electronic Engineering (IEEE): This organization handles the development of the 802:11
wireless standards
WiFi Alliance: This organization certifies WLAN equipment to ensure interoperability between vendors.
There have been three major network standards that have been release since the original wireless
network implementations in the 1990s. The following table gives the “fast fact” on these standards
RF band has been discussed. The maximum data rate dictates the maximum speed that of these standards
is able to reach. As the signal becomes weaker (the client moves further away from the WAP), the data rate
will decrease. The number of non-overlapping channels represents the number of non-intering access
points you can have in class proximity to each other.
802.1Q TUNNELS
Tunneling is a way of sending 802.1Q-tagged frames accross a foreign network (such as a service provider’s network)
and still preserve the original 802.1Q tag
WAN
Wan is the connection of two or more network that is in a large distance
HQ Branch Office
Internet
Tele Computer
Branch Office
Mobile User
Frequency
802.11b 802.11g 802.11a
2.4GHz 2.4Ghz 5GHz
Non-Overlapping 3 3 3
Channels
Demarcation Port- It’s the Port at which the responsibility of the WAN is transferred to you (customer)
Toll Network- The internal infrastructure put in place to carry your data.
Local Loop- Define the connection between the demarcation port and the central office switch.
UNDERSTANDING VPN
VPN transmit data between devices securely using a public network as a transport. How it accomplishes this
fact is actually quite complex.
VPN BENEFITS
LOW COST- it’s much cheaper to purchase an internet connection at each of your office location rather
than dedicated WAN links.
AVAILABILIITY AND SCALABILITY- Internet connections are widely available. Because of this, your
VPN is able to scale to encompass multiple offices. The topology above is actually VPN network design.
TYPES OF CONNECTION
Site-To-Site-VPN linking two offices together. Routers or firewall equipment handles VPN connections
rather than end users.
Remote-Access-VPN linking remote user to the corporate network. The end user usually handles
the VPN connection through some installed softwares.
Web-VPN- it allow you to tunnel traffic through an existing connection which is typically initiated through a web
browser.
LEASE LINE CONNECTION
A lease line connection is a private point –point link between offices. Leased lines are notorious for their
reliability, stability and price tag.
DATA LINK WAN PROTOCOLS
HIGH-LEVEL DATA LINK CONTROL (HDLC)- All Cisco routers uses the HDLC
protocol by default on serial interface. Cisco version of HDLC is proprietary, so
it is useful when connecting between two Cisco routers.
POINT-TO-POINT PROTOCOL (PPP)- PPP is the industry standard protocol
for many types of WAN connections including leased lines. It run on serial
interface, it can be use to connect a Cisco router to any other brand of router. It
supports many features like Authentication, Compression, Callback and
Multilink.
Abuja Lagos
S0/0 S0/0
R1 R2
102 PVC
201
103
DLCI
203 S0/0
FRAME RELAY
R3
Local Management Interface (LMI) - The Protocol used between you and the service provider to manage the frame relay connections.
Committed Burst (BC) - Is the average data rate higher than CIR but experienced on a short rate.
Excessive Burst (BE)-Is the highest data rate that your virtual circuit will ever experienced
FRAME RELAY SUB-INTERFACE
Point –to- Point Are used, when each PVC are to be designated as a separate IP subnet.
Multipoint – Are used when all PVC share the same IP subnet. This design makes the frame relay cloud feel like
an Ethernet switch.
192.168.1.1/0 192.168.1.2/30
S0/0 S0/0
R1 R2
Lagos 102 201 PH
103
192.168.1.3/30
310 S0/0
FRAME RELAY
R3
Abuja
Multipoint Configuration
The previous figure illustrates a frame relay multiple point configuration. You can tell this because all routers are sharing
the same IP subnet.
Lagos(config)# int s2/0
Lagos(config-if)# IP address 192.168.1.1 255.255.255.252
Lagos(config-if)# encapsulation frame-relay
Lagos(config-if)# Frame-relay map ip 192.168.1.2 102 broadcast
Lagos(config-if)# Frame-relay map IP 192.168.1.3 103 broadcast
PortH(config)# int s2/0
PortH(config-if)# IP address 192.168.1.2 255.255.255.252
PortH(config-if)# encapsulation frame-relay
PortH(config-if)# Frame-relay map IP 192.168.1.1 201 broadcast
PortH(config-if)# Frame-relay map IP 192.168.1.3 102 broadcast
Abuja(config)# int s2/0
Abuja(config-if)# IP address 192.168.1.3 255.255.255.252
Abuja(config-if)# encapsulation frame-relay
Abuja(config-if)# Frame-relay map ip 192.168.1.1 103 broadcast
Abuja(config-if)# Frame-relay map IP 192.168.1.3 310 broadcast
The key command in the multipoint configuration is the Frame-Relay command. This commands map a remote IP address to the
local DLCI number used to reach the remote IP address. Take the following command on R1: Frame-Relay Map IP 192.168.1.2 102
broadcasts. This command “says” to reach the remote IP address 192.168.1.2, use DLCI 102 --- and allow broadcasts to be sent on
this circuit. The broadcast key word allows routing protocol updates to be sent by R1 and R2, in this case. If you left the broadcast
keyword off, routing protocols would not operate over the frame relay cloud.
VERIFY COMMAND
Show frame-relay map
Show frame-relay PVC
Show frame-relay lmi Lagos
PH
R1 R2
S0/0 S0/0
S0/0.12 102 201 S0/0.12
192.168.12.1/24 192.168.12.2/24
S0/0.13 103
192.168.13.1/24 Abuja
R3
310
S0/0
S0/0.13
POINT-TO-POINT CONFIGURATION 192.168.13.2/24
As you can see, each PVC is assigned its own IP subnet. The sub-interface numbers you choose can be anything you want.
Lagos(config)# int s0/0
Lagos(config-if)# encapsulation frame-relay
Lagos(config-if)# exit
Lagos(config-if)# interface serial 0/0.12 point-to-point
Lagos(config-if)# IP address 192.168.12.1 255.255.255.252
Lagos(config-if)# frame-relay interface-dlci 102
Lagos(config-if)# exit
Lagos(config-if)# interface serial 0/0.13 point-to-point
Lagos(config-if)# IP address 192.168.13.1 255.255.255.252
Lagos(config-if)# frame-relay interface-dlci 103
PH(config)# int s0/0
PH(config-if)# encapsulation frame-relay
PH(config-if)# exit
PH(config-if)# interface serial 0/0.12 point-to-point
PH(config-if)# IP address 192.168.12.2 255.255.255.0
PH(config-if)# frame-relay interface-dlci 201
ABUJA(config)# int s0/0
ABUJA(config-if)# encapsulation frame-relay
ABUJA(config-if)# exit
ABUJA(config-if)# interface serial 0/0.12 point-to-point
ABUJA(config-if)# IP address 192.168.13.2 255.255.255.0
ABUJA(config-if)# frame-relay interface-dlci 301
IPV6
IPV6 was created dual to the rapid growth of the internet, it was a better version compare to IPV4.
Its 128bits (128) address provision.
IPV4 – 32 bits
IPV6 – 128 ?
ADVANTAGES
More address spaces
Better Quality of Service(QoS)
It has a better routing features
It has a security features
It’s mobile. A device that does forwarding is called home agent.
TYPES OF IPV6
UNICAST- It’s a host to host connection i.e 1-1 connection
MULTICAST- It’s a connection between one device to many devices, it’s use for special purpose
e.g for routing protocol, it conserved bandwidth.
ANYCAST- It’s use to give all system the same address, one to the closest communication.
PRESENTATION OF IPV6
There are two ways to shorten the representation of an IPV6 address. Take the example address.
4001:0000:0001:0002:0000:0000:0000:0000:ABCD
16bits 16bits 16bits
Leading zeros may be omitted. This makes the example
4001:0:1:2:0:0:0:0:ABCD
Sequential zeros may be shown as double colons once per address. This makes the example 4001:1:2::ABCD
2001:000F:0000:0000:0003:0000:0000:0000
2001:F:0:0:3:0:0:0
2001:F::3:0:0:0
2001:F::3::
The subnet mask is called Prefix/64
ENABLING IPV6 ON A ROUTER
IPV4
INTERNET
R1
IPV6 Client Dual Stack
2001:50:300::ab4:1e2b:98aa/24 Router
The client has the address 2001:50:300::ab4:1c2b:98aa/64.
The /64 subnet mask means the first half of the address represents the network (remember, each octet in these new IPV6
addresses are 16 bits each ) and the second half of the address represents the host on the network. Since this is a shorten
address, here are the full representations:
IPV6 network Portion: 2001: 0050:0300:0000
IPV6 host position: 0000:0ab4:1e2b:98aa
R1(config)# IPV6 unicast-routing
R1(config)# interface fa0/0
R1(config)# ip address 192.168.1.1 255.255.255.0
R1(config)# IPV6 address 2001:0050:0300::1/64
The CCNA exam just requires you to know the foundations of IPV6.
VERIFY
R1# show ipv6 protocols
To view the routing protocol
R1# show ipv6 route
Here is an unofficial summary of the CCNA 2013 syllabus for the new 200-120 composite exam that is replacing the 640-802 from 1st October
2013.
With this change to the CCNA the barrier to entry into the networking world is becoming higher and more difficult to achieve.
If you want to give your studies a boost and reduce the time it takes you to get to CCNA level, enroll in our online CCNA video bootcamp.
LAN Switching
Understand the media access control method for Ethernet.
Describe the basic switching concepts and the operation of switches.
Configure and verify switch configuration including remote access management.
Verify a network and switch operation using basic utilities such as ping, telnet and SSH.
Describe VLANs and the need for routing between VLANs.
Understand network segmentation and traffic management.
Be able to configure and verify VLANs.
Configure and verify trunking on Cisco switches.
Understand advanced switching technologies:
RSTP
PVSTP
EtherChannel
Be able to configure and verify PVSTP operation.
Describe the process of root bridge election.
IP Addressing (IPv4 and IPv6 )
Describe the need for public and private addresses for IPv4.
Understand IPv6 addresses.
Describe the appropriate IPv6 addressing scheme for a LAN/WAN environment.
Describe the appropriate IPv4 addressing scheme for a LAN/WAN environment, including VLSM and summarization.
Describe the technologies required to run IPv6 and IPv4 concurrently such as dual stack.
IP Routing
Understand the basic routing concepts.
Understand the boot process of a Cisco router.
Configure and verify a basic router configuration using the command line interface.
Configure and verify both serial and Ethernet interfaces.
Be able to verify the network connectivity and configuration of a router.
Configure a static or default route given specific requirements, then verify.
Manage Cisco IOS files and image(s).
Understand Cisco IOS licensing.
Understand and distinguish different methods of routing and routing protocols.
Configure and verify EIGRP in a single autonomous system.
Configure and verify OSPF (v2 and v3) in a single area.
Configure and verify interVLAN routing using router-on-a-stick.
Be able to configure SVI interfaces.
IP Services
Configure and verify DHCP on a Cisco router.
Understand the features and applications of each type of ACL.
Be able to configure and verify ACLs.
Understand the basic operation of NAT.
Configure and verify NAT based on a set of network requirements.
Be able to configure and verify NTP as a client.
Recognize high availability FHRP.
Understand, configure and verify Syslog and utilize Syslog output.
Understand SNMP v2 and v3.
Network Device Security
Be able to configure and verify device security features.
Understand, configure and verify switch port security features.
Configure and verify ACLs for filtering network traffic.
Limit telnet and SSH access to a router by configuring ACLs.
Troubleshooting
Troubleshoot and correct common issues concerning IP addressing and host configurations.
Be able to utilize netflow and monitor data.
Troubleshoot and fix spanning tree operation.
Troubleshoot and resolve routing issues, including OSPF, and EIGRP.
Troubleshoot and correct VLAN problems.
Identify and resolve interVLAN problems.
Troubleshoot and resolve switch trunking issues.
Troubleshoot and fix ACL problems.
Troubleshoot and correct layer 1 problems.
Troubleshoot and correct WAN issues.
Troubleshoot EtherChannel issues.
WAN Technologies
Understand and identify different WAN technologies including:
Metro Ethernet
Frame Relay
VSAT
Cellular 3G and 4G
MPLS
T1/E1
ISDN
DSL
Cable
VPN
Configure and verify a serial WAN connection.
Configure Frame Relay on Cisco routers including verification.
Be able to configure and verify a PPP connection between two Cisco routers.
Configure and troubleshoot PPPoE