Please enable JavaScript.
Coggle requires JavaScript to display documents.
CCNA, Using The Command Line Interface, imagen_2023-01-13_082301441 -…
CCNA
IP4 Routing
Perspectives on IPv4 Subnetting
Subnetting Defined Through a Simple Example
Operational View Versus Design View of Subnetting
Analyze Subnetting and Addressing Needs
Rules About Which Hosts Are in Which Subnet
Determining the Number of Subnets
Determining the Number of Hosts per Subnet
One Size Subnet Fits All—Or Not
Defining the Size of a Subnet
One Size Subnet Fits All
Multiple Subnet Sizes (Variable-Length Subnet Masks)
One Mask for All Subnets, or More Than One
Make Design Choices
Choose a Classful Network
Public IP Networks
Growth Exhausts the Public IP Address Space
Private IP Networks
Choosing an IP Network During the Design Phase
Choose the Mask
Classful IP Networks Before Subnetting
Borrowing Host Bits to Create Subnet Bits
Choosing Enough Subnet and Host Bits
Example Design: 172.16.0.0, 200 Subnets, 200 Hosts
Masks and Mask Formats
Build a List of All Subnets
Plan the Implementation
Assigning Subnets to Different Locations
Choose Static and Dynamic Ranges per Subnet
Analyzing Classful IPv4 Networks
Classful Network Concepts
IPv4 Network Classes and Related Facts
The Number and Size of the Class A, B, and C Networks
Address Formats
Default Masks
Number of Hosts per Network
Deriving the Network ID and Related Numbers
Unusual Network IDs and Network Broadcast Addresses
Analyzing Subnets Masks
Subnet Mask Conversion
Three Mask Formats
Converting Between Binary and Prefix Masks
Converting Between Binary and DDN Masks
Converting Between Prefix and DDN Masks
Practice Converting Subnet Masks
Identifying Subnet Design Choices Using Masks
Masks Divide the Subnet’s Addresses into Two Parts
Masks and Class Divide Addresses into Three Parts
Classless and Classful Addressing
Calculations Based on the IPv4 Address Format
Analyzing Existing Subnets
Defining a Subnet
An Example with Network 172.16.0.0 and Four Subnets
Subnet ID Concepts
Subnet Broadcast Address
Range of Usable Addresses
Analyzing Existing Subnets: Binary
Finding the Subnet ID: Binary
Finding the Subnet Broadcast Address: Binary
Shortcut for the Binary Process
Brief Note About Boolean Math
Finding the Range of Addresses
Analyzing Existing Subnets: Decimal
Analysis with Easy Masks
Predictability in the Interesting Octet
Finding the Subnet ID: Difficult Masks
Finding the Subnet Broadcast Address: Difficult Masks
A Choice: Memorize or Calculate
IPv4 Routing
Operating Cisco Routers
Installing Cisco Routers
Installing Enterprise Routers
Cisco Integrated Services Routers
Physical Installation
Installing SOHO Routers
Enabling IPv4 Support on Cisco Router Interfaces
Accessing the Router CLI
Router Interfaces
Interface Status Codes
Router Interface IP Addresses
Bandwidth and Clock Rate on Serial Interfaces
Router Auxiliary Port
Configuring IPv4 Addresses and Static Routes
IP Routing
IPv4 Routing Process Reference
An Example of IP Routing
Host Forwards the IP Packet to the Default Router (Gateway)
Routing Step 1: Decide Whether to Process the Incoming Frame
Routing Step 2: De-encapsulation of the IP Packet
Routing Step 3: Choosing Where to Forward the Packet
Routing Step 4: Encapsulating the Packet in a New Frame
Routing Step 5: Transmitting the Frame
Configuring IP Addresses and Connected Routes
Connected Routes and the ip address Command
The ARP Table on a Cisco Router
Configuring Static Routes
Static Network Routes
Static Host Routes
Floating Static Routes
Static Default Routes
Troubleshooting Static Routes
The Static Route Does Not Appear in the IP Routing Table
The Correct Static Route Appears but Works Poorly
IP Forwarding with the Longest Prefix Match
Using show ip route to Find the Best Route
Using show ip route address to Find the Best Route
IP Routing in the LAN
VLAN Routing with Router 802.1Q Trunks
Configuring ROAS
Verifying ROAS
Troubleshooting ROAS
VLAN Routing with Layer 3 Switch SVIs
Configuring Routing Using Switch SVIs
Verifying Routing with SVIs
Troubleshooting Routing with SVIs
VLAN Routing with Layer 3 Switch Routed Ports
Implementing Routed Interfaces on Switches
Implementing Layer 3 EtherChannels
Troubleshooting Layer 3 EtherChannels
Troubleshooting IPv4 Routing
Ping Command Basics
Strategies and Results When Testing with the ping Command
Testing Longer Routes from Near the Source of the Problem
Using Extended Ping to Test the Reverse Route
Testing LAN Neighbors with Standard Ping
Testing WAN Neighbors with Standard Ping
Using Ping with Names and with IP Addresses
traceroute Basics
How the traceroute Command Works
Standard and Extended traceroute
Telnet and SSH
Common Reasons to Use the IOS Telnet and SSH Client
IOS Telnet and SSH Examples
Problem Isolation Using the ping Command
Implementing Ethernet LANs
Analyzing Ethernet LAN Switching
LAN Switching Concepts
Overview of Switching Logic
Forwarding Known Unicast Frames
Learning MAC Addresses
Flooding Unknown Unicast and Broadcast Frames
Avoiding Loops Using Spanning Tree Protocol
LAN Switching Summary
Verifying and Analyzing Ethernet Switching
Demonstrating MAC Learning
Switch Interfaces
Finding Entries in the MAC Address Table
Managing the MAC Address Table (Aging, Clearing)
MAC Address Tables with Multiple Switches
Configuring Basic Swich Managment
Securing the Switch CLI
Securing User Mode and Privileged Mode with Simple Passwords
Securing User Mode Access with Local Usernames and Passwords
Securing User Mode Access with External Authentication Servers
Securing Remote Access with Secure Shell
Enabling IPv4 for Remote Access
Host and Switch IP Settings
Configuring IPv4 on a Switch
Configuring a Switch to Learn Its IP Address with DHCP
Verifying IPv4 on a Switch
Miscellaneous Settings Useful in the Lab
History Buffer Commands
The logging synchronous, exec-timeout, and no ip domain-lookup Commands
Configuring and Verifying Switch Interfaces
Configuring Switch Interfaces
Configuring Speed, Duplex, and Description
Configuring Multiple Interfaces with the interface range Command
Administratively Controlling Interface State with shutdown
Removing Configuration with the no Command
Autonegotiation
Autonegotiation Under Working Conditions
Autonegotiation Results When Only One Node Uses Autonegotiation
Autonegotiation and LAN Hubs
Analyzing Switch Interface Status and Statistics
Interface Status Codes and Reasons for Nonworking States
Interface Speed and Duplex Issues
Common Layer 1 Problems on Working Interfaces
Implementing VLANs ans STP
Implementing Ethernet Virtual LANs
VLAN Tagging Concepts
The 802.1Q and ISL VLAN Trunking Protocols
Forwarding Data Between VLANs
The Need for Routing Between VLANs
Routing Packets Between VLANs with a Router
VLAN and VLAN Trunking Configuration and Verification
Creating VLANs and Assigning Access VLANs to an Interface
VLAN Configuration Example 1: Full VLAN Configuration
VLAN Configuration Example 2: Shorter VLAN Configuration
VLAN Trunking Protocol
VLAN Trunking Configuration
Implementing Interfaces Connected to Phones
Data and Voice VLAN Concepts
Summary: IP Telephony Ports on Switches
Troubleshooting VLANs and VLAN Trunks
Access VLANs Undefined or Disabled
Mismatched Trunking Operational States
The Supported VLAN List on Trunks
Mismatched Native VLAN on a Trunk
Virtual LAN Concepts
Creating Multiswitch VLANs Using Trunking
Spanning Tree Protocols Concepts
STP and RSTP Basics
The Need for Spanning Tree
What Spanning Tree Does
How Spanning Tree Works
The STP Bridge ID and Hello BPDU
Electing the Root Switch
Choosing Each Switch’s Root Port
Configuring to Influence the STP Topology
Details Specific to STP (and Not RSTP)
STP Activity When the Network Remains Stable
Changing Interface States with STP
Rapid STP Concepts
Comparing STP and RSTP
RSTP and the Alternate (Root) Port Role
RSTP States and Processes
RSTP and the Backup (Designated) Port Role
RSTP Port Types
Optional STP Features
EtherChannel
PortFast
BPDU Guard
Spanning Tree Protocol Easy Explain
Steps
Electing Root Switch
Based on Lowest BID
IF tie Lowest MAC ADDRESS
Choosing Root Port
the least STP/RSTP cost to reach the root switch
IF tie occurs Lowest BID,Port Priority,int Number
1 more item...
1) Lowest cost 2) Lowest Bridge ID 3) Lowest Port Number
RSTP and EtherChannel Configuration
Understanding RSTP Through Configuration
The Need for Multiple Spanning Trees
STP Modes and Standards
The Bridge ID and System ID Extension
How Switches Use the Priority and System ID Extension
RSTP Methods to Support Multiple Spanning Trees
Other RSTP Configuration Options
Configuring Layer 2 EtherChannel
Configuring a Manual Layer 2 EtherChannel
Configuring Dynamic EtherChannels
Physical Interface Configuration and EtherChannels
EtherChannel Load Distribution
Configuration Options for EtherChannel Load Distribution
The Effects of the EtherChannel Load Distribution Algorithm
IP Access Control Lists
Introduction to TCP/IP Transport and Applications
TCP/IP Layer 4 Protocols: TCP and UDP
Transmission Control Protocol
Multiplexing Using TCP Port Numbers
Popular TCP/IP Applications
Connection Establishment and Termination
Error recovery and Reliability
Flow Control using Windowing
User Datagram Protocol
TCP/IP Aplications
Uniform Resourses Identifiers
Finding the Web Servers Using DNS
Trasfering Files with HTTP
How the receiving Host Identifies the correct Receiving Application
Basic IP4 Access Control Lists
IPv4 Access Control List Basics
ACL Location and Direction
Matching Packets
Taking Action When a Match Occurs
Types of IP ACLs
Standard Numbered IPv4 ACLs
List Logic with IP ACLs
Matching Logic and Command Syntax
Matching the Exact IP Address
Matching a Subset of the Address with Wildcards
Binary Wildcard Masks
Finding the Right Wildcard Mask to Match a Subnet
Matching Any/All Addresses
Implementing Standard IP ACLs
Standard Numbered ACL Example 1
Standard Numbered ACL Example 2
Troubleshooting and Verification Tips
Reverse Engineering from ACL to Address Range
Advanced IP4 Access Lists
Extended Numbered IP Access Control Lists
Matching the Protocol, Source IP, and Destination IP
Matching TCP and UDP Port Numbers
Extended IP ACL Configuration
Named ACLs and ACL Editing
Named IP Access Lists
Editing ACLs Using Sequence Numbers
Numbered ACL Configuration Versus Named ACL Configuration
ACL Implementation Considerations
Additional Reading on ACLs
IP version 6
Fundamentals of IP version 6
Introduction to IPv6
The Historical Reasons for IPv6
IPv6 Routing
IPv6 Routing Protocols
IPv6 Addressing Formats and Conventions
Representing Full (Unabbreviated) IPv6 Addresses
Abbreviating and Expanding IPv6 Addresses
Abbreviating IPv6 Addresses
Expanding Abbreviated IPv6 Addresses
Representing the Prefix Length of an Address
Calculating the IPv6 Prefix (Subnet ID)
Finding the IPv6 Prefix
Working with More-Difficult IPv6 Prefix Lengths
IPv6 Addresing and subnetting
Global Unicast Addressing Concepts
Public and Private IPv6 Addresses
The IPv6 Global Routing Prefix
Address Ranges for Global Unicast Addresses
IPv6 Subnetting Using Global Unicast Addresses
Deciding Where IPv6 Subnets Are Needed
The Mechanics of Subnetting IPv6 Global Unicast Addresses
Listing the IPv6 Subnet Identifier
List All IPv6 Subnets
Assign Subnets to the Internetwork Topology
Assigning Addresses to Hosts in a Subnet
Unique Local Unicast Addresses
Subnetting with Unique Local IPv6 Addresses
The Need for Globally Unique Local Addresses
Implementing IPv6 Addressing on Routers
Implementing Unicast IPv6 Addresses on Routers
Static Unicast Address Configuration
Configuring the Full 128-Bit Address
Enabling IPv6 Routing
Verifying the IPv6 Address Configuration
Generating a Unique Interface ID Using Modified EUI-64
Dynamic Unicast Address Configuration
Special Addresses Used by Routers
Link-Local Addresses
Link-Local Address Concepts
Creating Link-Local Addresses on Routers
Routing IPv6 with Only Link-Local Addresses on an Interface
IPv6 Multicast Addresses
Reserved Multicast Addresses
Multicast Address Scopes
Solicited-Node Multicast Addresses
Miscellaneous IPv6 Addresses
Anycast Addresses
IPv6 Addressing Configuration Summary
IP services
Device Management Protocol
System Message Logging (Syslog)
Sending Messages in Real Time to Current Users
Storing Log Messages for Later Review
Log Message Format
Log Message Severity Levels
Configuring and Verifying System Logging
The debug Command and Log Messages
Network Time Protocol (NTP)
Setting the Time and Timezone
Basic NTP Configuration
NTP Reference Clock and Stratum
Redundant NTP Configuration
NTP Using a Loopback Interface for Better Availability
Analyzing Topology Using CDP and LLDP
Examining Information Learned by CDP
Configuring and Verifying CDP
Examining Information Learned by LLDP
Configuring and Verifying LLDP
Network Address Translation
Perspectives on IPv4 Address Scalability
CIDR
Private Addressing
Network Address Translation Concepts
Static NAT
Dynamic NAT
Overloading NAT with Port Address Translation
NAT Configuration and Troubleshooting
Static NAT Configuration
Dynamic NAT Configuration
Dynamic NAT Verification
NAT Overload (PAT) Configuration
NAT Troubleshooting
QoS
Introduction to QoS
QoS: Managing Bandwidth, Delay, Jitter, and Loss
Types of Traffic
Data Applications
Voice and Video Applications
QoS as Mentioned in This Book
QoS on Switches and Routers
Classification and Marking
Classification Basics
Matching (Classification) Basics
Classification on Routers with ACLs and NBAR
Marking IP DSCP and Ethernet CoS
Marking the IP Header
Marking the Ethernet 802.1Q Header
Other Marking Fields
Defining Trust Boundaries
DiffServ Suggested Marking Values
Expedited Forwarding (EF)
Assured Forwarding (AF)
Class Selector (CS)
Guidelines for DSCP Marking Values
Queuing
Round-Robin Scheduling (Prioritization)
Low Latency Queuing
A Prioritization Strategy for Data, Voice, and Video
Shaping and Policing
Policing
Where to Use Policing
Shaping
Setting a Good Shaping Time Interval for Voice and Video
Congestion Avoidance
TCP Windowing Basics
Congestion Avoidance Tools
Wireless LANs
Fundamentals of Wireless Networks
Comparing Wired and Wireless Networks
Wireless LAN Topologies
Basic Service Set
Distribution System
Extended Service Set
Independent Basic Service Set
Other Wireless Topologies
Repeater
Workgroup Bridge
Outdoor Bridge
Mesh Network
RF Overview
Wireless Bands and Channels
APs and Wireless Standards
Analyzing Cisco Wireless Arquitectures
Autonomous AP Architecture
Cloud-based AP Architecture
Split-MAC Architectures
Comparing Wireless LAN Controller Deployments
Cisco AP Modes
Securing Wireless Networks
Anatomy of a Secure Connection
Authentication
Message Privacy
Message Integrity
Wireless Client Authentication Methods
Open Authentication
WEP
802.1x/EAP
LEAP
EAP-FAST
PEAP
EAP-TLS
Wireless Privacy and Integrity Methods
TKIP
CCMP
GCMP
WPA, WPA2, and WPA3
IP Security Services
Security Arquitectures
Security Terminology
Common Security Threats
Attacks That Spoof Addresses
Denial-of-Service Attacks
Reflection and Amplification Attacks
Man-in-the-Middle Attacks
Address Spoofing Attack Summary
Reconnaissance Attacks
Buffer Overflow Attacks
Malware
Human Vulnerabilities
Password Vulnerabilities
Password Alternatives
Controlling and Monitoring User Access
Developing a Security Program to Educate Users
Securing Networks Devices
Securing IOS Passwords
Encrypting Older IOS Passwords with service password-encryption
Encoding the Enable Passwords with Hashes
Interactions Between Enable Password and Enable Secret
Making the Enable Secret Truly Secret with a Hash
Improved Hashes for Cisco’s Enable Secret
Encoding the Passwords for Local Usernames
Controlling Password Attacks with ACLs
Firewalls and Intrusion Prevention Systems
Traditional Firewalls
Security Zones
Intrusion Prevention Systems (IPS)
Cisco Next-Generation Firewalls
Cisco Next-Generation IPS
OSPF
Understanding OSPF concepts
Comparing Dynamic Routing Protocol Features
Routing Protocol Functions
Interior and Exterior Routing Protocols
IGP and EGP
Comparing IGPs
IGP Routing Protocol Algorithms
Metrics
Other IGP Comparisons
Administrative Distance
OSPF Concepts and Operation
OSPF Overview
Topology Information and LSAs
Applying Dijkstra SPF Math to Find the Best Routes
Becoming OSPF Neighbors
Meeting Neighbors and Learning Their Router ID
Exchanging the LSDB Between Neighbors
Fully Exchanging LSAs with Neighbors
Maintaining Neighbors and the LSDB
Using Designated Routers on Ethernet Links
Calculating the Best Routes with SPF
OSPF Areas and LSAs
OSPF Areas
How Areas Reduce SPF Calculation Time
(OSPFv2) Link-State Advertisements
Router LSAs Build Most of the Intra-Area Topology
Network LSAs Complete the Intra-Area Topology
Network Arquitecture
LAN Arquitecture
Analyzing Campus LAN Topologies
Two-Tier Campus Design (Collapsed Core)
The Two-Tier Campus Design
Topology Terminology Seen Within a Two-Tier Design
Three-Tier Campus Design (Core)
Topology Design Terminology
Small Office/Home Office
Power over Ethernet (PoE)
PoE Basics
PoE Operation
PoE and LAN Design
Introduction To Networking
Introduction To TCP/IP Networking
Perspectives on Networking
TCP/IP Networking Model
History Leading to TCP/IP
Overview of the TCP/IP Networking Model
TCP/IP Application Layer
HTTP Overview
HTTP Protocol Mechanisms
TCP/IP Transport Layer
TCP Error Recovery Basics
Same-Layer and Adjacent-Layer Interactions
TCP/IP Network Layer
Internet Protocol and the Postal Service
Internet Protocol Addressing Basics
IP Routing Basics
TCP/IP Data-Link and Physical Layers
Data Encapsulation Terminology
Names of TCP/IP Messages
OSI Networking Model and Terminology
Comparing OSI and TCP/IP Layer Names and Numbers
OSI Data Encapsulation Terminology
Using The Command Line Interface
Accessing the Cisco Catalyst Switch CLI
Cisco Catalyst Switches
Accessing the Cisco IOS CLI
Cabling the Console Connection
Accessing the CLI with Telnet and SSH
User and Enable (Privileged) Modes
Password Security for CLI Access from the Console
CLI Help Features
The debug and show Commands
Configuring Cisco IOS Software
Configuration Submodes and Contexts
Storing Switch Configuration Files
Copying and Erasing Configuration Files