Ccna - Best Hand Note
Ccna - Best Hand Note
A Presentation
by
Faruk Mamaniat
(mrlogic0)
Based on
Paul Browning’s
“CCNA Cram Guide”
CCNA Cram Guide
– NBP
3. Network Layer
• Routes data from one node to another and determines the best
path to take
• Routers operate at this level
• Network addresses are used here for routing
• Routing tables, subnetting and control of network congestion
occur here.
• Routing protocols regardless of which protocol they run over
reside here:
– RIP
– IP
– IPX
– ARP
– IGRP
– Appletalk
8
• [Encapsulation
Created by Faruk Mamaniat=–Packets]
Based on Paul Browning’s CCNA Cram Guide
2. Data Link Layer
• Sometimes referred to as the LAN layer.
• Responsible for the physical transmission of data from one node
to another
• Packets are translated into Frames here and hardware address is
added.
• Error detection
• Bridges and switches operate at this layer.
• [Encapsulation = Frames]
• Telnet
– Used to connect to a remote device (TCP)
– A password and username is required to connect.
– Telnet tests all seven layers of the OSI model.
• SNMP
– Allows remote management of network devices.
• FTP
– Connection orientated (TCP) protocol
– Used to transfer large files.
• TFTP
– Connectionless (UDP) protocol used for file
transfer
• Console port:
– A PC is connected to the console port via a rollover cable.
– Used for initial configuration or disaster recovery.
• Auxiliary port:
– Normally a modem connected to this port.
• Virtual Terminals:
– Normally accessed by telnetting to the router.
– Five lines available numbered [vty] 0-4
• TFTP server:
– The router can get its configs or IOS from a server (PC for
example) running TFTP software and holding the necessary
files.
• NMS:
– Network management station
– Uses SNMP to manage the router normally via a Web style
interface.
• Switching
– LAN Switches are primarily hardware based.
– Many spanning-tree instances per switch and up to
100 ports.
• Bridging
– Bridges are primarily software based and have one
spanning-tree instance per bridge.
– Normally 16 ports per bridge.
• Format/Default Mask
– N.H.H.H
– 255.0.0.0
• Leading Bit Pattern = 0
• Network Address Range = 0 - 126
• Max Networks = 126
• Max Hosts/nodes = 16,777,214
• Format/Default Mask
– N.N.H.H
– 255.255.0.0
• Leading Bit Pattern = 10
• Network Address Range = 128 -191
• Max Networks = 16,384
• Max Hosts/nodes = 65,534
• Format/Default Mask
– N.N.N.H
– 255.255.255.0
• Leading Bit Pattern = 110
• Network Address Range = 192 - 223
• Max Networks = 2,097,152
• Max Hosts/nodes = 254
• Dual-Stack
• Tunnelling
• E.g
ip route 172.16.5.2 255.255.255.0 172.16.12.8
• For EIGRP
Router(config)# router eigrp 20
Router(config-router)#network 172.16.0.0
Router(config-router)#no auto-summary <- {optional}
• For OSPF
Router(config)#router ospf 20
Router(config-router)#network 172.16.0.0 0.0.255.255 area 0
• Uses IP protocol 88
• Classless
• Hybrid of distance vector and link state
• Multicasts updates to 224.0.0.10
• Uses feasible successors to determine alternative
routes to networks.
• The feasible successor is a backup route based upon
the topology table.
• Open System
– Host sends an association request to the wireless access
point and it will be sent a success or failure message
• Shared key
– A key or pass phrase is configured on the AP & client(s)
– 3 Types of Authentication: WEP, WPA, WPA2…
• Wildcard masks
• Access lists are applied to
interfaces
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 85
Inbound & Outbound
Access Lists
• Inbound:
– Save the router having to process the packet
– Denied packets will be dropped at the inbound interface
• Outbound:
– Will be processed by the router
– Then dropped at the outbound interface if they match the
access list
• Service password-encryption
• Enable
• Enable Secret
• VTY
• Auxiliary
• Console
• Firewalls
– Divide your network into three zones:
• Trusted
• Semi-Trusted
• Un-Trusted
• VPN
– Allows information to be sent securely over an insecure
medium (eg Internet)
– Can be:
• Site-to-Site (eg WAN)
• Access (eg homeworker)
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 96
Security Device Manager
(SDM)
• A GUI web based tool
• Allows you to configure and manage your Cisco
routers
• Can be installed on your router or your PC
• (Huge amount of parameters and screens to navigate)
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 100
Frame Relay (1)
• Based upon x.25 protocol
• Less error checking = quicker
• 56K to 2Mb
– Ideal for SMEs
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 101
Frame Relay (2)
• Each router uses LMIs for keepalives on the line
between the router & the frame relay switch:
– LMI type is Cisco by default.
– You must use another type such as ansi if connecting to a non-cisco
router.
• Router(config-if)#encapsulation frame-relay
Router(config-if)#frame-relay map ip 2.2.2.2 100
– Router is told to get to ip address 2.2.2.2 use dlci 100
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 103
Frame Relay Problems include:
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 104
20. Troubleshooting
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 105
Show ip interface brief
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 106
Layer 1
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 107
Layer 2
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 108
Layer 3
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 109
Warning!
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 110
CCNA Cram Guide
Created by Faruk Mamaniat – Based on Paul Browning’s CCNA Cram Guide 111