Ccna (Cisco Certified Network Associate) Certification and Training Program
Ccna (Cisco Certified Network Associate) Certification and Training Program
Ccna (Cisco Certified Network Associate) Certification and Training Program
• Domain 3: IP Connectivity
• Domain 4: IP Services
Domain 3: IP Connectivity
Domain 4: IP Services
25%
Network Fundamentals
o Endpoint Devices: These are the equipments that require network data access. For eg.
Computers, tablets, phones, printers etc.
o Network Devices: These are the equipments that transfers the data between endpoints.
For eg. Firewalls, switches, routers, wireless access points
o Network Protocols: These are a set of rules that are to be followed when there is a
communication between endpoints in a network
• Routers also provide multiple broadcast domains, traffic segmentation, and determine
the networks and network layer addressing subnets
• Those networks are defined by router network adapters or ports to which IP addresses
are assigned
• Those IP addresses are the default gateway to PCs and other networking devices
o Static: Static routers require an administrator to set up and configure the routing
table manually and to define each route
• Routers communicate with each other to share information about accessible paths and
directly connected routes
• A L2 (Layer 2) switch is a type of device or network switch that operates on the second
layer of OSI Layer (data link layer) and uses MAC Address to determine the path through
which the frames are to be transmitted
• This uses techniques of hardware-based switching to connect and transmit data in a LAN
(local area network)
• The primary responsibility of a layer 2 switch is to transport data on a physical layer and
to perform error checks on every transmitted and received frame
• A layer 2 switch needs NIC's MAC address for the transmission of data on each network
node
• They automatically learn MAC addresses by copying the MAC address of each frame
received or by listening to devices on the network and maintaining the MAC address of
the devices in a forwarding table
• It serves as a switch for connecting devices on the same subnet or virtual LAN at
lightning speeds and has IP (Internet Protocol) routing intelligence built in to double up
as a router
• It can maintain routing protocols, inspect incoming packets and even make routing
decisions based on the addresses of the source and destination
Application Streamlined
Multi-functional
Awareness Infrastructure
• There are several different threats that an IPS is designed to prevent, and it includes:
Distributed
Denial of Service Various types of
Denial of Service Worms Viruses
(DoS) attack exploits
(DDoS) attack
• An IPS is typically configured to use many different procedures to secure the network
from an unauthorised user
• It includes:
Signature-Based
Anomaly-Based
Policy-Based
• Just like a switch or HUB connects multiple devices in single or multiple wired LAN
networks, an access point connects multiple wireless devices in single or multiple
wireless networks
• You can also use an access point to extend the wired network to the wireless devices
• The access point is categorised into three types based on the functionalities:
• Cisco DNA Center is the foundational controller and analytics framework at the core of
intent-based network of Cisco
• Cisco DNA Center provides intuitive, centralised management which makes it fast and easy
to design, provision and implementation of policies across your network environment
• The Cisco DNA Center UI provides end-to-end visibility of the network and makes use of
network insights to optimise performance of the network and deliver the best user and
application experience
• A WLC (Wireless LAN Controller) is a wireless architecture that aims to meet changing
network requirements
• Wireless network access points are controlled by a WLAN controller which allows wireless
devices to connect to the network
• What an amplifier does for your home stereo is similar to what a wireless access point
does for your network
• The bandwidth, which is coming from a router, is taken and stretched by WLC so that
several devices can go on the network from farther distances away
• One of the biggest problems with endpoint devices is that they involve robust security for
a system of enterprise or a network
• Security managers should determine whether several endpoint devices could be security
gaps for a network i.e. if the unauthorised users can access that endpoint device and use
the same to pull off sensitive or imperative data
2) Distribution (generally all fiber connections, Layer 2 switching, uplink aggregation where
switch to switch links interconnect)
3) Access (generally all copper connections, where endpoints connect to the network)
Core/Distribution
Access
Core
Distribution
Access
• For Data center solutions such as Fabric path and Cisco ACI, Spine and Leaf architectures
were introduced
• The main focus of this architecture is that there are no layer 2 loops and each destination
is reachable within a maximum of two routed hops
Spines
Leafs
• WAN (Wide area network) can be defined as a data communication network which work
beyond the geographic scope of LAN
• Wide area network utilises transmission facilities that are provided by the common
carriers like telephone companies
• The WAN technologies usually function at the OSI reference model’s lower three layers:
the network layer, the physical layer and the data link layer
1. Circuit switching
• It dynamically builds a virtual connection for data or voice between the sender and the
receiver
• It is important to establish the connection through the service provider network before
the communication begins
1. Circuit switching
Circuit
Switching
2. Packet switching
• A packet-switched network (PSN) divides the traffic data into packets that are routed
over a shared network
• These networks do not need a circuit to be established, and they permit several nodes
pairs to interact over the same channel
• The switches in a packet-switched network ascertain the links that packets must be sent
over based on the addressing information in every packet
2. Packet switching
175
87
219
Gi0/1 Gi0/2
H1 SW1 H2
• It allows the two systems (computers) to communicate with each other. Perhaps to
share few files or play a multiplayer game
H3
H3
• On-premises software is installed on the servers of a company and behind its firewall,
and it is only provided to organisations for a long time and may continue to serve your
business requirements adequately
• This is because the software itself is licensed and the whole instance of the software is
located within the premises of an organisation, there is usually greater protection than
with a cloud computing infrastructure
• Coaxial cable, shielded twisted pair, and unshielded twisted pair are the three types of
copper cable
Is used for long distances Is use for shorter distances Is used for shorter distances
• In such a situation, network data can collide and cut down performance
• Now-a-days, endpoints are generally connected to switch interfaces that connect per-
port collision domains
Point-to-Point Point-to-Multipoint
• Some devices with PoE, usually a LAN switch, act as the PSE (Power Sourcing Equipment)
and the device that supplies DC (Direct Current) power over the Ethernet UTP
(Unshielded Twisted Pair) cable (as shown in Figure)
Power Supply
• PoE, standardised by the IEEE (Institute of Electrical and Electronics Engineers), extends
the same IEEE auto-negotiation mechanisms. These mechanisms are required to work
before the initialisation of PD(Powered Device), because the PD needs power before it
can boot
• PoE can determine whether the device on the end of the cable needs power (i.e., it is a
PD) and how much power to supply, by using IEEE auto-negotiation messages and
watching for the return signal levels
• A collision is a mechanism used by Ethernet for controlling access and allocating shared
bandwidth among stations that want to transmit on a shared medium simultaneously
• Because the medium is shared, there has to be a mechanism where two stations will
detect that they want to transmit simultaneously. This mechanism is collision detection
• Packets input gives the total number of error-free packets that the system receives
• The total number of bytes in the error-free packets is given by the bytes input that
received by the system, including data and MAC encapsulation
• Input error involves giants, runts, CRC (cyclic redundancy check), frame, overrun, no
buffer and ignored counts
• On both ends, duplex and speed should match or else you will have problems
• Traffic can still transmit with inconsistent duplex and speed, but you will experience
retransmissions and decreased throughput
• Duplex is subservient to speed in the way that the duplex can not be changed manually if
speed is set to auto
• When both the duplex and speed settings on the two devices are hardcoded, you might
see Cyclic Redundancy Check (CRC) error messages
• As an example, TCP offers error recovery but it consumes more bandwidth as well as
processing cycles in order to do so
• UDP is connection less protocol and it does not provide reliability, windowing, reordering
of the received data segmentation of large chunks of data into the right size for
transmission
• UDP offers some functions of TCP like multiplexing using port numbers, data transfer and
do it with fewer bytes of overhead and less processing needed as compared to TCP
• UDP Header
• As an example, routers discard packets for a variety of reasons such as congestion, bit
errors and those instances in which correct routes are not known
• Most of the data link protocols notice errors with the help of error detection process and
then discard those frames which have errors.
• TCP offers error recovery i.e. retransmission and help in avoiding congestion i.e. flow
control, however UDP does not
• As compared to TCP, UDP requires less bytes in its header which results into fewer bytes
of overhead in the network
• UDP software does not slow down the transfer of data in cases where TCP slow down
purposefully
• Some applications like Voice over IP or Video over IP do not require error recovery and
hence they use UDP
• The combination of a subnet mask and an IP address can be used to define a host ID and
a network ID
• Based on the first octet of the IP address, classful addressing allocates a network ID
• The classful addressing scheme was used before subnet masks are used to recognise the
network ID portion of an address
o Class A, Class B, and Class C Addresses
• Under classful addressing, the network IDs are classified into three classes describing
different sizes of IP network
Network ID Host ID
Class B
10?????? ???????? ???????? ????????
16,384 65,354 128-191
Network ID Host ID
Class C
110????? ???????? ???????? ????????
2,097,152 254 192-223
Network ID Host ID
• There are almost 16 thousand Class B networks, each comprising up to 65,000 hosts
• Class C networks support only 254 hosts each, but there are over 2 million of them
There are two additional classes of IP address (D and E) that use the remaining numbers:
• Class E addresses (240.0.0.0 through 255.255.255.255) are used for experimental use
and testing
• A public IP network refers to one that can establish a connection with other public IP
networks and hosts over the Internet
• IANA governs the allocation of public IP addresses and regional registries and Internet
Service Providers (ISP) administer it
• Hosts interacting with one another over a LAN use a public addressing scheme but will
more typically use private addressing
• Any organisation can use private addresses on their networks without applying to ISP,
and multiple organisations can use these ranges simultaneously
Internet access can be facilitated for hosts utilising a private addressing scheme in two
methods:
• Through a proxy server that accomplishes requests for Internet resources on behalf of
clients
• A public IP network address can represent an organisation on the Internet, but most
companies need to subdivide their private networks into different logical groups
o Subnet Design
Large networks are divided by organisations into logically distinct subnets for these reasons:
VLANs are used by large networks to isolate broadcast domains and formulate
subnets to map to each VLAN
• Networks that use different data links and physical technologies, such as Ethernet and
Token Ring, should be separated logically as different subnets
• Several organisations have more than one site and WAN links between them. The WAN
link forms a separate subnet
• It is beneficial to divide a network into logically distinct zones for administrative and
security control
• While IPv4 was initially based on a classful address scheme, subnetting substituted the
idea of recognising the network portion of an IP address based on its class with the idea
of using a subnet mask
• The subnet mask length defines the length of the network portion of the IP address
• As the "1"s in a mask are always contiguous, every octet in decimal in a subnet mask will
always be one of the below mentioned:
The default subnet masks correspond to the three classes of unicast IP address (A, B, and C).
The default masks include whole octets:
• Class A: 255.0.0.0
• Class B: 255.255.0.0
• Class C: 255.255.255.0
• These default masks can be changed to permit a single network to be divided into
several subnets
• For this, additional bits of the IP address has to be allocated to the network address
rather than the host ID
Network ID Host ID
16-bit 16-bit
Internetwork addressing (Class B address)
• The whole network is still referred to by the network ID and the default mask:
172.1.0.0 / 255.255.0.0
• However, routers within the network add bits to the mask for differentiating the subnets
• With a classless addressing scheme, the concept of default masks and address classes is
abandoned in favour of representing the address with an adequately sized network
prefix
• The idea of aligning netmask along a particular octet boundary is wholly discarded
• For example, when expressed in binary, the subnet mask 255.255.240.0 includes 20 ones
followed by 12 zeroes. Therefore, the network prefix, displayed in slash notation, is
172.1.0.0/20
• The routers have performed classless routing for a very long time, and the class
terminology is still used widely
• Under classless addressing, the old classes are usually used as names for the netmasks
that align to whole octet boundaries; a Class A network is /8, a Class B network is /16,
and a Class C network is /24
A network designer requires to plan the IP network addressing scheme carefully. Before
selecting a scheme, examine the given below factors:
The following are some additional constraints to consider while planning an addressing
scheme:
• The network and host IDs cannot be all 1s in binary – this is reserved for broadcasts
• The network and host ID cannot be all zeroes in binary; 0 means "This Network"
While performing subnet calculations, it helps to identify that each power of two is double
the previous one:
22 23 24 25 26 27 28
4 8 16 32 64 128 256
When an organisation needs to connect to the Internet, it must apply for a range of public IP
addresses through its ISP
o Classful Addressing
• With the subnetting introduction, depending on the class of IP address, some octets
were fixed, but the left portion could use any valid addressing scheme
• For example, an organisation may allocate the network address 128.248.0.0 where it can
allocate the third and fourth octets as required
• Under this classful system, almost all the Class B addresses became allocated
• This deficiency of network addresses prompted the development of IPv6, which utilises a
much larger address space
• However, the deployment of IPv6 has been protracted enormously, so a series of stopgap
measures have been introduced over the years
• The subnetting and private address ranges are used to hide the private local networks
complexity from the wider Internet
• Classless addressing was created to solve two main difficulties of the classful addressing
scheme as more and more networks are joining the Internet
• The first difficulty was that network addresses (especially, Class B addresses) were
becoming very scarce and the second difficulty was near exponential growth in Internet
routing tables
• Mostly, it utilises bits usually assigned to the network ID to mask them as subnet bits or
host
/21 External Network address Internal Network Addresses and Host IDs
21-bit 11-bit
• For example, instead of allocating a class B (or /16) network address to a company,
various contiguous class C (or /24) addresses could be assigned
• Eight /24 network addresses give 2032 hosts. This means complex routing with several
entries in the routing tables to represent eight IP networks at the same location
• If the ANDed result exhibits the same network ID as the destination address, then it is
the same network
• In the following table, the first two IP addresses belong to the same network (the second
is the broadcast address for the network) but the third is in a different one:
• As the IPv4 address space becomes steadily more utilised, there is a need to use more
efficient methods of allocating IP addresses
• VLSM enables a network designer to allocate IP addresses ranges to subnets that match
the predicted requirement for numbers of subnets and hosts per subnet more closely
• Without VLSM, the user has to allocate subnetted ranges of addresses that are of the
same size and utilise the same subnet mask within a single class-based network
• This means that there is a need to install additional routing interfaces to connect various
smaller subnets within a department
• VLSM enables different length subnet masks to be used within the same IP network,
permitting more flexibility in the design process
• This scenario has six main offices each with differing network sizes and IP address
requirements
• There are also two subnets connecting the regional routers with the headquarters
router, which renders access to the Internet
• VLSM design continues by recognising the largest subnets and organising the scheme in
descending order
• Even though VLSM enables more precise allocation of address space, but there is a need
to design for growth and allow space in every subnet for additional hosts
• The need for the subnetted network are listed in the table given on the next slide, along
with the actual number of IP addresses that would be rendered by the VLSM design
Branch Office C 70 126
Router Subnet North 2 2
Router Subnet South 2 2
• However, the method in which addresses have been allocated is inefficient that leads to
wastage of available addresses
• Addressing scheme inefficiencies and increasing demand for addresses indicates that the
available IPv4 address supply is close to exhaustion
• Private addressing and network address translation (NAT) have rendered a 'stopgap'
solution to the problem
• Its 128-bit addressing scheme has space for 340 undecillion unique addresses
• Only a small part of the scheme can be allocated currently to hosts, but there is still
enough address space within that allocation
• IPv6 is designed to fulfil the demands of personal and handheld devices with internal
connectivity
• Currently, that means phones, but the IPv6 designers visualise a world of wireless
Internet connectivity for a huge variety of appliances
• For example, an advertising hoarding could be made "active" so that it can be linked to
the product through the phone
• Now, IPv6 has begun to be deployed in particular sections of corporate and public
networks
• While IPv6 has been a standard installed feature in the last few versions of both desktop
and Server of common OSes; it is only in the core network that IPv6 has been
implemented typically
• However, with the increasing problems with existing IPv4, the IPv6 will become more
mainstream for corporate networks down to the desktop and the web in general
o Hexadecimal Numbering
• For interpreting IPv6 addresses, the user needs to understand the hexadecimal notation
and the base numbering system
• Base 10 defines that each digit can have one of ten possible values (0…9)
• A digit placed to the left of another is ten times the value of the digit to the right
(2x10x10)+(5x10)+5
• Binary is base 2 so a digit in any given position can only have one of two values (0 or 1)
and each place position is the next power of 2
• The binary value 11111111 can be changed to the decimal value 255 with the help of
below-mentioned sum:
(1x2x2x2x2x2x2x2)+(1x2x2x2x2x2x2)+(1x2x2x2x2x2)+(1x2x2x2x2)+(1x2x2x2)+(1x2x2)+(1x2)+1
• Several values in computing, such as IPv4 addresses, are depicted in octets (or bytes)
• As the addresses of IPv6 are long (128 bits), the dotted decimal conversion becomes
difficult
• Hex is base 16 with the possible values of each digit signified by the numerals 0…9 and
the characters A, B, C, D, E, F
The following table is used to convert between binary, decimal, and hexadecimal values
• IPv6 addresses include eight 16-bit numbers with each double-byte number expressed as
4 hex digits. For example, the binary address:
0010 0000 0000 0001 : 0000 1101 1011 1000 : 0000 0000 0000 0000 :
0000 0000 0000 0000 : 0000 1010 1011 1100 : 0000 0000 0000 0000 :
1101 1110 1111 0000 : 0001 0010 0011 0100
2001:0db8:0000:0000:0abc:0000:def0:1234
• In addition, one contiguous series of zeroes can be substituted by a double colon place
marker
2001:db8::abc:0:def0:1234
• Double-colon compression can be used only single time in a given address. For example:
2001:db8::abc::def0:1234
• The above mentioned is not valid as it is ambiguous between the below two addresses:
2001:db8:0000:0abc:0000:0000:def0:1234
2001:db8:0000:0000:0abc:0000:def0:1234
• If IPv6 addresses are used as part of a URL, then the IPv6 address must be enclosed
within square brackets
• For example:
http://[2001:db8::abc:0:def0:1234]/index.htm
• An IPv6 packet comprises two or three elements: the main header, one or more optional
extension headers, and the payload
Flow Label 20 bits Used for QoS management, such as for real-time streams. This is set to 0
for packets not part of any delivery sequence or structure
Payload Length 16 bits Indicates the length of the packet pay load, up to a maximum of 64 KB; if
the payload is bigger than that, this field is 0 and a special Jumbo Payload
(4 GB) option is established
Next Header 8 bits Used to describe what the next extension header (if any) is, or where the
actual payload begins
• An IPv6 address is divided into two parts: the first 64 bits are utilised as a network ID and
the second 64 bits designate a specific interface
Network ID Interface ID
64-bit 64-bit
• Network addresses are written by utilising CIDR notation, where /nn is the routing prefix
length in bits
• Within the 64-bit network ID, as with CIDR, the network prefix length is utilised to decide
whether two addresses refer to the same IP network
• For example, if the prefix is /48, then if the IPv6 address' first 48 bits were the same as
another address, the two would belong to the same IP network
2001:db8:3c4d::/48 2001:db8:3c4d:01::/64
• IPv6 describes several addressing schemes. These are unicast, multicast, and anycast
• Global scopes render the equivalent of public addressing schemes in IPv4 while link-local
schemes render private addressing
• Globally scoped unicast addresses are routable over the Internet and are the equivalent
of public IPv4 addresses
The first 3 bits (001) denote that the address is within the global scope. Maximum
IPv6 address space is unused. The scope for globally unique unicast addressing holds
1/8th of the total address space. In hex, globally scoped unicast addresses will begin
with a 2 (0010) or 3 (0011)
The next 45 bits are allotted hierarchically to regional registries and from them to
ISPs and end users
• The digits fffe are added in the middle of the address, and the U/L bit is flipped
• For example, the MAC address 00608c123abc would become the EUI-64 address
02608cfffe123abc, which when expressed in doublebytes becomes 0260:8cff:fe12:3abc,
or 260:8cff:fe12:3abc
• In the second technique, the client device uses a pseudorandom number for the
interface ID. This is referred to as a temporary interface ID or token
• Using interface identifiers would permit a specific host to be recognised and monitored
closely when connecting to the Internet and utilising a token mitigates this to some
degree
• Link-local addresses begin with a leading fe80 while the next 54 bits are set to zero and
the last 64 bits are the interface ID
• However, an IPv6 host is always configured with link-local addresses, even if it also has a
globally unique address
• A link-local address is also appended with a zone index of the form %1 (Windows) or
%eth0 (Linux)
• This is used to determine the address source and make it unique to a specific link
• For example, a host may have links to Ethernet, loopback address, and a VPN
• All these links use the same link-local address, so to make it unique each is assigned a
zone ID
• The host system generates zone indices, so where two hosts communicate, they may be
indicating to the link using different zone IDs
• Unique Local Addressing assigns addresses that are only routable within a site
• Unique Local Addressing (ULA) addresses are not routable over the Internet
• ULA is designed for hosts that will never access the Internet
• The prefix for unique local addressing is fc00;:/7 but it is more common to see addresses
of form fd00::/8 as to indicate the local addressing, the 8th bit should be fixed to 1
• A pseudo-random algorithm should generate the next 40 bits and used for a single site
only
• While designed for site-local addressing, ULA is global in scope, which indicates that no
organisation should assign the same ULA prefix. The remaining 16 bits can be utilised for
subnetting
• A multicast address recognises multiple network interfaces, and unlike IPv4, IPv6 routers
must support multicast
The first 8 bits show that the address is within the multicast scope (1111 1111 or ff)
The next 4 bits are utilised to flag types of multicast if required (they are set to 0
otherwise)
The next 4 bits define the scope; for example, 1 is node-local while 2 is link-local
The final 112 bits define multicast groups within that scope
• Broadcast addresses are not executed in IPv6. Instead, hosts use a suitable multicast
address for a given situation
• The multicast addresses are reserved for these types of "broadcast" functionality. They
enable an interface to "broadcast" to all routers or interfaces on the same node or local
link
Address Target
ff02::1 All link-local nodes
ff02::2 All link-local routers
ff02::1:2 All link-local DHCP servers and relay agents
• ARP is "chatty" and needs every node to process its messages, whether they are relevant
to the node or not. IPv6 substitutes ARP with the Neighbor Discovery (ND) protocol
• It includes the prefix ff02::1:ff and also the last 24 bits of the unicast address
• It decreases the hosts' number that is likely to receive ND messages and is therefore
more useful than the old ARP broadcast mechanism
• Anycast is used when the message is required to be sent to any members of a group but
not certainly to all of them
• The packet is sent to the group member physically closest to the transmitting host
• Following table is used to identify some commonly used classes of IPv6 address by prefix
notation or leading hex digits:
Global unicast 2000::/3 2, 3
Multicast ff00::/8 ff
o Range - 2000::/3
o Range – FD00::/8
o Self-generated
o Range – FE80::/10
1.9.d AnyCast
o Range – FF00:/8
a. Windows
The following are the steps to verify interface IP parameters in Windows OS:
1. Open the command prompt application by searching for “command prompt” with a
Windows search
The following are the steps to verify interface IP parameters in MAC OS:
The following are the steps to verify interface IP parameters in Linux OS:
1. Open the terminal application by searching for “terminal” with an application search
1 2 3 4 5 67 8 9 10 11
5 GHz channels (U.S.)
36 40 44 48
…
RF
• Most companies, now a days, create a virtualised data centre i.e. the company purchases
server hardware, installs it in racks, and then treats all the CPU, RAM, and so on as
capacity in the data centre
• After that, each OS instance is decoupled from the hardware and is therefore virtual
• Every piece of hardware that we would previously have thought of as a server runs
multiple instances of an OS at the same time, with each virtual OS instance called a
virtual machine, or VM
OS OS OS OS
Hypervisor
• The management and allocation of the host hardware i.e. CPU, RAM, etc. to each VM
based on the settings for the VM is done by the hypervisor
• Generally, a physical server has one or more NICs, maybe as slow as 1 Gbps, often 10
Gbps today, and maybe as fast as 40 Gbps
• To make the OS work normally, every VM has at least one NIC, but for a VM, it is a virtual
NIC
• Mostly, every server uses some kind of an internal Ethernet switch concept, known as a
virtual switch, or vSwitch
• By default, the switch removes MAC address table entries after every five minutes
• The layer 2 broadcast is transmitted to all devices on a single broadcast (segment) domain
• The switch generates the broadcast packet ffff.ffff.ffff as the MAC address of the
destination and transmits it to all ports except where the frame was learned
• The IP address of source and destination in the header are needed for end-to-end
connectivity
• Wireless access points and Switches are network devices which make forwarding
decisions on the basis of the destination MAC address in the frame
• In the frame, Wireless access points and Switches do not change MAC addressing
• The switch does not rewrite the MAC addressing in the header of frames
• It examines the MAC address of source and MAC address of the destination
• When not listed, the incoming frame's source MAC address is added to the MAC
address table
• The switch examines the frame header for the MAC address of the destination and
looks up the MAC address table for a forwarding decision
• Then, the frame is forwarded out the switch port related with the MAC address of the
destination where the host is connected
• Any MAC address of the destination which is not local is forwarded to the router
• Initially, the L2 table does not have a MAC address of the destination port. Therefore,
LAN switch broadcast the messages of all the connected ports to get the MAC address
of each of the connected ports. This causes the Frame Flooding
• Then, the second time LAN switch broadcast the messages to the specific port based on
MAC address of frame destination(MAC address of the destination port)
Is address of that
destination port is
No Yes
available in the CAM
table
Forward frame to all the connected ports Forward frame only to the port which is
except the port on which it arrived connected with the destination address
• A MAC address has the purpose of providing a unique identifier for layer 2
• That enables the communication between devices of the different segment of the
network (VLAN) or the same segments
• The decisions regarding switch forwarding are based on the assigned port and the MAC
address
• The last 24 bits (bold) is a unique serial number (SN), and the first 24 bits is a
manufacturer OUI (Organisational Unique Identifier)
OUI | SN
0000.000a.aaaa
Network Access
3. Global
1. User 2. Privileged
Configuration
Execution Mode Mode
Mode
4. Interface
5. ROMMON
Configuration
Mode
Mode
• Access ports are also called edge ports, and they act as endpoints for establishing a
connection to the network
Access port
• Data access ports are not intended for VLAN tagging. Therefore, connected devices
should send untagged frames
• When an access port receives untagged data traffic, the "access VLAN" provisioned on
the interface will determine on which VLAN the traffic will be forward
Connectivity is considered as a key factor in any business. The following are some types of
network connectivity:
• Generally, ISDN, DSL, mobile broadband and cable modem are usually classified as
broadband
ii. Mobile Internet: is used to access networks from anywhere through wireless
connections
• For mobile internet, the higher the protocol, the higher the speed and connectivity
iii. Virtual Private Network (VPN): is used to create a private network to exchange data
securely over a public network
iv. Dial-up Networks: These networks enable TCP/IP communication over ordinary
telephone lines
• They make use of analog modems that call specific telephone numbers to make
connections
v. Local Area Networks (LAN): These are used to connect multiple local devices and
computers to share information and access resources
• Routers and network switches are used to connect a LAN with outside networks
vi. Direct Networks: This is the simplest form of connectivity in which the connection is
established between two devices directly
• Trunk ports are used for connections when several VLANs need to send data
Trunk Port
(Tagged)
Access Port
(Untagged)
1. Configuration of Switch 1
4. Configuration of Switch 2
4 Bytes
• Cisco trunk ports can have one untagged VLAN, and it is also known as Native VLAN
• Traffic that is transmitted out of a trunk port that resides in the Native VLAN will be
forwarded without a VLAN tag
• Configuration of switch 1
• Cisco proprietary protocol which can be used to discover directly connected device's
information and it is enabled on most Cisco devices by default
• The command "show cdp neighbor" can be used to display CDP learned information
• Similar to CDP except that it's an open standard protocol and it can be used by anyone
including Cisco
Switch 1
With STP
Switch 2 Switch 2
HOST A HOST A
• Every switch elects the port closest to the root bridge as its root port in an STP topology
Designated Port
Alternate Port
• In each STP (Spanning Tree Protocol) topology, one switch is selected as the primary root
bridge. It acts as the central reference point for topology
o By default, the switch including the lowest MAC address will gain the root bridge
election
1. Discarding
2. Learning
The state of a
switchport when it 3. Forwarding
In this state, the
appears in blocking switchport starts to In this final state the
mode first learn MAC switchport finally
addresses starts forward traffic
• Many network devices cannot work properly while waiting for Rapid PVST+ to reach the
forwarding state
• Switchports can go directly into the forwarding state with the PortFast feature and
bypass the first two states (discarding & learning)
• PortFast should only be used on edge ports which do not have other switches
connected, as it bypasses the Rapid PVST+ loop prevention checks
o Local Mode: Access-points tunnel all AP Tunnels Endpoints Traffic to WLC with
wireless endpoint traffic to a WLC that CAPWAP
• WLC Connections
o WLCs would typically have a trunk port, and it is connected to the core switching
devices
o A WLC trunk port can be a single link, but best practice is to use a Link Aggregation
(EtherChannel)
Step 1: Create the given topology in the cisco packet tracer, and click on laptop
LAG Trunk
Mode(Tagged)
• Once Lightweight APs get registered, they are managed by the WLC, and you really
should not need to have direct access to them
WLC Management
• WLCs are primarily managed through HTTPS (Hypertext Transfer Protocol Secure) & SSH
(Secure Shell)
• There are various codes displayed in routing tables that identify how routes are added to
the routing table
• A network mask (also known as subnet mask) describes the component of the network
prefix of an IP address used for routing
• The blue highlighted values identify the network mask for the prefix 10.0.0.0/24
o 10.0.0.0/24 or 255.255.255.0
o Network mask 255.255.255.0 in binary
11111111.11111111.11111111.00000000
o 1 in a binary network mask= Part of network portion
o 0 in a binary network mask= Part of host portion
• When network devices need to route to a destination, a next hop IP address is required to
forward packets in the right direction
• In the output below this layer 3 switch is sending default routed destinations to the next
hop IP address 10.0.0.2
• Network devices rely on the administrative distance (AD) to know which route types are
better than others
• The pre-assigned default AD values for Each route type are shown in below table
Route Source Default Distance Values
Connected interface 0
Static route 1
Enhanced interior Gateway Routing 5
Protocol (EIGRP) summary route
OSPF 110
Unknown 225
• You can see the AD value in the routing table. It is the value on the left in the bracket
after the prefix
• In the figure below you can see the AD is “1” for the static route
• You can use the metric value as a tie-breaker if the administrative distance value is the
same for two learned routes
• Routing protocols change advertised route metrics dynamically, based on things like
interface bandwidth
• If there are no specific routes for a particular destination in the routing table the last
resort gateway (Default route) is used
• When a router looks at the routing table to decide a destination's best path, the first
thing to look for is the most specific match
• It means the route with the most network bit matches for the destination
• If a router has more than one route in the routing table that is the same network mask bit
match, then the AD can be used as a tie-breaker to decide which route should be more
preferred
• In the example two static routes are added to routers configuration with the same network
bit length but the one with the lower AD is installed in the routing table
Administrative Distance
• If the length of the prefix matches with the AD then the final tie-breaker is the routing
metric
• In the example the same route is learned from multiple sources via the routing protocol
OSPF (Default AD of 110) with the same prefix length and AD
• In this case the router will rely on the learned OSPF route metric to determine the best path
• This kind of route is used as a catch all route to send unknown destinations to a particular
device
• IPv4 static network route configuration example for network destination 10.0.0.0/24 with
next-hop 10.0.255.2
• IPv6 static network route configuration example for network destination 2001::/64 with
next-hop 2001:255::2
• This kind of route is used as a backup route if a primary next-hop device is not available
• You set the AD to be higher than the primary route and set a different next-hop to make a
route “floating”
Primary Route
Administrative Distance
Secondary Route
• OSPF (Open Shortest Path First) is a link-state protocol that can be used to advertise
routes between routers
• For routers to exchange routes with each other with they must first form a neighbor
adjacency
4. Same HELLO
1. Common 2. Unique 3. Same AREA 5. Same MTU
and DEAD
Subnet Router-ID ID Value
Timers
Router 2
Router 1
• Configuration of Router 2
Check to see if any OSPF routes are learned from adjacent neighbors
• If OSPF uses L2 WAN protocols such as HDLC (High-Level Data Link Control) & PPP (Point-
to-Point Protocol) over point-to-point serial links it runs as a point-to-point network type
• In this mode, DR/BDR (Backup Designated Router) roles are not needed since it is not a
multi-access connection
• Designated Routers (DR) and Backup Designated Routers (BDR) are used in a multi-access
(Broadcast) OSPF topology to relay routing updates
• DR routers help to scale OSPF topologies so that less information is available for each
router to process
• In each multi-access OSPF topology 1 DR and 1 BDR are selected OSPF DR/BDR Selection
Process:
• With FHRP if multiple core devices are on a network and one goes down, another can
take control, so that clients do not lose access to the network
• As the default gateway, routers participating in an FHRP share a virtual IP address (VIP)
VIP
1
.2 10.0.0.0/24 .3
10.0.0.100 255.255.255.0
default gateway 10.0.0.1
VIP
1
.2 10.0.0.0/24 .3 Standby
G
a
t
e
w
a
y
10.0.0.100 255.255.255.0
default gateway 10.0.0.1
VIP
1
.2 10.0.0.0/24 .3 Active
G
a
t
e
w
a
y
10.0.0.100 255.255.255.0
default gateway 10.0.0.1
IP Services
• Module 2: Configure and verify NTP operating in a client and server mode
• Module 3: Explain the role of DHCP and DNS within the network
• Module 7: Explain the forwarding per-hop behaviour (PHB) for QoS such
as classification, marking, queuing, congestion, policing, shaping
• Configuration example for translating traffic from the private IP network 10.1.0.0/24 to
public IP NAT pool 97.8.22.21 - 97.8.22.31
• NTP Server Mode: A network device can work as an NTP server without any
configurations as long as their time is synced to another NTP server
• NTP Master: A network device can act as a NTP server using its local time information if it
is configured as an NTP master. An NTP master can sync to its local clock and still provide
time to NTP clients
o DHCP Server: It is a host running a DHCP server application with IP address pools for
client assignments
o DNS Server: It is a host running a DNS server application that manages a database of
hot name to IP address mappings
6. Client connects to the website using the IP Address it learned from DNS
www.ipversity.com = 172.217.3.110
DNS Server
We
b re
que
st to
172
.217
.3.1
10
Web Server
www.google.com
© 2020 The Knowledge Academy Ltd 344
Explain the Role of DHCP and DNS within the
Network
Example of DHCP configuration on Router
o SNMP Collector: Server running an SNMP collector application with a database for store
information. Examples of SNMP are Cisco Prime and SolarWinds
o Traps are sent by network devices to SNMP collectors when certain events take place like
high CPU or interface alarms
access-list block
url-filtering
malware block Database
Ids/ips logs Configuration change
Debug message
Hardware failure
error message Access-list block
configuration change url-filtering
Debug message Syslog Server Malware block
hardware failure Ids/ips logs
error message
configuration change error message
Debug message configuration change
hardware failure Debug message
hardware failure
o Syslog Server: It is a server running a Syslog application with a database to store log
information
• Classification is a method used to identify traffic types so that the network devices can
apply proper QoS
• Marking is a method used to set QoS values that can be used to apply proper QoS
• DSCP
o Decimal values 0-63
o CS 0-7
o Assured Forwarding
Best EF Voice
Worst Default
Best
Layer 2
COS0 COS1 COS2 COS3 COS4 COS5 COS6 DOT1Q Tag
Worst
o When traffic requires to forward out of a router or switch port is added to a traffic
queue
o Such queues can be thought of as a way to buffer packets until they are transmitted
out of an interface
Queue 1
Interface Queue 2
Queue 3
o If an interface is overloaded with congestion, network devices will tail drop traffic
o QoS policies can be used to prioritise which traffic is dropped first to improve
performance for critical applications like voice and video
o Usually used to prevent low-priority traffic from using all the bandwidth
o Usually used to smooth traffic speeds to match provider circuit speeds so traffic like a
voice is buffered rather than dropped
• Example of configuration
• Software upgrades and configuration backups are common uses for using TFTP/FTP in
networking
FTP
Server FTP TRANSFER
FTP Client
Security Fundamentals
• Module 10: Configure WLAN using WPA2 PSK using the GUI
• Threat means a new or a newly discovered happening that has the ability to harm a
particular system or even to the whole organisation
• It is not an open door instead a weakness which if attacked could provide a way in
• Exploiting is the action of trying to turn a vulnerability (a weakness) into an actual way
to breach a system
• Exploits are not easy to spot as they can take place behind firewalls
• If they are not detected they can even cause irretrievable damage
o Antimalware
o Firewall
o Software Patches
• Awareness regarding requirement for data confidentiality in order to protect corporate info and
also their own credentials and personal information should be spread among all users
• Users should also be made aware about potential threats, schemes to mislead and appropriate
procedures to report security incidents
• They should also be instructed to follow strict guidelines related to data loss
• As an example, users should not include sensitive information in emails or attachments should
not keep or transmit such information from a smartphone, or store it on cloud services or
removable storage drives
• All users should take part in periodic formal training so that they become aware with all
corporate security policies
• The organisation should develop as well as publish formal security policies for its users,
employees and business partners to follow
• Infrastructure locations such as data centres and network closets should be locked
securely
• A scalable solution to sensitive locations is badge access that offers an audit trail of
identities and timestamps when access is granted
Complexity
Management
• A single factor that a user must enter to be authenticated is a simple password string
• Multifactor credentials need that users provide values/factors coming from different
sources, thereby reducing the chance that an attacker might possess all of the factors
• Two- factor credentials are described as “something you have” i.e. a text message with
a time-limited code or a dynamic changing cryptographic key and “something you
know” i.e. a password
• If an organisation supports use of digital certificate, then a user must request and be
granted a unique certificate to use for a particular purpose
• Digital certificates are time sensitive i.e. each one is approved for a specific time range
• After the certificate expiration, any attempts to authenticate with it will be rejected
and the user who has the certificate can request a new one prior to the expiration date
or at any time afterward
• Generally, physical attributes are unique to a body structure of an individual and cannot
be easily duplicated or stolen
• Other examples can be voice recognition, face recognition, iris recognition etc.
Trusted Trusted
Encrypted Data VPN Tunnel Encrypted Data
Untrusted
Gateway Gateway
LAN LAN
VPN Tunnel
LAN Gateway
LAN
VPN Tunnel
2. Extended: Extended ACLs can match source/destination IP and port information plus
much more
1. Numbered: Standard numbered ACLs can be configured in the range 1–99 and 1300–
1999
2. Named: Extended numbered ACLs can be configured in the range 100–199 and 2000–
2699
• A switch feature that will only allow DHCP server response packets on interfaces that
are defined as “trusted”
• Trusted ARP replies that will only be permitted by switch features are learned from
DHCP responses either “trusted” interfaces. By default, interfaces are untrusted.
Port Security
• Switch feature that can (1) Limit how many MAC addresses are learned on a single
interface and (2) Limit which MAC addresses are learned
Switch 1
• Before authorising or allowing access to any user, AAA uses standardised methods to
challenge them for their credentials
• AAA is generally used to control and monitor access to various network devices such as
switches, routers, firewalls etc.
• Credentials for users that request network access are validated (Who is the user?)
Username: Jack
Password: *****
Authentication
Switch 1
Authentication
Jack is a valid user Username: Jack
and has been Password: *****
authenticated
User
Accounts
• Access restrictions for authenticated users (What is the user allowed to do?)
Authorised
Jack is
authorised for
privilege level
15
User
Accounts
© 2020 The Knowledge Academy Ltd 414
Differentiate Authentication, Authorisation,
and Accounting Concepts
3. Accounting
• Event history containing activity for authenticated/authorised users (What did the user
do?)
Log Off
Switch 1
Accounting
User Accounts
WPA
WPA2
WPA3
• More secure
• Because of this, networks are harder to manage and there is more room for human
error
• If done manually, the tasks that would take hours can be completed in seconds with
programming
• Instead of individually managing network devices they can simply login to the
controller for provisioning and troubleshooting
IT Admin IT Admin
Controller DNAC
Traditional Network
Controller Based Network
Underlay
Examples are:
i. MPLS
ii. Internet
Overlay
Examples are:
i. GRE
ii. IPSec
iii. CAPWAP
VPN Tunnel
(Overlay)
Home
Internet
(Underlay)
Fabric
Examples are:
i. SDA
ii. ACI
• It signifies to offload the processing of information from network device like routing
computations
• The notion behind is that if control plane processing can be centralised, then network
devices can use more resources for data place forwarding
• It is a method that is used to exchange information between two software programs i.e.
machine to machine
Northbound API
SDN Controller
Southbound API
IT Admin
• Devices are centrally monitored and managed from a single pane of glass (DNAC)
IT Admin
Controller DNAC
DNAC Management
• REST-based APIs follow a set of basic rules regarding what makes a REST API and what
does not
b) Stateless operation
d) Uniform interface
e) Layered
f) Code-on-demand
• The working of REST API depends upon first three attributes mainly
• A few APIs are designed as an interface between programs running on the same
computer, because of this the communication between programs happens within a
single OS
• Several APIs must be available to programs that run on other computers, hence the API must
define the type of networking protocols supported by the API
• The creators of REST-based APIs choose HTTP for the reason that the logic of HTTP
matches with some concepts defined more generally for REST APIs
• HTTP uses the same principles as REST. For example, it operates with a client/ server
model; it uses a stateless operational model; and it includes headers that clearly mark
objects as cacheable or not cacheable
• HTTP also includes verbs; the words that dictate the anticipated action for a pair HTTP
Request and Reply that matches how applications like to work.
• The acronym CRUD is used by software industry for the four primary actions performed
by any application:
1) Create
• Permits the client to create a few new instances of variables and data structures at the
server and initialisation of their values as kept at the server
2) Read
• Permits the client to read (retrieve) the current values of variables that exist at the
server and store a copy of the variables, values, and structures at the client
3) Update
• Permits the client to update (change) the value of variables that exist at the server
4) Delete
Permits the client to delete from the server different instances of data variables
• It defines an HTTP request and reply concept, with the client sending a request and
with the server answering back with a reply
• Every request or reply lists an action verb in the HTTP request header that defines the
HTTP action
• The HTTP message is carried in IP and TCP, with headers and data, as represented
HTTP
• When we open a web browser and click a link, the browser generates an HTTP GET
request message
• This message includes an HTTP header with the GET verb and the URI
• The resources that are returned in the reply are the components of a web page, such as
text files, image files, and video files
• HTTP works well with REST as HTTP has verbs that match the common program actions
in the CRUD paradigm
List of Networks
HTTP Response
HTTP 200 OK
{ JSON Data}
• Postman is a great App that can be used for sending API calls
• Most people use these names to the companies as well as their primary configuration
management products
• It can be installed on own Linux Host, but for production purposes, it will be normally
installed on a Linux server known as Puppet master
• Puppet uses various important text files with different components such as
o Resource, Class, Module – Components of the manifest, with the largest modules
being composed of smaller classes
• Chef offers various products such as Chef Automate which is generally referred to as
Chef by most people
• With Puppet, in production Chef is probably run as a server with multiple Chef
workstations used by the engineering staff to build Chef files that are stored on the
Chef server
• Once Chef is installed, various text files can be created with different components such as
o Recipe - The Chef logic that is applied to resources to find out when, how, and whether to
act against the resources that are analogous to a recipe in a cookbook
o Cookbooks - A set of recipes related to same types of work, grouped collectively for
easier management and sharing
o Runlist - An ordered list of recipes that should be run against a given device
• Every managed device known as a Chef node or Chef client runs an agent for network
devices
o Playbooks
• These files provide logic and actions about what Ansible should perform
o Inventory – These files provide device with info about every device such as device roles
that is why Ansible can perform functions for subsets of the inventory
o Templates - They represent a device’s configuration but with variables using Jinja2
language
o Variables - A file can list variables that Ansible will substitute into templates using YAML
• Along with a few JSON rules, most humans can read JSON data, move past just guessing
at what it means, and confidently interpreting the data structures defined by the JSON
data
• At the same time, JSON data makes it easy for programs to convert JSON text into
variables, making it very useful for data exchange between applications using APIs
The following are key rules about key:value pairs in JSON, which can be thought of as
individual variable names and their values:
o Key: Value Pair: Every colon recognises one key:value pair, with the key before the
colon and the value after the colon
o Key: Text, inside double quotes, before the colon is used as the name that references a
value
o Value: The item after the colon that represents the value of the key that can be
o Multiple Pairs: When listing multiple key:value pairs, separate the pairs with a comma
at the end of each pair (except the last pair)
• JSON uses JSON objects and JSON arrays to communicate data structures beyond a
key:value pair with a simple value
• Objects can be flexible to some extent, but in most uses, they act like a dictionary
• There are a set of rules about interpreting the syntax of JSON objects and arrays
o [ ] - Array: A series of values that are not key:value pairs enclosed in a matched pair of
square brackets, with an opening left square bracket and its matching right square
bracket
o Key:value pairs inside objects: All key:value pairs inside an object conform to the
earlier rules for key:value pairs
o Values inside arrays: All values conform to the previous rules for formatting values