Ccna Notes by Rima
Ccna Notes by Rima
WHAT IS NETWORK?
When two or more than two computer is interconnected for
1. Data Communication
2. Sharing
a. Data Sharing
i. File , folder and directory sharing
b. Resource Sharing
i. Printer, plotter, Scanner etc.
WHAT IS NETWORKING?
The process, technique, terminology through which a network is being established.
Communication devices
Lan Card
LAN card, NIC card, Ethernet card, Ethernet adapter.
Each LAN card having 48 bit hexadecimal address known as the MAC (Media Access
Control Address).
It is the physical address which is preceded within the LAN card and user cannot change
it. MAC address of two LAN card cannot be same.
Notes in LAN, communication take place through MAC address but in WAN it is
through IP address.
Communication Media
There are two types of the media.
3. Guided media (also known as wired base)
4. Unguided media (also known as wireless)
Coaxial wire
Core
Core is the data carrier. It cstaarries the data from source to destination.
Copper mesh
11. Its used for earthing or ground.
12. To reduce the EMI (Electromagnetic Interference) effect.
Note
Electrical signal are used in the coaxial wire and twisted wire but in case of fiber
optics the signal are in the form of light or optics.
FIBRE OPTICS
In case of fiber optics the fiber used is made up of glass or silica which is in the sand.
In case of both coaxial and twisted pair data is transmitted in the forms of electrical
signal.
But in case of fiber optics the data transfer in the form of light signal or optical signal
which is not attenuate easily.
source
19. Detector
20. Fiber
optics
It has 1.5 to 2 km range without any signal lose. The fiber optics works over the principle
of the TIR.
TIR stand for the Total Internal Reflection.
UTP
STP
No any shielding is present over Shielding is present over the pairs
the pair
Cheaper
More chance of EMI
Limited coverage(100-120 m)
Costly
Negligible chance of the EMI
Larger coverage (150-200 m)
CAT5
5 twist per inch
100 Mbps
Cheap
Less chance of EMI
CAT 7
7 twist per inch
1000 Mbps
Costly
Negligible chance of
Good strength
EMI
High strength
Straigth Cable
The usage of the straight cable
Here orange and green are active color and they are on the active pin as 1,2,3,6. So we
take blue color in the 3 and 6 as 45 numbers. Here blue and brown color having no any
importance.
Cross cable
Usage
This is used to connect the similar devices as
39.
Pc to Pc
40.
Hub to Hub
41.
Switch to Switch
42.
Hub to Switch
43.
Modem to Pc
44.
Pc to router
Cross cable
1
Rollover cable
In the case of the rollover cable the whole wire is changed. We count the number by
seeing the metal head not the jack head.
1
The rollover wire is also called console cable. This is used to get the access of the router
from the pc in order to configure it. If we make it as shown above scheme then both end
are RJ45 connector but we must have a serial or com port to get the access of router for
configuration so we use a connector which change the RJ45 interface to serial interface.
Transmission (T+)
Transmission (T-)
Receiving (R+)
Receiving (R-)
Receiving (R+)
Receiving (R-)
Transmission (T+)
Transmission (T-)
To connect pc to pc
1T+
T+1
2T-
T-2
3R+
R+3
6R-
R-6
R+
2T-
R-
3R+
T+
6R-
T-
Wireless Media
There is different type of the wireless media as
45. Radio Connectivity
46. Microwave Connectivity
47. Infra-Red Technology
Radio Connectivity
In this case radio connectivity data is transmitted in the form of radio waves.
Characteristics
48. Radio wave are omni directional (multidirectional) i.e. They can travel in all the
direction
49. Radio wave can easily bypass the physical objects.
50. Radio waves are frequency dependent.
Disadvantages
51. Limited coverage i.e.(45 km to 50 km)
52. Limited bandwidth i.e. Data transfer rate is limited
53. Unsecured and unreliable
54. May get affected due to whether and climatic conditions.
Examples
a) Radio sets
b) Wireless sets
c) Walky talky
Image from note books
Microwave technology
In this technology data is transmitted in the form of microwaves.
Characteristics
55. Microwaves are unidirectional i.e. they can travel in only one direction.
56. Point to point connection
57. Microwaves cant bypass the physical objects
58. Wider coverage i.e. World wide
59. High data transfer rate i.e. Bandwidth
60. Not easy to hack thus these are more secure and reliable.
Disadvantages
61.
costly
62.
63.
Examples
a) Mobile phones
b) Cable television
c) VSAT
d) ATM
INFRARED TECHNOLOGY
Data is transmitted in the form of infrared rays.
Characteristics
64. Infrared
65. Its
66. Coverage
is limited
67. Slow
68. Easy
to hacks.
Examples
69. Remote
control
70. Infrared
in mobiles etc.
NETWORKING DEVICES
There are three main devices used in the networking.
71.
Hub
72.
Switch/Bridge
73.
Router
HUB
a) It is a networking device that is used to connect two or
more than two computer within a network.
b) It is a duffer device because it does not know any type
of address i.e. Neither MAC nor IP addresses.
c) Its only knows the source port so when it broadcast the
data then it will broadcast data all the port except the
source port.
d) Its internally based on bus topology according to which
only one user can communicate at a time. Either he can
send the data or receive the data
e) It divides the actual bandwidth among the users.
f) Hub always makes a broadcast and as a result of
broadcast bandwidth will get wasted.
g) Collisions are common in case of Hubs. Due to
collision data loss as well as wastage of LAN
bandwidth.
h) Its based on the CSMA/CD technology (Carrier Sends
Multi Access/collision detection)
i) Broadcast domain
a. Area or LAN affected by the
broadcasting.
b. Broadcast domain one
j) Collision domain
a. Area or lines affected by the single
collision
b. Collision domain one
SWITCH
74. It
addresses.
76. Its
internally based upon the star topology. So all the user can
79. When
81. Broadcast
82. Collision
domain= one
Switch
1. Switch is a hardware based
Bridge
It is software based device
Similarities
83. Both
84. Both
85. It
87. Routing
destination.
88. Packet
broadcasting
90. No
collision
91. Broadcast
92. Collision
domain
= no. of ports
The principle used for defining the OSI layer is: 93. Do
94. Collect
95. Allow
Aaa
All
Away
Pass
people
Pizza
Sirf
Seam
Tod
To
Spicy
(4) Transport layer
Throw
(5)Network layer
Na
Need
Not
Dil
Data
Do
Pather
Processing
Please
in actual implementation of the seven layers, the first three layers
are likely to be in hardware the next two layer in the operating
system the presentation layer in library subroutine in the users
address space and the application layer in he users program.
meaningful )
Different data processing techniques are there e.g.
104.
105.
application layer.
It deals with the characters conversion also (ASCII,
106.
EBCDIC)
SESSION LAYER
The session layer is responsible for validate the
107.
108.
users.
Its control the dialog. Its mean that to check whether
109.
110.
others.
111.
Transport layer
112.
113.
part.
114.
116.
UDP
User Datagram Protocol
Connectionless
Its works as delivery of letter
No communication among sender
user
Its make a reliable delivery of
or user.
Its provide unreliable
data
There is acknowledgement of
communication
There is no acknowledgement
sending data
Its provide connection oriented
services
TCP is slower data
services.
It is fast data communication
communication process
TCP support the flow controls
Support sequencing
Support windowing
process
It does not support flow controls
Does not support sequencing
Does not supports windowing
NETWORK LAYER
119.
120.
122.
123.
125.
IP addresses.
Network layer provide multiplexing.
126.
127.
protocol .
o IP and IPX protocol are known as routing protocol
because they are used on the network (routing layer).
128.
129.
130.
135.
136.
137.
138.
139.
140.
transmitting information.
High performance
143.
144.
Policy creation
o Enable to create policy and specify filters and rules
145.
Scalability
o Enable the networks growth
146.
Behavior prediction
o Enables you to determine what will happen to the
network when new stresses are placed on it.
Three Layer Model
147.
148.
149.
Core layer
150.
151.
of packets.
153.
154.
155.
156.
159.
160.
o Bridge
o VPN access router
ACCESS LAYER
161.
162.
163.
164.
POINT TO REMEMBER
165.
166.
Ping commands
It is an echo request that is used to test the physical connectivity of
an remote device with your device.
Traceroute
Its used to identify the best route that the packet will take to reach
form source to destination. This command is used to trace the path.
Destination host unreachable
This message is appear when destination is not a member of your
networks.
Request time out
This message is appear when the destination gets
disconnected due to problem in wires hub switch ports or collision.
CHAPTER TWO
IP ADDRESSING
IP ADDRESSING SCHEMA
In a network every computer having a unique address called IP
address which is use to communicate the computer with another
computer in the network. Every computer must have IP address. So
it very important to understand the concept of IP Addressing
Scheme.
An IP address is a 4 octet i.e. 8*4 =32 bits address. Each octet is
separated by the dot.
Format of IP address is
0-255.0-255.0-255.0-255
An IP address having two parts. Host ID and Network ID.
192.168.0.1
Here 192.168.0. Is the network ID and 1 is the Host ID
Network ID
This part specifies the unique number assigned to your particular
network. It it also the part that identifies the class of network
assigned.
Host ID
This is the part of the IP address that you assign to each host, and
uniquely identifies each host on your network. Note that for each
host on your network, the network part of the address will be the
same, but the host part must be different.
Class A
address
168.
Class B
address
169.
Class C
address
170.
Class D
address
171.
Class E
address
Class A address scheme
In class A first 8 bits are network address while the remaining 24
bits are host address.
Range of class A is from 0.0.0.0. To 127.255.255.255.
Network address 0 is reserved to designate the default route for the
packets and the network address 127 is reserve for the diagnostic
to check out the local loop address.
This mean that there are 126 networks are available.
e.g. 86.18.2.4 is a IP of class A with network address 86 and host
address is 18.2.4
The address of this class is used for multicasting. This class does
not have any netid and hostid
The IP range for D class address is 224.0.0.0 to 239.255.255.255
Class e address scheme
The address of the E class is reserved for the internet society
The range for the E class is 240.0.0.0 to 255.255.255.255
Point to remember
For class A there is only one private network having netid 10.0.0.
For class B there are 16 private network allowed. Netid for these
private networks are from
172.16 to 172.31
For class C there are 256 private network allowed. Netid ranges for
these networks are
192.168.0. to 192.168.255
64
32
16
Firstly we will convert 192 to binary value. Add the value to make
192 and mark them as 1
128+64=192
So for 192 binary value is 11000000
Other bits are mark as 0
Now 168 =128+32+16+2=10110001
For 0=00000000
For 10 = 8+2=00001010
Now 192.168.0.10 is 11000000.10110001.00000000.00001010
Why we not consider 127 in any range of IP address?
We dont consider 127 in any IP range because it is reserved as the
loop back address. To check the system whether its ready for
networking or not we use it.
The 127.0.0.1 is known as loop back address. It also allows
information technology professionals to test IP software without
worrying about broken or corrupted drivers or hardware.
174.
175.
176.
177.
178.
179.
POINT TO REMEMBER
180.
it is a network address.
181.
host address
When all the net ID bits are 1 its represent all the
networks.
o 255.0.0.0
184.
When all the net ID bits and host ID bits are 1, its
127.0.0.1
o It is loop back address used for self testing. If ping to
this address is successful its means the TCP/IP protocol
stack is ok. If there is no reply the TCP/IP suite is
corrupt it means you have to reinstall the O.S. it does
not depends upon the presence of the LAN cards. i.e. if
Valid hosts
224-2
o Class A
255.0.0.0
o Class B
255.255.0.0
216-2
o Class C
255.255.255.0
28 -2
SUBNETTING
It is also called sub networking. It is a process through which a
very large complex network is sub divided into smaller parts and
each such part is known as subnet or sub network.
Benefits
188.
189.
190.
192.168.10.0./26
2n
Where n is the no. of the borrowed bits
In above case subnet is 26 bit i.e. 2
borrowed bits for class C it must be 24.
2. identify valid no. of hosts for each subnet
2m-2
Where m is remaining host ID portion bits.
Here 2 bits are borrowed and remaining bits
are 6.
So 26-2=62
3. identify the value of new subnet mask and the
range
255.255.255.11000000
255.255.255.192
Range
256-192=64
Maximum possibilities of octet-value
of host ID.
4. identify all the valid subnets
192.168.10.0
192.168.10.64
192.168.10.128
192.168.10.192
191.
Components of a router
COMPUTER
HARDDISK
RAM
NVRAM
ROM
ROUTER
FLASH
RAM
NVRAM
ROM
FLASH
195.
Operating System)
RAM
197.
198.
It is volatile Memory
199.
200.
NVRAM
201.
202.
ROM
204.
hardware testing.
205.
MINI IOS
o It is the mini IOS.
o Mini IOS is the minimum set of driver that is
required to boot the router.
207.
POST
208.
BOOT STRAP
a. Its specify the router from where to load the IOS.
209.
RAM.
210.
PART OF A ROUTER
There are two main part of the router
211.
LINES
212.
INTERFACES
INTERFACES
Interfaces are used to connect the router with the LAN or
WAN.
Over interface we specify the IP addresses
Type of the interfaces
Ethernet port (used to connect the router with a computer)
Serial port (used to connect the router with other router)
RJ 45 female port
214.
216.
217.
Notes
The router Ethernet port address is the default gateway for all
the systems that are member of that LAN.
Console port:
It is line that is used to get the access of a router in
218.
219.
purpose.
One end of this console cable is male RJ-45 and
220.
221.
BRI port
222.
223.
Telephone line
ISDN(Integrated Service
It is an analog line
It provides only audio support
Digital Network)
It is a digital line
It provides both audio , video
and data
It provides to the max of 56 kbps. It has two B and one D channel.
Each B channel is of 64 kbps
and
D is of 16 kbps. i.e. total 144
kbps.
Auxiliary port:
225.
our router.
VTY port
227.
Virtual type
228.
229.
that purpose we have to set login and password over the vty
line.
230.
Line vty 0 4
231.
Password
232.
Login
Serial port
233.
directly or remotely.
234.
235.
236.
238.
DB 60
o It is a 60 pin modular port it is always IT( 1 T mean
one terminal)
239.
Smart serial
o Latest and compact
o It can be 1T as well as 2T.
o Two categories of serial interface card.
240.
Privileged mode
243.
245.
High priority
To set secret password command is
1. enable secret (password)
note :-- this password never be seen by the show running-config
command. Because it is encrypted.
f. Both passwords never are same.
Privileged mode
BASIC COMMAND
We can use hypertrm command to access the hyper terminal.
Privileged mode commands.
246.
Show History
a. it is used to see the previous 10 commands being used
over the router till router powered up to privileged
mode.
247.
show terminal
b. It is used to see the size of history.
248.
249.
show version
d. it is used to see
i.version of routers IOS (Internetworking
Operating System)
250.
ii.
iii.
iv.
show interfaces
e. it is used to see
i.name of the interface
ii.
iii.
IP of the interface
iv.
v.
Transmission Units)
vi.
vii.
viii.
Reliability
ix.
Load
x.
Delay
xi.
Encryption type
NOTES
By default encapsulation over the routers Ethernet port
is ARPA (Advanced Research Project Agency) and over the
serial port is HDLC (High Level Data Link Control)
251.
252.
show startup-config
g. This command is used to see the startup configuration
of router.
h. It will view
i.The IP assigned to interface
ii.
Enable password
iii.
erase startup-config
253.
i.
254.
show running-config
j. It is used to see the last changed but not saved
configuration i.e. running configuration.
255.
256.
show protocols
l. This command is used to view the detailed information
of routing protocol.
257.
show ip protocols
m. this command is used to view the information about the
configure routing protocol
258.
show IP route
n. This command is used to view the routing table.
259.
show arp
o. This command is used to see the Ethernet interface.
260.
clear arp
p. This command is used to clear the arp table.
261.
show hosts
263.
264.
Write
hostname <name>
v. This command is used to assign the hostname to the
route. If the name is not set then by default it is router.
266.
config-register
w. This command is used to change the value of routers
config register.
268.
shutdown
aa.
port
270.
271.
abc(config-line)#
cc.
password
dd.
login
272.
gg.
273.
274.
ii.
iii.
iv.
IP address of interface
show startup-config
ii. This command is used to see the startup configuration
or saved configuration of your router.
show running-config (run)
275.
reload
ll. It is used to restart the router.
278.
279.
280.
oo.
specific line.
281.
login
pp.
282.
hostname
qq.
283.
enable password
rr. it is used to set or change the router simple enable
password.
284.
service password-encryption
ss. this command is used to encrypt all the password of
your router.
tt. Once encrypted these password can never be get
decrypted.
285.
enable secret
uu.
286.
vv.
no shutdown
ww.
shutdown
xx.
description
zz.
interface of a router.
Notes
Line console 0
292.
293.
Login
294.
show flash
aaa.
flash.
295.
show clock
bbb.
Password
To make a password on the console line we can write a
command as
Line console 0
Password (password)
Login
We can make a password on the privileged mode by enable
command as enable password or enable secret
Troubleshooting
Configuration register
It is a hexadecimal value that specifies the router from where
to load the IOS.
0x2100
296.
298.
MONITOR) mode.
299.
rommon mode.
302.
304.
router(boot)>
307.
is as router>
0x2102
308.
309.
311.
0x2142
from flash to RAM.
312.
startup configuration.
313.
315.
your router.
Password recovery
317.
i.o/r 0x2142
319.
320.
(initialize)
321.
322.
(or)
h. Write
Backup and restore
324.
and router.
a. To connect the router and computer cross wire is
required
b. We can connect the pc to switch and switch to router if
we have only straight wire.
c. Assign the IP address to both computer and router.
d. IP address of the router is assigned as the default
gateway to computer
326.
331.
We can check the tftp server which file are backed up by command
Show tftp-configs
RESTORING
332.
333.
334.
How to associate a router name with its ip so that we can ping it by its name
Let we have a router having name Chandigarh and ip is 192.168.1.2
Then on another router we can make as
Router (config)# ip host chandigarh 192.168.1.2
Router (config) # ping chandigarh
Note we have to assign the hostname otherwise it does not work.
TELNET
The term telnet is derived from the telephone network. It is based
on client servers architecture. The system that requests the telnet
service is called telnet client and the system that provide the
requested telnet service is called telnet server. The telnet service is
must be enabling on the server. We can enable it from the
administrative tool services telnet.
To activate the telnet service on the router
Line vty 0 4
Password
Login
Command is used.
Two way of using telnet
Telnet 10.0.0.2
Or 10.0.0.2
Both command access the telnet server having IP address as
10.0.0.2
To close the telnet session permanently command is EXIT
To switch among two session
We use ctrl + shift +6 and then x to go back on router from
computer.
Press enter twice to go on the computer from router.
If we have more than 2 telnet then to go another telnet connection
we can use
The number of the connection and then press enter twice
Show session
It is used to see all the telnet session being made from your router
to outside environment.
This command show the information as
335.
Session number
336.
it)
337.
Source address
338.
Destination address
339.
Show users
It is used to see all the lines being used by the users
from outside environment to get the access of router in order to
configure it.
This command output show the information as
340.
Line name
341.
Line number
342.
Source
343.
Destination
344.
Active line
345.
346.
Idle line
Troubleshooting
Routing
It is a technique or process that is used by router to select the best
IP route to reach a network or destination.
Two types of protocols are used in routing i.e.
347.
348.
Routed protocol
Routing protocol
Routed protocol
These protocols are used to send data packets over a route decided
by routing protocols as IP, IPX, and Apple talk in Macintosh.
Routing protocols
These protocols are used to find out the best IP route among other
possible router to reach a destination.
RIP (Routing Information Protocol)
IGRP (Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
OSPF (Open Shortest Path First)
Routing types
349.
Static routing
350.
Default routing
351.
Dynamic routing
Static Routing:
In this type of routing we have to set the route
manually. There is no any use of the protocol in this type of the
routing. This type of routing is suitable for small networks and all
the burden or responsibilities of performance of networks is on the
network administrators. Static routing is done on directly
connected devices static routing is more reliable. To manually set
the entry we use the command as
R2 #
Default routing
This routing is performing only on the stub networks. Stub
networks are defined over the networks which has only one exit
interface.
Syntax
# ip route 0.0.0.0 0.0.0.0 exit interface /next hop address
352.
OSPF
EGP (Exterior Gateway Protocol)
357.
networks 0
359.
routing is 1
360.
361.
362.
363.
neighbor then only for the first time they will exchange their
complete routing table with its immediate neighbor and then
only the link status message will be send
365.
366.
Example
o OSPF (Open Shortest Path First)
367.
protocol
Example are
368.
Loop avoidance
369.
370.
Split horizon
o The route over which an update is being received , no
new update will be send or transfer over that route.
371.
372.
Trigger update
o The update is sent immediately the happening
o It does not wait for timer
373.
It is a DVRP protocol, in case of which each router sends its complete routing table to its
immediate neighbour.
374.
376.
377.
RIP Version 1
RIP Version 2
It is a classful routing protocol in It is a classless routing protocol
which the subnet mask related
discontigeous networks
discontagious
Timer
Update Timer
It is a time period after the expiry of which each router sends its
IGRP
378.
379.
380.
381.
383.
384.
385.
386.
387.
of two thing
o Bandwidth &
o Delay
388.
Timer
o Update time 90 seconds (by default)
o Invalid timer 3* update timer =270 seconds
o Hold down timer 3* update timer + 10 =280
o Flush out timer 7* update timer =630 seconds
Commands
To configure the IGRP over two routers as R1 having Ethernet
Administrative distance 90
391.
392.
393.
394.
395.
396.
By default it is 100
397.
PDM
o Protocol dependent Module
EIGRP provide support for multiple network layer
protocol IP, IPX, APPLETALK through PDM.
For each protocol an independent set of database
will be created. I.e. if IP is used then IP/EIGRP
database, if IPX then IPX/EIGRP database, if
AppleTalk then AppleTalk /EIGRP.
398.
399.
only for the first time they will exchange their complete
routing table with each other and then only the route updates
will be sent at regular interval of time.
Point to remember
400.
feasible distance
401.
404.
DUAL
o Defusing Update Algorithm
o It is used to identify
The best route to reach the destination network
called feasible distance
Metric
o The metric used to identify the best route is
combination of 4 things
Bandwidth
Delay
Load
Reliability
406.
407.
408.
EIGRP practical
# Router EIGRP 10
# Network 10.0.0.0
# Network 20.0.0.0
RIP v1
VDP
OSPF
Link state
Class full
No VLSM
AD 120
Metric Hop count
Max hop count limit 15
It support auto summarization
Classless
SUPPORTS VLSM
AD110
Metric Bandwidth
No limit
It do not support auto
summarization
Only routing table
Three table are proposed
neighbourship topology routing
It do not support larger networks Support larger network
It is based on flat architecture
Hierarchical architecture
It do not support manual
It support manual summarization
summarization
417.
418.
419.
Hello packet
It is only through exchange of hello packet two router
will become neighbour to each other
Link state advertisement
It contains information regarding the status of the link
and the route update
Designated router (D R)
Router with the highest IP address or router is will be
elected as the designation router
Backup designated router (BDR)
Router with second highest router ID or IP address will
be elected as BDR.
Point to Point
Unicast processing
BMA (Broadcast Multi Access) broadcast
NBMA (Non Broadcast multi Access) multi cast
Wild card mark (WCM) for network address
WCM =full mask subnet mask
For 10.0.0.0
Here SM = 255.0.0.0.
FM =255.255.255.255
WCM = 0.255.255.255
For IP addresses WCM is 0.0.0.0
172.16.0.1= 0.0.0.0
OSPF protocol: practical
OSPF process ID:
It is locally significant it represent a unique
instance of OSPF over your router it can be any number in between
1-65535
On router 1
# Router OSPF 10
# n/w 20.0.0.0 0.255.255.255 area 0
# n/w 30.0.0.0 0.255.255.255 area 0
Router 2
# Router ospf 10
# n/w 20.0.0.0 0.255.255.255 area 0
# n/w 30.0.0.0 0.255.255.255. Area 0
Show ip ospf database
This command is used to see the topology database table
Show ip ospf neighbor
This command is used to see the neighbourship table
# debugging
It is used to see the router backend processing related to RIP
423.
Deny all
permit 10.0.0.0
Permit 10.0.0.0 deny all
Protocol
It can be either layer 3 protocol or layer 4
Layer 4 protocol i.e. TCP is used to block any specific service like
telnet, FTP,
Layer 3 protocol i.e. IP is used to either allow full access or no
access.
An ICMP is used to block ping or traceroute.
FTP =20 (for receiving files through FTP)
=21 for sending file through FTP
TFTP 69
SNMP =
TELNET = 23
SMTP =25
DNS = 53
HTTP = 80
POPS = 110
HTTPS = 443
All port are reserved 1024 or its are free ports use transport layer
for communication.
10.5 should not be able to TELNET or FTP 30.10
# Accesslist 100 deny TCP 30.0.0.10
0.0.0.0
Direction of an interface
Ethernet port
IN from inside to outside
OUT from outside to inside
Serial port
IN incoming data
OUT outgoing data
How to implement ACLs on interface configuration
Int E0
# IP access-group accesslist no in/out
Std E0 out S0 in
Ext E0 in S0 out
If we have wan
To block or permit telnet service using standard access list
# access- list 1 deny 10.0.0.5
# Line vty 0 4
# access- class 1 in
Show access-list
It is used to see the entire access list created over your router
Show access-list (access list no.)
It is used to see any specific access list being created over your
router
Show run
It is used to see the access list created and where they have been
applied
No access-list
It is used to remove any specific access list.
SWITCHING
428.
429.
430.
Limited broadcast
433.
434.
435.
436.
437.
bandwidth
438.
SWITCH
It is a hardware based device
BRIDGE
It is software based device
address table
SIMILARITIES
439.
440.
Characteristics of switching
Address learning
Forwarding and filtering decision
(Broadcast) and (unicast)
Three switching technique
441.
Cut through
442.
Fragment free
443.
Cut through
In cut through switching technique when a frame is received no
error detection technique will be run over that frame instead the
frame is forwarded by seeing the destination MAC address.
Fragment free
In this switching technique when a frame is received the CRC
error detection technique will be run over the first 64 bytes and
if no error is detected data will be forwarded by seeing the
destination MAC address.
Store and forward
In this switching technique when a frame is received the entire frame is first stored
and then the error detection technique CRC will be run over the entire frame and if no
error is detected the data will be forwarded by seeing the destination MAC address.
By default all ports of a switch are member of a single V-LAN called default V-LAN
VLAN
It is logical grouping of network users and resources over the predefine ports of a
switch
Benefits
444.
445.
446.
447.
The users that need high level security should be made member of
separate VLAN.
448.
449.
Types of VLAN
Static and
Dynamic
Static VLAN
In case of static VLAN the administrators by himself first create the VLAN and then
assign switch port to each VLAN manually
Static VLAN are more secure and reliable
Dynamic VLAN
In case of dynamic VLAN the MAC address database will be created over the VMPS
(VLAN MANAGEMENT POLICY SERVICE) in which it is specified that a system with
specific MAC address should be made a member of a specific VLAN and when the users
are attached to any specific port of a switch the switch will assign the VLAN membership
automatically as per that database.
Type of links
450.
Trunk link
451.
Access link
Access link
Access link is a link that exist within a single VLAN and the member of this link does not
k now anything about its VLAN membership so link from pc to switch is called access
link
Trunk link
It is a link that carries multiple VLAN conversation from either a switch to switch or
from switch to router. It is a 100 or 1000 Mbps link from either switch to switch or from
switch to router.
Frame tagging
When there is more than one VLAN over a switch and more than one switch in a network
then it is very difficult for the destination switch to identify from which VLAN data has
arrived and to which VLAN data has to be delivered so the concept of frame tagging was
introduced
453.
802.10
802.1a
454.
vendors support
456.
Benefits
Scalability and flexibility
Consistency and reliability
The VTP domain name of all the switches participating in VTP should be
same.
458.
should be in server mode, and the switch over which the VLAN configuration is
to be transferred should be in client mode.
459.
460.
Server
Client
Transparent
Server mode
Switch in server mode can create and forward the VTP updates we can add remove or
update the VLAN related configuration only over the switch which is in server mode.
Client mode
A switch is client mode can receive and forward the VTP updates and it can change the
VLAN related configuration as per that update, we cannot ad remove or update VLAN
related configuration over the switch which is in client mode.
Transparent mode
A switch in transparent mode can receive and forward the VTP updates but it will not
update its VLAN related configuration as per that update.
VTP
PRACTICAL PROCEDURE
461.
First of all select a switch and make the VLan as sale and market
462.
463.
o Config term
464.
465.
466.
The above command will make a setting as the interface e0/1 is now the
member of the 2 VLan and the configuration mode is the static one.
in the above scene if we want pc1 can communicate with pc2 but not with pc3 then we
have to make step as
467.
Take two router and assign serial interface ip as 10.0.0.1 & 10.0.0.2
468.
469.
470.
471.
Now assign the ip address to pc2 as 30.0.0.2 and gateway as 30.0.0.1 and
Now configure the rip protocol on the both router so that pc1 can ping pc2
and pc3.
473.
Now access the switch. And make two VLan as sale and market by using
command
o VLan 2 name sale
o VLan 3 name market
474.
Now e0/2 port on which we have pc2, e0/1 router. E0/3 pc3.
475.
477.
Result: pc2 can communicate with pc1 but not pc3 can communicate
with pc1.
478.
479.
480.
Show CDP
It will show the CDP timer and CDP hold time of your Cisco
devices.
481.
CDP timer 80
484.
It is used to see the number of update being sent and received the
lost due to error or collision.
487.
No CDP run
Banner
We can add a banner as
Banner motd (then the starting character) @, # any
Then enter the banner text and then again to save the banner
Enter the same delimiter.
Point to remember
489.
PING stand for Packet Inter Net Groper. Ping use the
o Interface s0
o Encapsulation ppp
o Ppp authentication chap
495.
496.
497.
498.
If both the router are cisco router then the serial encapsulation is HDLC.
499.
If the both router are different ie. One cisco and another someone else then
Switching
501.
502.
503.
504.
505.
ISDN
Integrated Service Digital Networks.
Step to configure the isdn line
506.
The isdn line is connected to BRI 0 interface. Firstly assign the ip address
508.
509.
Now we need to specify some information on the bri interface. The SPID.
o SPID stand for the Service Profile Identifier. This number is given by the
isp. The spid is like 32177820010100
510.
After it we have to prepare the dialer string on the BRI interface. This can