CCNA 2ccna2
CCNA 2ccna2
NAT basics, also known as network address translation is an important part of the CCENT and
CCNA certification exams. When NAT is implemented it allows a router to translate the source
IPv4 address in the packet header as it crosses the router, changing the source address in the
packet from one address to another. This allows the sending computer’s message to appear as if
it is coming from another computer’s address. When you masquerade the origin of a computer’s
IPv4 address on a network it is known as a NAT firewall.
Network address translation is a primary reason that IPv4 addressing has survived and is still in
use today. The creation of NAT along with private IPv4 address ranges like 192.168.0.0 to
192.168.255.255, 172.16.0.0 to 172.31.255.255, and 10.0.0.0 to 10.255.255.255 has allowed for
the conservation of publicly routable IPv4 addresses. One of the results of NAT’s ability
translate public addresses at the router to private IPv4 addresses is that the advent of IPv6
addressing has essentially been delayed.
Configuring NAT
For the CCENT and the CCNA certifications you need to know how NAT works and how to
configure it on a Cisco router. In the following Packet Tracer exercise and accompanying video
tutorials, I demonstrate four different ways of configuring NAT.
Download
Download the Packet Tracer 6.3 activity here: NAT_practice_activity
Instructions
1. Set the PC’s IP addresses based on the host address label and VLAN color code in the
topology diagram
2. Assign the switch hostnames based on their labels.
3. Configure the switch VLAN numbers and VLAN names according to the diagram.
4. Configure Interface VLAN88 (SVI) addresses on both switches according to the diagram.
5. Change the switchports as access ports and assign them to VLANs according to the diagram.
6. Configure G0/1 as a Trunk. Allow the listed VLANs only across the trunk and configure the
Native VLAN as shown
7. Shutdown the G0/2 interface.
Download
For this graded activity you will need Packet Tracer version 6.1 or higher.
VLANS-Switchports-Trunks-SVIs.zip
The scoring is based on the total number of items correctly configured. Remember that when
entering configurations the system is case sensitive. When you are finished, you should be able
to communicate across the network. In this PT activity access to the CLI tab has not been
disabled. Have fun!
Download
CCNA2_RoutingNSwitching-practice-final.zip
Note: You will need Packet Tracer version 6.0.1 to open this activity
Video Tutorials
The scoring is based on the total number of items correctly configured. Remember that when
entering configurations the system is case sensitive. When you are finished, you should be able
to communicate across the network (e.g. successfully ping PCB from PCA)
Download
RIPng.zip
Note: You will need Packet Tracer version 6.0.1 to open this activity
Spoiler Alert – read below if you are stuck and need help with the commands
Download
The Packet Tracer file is created with Packet Tracer 5.3.3. The Packet Tracer Activity file will
track your progress and give you a completion percentage and point total. You can download it
here: standardACL-practice1.zip
Download
The Packet Tracer file is created with Packet Tracer 5.3.3. The Packet Tracer Activity file will
track your progress and give you a completion percentage and point total. You can download it
here: BasicConfig-VLAN-Trunk-PortSec-SSH-challenge.zip
Activity Instructions
Configure the Network according to the Topology Diagram and Labels.
When you are finished, the PCs on the Student VLAN should be able to ping each other and so
should the PCs on the Faculty VLAN. The Admin PC should be able to SSH into S1 and S2 from
the command prompt (Eg. PC>ssh -l admin 192.168.99.2)
PCs
1. IP address (see topology),
2. subnet mask (see topology),
3. default gateway address (first usable address in network)
RIP Commands
R2(config)#router rip
R2(config-router)#version 2 //change to RIP version 2
R2(config-router)#no auto-summary //turn off default route
summarization
R2(config-router)#network //advertises a connected network to
neighboring RIP routers
R2(config-router)#network
R2(config-router)#network
R2(config-router)#default-information originate //distribute a
default route to neighboring RIP routers
R2(config-router)#passive-interface //stops RIP from advertising
routes out of an interface
R2(config-router)#end
Overview
In the lab, we configure a network topology which includes three Cisco 1841 or 1941 routers,
three Cisco 2960 switches, and three PCs. The three routers need to be connected to each other
over serial connections. {loadposition adposition5}Each router also needs to be connected to a
switch over a fast ethernet (1841) or gigabit ethernet port (1941). Each PC needs to be connected
to a switch. The goal of the lab is to do the following things:
I have created a Packet Tracer Activity which has all of the lab instructions included in it and
will also check your results when you are finished. You will need Packet Tracer version 5.3.3.
You can download the activity by clicking here, :
CCNA2_Configure_the_Network_Challenge_1b.zip
Here is an image of the network topology at the start of the activity lab.
Lab Outline
1) Wire the network. The serial interfaces with .2 as the address should be the DCE.
2) Configure the ip addressing and names of all of the devices as shown in the topology
3) Configure the devices using the commands listed below
4) Configure RIP so all devices can communicate over the network
Notes:
• Login passwords should be “cisco” (no quotes)
• Enable secret should be “class” (no quotes)
• Clock rates should be set to 64000
• Interface descriptions should be based on the connected network subnet like: “network-1”,
“network-2”, up to “network-6”
• commands not listed below are: “enable” are “configure terminal”
• Start wiring the local area networks from the PCs using first available ethernet ports. PC1 to
S1(fa0/1) and S1(fa0/2) to R1(fa0/0). Start wiring serial ports clockwise starting from R1(0/0/0)
to R2 (0/0/0), R2(0/0/1) to R2 (0/0/0), etc.. (Remember the .2s should be the DCEs.)
• PCs should be configured with .10 host addresses, switches with .2 host addresses, and routers
with .1 and .2 host addresses (refer to diagram)
Router Commands
hostname <name>
banner motd <#No unauthorized access!#>
enable secret <password>
line console 0
password <password>
login
line vty 0 4
password <password>
login
int fa 0/0
ip address <ip addr> <mask>
description <description>
no shut
int s 0/0/0
ip address <ip addr> <mask>
clock rate <rate num> (only if the interface is the DCE)
description <description>
no shut
int s 0/0/1
ip address <ip addr> <mask>
clock rate <rate num> (only if the interface is the DCE)
description <description>
no shut
router rip
network <net address>
network <net address>
network <net address>
copy running-config startup-config
Switch Commands
hostname <name>
banner motd <#No unauthorized access!#>
enable secret <password>
line console 0
password <password>
login
line vty 0 15
password <password>
login
int vlan 1
ip address <ip addr> <mask>
no shutdown
ip default-gateway <ip addr>
copy running-config startup-config
LAN Design
Overview
A hierarchical network design model, as opposed to a flat network design model, creates a more
more functional network by differentiating network devices into core, distribution, and access
layers, which creates a hierarchy of network devices and gives the network the following
benefits:
• Scalability – is improved because having distribution layer 3 switches segments the network,
creates multiple broadcast domains, and distributes routing duties, this in turn allows the ability
to add more access layer switches and add more host computers.
• Redundancy – instead of having only one way out of the network, a hierarchical network
design creates redundant, interconnected (meshed) distribution layer and core layer switches
allowing more paths for traffic to flow.
• Manageability – centralized management software can manage from the distribution layer
• Enhanced bandwidth resources – greater network segmentation will lead to better bandwidth
availability
• Enhanced Security – having more than one distribution layer switch allows differentiated
security policies and network security services
Switch Attributes
Port Security – The ability to configure which host MAC addresses can be on a port, and
shutdown ports if they are not the specified host MAC addresses.
PoE (power over ethernet) – The ability to use certain ethernet wire pairs for electrical power
instead of data.
Link Aggregation – The ability to have multiple ports work together as uplink ports, effectively
doubling and tripling uplink speeds.
QoS (quality of service)- The ability to distinguish and prioritize certain kinds of traffic like voice
data.
Port Density – How many ports a switch has.
VLANs (virtual local area networks) – The ability to create VLANs and assign ports to separate
VLANs
Access List Control – Layer 3 functionality. A layer 3 switch, which is a switch and a router
combined is needed.
Switch Types
Fixed Configuration Switches -Cannot be changed or altered, port density is set.
Modular Switches – Can be altered by adding switch blade ports.
Stackable Switches – Special high speed backplane for connecting the switches together.
Switching Modes
Store and Forward – Slowest, most reliable
Cut Through Switching – Faster, but less reliabl
Fast Forward – Fastest, least reliable. The switch forwards the packet/frame once it has stripped
off the destination MAC address.
Fragment Free – Second fastest. The switch forwards the packet after reading the first 64 bytes.
SSH Overview
The ability to remotely manage your Cisco switch or router is very important. Network
administrators are usually not sitting next to the switch or router with a laptop and a console
interface connection. There are various methods of managing a network device like a switch or
router, remotely over the network. Remote management can be accomplished through a browser
based interface (web browser) or more commonly through a terminal interface (CLI). Cisco
switches and routers can be configured to use Telnet or SSH for remote terminal access. Telnet is
not desirable because it is an unencrypted protocol that sends messages in clear text over the
network. SSH is preferred to Telnet because it uses strong key based, encryption techniques to
secure data transmission.
VLANs Overview
VLANs – A switches is used to set up a local area network (LAN). A VLAN stands for a virtual
local area network. By default, all of the ports on a Cisco switch are part of the same default
VLAN (VLAN1) and therefore the same network. A VLAN is a network and a network is a
broadcast domain. If you configure various switch ports for separate VLANs, then the devices on
those ports will belong to separate VLANs and therefore, will be segmented into separate
broadcast domains and networks. This is effectively like dividing a switch into multiple
switches. This is cost effective, because instead of having multiple switches, each for a different
network, you can have one switch configured for multiple VLANs and you can assign the ports
on that switch to belong to whatever VLAN you need the host to belong to.
VLAN Types
Data VLAN – A data VLAN carries only user data not management data, control data or voice
data.
Default VLAN – On a Cisco switch the default VLAN is VLAN1. This means that by default,
when a Cisco switch boots up for the first time all the ports are automatically assigned to the
default VLAN, VLAN1. You cannot delete or rename VLAN1 but you can assign the ports on
the switch to a different VLAN. It is considered best practice to make all of the user ports on the
switch belong to a different default VLAN, one other than VLAN1. In this way, control data
such as CDP and STP (spanning tree protocol) which are by default carried on VLAN1 would be
on a separate VLAN from user data.
Native VLAN – The native VLAN, if not explicitly configured, will default to the default
VLAN, (VLAN1). The Native VLAN is configured for an 802.1Q Trunk port. 802.1Q trunks
carry traffic from multiple VLANs by tagging the traffic with VLAN identifiers (Tagged Traffic)
which identifies which packets are associated with which VLANs, and they can also carry non
VLAN traffic from legacy switches or non 802.1Q compliant switches (Untagged Traffic). The
switch will place untagged traffic on the Native VLAN by using a PVID identifier. Native
VLAN traffic is not tagged by the switch. It is a best practice to configure the Native VLAN to
be different than VLAN1 and to configure it on both ends of the trunk.
Management VLAN – The management VLAN is any VLAN you configure to allow a host to
connect to the switch and remotely manage it. The management VLAN will need to be
configured with an IP address and subnet mask to allow a manager to connect to the switch by
either a web interface (HTTP), Telnet, SSH, or SNMP.
VLAN ID Ranges
Normal Range
1 to 1005
VLAN1 (default), created by default, cannot be deleted
VLAN1002-1005 (Token Ring and FDDI default), created by default and cannot be deleted
Stored in the VLAN.dat file in Flash memory
Extended Range
1006 – 4094
Extended VLAN range used by ISPs
Stored in Running-Config
Trunks – If you have a switch that has ports variously configured on four different VLANs, then
that switch has four different networks on it. When you connect that switch to a router or to
another switch you will need four ethernet connections or links, one for each VLAN/network. A
more cost effective way to connect a switch with multiple VLANs to a router or switch would be
to configure a Trunk. A Trunk is a special kind of port configuration which allows multiple
VLANs to travel over one link. This way multiple networks can travel over one trunk instead of
wasting valuable ports to connect from switch to switch or switch to router. A Cisco trunk by
default uses the 802.1Q protocol. The 802.1Q protocol places and strips VLAN tags on packets
to identify which VLAN they belong to.
CLI Commands
switch#show vlan
switch#show interfaces trunk
switch(config)#vlan <vlan number>
switch(config-vlan)#name <vlan name>
switch(config)#interface fa0/x
switch(config-if)#switchport mode access
switch(config-if)#switchport access vlan <1-4096>
Download
For this graded activity you will need Packet Tracer version 6.1 or higher.
VLANS-Switchports-Trunks-SVIs.zip
Download
The Packet Tracer file is created with Packet Tracer 5.3.3. The Packet Tracer Activity file will
track your progress and give you a completion percentage and point total. You can download it
here: BasicConfig-VLAN-Trunk-PortSec-SSH-challenge.zip
Activity Instructions
Configure the Network according to the Topology Diagram and Labels.
When you are finished, the PCs on the Student VLAN should be able to ping each other and so
should the PCs on the Faculty VLAN. The Admin PC should be able to SSH into S1 and S2 from
the command prompt (Eg. PC>ssh -l admin 192.168.99.2)
PCs
1. IP address (see topology),
2. subnet mask (see topology),
3. default gateway address (first usable address in network)
config-if)# shut
Overview
Some of the ideas that are covered in this section are how Cisco routers are put together, their
different types of memory, their various interfaces both LAN and WAN, and their start-up
processes? Allso in this section there is a review on how to configure a router, how to bring up
its interfaces, and how to issue show commands to read its status. This first part of CCNA 2 also
covers in an introductory way the router’s routing table, and static versus dynamic routing.
Router Memory
Similar yet different from a regular computer, the router has different kinds of memory ROM,
Flash, NVRAM, and SDRAM which all have different functions:
Notice: The router is a computer but it does not have a traditional hard drive to store files and the
operating system, this is accomplished in Flash memory and NVRAM memory.
Bootup Process
1. POST – ROM memory,
2. Bootstrap – ROM memory,
3. Load the IOS – the router has an ordered routine for loading the IOS
1. Flash Memory – the IOS is typically loaded from Flash memory
2. TFTP – if there is no IOS in Flash, the router will search for a network TFTP server,
3. ROM – if there is no IOS found, the router defaults to a recovery IOS called Rommon,
4. Load the Startup-Config – the router has an ordered routine for loading the startup-config file
1. NVRAM memory – the startup-config file is typically loaded from NVRAM memory
2. TFTP – if there is no config file in NVRAM, the router will search for a network TFTP
server,
3. Setup-Mode – if there is no configuration file found, the router defaults to setup-mode
There is a difference between routed or routable protocols and routing protocols. A routed
protocol is a protocol that is routable over multiple networks like the internet. Today the de facto
routed protocol is TCP/IP. A routing protocol is a protocol used by routers to share information
with each other, specifically information about available routes. Examples of routing protocols
would be RIP, EIGRP, OSPF, and ISIS.
For the Cisco CCNA certification exam you will need to know how to configure an interior
gateway routing protocol in a multiple router network. You will be required to know the
following interior gateway routing protocols: RIPv1, RIPv2, EIGRP, and OSPF.
Routed Protocols
TCP/IP
IPX/SPX (Novell – no longer in use)
Apple Talk (Apple – no longer in use)
Routing Protocols
EIGRP (VLSM/CIDR)