CCNA Quick Reference
CCNA Quick Reference
Page | 1 lammle.com
Well-Known Port Number Modified EUI-64 Host Portion Assignment
Configuring Trunking
The TCP/IP Version 4 Address Classes interface gi0/10
Address Class High-Order Bit Setting 1st Octet Range in Decimal
A 0 1–127 switchport trunk encapsulation dot1q
B 10 128–191 switchport mode trunk
C 110 192–223
D 1110 224–239
Wireless Technologies
The Possible Values in an IPv4 Subnet Mask Octet
On Bits Value
8 255
RF Bands: There are two main radio frequency
7 254 bands used with WiFi technologies. The 2.4 GHz
6 252
5 248 band and the 5 GHz band. For example, 802.11g
4 240
3 224
uses the 2.4 GHz band, while 802.11ac uses the 5
2 192 GHz band.
1 128
0 0
SSID: This is the “friendly” name of the wireless
Default IPv4 Subnet Masks
Address Class Default Mask Prefix Notation Mask Bits
network.
A 255.0.0.0 /8
B 255.255.0.0 /16 Non-overlapping channels: Channels 1, 6, 11 are
C 255.255.255.0 /24
non-overlapping channels that permit you to
The IPv4 Private Address Ranges configure wireless LANs that function properly.
Address Class Range of Private Addresses
A 10.0.0.0 to 10.255.255.255 Wireless LAN Controller (WLC): The WLC is a device
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255.255
for configuring, monitoring, and troubleshooting
the wireless LAN. For example, wireless Access
Points can be “lightweight” and can rely on WLCs
for the “intelligence” required to form the WLAN.
Page | 2 lammle.com
IP CONNECTIVITY IP SERVICES
Default Admin Distances (Cisco) Inside Source Dynamic PAT
Page | 3 lammle.com
WPA2: WPA2 is considered strong enough for use REST APIs: These APIs are often used for cloud and
today. It replaced TKIP (which had weaknesses) SDN technologies. They ensure that you can
with CCMP. Like WPA, it uses AES for encryption. retrieve data using “standard” URLs understood by
TKIP is still present in the protocol, but only for web browsers and Internet technologies.
backward compatibility with WPA. JSON: This is a very friendly way to represent data
WPA3: Like WPA2, this latest version of the in a human readable form. JSON presents data as a
security protocol permits you to configure a series of attribute-value pairs. It is very similar to
“personal” or home version, compared to a XML, but even more easily readable by us humans.
stronger “enterprise” version. Puppet, Chef, and Ansible: These tools allow you
to easily manage network devices from a central
Common Cybersecurity Threats location. The tools use different techniques. For
example, Puppet uses an agent on the various
Computer Viruses network devices, while Ansible is often celebrated
Malware as it is agent-less.
Trojans
Adware and spyware
Worms CRUD:
DDoS Create
Phishing Read
Rootkit Update
SQL injection attack Delete
Main-in-the-middle
Ransomware
Data exfiltration
AUTOMATION AND
PROGRAMMABILITY
Controller-based networking: Software defined
networking (SDN) often features the use of a
central controller that implements the control
plane functions required by the network. The
devices that are controlled in SDN can focus on the
forwarding of traffic. The SDN approach fosters
efficient, automated, highly controlled networks.
Page | 4 lammle.com