CCNA Notes PDF
CCNA Notes PDF
Basic Commands :-
IP Routing :
It is a process by which a routing table is created. This routing table helps to provide the
best path to different destination networks.
Types of routing:
1. Static Routing
2. Static Default
3. Dynamic routing
Static Routing :
It is a process by which routes are defined at routers manually. It can be useful for a
small network. It increases the administrative task.
Router 1
Router>enable
Router#conf t
Router(config)#
Router(config)#hostname r1
Router(config)#int fa0/0
Router(config)#ip add 10.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#int s0/0/0
Router(config)#ip add 11.0.0.1 255.0.0.0
Router(config)#clock rate 64000
Router(config)#no shut
Router(config)#ip route 12.0.0.0 255.0.0.0 11.0.0.2
Router(config)#ip route 172.16.0.0 255.255.0.0 11.0.0.2
Router(config)#ip route 192.168.0.0 255.255.255.0 11.0.0.2
Router 2
Router(config)#hostname r2
Router(config)#int fa0/0
Router(config)#no shut
Router(config)#int s0/0/0
Router(config)#no shut
Router(config)#int s0/0/1
Router(config)#no shut
Router 3
Router(config)#hostname r3
Router(config)#int fa0/0
Router(config)#no shut
Router(config)#int s0/0/0
Router(config)#no shut
Router(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Router(config)#hostname r1
Router(config)#int fa0/0
Router(config)#ip add 10.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#int s0/0/0
Router(config)#ip add 11.0.0.1 255.0.0.0
Router(config)#clock rate 64000
Router(config)#no shut
Router(config)#ip route 12.0.0.0 255.0.0.0 11.0.0.2
Router(config)#ip route 172.16.0.0 255.255.0.0 11.0.0.2
Router(config)#ip route 192.168.0.0 255.255.255.0 11.0.0.2
Router(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2
Router 2
Router(config)#hostname r2
Router(config)#int fa0/0
Router(config)#no shut
Router(config)#int s0/0/0
Router(config)#int s0/0/1
Router(config)#no shut
Router 3
Router(config)#hostname r3
Router(config)#int fa0/0
Router(config)#no shut
Router(config)#int s0/0/0
Router(config)#no shut
Dynamic Routing
In this routing, routes are generated and updated automatically with
the help of routing protocols.
Metric:
1. Hops
2. Bandwidth
3. Delay
4. Reliability
5. MTU
6. Load
1. Distance Vector
2. Supports maximum 15 hops
3. Belmon Ford
4. Types :
a. RIP version 1
Works on broadcasting – 255.255.255.255 -> To send updates
Updates are sent at every 30 seconds.
Route invalid timer – 180 seconds
Route Flush Timer – 240 seconds
Supports class full ipv4 addressing
Does not support auto summarization of routes.
Configuration of RIP
R1
R1(config)#router rip
Network 10.0.0.0
Network 11.0.0.0
R2(config)#router rip
Network 172.16.0.0
Network 12.0.0.0
Network 11.0.0.0
R3(config)#router rip
Network 192.168.0.0
Network 12.0.0.0
b. RIP version 2
Works on multicasting – 224.0.0.9 -> To send updates
Updates are sent at every 30 seconds.
Route invalid timer – 180 seconds
Route Flush Timer – 240 seconds
Supports classless ( VLSM ) ipv4 addressing.
By default, it supports auto summarization of routes.
Router 1
Router(config)#router rip
Version 2
Network 10.0.0.0
Network 10.0.0.64
Network 11.0.0.0
9. Router ID – It provides unique identity to each router. For ID highest IP add is used.
10. In a OSPF based network, a router with highest router ID becomes DR ( Designated Router ).
DR receives updates from all routers and it will be responsible to forward those updates to
another router.
11. BDR ( Backup Designated Router ) – It will perform the task as DR but whenever DR will
not work.
11. Area – It is a numeric value ( 0 – 4.2 million) that is used to divide a large OSPF based
network into small part.
Area 0 is known as backbone area means all another area should be connected to area 0.
Area Border router ( ABR ) – A router which is responsible to establish connection between two
or more different area.
12. OSPF uses HELLO protocol to establish link between routers.
13. OSPF sends LSA ( Link State Advertisement) for any kind of update between routers.
14. OSPF uses Process ID value for indifying processes executed at router.
Process ID numeric range -> 0-65535
15. It uses wild card mask for abbreviation of routes ( summarization of routes ).
255.255.255.255
- 255.0.0.0 = 0.255.255.2555
255.255.255.255
- 255.255.255.192 =0.0.0.63
255.255.255.255
- 255.255.255.224 =0.0.0.31
16. It does not support auto-summarization of routes.
R1(config)#router ospf 1
Net 10.0.0.0 0.0.0.63 area 0
Net 10.0.0.64 0.0.0.31 area 0
Net 11.0.0.0 0.255.255.255 area 0
R2(config)#router ospf 2
Net 172.16.0.0 0.0.0.63 area 0
Net 172.16.0.64 0.0.0.31 area 0
Net 11.0.0.0 0.255.255.255 area 0
Net 12.0.0.0 0.255.255.255 area 0
R3(config)#router ospf 3
Net 192.168.0.0 0.0.0.63 area 0
Net 192.168.0.64 0.0.0.31 area 0
Net 12.0.0.0 0.255.255.255 area 0
R1(config)#router ospf 1
Net 10.0.0.0 0.0.0.63 area 0
Net 10.0.0.64 0.0.0.31 area 0
Net 11.0.0.0 0.255.255.255 area 0
R2(config)#router ospf 2
Net 172.16.0.0 0.0.0.63 area 0
Net 172.16.0.64 0.0.0.31 area 1
Net 11.0.0.0 0.255.255.255 area 0
Net 12.0.0.0 0.255.255.255 area 1
R3(config)#router ospf 3
Net 192.168.0.0 0.0.0.63 area 1
Net 192.168.0.64 0.0.0.31 area 1
Net 12.0.0.0 0.255.255.255 area 1
Configuration of EIGRP :
R1(config)#router eigrp 5
#net 11.0.0.0
#net 10.0.0.0
#net 10.0.0.64
R2(config)#router eigrp 5
#net 11.0.0.0
#net 12.0.0.0
#net 172.16.0.0
#net 172.16.0.64
R3(config)#router eigrp 5
# net 12.0.0.0
#net 192.168.0.0
#net 192.168.0.64
Types of ACL :
1. Standard ACL :
a. It uses only source address.
b. It is always configured and implemented at destination router.
c. For Numbered ACL –
1 – 99, 1300 – 1999
d. It always allow or deny all services.
e. It always allow or deny communication from whole destination network.
Destination Router – R3
Standard ACL - Numbered
R3(config)# access-list 1 deny host 1.0.0.2
OR Access-list 1 deny 1.0.0.0 0.255.255.255
R3(config)# access-list 1 permit any
R3(config)#exit
R3(config)#int fa0/0
R3(config)#ip access-group 1 out
Types of NAT :
1. Static NAT – In this type, each inside local IP add is translated into separate outside
global ip address. This translation is done manually. But, in this case only security is
increased, there is no ip conservation.
2. Dynamic NAT – In this type, each inside local ip add is translated into separate outside
global ip add with the help of ACL and a range of outside globalip add ( pool ). It
increases security but there is no saving.
3. PAT ( Port Address Translation): - In this type, all inside local ip add are translated into
single outside ip address with the help of ACL and pool. It uses port number ( 1- 65535).
It increases security and saves ip address.
Static NAT Configuration :
R1(config)#ipnat inside source static 1.0.0.2 11.0.0.3
R1(config)#ipnat inside source static 1.0.0.3 11.0.0.4
R1(config)#int fa0/0
R1(config)#ipnat inside
R1(config)#int s0/0/0
R1(config)#ipnat outside
Switch :-
1. Layer 2 device and it works on Layer 3 also.
2. Layer 2 switch works on MAC address
3. Layer 3 switch works on IP address.
4. It has RJ-45 ports – RJ-45 ports are with 8 pins and SAP ports
RJ – 11 ports are with 4 pins only
5. Switch has 4/8/16/24/48/96/128 RJ-45 ports.
6. RJ-45 ports – PoE ( Power On Ethernet )
7. Port Speed – 10Mbps / 100Mbps / 1000Mbps /10G
8. It create MAC Table – L2 switch
9. Creates Routing Table – L3 switch
L2 Switch:-
b. Manageable Switch
2. Switch Can be configured for – VLAN, port security, speed control, Server-Client ,
4. Password Security
Basic Commands :-
Switch>enable -to go into previllaged mode
Switch# clock set 09:05:25 7 Apr 2020 - to set date and time
S1(config-if)# no shutdown
S1(config-if)# exit
To set default gateway at a switch. With this gateway, switch can be accessed from another
network.
Password Security :-
1. Enable Password – Plain text mode.
2. Encrypted Enable Password
S1(config)#enable secret <password>
3. Console Port Password :-
S1(config)#line console 0
S1(config-line)#password abc
S1(config-line)#login
S1(config-line)#exit
4. Define username & password
#username niraj password ccie
5. Console Security with user
#line console 0
#login local
#exit
To encrypt all password :
S1(config)#service password-encryption
Types of VLAN :
1. Static VLAN
2. Dynamic VLAN
1. Dynamic – in this mode switch port can change its state as per connectivity of
node.
2. Access – in this mode switch port cannot change its state as per connectivity
of node. It can be member of any one VLAN / it supports only one VLAN
frame.
3. Trunk – in this mode switch port is not member of any VLAN. But, it supports
frames of all VLAN.
Configuration of VLAN :
S1(config)#vlan 2
S1(config)#name sales
S1(config)#vlan 3
S1(config)#name account
S1(config)#int range fa0/1-5
S1(config)#switchport mode access
S1(config)#switchport access vlan 2
Trunking between switches :
It used to connect two switches to transfer data frames of different VLANs through a single
port.
For this service that single port must be converted into trunk port. Trunks port is not a part of
any VLAN.
Frame Tagging :
At a trunk port, VLAN ID is assigned to a each frame so that it can be identified at next switch
and different VLAN frames can communicate to same VLAN.
S1(config)#vlan 2
S1(config)#name sales
S1(config)#vlan 3
S1(config)#name admin
S1(config)#int range fa0/1-10
S1(config)#int gi0/1
S1(config)#int fa0/23
S1(config)#switchport mode trunk
4. Now, at router use following steps :
Router>enable
Router#conf t
Router(config)#hostname r1
R1(config)#int fa0/0
R1(config)#no shutdown
R1(config)#int fa0/0.1
R1(config)#encapsulation dot1q 2
R1(config)#ip address 1.0.0.1 255.0.0.0
R1(config)#int fa0/0.2
R1(config)#encapsulation dot1q 3
R1(config)#ip address 2.0.0.1 255.0.0.0
5. Now, configure default gateway at nodes connected to VLAN 2 – 1.0.0.1
6. Configure default gateway at nodes connected to VLAN 3 – 2.0.0.1
Private VLAN
Virtual LAN (VLAN) is used to break a broadcast domain into smaller domain at layer 2. Only
(all) hosts belonging to same VLAN are able to communicate with each other while to
communicate with other VLAN hosts, Inter Vlan routing is done. But in same VLAN, if we want
some hosts should not be able to communicate with other hosts (in the same VLAN) at layer 2
level then VLAN access-list or concept of private VLAN is used.
Private VLAN –
Private VLAN are used to break the layer 2 broadcast domain into small sub-domains. A sub-
domain consists of one primary VLAN and one or more secondary VLAN.
Types of VLANs –
There are two types of VLANs in Private VLANs:
1. Primary VLAN –
All the ports in the private VLAN belongs to a primary VLAN. A private VLAN can have
only one primary VLAN. All the VLANs in a private VLAN domain share a same primary
VLAN.
2. Secondary VLAN –
A private VLAN can have one or more secondary VLANs. It provides isolation between the
ports belonging to same private VLAN domain.
These are of two types:
1. Isolated VLANs –
Hosts belonging to Isolated VLAN can only communicate with its associated promiscuous
port and cannot communicate directly with other hosts (belonging to other isolated or
community VLAN) directly at layer 2. Usually a single port is assigned to Isolated VLANs
but you can have more than one port associated to it.
2. Community VLANs –
A private VLAN can have one or more than one community VLANs. Hosts belonging to
same community VLANs can communicate with each other and its associated promiscuous
port but hosts belonging to different community VLANs cannot communicate with each
other at layer 2.
Types of ports –
Types of ports in A Private VLAN are:
1. Promiscuous port –
It belongs to the primary VLAN. These ports can communicate with all interfaces, that are a
part of secondary VLANs associated with that promiscuous port and that primary VLAN.
Generally, it is used for connecting switches with routers, Firewalls etc.
2. Isolated port –
An isolated port belongs to a secondary isolated VLAN.These are the host ports whose traffic
is forwarded to the promiscuous port. A private VLAN allows only that traffic to the isolated
port which is coming from its associated promiscuous port.
3. Community port –
This port belongs to a secondary community VLAN. These host ports can communicate with
other ports in the same community VLAN and also with its associated promiscuous port.
These ports are completely isolated from other community VLAN ports and isolated ports.
Note –
VTP (VLAN Trunking Protocol) should be operating in mode transparent or off in order to
configure private VLANs.
Configuration –
Security on Switch:
S1(config)#switchport port-security
Switching Loop :-
BPDU – ( Bridge Protocol Data Unit )
When two or more switches communicate to each other, they sends a message frame for
update. It is the responsibility of each switch to send update to all another switches. It is
done by BPDU.
1. Listening State – It check the physical connectivity of node and port status.
2. Learning State – It reads the MAC address of connected node and keeps this address
into MAC table. It generates broadcast message. Broadcast MAC address -> FFFF-FFFF-
FFFF
3. Forwarding State – In this state, switch support data transmission through a port.
4. Blocking State – Whenever, a port generates switching loop, responsible port can be in
blocking state.
Few concepts, related to Switch Bridging :
PVST+ Configuration
The focus of this topic is on how to configure PVST+ in a switched LAN environment.
Table shows the default spanning-tree configuration for a Cisco Catalyst 2960 Series
switch. Notice that the default spanning-tree mode is PVST+.
Feature Default Setting
When an administrator wants a specific switch to become a root bridge, the bridge
priority value must be adjusted to ensure that it is lower than the bridge priority values of
all the other switches on the network. There are two different methods to configure the
bridge priority value on a Cisco Catalyst switch.
Method 1
To ensure that a switch has the lowest bridge priority value, use the spanning-tree
vlan vlan-id root primary command in global configuration mode. The priority for the
switch is set to the predefined value of 24,576 or to the highest multiple of 4096 less
than the lowest bridge priority detected on the network.
If an alternate root bridge is desired, use the spanning-tree vlan vlan-id root
secondary global configuration mode command. This command sets the priority for the
switch to the predefined value 28,672. This ensures that the alternate switch becomes
the root bridge if the primary root bridge fails. This assumes that the rest of the switches
in the network have the default 32,768 priority value defined.
In Figure 3-39, S1 has been assigned as the primary root bridge, using the spanning-
tree vlan 1 root primary command, and S2 has been configured as the secondary root
bridge, using the spanning-tree vlan 1 root secondary command.
Method 2
Another method for configuring the bridge priority value is by using the spanning-tree
vlan vlan-id priority value global configuration mode command. This command gives
more granular control over the bridge priority value. The priority value is configured in
increments of 4096 between 0 and 61,440.
In the example in Figure 3-39, S3 has been assigned a bridge priority value of 24,576,
using the spanning-tree vlan 1 priority 24576 command.
To verify the bridge priority of a switch, use the show spanning-tree command. In
Example 3-4, the priority of the switch has been set to 24,576. Also notice that the
switch is designated as the root bridge for the spanning-tree instance.
PortFast is a Cisco feature for PVST+ environments. When a switch port is configured
with PortFast, that port transitions from blocking to forwarding state immediately,
bypassing the usual 802.1D STP transition states (the listening and learning states). As
shown in Figure 3-40, you can use PortFast on access ports to allow these devices to
connect to the network immediately rather than wait for IEEE 802.1D STP to converge
on each VLAN. Access ports are ports that are connected to a single workstation or to a
server.
In a valid PortFast configuration, BPDUs should never be received because that would
indicate that another bridge or switch is connected to the port, potentially causing a
spanning-tree loop. Cisco switches support a feature called BPDU guard. When it is
enabled, BPDU guard puts the port in an errdisabled (error-disabled) state on receipt of
a BPDU. This effectively shuts down the port. The BPDU guard feature provides a
secure response to invalid configurations because you must manually put the interface
back into service.
Cisco PortFast technology is useful for DHCP. Without PortFast, a PC can send a
DHCP request before the port is in forwarding state, denying the host from getting a
usable IP address and other information. Because PortFast immediately changes the
state to forwarding, the PC always gets a usable IP address (if the DHCP server has
been configured correctly and communication with the DHCP server has occurred).
NOTE
Because the purpose of PortFast is to minimize the time that access ports
must wait for spanning tree to converge, it should be used only on access
ports. If you enable PortFast on a port connecting to another switch, you
risk creating a spanning-tree loop.
S2(config-if)#
To configure BPDU guard on a Layer 2 access port, use the spanning-tree bpduguard
enable interface configuration mode command, as shown in Example 3-6.
Example 3-6 Configuring and Verifying BPDU Guard
S2(config-if)# spanning-tree bpduguard enable
S2(config-if)# end
S2#
S2# show running-config interface f0/11
interface FastEthernet0/11
spanning-tree portfast
spanning-tree bpduguard enable
S2#
Notice in Example 3-6 how the show running-config interface command can be used
to verify that PortFast and BPDU guard have been enabled for a switch port. PortFast
and BPDU guard are disabled, by default, on all interfaces.
The topology in Figure 3-41 shows three switches with 802.1Q trunks connecting them.
Two VLANs, 10 and 20, are being trunked across these links. The goal is to configure
S3 as the root bridge for VLAN 20 and S1 as the root bridge for VLAN 10. Port F0/3 on
S2 is the forwarding port for VLAN 20 and the blocking port for VLAN 10. Port F0/2 on
S2 is the forwarding port for VLAN 10 and the blocking port for VLAN 20.
In addition to establishing a root bridge, it is also possible to establish a secondary root
bridge. A secondary root bridge is a switch that may become the root bridge for a VLAN
if the primary root bridge fails. Assuming that the other bridges in the VLAN retain their
default STP priority, this switch becomes the root bridge if the primary root bridge fails.
• Step 1. Select the switches you want for the primary and secondary
root bridges for each VLAN. For example, in Figure 3-41, S3 is the
primary bridge for VLAN 20, and S1 is the secondary bridge for VLAN
20.
• Step 2. As shown in Example 3-7, configure S3 to be a primary
bridge for VLAN 10 and the secondary bridge for VLAN 20 by using
the spanning-tree vlan number root { primary | secondary }
command.
Example 3-7 Configuring Primary and Secondary Root Bridges for Each VLAN on S3
Example 3-9 Configuring the Lowest Possible Priority to Ensure That a Switch Is Root
The switch priority can be set for any spanning-tree instance. This setting
affects the likelihood that a switch is selected as the root bridge. A lower
value increases the probability that the switch is selected. The range is 0 to
61,440, in increments of 4096; all other values are rejected. For example, a
valid priority value is 4096 × 2 = 8192.
As shown in Example 3-10, the show spanning-tree active command
displays spanning-tree configuration details for the active interfaces only.
The output shown is for S1 configured with PVST+. A number of Cisco IOS
command parameters are associated with the show spanning-
tree command.
In Example 3-11, the output shows that the priority for VLAN 10 is 4096,
the lowest of the three respective VLAN priorities.
NOTE
VLAN0010
Spanning tree enabled protocol rstp
Root ID Priority 4106
Address ec44.7631.3880
This bridge is the root
Hello Time 2 sec Max Age 20 sec
Forward Delay 15 sec
In the output, the statement “Spanning tree enabled protocol rstp” indicates
that S1 is running Rapid PVST+. Notice that the BID priority is set to 4096.
Because S1 is the root bridge for VLAN 10, all of its interfaces are
designated ports.
In Example 3-14, the show running-config command is used to verify the
Rapid PVST+ configuration on S1.
NOTE
Situations may occur in which STP was not considered in the network
design and implementation, or in which it was considered or implemented
before the network underwent significant growth and change. In such
situations, it is important to know how to analyze the STP topology in the
operational network.
A big part of troubleshooting consists of comparing the actual state of the
network against the expected state of the network and spotting the
differences to gather clues about the troubleshooting problem. A network
professional should be able to examine the switches and determine the
actual topology, as well as understand what the underlying spanning-tree
topology should be.
The output on switch S1 in this example shows all three ports in the
forwarding (FWD) state and the roles of the three ports as either
designated ports or root ports. Any ports being blocked display the output
status as “BLK.”
The output also gives information about the BID of the local switch and the
root ID, which is the BID of the root bridge.
Figure 3-45 Overview of STP Status
There are two types of STP failure. First, STP might erroneously block
ports that should have gone into the forwarding state. Connectivity might be
lost for traffic that would normally pass through this switch, but the rest of
the network remains unaffected. Second, STP might erroneously move one
or more ports into the forwarding state, as shown for S4 in Figure 3-47.
Remember that an Ethernet frame header does not include a TTL field,
which means that any frame that enters a bridging loop continues to be
forwarded by the switches indefinitely. The only exceptions are frames that
have their destination address recorded in the MAC address table of the
switches. These frames are simply forwarded to the port that is associated
with the MAC address and do not enter a loop. However, any frame that is
flooded by a switch enters the loop. This may include broadcasts,
multicasts, and unicasts with a globally unknown destination MAC address.
The load on all links in the switched LAN quickly starts increasing as more
and more frames enter the loop. This problem is not limited to the links that
form the loop but also affects any other links in the switched domain
because the frames are flooded on all links. When the spanning-tree failure
is limited to a single VLAN only, links in that VLAN are affected. Switches
and trunks that do not carry that VLAN operate normally.
If the spanning-tree failure has created a bridging loop, traffic increases
exponentially. The switches then flood the broadcasts out multiple ports.
This creates copies of the frames every time the switches forward them.
When control plane traffic (for example, routing messages) starts entering
the loop, the devices that are running these protocols quickly start getting
overloaded. Their CPUs approach 100 percent utilization while they are
trying to process an ever-increasing load of control plane traffic. In many
cases, the earliest indication of this broadcast storm in progress is that
routers or Layer 3 switches report control plane failures and that they are
running at a high CPU load.
If the underlying cause of the spanning-tree failure has not been fixed,
chances are that restoring the redundant links will trigger a new broadcast
storm. Before restoring the redundant links, determine and correct the
cause of the spanning-tree failure. Carefully monitor the network to ensure
that the problem is fixed.
Activity 3.3.3.6: Troubleshoot STP Configuration
Issues
Refer to the online course to complete this activity.
Figure 3-49 shows the backplane of four Catalyst 3750 switches and how
they are connected in a stack.
Every member is uniquely identified by its own stack member number. All
members are eligible masters. If the master becomes unavailable, there is
an automatic process to elect a new master from the remaining stack
members. One of the factors is the stack member priority value. The switch
with the highest stack member priority value becomes the master.
Layer 2 and Layer 3 protocols present the entire switch stack as a single
entity to the network. One of the primary benefits of switch stacks is that
you manage the stack through a single IP address. The IP address is a
system-level setting and is not specific to the master or to any other
member. You can manage the stack through the same IP address even if
you remove the master or any other member from the stack.
Figure 3-49 Cisco Catalyst 3750 Switch Stack
The master contains the saved and running configuration files for the stack.
Therefore, there is only one configuration file to manage and maintain. The
configuration files include the system-level settings for the stack and the
interface-level settings for each member. Each member has a current copy
of these files for backup purposes.
NOTE
The formulas used to calculate the diameter are beyond the scope of this
course. Refer to the following Cisco document for more
information: www.cisco.com/c/en/us/support/docs/lan-switching/spanning-
tree-protocol/19120-122.html.
Switch stacks help maintain or reduce the impact of diameter on STP reconvergence. In a switch stack, all switches
use the same bridge ID for a given spanning-tree instance. This means that, if the switches are stacked, as shown
in Figure 3-51, the maximum diameter becomes 3 instead of 9.
Figure 3-51 Switch Stacking Reduces STP Diameter
Ether Channel :
It is a technique to combine multiple port of a switch to link with another switch. It
increases bandwidth and provides fault tolerance in the network. Switching loop is not
generated between two switches because switch port are combined under a logical
interface.
It is done by Channel Group. Maximum 6 channel groups can be created a physical switch.
In case of Multiple channel group only one group is active while another groups logical
interface are in disable state as per rule of STP. Ether channel is also used for load
balancing.
Before creating the channel-group with switch ports, ports must be in trunking mode because
trunk port supports frames of all VLANs and it is not member of any VLAN.
Steps :
S1(config)#int range fa0/22-24
R1(config)#line con 0
R1(config)#password 789
R1(config)#login
R1(config)#exit
Recovery of password:
Router IOS – Flash Memory
Booting Process –
Power On -> ROM (BIOS) -> Flash Memory (IOS) -> RAM -> Booting
NVRAM( R1.confg )
R1>
Password Implementation :
Router>
Router>enable
Router#conf t
#line con 0
#password 789
#login
#exit
#line con 0
#login local
#exit
Rommon2>reset
Router>enable
Router#copystartup-config running-config
R1#sh run
R1#conf t
R1(config)#line con 0
R1(config-line)#no password
R1(config-line)#no login
R1(config-line)#exit
R1(config)#no enable password
R1(config)#config-register ox2102
R1(config)#exit
R1#write memory
R1#reload
Commands-
R1#copy startup-configtftp
Router#copytftpstartup-config
Rommon1>tftpdnld
IP_ADDRESS=1.0.0.1
IP_SUBNET_MASK=255.0.0.0
IP_DEFAULT_GATEWAY=1.0.0.1
TFTP_SERVER=1.0.0.2
TFTP_FILE= →Give IOS file name which are available at TFTP server
Rommon>tftpdnld
We will rename this file to stop loading this file at the time of booting
of switch.