Sunteți pe pagina 1din 61

WAN Headline views.

Data Link Protocols


HDLC
PPP
FRAME RELAY
ATM
Major Components
Routers, DSU/CSU, Access Servers
Major Types
Circuit Switched,
Packet Switched,
Dedicated
Cell Switched

WAN Bandwidths
North American
1
24
672

DSO - DSO
DSOs - DS1 or T1
DSOs - DS2 or T3

= 64
= 1.544
= 43.736

Kbps
Mbps
Mbps

= 2.048
= 34.368

Mbps
Mbps

European
E1
E3

- E1
- E3

Frame Relay
Packet Switched
Provides permanent and virtual switched circuits using shared medium b/w
No error / flow control
Most upto 4Mbps
Layer 2 Data Link
Network edge connection is often Leased Line but may be ISDN2
Multiple VCs . PVCs possible
Data Link Connection Identifier (DLCI) used to identify the VC
LMI Local management interface standards (Cisco, ANSI, ITU-T) from router to local
switch. Indicates standards and DLCIs and whether they are up or down.
BECN / FECN counters indicating congestion

Common Commands
Encapsulation frame-relay (ietf / cisco)
Bandwidth 64
Frame-relay map ip destip DLCI num broadcast
Interface serial2.2 multipoint / point-to-point
Show frame-relay traffic / lmi / map / pvc
Show interfaces
Clear frame-relay-inarp

ATM - Asyncronous Transfer Mode


ATM is a high throughput packet switching protocol that provides statistical
multiplexing, broadband (multi megabit) data rates, multiple virtual circuits per
network access, and flexible bandwidth per connection.
A network technology that uses label-switching to forward cells with 48-byte payloads.
When used as L2 for an IP network, this imposes an overhead of wasted bandwidth due
to the cell headers and the padding on the last cell of a packet.

Cell Switched
Voice, video and data through networks
Less efficient than frame
Implemented on PVC or SVC
Multiplexes several data streams to one

HDLC - Encapsulation
May not be interchangeable with other vendors
Cisco version used with proprietary elements
P2P and Multipoint configurations
Supports only synchronous links
Cisco default encapsulation on serial links
Common Commands
Encapsulation HDLC (already enabled by default)
Show ip route / eigrp
Debug ip rip / eigrp
Show ip eigrp interfaces / traffic / neighbours /topology

PPP Encapsulation
Will be better to use to integrate with other vendors
Authentication (PAP and CHAP)
Protocol multiplexing, link quality testing, error detection
Synchronous and Asynchronous
Includes :
o Method for encapsulating multiprotocol datagrams
o Link Control Protocol for managing the data link (authentication, compression, error, multilink)
o Network Control Protocol for managing the network layer protocols

Common Commands
Encapsulation ppp
Ppp authentication
Debug ppp authentication

Routing Protocols
Interior Gateway Protocols (IGP)
Exchange route information within an autonomous system.
Examples include : RIPv2/EIGRP/OSPF

Exterior Gateway Protocols (EGP)


Route information between autonomous systems examples include
: BGP
Common Commands
Show ip protocols
Show ip route / eigrp
Debug ip rip / eigrp
Show ip eigrp interfaces / traffic / neighbours /topology

Distance Vector

Link State Routing

Router does not know entire


path

Router tries to build own map of network


topology based on topology changes from Link
State Packets

Distance (hop) and Direction (vector)

Uses Link State Announcements (LSAs)

Sent out even if no changes to


communicate topology changes

Routers send messages when first active about


connections and live routes.

Routing by rumour

LSR responds quickly in changes to routing.

Updates sent out frequently (30


second) intervals.

Updates sent at long (30 minute) intervals


Supports classless routing & route
summarisation
Can be segmented into area hierarchies

Link State Distance Vector Comparison


Distance Vector
View network from neighbours perspective
Add distance vectors form router to router
Frequent periodic updates : slow convergence
Passes copies of routing tables to neighbours

Link State
Get common view of entire network topology
Calculate the shortest path to other routers
Event triggered updates: faster convergence
Passes LS route updates to other routers

Link State vs Distance Vector


Advantages
Fast convergence: changes are reported
immediately by the source affected
Robustness against routing loops
Routers know the topology
Link-state packets are sequenced and aged
The link-state database sizes can be minimized
with careful network design

Disadvantages
Significant demands on memory and processing
resources
Requires very strict network design
Requires a knowledgeable network admin
Initial flood can impede network performance

IS-IS

V1&2

Default routing Administrative Distances


Directly connected network
Static route
EIGRP
IGRP
OSPF
IS-IS
RIPv2
External EIGRP
Unknown

0
1
90
100
110
115
120
170
255

Routing Metrics
Bandwidth
Delay
Hop count
Cost
Load
Reliability

the data capacity of the link


the time take to move a packet
the number of times it passes a router
configurable value on Cisco routers
amount of activity on the resource
- usually refers to the bit error rate

IGRP Distance Vector - Classful


IGRP is a proprietary protocol. IGRP created to overcome the limitations of RIP max hop
count of 15 and a single routing metric. IGRP supports multiple metrics for each route,
including bandwidth, delay, load, MTU, and reliability. Max hop count of IGRP is 255
(default 100) and routing updates are broadcast every 90 seconds (by default).
IGRP is classful protocol. Because the protocol has no field for a subnet mask, the router
assumes that all interface addresses within the same Class A, Class B, or Class C network
have the same subnet mask as the subnet mask configured for the interfaces in question. This
contrasts with classless routing protocols that can use variable length subnet masks. Classful
protocols have become less popular as they are wasteful of IP address space.
Uses Bandwidth, Delay & Reliability as metrics
Default hop count is 100 max is 255
Propriatory
Mainly designed to overcome max hop count within RIP
Classful

RIP IGP
RIP is a dynamic routing protocol used in local and wide area networks. It is classified as an
interior gateway protocol (IGP) using the distance-vector routing algorithm. The protocol has
since been extended several times, resulting in RIP-2. Both versions are still in use today,
however, they are considered technically obsoleted by more advanced techniques, such as Open
Shortest Path First (OSPF) and the OSI protocol IS-IS. Since the advent of IPv6, the next
generation of the Internet Protocol, RIP has been adapted, known as RIPng for IPv6.
Distance Vector
Max hopcount = 15
Only Metric used is hopcount
Transmits every 30 seconds
Uses
Split Horizon
Route Poisoning
Hold down timers
Long Convergence poor scalability
UDP Based.
Specify only major networks net 10.0.0.0

OSPF Classless Link State - IGP


Summary
Uses Backbone, internal, ABR routers within areas and autonomous systems
Operates within a hierarchy, quick convergence
Uses Multicast to send hello messages
Each router builds its own topology view basing itself at the root of the tree.
Uses MD5 authentication
Supports VLSM
Backbone area is 0 Valid Area numbers 0 - 65535
IP Protocol 89
Bandwidth = 100Mbs / bandwidth in Mbs

Common Commands
ROUTER OSPF process-id
SHOW IP ROUTE / PROTOCOLS
SHOW IP OSPF / INTERFACE
SHOW IP OSPF NEIGHBOUR (include ipaddress for more info)
DEBUG IP OSPF EVENTS / PACKET
IP OSPF COST [value]
Network 192.168.1.0 0.0.0.255 area 0

EIGRP - Classless
Distance Vector Protocol Developed by Cisco hence proprietary
Rapid Convergence Diffusing Update Algorithm (DUAL)
Reduced Bandwidth Usage through use of partial updates on topology change
Multi-protocol support
Classless routing
Less overhead due to use of multicast and unicast (not broadcast)
Supports load balancing
Easy Summarisation
Best route is called successor route
Backup route is called feasible successor
Advertised Distance = Distance for an EIGRP neighbour to reach a network
Feasible Distance = Advertised distance + Additional metric to reach that
neighbour.
Supports MD5 authentication

Hello packets contain:


Router ID
Hello and dead intervals default is 10 seconds
Neighbours
Area ID (must share same area id & subnet mask)
Router priority (8 bit number)
DR and BDR IP addresses.
Authentication password (null, simple or MD5)
Stub area flag
Common Commands
Show ip route EIGRP
Show ip protocols
Show ip EIGRP interfaces
Show ip EIGRP neighbours
Show IP EIGRP topology
Show ip eigrp traffic

Classful / Classless?
Classful does not pass subnet information no VLSM
RIPv1
IGRP
Cannot use subnet 0 or 255
Classless does pass subnet information can use VLSM
RIPv2
EIGRP
OSPF
IS-IS
Can use subnet 0 or 255
Manual summarisation

WLAN - Summary
Standard
802.11a
Frequency
5Ghz (U-NII)
Channels (non overlapped)23 (12)
Max Speed DSSS
Max Speed OFDM
54 Mbps
Standard
OFDM

802.11b
2.4Ghz (ISM)
11 (3)
11 Mbps
DSSS

802.11g
2.4Ghz (ISM)
11 (3)
11Mbps
54 Mbps
OFDM DSSS

BSS Basic Service Set one access point


ESS Extended Service Set multiple access points ability to roam between them.
IBSS Independent Basic Service Set Add hoc P2P

WLAN Security
Name
Wired Equivalent Privacy
Cisco
Wi-Fi Protected Access (WPA)
802.11i (WPA2)

Year
1997
2001
2003
2005+

Who Defined
IEEE
Cisco EAP
Wi-Fi Alliance
IEEE

WEP issues static preshared keys (PSK), Easily cracked keys should not be used today.
Added cloaking and MAC filtering to improve security, both poor attempts.
WPA included dynamic key exchange using TKIP additional message integrity check
algorithm.
WPA2 not backwards compatible. Dynamic key exchange, stronger encryption, and user
authentication also includes AES
Standard
WEP
CISCO
WPA
WPA2 (802.11i)

Key Dist
Static
Dynamic
Both
Both

Device Auth
Yes (weak)
Yes
Yes
Yes

User Auth
None
Yes (802.1x)
Yes (802.1x)
Yes (802.1x)

Encryption
Yes (weak)
Yes (TKIP)
Yes (TKIP)
Yes (AES)

ISDN
ISDN BRI
ISDN PRI

B Channels
D Channels

- 2 x 64k and 1 x 16k


- 23 x 64k and 1 x 64K

D Channel is up all the time with SS7


Uses Signalling System 7 (SS7)
Cisco Implementations

Q.921

Common Commands
ISDN switch-type switch-type
ISDN spid1 spid number sets B first channel SPID
ISDN spid2 spid numbers sets second B channel SPID
Show isdn active / status
Show interfaces bri0

Dial on Demand Routing DDR/ DOD


Need to setup the BRI
o
o
o
o

Setup IP Address
Encapsulation
Dialler map (see below)
Dialer group

Common Commands
Dialer-list 1 protocol ip permit
Access-list 101 deny tcp any eq ftp
Dialer map ip 10.1.0.2 name ppp remote host name telephone number
Dialer idle-timeout seconds
dialer load-threshold load (1-255)
show dialer
show isdn

NAT
Static NAT 1 to 1 mapping
Dynamic NAT mappings based on a pool of allocatable NAT addresses
NAT Overloading / PAT mapping of multiple IP addresses to single registered IP addresses
using port numbers to separate the streams.

Common Commands
ip nat inside source static local ip global ip
ip nat inside / outside
ip nat pool name start-ip end-ip netmask
access-list access-list-number permit source
show ip nat translations / statistics
clear ip nat translation
debug ip nat / detailed
clear ip nat translation

Static Translation Example

Dynamic Translation Example

NAT Troubleshooting
Use SHOW IP NAT TRANSLATION to verify that translations exist.
Use SHOW IP NAT STATISTICS to verify that translations are happening.
Check that routes exist on next hop routers for translated addresses.
Check interfaces are allocated INSIDE and OUTSIDE correctly.
Check access lists permit translated addresses using SHOW ACCESS-LIST
Check enough IP Addresses available within NAT pool

Variable Length Subnet Masking VLSM

Routing protocol must advertise the subnet number but also the subnet mask.
RIP-2, EIGRP and OSPF all support VLSM with manual summarisation.
RIP-1 and IGRP do not support VLSM

Access Control Lists


Used for Classification and Filtering/
Used on inbound and/or outbound interfaces
Standard ACLs rules based on IP addresses 1->99 & 1300->1999
Extended ACLs based on protocols & IP addresses 100->199 & 2000->2699
ACLs identified by Numbers or Names
Executed top down
Dynamic ACLs require telnet connectivity and pre-auth
Reflexive ACLs allow filtering on upper layer information (e.g. port nos)
Time Based ACLs self explanatory
To find mask convert to decimal and then subtract from 255.255.255.255

Common Commands
Access-list 1 permit 172.16.0.0 0.0.255.255
ip access-group 1 out
line vty 0 4
access-class 1 in to restrict on VTY (Telnet ports)
show ip interfaces e0 (to show whether a list is applied)
show access-lists
access-list 120 deny icmp any any

APPLICATION

APPLICATION

PRESENTATION

PRESENTATION

SESSION
TRANSPORT
NETWORK
DATA LINK
PHYSICAL

HTTP / POP3 / SMTP

SESSION
SEGMENTS
PACKETS
FRAMES
BITS

TRANSPORT

TCP/UDP

NETWORK

IP

DATA LINK

MAC / CDP

PHYSICAL

Ethernet / Frame /

Application Layer Interfaces between network and application software, includes


authentication services

Presentation Layer Defines the format and organisation of data includes encryption
Session Layer Establishes and maintains end to end bidirectional flows between endpoints
includes managing transaction flows

Transport Layer Connection, establishment and termination, flow control, error


recovery & segments data from the system of the sending host and reassembles the data into a
data stream on the system of the receiving host for transmission

Network Layer Logical addressing, routing and path determination, END TO END
DELIVERY OF PACKETS

Data Link Formats data into frames appropriate for transmission onto some physical
medium. Defines rules for when the medium can be used. Defines means by which to recognise
transmission errors

Physical Layer - defines the electrical, mechanical, procedural, and functional specifications
for activating, maintaining, and deactivating the physical link between end systems

Private IP Address Spaces


10.0.0.0
172.16.0.0
192.168.0.0

to
to
to

10.255.255.255
172.31.255.255
192.168.255.255

IP Address Classes
Class A First Octet : 0xxxxxxx
Class B First Octet : 10xxxxxx
Class C First Octet : 110xxxxx
Class D First Octet : 1111xxxx

1-126.xxx.xxx.xxx
128-191.xxx.xxx.xxx
192-223.xxx.xxx.xxx
248-255.xxx.xxx.xxx

Loopback Address
127.0.0.1 (127.x.x.x addresses are reserved)

Common Port Numbers


20
21
22
23
25
53
67,68
69
80
110
143
161
443

FTP (Data)
FTP (Control)
SSH
Telnet
SMTP
DNS
DHCP
TFTP
HTTP
POP3
IMAP
SNMP
HTTPS/SSL

TCP
TCP
TCP
TCP
TCP
UDP, TCP
DHCP
UDP
HTTP
TCP
UDP
TCP

IPv6
128 bit binary value address
Simplified header less routing overhead
Compliance with mobility and IPSec as standard
Transition richness dual stack, NAT and tunnelling between and over IPv4
Leading zeros are optional so 09C0 becomes 9C0 and 0:0:0:0 becomes ::
Replaces broadcasts with multicasts and anycasts
Private address space now begins with FE
o Site local addresses are FEC, FED, FEE, FEF
o Link local addresses (for routing also setup)
Loopback address ::1
Unspecified address is ::

Common Commands
IPV6 UNICAST-ROUTING
IPV6 ROUTER RIP RT0
IPV6 ADDRESS 2001:B8:1:1::/64 EUI-64
IPV6 RIP RT0 ENABLE

Enable IPv6 on router


Assign RIP PID to RT0
Assign IP address
Enable RIPng

Allocating IPv6 Addresses


Manual interface assignment either
Full allocation or
Allocate network id and use MAC address and EUI-64 to allocate Host
Stateless configuration
DHCPv6 (Stateful)
More control than server less or stateless auto configuration
Can be employed in a server only environment
Can be used in parallel with stateless auto configuration
Can be used for renumbering

TCP
Connection Orientated

UDP
Connectionless

Reliable

Unacknowledged

Error checking & Packet


Recovery

No error checking

Full Duplex
Sequencing & Flow Control

Better for video conferencing

Ethernet Cable Standards


100BASE-FX
10BASE-T
100Base-T
100Base-TX

-100 Mb/s Ethernet over a fiber-optic cable 400 metres


-10 Mb/s Ethernet over a copper cable 100 metres
-100 Mb/s Ethernet over a copper cable 100 metres
-100 Mb/s Ethernet over a fiber-optic cable 100 metres

Switch vs Bridge
Switch is hardware based switching Bridge is software switches are faster
Switches separate collision domains
Switches create full duplex communication
Switches support rate adaptation

VLAN Trunking - 802.1Q/ISL


General
Carries multiple VLAN traffic over single trunk
Four byte tag field
PVST+ - Per LAN VLAN Spanning Tree +
ISL
Created before IEEE 802.1Q Cisco Propriatory
Full encapsulation of frame within ISL header and trailer
802.1Q
Additional 32 bit field is inserted with VLAN ID
FCS is recalculated to cope.
Native tag is VLAN 1 hence no additional tagging required.
Port States
o
o
o
o
o
o

Dynamic Desirable sending DTPs and actively negotiating


Dynamic Auto will form a trunk but not sending DTPs
Trunk will only trunk
Access will only access
No-Negotiate DTP frames not sent.
Default mode is trunk

VTP Layer 2
A VTP domain is one switch (or several interconnected) which share same
VTP environment. No domain name set by default
Modes
Server (default)
Client
Transparent

Manages policy
Synchs with Server
Does not synch with Server

VTP Adverts sent every 5 minutes or when VLAN configuration changes.


Common Commands
VTP domain domain name
VTP Password password
Vtp mode mode (Server, Client, Transparent)
Show vtp status
Switchport mode trunk to put into 802.1Q

RSTP vs STP Port States


Operational
Status
Enabled
Enabled
Enabled
Enabled
Disabled

STP Port State


Blocking
Listening
Learning
Forwarding
Disabled

RSTP Port State Port Included in


Active Topology
Discarding
No
Discarding
No
Learning
Yes
Forwarding
Yes
Discarding
No

STP IEEE 802.1D


Switches and devices exchange info every 2 secs using multicast frames called the BDPU.
Root bridge is the one with the lowest Bridge ID
Bridge ID is combination of Bridge ID and Priority
Defines CST (Common Spanning Tree)
PVST (PerVlanSpanningTree)
50 Second convergence time

Default costs:
10
100
1
10

Mbps
Mbps
Gbps
Gbps

100
19
4
1

Portfast
Allows a switch to become immediately active (forwarding) when port becomes active
must be no other switches, bridges or STP speaking devices connected

BDPU Guard
Protects ports and integrity by disabling a port if any BPDUs are received. used only
on access ports used commonly with portfast.

Rapid Spanning Tree 802.1w


Only waits 3 hello periods before converging network. Eliminates forwarding delay
RSTP convergence time is typically <10 seconds although can be as low as 1-2 secs.
Will not work well in environment with hubs.

ADSL/SDSL
Uses local loop
Multiplexed using DSLAM/TDM
Must be within 18000 feet

Always on
Up to 8.192Mbs

Grades ADSL
ADSL
CDSL/G-Lite
(Consumer DSL)
VDSL
(Very High Data Rate)
Grades SDSL
SDSL
HDSL
IDSL
GSHDSL

(High data rate DSL)


(ISDN DSL)
(Symmetric High bit rate)

Terminology
Broadcast (FFFF:FFFF:FFFF:FFFF)a single packet sent to all devices
within the same broadcast domain

Unicast - there is a one-to-one association between network address and


network endpoint. The Message goes to one recipient.

Multicast - there is a one-to-many association between network addresses


and network endpoints: each destination address identifies a set

Anycast (IPv6)- An anycast address is a single address that can be assigned to


multiple interfaces. Eg an IPv6 address is assigned to a multi-homed computer. A
packet sent to an anycast address is delivered to the first available interface of a
device. Used to provide load-balancing & automatic failover Anycast addresses are
used only as destination addresses and can be assigned only to routers.

Securing the Cisco Router & Switch


Router
Router
Router
Switch
Switch
Switch

:
:
:
:
:
:

Implementation of passwords on VTY and console connections


Usage of secret passwords
SSH use with local user name and password or from an AAA server
Prevent VTP and Trunking using switch port mode access
Assign ports to an un-used VLAN
Admin disable using shutdown

Common Commands
LINE CONSOLE 0
PASSWORD FAITH
LINE VTY 0 15
PASSWEORD LOVE
ENABLE SECRET CISCO
SERVICE PASSWORD-ENCRYPTION
SSH
o Login local
o Transport input telnet ssh
o Username Wendell password hope
o Ip domain-name example.com
o Crypto key generate rsa

Configuring SSH
SSH is preferred method of access today. To add support for SSH authentication support is
required (either locally or on AAA server)
1
2
3
3
4
5

Specify Lines
Specify local authentication
Specify transport
Specify credentials
Specify DNS domain name
Generate public and private key

LINE VTY 0 15
LOGIN LOCAL
TRANSPORT INPUT TELNET SSH
USERNAME WENDELL PASSWORD HOPE
IP DOMAIN-NAME name
CRYPTO KEY GENERATE RSA

Each client will require a copy of the devices public key before the client can connect.

Port Security
Implementation of passwords
Default violation mode is shutdown

Common Commands
Switchport mode access port into access(not trunk mode)
Switchport port-security interface maximum number
Switchport port-security violation (protect/restrict/shutdown)
Switchport port-security mac-address mac-address
Switchport port-security mac-address sticky

Cisco Discovery Protocol Currently at version 2


Cisco Propriatory
Runs over Data Link Layer (Layer 2)
Must support Subnetwork Access Protocol (SNAP) encapsulation
CDP enabled by default
Can enable globally on port by port basis
Provides
o Device Identifiers (e.g. host names)
o Address list one per protocol supported
o Port identifier
o Capabilities List
o Platform e.g. Cisco 7200

Common Commands
Show CDP [entry | interface | neighbors | statistics | traffic)
no cdp run global disable
no cdp enable interface disable

Cisco LAN Switch Port Status


Line Status

Protocol
Status
Admin Down Down
Down
Down
Up
Down
Up

Interface
Typical Root Cause
Status
Disabled
The interface is configured with the shutdown command
Not connect No cable, bad cable, wrong cable pinouts, mismatched speeds,
connecting device is powered off or other interface is shutdown
Not connect An interface up/down state is not expected on an LAN interface
Err-disabled Port security has disabled the interface

Down
Down
(err Disabled)
Up
Connect

The interface is working

Cisco Router Switch Port Status


Line / Proto Status
Admin down & down
Down down
Up down
Up Up

Shutdown
No shutdown configured but there is a physical issue E.g. no cable, wrong cable
Refers to data link problems. Configu problems e.g. encapsulation issues, clock
mis matches.
All is Well, interface is functioning

First status code refers to layer 1 status is the cable installed, right or wrong cable etc
Second code refers to layer 2 protocol configuration etc.

Miscellaneous
Exam Help
Broadcast domains are broken only by routers, not switches
Collision domains are broken by switches and routers
Use debug IP NAT DETAILED to provide information about exception faults
IP4 over IP6 advantage is a shorter header
IP6 Global Unicast Address is Anycast
EUI-64 expands 48bit MAC t0 64 by inserting FFFE into the middle 16 bits
IPv6 routing protocols : OSPFv3, EIGRP for IPv6, RIPng, ODR
Common transition techniques are Dual stack and 6to4 tunnels
Ping Responses
Timed out ping
Packed recd unknown
Unreachable Subnet
Successful

period (".").
"?"
"N"
"!"

Cross over cable


Change pins 2 goes to 6, pins 3 go to 1
Devices that transmit on 1&2 and receive on 3&6

Devices that Transmit on 3&6 and Receive on 1&2

PC NIC
Routers
Wireless Access Points
Networks printers

Hubs
Switches

Rollover cable
Pin
1
2
3
4
5
6
7
8

Pin
8
7
6
5
4
3
2
1

Ethernet Frame
Starting
Delimiter
(1 byte)

Destination
Address
(6 bytes)

Source
Type
Address (2 bytes)
(6 bytes)

Information field
(46 - 1500 bytes)

CDP
Layer 2
Enabled by Default
Cisco Boot Modes
0 X 0 = the router will enter the ROM monitor mode
0 X 1 = the router will boot from image in ROM
0 X 2 = normal boot sequence from config file in NV RAM

Frame Check
Sequence
(4 bytes)

Cisco Boot Sequence


Show version will show registers current value
Default is 2101
Boot values
o 0 = ROMMON OS
o 1 = Load first IOS file found in flash
o 2-F = each boot system in startup-config file until one works or
load first IOS in flash
Connection Orientated : A protocol that requires an exchange of messages before data transfer
begins or that has a required pre-established correlation between two endpoints.
Connectionless A Protocol that does not require an exchange of messages and that does not
require a pre-established correlation between two endpoints.

Cisco Key Strokes / Shortcuts


Delete: Removes the character to the right of the cursor
Backspace: Removes the character to the left of the cursor
Up Arrow: Allows you to scroll forward through previous commands
Down Arrow: Allows you to scroll backwards through previous commands
Ctrl+P (or up arrow): Displays the last command entered
Ctrl+N (or down arrow): Displays previous commands entered
Ctrl+A: Moves the cursor to the beginning of the current line
Ctrl+E: Moves the cursor to the end of the current line
Ctrl+F: Moves forward one character
Ctrl+B: Moves backwards one character
Esc+F: Moves forward one word
Esc+B: Moves backwards one word
Ctrl+R: Redisplays a line (starts a new line, with the same command shown)
Ctrl+U: Erases a line
Ctrl+W: Erases a word
Tab: Completes a partial command
Ctrl+Z: Exits configuration mode, returning you to privileged EXEC mode

Abbreviations
ARP
CHAP
CIDR
CIR
CPE
CSU
DLCI
DSLAM
DSSS
DSU
DTE
HDLC
LMI
NLSP
OFDM
PAP
POST
RADIUS
RARP
SNAP
UDP
WIC
WPA

Address Resolution Protocol


Challenge Handshake Authentication protocol
Classless Interdomain Routing
Committed Information Rate (Frame Relay)
Customer Premises Equipment
Channel Service Unit
Data Link Connection Identifier (Frame Relay)
Digital Subscriber Line Access Multiplexer
direct sequence spread spectrum
Digital Service Unit
Data Terminal Equipment
High Level Data Link Control
Local Management Interface
Network Link State Protocol
Orthogonal Frequency Division Multiplex (O
Password Authentication Protocol
Power on Self Test
Remote Authentication Dial In User Service
Reverse Address Resolution protocol
Sub network access Protocol - CDP
User Datagram Protocol
Wan Interface Card
WIFI Protected Access

SDM Security Device Manager


BPDU Bridge Protocol Data Units

S-ar putea să vă placă și