Documente Academic
Documente Profesional
Documente Cultură
0
Networking Fundamentals
Agenda
Day 1
Laboratorio
Agenda
Day 2
WAN Technologies
Identify different WAN Technologies, HDLC, PPP, Frame Relay.
Configure and verify Frame Relay on Cisco routers
Agenda
Day 3
IP Routing Technologies
Describe basic routing concepts
-C E F
-Packet forwarding
-Router lookup process
Describe the boot process of Cisco IOS routers
Configure and verify basic Router configuration
Configure and verify interface (serial and Ethernet)
Configure and verify Static & Default routing
Manage Cisco IOS Files
- Boot preferences / Cisco IOS image(s)
- Licensing
Differentiate methods of routing and routing protocols
-Static vs. Dynamic
-Link state vs. Distance Vector
-Administrative distance
Configure and verify OSPF (single area)
-Benefit of single area
-neighbor adjacencies
-OSPF states, Multi area
-Configure OSPF v2
-Router ID, Passive interface, LSA types
Agenda
Day 3
Configure and verify EIGRP (single AS)
-Feasible Distance / Feasible Successors
-Administrative distance
-Feasibility condition
-Metric composition
-Router ID, Auto summary, Path selection
-Load balancing (Equal & Unequal)
-Passive interface
InterVLAN routing (Router on a stick)
-sub interfaces, encapsulation
Configure SVI interfaces
Laboratorio de OSPF
Laboratorio EIGRP
Agenda
Day 4
IP Services
Configure and verify DHCP (IOS Router)
-Configuring router interfaces to use DHCP
-DHCP options
-Excluded addresses, Lease time
ACL (Types, Features & Applications of ACLs)
-Standard, Extended, Named & Numbered
-Log option
Configure and verify ACL
Recognize High availability (FHRP, VRRP, HSRP & GLBP)
Configure and verify Syslog.
Describe SNMP v2 & v3
Agenda
Day 4
Laboratorio
Agenda
Day 5
Troubleshooting
Identify and correct common network problems
Troubleshoot and Resolve VLAN problems
-Identify that VLANs are configured
-port membership correct
-IP address configured
Troubleshoot and Resolve trunking problems
-correct trunk states
-correct encapsulation configured
-correct vlans allowed
Troubleshoot and Resolve STP
-Root switch
-Priority
-Mode is correct
-Port states
Troubleshoot and Resolve routing issues
-Routing is enabled
-Routing table is correct
-Correct path selection
Agenda
Day 5
Troubleshoot and Resolve OSPF problems
-Neighbor advances
-Hello and Dead timers
-OSPF area
-Interface MTU
-Network types
-Neighbor states
-OSPF topology database
Troubleshoot and Resolve EIGRP problems
- Neighbor adjancies
- AS number
- Load balancing
Troubleshoot and Resolve interVLAN
-Connectivity
-Encapsulation
-Subnet
-Native VLAN
-Port mode trunk status
Troubleshoot and Resolve ACL issues
-Statistics, Permitted networks, Direction
Troubleshoot and Resolve WAN implementation issues
-Serial interfaces, PPP, Frame relay
Troubleshoot etherchannel problems
Agenda
Day 6
802.1x
Device Roles
Authentication Process
Authentication Initiation and Message Exchange
Authentication Manager
Port-Based Authentication Methods
Per-User ACLs and Filter-Ids
Authentication Manager CLI Commands
Ports in Authorized and Unauthorized States
802.1x Authentication and Switch Stacks
802.1x Host Mode
802.1x Multiple Authentication Mode
MAC Move
MAC Replace
802.1x Accounting
802.1x Accounting Attribute-Value Pairs
802.1x Authentication with Guest VLAN
802.1x Authentication with Restricted VLAN
802.1x Authentication with Inaccessible Authentication Bypass
IEEE 802.1x Authentication with Voice VLAN Ports
IEEE 802.1x Authentication with Port Security
IEEE 802.1x Authentication with Wake-on-LAN ]
Agenda
Day 6
Prerequisites for Configuring NetFlow and NetFlow Data Export
Restrictions for Configuring NetFlow and NetFlow Data Export
NetFlow Data Capture
NetFlow Data Export
Networking Devices
Network Topology
Network Protocols
Importance of Bandwidth
OSI Model
OSI Layers
OSI Layers
OSI Layers
OSI Layers
OSI Layers
OSI Layers
OSI Layers
Peer-to-Peer Communication
TCP/IP Model
Encapsulation
CCNA
Networking Media
Overview
Routers
Switches, Bridges
Hub, Repeaters
Distance limitations
Ethernet is fundamentally a shared technology where all users on a given LAN
segment compete for the same available bandwidth.
This situation is analogous to a number of cars all trying to access a one-lane
road at the same time.
Because the road has only one lane, only one car can access it at a time.
The introduction of hubs into a network resulted in more users competing for
the same bandwidth.
Collisions are a by-product of Ethernet networks.
Bridges
Switches
Router
Half-Duplex
Duplex Transmissions
Two way street, but only one way at a time (land slide).
Network Congestion
Network Latency
Latency, or delay, is the time a frame or a packet takes to travel from the
Full-duplex transmitting
Full-duplex Ethernet allows the transmission of a packet and the reception of a different packet at the
same time.
To transmit and receive simultaneously, a dedicated switch port is required for each node.
The full-duplex Ethernet switch takes advantage of the two pairs of wires in the cable by creating a
direct connection between the transmit (TX) at one end of the circuit and the receive (RX) at the
other end.
Ethernet usually can only use 50%-60% of the available 10 Mbps of bandwidth because of collisions
and latency.
Full-duplex Ethernet offers 100% of the bandwidth in both directions.
This produces a potential 20 Mbps throughput, which results from 10 Mbps TX and 10 Mbps RX.
A layer 3 switch is typically a layer 2 switch that includes a routing process, I.e.
does routing. (Oh yea, also known as routing. Got to love those people in
Marketing.)
Layer 3 switching has many meanings and in many cases is just a marketing
term.
Layer 3 switching is a function of the network layer.
The Layer 3 header information is examined and the packet is forwarded
based on the IP address.
Memory buffering
switch
1111
3333
Abbreviate
d MAC
addresses
2222
4444
Cut-through
Cut-through
Fast-forwardOffers the lowest level of latency.
Fast-forward switching immediately forwards a packet after reading
the destination address.
There may be times when packets are relayed with errors.
Although this occurs infrequently and the destination network
adapter will discard the faulty packet upon receipt.
Cut-through
Cut-through
Fragment-freeFragment-free switching filters out collision fragments before
forwarding begins.
Collision fragments are the majority of packet errors.
In a properly functioning network, collision fragments must be smaller than
64 bytes.
Anything greater than 64 bytes is a valid packet and is usually received
without error.
Fragment-free switching waits until the packet is determined not to be a
collision fragment before forwarding.
Adaptive cut-through
In this mode, the switch uses cut-through until it detects
a given number of errors.
Once the error threshold is reached, the switch changes
to store-and-forward mode.
Broadcast domains
1 7 2 .3 0 .1 .2 1
2 5 5 .2 5 5 .2 5 5 .0
1 7 2 .3 0 .2 .1 0
2 5 5 .2 5 5 .2 5 5 .0
S w itc h 1
1 7 2 .3 0 .1 .2 3
2 5 5 .2 5 5 .2 5 5 .0
A ll S w itc h e d N e tw o r k - T w o N e tw o r k s
T w o S u b n e ts
S e v e r a l C o llis io n D o m a in s
O n e p e r s w it c h p o r t
O n e B r o a d c a s t D o m a in
S w itc h 2
1 7 2 .3 0 .2 .1 2
2 5 5 .2 5 5 .2 5 5 .0
1 7 2 .3 0 .1 .2 5
2 5 5 .2 5 5 .2 5 5 .0
1 7 2 .3 0 .2 .1 4
2 5 5 .2 5 5 .2 5 5 .0
1 7 2 .3 0 .2 .1 6
2 5 5 .2 5 5 .2 5 5 .0
1 7 2 .3 0 .1 .2 7
2 5 5 .2 5 5 .2 5 5 .0
Even though the LAN switch reduces the size of collision domains, all hosts connected to
the switch are still in the same broadcast domain.
Therefore, a broadcast from one node will still be seen by all the other nodes connected
through the LAN switch.
Ch. 7/ Mod. 6
Switch Configuration
CCNA 3 version 3.0
show running-config
show interface
show vlan
show flash
show version
The following steps will ensure that a new configuration will completely
overwrite any existing configuration:
Remove any existing VLAN information by deleting the VLAN database
file vlan.dat from the flash directory
Erase the back up configuration file startup-config
Reload the switch
A web browser can access this service using the IP address and port
80, the default port for http.
The HTTP service can be turned on or off, and the port address for the
service can be chosen.
Switches learn the MAC addresses of PCs or workstations that are connected
to their switch ports by examining the source address of frames that are
received on that port.
Machines may have been removed from a port, turned off, or moved to another
port on the same switch or a different switch.
This could cause confusion in frame forwarding.
The MAC address entry is automatically discarded or aged out after 300
seconds.
You can use the port security feature to restrict input to an interface by limiting and
identifying MAC addresses of the stations allowed to access the port.
When you assign secure MAC addresses to a secure port, the port does not forward
packets with source addresses outside the group of defined addresses.
If you limit the number of secure MAC addresses to one and assign a single secure MAC
address, the workstation attached to that port is assured the full bandwidth of the port.
If a port is configured as a secure port and the maximum number of secure MAC
addresses is reached, when the MAC address of a station attempting to access the port
is different from any of the identified secure MAC addresses, a security violation occurs.
Also, if a station with a secure MAC address configured or learned on one secure port
attempts to access another secure port, a violation is flagged.
A secure port can have from 1 to 132 associated secure addresses. After you have set
the maximum number of secure MAC addresses on a port, the secure addresses are
included in an address table in one of these ways:
1. You can configure all secure MAC addresses by using the switchport port-security
mac-address mac-address interface configuration command.
2. You can allow the port to dynamically configure secure MAC addresses with the
MAC addresses of connected devices.
3. You can configure a number of addresses and allow the rest to be dynamically
configured.
Once the maximum number of secure MAC addresses is configured, they are stored in
an address table.
Setting a maximum number of addresses to one and configuring the MAC address of an
attached device ensures that the device has the full bandwidth of the port.
2950 Configuration