You are on page 1of 116

What is CCNA? CCNA is a popular certification in computer networking developed by Cisco Systems.

Cisco created the CCNA to recognize basic competency in installation and support of medium-tolarge sized networks. Topics covered on the CCNA exam include

LAN and WAN design (including the OSI model) IP addressing routers and routing protocols (including OSPF, EIGRP and RIP) VLAN (virtual LAN) and WLAN (wireless LAN) network security and management (including ACLs)

What is computer network? Network is a collection of computers and devices interconnected by communications channels that facilitate communications and allow sharing of resources and information among interconnected devices.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Network elements:1. communication Device = pc, laptop, printer, scanner, mobile. 2. communication media = there are two types of communication media. a. wired == coaxial cable, twisted pair cable, fiber optic cable b. wireless == infrared, Bluetooth, radio waves, microwaves 3. connectivity device == hub, switch, route 4. common language == Tcp/IP protocol suite 5. device identification == A. physical address (mac (media access control) address) B. logical address (ip address) C. service address (port no.)

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Types of Cable:1. coaxial cable :- A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire. The shield minimizes electrical and radio frequency interference.

Types of coaxial cable:Cable type Ethernet network Speed Signal type Segment Length Standard Connector Terminator Thinnet coaxial cable 10 base 2 10 mbps Baseband 185 meter RG 58 BNC (British naval connector) 50 ohm Thicknet Coaxial cable 10 base 5 10 mbps Baseband 500 meter RG 8 AUI (attachment user interface) 50 ohm

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Twisted Pair Cable: - Twisted-pair cable consists eight wires that are twisted together in pairs. There are two types of Twisted pair cable :A. utp (unshielded twisted pair cable) B. stp (shielded twisted pair cable) A metallic shield is placed around the twisted pairs. Hence, the name shielded Twisted-pair (STP). More commonly, you see cable without outer shielding; its called unshielded twistedpair (UTP). UTP cable is rated in the following categories: A. Category 1 Two twisted wire pairs (four wires). Voice grade (not rated for data communications). upports signals limited to a frequency of 1MHz. B. Category 2 Four twisted wire pairs (eight wires). Suitable for up to 4Mbps, with a frequency Limitation of 10MHz. C. Category 3 Suitable for up to 10 Mbps, with a frequency Limitation of 16 MHz. D. Category 4 Suitable for up to 16 Mbps, with a frequency Limitation of 20 MHz E. Category 5 Suitable for up to 100 Mbps, with a frequency Limitation of 100 MHz F. Category 5e Suitable for up to 1000 Mbps, with a frequency Limitation of 100 MHz G. Category 6 Suitable for up to 1Gbps, with a frequency Limitation of 250 MHz Connector for Twisted pair cable: RJ 45 (registered jack 45)

Fiber-Optic Cable: - fiber-optic cable transmits digital signals using light impulses rather than electricity, it is immune to Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI). The cable itself comes in two different styles: single-mode fiber (SMF) multimode fiber (MMF). multimode fiber is used for shorter-distance applications and single-mode fiber for longer distances. It has pros and cons just as the other cable types. Here are the pros: CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Is completely immune to EMI or RFI Can transmit up to 40 kilometers (about 25 miles) Here are the cons of fiber-optic cable: Is difficult to install Requires a bigger investment in installation and materials Fiber-Optic Connectors: Fiber-optic cables can use different connectors, but the two most popular and recognizable are the straight tip (ST) and subscriber (or square) connector (SC) connectors.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Common Network Connectivity Devices: NIC (network interface card): - it is the expansion card you install in your computer to connect, or interface, your computer to the network. Hub: It is LAN or Same Network Connectivity Device. Hub operates layer 1 (physical) of OSI Model. It works in Half Duplex Mode. Means only two device can communicate at a time, one can send the data and another can receive the data. It divides the transmission speed. Because it uses broadcast to make communication. It is also called Multiport Repeater. Bridge: It is a network device that connects two similar network segments together. It operates Data link layer of OSI Model. And Creates software Based MAC address table. It works in full duplex mode. It has less number of Ports compare to switch. Switch: It is also LAN or Same network connectivity Device. Switch operates layer 2 (Data Link layer) of OSI model. It understands the Mac Address. And Forward the Frame According to Mac address. It works in full duplex mode. Means device can send and receive data simultaneously. It provides wired speed. It uses Hardware Chip ASIC (application specific integrated circuit) to create mac address table. It is also called multiport Bridge.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Router: It is different network connectivity device. It operates layer 3 (network layer ) of OSI model. It understands the IP address and creates Routing Table. Function of router:1. Packet switching 2. Packet filtering 3. path selection 4. internetwork communication

Note: - by default Hub, Bridge and Switch forward the Broadcast and Router break the broadcast.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Ethernet Networking: Ethernet is a contention media access method that allows all hosts on a network to share the same bandwidth of a link. Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD). CSMA/CD was created to overcome the problem of those Collisions that occur when packets are transmitted simultaneously from different nodes. Ethernet Cabling: - Three types of Ethernet cables are available: 1. Straight-through cable 2. Crossover cable 3. Rolled cable Straight-Through Cable: - The straight-through cable is used to connect dissimilar devices. Example: Host to switch or hub Router to switch or hub

Addressing in computer Network:- There are three types of address in computer network. 1. Physical address (hardware address /MAC address) 2. logical address (IP address) 3. Service address (Software port no.)

1. Physical address (hardware address /MAC address) : A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. It is 48 bit (12 digit), hexa decimal number which is used to identify any host in LAN or Same network. It Divides in 2 Part. First 24 bit for vendor id and last 24 bit for device serial no. Switch understands the MAC address and Creates Mac table. Example:- 1A-2B-34-54-2A-CD

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

2. logical address (IP address): It is 32 bit Binary Number which is used to identify any host in network. We represent this address in to decimal format. It has two portions. First portion is called network id and another is called host id. Router understands the IP address and creates Routing Table. Its table holds best path to reach destination. IP address is divided into four octets separated by dots (.). And every octet has value between 0-255. Example: -

IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. Currently there are two types of Internet Protocol (IP) addresses in active use: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was initially deployed on 1 January 1983 and is still the most commonly used version. IPv4 addresses are 32-bit numbers often expressed as 4 octets in "dotted decimal" notation (for example, 192.0.2.53). Deployment of the IPv6 protocol began in 1999. IPv6 addresses are 128-bit numbers and are conventionally expressed using hexadecimal strings (for example, 2001:0db8:582:ae33::29). Both IPv4 and IPv6 addresses are generally assigned in a hierarchical manner. Users are assigned IP addresses by Internet service providers (ISPs). ISPs obtain allocations of IP addresses from a local Internet registry (LIR) or National Internet Registry (NIR), or from their appropriate Regional Internet Registry (RIR):

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Registry AfriNIC APNIC ARIN

Area Covered Africa Region Asia/Pacific Region North America Region Latin America and some Caribbean LACNIC Islands Europe, the Middle East, and Central RIPE NCC Asia

3. Service address (Software port no.): It is 16 bit number , which is used identify a service. port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Well-known ports: 01023:- They are used by system processes that provide widely-used types of network services. Registered ports: 102449151: - They are assigned by IANA for specific service upon application by a requesting entity. Dynamic, private or ephemeral ports: 4915265535: - The range above the registered ports contains dynamic, or private, ports that cannot be registered with IANA. It is used for custom or temporary purposes. Port 7 20 21 23 25 53 79 80 88 110 119 161 179 Application Echo FTP-Data FTP-CMD Telnet SMTP DOMAIN Finger HTTP Kerberos POP3 NNTP SMTP BGP Description Echo File transfer data port File transfer command port Telnet remote login port Simple Mail Transfer Protocol port Domain Name Service Obtains information about active users Hypertext Transfer Protocol port Authentication Protocol PC Mail retrieval service port Network news access port Network Management Border Gateway Protocol

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

OSI Model: Open system interconnection. It developed by ISO (international standard organization or international organization for standardization) in 1977. First Network developed by IBM, and it operates only IBM devices. OSI model provides Common Platform for different Vendor to develop their devices. It divides network communication process into seven layers. And every layer has distinct function. 7 layers of OSI Model:-

Physical Layer: It layer 7 of OSI Model Data unit == Bits Devices == Hub, Repeater, NIC, Cable, Connector Working of Physical Layer: - It takes data from Data link layer in form of Frame. Then dived frame into byte and byte into bits. Responsibilities of Physical layer: 1. Transmission Media: - there are two types of transmission media. 1. Wired == coaxial cable, Twisted Pair Cable, Fiber Optic Cable 2. Wireless == infrared, Bluetooth, Radio waves, Microwaves 2. Transmission Mode: - There are three types of transmission Mode. 1. Simplex == One way communication. Ex:- FM radio 2. Half duplex == two way but not simultaneously. Ex.- walkie talkie, Wireless 3. Full duplex == Two way simultaneous Communication. Ex.mobile., pc to pc CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

3. Transmission Speed:- Transmission Speed depends on Physical layer, and we measure it in bits/seconds. Bits == 0, 1 Group of 4 bit == 1 Nibble Group of 8 Bit == 1 Byte == single character 1024 byte == 1 kB (kilo byte) 1024 kB == 1 MB (mega byte) 1024 MB = 1 GB (giga byte) 1024 GB = 1TB (Tera Byte) 1024 TB == 1 PB (Peta Byte) 1024 PB == 1 EB (exa Byte)

Data Link Layer: It is layer 2 of OSI model, Data Unit == Frames Devices == Switch , Bridge Protocol == PPP, HDLC , Frame Relay, ATM, VTP , STP Working of Data Link Layer: - It receives data from Network Layer in Form of Packet. Then attach Header and trailer on this Packet. Now packet becomes Frame. And its Header has information about Preamble, Destination MAC address, Source MAC address and Length, and its Trailer has FCS (Frame check sequence).

Preamble: - An alternating 1,0 pattern provides a 5MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream There are Two sub layer of Data link Layer:1. MAC (media Access Control) sub layer It has IEEE Standard 802.3 Defines how frames are placed on the media. Contention media access is first come/first served access where everyone shares the same bandwidth 2. LLC (Logical Link Control) Sub Layer It has IEEE standard 802.2 Responsible for identifying Network layer protocols and then encapsulating them. CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Responsibilities of Data Link Layer: Physical Addressing: - it attaches Physical address (destination and source Mac addresses) on data frame, this is called Physical Addressing. Flow control: - FCS code is used to Control flow of data. Network Layer: It is Layer 3 of OSI model. Data unit == Packets Devices == Router , Layer 3 Switch Protocol == there are two types of Protocol on network layer. 1. Routed Protocol: - it defines the method of Packet transmission. Ex. - IP, IPv6, IPX, AppleTalk. 2. Routing Protocol: - It selects the best path for Packet transmission. Ex.- RIP, IGRP, EIGRP, OSPF. Working of Network Layer: - It receives data from transport layer in form of segment. Then attach header on this segment, now segment becomes packet. Its header has information about IP version, TTL (time to live), Protocol, source ip address and

1. 2. 3.

destination ip address. Responsibilities of Network Layer: Logical Addressing: - it attaches logical address (ip address) information on data. This is called logical addressing. Path Selection: - Router operates on network. And router is used to select best path for packet transmission. Internetwork communication: - To make communication in two different network. CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Transport Layer: 1. It is layer 4 of OSI Model. 2. It provides end-to-end data transport services and can establish a logical connection between the sending host and destination host on an internetwork. 3. The Transport layer can be connectionless or connection-oriented. 4. Data Unit == Segment 5. Protocols == there are two protocols work on transport layer. o TCP (transmission control Protocol) = connection oriented o UDP (User Datagram Protocol) = connection less protocol 4. Working of Transport Layer: - It receives data from Upper layers (application, presentation, session), then divides this data into smaller unit called Segment. And attaches header on every segment. Its header has source port no. , destination port no. and sequence no. information.

5. Responsibilities of Transport Layer: 1. Service Addressing: - it attaches source port no. and destination port no. information on data, this is called service addressing. 2. Flow control: - Data integrity is ensured at the Transport layer by maintaining flow control. Flow control prevents a sending host on one side of the connection from overflowing the buffers in the receiving hostan event that can result in lost data. 3. Connection-Oriented Communication: - The transmitting device first establishes a connection-oriented session with its peer system, which is called a call setup or a three-way handshake. Data is then transferred; when the transfer is finished, a call termination takes place to tear down the virtual circuit.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

4. Windowing: - The quantity of data segments (measured in bytes) that the transmitting machine is allowed to send without receiving an acknowledgment for them is called a window.

5.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

The Session Layer: It is layer 5 of OSI model Data unit == data The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. The Session layer basically keeps different applications data separate from other applications data. This layer also provides dialog control between devices, or nodes. The Presentation Layer: It is layer 6 of OSI model. Data Unit == data It presents data to the Application layer and is responsible for data translation and code formatting. By providing translation services, the Presentation layer ensures that data transferred from the Application layer of one system can be read by the Application layer of another one. Data compression, decompression, encryption, and decryption are associated with this layer. The Application Layer: It is layer 7 of OSI model. Data Unit == data The Application layer of the OSI model marks the spot where users actually communicate to the computer. The Application layer is acting as an interface between the actual application programs. This means that Microsoft Word does not reside at the Application layer but instead interfaces with the Application layer protocols.

TCP/IP Model: The Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created by the Department of Defense (DoD) to ensure and preserve data integrity. its composed of four instead of seven, layers: 1. Process/Application layer 2. Host-to-Host layer 3. Internet layer 4. Network Access layer CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

The DoD and OSI models are alike in design and concept and have similar functions in similar layers.

1. The Process/Application Layer Protocols: The following protocols and applications are covered in this section: Telnet FTP TFTP CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

NFS SMTP LPD X Window SNMP DNS DHCP/BootP

Telnet: Port no. = 23, It uses TCP protocol to establish connection. Its specialty is terminal emulation. It allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server. File Transfer Protocol (FTP) Port no. = 21 (control), 20 (data) It uses TCP protocol to establish connection. File Transfer Protocol (FTP) is the protocol that actually lets us transfer files, and it can accomplish this between any two machines using it. FTP isnt just a protocol; its also a program. As a program, FTP allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones. Trivial File Transfer Protocol (TFTP) Port no. = 69 It uses UDP (user datagram protocol) protocol to establish connection. Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of FTP. TFTP has no directory-browsing abilities. it can do nothing but send and receive files. Theres no authentication as with FTP, so its insecure. Network File System (NFS) Port no. = 2049 It uses UDP (user datagram protocol) protocol to establish connection. Network File System (NFS) is a jewel of a protocol specializing in file sharing. It allows two different types of file systems to interoperate. It works like this: Suppose the NFS server software is running on an NT server and the NFS client software is running on a UNIX host.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Simple Mail Transfer Protocol (SMTP) Port no. = 25 It uses TCP protocol to establish connection. SMTP answering our ubiquitous call to email uses a spooled, or queued, method of mail delivery. SMTP is used to send mail; POP3 is used to receive mail. POP3 (Post office Protocol) Port no. = 109 (POP2), 110 (POP3) It uses TCP protocol to establish connection. SMTP is used to send mail; POP3 is used to receive mail. POP3 always downloads all new emails locally to your computer. With POP3, your emails can be automatically erased from the server after they are downloaded freeing up space in your account. IMAP (Internet Message Access Protocol) Port no. = 143 It uses TCP protocol to establish connection. It is also used to receive emails. IMAP downloads message summaries and doesn't download the entire message until you explicitly select it.. IMAP keeps all emails on the server until you erase them. HTTP (Hyper Text Transfer Protocol) Port no. = 80 (HTTP), 443 (HTTPS) It uses TCP and UDP protocols to establish connection. HTTP uses TCP, and HTTPS uses TCP and UDP both . It is the protocol used to convey information of World Wide Web (WWW). HTTP protocol is a stateless and connectionless protocol. Line Printer Daemon (LPD) Port no. = 515 It uses TCP protocol to establish connection. LPD protocol is designed for printer sharing. The LPD, along with The Line Printer (LPR) program, allows print jobs to be spooled and sent to the networks printers using TCP/IP.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

X Window Port no. = 6000 It uses TCP protocol to establish connection. X Window defines a protocol for writing client/server applications based on a graphical user interface (GUI). Simple Network Management Protocol (SNMP) Port no. = 161(SNMP), 162(SNMP TRAP) It uses udp protocol to establish connection. SNMP collects and manipulates valuable network information. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events. These network watchdogs are called agents; agents send an alert called a trap to the management station. Domain Name Service (DNS) Port no. = 53 It uses TCP and UDP both to establish connection. To resolve client query it uses UDP, and to synchronize Data between two DNS server, It uses TCP. Domain Name Service (DNS) resolves hostnames into IP address and IP address resolves into Hostname. Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP) Port no. = 68 (DHCP Client), 67 (DHCP Server) It uses udp protocol to establish connection. DHCP assigns IP addresses to hosts automatically. DHCP differs from BootP in that BootP assigns an IP address to a host but the hosts hardware address must be entered manually in a BootP table. That BootP is also used to send an operating system that a host can boot from. DHCP cant do that. list of the information a DHCP server can provide: 1. IP address 2. Subnet mask 3. Domain name 4. Default gateway (routers) 5. DNS 6. WINS information

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

2. The Host-to-Host Layer Protocols: This layer says to the upper layer, Just give me your data stream, with any instructions, and Ill begin the process of getting your information ready to send. The following sections describe the two protocols at this layer: 1. Transmission Control Protocol (TCP) 2. User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Protocol No. = 6 It is connection oriented Protocol. It uses three way Handshake methods to establish connection. It provides acknowledgement. It is reliable protocol for communication. UDP (User Datagram Protocol) Protocol No. = 17 It is connectionless Protocol. It does not use three way Handshake methods to establish connection. It does not support acknowledgement. It is unreliable protocol for communication.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

3. The Internet Layer Protocols: There are two main reasons for the Internet layers existence: routing and providing a single network interface to the upper layers. The following sections describe the protocols at the Internet layer: 1. Internet Protocol (IP) 2. Internet Control Message Protocol (ICMP) 3. Address Resolution Protocol (ARP) 4. Reverse Address Resolution Protocol (RARP) 5. Internet Protocol (IP) Internet Protocol (IP) essentially is the Internet layer. The other protocols found here merely exist to support it. IP looks at each packets address. Then, using a routing table, it decides where a packet is to be sent next, choosing the best path.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Internet Control Message Protocol (ICMP) ICMP is a management protocol and messaging service provider for IP. ICMP can provide hosts with information about network problems. The following are some common events and messages that ICMP relates to: Destination Unreachable: - If a router cant send an IP datagram any further, it uses ICMP to send a message back to the sender, advising it of the situation. Buffer Full: - If a routers memory buffer for receiving incoming datagrams is full, it will use ICMP to send out this message until the congestion abates. Ping: - Packet Internet Groper (Ping) uses ICMP echo request and reply messages to check the physical and logical connectivity of machines on an internetwork. Traceroute: - Using ICMP time-outs, Traceroute is used to discover the path a packet takes as it traverses an internetwork. Tracert: - Using ICMP time-outs, Traceroute is used to discover the path a packet takes as it traverses an internetwork. Windows supports tracert command instead of traceroute.

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) finds the hardware address of a host from a known IP address. RP resolves IP addresses to Ethernet (MAC) addresses.

Reverse Address Resolution Protocol (RARP) RARP resolves Ethernet (MAC) addresses to IP addresses. A designated machine, called a RARP server, responds with the answer and the identity crisis is over. CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

IP Addressing An IP address is a numeric identifier assigned to each machine on an IP network. IP addressing was designed to allow hosts on one network to communicate with a host on a different network. IP Terminology 1. Bit: -A bit is one digit, either a 1 or a 0. 2. Byte: -A byte is 7 or 8 bits, depending on whether parity is used. We always assume a byte is 8 bits. 3. Octet: - An octet, made up of 8 bits, is just an ordinary 8-bit binary number. 4. Network address: - This is the designation used in routing to send packets to a remote net-workfor example, 10.0.0.0, 172.16.0.0, and 192.168.10.0 5. Broadcast address: - The address used by applications and hosts to send information to all nodes on a network is called the broadcast address. Examples include 255.255.255.255, which is all networks, all nodes; 172.16.255.255. The Hierarchical IP Addressing Scheme An IP address consists of 32 bits of information. These bits are divided into four sections, referred to as octets or bytes, each containing 1 byte (8 bits). Every IP address has two portion: Network id + Host id = 32 Bit

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Reserved IP Addresses Network 127.0.0.1 :- Reserved for loopback tests. Designates the local node and allows that node to send a test packet to itself without generating network traffic. Node address of all 0s Interpreted to mean network address or any host on specified network. Node address of all 1s Interpreted to mean all nodes on the specified network; for example, 128.2.255.255 means all nodes on network 128.2 (Class B address). Entire IP address set to all 0s Used by Cisco routers to designate the default route. Could also mean any network. Entire IP address set to all 1s (same as 255.255.255.255) Broadcast to all nodes on the current network; sometimes called an all 1s broadcast or limited broadcast.

Class A Addresses Identification of Class A = First Octet value = (0- 127) No. of Network Bit = 8 , Fix bit = 1, No. networks in class A = 28-1= 27 = 128 No. of Host Bit= 24 Host/network = 224- 2 = 16777216 2 =16777214 host/network. Example:- 10.0.0.1, 123.12.1.23

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Class B Addresses Identification of Class B = First Octet value = (128 - 191) No. of Network Bit = 16 , Fix bit = 2, No. networks in class B = 216-2= 214 = 16384 networks No. of Host Bit= 16 Host/network = 216- 2 = 65636 2 = 65534 host/network. Example: - 129.0.0.1, 173.12.1.23 Class C Addresses Identification of Class C = First Octet value = (192 - 223) No. of Network Bit = 24 , Fix bit = 3, No. networks in class C = 224-3= 221= 2097152 networks No. of Host Bit= 8 Host/network = 28- 2 = 256 2 = 254 host/network. Example: - 197.0.0.1, 220.12.1.23 Private IP Addresses: These addresses can be used on a private network, but theyre not routable through the Internet. It is free.

Public IP address: Public IP Addresses (also known as Static IP Addresses) are IP addresses that are visible to the public. They allow other people to know about and access your computer, like a Web server. You have to pay for these IP addresses.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Subnetting Basics: In this method, we divide a large network into multiple small sub-networks. To create sub-networks, you take bits from the host portion of the IP address and reserve them to define the subnet address. how you get the answers to those big questions: 1. How many subnets? 2x = number of subnets. x is the number of masked bits, or the 1s. 2. How many hosts per subnet? 2y 2 = number of hosts per subnet. y is the number of unmasked bits, or the 0s. 3. What are the valid subnets? 256 subnet mask = block size, or increment number. An example would be 256 192 = 64. Subnet Masks A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID portion of the IP address. The 1s in the subnet mask represent the positions that refer to the network or subnet addresses.

Classless Inter-Domain Routing (CIDR): Its basically the method that ISPs (Internet service providers) use to allocate a number of addresses to a company, a homea customer. 192.168.10.32/28. This is telling you what your subnet mask is. The slash notation (/) means how many bits are turned on (1s). Class A default subnet mask, which is 255.0.0.0. This means that the first byte of the subnet mask is all ones (1s), or 11111111.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Subnetting Class C Addresses: CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Class C address, only 8 bits are available for defining the hosts. Remember that subnet bits start at the left and go to the right, without skipping bits.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Subnetting Class B Addresses Class B network address has 16 bits available for host addressing. This means we can use up to 14 bits for subnetting (because we have to leave at least 2 bits for host addressing). 255.255.0.0 (/16) 255.255.128.0 (/17) 255.255.255.0 (/24) 255.255.192.0 (/18) 255.255.255.128 (/25) 255.255.224.0 (/19) 255.255.255.192 (/26) 255.255.240.0 (/20) 255.255.255.224 (/27) 255.255.248.0 (/21) 255.255.255.240 (/28) 255.255.252.0 (/22) 255.255.255.248 (/29) 255.255.254.0 (/23) 255.255.255.252 (/30)

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Subnetting Class A Addresses Class A subnetting is not performed any differently than Classes B and C, but there are 24 bits to play with instead of the 16 in a Class B address and the 8 in a Class C address. Lets start by listing all the Class A masks: 255.0.0.0 (/8) 255.128.0.0 (/9) 255.255.240.0 (/20) 255.192.0.0 (/10) 255.255.248.0 (/21) 255.224.0.0 (/11) 255.255.252.0 (/22) 255.240.0.0 (/12) 255.255.254.0 (/23) 255.248.0.0 (/13) 255.255.255.0 (/24) 255.252.0.0 (/14) 255.255.255.128 (/25) 255.254.0.0 (/15) 255.255.255.192 (/26) 255.255.0.0 (/16) 255.255.255.224 (/27) 255.255.128.0 (/17) 255.255.255.240 (/28) 255.255.192.0 (/18) 255.255.255.248 (/29) 255.255.224.0 (/19) 255.255.255.252 (/30)

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Variable Length Subnet Masks (VLSMs): Take one network and create many networks using sub-net masks of different lengths on different types of network designs. This is called VLSM networking. You can use VLSM with routing protocols such as RIPv2, EIGRP, and OSPF.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Summarization: Summarization, also called route aggregation, allows routing protocols to advertise many networks. The purpose of this is to reduce the size of routing tables on routers to save memory as one address.

Troubleshooting IP Addressing: Packet InterNet Groper (ping) Uses ICMP echo request and replies to test if a node IP stack is initialized and alive on the network. traceroute Displays the list of routers on a path to a network destination by using TTL time-outs and ICMP error messages. This command will not work from a DOS prompt. tracert Same command as traceroute, but its a Microsoft Windows command and will not work on a Cisco router. arp -a Displays IP-to-MAC-address mappings on a Windows PC. show ip arp Same command as arp -a, but displays the ARP table on a Cisco router. Like the commands traceroute and tracert, they are not interchangeable through DOS and Cisco. ipconfig /all Used only from a DOS prompt, shows you the PC network configuration.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Routers Routers are specialized computers for networking services using hardware and software. The hardware includes a processor, memory, specialized chips, and a selection of interfaces or ports. The software provides an operating environment for the hardware.

Cisco Internetwork Operating System (IOS) The Cisco Internetwork Operating System (IOS) is the kernel of Cisco routers and most switches. a kernel is the basic, indispensable part of an operating system that allocates resources and manages things such as low-level hardware interfaces and security. The first IOS was written by William Yeager in 1986. Im going to show you how to configure a Cisco IOS router using the Cisco IOS command-line interface (CLI). These are some important things that the Cisco router IOS software is responsible for: 1. Carrying network protocols and functions 2. Connecting high-speed traffic between devices 3. Adding security to control access and stop unauthorized network use 4. Providing scalability for ease of network growth and redundancy 5. Supplying network reliability for connecting to network resources Note: - You can access the Cisco IOS through the console port of a router, from a modem into the auxiliary (or Aux) port, or even through Telnet.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Router Components Bootstrap stored in ROM microcode brings router up during initialisation, boots router and loads the IOS. POST Power On Self Test - stored in ROM microcode checks for basic functionality of router hardware and determines which interfaces are present ROM Monitor stored in ROM microcode used for manufacturing, testing and troubleshooting Mini-IOS a.k.a RXBOOT/boot loader by Cisco small IOS ROM used to bring up an interface and load a Cisco IOS into flash memory from a TFTP server; can also perform a few other maintenance operations RAM holds packet buffers, ARP cache, routing table, software and data structure that allows the router to function; running-config is stored in RAM, as well as the decompressed IOS in later router models ROM starts and maintains the router Flash memory holds the IOS; is not erased when the router is reloaded; is an EEPROM [Electrically Erasable Programmable Read-Only Memory] created by Intel, that can be erased and reprogrammed repeatedly through an application of higher than normal electric voltage

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

NVRAM Non-Volatile RAM - holds router configuration; is not erased when router is reloaded Config-Register controls how router boots; value can be seen with show version command; is typically 0x2102, which tells the router to load the IOS from flash memory and the startup-config file from NVRAM

System Startup POST loaded from ROM and runs diagnostics on all router hardware Bootstrap locates and loads the IOS image; default setting is to load the IOS from flash memory IOS locates and loads a valid configuration from NVRAM; file is called startupconfig; only exists if you copy the running-config to NVRAM startup-config if found, router loads it and runs embedded configuration; if not found, router enters setup mode

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Where is the Configuration? Router always has two configurations: Running configuration In RAM, determines how the router is currently operating Is modified using the configure command To see it: show running-config Startup confguration In NVRAM, determines how the router will operate after next reload Is modified using the copy command To see it: show startup-config Can also be stored in more permanent places: External hosts, using TFTP (Trivial File Transfer Protocol) In flash memory in the router Copy command is used to move it around copy run start copy run tftp copy start tftp copy tftp start copy flash start copy start flash External Configuration Sources Console Direct PC serial access Auxiliary port Modem access Virtual terminals Telnet/SSH access TFTP Server Copy configuration file into router RAM Network Management Software e.g. CiscoWorks Establishing a Console Session with HyperTerminal:Connect one end of the rollover cable to the Console port on the router and the other end to the PC COM port using a DB9 adapter. Step 1. Turn on the computer and router. Step 2. From the Windows taskbar, locate the HyperTerminal program (choose Start > Programs >Accessories > Communications > HyperTerminal). Bits per second = 9600 Data bits = 8 Parity = None Stop bits = 1 Flow control = None CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Router Prompts How to tell where you are on the router You can tell in which area of the routers configuration you are by looking at the router prompts: Router> USER prompt mode Router# PRIVILEGED EXEC prompt mode Router(config) terminal configuration prompt Router(config-if) interface configuration prompt Router(config-subif) sub-interface configuration prompt Router(config-route-map)# route-map configuration prompt Router(config-router)# router configuration prompt Router(config-line)# line configuration prompt rommon 1> - ROM Monitor mode

Data Terminal Equipment and Data Communication Equipment: By default, router interfaces are data terminal equipment (DTE), and they connect into data communication equipment (DCE) like a channel service unit/data service unit (CSU/DSU). The CSU/DSU then plugs into a demarcation location (demarc) and is the service providers last responsibility. The networks DCE device (CSU/DSU) provides clocking to the DTE-connected interface (the routers serial interface).

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

1. configure ip addressing on Bhopal router :Router>enable Router#config t Router(config)#hostname Bhopal Bhopal(config)#int s1/0 Bhopal(config-if)#ip add 11.0.0.1 255.0.0.0 Bhopal(config-if)#clock rate 64000 Bhopal(config-if)#no shut Bhopal(config-if)#exit Bhopal(config)#int f0/0 Bhopal(config-if)#ip add 192.168.1.1 255.255.255.0 Bhopal(config-if)#no shut Bhopal(config-if)#end Bhopal#copy run start 2. configure IP addressing on Indore router :Router>en Router#conf t Router(config)#hostname Indore Indore(config)#int s1/0 Indore(config-if)#ip address 11.0.0.2 255.0.0.0 Indore(config-if)#no shut CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Indore(config-if)#exit Indore(config)#int f0/0 Indore(config-if)#ip add 172.16.1.1 255.255.0.0 Indore(config-if)#no shut Indore(config-if)#end Indore#copy run start 3. configure Indore router as DHCP for network 172.16.0.0 :Indore#conf t Indore(config)#ip dhcp pool cisco Indore(dhcp-config)#network 172.16.0.0 255.255.0.0 Indore(dhcp-config)#default-router 172.16.1.1 Indore(dhcp-config)#dns-server 192.168.1.2 Indore(dhcp-config)#exit Indore(config)#ip dhcp excluded-address 172.16.0.1 172.16.1.1 Indore(config)#end Indore#copy run start

Router passwords:There are four types of router passwords 1. console password 2. enable password 3. telnet password 4. auxiliary password 1. console password :- it is ask when we want to configure router through the console port. bhopal>en bhopal#conf t bhopal(config)#line console 0 bhopal(config-line)#password india bhopal(config-line)#login bhopal(config-line)#end bhopal#copy run start 2. Enable password: - it is ask between user exec mode and privilege mode. And there are two types of enable password. a. Enable password: - it stores password in plain text. b. Enable secret: - it stores password in md5 encryption. bhopal>en CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

bhopal#conf t bhopal(config)#enable password cisco bhopal(config)#enable secret tendulkar bhopal(config)#end bhopal#copy run start Note:- if we configured both password enable and enable secret. Then router will ask only enable secret password. Command to remove router console and enable passwords:bhopal#conf t bhopal(config)#line console 0 bhopal(config-line)#no password bhopal(config-line)#exit bhopal(config)#no enable secret bhopal(config)#no enable password bhopal(config)#end bhopal#copy run start 3. Telnet password: - it is ask if want to configure router from remote location or through the telnet connection. To take router on telnet, router must have vty and enable password. Router has 5 virtual line (vty 0-4) for telnet session. bhopal>en bhopal#conf t bhopal(config)#line vty 0 4 bhopal(config-line)#password telnet bhopal(config-line)#login bhopal(config-line)#exit bhopal(config)#enable password cisco bhopal(config)#end bhopal#copy run start Command to remove telnet password: bhopal>en bhopal#conf t bhopal(config)#line vty 0 4 bhopal(config-line)#no password 4. auxiliary password: - it is ask when we want to configure router from remote location , by using modem or auxiliary port. bhopal#conf t CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

bhopal(config)#line aux 0 bhopal(config-line)# password rahul bhopal(config-line)#exit 5 command to encrypt router passwords: Router(config)#service password-encryption

================================================================== Router Basic commands :1. command to show information about routers hardware , software and configuration register value :Router>enable Router#show version 2. command to show ip configuration of router :Router#show ip interface brief or Router#show ip interface or Router#show ip interface s1/0 3. command show interface information in detail ;Router#show interfaces or Router#show interfaces s1/0 4. command to router date and time :Router#show clock Command to set date and time;Router#clock set 08:30:14 6 april 2011 5. command to show routers running configuration (database in DRAM):Router#show running-config Or Router#sh run CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

6. command to show routers startup configuration (database in NVRAM):Router#show startup-config or Router#sh start 7. command to save running configuration in to nvram :Router#copy running-config startup-config Or Router#copy run start 8. command to show routers routing table ;Router#show ip route 9. command to show previous command history :Router#show history Command to show history size :Router#show terminal Command to increase history size ;Router#terminal history size 50 Note: we can set size between 0-256. 10.command to assign ip address on router interface :Router>enable Router#config t Router(config)#interface f0/0 Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shutdown Router(config-if)#end Router#copy run start 11.commands to assign ip address on router serial DCE interface :Router#conf t Router(config)#int s1/0 Router(config-if)#ip add 11.0.0.1 255.0.0.0 Router(config-if)#clock rate 64000 Router(config-if)#no shutdown Router(config-if)#end Router#copy run start CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

12.configure banner or welcome message in router: bhopal#conf t bhopal(config)#banner motd @ welcome in router world. prohibited unathorized access. @ 13.configure description command to router interfaces:bhopal>en bhopal#conf t bhopal(config)#int s1/0 bhopal(config-if)#description "this port connect with indore router port s1/0" bhopal(config-if)#exit bhopal(config)#int f0/0 bhopal(config-if)#description "this port connect with lan switch" 14.commnd to remove ip address :bhopal(config)#int f0/0 bhopal(config-if)#no ip address 15.command to shutdown the port or disable the port :bhopal(config)#int f0/0 bhopal(config-if)#shutdown

Here are the main steps to password recovery: 1. Boot the router and interrupt the boot sequence by performing a break by pressing ctrl+break key , which will take the router into ROM monitor mode. 2. Change the configuration register to turn on bit 6 (with the value 0x2142). rommon>confreg 0x2142 3. Reload the router. Rommon>reset 4. Enter privileged mode. Router>en CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

5. Copy the startup-config file to running-config. Router#copy start run 6. Change the password. 7. Reset the configuration register to the default value. Router(config)#config-register 0x2102 8. Save the router configuration. Router#copy run start 9. Reload the router (optional). Router#reload

Routing: Routing or routeing is the process of selecting paths in a network along which to send network traffic. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes, typically hardware devices called routers, bridges, gateways, firewalls, or switches. types of routing :1. Static routing 2. Default routing 3. Dynamic routing CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Static Routing Static routing occurs when you manually add routes in each routers routing table. Static routing has the following benefits: 1. There is no overhead on the router CPU 2. There is no bandwidth usage between routers. 3. It adds security because the administrator can choose to allow routing access to certain networks only. syntax you use to add a static route to a routing table: ip route [destination_network] [mask] [next-hop_address or exitinterface] [administrative_distance] [permanent] Router(config)#ip route 172.16.3.0 255.255.255.0 192.168.2.4 Default Routing :We use default routing to send packets with a remote destination network not in the routing table.. You should only use default routing on stub networks those with only one exit path out of the network.

Gateway(config)#ip route 0.0.0.0 0.0.0.0 <next hop ip/ exit interface> Gateway(config)#ip route 0.0.0.0 0.0.0.0 217.124.6.1 Gateway(config)#ip route 0.0.0.0 0.0.0.0 s0/0

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Practical: -

1. 2. 3. 4.

configure above network with respective ip addressing. configure static routing. Remove static routing on Bhopal router. configure defalult routing on Bhopal routing.

1. configure ip addressing on Bhopal router :Router>en Router#conf t Router(config)#hostname bhopal bhopal(config)#int f0/0 bhopal(config-if)#ip add 192.168.1.1 255.255.255.0 bhopal(config-if)#no shut bhopal(config-if)#exit bhopal(config)#int s1/0 bhopal(config-if)#ip add 11.0.0.1 255.0.0.0 bhopal(config-if)#clock rate 64000 bhopal(config-if)#no shut bhopal(config-if)#end CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

bhopal#copy run start 2. configure ip addressing on Indore router :Router#conf t Router(config)#hostname indore indore(config)#int f0/0 indore(config-if)#ip add 172.16.1.1 255.255.0.0 indore(config-if)#no shut indore(config-if)#exit indore(config)#int s1/0 indore(config-if)#ip add 11.0.0.2 255.0.0.0 indore(config-if)#no shut indore(config-if)#exit indore(config-if)#int s1/1 indore(config-if)#ip add 12.0.0.1 255.0.0.0 indore(config-if)#clock rate 64000 indore(config-if)#no shut indore(config-if)#end indore#copy run start 3. configuring ip address on Raipure router :Router#conf t Router(config)#hostname raipur raipur(config)#int f0/0 raipur(config-if)#ip add 10.0.0.1 255.0.0.0 raipur(config-if)#no shut raipur(config-if)#exit raipur(config)#int s1/0 raipur(config-if)#ip add 12.0.0.2 255.0.0.0 raipur(config-if)#no shut raipur(config-if)#^Z raipur#copy run start 4. configure static routing on Bhopal router :bhopal(config)#ip route 172.16.0.0 255.255.0.0 11.0.0.2 bhopal(config)#ip route 12.0.0.0 255.0.0.0 11.0.0.2 bhopal(config)#ip route 10.0.0.0 255.0.0.0 11.0.0.2 bhopal(config)#end bhopal#copy run start

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

5. configure static routing on indore router :indore(config)#ip route 192.168.1.0 255.255.255.0 11.0.0.1 indore(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.2 indore(config)#do copy run start command to show routing table ;indore#sh ip router 6. configure static routing on raipur router ;raipur(config)#ip route 192.168.1.0 255.255.255.0 12.0.0.1 raipur(config)#ip route 172.16.0.0 255.255.0.0 12.0.0.1 raipur(config)#ip route 11.0.0.0 255.0.0.0 12.0.0.1 raipur(config)#do copy run start 7. command to remove static routing :bhopal#conf t bhopal(config)#no ip route 10.0.0.0 255.0.0.0 11.0.0.2 bhopal(config)#no ip route 12.0.0.0 255.0.0.0 11.0.0.2 bhopal(config)#no ip route 172.16.0.0 255.255.0.0 11.0.0.2 bhopal(config)#do copy run start 8. configure default routing on Bhopal router ;bhopal(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2 bhopal(config)#end bhopal#copy run start

Dynamic Routing: Dynamic routing is when protocols are used to find networks and update routing tables on routers.Two types of routing protocols are used in internetworks: 1. Interior gateway protocols (IGPs) 2. Exterior gateway protocols (EGPs).

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

There are three classes of routing protocols: Distance vector The distance-vector protocols find the best path to a remote network by judging distance. The vector indicates the direction to the remote network. Both RIP and IGRP are distancevector routing protocols. They send the entire routing table to directly connected neighbors. Link state Link state In link-state protocols, also called shortest-path-first protocol. OSPF is an IP routing protocol that is completely link state. Link-state protocols send updates containing the state of their own links to all other routers on the network. Hybrid Hybrid protocols use aspects of both distance vector and link state. for example, EIGRP.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Administrative Distances The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router. An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route. Route Source Connected interface Static route EIGRP IGRP OSPF RIP External EIGRP Unknown Default AD 0 1 90 100 110 120 170 255 (this route will never be used)

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Routing Information Protocol (RIP) Distance-vector routing protocol. Administrative distance (120). RIP sends the complete routing table out to all active interfaces every 30 seconds. RIP only uses hop count to determine the best path. It has a maximum allowable hop count of 15 by default. RIP version 1 uses only classful routing. This is because RIP version 1 doesnt send updates with subnet mask information. RIPv2 is considered classless because subnet information is sent with each route update. RIPv1 sends broadcasts every 30 seconds and has an AD of 120. RIPv2 sends multicasts (224.0.0.9) every 30 seconds and also has an AD of 120. RIPv2 sends subnet mask information with the route updates, which allows it to support It Supports Load balancing on 4 equal paths. (by default). RIP works on Bellman Ford algorithm. RIPv1 RIPv2 Maximum hop count of 15 Maximum hop counts of 15 Classfull Classless Broadcast based Uses multicast 224.0.0.9 No support for VLSM Supports VLSM networks No authentication Allows for MD5 authentication Syntex :Corp#config t Corp(config)#router rip Corp(config-router)#version <1/2> Corp(config-router)#network <directly connected networks> Routing Loops Distance-vector routing protocols keep track of any changes to the internetwork by broadcasting periodic routing updates out all active interfaces.

Loop Avoidance Methods:1. Maximum Hop Count. 2. Split Horizon 3. Route Poisoning 4. Holddowns CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Maximum Hop Count The routing loop problem just described is called counting to infinity, One way of solving this problem is to define a maximum hop count. RIP permits a hop count of up to 15, so anything that requires 16 hops is deemed unreachable. Split Horizon the routing protocol differentiates which interface a network route was learned on, and once this is determined, it wont advertise the route back out that same interface. Route Poisoning when Network goes down, Router initiates route poisoning by advertising Network as 16, or unreachable. Holddowns A holddown prevents regular update messages from reinstating a route that is going up and down (called flapping). RIP Timers:Route update timer Sets the interval (typically 30 seconds) between periodic routing updates in which the router sends a complete copy of its routing table out to all neighbors. Route invalid timer Determines the length of time that must elapse (180 seconds) before a router determines that a route has become invalid. Holddown timer Routes will enter into the holddown state when an update packet is received that indicated the route is unreachable. This continues either until an update packet is received with a better metric or until the holddown timer expires. The default is 180 seconds. Route flush timer Sets the time between a route becoming invalid and its removal from the routing table (240 seconds).

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Practical: -

configure rip routing on Bhopal router :bhopal(config)#router rip bhopal(config-router)#network 11.0.0.0 bhopal(config-router)#network 192.168.1.0 configure rip routing on indore router :indore(config)#router rip indore(config-router)#network 11.0.0.0 indore(config-router)#network 12.0.0.0 indore(config-router)#network 172.16.0.0 indore(config-router)#end indore#copy run start configure rip routing on Raipur router :raipur(config)#router rip raipur(config-router)#network 10.0.0.0 raipur(config-router)#network 12.0.0.0 raipur(config-router)#end raipur#copy run start command to show information of sending and receiving of routing update :bhopal#debug ip rip CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

command to stop debugging :Bhopal#undebug all command to show information of routing protocol :bhopal#sh ip protocols command to configure passive interface :Passive interface :- if we configure router interface as passive interface it receive routing update but does not send routing update. bhopal(config)#router rip bhopal(config-router)#passive-interface s1/0 bhopal(config-router)#end bhopal#copy run start command to clear routing updates :indore#clear ip route * indore#clear ip route 192.168.1.0 command to change rip tiemers (route update timer = 60 , route invalid timer = 80, route holddown = 90, route flush= 100) bhopal#conf t. bhopal(config)#router rip bhopal(config-router)#timers basic 60 80 90 100 command to change administrative distance of rip :bhopal#conf t bhopal(config)#router rip bhopal(config-router)#distance 50 command to change rip version :bhopal(config)#router rip bhopal(config-router)#version 2

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Interior Gateway Routing Protocol (IGRP) IGRP is a Cisco-proprietary distance-vector routing protocol. IGRP has a maximum hop count of 255 with the default being 100 (same as EIGRP). IGRP uses bandwidth and delay of the line by default as a metric for determining the best route to an internetwork. This is called a composite metric. The main difference between RIP and IGRP configuration is that when you configure IGRP, you supply the autonomous system number. All routers must use the same number in order to share routing table information. Syntax :R3#config t R3(config)#router igrp <autonomous system no.> R3(config-router)#network <directly connected network address> Note:Cisco no longer supports IGRP.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Enhanced Interior Gateway Routing Protocol (EIGRP) EIGRP) is a proprietary Cisco protocol that runs on Cisco routers. Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is sometimes referred to as a hybrid routing protocol because it has characteristics of both distance-vector and link-state protocols. EIGRP has a maximum hop count of 255 (the default is set to 100). it provides routing support for multiple Network layer protocols: IP, IPX, AppleTalk, and now IPv6. Considered classless (same as RIPv2 and OSPF) Support for VLSM/CIDR Support for summaries and discontiguous networks Communication via Reliable Transport Protocol (RTP) Best path selection via Diffusing Update Algorithm (DUAL) Neighbor Discovery There are three conditions that must be met for neighborship establishment: 1. Hello or ACK received 2. AS numbers match 3. Identical metrics (K values) Reliable Transport Protocol (RTP) EIGRP uses a proprietary protocol called Reliable Transport Protocol (RTP) to manage the communication of messages between EIGRP-speaking routers. EIGRP sends multicast traffic, it uses the Class D address 224.0.0.10 If EIGRP doesnt get a reply from a neighbor, it will switch to using unicasts to resend the same data. If it still doesnt get a reply after 16 unicast attempts, the neighbor is declared dead. EIGRP Metrics 1. Bandwidth 2. Delay 3. Load 4. Reliability Like IGRP, EIGRP uses only bandwidth and delay of the line to determine the best path to a remote network by default EIGRP creates three tables :Neighborship table The neighborship table (usually referred to as the neighbor table) records information about routers with whom neighborship relationships have been formed. Topology table The topology table stores the route advertisements about every route in the internetwork received from each neighbor. CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Route table The route table stores the routes that are currently used to make routing decisions. There would be separate copies of each of these tables for each protocol that is actively being supported by EIGRP, whether its IP or IPv6.

Define some terms Feasible distance This is the best metric along all paths to a remote network, including the metric to the neighbor that is advertising that remote network. Reported/advertised distance This is the metric of a remote network, as reported by a neighbor. Neighbor table Each router keeps state information about adjacent neighbors. Topology table It contains all destinations advertised by neighboring routers, holding each destination address and a list of neighbors that have advertised the destination. Feasible successor A feasible successor is a path whose reported distance is less than the feasible distance, and it is considered a backup route. EIGRP will keep up to six feasible successors in the topology table. Only the one with the best metric (the successor) is copied and placed in the routing table. Successor A successor route (think successful!) is the best route to a remote network.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Configuring EIGRP Router#config t Router(config)#router eigrp <1-65535> Router(config-router)#network <directly connected network>

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

1. configure ip addressing on router 1 :Router>enable Router#conf t Router(config)#hostname R1 R1(config)#int s1/0 R1(config-if)#ip add 11.0.0.1 255.0.0.0 R1(config-if)#no shut R1(config-if)#clock rate 64000 R1(config-if)#bandwidth 128 R1(config-if)#exit R1(config)#int f0/0 R1(config-if)#ip add 192.168.1.1 255.255.255.0 R1(config-if)#no shut R1(config-if)#int s1/0 R1(config-if)#int s1/1 CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

R1(config-if)#ip add 14.0.0.1 255.0.0.0 R1(config-if)#no shut R1(config-if)#clock rate 64000 R1(config-if)#bandwidth 128 R1(config)#end R1#copy run start 2. configure ip addressing on router 2 :Router>enable Router#conf t Router(config)#hostname R2 R2(config)#int s1/0 R2(config-if)#ip add 11.0.0.2 255.0.0.0 R2(config-if)#no shut R2(config-if)#bandwidth 128 R2(config-if)#int s1/1 R2(config-if)#ip add 12.0.0.1 255.0.0.0 R2(config-if)#no shut R2(config-if)#clock rate 64000 R2(config-if)#bandwidth 128 R2(config-if)#end R2#copy run start 3. configure ip addressing on router 3 :Router>en Router#conf t Router(config)#hostname R3 R3(config)#int s1/0 R3(config-if)#ip add 12.0.0.2 255.0.0.0 R3(config-if)#bandwidth 128 R3(config-if)#no shut R3(config-if)#int s1/1 R3(config-if)#ip add 13.0.0.1 255.0.0.0 R3(config-if)#no shut R3(config-if)#clock rate 64000 R3(config-if)#bandwidth 128 R3(config-if)#exit R3(config-if)#end R3#copy run start

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

4. configure ip addressing on router 4 :Router>en Router#conf t Router(config)#hostname R4 R4(config)#int s1/0 R4(config-if)#ip add 14.0.0.2 255.0.0.0 R4(config-if)#no shut R4(config-if)#bandwidth 128 R4(config-if)#int s1/1 R4(config-if)#ip add 15.0.0.1 255.0.0.0 R4(config-if)#clock rate 64000 R4(config-if)#bandwidth 64 R4(config-if)#no shut R4(config-if)#end R4#copy run start 5. configure ip addressing on router 5 :Router>enable Router#conf t Router(config)#hostname R5 R5(config)#int s1/0 R5(config-if)#ip add 13.0.0.2 255.0.0.0 R5(config-if)#no shut R5(config-if)#bandwidth 128 R5(config-if)#exit R5(config)#int s1/1 R5(config-if)#ip add 15.0.0.2 255.0.0.0 R5(config-if)#bandwidth 64 R5(config-if)#no shut R5(config-if)#int f0/0= R5(config-if)#ip add 172.16.1.1 255.255.0.0 R5(config-if)#no shut R5(config-if)#end R5#copy run start

6. configuring EIGRP routing :R1(config)#router eigrp 10 R1(config-router)#network 11.0.0.0 R1(config-router)#network 14.0.0.0 R1(config-router)#network 192.168.1.0 CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

R1(config-router)#end R1#copy run start R2(config)#router eigrp 10 R2(config-router)#network 11.0.0.0 R2(config-router)#network 12.0.0.0 R2(config-router)#end R2#copy run start

R3(config)#router eigrp 10 R3(config-router)#network 12.0.0.0 R3(config-router)#network 13.0.0.0 R3(config-router)#end R3#copy run start R4(config)#router eigrp 10 R4(config-router)#network 14.0.0.0 R4(config-router)#network 15.0.0.0 R4(config-router)#end R4#copy run start R5(config)#router eigrp 10 R5(config-router)#network 13.0.0.0 R5(config-router)#network 15.0.0.0 R5(config-router)#network 172.16.0.0 R5(config-router)#end R5#copy run start

Maximum Paths and Hop Count By default, EIGRP can provide equal-cost load balancing of up to four links. you can have EIGRP actually load-balance across up to six links (equal or unequal) by using the following command: Pod1R1(config)#router eigrp 10 Pod1R1(config-router)#maximum-paths <1-6> EIGRP has a maximum hop count of 100, but it can be set up to 255. Pod1R1(config)#router eigrp 10 Pod1R1(config-router)#metric maximum-hops <1-255> CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

EIGRP Troubleshooting Commands

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Open Shortest Path First (OSPF) 1. (OSPF) is an open standard routing protocol. 2. OSPF works by using the Dijkstra algorithm. 3. it supports multiple, equal-cost routes to the same destination. Like EIGRP, it does support both IP and IPv6 routed protocols. 4. Consists of areas and autonomous systems 5. Minimizes routing update traffic 6. Allows scalability 7. Supports VLSM/CIDR 8. Has unlimited hop count 9. Allows multi-vendor deployment (open standard). OSPF uses a metric referred to as cost. Cisco uses a simple equation of COST =100000000/bandwidth in bps. And least cost path is best path for ospf. This value may be overridden by using the ip ospf cost command. Characteristic OSPF RIPv2 Type of protocol Link state Distance vector Classless support Yes Yes VLSM support Yes Yes Auto-summarization No Yes Manual summarization Yes No Discontinuous support Yes Yes Route propagation Multicast on change Periodic multicast metric Bandwidth Hops Hop count limit None 15 Convergence Fast Slow Peer authentication Yes Yes Hierarchical network Yes (using areas) No (flat only) Updates Event triggered Route table updates Route computation Dijkstra Bellman-Ford RIPv1 Distance vector No No Yes No No Periodic broadcast Path Hops 15 Slow No No (flat only) Route table updates Bellman-Ford

OSPF areas OSPF is supposed to be designed in a hierarchical fashion, which basically means that you can separate the larger internetwork into smaller internetworks called areas. The following are reasons for creating OSPF in a hierarchical design: To decrease routing overhead To speed up convergence To confine network instability to single areas of the network An OSPF area is a grouping of contiguous networks and routers. All routers in the same area share a common Area ID. CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

OSPF Terminology Link A link is a network or router interface assigned to any given network. Router ID The Router ID (RID) is an IP address used to identify the router. Cisco chooses the Router ID by using the highest IP address of all configured loopback interfaces. If no loopback interfaces are configured with addresses, OSPF will choose the highest IP address of all active physical interfaces. Neighbor Neighbors are two or more routers that have an interface on a common network, such as two routers connected on a point-to-point serial link. Adjacency An adjacency is a relationship between two OSPF routers that permits the direct exchange of route updates. Hello protocol The OSPF Hello protocol provides dynamic neighbor discovery and maintains neighbor relationships. Hello packets are addressed to 224.0.0.5. Neighborship database The neighborship database is a list of all OSPF routers for which Hello packets have been seen. Topological database The topological database contains information from all of the Link State Advertisement packets that have been received for an area. Link State Advertisement A Link State Advertisement (LSA) is an OSPF data packet containing link-state and routing information thats shared among OSPF routers. Designated router A Designated Router (DR) is elected whenever OSPF routers are connected to the same multi-access network. DR is chosen (elected) to disseminate/receive routing information to/from the remaining routers on the broadcast network or link.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Backup designated router A Backup Designated Router (BDR) is a hot standby for the DR on multi-access links. BDR receives all routing updates from OSPF adjacent routers but doesnt flood LSA updates.

Configuring OSPF Enabling OSPF Lab_A(config)#router ospf <1-65535> A value in the range 165,535 identifies the OSPF Process ID. The OSPF Process ID is needed to identify a unique instance of an OSPF database and is locally significant. R1#config t R1(config)#router ospf 1 R1(config-router)#network <directly connected n/w> <wildcard mask> area <no. > The areas can be any number from 0 to 4.2 billion. Dont get these numbers confused with the Process ID, which is from 1 to 65,535.

Lab_A#config t Lab_A(config)#router ospf 1 Lab_A(config-router)#network 192.168.10.64 0.0.0.7 area 0 Lab_A(config-router)#network 10.255.255.80 0.0.0.3 area 0

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Lab_B#config t Lab_B(config)#router ospf 1 Lab_B(config-router)#network 192.168.10.48 0.0.0.7 area 0 Lab_B(config-router)#network 10.255.255.80 0.0.0.3 area 0 Lab_B(config-router)#network 10.255.255.8 0.0.0.3 area 0

Lab_C#config t Lab_C(config)#router ospf 1 Lab_C(config-router)#network 192.168.10.16 0.0.0.7 area 0 Lab_C(config-router)#network 10.255.255.8 0.0.0.3 area 0 Verifying OSPF Configuration Corp#sh ip ospf This command provides information about the Router ID, area information, SPF statistics, and LSA timer information. Corp#sh ip ospf database This command will give you information about the number of routers in the internetwork (AS) plus the neighboring routers ID. Corp#sh ip ospf interface f0/1 The following information is displayed by this command:  Interface IP address  Area assignment  Process ID  Router ID  Network type  Cost  Priority  DR/BDR election information (if applicable)  Hello and Dead timer intervals  Adjacent neighbor information Corp#sh ip ospf neighbor Corp#sh ip protocols

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Broadcast (multi-access) Broadcast (multi-access) networks such as Ethernet allow multiple devices to connect to (or access) the same network as well as provide a broadcast ability in which a single packet is delivered to all nodes on the network. Non-broadcast multi-access Non-broadcast multi-access (NBMA) networks are types such as Frame Relay, X.25, and Asynchronous Transfer Mode (ATM). These networks allow for multi-access but have no broadcast ability like Ethernet. Point-to-point Point-to-point refers to a type of network topology consisting of a direct connection between two routers that provides a single communication path. Point-to-multipoint Point-to-multipoint refers to a type of network topology consisting of a series of connections between a single interface on one router and multiple destination routers.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

ACCESS-LIST: An access list is essentially a list of conditions that categorize packets. Router can filter the packets according to this list. There are two main types of access lists: 1. Standard Access-List 2. Extended Access-List Standard Access-List: It has numeric identification from 1-99, 1300-1999 (expanded range). These use only the source IP address in an IP packet as the condition test. This means that standard access lists basically permit or deny an entire suite of protocols. They dont distinguish between any of the many types of IP traffic such as web, Telnet, UDP, and so on. Extended Access-List: It has numeric identification from 100-199, 2000-2699 (expanded range). They can evaluate source and destination IP addresses, the protocol field in the Network layer header, and the port number at the Transport layer header. Access lists for inbound and outbound traffic on a single interface: Inbound access lists: - When an access list is applied to inbound packets on an interface, those packets are processed through the access list before being routed to the outbound interface. Outbound access lists: - When an access list is applied to outbound packets on an interface, those packets are routed to the outbound interface and then processed through the access list before being queued. Note: - You can assign only one access list per interface per protocol per direction. This means that when creating IP access lists, you can have only one inbound access list and one outbound access list per interface. Wildcard Masking: Wildcards are used with access lists to specify an individual host, a network, or a certain range of a network or networks. Wildcard Is opposite of subnet mask. To specify a host, the address would look like this: 172.16.30.5 0.0.0.0 how a /24 subnet is specified with a wildcard: 172.16.30.0 0.0.0.255

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

1. configure ip addressing on router 1 ;Router>en Router#conf t Router(config)#hostname R1 R1(config)#int s1/0 R1(config-if)#ip add 11.0.0.1 255.0.0.0 R1(config-if)#clock rate 64000 R1(config-if)#no shut R1(config-if)#int f0/0 R1(config-if)#ip add 10.0.0.1 255.0.0.0 R1(config-if)#no shut R1(config-if)#int f0/1 R1(config-if)#ip add 192.168.1.1 255.255.255.0 R1(config-if)#no shut R1(config-if)#end R1#copy run start 2. configure ip addressing on router 2 :Router>en Router#conf t Router(config)#hostname R2 R2(config)#int s1/0 R2(config-if)#ip add 11.0.0.2 255.0.0.0 CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

R2(config-if)#no shut R2(config-if)#int f0/0 R2(config-if)#ip add 172.16.1.1 255.255.0.0 R2(config-if)#no shut R2(config-if)#end R2#copy run start 3. configure eigrp routing :R1#conf t R1(config)#router eigrp 11 R1(config-router)#network 10.0.0.0 R1(config-router)#network 11.0.0.0 R1(config-router)#network 192.168.1.0 R1(config-router)#do copy run start R2#conf t R2(config)#router eigrp 11 R2(config-router)#network 172.16.0.0 R2(config-router)#network 11.0.0.0 R2(config-router)#do copy run start 4. configure standard access-list 10 on router 1, pc 172.16.1.2 should not communicate with network 10.0.0.0 :R1>en R1#conf t. R1(config)#access-list 10 deny 172.16.1.2 0.0.0.0 R1(config)#access-list 10 permit any R1(config)#int f0/0 R1(config-if)#ip access-group 10 out R1(config-if)#do copy run start 5. command to show access-list :R1#sh access-list

6. command to delete access-list :R1#conf t. R1(config)#no access-list 10 R1(config)#int f0/0 R1(config-if)#no ip access-group 10 out R1(config-if)#do copy run start CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

7. configure standard access-list 11 on router 1 , network 172.16.0.0 should not access network 10.0.0.0 :R1>en R1#conf t. R1(config)#access-list 11 deny 172.16.0.0 0.0.255.255 R1(config)#access-list 11 permit any R1(config)#int f0/0 R1(config-if)#ip access-group 11 out R1(config-if)#do copy run start 8. configure access-list 12, on router 1, pc range 172.16.1.1- 172.16.1.50 should not access network 10.0.0.0 :R1#conf t R1(config)#access-list 12 permit host 172.16.1.51 R1(config)#access-list 12 deny 172.16.1.0 0.0.0.31 R1(config)#access-list 12 deny 172.16.1.32 0.0.0.15 R1(config)#access-list 12 deny 172.16.1.48 0.0.0.3 R1(config)#access-list 12 permit any R1(config)#int f0/0 R1(config-if)#ip access-group 12 out R1(config-if)#do copy run start 9. configure extended access-list 101 on router 1, pc 172.16.1.2 should not communicate with pc 192.168.1.3 :R1#conf t R1(config)#access-list 101 deny ip 172.16.1.2 0.0.0.0 192.168.1.3 0.0.0.0 R1(config)#access-list 101 permit ip any any R1(config)#int s1/0 R1(config-if)#ip access-group 101 in R1(config-if)#do copy run start

10.configure extended access-list on router 1, pc 172.16.1.2 should not access website of webserver 192.168.1.2 ;R1(config)#access-list 102 deny tcp host 172.16.1.2 host 192.168.1.2 eq 80 R1(config)#access-list 102 permit ip any any R1(config)#int f0/1 R1(config-if)#ip access-group 102 out R1(config-if)#do copy run start CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

11.configure extended access-list 105 on router 1, host range {172.16.1.1-172.16.1.99 } should not communicate with host range 192.168.1.1-192.168.1.51 } :R1(config)#access-list 105 deny ip 172.16.1.0 0.0.0.63 192.168.1.0 0.0.0.31 R1(config)#access-list 105 deny ip 172.16.1.0 0.0.0.63 192.168.1.32 0.0.0.15 R1(config)#access-list 105 deny ip 172.16.1.0 0.0.0.63 192.168.1.48 0.0.0.3 R1(config)#access-list 105 deny ip 172.16.1.64 0.0.0.31 192.168.1.0 0.0.0.31 R1(config)#access-list 105 deny ip 172.16.1.64 0.0.0.31 192.168.1.32 0.0.0.15 R1(config)#access-list 105 deny ip 172.16.1.64 0.0.0.31 192.168.1.48 0.0.0.3 R1(config)#access-list 105 deny ip 172.16.1.96 0.0.0.3 192.168.1.0 0.0.0.31 R1(config)#access-list 105 deny ip 172.16.1.96 0.0.0.3 192.168.1.32 0.0.0.15 R1(config)#access-list 105 deny ip 172.16.1.96 0.0.0.3 192.168.1.48 0.0.0.3 R1(config)#access-list 105 permit ip any any R1(config)#int s1/0 R1(config-if)#ip access-group 105 in R1(config-if)#do copy run start

==== name access-list :1. configure name standard access-list rocky , pc 172.16.1.2 should not access network 10.0.0.0 R1(config)#ip access-list standard rocky R1(config-std-nacl)#deny 172.16.1.2 0.0.0.0 R1(config-std-nacl)#permit any R1(config-std-nacl)#exit R1(config)#int f0/0 R1(config-if)#ip access-group rocky out R1(config-if)#do copy run start 2. configure name extended access-list kalsi , pc 172.16.1.3 should not communicate with pc 192.168.1.2 :R1(config)#ip access-list extended kalsi R1(config-ext-nacl)#deny ip 172.16.1.3 0.0.0.0 host 192.168.1.2 R1(config-ext-nacl)#permit ip any any R1(config-ext-nacl)#int s1/0 R1(config-if)#ip access-group kalsi in R1(config-if)#do copy run start

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Layer 2 Switching and Spanning Tree Protocol (STP) Switching Services Switches use application specific integrated circuits (ASICs) to build and maintain their filter tables. Layer 2 switches and bridges are faster than routers because they dont take up time looking at the Network layer header information. Instead, they look at the frames hardware addresses before deciding to either forward, flood or drop the frame. Layer 2 switching provides the following: 1. Hardware-based bridging (ASIC) 2. Wire speed 3. Low latency 4. Low cost Bridging vs. LAN Switching Bridges are software based, while switches are hardware based because they use ASIC chips to help make filtering decisions. A switch can be viewed as a multiport bridge. Switches have a higher number of ports than most bridges. Both bridges and switches forward layer 2 broadcasts. Bridges and switches learn MAC addresses by examining the source address of each frame received. Both bridges and switches make forwarding decisions based on layer 2 addresses. Three Switch Functions at Layer 2 Address learning Layer 2 switches and bridges remember the source hardware address of each frame received on an interface, and they enter this information into a MAC database called a forward/filter table. Forward/filter decisions When a frame is received on an interface, the switch looks at the destination hardware address and finds the exit interface in the MAC database. The frame is only forwarded out the specified destination port. Loop avoidance if multiple connections between switches are created for redundancy purposes, network loops can occur. Spanning Tree Protocol (STP) is used to stop network loops while still permitting redundancy.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Address Learning

Let me give you an example of how a forward/filter table is populated: 1. Host A sends a frame to Host B. Host As MAC address is 0000.8c01.000A; Host Bs MAC address is 0000.8c01.000B. 2. The switch receives the frame on the E0/0 interface and places the source address in the MAC address table. 3. Since the destination address is not in the MAC database, the frame is forwarded out all Interfaces except the source port. 4. Host B receives the frame and responds to Host A. The switch receives this frame on Interface E0/1 and places the source hardware address in the MAC database. 5. Host A and Host B can now make a point-to-point connection and only the two devices will receive the frames. Hosts C and D will not see the frames, nor are their MAC addresses Found in the database because they havent yet sent a frame to the switch.

Forward/Filter Decisions When a frame arrives at a switch interface, the destination hardware address is compared to the forward/filter MAC database. if the destination hardware address is not listed in the MAC database, then the frame is flooded out all active interfaces except the interface the frame was received on.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Port Security: If you want to set up a switch port to allow only one host per port, and to shut down the port if this rule is violated, use the following commands: Switch#config t Switch(config)#int f0/1 Switch(config-if)#switchport mode access Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security maximum 1 Switch(config-if)#switchport port-security violation shutdown

1. command to show mac-address table ;Switch#sh mac-address-table 2. configure swithcport security on port f0/1, only connected pc can connect with this port :Switch(config)#int f0/1 Switch(config-if)#switchport mode access Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security mac-address 00d0.d3bc.bd45 Switch(config-if)#switchport port-security violation shutdown Switch(config-if)#do copy run start 3. command to show switch port security :Switch#sh port-security interface f0/1 4. command to remove swithchport security :Switch(config)#int f0/1 Switch(config-if)#no switchport port-security Switch(config-if)#do copy run start 5. configure switchport security on swith, only conneceted pc can connect with switch :Switch(config)#int range f0/1 -f0/24 Switch(config-if-range)#switchport mode access Switch(config-if-range)#switchport port-security Switch(config-if-range)#switchport port-security mac-address sticky Switch(config-if-range)#switchport port-security maximum 1 Switch(config-if-range)#switchport port-security violation shutdown Switch(config-if-range)#do copy run start CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Spanning Tree Protocols: -

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Rapid Spanning Tree Protocol (RSTP) 802.1w Cisco created PortFast, UplinkFast, and BackboneFast to fix the holes and liabilities the IEEE 802.1d standard presented. The drawbacks to these enhancements are only that they are Cisco proprietary and need additional configuration. But the new 802.1w standard (RSTP) addresses all these issues in one tight packagejust turn on RSTP and youre good to go. Core(config)#spanning-tree mode rapid-pvst

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

VLAN (Virtual Local Area Network) VLAN is used to create multiple broadcast domains in switched network. By defaults all switch ports are member of VLAN 1. So we start creation of VLAN from VLAN 2. How do we break up broadcast domains in a pure switched internetwork? By creating a virtual local area network (VLAN). A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switch.

Creating VLAN: Switch(config)#vlan <no.> Switch(config)#name <name>

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

VLAN WITH EIGRP ROUTING

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

1. Create and configure VLAN on switch 1. 2. Configure Router 1 as Dhcp server and communicate different vlan with the help router. 3. Configure EIGRP Routing with autonomous system no. 11

1. Create and configure VLAN on switch 1. Switch>en Switch#conf t Switch(config)#hostname switch1 switch1(config)#vlan 2 switch1(config-vlan)#name account switch1(config-vlan)#vlan 3 switch1(config-vlan)#name sales switch1(config-vlan)#vlan 4 switch1(config-vlan)#name technical switch1(config-vlan)#vlan 5 switch1(config-vlan)#name management CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

2. Add switch port in vlan. switch1(config)#int range f0/1 -2 switch1(config-if-range)#switchport mode access switch1(config-if-range)#switchport access vlan 2 switch1(config-if-range)#exit switch1(config)#int range f0/3 -4 switch1(config-if-range)#switchport mode access switch1(config-if-range)#switchport access vlan 3 switch1(config-if-range)#exit switch1(config)#int range f0/5 -6 switch1(config-if-range)#switchport mode access .switch1(config-if-range)#switchport access vlan 4 switch1(config-if-range)#exit switch1(config)#int range f0/7 -8 switch1(config-if-range)#switchport mode access switch1(config-if-range)#switchport access vlan 5 switch1(config)#int f0/9 switch1(config-if)#switchport mode trunk 3. Command to show information about vlan. switch1#sh vlan 4. Configure Router 1 as Dhcp server and communicate different vlan with the help router. Router>en Router#conf t Router(config)#hostname router1 router1(config)#int f0/0 router1(config-if)#no ip add router1(config-if)#no shutdown router1(config-if)#int f0/0.1 router1(config-subif)#encapsulation dot1q 2 router1(config-subif)#ip add 192.168.1.1 255.255.255.192 router1(config-subif)#int f0/0.2 router1(config-subif)#encapsulation dot1q 3 router1(config-subif)#ip add 192.168.1.65 255.255.255.224 router1(config-subif)#int f0/0.3 router1(config-subif)#encapsulation dot1q 4 router1(config-subif)#ip add 192.168.1.97 255.255.255.224 router1(config-subif)#int f0/0.4 CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

router1(config-subif)#encapsulation dot1q 5 router1(config-subif)#ip add 192.168.1.129 255.255.255.240 router1(config-subif)#exit configure router as dhcp:router1(config)#ip dhcp pool cisco1 router1(dhcp-config)#network 192.168.1.0 255.255.255.192 router1(dhcp-config)#default-router 192.168.1.1 router1(dhcp-config)#exit router1(config)#ip dhcp pool cisco2 router1(dhcp-config)#network 192.168.1.64 255.255.255.224 router1(dhcp-config)#default-router 192.168.1.65 router1(dhcp-config)#exit router1(config)#ip dhcp pool cisco3 router1(dhcp-config)#network 192.168.1.96 255.255.255.224 router1(dhcp-config)#default-router 192.168.1.97 router1(dhcp-config)#exit router1(config)#ip dhcp pool cisco4 router1(dhcp-config)#network 192.168.1.128 255.255.255.240 router1(dhcp-config)#default-router 192.168.1.129 router1#conf t router1(config)#int s1/0 router1(config-if)#ip add 11.0.0.1 255.0.0.0 router1(config-if)#clock rate 64000 router1(config-if)#no shut 5.Configure Router 2. Router>en Router#conf t Router(config)#hostname router2 router2(config)#int s1/0 router2(config-if)#ip add 11.0.0.2 255.0.0.0 router2(config-if)#no shut router2(config-if)#exit router2(config)#int f router2(config)#int f0/0 router2(config-if)#ip add 12.0.0.1 255.0.0.0 router2(config-if)#no shut 6. Configure EIGRP Routing with autonomous system no. 11 CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

router1(config)#router eigrp 11 router1(config-router)#network 192.168.1.0 router1(config-router)#network 192.168.1.64 router1(config-router)#network 192.168.1.96 router1(config-router)#network 192.168.1.128 router1(config-router)#network 11.0.0.0 router2(config)#router eigrp 11 router2(config-router)#network 11.0.0.0 router2(config-router)#network 12.0.0.0

VTP (VLAN Trunking Protocol)

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Network Address Translation (NAT) CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

NAT translates private IP address into Public IP address. It saves valuable public IP address. Types of Network Address Translation 1. Static NAT 2. Dynamic NAT 3. NAT Overload [PAT (Port Address translation)] Static NAT This type of NAT is designed to allow one-to-one mapping between local and global addresses. the static version requires you to have one real Internet IP address for every host on your network. Dynamic NAT This version gives you the ability to map an unregistered IP address to a registered IP address from out of a pool of registered IP addresses. NAT Overload [PAT (Port Address translation)] Understand that overloading really is a form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP addressmany-to-oneby using different ports. By using PAT (NAT Overload), you get to have thousands of users connect to the Internet using only one real global IP address.

NAT Names CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

How NAT Works

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

PRACTICAL: -

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

1. CONFIGURE STATIC NAT MAP PRIVATE 192.168.1.2 INTO PUBLIC IP 11.0.0.3 :bhopal(config)#ip nat inside source static 192.168.1.2 11.0.0.3 bhopal(config)#int s1/0 bhopal(config-if)#ip nat outside bhopal(config-if)#int f0/0 bhopal(config-if)#ip nat inside bhopal(config-if)#do copy run start 2. configure dynamic nat :bhopal#conf t bhopal(config)#ip nat pool cisco 11.0.0.3 11.0.0.5 netmask 255.0.0.0 bhopal(config)#access-list 1 permit 192.168.1.0 0.0.0.31 bhopal(config)#ip nat inside source list 1 pool cisco bhopal(config)#int s1/0 bhopal(config-if)#ip nat outside bhopal(config-if)#int f0/0 bhopal(config-if)#ip nat inside bhopal(config-if)#do copy run start

command to remove dynamic nat :bhopal#clear ip nat translation * bhopal#conf t bhopal(config)#no ip nat inside source list 1 pool cisco bhopal(config)#no ip nat pool cisco bhopal(config)#no access-list 1 bhopal(config)#int s1/0 bhopal(config-if)#no ip nat outside bhopal(config-if)#exit bhopal(config)#int f0/0 bhopal(config-if)#no ip nat inside bhopal(config-if)#do copy run start 3. configure pat(port address translation) :bhopal#conf t bhopal(config)#ip nat pool cisco 11.0.0.3 11.0.0.3 netmask 255.0.0.0 bhopal(config)#access-list 10 permit 192.168.1.0 0.0.0.31 Bhopal(config)#access-list 10 permit 172.16.0.0 0.0.255.255 bhopal(config)#ip nat inside source list 10 pool cisco overload bhopal(config)#int s1/0 bhopal(config-if)#ip nat outside CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

bhopal(config-if)#int f0/0 bhopal(config-if)#ip nat inside Bhopal(config-if)#exit Bhopal(config)#int f0/1 Bhopal(config-if)#ip nat inside bhopal(config-if)#do copy run start

================================================================= Wide Area Networks: The Cisco IOS supports a ton of different wide area network (WAN) protocols that help you extend your local LANs to other LANs at remote sites. WAN connection types that can be used to connect your LANs together (DTE) over a DCE network. Leased Line: These are usually referred to as a point-to-point or dedicated connection. A leased line is a pre-established WAN communications path that goes from the CPE through the DCE switch, then over to the CPE of the remote site. It uses synchronous serial lines up to 45Mbps. HDLC and PPP encapsulations are frequently used on leased lines.

Circuit switching When you hear the term circuit switching, think phone call. The big advantage is costyou only pay for the time you actually use. No data can transfer before an end-to-end connection is established. Circuit switching uses dial-up modems or ISDN and is used for low-bandwidth data transfers.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Packet switching This is a WAN switching method that allows you to share bandwidth with other companies to save money. Packet switching will only work for you if your data transfers are the bursty type not continuous. Frame Relay and X.25 are packet-switching technologies with speeds that can range from 56Kbps up to T3 (45Mbps).

[Note: - WAN protocols used today: Frame Relay, ISDN, LAPB, LAPD, HDLC, PPP, PPPoE, Cable, DSL, MPLS, and ATM. ]

Defining WAN Terms: Customer premises equipment (CPE) Customer premises equipment (CPE) is equipment thats owned by the subscriber and located on the subscribers premises. Demarcation point The demarcation point is the precise spot where the service Providers responsibility ends and the CPE begins. Local loop The local loop connects the demarc to the closest switching office, which is called a central office. Central office (CO) This point connects the customers network to the providers switching network. Toll network The toll network is a trunk line inside a WAN providers network. This network is a collection of switches and facilities owned by the ISP. Data Terminal Equipment and Data Communication Equipment: By default, router interfaces are data terminal equipment (DTE), and they connect into data communication equipment (DCE) like a channel service unit/data service unit (CSU/DSU). The CSU/DSU then plugs into a demarcation location (demarc) and is the service providers last responsibility. The networks DCE device (CSU/DSU) provides clocking to the DTE-connected interface (the routers serial interface).

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

HDLC High-Level Data-Link Control (HDLC) was derived from Synchronous Data Link Control (SDLC), which was created by IBM as a Data Link connection protocol. HDLC has its own way of identifying the Network layer protocol, meaning each vendors HDLC is proprietary. HDLC is a point-to-point protocol used on leased lines. No authentication can be used with HDLC. HDLC is the default encapsulation used by Cisco routers over synchronous serial links. Ciscos HDLC is proprietaryit wont communicate with any other vendors HDLC implementation. Point-to-Point Protocol (PPP) Its a Data Link layer protocol that can be used over either asynchronous serial (dialup) or synchronous serial (ISDN) media. PPP can encapsulate several layer 3 routed protocols. Provide authentication, dynamic addressing, and callback, PPP could be the best encapsulation solution for you instead of HDLC. PPP contains two components: 1. LCP A method of establishing, configuring, maintaining, and terminating the point-to-point connection. 2. NCP A method of establishing and configuring different Network layer protocols. NCP is designed to allow the simultaneous use of multiple Network layer protocols.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Link Control Protocol (LCP) Configuration Options: Authentication This option tells the calling side of the link to send information that can identify the user. The two methods are PAP and CHAP. Compression This is used to increase the throughput of PPP connections by compressing the data or payload prior to transmission. PPP decompresses the data frame on the receiving end. Multilink This option makes several separate physical paths appear to be one logical path at layer 3. For example, two T1s running multilink PPP would show up as a single 3Mbps path to a layer 3 routing protocol. PPP callback Once authentication is completed, the remote router will terminate the connection and then re-initiate a connection to the calling router from the remote router. PPP Authentication Methods: Password Authentication Protocol (PAP) The Password Authentication Protocol (PAP) is the less secure of the two methods. Passwords are sent in clear text. Challenge Handshake Authentication Protocol (CHAP) router sends a challenge request to the remote device. The remote device sends a value calculated using a one-way hash function called MD5. The local router checks this hash value to make sure it matches. If the values dont match, the link is immediately terminated. PRACTICAL: -

command to show encapsulatin type :appin#sh interfaces s1/0

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

configure ppp protocol :appin(config)#username airtel password cisco appin(config)#int s1/0 appin(config-if)#encapsulation ppp appin(config-if)#ppp authentication chap appin(config-if)#do copy run start airtel#conf t airtel(config)#username appin password cisco airtel(config)#int s1/0 airtel(config-if)#encapsulation ppp airtel(config-if)#ppp authentication chap airtel(config-if)#do copy run start configure hdlc protocol :appin(config)#int s1/0 appin(config-if)#encapsulation hdlc appin(config-if)#do copy run start airtel(config)#int s1/0 airtel(config-if)#encapsulation hdlc airtel(config-if)#do copy run start

Frame Relay Frame Relay is classified as a non-broadcast multi-access (NBMA) network, meaning it doesnt send any broadcasts. Frame Relay is packet-switching technologies with speeds that can range from 56Kbps up to T3 (45Mbps).

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

There are two separate bandwidth specifications with Frame Relay: 1. Access rate The maximum speed at which the Frame Relay interface can transmit. 2. CIR The maximum bandwidth of data guaranteed to be delivered. In reality, its the average amount that the service provider will allow you to transmit. Virtual Circuits: Frame Relay operates using virtual circuits as opposed to the actual circuits that leased lines use. there are two types of virtual circuits: 1. permanent virtual circuit (pvc) 2. switched virtual circuit (svc) Permanent virtual circuit (pvc) permanent means here is that the telco creates the mappings inside their gear and as long as you pay the bill, theyll remain in place. switched virtual circuit (svc) SVCs are more like a phone call. The virtual circuit is established when data needs to be transmitted, then its taken down when the data transfer is complete. Data Link Connection Identifiers (DLCIs): Frame Relay PVCs are identified to DTE end devices by Data Link Connection Identifiers (DLCIs). A Frame Relay service provider typically assigns DLCI values, which are used on Frame Relay interfaces to distinguish between different virtual circuits. Inverse ARP (IARP),it is somewhat similar to ARP in the fact that it maps a DLCI to an IP address.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Local Management Interface (LMI) Local Management Interface (LMI) is a signaling standard used between your router and the first Frame Relay switch its connected to. There are three different types of LMI message formats: Cisco, ANSI, and Q.933A.

1. configure Delhi router :-

Router>EN Router#CONF T Router(config)#hostname delhi delhi(config)#int s1/0 delhi(config-if)#ip add 11.0.0.1 255.0.0.0 delhi(config-if)#clock rate 64000 delhi(config-if)#encapsulation frame-relay delhi(config-if)#frame-relay lmi-type cisco delhi(config-if)#no shut delhi(config-if)#frame-relay map ip 11.0.0.2 102 broadcast delhi(config-if)#frame-relay map ip 11.0.0.3 103 broadcast CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

delhi(config-if)#exit delhi(config)#int f0/0 delhi(config-if)#ip add 192.168.1.1 255.255.255.0 delhi(config-if)#no shut delhi(config-if)#do copy run start 2. configure Bhopal router :Router(config)#hostname bhopal bhopal(config)#int s1/0 bhopal(config-if)#ip add 11.0.0.2 255.0.0.0 bhopal(config-if)#clock rate 64000 bhopal(config-if)#no shut bhopal(config-if)#encapsulation frame-relay bhopal(config-if)#frame-relay lmi-type cisco bhopal(config-if)#frame-relay map ip 11.0.0.3 203 broadcast bhopal(config-if)#exit bhopal(config)#int f0/0 bhopal(config-if)#ip add 172.16.1.1 255.255.0.0 bhopal(config-if)#no shut bhopal(config-if)#do copy run start 3. configure Indore router :Router(config)#hostname indore indore(config)#int s1/0 indore(config-if)#ip add 11.0.0.3 255.0.0.0 indore(config-if)#no shut indore(config-if)#clock rate 64000 indore(config-if)#encapsulation frame-relay indore(config-if)# indore(config-if)#frame-relay lmi-type cisco indore(config-if)#exit indore(config)#int f0/0 indore(config-if)#ip add 10.0.0.1 255.0.0.0 indore(config-if)#no shut indore(config-if)#do copy run start 4. Command to show frame-relay map,lmi and pvc information ;delhi#sh frame-relay map delhi#sh frame-relay lmi delhi#sh frame-relay pvc CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Internet Protocol Version 6 (IPv6) It is 128 bit, Hexadecimal number which is used to identify any host in network. It divides in 8 parts of 16 bit, separated by colon (:0). IPv4 32 bits or 4 bytes long 4,200,000,000 possible addressable nodes IPv6 128 bits or 16 bytes: four times the bits of IPv4 3.4 * 1038 possible addressable nodes 340,282,366,920,938,463,374,607,432,768,211,456 5 * 1028 addresses per person

IPv6 Addressing and Expressions: -

Shortened Expression of IP v6 : You can drop any leading zeros in each of the individual blocks. 2001:db8:3c4d:12:0:0:1234:56ab we can remove the two blocks of zeros by replacing them with double colons, like this: 2001:db8:3c4d:12:: 1234:56ab

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Check out this example: 2001:0000:0000:0012:0000:0000:1234:56ab And just know that you cant do this: 2001::12::1234:56ab Instead, this is the best that you can do: 2001::12:0:0:1234:56ab

Address Types in IPv6:Unicast address Packets addressed to a unicast address are delivered to a single interface. There are a few different types of unicast addresses: 1. Global unicast addresses These are your typical publicly routable addresses, and theyre the same as they are in IPv4. Example: 2000::/3 The global unicast address range.

2. Link-local addresses These are like the private addresses in IPv4 in that theyre not meant to be routed. Example: FE80::/10 The link-local unicast range. 3. Unique local addresses These addresses are also intended for non-routing purposes, but they are nearly globally unique. it is routable to multiple local networks. Example: FC00::/7 The unique local unicast range. Multicast address Packets addressed to a multicast address are delivered to all interfaces identified by the multicast address. Sometimes people call them one-to-many addresses. FF00::/8 The multicast range Anycast address Like multicast addresses, an anycast address identifies multiple interfaces, but theres a big difference: the anycast packet is only delivered to one addressactually, to the first one it finds defined in terms of routing distance. CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Special Addresses: 0:0:0:0:0:0:0:0 Equals :: This is the equivalent of IPv4s 0.0.0.0. 0:0:0:0:0:0:0:1 Equals ::1. The equivalent of 127.0.0.1 in IPv4. 2001:0DB8::/32 Also reserved for examples and documentation.

1.Configure above network with ip v6 addrressing. 2. Configure ripng (routing information protocol new generation ) routing. 3. Configure eigrp routing. 4. Configure ospf routing. "configure ipv6 address on indore router" Router>en Router#conf t Router(config)#hostname indore indore(config)#ipv6 unicast-routing indore(config)#int f0/0 indore(config-if)#ipv6 add 2001:db8:3c4d:1::2/64 indore(config-if)#no shut indore(config-if)#exit CCNA Guide By Manish Raghuvanshi
Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

indore(config)#int s1/0 indore(config-if)#ipv6 add 2001:db8:3c4d:2::1/64 indore(config-if)#clock rate 64000 indore(config-if)#no shut configure ipv6 address on bhopal router Router>en Router#conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#ipv6 unicast-routing Router(config)#int f0/0 Router(config-if)#ipv6 add 2001:db8:3c4d:3::1/64 Router(config-if)#no shut Router(config-if)#int s1/0 Router(config-if)#ipv6 add 2001:db8:3c4d:2::2/64 Router(config-if)#no shut command to show ipv6 routing table :bhopal#sh ipv6 route command to show ipv6 interface configuration:bhopal#sh ipv6 int brief configure ripng (routing information protocol new generation) in ipv6 network indore(config)#ipv6 router rip 1 indore(config-rtr)#int f0/0 indore(config-if)#ipv6 rip 1 enable indore(config-if)#int s1/0 indore(config-if)#ipv6 rip 1 enable indore(config-if)#^Z indore#copy run start bhopal(config)#ipv6 router rip 1 bhopal(config-rtr)#int f0/0 bhopal(config-if)#ipv6 rip 1 enable bhopal(config-if)#int s1/0 bhopal(config-if)#ipv6 rip 1 enable bhopal(config-if)#^Z bhopal#copy run start

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

command to remove ip6 ripng routing :indore(config)#no ipv6 router rip 1 indore(config-rtr)#int f0/0 indore(config-if)#no ipv6 rip 1 enable indore(config-if)#int s1/0 indore(config-if)#no ipv6 rip 1 enable indore(config-if)#^Z indore#copy run start

configure eigrp routing on ipv6 network indore(config)#ipv6 router eigrp 10 indore(config-rtr)#int f0/0 indore(config-if)#ipv6 eigrp 10 indore(config-if)#int s1/0 indore(config-if)#ipv6 eigrp 10 indore(config-if)#^Z indore#copy run start {where 10 is autonomous system number} configure ospf routing in ipv6 nework indore(config)#ipv6 router ospf 1 indore(config-rtr)#int f0/0 indore(config-if)#ipv6 ospf 1 area 0.0.0.0 indore(config-if)#int s1/0 indore(config-if)#ipv6 ospf 1 area 0.0.0.0 indore(config-if)#^Z indore#copy run start

Wireless :802.11 Wireless LANs operate at layer 1 and 2 of the OSI Model. Transmitting a signal using the typical 802.11 specifications works a lot like it does with a basic Ethernet hub: Theyre both two-way forms of communication, and they both use the same frequency to both transmit and receive, often referred to as halfduplex. Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into the air from an antenna that creates radio waves. These waves can be absorbed, refracted, or reflected by walls, water, and metal surfaces, resulting in low signal strength.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

FCC has released three unlicensed bands for public use: 900MHz, 2.4GHz, and 5.7GHz. The 900MHz and 2.4GHz bands are referred to as the Industrial, Scientific, and Medical (ISM) bands, and the 5-GHz band is known as the Unlicensed National Information Infrastructure (UNII) band. Ethernet Layer 2 frames carry only two MAC addresses, while 802.11 frames have felds for four MAC addresses. Ethernet just defnes source and destination addresses, while an 802.11 frame can defne source, destination, transmitter and receiver. Most wireless LANs (WLANs) are based on the IEEE 802.11 standards and amendments, such as 802.11a, 802.11b, 802.11g, and 802.11n.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

Infrastructure mode - Basic Service Set (BSS) ;network resources. Extended Service Set (ESS) :-

Mobile clients use a single AP

for connectivity to each other or

wired

Two or more BSSs connected by

a common distribution system (DS).

Two methods exist in the 802.11 standard for authenticating wireless LAN clients to an access point: open system :- Open system does not provide any security mechanisms but is simply a request to make a connection to the network. shared-key authentication:- Shared-key authentication has the wireless client hash a string of challenge text with the Wired Equivalent Privacy (WEP) key to authenticate the client to the network. Wep key:- WEP uses an RC4 64-bit or 128-bit encryption key to encrypt the Layer 2 data payload. This WEP key comprises a 40-bit or 104-bit user-defned key combined with a 24-bit Initialization Vector (IV), making the WEP key either 64 or 128 bit.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

WPA Personal and WPA2 Personal use a passphrase to authentication WLAN clients. WPA Enterprise and WPA2 Enterprise authenticate WLAN users via a RADIUS server using the 802.1X/Extensible Authentication Protocol (EAP) standards. TKIP rotates the data encryption key to prevent the vulnerabilities of WEP and, consequently, cracking attacks.

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

CCNA Guide By Manish Raghuvanshi


Contact @ 9753338888, 9926210940, email: - manish.raghuvanshi1985@gmail.com

You might also like