Professional Documents
Culture Documents
HOST-TO-HOST
INTERNET
NETWORK ACCESS
TELNET
PROCESS/APPLICATION LAYER PROTOCOL THAT PROVIDES
TERMINAL EMULATION.
01111111 = 127
CLASS B NETWORK RANGE
10000000 = 128
10111111 = 191
CLASS C NETWORK RANGE
11000000 = 192
11011111 = 223
PRIVATE IP RANGES
CLASS A 10.0.0.0 THROUGH 10.255.255.255
Router#
Router#config
Router(config)#
ACCESS ROUTER INTERFACE CONFIGURATION MODE
Router>enable
Router#config
Router(config-if)#
CONFIGURES ROUTING PROTOCOLS
Router>enable
Router#config
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#
User EXEC mode
CLI MODE LIMITED TO BASIC MONITORING COMMANDS
Privileged EXEC mode
CLI MODE THAT PROVIDES ACCESS TO ALL OTHER ROUTER
COMMANDS
GLOBAL CONFIGURATION MODE
COMMANDS THAT AFFECT THE ENTIRE SYSTEM
Router(config)#
SPECIFIC CONFIGURATION MODES
COMMANDS THAT AFFECT INTERFACES OR PROCESSES ONLY
Router(config-if)#
SETUP MODE
INTERACTIVE CONFIGURATION DIALOG INTENDED FOR NON-
CISCO TRAINED USERS
EDITS ROUTER LOCAL HOSTNAME
Router>enable
Router#config
Router(config)#hostname Atlanta
Atlanta(config)#
SETS ENABLE PASSWORDS
last-resort
password
secret
use-tacacs
SETS AUXILIARY PORT PASSWORD
Router(config)#
Router(config)#line aux 0
Router(config-line)#password aux
Router(config-line)#login
LEASED LINES
Otherwise known as point to point or dedicated connections. It
is a pre-established WAN path provided by the ISP and uses
synchronous serial lines up to 45 Mbps.
(ROUTING PROTOCOLS)
Hybrid protocols use aspects of both distance-vector and link-
state, for example, EIGRP.
LAYER 2 SWITCH FUNCTIONS
ADDRESS LEARNING
FORWARD/FILTER DECISIONS
LOOP AVOIDANCE
LAYER 2 ADDRESS LEARNING
Layer 2 switches and bridges remember the source hardware
address of each frame received on an interface, and they enter
this information into a MAC database called a forward/filter
table
LAYER 2 FORWARD/FILTER DECISIONS
When a frame is received on an interface, the switch looks at the
destination hardware address and finds the exit interface in the
MAC database. The frame is only forwarded out the specified
destination port.
LAYER 2 LOOP AVOIDANCE
If multiple connections between switches are created for
redundancy purposes, network loops can occur. Spanning Tree
Protocol (STP) is used to stop network loops while still
permitting redundancy.
APPLICATION-LAYER ATTACKS
These security attacks zero-in on well-known security
vulnerabilities found on server software.
Similar to STATIC NAT because you still need one public Internet
IP address for every host in your network, however, the
addresses are assigned dynamically.
NAT OVERLOAD
The most popular type of NAT configuration. Overloading is a
form of dynamic NAT that maps multiple unregistered IP
addresses to a single registered IP address by using different
ports.