CCNA 2 Routing & Switching Configurations
Welcome to the CCNA Routing and Switching: Basic routing and switching principles (Routing and Switching Essentials) course. Here you will find all the basic configuration content related to CCNA exams with Lab configuration examples.CCNA Course Content
This CCNA course focuses on learning the architecture, components and operation of routers and switches in a small network.In this course, you will learn how to configure a router and a switch to obtain basic functionality. In this grade:
- Configure and verify static routing and default gateway.
- Configure and solve the basic operation problems of a small switched network.
- Carry out the configuration and troubleshooting of the basic operations of the routers in a small routed network.
- Configure and solve the problems of VLANs and routing between VLANs.
- Configure, monitor and troubleshoot ACLs for IPv4.
- Configure and verify DHCPv4 and DHCPv6.
- Configure and verify NAT for IPv4.
- Configure and monitor networks using the device detection, administration and maintenance tools.
CHAPTER 1: ROUTING CONCEPTS - CCNA 2
Ethernet switches operate at the data link layer, layer 2, and are used to forward Ethernet frames between devices within the same network.However, when the source and destination IP addresses are on different networks, the Ethernet frame must be sent to a router. Routers connect a network to another network. The router is responsible for the delivery of packets across different networks.
The router uses its routing table to find the best route to resend a packet. It is the responsibility of the routers to deliver those packages in due time. The effectiveness of internetwork communications depends, to a large extent, on the ability of routers to forward packets as efficiently as possible.
When a host sends a packet to a device on a different IP network, the packet is forwarded to the default gateway , since host devices cannot communicate directly with devices that are outside the local network. The default gateway is the destination that routes traffic from the local network to the devices in the remote networks. Frequently, it is used to connect a local network to the Internet.
This chapter answers the question “ What does a router do when it receives a packet from a network that is destined for another network? ”The details of the routing table will be examined, including connected, static and dynamic routes.
In this chapter, the router, its role in networks, its main hardware and software components, and the routing process will be presented. Exercises will be provided that demonstrate how to access the router, how to configure the basic parameters of the router and how to verify the configuration.
CHAPTER 2: STATIC ROUTING - CCNA 2
Routing is essential for any data network, as it transfers information through an internetwork from source to destination. Routers are devices that transfer packets from one network to the next.Routers discover remote networks dynamically, through routing protocols, manually, or through static routes. In many cases, routers use a combination of dynamic routing protocols and static routes. This chapter is about static routing.
The static routes are very common and do not require the same amount that dynamic routing protocols and processing overhead.
In this chapter, sample typologies will be used to configure static routes IPv4 and IPv6 and to present troubleshooting techniques. Throughout the process, several important IOS commands and the results they generate will be analyzed. An introduction to the routing table with directly connected networks and static routes will be included.
CHAPTER 3: DYNAMIC ROUTING - CCNA 2
The data networks we use in our daily lives to learn, play and work vary from small local networks to large global internetworks. At home, a user can have a router and two or more computers . At work, an organization probably has several routers and switches to meet the data communication needs of hundreds or even thousands of computers.Routers resend packets by using the information in the routing table . Routers can discover routes to remote networks in two ways: statically and dynamically.
In a large network with many networks and subnets, the configuration and maintenance of static routes between these networks entail an administrative and operational overhead. This administrative overhead is especially tedious when changes occur in the network, such as an out-of-service link or the implementation of a new subnet. Implementing dynamic routing protocols can ease the burden of configuration and maintenance tasks, in addition to providing sociability to the network.
In this chapter, dynamic routing protocols are presented , Compare the use of static and dynamic routing. The dynamic routing implementation is then analyzed using version 1 of the Routing Information Protocol (RIPv1) and version 2 (RIPv2). The chapter concludes with an in-depth analysis of the routing table.
Following topic will be covered:
- ROUTING OR DYNAMIC ROUTING
- RIP PROTOCOL CONFIGURATION
- IPV4 AND IPV6 ROUTING TABLE
CHAPTER 4: SWITCHED NETWORKS - CCNA 2
Modern networks continue to evolve. Now users expect to have instant access to a company's resources, anytime, anywhere. These resources include not only traditional data, but also video and voice. There is also a growing need for collaborative technologies. These technologies allow the distribution of resources in real time among several people in remote sites, as if they were in the same physical location.Different devices must work together without inconvenience to provide a fast, secure and reliable connection between hosts. LAN switches provide the connection point to the business network for end users and are also primarily responsible for controlling information within the LAN environment.
Routers facilitate the transmission of information between LAN networks and, in general, ignore individual hosts. All advanced services depend on the availability of a solid routing and switching infrastructure that serves as the basis. This infrastructure must be carefully designed, implemented and managed to provide a stable platform.
In this chapter, we begin with an examination of the traffic flow in a modern network. Some of the current network design models and the way in which LAN switches create forwarding tables and use MAC address information to switch data between hosts effectively are examined.
The topics covered:
SWITCHED NETWORKS: LAN DESIGN AND SWITCHED ENVIRONMENT
CHAPTER 5: SWITCH CONFIGURATION - CCNA 2
The switches are used to connect several devices on the same network. In a properly designed network, LAN switches are responsible for controlling the flow of data in the access layer and directing it to networked resources.The Cisco switches are automatic configuration and do not require any additional configuration to begin operation. However, Cisco switches run Cisco IOS and can be manually configured to best meet the needs of the network. This includes adjusting the requirements for speed, bandwidth and port security.
In addition, Cisco switches can be managed locally and remotely. To manage a switch remotely, it must be configured with an IP address and a default gateway. These are just two of the configuration parameters discussed in this chapter.
The switches work in places in the access layer where client network devices connect directly to the network and where IT departments want users to simply access it. It is one of the most vulnerable areas of the network, since it is very exposed to the user.
The switches must be configured to be resistant to attacks of all kinds and, at the same time, protect user data and allow high-speed connections. Port security is one of the security features that Cisco managed switches provide.
In this chapter, some of the basic switch configuration options that are required to maintain a secure and available switched LAN environment are discussed .
CHAPTER 6: VLAN - CCNA 2
Network performance is an important factor in the productivity of an organization. One of the technologies that contribute to improving network performance is the division of large broadcast domains into smaller domains .For a design issue, routers block broadcast traffic on an interface. However, routers generally have a limited number of LAN interfaces. The main function of a router is to transfer information between the networks, not to provide access to the network to the terminals.
The function of providing access to a LAN is usually reserved for access layer switches. A virtual local area network (VLAN) can be created on a Layer 2 switch to reduce the size of broadcast domains, similar to Layer 3 devices. Generally, VLANs are incorporated into the network design to facilitate that a network supports the objectives of an organization.
While VLANs are primarily used within switched local area networks, modern VLAN implementations allow them to span MAN and WAN networks.
Because VLANs segment the network, a layer 3 process is necessary to allow traffic to pass from one network segment to another.
This chapter describes how to configure and manage VLANs and VLAN trunks, as well as resolve related problems. Also to implement routing between VLANs through a router.
CHAPTER 7: ACCESS CONTROL LISTS - CCNA 2
One of the most important skills a network administrator needs is the domain of access control lists (ACLs). ACLs provide security to a network.Network designers use firewalls to protect networks from unauthorized use. Firewalls are hardware or software solutions that apply network security policies. Imagine a lock on the door of a room inside a building. The lock allows only authorized users who have a key or an access card to enter. Similarly, a firewall filters unauthorized or potentially dangerous packets and prevents them from entering the network.
On a Cisco router, you can configure a simple firewall that provides basic traffic filtering capabilities through ACL. Administrators use ACLs to stop traffic or to allow only specific traffic on their networks.
This chapter explains how to configure and troubleshoot the standard IPv4 ACLs on a Cisco router as part of a security solution. Advice, considerations, recommendations and general guidelines on how to use ACLs are included. In addition, this chapter offers the opportunity to develop your mastery of ACLs with a series of lessons, activities and laboratory practice exercises.
CHAPTER 8: DHCP - CCNA 2
Every device that connects to a network needs a unique IP address. Network administrators assign static IP addresses to routers, servers, printers and other network devices whose locations (physical and logical) probably do not change.Usually, these are devices that provide services to users and devices on the network. Therefore, the addresses assigned to them must be kept constant. In addition, static addresses enable administrators to administer these devices remotely. Network administrators find it easier to access a device when they can easily determine its IP address.
However, computers and users in an organization often change location, physically and logically. For network administrators, assigning new IP addresses each time an employee changes location can be difficult and time consuming.
The introduction of a Dynamic Host Configuration Protocol (DHCP) server in the local network simplifies the assignment of IP addresses to both desktop and mobile devices. The use of a centralized DHCP server allows organizations to manage all IP address assignments from a single server. This practice makes IP address management more efficient and ensures consistency throughout the organization, including branches.
DHCP is available for both IPv4 (DHCPv4) and IPv6 (DHCPv6). In this chapter, the functionality, configuration, and troubleshooting of DHCPv4 and DHCPv6 is explored .
- DHCPV4: WHAT IT IS AND HOW IT WORKS
- CONFIGURING A CLIENT AND A DHCPV4 SERVER
- DHCPV4 TROUBLESHOOTING
- SLAAC AND DHCPV6: INTRODUCTION AND OPERATION
- DHCPV6 CONFIGURATION WITHOUT STATUS
- DHCPV6 CONFIGURATION WITH STATUS
- DHCPV6 TROUBLESHOOTING
CHAPTER 9: NAT FOR IPV4 - CCNA 2
All public IPv4 addresses used on the Internet must be registered in a regional Internet registry (RIR). Organizations can lease public addresses from a service provider. The registered holder of a public IP address can assign that address to a network device.With a theoretical maximum of 4300 million addresses, the IPv4 address space is very limited. When Bob Kahn and Vint Cerf first developed the TCP / IP protocol suite that included IPv4 in 1981, they never imagined what the Internet could become.
The long-term solution was the IPv6 protocol, but more immediate solutions were needed to address address depletion.
In this chapter, we discuss how NAT is used in combination with private address space to more effectively conserve and use IPv4 addresses, in order to provide Internet access to networks of all sizes.
In this chapter, the following topics are covered:
- NAT features, terminology and general operations
- Different types of NAT, including static NAT, dynamic NAT and NAT with overhead
- Static NAT Settings
- Dynamic NAT Settings
- PAT Configuration
- Configure Port Forwarding With IOS
- NAT and Its Relationship With IPV6
CHAPTER 10: DETECTION, ADMINISTRATION AND MAINTENANCE OF DEVICES - CCNA 2
In this chapter, you will study the tools that network administrators can use for device detection, management and maintenance . Both the Cisco Discovery Protocol (CDP) and the Link Layer Discover Protocol (LLDP) have the ability to detect information about directly connected devices.The Network Time Protocol (NTP) can be used effectively to synchronize the time on all your network devices, something especially important when trying to compare log files from different devices. These log files are generated by the syslog protocol. Syslog messages can be captured and sent to a syslog server to facilitate device management tasks.
Device maintenance includes making sure that a backup copy of the Cisco IOS configuration files and images is in a secure location in case the device memory is corrupted or erased, either for malicious reasons or involuntary Maintenance also includes keeping the IOS image up to date. The device maintenance section of the chapter includes topics related to file maintenance, image management and software licenses.
- DEVICE DETECTION : CDP AND LLDP
- DEVICE ADMINISTRATION
No comments:
Post a Comment