Professional Documents
Culture Documents
En Blanco
En Blanco
En Blanco
Miguel Juárez
TEMARIO
C:\Users\Miguel\Downloads\200-301-CCNA.pdf
COURSE TOPICS
Def.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: Peer to peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of
network design is only recommended for very small networks.
Advantages Disadvantages
Easy to set up No centralized administration
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or individual. Typically administered by one or more service providers.
Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: LAN and WAN (cont)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: Taking a deep dive
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: The Internet
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Impact of user applications on the network
SUBTHEME: Network Traffic Types
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Impact of user applications on the network
SUBTHEME: Network Traffic Types
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The converging Network
SUBTHEME:
Before converged networks, an organization would have been separately cabled for
telephone, video, and data. Each of these networks would use different technologies to
carry the signal.
Each of these technologies would use a different set of rules and standards.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The converging Network
SUBTHEME:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Reliable Network
SUBTHEME: Fault tolerance
• In telecommunication, a communication
protocol is a system of rules that allow two or
more entities of a communications system to
transmit information via any kind of variation of a
physical quantity.
• The protocol defines the rules, syntax, semantics
and synchronization of communication and
possible error recovery methods.
• Protocols may be implemented by hardware,
software, or a combination of both
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI and TCP models mapping
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Application layer
The open systems interconnection model is a critical building block for your understanding of networking.
It’s important for troubleshooting and understanding networks and network protocols.
In the past, there were older models that were proprietary and would typically controlled by
a single vendor. This caused multiple issues, especially in networking, where we have many different devices
that need to communicate with each other. Issues resulting from a proprietary model included slow
development and no interoperability between vendors.
The same model was developed by the International Organization for Standardization, or the ISO, and
it provides a layered approach to development and interoperability. It allows for multi vendor interoperability
and rapid development.
Thus, for example, a Web browser like Chrome from Google can run on an HP computer or Dell laptop
and connect to a Cisco network, traverse the Internet and connect to a Web server running Apache on
top of Linux.
So your Web browser is running perhaps in Windows. Or it could be a safari browser running on a MacBook,
connecting across a Cisco network in your corporate environment, traversing multiple devices on the Internet
and communicating with a Apache's server running on Linux.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The OSI model
SUBTHEME: Logical ports
• In computer networking, a port is a Service names and port numbers are used to distinguish
communication endpoint. between different services that run over transport protocols
• At the software level, within an operating such as TCP and UDP.
system, a port is a logical construct that • Service names are assigned on a first-come, first-served
identifies a specific process or a type of process, as documented in [RFC6335].
network service. • Port numbers are assigned in various ways, based on three
• A port number is a 16-bit unsigned integer, ranges:
thus ranging from 0 to 65535 • System Ports (0-1023)
• User Ports (1024-49151)
• and the Dynamic and/or Private Ports (49152-65535)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The OSI model
SUBTHEME: Ephemeral ports
• The color coding of the wire pairs in an UTP cable is determined by the type of standard that is
used to make the cable.
• Different standards have different purposes and are closely governed by the standards
organizations.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Estandard T-658
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs transmit and receive pairs
SUBTHEME:
• Ethernet NICs and the ports on networking devices are designed to send data over UTP cables.
• Specific pins on the connector are associated with a transmit function and a receive function.
• The interfaces on each device are designed to transmit and receive data on designated wires
within the cable.
• When two unlike devices are directly connected using an UTP Ethernet cable, it is important
that the transmit function and the receive function on each end of the cable are reversed.
• This cable is called straight-through cable and it has the same color patterns on both ends
of the cable.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME: Straight-through Cable pinout
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 4.- STRUCTURED CABLING
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME: Definition
Convention Description
boldface Boldface text indicates commands and keywords that you enter literally as shown.
italics Italic text indicates arguments for which you supply values.
Braces and vertical lines within square brackets indicate a required choice within an
[x {y | z }]
optional element. Spaces are used to clearly delineate parts of the command.
The command is ping and the user-defined
argument is the ip-address of the destination
device. For example, ping 10.10.10.5.
If a command is complex with multiple arguments, you may see it represented like this:
The Command Structure
Hot Keys and Shortcuts (Cont.)
• The table below is a brief list of keystrokes to enhance command line editing.
Keystroke Description
Tab Completes a partial command name entry.
Left Arrow or Ctrl+B Moves the cursor one character to the left.
Right Arrow or Ctrl+F Moves the cursor one character to the right.
Device Names
Basic Device Configuration
Device Names
• The first configuration command on any device
should be to give it a unique hostname.
• By default, all devices are assigned a factory
default name. For example, a Cisco IOS switch
is "Switch.”
• Password Guidelines:
• Use passwords that are more than eight characters
in length.
• Use a combination of upper and lowercase letters,
numbers, special characters, and/or numeric Note: Most of the labs in this course use simple
sequences. passwords such as cisco or class. These passwords are
considered weak and easily guessable and should be
• Avoid using the same password for all devices. avoided in production environments.
• Do not use common words because they are easily
guessed.
Basic Device Configuration
Configure Passwords
Securing user EXEC mode access:
• First enter line console configuration mode
using the line console 0 command in global
configuration mode.
• Next, specify the user EXEC mode password
using the password password command.
• Finally, enable user EXEC access using
the login command.
Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco switches
support up to 16 VTY lines that are numbered 0 to 15.
Basic Device Configuration
Encrypt Passwords Use the show running-config command to
verify that the passwords on the device are
now encrypted.
• The startup-config and running-config files
display most passwords in plaintext.
• To encrypt all plaintext passwords, use
the service password-encryption global
config command.
https://www.ifm.net.nz/cookbooks/passwordcracker.html
Basic Device Configuration
Banner Messages
• A banner message is important to
warn unauthorized personnel from
attempting to access the device.
• To create a banner message of the The banner will be displayed on attempts to access the device.
day on a network device, use
the banner motd # the message of
the day # global config command.
Note: The text file created can be used as a record of how the
device is currently implemented. The file could require editing
before being used to restore a saved configuration to a device.
Reset password and configuration on a Router Cisco
Chapter 8.- IPv4
Hierarchical Network Design
Physical and Logical Addresses
Both a physical address and logical IP address are needed for a device to communicate on an Ethernet
network.
• A physical address (MAC address) does not change.
• Burned into the NIC
• A logical address (IP address) can change and is commonly assigned by a network administrator.
• Two parts: network and host
Logical
addressing
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 232
Types of IPv4 Addresses
Legacy Classful Addressing
Address range 127.0.0.0 - 127.255.255.255
Used to test the network stack (think OSI, TCP/IP model) on the local device
IPv4 Address Structure
The Prefix Length The Prefix Length:
• Shorthand method of expressing
the subnet mask.
• Equals the number of bits in the
subnet mask set to 1.
• Written in slash notation, /
followed by the number of
network bits.
Types of IPv4 Addresses
Public and Private IPv4 Addresses
• Private Addresses
• Not routable
• Introduced in mid 1990s due to depletion of IPv4
addresses
• Used only in internal networks.
• Must be translated to a public IPv4 to be routable.
• Defined by RFC 1918
• Private Address Blocks
• 10.0.0.0 /8 or 10.0.0.0 to 10.255.255.255
• 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
192.168.0.0 /16
• 192.168.0.0 to 192.168.255.255
• Link-Local addresses (169.254.0.0 /16 or
169.254.0.1)
• Commonly known as Automatic Private IP
Addressing (APIPA) addresses.
• Used by Windows client to self configure if no
DHCP server available.
RFC 1918 “Address Allocation for Private IP”
An IPv6 global unicast address (GUA) is a globally unique and routable IPv6 address. It is equivalent to
a public IPv4 address. A GUA begins with either a hexadecimal 2 or 3. A GUA can be either a source or
destination IPv6 address. The following is an example of a global unicast address:
2001:db8:cafe:1::200 / 64
A link-local address is a unicast address that is local only on that link. The term link refers to a logical
network segment or subnet. Link-local addresses are limited to the particular link and are not routable
beyond the local subnet. An IPv6 device doesn’t have to have a global unicast address but it must have
a link-local address. In other words, any device that is IPv6-enabled requires a link-local address. The
device must be capable of self-generating the link-local address on the IPv6-enabled interface. Link-
local addresses commonly begin with fe80, as in this example:
fe80::a299:9bff:fe18:00dd
Link-local addresses are typically created automatically by the host operating system, which is why you
see these addresses already configured on the computer.
Your text here
2000:db8:CAFE::/48 2000:db8:CAFE:4:/64
2000:db8:CAFE:2:/64
2000:db8:CAFE:1:/64
2000:db8:CAFE:3:/64
2000:db8:CAFE:6:/64
2000:db8:CAFE:5:/64
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Topology
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Configuring IPv6 on a CISCO router
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Configuring IPv6 static routes on a CISCO router
Chapter 12.- VIRTUAL AREA NETWORK
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Flat LAN (No segmentation)
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Characteristics
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Explanation
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Access ports and Trunk ports
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: ETHERNET FRAME
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: DTP Dynamic Trunk Protocol
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NETWORK USING VLAN’S (SEGMENTED NETWORK))
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NETWORK USING VLAN’S (SEGMENTED NETWORK))
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NETWORK USING VLAN’S (SEGMENTED NETWORK))
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NVLAN Data Frame)
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: One phisical Router Interface for each VLAN
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: One phisical Router Interface for each VLAN
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Router on a stick
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Router on a steak (creating subinterfaces in the router
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: VLAN Routing with ASA
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: The best configuration
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: The best configuration
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: The best configuration
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Switch Virtual Interface (SVI) on SW Layer 3
Chapter 13.- STP PROTOCOL