En Blanco

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 331

Profr.

Miguel Juárez
TEMARIO

Temario de Redes Básicas

C:\Users\Miguel\Downloads\200-301-CCNA.pdf
COURSE TOPICS

Chapter 1.- Basic concepts Chapter 11.- IPv6


Chapter 2.- OSI AND TCP/IP MODELS Chapter 12.- VIRTUAL LOCAL AREA NETWORK
Chapter 3.- THE PHYSICAL LAYER Chapter 13.- STP PROTOCOL
Chapter 4.- STRUCTURED CABLING Chapter 14.- ETHERCHANNEL
Chapter 5.- IN-BAND CONECCTION Chapter 15.- DHCP
Chapter 6.- THE CISCO IOS Chapter 16.- NAT
Chapter 7.- CISCO DEVICE CONFIGURATION Chapter 17.- ROLE BASED ACCESS CONTROL
Chapter 8.- IPv4 Chapter 18.- PROGRAMMABILITY
Chapter 9.- ARP PROTOCOL Chapter 19.- SECURITY
Chapter 10.- THE PACKET
Chapter 1.- Basic Concepts
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Connection
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Connectivity
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: End devices (host)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: End devices (host)

Every computer on a network is called a


host or end device.
Servers are computers that provide Server Description
information to end devices: Type
• email servers
Email Email server runs email server software.
• web servers Clients use client software to access email.
• file server
Web Web server runs web server software.
Clients are computers that send Clients use browser software to access web pages.
requests to the servers to retrieve
information:
File File server stores corporate and user files.
• web page from a web server The client devices access these files.
• email from an email server
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Intermediary devices
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Network Media
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Network Media
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Graphical representation
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Switch

 Have many network ports for end devices to conect to


 Provide connectivity within the same LAN
 Do not provide connectivity between LAN’s or over Internet
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Switch
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Router

1.- Have fewer network interfaces than switches


2.- They are used to provide conectivity between LAN’s and over The Internet
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Router
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Firewall (ASA – Adaptive Security Appliance CISCO)

1.- Monitor and control network traffic based on configures rules.


2.- Filter traffic between networks.
3.- Host-based (PC´s)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Correct place of a network device
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Correct place of a network device
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: WLC (Wireless LAN Controller)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network Devices
SUBTHEME: Rack and cabinet
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Putting it all together
SUBTHEME: Network Graphical Representation

Network diagram or topology diagram or topology


Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Definition
SUBTHEME: What is a network ?

Def.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: Peer to peer

It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of
network design is only recommended for very small networks.

Advantages Disadvantages
Easy to set up No centralized administration

Less complex Not as secure

Lower cost Not scalable

Used for simple tasks: transferring files and Slower performance


sharing printers
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: LAN and WAN

A LAN is a network infrastructure that A WAN is a network infrastructure that spans a


spans a small geographical area. wide geographical area.

LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or individual. Typically administered by one or more service providers.
Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: LAN and WAN (cont)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: Taking a deep dive
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Types of networks
SUBTHEME: The Internet
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Impact of user applications on the network
SUBTHEME: Network Traffic Types
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Impact of user applications on the network
SUBTHEME: Network Traffic Types
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The converging Network
SUBTHEME:

Before converged networks, an organization would have been separately cabled for
telephone, video, and data. Each of these networks would use different technologies to
carry the signal.
Each of these technologies would use a different set of rules and standards.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The converging Network
SUBTHEME:

Converged data networks carry multiple


services on one link including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same network
infrastructure. The network infrastructure
uses the same set of rules and standards.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Reliable Network
SUBTHEME: Network Architecture

Network Architecture refers to the technologies


that support the infrastructure that moves data
across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:

• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Reliable Network
SUBTHEME: Fault tolerance

A fault tolerant network limits the impact of a


failure by limiting the number of affected
devices. Multiple paths are required for fault
tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into packets
that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated circuits.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Reliable Network
SUBTHEME: Scalability

A scalable network can expand


quickly and easily to support new
users and applications without
impacting the performance of
services to existing users.
Network designers follow accepted
standards and protocols in order to
make the networks scalable.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Reliable Network
SUBTHEME: Quality of service

Voice and live video transmissions require


higher expectations for those services being
delivered.
Have you ever watched a live video with
constant breaks and pauses? This is caused
when there is a higher demand for bandwidth
than available – and QoS isn’t configured.

• Quality of Service (QoS) is the primary


mechanism used to ensure reliable delivery
of content for all users.
• With a QoS policy in place, the router can
more easily manage the flow of data and
voice traffic.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Reliable Network
SUBTHEME: Network security

There are two main types of


network security that must be
addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the
devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended
recipients can read the data
• Integrity – assurance that the data
has not be altered with during
transmission
• Availability – assurance of timely
and reliable access to data for
authorized users
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network topology
SUBTHEME: Physical topology
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Network topology
SUBTHEME: Logical topology
Network Types
Network Types
Point-to-point network
• A network that connects a single pair of routers.
• A serial link is an example of a point-to-point connection.
Broadcast network
• A network that can connect many routers along with the capability to
address a single message to all of the attached routers.
• Ethernet is an example of a broadcast network.
Nonbroadcast Multiaccess (NBMA) network
• A network that can support many routers but does not have broadcast
capability.
• The sender needs to create an individual copy of the same packet for
each recipient if it wishes to inform all connected packet can be
transmitted.
• Frame Relay and Asynchronous Transfer Mode (ATM) are examples of
an NBMA network type.
Chapter 2.- OSI and TCP/IP MODELS
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: How a network is seen
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: Why use a model ?

• A mental model captures ideas in a problem domain, while a


conceptual model represents 'concepts' (entities) and
relationships between them.
• A conceptual model is a representation of a system, made of the
composition of concepts which are used to help people know,
understand, or simulate a subject the model represents.
• It is also a set of concepts. Some models are physical objects; for
example, a toy model which may be assembled, and may be
made to work like the object it represents.
• The term conceptual model may be used to refer to models which
are formed after a conceptualization or generalization process.
• Conceptual models are often abstractions of things in the real
world whether physical or social.
The aim of a conceptual model is to express the meaning of terms and concepts used by domain
experts to discuss the problem, and to find the correct relationships between different concepts.
• The conceptual model attempts to clarify the meaning of various, usually ambiguous terms,
and ensure that problems with different interpretations of the terms and concepts cannot occur.
• Such differing interpretations could easily cause confusion amongst stakeholders, especially
those responsible for designing and implementing a solution, where the conceptual model
provides a key artifact of business understanding and clarity
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: Protocols and devices

• In telecommunication, a communication
protocol is a system of rules that allow two or
more entities of a communications system to
transmit information via any kind of variation of a
physical quantity.
• The protocol defines the rules, syntax, semantics
and synchronization of communication and
possible error recovery methods.
• Protocols may be implemented by hardware,
software, or a combination of both
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI and TCP models mapping
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Application layer

• This layer is closest to the end user.


• Interacts with software applications, for example your
web browser (Brave, Firefox, Chrome, etc)
• HTTP and HTTPS are Layer 7 protocols

Functions of Layer 7 include:


• Identifying communication partners
• Synchronizing communication
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Presentation layer

• Data in the application layer is in “application Format”


• It needs to be 'translated to a different format to be sent over
the network.
• The Presentation Layer's job is to translate between application
and network formats.
• For example, encryption of data as it is sent, and decryption of
data as it is received.
• Also translates between different Application-Layer formats.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Session layer

• Controls dialogues (sessions) between communicating hosts.


• Establishes, manages, and terminates connections between
the local application (for example, your web browser) and
the remote application (for example, YouTube).
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Transport layer

• Segments and reassembles data for communications


between end hosts.
• Breaks large pieces of data into smaller segments which can
be more easily sent over the network and are less likely to
cause transmission problems if errors occur.
• Provide host-to-host communication.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Network layer

• Provides connectivity between end hosts on different


networks (ie. outside of the LAN).
• Provides logical addressing (IP addresses).
• Provides path selection between source and destination.
Routers operate at Layer 3.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Data Link layer

• Provides node-to-node connectivity and data transfer (for


example, PC to switch, switch to router, router to router).
• Defines how data is formatted for transmission over a
physical medium (for example, copper UTP cables)
• Detects and (possibly) corrects Physical Layer errors.
• Uses Layer 2 addressing, separate from Layer 3 addressing
• Switches operate at layer 2.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: OSI model, Physical layer

• Defines physical characteristics of the medium used to


transfer data between devices.
• For example, voltage levels, maximum transmission distances,
physical connectors, cable specifications, etc.
• Digital bits are converted into electrical (for wired
connections) or radio (for wireless connections) signals.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: TCP/IP models
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction to OSI and TCP/IP models
SUBTHEME: Encapsulation
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The OSI model
SUBTHEME:

The open systems interconnection model is a critical building block for your understanding of networking.
It’s important for troubleshooting and understanding networks and network protocols.

In the past, there were older models that were proprietary and would typically controlled by
a single vendor. This caused multiple issues, especially in networking, where we have many different devices
that need to communicate with each other. Issues resulting from a proprietary model included slow
development and no interoperability between vendors.

The same model was developed by the International Organization for Standardization, or the ISO, and
it provides a layered approach to development and interoperability. It allows for multi vendor interoperability
and rapid development.

Thus, for example, a Web browser like Chrome from Google can run on an HP computer or Dell laptop
and connect to a Cisco network, traverse the Internet and connect to a Web server running Apache on
top of Linux.

So your Web browser is running perhaps in Windows. Or it could be a safari browser running on a MacBook,
connecting across a Cisco network in your corporate environment, traversing multiple devices on the Internet
and communicating with a Apache's server running on Linux.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The OSI model
SUBTHEME: Logical ports

• In computer networking, a port is a Service names and port numbers are used to distinguish
communication endpoint. between different services that run over transport protocols
• At the software level, within an operating such as TCP and UDP.
system, a port is a logical construct that • Service names are assigned on a first-come, first-served
identifies a specific process or a type of process, as documented in [RFC6335].
network service. • Port numbers are assigned in various ways, based on three
• A port number is a 16-bit unsigned integer, ranges:
thus ranging from 0 to 65535 • System Ports (0-1023)
• User Ports (1024-49151)
• and the Dynamic and/or Private Ports (49152-65535)
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The OSI model
SUBTHEME: Ephemeral ports

Service names and port numbers are used to distinguish


between different services that run over transport protocols
such as TCP and UDP.
• Service names are assigned on a first-come, first-served
process, as documented in [RFC6335].
• Port numbers are assigned in various ways, based on three
ranges:
• System Ports (0-1023)
• User Ports (1024-49151)
• and the Dynamic and/or Private Ports (49152-65535)
An ephemeral port is a short-lived transport protocol
port for Internet Protocol (IP) communications.
• Ephemeral ports are allocated automatically from a
predefined range by the IP stack software.
• An ephemeral port is typically used by the
Transmission Control Protocol (TCP), User Datagram
Protocol (UDP), as the port assignment for the client
end of a client–server communication to a particular
port (usually a well-known port) on a server
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The OSI model
SUBTHEME: Ephemeral ports

• The Internet Assigned Numbers Authority (IANA) suggests the


range 49152 to 65535 for dynamic or private ports.
• Many Linux kernels use the port range 32768 to 61000.
FreeBSD has
used the IANA port range since release 4.6. Previous versions,
including the Berkeley Software Distribution (BSD), use ports
1024
to 5000 as ephemeral ports.[
• Microsoft Windows operating systems through XP use the
range
1025–5000 as ephemeral ports by default.
• Windows Vista, Windows 7, and Server 2008 use the IANA
range by
default.
• All versions of Windows since Windows 2000 have the option
of
specifying a custom range anywhere within 1025–65535
Chapter 3.- Physical layer
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction
SUBTHEME: Structured cabling
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Introduction
SUBTHEME: Structured cabling
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The Ethernet standards
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The Ethernet standards
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The Ethernet standards
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: The Ethernet standards
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME: Basic components of an Ethernet link
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Ports and connectors
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:

• The color coding of the wire pairs in an UTP cable is determined by the type of standard that is
used to make the cable.
• Different standards have different purposes and are closely governed by the standards
organizations.

• There are two standards that are widely implemented for


typical Ethernet installations.
• The TIA/EIA organization defines two different patterns,
or wiring schemes, called T568A and T568B.
• Each wiring scheme defines the pinout, or order of wire
connections, on the end of the cable.
• One of the two wiring schemes (T568A or T568B) should
be chosen for a network installation.
• It is important that the same wiring scheme is used for
every termination in that project.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Estandard T-658
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs transmit and receive pairs
SUBTHEME:

• Ethernet NICs and the ports on networking devices are designed to send data over UTP cables.
• Specific pins on the connector are associated with a transmit function and a receive function.
• The interfaces on each device are designed to transmit and receive data on designated wires
within the cable.

• When two unlike devices are directly connected using an UTP Ethernet cable, it is important
that the transmit function and the receive function on each end of the cable are reversed.
• This cable is called straight-through cable and it has the same color patterns on both ends
of the cable.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME: Straight-through Cable pinout
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Twisted pairs
SUBTHEME:
Chapter 4.- STRUCTURED CABLING
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME:
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME: Definition

• Definición de cableado estructurado.


Método de diseño y despliegue (instalación o implementación) para crear una
infraestructura conforme a normas y estándares para brindar servicios de voz,
audio, datos, video, automatización, etc.

Estándar. Conjunto de reglas que se utilizan como referencia ( de como se tiene


que hacer) para establecer compatibilidad y mejores prácticas, las cuales se
deben respetar para cumplir como un requisito mínimo para tener un
rendimiento adecuado de la infraestructura de red. Los fabricantes se deben de
apegar a estar recomendaciones y la única diferencia entre las marcas es la
calidad del producto.
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME: Basic concepts
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME: Basic concepts
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME: Basic concepts
Chapter 1. Basic Concepts Chapter 2. Phisical Layer Chapter 3. IPv4 Chapter 4. IPV6 Chapter 5. Switching Chapter 6. Routing
THEME: Structured Cabling
SUBTHEME: Basic concepts

• Ancho de banda. Capacidad de un conductor para transmitir un flujo


de información.
• Velocidad. Velocidad de transmisión de información. Bps
A mayor velocidad se requiere mayor ancho de banda
Chapter 5.- IN-BAND CONNECTION
Cisco IOS Access
Access Methods
• Console – A physical management
port used to access a device in
order to provide maintenance, such
as performing the initial
configurations.
• Secure Shell (SSH) – Establishes a
secure remote CLI connection to a
device, through a virtual interface,
over a network. (Note: This is the
recommended method for remotely connecting to a
device.)
• Telnet – Establishes an insecure
remote CLI connection to a device
over the network. (Note: User
authentication, passwords and commands are sent
over the network in plaintext.)
Chapter 6.- THE CISCO IOS
Cisco IOS Access
Operating Systems
• Shell - The user interface that allows users
to request specific tasks from the computer.
These requests can be made either through
the CLI or GUI interfaces.
• Kernel - Communicates between the
hardware and software of a computer and
manages how hardware resources are used
to meet software requirements.
• Hardware - The physical part of a computer
including underlying electronics.
Cisco IOS Access
Purpose of an OS CLI-based network operating system enables a
PC operating system enables a network technician to do the following:
user to do the following: • Use a keyboard to run CLI-based
• Use a mouse to make selections and network programs
run programs • Use a keyboard to enter text and text-
• Enter text and text-based commands based commands
• View output on a monitor • View output on a monitor
IOS Navigation
Primary Command Modes
User EXEC Mode:
• Allows access to only a
limited number of basic
monitoring commands
• Identified by the CLI prompt
that ends with the > symbol

Privileged EXEC Mode:


• Allows access to all commands and
features
• Identified by the CLI prompt that
ends with the # symbol
IOS Navigation
Configuration Mode and Subconfiguration Modes
Global Configuration Mode:
• Used to access configuration
options on the device

Line Configuration Mode:


• Used to configure console,
SSH, Telnet or AUX access

Interface Configuration Mode:


• Used to configure a switch port
or router interface
IOS Navigation
Navigation Between IOS Modes
• Privileged EXEC Mode:
• To move from user EXEC mode to
privilege EXEC mode, use the enabled
command.
• Global Configuration Mode:
• To move in and out of global
configuration mode, use the configure
terminal command. To return to
privilege EXEC mode, use the exit
command.
• Line Configuration Mode:
• To move in and out of line configuration
mode, use the line command followed
by the management line type. To return
to global configuration mode, use the
exit command.
IOS Navigation
Navigation Between IOS Modes (Cont.)
Subconfiguration Modes:
• To move out of any subconfiguration
mode to get back to global configuration
mode, use the exit command. To return
to privilege EXEC mode, use the end
command or key combination Ctrl +Z.

• To move directly from one


subconfiguration mode to another, type in
the desired subconfiguration mode
command. In the example, the command
prompt changes from (config-line)# to
(config-if)#.
2.3 The Command Structure
The Command Structure
IOS Command Syntax Check
A command might require one or more arguments. To determine the keywords and
arguments required for a command, refer to the command syntax.
• Boldface text indicates commands and keywords that are entered as shown.
• Italic text indicates an argument for which the user provides the value.

Convention Description
boldface Boldface text indicates commands and keywords that you enter literally as shown.

italics Italic text indicates arguments for which you supply values.

[x] Square brackets indicate an optional element (keyword or argument).

{x} Braces indicate a required element (keyword or argument).

Braces and vertical lines within square brackets indicate a required choice within an
[x {y | z }]
optional element. Spaces are used to clearly delineate parts of the command.
 The command is ping and the user-defined
argument is the ip-address of the destination
device. For example, ping 10.10.10.5.

 The command is traceroute and the user-


defined argument is the ip-address of the
destination device. For example, traceroute
192.168.254.254.

 If a command is complex with multiple arguments, you may see it represented like this:
The Command Structure
Hot Keys and Shortcuts (Cont.)
• The table below is a brief list of keystrokes to enhance command line editing.

Keystroke Description
Tab Completes a partial command name entry.

Backspace Erases the character to the left of the cursor.

Left Arrow or Ctrl+B Moves the cursor one character to the left.

Right Arrow or Ctrl+F Moves the cursor one character to the right.

Recalls the commands in the history buffer, beginning with the


Up Arrow or Ctrl+P
most recent commands.
The Command Structure
Hot Keys and Shortcuts
• When a command output produces more text than
can be displayed in a terminal window, the IOS will • The table below lists commands that can be
display a “--More--” prompt. The table below
used to exit out of an operation.
describes the keystrokes that can be used when this
prompt is displayed.

Keystroke Description Keystroke Description


When in any configuration mode, ends the configuration
Enter Key Displays the next line. Ctrl-C
mode and returns to privileged EXEC mode.

When in any configuration mode, ends the configuration


Ctrl-Z
Space Bar Displays the next screen. mode and returns to privileged EXEC mode.

All-purpose break sequence used to abort DNS lookups,


Ctrl-Shift-6
Ends the display string, returning to traceroutes, pings, etc.
Any other key
privileged EXEC mode.

Note: To see more hot keys and shortcuts refer to 2.3.5.


Chapter 7.- CISCO DEVICE CONFIGURATION
Basic Device Configuration

Device Names
Basic Device Configuration
Device Names
• The first configuration command on any device
should be to give it a unique hostname.
• By default, all devices are assigned a factory
default name. For example, a Cisco IOS switch
is "Switch.”

• Guideline for naming devices:


• Start with a letter
• Contain no spaces
Note: To return the switch to the
• End with a letter or digit default prompt, use the no
• Use only letters, digits, and hostname global config
dashes command.
• Be less than 64 characters in
length
Basic Device Configuration
Device Names
• The first configuration command on any device should be to give it
a unique hostname.
• By default, all devices are assigned a factory default name. For
example, a Cisco IOS switch is "Switch.”

• Guideline for naming devices:


• Start with a letter
• Contain no spaces Note: To return the switch to the default
• End with a letter or digit prompt, use the no hostname global config
command.
• Use only letters, digits, and dashes
• Be less than 64 characters in length
Basic Device Configuration
Password Guidelines
• The use of weak or easily guessed passwords are a security concern.
• All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and
remote Telnet access with passwords. In addition, all passwords should be encrypted and legal
notifications provided.

• Password Guidelines:
• Use passwords that are more than eight characters
in length.
• Use a combination of upper and lowercase letters,
numbers, special characters, and/or numeric Note: Most of the labs in this course use simple
sequences. passwords such as cisco or class. These passwords are
considered weak and easily guessable and should be
• Avoid using the same password for all devices. avoided in production environments.
• Do not use common words because they are easily
guessed.
Basic Device Configuration
Configure Passwords
Securing user EXEC mode access:
• First enter line console configuration mode
using the line console 0 command in global
configuration mode.
• Next, specify the user EXEC mode password
using the password password command.
• Finally, enable user EXEC access using
the login command.

Securing privileged EXEC mode access:


• First enter global configuration mode.
• Next, use the enable secret password command.
Basic Device Configuration
Configure Passwords (Cont.)
Securing VTY line access:
• First enter line VTY configuration mode
using the line vty 0 15 command in
global configuration mode.
• Next, specify the VTY password using
the password password command.
• Finally, enable VTY access using
the login command.

 Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco switches
support up to 16 VTY lines that are numbered 0 to 15.
Basic Device Configuration
Encrypt Passwords  Use the show running-config command to
verify that the passwords on the device are
now encrypted.
• The startup-config and running-config files
display most passwords in plaintext.
• To encrypt all plaintext passwords, use
the service password-encryption global
config command.
https://www.ifm.net.nz/cookbooks/passwordcracker.html
Basic Device Configuration
Banner Messages
• A banner message is important to
warn unauthorized personnel from
attempting to access the device.
• To create a banner message of the The banner will be displayed on attempts to access the device.
day on a network device, use
the banner motd # the message of
the day # global config command.

Note: The “#” in the command syntax is called the


delimiting character. It is entered before and after
the message.
Save Configurations
Configuration Files
• There are two system files that store the device configuration:
• startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands
that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is
powered off.
• running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration.
Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile
memory. It loses all of its content when the device is powered off or restarted.
• To save changes made to the running configuration to the startup configuration file, use the copy running-
config startup-config privileged EXEC mode command.
Save Configurations
Alter the Running Configurations
If changes made to the running config do not
have the desired effect and the running-
config has not yet been saved, you can
restore the device to its previous
configuration. To do this you can:
• Remove the changed commands individually.
• Reload the device using the reload command in
privilege EXEC mode. Note: This will cause the
device to briefly go offline, leading to network
downtime.
If the undesired changes were saved to the
startup-config, it may be necessary to clear all
the configurations using the erase startup-
config command in privilege EXEC mode.
• After erasing the startup-config, reload the
device to clear the running-config file from
RAM.
Save Configurations
Capture Configuration to a Text File
Configuration files can also be saved and
archived to a text document.
• Step 1. Open terminal emulation
software, such as PuTTY or Tera Term,
that is already connected to a switch.
• Step 2. Enable logging in to the terminal
software and assign a name and file
location to save the log file. The figure
displays that All session output will be
captured to the file specified (i.e.,
MySwitchLogs).
Save Configurations

Capture Configuration to a Text File (Cont.)


• Step 3. Execute the show running-
config or show startup-config command
at the privileged EXEC prompt. Text
displayed in the terminal window will be
placed into the chosen file.
• Step 4. Disable logging in the terminal
software. The figure shows how to
disable logging by choosing
the None session logging option

Note: The text file created can be used as a record of how the
device is currently implemented. The file could require editing
before being used to restore a saved configuration to a device.
Reset password and configuration on a Router Cisco
Chapter 8.- IPv4
Hierarchical Network Design
Physical and Logical Addresses

Both a physical address and logical IP address are needed for a device to communicate on an Ethernet
network.
• A physical address (MAC address) does not change.
• Burned into the NIC
• A logical address (IP address) can change and is commonly assigned by a network administrator.
• Two parts: network and host

Logical
addressing

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 232
Types of IPv4 Addresses
Legacy Classful Addressing
Address range 127.0.0.0 - 127.255.255.255
Used to test the network stack (think OSI, TCP/IP model) on the local device
IPv4 Address Structure
The Prefix Length  The Prefix Length:
• Shorthand method of expressing
the subnet mask.
• Equals the number of bits in the
subnet mask set to 1.
• Written in slash notation, /
followed by the number of
network bits.
Types of IPv4 Addresses
Public and Private IPv4 Addresses
• Private Addresses
• Not routable
• Introduced in mid 1990s due to depletion of IPv4
addresses
• Used only in internal networks.
• Must be translated to a public IPv4 to be routable.
• Defined by RFC 1918
• Private Address Blocks
• 10.0.0.0 /8 or 10.0.0.0 to 10.255.255.255
• 172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
192.168.0.0 /16
• 192.168.0.0 to 192.168.255.255
• Link-Local addresses (169.254.0.0 /16 or
169.254.0.1)
• Commonly known as Automatic Private IP
Addressing (APIPA) addresses.
• Used by Windows client to self configure if no
DHCP server available.
RFC 1918 “Address Allocation for Private IP”

CLASS RFC 1918 Range CIDR Prefix


A 10.0.0.0 - 10.255.255.255 10.0.0.0/8
B 172.16.0.0 - 172.31.255.255 172.16.0.0/12
C 192.168.0.0 - 192.168.255.255 192.168.0.0/16
Chapter 9.- ARP
Chapter 10.- THE PACKET
MAC and IP
Destination on Same Network
There are two primary addresses assigned to a device on an Ethernet LAN:
• Layer 2 physical address (the MAC address) – Used for NIC to NIC communications on the same
Ethernet network.
• Layer 3 logical address (the IP address) – Used to send the packet from the source device to the
destination device.
Layer 2 addresses are used to deliver frames from one NIC to another NIC on the same network. If a
destination IP address is on the same network, the destination MAC address will be that of the
destination device.
Data Access
Layer 3 Logical Address
The IP packet contains two IP addresses:
• Source IP address - The IP address of
the sending device, original source of
the packet.
• Destination IP address - The IP
address of the receiving device, final
destination of the packet.
These addresses may be on the same link or
remote.
Chapter 11.- Introduction to IPv6
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: IPv4 and IPv6 comparision

Taken from “31 days before your CCNA exam” book


THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Topology
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: IPv6 Address format
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: IPV6 address on Windows
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: IPv6 Address types
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: IPv6 Address types

An IPv6 global unicast address (GUA) is a globally unique and routable IPv6 address. It is equivalent to
a public IPv4 address. A GUA begins with either a hexadecimal 2 or 3. A GUA can be either a source or
destination IPv6 address. The following is an example of a global unicast address:

2001:db8:cafe:1::200 / 64

A link-local address is a unicast address that is local only on that link. The term link refers to a logical
network segment or subnet. Link-local addresses are limited to the particular link and are not routable
beyond the local subnet. An IPv6 device doesn’t have to have a global unicast address but it must have
a link-local address. In other words, any device that is IPv6-enabled requires a link-local address. The
device must be capable of self-generating the link-local address on the IPv6-enabled interface. Link-
local addresses commonly begin with fe80, as in this example:

fe80::a299:9bff:fe18:00dd

Link-local addresses are typically created automatically by the host operating system, which is why you
see these addresses already configured on the computer.
Your text here
2000:db8:CAFE::/48 2000:db8:CAFE:4:/64
2000:db8:CAFE:2:/64

2000:db8:CAFE:1:/64

2000:db8:CAFE:3:/64

2000:db8:CAFE:6:/64
2000:db8:CAFE:5:/64
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Topology
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Configuring IPv6 on a CISCO router
THEME: Introduction to IPv6 by configuring static routes
SUBTHEME: Configuring IPv6 static routes on a CISCO router
Chapter 12.- VIRTUAL AREA NETWORK
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Flat LAN (No segmentation)
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Characteristics
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Explanation
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Access ports and Trunk ports
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: ETHERNET FRAME
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: DTP Dynamic Trunk Protocol
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NETWORK USING VLAN’S (SEGMENTED NETWORK))
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NETWORK USING VLAN’S (SEGMENTED NETWORK))
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NETWORK USING VLAN’S (SEGMENTED NETWORK))
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: NVLAN Data Frame)
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: One phisical Router Interface for each VLAN
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: One phisical Router Interface for each VLAN
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Router on a stick
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Router on a steak (creating subinterfaces in the router
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: VLAN Routing with ASA
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: The best configuration
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: The best configuration
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: The best configuration
THEME: VLAN (VIRTUAL L0CAL AREA NETWORK)
SUBTHEME: Switch Virtual Interface (SVI) on SW Layer 3
Chapter 13.- STP PROTOCOL

You might also like