Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 111

Cisco CCNA

Network Training
U Aung Khaing

- Bachelor of Sciences ( Physics )


Professional Experience
- Diploma in Network Engineering (Yangon University)
- More than 13 years IT Experiences
- Diploma in Computing (UK)
- Former Director at Right Way Technologies Co.,Ltd
- Cisco Certified Network Associate (CCNA)
- Former Head of Center at Y-Max University
- Cisco Certified Network Professional (CCNP)
- Over 10 years Teaching Experience
- ICSI|CNSS Certified Network Security Specialist

- MikroTik Certified Network Associate (MTCNA)

- Microsoft Certified Professional (MCP)


Y-Max University (YMU)

Chapter-1
Networking Fundenmental
 Network Basic
 Networking Hardware
 Network Characteristics
 Host To Host Communication:
 MAC Address
 TCP / UDP Protocols
 IP Addressing
 Subnetting
3
 The Cisco IOS Operating System
Y-Max University (YMU)

What is a Network?
 A network consists of two or more computers that are linked in order to share
resources
 exchange files,
 (such as printers and CDs/DVDs), Drive HDD Storage
 allow electronic communications.
 game ML

 The computers on a network may be linked through


 Cables (copper , fiber optic)
 radio waves
 Satellites

4
Y-Max University (YMU)

Networking hardware:

Computers need networking hardware in order to connect to each other.

Here is the common network device list:


 Hub
 Switch
 Router
 Bridge
 Modem
 Repeater
 Access Point
 NICs (Netwrok Interface Cards)

5
Y-Max University (YMU)
Hub
 Hubs connect multiple computer networking devices together.

 A hub has no intelligence on where to send information

 Hub cannot learn MAC Address

 broadcasts all network data across each connection.

 Devices on a hub function as a network segment and share a collision domain

 having all information broadcast to multiple ports can be a security risk

 Hubs operate in half-duplex

6
Y-Max University (YMU)

Types of hubs
 Active hubs repeat and strengthen incoming transmissions. They are also
sometimes referred to as repeaters.

 Passive hubs simply serve as a point of connectivity, without any additional


capabilities.

 A third designation, intelligent hubs, is synonymous with a switch.


Y-Max University (YMU)

Switch
 Switches generally have a more intelligent role than hubs.

 A switch is a multiport device that improves network efficiency.

 Strands of LANs are usually connected using switches.

 Network switch determines where to send each incoming message frame by


looking at the physical device address (also known as the Media Access
Control address or MAC address).

 Switch can learn MAC Address

 Switch work with MAC table

 Switch have a lot of communication collisions.

 Switch operate in half-duplex


Y-Max University (YMU)

Types of networking switches


 A managed switch which lets a user adjust each port on the switch, allowing
monitoring and configuration changes.

 An unmanaged switch which allows Ethernet devices to pass data automatically


utilizing auto-negotiation (which determines parameters such as the data rate).
The configuration is fixed and cannot be edited.
Y-Max University (YMU)
Router
 A router is connected to at least two different networks, commonly two
LANs or WANs or a LAN and its ISP's network.

 Routers are located at gateways, the places where two or more networks
connect.

 Router work with Routing Table

 Routers are intelligent devices, and they store information about the
networks they’re connected to
Y-Max University (YMU)
Types of routers
 Core routers used by Internet Service Providers (ISPs) are the fastest and
most powerful,

 An edge router, also known as an access router, is a lower-capacity device.


Home and small office routers are considered subscriber edge routers.

 A wireless router works in the same way as the router in a hard-wired home
or business local area network (LAN),
Y-Max University (YMU)
Bridge
 Bridges are used to connect two or more hosts or network segments
together.

 They use hardware Media Access Control (MAC) addresses for transferring
frames.

 Bridges can also be used to connect two physical LANs into a larger logical
LAN.
Y-Max University (YMU)
Modem
 Modem is short for "Modulator-Demodulator.

 It converts or "modulates" an analog signal from a telephone or cable wire to


digital data (1s and 0s) that a computer can recognize.

 Similarly, it converts digital data from a computer or other device into an analog
signal that can be sent over standard telephone lines.

 The first modems were "dial-up

 Modern modems are typically


DSL or cable modems, which are
Considered "broadband" devices.
Y-Max University (YMU)
Repeater
 A repeater is an electronic device that amplifies the signal it receives.

 In electromagnetic media, repeaters overcome the attenuation caused by


free-space electromagnetic-field divergence or cable loss.

 In a wireless communications system, a repeater consists of a radio receiver,


an amplifier, a transmitter, an isolator, and two antennas.
Y-Max University (YMU)

Access Point
 An access point is a device that creates a wireless local area network, or
WLAN, usually in an office or large building

 An access point connects to a wired router, switch, or hub via an Ethernet


cable, and projects a Wi-Fi signal to a designated area.

 An AP is like an Ethernet hub,


A (Very) Basic Introduction to Networking

Internet
New York Boston

Wide Area
Network
Network Characteristics

Topology
Speed
Cost
Security
Availability
Scalability
Reliability
Host to Host Communications
Y-Max College (YMC)
MAC Address
A Unique Identifier assigned to network interfaces
Work at the data link layer
Also be known as Hardware Address or Physical Address
48-bit address
12 Hexadecimal digits, grouped in 6 pairs.

Example: 00 03 47 6F 5A 38

Organizationally Unique Universally Administered


Identifier (OUI) Addresses (UAA)
Y-Max College (YMC)
TCP and UDP Protocols
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) is
a transportation protocol that is one of the core protocols of the Internet
protocol suite. Both TCP and UDP work at transport layer TCP/IP model.

Difference between TCP and UDP Internet Protocols.


TCP UDP
Connection-Oriented Connectionless
Reliable Unreliable
Protocol number 6 Protocol number 17
Supports full duplex Does not support full duplex
Acknowledge segments No acknowledgement
The TCP Three-Way
Handshake

Sender Receiver
SYN

SYN-ACK

ACK
Y-Max College (YMC)
TCP/UDP Port Numbers

The port number = 16bits number


Maximum possible value = 65535
The port numbers are divided into three ranges:

Port Number Range Port Group


0 to 1023 Well Known Ports
1024 to 49151 Registered Ports
49152 to 65535 Private or Dynamic Ports
Y-Max College (YMC)
Common TCP/UDP Protocols and Ports
Application Protocol Port Numbers
FTP Data/Control TCP 20,21
SSH Remote Login Protocol TCP 22
Telnet TCP 23
Simple Mail Transfer Protocol (SMTP) TCP 25
Domain Name System (DNS) TCP/UDP 53
Dynamic Host Configuration Protocol (DHCP) UDP 67,68
Trivial File Transfer Protocol (TFTP) UDP 69
Hyper Text Transfer Protocol (HTTP) TCP 80
Post Office Protocol (POP3) TCP 110
Y-Max College (YMC)
Common TCP/UDP Protocols and Ports Cont..
Application Protocol Port Numbers
Network Time Protocol (NTP) UDP 123
NetBIOS TCP/UDP 137-139
Internet Message Access Protocol (IMAPv4) TCP 143
Simple Network Management Protocol (SNMP) UDP 161
Border Gateway Protocol (BGP) TCP/UDP 179
Apple Talk TCP/UDP 201
Lightweight Directory Access Protocol (LDAP) TCP 389
Hypertext Transfer Protocol over SSL/TLS (HTTPS) TCP 443
Microsoft DS (SMB) TCP 445
Y-Max College (YMC)
Common TCP/UDP Protocols and Ports Cont..
Application Protocol Port Numbers
Remote Shell (RSH) TCP 514
DHCPv6 UDP 546,547
LDAP over SSL/TLS TCP/UDP 636
FTP over SSL/TLS TCP 989/990
IMAPv4 over SSL/TLS TCP 993
POP3 over SSL/TLS TCP 995
Microsoft Terminal Server (RDP) TCP/UDP 3389
HTTP Proxy TCP 8080
VMware Server TCP 8200
Y-Max University (YMU)

IP Addressing
Y-Max University (YMU)

 What is IP Address.
 IP History and Management.
 Classes of IP Addresses.
 Subnet Mask.
 Valid and Invalid IP.
 IPv4 Addresses: Public & Private
 What is Subnetting.
 Types of Subnetting
- FLSM (Full Length Subnet Mask)
- VLSM (Variable Length Subnet Mask)
Y-Max University (YMU)

IP HISTORY AND
MANAGEMENT
Y-Max University (YMU)

The early years: 1981 – 1992


Y-Max University (YMU)

The boom years: 1992 – 2001

1992:
“It has become clear that … these problems are likely to become critical within the
next one to three years.” (RFC1366)

“…it is [now] desirable to consider delegating the registration function to an


organization in each of those geographic areas.” (RFC 1338)
Y-Max University (YMU)

Recent years: 2002 – 2009

2004:
Establishment of the
Number Resource Organisation
Y-Max University (YMU)

Address Management Today


IETF
IP
IANA

Allocation
RIR*
IETF : Internet Engineering Task Force
IANA : Internet Assigned Numbers Authority
Allocation
ISP

RIR : Representative of ISP Assignment


User
Y-Max University (YMU)

RIR (Regional Internet



Registries)
A regional Internet registry (RIR) is an organization overseeing the allocation and registration of
Internet Number resources within a particular region of the world. Resources include IP addresses.

There are currently five RIRs in operation:

 American Registry for Internet Numbers (ARIN) for North America and parts of the Caribbean
 RIPE Network Coordination Centre (RIPE NCC) for Europe, the Middle East and Central Asia
 Asia-Pacific Network Information Centre (APNIC) for Asia and the Pacific region
 Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and parts of
the Caribbean region
 African Network Information Centre (AfriNIC) for Africa
Y-Max University (YMU)

Introduction to TCP/IP
 What is TCP/IP?

TCP/IP is a standard protocol used between computers and network devices for
communication.
Y-Max University (YMU)

TCP/IP Addressing
 IP Address is logical address given to each and every device in the network
defined by IANA.
 Resides at OSI Layer-3 address (Network Layer).

 Two Versions of IP:


 IP version 4 (IPv4)
 IP version 6 (IPv6)
Y-Max University (YMU)

IPv4 Address Structure


 32-bit addressing system.
 IPv4 addresses are comprised of 4 octets.
 Dotted decimal notation is used to segment the octet.
 Each section contains a number between 0 and 255.
 Examples : 10.1.12.1, 172.16.1.1, 192.168.1.254
 Total number of IPv4 Address Space = 4,294,967,296 (4.3 Billions)
Y-Max University (YMU)

Classes of IP Addresses
Classes Range Binary

Class A 0.0.0.0 - 127.255.255.255 0xxxxxxx xxxxxxxx xxxxxxxx


xxxxxxxx
Class B 128.0.0.0 - 191.255.255.255 10xxxxxx xxxxxxxx xxxxxxxx
xxxxxxxx
Class C 192.0.0.0 -223.255.255.255 110xxxxx xxxxxxxx
xxxxxxxx xxxxxxxx
Class D 224.0.0.0 - 239.255.255.255 1110xxxx xxxxxxxx
xxxxxxxx xxxxxxxx
Class E 240.0.0.0 - 255.255.255.255 1111xxxx xxxxxxxx
xxxxxxxx xxxxxxxx
Y-Max University (YMU)

Subnet Mask

Helps identify network and host portion of network.

Default subnet masks:


Address Class Dotted Decimal Prefix

Class A 255.0.0.0 /8

Class B 255.255.0.0 /16

Class C 255.255.255.0 /24

Class D 255.255.255.255 /32

Class E None None


Y-Max University (YMU)

Network and Host Portions

 IP address is divided into Network and Host Portion.


8 bits 24 bits

 Class A Network Host Host Host

16 bits 16 bits
 Class B Network Network Host Host

24 bits 8 bits

 Class C Network Network Network Host


Y-Max University (YMU)

High-Order Bits

 Class addresses specified by the high-order bits:

 Class A (0)

 Class B (10)

 Class C (110)
Y-Max University (YMU)

Assignable IP Addresses
The number of assignable IP addresses in the various classes of IP addresses
shown in table.
Classes Range Binary Total number of Total number of
networks host

Class A 0.0.0.0 - 127.255.255.255 0xxxxxxx xxxxxxxx 128 16777216


xxxxxxxx xxxxxxxx

Class B 128.0.0.0 - 191.255.255.255 10xxxxxx xxxxxxxx 16384 65536


xxxxxxxx xxxxxxxx

Class C 192.0.0.0 -223.255.255.255 110xxxxx xxxxxxxx 2097152 256


xxxxxxxx xxxxxxxx

Class D 224.0.0.0 - 239.255.255.255 1110xxxx xxxxxxxx Reserved for Reserved for


xxxxxxxx xxxxxxxx Multicasting Multicasting

Class E 240.0.0.0 - 255.255.255.255 1111xxxx xxxxxxxx Reserved for Reserved for


xxxxxxxx xxxxxxxx Research and Research and
Development Development
Y-Max University (YMU)
Valid and Invalid IP
 When all the HOSTID portion bits of an IP address are zero’s then it is called Network Address.

class A 10.0.0.0
class B 172.16.0.0
class C 192.168.10.0

 When all the HOSTID portion bits of an IP address are one’s then it is called Broadcast Address.

class A 10.255.255.255
class B 172.16.255.255
class C 192.168.10.255

 When all the NETID as well as HOSTID portion bits of an IP address are 0’s then it is used for Default
Routing (CISCO Routers)

Address 0.0.0.0

 Loopback Addresses (Self Testing)

Address 127.0.0.0 255.0.0.0

 APIPA or Link Local Address

169.254.0.0/16
Y-Max University (YMU)

IPv4 Addresses: Public & Private

Private IP Public IP
Used with the LAN or within the Used on public network (Internet)
organization.

Not recognized on internet Recognized on internet

Given by the administrator Given by the service provider

Unique within the network Globally unique

Free of charge Pay to service provider

Unregistered IP Registered IP
Y-Max University (YMU)

Range of Private IP Address

 Defined in RFC 1918


 For internal use only
 Cannot be routed through the internet

Class Private IP Addresses CIDR Block Total Hosts


A 10.0.0.0 to 10.255.255.255 /8 16,777,216
B 172.16.0.0 to 172.31.255.255 /12 1,048,576
C 192.168.0.0 to 192.168.255.255 /16 65,536
Y-Max University (YMU)

Subnetting
Y-Max University (YMU)

Subnetting : A network is divided into several smaller networks with each subnetwork
(or subnet) having its subnetwork address
 Reasons:-
 Provides addressing flexibility for the network administrator.
-Each LAN must have its own network or subnetwork address.
 Provides some security since access to other subnets is only available through the
services of a router.
 Reduce the Wastage of IP Addresses
 Reduce network traffic
Y-Max University (YMU)

Subnetting
Class A, B, C in IP addressing are designed with two levels of hierarchy (not subnetted)

-Netid and Hostid


Y-Max University (YMU)

Subnetting (cont’d)
 Further division of a network into smaller networks called subnetworks
 R1 differentiating subnets
Y-Max University (YMU)

Subnetting (cont’d)
 Three levels of hierarchy : netid, subnetid, and hostid
Y-Max University (YMU)

Types of Subnetting

 FLSM (FIXED LENGTH SUBNET MASK)


 VLSM (VARIABLE LENGTH SUBNET MASK)
Y-Max University (YMU)

IP-SUBNET ZERO OR FLSM


 Subnetting is based up on NETID portion bits.
 In this case we need to borrow some bits from Host ID portion that depends up on the
number of subnets
 For e.g 192.168.10.0/26

Step 1: Identify the total number of subnets (how many)?


2n = number of subnets
22 = 4
Where n are the number of borrowed bits from hostId portion.

Step 2: Identify the the total number of hosts for each subnets (how many)?
2m - 2 = number of valid hosts
26 – 2 = 62
Where m are remaining number of bits in hostid portion.

Step 3: Calculate Subnet Mask and Range.


11111111 11111111 11111111 11000000
255 .255 .255 .192
Range:256 - 192 = 64
Y-Max University (YMU)

VLSM
 Subnetting is based up HostId portion bits.

 In this case we reserve some bits in hostid portion rest of the


bits will be in Netid portion bits.
 Subnet Mask vary for each subnet.
Y-Max University (YMU)

VLSM

Need 10 addresses /28. Give them 16.

Need 200 addresses /24. Give them 256.

Need 500 addresses /23. Give them 512.

Need 1000 addresses /22. Give them 1024.

Need 4000 addresses /20. Give them 4096.


Y-Max University (YMU)

Before VLSM
Need 10 addresses Class C. Give them
256.
Need 200 addresses Class C. Give them
256.
Need 500 addresses Class B. Give them
65,536.
Need 1000 addresses Class B. Give them
65,536.
Need 4000 addresses Class B. Give them
65,536.
The OSI Open Systems Interconnect Model

The OSI reference model is a standard of the International


Organization for Standardization (ISO).
It is a general-purpose framework that characterises and standardises
how computers communicate with one another over a network.
Its seven-layered approach to data transmission divides the operations
into specific related groups of actions at each layer.
A layer serves the layer above it and is served by the layer below it.
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7
6
5
4
3
2
1
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6
5
4
3
2
1

L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5
4
3
2
1

L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4
3
2
1

L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3
2
1

L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2
1

L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1

L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical Hubs

L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L2 L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L3 L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L4 L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L5 L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L6 L7
OSI Reference Model - Encapsulation

Layer Name Includes Devices


Sender Receiver
7 Application
6 Presentation
5 Session
4 Transport TCP/UDP, Port
3 Network IP Address Routers
2 Data-Link Ethernet MAC Address Switches
1 Physical

L7
OSI Model
Benefits
Engineers do not need to design a technology to work end to end from
top to bottom of the model. They can just focus on their layer of
expertise, and make sure they comply with the standards for the layers
above and below.
This leads to open standards and multi-vendor interoperability.
For example: If you’re an application developer, you can just focus on
the top three layers, the lower layers are the domain of network
engineers.
Troubleshooting is easier because you can analyse a problem in a
logical fashion layer by layer.
The OSI Open Systems Interconnect
Model
It’s difficult to overstate how important the OSI Model is to computer
networking.
As you become more experienced you will ‘think’ according to the OSI
model when you are troubleshooting or learning a new network
technology.
On the job you will hear technologies and problems being described
according to their OSI layer.
OSI
Acronyms
The Classic: Please Do Not Throw Sausage Pizza Away

Network Relevant: Please Don’t Need Those Stupid Packets Anyway

Us Relevant: Please Do Not Teach Students Pointless Acronyms

Useful: Please Do Not Take Sales People’s Advice

My Favourite: Please Do Not Touch Superman’s Private Area


The Upper OSI
Layers
Network engineers do not typically work directly with the upper 3
layers of the OSI model… but we still need to know what they do.
They are more relevant to application developers.
In this lecture I will primarily be giving you the Cisco definitions of the
layers.
Information included in the upper layers would include the Message
Body and Subject Line in an email message for example.
Layer 7 – The Application
Layer
• The application layer provides network services to the applications of
the user.
• It differs from the other layers in that it does not provide services to
any other OSI layer.
•The application layer establishes the availability of intended
communication partners.
• It then synchronizes and establishes agreement on procedures for
error recovery and control of data integrity.
Layer 6 – The Presentation
Layer
The presentation layer ensures that the information that is sent at the
application layer of one system is readable by the application layer of
another system.
The presentation layer can translate among multiple data formats
using a common format (eg computers with different encoding
schemes).
Layer 5 – The Session
Layer
• The session layer establishes, manages, and terminates sessions
between two communicating hosts.

• The session layer also synchronizes dialog between the presentation


layers of the two hosts and manages their data exchange.

• For example, web servers have many users, so there are many
communication processes open at any given time to track.

• It also offers efficient data transfer, CoS, and exception reporting of


upper layer problems.
The Lower OSI
Layers
Whereas Network engineers are not particularly interested in the
upper OSI layers, we are very concerned with the lower 4 layers of the
OSI model.

Each of these layers have their own dedicated section later and you
will learn much more detailed information about them throughout the
course.
Layer 4 – The Transport Layer
The main characteristics of the Transport layer are whether TCP or
UDP transport is used, and the port number.
Definition:
‒ The transport layer defines services to segment, transfer, and
reassemble the data for individual communications between the end
devices.
‒ It breaks down large files into smaller segments that are less likely to
incur transmission problems.
Layer 3 – The Network
Layer
The most important information at the Network layer is the source and
destination IP address.
Routers operate at Layer 3.
Definition:
‒ The network layer provides connectivity and path selection between
two host systems that may be located on geographically separated
networks.
‒ The network layer is the layer that manages the connectivity of hosts
by providing logical addressing.
Layer 2 – The Data-Link
Layer
The most important information at the Data-Link layer is the source
and destination layer 2 address.
For example the source and destination MAC address if Ethernet is the
layer 2 technology.
Switches operate at Layer 2.
Definition:
‒ The data link layer defines how data is formatted for transmission and
how access to physical media is controlled.
‒ It also typically includes error detection and correction to ensure a
reliable delivery of the data.
Layer 1 – The Physical
Layer
• The Physical layer concerns literally the physical components of
the network, for example the cables being used.
• Definition:
‒ The physical link enables bit transmission between end
devices.
‒ It defines specifications needed for activating, maintaining,

and deactivating the physical link between end devices.


‒ For example, voltage levels, physical data rates, maximum
transmission distances, physical connectors etc.
Unicast, Broadcast and Multicast
Traffic
There are 3 main IP traffic types: unicast, broadcast and multicast.

Unicast traffic is to a single destination host.

Broadcast traffic is to all hosts on the subnet.

Multicast traffic is to multiple interested hosts.


Unicast
Traffic

Sender
Broadcast
Traffic

Sender
Unicast Traffic to Multiple
Hosts

Sender
Multicast
Traffic

Sender
The Cisco IOS Operating System
A Short History of Cisco Operating
Systems
• Most people think of Cisco as primarily a routing and switching
company, but they actually started out with just routers in 1984.
• IOS is the operating system that has been used on Cisco routers since
their inception.
• Cisco Catalyst switches evolved from the acquisition of Crescendo in
1993.
• The original Cisco switch operating system was CatOS, which has now
been deprecated.
A Short History of Cisco Operating
Systems
• Cisco firewalls evolved from the acquisition of Network Translation’s
PIX firewall with Finesse operating system in 1995.
• Cisco switches and firewalls were ported over to the IOS operating
system over the following years.
Other Cisco Operating
Systems
• IOS remains as the operating system used on the majority of Cisco
enterprise grade network devices.
• Other operating systems have been developed for some more recent
router and switch platforms.
Other Cisco Operating
Systems
The Cisco Nexus and MDS data center switch product lines run on
NX-OS.
The IOS-XR operating system runs on the service provider NCS, CRS,
ASR9000 and XR12000 series routers.
IOS-XE runs on the ASR1000 series service provider routers.
The Command Line Interfaces for the other operating systems are
nearly identical to IOS.
Connecting to a Cisco Device over the
network
• The lab exercises in this course use Cisco Packet Tracer simulation
software on your PC.
• See Section 2 ‘How to Set Up the Lab’ for step by step instructions on
how to use Packet Tracer for the course lab exercises.
• This lecture shows how to connect to a real router or switch over the
network with Putty.
• You do not need to install or use Putty to do the course lab exercises.
Connecting over the
network
Connecting to a Cisco
Device
To get to the Command Line Interface for day to day management of a
Cisco device you will use Secure Shell (SSH) to connect to it’s management
IP address over the network.
Telnet is also supported but not recommended because it is insecure.
In enterprise networks, secure login will typically be enforced through
integration with a centralised AAA (Authentication, Authorization and
Accounting) server.
We will cover SSH and AAA in later lessons.
Connecting to a Cisco
Device
To get to the Command Line Interface for day to day management of a
Cisco device you will use Secure Shell (SSH) to connect to it’s management
IP address over the network.
Telnet is also supported but not recommended because it is insecure.
In enterprise networks, secure login will typically be enforced through
integration with a centralised AAA (Authentication, Authorization and
Accounting) server.
We will cover SSH and AAA in later lessons.
Out of Band
Management
Connecting to a Cisco
Device
• This lecture shows how to connect to a real router or switch over a
console connection with Putty.
• The lab exercises in this course use Cisco Packet Tracer simulation
software on your PC.
• You do not need to install or use Putty to do the course lab
exercises.
• See Section 2 ‘How to Set Up the Lab’ for step by step instructions on
how to use Packet Tracer for the course lab exercises.
Initial Connection to a Cisco
Device
Cisco devices do not usually have a default IP address, so we need to
set one up before we can connect to it over the network.
We need a way to connect to the device to do the initial configuration
including adding IP addresses. This is where the console connection
comes in.
The Console Cable (DB9 to
RJ45)
The New Console Cable (USB to Mini-
USB)
Console Connection Troubleshooting
• As well as for initial configuration, the console port can be used if the
device’s IP addresses become unresponsive.
• It can also be used to troubleshoot the bootup process. You can view
the device booting up from a console connection but this is not
possible with SSH because the system must have booted already
before the IP address will be live.
IOS Command Hierarchy
hostname> User Exec mode

hostname# Privileged Exec mode (‘Enable’)

hostname(config)# Global Configuration mode (‘Configure Terminal’)

hostname(config-if)# Interface Configuration mode (‘Interface x’)

‘Exit’ drops back down a level.

‘End’ drops back to Privileged Exec mode from any level.


Command Abbreviation

•You can type in a shortened version of a command.

•For example, ‘en’ instead of ‘enable’

•There must be only one possible match for what you typed for
abbreviation to succeed
Context Sensitive Help

•You can enter a question mark to access Help

•‘sh?’ will show all commands that begin with ‘sh’

•‘show ?’ will show all available keyword options for the ‘show’
command
•‘show ip ?’ will show all available keyword options for the ‘show ip
command’
Moving the Cursor

•Backspace deletes the previous character

•The arrow keys (˂ and ˃) move the cursor left and right one character
at a time

•Ctrl-A moves the cursor to the beginning of the line

•Ctrl-U deletes the whole line

•See http://etherealmind.com/cisco-ios-cli-shortcuts/
for more
Command History
The up and down arrows (˄ and ˅) cycle through previously entered
commands at the same level in the hierarchy.
Showing command output

•Enter will show ‘show’ command output which scrolls off the end of the
page line by line.
•The Spacebar will show it page by page.

•Ctrl-C will break out of the show command output and return to the
command prompt.
Piped Command Examples
show running-config interface FastEthernet0/0

show running-config | begin FastEthernet0/0

show running-config | include FastEthernet0/0

show running-config |exclude FastEthernet0/0

show running-config | section interface


Configuration Storage Locations
The IOS operating system image is stored in Flash.

The Startup Configuration is stored in NVRAM.

The Running Configuration is stored in RAM. (Loaded into RAM from


the Startup Config when the device boots up.)
Saving the Configuration

• Commands take effect immediately but are not persistent across a


reboot.
• Enter ‘copy running-config startup-config’ to make the configuration
persistent.
• Enter ‘wr erase’ or ‘erase startup-config’ and then ‘reload’ to delete the
starting configuration and factory reset the device.

You might also like