Prep v1 Aug 18 2024
Prep v1 Aug 18 2024
1. Network Fundamentals
• 1.1 Explain the role and function of network components
o Routers
Sending data in network using routing table
o Layer 2 and Layer 3 switches
Forwarding data to every device in the same LAN or VLAN
o Next-generation firewalls and Intrusion Prevention System (IPS)
Provide security by inspecting traffic
o Access points
Connecting wired and wireless devices
o Controllers (Cisco DNA Center and WLC)
Cisco DNA Center: management, automation, policy enforcement,
and analytics both wired and wireless networks.
...
5 minute input rate 1000 bits/sec, 5 packets/sec
- **Functionality:**
- Used to configure Switched Virtual Interfaces (SVIs) for VLANs.
- Commands include `ip address`, `no shutdown`, etc.
### 10. **Access Control List (ACL) Configuration Mode (`(config-acl)#`):**
- **Exists by Default:** No, needs to be created.
- **How:** ACLs are created manually by entering the ACL configuration
command:
```shell
Router(config)# ip access-list extended MY_ACL
```
- **Functionality:**
- **Traffic Filtering:** ACLs control which packets are allowed or denied, either
on the inbound or outbound interfaces.
- **Security:** Helps prevent unauthorized access and can block malicious
traffic.
- **QoS:** Used to identify traffic for Quality of Service (QoS) purposes.
- **Route Filtering:** Used in conjunction with routing protocols to control
which routes are advertised or received.
### 11. **Control Plane Policing (CoPP) Configuration Mode (`(config-cp-
policer)#`):**
- **Exists by Default:** No, needs to be created.
- **How:** You must define a policy map and apply it to the control plane:
Router(config)# policy-map MY_POLICY
Router(config-cp)# class-map MY_CLASS
Router(config)# control-plane
Router(config-cp)# service-policy input MY_POLICY
- **Functionality:**
- Control Plane Protection: CoPP protects the control plane from excessive
traffic or attacks by limiting the rate of specific types of traffic.
- Traffic Classification: Allows you to classify and prioritize control plane traffic.
- Rate Limiting: Applies rate limiting to control plane traffic, preventing any
single type of traffic from overwhelming the control plane.
### 12. **VRF Configuration Mode (`(config-vrf)#`):**
Exists by Default : No
- Create VRF Router(config)# ip vrf CUSTOMER_A
- **Functionality:**
- **Network Segmentation:** VRFs segment a network into different routing
domains.
- **Multi-Tenancy:** Enables different customers or departments to have their
own isolated routing tables.
- **Overlapping IP Addresses:** Allows different VRF instances to use
overlapping IP address spaces without conflict.
- **Route Import/Export:** Controls which routes are shared between
different VRFs using Route Targets.
2. Network Access
• 2.1 Configure and verify VLANs (normal range) spanning multiple
switches
o Access ports (data and voice)
o Default VLAN
o InterVLAN connectivity
Configuring and Verifying VLANs Spanning Multiple Switches
1. Create VLANs on Each Switch:
For each switch:
1. Enter global configuration mode.
2. Create the necessary VLAN(s).
3. Assign a name to each VLAN.
4. Exit VLAN configuration mode.
Switch(config)# vlan <VLAN_ID>
Switch(config-vlan)# name <VLAN_NAME>
If using a router:
1. Create subinterfaces for each VLAN on the physical interface connected to the
switch.
2. Configure 802.1Q encapsulation and assign IP addresses to each subinterface.
3. Verify that the subinterfaces are up.
Router(config)# interface <interface>.<VLAN_ID>
Router(config-if)# encapsulation dot1Q <VLAN_ID>
Router(config-if)# ip address <IP_ADDRESS> <SUBNET_MASK>
6. Verify Configuration:
- On each switch
1. Check VLAN configuration.
2. Verify the status of VLAN interfaces.
3. Confirm trunk and access port configurations.
Switch# show vlan brief
Switch# show interfaces trunk
Switch# show interfaces status
# Summary
1. Create VLANs** on all switches.
2. Assign VLANs to access ports** for data and voice traffic.
3. Configure trunk links** between switches.
4. Enable InterVLAN routing** on a Layer 3 switch or router.
5. Verify configuration** using show commands on both switches and routers.
• 2.2 Configure and verify interswitch connectivity
o Trunk ports
o 802.1Q
o Native VLAN
3. IP Connectivity
• 3.1 Interpret the components of routing table
Example
D 10.1.1.0/24 [90/2170112] via 192.168.1.2, 00:00:20, Ethernet0
o Routing protocol code Identifies the protocol that learned the route
C : Connected (Directly connected networks)
S : Static (Manually configured routes)
D : EIGRP (Enhanced Interior Gateway Routing Protocol)
O : OSPF (Open Shortest Path First)
R : RIP (Routing Information Protocol)
B : BGP (Border Gateway Protocol)
EIGRP
Router(config)# router eigrp 1
Router(config-router)# no auto-summary
Router(config-router)# passive-interface g2/0
Router(config-router)# network 10.0.0.0
o Configuration
Router(config)# router ospf 1
*Note that unlike EIGRP AS number, routers with diffrerent OSPF process IDs
(in this example = 1) can become OSPF neighbours.
Router(config-router)# network 10.0.12.0 0.0.0.3 area 0
**Note that we have to own (e.g. registered by service) 100.0.0.1 to be able to use it.
Table
Router#show ip nat translation
Statistics
Router#show ip nat statistics
Pools
• 4.2 Configure and verify NTP operating in a client and server mode
Network Time Protocol (NTP) is used to synchronize the clocks of network devices
with a reliable time.
• NTP Server: A device that provides time information to other devices.
• NTP Client: A device that receives time information from an NTP server
The stratum number indicates the distance from the reference clock. Lower
numbers are more accurate
Router(config)# ntp master [stratum number]
Show command
Router# show ntp status
Router# show ntp association
From reddit: “Let me give you a clear example of why having time be synchronous
across all the devices in the network matters.
How do you write concurrent software that naturally scales to multiple cores
when they are available?
If you don’t have sufficiently synchronized clocks, you just can’t make stuff like this
work. And it’s really, really hard to synchronize much tighter than a few
milliseconds”
• 4.3 Explain the role of DHCP and DNS within the network
Dynamic Host Configuration Protocol (DHCP): Reduces the need for manual IP
configuration. Ensures devices receive correct network parameters
automatically.
• Purpose: DHCP automates the process of assigning IP addresses, subnet
masks, gateways, and other network parameters to devices on a network.
• DHCP Server: Assigns IP addresses to clients.
• DHCP Client: Receives IP configuration from a DHCP server.
Domain Name System (DNS):
• Purpose: DNS translates domain names (like www.example.com) into IP
addresses, allowing users to access websites using easy-to-remember
names instead of numerical IPs.
• 4.5 Describe the use of syslog features including facilities and levels
Feature used to log events (e.g. interface up/down) It can be displayed in CLI or
saved in the device RAM or sent to an external Syslog server.
seq : time stamp : %facility-severity-MNEMONIC : description
Sequence and Time stamp: order and time of the message being generated.
Facility: The part of the system that generated the message.
Severity: The importance of the message.
Mnemonic: A code that provides more detail about the message.
Common Facilities
• AUTH Authentication messages.
• SYS System-related messages.
• IF Interface-related messages.
• ROUT Routing-related messages.
• SEC Security-related messages.
• SYSLOG Messages from the syslog process itself.
• LINEPROTO Line protocol changes.
• OSPF Open Shortest Path First (OSPF) protocol messages.
• SNMP Simple Network Management Protocol messages.
• BGP Border Gateway Protocol messages.
• IP IP protocol-related messages.
Severity Levels
• 0 – Emergency System is unusable.
• 1 – Alert Immediate action required.
• 2 – Critical Critical conditions.
• 3 – Error Error conditions.
• 4 – Warning Warning conditions.
• 5 – Notice Normal but significant condition.
• 6 – Informational Informational messages.
• 7 – Debug Debug-level messages.
Common Mnemonics
• UPDOWN Indicates an interface state change (e.g., up or down).
• LINK-3-UPDOWN Indicates a change in the status of an interface.
• SEC-6-IPACCESSLOGP Indicates a packet was logged by an IP access list.
• CONFIG_I Configuration commands were entered.
• COPY Configuration was copied to/from the device.
• OSPF-5-ADJCHG OSPF adjacency change.
• SNMP-3-AUTHFAIL SNMP authentication failure.
• 4.7 Explain the forwarding per-hop behavior (PHB) for QoS, such as
classification, marking, queuing, congestion, policing, and shaping
• 5.3 Configure and verify device access control using local passwords
• 5.10 Configure and verify WLAN within the GUI using WPA2 PSK
6. Automation
• 6.1 Explain how automation impacts network management