1 |Page
CCNA Exam Topics
ICND 1 Topics Cover Describe the operation of data network Describe the purpose and functions of various network devices o PC NICs Personal Computer Network Interface Cards Purpose: Providing a hardware of network device in PC to communicate with network devices Functions: Layer 2 function, sending data on pins 1 and 2, receiving data on pins 3 and 6 Repeaters extended the length of LANs by cleaning up the electrical signal and repeating it (regenerating the electrical signals) Purpose: Regenerating the electrical signals on the same shared electrical bus Functions: Layer 1 function, sending data on pins 3 and 6, receiving data on pins 1 and 2 Hubs are like the repeaters with multiple physical ports, yet it is still created one shared electrical bus like the repeaters Purpose: Same as Repeats and provide a centralized connection for UTP cabling Functions: Layer 1 function, sending data on pins 3 and 6, receiving data on pins 1 and 2 Switches are improved devices of hubs with an intelligence logic Purpose: Functions: Layer 2 function, sending data on pins 3 and 6, receiving data on pins 1 and 2 Routers Purpose: Functions: Layer 3, sending data on pins 1 and 2, receiving data on pins 3 and 6 Wireless Access Point Purpose: Functions: Layer 3, sending data on pins 1 and 2, receiving data on pins 3 and 6 Networked Printers is a printer that connect directly to the LANs
Purpose: Providing LANs network an access to a printer on the network Functions: Layer 1, sending data on pins 1 and 2, receiving data on pins 3 and 6 Select the components required to meet a given network specification o Computers that have an Ethernet network interface card (NIC) installed o Either an Ethernet hub or Ethernet switch o UTP cables to connect each PC to the hub or switch Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
2 |Page Like TCP/IP, OSI defines processes by which a higher layer asks for services from the next lower layer. To provide the services, the lower layer encapsulates the higher layers data behind a header. o TCP/IP refers to various layers and their respective encapsulated data (Segment, Packet, and Frame) while OSI refers to various layers as PDU [Protocol Data Unit] (L7PDU L2PDU) Describe common networking applications including web application o HTTP, TELNET, FTP, SMTP, POP3, VoIP, SNMP o Describe the purpose and basic operation of the protocols in the OSI and TCP models o OSI Model consists of seven layers and each layer defines a set of typical networking functions. Also referenced other protocols that were already defined. Application provides an interface between the communications software and any applications that need to communicate outside the computer on which the application resides. It also defines processes for user authentication. Presentation defines and negotiates data formats, such as ASCII text, EBCDIC text, binary, BCD, and JPEG. Encryption also is defined by OSI as a presentation layer service. Session defines how to start, control, and end conversation (called sessions), include the control and management of multiple bidirectional messages. Transport provides a large number of service focuses on issues related to data delivery to another computer (for instance, error recovery and flow control) Network defines three main features: logical addressing, routing (forwarding), and path determination. Data Link defines the rules (protocols) that determine when a device can send data over a particular medium. Also define the format of a header and trailer that allows devices attached to the medium to send and receive data successfully. The data link trailer defines a Frame Check Sequence (FCS) field which allows the receiving device to detect transmission error. Physical refers to standards from other organizations, deal with the physical characteristics of the transmission medium, including connectors, pins and use of pins, electrical currents, encoding, light modulation, and the rules for how to activate and deactivate the use of the physical medium. o TCP/IP Model consists of four layers Application Layer combines of OSI Layers 5-7 Protocols: TELNET, HTTP, FTP, SMTP, POP3, VoIP, SNMP Devices: Firewall, Intrusion Detection System Transport Layer refers same details as OSI Transport Layer Protocols: TCP, UDP Internet Layer refers same details as OSI Network Layer Protocols: IP Devices: Router Network Access combines of OSI Layers 1-2
3 |Page Protocols: Ethernet (IEEE 802.3), HDLC, Frame Relay, PPP [DATA LINK LAYER 2] Devices: LAN switch, Wireless access point, Cable modem, DSL modem [DATA LINK LAYER 2] Protocols: RJ-45, EIA/TIA-232, V.35, Ethernet (IEEE 802.3) [PHYSICAL LAYER 1] Devices: LAN Hub, Repeater [PHYSICAL LAYER 1] Describe the impact of applications (Voice Over IP and Video Over IP) on a network o Describe the components required for network and Internet communication o Identify and correct common network problems at Layers 1, 2, 3, and 7 using a layered model approach o Ping Packet Internet Groper uses the Internet Control Message Protocol (ICMP) to test basic IP connectivity on Layer 1, 2, and 3 Implement an IP addressing scheme and IP services to meet network requirements for a small branch office Describe the need for and role of addressing in a network o Create and apply an addressing scheme to a network o Describe and verify DNS operation o Implement a small route network Describe basic routing concepts (including: packet forwarding, router lookup process) o Select the appropriate media, cables, ports, and connectors to connect routers to other network devices sand hosts o Identify security threats to a network and describe general methods to mitigate those threats Explain todays increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats o Explain general methods to mitigate common security threats to network devices, hosts, and applications o Describe the functions of common security appliances and applications o Describe security recommended practices including initial steps to secure network devices o
4 |Page
CCNA Exam Topics
ICND 2 Topics Cover Configure, verify and troubleshoot a switch with VLANs and interswitch communications Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q) o VTP VLAN Trunking Protocols provides a means by which Cisco switches can exchange VLAN configuration information. advertises about the existence of each VLAN based on its VLAN IDs and names defines a Layer 2 messaging protocol uses one of three modes: 1. Server Mode VLAN configuration to configure (synchronization in every 5 minutes) By default setting all new switches without configuration set this mode. 2. Client Mode to learn/update the configuration to change (synchronization in every 5 minutes) 3. Transparent Mode to ignore VTP; to forward the VTP messages defines three different types of message: 1. Summary Advertisement lists the revision number, domain name, and other information but no VLAN information 2. Subset Advertisement lists of VLAN information 3. Advertisement Request immediately requests VTP messages from neighboring when trunk comes up (connected) uses case-sensitive domain name/password By default setting, all new switches without configuration has no domain name/password automatically configured VLAN 1 and VLANs 1002-1005 (and cannot be deleted) By default By default setting, all new switches set all access interfaces are assigned to VLAN 1 (VTP)Pruning simply means that the appropriate switch trunk interface(s) do not flood frames in VLAN (By default, Cisco switches flood broadcast in each active VLAN out all trunks.) allows VTP to dynamically determine which switches do not need frames from certain VLANs increases the available bandwidth by restricting flooded traffics o RSTP o VLAN Virtual Local Area Network is a group of devices connected to one or more switches that are grouped into a single broadcast domain used by switches created multiple broadcast domains beneficial reasons of using: 1. creates more flexible designs by groups that work together, instead of by physical location 2. segments devices into smaller LANs (broadcast domains) 3. reduces the workload for the Spanning Tree Protocol (STP) by limiting a VLAN to a single access switch 4. enforces better security 5. separates traffic sent o (VLAN) Trunking uses VLAN tagging (VLAN ID), which the sending switch adds another header to the frame before sending it over the trunk have two protocols define headers which identify the VLAN ID:
5 |Page
1. ISL Inter-Switch Link which is fully encapsulates each original
Ethernet frame in an ISL header and trailer source/destination addresses use MAC addresses of the sending/receiving switch do not use a native VLAN Cisco proprietary which it can be used only between two Cisco switches that support ISL. 2. 802.1q see below to 802.1q outline Both protocols ISL/802.1q define VLAN header that has a VLAN ID, use 12bits of the VLAN header to number VLANs (VLAN ID value 0 4095) VLAN ID 1-1005 is normal range (can be used in all modes) VLAN ID 1006-4094 is extend range (can be used only in Transparent mode) Both protocols allow multiple STP (separate instance of STP for each VLAN, but with different implementation details) o PVSTP o 802.1q inserts an extra 4-byte VLAN header into original Ethernet frames header Opposites of ISL, the frame still has the same source/destination MAC addresses because the original header has been expanded which forces a recalculation of the original frame check sequence (FCS) field in Ethernet trailer FCS is based on the contents of the entire frame Uses a native VLAN (simply does not add header to frames in the native VLAN) IEEE standardizes protocols that relate to LANs Describe how VLANs create logically separate networks and the need for routing between them o VLANs create logically separate networks by grouping a single broadcast domain and placing connected devices in separate VLANs without requiring separate physical switches. o The need for routing between VLANs: At least one router IP subnets Create a new VLAN and Assign the new VLAN for each access interface VTP Encapsulation (Layer 2 protocols): ISL 802.1q Configure, verify, and troubleshoot VLANs o Configure VLANs: From configuration mode, use the vlan {vlan-id} From VLAN configuration mode, use the name {VLAN name} to assign name for the VLAN Use the interface {type of interface} to move into interface configuration mode Use the switchport access vlan {vlan-id} to specify the VLAN number associated with that interface o Verify VLANs: From privilege exec mode, use show vlan brief From privilege exec mode, use show running-config From privilege exec mode, use show interfaces switchport o Troubleshoot VLANs: From privilege exec mode, use show vlan brief (lists the vlans and interfaces in each vlan) From privilege exec mode, use show vlan id x (replace x with the vlan number you are looking at for status.)
6 |Page From privilege exec mode, use show spanning-tree vlan x (use this to check root id, discover possible loops) Configure, verify, and troubleshoot trunking on Cisco switches o Configure Trunking: From interface mode, use switchport mode trunk {access/trunk/dynamic desirable/dynamic auto} Access prevents the use of trunking Trunk always uses trunking Dynamic Desirable initiates negotiation messages and responds to negotiation messages, and defines the trunking encapsulation Dynamic Auto passively waits to receive trunk negotiation messages (Optional depends on switches)From interface mode, use switchport trunk encapsulation {dot1q/ISL} dot1q IEEE standardizes trunking protocol on switches by default ISL Cisco proprietary protocol on older switches, only works with another Cisco switches o Verify Trunking: From privilege exec mode, use show interfaces {type} switchport From privilege exec mode, use show interfaces trunk o Troubleshoot Trunking: From privilege exec mode, use show interfaces {type} switchport (looks at administrative mode, operational mode, and both trunking encapsulation, and trunking VLANs enabled) From privilege exec mode, use show interfaces trunk (looks at the lists shown each types) Configure, verify, and troubleshoot interVLAN routing o Configure interVLAN routing:
o o
Verify interVLAN routing:
Troubleshoot interVLAN routing:
Configure, verify, and troubleshoot VTP o Configure VTP: From global configuration mode, vtp mode {server/client/transparent} Server Mode VLAN configuration to configure (synchronization in every 5 minutes) By default setting all new switches without configuration set this mode. Client Mode to learn/update the configuration to change (synchronization in every 5 minutes) Transparent Mode to ignore VTP; to forward the VTP messages From global configuration mode, vtp domain {domain-name} From global configuration mode, vtp password {password} (Optional)From global configuration mode, vtp pruning to configure VTP pruning VTP pruning (Optional)From global configuration mode, vtp version 2 to enable VTP version 2 Lastly bring up trunks between the switches using above Configuring Trunking o Verify VTP: From privilege exec mode, show vtp status
7 |Page
From privilege exec mode, show vlan brief Troubleshoot VTP: From privilege exec mode, show vlan brief (to see where the interfaces assigned which VLANs and its status and ) From privilege exec mode, show interfaces trunk or show interfaces switchport or show cdp neighbors (to check the trunk links between two switches) From privilege exec mode, show vtp status (to check the configuration reversion, VTP operating mode, VTP domainname, VTP password in MD5 digest, and Configuration last modified by) Configure, verify, and troubleshoot RSTP operation o Configure RSTP operation: o o o
Verify RSTP operation:
Troubleshoot RSTP operation:
Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network. Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)