Beruflich Dokumente
Kultur Dokumente
Beginners
Introduction
Before taking the CCNA certification and other likewise certification exams, CCENT is a
good certification to track to start with. CCENT certification is one of the newest and
most highly-regarded certification that measures your knowledge about basic
networking concepts and Cisco devices. Most parts of the exam touches on network
management and their real-world applications.
Cisco technology has been widely adapted and used by other manufacturers of network
devices. Learning more about how Cisco devices operate gives you a good overview of
how likewise devices function both as an independent device and as a part of wide
expanse of network systems.
Cisco CCENT for Beginners is created to give a comprehensive guide to Network
managers such as probably yourself to pass the CCENT certification exam. This book
tries to veer away from technical jargon without compromising the understandability of
highly-technical concept. Most concepts are replete with examples that can be applied in
your work as network managers
The book is filled with the following:
Illustrations: For you to have a full understanding of how Cisco devices and
how most network system works, this book provides illustrative examples and
diagrams of all related concepts.
Assessment Activities: At the end of each parts of the book, there are
assessment activities that measure how much you have understood the concepts.
Obviously, the main goal of this book is to help you pass the certification exam but more
than that, this book is designed to help you when you need other non-conceptual
information like troubleshooting tips and network security principles.
This book is divided into six parts:
These six chapters cover all the major topics that are prominently figured in the CCENT
Certification exam. Unlike other materials that you can purchase in the bookstore or
download from the internet, this book is engaging because it uses a conversational tone.
The concepts are outlined without being detached to the subject matter. Aside from that,
this book uses special formatting to emphasize important concepts that you need to
know in preparation for the certification exam.
Concepts that are in:
Boldfaced concepts are topic markers. They are the main sections of each of
the chapter.
Italicized concepts are less important concepts but they may come out in the
exam.
Boldfaced and Italicized concepts are very important terms that you should
understand and remember as there is a good chance that the will be included in
the exam.
Should command guides be needed in a particular section, you can spot them easily
because they use a special font for easier reading and understanding.
Table of Contents
Introduction: About the Cisco CCENT Exam
Part 1: Networking Technologies
Chapter 1: Basics of Networking
Chapter 3: TCP/IP
25
35
51
57
75
75
78
80
83
85
85
85
85
Part 1:
Networking Technologies
Chapter 1
Basics of Networking
The network layer in both TCP/IP and Open Systems Interconnection network models is
called Layer 3.
Layer 3 (Network Layer)
Logical addresses or more popularly known as IP addresses are assigned by Network
Layer to all the devices connected to the network. These addresses are used to identify
Chapter 2
Network Devices and Services
Chapter 3
TCP/IP
Chapter 4
VLSM and Subnetting
Assessment Activity (Part 1):
Network Technologies
Part 2:
Cisco Technology
Chapter 5
Cisco IOS
Cisco invented a special operating system designed specifically for Cisco devices. This
operating system is called the Internetwork Operating System (IOS). The IOS is
different from the iOS, which is the operating system created by Apple Computers for
their mobile devices. Cisco IOS manages all the functions of Cisco devices including
routing, switching and maintaining security of the network where these devices are
connected. The sets of functions may differ depending on the IOS version being used.
Example: All Cisco IOS version before the 11.3 upgrade does not have a feature called Network
Address Translation (NAT), which is something that all newer IOS versions have configured .
IOS allows users, specifically network managers, to implement command codes when
interacting with the Cisco hardware. These commands can be encoded to the IOS using
the command-line interface (CLI).
Port Identification
There may be a lot of Cisco devices being sold and used today but these devices often
have the same ports consistent in most Cisco devices. These ports can be either an
auxiliary, console, seral or Ethernet ports.
This port connects the router to the computer host device through a cable
called console cable, otherwise known also as the rollover cable. This port
is where the instructions from the console or computer host enter the
router for device configuration and troubleshooting. On the side of the
computer host, the console cable is plugged in to the console port.
Establishing a wired connection between the router (or any Cisco network
device) and a computer host counts as a local connection. On the flipside,
establishing a non-wired connection between any Cisco device and a
computer is called remote connection. This is discussed in detail in
Chapter 2 (Network Devices and Services) of this book.
2. Auxiliary Port
Like a console port, an auxiliary port establishes a local connection using a
console cable connected usually to a modem. The modem then establishes
a remote connection with a device that can configure the router without
being physically near. This is particularly useful since almost all networks
existing today are connected to the internet.
3. Cisco Ethernet Port
Most routers these days transmit big bulks of data to and from the
computer host requiring an Ethernet connection with a speed of 10 Mbps
(Ethernet), 100 Mbps (Fast Ethernet) and 1000 Mbps (Gigabit Ethernet).
Example: Cisco 2501 only has a single Ethernet port. Instead of the usual RJ-45 port,
Cisco 2501 Ethernet port uses Attachment Unit Interface (AUI) port.
Some Ethernet port can use fiber connectors than faster than any of the
three speeds mentioned above. When managing network interfaces using
Ethernet port, the corresponding interface ID code must match the
Ethernet port type being used.
Ethernet Port Type
10 Gigabit Ethernet
(10 Gbps)
1 Gigabit Ethernet
(1000 Mbps)
Fast Ethernet
(100 Mbps)
Ethernet
(10Mbps)
Interface ID Code
TenGigabitEthernet0/1 or
TenGigabitEthernet0/0
GigabitEthernet0/1 or
GigabitEthernet0/0
FastEthernet0/1 or
FastEthernet0/0
Etherhet1 or Ethernet0
4. Serial Ports
These ports are responsible for establishing a stable connection between
the router and the Wide Area Network (WAN). Aside from WAN
Example: Establishing a firm connection between two branches that are far apart from
each other but are of the same company, requires the help of a telephone company or an
internet service provider. The infrastructure built by the telephone companies connects
the servers of these two branches so that data transmission and reception is easy.
connected locally through the console port to the computer or an SSH/ Telnet
remote connection. When using the interface, you can run any commands to
configure the properties of the Cisco device with an established connection with
the interface.
For instance, if you want to set the name of a router to something recognizable
while at the same time distinct, you can implement the following code:
Router01 > en
Router01 #config t
Instruction: Key in commands; only one per line. End
command with CTRL/Z
Router01 (config) #hostname SampleName
SampleName (config) #
Command Guide: Naming Cisco Devices
At first, CL1 can be frustrating to use. This is true for people who have little
experience coding commands. CL1 is an intuitive interface but it sometimes
needs a little getting used to before making it work for you flawlessly. Take note
that CCENT almost exclusively measures how much you know of the CL1
interface as the main tool used for configuring Cisco devices.
C:\>SSH 24.0.1.0
Establishing 24.0.1.0 ...
User Access Confirmation
Password:
SampleName >en
Password:
SamplName#
Command Guide: Establishing Remote Connection
When Cisco became aware that smaller networks are maintained by computer
users who do not have a background in coding, they devised a much simpler and
more understandable interface. This time it is with color and graphics to boot.
Newer Cisco device models often include an installer CD, which contains a
software called Security Device Manager (SDM), in the package.
Powered by Java, SDM uses the IP address of the router as input for its graphical
interface embedded in the software program from the CD. Once the computer
host and the device managed to establish a working connection, the SDM
appears, giving you options on the configuration settings of the Cisco device.
http://www.cisco.com/go/cna
Just like the Security Device Manager, CAN is a graphical interface that has been
in circulation earlier than SDM has. Port configuration for routers and VLAN
configuration for switches are SDM's specialty.
Memory Types
Each Cisco Device has been bestowed with a memory. The memory installed in a Cisco
device can differ from each other. In fact, the memory depends on the function exercised
by the router where the memory is installed.
All Cisco devices have ROM, because similar to its function in most computers,
ROM oversees the booting operation of the Cisco device. From the moment you
turn on a Cisco router, for instance, ROM initiates the startup operation. This
is a term referring to the process performed by a device on the onset of energy
passing through the processors. Self-checks and properties assessment are done
during the startup operation.
Flash Memory
This is where Cisco IOS is stored for safekeeping. Since the IOS receives regular
update, usually involving system upgrades, the Cisco IOS is stored in the flash
memory instead of in the ROM as it was in older Cisco devices. Had the IOS been
installed in the ROM, interface upgrades would not have been possible since
ROM cannot be rewritten to, unlike other kinds of memory. Flash memory is
integrated within the actual system board or in some cases, installed externally
with the use of a flash memory card.
This is the exact opposite of the VRAM. Even after the device has been turned off,
all the information stored in NVRAM is saved for future use. If the running
configuration is stored in the NVRAM, the device will remember its current
settings even after the device is powered off. To save the changes made in the
VRAM (running configuration) to the NVRAM (startup configuration), you can
use this command:
Cisco devices undergo different configuration modes depending on how you intend to
execute configuration commands on the device. These configurations are interrelated to
each other.
4. Interface Prompt
Even deeper (in the hierarchy of configuration mode) and more powerful than
the global configuration is the interface prompt that allows setting
reconfiguration of an interface including IP addresses of the Cisco device. To
navigate to a specific interface and to reconfigure its settings you can use the
interface command coupled with the interface ID (ex. fa0/0) as in the
following command:
interface fa0/0
Command Guide: Enabling Interface Prompt
device_name (config-if) #
5. Line Prompt
Aside from interface prompt, you can also access the line prompt when
configuring specific ports like console ports, auxiliary ports and Telnet ports. To
access the line prompt from the global configuration, you can use the following
command:
line con 0
Command Guide: Enabling Line Prompt
It is likely that each Cisco device is running a different IOS version so even before
creating a network using Cisco device, it is always handy to determine the IOS version.
Some IOS versions may have commands that may not be accepted in other IOS versions.
When the Cisco device loads the IOS from the flash memory, the following information
is displayed:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by Cisco Systems, Inc.
In the above display, the IOS version is 12.1
Help System
It is hard to memorize all the commands found in this book so your best friend when
practicing command codes is the Help System found in Cisco IOS. Help System lists all
the commands needed to complete a task involving a Cisco device. Simply key in:
?
Command Guide: Accessing Help System
Device_Name > ?
Exec commands:
Terminal
telnet
show
resume
exit
ssh
enable
disconnect
ping
logout
ipv6
connect
<1-99>
Chapter 6
Cisco Device Management
By default, Cisco device configurations are stored in two places: running-config file
(temporary; RAM) and in the startup-config file (permanent; NVRAM). Cisco device
managers often save configuration files in locations that are not within the Cisco device.
This is to make sure that the file is safe in cases that these files are erased or replaced
from the device memory. Not only will this save you time from having to recode a new
configuration file including security credentials (hostname and IP addresses) manually
in the interface.
Often, the Trivial File Transfer Protocol (TFTP) server is used for creating a location to
store a backup copy of the configuration file. The TFTP is a special server that is
specifically designed to transmit minute files through UDP port 69. Compared to the
more commonly used File Transfer Protocol (FTP), TFTP is simpler.
Installing TFTP Software
The first obvious thing that needs to be done is to create a TFTP server. The steps to
install and set your own TFTP server are as follows:
1.
Download and install your desired TFTP Server software. (For the purpose of this
example, you can use any search engine to locate a viable version of a TFTP
server software.)
2. After the installation procedure has ended, the Welcome screen often appears.
Click Next until a prompt confirms that the TFTP software is properly installed
to the computer system. Finally, click Finish.
3. Verify that the TFTP Server software is properly installed and configured to the
system by clicking on the desktop icon representing the TFTP Server. Click TFTP
Server Manager.
4. While the TFTP Server manager launches, the TFTP server asks you to input the
specific TFTP server you wish to use as a backup location. Click OK.
5. Make sure that the devices that are crucial to the existence of the TFTP network is
running before you begin uploading device configuration files into the server.
Once you are sure that the server is up and running, click Yes.
In the previous chapter, you learned that the *copy* command to transition
configuration files from running-config to startup config. The syntax for the said
command is as follows:
Copy running-config startup-config
Command Guide: Backup Configuration
If you analyze the above command guide, the syntax always begins with the copy
command, follow by the origin directory and then the destination directory. The syntax
for copy can therefore be seen as:
Copy [source directory] [destination directory]
Following the above syntax format, copying the back-up configuration files from the
running-config directly to the enabled tftp server can be accomplished through the
following command code:
Copy running-config tftp
Command Guide: Backup Configuration
Once your configuration is backed up to a TFTP server, you can then restore that
configuration at any point in time to your Cisco device. To restore the configuration, you
use the copy command, but this time you flip the source and destination parameters
around so that the source is the TFTP server and the destination is the running
configuration, as shown here:
Copy tftp running-config
To test this command, you can change the name of the router from NY-R1 to NY-R1b.
After the restore operation is complete, you should have the old router name applied
from the configuration file stored on the TFTP server.
NY-R1>enable
NY-R1#config term
NY-R1(config)#hostname NY-R1b
NY-R1b(config)#exit
After you have changed the name of the router, you can use the copy command to copy
the configuration from the TFTP server to your running configuration. The Cisco IOS
will prompt you for the IP address of the TFTP server and the name of the configuration
file to download.
Part 3:
Cisco Routing Technology
Chapter 7
Basic Routing Technology
Chapter 8
Static Routing
Chapter 9
Dynamic Routing Protocols
Assessment Activity: Cisco Routing Technology
Part 4:
Cisco Switching Technology
Chapter 10
Introduction to Switching
Chapter 11
Basic Switching Configuration
Assessment Activity: Cisco Switching Technology
Part 5:
Troubleshooting Networks
Chapter 12
Troubleshooting Network Communications
Chapter 13
Security Practices
Assessment Activity: Troubleshooting Networks
Part 6:
Other CCENT Topics
Chapter 14
CCENT-Related Terminology
Chapter 15
Wireless Network
Assessment Activity: Other CCENT Topics