Sie sind auf Seite 1von 25

Cisco CCENT Networking for

Beginners

Introduction
Before taking the CCNA certification and other likewise certification exams, CCENT is a
good certification to track to start with. CCENT certification is one of the newest and
most highly-regarded certification that measures your knowledge about basic
networking concepts and Cisco devices. Most parts of the exam touches on network
management and their real-world applications.
Cisco technology has been widely adapted and used by other manufacturers of network
devices. Learning more about how Cisco devices operate gives you a good overview of
how likewise devices function both as an independent device and as a part of wide
expanse of network systems.
Cisco CCENT for Beginners is created to give a comprehensive guide to Network
managers such as probably yourself to pass the CCENT certification exam. This book
tries to veer away from technical jargon without compromising the understandability of
highly-technical concept. Most concepts are replete with examples that can be applied in
your work as network managers
The book is filled with the following:

Illustrations: For you to have a full understanding of how Cisco devices and
how most network system works, this book provides illustrative examples and
diagrams of all related concepts.

Command Guides: Instead of relying on just concepts, this book provides


useful command guides on how to manage routers, switches and other network
devices included in the content of the exam.

Outlined Concepts: All pertinent information in this book is organized and


outlined to highlight which concepts are more important in preparation for the
certification exam.

Assessment Activities: At the end of each parts of the book, there are
assessment activities that measure how much you have understood the concepts.

Obviously, the main goal of this book is to help you pass the certification exam but more
than that, this book is designed to help you when you need other non-conceptual
information like troubleshooting tips and network security principles.
This book is divided into six parts:

Part One: Network Technologies

Part Two: Cisco Devices and Technology

Part Three: Cisco Routing System

Part Four: Cisco Switching System

Part Five: Troubleshooting Networks

Part Six: Other CCENT Topics

These six chapters cover all the major topics that are prominently figured in the CCENT
Certification exam. Unlike other materials that you can purchase in the bookstore or
download from the internet, this book is engaging because it uses a conversational tone.
The concepts are outlined without being detached to the subject matter. Aside from that,
this book uses special formatting to emphasize important concepts that you need to
know in preparation for the certification exam.
Concepts that are in:

Boldfaced concepts are topic markers. They are the main sections of each of
the chapter.

Italicized concepts are less important concepts but they may come out in the
exam.

Boldfaced and Italicized concepts are very important terms that you should
understand and remember as there is a good chance that the will be included in
the exam.

Should command guides be needed in a particular section, you can spot them easily
because they use a special font for easier reading and understanding.

Table of Contents
Introduction: About the Cisco CCENT Exam
Part 1: Networking Technologies
Chapter 1: Basics of Networking

Chapter 2: Network Devices and Services

Chapter 3: TCP/IP

25

Chapter 4: VLSM and Subnetting

35

Network Technologies: Assessment Activity


Part 2: Cisco Devices and Technology
Chapter 5: Cisco IOS

51

Chapter 6: Cisco Device Management

57

Cisco Technology: Assessment Activity


Part 3: Cisco Routing System

Chapter 7: Basic Router Configuration

75

Chapter 8: Static Routing

75

Chapter 9: Dynamic Routing Protocols

78

Cisco Routing Technology: Assessment Activity


Part 4: Cisco Switching System
Chapter 10: Introduction to Switching

80

Chapter 11: Basic Switching Configuration

83

Cisco Switching Technology: Assessment Activity


Part 5: Troubleshooting Networks
Chapter 12: Troubleshooting Networks Communication

85

Chapter 13: Security Practices

85

Troubleshooting Networks: Assessment Activity


Part 6: Other CCENT-related Topics
Chapter 12: Network Technology Terminology

85

Chapter 13: Wireless Networking

85

Troubleshooting Networks: Assessment Activity

Part 1:
Networking Technologies

Chapter 1
Basics of Networking
The network layer in both TCP/IP and Open Systems Interconnection network models is
called Layer 3.
Layer 3 (Network Layer)
Logical addresses or more popularly known as IP addresses are assigned by Network
Layer to all the devices connected to the network. These addresses are used to identify

Chapter 2
Network Devices and Services
Chapter 3
TCP/IP
Chapter 4
VLSM and Subnetting
Assessment Activity (Part 1):
Network Technologies

Part 2:
Cisco Technology

Chapter 5
Cisco IOS
Cisco invented a special operating system designed specifically for Cisco devices. This
operating system is called the Internetwork Operating System (IOS). The IOS is
different from the iOS, which is the operating system created by Apple Computers for
their mobile devices. Cisco IOS manages all the functions of Cisco devices including
routing, switching and maintaining security of the network where these devices are
connected. The sets of functions may differ depending on the IOS version being used.
Example: All Cisco IOS version before the 11.3 upgrade does not have a feature called Network
Address Translation (NAT), which is something that all newer IOS versions have configured .

IOS allows users, specifically network managers, to implement command codes when
interacting with the Cisco hardware. These commands can be encoded to the IOS using
the command-line interface (CLI).
Port Identification
There may be a lot of Cisco devices being sold and used today but these devices often
have the same ports consistent in most Cisco devices. These ports can be either an
auxiliary, console, seral or Ethernet ports.

Cisco Router Ports


Each of the port types consists of a unique identification code which
indicates the port type and a reference index number for the specific port
should there be another port of the same type existing in the same device.
The types of router ports are as follows:
1. Console Port

This port connects the router to the computer host device through a cable
called console cable, otherwise known also as the rollover cable. This port
is where the instructions from the console or computer host enter the
router for device configuration and troubleshooting. On the side of the
computer host, the console cable is plugged in to the console port.
Establishing a wired connection between the router (or any Cisco network
device) and a computer host counts as a local connection. On the flipside,
establishing a non-wired connection between any Cisco device and a
computer is called remote connection. This is discussed in detail in
Chapter 2 (Network Devices and Services) of this book.
2. Auxiliary Port
Like a console port, an auxiliary port establishes a local connection using a
console cable connected usually to a modem. The modem then establishes
a remote connection with a device that can configure the router without
being physically near. This is particularly useful since almost all networks
existing today are connected to the internet.
3. Cisco Ethernet Port
Most routers these days transmit big bulks of data to and from the
computer host requiring an Ethernet connection with a speed of 10 Mbps
(Ethernet), 100 Mbps (Fast Ethernet) and 1000 Mbps (Gigabit Ethernet).
Example: Cisco 2501 only has a single Ethernet port. Instead of the usual RJ-45 port,
Cisco 2501 Ethernet port uses Attachment Unit Interface (AUI) port.

Some Ethernet port can use fiber connectors than faster than any of the
three speeds mentioned above. When managing network interfaces using
Ethernet port, the corresponding interface ID code must match the
Ethernet port type being used.
Ethernet Port Type
10 Gigabit Ethernet
(10 Gbps)
1 Gigabit Ethernet
(1000 Mbps)
Fast Ethernet
(100 Mbps)
Ethernet
(10Mbps)

Interface ID Code
TenGigabitEthernet0/1 or
TenGigabitEthernet0/0
GigabitEthernet0/1 or
GigabitEthernet0/0
FastEthernet0/1 or
FastEthernet0/0
Etherhet1 or Ethernet0

4. Serial Ports
These ports are responsible for establishing a stable connection between
the router and the Wide Area Network (WAN). Aside from WAN

connections, serial ports are also integral in building direct point-to-point


connections between two independent routers using a cable called backto-back serial cable.

Example: Establishing a firm connection between two branches that are far apart from
each other but are of the same company, requires the help of a telephone company or an
internet service provider. The infrastructure built by the telephone companies connects
the servers of these two branches so that data transmission and reception is easy.

Cisco Switch Ports


Cisco switches use the same reference as that of Cisco routers. The only difference
is that Cisco routers have less number of ports than that of Cisco switches. This is
because Cisco routers link networks together whereas Cisco switches link
different computer and network systems together. Another difference is that
switches do not have auxiliary ports.
Both Cisco router and Cisco switch have console and Ethernet ports.
Configuring Cisco Devices
Cisco Devices can be configured through different methods such as:

Command-Line Interface (CLI)


The most popular device configuration method for Cisco units is through the
command-line interface (CLI). This interface uses either a HyperTerminal

connected locally through the console port to the computer or an SSH/ Telnet
remote connection. When using the interface, you can run any commands to
configure the properties of the Cisco device with an established connection with
the interface.

For instance, if you want to set the name of a router to something recognizable
while at the same time distinct, you can implement the following code:

Router01 > en
Router01 #config t
Instruction: Key in commands; only one per line. End
command with CTRL/Z
Router01 (config) #hostname SampleName
SampleName (config) #
Command Guide: Naming Cisco Devices

At first, CL1 can be frustrating to use. This is true for people who have little
experience coding commands. CL1 is an intuitive interface but it sometimes
needs a little getting used to before making it work for you flawlessly. Take note
that CCENT almost exclusively measures how much you know of the CL1
interface as the main tool used for configuring Cisco devices.

When instead of a local connection, a remote connection is being used, remote


applications SSH and Telnet establishes a stable connection to the router though
the IP address. The CL1 interface will project the following command lines:

C:\>SSH 24.0.1.0
Establishing 24.0.1.0 ...
User Access Confirmation
Password:
SampleName >en
Password:
SamplName#
Command Guide: Establishing Remote Connection

Security Device Manager (SDM)

When Cisco became aware that smaller networks are maintained by computer
users who do not have a background in coding, they devised a much simpler and
more understandable interface. This time it is with color and graphics to boot.
Newer Cisco device models often include an installer CD, which contains a
software called Security Device Manager (SDM), in the package.

Powered by Java, SDM uses the IP address of the router as input for its graphical
interface embedded in the software program from the CD. Once the computer
host and the device managed to establish a working connection, the SDM
appears, giving you options on the configuration settings of the Cisco device.

Cisco Network Assistant (CNA)


If you already have access to the internet, you can get your hands on a free
application made available in the Cisco Web site:

http://www.cisco.com/go/cna
Just like the Security Device Manager, CAN is a graphical interface that has been
in circulation earlier than SDM has. Port configuration for routers and VLAN
configuration for switches are SDM's specialty.

Memory Types

Each Cisco Device has been bestowed with a memory. The memory installed in a Cisco
device can differ from each other. In fact, the memory depends on the function exercised
by the router where the memory is installed.

Read Only Memory (ROM)

All Cisco devices have ROM, because similar to its function in most computers,
ROM oversees the booting operation of the Cisco device. From the moment you
turn on a Cisco router, for instance, ROM initiates the startup operation. This
is a term referring to the process performed by a device on the onset of energy
passing through the processors. Self-checks and properties assessment are done
during the startup operation.

ROM consists of the following:

1. Power-On-Self-Test (POST): This is a routinary test imposed by


the ROM to the system memory to check whether the device hardware
is operational or is in pristine condition.

2. Bootloader Program: Otherwise known as the bootstrap program,


the bootloader program begins after the Cisco device finished
performing the POST program. Bootloader program are usually
integrated in the ROM to gain access to the flash memory where the
IOS is typically located. The IOS is then loaded into the memory.
3. RX-Boot: If the bootloader program is unable to load the IOS from
the flash memory, RX-Boot executes a simulation of the Cisco IOS. The
simulation enjoys only limited functionality but while the RX-Boot is
simply a simulated IOS version, it is useful because it enables network
manager to load an IOS from the TPTP server.

4. ROM Monitor (ROMMON): Should any of the three components


detect error that will render the Cisco device unable to dispense of its
function, the ROMMON will initiate a systematic check and a
troubleshooting phase for simple problems. ROMMON is typically
used to bypass security measures such as password request. ROMMON
is initiated manually by using the Ctrl + Break keystroke while Cisco
device is still in the booting process.

Flash Memory

This is where Cisco IOS is stored for safekeeping. Since the IOS receives regular
update, usually involving system upgrades, the Cisco IOS is stored in the flash
memory instead of in the ROM as it was in older Cisco devices. Had the IOS been
installed in the ROM, interface upgrades would not have been possible since
ROM cannot be rewritten to, unlike other kinds of memory. Flash memory is
integrated within the actual system board or in some cases, installed externally
with the use of a flash memory card.

Volatile RAM (VRAM)

Otherwise known as simply RAM, VRAM is a kind of memory that holds


temporary information until the device is turned off or if power is lost. The
current device configuration of a Cisco device known as the running
configuration is stored in the VRAM. The configuration often includes the
current name set on the device. If you want the name to be permanent (unless
changed) even after the device has been turned off, you should transfer the
running configuration to a non-volatile RAM.

Nonvolatile RAM (NVRAM)

This is the exact opposite of the VRAM. Even after the device has been turned off,
all the information stored in NVRAM is saved for future use. If the running
configuration is stored in the NVRAM, the device will remember its current
settings even after the device is powered off. To save the changes made in the
VRAM (running configuration) to the NVRAM (startup configuration), you can
use this command:

Copy running-config startup-config


Command Guide: Saving Device Configuration to NVRAM

Cisco Configuration Modes

Cisco devices undergo different configuration modes depending on how you intend to
execute configuration commands on the device. These configurations are interrelated to
each other.

1. User Exec Mode


This mode is read-only. In other words, when the device is in this mode, device
users cannot reconfigure the current settings of the device. It can merely show
you the list of commands but you cannot use these commands to change the
configuration setting of the device. To set the device to user exec mode, you must
Telnet the connection in the console port until the interface displays:
device_name >
2. Priv Exec Mode
Should you need to reconfigure the current settings of the device, you can shift
the Cisco device setting from user exec mode to privilege exec mode or simply,
priv exec mode by implementing the following command:
enable
Command Guide: Enabling Priv Exec Mode

The user interface should now display the following:


device_name #
3. Global Configuration
In theory, privilege exec mode should allow users to effect changes in the
configuration of the Cisco device but for some reason, most commands that can
make significant changes to the current device configuration of the device can be
made only if global configuration is enabled. Unlike priv exec mode, global
configuration can make changes not just on a single port but also for the entire
device.

Global configuration is enabled by any of the following commands:


configure terminal
config term
config t
Command Guide: Enabling Global Configuration

The user interface should now display the following:


device_name (config) #
If you wish to return to priv exec mode, implement this command:
exit
Command Guide: Enabling Global Configuration

4. Interface Prompt
Even deeper (in the hierarchy of configuration mode) and more powerful than
the global configuration is the interface prompt that allows setting
reconfiguration of an interface including IP addresses of the Cisco device. To
navigate to a specific interface and to reconfigure its settings you can use the
interface command coupled with the interface ID (ex. fa0/0) as in the
following command:
interface fa0/0
Command Guide: Enabling Interface Prompt

The interface should then display:

device_name (config-if) #
5. Line Prompt
Aside from interface prompt, you can also access the line prompt when
configuring specific ports like console ports, auxiliary ports and Telnet ports. To
access the line prompt from the global configuration, you can use the following
command:
line con 0
Command Guide: Enabling Line Prompt

The interface should then display:


(config-line) #
Determining the Cisco IOS versions

It is likely that each Cisco device is running a different IOS version so even before
creating a network using Cisco device, it is always handy to determine the IOS version.
Some IOS versions may have commands that may not be accepted in other IOS versions.

When the Cisco device loads the IOS from the flash memory, the following information
is displayed:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by Cisco Systems, Inc.
In the above display, the IOS version is 12.1

Help System
It is hard to memorize all the commands found in this book so your best friend when
practicing command codes is the Help System found in Cisco IOS. Help System lists all
the commands needed to complete a task involving a Cisco device. Simply key in:
?
Command Guide: Accessing Help System

Depending on the IOS version, the following commands will be displayed:

Device_Name > ?
Exec commands:
Terminal
telnet
show
resume
exit
ssh
enable
disconnect
ping
logout
ipv6
connect
<1-99>

Set terminal line parameters


Open a telnet link
Display running system information
Continue an active network connection
Leave current mode
Open a protected shell client link
Turn on privileged commands
Disconnect a current network connection
Transmit echo messages
Exit from the current mode
ipv6
Begin a terminal connection
Session number to resume

Chapter 6
Cisco Device Management
By default, Cisco device configurations are stored in two places: running-config file
(temporary; RAM) and in the startup-config file (permanent; NVRAM). Cisco device
managers often save configuration files in locations that are not within the Cisco device.
This is to make sure that the file is safe in cases that these files are erased or replaced
from the device memory. Not only will this save you time from having to recode a new
configuration file including security credentials (hostname and IP addresses) manually
in the interface.
Often, the Trivial File Transfer Protocol (TFTP) server is used for creating a location to
store a backup copy of the configuration file. The TFTP is a special server that is
specifically designed to transmit minute files through UDP port 69. Compared to the
more commonly used File Transfer Protocol (FTP), TFTP is simpler.
Installing TFTP Software
The first obvious thing that needs to be done is to create a TFTP server. The steps to
install and set your own TFTP server are as follows:

1.

Download and install your desired TFTP Server software. (For the purpose of this
example, you can use any search engine to locate a viable version of a TFTP
server software.)

2. After the installation procedure has ended, the Welcome screen often appears.
Click Next until a prompt confirms that the TFTP software is properly installed
to the computer system. Finally, click Finish.

3. Verify that the TFTP Server software is properly installed and configured to the
system by clicking on the desktop icon representing the TFTP Server. Click TFTP
Server Manager.

4. While the TFTP Server manager launches, the TFTP server asks you to input the
specific TFTP server you wish to use as a backup location. Click OK.

5. Make sure that the devices that are crucial to the existence of the TFTP network is
running before you begin uploading device configuration files into the server.
Once you are sure that the server is up and running, click Yes.

Backing up Configuration Files

In the previous chapter, you learned that the *copy* command to transition
configuration files from running-config to startup config. The syntax for the said
command is as follows:
Copy running-config startup-config
Command Guide: Backup Configuration

If you analyze the above command guide, the syntax always begins with the copy
command, follow by the origin directory and then the destination directory. The syntax
for copy can therefore be seen as:
Copy [source directory] [destination directory]
Following the above syntax format, copying the back-up configuration files from the
running-config directly to the enabled tftp server can be accomplished through the
following command code:
Copy running-config tftp
Command Guide: Backup Configuration

Restoring Configuration from TFTP Server

Once your configuration is backed up to a TFTP server, you can then restore that
configuration at any point in time to your Cisco device. To restore the configuration, you
use the copy command, but this time you flip the source and destination parameters
around so that the source is the TFTP server and the destination is the running
configuration, as shown here:
Copy tftp running-config

To test this command, you can change the name of the router from NY-R1 to NY-R1b.
After the restore operation is complete, you should have the old router name applied
from the configuration file stored on the TFTP server.
NY-R1>enable
NY-R1#config term
NY-R1(config)#hostname NY-R1b
NY-R1b(config)#exit
After you have changed the name of the router, you can use the copy command to copy
the configuration from the TFTP server to your running configuration. The Cisco IOS
will prompt you for the IP address of the TFTP server and the name of the configuration
file to download.

Backing up your IOS


It is important to back up your configuration, but you should also back up the Cisco IOS
from your router to the TFTP server, just in case the IOS is corrupted on your device. In
the case where the IOS is corrupt on your device, you can restore the IOS from the TFTP
server as long as you have backed it up to the TFTP server.
In order to back up the IOS, you need to know the filename of the IOS that is stored in
the flash memory you wish to back up. To view a list of files in flash memory, you use the
show flash command. The IOS file is a file stored in flash that has a .bin extension and
most likely has a filename that symbolizes the series of the device you are working with.
The following

Assessment Activity: Cisco Technology

Part 3:
Cisco Routing Technology
Chapter 7
Basic Routing Technology
Chapter 8
Static Routing
Chapter 9
Dynamic Routing Protocols
Assessment Activity: Cisco Routing Technology

Part 4:
Cisco Switching Technology
Chapter 10
Introduction to Switching
Chapter 11
Basic Switching Configuration
Assessment Activity: Cisco Switching Technology

Part 5:
Troubleshooting Networks

Chapter 12
Troubleshooting Network Communications
Chapter 13
Security Practices
Assessment Activity: Troubleshooting Networks

Part 6:
Other CCENT Topics
Chapter 14
CCENT-Related Terminology
Chapter 15
Wireless Network
Assessment Activity: Other CCENT Topics

Das könnte Ihnen auch gefallen