SlideShare una empresa de Scribd logo
1 de 19
SUMMER TRAINING PRESENTATION
ON
CISCO CERTIFIED NETWORK ASSOCIATE
08/13/13BASED ON CCNA
1
ABOUT CCNA
 This certification builds a
foundation in and apprentice
knowledge of networking.
 CCNA certified professionals can install, configure,
and operate LAN, WAN and daily access services
for small networks (100 modes or fewer), including
but not limited to use of these protocols: IP, IGRP,
SERIAL FRAME-RELAY, IP RIP, VLANs, RIP
ETHERNET, ACCESS-LISTS.
08/13/13BASED ON CCNA
2
08/13/13BASED ON CCNA
3
Router user interface
The Cisco IOS software uses a command-line
interface (CLI) as the traditional console
environment.
This environment is accessible through
several methods:
 Console
 AUX port (modem)
 Telnet
Establishing a HyperTerminal session
08/13/13BASED ON CCNA
4
Take the following steps to connect a terminal to the console port on the router:
• Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to
DB-9 or RJ-45 to DB-25 adapter.
• Configure the terminal or PC terminal emulation software for 9600 baud, 8 data
bits, no parity, 1 stop bit, and no flow control.
Rollover cable
Console port
Com1 or Com2 serial port
Terminal or a
PC with
terminal
emulation
software
Router
08/13/13BASED ON CCNA
5
• The IOS provides a command interpreter service known as the
command executive (EXEC).
• After each command is entered, the EXEC validates and executes the
command.
• The levels are user EXEC mode and privileged EXEC mode.
08/13/13BASED ON CCNA
6
Router#configure terminal
Router(config)#
08/13/13BASED ON CCNA
7
Not recommended, clear text
Router(config)#enable secret <password>
Use this command instead, password is encryped
Encrypts the passwords
above, but…
• On serial links that are directly interconnected, as in a lab environment,
one side must be considered a DCE and provide a clocking signal.
• The clock is enabled and speed is specified with the clock rate
command.
Router(config)#interface serial 0/0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
08/13/13BASED ON CCNA
8
08/13/13BASED ON CCNA
9
It is also called Network Traffic Control
Management (NTCM). We can provide restrictions to
individual users, subnets and services etc.
ACL
Standard ACL Extended ACL
Any access list is identified by its number.
S. A. L 1 – 99
Ex. A. L 100 - 199
08/13/13BASED ON CCNA
10
Rules for creating and implementing
Access List
1. Access list must begin with the Deny Statements (If
exists) then Permit Statements must follow.
2. There must be at least one Permit Statement as an
Implicit “Deny All” always exists.
3. While Implementation of Access list, There must be
only one Access list per Interface, per direction and
per protocol.
08/13/13BASED ON CCNA
11
Router A Router B
S 0 172.16.1.1 172.16.1.2 S 0
E 0 5.50
1.1
1.21.3
1.4
5.1
5.2
5.4
5.3
E 0 1.50
Syntax
Router(config)# Access-list ALNO P/D Src Src-WCM
Router(config)# Int <name of interface>
Router(Config-if)#Ip Access-Group <Direction>
Layer 2 switching is the process of
using the hardware address of devices
on LAN to segment a network.
In multiple links between switches we
face multi looping problems. To solve
this problem switches run Spanning
Tree Protocol (STP).
08/13/13BASED ON CCNA
12
A VLAN is a logical grouping of network
users and resources connected to
administratively defined ports on a switched.
A group of users that need an unusually
high level of security can be put into its own
VLAN so that users outside of the VLAN
can’t communicate with them. So it provide
security.
08/13/13BASED ON CCNA
13
Switch>show vlan
Switch>enable
Switch#vlan database
Switch(vlan)#vlan vlan-id name vlan-name
Switch(vlan)#exit or ^z.
08/13/13BASED ON CCNA
14
08/13/13BASED ON CCNA
15
• STP is a loop-
prevention protocol
• Uses the Spanning Tree
Alogithm
• STP allows L2 devices to
communicate with each
other to discover physical
loops in the network.
• STP specifies an algorithm
that L2 devices can use to
create a loop-free logical
topology.
08/13/13BASED ON CCNA
16
• By default, STP is enabled for every port on
the switch.
• If for some reason STP has been disabled,
you can reenable it.
• To re-enable STP, use the
Switch(config)#spanning-tree vlan vlan-id
• To disable STP, on a per-VLAN basis:
Switch(config)#no spanning-tree vlan vlan-id
A packet-switched technology that made its
debut in the early 1990s, Frame Relay is a
high-performance Data Link and Physical
layer specification. An upside to Frame Relay
is that it can be more cost effective than point-
to-point links, plus it typically runs at speeds of
64Kbps up to 45Mbps (T3). Another Frame
Relay benefit is that it provides features for
dynamic bandwidth allocation and congestion
control.
08/13/13BASED ON CCNA
17
F r a m e R e la y
N e t w o r k
H e a d q u a r t e r s
H u b C it y
S a t e llit e O f f ic e 1
S p o k a n e
S a t e llit e O f f ic e 2
S p o k o m o
1 7 2 .1 6 .1 .1 1 7 2 .1 6 . 1 . 3
1 7 2 .1 6 . 1 . 2
D L C I 1 0 1
D L C I 1 0 2
D L C I 1 1 2
D L C I 2 1 1
HubCity
interface Serial0
ip address 172.16.1.2
255.255.255.0
encapsulation frame-relay
(Inverse-ARP still works here)
Spokane
interface Serial0
ip address 172.16.1.1
255.255.255.0
encapsulation frame-relay
frame-relay map ip 172.16.1.3 102
frame-relay map ip 172.16.1.2 102
Spokomo
interface Serial0
ip address 172.16.1.3
255.255.255.0
encapsulation frame-relay
frame-relay map ip 172.16.1.1 211
frame-relay map ip 172.16.1.2 211
Frame-Relay Map Statements
Notice that the routers are configured to use either IARP or Frame Relay
maps. Using both on the same interface will cause problems.
08/13/13BASED ON CCNA
18
THANK YOUTHANK YOU
08/13/13BASED ON CCNA
19

Más contenido relacionado

La actualidad más candente

CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructurePrince Gautam
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaHoneyKumar34
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Saurav Pandey
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Training
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworksgolarsnetworks34
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Arunabh Deka
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configurationRandyDookheran1
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2Andy Juan Sarango Veliz
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3Ibby Nuj
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 

La actualidad más candente (20)

CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 

Destacado

Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Dân Chơi
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7VISHNU N
 
ppt on 6 weeks summer training
ppt on 6 weeks summer training ppt on 6 weeks summer training
ppt on 6 weeks summer training Pulkit Mahajan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkAhmed Habib
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeAhmed Habib
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2samis
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsVuz Dở Hơi
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionAhmed Habib
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACLfaust0
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfMadhan Banda
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideIT Tech
 

Destacado (20)

Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
 
ppt on 6 weeks summer training
ppt on 6 weeks summer training ppt on 6 weeks summer training
ppt on 6 weeks summer training
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
CCNA part 7 acl
CCNA part 7 aclCCNA part 7 acl
CCNA part 7 acl
 
ccna project
ccna projectccna project
ccna project
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
 
Ccna security
Ccna securityCcna security
Ccna security
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 

Similar a CCNA 2

Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01amit singh
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switchingparthasn83
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdfssusercbaa33
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxgalerussel59292
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commandsAreej Khasawneh
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Vinod Kumar Balasubramanyam
 
5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знатьSkillFactory
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataManageEngine, Zoho Corporation
 
configuration of switch campus network
configuration of switch campus networkconfiguration of switch campus network
configuration of switch campus networksubhash subbu
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoCisco Russia
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ questionsufi1248
 

Similar a CCNA 2 (20)

Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Ducat
DucatDucat
Ducat
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
corporate network
corporate networkcorporate network
corporate network
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
Lab6.4.1
Lab6.4.1Lab6.4.1
Lab6.4.1
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
Zxdsl 9210 guide
Zxdsl 9210 guideZxdsl 9210 guide
Zxdsl 9210 guide
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
Samplab19
Samplab19Samplab19
Samplab19
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commands
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать5 продвинутых технологий Cisco, которые нужно знать
5 продвинутых технологий Cisco, которые нужно знать
 
BRKARC-3146_PoE_C3k.pdf
BRKARC-3146_PoE_C3k.pdfBRKARC-3146_PoE_C3k.pdf
BRKARC-3146_PoE_C3k.pdf
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
 
configuration of switch campus network
configuration of switch campus networkconfiguration of switch campus network
configuration of switch campus network
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
 

Más de Asish Verma

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Asish Verma
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)Asish Verma
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsisAsish Verma
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERAsish Verma
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)Asish Verma
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)Asish Verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6Asish Verma
 

Más de Asish Verma (13)

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsis
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVER
 
Pt report(body)
Pt report(body)Pt report(body)
Pt report(body)
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)
 
Pt report(cert)
Pt report(cert)Pt report(cert)
Pt report(cert)
 
Asish verma
Asish vermaAsish verma
Asish verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

CCNA 2

  • 1. SUMMER TRAINING PRESENTATION ON CISCO CERTIFIED NETWORK ASSOCIATE 08/13/13BASED ON CCNA 1
  • 2. ABOUT CCNA  This certification builds a foundation in and apprentice knowledge of networking.  CCNA certified professionals can install, configure, and operate LAN, WAN and daily access services for small networks (100 modes or fewer), including but not limited to use of these protocols: IP, IGRP, SERIAL FRAME-RELAY, IP RIP, VLANs, RIP ETHERNET, ACCESS-LISTS. 08/13/13BASED ON CCNA 2
  • 3. 08/13/13BASED ON CCNA 3 Router user interface The Cisco IOS software uses a command-line interface (CLI) as the traditional console environment. This environment is accessible through several methods:  Console  AUX port (modem)  Telnet
  • 4. Establishing a HyperTerminal session 08/13/13BASED ON CCNA 4 Take the following steps to connect a terminal to the console port on the router: • Connect the terminal using the RJ-45 to RJ-45 rollover cable and an RJ-45 to DB-9 or RJ-45 to DB-25 adapter. • Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control. Rollover cable Console port Com1 or Com2 serial port Terminal or a PC with terminal emulation software Router
  • 5. 08/13/13BASED ON CCNA 5 • The IOS provides a command interpreter service known as the command executive (EXEC). • After each command is entered, the EXEC validates and executes the command. • The levels are user EXEC mode and privileged EXEC mode.
  • 6. 08/13/13BASED ON CCNA 6 Router#configure terminal Router(config)#
  • 7. 08/13/13BASED ON CCNA 7 Not recommended, clear text Router(config)#enable secret <password> Use this command instead, password is encryped Encrypts the passwords above, but…
  • 8. • On serial links that are directly interconnected, as in a lab environment, one side must be considered a DCE and provide a clocking signal. • The clock is enabled and speed is specified with the clock rate command. Router(config)#interface serial 0/0 Router(config-if)#clock rate 64000 Router(config-if)#no shutdown 08/13/13BASED ON CCNA 8
  • 9. 08/13/13BASED ON CCNA 9 It is also called Network Traffic Control Management (NTCM). We can provide restrictions to individual users, subnets and services etc. ACL Standard ACL Extended ACL Any access list is identified by its number. S. A. L 1 – 99 Ex. A. L 100 - 199
  • 10. 08/13/13BASED ON CCNA 10 Rules for creating and implementing Access List 1. Access list must begin with the Deny Statements (If exists) then Permit Statements must follow. 2. There must be at least one Permit Statement as an Implicit “Deny All” always exists. 3. While Implementation of Access list, There must be only one Access list per Interface, per direction and per protocol.
  • 11. 08/13/13BASED ON CCNA 11 Router A Router B S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.21.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Syntax Router(config)# Access-list ALNO P/D Src Src-WCM Router(config)# Int <name of interface> Router(Config-if)#Ip Access-Group <Direction>
  • 12. Layer 2 switching is the process of using the hardware address of devices on LAN to segment a network. In multiple links between switches we face multi looping problems. To solve this problem switches run Spanning Tree Protocol (STP). 08/13/13BASED ON CCNA 12
  • 13. A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switched. A group of users that need an unusually high level of security can be put into its own VLAN so that users outside of the VLAN can’t communicate with them. So it provide security. 08/13/13BASED ON CCNA 13
  • 14. Switch>show vlan Switch>enable Switch#vlan database Switch(vlan)#vlan vlan-id name vlan-name Switch(vlan)#exit or ^z. 08/13/13BASED ON CCNA 14
  • 15. 08/13/13BASED ON CCNA 15 • STP is a loop- prevention protocol • Uses the Spanning Tree Alogithm • STP allows L2 devices to communicate with each other to discover physical loops in the network. • STP specifies an algorithm that L2 devices can use to create a loop-free logical topology.
  • 16. 08/13/13BASED ON CCNA 16 • By default, STP is enabled for every port on the switch. • If for some reason STP has been disabled, you can reenable it. • To re-enable STP, use the Switch(config)#spanning-tree vlan vlan-id • To disable STP, on a per-VLAN basis: Switch(config)#no spanning-tree vlan vlan-id
  • 17. A packet-switched technology that made its debut in the early 1990s, Frame Relay is a high-performance Data Link and Physical layer specification. An upside to Frame Relay is that it can be more cost effective than point- to-point links, plus it typically runs at speeds of 64Kbps up to 45Mbps (T3). Another Frame Relay benefit is that it provides features for dynamic bandwidth allocation and congestion control. 08/13/13BASED ON CCNA 17
  • 18. F r a m e R e la y N e t w o r k H e a d q u a r t e r s H u b C it y S a t e llit e O f f ic e 1 S p o k a n e S a t e llit e O f f ic e 2 S p o k o m o 1 7 2 .1 6 .1 .1 1 7 2 .1 6 . 1 . 3 1 7 2 .1 6 . 1 . 2 D L C I 1 0 1 D L C I 1 0 2 D L C I 1 1 2 D L C I 2 1 1 HubCity interface Serial0 ip address 172.16.1.2 255.255.255.0 encapsulation frame-relay (Inverse-ARP still works here) Spokane interface Serial0 ip address 172.16.1.1 255.255.255.0 encapsulation frame-relay frame-relay map ip 172.16.1.3 102 frame-relay map ip 172.16.1.2 102 Spokomo interface Serial0 ip address 172.16.1.3 255.255.255.0 encapsulation frame-relay frame-relay map ip 172.16.1.1 211 frame-relay map ip 172.16.1.2 211 Frame-Relay Map Statements Notice that the routers are configured to use either IARP or Frame Relay maps. Using both on the same interface will cause problems. 08/13/13BASED ON CCNA 18