CCNA Networking Concepts and Configurations
CCNA Networking Concepts and Configurations
com
CCNA
(Cisco Certified Network Associate)
CCNA (Cisco Certified Network Associate) is an information technology (IT) certification
from Cisco. CCNA certification is an associate-level Cisco Career certification.
Up gradation path
CCENT Entry Level
(Cisco Certified Entry Networking Technician)
CCNA Associate
(Cisco Certified Network Associate )
CCNP Professional
(Cisco Certified Network Professional)
CCIE Expert
(Cisco Certified Internetwork Expert)
CCAr Architect
(Cisco Certified Architect)
CCNA Categories:
CCNA Routing and Switching CCNA Data Center
CCNA Security CCNA Service Provider
CCNA Collaboration CCNA Voice
CCNA Wireless
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Certification Required
CCNAX (200-125): Interconnecting Cisco Networking Devices Accelerated
Networking devices
1. Repeater: This is used to convert weak signals into strong signals.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
HUB SWITCH
1. It is layer 1 device of OSI mode. 1. It is layer 2 device of OSI mode. Some
switch are layer 3 devices.
Transmission Modes:
1) Simplex:- In this mode, the communication between sender and receiver occur only in one
direction.
That means only the sender can transmit the data to receiver but receive can’t.
2) Half- Duplex:- In this mode, the communication between sender and receiver occurs in both
the directions but, one at a time.
The sender and receiver both can transmit and receive the information but, only one is allowed
to transmit at a time.
3) Full-Duplex:- In this mode, the communication between sender and receiver can occur
simultaneously.
Sender and receiver both can transmit and receive simultaneously at the same time.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
4. Bridge:
It is same as switch but have two or three port only.
5. Router:
It is used to connect from two different networks.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
6. Brouter:
7. Gateway:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Networking Topology
It is the physical arrangement of networking devices to make a network.
Types of Topology:-
1) Bus 2) Star 3)Ring 4)Mesh 5)Tree 6)Wireless
BUS TOPOLOGY:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Star Topology:
Twisted pair cable is used.
Ring Topology
Here we require separate NIC card which supports Ring Topology.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
1) This type of network topology is very organized. Each node gets to send the data when it
receives an empty token. This helps to reduces chances of collision.
2) Even when the load on the network increases, its performance is better than that of Bus
topology.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
1) Each packet of data must pass through all the computers between source and destination.
This makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
4) MAU’s and network cards are expensive as compared to Ethernet cards and hubs.
Mesh Topology
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
• Scalable as leaf nodes can accommodate more nodes in the hierarchical chain.
• A point to point wiring to the central hub as each intermediate node of a tree topology
represents a node in the bus topology
• Other hierarchical networks are not affected if one of them gets damaged.
• Easier maintenance and fault finding.
Wireless Topology
• It shows how the computers connect and interact each other when there is no physical
connection, no cables connecting the computers.
• The computers communicate each other directly, using the wireless devices.
Ad hoc network
• The network is ad hoc because it does not rely on a pre-existing infrastructure, such
as routers in wired networks or access points in managed (infrastructure) wireless
networks.
• Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes
are free to move.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Straight cable is used to connect different type of devices. This type of cable will be used most of
the time and can be used to:
2) Crossover Cable:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
If you need to check how crossover cable looks like, both side (side A and side B) of cable
have wire arrangement with following different color .
In case you need to make a crossover cable yourself! You can use crimper to do it.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Note: If there is auto MDI/MDI-X feature support on the switch, hub, network card or other
network devices, you don't have to use crossover cable in the situation. This is because
crossover function would be enabled automatically when it's needed.
3) Rollover Cable:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
OSI Layer
➢ Open System Interconnect (OSI) developed by ISO in 1970.
➢ Defines a networking framework to implement protocols in seven layers.
➢ Communication over network is understandable through this OSI model.
➢ OSI having 7 layers and each layers has its own responsibilities.
➢ Hardware and software work together.
➢ Troubleshooting is easier by separate networks.
Protocol:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Framing : Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver.
The layer provides an interface for the user interact with the application such as Email, HTTP,
FTP, Remote file access.
➢ Authentication
➢ File access
➢ Management
IP ADDRESSING
It is a unique address used to identify a device (like computer, smart phone, router, IP based
phone, network printer etc) in network.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
IP Address
IP v4 IP v6
❖ IPv1, 2, & 3 would actually be part of the TCP/IP protocols, of which there were 3
versions.
❖ IPv5 is an experimental TCP/IP protocol called the Internet Stream Protocol that never
really went anywhere because increases in bandwith made streaming over IPv4 feasible.
So IPv5 was never finalized and they skipped to IPv6.
IP V4
Example:-
192 . 168 . 1. 1
11 00 00 00 .10 10 10 00 .00 00 00 01 . 00 00 00 01
8 8 8 8
32 bits
Network ID Host ID
8 bits = 28= 256
Therefore the value we can write in each octet is from 0 – 255 only.
IP v4
Classful Classless
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Range of IPv4
A [Link] [Link]
B [Link] [Link]
C [Link] [Link]
D [Link] [Link]
E [Link] [Link]
Note : [Link] is reserved for local host and called loopback address.
Range: [Link] – [Link]
To Remember
Class Range
A 1 - 126
B 128 – 191
C 192 – 223
D 224 – 239
E 240 – 255
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Subnet Mask
Subnet Mask
Subnet Mask
Types of IP Address:
Loop-back Address:
It is a special class A IP address ([Link]-127 [Link]),reserved for loopback or
diagnostic functions.
Link-Local Address:
DHCP is automatically assign the IP Address to a computer.
Calculation of IP Address:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Formula:-
Reserved bits :
1) Class - A :
n = 8, h = 24 , r = 1
No. of network = 2n-r = 28-1 = 27 = 128
No. of host /network = 2h-2 = 224-2 = 16,777,214
2) Class – B :
n = 16, h = 16 , r = 2
No. of network = 2n-r = 216-2 = 214 = 16384
No. of host /network = 2h-2 = 216-2 = 65,536-2 = 65,534
3) Class – C :
n = 24, h = 8 , r = 3
No. of network = 2n-r = 224-3 = 221 = 2,097,152
No. of host /network = 2h-2 = 28-2 = 256-2 = 254
Ans:
[Link] Network ID
[Link]
[Link]
. Valid host = 254
.
[Link]
[Link] Broadcast ID
[Link] Network ID
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
[Link]
[Link]
. Valid host = 254
.
[Link]
[Link] Broadcast ID
[Link] Network ID
[Link]
[Link]
. Valid host = 254
.
[Link]
[Link] Broadcast ID
Therefore total valid host (Computers) = 254+254+92 = 600
Two router require to communicate all systems here.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Public IP Private IP
Assinged by ISP Assigned by user from a given range
Private IP Range:
0.5 billions used by Private IP, Lookback address and APIPA address
Router Basics
Router Type
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
add and remove the Ethernet or Serial and remove interfaces as per the
interfaces) requirements)
Doesn’t have any extra slot Number of slots available depend on
the series of the router.
Router Manufacturers
CiscoLinksysNetgear D-LinkDellDigisolAsusZTE
1800, 1900, 2800, 2900, 3800, 3900, 4400, 7200, 10000, 12000
b) On/Off button:
• Used to switch on/off the Router.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
c) Auxiliary port:
• Used to connect modem. It is known as remote Administrative Port. Its an RJ-45
Port. A console or a rollover cable is to be used.
d) Console Port:
• It is known as local Administrative port. It is generally used for configuration,
Password recovery and local Administration of the router. It is RJ-45 port.
• For connecting one end to other Rollover cable will be used.
ROM :
• Is a chip integrated on the motherboard which contains a bootstrap program which tells
how to load the IOS.
• Used to start and maintain the router. Holds the POST and the bootstrap programs, as
well as the mini-ISO.
• Stored in the microcode of the ROM, the POST is used to check the basic the basic
functionality of the router hardware and determines which interfaces are present.
What is Mini-IOS ?
• Also called the RXBOOT or boot-loader by cisco, the mini-IOS is a small IOS in ROM
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
that can be used to bring up an interface and load a cisco IOS into flash memory.
DRAM :
• Used to hold the temporary config, recent packet buffers information, ARP catch, routing
tables, and also the software and data structures that allow the router to function.
• The IOS is loaded in to the RAM from the Flash at the time of booting.
Flash Memory:
• Stores the Cisco IOS by default. Flash memory is not erased when the router is reloaded.
NVRAM :
• Used to hold the router and switch configuration. NVRAM is not erased when the router
or switch is reloaded.
CONFIGURATION REGISTER:
• The configuration register is a 16-bit number, represented in hexadecimal, which
controls everything from the way in which a CISCO router boots.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
• User Mode is the first mode a user has access to after logging into the router.
• This mode allows the user to execute only the basic commands, such as those that show
the system's status.
• The router cannot be configured or restarted from this mode.
• The user mode can be identified as shown below :
Router>
• Privileged mode allows users to view the system configuration, restart the system, and
enter router configuration mode.
• Privileged mode also allows all the commands that are available in user mode.
• The Privileged mode can be identified as shown below:
Router#
• Global Configuration mode allows users to modify the running system configuration.
• From the Privileged mode a user can move to configuration mode by running the
"configure terminal" command from privileged mode.
• To exit configuration mode, the user can enter "end" command or press Ctrl-Z key
combination.
• The Global Configuration mode can be identified as shown below:
Router(config)#
Router(config-if)#
Rommon mode:-
Rommon>
➢ Different routing protocols use different algorithms to choose the port to which a packet
should be sent.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
➢ Routing algorithms use different metrics to determine the best route for the data packet.
➢ A routing algorithm generates a number called a metric value for each path through a
network.
➢ Typically, smaller metric values indicate preferred paths.
Metrics:-
• Routing metrics are values allows the routers decide the best route for the data
packets.
• Routing protocols relay on different metrics values such as hops, bandwidth, load
and cost to identify the appropriate path.
4) Reliability:
• Reliability is usually a reference to the error rate of each network link.
5) Hop count:
• Hop count is the number of routers that a packet must travel through before reaching its
destination.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
• An Autonomous system is a network or a collection of networks that are all managed and
supervised by a single entity or organization.
• Each sub-network is assigned a globally unique 16 bit identification number known as
A.S number or ASN by the Internet Assigned Number Authority (IANA).
• Autonomous System Number Range :- ( 0 – 65535 )
• For public – 1-64512For Private – 64513-65535
• Private AS: used within the same service providers
• Public AS: used in between multiple service providers
Administrative Distance(AD)
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
5
EIGRP(Enhanced Interior Gateway Protocol)
20
External BGP(Border Gateway Protocol)
Internal EIGRP 90
110
OSPF(Open Shortest Path First)
IS-IS 115
Routing Information Protocol (RIP) 120
Unknown 255
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
18 shutdown shut
Router Security
Router# conf t
Router(config-line) #login
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router(config-line) # exit
Router# conf t
Router(config-line) #login
Router(config-line) # exit
Router# conf t
Router(config-line) #login
Router(config-line) # exit
Router# conf t
Router(config) # exit
Router# conf t
Router(config) # exit
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
R# sh ver
Shortcut Description
Ctrl+A Move cursor to the beginning for the line
Ctrl+E Move cursor to the end of the line
Ctrl+F Move cursor forward one character
Ctrl+B Move cursor backward
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
ROUTER CONFIGURATIONS
Router>en
Router#conf t
Router(config)#ho mumbai
Router(config)#int fa0/0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa0/1
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#do wr
Disadvantages
❖ When client make query to DHCP server (DHCP Discover) it is UDP query it consume more
bandwidth.
❖ When DHCP server is unavailable client unable to access enterprises network.
DORA Process
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
In Router:
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#no shut
Router(config-if)#exit
Router(dhcp-config)#dns-server [Link]
Router(dhcp-config)#default-router [Link]
Router(dhcp-config)#do wr
Router(dhcp-config)#exit
Router(config)#int fa0/1
Router(config-if)#no shut
Router(config-if)#exit
Router(dhcp-config)#dns-server [Link]
Router(dhcp-config)#default-router [Link]
Router(dhcp-config)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router(dhcp-config)#exit
In client PC:
Routing
• Forwarding of packets from one network to another network choosing the best path from
the routing table.
• Routing makes possible for two or more different networks to communicate with each
other.
• Routing table consist of only the best routes for every destinations.
Types of Routing:
1. Static Routing
2. Default Routing
3. Dynamic Routing
Static routing
Advantages:
Disadvantages:
• Used for small network (It is not feasible in large networks)
• Each and every network has to be manually configured.
• The administrator must really understand the internetwork and how each router is
connected in order to configure routes correctly.
• Any changes in the internetwork has to be updated in all routers.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Command syntax:
R(config)# ip route <neighbour NW Add.><neighbour NW Subnet mask><via>
Router 0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#no shut
delhi(config-if)#exit
delhi(config)#int se0/0/0
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#do wr
Router1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#no shut
delhi(config-if)#exit
delhi(config)#int se0/0/0
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
delhi(config)#do wr
Router1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#int se0/0/1
mumbai(config-if)#no shut
mumbai(config-if)#cl ra 64000
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#do wr
Router2:
Router>en
Router#conf t
Router(config)#ho chennai
chennai(config)#int fa0/0
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
chennai(config-if)#int se0/0/1
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
chennai(config-if)#band 100
chennai(config-if)#do wr
chennai(config-if)#exit
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#do wr
Default Routing
1) Default Routing is used when Network admin do not have information of entire network.
2) Generally used to communicate LAN to WAN.
3) It is like allowing communication to all.
Command Syntax:
Router(config)# ip route [Link] [Link] <next-hop-address>
Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
delhi(config-if)#int se0/0/0
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#do wr
Router1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#ip route [Link] [Link] [Link]
mumbai(config)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#do wr
Router1:
Router>en
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#int se0/0/1
mumbai(config-if)#no shut
mumbai(config-if)#cl ra 64000
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#do wr
Router2:
Router>en
Router#conf t
Router(config)#ho chennai
chennai(config)#int fa0/0
chennai(config-if)#no shut
chennai(config-if)#int se0/0/1
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
chennai(config-if)#no shut
chennai(config-if)#band 100
chennai(config-if)#do wr
chennai(config-if)#do wr
chennai(config-if)#exit
chennai(config)#ip route [Link] [Link] [Link]
chennai(config)#do wr
• Interior Gateway Protocol is a routing protocol which is used to find network path
information within an autonomus no. (A.S no.)
a) RIP
b) IGRP
c) EIGRP
d) OSPF
Routing Information Protocol (RIP):
➢ Routing Information Protocol (RIP) is a true distance-vector routing protocol.
➢ RIP uses hop count to determine the best path between two locations.
➢ Maximum allowable hop count of 15 by default.
➢ In a RIP network, each router broadcasts its entire RIP table to its neighbor routers every
30 seconds.
➢ Used in small organization only.
➢ RIP - RIP v1 ( Support classful IP only)
➢ RIP v2 (Support classful and classless both)
Command Syntax
R(config)# Router RIP
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
R(config)# do wr
In Router 0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#exit
delhi(config)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router rip
delhi(config-router)#network [Link]
delhi(config-router)#network [Link]
delhi(config-router)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
delhi(config-router)#exit
In Router 1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#no shut
mumbai(config-if)#exit
mumbai(config)#int se0/0/0
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router rip
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai (config-router)#do wr
mumbai (config-router)#exit
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
In Router 0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#exit
delhi(config)#int se 0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router rip
delhi(config-router)#network [Link]
delhi(config-router)#network [Link]
delhi(config-router)#do wr
delhi(config-router)#exit
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
In Router 1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config)#int se0/0/1
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#cl ra 64000
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router rip
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai(config-router)#do wr
mumbai(config-router)#exit
Router2:
Router>en
Router#conf t
Router(config)#ho chennai
chennai(config)#int fa0/0
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
chennai(config-if)#int se0/0/1
chennai(config-if)#ip add [Link] [Link]
chennai(config-if)#no shut
chennai(config-if)#band 100
chennai(config-if)#do wr
chennai(config-if)#exit
chennai(config)#router rip
chennai(config-router)#network [Link]
chennai(config-router)#network [Link]
chennai(config-router)#do wr
chennai(config-router)#exit
IGRP
Command Syntax
R1(config)# router IGRP 10 ([Link])
R1(config)#do wr
NOTE:-
❖ EIGRP uses autonomous system number to identify the collection of routers that share
route information. Only routers that have the same autonomous system numbers share
routes.
❖ AS no should be same on all routers to become neighbors and exchange the routes.
❖ EIGRP routers that belongs to different autonomous systems don’t automatically share
routing information and they don’t become neighbors.
Disadvantage:
Command Syntax
R1(config)# router EIGRP 10 ([Link])
R1(config)#do wr
R2(config)# do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router eigrp 10
delhi(config-router)#network [Link]
delhi(config-router)#network [Link]
delhi(config-router)#no auto-summary
delhi(config-router)#do wr
Router1:
Router>en
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router eigrp 10
mumbai(config-router)#network [Link]
mumbai(config-router)#network [Link]
mumbai(config-router)#no auto-summary
mumbai(config-router)#do wr
Advantages:
➢ It will run on most routers, since it is based on an open standard.
➢ It uses the SPF algorithm, developed by dijkstra, to provide a loop-free topology.
➢ It provides fast convergence with triggered, incremental updates via Link State
Advertisements (LSAs).
Disadvantages:
➢ It requires more memory to hold the adjacency (list of OSPF neighbors), topology and
routing tables.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Command Syntax:
Router(config)#Router OSPF [Link]
Router(config)#Network <directly connected nw> <wild card mask> Area no.
Router(config)# do wr
Area:
1. An OSPF network is divided into areas that are logical groupings of hosts and networks.
2. An area includes its router having interfaces connected to the network.
3. Each area maintains a separate link state database
4. Areas are uniquely identified with 32-bit numbers ( 1– 65,535)
Eg: 0 – [Link] or 1 - [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
2) Stub: Stub Area, Totally stubby area and Not So Stubby Area
Router types:
Internal router(IR):All the router in the same areas
Autonomous system boundary router (ASBR): Connect the domain which is configured in other
protocol
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router attributes:
Designated router (DR): Master
Protocol Messages
➢ Link State Request (LSR)
➢ Link State Update( LSU)
➢ Link State Acknowledgment (LS ack)
Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#router ospf 35
delhi(config-router)#network [Link] [Link] area 1
delhi(config-router)#network [Link] [Link] area 0
delhi(config-router)#do wr
delhi(config-router)#exit
Router1:
Router>en
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router ospf 35
mumbai(config-router)#network [Link] [Link] area 2
mumbai(config-router)#network [Link] [Link] area 0
mumbai(config-router)#do wr
mumbai(config-router)#exit
• Exterior Gateway Protocol is a routing protocol which is used to find network path
information between different Autonomous no. (A.S no.)
1) BGP
Command Syntax:
R1(config)# router BGP 10 ([Link])
R1(config)#end
R1#wr
R2(config)#end
R1#wr
Router0:
Router>en
Router#conf t
Router(config)#ho delhi
delhi(config)#int fa0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
delhi(config-if)#int se0/0/0
delhi(config-if)#ip add [Link] [Link]
delhi(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
delhi(config-if)#cl ra 64000
delhi(config-if)#band 100
delhi(config-if)#do wr
delhi(config-if)#exit
delhi(config)#router bgp 10
delhi(config-router)#network [Link] mask [Link]
delhi(config-router)#network [Link] mask [Link]
delhi(config-router)#neighbor [Link] remote-as 20
delhi(config-router)#end
delhi#wr
Router1:
Router>en
Router#conf t
Router(config)#ho mumbai
mumbai(config)#int fa0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#int se0/0/0
mumbai(config-if)#ip add [Link] [Link]
mumbai(config-if)#no shut
mumbai(config-if)#band 100
mumbai(config-if)#do wr
mumbai(config-if)#exit
mumbai(config)#router bgp 20
mumbai(config-router)#network [Link] mask [Link]
mumbai(config-router)#network [Link] mask [Link]
mumbai(config-router)#neighbor [Link] remote-as 10
mumbai(config-router)#end
mumbai#wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router 1 ------------------------------------> PC 1
R1>en
R1#conf t
R1(config)#ho name
R1(config)#line vty 0 4
R1(config)#password 123
R1(config)#login
R1(config)#exit
R1(config)#enable password 1234
R1(config)#do wr
After that where we want to check we go to that router (CLI mode) and type:
In Router2 ([Link])
R1>en
R# telnet [Link]
Ist - vty password
2nd - en
3rd - secret password or user password
Tracert
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Procedure:
• Open any pc of N/w 1
• Open cmd mode tracert<destination n/w IP>
-------------Router 1 IP
-------------Router 2 IP
-------------Router 3 IP
Tracert<destination IP address>
---------- router 1 IP
---------- router 2 IP
Traceroute:
• To trace the route.
• This command used in router.
• To know the number of hops between source and destination.
Router>en
Router #traceroute<Dest-IP>
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
In Router1:
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#do wr
In Router3:
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#do wr
Router(config-if)#exit
In Router2:
Router>en
Router#conf t
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router(config)#int fa0/0
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa0/1
Router(config-if)#ip add [Link] [Link]
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#ho R2
R2(config)#enable password 1234
Router(config)#ip domain-name [Link]
R2(config)#crypto key generate rsa
How many bits in module[512]:1024
R2(config)#ipssh time-out 15
R2(config)#ipssh authentication-retries 2
R2(config)#username avinash password cisco
R2(config)#line vty 0 4
R2(config-line)#transport input ssh
R2(config-line)#login local
R2(config-line)#do wr
R2(config-line)#exit
1) Standard AL 2) Extended AL
1) Standard AL:
2) Extended AL:
• Traffic is filtered based on source IP, Destination IP, TCP or UDP, [Link] ,protocol etc.
• Provide more feature than Standard AL
• Uses AL number 100-199 and 2000-2699
• Can block a network, host, subnet and services.
• Selected services can be block.
Note: - Mainly these commands are used to block the access between two or many network.
Note:- deny any : the last line (by default given by router)
So, after writing ACL add one extra line to permit all.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Sol:-
R2>en
R2#conf t
R2(config)#ip access-list extended test1
R2(config-ext-nacl)#deny ip [Link] [Link] [Link] [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#interface fa0/1
R2(config-if)#ip access-group test1 in
R2(config-if)#exit
Example 2:- Deny a specific host and permit all other host (One to many)
Q. Deny a particular host [Link] to access the network [Link] but it can access
other network.
Sol:-
R2>en
R2#conf t
R2(config)#ip access-list extended test2
R2(config-ext-nacl)#deny ip host [Link] [Link] [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#int fa0/1
R2(config-if)#ip access-group test2 in
R2(config-if)#exit
Example 3:- Permit a specific host and deny all other host (one to many)
Q. Permit a particular host [Link] where as block all hosts in network [Link]
Sol:-
R2>en
R2#conf t
R2(config)#ip access-list extended test3
R2(config-ext-nacl)#permit ip host [Link] [Link] [Link]
R2(config-ext-nacl)#deny ip [Link] [Link] [Link] [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#int fa0/1
R2(config-if)#ip access-group test3 in
R2(config-if)#exit
Example 4:-
Q. Deny communication between two hosts only and permits others (one to one)
Sol:-
R2>en
R2#conf t
R2(config)#ip access-list extended test4
R2(config-ext-nacl)#deny ip host [Link] host [Link]
R2(config-ext-nacl)#permit ip any any
R2(config-ext-nacl)#exit
R2(config)#int fa0/1
R2(config-if)#ip access-group test4 in
R2(config-if)#exit
Ans:-
i)From any PC of the N/w open the PC --> Desktop --> Web browser --> then type :
[Link]
R2>en
R2# conf t
[Link] [Link] eq 80
R2# no shut
R2# do wr
[Link]
Ans:-
R2>en
R2#conf t
R2# no shut
R2# do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Types of NAT:
1. Static–
• One to one mapping (1-private/1-public)
• This type of NAT is designed to allow one-to-one mapping between local and global address.
• Static version requires one real internet IP address (public IP) for every host on your
network.
2. Dynamic–
➢ Many to many mapping (multiple Public IP to Multiple Private IP)
➢ This version gives you the ability to map an unregistered IP ta a registered IP addressfrom
out of a pool of registered IP address.
3. Overload–
• It became PAT (Port Address Translation, (Many - 1)
• This is the most popular type of Nat configuration. Understand that overloading really is a
form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP
address-many-to-one by using different ports.
• It is also known as Port address translation (PAT), and by using (NAT overload), we get to
have thousands of users connect to the internet using only one real global IP address.
• NAT overload is the real reason we haven’t run out of valid IP address on the internet.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Configuration:
Static NAT:
In router 1
#int fa0/0
# ip add [Link] [Link]
# no shut
# exit
# int se0/0/0
#ip add [Link] [Link]
# no shut
# cl ra 64000
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
# band 100
# do wr
# exit
# int fa0/1
#ip nat inside
#exit
#int se0/0/0
#ip nat outside
#exit
# ip route [Link] [Link] [Link]
# ip nat inside source static [Link] [Link]
# do wr
# exit
Now Access the web page of Server by using Public IP ([Link]) from any client PC.
Use command = sh ip nat translation (By router)
Dynamic NAT
First configure Default routing.
# int fa0/1
#ip nat inside
#exit
#int se0/0/0
#ip nat outside
#exit
# access-list 100 permit ip any any
# ip nat Pool test1 [Link] [Link] netmask [Link]
# ip nat inside source list 100 pool test1
#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
# int fa0/1
#ip nat inside
#exit
#int se0/0/0
#ip nat outside
#exit
# access-list 100 permit [Link] [Link]
# ip nat Pool test1 [Link] [Link] netmask [Link]
# ip nat inside source list 100 pool test1 overload
#do wr
Switching
➢ Switch is a computer networking device that connects devices together on a computer
network.
➢ A network switch is a multiport network bridge that uses hardware addresses to process and
forward data at the data link layer (layer 2) of the OSI model.
➢ Two Types :Non-Manageable and Manageable
a) Non-Manageable:
➢ Unmanaged switches have less network capacity than managed switches.
➢ It's not designed to be configured, so installation is easy.
b) Manageable:
➢ A managed network switch is configurable, offering greater flexibility and
capacity than an unmanaged switch.
➢ You can monitor and adjust a managed switch locally or remotely, to give you
greater network control.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
No of ports in Switch:
4, 8, 12, 16, 24, 32, 48, 52
Some industry switches can be modified and additional card can be used to increase the no of
ports.
Switch mode
1) Half Duplex
2) Full Duplex
Switch Security
Enabling Security:
Switch> en
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch # conf t
or
Switch (config) #enable secret 12345 ------> 2nd layer encrypted password
Switch (config) # do wr
Disabling Security:
Switch> en
Switch # conf t
Switch (config) # do wr
Process:
1) Unplug the power cable of switch
2) Plug it again and press mode button in front side
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Cisco Release the Mode button when the SYST LED blinks amber and then turns
2960, solid green. When you release the Mode button, the SYST LED blinks
2970 green.
The system has been interrupted prior to initializing the flash file system to finish
flash-init
load-helper
boot
4) Now Type
switch: flash-init
Switch: load-helper
switch: boot
Now switch will boot and enter into console without asking password.
Switch configuration:
Switch port mode:-
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch0:
Switch>en
Switch#conf t
Switch(config)#intfa 0/1
Switch(config-if)#no shut
Switch(config-if)#int fa0/2
Switch(config-if)#no shut
Switch(config-if)#int fa0/3
Switch(config-if)#no shut
Switch(config-if)#do wr
Switch(config-if)#exit
Switch1:
Switch>en
Switch#conf t
Switch(config)#int fa0/1
Switch(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch(config-if)#int fa0/2
Switch(config-if)#no shut
Switch(config-if)#int fa0/3
Switch(config-if)#no shut
Switch(config-if)#do wr
Switch(config-if)#exit
Advantages:-
Configuration:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch0:
Switch>en
Switch#conf t
Switch(config)#int ra fa0/1-4
Switch(config-if-range)#no shut
Switch(config-if-range)#int fa0/5
Switch(config-if)#no shut
Switch(config-if)#do wr
Switch(config-if)#exit
Switch(config)#vlan 2
Switch(config-vlan)#name sales
Switch(config-vlan)#vlan 3
Switch(config-vlan)#name account
Switch(config-vlan)#int ra fa0/1-2
Switch(config-if-range)#int ra fa0/3-4
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch(config-if-range)#do wr
Switch(config-if-range)#exit
Switch1:
Switch>en
Switch#conf t
Switch(config)#int ra fa0/1-4
Switch(config-if-range)#no shut
Switch(config-if-range)#int fa0/5
Switch(config-if)#no shut
Switch(config-if)#do wr
Switch(config-if)#exit
Switch(config)#vlan 2
Switch(config-vlan)#name sales
Switch(config-vlan)#vlan 3
Switch(config-vlan)#name account
Switch(config-vlan)#int ra fa0/1-2
Switch(config-if-range)#int ra fa0/3-4
Switch(config-if-range)#do wr
Switch(config-if-range)#exit
3 - other switches in different floor or diff. location having 3 clients in each switch
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Condition:-The SAP client should access SAP server only and so on..........
802.1q:-This is the most common trunking protocol. It is a standard and supported by many
vendors.
Configure Inter-VLAN:
IN Switch0:
Switch>en
Switch#conf t
Switch(config)#intra fa0/1-4
Switch(config-if-range)#no shut
Switch(config-if-range)#int fa0/5
Switch(config-if)#no shut
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch(config-if)#exit
Switch(config)#vlan 2
Switch(config-vlan)#name sales
Switch(config-vlan)#vlan 3
Switch(config-vlan)#name accounts
Switch(config-vlan)#intra fa0/1-2
Switch(config-if-range)#intra fa0/3-4
Switch(config-if-range)#do wr
IN Router 0:
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa0/0.1
Router(config-subif)#encapsulation dot1q 2
Router(config-subif)#exit
Router(config)#int fa0/0.2
Router(config-subif)#encapsulation dot1q 3
Router(config-subif)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
➢ When you configure a new VLAN on one VTP server, the VLAN is distributed through all
switches in the domain. This reduces the need to configure the same VLAN everywhere.
VTP version:
VTP v1 VTP v2 VTP v3
VTP Modes:
Server Mode:
• In VTP server mode, you can create, modify, and delete VLANs and specify other
configuration.
Client Mode:
• VTP clients behave the same way as VTP servers, but we cannot create, change, or delete
VLANs on a VTP client.
Transparent Mode:
• Transparent switches do forward VTP advertisements that they receive out their trunk ports
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
VTP Pruning:
• VTP ensures that all switches in the VTP domain are aware of all VLANs. Sometimes VTP
can create unnecessary traffic
• VTP pruning is a feature that you use in order to eliminate or prune this unnecessary traffic.
• When VTP pruning is enabled on a VTP server, pruning is enabled for the entire
management domain.
VTP Password:
• If we configure a password for VTP, you must configure the password on all switches in the
VTP domain. The password must be the same password on all those switches.
Configuration
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch0>en
Switch0#conf t
Switch0(config)#ho delhi
delhi(config)#int ra fa 0/0-1
delhi(config)#int fa 0/3
delhi(config)#vlan 10
delhi(config)#name account
delhi(config)#vlan 20
delhi(config)#name sales
delhi(config)#do wr
delhi# sh vlan
Switch1#conf t
Switch1(config)#ho mumbai
mumbai(config)#int ra fa 0/0-1
mumbai(config)#int ra fa 0/3-4
mumbai(config)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
mumbai(config)#do wr
mumbai(config)#sh vlan
Switch2#conf t
Switch2(config)#ho kolkata
kolkata(config)#int ra fa 0/0-1
kolkata(config)#int ra fa 0/3
kolkata(config)#do wr
kolkata(config)#do wr
kolkata(config)#exit
Or
• Spanning tree protocol (STP) uses spanning tree algorithm to avoid the switching loops in
layer-2 devices (bridges or switches).
• STP works when multiple switches are used with redundant links avoiding broadcast
storms, multiple frame copies & database instability.
• First developed by DEC
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
STP Terminology:
BPDU
• All switches exchange information through what is called as bridge protocol data units
(BPDUs)
• BPDUs contain a lot of information to help the switches determine the topology and any
loops that result from that topology.
• BPDUs are sent every 2 sec.
Bridge ID
• All switches other than the root bridge are Non-Root Bridges.
Root port:
• The link directly connected to the root bridge, or the shortest path to the root bridge.
• Every non-root bridge looks the best way to go root-bridge.
• For every non-root bridge there is only once root port.
1. Root port with the least cost (speed) connecting to the root bridge.
2. The bridge with the best (Lowest) switch ID
3. Lowest Physical port number.
Designated port:
• All the port or ports which are blocked by STP to avoid switching loop.
• A Non designated port will always in blocked mode.
STP port states:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Blocking: Won’t forward frames listen to BPDUs, All ports are in blocking states by default when
the switch is powered up.
Listening: Listens to BPDUs to make sure no loops occur on the network before passing data
frames.
Learning: Learn MAC addresses and builds a filter table but does not forward frames.
Forwarding: Sends and receives all data on the bridged port.
To verify spanning-tree behavior:
Sw-1# sh spanning-tree
Sw-2# sh spanning-tree
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Sw-3# sh spanning-tree
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Switch>en
Switch# sh port-security
Switch#conf t
Switch(config)#int fa0/1
Switch(config)#switchport port-security
Switch# sh port-security
Switch# shipintbr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Note:-If we change the PC1 to other PC the port will be block because the Mac-address to that PC
is not matched.
Frame Relay
• Is a packet switching telecommunication service.
• Cost efficient data transmission between LAN and endpoints in WAN.
• Connection oriented link layer service.
• With frame relay we can have a single serial interface on a router connecting into multiple
remote sites through virtual circuits.
• Avirtual circuit is a logical connection between two devices.
Advantages:
• VC’s overcome the scalability problem of leased line by providing the multiple logical
circuits over the same physical connection.
• Cheaper
• Best quality
• VC’s are full duplex
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
LMI types:
a) CISCO (default)
b) ANSI
c) Q933A
Router1:
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#intse0/0/0
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router(config-if)#no shut
Router(config-if)#cl ra 64000
Router(config-if)#band 100
Router(config-if)#exit
Router(config)#router rip
Router(config-router)#network [Link]
Router(config-router)#network [Link]
Router(config-router)#do wr
Router(config-router)#exit
Router(config)#int se0/0/0
Router(config-if)#encapsulation frame-relay
Router(config-if)#ho delhi
delhi(config)#do wr
Router2:
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int se0/0/0
Router(config-if)#no shut
Router(config-if)#cl ra 64000
Router(config-if)#band 100
Router(config-if)#exit
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router (config-router)#do wr
Router (config-router)#exit
Kolkatta (config-if)#do wr
******************************************
Cloud:
• Open WAN Emulation and select 1st diagram genric.
• To connect b/w router to cloud (Genric) first click on router (through DCE cable)
1. Go to interface ->
serial 0
LMI –cisco
Serial 1
• A data link connection identifier is a frame relay 10 bit wide link local virtual circuit.
• identifier used to assign frames to a specific PVC(Permanent virtual circuit)
• Frame relay networks use DLCI s to statistically multiplex frames.
• Valid – 10 bit
DLCI address:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
1008-1018 – Reserved
1023 – Reserved for LMI link mgt(Local management interface- Is a signaling standard
used between routers and frame.)
Router0
Router0 Router>en
Router0 Router#conf t
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router0 delhi(config-if)#do wr
Router0 delhi(config-if)#exit
Router0 delhi(config-router)#do wr
Router0 delhi(config-router)#exit
Router1
Router1 Router>en
Router1 Router#conf t
Router1 chennai(config-if)#do wr
Router1 chennai(config-if)#exit
Router1 chennai(config-router)#do wr
Router1 chennai(config-router)#exit
Router2
Router2 Router>en
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router2 Router#conf t
Router2 Router(config-if)#exit
Router2 kerala(config-if)#do wr
Router2 kerala(config-if)#exit
Router2 kerala(config-router)#do wr
Router2 kerala(config-router)#exit
Cloud:
• Open WAN Emulation and select 1st diagram genric.
• To connect b/w router to cloud (Generic) first click on router (through DCE cable)
Go to interface ->
Serial 0
LMI –cisco
Serial 1
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Serial 2
Firewall
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
1) Inbound Rule
2) Outbound Rule
Inbound rules:
• These are to do with other things accessing your computer. If you are running a Web Server
on your computer then you will have to tell the Firewall that outsiders are allowed to
connect to it.
Outbound rules:
• These are so that you can let some programs use the Internet, and Block others. You will
want to let your Web Browser (Internet Explorer, Firefox, Safari, Chrome, Opera...) have
access to the Internet, so you will tell Windows Firewall that it's allowed.
1) Zone Alarm
2) Comodo free firewall
3) Peer Block
4) Tiny wall
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
WIRELESS NETWORK
➢ Wireless network allows to a communication between 2 or many computers without
using physical wire.
What is IEEE ?
IEEE 802 : IEEE 802 is a family of IEEE standards dealing with local area networks and
metropolitan area networks.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Full Form
NMT - Nordic Mobile Telephone
•
WEP is a weak security standard.
•
The password it uses can often be cracked in a few minutes with a basic laptop
computer and widely available software tools.
2) WPA (Wi-Fi Protected Access):
3) WPA2
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
• The current standard is WPA 2, some hardware cannot support WPA2 without
firmware upgrade or replacement.
• WPA 2 uses an encryption device that encrypts the network with a 256-bit key, the
longer key length improves security over WEP.
1) WPA2-TKIP
• TKIP is actually an older encryption protocol introduced with WPA to replace the very-
insecure WEP encryption at the time.
• TKIP is actually quite similar to WEP encryption.
• TKIP is no longer considered secure, and is now deprecated.
2) WPA2-AES
User =admin
Password = admin
B) Wireless Security
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
SSID = RTS
Mode: 802.11n
Security option = WPA2
Encryption = AES
Pre shared key = 123456
C) LAN setting
IP = [Link]
SM= [Link]
E) Parental Control
-Blocking web sites
- Blocking services( like http, https, ftp etc)
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
✓ Two connections – one is made to the Internet and the second is made to the VPN.
✓ Datagrams – contains data, destination and source information.
✓ Firewalls – VPNs allow authorized users to pass through the firewalls.
✓ Protocols – protocols create the VPN tunnels.
Tunneling:
A virtual point-to-point connection made through a public network. It transports
encapsulated datagrams.
➢ PPTP (Point-to-Point Tunneling Protocol)- This protocol is used to connect a remote client
to a private server over the internet.
➢ L2TP (Layer 2 Tunneling Protocol)- This protocol is used to tunnel data communication
traffic between two sites over the internet.
➢ IPsec (Internet Protocol Security)- It is used to secure communications over the internet.
Ipsec traffic can use either transport mode or tunneling to encrypt data traffic in a VPN.
➢ SSL (Secure sockets layer)- Use cryptography to secure communications over the internet,
an authentication process involving certificates is used. Certificates are cryptographic key
that are stored on both the server and client.
Types of VPN:
Advantages:
Remote-access VPN:
A remote-access VPN uses a public telecommunication infrastructure like the internet to provide
remote users secure access to their organization's network.
A remote-access VPN usually relies on either IPsec or Secure Sockets Layer (SSL) to secure the
connection, although SSL VPNs are often focused on supplying secure access to a single
application, rather than to the entire internal network.
Site-to-site VPN:
A site-to-site VPN uses a gateway device to connect the entire network in one location to the
network in another location, usually a small branch connecting to a data center.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
End-node devices in the remote location do not need VPN clients because the gateway handles the
connection. Most site-to-site VPNs connecting over the internet use IPsec.
Configuration:
In Router 1:
Router>en
Router#conf t
Router(config)#ho R1
R1(config)#int fa0/0
R1(config-if)#ip add [Link] [Link]
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#int fa0/1
R1(config-if)#ip add [Link] [Link]
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#ip route [Link] [Link] [Link]
R1(config)#do wr
R1(config)#do ping [Link]
R1(config)#int tunnel 10
R1(config-if)#ip add [Link] [Link]
R1(config-if)#tunnel source fa0/1
R1(config-if)#tunnel destination [Link]
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#ip route [Link] [Link] [Link]
R1(config)#do wr
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
To Check:
In Router 2:
Router>en
Router#conf t
Router(config)#ho R2
R2(config)#int fa0/0
R2(config-if)#ip add [Link] [Link]
R2(config-if)#no shut
R2(config-if)#exit
R2(config)#int fa0/1
R2(config-if)#ip add [Link] [Link]
R2(config-if)#no shut
R2(config-if)#exit
R2(config)#do wr
In Router 3:
Router>en
Router#conf t
Router(config)#ho R3
R3(config)#int fa0/0
R3(config-if)#ip add [Link] [Link]
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#int fa0/1
R3(config-if)#ip add [Link] [Link]
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#ip route [Link] [Link] [Link]
R3(config)#do wr
R3(config)#do ping [Link]
R3(config)#int tunnel 100
R3(config-if)#ip add [Link] [Link]
R3(config-if)#tunnel source fa0/0
R3(config-if)#tunnel destination [Link]
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#ip route [Link] [Link] [Link]
R3(config)#do wr
To Check:
So what actually IPsec does is it acts at the network layer which means its working in network
layer of TCP/IP model and protecting sensitive data and authenticate IP packets only between
participating IPsec devices like cisco routers.
here in this IPSEC Example lab Router0 and Router1 is is participating in IPsec [Link] in this
acitivity or in this lab i will configure these two routers to support a site to site IPsec VPN for
traffic flowing from their respective LANs.
Configuration on Router1
Router(config)#router rip
Router(config-router)#network [Link]
Router(config-router)#network [Link]
Router(config-router)# crypto isakmp policy 10
Router(config-isakmp)#authentication pre-share
Router(config-isakmp)#hash sha
Router(config-isakmp)#encryption aes 256
Router(config-isakmp)#group 2
Router(config-isakmp)#lifetime 86400
Router(config-isakmp)#exit
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Verification on Router0
Test and Verify IPSEC Configuration
Router#show crypto isakmp sa
Router# show crypto ipsec sa
Types Of Switches
1) Store and Forward Switching
➢ In Store and Forward switching, Switch copies each complete Ethernet frame into the switch
memory and computes a Cyclic Redundancy Check (CRC) for errors. If a Cyclic Redundancy
Check (CRC) error is found, the Ethernet frame is dropped and if there is no Cyclic Redundancy
Check (CRC) error, the switch forwards the Ethernet frame to the destination device.
➢ Store and Forward switching can cause delay in switching since Cyclic Redundancy Check
(CRC) is calculated for each Ethernet frame.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
2) Cut-through Switching
In cut-through switching, the switch copies into its memory only the destination MAC address (first 6
bytes of the frame) of the frame before making a switching decision. A switch operating in cut-through
switching mode reduces delay because the switch starts to forward the Ethernet frame as soon as it
reads the destination MAC address and determines the outgoing switch port.
3) Fragment-Free Switching
Fragment-free switching is also known as runtless switching and is a hybrid of cut-through and store-
and-forward switching. Fragment-free switching was developed to solve the late-collision problem
Layer 3 switching is another example of fragment-free switching.
Multilayer switching is a switching technique that switches at both the data link (OSI Layer 2) and
network (OSI Layer 3) layers. To enable multilayer switching, LAN switches must use store-and-
forward techniques because the switch must receive the entire frame before it performs any protocol
layer operations
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router Backup
1) Configure some setting like password, int ,hostname etc.
2) Router# sh run
3) Now take backup
Router# copy start tftp
Address of remote host -tftp[]? [Link]
Destination File name ? rts-router-bkf
Router Restore
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Now restart the router and check. All old setting you can see now.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Networking Protocol
A protocol is set of rules that must be followed while communicating two networking devices.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Same as FTP but downloading data is divided into a small parts. Downloading is fast in TFTP.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Dynamic Host
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
INTERNET PROTOCOL
➢ It is the method or protocol by which data is sent from one computer to another on the internet.
➢ Each Computer (known as host) on the internet has at least one IP address that uniquely identifies it
from all other Computers on the internet.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
In CSMA/CA, as soon as a node receives a packet that is to be sent, it checks to be sure the channel is clear
(no other node is transmitting at the time). If the channel is clear, then the packet is sent. If the channel is not
clear, the node waits for a randomly chosen period of time, and then checks again to see if the channel is
clear.
FRAME DELAY
Frame relay is a data link layer, digital packet switching network protocol technology designed to
connect Local Area Networks (LANs) and transfer data across Wide Area Networks (WANs).
It also supports variable-length packet sizes for more efficient utilization of network bandwidth.
Frame Relay operates over fiber optic or ISDN lines and can support different higher level
network protocols including Internet Protocol (IP).
[Link] Virtual Circuits(PVC): For persistent connections intended to be maintained for long periods of
time even if no data is actively being transferred
[Link] Virtual Circuits (SVC): For temporary connections that last only for the duration of a single
session
Port Number
Network ports are provided by the TCP or UDP protocols at the Transport layer.
They are used by protocols in the upper layers of the OSI model.
Port numbers are used to determine what protocol incoming traffic should be directed to.
Port use is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN).
By ICANN there are three categories for ports:
• From 0 to 1023 – well known ports assigned to common protocols and services
• From 1024 to 49151 – registered ports assigned by ICANN to a specific service
• From 49152 to 65 535 – dynamic (private, high) ports range from 49,152 to 65,535. Can
be used by any service on an ad hoc basis. Ports are assigned when a session is
established, and released when the session ends.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
23 Telnet TCP
50, 51 IPSec
443 HTTP with Secure Sockets Layer (SSL) TCP and UDP
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
➢ Routers which are used by the ISPs and are also known as ISP Layer Routers
➢ Router Series : 3800, 3900 old one :- 2600, 3200, 3600, 3700
Router Classification
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Router Ports
Serial Port
• Serial pin configuration is 60 pin configuration female (i.e. 15 pins and 4 rows) and Smart
Serial pin configuration is 26 pin configuration female.
• It is known as WAN Port
• It is used for connecting to Remote Locations
• V.35 cable is having 60 pin configuration male at one
end and on the other end 18 pin configuration male.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Console Port
Auxiliary Port
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Brief Overview
o WAN interfaces
▪ Serial interface (S0, S1 etc) – 60 pin/26 pin(smart serial)
▪ ISDN interface(BRI0 etc) – RJ45
o LAN interfaces - Ethernet
▪ AUI (Attachment Unit Interface) (E0)– 15 pin
▪ 10baseT – RJ45
o Administration interfaces
▪ Console – RJ45 – Local Administration
▪ Auxiliary – RJ45 – Remote Administration
Internal Components
ROM
A bootstrap program is located here. It is same as the BIOS of the PC. Bootstrap program
current version is 11.0
Flash
Internetwork Operating System (IOS) developed by Cisco is stored here. IOS is Command
line interface.
NVRAM
Non volatile RAM, similar to Hard Disk It is also known as Permanent Storage or Startup
Configuration. Generally size of NVRAM is 32 KB.
RAM
It is also known as Temporary Storage or running Configuration. Minimum size of RAM is
2MB. The size of RAM is greater than NVRAM in the Router.
Processor
Motorola Processor 70 Mhz, RISC based processor (Reduced Instruction Set Computer)
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
L2: 2950,2960
L3: 3550,3560,3750,4500,6500,7000
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Hardware Features
3750 Series Switches consume less power than their predecessors.
Get support for up to 48 PoE+ ports, Cisco UPOE (60W per port), and energy-efficient Ethernet.
Support nonstop communications with hot-swappable power supplies, cooling fans, and network
modules.
Software Features
They can provide investment protection by enabling a unified network for data, voice, and video.
IP Base software includes advanced QoS, rate limiting, ACLs, Open Shortest Path First for routed
access, and IPv6 functionality.
Protect against malicious behavior with Flexible NetFlow. Protect data confidentiality with MACsec
Layer 2 encryption. Provide identity-based access control with TrustSec.
Used Area
They are ideal access layer switches for enterprise, retail, and branch-office environments.
Switching Mode
Store-and-Forward: Store-and-Forward switching will wait until the entire frame has arrived prior to forwarding
it. This method stores the entire frame in memory. Once the frame is in memory, the switch checks the destination
address, source address, and the CRC. If no errors are present, the frame is forwarded to the appropriate port. This
process ensures that the destination network is not affected by corrupted or truncated frames.
Cut-Through: Cut-Through switching will begin forwarding the frame as soon as the destination address is
identified.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
The difference between this and Store-and-Forward is that Store-and-Forward receives the whole frame before
forwarding. Since frame errors cannot be detected by reading only the destination address, Cut-Through may
impact network performance by forwarding corrupted or truncated frames. These bad frames can create broadcast
storms wherein several devices on the network respond to the corrupted frames simultaneously.
Store-and-forward
Cut-through
• The Cisco Nexus 5000 Series access-layer switch is an example of a low-latency cut-through single-
stage fabric implementation
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
STP
Introduction to Spanning-Tree Protocol
Spanning-tree is a protocol that runs on our switches that helps us to solve loops.
What is a loop and how do we get one? Let me show you an example:
In the picture above we have two switches. These switches are connected to each other with a
single cable so there is a single point of [Link] get rid of this single point of failure we will add
another cable:
With the extra cable we now have redundancy. Unfortunately for us redundancy also
brings loops. Why do we have a loop in the scenario above? Let me describe it to you:
1. H1 sends an ARP request because it’s looking for the MAC address of H2. An ARP request is
a broadcast frame.
2. SW1 will forward this broadcast frame on all it interfaces, except the interface where it received the
frame on.
3. SW2 will receive both broadcast frames.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
1. It will forward it out of every interface except the interface where it received the frame on.
2. This means that the frame that was received on interface Fa0/0 will be forwarded on Interface Fa1/0.
3. The frame that was received on Interface Fa1/0 will be forwarded on Interface Fa0/0.
Do you see where this is going? We have a loop! Both switches will keep forwarding over and over
again until the following happens:
Spanning-tree will help us to create a loop-free topology by blocking certain interfaces. Let’s take
a look how spanning-tree works! Here’s an example:
We have three switches and as you can see we have added redundancy by connecting the
switches in a triangle, this also means we have a loop here. I have added the MAC addresses but
simplified them for this example:
• SW1: MAC AAA
• SW2: MAC BBB
• SW3: MAC CCC
Since spanning tree is enabled, all our switches will send a special frame to each other called
a BPDU (Bridge Protocol Data Unit). In this BPDU there are two pieces of information that
spanning-tree requires:
• MAC address
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
• Priority
The MAC address and the priority together make up the bridge ID. The BPDU is sent between
switches as shown in the following picture:
Spanning-tree requires the bridge ID for its calculation. Let me explain how it works:
• First of all spanning tree will elect a root bridge; this root-bridge will be the one that has the best
“bridge ID”.
• The switch with the lowest bridge ID is the best one.
• By default the priority is 32768 but we can change this value if we want.
So who will become the root bridge? In our example SW1 will become the root bridge! Priority and
MAC address make up the bridge ID. Since the priority is the same on all switches it will be the
MAC address that is the tiebreaker. SW1 has the lowest MAC address thus the best bridge ID and
will become the root bridge.
The ports on our root bridge are always designated which means they are in a forwarding state.
Take a look at the following picture:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Above you see that SW1 has been elected as the root bridge and the “D” on the interfaces stands
for designated.
Now we have agreed on the root bridge our next step for all our “non-root” bridges (so that’s
every switch that is not the root) will have to find the shortest path to our root bridge! The
shortest path to the root bridge is called the “root port”. Take a look at my example:
I’ve put an “R” for “root port” on SW2 and SW3, their Fa0/0 interface is the shortest path to get
to the root bridge. In my example I’ve kept things simple but “shortest path” in spanning tree
means it will actually look at the speed of the interface. Each interface has a certain cost and the
path with the lowest cost will be used. Here’s an overview of the interfaces and their cost:
• 10 Mbit = Cost 100
• 100 Mbit = Cost 19
• 1000 Mbit = Cost 4
Excellent!…we have designated ports on our root bridge and root ports on our non-root bridges,
we still have a loop however so we need to shut down a port between SW2 and SW3 to break that
loop. So which port are we going to shut down? The one on SW2 or the one on SW3? We’ll look
again at the best bridge ID:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
VTP VERSIONS
There are three version of VTP so far. VTP Version 2 (V2) is not much different than VTP Version 1
(V1). The major difference is that VTP V2 introduces the support for Token Ring VLANs. If you are
using Token Ring VLANs, you need to enable VTP V2. Otherwise, there is no reason to use VTP V2. VTP
version 3 differs from earlier VTP versions in that it does not directly handle VLANs. VTP version 3 is a
protocol that is only responsible for distributing a list of opaque databases over an administrative domain.
When enabled, VTP version 3 provides the following enhancements to previous VTP versions:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Routing is the process of finding a path on which data can pass from source to destination. Routing is done
by a device called routers, which are network layer devices.
The job of the Data Link layer is to check messages are sent to the right device. Another function of this
layer is framing.
When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With
this process, it gains access and reads the destination address, after which it forwards that frame to the
appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.
Network congestion occurs when too many users are trying to use the same bandwidth. This is especially
true in big networks that do not resort to network segmentation.
A Window refers to the number of segments that is allowed to be sent from source to destination before an
acknowledgement is sent back.
Not really. What a bridge actually does is to take the large network and filter it, without changing the size of
the network.
This model uses the Store-and-forward switching method. It stores the entire frame to its buffers and
performs a crc check before deciding whether or not to forward that data frame.
The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer.
One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also
provide error correction.
RIP relies on the number of hops in order to determine the best route to a network. On the other hand,
IGRP takes consideration many factors before it decides the best route to take, such as bandwidth,
reliability, MTU and hop count.
BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short
for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as
the IP address of the server PC.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
The Application Layer supports the communication components of an application and provides network
services to application processes that span beyond the OSI reference model specifications. It also
synchonizes applications on the server and client.
User Mode is used for regular task when using a CISCO router, such as to view system information,
connecting to remote devices, and checking the status of the router. On the other hand, privileged mode
includes all options that are available for User Mode, plus more. You can use this mode in order to make
configurations on the router, including making tests and debugging.
This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for
100Mbps, which is the data speed.
In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that
is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot
receive while it is transmitting, and vice versa.
MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out
onto the data line without the need to fragment it.
In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out
again and forward it to the next network segment after reading the destination address.
Latency is the amount of time delay that measures the point from which a network device receives a data
frame to the time it sends it out again towards another network segment.
19) Utilizing RIP, what is the limit when it comes to number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered
unreachable.
Frame Relay is a WAN protocol that provides connection-oriented communication by creating and
maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical
Layers.
The initial thing to do is to enable IPX routing by using the “ipx routing” command. Each interface that is
used in the IPX network is then configured with a network number and encapsulation method.
There are two access lists: Standard and Extended. Standard Access List can only filter the source or
destination IP address. An Extended Access List uses the source and destination IP addresses, port,
socket and protocol when filtering a network.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it
is possible to establish networks by different means, such as by function, type of hardware, protocol,
among others. This is a big advantage when compared to conventional LANs wherein collision domains are
always tied to physical location.
Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network,
each subnet is assigned some additional parameters or identifier to indicate its subnet number.
25) What are the advantages of a layered model in the networking industry?
A layered network offers many advantages. It allows administrators to make changes in one layer without
the need to make changes in the other layers. Specialization is encouraged, allowing the network industry
to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.
It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and
acknowledgements.
Presentation layer supports many standards, which ensures that data is presented correctly. These include
PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.
In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall
Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.
31) How do you go to privileged mode? How do you switch back to user mode?
To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user
mode, enter the command “disable”
HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the
default encapsulation operated within CISCO routers.
Internetworks are created when networks are connected using routers. Specifically, the network
administrator assigns a logical address to every network that connects to the router.
Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a
transmission channel can handle, and is measured in Kbps.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Hold-downs prevent regular update messages from reinstating a downed link by removing that link from
update messages. It uses triggered updates to reset the hold-down timer.
Packets are the results of data encapsulation. These are data that has been wrapped under the different
protocols of the OSI layers. Packets are also referred to as datagrams.
Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission
towards the network. Segments are the logic units at the Transport Layer.
Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This
technique is used in order to prevent problems caused by inconsistent updates on a route.
The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are
considered valid are those that can be found between the subnets.
DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order
to uniquely identify each virtual circuit that exists on the network.
From a data transmitter’s point of reference, data from the end user is converted to segments. Segments
are then passed on to the other layers and converted into packets or datagrams. These packets are then
converted into frames before passing on to the network interface. Finally, frames are converted to bits prior
to actual data transmission.
43) What are the different types of passwords used in securing a CISCO router?
There are actually five types of passwords that can be used. These are enable secret, enable, virtual
terminal, console, and auxiliary.
44) Why is network segmentation a good idea when managing a large network?
For a network administration, segmenting a network would help ease network traffic and ensures that high
bandwidth is made available at all times for all users. This translates to better performance especially for a
growing network.
45) What are the things that can be accessed in a CISCO router’s identifying information?
The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed
configurations that refer to the router ports.
Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual
layout of the network medium.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
47) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when the router received a processing
task that incidentally was proportional to the number of links in the internetwork.
48) In configuring a router, what command must be used if you want to delete the configuration data that is
stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config
49) Referring to the commands shown, what command must next be used on the branch router prior to traffic
being sent to the router router?
50) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in
determining the OSPF router ID?
51) Mention what is the difference between the switch, hub, and router?
Hub has single broadcast It is a device that filters and forwards packets
domain and collision between LAN segments. Switches have single
domain. Anything comes broadcast domain and multiple collision domains. It
in one port is sent out to supports any packet protocol, as such it operates at the Router is a device which transmits
the others. data link layer 2 and layer 3 data packets along networks.
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.
A data packet consists of sender’s information, recipient’s information, and the data contained. It also has
the numeric identification number that defines the packet number and order. When data is send across the
network, that information is segmented into data packets. In short, data packets carry the information and
routing configuration for your transferred message.
DHCP stands for Dynamic Host Configuration Protocol. DHCP assigns an IP address automatically to a
given workstation client. You can also make static IPS for machines like printers, servers, routers and
scanners.
BOOTP is a computer networking protocol used to deploy an IP address to network devices from a
configuration server.
It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and
acknowledgments
57. Mention what is the difference between dynamic IP and static IP addressing?
Dynamically IP addresses are provided by DHCP server and static IP address are given manually.
58. Mention what are the ranges for the private IPS?
• Telnet (IP)
• AUX (Telephone)
• Console (Cable)
60. Explain what is EIGRP?
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco
Systems. It is availed on a router to share routes with other routers within the same autonomous system.
Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the
router and the amount of data that needs to be transferred.
• Bandwidth
• Load
• Delay
• Reliability
• MTU
• Maximum Transmission Unit
63. Mention what command you must use if you want to delete or remove the configuration data that is stored
in the NVRAM?
Erase startup- coding is the command you must use if you want to delete the configuration data that is
stored in the NVRAM
Full duplex means that the communication can occur in both directions at the same time, while half duplex
means that the communication can occur in one direction at time.
• Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted
into Data
• Layer Four (Transport): Data is converted into small segments
• Layer Five (Network): Data converted into packets or datagrams and Network header is added
• Layer Six (Data Link): Datagrams or packets are built into frames
• Layer Seven (Physical): Frames are converted into bits
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Route poisoning is a technique of preventing a network from transmitting packets through a route that has
become invalid.
69. What route entry will be assigned to dead or invalid route in case of RIP?
In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it unreachable.
Ans:
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Ans:
Ans:
Ans:
Ans:
Public IP Private IP
Ans:
IPV4 IPV6
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Ans:
Ans:
2 B 16 [Link]
3 C
14) Write the Suitable IP for 2nd and 3rd System to properly communicate with First . --10 M
Best of Luck
A-> [Link]
B-> [Link]
C-> [Link]
D-> [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
2. 2)You have an interface on a router with the IP address of [Link]/29. Including the router interface,
how many hosts can have IP addresses on the LAN attached to the router interface?
A. 6 B) 8 C) 30 D) 32
3)You need to configure a server that is on the subnet [Link]/29. The router has the first available
host address. Which of the following should you assign to the server?
A. [Link] [Link]
B. [Link] [Link]
C. [Link] [Link]
D. [Link] [Link]
3. 4)You have an interface on a router with the IP address of [Link]/29. What is the broadcast address
the hosts will use on this LAN?
A. [Link]
B. [Link]
C. [Link]
D. [Link]
4. 5)What is the subnetwork address for a host with the IP address [Link]/28?
A. [Link]
B. [Link]
C. [Link]
D. [Link]
5. 6)On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the
waste of IP addresses?
A. /27 B) /29 C) /29 D) /30
7)Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask
is [Link]?
A. Router(config)#ip classless B) Router(config)#no ip classful
Class C subnet mask of [Link] is 3 bits on and 5 bits off (11100000) and provides 8 subnets, each
with 30 hosts. However, if the command ip subnet-zero is not used, then only 6 subnets would be available
for use.
6.
9) A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown
in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide
connectivity between the hosts?
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
9)What subnet mask will allow for 128 hosts on a subnet? (choose the best two answers)
11. 11)What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the
[Link] subnet mask?
A. 14 B) 15 C) 16 D) 30
12)You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask
would you use?
A. [Link] B) [Link]
C. [Link] D) [Link]
13. You have a network that needs 29 subnets while maximizing the number of host addresses available on
each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A. 2 B) 3 C) 4 D) 5
No Choice Questions
14. Enter the broadcast address for the network [Link] [Link]
Answer: [Link]
Enter the last valid host on the network [Link] [Link]:
Answer: [Link]
15. What is the Subnet Mask corresponding to a shorthand of /22?
Answer: [Link]
16. What is the Subnet Mask corresponding to a shorthand of /20?
Answer: [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Enter the maximum number of valid subnets and usable hosts per subnet that you can get from the
network [Link]/22:
Answer: Subnets: 64, Hosts per subnet: 1022
What subnet mask would you use for the [Link] network, such that you can get 250 subnets and
240 hosts per subnet?
Answer: [Link]
17. Enter the valid host range for the network that the IP address [Link] [Link] is a
part of:
Answer: First Host: [Link], Last Host: [Link]
18. Enter the last valid host on the network [Link] [Link]:
Answer: [Link]
Class B Questions
19. 19)The network address of [Link]/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
20. 20)If an Ethernet port on a router were assigned an IP address of [Link]/25, what would be the
valid subnet address of this host?
A. [Link]
B. [Link]
C. [Link]
D. [Link]
21. 21)What is the subnetwork number of a host with an IP address of [Link]/21?
A. [Link]
B. [Link]
C. [Link]
D. [Link]
22. 22)You have a network with a subnet of [Link]/22. Which is the valid host address?
A. [Link] [Link]
B. [Link] [Link]
C. [Link] [Link]
D. [Link] [Link]
23. 23)If a host on a network has the address [Link]/30, what is the subnetwork this host belongs
to?
A. [Link]
B. [Link]
C. [Link]
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
D. [Link]
24)What address Class does [Link]/24 belong to?
A) Class A
B) Class B
C) Class C
D) Class D
28) Enter the first valid host on the network that the host [Link]/18 is a part of:
Answer: [Link]
29) Enter the broadcast address for the network [Link] [Link]:
Answer: [Link]
30) Enter the subnet the host [Link]/22 belongs to:
Answer: [Link]
Best of Luck
Rough Work
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Rough Work
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale
Real Time Signals Technologies Pvt Ltd, [Link] or [Link]
Rough Work
All right reserver by Real Time Signals Technologies Pvt Ltd, [Link] or [Link], Not for sale