I ICMP (Internet Control Message Protocol), 15, 72 - 74 Can’t Fragment code, 72 Destination Unreachable messages, 72 Echo Request / Reply messages, 15, 72 Host Unreachable, 72 Network Unreachable code, 72 Protocol Unreachable code, 72 Redirect messages, 72, 74 Source Quench messages, 73 Time Exceeded messages, 15, 72, 73 Unreachable codes, 72 icons, 1 identifying data link layer encapsulated data, 17, 23 subnet broadcast address, 63 IP addresses in a subnet, 63 idle frames (synchronous data link protocols), 152 IETF encapsulation, Frame Relay, 159 IGMP (Internet Group Management Protocol), 20 IGRP (Interior Gateway Routing Protocol), 79, 80 configuration, 87 - 89 metric, 79 variance, 79, 90 inbound access list, 135 inside global addresses, 125, 129 inside local addresses, 125, 129 interaction adjacent-layer interaction, 3 same-layer interaction, 3 interesting traffic, ISDN, 193, 194 interior gateway protocols, 75 interior routing protocols classifying, 75 EIGRP, 95 - 98, 107 - 110 IGRP, 79, 80, 87 - 89 OSPF, 91 - 95, 99 - 106 RIP, 79, 80, 85 - 87 interoperability, 1 interworking, Frame Relay, 162, 163 invalid timer, 80 IOR (Index of Refraction), 27 IOS boot sequence, 37 CLI error messages, 32 configuration register, 37 copy operation, 36 image name decode, 37 modes, 37 ROMmon, 37 vii IP RXBOOT, 37 upgrade process, 36 address classes, 61 IP addresses, 12 IPv4 datagram format, 13 private addressing, 62 subnetting, 12, 62, 63 IPCP (IP Control Protocol), 150 IPv6, 64 IPX (Internetwork Packet Exchange), 12 IPXCP (IPX Control Protocol), 150 ISDN (Integrated Services Digital Networks) BRI, 196, 197 call setup, 197 CHAP, 195 circuit establishment, 189 configuration, 193 - 202 DDR, 193 - 196 dialer groups, 200 dialer profiles, 200 - 202 displaying status information, 197, 198 encoding (PRI), 192, 199 framing (PRI), 192, 199 function groups, 190 idle timers, 193, 196 Layer 2 messages, 197, 198 Layer 3 messages, 197, 198 legacy DDR, 193 - 196 modems, 187, 191 Multilink PPP, 202 out-of-band signaling, 189 PRI configuration, 199 E1 / T1 controllers, 199 encoding, 192, 199 framing, 192, 199 reference points, 191 signaling, 194, 195 SPIDs, 189, 196 ISL (Inter-Switch Link) trunking, 51, 52 ISM (Industrial, Scientific, and Medical) bands, 173 ITU (International Telecommunications Union), 147, 188 J jamming signal, 18 Copyright © 2008 Yap Chin Hoong yapchinhoong@hotmail.com
K keepalives EIGRP, 95 Frame Relay, 157 OSPF, 93 keys, wireless networks, 182, 183 L L3 switches, 53 LANs broadcast domains, 3, 11, 14 cabling, 18, 19, 24, 26 Ethernet, 26 - 29 frames, 3, 23 segmenting, 3, 19 switching, 20 - 22 LAPB (Link Access Procedure Balanced), 152 LAPD (Link Access Procedure – D Channel), 152, 188, 189 LAPF (Link Access Procedure for Frame- Mode Bearer Services), 152, 159 latency, 17, 21, 22 layer access layer, 4 core layer, 4 distribution layer, 4 layered architecture benefits, 1 LCP (Link Control Protocol), 150, 151 LEAP (Lightweight Extensible Authentication Protocol), 183 learning state, STP, 42 leased lines, 143 legacy DDR, 163 - 165 lightweight access points, 177, 178 link-state routing protocols, 91 - 95, 99 - 106 listening state, STP, 42 LLC (Logical Link Control) sublayer, 18 LMI (Local Management Interface), 157, 158 load balancing, 79, 80, 90, 95, 106, 110 local addressing, Frame Relay, 159 local loop, 143 logical topologies, 25 loop avoidance distance-vector protocols holddown, 79 poison reverse, 77 route poisoning, 77 split horizon, 77 triggered updates, 78 EIGRP, 95 OSPF, 93 viii STP, 39, 42 loopback interfaces, OSPF, 92, 106 looped link detection, PPP, 151 LQM (Link Quality Monitoring), PPP, 151 LSAs (Link-State Advertisements), 91 LSUs (Link-State Updates), 91 LWAPP (Lightweight Access Point Protocol), 178 M MAC sublayers, 18 MAC addresses, 17, 22 BIAs (burned-in addresses), 22 broadcast addresses, 22 dynamically learned MAC addresses, 20, 45 multicast addresses, 22 OUIs (Organizationally Unique Identifiers), 22 unicast addresses, 22 magic numbers, PPP, 151 MAPs (Mesh Access Points), 181 masks subnet masks, 12, 62 wildcard masks, 100, 136 MAU (Medium Attachment Unit), 26, 27 MaxAge timer, STP, 41 maximum hop count, 78 maximum hop counts RIP, 79 IGRP, 80 EIGRP, 97 maximum paths, 79, 90, 110 MCNS (Multimedia Cable Network Systems), 149 MD5 (Message Digest 5), 155 memory Flash memory, 36 NVRAM, 36 RAM, 36 ROM, 36 mesh wireless topology, 180, 181 messages, ICMP Destination Unreachable, 72 Echo Request / Reply, 72 Redirect, 72, 74 Time Exceeded, 72, 73 metrics, 79 administrative distances (ADs), 80 costs, OSPF, 91, 103 hop counts, RIP, 79 infinite metrics, 77 - 79 microsegmentation, LAN switching, 3, 19 Copyright © 2008 Yap Chin Hoong yapchinhoong@hotmail.com
- Page 1 and 2:
CCNA Complete Guide 2nd Edition Yap
- Page 3 and 4:
CCNA Complete Guide 2nd Edition Cop
- Page 5 and 6:
Upper Layers Lower Layers Applicati
- Page 7 and 8:
Cisco Hierarchical Model - Defined
- Page 9 and 10:
This page is intentionally left bla
- Page 11 and 12:
Header Length (4) Source Port (16)
- Page 13 and 14:
- Socket is a communication channel
- Page 15 and 16:
- The length of an IP address is 32
- Page 17 and 18:
- The following section discusses s
- Page 19 and 20:
This page is intentionally left bla
- Page 21 and 22:
- Below lists the 2 sublayers in th
- Page 23 and 24:
- Each switch port does not share t
- Page 25 and 26:
- Below lists the switch internal p
- Page 27 and 28:
Physical Layer - The physical layer
- Page 29 and 30:
- Another way to reduce emissions i
- Page 31 and 32:
Figure 3-7: Single-Mode and Multimo
- Page 33 and 34:
Wireless AP Switch Figure 3-8: 802.
- Page 35 and 36:
- Below lists the common IOS CLI er
- Page 37 and 38:
RT1#show running-config interface F
- Page 39 and 40:
- Cisco IOS treats a mistyped comma
- Page 41 and 42:
This page is intentionally left bla
- Page 43 and 44:
- Below describes the STP convergen
- Page 45 and 46:
- Refer back to Figure 5-1B, assume
- Page 47 and 48:
- A switch running RSTP only need 6
- Page 49 and 50:
Port Security Configuration - Port
- Page 51 and 52:
SW2# 00:25:00: STP: VLAN0001 new ro
- Page 53 and 54:
This page is intentionally left bla
- Page 55 and 56:
- Both protocols utilize a 12-bit V
- Page 57 and 58:
Layer 4 Switching (Content Switchin
- Page 59 and 60:
- VTP Pruning provides a way to pre
- Page 61 and 62:
VLAN Trunking Protocol Configuratio
- Page 63 and 64:
- VLAN information will not be prop
- Page 65 and 66:
- Private IP addresses are non-rout
- Page 67 and 68:
- Some materials calculate the numb
- Page 69 and 70:
This page is intentionally left bla
- Page 71 and 72:
Cisco Discovery Protocol (CDP) c250
- Page 73 and 74:
- CDP is enabled by default. The no
- Page 75 and 76:
Troubleshooting IP - Internet Contr
- Page 77 and 78:
- Firstly, PC1 purposely sends out
- Page 79 and 80:
- Below describes the operation of
- Page 81 and 82:
Maximum Hop Count Hop count metric
- Page 83 and 84:
- Invalid Timer specifies how long
- Page 85 and 86:
- Initial configuration on RT2: Rou
- Page 87 and 88:
- Static Routing configuration on R
- Page 89 and 90:
- RIPv1 and IGRP are classful routi
- Page 91 and 92:
- IGRP configuration on RT2: RT2(co
- Page 93 and 94:
MISC IP Routing Commands - The pass
- Page 95 and 96:
- OSPF uses a reliable protocol to
- Page 97 and 98:
- OSPF areas break up a network so
- Page 99 and 100:
- EIGRP uses the same formula as us
- Page 101 and 102:
- Autosummarization EIGRP supports
- Page 103 and 104:
- OSPF Single-Area configuration on
- Page 105 and 106:
- The show ip ospf database EXEC co
- Page 107 and 108:
OSPF Multiarea Configuration Area 1
- Page 109 and 110:
- Below lists the different termino
- Page 111 and 112:
- Verify the EIGRP configuration on
- Page 113 and 114:
- When a link to a neighbor fails,
- Page 115 and 116:
- Below shows the beauty of VLSM. B
- Page 117 and 118:
- RT1 and RT3 are summarizing route
- Page 119 and 120:
This page is intentionally left bla
- Page 121 and 122:
- RIPv1 and IGRP perform autosummar
- Page 123 and 124:
RT1#sh ip route Gateway of last res
- Page 125 and 126:
MTU and Fragmentation - Maximum Tra
- Page 127 and 128:
- Figure 17-1 shows the usage of CI
- Page 129 and 130:
- Static NAT performs one-to-one ma
- Page 131 and 132:
172.16.1.1 172.16.1.2 172.16.1.3 17
- Page 133 and 134:
This page is intentionally left bla
- Page 135 and 136:
- Below shows the IP NAT debugging
- Page 137 and 138:
- The access list indicates whether
- Page 139 and 140:
- Access Control List (ACL) is the
- Page 141 and 142:
- Below lists some other usages of
- Page 143 and 144:
- Standard IP Access Lists configur
- Page 145 and 146:
RT2#sh access-lists example01 Exten
- Page 147 and 148:
WAN Network RT1 CSU/DSU CSU/DSU RT2
- Page 149 and 150:
Remote Access Technologies - Remote
- Page 151 and 152:
Digital Subscriber Lines (DSL) - DS
- Page 153 and 154:
Point-to-Point Serial Links (Leased
- Page 155 and 156:
- Comparisons between synchronous a
- Page 157 and 158:
- PPP Encapsulation configuration o
- Page 159 and 160:
- The function of the username {rem
- Page 161 and 162:
- 3 LMI protocol options are availa
- Page 163 and 164:
- Comparisons between Frame Relay L
- Page 165 and 166:
RT1 RT2 RT3 Figure 23-7A: RT1 with
- Page 167 and 168:
This page is intentionally left bla
- Page 169 and 170:
- IETF Frame Relay encapsulation ty
- Page 171 and 172:
RT1 Frame Relay RT2 DLCI 101 Frame
- Page 173 and 174:
- The interface serialx.y point-to-
- Page 175 and 176:
- Frame Relay Multipoint Subinterfa
- Page 177 and 178:
- Rate Shifting or Adaptive Rate Se
- Page 179 and 180:
- By operating in the 5GHz radio ba
- Page 181 and 182:
- Every packet from every access po
- Page 183 and 184:
Virtual Interface (mandatory) Servi
- Page 185 and 186:
Wireless Security - Organizations t
- Page 187 and 188:
Wireless Management - WLANs require
- Page 189 and 190:
Cisco Wireless LAN Configuration -
- Page 191 and 192:
- ISDN offers very fast call setup
- Page 193 and 194:
- ISDN was designed to reuse the ex
- Page 195 and 196:
- ISDN PRIs are often being used fo
- Page 197 and 198:
- Routing protocols are unable to l
- Page 199 and 200:
DDR Step 4: Determining when to ter
- Page 201 and 202:
- The show interfaces bri{num:0 | 1
- Page 203 and 204:
DDR Dialer Profiles Configuration -
- Page 205 and 206:
- Note: IP addresses are configured
- Page 207 and 208:
- Below show the routing tables on
- Page 209 and 210:
- The configuration above defines 2
- Page 211 and 212:
cisco Systems, Inc. 170 West Tasman
- Page 213 and 214:
Catalyst Switch IOS Upgrade Procedu
- Page 215 and 216:
Catalyst Switch IOS Upgrade Procedu
- Page 217 and 218:
Cisco Router Password Recovery Proc
- Page 219 and 220:
Catalyst Switch Password Recovery P
- Page 221 and 222:
Switch> Switch>en Switch#rename con
- Page 223 and 224:
- The 3 possible Frame Relay PVC st
- Page 225 and 226:
Constructing a Compound Frame Relay
- Page 227 and 228:
This page is intentionally left bla
- Page 229 and 230:
8. Once the frame is completed, it
- Page 231 and 232:
This page is intentionally left bla
- Page 233 and 234:
This page is intentionally left bla
- Page 235 and 236:
Decimal Hex Binary Decimal Hex Bina
- Page 237 and 238:
This page is intentionally left bla
- Page 239 and 240:
MISC Basic Networking Notes - The m
- Page 241 and 242:
MISC Data Link Layer Notes - Ethern
- Page 243 and 244:
- The 5-4-3 repeater deployment rul
- Page 245 and 246:
Ethernet Autonegotiation and Duplex
- Page 247 and 248:
The TCP Connection States timeout s
- Page 249 and 250:
- Q: How does a client application
- Page 251 and 252:
- Urgent Data Pointer (16 bits) ind
- Page 253 and 254:
TCP Selective Acknowledgment (SACK)
- Page 255 and 256:
- Local Proxy ARP is used when ther
- Page 257 and 258:
Spanning Tree Protocol Port ID - Wh
- Page 259 and 260:
The Problem of Router-on-a-Stick Co
- Page 261 and 262:
- Sample Subnet Zero configuration:
- Page 263 and 264:
The permanent keyword in the Static
- Page 265 and 266:
RIPv1 and VLSM RT1 RT4 Figure A6-9:
- Page 267 and 268:
- Below shows the NAT operations on
- Page 269 and 270:
Bidirectional (2-Way) NAT PC1 172.1
- Page 271 and 272:
- Note: A router does not require a
- Page 273 and 274:
The Access Control List established
- Page 275 and 276:
Switch Port Access Control Lists -
- Page 277 and 278: - Below shows a sample Dynamic Acce
- Page 279 and 280: Router(config)#ip access-list exten
- Page 281 and 282: Optional PPP Commands - The compres
- Page 283 and 284: - Below shows the output of the PPP
- Page 285 and 286: - Below shows the output of the PPP
- Page 287 and 288: - Below configure the username and
- Page 289 and 290: IEEE 802.11 Standards and Specifica
- Page 291 and 292: - Figure A6-20 shows the frame form
- Page 293 and 294: - Below lists the IEEE 802.11 manag
- Page 295 and 296: IEEE 802.11 Types and Subtypes Type
- Page 297 and 298: Client (Supplicant) EAPOL-Start EAP
- Page 299 and 300: - IPsec-based VPN is comprised of 2
- Page 301 and 302: - IPsec supports the following 3 ty
- Page 303 and 304: Version Header Length Time To Live
- Page 305 and 306: - The authentication pre-share ISAK
- Page 307 and 308: Troubleshooting ISDN E1/T1 Physical
- Page 309 and 310: - Below addresses ISDN E1/T1 contro
- Page 311 and 312: Troubleshooting ISDN Layer 2 - Unde
- Page 313 and 314: Troubleshooting ISDN Layer 3 - Only
- Page 315 and 316: ISDN Loopback Test Call - In a loop
- Page 317 and 318: 96 Number changed. The called numbe
- Page 319 and 320: C2 Channel type not implemented. Th
- Page 321 and 322: This page is intentionally left bla
- Page 323 and 324: locking state, STP, 39 BNC, 27 bool
- Page 325 and 326: show vlan, 57 show vtp status, 58 s
- Page 327: framing, 22 MAC addresses, 22 stand
- Page 331 and 332: PAT (Port Address Translation), 127
- Page 333 and 334: star topologies, 25 startup-config