CCNA 2 Routers and Routing Basics v3.1 Instructor Guide 1
CCNA 2 Routers and Routing Basics v3.1 Instructor Guide 1
CCNA 2 Routers and Routing Basics v3.1 Instructor Guide 1
Permission is granted to print and copy this document for noncommercial distribution and exclusive use by instructors in the CCNA 2: Routers and Routing Basics course as part of an official Cisco Networking Academy Program.
I. Welcome
Welcome to the CCNA 2 version 3.1 Instructor Guide. Cisco Worldwide Education (WWE) has developed this guide to provide a helpful resource for instructors. This introduction will emphasize four themes: Student-centered, instructor-facilitated model One size does not fit all Hands-on, skills-based learning Global community of educators
Student-Centered, Instructor-Facilitated The CCNA curriculum has not been designed as a standalone e-learning or distance-learning course. The teaching and learning model of the Cisco Networking Academy Program is based on instructor facilitation. The Learner Model: Academy Student diagram shows the emphasis that WWE puts on the learner. The model begins with the prior knowledge of students. The instructor guides learning events, which are built from a variety of resources, to help the students achieve their desired comprehension of networking.
1 - 253
One Size Does Not Fit All The Cisco Networking Academy Program serves hundreds of thousands of students in almost 150 countries. Students range from early teens to mature adults and from advanced middle school students to undergraduate engineering students. One curriculum cannot fit the needs of all students. WWE relies on local instructors to make the program work and to help their students achieve the learning goals of the program. There are three fixed reference points for each program that provide flexibility for the instructors: The mission of WWE to educate and train The requirements of the CCNA certification exam The hands-on skills that help prepare students for the industry and further education
The WWE policy allows instructors to "add anything, but subtract nothing" from the curriculum. WWE supports in-class differentiation, which is used to provide additional support for students who need it and additional challenges for advanced students. WWE also allows instructors to decide how much time to spend on various topics. Some topics can be skimmed, while others may need to be emphasized for different audiences. The local instructor must decide how to balance the need for hands-on labs with the realities of the local student-to-equipment ratio and time schedule. This Guide can be used to facilitate the preparation of lesson plans and presentations. Instructors are encouraged to research and use external sources to develop additional labs and exercises. Core TIs have been highlighted for emphasis to assist the instructor in course and lesson planning. These are not the only TIs that need to be taught. Many core TIs will only make sense after the preceding TIs have been reviewed. It may be useful to have a map of the core TIs, which contain the most important knowledge and skills for success in the CCNA program. The assessment process is multifaceted and flexible. A wide variety of assessment options exist to provide feedback to students and document their learning. The Academy assessment model is a blend of formative and summative assessments that include online and hands-on, skills-based exams. Appendix B summarizes the Academy assessment policy. Appendix C describes the claims and evidence approach that is used to build assessments and the certification exam. Hands-On, Skills-Based The core of the CCNA 2 experience is the sequence of hands-on labs. Labs are designated as either essential or optional. Essential labs include information that is fundamental to the CCNA Academy student experience. This information will help students prepare for the certification exam, succeed in job situations, and develop their cognitive abilities. In CCNA 2, students will learn about the following elements of basic router configuration: Hostnames, banners, and passwords Interface configuration IOS file system
2 - 253
Static routes and dynamic routing (RIP version 1 and IGRP) Standard and extended access-list configuration and placement show, debug, ping, trace, and telnet commands to verify and troubleshoot
Global Community WWE instructors are members of a global community of educators. There are over 10,000 instructors that teach the same eight CCNA and CCNP courses in the program. Instructors should take advantage of the diversity and skills of this community through their Regional Academies, Cisco Academy Training Centers (CATCs), the Cisco Academy Connection (CAC), or through other forums. WWE is committed to the improvement of the curriculum, assessment model, and instructional resources such as this guide. Please submit any feedback through CAC. Check CAC for new releases of instructional materials. Guide Overview: Section II provides a scope and sequence overview of the course. Section III summarizes the most important learning objectives, target indicators, and labs, and offers teaching suggestions and background information. Section IV provides a case study related to network design, implementation, and troubleshooting. Instructors can also devise their own case studies. Section V includes four appendices: Cisco online tools and utilities CCNA assessment guidelines Evidence-centered design of assessment tasks in the Networking Academy program Instructional best practices
3 - 253
Prerequisites
The successful completion of this course requires the following: Reading age level of 13 or higher Successful completion of CCNA 1
The following prerequisites are beneficial, but not required: Prior experience with computer hardware and command line interfaces Background in computer programming
Course Description
CCNA 2: Routers and Routing Basics is the second of four CCNA courses that lead to the Cisco Certified Network Associate (CCNA) designation. CCNA 2 focuses on initial router configuration, Cisco IOS Software management, routing protocol configuration, TCP/IP, and access control lists (ACLs). Students will learn how to configure a router, manage Cisco IOS software, configure routing protocols on routers, and set access lists to control access to routers.
Course Objectives
The CCNA certification indicates knowledge of networking for the small office, home office (SOHO) market and the ability to work in small businesses or organizations that use networks with fewer than 100 nodes. A CCNA-certified individual can perform the following tasks: Install and configure Cisco switches and routers in multiprotocol internetworks that use LAN and WAN interfaces Provide Level 1 troubleshooting service Improve network performance and security Perform entry-level tasks in the planning, design, installation, operation, and troubleshooting of Ethernet and TCP/IP Networks
4 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Course Overview
Students must successfully complete the CCNA 2 course before they can achieve CCNA certification. Upon completion of this course, students will be able to perform tasks related to the following: Routers and their roles in WANs Cisco IOS Software Management Router configuration Router file management RIP and IGRP routing protocols TCP/IP error and control messages Router troubleshooting Intermediate TCP Access control lists
Lab Requirements
Please refer to the CCNA equipment bundle spreadsheets on the Cisco Academy Connection.
Certification Alignment
The curriculum is aligned with the CCNA Basic (CCNAB) and Interconnecting Cisco Network Devices (ICND) courses offered by the Cisco Internet Learning Solutions Group (ILSG). The Course 2 claims state that students will be able to complete the following tasks: Identify the key characteristics of common wide-area network (WAN) configurations and technologies, and differentiate between these and common LAN technologies Describe the role of a router in a WAN Describe the purpose and operations of the router Internet Operating System (IOS) Establish communication between a terminal device and the router IOS, and use IOS for system analysis, configuration, and repair Identify the major internal and external components of a router, and describe the associated functionality Connect router Fast Ethernet, serial WAN, and console ports Perform, save, and test an initial configuration on a router
5 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Course Overview
Configure additional administrative functionality on a router Use embedded data-link layer functionality to perform network neighbor discovery and analysis from the router console Use embedded Layer 3 through Layer 7 protocols to establish, test, suspend, or disconnect connectivity to remote devices from the router console Identify the stages of the router boot-up sequence and show how the configuration register and boot system commands modify that sequence Manage system image and device configuration files Describe the operation of the Internet Control Message Protocol (ICMP) and identify the reasons, types, and format of associated error and control messages Identify, configure, and verify the use of static and default routes Evaluate the characteristics of routing protocols Identify, analyze, and show how to rectify inherent problems associated with distance vector routing protocols Configure, verify, analyze, and troubleshoot simple distance vector routing protocols Use commands incorporated within IOS to analyze and rectify network problems Describe the operation of the major transport layer protocols and the interaction and carriage of application layer data Identify the application of packet control through the use of various access control lists Analyze, configure, implement, verify, and rectify access control lists within a router configuration
Course Overview
The course has been designed for 70 contact hours. Approximately 35 hours will be designated to lab activities and 35 hours will be designated to curriculum content. A case study on routing is required. The format and timing should be determined by the Local Academy. The following changes have taken place since CCNA version 2.x:
6 - 253
More emphasis on router configuration early in semester More efficient presentation and practice of IOS IGRP moved from CCNA 3 to CCNA 2 Access lists moved from CCNA 3 to CCNA 2
Copyright 2004, Cisco Systems, Inc.
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Course Overview
Revisions to TCP/IP coverage More focus on routing tables Case study is required with format and timing determined by the Local Academy More interactive flash activities Sequence of over 40 e-Labs Lab focus on two-router labs
7 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Course Overview
For example, 3.2.5 references Module 3, LO 2, and TI 5. The following terms are commonly used to describe the curriculum, instructional materials, and assessments in WWE and Cisco documentation: Certification-level claims High-level statements about what a CCNA-certified person should know and be able to do. These claims are measured through certification exams. Course A subset of a curriculum which is a collection of chapters to be offered as a scheduled course. Course-level claims Medium-level statements about what a person who completes the CCNA 2 course should know and be able to do.
Core TI The TIs that apply most directly to the claims and learning objectives. Instructors should not skip over these TIs or move through them quickly.
Curriculum A predefined or dynamic path of learning events with an end goal such as certification or the acquisition of required job skills and knowledge.
Hands-on skills There is some overlap between hands-on skills and claims. These statements emphasize hands-on, lab-based learning.
8 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Teaching Guide: TI by TI
Module Logical groupings that comprise a course. Modules contain multiple lessons or LOs. Modules are also referred to as chapters.
Learning objective (LO) A statement that establishes a measurable behavioral outcome. LOs are used to organize content and to indicate how the acquisition of skills and knowledge will be measured. LOs are also referred to as terminal objectives or RLOs.
Lesson A set of TIs, or enabling objectives, that are grouped together and presented in a coherent format to meet an LO, or terminal objective. Lessons emphasize the role of the instructor. Learning objectives emphasize the role of the students.
Module caution Suggestions related to areas where difficulties may be encountered. These are especially important for syllabus development, lesson planning, and pacing.
Reusable Learning Object (RLO) This is a Cisco Instructional Design term. RLOs typically consist of five to nine RIOs. In this guide, RLOs are equivalent to lessons or learning objectives.
Reusable Information Object (RIO) This is a Cisco Instructional Design term. In this guide, RIOs are equivalent to target indicators.
Target indicator (TI) TIs are also referred to as enabling objectives or RIOs. TIs typically consist of a text frame with graphics and several media content items.
9 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Teaching Guide: TI by TI
10 - 253
1.1 WANs
Essential labs: Optional labs: Core TIs: Optional TIs: None None All none
Course-level claim: Students can identify the important characteristics of common WAN configurations and technologies, differentiate between these and common LAN technologies, and describe the role of a router in a WAN. Certification-level claim: Students can evaluate the important characteristics of WANs and implement simple WAN protocols. Hands-on skills: none
WANs operate at the physical and data-link layers of the OSI model. Devices used in a WAN are routers, switches, modems, and communication servers. The following topics are relevant to this TI: Discuss the various carriers and devices available for WAN connections. Show students what routers in a WAN look like. Explain what routers do.
Figure 3 is an important figure to review. Best instructional practices for this TI include online study sessions with study guides, group work, and mini-lectures. This TI provides essential background information for the CCNA exam.
11 - 253
Memory Interfaces
However, the main purpose of a router is to route, not to compute. The main components of the router are as follows: RAM NVRAM Flash ROM Interfaces
The following topics should be covered in this TI: Discuss the similarities of computers and routers such as the software they use. Explain the components of the router and what each component contains. Open a router and let the students examine the inside. Point out the main components. Explain that just as a computer cannot work without an operating system and software, a router cannot work without an operating system and configurations.
12 - 253
Some of the most common WAN technologies are as follows: POTS ISDN X.25 Frame Relay ATM T1, T3, E1, and E3 DSL SONET
Ask students to briefly explain each of the WAN technologies and discuss the differences between technologies and encapsulations. They will be covered in detail in CCNA 4. It is important to encourage student interest and enthusiasm in this TI. The world of WAN technologies is briefly introduced. Many students will be familiar with one or more of the technologies used. Many of these topics will be covered in CCNA 4 and students should be encouraged to do additional research on one of these technologies and present it to the class.
Each student should build a complete topology and then take it apart and let the next student do the lab. These labs are a review of the cabling labs in CCNA 1. This may be one of the last opportunities students have to cable a network, so do not miss this opportunity to make sure students complete the CCNA 2 Lab setup. This is a good place to introduce troubleshooting and the Layer 1 issues that occur in CCNA 2. It is also a fairly simple and fun activity.
1.2 Routers
Essential Labs: Optional Labs: Core TIs: Optional TIs: 1.2.5, 1.2.6, and 1.2.7 None All none
Course- Level Claim: Students can properly connect router Fast Ethernet, Serial WAN, and console ports. Certification-Level Claim: Students can describe the components of network devices. They can also identify the major internal and external components of a router and describe the associated functionality. Hands-on skills: none
What are the different types of RAM used by a router? Can the RAM be upgraded in a router?
Ask students the following questions: Which port is preferred for troubleshooting and why? Do all routers have an auxiliary port?
15 - 253
management control communications use a different path or channel than the data communications. Ask students the following questions: What type of terminal emulation must the PC or terminal support? What are the steps to connect the PC to a router?
16 - 253
Module 1 Summary
Before students move on to Module 2, they must be able to cable the lab setup, identify all external relevant ports, and identify internal router components. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 1 exam. Consider introducing formative assessments, where the instructor supervises the students as they work on the router setup. The use of formative assessments can be very valuable while students work through this router-intensive and IOS-intensive course. Students should understand the following main points: WAN and LAN concepts Role of a router in WANs and LANs WAN protocols How to configure console connections The identification and description of the internal components of a router The physical characteristics of a router The common ports on a router How to connect router console, LAN, and WAN ports
17 - 253
18 - 253
Course-Level Claim: Students can describe the purpose and fundamental operation of the router IOS. Certification-Level Claim: Students can establish communication between a terminal device and the router IOS and use it for system analysis, configuration, and repairs. Hands-on skills: none
Students should know the difference between these methods. They should also be comfortable with the term CLI.
19 - 253
should be able to identify the router prompts. The user mode prompt is Router>. The privileged mode prompt is Router#.
ROM monitor is used to recover from system failures and recover a lost password. Boot ROM is used to modify the Cisco IOS image in flash. There is a limited subset of features in this mode. Normal operation of a router requires the full Cisco IOS image. Discuss the three operating environments. Students should be able to identify these environments. Students must be familiar with the IOS to control the router. Cisco technology is in the IOS, not in the hardware.
One of the major constraints for the use of a new IOS image is compatibility with the router flash and RAM memory. The students should also understand that the same IOS is used on the smallest to the largest Cisco products. This will assure students that the skills they develop on small Cisco routers can be applied to larger routers and switches. Show students various naming conventions and identify the three parts of the naming convention. For example, in cpa25-cg-1, cpa25 is the Cisco Pro 2500 Router, cg is the feature capability such as communication server, remote-access server, or ISDN, and the 1 is the run location or compressed status. Explain that it is important to install and maintain various IOS versions, especially newer versions with advanced features. Encourage the students to conduct research online at www.cisco.com for more information on how to obtain various IOS images.
20 - 253
2.2
Starting a Router
Essential Labs: Optional Labs: Core TIs: Optional TIs: 2.2.1, 2.2.4, and 2.2.9 None All none
Course-Level Claim: Students can describe the purpose and fundamental operation of the router IOS Certification-Level Claim: Students can establish communication between a terminal device and the router IOS and use it for system analysis, configuration, and repair Hands-on skills: none
This section teaches students how to check the configuration during the boot process. Setup mode is intended to quickly install a router with minimal configuration. Discuss the initial startup of routers and explain why the IOS and configuration files can be loaded from several places.
If a router does not boot up correctly, issue the show version command to examine the configuration register to see if it is booting. Remind the students that the router is a special purpose computer. It has a boot sequence that is similar to a standard computer. The router must load the IOS from one of several sources. The router must also obtain a configuration file. If a configuration file is not available, the router will enter setup mode, which prompts the user for a basic router configuration. Make sure the students understand what the router needs as basic configuration information. This provides a lot of information about how the router works. It is very important for students to understand the difference between the IOS and the configuration file.
The user EXEC mode is a view-only mode. Enter privileged EXEC mode with the enable command from the User prompt. Other modes can be accessed from privileged mode to configure a router. The students should have a lot of practice with hands-on activities in the lab setup. It is important for students to understand the various modes to be able to accurately configure a router. It is not necessary to memorize all commands. Students must understand each mode so they can make the configurations from the correct locations.
instruct students to set the clock without telling them which commands to use. The question mark (?) will guide students through the process.
The syntax of IOS commands can be complex. Keyboard editing features can be used to correct text that has been entered. When a router is being configured, repetitive command statements, typing errors that need to be fixed, and commands that need to be reused may be encountered. Questions about the Ctrl key and Esc key sequences will probably appear on the CCNA exam.
By default, the command history records ten command lines in the history buffer. To recall commands, press Ctrl-P or the Up Arrow key to recall repeated commands. Press Ctrl-N or the Down Arrow key to recall more recent commands in the history. The Ctrl-P and Ctrl-N features are also likely to be tested on the CCNA exam.
23 - 253
The syntax of IOS commands can be complex. The feature used to recall commands can help students save time when they program or troubleshoot a router.
24 - 253
Module 2 Summary
Before students move on to Module 3, they must be able to interact with the router through a HyperTerminal session and the CLI. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 2 exam. Make sure students know how to access the command-line prompt. Formative assessments related to lab work are relevant to Module 2. Students should understand the following main points: Understand the basic operation of IOS Identify various IOS features Identify methods to establish a CLI session with the router Use HyperTerminal to establish a CLI session Log into the router Use the help feature in the command line interface Use the enhanced editing commands Use the command history Troubleshoot command line errors Use the show version command
25 - 253
Module 3 Caution Spend a lot of time on this module. Students have wanted to program routers since the first day of CCNA 1. This module presents the core skills that the students will use to build all Cisco device configurations. From this point in the CCNA 2 curriculum through the end of the CCNA 4 curriculum, students may be deprived of the opportunity to learn about the IOS if the student-to-equipment ratio is high. Only the local instructor can decide what mix of lab equipment, group work, creative rotations, lab access, remote access through NetLabs or other solutions, e-Labs, e-SIM, CiscoPedia, and other tools can be used to give students adequate opportunities to learn IOS. After completing this module, students should be able to perform the following tasks: Name a router Set passwords Examine show commands Configure a serial interface Configure an Ethernet interface Make changes to a router Save changes to a router
26 - 253
Configure an interface description Configure a message-of-the-day banner Configure host tables Understand the importance of backups and documentation
27 - 253
Course-Level Claim: Students can perform, save, and test an initial configuration on a router. Certification Level Claim: Students can perform an initial configuration on a router. Hands-on skills: none
The first configuration mode is referred to as global configuration mode or global config. The following configuration modes are available in global configuration mode: Interface Subinterface Controller Map-list Map-class Line Router
Global configuration commands are used in a router to apply configuration statements that affect the entire system. Use the privileged EXEC command configure terminal to enter global configuration mode. Explain that Cisco IOS is modal. Emphasize that in the CLI that there are different modes to accomplish different tasks. There are several advantages to this. One is that the commands are generally shorter because the object of the mode, i.e., the interface, or routing protocol, to
28 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 3 Copyright 2004, Cisco Systems, Inc.
be changed does not need to be specified in the command. Another advantage is that only the parameters, or objects of the mode, i.e., the interface, or routing protocol, can be modified by the command. This helps prevent accidental configuration of the wrong object. There are shortcuts to show students at a later time: config t for configure terminal int fa0/0 for interface fastethernet 0/0
Students commonly enter the correct command at the incorrect prompt. If the students are unable to enter a command, check the mode. The prompt will be either Router(config)# or Router(config-if)#. Ask students the following questions: Which mode is the user in when first logging into the router? What mode is the user in after entering the enable command?
29 - 253
Discuss the differences between the various passwords. Students need to understand when each password is used. If students ask if user ids and passwords can be used instead of just passwords, the answer is that they can, but that is beyond the scope of this course. Ask students the following questions: What is the command to set the enable password? What is the command to set the telnet password? What is the command to set the console password?
Students may want to use the show running-config command as their primary troubleshooting tool. This is not a good habit. It is probably the quickest way to find problems in the simple configurations used in this course. However, that is not true in most situations. Students should learn to use the show running-config command to confirm suspected problems. Some CLI shortcuts to show students in the future are as follows:
30 - 253
sh int fa0/0 for show interface fastethernet 0/0 sh run for show running-configuration sh run int fa0/0 for show running-configuration fastethernet 0/0
Copyright 2004, Cisco Systems, Inc.
Ask students the following questions: Which command will show the configuration file in NVRAM? Which command will show the configuration file in RAM?
31 - 253
Remove the startup configuration file with the erase startup-config command. Restart the router and enter setup mode.
To save the configuration variables to the startup configuration file in NVRAM, enter the following command at the privileged EXEC prompt: Router#copy running-config startup-config Students must understand that any changes that are made to the configuration will occur immediately. These changes are made to the running configuration. Students must also realize that configuration changes need to be saved to the startup configuration. If they are not, then they will be lost when the router is restarted. Students should shut down interfaces during configuration and enable the interface after the configuration changes are completed. Ask students the following questions: Which command will erase the configuration file in NVRAM? Which command will erase the configuration file in RAM? Which command will copy the RAM to NVRAM? Which command will copy the NRAM to RAM?
32 - 253
Course-Level Claim: Students can configure additional administrative functionality on a router Certification-Level Claim: Students can configure a router for additional administrative functionality. Hands-on skills: none
In many organizations, standards are either treated very seriously or there are no standards. It is important to develop standards for configuration files within an organization. These can be used to control of the number of configuration files that must be maintained, how the files are stored, and where the files are stored. In organizations where standards are treated seriously, students need to understand that it is very important for the standards to be followed. In organizations where there are no standards, students can introduce standards to add value to the organization. Students need to understand why standards are important and begin to apply them in the lab. Encourage students to create and use standards. Remember to simulate real-world environments in the classroom and lab. A centralized support standard is necessary to manage a network. Configuration, security, performance, and other issues must be adequately addressed for the network to function properly. The creation of standards for network consistency helps reduce network complexity, the amount of unplanned downtime, and exposure to network impacting events. Emphasize that there should be a standard for everything and that each standard should be a written part of the documentation and procedures. These should include how configuration files are named, how interfaces are addressed, and the description used on interfaces. The use of these standards is very important for troubleshooting. Explain to students that the same network associate will not always troubleshoot the network device. If the previous
33 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 3 Copyright 2004, Cisco Systems, Inc.
associate did not have or follow standards, then the next associate will need to analyze how the device is supposed to be connected or configured. For example, if the headquarters router always has the lowest address in a subnet configured and the remote office uses the next address up, then there is no question about what the interface addresses should be. The interface description should provide information about the configuration, connection, and use of the interface.
Ask students the following questions: Which configuration mode is used to enter the description? What are the commands to add a description to an interface?
35 - 253
Ask students the following questions: What is a host name is associated with? Can each unique IP address have a host name associated with it?
Configuration files should be stored as backup files. Configuration files can be stored on a network server, on a TFTP server, or on a disk that is stored in a safe place. Configuration backup files and documentation should be stored in a safe place in case there is a need to recover these files later. For example, the startup-configuration of a router can be stored in another place such as on a network server or on a TFTP server as a backup. If the router goes down, the stored file could be placed back on the router. This would minimize the down time. Configuration management is an important aspect of network management. The backups of the configurations should be current and maintained in multiple locations. These backups should be available for maintenance and troubleshooting, but protected from unauthorized access. Configurations can be used by hackers to gain useful information about a network infrastructure. Ask students the following questions: What is the purpose of configuration backup and documentation? Where can the configuration files be stored? What would minimize the down time of a router?
36 - 253
capturing text in the router. If the file needs to be copied back to the router, it can be pasted into the router. Ask students the following questions: What is the command used to copy RAM to NVRAM? What is the command used to copy NVRAM to RAM?
37 - 253
Module 3 Summary
Before students begin Module 4, they must be able to perform a basic router configuration in a limited amount of time and without assistance. Basic configuration includes hostnames, passwords, interfaces, and the ability to verify their work with show commands. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 3 exam. Formative assessments can also be conducted as students work on the routers to monitor how well a lab is performed. This section summarized the main points in router configuration. The router has several modes: User EXEC mode Privileged EXEC mode Global configuration mode Other configuration modes
The CLI can be used to make changes to the configuration such as the following: Set the hostname Set passwords Configure interfaces Modify configurations Show configurations
Students should understand the following main points: Configuration standards are important elements in the ability of any organization to maintain an efficient network. Interface descriptions can include important information to help network administrators understand and troubleshoot their networks. Login banners and messages-of-the-day provide users with information when they log in to the router. Host name resolutions translate names to IP addresses to allow the router to quickly convert names to addresses. Configuration backup and documentation is extremely important to keep a network operating properly.
38 - 253
Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices are connected to which local interfaces Use CDP to gather network address information about neighboring devices Establish a Telnet connection Verify a Telnet connection Disconnect from a Telnet session Suspend a Telnet session Perform alternative connectivity tests
Copyright 2004, Cisco Systems, Inc.
40 - 253
Course-Level Claim: Students can use embedded data-link layer functionality to perform network neighbor discovery and analysis from the router console. Hands-on skills: none
Students may not be familiar with multicasting. A brief explanation may be required at this point. The following link provides information on Cisco IP multicast implementation. http://www.cisco.com/warp/public/732/Tech/multicast
41 - 253
The show cdp neighbors command displays CDP information collected by a device about its neighbors. It can be issued at a console connected to a Cisco network device. Demonstrate the show cdp neighbors command and the show cdp neighbors detail command. Note that much of the information outlined in the table can only be seen if the detail option is utilized. This command variation is seen in subsequent RIOs. Some information is only displayed with CDPv2, which is implemented with IOS version 12.0(3)T. Demonstrate how the show cdp neighbors command and its variations can be consoled into a router that is connected to another router or a switch to show students the output. The show cdp neighbors command allows students to perform the associated Flash eLab.
42 - 253
show cdp entry entry-name [protocol | version] show cdp interface [type number] show cdp neighbors [type number] [detail]
If students have limited or no experience with the use of Telnet to move from device to device, this concept and skill should be reviewed. If students do not understand this capability, it will be difficult to understand the procedure described in this RIO. Demonstrate this capability if necessary. Refer to the figure to show students how telnet is used to map a network. Allow students to practice use of this command. Instruct students to map their router setup or a setup performed by another group.
CDP can be disabled at two levels: The no cdp run command can be used in global configuration mode to disable CDP for the entire device. This should be used when only one Cisco device is present and CDP would serve no purpose on the network segment. CDP can be disabled for a specific interface. The network administrator must be in interface mode to perform this task. The command is no cdp enable or no cdp advertise-v2, based on the version of CDP that is used.
To determine if a particular interface has CDP enabled, the show cdp interface command can be used in user or privileged mode. The figures show the use of these commands. Make sure students realize that CDP is enabled on all interfaces by default. Demonstrate how to disable CDP at the interface level and globally. Allow students to perform these commands on their own lab setup but ensure that students enable CDP when they are finished.
44 - 253
Command
clear cdp table clear cdp counters show cdp traffic show debugging debug cdp adjacency debug cdp events debug cdp ip debug cdp packets cdp timers cdp holdtime show cdp
Purpose
Deletes information about neighbors from the CDP table Reset traffic counters to zero Displays CD counters such as the number of packets sent and received and checksum errors Displays information about the types of debugging that are enabled for the router Displays CDP neighbor information Displays CDP events Displays CDP IP information Displays CDP packet-related information Specifies how often the Cisco IOS software sends CDP updates Specifies the hold time to be sent in the CDP update packet Displays global CDP information such as timer and hold-time information
Review the following key points: CDP is Cisco proprietary. CDP runs on any SNAP-enabled media. CDP functions at Layer 2 and functions independent of the upper layers. CDP is used by all Cisco network devices such as routers, switches, and bridges. CDP utilizes periodic advertisements to obtain or update information about directly-connected devices
45 - 253
Course-Level Claim: Students can perform simple LAN troubleshooting. Certification-Level Claim: Students can troubleshoot a device that is part of a working network. Hands-on skills: none
4.2.1 Telnet
Telnet provides network administrators with remote connection capability. It is a part of the TCP/IP protocol suite that operates at the application layer of the OSI model and the application layer of the TCP/IP model. The Telnet service in Cisco devices operates as a virtual terminal utility. Administrators can use Telnet to issue IOS commands when they are not directly connected to the device. Telnet consumes a vty session on the router when it is used. Remind students that vty lines 0 through 4 can be configured in a router configuration. Since Telnet is a vty connection, a router will support simultaneous Telnet connections. Telnet also provides a tool for troubleshooting. The establishment of a Telnet connection confirms the connectivity and functionality of the application layer. The ping command only confirms Layer 3 connectivity.
46 - 253
A connection can be resumed by selecting the corresponding number. The disconnect command will terminate a specific Telnet session. The procedure for disconnecting a Telnet session is as follows: Enter the disconnect command. Follow the command with the name or IP address of the router. Example: Denver> disconnect paris
The procedure for suspending a Telnet session is as follows: Press Ctrl-Shift-6 and then the letter X. Enter the name of the router or IP address of the next connection.
Students often think that the Ctrl-Shift-6, then X sequence will terminate a Telnet session. They need to understand that this only suspends the session. They also need to know how to resume and terminate a session
The resume [session number] command can be used to resume a Telnet session. The process id of a session can also be entered to resume the session.
47 - 253
The show sessions command output is as follows: Stanly_Lab#show sessions Conn Host Address 1 lab-b 192.168.10.1 2 lab-d 192.168.10.1 * 3 lab-e 192.168.10.1 Byte Idle 4 5 0 0 0 0 Conn Name lab-b lab-d lab-e
48 - 253
The procedure to use the ping command is as follows: ping IP address or name of destination Press Enter
The procedure to use the trace command is as follows: trace IP address or name of destination Press Enter
Demonstrate a successful ping. LAB-B#ping lab-c Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 199.6.13.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 32/35/36 ms Demonstrate an unsuccessful ping. LAB-D#ping lab-c Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 199.6.13.2, timeout is 2 seconds: ..... Success rate is 0 percent (0/5) Demonstrate a successful trace. LAB-A#trace lab-e Type escape sequence to abort. Tracing the route to LAB-E (210.93.105.2) 1 2 3 4 LAB-B LAB-C LAB-D LAB-E (201.100.11.2) 32 msec 24 msec 24 msec (199.6.13.2) 32 msec 52 msec 40 msec (204.204.7.2) 64 msec 64 msec 64 msec (210.93.105.2) 60 msec * 64 msec
Demonstrate an unsuccessful trace. LAB-A#trace lab-d Type escape sequence to abort. Tracing the route to LAB-D (204.204.7.2) 1 LAB-B (201.100.11.2) 36 msec 28 msec 24 msec 2 LAB-C (199.6.13.2) 36 msec 44 msec 40 msec 3 LAB-C (199.6.13.2) !H * !H
49 - 253
Show a routing table. LAB-C#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B BGP, D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1, E2 - OSPF external type 2, E EGP, i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default, U - per-user static route Gateway of last resort is not set C C R R R C R R 204.204.7.0/24 is directly connected, Serial0 223.8.151.0/24 is directly connected, Ethernet0 201.100.11.0/24 [120/1] via 199.6.13.1, 00:00:06, Serial1 219.17.100.0/24 [120/1] via 199.6.13.1, 00:00:06, Serial1 192.5.5.0/24 [120/2] via 199.6.13.1, 00:00:06, Serial1 199.6.13.0/24 is directly connected, Serial1 205.7.5.0/24 [120/2] via 199.6.13.1, 00:00:06, Serial1 210.93.105.0/24 [120/1] via 204.204.7.2, 00:00:07, Serial0
Troubleshooting is one of the most important skills of a network associate. The majority of time in the workplace will be spent troubleshooting. Students should develop these skills at every opportunity. Help students learn the logical process, what to look for, and the tools to use. Always use the OSI model to teach troubleshooting from Layer 1 to Layer 7. For students to become proficient at troubleshooting, it must be a normal part of the labs. Each lab should include a troubleshooting session. This could be a discussion about problems that might be experienced in the lab or problems can be placed on the student network.
50 - 253
Module 4 Summary
Students must master CDP and network troubleshooting commands before they move on to Module 5 Online assessment options include the end-of-module online quiz in the curriculum and the online Module 4 exam. Students should be familiar with the equipment that is in the room with them. If they need to see how it is connected, they can look at it. Another assessment option is to put several interconnected and configured routers in a taped box with a console cable and a power strip cord coming out of it. Mark the box with the name of a distant city. Then ask the students to draw a topology map of the internetwork of that city. Students should understand the following main points: How to enable and disable CDP How to use the show cdp neighbors command How to determine which neighboring devices are connected to which local interfaces How to use CDP to gather network address information about neighboring devices How to establish a Telnet connection How to verify a Telnet connection How to disconnect from a Telnet session How to suspend a Telnet session How to perform alternative connectivity tests How to troubleshoot remote terminal connections
51 - 253
52 - 253
Course-Level Claim: Students can Identify the stages of the router boot-up sequence and show how the configuration-register and boot system commands modify that sequence. Certification-Level Claim: Students can describe the components of network devices. Hands-on skills: none
Review the figure in this TI with the students. This is an excellent visual representation of the different aspects of the boot process. Each student should be able to reproduce this figure from memory. Remove the configuration from NVRAM to demonstrate the process used to check for a TFTP server and then enter the setup menu. Demonstrate the use of Ctrl-C to exit from the setup menu.
5.1.2 How a Cisco device locates and loads the Cisco IOS
The router can load the Cisco IOS from several different locations that can be specified by the operator. The boot system commands can be used to identify a fallback sequence of locations to look for the IOS. It is important to realize that these boot system commands
53 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 5 Copyright 2004, Cisco Systems, Inc.
must be saved in NVRAM to be executed at the next start-up. If no boot system commands are saved in NVRAM, the router will use the default fallback process, flash, TFTP, and finally ROM. Review the figure in this section to explain the process that is followed to load the IOS. Make sure students realize that network problems can affect the process when the IOS is loaded from a TFTP server. Explain that the IOS loaded from ROM is only a subset of the IOS loaded from flash. The figure is not complete because ROM is not included.
54 - 253
If the router does not boot properly, the show version command can be used to identify the configuration register setting. The boot field indicates where the router is configured to boot from and the config-register command is used to make any necessary changes. If the router IOS does not boot properly, there are several things that could be wrong: Boot system statement in configuration file Incorrect configuration register value Corrupted flash image Hardware failure
Instruct students to use the show version command to check the configuration register value. When a router does not boot properly it is usually because the configuration register setting is incorrect. For students to understand the impact that the boot sequence and the configuration register has on routing, they must perform the hands-on labs. Make sure each student can complete and explain the labs. Discuss the results and purpose of the labs after they have been completed by all of the students. Instruct students to verify the configuration register setting on a regular basis. Occasionally change the configuration register settings and allow them to troubleshoot the errors that occur. Additional Resources http://www.cisco.com/en/US/products/hw/routers/ps233/products_tech_note09186a00800a65 a5.shtml http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_summary_cha pter09186a00800801b1.html
55 - 253
Course-Level Claim: Students can manage system image and device configuration files. Certification-Level Claim: Students can manage system image and device configuration files. Hands-on skills: none
The operating system that is used in almost all Cisco devices is the Cisco IOS. The IOS is the software that allows the hardware to function as a router or a switch. The software a router or switch uses is referred to as the configuration, or config file. The configuration file contains the instructions that define how the device will route or switch. The IOS is stored in Flash memory. The configuration file is stored in NVRAM. Discuss with the students the differences between these types of memory and help the student understand by opening a router and showing the inside of the router to the students. Discuss RAM, ROM, flash, and NVRAM. Students must understand the differences between them. One difference to discuss is that the IOS in flash or RAM is several megabytes and the configuration file in NVRAM is up to a few kilobytes. Version 12 and newer releases of the IOS provide a single interface to all file systems. This is referred to as the Cisco IOS File System (IFS). The IFS can be used to perform all the file system management for a router. Explain that the IFS is based on UNIX file systems.
56 - 253
The first part of the IOS filename identifies the hardware platform. The second part of the IOS filename identifies the various features that the file contains. The third part of the filename indicates the file format. It specifies if the IOS is stored in flash, if it is in compressed format, and if it can be released. The fourth part of the filename identifies the IOS release. This is an important concept for students to understand. They should be able to look at an IOS filename and determine the hardware platform, features, file format, and the release. Students should also understand that these naming conventions vary for different releases. This occurs as the feature sets are rebundled and renamed. Show students some of the tools for IOS planning that are available on the Cisco website. Most of these are only available to users who have obtained user ids through SmartNet. http://www.cisco.com/warp/customer/620/1.html http://www.cisco.com/en/US/customer/products/sw/iosswrel/ios_abcs_ios_networking_the_ent erprise0900aecd800a4e14.html
The steps to copy from a TFTP server to restore the configuration file are as follows: Enter copy tftp running-config Select a host or network configuration file at the prompt Enter the IP address of the TFTP server where the config file is located Enter the name of the config file or accept the default name Confirm the configuration filename and the server address
Make sure students realize that there are other ways to back up a configuration file. Other methods will be discussed in later sections. It is important for students to understand this process and all the procedures that are explained. It is most important for students to understand that backups are an important part of network management.
57 - 253
After the configuration has been displayed, students should select Transfer > Capture Text > Stop to stop the capture. After the capture is completed, the configuration file needs to be edited to remove text that is not required to configure a router. Then it can be pasted back into the router if needed. The configuration file can be edited from a text editor such as Notepad. The following steps are used to edit the file: Select File > Open Find the captured file and select it Click Open
The lines that need to be deleted contain the following: show running-config Building Configuration Current Configuration -MoreAny lines that appear after the word End At the end of each of the interface sections, students should add no shutdown. To save the clean version, select File > Save.
Before the configuration is restored, any remaining configuration should be removed from the router by issuing the command erase startup-configuration. Use the reload command to restart the router.
58 - 253
HyperTerminal can be used to restore the configuration: Enter global configuration mode. Select Transfer > Send > Text File in HyperTerminal. Select the name of the file. Read the lines of the file as they are entered into the router. Observe for any errors. Press Ctrl-Z to exit global configuration mode after the configuration file is entered. Use the copy running-config startup-config command to restore the startup configuration file.
Students must understand each of the procedures. A backup configuration file is necessary for any network administrator. Explain that minimal down time is required in any network. Discuss the difference between running configuration and startup-configuration. This concept is very important. Also stress the benefits of comments in the configuration. These comments can explain the function of the various commands. Make sure that the students know that these comment lines begin with an exclamation point (!) and that these lines are not stored in the router. Some features of HyperTerminal do not work well with the version of HyperTerminal that comes with Windows XP. A free, educational upgrade to HyperTerminal 6.3 can be downloaded from the following website. http://www.hillgrave.com/htpe/index.html
59 - 253
To restore the image through the console, the local PC needs to have a copy of the IOS file to restore and a terminal emulation program. The default console speed of 9600 bps can be used or it can be changed to 115200 bps. This will speed up the download. The console speed can be changed with the confreg command. To restore the IOS image from the PC, students should use the xmodem command. The format of the command is xmodem c image_file_name. The -c instructs the Xmodem process to use CRC to check for errors during the download. The router then sends a warning message that the bootflash will be erased. Now the Xmodem transfer needs to be started from the terminal emulator. Instruct students to select Transfer > Send and then specify the image name and location in the Send File popup. Select the xmodem protocol and start the transfer. After the download is complete, the console speed must be changed back to 9600 bps and the configuration register should be changed back to 0x2102. This is done with the confreg 0x2102 command.
60 - 253
Discuss these procedures with the students and make sure they understand each concept. Also stress the fact that the fastest way to restore an IOS image to the router is to use TFTP from ROMmon to download the image. http://www.cisco.com/en/US/customer/products/hw/routers/ps259/products_tech_note09186a0 08015bf9e.shtml
Make sure the boot commands are reviewed. Stress the importance of familiarity with the bootup procedures.
61 - 253
Module 5 Summary
Students must be able to manage configuration files and verify the file system with show commands before they begin Module 6. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 5 exam. Students should understand the following main points: Identify stages of the router boot sequence Identify how the Cisco device locates and loads the Cisco IOS Identify the configuration register settings Identify the files used by the Cisco IOS and their functions Identify the locations on the router of the different file types Identify the parts of the IOS name Manage configuration files using TFTP Manage configuration files using copy-and-paste Manage IOS images with TFTP Manage IOS images with Xmodem Verify the file system using show commands
62 - 253
63 - 253
Course-Level Claim: Students can identify, configure, and verify the use of static and default routes. Certification-Level Claim: Students can evaluate the characteristics of routing protocols. Hands-on skills: none
Since a static route is manually configured, the administrator must configure the static route on the router with the ip route command. The administrator can accomplish this objective in one of two ways. The administrator can specify the outgoing interface or the next-hop IP address of the adjacent router.
64 - 253
From Rt1 either of the following commands will work. Rt1(config)#ip route 192.168.2.0 255.255.255.0 192.168.1.2 This command should be interpreted as To reach the network 192.168.2.0 that has a subnet mask of 255.255.255.0, the next hop in the path is 192.168.1.2. or Rt1(config)#ip route 192.168.2.0 255.255.255.0 s0 This should be interpreted as To reach the network 192.168.2.0 that has a subnet mask of 255.255.255.0, send the packet out interface serial 0/0. The administrative distance indicates the trustworthiness of the source of the route. The router assigns an administrative distance of one to static routes by default. The router assumes that if an administrator takes the time to figure out what route the packet should take then this routing information must be very reliable. Only directly-connected routes have a default administrative distance that is trusted more. The default administrative distance for directly-connected devices is zero. Administrative distance should not be confused with the metric of the route. The metric of the route indicates the quality of a route. When a router decides which route to a particular destination to put in the routing table, it compares the administrative distances of all the routes available to that destination. The router then examines the routes with the lowest administrative distances and chooses the one with the lowest metric. If the interface that a packet is to be sent to on the next hop is not up, the route will not be installed in the routing table. Here is an example of how a default administrative distance of 0 can be changed to an administrative distance of 255: Rt1(config)#ip route 192.168.2.0 255.255.255.0 192.168.1.2 255
65 - 253
Here is an example of a route from Rt1 to network 192.168.2.0. Rt1#config terminal Enter configuration commands, one per line. End with CNTL/Z. Rt1(config)#ip route 192.168.2.0 255.255.255.0 192.168.1.2 Rt1(config)#exit Rt1# Rt1#copy running-config startup-config Destination filename [startup-config]? Building configuration... Rt1# All routers must be configured. If Rt2 does not have a route back to network 192.168.0.0, a ping from network 192.168.0.0 will make it to network 192.168.2.0, but will not know how to get back. A relevant TI from CCNA 2 v2.1.4 is 12.1.4.
66 - 253
Here is an example for Rt1. Rt1#config terminal Enter configuration commands, one per line. End with CNTL/Z. Rt1(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.2 Rt1(config)#exit Rt1# Rt1#copy running-config startup-config Destination filename [startup-config]? Building configuration... Rt1# Remind students of different types of router modes.
67 - 253
interface Serial0/0 ip address 192.168.1.1 255.255.255.0 no ip directed-broadcast no fair-queue clockrate 56000 ! interface FastEthernet0/0 ip address 192.168.0.1 255.255.255.0 no ip directed-broadcast no keepalive ! ip classless ip route 192.168.2.0 255.255.255.0 Serial0 The show ip route command is used to make sure that the static route is present in the routing table. The output of show ip route is as follows. Show ip route output Rt1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B BGP, D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area, N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2, E1 - OSPF external type 1, E2 - OSPF external type 2, E EGP, i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area, * - candidate default, U - peruser static route, o ODR, P - periodic downloaded static route Gateway of last resort is not set C 192.168.0.0/24 is directly connected, FastEthernet0/0 C 192.168.1.0/24 is directly connected, Serial0/0 S 192.168.2.0/24 is directly connected, Serial0/0 Rt1#
68 - 253
Here are the outputs of the show interface, ping, and traceroute commands. Rt1#show interfaces s0 Serial0/0 is up, line protocol is up Hardware is PowerQUICC Serial Internet address is 192.168.1.1/24 MTU 1500 bytes, BW 128 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set Keepalive set (10 sec) Last input 00:00:00, output 00:00:00, output hang never Last clearing of "show interface" counters 00:35:48 Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 194 packets input, 12076 bytes, 0 no buffer Received 194 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 194 packets output, 12076 bytes, 0 underruns 0 output errors, 0 collisions, 5 interface resets 0 output buffer failures, 0 output buffers swapped out 1 carrier transitions DCD=up DSR=up DTR=up RTS=up CTS=up Rt1# Rt1#ping 192.168.2.1 Use the escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.2.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Rt1# Traceroute command from Rt1. Rt1#traceroute 192.168.2.1 Type escape sequence to abort. Tracing the route to 192.168.2.1 1 192.168.1.2 16 msec 16 msec * Rt1#
69 - 253
Course-Level Claim: Students can evaluate the characteristics of routing protocols. Certification-Level Claim: Students can evaluate the characteristics of routing protocols. Hands-on skills: none
system. They just need to understand the basic concepts of an autonomous system. Students do not have enough experience to understand policy-based routing.
Routers will determine which route to take to a given network based on the type of algorithm that is used. Each of the three types has advantages and disadvantages.
Distance vector algorithms do not allow a router to know the exact topology of an internetwork. The router only uses hop count to determine the best path. Distance vector algorithms require each router to send its entire routing table to each of its neighbors. This creates network traffic and there is a limit to the number of hops a distance vector routing protocol will use. The RIP maximum hop count is 15 and IGRP is 255. Explain that distance vector routing protocols use the view of neighboring routers to develop their view of the internetwork. The router will use copies of neighboring routing tables to build its routing table.
Link-state routing requires more memory. Routers send updates when there is a change in the table. There is less network traffic because the routers are not sending updates every 30 or 90 seconds. The routers in an area elect a Designated Router (DR) and a Backup Designated Router (BDR). When a change is made in the network, the router that notices the change sends an update to the DR. When an update occurs, only the change is sent instead of the entire routing table. The DR then sends the network change to all routers in the area with a multicast. An important concept to mention is that routers that use a link-state routing protocol develop a common view of the internetwork. A link-state protocol collects links from neighboring routers to create a routing table. Students also need to understand that the updates from the routers contain information about the links. These links can be locally connected or received from other routers. Students also need to know that the updates are partial updates.
72 - 253
Course-Level Claim: Students can evaluate the characteristics of routing protocols. Certification-Level Claim: Students can evaluate the characteristics of routing protocols. Hands-on skills: none
During path selection, the routing table is examined to determine the next hop destination of a packet and which interface to use to reach that next hop destination. Switching occurs when a packet is moved to the interface and a frame is created to send the information.
73 - 253
Make sure students understand that each routing protocol has advantages and disadvantages. The protocols have different characteristics and were designed for different purposes. In some instances administrators will want to use RIP and other times they will use BGP.
74 - 253
Module 6 Summary
Before students begin Module 7, they must be able to configure static routes and use the show ip route, ping, and traceroute commands to perform basic network testing. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 6 exam. Formative evaluations of students as they work on the routers may be valuable in this module. Students should understand the following main points: A router will not forward a packet without a route to a destination network. Network administrators must manually configure static routes. Default routes are special static routes that provide routers with gateways of last resort. Static and default routes are configured with the ip route command. Static and default route configuration can be verified with the show ip route, ping, and traceroute commands. How to verify and troubleshoot static and default routes Routing protocols Autonomous systems Purpose of routing protocols and autonomous systems The classes of routing protocols Distance vector routing protocol features and examples Link-state protocol features and examples Route determination Routing configuration RIP, IGRP, OSPF, EIGRP, and BGP routing protocols Autonomous systems and IGP versus EGP Distance vector routing Link-state routing
75 - 253
76 - 253
Course-Level Claim: Students can identify, analyze, and show how to rectify inherent problems associated with distance vector routing protocols. Certification-Level Claim: Students can troubleshoot and configure routing protocols based on user requirements. Hands-on skills: none
77 - 253
When Network 1 fails, Router E sends an update to Router A. Router A stops routing packets to Network 1, but Routers B, C, and D continue to route packets because they have not yet been informed of the failure. When Router A sends out its update, Routers B and D stop routing to Network 1. However, Router C has not received an update. Router C still tries to reach Network 1 through Router B. Now Router C sends a periodic update to Router D, which indicates a path to Network 1 through Router B. Router D changes its routing table to reflect this incorrect information and propagates the information to Router A. Router A propagates the information to Routers B and E and the process continues. Any packet that is destined for Network 1 will now loop from Router C to B to A to D and back again to C. Problem: Routing Loops
Convergence is when all routers have the same information about the network. Convergence is a by-product of the routing updates that are sent out based on the routing protocol used on a router. If updated information does not reach all routers in a network quickly enough, then incorrect routing information may be sent out by routers that have not received the updates, which will replace the correct information in other routers. In the example, Router C sends out an update to neighbor routers that incorrectly indicates that a route to Network 1 exists. This is a timing issue. Router C sends out updates before its neighbors have a chance to send out their newly updated information. Therefore, the accurate information is replaced by inaccurate information, which creates a routing loop. A kinesthetic activity may be helpful to students to get a mental picture of how this process occurs. Instruct students to write their updates on paper and reenact the scenario from the figure and description.
78 - 253
79 - 253
Split horizon is another mechanism to help prevent routing loops. Split horizon does not allow the originator of network information to receive updates about the network from another router. This prevents the originator of correct information from being influenced by the incorrect information of another router. Use the figure in this section for reference. If Router 2 sends out an update to Router 1 about the status of Network A, it cannot receive a report back from Router 1 about Network A. From the description in the curriculum, which is included above, if split horizon were in use in Step 2, Router A would have ignored information about Network 1 from Router B. More specifically, Router B would not have attempted to update Router A about that particular network in the first place because Router A originally informed Router B about the status of Network 1. Refer to Figure [1] Routing Update for a graphical representation of this process.
80 - 253
X
Reference the graphic in this section. When Router A determines that Network X is down, it poisons the route in its table. To do this, it sets the hop count to Network X to one more than the maximum. It then sends a poison update to Router B regardless of the time schedule for routing updates. This does not send the entire table. It only sends the route poisoning. This single change, which indicates that Network X is now unreachable, is quickly propagated through the network. This speeds convergence and reduces the likelihood that a loop will develop.
81 - 253
82 - 253
7.2 RIP
Essential Labs: Optional Labs: Core TIs: Optional TIs: 7.2.2, 7.2.6, 7.2.7, and 7.2.9 None All none
Course-Level Claim: Students can configure, verify, analyze, and troubleshoot simple distance vector routing protocols. Certification Level Claim: Students can troubleshoot and configure routing protocols based on user requirements. Hands-on skills: none
Notice that the network statements configured under the RIP protocol are classful addresses. Students commonly configure the network command by using the IP address of the subnet. The IOS will change this to the classful network address.
83 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 7 Copyright 2004, Cisco Systems, Inc.
The router interfaces associated with the directly connected networks will participate in the routing process. These interfaces will send and receive routing updates. RIP can be further customized through the use of some optional configuration parameters: Apply offsets to routing metrics Adjust timers Specify a RIP version Enable RIP authentication Run IGRP and RIP concurrently Disable the validation of source IP addresses Enable or disable split horizon
RIP permits a maximum hop count of 15 and any destination greater than 15 hops away is tagged as unreachable. This maximum hop count prevents counts to infinity and endless network routing loops. The split horizon rule prevents information about a route from being sent out the same interface from which it was originally received. Split horizon is used to avoid the creation of routing loops due to multiple routers that advertise routes to each other about
84 - 253
the same network. The no ip split-horizon command can be used to disable split horizon. Hold-down timers are used to define the amount of time that a possible down route will be held and routes with higher metrics to the same network will not be accepted. The default holddown time is 180 seconds, which is 6 times the regular update period. When a route goes down, the hold-down timer is started. During this time period, a route with a higher metric than the original metric will not be accepted. If the original route comes back up or a route with a lower metric than the original metric is advertised, they will be accepted immediately. The hold-down timer will reduce routing loops but it may also slow convergence. The timers basic 30 90 180 540 router configuration command can be used to adjust the basic timers. The holddown is the third number. RIP updates are broadcast by default every 30 seconds. This can be increased to reduce network congestion or decreased to improve convergence with the timers basic 30 90 180 540 command. The update timer is the first number listed. In some instances, it may necessary to avoid the advertisement of routing updates out a specific interface. This can be accomplished with the passive-interface interface router configuration command. For RIP to function in a non-broadcast environment, neighbor relationships must be configured. This can be accomplished with the neighbor ip address router configuration command. The RIP version can also be changed with the version [1 | 2] router configuration command. Other variations of this command may be placed on the interface to specify which version of packets to send and receive.
network 219.17.100.0, metric 2 network 199.6.13.0, metric 2 network 205.7.5.0, metric 1 network 210.93.105.0, metric 4 RIP: sending v1 update to 255.255.255.255 via Ethernet1 (205.7.5.1) network 204.204.7.0, metric 3 network 223.8.151.0, metric 3 network 201.100.11.0, metric 1 network 219.17.100.0, metric 2 network 192.5.5.0, metric 1 network 199.6.13.0, metric 2 network 210.93.105.0, metric 4 RIP: sending v1 update to 255.255.255.255 via Serial0 (201.100.11.1) network 192.5.5.0, metric 1 network 205.7.5.0, metric 1 RIP: ignored v1 update from bad source 219.17.100.1 on Ethernet0 RIP: received v1 update from 201.100.11.2 on Serial0 204.204.7.0 in 2 hops 223.8.151.0 in 2 hops 219.17.100.0 in 1 hops 199.6.13.0 in 1 hops 210.93.105.0 in 3 hops Other commands that can be used to troubleshoot RIP update issues include the following: show ip rip database show ip protocols show ip route debug ip rip show ip interface brief
86 - 253
desirable, or if another route for fault tolerance is desired. A static route can be configured on the router with the ip route command and removed with the no ip route command. These routes can then be redistributed or shared through the dynamic routing protocol with the redistribute static command.
88 - 253
7.3 IGRP
Essential Labs: Optional Labs: Core TIs: Optional TIs: 7.3.5 and 7.3.6 7.3.8 All none
Course-Level Claim: Students can configure, verify, analyze, and troubleshoot simple distance vector routing protocols. Certification-Level Claim: Students can troubleshoot and configure routing protocols based on user requirements. Hands-on skills: none
One additional item to note is that Cisco offers more support for EIGRP than IGRP. Many of the newer releases of IOS do not support IGRP.
89 - 253
Reliability the reliability between source and destination, determined by the exchange of keepalives Load the load on a link between a source and a destination based on bits per second MTU the maximum transmission unit value of a path
The show ip protocol command is used to display parameters, filters, and network information about the routing protocol used by a router. Each metric has a corresponding K value or weight. By default, only K1 and K3 are set to one. These represent the K values for bandwidth and delay. The K values of the other metrics are set to zero. By default, only bandwidth and delay are used to determine the composite metric or routing metric of each route. This use of multiple components to calculate a composite metric provides greater accuracy than the RIP hop-count metric to choose the best path. The show ip route command displays the composite IGRP metric for a given route in brackets with the administrative distance. A link with higher bandwidth will have a lower metric. A link with lower cumulative delay will have a lower metric. The lower the metric is, the better the route. Make sure that students understand that the default metrics for IGRP are bandwidth and delay. The other metrics can be used but are not used by default. Allow the students to configure IGRP on a mesh network and adjust the metrics to see how the routing table is changed. Students should also be instructed to trace the path to a network before and after the metric changes to verify the different path selection.
Interior routes are defined as routes between subnets that are connected to the same router interface. System routes are routes within the same autonomous system. These routes are derived from directly connected networks and through routes learned from other IGRP routers. System routes do not contain subnet information. Exterior routes are routes between autonomous systems. A gateway of last resort can be used to transfer information to a destination outside of a local autonomous system. Describe the graphic included in the TI in depth. Explain the concepts of interior routes and multiple subnets on the same router interface. Autonomous systems should also be explained.
routing loops between adjacent routers. Poison-reverse updates are necessary to avoid larger routing loops. An increase in metric may indicate a routing loop, so poison-reverse updates are sent to place the route with the increasing metric in holddown. IGRP sends out poisonreverse updates when the route metric has increased by a factor of 1.1 or more. The timers associated with IGRP include update, invalid, hold-down, and flush timers. The update timer indicates how often routing updates will be sent, the default for IGRP is 90 seconds. The invalid timer is the amount of time that IGRP will wait before it declares a route invalid. The default for IGRP is 270 seconds, which is 3 times the update period. The holddown variable specifies the holddown period. During this period the information about better routes is suppressed, even though the route in holddown is marked as inaccessible and advertised as unreachable. When the holddown time has expired, routes advertised by other routers are accepted. The default holddown time is greater than three times the update time. The flush timer indicates the amount of time that a route should remain in the routing table before it is flushed. This time should be at least as long as the holddown and invalid times combined. This will allow the proper holddown phase, otherwise the route may be flushed and new routes may be accepted prematurely. The default flush timer is seven times the update time. The show ip protocol command should be used to view the timers and then timers should be changed and viewed again. The debug ip igrp events command can be used to verify that the timers affect routing updates. Have the students configure IGRP on the lab topology.
91 - 253
routing protocol in smaller internetworks. Also, emphasize that IGRP can only be used in a fully Cisco environment.
The show interface command can be used to verify issues that are specifically related to the interface configuration such as the ip address, physical connectivity, and keepalives. The show ip protocol command should be used to verify that routing protocols are correctly configured. This command can be used to view the routing protocols enabled on the router, the networks advertised, timer values, and other routing protocol-specific information. The show ip route command displays the routing table and lists the next hop to all known networks, how the route was learned, the metric, and other route specific information. The show run command can be used to verify the running configuration. Have the students verify proper operation of IGRP on the lab topology.
Both the debug ip igrp events and debug ip igrp transactions commands can be used to verify that routing information is being passed between routers. The ping command can be used to test network connectivity. The trace command can be used to locate pinpoint delay or connectivity issues. Have the students take a break and place several IGRP problems on the lab topology. When the students return from the break, instruct them to troubleshoot the topology and correct any problems they find. Emphasize the fact that the show run command, which makes it easy to troubleshoot problems in a lab, may not be very
92 - 253
effective in real situations. The show run command should be used to verify configuration changes.
93 - 253
Module 7 Summary
Before students begin Module 8, they must be able to configure and troubleshoot RIP and IGRP by themselves. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 7 exam. Formative skill assessments such as timed competitions to see who can get hands-on or e-Lab routing to work the fastest should be used. The emphasis of any assessment should be on the ability to demonstrate mastery. Students should understand the following main points:
94 - 253
How routing information is maintained through distance vector protocols How routing loops occur in distance vector How to define a maximum to prevent count to infinity How to eliminate routing loops through split horizon Route poisoning How to avoid routing loops with triggered updates How to prevent routing loops with holddown timers How to prevent routing updates through an interface Load balancing across multiple paths RIP process RIP configuration The ip classless command Common RIP configuration issues Load balancing with RIP How to integrate static routes with RIP How to verify RIP configuration IGRP features IGRP metrics IGRP routes IGRP stability features How to configure IGRP
Copyright 2004, Cisco Systems, Inc.
How to migrate RIP to IGRP How to verify IGRP configuration How to troubleshoot IGRP
95 - 253
96 - 253
Course-Level Claim: Students can describe the operation of ICMP and identify the reasons, types, and format of associated error and control messages. Hands-on skills: none
8.1.1 ICMP
IP is considered a best effort or unreliable method for the delivery of network data. If the data does not reach its destination, the sender is not notified that the transmission has failed. ICMP is the component of the TCP/IP protocol stack that addresses the limitations of IP. ICMP does not overcome the unreliability issues in IP but ICMP does allow for testing. Reliability must be provided by upper layer protocols. Explain the difference between a guaranteed method and a best effort. This is a good time to show students how a successful ICMP works. Introduce problems into the lab setup to demonstrate how ICMP relays messages in a network. Explain that ICMP is a Layer 3 protocol of the TCP/IP suite. It is not an IP packet. It uses the IP addressing scheme but has a different packet format than IP.
97 - 253
If these conditions are not met, communication cannot occur. Instruct the students to discuss problems that could cause a network to be unreachable.
98 - 253
The type field indicates the type of ICMP message that is sent. The code field includes additional information that is specific to the message type. The checksum field is used to verify the integrity of the data. Create an example to help students understand this format. This is an important concept to help the student understand causes of ICMP "destination unreachable" messages.
99 - 253
Course Level Claim: Students can describe the operation of ICMP and identify the reasons, types, and format of associated error and control messages. Hands-on skills: none
Explain to the students that unlike error messages, control messages are not the result of lost packets or error conditions. Instead, they are used to inform hosts of conditions such as network congestion or the existence of a better gateway to a remote network. Like all ICMP messages, ICMP control messages are encapsulated.
The interface on which the packet comes into the router is the same interface on which the packet gets routed out. The subnet/network of the source IP address is the same subnet/network of the next hop IP address of the routed packet. The datagram is not source-routed.
Copyright 2004, Cisco Systems, Inc.
The route for the redirect is not another ICMP redirect or a default route. The router is configured to send redirects.
Make sure students understand default gateways. Instruct students to look at the router lab setup and visually determine the default gateway of the host attached to it.
process begins when the host sends a multicast router solicitation message to all routers with the address 224.0.0.2. If a router solicitation message is sent to a router that does not support the discovery process, the solicitation will go unanswered. However, if it is supported, a router advertisement is sent in return.
102 - 253
Module 8 Summary
Before students begin Module 9, they should know where to look for many of the error messages they may encounter. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 8 exam. This is a very descriptive module so vocabulary or scenario-based quizzes may be the preferred form of assessment. Students should understand the following main points: IP is a best-effort delivery method that uses ICMP messages to alert the sender that the data did not reach its destination. ICMP echo request and echo reply messages allow the network administrator to test IP connectivity to aid in the troubleshooting process. ICMP messages are transmitted with the IP protocol so their delivery is unreliable. ICMP packets have their own special header information, which starts with a type field and a code field. Potential causes of specific ICMP error messages The functions of ICMP control messages ICMP redirect/change request messages ICMP clock synchronization and transit time estimation messages ICMP information request and reply messages ICMP address mask request and reply messages ICMP router discovery message ICMP router solicitation message ICMP congestion and flow control messages
103 - 253
104 - 253
Course-Level Claim: Students can configure, verify, analyze, and troubleshoot simple distance vector routing protocols. Certification-Level Claim: Students can troubleshoot and configure routing protocols based on user requirements. Hands-on skills: none
Discuss with the students the differences between static routing and dynamic routing. This is an important concept for the students to understand. The instructor should also emphasize that the router would not know what to do with a packet if there was no route to forward it toward the destination.
105 - 253
The ip default-network command establishes a default route in networks with dynamic routing protocols. Discuss the important concept of the gateway of last resort and the two commands used to configure default routes. Have the students brainstorm and present their ideas on why routers do not maintain routes to every possible destination to the class. One thing the students should know is that the ip route 0.0.0.0 0.0.0.0 command is referred to as the quad zero route.
which are static routes. These have an administrative distance of one. Students should also learn the administrative distances of RIP, IGRP, EIGRP, and OSPF. The administrative distance must not be confused with routing metrics. Metrics are calculated and compared among routes from the most trusted routing source. The router will select the route from the best administrative source with the lowest metric. This is an important concept for the students to understand.
Stress the importance of these commands. Use examples to show the students the information generated by these commands.
107 - 253
Course-Level Claim: Students can use embedded Layer 3 through Layer 7 protocols to establish, test, suspend, or disconnect connectivity to remote devices from the router console. Certification Level Claim: Students can describe network communications in layered models, perform simple LAN troubleshooting, and use the OSI model as a guide for systematic network troubleshooting. Hands-on skills: none
opportunity to group students together to practice for an exam or earn extra credit through competitive activities. For example, describe a type of error and have the teams compete to determine the associated layer. Relevant TIs from CCNA 2 v2.1.4 are 13.1.1 and 13.1.5. The students need to understand the ping process and what is tested by each ping: ping the loopback address ping the interface address ping the local router interface address ping a remote host address
109 - 253
Course-Level Claim: Students can use the commands incorporated within IOS to analyze and rectify network problems. Certification-Level Claim: Students can perform simple WAN troubleshooting. Hands-on skills: none
This is an important concept for the students to understand to help in the troubleshooting process. Two important facts for the students to learn are that CDP is Cisco proprietary, which means that it only works between Cisco devices, and that CDP only works between directly connected devices.
the troubleshooting process. Students need to realize that there is a lot of output that will be completely unfamiliar to them. The two main reasons for them to use this command are to discover the cable type connected to the serial interface and to see the clock rate on the interface with the DCE cable.
112 - 253
Module 9 Summary
Before students begin Module 10, they must be able to read and interpret a routing table and must have mastered a range of IOS commands for troubleshooting. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 9 exam. Paper activities and hands-on router challenges should be used to give students troubleshooting practice. Consider giving students previously-bugged configuration files so they can demonstrate their troubleshooting skills in a timed, controlled setting. Students should understand the following main points: Use and understand the output of the show ip route command Determine the gateway of last resort Determine the route source and destination address Determine the route administrative distance Determine the route metric Determine the route next hop Determine the last route update Observe multiple paths to a destination Use a structured approach to troubleshooting Test by OSI layers Use indicators to troubleshoot Layer 1 Use the ping command to troubleshoot Layer 3 Use the telnet command to troubleshoot Layer 7 Use the show interfaces command to troubleshoot Layer 1 and Layer 2 Use the show ip route and show ip protocols commands to troubleshoot routing issues Use the following commands to troubleshoot various router problems:
113 - 253
Consider the use of network analysis or protocol sniffing software such as Fluke Protocol Inspector to analyze the operation of TCP on live networks. Module 10 Caution TCP was introduced in CCNA 1 but there is much more detail in this section. Students need to understand TCP. TCP ports and sessions are the foundations of network performance, control, and security. This is very challenging material for students who are still trying to separate the functions of Layer 2 headers, Layer 3 headers, and Layer 4 headers. The numbering of bytes in the back-and-forth exchange of SYN and ACK in TCP is difficult to understand. Work out examples for students. Students who complete this module should be able to perform the following tasks: Describe TCP and its functions Describe TCP synchronization and flow control Describe UDP operation and processes Identify common port numbers Describe multiple conversations between hosts Identify ports used for services and clients Describe port numbering and well known ports Understand the differences and the relationship between MAC addresses, IP addresses, and port numbers
114 - 253
Course-Level Claim: Students can describe the operation of the major transport layer protocols and the interaction and transportation of application layer data. Certification-Level Claim: Students can evaluate the TCP/IP communication process and its associated protocols. Hands-on skills: none
3. The source host responds with a simple acknowledgement of y + 1 to indicate that it received the previous ACK. This finalizes the connection process. The three-way handshake is an important concept for the student to understand. A relevant TI from CCNA 2 v2.1.4 is 9.1.6.
Even without an exact answer the students can see the inefficiency of streaming on all the other hosts. Calculate the wait with the formula (200MB x 8bits/byte)/media speed. After data is segmented, it must be transmitted to a destination device. Flow control regulates how much data is sent during a transmission. The process of flow control is known as windowing. Window size determines how much data can be transmitted at one time. The host must receive an ACK before any more data can be sent. TCP uses sliding windows to determine transmission size. This allows for negotiation of the window size to allow for more than one byte to be sent. This allows for the destination device to tell the source to decrease or increase the amount of data being sent. This is an important concept for the students to understand. This helps the student understand the entire process of TCP and why it is considered reliable and connection-oriented.
116 - 253
Both TCP and UDP use IP as their underlying protocol. TCP must be used when applications need to guarantee the delivery of a packet. When applications do not need a guarantee, UDP is used. It is a faster, connectionless delivery mechanism. Stress to the students that UDP does not use windowing or acknowledgments and does not require sequencing numbers. Application layer protocols provide more reliability. Since the UDP header is smaller than the TCP header, UDP has less overhead. UDP is often used for applications and services such as
117 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 10 Copyright 2004, Cisco Systems, Inc.
real-time audio and video. These applications require less overhead. They also do not need to be resequenced since packets that arrive late or out of order have no value.
118 - 253
Course-Level Claim: Students can describe the operation of the major transport layer protocols and the interaction and transportation of application layer data. Certification-Level Claim: Students can evaluate TCP/IP communication process and the associated protocols. Hands-on skills: none
A good analogy to help students understand this process is a post office box number. Each piece of mail is sent to a zip code, city, and then a P. O. Box. Similarly, the IP address and transport layer send the packet to the correct server, but the port number guarantees that the packet will contact the correct application.
ports. Students must know these port numbers. Explain to the student that a question mark (?) can be used in the router to display the port numbers. However, students must learn the most common port numbers. These ports and their activities can be examined on a workstation from the command prompt with the netstat a command. The ports that are listed as listening are services. A good way to explain this concept is a server service listens on a given port number. A client will initiate a session with the server by addressing that particular port number. All inbound segments have a destination port number. An application layer protocol or service looks at this port number to see if its port number is being addressed. If it is not, then the service ignores the segment. Emphasize that the client initiates the session. The server is listening and will respond when addressed.
The first 1023 are well known ports. Registered ports range from 1024 to 49151. Ports between 49152 and 65535 are dynamic or private ports. Discuss the differences between these ports with the students. Also, let the students know that services can use the upper port numbers. This can be done for private applications or for security. An example of using a private port for security is running a Telnet server listening to port 14002, instead of the wellknown port 23. Since the port is not the standard port 23, the open port 14002 would have to be known or discovered by a user to successfully telnet to this host.
sockets. Emphasize the fact that sequencing and acknowledgement numbers are handled on a session-by-session basis. Each session between hosts uses its own unique set of sequencing and acknowledgement numbers.
121 - 253
Module 10 Summary
Before students begin Module 11, they must be able to compare and contrast the roles of MAC addresses, IP addresses, and port numbers. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 10 exam. Students should understand the following main points: TCP operation description Synchronization process or three-way handshake Denial-of-service attacks Windowing and window size Sequencing numbers Positive acknowledgement and retransmission (PAR) UDP operation Multiple conversations between hosts Ports for services Ports for clients Port numbering and well-known ports Example of multiple sessions between hosts Comparison of MAC addresses, IP addresses, and port numbers
122 - 253
123 - 253
Course-Level Claim: Students can identify the application of packet control with various access control lists. Certification-Level Claim: Students can implement access lists, develop an access list to meet user specifications, and evaluate rules for packet control. Hands-on skills: none
The labs in CCNA 2 have allowed all traffic with no filtering. The students must understand the path, or know the source and destination address of the packets to apply the concept of an ACL. Review the OSI model and the protocols at each layer with the students. The reasons for ACLs and the methods that ACLs use to accomplish these functions may not be apparent to the students. ACLs may require some time to grasp. Do not rush through these sections. Give the students enough time to absorb this information. Encourage the students to use the labs to reinforce this knowledge. Encourage the students to experiment with various ACL scenarios.
124 - 253
<600-699> Appletalk access list <700-799> 48-bit MAC address access list <800-899> IPX standard access list <900-999> IPX extended access list <2000-2699> IP extended access list (expanded range) rate-limit Simple rate-limit specific access list The students will need to memorize the ACL numbers. rt1(config)#access-list 1 ? deny Specify packets to reject permit Specify packets to forward remark Access list entry comment rt1(config)#access-list 1 permit ? Hostname or A.B.C.D Address to match any Any source host host A single host address rt1(config)#access-list 1 permit 192.168.0.1 ? A.B.C.D Wildcard bits log Log matches against this entry <cr> rt1(config)#access-list 1 permit 192.168.0.1 0.0.0.0 ? log Log matches against this entry <cr> Give students a list of rules for access lists to help them understand this concept. Emphasize the following points: Use one access list for each protocol and for each direction. Place standard access lists closest to the destination. Place extended access lists closest to the source. Apply the "in or out" keyword as if from inside the router. Remember statements are processed sequentially from the top of the list until a match is found and if no match is found, the packet is denied. Remember there is an implicit deny all at the end of ACLs that will not appear in the configuration listing. Remember, the match condition is examined first and the permit or deny is examined ONLY if the match is true. List statements from specific references such as individual hosts to general references such as entire networks when access list logic overlaps. Do not work with an access list that is actively applied. Use Notepad or a similar text editor to create comments that outline the logic and then fill in the statements that perform the logic.
Copyright 2004, Cisco Systems, Inc.
126 - 253
Remember new lines are always added to the end of the access list. Use the no access-list x command to remove an entire list since it is not possible to selectively add and remove lines. Remember that an IP access list will send an ICMP host unreachable message to the sender of a rejected packet and will discard the packet. Use care when removing an access list. If the access list is applied to a production interface and it is removed, there may be a default deny any applied to the interface and all traffic will be halted. If the IOS defaults to permit all, there will be no security or performance regulation. Remember outbound filters do not affect traffic that originates from the local router.
These rules will help students become successful with using ACLs. This is not an all-inclusive list and it can be presented in any order.
should be consistent across the internetwork. For example, when a common group of bits is used to identify the network devices, these same bits should be used to identify all network devices in the internetwork.
To test an ACL, the students will need to know what traffic will be permitted, denied, and the path. Have students test for connectivity, apply the ACL, and then check the ACL to see if it works. The show running-config command should be used sparsely. Since lab configurations are relatively simple, the problems can usually be found rapidly with this command. However, students can become too dependent on it. When students troubleshoot the complex configurations of a production environment, this command will not be productive. The show and debug commands are the troubleshooting commands that should be used.
128 - 253
Course-Level Claim: Students can analyze, configure, implement, verify, and rectify access control lists within a router configuration. Certification-Level Claim: Students can implement access lists, develop an access list to meet user specifications, troubleshoot an access list, and evaluate rules for packet control. Hands-on skills: none
often wrap in the terminal window. The wildcards also have the option of using the host or any keywords in the command. The extended ACL uses the source and destination address. Ask students what ports are used for FTP, Telnet, SMTP, HTTP, and DNS. The students need to have these ports memorized. The first part of the IP extended ACL is the same as the IP standard ACL. The number is within the range of 100 to 199. rt1(config)#access-list 101 ? deny Specify packets to reject dynamic Specify a DYNAMIC list of PERMITs or DENYs permit Specify packets to forward remark Access list entry comment The permit or deny is the same as the standard. rt1(config)#access-list 101 permit ? <0-255> An IP protocol number ahp Authentication Header Protocol eigrp Cisco's EIGRP routing protocol esp Encapsulation Security Payload gre Cisco's GRE tunneling icmp Internet Control Message Protocol igmp Internet Gateway Message Protocol igrp Cisco's IGRP routing protocol ip Any Internet Protocol ipinip IP in IP tunneling nos KA9Q NOS compatible IP over IP tunneling ospf OSPF routing protocol pcp Payload Compression Protocol pim Protocol Independent Multicast tcp Transmission Control Protocol udp User Datagram Protocol In an extended ACL, the protocol is listed after the permit or deny statement. Then enter the source address with the wildcard mask and destination address with the wildcard mask. rt1(config)#access-list 101 permit tcp 172.16.0.1 0.0.0.0 192.168.0.0 0.0.255.255 ? ack Match on the ACK bit eq Match only packets on a given port number established Match established connections fin Match on the FIN bit gt Match only packets with a greater port number log Log matches against this entry log-input Log matches against this entry, including input interface lt Match only packets with a lower port number neq Match only packets not on a given port number precedence Match packets with given precedence value psh Match on the PSH bit range Match only packets in the range of port numbers rst Match on the RST bit syn Match on the SYN bit time-range Specify a time-range tos Match packets with given TOS value urg Match on the URG bit
130 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 11 Copyright 2004, Cisco Systems, Inc.
<cr> Next enter eq, gt or any of the above. The eq, gt and lt define ranges of port numbers. The students need to know the standard port numbers and if they use TCP or UDP. At the end of every ACL is the implied deny all statement. A common error is failure to enter a permit statement. If the ACL does not contain a permit statement, nothing will be permitted. There are two ways to design security with ACLs. The first is to create an ACL that specifically denies potentially harmful traffic and permits all other traffic. Most of the ACL statements will consist of deny statements with a permit any command as the last entry in the list. This generally has the advantage of being easier to create and has fewer lines. It is also less secure than the other method. The second method is to only permit traffic that is specified as appropriate. With this type of list, every type of traffic that is permissible requires a line in the list to permit it. All other traffic will be denied by the implicit deny at the bottom of the list. These lists consist of primarily permit statements and do not have a permit any at the end of the list. While these lists require more planning and lines of code, they are typically more secure. The maintenance for this type of list is usually triggered by the implementation of a new application or service that requires access by hosts on the internetwork.
It is important to note that a named access list will allow the deletion of statements but will only allow for statements to be inserted at the end of a list. The configuration of a named ACL is very similar to the configuration of a standard or extended ACL. The first difference is that instead of starting the command with access-list the named ACL uses ip access-list: rt1(config)#ip access-list ? extended Extended Access List log-update Control access list log updates logging Control access list logging standard Standard Access List Then enter extended or standard: rt1(config)#ip access-list extended ? <100-199> Extended IP access-list number WORD Access-list name The name used is named_ACL: rt1(config)#ip access-list extended named_ACL
131 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Module 11 Copyright 2004, Cisco Systems, Inc.
rt1(config-ext-nacl)# rt1(config-ext-nacl)#? Ext Access List configuration commands: default Set a command to its defaults deny Specify packets to reject dynamic Specify a DYNAMIC list of PERMITs or DENYs evaluate Evaluate an access list exit Exit from access-list configuration mode no Negate a command or set its defaults permit Specify packets to forward remark Access list entry comment From this point the ACL will work like any other extended ACL.
11.2.5 Firewalls
A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders. A network firewall usually consists of several different machines that work together to prevent unwanted and illegal access. ACLs should be used in firewall routers, which are often positioned between the internal network and an external network, such as the Internet. ACLs must be configured on border routers, which are routers situated on the boundaries of the network, to provide security benefits. CCNA 2 will cover standard, extended, and named ACLs. Other types will be covered in the CCNP classes.
configure routers and telnet into a remote router to test connectivity. Configure and apply the ACL to the vty lines to deny access. Then test the Telnet again. Here are the commands to configure virtual terminal access: Rt1(config)#access-list 2 permit 172.16.1.0 0.0.0.255 Rt1(config)#access-list 2 permit 172.16.2.0 0.0.0.255 Rt1(config)#access-list 2 deny any Here are the commands to apply the access list: Rt1(config)#line vty 0 4 Rt1(config-line)#login Rt1(config-line)#password secret Rt1(config-line)#access-class 2 in
133 - 253
Module 11 Summary
Before students take the final exam, they should have mastered the configuration and placement of standard and extended IP access-lists. Online assessment options include the end-of-module online quiz in the curriculum and the online Module 11 exam. Formative assessments such as short paper quizzes that instruct students to write out an access list in response to a scenario may help students achieve mastery. Students should understand the following main points: ACLs perform several functions within a router, which includes the implementation of security access procedures. ACLs are used to control and manage traffic. For some protocols, two ACLs can be applied to an interface, an inbound ACL and an outbound ACL. After a packet is matched to an ACL statement, it can be denied or permitted access to the router. Wildcard mask bits use the number one (1) and the number zero (0) to identify how to treat the corresponding IP address bits. Access list creation and application is verified through the use of various IOS show commands. The two main types of ACLs are standard and extended. Named ACLs allow access lists to be identified by names instead of numbers. ACLs can be configured for all routed network protocols. ACLs are placed where they allow the most efficient control. ACLs are typically used in firewall routers. Access lists can also restrict virtual terminal access to the router.
134 - 253
135 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
A company has several people responsible for maintaining various sections of the internetwork infrastructure. Many technicians have done an excellent job with the small portion for which they are responsible. One of the other network associates who was responsible for a larger portion of the infrastructure suddenly left the company. This left redesign and implementation on this portion of the internetwork unfinished. A technician is given the task to complete the design and implementation of the unfinished network. After taking home the documentation to study over the weekend, it is apparent to the technician why the network associate left suddenly. The few documents that existed were poorly written. So during the weekend the technician reconstructs the diagram above from an existing diagram that was found. It represents the new internetwork design. It shows the planned routers, hubs/switches, circuits, and the servers/workstations at each site. The server at the Center site is a file server accessed only by workstations on this internetwork. The workstation at the Center site is used to manage all routers on the internetwork. After returning to work Monday morning, the technician presents the new diagram to the Network Infrastructure Team Leader that assigned the project. After discussion, it is determined that new documentation must be developed for the project. The Team Leader, the instructor, must approve the documentation at each phase of the process. Use the following information to implement the network. Network address ___________________________ Required number of subnets __________________ Routing protocol ___________________________
136 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Phase 2: IP Addressing
Now that the basic plan is in place, the team leader assigns the technician to develop a prototype for the new internetwork. Use the network address assigned along with the subnetting requirements, to subnet the network. From the IP addressing scheme, assign IP addresses to the appropriate interfaces on all routers and computers in the internetwork. Use the diagram below as a guide. Obtain approval of this phase of development from the team leader before proceeding to Phase 3. Instructor approval ___________________Date __________________
137 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Boaz Hostname Console Password Secret Password VTY Password Serial 0/0 IP address Serial 0/1 IP address *Serial 0/0 Clock Rate *Serial 0/1 Clock Rate Fa 0/0 IP address Fa 0/1 IP address Enable the interfaces Add Routing Protocol
Center
Eva
138 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Boaz * Host Table contains all routers and servers Message of the Day Serial 0/0 description Serial 0/1 description Fa 0/0 description Fa 0/1 description
Center
Eva
139 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
The team lead asks the technician to write down a short summary of the purpose of each ACL, the interfaces upon which they will be applied, and the direction of the traffic. Then list the exact commands that will be used to create and apply the ACLs to the router interfaces. Before the ACLs are configured on the routers, review each of the following test conditions and make sure that the ACLs will perform as expected: Telnet from Boaz to Eva Telnet from Workstation 4 to Eva TELNET from Workstation 5 to Boaz TELNET from Workstation 2 to Boaz TELNET from Workstation 2 to Eva Ping from Workstation 5 to File Server 1 Ping from Workstation 3 to File Server 1 Ping from Workstation 3 to Workstation 4 Ping from Workstation 5 to Workstation 6 Ping from Workstation 3 to Workstation 5 Ping from Workstation 2 to Workstation 5 Ping from Workstation 2 to Workstation 3 Ping from Router Eva to Workstation 3 Ping from Router Boaz to Workstation 5 SUCCESSFUL BLOCKED BLOCKED SUCCESSFUL SUCCESSFUL SUCCESSFUL SUCCESSFUL SUCCESSFUL SUCCESSFUL BLOCKED SUCCESSFUL SUCCESSFUL SUCCESSFUL SUCCESSFUL
140 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Center
Eva
Center
Eva
141 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
General Documentation:
A complete narrative of the project should be typed using word processing software. Since the scenarios break up the entire task into pieces, take care to address each scenario task so that any layperson could understand that particular task. Microsoft Excel or another spreadsheet program could be used to simply list the equipment and serial numbers. Cisco Network Designer (CND), Microsoft Visio, or any paint program could be used to draw the network. Provide documentation that specifies how the security was tested. A plan for monitoring the network should also be included.
Technical Documentation:
The technical documentation should include details of the network topology. Use CND, Visio, or any paint program to draw the network. Use the tables in the working copy of the case study as a reference, and enter all table information into a spreadsheet program such as Microsoft Excel. The spreadsheet should include the following details: IP addressing of all interfaces DCE/DTE information Router passwords Interface descriptions IP addressing and gateway assignments for all PCs
The actual access control lists, or router commands sequence, should be included in this documentation using a word processing program. Be sure to include the router interface the list is applied to and the direction. Document the use of a routing protocol. Router output from the following commands should be captured and placed into this documentation:
142 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
show ip interface show version show hosts show startup-config show ip access-list
143 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
The routing protocol should be IGRP. The first part of Phase 1 should probably be completed as a class so that students understand the purpose of the case study. Along with a discussion of Phase 1, the deliverable piece should also be covered. The instructor should decide whether or not this is a group project. Certainly each student should be capable of deciding on IP addresses of interfaces after the IP scheme has been chosen. The Network Diagram - IP Addressing on page 4 is the first document that should be approved by the instructor.
Phase 2: IP Addressing
This Phase of the case study should be due after module 4 or 5 is completed. Students should recreate the drawing during this Phase using CDN, Visio, or a paint program. In the drawing the students should be advised to insert the appropriate interface connections on the routers. The drawing should be approved by the instructor. The following topics can be used for class discussion:
144 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
The concept of reserved address space for routers, servers, and hosts The reasons for developing an IP address scheme to allow for future growth
Optional
An additional Phase could be a reflection phase so that the student can look objectively at this case study. Questions might include: Why have two types of documentation?, What happens when a piece of equipment fails?, and so forth.
145 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Boaz#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route Gateway of last resort is not set I I C C 172.16.0.0/16 is subnetted, 4 subnets 172.16.128.0 [100/10476] via 172.16.64.1, 00:00:20, Serial0 172.16.32.0 [100/8576] via 172.16.64.1, 00:00:20, Serial0 172.16.96.0 is directly connected, Ethernet0 172.16.64.0 is directly connected, Serial0
Boaz#show ip protocols Routing Protocol is "igrp 11" Sending updates every 90 seconds, next due in 34 seconds Invalid after 270 seconds, hold down 280, flushed after 630 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates IGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 IGRP maximum hopcount 100 IGRP maximum metric variance 1 Redistributing: igrp 11 Routing for Networks: 172.16.0.0 Routing Information Sources: Gateway Distance Last Update 172.16.64.1 100 00:00:37 Distance: (default is 100)
146 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Boaz#show ip interface brief Interface IP-Address OK? Method Status Protocol Ethernet0 172.16.96.1 YES manual up up Serial0 172.16.64.2 YES manual up up Serial1 unassigned YES unset administratively down down Boaz#show version Cisco Internetwork Operating System Software IOS (tm) 3000 Software (IGS-J-L), Version 11.1(5), RELEASE SOFTWARE (fc1) Copyright (c) 1986-1996 by Cisco Systems, Inc. Compiled Mon 05-Aug-96 11:48 by mkamson Image text-base: 0x0303794C, data-base: 0x00001000 ROM: System Bootstrap, Version 11.0(10c), SOFTWARE ROM: 3000 Bootstrap Software (IGS-BOOT-R), Version 11.0(10c), RELEASE SOFTWARE (fc1) Boaz uptime is 5 hours, 6 minutes System restarted by power-on System image file is "flash:igs-j-l.111-5", booted via flash Cisco 2500 (68030) processor (revision N) with 6144K/2048K bytes of memory. Processor board ID 22650091, with hardware revision 00000000 Bridging software. SuperLAT software copyright 1990 by Meridian Technology Corp). X.25 software, Version 2.0, NET2, BFE and GOSIP compliant. TN3270 Emulation software (copyright 1994 by TGV Inc). 1 Ethernet/IEEE 802.3 interface. 2 Serial network interfaces. 32K bytes of non-volatile configuration memory. 8192K bytes of processor board System flash (Read ONLY) Configuration register is 0x2102 Boaz#show hosts Default domain is not set Name/address lookup uses domain service Name servers are 255.255.255.255 Host Centre Boaz Eva Flags Age Type Address(es) (perm, OK) 4 IP 172.16.64.1 172.16.128.1 172.16.32.1 (perm, OK) 4 IP 172.16.64.2 172.16.96.1 (perm, OK) 4 IP 172.16.128.2 172.16.160.1
147 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Boaz#show startup-config Using 1090 out of 32762 bytes ! version 11.1 service slave-log service udp-small-servers service tcp-small-servers ! hostname Boaz ! enable secret 5 $1$5EE4$v86z7o8zMLehnIWA0T7LB/ ! ! interface Ethernet0 description Boaz LAN workgroup interface ip address 172.16.96.1 255.255.224.0 ip access-group 101 in no keepalive ! interface Serial0 description Boaz WAN interface to Centre ip address 172.16.64.2 255.255.224.0 no fair-queue ! interface Serial1 no ip address shutdown ! router igrp 11 network 172.16.0.0 ! ip host Centre 172.16.64.1 172.16.128.1 172.16.32.1 ip host Boaz 172.16.64.2 172.16.96.1 ip host Eva 172.16.128.2 172.16.160.1 no ip classless access-list 101 permit ip 172.16.96.0 0.0.31.255 host 172.16.32.5 access-list 101 permit ip 172.16.96.0 0.0.31.255 172.16.96.0 0.0.31.255 access-list 101 deny tcp 172.16.96.0 0.0.31.255 any eq telnet access-list 101 deny icmp 172.16.96.0 0.0.31.255 any ! banner motd ^CWarning: This is a SECURE SYSTEM: UNAUTHORIZED USERS will be prosecuted.^C ! line con 0 exec-timeout 0 0 password cisco login line aux 0 line vty 0 4 password cisco login ! end Boaz#
148 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
tcp 172.16.96.0 0.0.31.255 any eq telnet icmp 172.16.96.0 0.0.31.255 any (8 matches)
150 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Centre#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route Gateway of last resort is not set C C I C 172.16.0.0/16 is subnetted, 4 subnets 172.16.128.0 is directly connected, Serial1 172.16.32.0 is directly connected, Ethernet0 172.16.96.0 [100/8576] via 172.16.64.2, 00:00:57, Serial0 172.16.64.0 is directly connected, Serial0
Centre#show ip protocol Routing Protocol is "igrp 11" Sending updates every 90 seconds, next due in 50 seconds Invalid after 270 seconds, hold down 280, flushed after 630 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates IGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 IGRP maximum hopcount 100 IGRP maximum metric variance 1 Redistributing: igrp 11 Routing for Networks: 172.16.0.0 Routing Information Sources: Gateway Distance Last Update 172.16.128.2 100 00:40:35 172.16.64.2 100 00:01:07 Distance: (default is 100) Centre#show ip interface brief Interface IP-Address OK? Method Status Protocol Ethernet0 172.16.32.1 YES manual up up Ethernet1 unassigned YES unset administratively down down Serial0 172.16.64.1 YES manual up up Serial1 172.16.128.1 YES manual up up Centre#show version Cisco Internetwork Operating System Software
151 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study Copyright 2004, Cisco Systems, Inc.
IOS (tm) 3000 Software (IGS-J-L), Version 11.1(5), RELEASE SOFTWARE (fc1) Copyright (c) 1986-1996 by Cisco Systems, Inc. Compiled Mon 05-Aug-96 11:48 by mkamson Image text-base: 0x0303794C, data-base: 0x00001000 ROM: System Bootstrap, Version 11.0(10c)XB2, PLATFORM SPECIFIC RELEASE SOFTWARE (fc1) ROM: 3000 Bootstrap Software (IGS-BOOT-R), Version 11.0(10c)XB2, PLATFORM SPECIFIC RELEASE SOFTWARE (fc1) Centre uptime is 5 hours, 18 minutes System restarted by power-on System image file is "flash:igs-j-l.111-5", booted via flash Cisco 2500 (68030) processor (revision D) with 8192K/2048K bytes of memory. Processor board ID 02782545, with hardware revision 00000000 Bridging software. SuperLAT software copyright 1990 by Meridian Technology Corp). X.25 software, Version 2.0, NET2, BFE and GOSIP compliant. TN3270 Emulation software (copyright 1994 by TGV Inc). 2 Ethernet/IEEE 802.3 interfaces. 2 Serial network interfaces. 32K bytes of non-volatile configuration memory. 8192K bytes of processor board System flash (Read ONLY) Configuration register is 0x2102 Centre#show host Default domain is not set Name/address lookup uses domain service Name servers are 255.255.255.255 Host Centre Boaz Eva Flags Age Type Address(es) (perm, OK) 4 IP 172.16.64.1 172.16.128.1 172.16.32.1 (perm, OK) 4 IP 172.16.64.2 172.16.96.1 (perm, OK) 4 IP 172.16.128.2 172.16.160.1
Centre#show startup-config Using 907 out of 32762 bytes ! version 11.1 service slave-log service udp-small-servers service tcp-small-servers ! hostname Centre ! enable secret 5 $1$MlW5$wj.I9efI57i0AxLPf4qOj/ ! ! interface Ethernet0 description Centre LAN workgroup interface ip address 172.16.32.1 255.255.224.0 ! interface Ethernet1 no ip address shutdown
152 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study Copyright 2004, Cisco Systems, Inc.
! interface Serial0 description Centre WAN interface to Boaz ip address 172.16.64.1 255.255.224.0 no fair-queue clockrate 56000 ! interface Serial1 description Centre WAN interface to Eva ip address 172.16.128.1 255.255.224.0 clockrate 56000 ! router igrp 11 network 172.16.0.0 ! ip host Centre 172.16.64.1 172.16.128.1 172.16.32.1 ip host Boaz 172.16.64.2 172.16.96.1 ip host Eva 172.16.128.2 172.16.160.1 no ip classless ! banner motd ^CThis is a SECURE SYSTEM. UNAUTHORIZED USERS will be prosecuted.^C ! line con 0 password cisco login line aux 0 line vty 0 4 password cisco login ! end Centre#
153 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Helper address is not set Directed broadcast forwarding is enabled Outgoing access list is not set Inbound access list is not set Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is enabled IP multicast fast switching is enabled Router Discovery is disabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled Probe proxy name replies are disabled Gateway Discovery is disabled Policy routing is disabled Centre#show ip access-lists <none applied> Centre#
155 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Eva#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route Gateway of last resort is not set C I I I 172.16.0.0/16 is subnetted, 4 subnets 172.16.128.0 is directly connected, Serial1 172.16.32.0 [100/8576] via 172.16.128.1, 00:01:17, Serial1 172.16.96.0 [100/10576] via 172.16.128.1, 00:01:18, Serial1 172.16.64.0 [100/10476] via 172.16.128.1, 00:01:18, Serial1
Eva#show ip protocol Routing Protocol is "igrp 11" Sending updates every 90 seconds, next due in 24 seconds Invalid after 270 seconds, hold down 280, flushed after 630 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates IGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 IGRP maximum hopcount 100 IGRP maximum metric variance 1 Redistributing: igrp 11 Routing for Networks: 172.16.0.0 Routing Information Sources: Gateway Distance Last Update 172.16.128.1 100 00:00:07 Distance: (default is 100) Eva#show ip interface brief Interface IP-Address OK? Method Status Protocol Ethernet0 172.16.160.1 YES manual up down Serial0 unassigned YES unset administratively down down Serial1 172.16.128.2 YES manual up up Eva#show version Cisco Internetwork Operating System Software IOS (tm) 3000 Software (IGS-J-L), Version 11.1(5), RELEASE SOFTWARE (fc1) Copyright (c) 1986-1996 by cisco Systems, Inc. Compiled Mon 05-Aug-96 11:48 by mkamson
156 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study Copyright 2004, Cisco Systems, Inc.
Image text-base: 0x0303794C, data-base: 0x00001000 ROM: System Bootstrap, Version 11.0(10c), SOFTWARE ROM: 3000 Bootstrap Software (IGS-BOOT-R), Version 11.0(10c), RELEASE SOFTWARE (fc1) Eva uptime is 5 hours, 4 minutes System restarted by reload System image file is "flash:igs-j-l.111-5", booted via flash Cisco 2500 (68030) processor (revision N) with 6144K/2048K bytes of memory. Processor board ID 06147980, with hardware revision 00000000 Bridging software. SuperLAT software copyright 1990 by Meridian Technology Corp). X.25 software, Version 2.0, NET2, BFE and GOSIP compliant. TN3270 Emulation software (copyright 1994 by TGV Inc). 1 Ethernet/IEEE 802.3 interface. 2 Serial network interfaces. 32K bytes of non-volatile configuration memory. 8192K bytes of processor board System flash (Read ONLY) Configuration register is 0x2102 Eva#show hosts Default domain is not set Name/address lookup uses static mappings Host Boaz Centre Flags Age Type Address(es) (perm, OK) 4 IP 172.16.64.2 172.16.96.1 (perm, OK) 4 IP 172.16.64.1 172.16.128.1 172.16.32.1
157 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
Eva#show startup-config Using 1156 out of 32762 bytes ! version 11.1 service slave-log service udp-small-servers service tcp-small-servers ! hostname Eva ! enable secret 5 $1$ejwr$qcHMWf3GAiWytPceeWK1y0 ! ip subnet-zero ! interface Ethernet0 description Eva LAN workgroup interface ip address 172.16.160.1 255.255.224.0 ip access-group 103 in ! interface Serial0 no ip address shutdown no fair-queue ! interface Serial1 description Eva WAN interface to Centre ip address 172.16.128.2 255.255.224.0 ! router igrp 11 network 172.16.0.0 ! ip host Boaz 172.16.64.2 172.16.96.1 ip host Centre 172.16.64.1 172.16.128.1 172.16.32.1 no ip classless ip http server access-list 103 permit ip 172.16.160.0 0.0.31.255 host 172.16.32.5 access-list 103 permit ip 172.16.160.0 0.0.31.255 172.16.160.0 0.0.31.255 access-list 103 deny tcp 172.16.160.0 0.0.31.255 any eq telnet access-list 103 deny icmp 172.16.160.0 0.0.31.255 any ! banner motd ^CWarning: This is a SECURE SYSTEM. UNAUTHORIZED USER will be prosecuted.^C ! line con 0 exec-timeout 0 0 password cisco login transport input none line aux 0 password cisco login line vty 0 4 password cisco login ! end Eva#
158 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
159 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
permit ip 172.16.160.0 0.0.31.255 172.16.160.0 0.0.31.255 (225 matches) deny tcp 172.16.160.0 0.0.31.255 any eq telnet deny icmp 172.16.160.0 0.0.31.255 any (20 matches) Eva#
160 - 253
CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Case Study
V. Appendices
A) Cisco Online Tools and Utilities B) CCNA Assessment Guidelines C) Evidence Centered Design of Assessment Tasks in the Networking Academy program D) Instructional Best Practices
161 - 253
162 - 253
1 Output Interpreter
Output Interpreter is a Web-based application that provides a troubleshooting analysis and a course of action for a router, switch, or PIX device. Output Interpreter uses a collection of show command output to perform the analysis. Users paste the output of one or more supported commands into Output Interpreter to receive a report that includes errors, warnings, and relevant troubleshooting information. The report also includes crash analysis and error message decodes, which were previously supported by the Stack Decoder and the Error Message Decoder tools. http://www.cisco.com/cgi-bin/Support/OutputInterpreter/home.pl
163 - 253
Explanations for console error message strings are listed in the Cisco Software System Messages guide. http://www.cisco.com/cgi-bin/Support/Errordecoder/home.pl
164 - 253
The Software Bug Toolkit is a Web-based resource that is used to search for software bugs based on version and feature sets. The toolkit can be used to determine why a feature does not work. http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl
165 - 253
4 IP Subnet Calculator
IP Subnet Calculator is a Web-based resource that is used to calculate the subnet mask based on several variables. This tool can be used to verify network settings. http://www.cisco.com/cgi-bin/Support/IpSubnet/home.pl
166 - 253
This Web page is the source for Cisco password recovery procedures. The password recovery procedure for every Cisco device can be found here. http://www.cisco.com/warp/public/474/
167 - 253
The TAC Case Collection, is an evolution of the Troubleshooting Assistant tool. It allows users to interactively identify and troubleshoot common problems that involve hardware, configuration, and performance issues. These solutions, which are provided directly by TAC engineers, help resolve networking problems. http://www.cisco.com/kobayashi/support/tac/tsa/launch_tsa.html
168 - 253
7 Software Advisor
The Software Advisor helps users choose the appropriate software for network devices. Users can match software features to Cisco IOS and CatOS releases, compare IOS releases, or find out which software releases support their hardware. http://www.cisco.com/cgi-bin/Support/CompNav/Index.pl
169 - 253
8 Feature Navigator II
Cisco Feature Navigator II is a Web-based application that allows users to quickly find the right Cisco IOS Software release for the features they want to run on their networks. Users can search by feature, search by release, or compare two different releases. http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp
170 - 253
Cisco IOS DocGen allows users to generate customized command reference documents through a Web-based interface. For example, this tool can be used to create a document that lists all EIGRP commands. Cisco IOS DocGen currently supports Major, or Mainline, Release 12.0. It does not support Release 12.0 maintenance releases such as Release 12.0(2) and 12.0(3), 12.0T early deployment releases, or 12.0 special releases E, S, and X. http://www.cisco.com/cgi-bin/front.x/DocGen.pl
171 - 253
TAC Advanced Search can be used to access the same resources used by TAC. Users can search the entire TAC database for technical documents published by the Cisco TAC, for TAC technical support tools, for documents that are located on http://www.cisco.com/, or for entries in the Networking Professionals Connection discussion forums. http://www.cisco.com/kobayashi/support/tac/s_tac.shtml
172 - 253
173 - 253
Quizzes
Quizzes are provided within the curriculum at the end of each module and give students the opportunity to identify areas of strength and weaknesses that need to be addressed. Student performance on these quizzes should be used to guide a review of the course material before students complete an assessment that will be used to characterize them for an extended time.
Practice exams
Practice exams are designed to allow instructors and students to assess how much knowledge students have gained and which areas require further study before they take a scored exam. The practice exams can be used repeatedly if the instructor or student desires.
Pretest exams
Pretest exams are offered at the beginning of a course and are usually statistically equal to the final exam in the course. Pretest exams can be used to help measure how much of the course material students are familiar with when the course begins. If an instructor does not use the pretest at the beginning of the class, it can be used later in the class as another tool to help students practice for the final exam. As with practice exams, pretest exams are accompanied by proficiency reports.
Module exams
Module exams are usually written for each module in the online curriculum. However, two or more modules may be combined to form an exam. Module exams are used to assess student progress through the curriculum and are usually 20 to 30 items long.
174 - 253
Final exams
Final exams appear at the end of each course and are used to assess student knowledge at the end of instruction. These exams are typically longer and range from 50 to 70 items. Final exams are not intended to be taken multiple times and the students should be supervised.
Required assessments
Student grades and course graduation requirements should include multiple activities in addition to the online assessments. These activities may include participation, presentations, skills-based assessments such as router configuration, and threaded case studies. The exact course configuration and final grade will be determined by the policies of the Local Academy and instructor. Local Academies should establish course evaluation criteria, which will be provided to students at the beginning of the course.
The Cisco Networking Academy Program currently requires students to complete the following tasks: Complete the online course final exam. There is a minimum score requirement for instructor trainees, but no minimum score is required for students. Complete the online course feedback. Complete a skills-based assessment. The score must be entered into the gradebook. Include a score for the case studies in some instructor training courses. Check the attendance column in the gradebook to indicate that students or instructors have met the minimum attendance requirement for graduation. The compressed time frame in which instructor training is offered makes attendance crucial for success.
The graduation rules for each course, language, and version can be reviewed on the online support FAQ section. The online assessments that must be completed are indicated on the page to select and activate assessments, or can be viewed on the default assessment attributes page. Some assessments within most courses are not required to complete the course. This does not mean that the material covered on an optional assessment is not important or required for success in the course. The assessments are optional to provide instructors with more flexibility within their local classrooms to teach and create evaluation tasks as they see fit. Most content areas from the course are likely to be found on required assessments such as final exams.
CCNA courses instead of limited amounts of information from a specific course or module. The certification exam also requires students to apply networking skills in real situations. The certification exam includes many assessment items that are based on router simulations. These simulations are similar to a variety of the e-Labs and e-SIMs that are available to all students. The skill assessments, case studies, hands-on activities, and labs are as important as online module and final exams. Students who memorize test questions without comprehension the reasons for their answers and test takers with no experience or limited experience solving real network problems on real network equipment will be at a disadvantage when they take the certification exam. To help students prepare for the certification exam, the Academy program offers a certification practice exam. The practice exam tests objectives that are covered on the certification exam. It contains similar item types such as multiple-choice single answer and multiple-choice multiple answer. It has the same level of difficulty as the certification exam. It is recommended that students take this practice exam and obtain a satisfactory score before they take the certification exam.
176 - 253
Judgment
Criteria Evidence
The concept is known as the claims and evidence approach to assessment design. The claims and evidence approach emphasizes the use of evidence to indicate that students can meet a specific criterion, or claim, about their knowledge, skills, or attitudes with a high degree of certainty.
Claims
Claims are propositions that need to be supported with data. They are measurable performance, or action statements that are made about students. Claims are used to build assessments. They are the aspects of proficiency or competency that are measured in assessments. Claims are developed from the course objectives.
177 - 253
Evidence is gathered from assessment tasks to support the claims. The data in assessments are the things students say, do, or create in different situations, such as essays, diagrams, marks on answer sheets, oral presentations, and conversations. These situations usually provide information about what students know or can do. Claims can be made about students on the basis of observations in an assessment setting. The types of assessment claims are dependent on the purpose of the assessment. The establishment of relevant assessment data and its value as evidence depends on the construction of claims based on evidence. Claims about students can be made at many levels in a training program. In the CCNA program, certification-level claims are designed to infer what successful candidates will be able to achieve after they complete the exam. These can be thought of as top level or terminal claims and are written in broad terms. The problem with this is that they make no provision for claims that might be made along the learning path. For example, a CCNA certification claim is that a competent person will be able to evaluate the characteristics of routing protocols. However, the curriculum includes Reusable Learning Objects for static and default routing, different protocols, and dynamic routing. To ensure that assessment within the course can focus more specifically on these topics, lower level claims have been formulated. Course level assessment is designed to gather evidence to meet these claims instead of specifically meeting the certification claims. Many of the claims have a distinctly practical bias. One fallacy of Academy assessment is that online tests are the only sources of assessment evidence that instructors should use to determine student proficiency. Adequate assessment of the full range of performance criteria embedded in the claims requires a diverse mixture of assessment methods. The use of objective, computer-generated tests is too narrow a base to assess competency in almost any occupation. Cisco believes that instruction is a complex process and assessment should include multiple sources of information. Instructors are encouraged to combine evidence from online tests, hands-on tests, and any other sources they believe are valid to make a reliable inference.
These skills compare to the levels in Blooms taxonomy of educational objectives cognitive domain. The numbers relate to the hierarchy as follows: 1. Knowledge 2. Comprehension 3. Application
Copyright 2004, Cisco Systems, Inc.
178 - 253
4. Analysis 5. Synthesis 6. Evaluation The broad content areas defined for the CCNA program are as follows: TCP/IP internetworking Network devices OSI model Ethernet LAN Traffic management and security WANs
Evidence
The second component of the paradigm is evidence. Evidence refers to the performance information or achievements that can be matched against relevant criteria in the claims to establish proof of student competency. Evidence can take many forms and should be gathered from many different sources. In the evidence centered design of assessment tasks, there are four components to evidence. It is a two-way approach that gives information to students and collects information from students. The following components are presented to students: The given representation is given to the student as part of a task. This may be a short test or a multiple choice question. An essential component is necessary for students to be able to perform a task. Two components of evidence are used to determine a score: The work product is the component that the student provides. The scorable features of that work product may vary.
179 - 253
Scope of claim
What can be given to the student to quantify the claim? (Student Representation)
Student Processing What can the student give back to YOU? (Work Product) Observable features what you want to measure
EVIDENCE
The online and embedded quizzes and assessments for the Academy program are all delivered through a computer interface. All representations given to the students are either textual or graphical. The work products returned by the students are also textual or graphical. However, the work products and representations are not necessarily the same. For example, the representation given to a student may be a graphic of a network and the work product returned may be a part of a configuration file, which is textual. The previous assessment engines used in the Academy limited the items to multiple choice, single answer tasks. Rich media items are now being introduced. Increasingly sophisticated models are planned for the future. These models will include an extensive range of evidence rules that can be used to analyse student work products. This will improve the range and validity of accumulated evidence. However, additional assessment tasks will probably still need to be evaluated to make reliable inferences about specific claims.
Conclusion
The Academy is an advanced, international e-learning program that uses the Web to create a community of instructors. Assessments are developed by current instructors and integrated with the curriculum. The Academy benefits from existing technologies and influences the development of new technologies. Increasingly sophisticated tools and models are used to ensure that the Academy continues to utilize the latest concepts in assessment development.
180 - 253
Since the early 1980s, schools have explored the use of technology as an effective tool for teaching and learning in the classroom. Current research supports certain practices and strategies that help teachers maximize student learning. Instructional concepts such as student centered learning and brain compatible learning have emerged as powerful contributors to advanced student achievement. These types of techniques are referred to as best practices. The Academy teaching community consists of over 20,000 instructors. Each instructor brings unique experiences and talents to the program. This section presents options that have been successful for certain audiences and certain topics. This section does not imply that all of these techniques apply equally well to all students in all curricula. These techniques, or best practices, form the foundation for effective teaching and learning environments across the Academy curriculum. The Academy program includes CCNA, CCNP, Fundamentals of UNIX, Fundamentals of Voice and Data Cabling, Fundamentals of Java, Fundamentals of Web Design, and IT Essentials. The ideas presented in this module are taken from international sources such as kindergarten through high school, community colleges, universities, instructional design and training models, and the IT teaching community.
181 - 253
Web Links International Society for Technology in Education: http://www.iste.org/ Southeast Center for Teaching Quality: http://www.teachingquality.org/ Milken Family Foundation: http://www.mff.org/edtech/ North Central Regional Educational Laboratory: http://www.ncrel.org/ Alabama Best Practices Center: http://www.bestpracticescenter.org/index.asp Mid-Continent Research for Education and Learning: http://www.mcrel.org/
D.1.2 NETS
The International Society for Technology in Education (ISTE) is a nonprofit professional organization that prepares students, teachers, and administrators for a business world that demands proficiency in information technology. The ISTE has written National Educational Technology Standards (NETS) for students, teachers, and administrators. The NETS for Students (NETSS) are divided into six categories:
Basic operations and concepts Social, ethical, and human issues Technology productivity tools Technology communication tools Technology research tools Technology problem-solving and decision-making tools
ISTE also features NETS for Teachers (NETST). There are six categories for teacher standards that are based on current research on teaching and learning with technology. The ISTE has considered the need for planning and integration as well as the emergence of new technologies in classrooms. The six categories are as follows:
182 - 253
Planning and designing learning environments and experiences Teaching, learning, and curriculum Assessment and evaluation Productivity and professional practice Social, ethical, legal, and human issues
The ISTE has also developed the National Educational Technology Standards for Administrators (NETSA). Administrators must be prepared to lead the way to systemic reform. Based upon a U.S. consensus, a recognized set of indicators are used within school systems that utilize technology effectively. The following six categories encourage strong leadership in the area of information technology:
Leadership and vision Learning and teaching Productivity and professional practice Support, management, and operations Assessment and evaluation Social, legal, and ethical issues
Web Links
ISTE website: http://www.iste.org/
183 - 253
Web Links National Council for Teachers of English: http://www.ncte.org/standards/standards.shtml Council for Teachers of Math: http://www.nctm.org/ National Science Teachers Association: http://www.nsta.org/ American Association for the Advancement of Science: http://www.aaas.org/ The National Academy of Science: http://www.nas.edu/ National Research Council (NRC): http://www.nrc-cnrc.gc.ca/
184 - 253
The Third International Mathematics and Science Study (TIMSS) indicate how U.S. students perform academically in comparison to students in other countries. The curriculum focuses on trends in math and science achievement. The study completed in 1995 discovers that fourth grade students in the United States scored above the international average. Eighth graders in the United States scored above the international level in science but below the international level in mathematics. Twelfth graders in the United States scored at the lowest possible levels in both math and science. Two findings emerged when different types of knowledge presentation were compared internationally. First, the United States leads the world in the amount of math and science objectives that are covered within curriculum. However, U.S. students are not taught how to use the information that they are learning. Asian nations and European nations teach fewer objectives and give students more opportunities to use the knowledge in practical applications. This study also finds dissimilarities in teaching styles. In the United States, problem-solving usually occurs after the teacher has demonstrated the process to find the correct answer based upon mathematical principals. Students will then apply this problem-solving process to similar mathematical problems. In countries such as Japan, the order of methodology is reversed. Problem-solving comes first in the sequence of learning. Students are presented with a problem and try to solve the problem based on their current knowledge. They invent their own solutions and then reflect on the process to better understand the mathematical concepts. This study encourages educators to examine teaching practices and content to determine the methods that will lead to higher student achievement. The most recent implementation of this study is TIMSS 1999, which included 38 countries. The 1999 assessment measured the mathematics and science abilities of eighth grade students. Extensive data was collected from students, teachers, and school principals about the mathematics and science curricula. They also investigated instructional practices, home contexts, school characteristics, and policies. The next TIMSS assessment will occur in 2003.
185 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
Web Links Third International Math and Science Study: http://isc.bc.edu/timss1999benchmark.html TIMSS International Study Center: http://timss.bc.edu/
Figure 1 illustrates the Cisco Networking Academy learner model. The model is designed to maximize student performance. Instructors are encouraged to strengthen and enhance the online curriculum and labs. When all components of the diagram have been established, research indicates that students are successful in their learning. This model represents a "constructivist learning" approach. Constructivist learning is derived from the Latin word constructus, which means to build. The Cisco Networking Academy allows students to develop knowledge that they can use in the real world. Constructivist learning is also known as student-centered learning. This type of learning is recognized as an exemplary instructional model. This method of teaching puts the students in control of their own learning. It allows them to practice their experimentation, inquiry, problem-solving, decision-making, and communication skills. Constructivist learning can occur on an individual level, in grouped pairs of students, or in small cooperative groups of three or four students. During constructivist activities, an essential question is presented to individuals or groups of students for thoughts and discussion. Students in a group setting will search for information about issues that surface during their discussion. Students will also assign roles and identify
186 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
jobs that need to be completed for the benefit of the group. This allows students to tap into their current knowledge, and journey into new levels of comprehension through a continuous cycle of inquiry and exploration. Students who work individually will go through the same process without any team direction and input. These students will make their own decisions about the relevancy of information. They will rely on their peers and other data sources to determine which information is most useful. During this time, the teacher will assume a role that is different from the provider of skills and knowledge. The instructor will become a facilitator of learning. As students become immersed in their questions and desire to learn, teachers can ask essential questions to support thinking and exploration. As students struggle with challenges, teachers can introduce problem-solving strategies and encourage students to work through what is perceived to be a difficult situation. As students master the course content, teachers can introduce the next level of challenge.
The research of Howard Gardner provides great insight into how students learn. Students learn in different ways. There are multiple skills that go beyond the traditional verbal and mathematical abilities that are required to master new learning. According to Gardner, there are eight intelligences that people have a predetermined strength to use:
Verbal/Linguistic intelligence allows students to understand verbal and written forms of words. Students with strong verbal/linguistic intelligence easily recognize sounds, languages, and inflections of speech. Logical/Mathematical intelligence allows students to understand and interact with numbers, symbols, and patterns, especially within the disciplines of math and science.
187 - 253
Bodily/Kinesthetic intelligence gives students a strong connection to new content through the movement and manipulation of body and external objects. Activities help students create cognitive connections for easy recall and comprehension. Musical/Rhythmic intelligence centers around melody, tune, pitch, rhythm, and patterns found in types of music or cadence. For some students, music presents an environment that fluctuates from peaceful to highly energetic. Their brains respond accordingly and the recall of new information becomes tied to a specific rhythm or cadence. Visual/Spatial intelligence is based on the ability to recognize and respond to visual content through written words or artistic designs. Visual/Spatial strength helps students interpret maps and charts and form mental images of information that is communicated by another person. Intrapersonal intelligence provides a confidence in oneself that allows a student to process new information through thought and reflection. Strong intrapersonal intelligence indicates a strong personal connection to feelings and emotions, which can take a student to a higher level of consciousness in learning. Interpersonal intelligence allows a student to accurately perceive the emotions, feelings, motivations, and intentions of others. Strong interpersonal intelligence indicates a strong team-player mentality. A student with this strength will work thoughtfully within group settings. Naturalist intelligence allows students to recognize natural phenomenon such as flora and fauna, soil and land, weather, and environmental issues. These students easily make choices related to issues such as survival in the wild or the proper clothing for different weather conditions.
Gardner believes that all individuals have strength in one or more of these intelligences and they will follow a changing pattern of strength that depends on their stages of human life and circumstances. For student achievement to be maximized, the Cisco Networking Academy Program encourages instructors to identify the intelligence that best reflects the learning style of individual students.
188 - 253
When people uncover uncertain, curious, or interesting phenomena in life, questions naturally arise that encourage quests for answers. Inquiry is a natural process that begins as soon as a child starts to experiment with language. As questions are asked, the answers often lead to more questions. This begins a cycle of inquiry for learning. In education, instructors refer to this process as "inquiry-based learning" or "problem-based learning". The basic requirements of either practice are strong reading skills and good scientific observation techniques. One methodology for inquiry-based learning is called KWHLAQ. The following questions breakdown the KWHLAQ method:
What do learners think they Know about the subject? What do learners Want to find out about the subject? How are learners going to go about finding the answers? What do learners anticipate Learning? What have they learned? Can learners Apply their learning to other subjects or projects? What new Questions have surfaced throughout the time of inquiry?
Within any inquiry-based learning activity or project, the range of control must remain flexible. There will be times when the instructor takes control of the learning environment, times when the students exercise more independence, and times when the instructor and students share control of the direction for learning. The instructor is always a role model for lifelong learning. Teachers show students that even instructors address problems on a daily basis in and out of school. They also model the fact that sometimes problems are solved successfully and other times they are not. Students begin to realize that they will often require a team approach to find the solution to essential questions. In inquiry-based learning, this team consists of the students and the instructor.
189 - 253
Web Links Big Rocks and Powerful Kingdoms Personal Learning in Science and Social Studies: http://www.ascd.org/readingroom/classlead/9911/2nov99.html Using the Internet to Promote Inquiry-based Learning: http://www.biopoint.com/msla/links.html Project Based Learning: What is it?: http://www.4teachers.org/projectbased/
When there are visually impaired students in a classroom, here are some general considerations to keep in mind:
Ask visually impaired students if they need help on specific tasks, but do not assume that they do. The students will ask for help if they need it. Use contrasting light and dark colors to help students differentiate between cables and routers. Use proper lighting in all areas of the lab to help students see more effectively. Provide pocket or lighted magnifiers for reading to assist students with low vision. Provide hats or visors to reduce the glare that is associated with many vision disorders. Use bold lines and write in large print when information is taught or presented. Encourage all students, especially those that are visually impaired, in the classroom. If feelings of hopelessness or fear occur, a social worker or special teacher of the visually impaired may be called in to help these students cope with their learning environment.
When there are hearing impaired students in a classroom, here are some general considerations to keep in mind:
Make sure the labs are well lighted so the speaker can be clearly seen. Be sensitive to background noise in the lab. Turn radios, cell phones, and televisions off during work times. If background noise is unavoidable with online
Copyright 2004, Cisco Systems, Inc.
190 - 253
learning, instruct hearing impaired students to use ear phones to keep extraneous noise to a minimum.
Get close to the students when speaking. Stress the importance of only one person talking at a time during group work. Initiate conversations with students by specifically calling their names. Be patient when students are tired or frustrated with the impact of their disabilities in the lab learning environment. Speak face to face. It is important to be on equal eye level with a student when having a conversation. Reword sentences or phrases if necessary to convey messages to students who are speech-readers. Be conscious of speaking distinctly and not too fast.
When there are physically impaired students in a classroom, here are some general considerations to keep in mind:
Be prepared to give physically impaired students more time if necessary to complete hands-on labs, tasks, and exams. Consider giving these students shorter work assignments with rest periods built into the schedule. Establish open communication with the student, parent, and doctor to find the right balance of work that matches individual endurance and capability. Configure the lab space to accommodate wheel chairs and other transportation aids. Provide preferential seating in the lab to accommodate transportation devices. Offer a copy of instructor notes to the student for review on tests. Use a computer for testing. Provide special devices for students with physical disabilities such as word processors, ergonomically designed furniture, laptop computers, Kurzweil print readers, portable tape recorders for books on tape, and voice synthesis programs.
191 - 253
Instructors will probably have a few students with learning disabilities in their classes. The following list summarizes some approaches to teaching students with learning disabilities. Many of these suggestions also apply to students without learning disabilities:
Engage the students with lesson starters that illicit emotion and feelings. This introduction to learning instructs the brain to pay attention. Provide opportunities for teamwork. Many students with learning disabilities will have a higher level of motivation to succeed in response to peer interactions than when working alone. Teach students to write their own personal learning goals. Instruct them to write short and long term goals and provide feedback on their progress. Provide numerous models, examples, and representations of curriculum concepts. Speak aloud in class to benefit students with learning disabilities. Discuss the steps and thoughts that occur during the problem-solving process. Use simple memory tools to help students process information for retrieval at a later time. These tools are called mnemonics and include rhythms or unique patterns of language that are easy to remember. Mnemonics can use pictures, music, color, and movement. This strategy is related to Howard Gardner's work with multiple intelligences.
Copyright 2004, Cisco Systems, Inc.
192 - 253
Use visual advance organizers to introduce new concepts, analyze, and synthesize levels of comprehension. Organizers prepare the brain for the arrival of new content. This technique builds upon existing knowledge to facilitate the acquisition of new knowledge. Use humor, which is a powerful stimulant to the brain. The mind easily latches onto the silly and unimaginable. Use movement and action. These are important motivators that can help some students with learning disabilities process information. The hands-on labs will greatly benefit these students. Instruct students to talk about or write about what they have learned, what they found interesting, and what they still need to learn at the end of each topic. Reflection moves new knowledge into long-term memory. Offer additional time for students with learning disabilities to formulate responses to questions. This extra time can be very important. Help students with learning disabilities maintain an emotional state that is free from anger and frustration. Students can work through tasks more easily when they are calm and focused.
Web Links National Center for Learning Disabilities: http://www.ncld.org/ Strategies for Teaching Students with Learning Disabilities: http://www.as.wvu.edu/~scidis/learning.html
193 - 253
The curriculum is lab intensive. Approximately 50 percent of all class time is spent on lab exercises. The required lab equipment for CCNA 1 includes workstations, hubs, switches, a variety of cable making and cable testing tools, and cable installation materials. CCNA 1 students acquire lab skills that enable them to perform the following tasks: Configure networking properties on workstations Make and test patch cables Install and test cable runs, jacks, and patch panels
The required lab equipment for CCNA 2 includes workstations, hubs, switches, and routers. CCNA 2 students acquire lab skills that enable them to perform the following tasks: Interconnect networking devices Use the Cisco Internet Operating System (IOS) to configure and test routers Build and troubleshoot a five-router network
The required lab equipment for CCNA 3 includes workstations, hubs, switches, and routers. CCNA 3 students acquire lab skills that enable them to perform the following tasks: Switch configuration VLAN configuration Intermediate routing protocol implementation Use of access control lists to provide traffic control and security on a simple network
Copyright 2004, Cisco Systems, Inc.
194 - 253
The required lab equipment for CCNA 4 includes workstations, hubs, switches, and routers. Optional WAN simulation equipment is also recommended. Students acquire lab skills in the following WAN technology areas: PPP ISDN Frame Relay
Students also must pass a comprehensive lab-skills exam as part of this course. Standard and premium lab bundles are available. A variety of optional bundles are also available. The student-to-equipment ratio should be as low as possible.
195 - 253
The CCNP curriculum teaches students how to plan, design, install, operate, and troubleshoot enterprise-level TCP/IP, Ethernet, routed, and switched networks with substantial remote access. The CCNP curriculum consists of four courses: Advanced Routing Remote Access Multilayer Switching Network Troubleshooting
The curriculum is lab intensive. Approximately 50 percent of all class time spent on lab exercises. The required lab equipment for CCNP 1 includes workstations, routers, and switches. CCNP 1 students acquire lab skills that enable them to perform the following tasks:
196 - 253
Implement advanced IP address management techniques Configure and test the EIGRP, OSPF, and BGP routing protocols, which help make most enterprise Intranets and the Internet possible
The required lab equipment for CCNP 2 includes workstations, routers, switches, and a WAN simulator. CCNP 2 students acquire lab skills such as the following: WAN design Dial-up, point-to-point, ISDN, Frame Relay, and X.25 WAN protocol configuration and testing Basic network security
The required lab equipment in CCNP 3 includes workstations, hubs, switches, and routers. CCNP 3 students acquire lab skills such as the following: Switch and VLAN configuration Multilayer switching and redundancy technology implementation Campus LAN design
Required lab equipment for CCNP 4 includes workstations, routers, switches, and a WAN simulator. CCNP 4 students acquire lab skills and the ability to troubleshoot the following: LANs WANs Switches Routers TCP/IP Protocols Routing Protocols
Standard and premium lab bundles are available. A variety of optional bundles are also available. The student-to-equipment ratio should be as low as possible.
197 - 253
D.2.3 NETLAB
Figure 1: NETLAB
Many educators are interested in remote access to shared lab equipment to give students more access to hands-on experiences. Remote access technologies can be used in courses such as the CCNA, CCNP, and sponsored curriculum to help lower student-to-equipment ratios in distance-learning situations. These technologies are currently fully implemented only for the CCNA courses. This course will examine this issue in more depth and suggest how instructors and Academies can use these technologies or implement their own versions of them. Cisco Networking Academy now offers the NDG NETLAB solution. This web-based appliance allows Cisco Networking Academies to host live router topologies and curriculum over the Internet. The NETLAB automation and sharing capabilities allow Cisco Networking Academies to maximize the use of their equipment and save money in the process. The networking hardware is identical to the lab bundle used in Cisco Networking Academies worldwide. This will allow students to maintain a consistent topology to practice the configuration commands covered in the Academy curriculum and labs. The use of NETLAB in the Cisco Networking Academy will allow students to log in, create, and edit configuration files. Students can also program one or more of the devices. Students can work in teams to configure an entire topology or schedule individual time to practice new commands. Since the NETLAB environment equipment is similar to the equipment used by Cisco Networking Academy programs, students can practice configuration tasks just as they would with their Networking Academy equipment. Since the NETLAB equipment can be accessed from any PC with a browser that is connected to the Internet, students can perform these configuration tasks outside of the Academy. Students will usually access the equipment
198 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
in the evening or on the weekends from their homes or another location with Internet access. Some instructors may choose to implement use of the NETLAB system within the classroom. This is especially useful when students are just beginning to learn new configuration tasks. Instructors can use the instructor-led lab features of NETLAB to lead the class through a lab. During instructor-led sessions, the instructor can issue configuration commands to one or more devices while students shadow the Telnet session of the instructor. Another way instructors can use NETLAB within the classroom is the team approach. A team of students is given an assignment to configure one or more of the routers in a topology. The team can use NETLAB to share access and control over the routers while other teams try to configure other routers in the topology. Since NETLAB can save and store these configuration files, it is easy for the instructor to evaluate the performance of each team. NETLAB has also been used by instructors to review the work of students on real equipment. During each lab reservation, NETLAB records every command and router output in log files. The final equipment configurations of students can be saved for instructor review. This feature allows instructors to determine the ability of students to implement the concepts learned in the classroom. Instructors can also identify and correct common mistakes that are made by students during lab exercises. NETLAB is currently deployed as a pilot program at selected Cisco Networking Academies. Upon the successful completion of this pilot program, Cisco will offer NETLAB to all Cisco Networking Academies. For information on how to become one of the Academies that participates in the NETLAB project pilot, please e-mail [email protected]. Interested Academies will receive a survey that will help identify any changes that will need to be made for the NETLAB tool to function and information on how to order the necessary equipment. Please e-mail [email protected] with any questions or requests for additional information. This process is designed to minimize potential deployment problems and to enhance the success of a production deployment. Academies will be selected for this program based upon a review of several factors. Technical capacity will be one of the more important criteria. A survey will be provided to interested Academies to identify the requirements for a successful solution. Academies will need to have the proper infrastructure in place and must be able to demonstrate a sufficiently high level of technical expertise. To learn how to utilize NETLAB, the Cisco Networking Academy Program has created an online curriculum and comprehensive administrator, instructor and student guides. Although NETLAB seems intuitive and easy to use, administrators and instructors should spend time becoming familiar with the numerous features of NETLAB.
Web Links
NGD NETLAB: http://www.netdevgroup.com/netlab.htm
199 - 253
D.2.4 Simulations
Figure 1: Simulations
Research indicates that learning is more extensive when content is interactive and provides instant feedback. The Academy curriculum contains a variety of interactive Flash activities. One class of these activities is simulation. Examples of simulations are content items, such as, command-line interfaces (CLIs), graphical user interfaces (GUIs), and programming language development environments. Figure 1 shows a simulation activity from the UNIX curriculum. The Help feature in the simulation can be used to obtain the necessary information to complete the required task. There are generally three levels of Academy simulations: Syntax drill The simplest and most scripted activity can be thought of as a syntax drill. This exercise gives students immediate practice when a new command or procedure is introduced. These simulations help move online curriculum away from an e-reading approach to a more interactive e-learning approach. Lab drill The second level can be thought of as a lab drill. This exercise involves a step-by-step simulation of hands-on labs and configuration tasks. The hands-on lab or configuration task will include a complete flash analogue that can be done by students even if they have no access to the lab equipment. Simulation The third level is called simulation. This is the most open-ended environment. This level is not scripted. Therefore, it supports a wide variety of
Copyright 2004, Cisco Systems, Inc.
200 - 253
hardware and software behavior. For command-line interfaces such as IOS or UNIX, many commands can be issued in any order. The best example of this third level simulation environment is eSIM, which is available and free to all CCNA and CCNP students. Flash simulations are meant to complement hands-on experience with lab equipment and actual programming. These simulations have many cognitive benefits. For example, simulations allow students to perform a simulative lab activity prior to an actual lab activity. This helps students increase their level of comprehension in a simulated environment before they are required to demonstrate a final proficiency with equipment and programming. In the future, many more simulations across the curricula will be developed for the Cisco Networking Academy Program.
201 - 253
202 - 253
The six sponsored curricula also require dedicated labs and a variety of hardware and software. They are summarized in the following sections: IT Essentials: PC Hardware and Software IT Essentials PC Hardware and Software, which is sponsored by Hewlett-Packard Company, presents an in-depth exposure to computer hardware and operating systems. Students learn the functionality of hardware and software components and the suggested best practices for maintenance and safety issues. Students learn how to assemble and configure computers, install operating systems and software, and troubleshoot hardware and software problems through hands-on activities and labs. An introduction to networking is also included. This course helps students prepare for the CompTIA A+ certification exam. This is designed as a 70-hour course. However, it addresses a broad range of topics that might benefit from a longer delivery model. IT Essentials: Network Operating Systems Network Operating Systems, which is sponsored by Hewlett-Packard Company, is an extensive introduction to multiuser, multitasking network operating systems (NOSs). This course will discuss the characteristics of the Linux, Windows 2000, NT, and XP NOSs. Handson labs will utilize the Windows 2000 and Linux NOSs. Students will explore a variety of topics such as installation procedures, security issues, back up procedures, and remote access. This is a 70-hour course. Fundamentals of Voice and Data Cabling Fundamentals of Voice and Data Cabling, which is sponsored by Panduit, is designed for students interested in the physical aspects of voice and data network cabling and installation. The course focuses on cabling issues related to data and voice connections and discusses the industry and worldwide standards, types of media and cabling, physical and logical networks, and signal transmission. Students will develop skills in the following areas: How to read network design documentation Part list set up and purchase How to pull and mount cable Cable management How to choose wiring closets Patch panel installation Termination Jack installation and cable testing
This is a hands-on, lab-oriented, 70-hour course. It stresses the following competencies: Documentation Design Installation issues
203 - 253
204 - 253
Fundamentals of UNIX Fundamentals of UNIX, which is sponsored by Sun Microsystems, provides students with the following: Ability to use UNIX operating system commands Hands-on experience with basic Sun Microsystems SolarisTM operating environment commands Introduction to the Common Desktop Environment (CDE), which is the graphical interface between different environments
This class is intended for new users of UNIX. Students will learn the fundamental commandline features of the Solaris environment: File system navigation File permissions The vi text editor Command shells Basic network use
CDE features include standard desktop tools, text editor, printing, and mail. The course is designed for 70 hours. About half of this time is spent on the instructor-facilitated online multimedia material and the rest is spent on lab exercises. Fundamentals of Java Programming Fundamentals of Java Programming, which is sponsored by Sun Microsystems, provides a conceptual comprehension of Object Oriented programming. The course also teaches students how to use the JAVA language object oriented technologies to solve business problems. Topics include the language fundamentals and the Java language application programming interface (API). Students will learn how to use this language to create classes, objects, and applications. This course also addresses the demand for training and preparation to be a Sun Certified Programmer for JavaTM 2 Platform. This is designed as a 70-hour course. However, it addresses some very advanced topics that might benefit from a longer delivery model or some pre-selection and screening of students. Fundamentals of Web Design Fundamentals of Web Design, which is sponsored by Adobe Systems, will focus on the overall production processes related to website design. The emphasis of the course will be on design elements that involve layout, navigation, and interactivity. Cisco Networking Academy students will learn Web design in preparation for higher education or jobs in the Internet economy. Hands-on Web design exercises will use Adobe Photoshop, Adobe Illustrator, Adobe GoLiveTM, Adobe LiveMotionTM, and Adobe Premiere. This course has been designed as a 70-hour course. However, since it uses five Adobe applications, it may be beneficial to use a longer delivery model or some pre-selection and screening of students. About half of the course time is spent on the instructor-facilitated online multimedia material and the rest is spent on lab exercises.
205 - 253
206 - 253
Figure 2: IP Phone
207 - 253
In the future, new technologies such as network security, IP telephony, and wireless LANs may be the basis for Academy courses. Each of these courses will have an associated lab bundle, which will allow for the successful implementation of the labs. The goal of these course will be to train professionals who can implement network security , IP telephony , wireless LANs , and other networking technologies.
Web Links Network security issues: http://cisco.com/warp/public/779/largeent/issues/security/ IP Telephony: http://www.cisco.com/warp/public/779/largeent/learn/technologies/IPtelephony.html Wireless solutions: http://www.cisco.com/warp/public/779/smbiz/netsolutions/find/wireless.shtml
208 - 253
D.2.7 Troubleshooting
Troubleshooting is a form of educational inquiry that is necessary in most Academy courses, even if it is not formally taught. There are literally over a hundred approaches to troubleshooting. Figure shows one approach. This is the preferred method for Cisco courses. Instructors may use their own preferred method. Troubleshooting and debugging skills are necessary for students who seek further education and employment in the IT industry. Instructors will typically need to spend more time on lab preparation to teach students about troubleshooting. However, the overall benefit to the student is worth this investment. Troubleshooting is used to identify and correct hardware, software, and programming problems. One instructional troubleshooting method involves deliberately introducing a finite number of problems, in a structured lab environment, that have been experienced previously by the students. With practice, students will be able to diagnose and fix the problems in a finite amount of time. This method must be integrated with labs that do the following: Expose students to a working system Demonstrate the typical failure modes of that system Allow students to experience first hand the symptoms of those failure modes
209 - 253
Web Links Teaching Methods Web Resources: http://www.mhhe.com/socscience/education/methods/resources.html The Universal Troubleshooting Process (UTP): http://www.troubleshooters.com/tuni.htm Journal of Technology Education: http://scholar.lib.vt.edu/ejournals/JTE/v2n2/html/deluca.html
210 - 253
NetDay challenges are problem-based labs or projects that are advocated by AAAS Project 2061, which is a science education reform project. Unlike step-by-step labs, these exercises encourage students to develop their own solutions to various problems or challenges. The challenges vary in content and duration ranges from 50 minutes to 3 weeks. These challenges consist of two basic parts. First, the lab asks students to solve a problem. Second, it asks the students to create a product. For example, a simple 50-minute challenge lab for the first semester might be titled "Make a Patch Cable that Works Successfully". A three-week challenge that teaches more complex tasks might be called "Wire the School Computer Lab". NetDay is a great example of challenge-based learning, and Cisco encourages instructors to incorporate it into their classes. Teaching and learning environments extend beyond the lab setting. Opportunities for realworld applications emerge when students can use their networking skills in projects that contribute to community initiatives. Sometimes these activities are called service learning. The Cisco Networking Academy Program originated as a community project. In the mid-1990s, educational institutions around the world experienced a demand for computer networks that exceeded the skilled personnel available to install and maintain those networks. Cisco engineer George Ward worked to address these issues. He articulated the need for a course sequence that would train high school students to support their school networks. This need for versatile apprentices became the Cisco Certified Network Associate (CCNA) curriculum.
211 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
A NetDay occurs when a community volunteers time to wire a school. It is a popular type of community project that involves students, parents, network administrators, and others who work together to get students connected to the Internet. Academy students participate in numerous NetDays. Another example of a community project was developed by the Cisco Academy of South West Ohio (CASWO). This Academy and its students provided technical support for the annual Ohio SchoolNet Technology Conference. Academy students helped set up the network for the conference and provided technical assistance to conference managers and presenters. One quote from a student demonstrates the value of this learning experience, "This really helped me see the big picture of how everything works together and what tech support is like". Another example of community outreach takes place in Washington, D.C. where Cisco Systems partners with Mary's Center for Maternal and Child Care. With help from a volunteer system engineer and three students from the Cisco Networking Academy Program at Bell Multicultural High School, Mary's Center now has a fully operational wireless network that can support their computer needs. Now the center can access important health and insurance information needed to assist families and their children. Academy students receive many benefits from working on real-world projects. These benefits are described in a quote from Max Anis, a Networking Academy instructor at Bell High School, "These students return to the classroom with an incredible amount of energy after these experiences. As a result, they are even more determined to complete the program and continue their pursuit of a career in the industry".
212 - 253
Design is an iterative process that starts with brainstorming. From there, it proceeds through research and problem-solving matrices and design specification tests. Multiple repetitions of this process are required until an adequate solution to a problem is achieved. Any Academy curriculum with projects or design activities allows instructors to introduce elements of the Dartmouth Problem-Solving and Design Method. The website associated with this section has online resources and written materials that can be downloaded and a video that can be ordered. There are other methods that are also effective. Cisco encourages instructors to use the method that works best for them and their students. Whether students will troubleshoot problems in an existing network or design and check a network to meet specifications, the process involves an iterative problem-solving procedure. For Internet problems and issues related to general engineering, problem-solving matrices are useful when there many alternatives for a given number of constraints. Chapter 1, The Engineering Problem-Solving Cycle of the Engineering Problem Solving for Mathematics, Science, and Technology Education, uses the problem solving matrix to introduce the problem solving cycle and its iterative nature. The matrix teaches students how to define a problem. Chapter 4, Guiding Students Through the Problem-Solving Cycle, explains how the entire process can be iterated. This includes suggestions on how to choose effective problems, how to set up the right environment for brainstorming sessions, and how to analyze the results of these sessions. The goal is for students to gain an appreciation for the importance of problem solving, which is one of the most important aspects of engineering. Cisco also wants students to experience the use of these procedures to gain a better comprehension of why some potential solutions work and others do not. They will learn that the ability to employ good problem-solving procedures and documentation will ultimately determine their success with problem solving. Eventually,
213 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
students will be able to use the lessons learned from failed problem-solving attempts to save time when they try to solve new problems. Chapter 5, Research, Documentation, and Testing, is a good resource for students to learn how to conduct site surveys, keep work logs, produce engineering reports, and create portfolios.
214 - 253
D.3.3 Brainstorming
Brainstorming techniques can be useful for teaching IT curriculum. These techniques can be applied to areas such as introductions to new topics and integral parts of design work, Figure 1 shows some responses to the question, "What does the word 'network' mean?" There are four simple rules for this brainstorming activity: The wildest possible ideas are accepted. There will be no censorship of ideas. The instructor wants a high quantity of responses. Responses can build on the ideas of other people.
Another method for brainstorming is called carousel brainstorming. This is a strategy used for creative thinking when multiple solutions are possible to solve an issue or problem. During a carousel session, problems are documented on large sheets of chart paper around a room. Students in small cooperative groups are given different colored pens and asked to go around the room and brainstorm solutions to the problems listed on the different chart papers. This is done in 30-second rotation sessions. The process continues until students have an opportunity to respond to all problems or issues listed on papers around the room. SCAMPER is another example of a brainstorming activity that encourages students to think creatively. Scamper is an acronym for substitute, combine, adapt, modify, put to other uses, eliminate, and reverse. It was first implemented in the 1940s by Alex Osborne and it was revised in the early 1980s by Bob Eberle. SCAMPER involves a series of questions related to
215 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
a new process or concept. After students encounter new information, they respond to the following questions: Substitute What material, methods, processes, or situations can be used in place of this? Combine What materials, methods, processes, or situations can be combined or added to influence this issue or problem? Adapt Can the materials, methods, processes, or situations be used in another way to find a solution? Modify Can this be made bigger, stronger, and more frequent? Can it be made smaller and more compact? Put to other uses Can this be used instead of other materials, methods, processes, or situations? Eliminate Can parts of this be eliminated? Reverse Can the work be done backwards? Can this process be reversed?
Web Links Gifted Education - A Resource Guide for Teachers: http://www.bced.gov.bc.ca/specialed/gifted/process.htm Scamper: http://www.discover.tased.edu.au/english/scamper.htm
216 - 253
Case study teaching methods have become more important in many professions such as law, medicine, and business. Case studies that are specified in the course or instructor-developed can be used to integrate many concepts throughout the Academy curricula. Figure 1 shows a case study from the CCNP curriculum. The International Travel Agency is a fictitious business for which a CCNP certified individual might be asked to provide network services.
217 - 253
Web Links Use of Master Classroom Technology to Implement a Case Study Approach to Learning: http://www.mtsu.edu/~itconf/papers96/MASTER.HTM Case Study Teaching in Science: A Bibliography: http://ublib.buffalo.edu/libraries/projects/cases/article2.htm
218 - 253
Figure 1: Cisco.com
The Internet has a tremendous amount of resources for people who want to understand or install networks. Students can also research products, answer questions, or perform extension activities. Academy students are encouraged to use the links built into the Instructors Guide or their favorite websites. The online documentation for Cisco Systems, Sun Microsystems, HP, Panduit, and other sponsors is particularly important. In terms of bandwidth capabilities, the Web resources related to networking far exceed any textbook or online curriculum. Students must find the resources and be cautious consumers. The ability to use the Internet as a resource is a very useful skill for students to develop. Web Links Cisco: http://www.cisco.com/ Sun: http://www.sun.com/index.xml Adobe: http://www.adobe.com/ Panduit: http://www.panduit.com/ Hewlett Packard: http://www.hp.com/ Google: http://www.google.com/ Yahoo: http://www.yahoo.com/
219 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
The instructor-led style of instruction is currently the most commonly used approach. Academy instructors must communicate information to students based on required competencies and performance objectives. Instructor-led environments allow instructors to cover specified subject matter with a large group or small group of students at the same time. This style of instruction can take place in an extended time frame, which might require an entire class period, or in a shorter time frame as a mini-lecture. Mini-lectures focus on smaller chunks of content that students may need to hear at some point in the learning process. An effective classroom strategy for this style of instruction is to present all lectures at a predetermined class time, and as a precursor to individual and group work. The current focus on the cooperative dynamics of learning has taken attention away from the importance of knowledgebased processes and procedures. Within the instructor-led environment, teachers can review strategies that will help students become better listeners. This will prepare them to be more effective communicators in the academic and working world.
220 - 253
A mini-lecture is a 10-minute lecture format that might consist of the following elements: A hook A pretest or focus question to test for comprehension The actual lecture A short question or activity
Copyright 2004, Cisco Systems, Inc.
Studies have found that relatively short, engaging lectures that include demonstrations are excellent adjuncts to the online curriculum and lab activities.
221 - 253
222 - 253
There are a variety of ways to engage students through cooperative learning. Instructors can divide the class into student groups to conduct reviews, ask questions, learn content, and work on performance labs or other activities. It is important to know how and when to use groups for the most effective instruction. The following examples illustrate some of the types of groups and the purposes for which they might be used. Pairs or partners There are different methods that instructors can use to partner students: Each student can choose another student with whom they want to work. The instructor can assign partners. Students can work with other students based on the classroom seating arrangement.
Students can work in teams of two or they can form a larger group. Students can also partner with three students in classes with an odd number of students. A pair may partner with another pair so that the absence of one student will not disrupt their work. Small groups Small groups usually have three to five students. Small groups can be formed in the following ways: The students can choose their own partners. The instructors can assign members to a group. The students can work with other students based on the classroom seating arrangement.
223 - 253
The student roles within the group may be formal and assigned, or informal and unassigned. A formal or assigned role may be a leader, a speaker, a note taker, a summarizer, or a timekeeper. In informal groups, roles may be unassigned but naturally assumed by members of the group. Some group activities will not require the group members to assume any specific roles. Teams A team usually has a specified purpose and consists of three to ten members. The team members may be assigned as follows: Appointed Selected by other members of the team Grouped informally based on classroom seating arrangements Selected alphabetically Selected through some other random method
Team members may or may not have assigned roles. This depends on the performance task. If there are specific roles, they may be based on skill, interest, or necessity. The end product or result of the team effort may contribute to the grades of all or individual team members. Competitive teams The selection of team members for competitive team activities is similar to the previous description. Each competitive team has a specific purpose. They compete with other teams to determine which team can accomplish the criteria and objectives of a performance task with the most speed and accuracy. The members of each team receive rubrics and criteria for the task. Large groups A large group of students can be configured in a variety of ways: Smaller teams Groups Partners Individuals Whole class
The parameters and criteria for large group discussion and participation should be established prior to the task or activity. This is done so that all of the team members understand their roles and responsibilities within the group. Whole class This type of group is designed to involve all of the students. The parameters for participation and topic focus are clarified in advance so that all participants understand their roles and responsibilities within the class. This student configuration facilitates the following activities:
224 - 253
Teacher-led discussions
Copyright 2004, Cisco Systems, Inc.
Web Links Teaching Strategies: Group Work and Cooperative Learning: http://www.crlt.umich.edu/tstrategies/tsgwcl.html Enhancing Student Thinking through Collaborative Learning. ERIC Digest: http://www.ericfacility.net/ericdigests/ed422586.html
225 - 253
D.4.4 Jigsaws
The teaching and learning strategy known as the expert jigsaw was configured by Elliot Aronson in the late 1970s. This strategy asks students to explore new information within the dynamics of a group setting. Cooperative group skills are a prerequisite for this type of learning. Students are divided into three groups, which are called home groups. Each group is assigned a number or a name. The content to be learned is broken into three sections. The content is distributed so each home group receives one of the three sections of content. The use of color codes is a useful technique to implement within this activity. Three different colors are used to distinguish between the three content sections to be learned. Members from each group move to an expert group where the main points of the content are discussed. Members of the expert group process this new information and return to their home groups to teach other members the main points of what they learned from the activity. Research states that this is one technique that stimulates significant learning within the brain since it requires critical analysis and articulation before the acquired knowledge can be taught to others.
226 - 253
In classrooms and labs across the United States, students are typically given questions that test their low-level and high-level cognitive abilities. Instructors who ask low-level questions expect students to respond with basic recall of facts and comprehension based on information they heard in a lecture or read from the curriculum. An example of a low-level question is to ask students to name the levels of the food pyramid or list the elements on the periodic table. This is the most common type of question that students are asked in schools. High-level questions are more open-ended and interpretive. Students are required to analyze and synthesize information. With high-level questions, students are asked to communicate their knowledge through logic, reasoning, and evidence. An example of a high-level question is to ask students to predict the next world epidemic or explain why rockets cannot launch into outer space in extremely cold weather. The average wait time for teachers after they ask a question in a classroom is approximately 1.5 seconds. Research indicates that with just a 3-second waiting period, student answers are more accurate and organized. Instructors should ask students questions about the concepts that they will continue to understand long after the little details fade away from their short-term memories. These concepts will require teachers and students to reflect on the intrinsic value of the questions that they ask and the truths that these questions may uncover. The late Dr. Mary Budd Rowe was an accomplished science educator at the University of Florida and Stanford University. Dr. Rowe studied classroom dynamics. One of Dr. Rowes greatest contributions was to study the time between when an instructor finishes asking the class a question and when the instructor breaks the silence and prompts the class further to respond to the question. Figure 1 shows a timeline. At time Q, the instructor finishes asking a question. At time P, the instructor breaks the silence, either with encouragement or the correct answer. Dr. Rowe called the time between Q and P the wait time. This concept can lead to significant improvements in student learning. The instructors who participated in the study had an average wait time of about 1 second after they asked a question and before they took further action to elicit a response. Dr. Rowe discovered that if the wait time was extended from about 1
227 - 253
second to beyond 3 seconds, the following significant improvements in classroom dynamics occurred: Longer responses by students More participation by more students with more confidence Increase in student-to-student interactions More questions asked Improvements on complex assessments Better classroom management
Instructors who use question and answer techniques to teach networking should increase the wait time to see if student learning improves. Instructors can read an article written by Dr. Rowe to learn more about this concept. Rowe, M., (1974). Relation of wait-time and rewards to the development language, logic and fate control: a. part one: wait time. Journal of Research in Science Teaching, 11(2), 8l-94. b. part two: rewards. 11(4), 29l-308. Many resources about different forms of wait time are also available on the Web.
228 - 253
D.4.6 PMI
Figure 1: PMI
Many of the best instructional strategies help students think about their thought processes, or engage in metacognition. Other strategies encourage students to use knowledge in new and innovative ways. There are many strategies that are currently implemented in classrooms. This section will discuss three methods that are linked to easily-understood instruction, which encourages higher student achievement. The first method is called Plus, Minus, Interesting (PMI). This practice is metacognitive and asks students to evaluate their thoughts about new information. After students have read, heard, or interacted with new information, they create a T-chart. The left side of the chart includes an area for items that might qualify as plus, minus, or interesting. Students respond to the following questions in relation to specific content: What do they consider to be a Plus? What do they consider to be a Minus? What do they consider to be an interesting process, comment or question?
Students record their thoughts on the right side of the chart as they apply the categories to the new content. Students can work individually on PMI charts and then share their responses with a partner or a larger group. Ideas and perspectives are shared until they reach common conclusions. PMI is especially useful during lecture sessions since it provides students with an opportunity and a method to digest new content.
Web Links PMI: http://www.mindtools.com/pmi.html Activating and Engaging Habits of Mind: http://www.ascd.org/cms/objectlib/ascdframeset/index.cfm?publication=http://www.ascd.org/pu blications/books/2000costa1/2000costatoc.html
229 - 253
230 - 253
Figure 3: Flowchart
231 - 253
232 - 253
233 - 253
234 - 253
Advanced organizers can be used to tap into the prior knowledge of students. There are many forms of advanced organizers such as exposition, narratives, and graphics. Graphic organizers are shown in Figures through . These methods were publicized by a psychologist named David Ausubel in the late 1960s. These techniques help students make connections between their current knowledge and the information needed to reach a more complete comprehension of a learning objective. Graphic organizers also enable students to arrange large chunks of new information into smaller chunks. These smaller pieces are easier to learn and understand.
235 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
Cluster diagrams help students generate and organize thoughts. When students brainstorm, a question or concept is put in the center of a cluster and all of their ideas are added to the cluster. Similar ideas are grouped together. Cluster diagrams are also used as concept maps or to present course material to students. They can also be used to assess how well students understand a concept. Problem-solving matrices are a standard part of design documentation. In their simplest form, a variety of design options such as network media, network architecture, or protocols are listed vertically and the specifications against which choices will be rated are listed horizontally. In theory, the option that earns the highest score against the specification rubric is chosen. However, design is a repetitious process and many layers of matrices are typically created with increasingly refined specifications, weighted rubrics, and significant brainstorming and research. Flowcharts are a standard part of computer programming. Flowcharts and process flow diagrams are generally used to graphically represent various branches of a process. Flowcharts are used throughout the curriculum to describe configuration, troubleshooting, and communications processes. Block diagrams are standard in the electronics industry. A few simple symbols or pictorials and arrows are used to indicate the flow of information. Block diagrams include simple descriptions of the functions of the various blocks. Block diagrams represent an intermediate level of detail for electrical systems. They are not circuit-level schematic diagrams. A block diagram of the following components is a good accompaniment to flowcharts that explain the processes that occur among the blocks: The internal components of a PC The internal components of a router The devices make up the LAN or a WAN
In networking there are logical topological diagrams and physical topological diagrams. Logical topologies refer to logical interconnections and the flow of information in a network. Physical topologies refer to the devices, ports, interconnections, and physical layout of a network. Both of these diagrams are used extensively. Electrical engineers refer to voltage versus time graphs of signals as the time domain. These graphs show the output from an oscilloscope, which is a device that measures voltage. These graphs summarize many important networking concepts, particularly in the first semester curriculum: Bits Bytes Analog signals Digital signals Noise, attenuation Reflection
236 - 253
237 - 253
238 - 253
239 - 253
A kinesthetic activity refers to the movement of the body to act out or communicate something. The kinesthetic activities in this section demonstrate the networking process. These exercises are also known as role-playing activities or skits. They help students understand complex and normally invisible processes. Kinesthetic activities can be a helpful way to introduce basic IT concepts. Most IT courses require knowledge of binary arithmetic. Figures and show an activity that can be done with eight students. Each student represents a specific place value of 128, 64, 32, 16, 8, 4, 2, or 1 for 8-bit binary numbers. The instructor picks a number between decimal 0 and 255 and each student must decide if they should sit to represent binary 0 or stand to represent binary 1. Many IT processes and algorithms can be expressed through kinesthetic activities. Role-playing occurs when students act out or dramatize a scenario, story, event, or real life situation. Role-playing activities can be used to help students understand events, discoveries, or interpersonal relationships. Students can create a script for role-playing or ad-lib the actions and dialogue.
240 - 253
241 - 253
Progress
Throughout the year, students should review their reflections and acknowledge the growth in their comprehension. Prior to a reporting period, students should write a brief paper that explains their growth in knowledge and the skills they acquired in the preceding weeks. Some examples of reflection and journal writing for Academy courses are as follows: Key ideas from class presentations Discussions Activities related to lesson content Personal analysis that shows a connection with the content purpose Questions or statements that indicate a need for further clarification or inquiry Attention to the process required to accomplish an important task Application of learned material to other content or subjects A demonstration of the connection between concept or content Thoughtfulness as demonstrated by goals for improvement Other actions that demonstrate self-learning Acquired knowledge Important concepts Skills Improvements Effective strategies Ineffective strategies Group activities Instructor performance Progress Shortcomings Goals for further learning Applications of knowledge
243 - 253
244 - 253
D.5.3 Rubrics
Another good instructional practice is the use of rubrics as a form of assessment. A rubric allows criteria to be established for outcomes that are acquired through individual or group projects. Levels of success and quality are identified at different levels of a predetermined scale. Quantitative data can be associated with each level of performance. Rubrics assess observable learning behavior, all curriculum content associated with a project, and other components such as design, research skills, organization of thought, cooperative skills, and the ability to communicate emerging knowledge. The rubric has two primary functions for teaching and learning. Rubrics communicate expectations and give students a level of achievement to work toward. One of the most important benefits of rubric assessment is the control it gives to students. Students can create their own rubrics based on established standards and performance objectives. Assessment occurs continuously through selfmonitoring and self-evaluation. Students who are given direction and the freedom to choose their path of learning, are empowered to accomplish high levels of achievement. For Academy courses, rubrics create specific expectation criteria for the final performance of a lab or activity. In the demonstration of each task, there is a specific set of performance levels for all objectives, content, and skills. Each rubric contains a criterion that defines the elements that indicate learning proficiency. Many rubrics are based on a four-point scale, where four points represent the best level. Each point on the scale has specific criteria that describe the performance characteristics. Before an assessment of student interactions, classroom work, or any performance lab or activity, students should be aware of the expectations. This will help them begin the process of self-assessment as they progress through the individual tasks that are reflected in the rubric. Rubrics that are developed by both students and teachers can help students organize and prepare for learning through advance knowledge of their assessment
245 - 253 CCNA 2: Routers and Routing Basics v3.1 Instructor Guide Appendix D Copyright 2004, Cisco Systems, Inc.
expectations. It also allows students to contribute to the development of the grading scale for their performance labs or activities.
246 - 253
D.5.4 Portfolio
A portfolio is an example of authentic assessment. As students complete major presentations or networking projects, they save them in a portfolio. A portfolio of accomplishments must be presented before many companies will hire an individual. Portfolios show growth over time and include student reflections on different periods of learning. Academy students might keep a portfolio of their experience in building a network and examples of configurations they created for different scenarios. Community projects are also good examples of accomplishments. A portfolio is a paper, electronic, or online collection that shows the best work of a student. As with any educational initiative, portfolios are continually revised and improved. Many secondary school districts encourage portfolio-based assessments. The Cisco Networking Academy Program is well suited for this type of assessment. Students maintain their portfolios to include all of their best work throughout all semesters of a curriculum. This portfolio can contribute to graduation criteria. It can also serve as an impressive display for potential employers.
247 - 253
248 - 253
Well-planned oral examinations can be powerful learning experiences for students. Careful preparation can minimize the intimidation that is felt by some students. The models for oral exams are usually based on job interviews and graduate school oral exams. A method that works particularly well for groups of diverse students, is to give teams of students the exam questions, answers, and rubrics prior to the exam session. Establish scheduled exam times, which can be after school if necessary. Students study and complete assessment activities in groups. Then, each individual member of a team enters the room alone and is asked one of the questions by the board. The students do not know which question they will be asked in advance. This method of oral testing usually motivates the students to study hard and with a lot of enthusiasm. Examples of oral exams are found in Semester 2 Lesson Plans. Instructors are encouraged to develop their own techniques for oral examinations and should use them to test for benchmark comprehension.
249 - 253
Lab exams are also known as skills exams. These exams give students an opportunity to demonstrate their knowledge of cable and router configuration. Students use cables and routers to assemble a network in a lab. Their performance task is to connect cables and routers so every router can successfully communicate with the other routers. The number of routers to connect will vary based on equipment access. This process is one that distinguishes the Cisco Networking Academy Program from all other programs. When students graduate from the Academy, they have been tested on their hands-on expertise with equipment. This practice supports authentic assessment and gives students higher credibility in the job market. Lab exams include all of the following: Practical exams Performance exams Demonstration labs Skills-based and performance assessments Authentic assessment Mastery learning Formative and summative exams
Cisco recommends a simple pass or fail grade, with opportunities to retake the skills exam if necessary.
250 - 253
251 - 253
In any learning endeavor, certain lenses are indispensable to ensure a high quality experience for students. There are six different perspectives that are supported in the Academy courses: Equity Curriculum Teaching Learning Assessment Technology
It is important to ask questions about these factors in all Academy curriculums. The following example uses UNIX: Equity Do all Academy students have adequate access to information about UNIX? Curriculum Do the online curriculum and skills-based labs provide ample opportunities for students to learn about UNIX? Teaching Do all Academy students have access to instructors who use instructional best practices to teach UNIX? Learning Do students have adequate resources to construct their own iterative comprehension of UNIX? Assessment Do all students have access to online and skills-based formative and summative assessments? Technology What technologies enable the effective teaching of UNIX?
252 - 253
As instructors work through this orientation they are encouraged to revisit these essential questions. In this section, Cisco presented some useful content, tools, and perspectives. Ultimately, instructors should decide what teaching methods are best for their students.
253 - 253