Cornell Notes Sheet: 200-301 CCNA
Cornell Notes Sheet: 200-301 CCNA
Cornell Notes Sheet: 200-301 CCNA
CORNELL
NOTES
SHEET
QUESTION NOTES
S
1.0
Network Fundamentals
1.1 Explain role/function of network components
o 1.1.a Routers
Routers use the longest stick match (the more specific route to the subnet)
if more than one route exists to the same subnet
o 1.1.b L2 and L3 switches
o 1.1.c Next-generation firewalls and IPS
o 1.1.d Access points
o 1.1.e Controllers (Cisco DNA Center and WLC)
o 1.1.f Endpoints
o 1.1.g Servers
1.2 Describe characteristics of network topology architectures
o 1.2.a 2 tier (Collapsed Core)
Core/distribution layers combined as a single layer; collapsed core
devices are characterized by high speed connectivity and routing,
filtering, NAT distribution functions
Each access switch connects to distribution switch(es) w/ one or
more ports/uplinks (partial mesh)
o 1.2.b 3 tier (Hierarchy)
Core: Move large amounts of data as fast as possible, majority of users
Distribution: Routing. filtering, WAN access, NAT, firewalls,
redistribution
Access: End device connectivity
o 1.2.c Spine-leaf
Provides high bandwidth, low-latency, nonblocking server-to-server
connectivity
2 tier
Leaf layer: Every access switch connects to each of the switches
in spine layer to create full mesh topology
o Leaf switches provide devices access to the fabric
(spine/leaf switch network), deployed at top of the track
o Devices (Servers, Firewalls/Load Balancers, WAN
routers) connect to leaf switches
o Leaf switches can connect to every spine switch
o Access layer
Spine layer: Made up of switches that perform routing
o Spine switches connect to all leaf switches, deployed
middle/end of row
o Aggregation layer
East-west network traffic; evenly distributed load among top-tier
switches as path is randomly chosen
3 tier
Leaf layer, Spine layer, and Core layer that consists of routers
added to leaf and spine later
Data flows can take shortcuts but take same number of hops
regardless of source/destination (fully mesh)
o 1.2.d WAN
o 1.2.e Small office/home office (SOHO)
o 1.2.f On-premises and cloud
1.3 Compare physical interface and cabling types
o 1.3.a Single-mode fiber, multimode fiber, copper
Single Mode
Single light ray; great distance
Distances up to 2000 (full-duplex)
MultiMode
Multiple light rays, relatively short distance (modal dispertion)
Distances up to 412 meters
Copper
Up to 100 meters
Cat 5 100 Mbps
o Pins 1,3,2,6. The really stupid thing is that anything with
bandwidth less than Cat 5e aren’t capable of auto-MDIX. I
was fooled all along into thinking our cables nowadays
aren’t bidirectional!
Cat 5e: 1000 Mbps
Cat 6: 10 Gbps (>55 Meters)
o 24 gauge connectors
Cat 6a: 10 Gbps
Cat 7: 10 Gbps
o 1.3.b Connections (Ethernet shared media and point-to-point)
o 1.3.c Concepts of PoE
IEEE 802.3af/802.3at standards describe any systems which pass
electrical power along with data on twisted pair Ethernet cabling as PoE
Power is usually supplied by PoE-enabled switch
PoE injectors add PoE capability to regular non-PoE network links
1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
o Collisions occur when 2 devices transmit at the same time
o In a connection with two different duplex configurations, the half-duplex end will
experience late collisions
1.5 Compare TCP to UDP
o TCP
1.6 Configure and verify IPv4 addressing and subnetting
o Configure route summarization
Identify summarized route for subnet group
Convert last significant octet of the first & last subnet in range to
binary
o ex. 172.16.31.0 /24 -> 00011111
o ex. 172.16.16.0 /24 -> 00010000
o
Identify last consecutive bit shared
Convert all values right of shared bit to 1 to produce a mask value
of the summarized route
o 11110000 -> 255.255.240.0
Identify subnet addresses included in the range indicated by the
advertised subnet and mask
o 172.16.17.0
o 172/16.30.0
o Unable to use 172.16.16.0, 172.16.31.0
(config-router)#no auto-summary turn off automatic route-
summarization
Default: Summarize subnets based on classful boundaries when
advertising routes on networks w/ a different class boundary
(config-if)#)ip summary-address [routing protocol] a.b.c.d m.m.m.m
configured summary address on specified outbound interface
If neighboring devices receive query packet for network that
matches summary route, it sends a network a.b.c.d/m unreachable
message in response and won’t extend query packets further
Add summary route to routing table w/ the route’s next-hop
interface set to null0
1.7 Describe the need for private IPv4 addressing
1.8 Configure and verify IPv6 addressing and prefix
o ipv6 address [ipv6-prefix/prefix-length] eui-64 configure global IPv6 address
with interface ID
Specify only the 64-bit network prefix
Last 64 bits are automatically computed from the interface ID
Automatically configures link-local address on interface
o show ipv6 interface [type] [number] Verifies that IPv6 addresses are
configured correctly for the specified interface
Interface is up if hardware usable, Line protocol is up if interface
provides two-way communication
o show ipv6 interface brief
1.9 Compare IPv6 address types
o 1.9.a Global unicast
o 1.9.b Unique local
o 1.9.c Link local
o 1.9.d Anycast
o 1.9.e Multicast
o 1.9.f Modified EUI 64
1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
o ipconfig (Win), ifconfig (Mac/Linux) displays IP configuration info:
IP address and mask
Default gateway
DNS and WINS server addresses
IP address of the DHCP server used for configuration
MAC address
o netstat resolves IP address of hostname and displays name-resolution related
info by looking for it in the following order
Local DNS cache
HOSTS file
DNS server query
1.11 Describe wireless principles
o 1.11.a Nonoverlapping Wi-Fi channels
o 1.11.b SSID
o 1.11.c RF
o 1.11.d Encryption
1.12 Explain virtualization fundamentals (virtual machines)
1.13 Describe switching concepts
o 1.13.a MAC learning and aging
MAC aging specifies time before CAM table entry ages out and is
discarded (default 300 seconds; 0 to 1 mil)
Configure in Interface configuration mode/VLAN configuration mode
If VLAN not specified, aging applies to all VLANs
MAC learning is the process by which new entries are added to the
switches’ CAM table when a frame is received. Once an association is
made, the switch forwards subsequent frames to a single port without
flooding all the others
Built using the MAC source address of frames received
Enabled on all VLANS by default
o 1.13.b Frame switching
LAN switches are characterized by the forwarding methods that they
support
Store-and-forward switches entire frame in internal memory and
check frame for errors before forwarding to destination; bad
frames are discarded
o Ingress (incoming) interface buffers frames as FCS
checksum field is checked, giving the switch ample time to
adjust speed between ingress and egress port
Cut-through switches forward frames as soon as they know the
destination MAC address and outgoing egress interface port; only
the destination MAC address (6 bytes) is copied into memory
o Reduces latency but bandwidth issues can buildup as a
result
o No support for ports w/ varying ingress/egress speeds
Fragment-free switches are like cut-through switches except the
first 64 bytes of the frame are stored before forwarding
o Runts are typically less than 64 bits; this at least verifies
frame is minimally-sized
o Compromise between above 2 methods
o 1.13.c Frame flooding
Switch sends copy of frame to all nodes on all ports when the destination
MAC address of the frame is a broadcast address
Switches never send traffic out same interface it was received on
If source MAC address is
o Not in CAM table: Add new entry mapping port # to MAC
address(Learning)
o Is already mapped to the port on which the frame was
received: No changes made to CAM table
o Is already in CAM table but frame was received on
different switch port: Update entry, refresh timer
If destination MAC address is a:
o Broadcast address: Switch floods the frame to all ports
(flooding)
o Unknown Unicast: Switch floods frame to all ports [that
are members of the same VLAN], only recipient accepts
the frame, all other devices drop frame
o Unicast address (In CAM table): Switch forwards frame to
switch port in CAM table (forwarding)
o Unicast address (In CAM table but destination device is
connected to same port on which frame was received):
Switch ignores frame and does not forward it (filtering)
o 1.13.d MAC address table
Forwarding database built by switch which contains mappings of MAC
addresses to their respective port
MAC addresses are only used for local delivery on same IP
network; at each point the
Columns: VLAN, MAC address, Type (Dynamic/Static), Ports
o Static entries persist through reboot; dynamic entries do
not
When frame arrives on switch port (interface), the switch examines the
source and destination MAC address and makes note of the port the frame
arrived on
2.0
Network Access
2.1 Configure and verify VLANs (normal range) spanning multiple switches
o 2.1.a Access ports (data and voice)
o 2.1.b Default VLAN
o 2.1.c Connectivity
2.2 Configure and verify Interswitch connectivity
o 2.2.a Trunk ports
o 2.2.b 802.1Q
o 2.2.c Native VLAN
2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and
LLDP)
o CDP Cisco Discovery Protocol
Broadcasts periodic advertisements (unencrypted, unauthorized)
containing device information: Hostname, IOS version, interfaces of
directly connected neighbors (no hopping across devices!)
Network troubleshooting, design, changes, documentation
Disable on edge routers and user-facing interfaces; keep device-facing
interfaces
show cdp neighbors show CDP neighbors
Interface vs Remote Port
detail show ip addresses of connected devices
show cdp show global CDP info
do show cdp
run privleged exec prompt
no cdp run disable cdp by force timeout holdtime
no cdp enable within interface
cdp run enable cdp
cdp enable within interface
o LLDP Link Layer Discovery Protocol
Disabled by default and must be configured on a per-interface basis and
enabled globally before being used; similar syntax as CDP
lldp run to enable
lldp transmit enable interface to send info
lldp recieve enable interface to receive info
show lldp Displays LLDP information, including frequency of
transmissions, hold time for packets to be sent, and the delay time for
LLDP initialization on an interface.
show lldp interface Displays information about interfaces that have
LLDP enabled, including transmit and receive configuration, as well as
the current state
show lldp neighbors
show lldp entry
2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol
and identify basic operations
o 2.5.a Root port, root bridge (primary/secondary), and other port names
o 2.5.b Port states (forwarding/blocking)
o 2.5.c PortFast benefits
2.6 Compare Cisco Wireless Architectures and AP modes
o Hub-and-spoke
Wireless controller connects to all APs via wired links, connecting
wireless to internal wired network and pushing out configuration changes
for APs
o Distributed Wireless Mesh
2.7 Describe physical infrastructure connections of WLAN components (AP, WLC,
access/trunk ports, and LAG)
o AP
Often configured as a bridge connecting a wireless segment to a wired
segment on same subnet
Layer 2 device
o WLC (wireless controller) connects and manages multiple APs through wired
links
Push down configuration changes
Provides DHCP services typically
Routes traffic from the wireless network to internal wired network and
vice versa
Hub-and-spoke infrastructure
All wireless data must pass through controller
APs communicate only with WLC and not each other
Bottleneck & single-point-of-failure if no redundancy
2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,
HTTPS, console, and TACACS+/RADIUS)
o SSH client requirements
k9 (crypto) IOS image
hostname hostname configure hostname if not previously done
ip domain-name configure DNS domain name of router
crypto key generate rsa generate an SSH key to be used with SSH
line vty 0 # ; transport input ssh Disable Telnet (enabled by default),
enable SSH only
2.9 Configure the components of a wireless LAN access for client connectivity using
GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN
settings
3.0
IP Connectivity
Separate 3.1 Interpret the components of routing table
routing tables o 3.1.a Routing protocol code
are used for Indicates the route source
each protocol L: Address of local router interface
(IP, C: Directly connected network
AppleTalk) S: Static route
P: Dynamic network learned with OSPF
R: Dynamic network learned with RIP
o 3.1.b Prefix
Network address for destination route
o 3.1.c Network mask
Subnet address for destination route
o 3.1.d Next hop
IP address of next router the packet will be forwarded to
o 3.1.e Administrative distance
Value that measures trustworthiness of route sources (routing protocols)
given multiple sources of info about remote networks. Lower number =
preferred route
o 3.1.f Metric
Used to determine the path to take with multiple ways to get to a remote
network; identifies how far a destination is (distance/time). Lower metric
= Higher preference
o 3.1.g Gateway of last resort
Also known as the default route, avoids the packet being dropped if no
match is found
3.2 Determine how a router makes default forwarding decisions
o 3.2.a Longest match
The best match in the routing table; the route with the most left
matching bits (the longest match)
o 3.2.b Administrative distance
If a static route is available, select it.
Choose route with lowest administrative distance if router learns of
multiple routes through different routing protocols
Choose route with the best cost as defined by the routing metric if router
learns of multiple routes through the same protocol
Route Sources and Default Administrative Distances
Direct Connected:0
Static:1
EIGRP Summary Route:5
External BGP: 20
Internal EIGRP: 90
IGRP: 100
OSPF: 110
IS-IS: 115
RIP: 120
External EIGRP: 170
Internal BGP: 200
o 3.2.c Routing protocol metric
3.3 Configure/verify IPv4/IPv6 static routing
o 3.3.a Default route
Works best when only one path exists to a part of network
Router(config)#ip route 0.0.0.0 0.0.0.0 {ip-address | exit-intf}
Configure default route to internet; assuming the ISP’s address is
160.12.99.1
o ip route 0.0.0.0 0.0.0.0 160.12.99.1
Router(config)#ipv6 route ::/0 {ipv6-address | exit-intf}
Router#show ip route static or show ipv6 route static Show static
routes in routing table
o 3.3.b Network route
Used when connecting to a remote network
Router(config)#ip route network-address subnet-mask { ip-address |
exit-intf [ip-address]} [distance]
Distance defaults to 1 if not specified
Configure static route on the router to 10.0.0.0/8; assuming we use
the next hop address of 172.17.12.98
o ip route 10.0.0.0 255.0.0.0 172.17.12.98
A route to network 10.0.0.0 is added to routing
table; the next hop router address (outgoing
interface/default gateway IP address) is
172.17.12.98 (where packets that are addressed for
the network are forwarded)
o 3.3.c Host route
o 3.3.d Floating static
Backup routes
Router(config)#ip route network-address subnet-mask { ip-address |
exit-intf [ip-address]} [distance]
Increase administrative distance of floating route (>1) to ensure
it’s higher than the default static route and used only as backup
Routes don’t show in show ip route
3.4 Configure and verify single area OSPFv2
o 3.4.a Neighbor adjacencies
o 3.4.b Point-to-point
o 3.4.c-d Broadcast (DR/BDR selection), Router ID
DR: Single designated router who coordinates routing table updates for
all routers on the subnet
BDR (Backup designated router): Single designated router who becomes
DR if unavailable
Values used to elect DR/BDR, in this order:
First the Router with highest OSPF priority (0-255, default 1) set
on the interface becomes the DR
o ip ospf priority # give priority setting
o Priority 0 means router never becomes DR or BDR
o DR remains DR even if another router with higher
priority/router ID comes online; Reset OSPF to force new
election
o DR that comes back online doesn’t resume DR role unless
reset is performed
For routers with the same priority value, the highest Router ID
becomes DR; the router ID is determined in this order:
o Highest Router ID configured for the OSPF process
o Highest loopback address (recommended)
Never goes down like an interface address could
interface loopback #
o Highest active IP address for any of it’s interfaces that’s up
BDR is router with next highest priority/router ID
o 3.5 Describe the purpose of first hop redundancy protocol
HSRP uses a virtual IP address and virtual MAC address configured on a
group of routers that
4.0
IP Services
4.1 Configure and verify inside source NAT using static and pools
4.2 Configure and verify NTP operating in a client and server mode
4.3 Explain the role of DHCP and DNS within the network
o Router/Switch looks at Static DNS entries then DNS server query (if enabled)
o Workstation looks at local DNS cache, hosts files, DNS server query (primary),
DNS server query (secondary)
4.4 Explain the function of SNMP in network operations
4.5 Describe the use of syslog features including facilities and levels
4.6 Configure and verify DHCP client and relay
o DHCP runs on interfaces based on the IP address assigned to the interface; if it’s
assigned an IP address that matches a DHCP pool, DHCP listens for requests on
that interface. If the interface doesn’t have an IP address, it wont run DHCP
Lease request: DHCPDiscover sent by client
Cisco routers use DHCPDiscover packet to obtain IP subnet on
which DHCP client resides
Lease offer: DHCPOffer is sent by all DHCP servers with available IP
addresses
Lease selection: Client selects IP address from first offer and broadcasts
DHCPREQUEST
Lease acknowledgement: DHCP server that made offer responds with a
DHCPACK to client
o Enable DHCP requests across subnets by enabling BOOTP (DHCP broadcast)
requests through router and configure a server for BOOTP forwarding to request
IP info on behalf of other clients
o ip address dhcp enable the device to receive configuration information
use in interface mode for physical interface on router; use in vlan1
interface mode for switch
automatically replace any manually configured address for interface
o service dhcp enable DHCP service on router
o no ip dhcp conflict logging force DHCP server to not log IP address conflicts
o ip dhcp pool VLAN ID Set DHCP pools on specified VLAN
domain-name domain
network address mask Sets network address and subnet mask for DHCP
address pool
default-router x.x.x.x Set default gateway
dns-server x.x.x.x x.x.x.x Set DNS server; you don’t have to have
multiple, can set up to 8
lease d h m Set lease time
infinite
d days
h hours
m minutes
host address mask or client-identifier mac address Binds specific IP
address and mask to host, creating a separate pool from that of the subnet.
Give the pool a unique name.
Only one manual binding per host pool
Bindings for DHCP clients use the latter command;
01aa.bbcc.ddee.ff, where 01 represents media type
o 1:Ethernet
o 5:IEEE 802 Networks
o 17:HDLC
o 20:Serial Line
o ip dhcp excluded-address x.x.x.x – x.x.x.x Set DHCP Exclusions; doesn’t have
to be a range
Global configuration command; not part of pool
o ip helper-address x.x.x.x Enable DHCP relay agent feature
x.x.x.x is IP address of DHCP server
o no ip forward-protocol udp port Control which broadcast packets & protocols
are forwarded by a DHCP relay agent
37: Time
49: TACACS
53: DNS
67: BOOTP/DHCP Server
68: BOOTP/DHCP Client
69: TFTP
137: NetBIOS Name Service
138: NetBIOS Datagram Service
o Privleged EXEC
show ip dhcp binding Display info about each IP address lease
show ip dhcp pool name Display info about DHCP address pools: pool
name, IP address range of requested subnets, total number of addresses
(leased, allocated, excluded, reserved)
show ip dhcp server statistics
show ip dhcp conflict also shows method used to identify conflicts
ping: detected by server
gratuitous ARP: detected by client
clear ip dhcp conflict
show ip dhcp database Display DHCP server database agent info:
remote file used to store automatic DHCP bindings, last date/time
bindings were read/written from server, whether last read/write of host
bindings was successful
show hosts Display default domain name, style of name lookup service,
name server hosts, and cached list of hostnames/addresses
4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification,
marking, queuing, congestion, policing, shaping
o Weighted Random Early Detection (WRED) is a congestion avoidance
mechanism that drops packets selectively based on IP precedence
4.8 Configure network devices for remote access using SSH
o
4.9 Describe the capabilities and function of TFTP/FTP in the network
5.0
Security Fundamentals
5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation
techniques)
o
5.2 Describe security program elements (user awareness, training, and physical access
control)
o User awareness is a security program that makes users aware of the need for data
confidentiality and threats to data
o
5.3 Configure device access control using local passwords
o
5.4 Describe security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
o
5.5 Describe remote access and site-to-site VPNs
5.6 Configure and verify access control lists
5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and
port security)
5.8 Differentiate authentication, authorization, and accounting concepts
5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
5.10 Configure WLAN using WPA2 PSK using the GUI
o Requires AES-256 encryption (64 hexadecimal characters) for WPA2 passphrase
6.0
Automation/Programmability
6.1 Explain how automation impacts network management
6.2 Compare traditional networks with controller-based networking
6.3 Describe controller-based and software defined architectures (overlay, underlay, and
fabric)
o 6.3.a Separation of control plane and data plane
o 6.3.b North-bound and south-bound APIs
Southbound APIs
OpenFlow: Defines the way the SDN controller interacts with the
forwarding plane to make adjustments to the network
NETCONF: uses XML to manage network device configuration
onePK: Cisco-proprietary DBI that allows for management of
network device configuration without hardware updates
OpFlex: Open-standard distributed control system; uses summary
policies
6.4 Compare traditional campus device management with Cisco DNA Center enabled
device management
o Cisco DNA Center platform capabilities
SDKs allow management to be extended to third-party network devices
Intent-based APIs leverage controller
Process adapters built on integration APIs allow integration with network
systems to streamline IT operations
Domain adapters built on integration APIs allow integration with
infrastructure domains (data center, WAN, security) to deliver intent-
based infrastructure across entire enviornment
6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data
encoding)
6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef,
and Ansible
6.7 Interpret JSON encoded data
Layer 2 issues
<int> is up, line protocol is down
Mismatch in encapsulation type or other data link connection parameters
Layer 1 issues
<int is down, line protocol is down>
Layer 3 issues
<int is up, line protocol is up> but ping fails
Layer 7 issues
All other indicators work but inability to establish telnet/ssh session (by itself, the two
application protocols wouldn’t identify the layer the problem exists at)
When you troubleshoot, you generally go up the OSI model, from layer 1 to layer 7
Traffic bounces between interface address A and interface address B -> loop exists between the
2 routers
SUMMARY: Write 4 or more sentences describing specific learning from these notes.
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________