About the Author

Scott Empson is the associate chair of the Bachelor of Applied Information Systems Technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he teaches Cisco routing, switching, and network design courses in a variety of different programs (certificate, diploma, and applied degree) at the post-secondary level. Scott is also the program coordinator of the Cisco Networking Academy Program at NAIT, a Regional Academy covering Central and Northern...

Applying Extended ACLs to an Interface

Router(config) interface fastethernet 0 0 Router(config-if) ip access-group 110 out TIP Access lists can be applied in either an inbound direction (keyword in) or in an outbound direction (keyword out). TIP Only one access list can be applied per interface, per direction. TIP Apply an extended ACL as close as possible to the source network or device.

Assigning IPv6 Addresses to Interfaces

Enables the forwarding of IPV6 unicast datagrams globally on the router. Router(config) interface fastethernet 0 0 Moves to interface configuration mode. Automatically configures an IPv6 link-local address on the interface and enables IPv6 processing on the interface. NOTE The link-local address that the ipv6 enable command configures can be used only to communicate with nodes on the same link. Router(config-if) ipv6 address 3000 1 64 Configures a global IPv6 address on the interface and...

Cables and Connections

This chapter provides information and commands concerning the following topics Connecting a rollover cable to your router or switch Determining what your terminal settings should be Understanding the setup of different LAN connections Identifying different serial cable types Determining which cable to use to connect your router or switch to another device

Class AE Addresses

All 0s in host portion Network or subnetwork address All 1s in host portion Broadcast address Combination of 1s and 0s in host portion Valid host address All 0s in host portion Network or subnetwork address All 1s in host portion Broadcast address Combination of 1s and 0s in host portion Valid host address

Configuration Example DHCP

Figure 24-1 illustrates the network topology for the configuration that follows, which shows how to configure DHCP services on a Cisco IOS router using the commands covered in this chapter. Figure 24-4 Network Topology for DHCP Configuration Figure 24-4 Network Topology for DHCP Configuration Edmonton(config) interface fastethernet 0 0 Moves to interface configuration mode Edmonton(config-if) description LAN Interface Sets the local description of the interface Edmonton(config-if) ip address...

Configuration Example PPP

Figure 26-1 illustrates the network topology for the configuration that follows, which shows how to configure PPP using the commands covered in this chapter. Figure 26-1 Network Topology for PPP Configuration Figure 26-1 Network Topology for PPP Configuration NOTE The host name, password, and interfaces have all been configured as per the configuration example in Chapter 6, Configuring a Single Cisco Router. Boston(config) username Buffalo password academy Sets the local username and password...

Configuration Example STP

Figure 14-1 illustrates the network topology for the configuration that follows, which shows how to configure STP using commands covered in this chapter. Figure 14-4 Network Topology for STP Configuration Example Figure 14-4 Network Topology for STP Configuration Example Turns off Dynamic Name System (DNS) queries so that spelling mistakes do not slow you down. Changes the switch to VTP server mode. This is the default mode. Configures the VTP domain name to stpdemo. Creates VLAN 10 and enters...

Configuration Example VLANs

Figure 12-1 illustrates the network topology for the configuration that follows, which shows how to configure VLANs using the commands covered in this chapter. Figure 12-2 Network Topology for VLAN Configuration Example Creates VLAN 10 and enters VLAN configuration mode. Increases the revision number by 1 and returns to global configuration mode. Creates VLAN 20 and enters VLAN configuration mode. Creates VLAN 30 and enters VLAN configuration mode. Note that you do not have to exit back to...

Configuring a Secondary Root Switch

Switch(config) spanning-tree vlan 5 root secondary Switch recalculates timers along with priority to allow the switch to become the root switch for VLAN 5 should the primary root switch fail. NOTE If all other switches have extended system ID support, this switch resets its priority to 28672. Therefore, if the root switch fails, and all other switches are set to the default priority of 32768, this becomes the new root switch. For switches without extended system ID support, the switch priority...

Configuring DHCP

Router(config) ip dhcp pool internal Creates a DHCP pool called internal. Router(dhcp-config) network 172.16.10.0 255.255.255.0 Defines the range of addresses to be leased. Router(dhcp-config) default-router 172.16.10.1 Defines the address of the default router for the client. Router(dhcp-config) dns-server 172.16.10.10 Defines the address of the Domain Name System (DNS) server for the client 172.16.10.10 Defines the address of the NetBIOS server for the client. Router(dhcp-config) domain-name...

Configuring Frame Relay

Setting the Frame Relay Encapsulation Type Router(config) interface serial 0 0 0 Router(config-if) encapsulation frame-relay Turns on Frame Relay encapsulation with the default encapsulation type of cisco. Router(config-if) encapsulation frame-relay ietf Turns on Frame Relay encapsulation with the encapsulation type of ietf (RFC 1490). Use the ietf encapsulation method if connecting to a non-Cisco router. Setting the Frame Relay Encapsulation LMI Type Router(config-if) frame- relay lmi-type...

Configuring Static NAT One Private to One Permanent Public Address Translation

Step 1 Define a static route on the remote router stating where the public addresses should be routed. ISP(config) ip route 64.64.64.64 255.255.255.128 s0 0 Informs the ISP where to send packets with addresses destined for 64.64.64.64 255.255.255.128. Step 2 Create a static mapping on your router that will perform NAT. Corp(config) ip nat inside source static 172.16.10.5 64.64.64.65 Permanently translates the inside address of 172.16.10.5 to a public address of 64.64.64.65. Use the command for...

Converting Between Decimal Numbers and Binary

In any given octet of an IP address, the 8 bits can be defined as follows To convert a decimal number into binary, you must turn on the bits (make them a 1) that would add up to that number, as follows 187 10111011 128+32+16+8+2+1 224 11100000 128+64+32 To convert a binary number into decimal, you must add the bits that have been turned on (the 1s), as follows 10101010 128+32+8+2 170 11110000 128+64+32+16 240 The IP address 138.101.114.250 is represented in binary as The subnet mask of...

Creating Named ACLs

Router(config) ip access-list extended serveraccess Creates an extended named ACL called serveraccess and moves to named ACL configuration mode. Router(config-ext-nacl) permit tcp any host 131.108.101.99 eq smtp Permits mail packets from any source to reach host 131.108.101.99. Router(config-ext-nacl) permit udp any host 131.108.101.99 eq domain Permits Domain Name System (DNS) packets from any source to reach host 131.108.101.99. Router(config-ext-nacl) deny ip any any log Denies all other...

Enabling Rapid Spanning Tree

Switch(config) spanning-tree mode rapid-pvst Switch(config) interface fastethernet 0 1 Moves to interface configuration mode. Switch(config-if) spannisng-tree link-type point-to-point Sets the interface to be a point-to-point interface. NOTE By setting the link type to point to point, this means that if you connect this port to a remote port, and this port becomes a designated port, the switch negotiates with the remote port and transitions the local port to a forwarding state. Switch(config)...

Hj wirelessN

This Setup Wizard will help you install the Wireless-N Broadband Router. Norton Internet Security User Guide Exit 200S Cisco Systems. Inc. All Rights Reserved Figure 15-3 shows the wizard asking you to unplug the power from your modem. When you have finished, click Next. Figure 15-8 Unplugging Power to the Modem Figure 15-8 Unplugging Power to the Modem Figure 15-4 shows the wizard asking you to unplug the modem from your computer. When you have finished, click...

Including Comments About Entries in ACLs

Router(config) access-list 10 remark only Jones has access The remark command allows you to include a comment (limited to 100 characters). Router(config) access-list 10 permit 172.16.100.119 Read this line to say, Host 172.16.100.119 will be permitted through the internetwork. Router(config) ip access-list extended telnetaccess Creates a named ACL called telnetaccess and moves to named ACL configuration mode. Router(config-ext-nacl) remark do not let Smith have telnet The remark command allows...

Interface

This chapter provides information and commands concerning the following topics Shortcuts for entering commands Using the fTabj) key to enter complete commands Using the question mark for help enable command exit command disable command logout command Setup mode Keyboard help History commands show commands To enhance efficiency, Cisco IOS Software has some shortcuts for entering commands. Although these are great to use in the real world, when it comes time to write a vendor exam, make sure you...

IP Subnet Zero

When you work with classical subnetting, you always have to eliminate the subnets that contain either all zeros or all ones in the subnet portion. Hence, you always used the formula 2N - 2 to define the number of valid subnets created. However, Cisco devices can use those subnets, as long as the command ip subnet-zero is in the configuration. This command is on by default in Cisco IOS Software Release 12.0 and later if it was turned off for some reason, however, you can re-enable it by using...

Organization of This Book

This book follows what I think is a logical approach to configuring a small to mid-size network. It is an approach that I give to my students when they invariably ask for some sort of outline to plan and then configure a network. Specifically, this approach is as follows Chapter 1, How to Subnet An overview of how to subnet, examples of subnetting (both a Class B and a Class C address), the use of the binary AND operation, the Enhanced Bob Maneuver to Subnetting Chapter 2, VLSM An overview of...

Restricting Virtual Terminal Access

Router(config) access-list 2 permit host 172.16.10.2 Permits host 172.16.10.2 to Telnet into this router based on where this ACL is applied. Router(config) access-list 2 permit 172.16.20.0 0.0.0.255 Permits anyone from the 172.16.20.x address range to Telnet into this router based on where this ACL is applied. The implicit deny statement restricts anyone else from being permitted to Telnet. Moves to vty line configuration mode. Router(config-line)access-class 2 in Applies this ACL to all 5 vty...

Route Summarization

Route summarization, or supernetting, is needed to reduce the number of routes that a router advertises to its neighbor. Remember that for every route you advertise, the size of your update grows. It has been said that if there were no route summarization, the Internet backbone would have collapsed from the sheer size of its own routing tables back in 1997 Routing updates, whether done with a distance vector or link-state protocol, grow with the number of routes you need to advertise. In simple...

Route Summarization and Route Flapping

Another positive aspect of route summarization has to do with route flapping. Route flapping is when a network, for whatever reason (such as interface hardware failure or misconfiguration), goes up and down on a router, causing that router to constantly advertise changes about that network. Route summarization can help insulate upstream neighbors from these problems. Consider router Edmonton from Figure 3-1. Suppose that network 172.16.74.0 24 goes down. Without route summarization, Edmonton...

Routing

Chapter 7 Static Routing Chapter 8 RIP Chapter 9 EIGRP Chapter 10 Single Area OSPF This chapter provides information and commands concerning the following topics Configuring a static route on a router The permanent keyword (optional) Static routes and administrative distance (optional) Configuring a default route on a router Configuration example Static routes Configuring a Static Route on a Router When using the ip route command, you can identify where packets should be routed in two ways Both...

Security Device Manager

This chapter provides information and commands concerning the following topics Security Device Manager Connecting with CLI Security Device Manager Connecting with GUI SDM Express Wizard with no CLI preconfiguration Resetting the router to factory defaults using SDM Configuring interfaces using SDM Configuring routing using SDM Using SDM to configure a router to act as a DHCP server Using SDM to configure an interface as a DHCP client Using SDM to configure NAT PAT What to do if you lose SDM...

Setting Duplex Operation

fastethernet 0 1 Moves to interface configuration mode 2960Switch(config) interface fastethernet 0 1 Displays current MAC address forwarding table Deletes all entries from current MAC address forwarding table switch clear mac address-table dynamic Deletes only dynamic entries from table 2960Switch(config) mac address-table static aaaa.aaaa.aaaa vlan 1 interface fastethernet 0 1 Sets a permanent address to port fastethernet 0 1 in VLAN 1 2960Switch(config) no mac address-table static aaaa....

Setting Passwords

Setting passwords for the 2960 series switches is the same method as used for a router. 2960Switch(config) enable password cisco 2960Switch(config) enable secret class Sets the encrypted secret password to class 2960Switch(config-line) password cisco 2960Switch(config-line) password cisco 2960Switch(config-line) line vty 0 4 Enters line vty mode for all five virtual ports 2960Switch(config-line) password cisco Setting IP Addresses and Default Gateways Enters the virtual interface for VLAN 1,...

Setting the Encapsulation Type

Depending on the series of switch that you are using, you might have a choice as to what type of VLAN encapsulation you want to use the Cisco proprietary Inter-Switch Link (ISL) or the IEEE Standard 802.1q (dotlq). The 2960 switch supports only dotlq trunking. 3560Switch(config) interface fastethernet 0 1 Moves to interface configuration mode 3560Switch(config-if) switchport mode trunk Puts the interface into permanent trunking mode and negotiates to convert the link into a trunk link...

So Why AND

The best answer is to save you time when working with IP addressing and subnetting. If you are given an IP address and its subnet, you can quickly find out what subnetwork the address belongs to. From here, you can determine what other addresses belong to the same subnet. Remember that if two addresses are in the same network or subnetwork, they are considered to be local to each other and can therefore communicate directly with each other. Addresses that are not in the same...

Step 3 Summarize Edmontons Routes

For Edmonton, you do the same thing that we did for Winnipeg and Calgary look for common bit patterns in the routes 172.16.72.0 172.16.73.0 172.16.74.0 10101100.00010000 01001010.00000000 172.16.75.0 10101100.00010000 01001011.00000000 172.16.76.0 172.16.77.0 172.16.78.0 172.16.79.0 Common For Edmonton, the first 21 bits are common. The summarized route is therefore Figure 3-2 shows what the network looks like, with Winnipeg, Calgary, and Edmonton sending their summarized routes to Vancouver....

Step 4 Summarize Vancouvers Routes

Yes, you can summarize Vancouver's routes to Seattle. You continue in the same format as before. Take the routes that Winnipeg, Calgary, and Edmonton sent to Vancouver, and look for common bit patterns 172.16.64.0 172.16.68.0 172.16.72.0 Common Because there are 20 bits that are common, you can create one summary route for Vancouver to send to Seattle Vancouver has now told Seattle that in one line of a routing update, 16 different networks are being advertised. This is much more efficient than...

Sticky MAC Addresses

Sticky MAC addresses are a feature of port security. Sticky MAC addresses limit switch port access to a specific MAC address that can be dynamically learned, as opposed to a network administrator manually associating a MAC address with a specific switch port. These addresses are stored in the running configuration file. If this file is saved, the sticky MAC addresses do not have to be relearned when the switch is rebooted, and thus provide a high level of switch port security. Switch(config)...

Troubleshooting Spanning Tree

Displays all spanning-tree debugging events Displays spanning-tree debugging topology events Switch debug spanning-tree backbonefast Displays spanning-tree debugging BackboneFast events Switch debug spanning-tree uplinkfast Displays spanning-tree debugging UplinkFast event Switch debug spanning-tree switch state Displays spanning-tree port state changes

Using Global Configuration Mode

Changes the switch to VTP client mode. Changes the switch to VTP server mode. Changes the switch to VTP transparent mode. NOTE By default, all Catalyst switches are in server mode. Returns the switch to the default VTP server mode. Switch(config) vtp domain domain-name Configures the VTP domain name. The name can be from 1 to 32 characters long. NOTE All switches operating in VTP server or client mode must have the same domain name to ensure communication. Switch(config) vtp password password...

Using Sequence Numbers in Named ACLs

Router(config) ip access-list extended serveraccess2 Creates an extended named ACL called serveraccess2. Router(config-ext-nacl) 10 permit tcp any host 131.108.101.99 eq smtp Uses a sequence number 10 for this line. Router(config-ext-nacl) 20 permit udp any host 131.108.101.99 eq domain Sequence number 20 will be applied after line 10. Router(config-ext-nacl) 30 deny ip any any log Sequence number 30 will be applied after line 20. Returns to global configuration mode. Router(config) interface...

Using VLAN Configuration Mode

Creates VLAN 3 and enters VLAN configuration mode for further definitions. Switch(config-vlan) name Engineering Assigns a name to the VLAN. The length of the name can be from 1 to 32 characters. Applies changes, increases the revision number by 1, and returns to global configuration mode. NOTE This method is the only way to configure extended-range VLANs (VLAN IDs from 100 to 4094). NOTE Regardless of the method used to create VLANs, the VTP revision number is increased by 1 each time a VLAN is...

Using VLAN Database Mode

CAUTION The VLAN database mode has been deprecated and will be removed in some future Cisco IOS Software release. It is recommended to use only VLAN configuration mode. Creates VLAN 4 and names it Sales. The length of the name can be from 1 to 32 characters. Creates VLAN 10 and gives it a name of VLAN0010 as a default. Applies changes to the VLAN database and increases the revision number by 1. Applies changes to the VLAN database, increases the revision number by 1, and exits VLAN database...

Verifying and Troubleshooting IPv6

CAUTION Using the debug command may severely affect router performance and might even cause the router to reboot. Always exercise caution when using the debug command. Do not leave debug on. Use it long enough to gather needed information, and then disable debugging with the undebug all command. TIP Send your debug output to a syslog server to ensure you have a copy of it in case your router is overloaded and needs to reboot. Deletes routes from the IPv6 RIP routing table and, if installed,...

VLSM Example

You follow the same steps in performing VLSM as you did when performing classical subnetting. Consider Figure 2-1 as you work through an example. Figure 2-1 Sample Network Needing a VLSM Address Plan A Class C network 192.168.100.0 24 is assigned. You need to create an IP plan for this network using VLSM. Once again, you cannot use the N bits 192.168.100. You can use only the H bits. Therefore, ignore the N bits, because they cannot change The steps to create an IP plan using VLSM for the...

Warning and Disclaimer

This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an as is basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages...

Who Should Read This Book

This book is for those people preparing for the CCNA exam, whether through self-study, on-the-job training and practice, or even through study within the Cisco Networking Academy Program. There are also some handy hints and tips along the way to hopefully make life a bit easier for you in this endeavor. It is small enough that you will find it easy to carry around with you. Big, heavy textbooks might look impressive on your bookshelf in your office, but can you really carry them all around with...

Wireless Access Point Configuration Linksys 300N Access Point

NOTE The wireless access point (AP) used in this chapter is the Linksys Wireless-N Broadband Router. If you are using a different AP, the screen captures shown here may differ. It is important to use the most up-to-date firmware or drivers. This is especially true for the 300N AP because the 802.11n technology is still in draft stage. Therefore, check the AP manufacturer website for available updates. In the case of Linksys, its website for updates is http www.linksys.com download. Figure 15-1...

Troubleshooting

This chapter provides information and commands concerning the following topics Determining the gateway of last resort Determining the last routing update Interpreting the show interface command Clearing interface counters The show controllers command Operating system IP verification commands Displays a table about a specific protocol (for example, RIP or IGRP) Displays information about route w.x.y.z Displays a table of connected routes Determining the Gateway of Last Resort Router(config) ip...

Configuration Example InterVLAN Communication

Figure 13-1 illustrates the network topology for the configuration that follows, which shows how to configure inter-VLAN communication using commands covered in this chapter. Some commands used in this configuration are from previous chapters. Figure 13-3 Network Topology for Inter-VLAN Communication Configuration Figure 13-3 Network Topology for Inter-VLAN Communication Configuration Moves to interface configuration mode ISP(config-if) description simulated address representing remote website...

Cisco Discovery Protocol CDP

This chapter provides information and commands concerning the following topic Cisco Discovery Protocol (CDP) Displays global CDP information (such as timers) Displays information about neighbors Displays more detail about the neighbor device Displays information about the device named word Displays information about all devices Displays information about interfaces that have CDP running Displays information about specific interface x running CDP Displays traffic information packets in out...

Configuring the Root Switch

Switch(config) spanning-tree vlan 5 root Modifies the switch priority from the default 32768 to a lower value to allow the switch to become the root switch for VLAN 5. NOTE If all other switches have extended system ID support, this switch resets its priority to 24576. If any other switch has a priority set to below 24576 already, this switch sets its own priority to 4096 less than the lowest switch priority. If by doing this the switch would have a priority of less than 1, this command fails....

Subnetting a Class B Network Using Binary

You have a Class B address of 172.16.0.0 16. You need nine subnets. What is the IP plan of network numbers, broadcast numbers, and valid host numbers What is the subnet mask needed for this plan You cannot use N bits, only H bits. Therefore, ignore 172.16. These numbers cannot change. Step 1 Determine how many H bits you need to borrow to create nine valid subnets. 2n- 2 > 9 N 4, so you need to borrow 4 H bits and turn them into N bits. HHHHHHHHHHHHHHHH (Remove the decimal point for now) Step...

A a

Example 1 Write an ACL that prevents the 10.0 network from accessing the 40.0 network but allows everyone else to. RedDeer(config) access-list 10 deny 172.16.10.0 0.0.0.255 The standard ACL denies complete network for complete TCP IP suite of protocols. RedDeer(config) access-list 10 permit any RedDeer(config) interface fastethernet 0 0 Moves to interface configuration mode. RedDeer(config) ip access-group 10 out Applies ACL in an outbound direction. Example 2 Write an ACL that states that 10.5...

Subnetting a Class C Network Using Binary

You have a Class C address of 192.168.100.0 24. You need nine subnets. What is the IP plan of network numbers, broadcast numbers, and valid host numbers What is the subnet mask needed for this plan You cannot use N bits, only H bits. Therefore, ignore 192.168.100. These numbers cannot change. Step 1 Determine how many H bits you need to borrow to create nine valid subnets. 2n- 2 > 9 N 4, so you need to borrow 4 H bits and turn them into N bits. N 4, so you need to borrow 4 H bits and turn...

Configuring PAT Many Private to One Public Address Translation

All private addresses use a single public IP address and numerous port numbers for translation. Step 2 Define a pool of usable public IP addresses on your router that will perform NAT (optional). Use this step if you have many private addresses to translate. A single public IP address can handle thousands of private addresses. Without using a pool of addresses, you can translate all private addresses into the IP address of the exit interface (the serial link to the ISP, for example)....

Password Recovery Procedures and the Configuration Register

This chapter provides information and commands concerning the following topics Console terminal baud rate settings Changing the console line speed CLI Changing the console line speed ROM Monitor mode Password-recovery procedures for Cisco routers Password-recovery procedures for 2960 series switches The last line of output tells you what the configuration register is set to. router(config) config- register 0x2142 Changes the configuration register to 2142. The configuration register is a 16-bit...

The Enhanced Bob Maneuver for Subnetting or How to Subnet Anything in Under a Minute

Legend has it that once upon a time a networking instructor named Bob taught a class of students a method of subnetting any address using a special chart. This was known as the Bob Maneuver. These students, being the smart type that networking students usually are, added a row to the top of the chart, and the Enhanced Bob Maneuver was born. The chart and instructions on how to use it follow. With practice, you should be able to subnet any address and come up with an IP plan in under a minute....

Backing Up and Restoring Cisco IOS Software and Configurations

This chapter provides information and commands concerning the following topics Backing up configurations to a TFTP server Restoring configurations from a TFTP server Backing up the Cisco IOS Software to a TFTP server Restoring upgrading the Cisco IOS Software from a TFTP server Restoring the Cisco IOS Software from ROM Monitor mode using Xmodem Restoring the Cisco IOS Software using the ROM Monitor environmental variables and tftpdnld command Router(config) boot system flash imagename Loads the...

Security Device Manager Connecting with CLI

NOTE Cisco recommends that you use the Cisco Router and Security Device Manager (SDM) to configure your router. However, Cisco also realizes that most implementations of a router with SDM will be to use the command-line interface (CLI) for initial configuration then, after the routers have been added to the network, all future configuration will take place using SDM. If you have a router that has the SDM files already installed on it, console into the router and power the router on. If there is...

SNMP and Syslog

This chapter provides information and commands concerning the following topics Router(config) snmp-server community academy ro Sets a read-only (ro) community string called academy Router(config) snmp-server community academy rw Sets a read-write (rw) community string called Router(config) snmp-server location 2nd Floor IDF Defines an SNMP string that describes the physical location of the SNMP server Router(config) snmp-server contact Scott Empson 555-5236 Defines an SNMP string that describes...

Configuring PPP on a Serial Line Optional Commands Compression

Router(config-if) compress predictor Enables the predictor compression algorithm Enables the stac compression algorithm Configuring PPP on a Serial Line (Optional Commands) Link Quality Ensures the link has a quality of x percent. Otherwise, the link will shut down. NOTE In PPP, the Link Control Protocol allows for an optional link-quality determination phase. In this phase, the link is tested to determine whether the link quality is sufficient to bring up any Layer 3 protocols. If you use the...

Configuration Example IPv6 RIP

Figure 25-1 illustrates the network topology for the configuration that follows, which shows how to configure IPv6 and RIPng using the commands covered in this chapter. Figure 25-1 Network Topology for IPv6 RIPng Configuration Example Enables the forwarding of IPv6 unicast datagrams globally on the router Austin(config) interface fastethernet 0 0 Automatically configures an IPv6 link-local address on the interface and enables IPv6 processing on the interface Austin(config-if) ipv6 address 2001...

Static Routes in IPv6

NOTE Although not part of the CCNA exam objectives, the concept of static routes in IPv6 is one that network administrators dealing with IPv6 need to be comfortable with. NOTE To create a static route in IPv6, you use the same format as creating a static route in IPv4. Figure 25-3 illustrates the network topology for the configuration that follows, which shows how to configure static routes with IPv6. Note that only the static routes on the Austin router are displayed. Figure 25-3 Network...

Configuration Examples Frame Relay

Figure 27-1 shows the network topology for the Frame Relay configuration that follows using the commands covered in this chapter. FRAME RELAY (Atlas 550) Atlas Port Atlas Port NOTE This diagram assumes the use of an Adtran Atlas 550 device to simulate the Frame Relay cloud. Three physical ports (1 1, 2 1, and 2 2) are used to interconnect the three cities. Edmonton(config) no ip domain-lookup Turns off DNS queries so that spelling mistakes do not slow you down. Edmonton(config) enable secret...

Verifying NAT and PAT Configurations

Router clear ip nat translations inside a.b.c.d outside e.f.g.h Clears a specific translation from the table before it times out Clears the entire translation table before entries time out Troubleshooting NAT and PAT Configurations Displays information about every packet that is translated. Be careful with this command. The router's CPU might not be able to handle this amount of output and might therefore hang the system. Displays greater detail about packets being translated. Figure 23-1 shows...

Network Address Translation

This chapter provides information and commands concerning the following topics Private IP addresses RFC 1918 Configuring dynamic NAT One private to one public address translation Configuring Port Address Translation (PAT) Many private to one public address translation Configuring static NAT One private to one permanent public address translation Verifying NAT and PAT configurations Troubleshooting NAT and PAT configurations The following table lists the address ranges as specified in RFC 1918...

Creating Standard ACLs

Router(config) access-list 10 permit 172.16.0.0 0.0.255.255 Read this line to say, All packets with a source IP address of 172.16.x.x will be permitted to continue through the internetwork. Arbitrary number between 1 and 99, or 1300 and 1999, designating this as a standard IP ACL. Packets that match this statement will be allowed to continue. Source IP address to be compared to. Router(config) access-list 10 deny host 172.17.0.1 Read this line to say, All packets with a source IP address of...

Configuring a Single Cisco Router

This chapter provides information and commands concerning the following topics Entering global configuration mode Configuring a router, specifically Configuring a serial interface Configuring a Fast Ethernet interface Creating a message-of-the-day (MOTD) banner Setting the clock time zone Assigning a local host name to an IP address The no ip domain-lookup command The logging synchronous command show commands to verify the router configurations EXEC commands in configuration mode the do command...

Security Device Manager Connecting with GUI

SDM has, by default, a one-time username and password set on a router. This one-time username password combination is cisco cisco. Plug your router's first Fast Ethernet (or Gigabit Ethernet) port into a switch. Plug your PC into the same switch. Configure your PC's IP address to be 10.10.10.2 29 (10.10.10.2 with a subnet mask of 255.255.255.248). Open your PC's Internet browser and enter the following command in the browser's address bar You will see a screen similar to the one shown in Figure...

Configuration Example Ether Channel

Figure 14-2 illustrates the network topology for the configuration that follows, which shows how to configure EtherChannel using commands covered in this chapter. Figure 14-5 Network Topology for EtherChannel Configuration Figure 14-5 Network Topology for EtherChannel Configuration Turns off DNS queries so that spelling mistakes do not slow you down Changes the switch to VTP server mode Configures the VTP domain name to testdomain Creates VLAN 10 and enters VLAN configuration mode Returns to...

Configuration Example Single Area OSPF

Figure 10-1 illustrates the network topology for the configuration that follows, which shows how to configure Single Area OSPF using commands covered in this chapter. Figure 10-9 Network Topology for Single Area OSPF Configuration Network Network Figure 10-9 Network Topology for Single Area OSPF Configuration Network Network Austin(config) interface fastethernet 0 0 Moves to interface configuration mode. Austin(config-if) ip address 172.16.10.1 255.255.255.0 Austin(config-if) interface serial 0...

Single Area OSPF

This chapter provides information and commands concerning the following topics Configuring OSPF Mandatory commands Using wildcard masks with OSPF areas Configuring OSPF Optional commands Authentication Using MD5 encryption Propagating a default route Verifying OSPF configuration Configuration example Single area OSPF Configuring OSPF Mandatory Commands Starts OSPF process 123. The process ID is any positive integer value between 1 and 65,535. The process ID is not related to the OSPF area. The...