Another Security Blog

A place to show my mad skills

TidBits Walkthroughs Resources Projects View on GitHub
14 October 2024

CCNA Super Study Guide: Section 1

by C. Casquatch

Space to dump notes for CCNA

End goal is to obtain a CCNA certificate from Cisco and maybe learn networking

Utilities Used

Environments Used

CCNA 200-301 Exam Notes: 1.0 Network Fundamentals

1.1 Explain the Role and Function of Network Components

OSI Layers and Network Services

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand network interactions. It consists of 7 layers, each with its specific role in handling communication:

Protocol Data Units (PDU)

Each layer in the OSI model adds a specific header to data, encapsulating it as it moves down the layers:

Encapsulation Process:

TCP/IP Reference Model vs. OSI Model

TCP/IP Model OSI Model
Application Layer Session, Presentation, Application Layers
Transport Layer Transport Layer
Internet Layer Network Layer
Network Access Layer Data Link Layer, Physical Layer

The TCP/IP model is more simplified, combining some of the OSI layers, such as the Application Layer merging the functionalities of OSI’s Application, Presentation, and Session layers.

Network Devices and OSI Layers

Each network device operates at a specific layer of the OSI model. Understanding their roles helps in troubleshooting and network design.

1.1.a What is a Router?

1.1.b Layer 2 and Layer 3 Switches

1.1.c Next-Generation Firewalls and IPS

1.1.d Access Points (AP)

1.1.e Controllers (Cisco DNA Center and WLC)

1.1.f Endpoints

1.1.g Servers

1.1.h Power over Ethernet (PoE)


1.2 Describe Characteristics of Network Topology Architectures

1.2.a Two-Tier Architecture

1.2.b Three-Tier Architecture

1.2.c Spine-Leaf Architecture

Components:

Traffic Types:

Benefits:

1.2.d WAN (Wide Area Network)

Technologies:

1.2.e Small Office/Home Office (SOHO)

1.2.f On-Premises and Cloud

On-Premises:

Cloud:

Colocation Facilities:


1.3 Compare Physical Interface and Cabling Types

Ethernet Cables

Fiber-Optic Cables

Serial Connections

Ethernet Standards

Ethernet standards define the speed and media type for network communication over wired connections:


1.4 Identify Interface and Cable Issues (Collisions, Errors, Mismatched Duplex, and/or Speed)

Interface Speed and Duplex Parameters

Mismatched Speed or Duplex Settings


Broadcast and Collision Domains


1.5 Compare TCP to UDP

TCP (Transmission Control Protocol)

UDP (User Datagram Protocol)


Inter-Application Communication


Table 2: TCP/UDP Port Assignment

Protocol Port Type
Telnet TCP 23 TCP
SMTP TCP 25 TCP
FTP TCP 21 TCP
HTTP TCP 80 TCP
SNMP UDP 161 UDP
DNS TCP/UDP 53 Both
HTTPS TCP 443 TCP
SSH TCP 22 TCP
TFTP UDP 69 UDP


1.6 Configure and Verify IPv4 Addressing and Subnetting

IPv4 Addressing


Subnetting


Variable Length Subnet Masks (VLSM)


Private IPv4 Addressing

Private IPv4 Address Ranges (as per RFC 1918):



1.7 Describe Private IPv4 Addressing

Private IP Addressing (RFC 1918)

Private Address Ranges

Private IPv4 addresses are divided into three classes:

Class A Private Addresses

Class B Private Addresses

Class C Private Addresses

Key Concepts


1.8 Configure and Verify IPv6 Addressing and Prefix


IPv6 Addressing Format


Stateless Address AutoConfiguration (SLAAC)


Router Advertisements


The Unspecified Address


Neighbor Discovery


Verification Commands



1.9 Describe IPv6 Address Types

IPv6 defines several types of addresses, each serving different purposes. These address types allow for flexible and efficient addressing, with some mandatory for interface configurations, while others are optional. Multiple addresses can exist on the same interface for different purposes.



1.9.b Anycast


1.9.c Multicast


1.9.d Modified EUI-64



IPv6 Stateless Address Autoconfiguration (SLAAC)


IPv6 Router Advertisements and Solicitation


Special IPv6 Addresses


IPv6 Routing and Dual-Stack



1.10 Verify IP Parameters for Client OS (Windows, Mac OS, Linux)

To verify IP parameters on different operating systems, use the following commands:

These commands help ensure that the correct IP parameters are configured on the system, aiding in troubleshooting network connectivity.


1.11 Describe Wireless Principles

Wireless Local Area Networks (WLANs) cannot use CSMA/CD (Carrier Sense Multiple Access with Collision Detection) because wireless communication is half duplex.


1.11.a Non-overlapping Wi-Fi Channels


1.11.b SSID (Service Set Identifier)


1.11.c RF (Radio Frequency)


1.11.d Encryption

Some common wireless security standards include:


WPA Personal vs. WPA Enterprise

Virtualization is a core technology that enables cloud computing by allowing multiple customers to share the underlying hardware. While cloud computing has popularized virtualization, the technology itself has been around for much longer.

Virtualization allows multiple virtual systems to run on a single physical machine, offering flexibility and cost reduction. Redundancy can be achieved by adding multiple physical systems, each hosting virtual systems.

Clustering combines physical systems into a single virtual system, providing both redundancy and increased performance.




Containers vs. Type 1 Hypervisors


Example of Virtual Switching with Nexus 1000V


Firewall Virtualization with Contexts (e.g., ASA)


Example of Virtual Routing and Forwarding (VRFs)


1.13 Describe Switching Concepts

1.13.a MAC Learning and Aging

MAC Learning:

How MAC Learning Works:

  1. Frame Reception: When a switch receives a frame on one of its ports, it checks the source MAC address in the frame header.
  2. MAC Address Table Update: The switch updates its MAC address table with the source MAC address and the corresponding ingress port.
  3. Address Table Entry: Each entry includes the MAC address, the associated port, and a timestamp showing when the entry was last updated.

Example Scenario:

Importance of MAC Learning:

  1. Efficient Forwarding: MAC learning ensures switches forward frames only to the correct ports, reducing unnecessary traffic.
  2. Auto-Configuration: Switches dynamically update their MAC address tables as devices connect or disconnect.
  3. Plug-and-Play Connectivity: Devices can be connected to any port on a switch without manual configuration.

How MAC Aging Works:

Significance of MAC Aging:

  1. Resource Optimization: Removes stale entries, conserving memory and processing power.
  2. Network Security: Prevents unauthorized devices from “hijacking” MAC addresses.
  3. Adaptability: Allows switches to update their tables based on changing network conditions.

1.13.b Frame Switching

  1. Switching Decision: Upon receiving a data frame, the switch uses the destination MAC address to decide the outgoing port. The frame is then forwarded only to the port where the destination device resides.
  2. Store-and-Forward vs Cut-Through Switching:
    • Store-and-Forward: The entire frame is received before being forwarded. This allows error checking for data integrity.
    • Cut-Through: The frame is forwarded as soon as the destination MAC address is identified, resulting in lower latency but no error checking.

1.13.c Frame Flooding

  1. Broadcast and Unknown Unicast Frames: When a switch receives a broadcast frame (destined for all devices) or an unknown unicast frame (destination MAC address not found in the table), it engages in frame flooding. This means the frame is broadcast to all ports except the incoming port, helping ensure it reaches its destination.
  2. Reducing Frame Flooding: Techniques like Spanning Tree Protocol (STP) and Rapid STP (RSTP) help minimize frame flooding by creating loop-free network topologies and preventing broadcast storms.

1.13.d MAC Address Table

  1. Structure and Content: The MAC address table (also known as the CAM table) contains entries with MAC addresses and their corresponding ports. This table helps the switch make forwarding decisions based on the destination MAC address.
  2. Dynamic and Static Entries:
    • Dynamic Entries: Learned through MAC learning and aging.
    • Static Entries: Manually configured by network administrators to ensure specific MAC addresses are always associated with particular ports.

tags: ccna - study - cisco