Another Security Blog

A place to show my mad skills

TidBits Walkthroughs Resources Projects View on GitHub
14 October 2024

CCNA Super Study Guide: Section 2

by C. Casquatch

Space to dump notes for CCNA

End goal is to obtain a CCNA certificate from Cisco and maybe learn networking

Utilities Used

Environments Used

CCNA 200-301 Exam Notes: 2.0 Network Access

2.1 Configure and Verify VLANs (Normal Range) Spanning Multiple Switches

2.1.a Access Ports (Data and Voice)

Overview

Access ports are switch interfaces configured to connect end hosts. Each access port is associated with a single VLAN, and end hosts connected to these ports are not VLAN-aware. Traffic is restricted to devices within the same VLAN.

Example Access Port Configuration

SW1(config)# vlan 10
SW1(config-vlan)# name Eng
SW1(config)# interface FastEthernet 0/1
SW1(config-if)# switchport mode access
SW1(config-if)# switchport access vlan 10

SW1(config)# interface range FastEthernet 0/3-5
SW1(config-if)# switchport mode access
SW1(config-if)# switchport access vlan 10

Verification Methods

  1. Method 1:
    SW1# show vlan brief
    
  2. Method 2:
    SW1# show interface FastEthernet 0/1 switchport
    

2.1.b Default VLAN


2.1.c Inter-VLAN Connectivity

Overview

In a typical LAN campus, VLANs are mapped to specific IP subnets. For example:

Since VLANs separate hosts at Layer 2, communication between VLANs requires Layer 3 routing. Hosts in different VLANs must send traffic via a router or Layer 3 switch to communicate.

Configuration Options

Option 1: Router with Separate Interfaces

Option 2: Router on a Stick (ROAS)

Option 3: Layer 3 Switch

Example Configurations

Option 1: Router with Separate Interfaces

Router(config)# interface FastEthernet 0/1
Router(config-if)# ip address 10.10.10.1 255.255.255.0
Router(config-if)# no shutdown

Router(config)# interface FastEthernet 0/2
Router(config-if)# ip address 10.10.20.1 255.255.255.0
Router(config-if)# no shutdown

Option 2: Router on a Stick (ROAS)

Router(config)# interface FastEthernet 0/1
Router(config-if)# no shutdown

Router(config)# interface FastEthernet 0/1.10
Router(config-subif)# encapsulation dot1q 10
Router(config-subif)# ip address 10.10.10.1 255.255.255.0

Router(config)# interface FastEthernet 0/1.20
Router(config-subif)# encapsulation dot1q 20
Router(config-subif)# ip address 10.10.20.1 255.255.255.0

Option 3: Layer 3 Switch

Switch(config)# interface vlan 10
Switch(config-if)# ip address 10.10.10.1 255.255.255.0
Switch(config-if)# no shutdown

Switch(config)# interface vlan 20
Switch(config-if)# ip address 10.10.20.1 255.255.255.0
Switch(config-if)# no shutdown

Switch(config)# ip routing

Summary

Choose the configuration method based on scalability, performance needs, and available hardware.


2.2 Configure and Verify Interswitch Connectivity

2.2.a Trunk Ports

Overview

Trunk ports function as highways between switches, carrying traffic for multiple VLANs. Each VLAN can be thought of as a separate lane on the highway, enabling interswitch VLAN communication.

Example Trunk Port Configuration

SW1(config)# interface FastEthernet 0/24
SW1(config-if)# switchport mode trunk
SW1(config-if)# switchport trunk allowed vlan 10,20

2.2.b 802.1Q (dot1Q)

Overview

802.1Q, commonly referred to as dot1Q, is the industry-standard protocol for VLAN tagging. It is used to encapsulate VLAN information into Ethernet frames.

Example 802.1Q Configuration

SW1(config)# interface FastEthernet 0/24
SW1(config-if)# switchport trunk encapsulation dot1q
SW1(config-if)# switchport mode trunk

2.2.c Native VLAN

Overview

The Native VLAN is used for untagged traffic on a trunk link. This provides a default lane for packets that do not belong to any VLAN.

Example Native VLAN Configuration

SW1(config)# interface FastEthernet 0/24
SW1(config-if)# switchport trunk native vlan 99

Summary

Overview

Link Layer Discovery Protocol (LLDP) is an open-standard protocol similar to CDP. It provides the following advantages:

Key Differences from CDP

LLDP Configuration


Summary

2.4 Configure and Verify (Layer 2/Layer 3) EtherChannel (LACP)

To establish an EtherChannel, member interfaces on both sides must match in:


LACP Configuration

Example Configuration

SW1 Configuration:

SW1(config)# interface range f0/23 - 24
SW1(config-if-range)# channel-group 1 mode active
SW1(config)# interface port-channel 1
SW1(config-if)# switchport mode trunk

SW2 Configuration:

SW2(config)# interface range f0/23 - 24
SW2(config-if-range)# channel-group 1 mode active
SW2(config)# interface port-channel 1
SW2(config-if)# switchport mode trunk

PAgP Configuration

Example Configuration

SW1 Configuration:

SW1(config)# interface range f0/23 - 24
SW1(config-if-range)# channel-group 1 mode desirable
SW1(config)# interface port-channel 1
SW1(config-if)# switchport mode trunk

Static Configuration

Example Configuration

SW1 Configuration:

SW1(config)# interface range f0/23 - 24
SW1(config-if-range)# channel-group 1 mode on
SW1(config)# interface port-channel 1
SW1(config-if)# switchport mode trunk

Verification

To verify EtherChannel configuration:

SW# show etherchannel summary

OR

SW# show spanning-tree vlan 1

EtherChannel Across Redundant Switches

Multi-Chassis EtherChannel


Layer 3 EtherChannel

Layer 3 EtherChannel allows routing across the aggregated links. Configuration steps for Layer 3 EtherChannel are specific to routing contexts and hardware platforms.

2.5 Interpret Basic Operations of Rapid PVST+ Spanning Tree Protocol

Terminology

How Spanning Tree Works

The Bridge ID

Short-Mode vs Long-Mode Path Cost Calculation

Spanning Tree Path Cost

Spanning Tree Versions

IEEE Open Standards

  1. 802.1D STP: Original implementation; one tree for all VLANs.
  2. 802.1w RSTP: Improved convergence time; one tree for all VLANs.
  3. 802.1s MSTP: Groups VLANs into separate Spanning Tree instances for load balancing.

Cisco Enhancements

Supported Versions

Manipulating the Root Bridge Election

Spanning Tree and HSRP Relationship

Key Concepts and Port Roles

Determining Port Roles

  1. Identify the Root Bridge (lowest Bridge ID).
  2. Designate all Root Bridge ports as Designated Ports.
  3. Determine Root Ports on other switches.
  4. Assign opposing ports as Designated Ports.
  5. Block remaining ports based on cost or Bridge ID.

Port States

PortFast

Spanning Tree Security Features

BPDU Guard

Root Guard

Loop Guard

BPDU Filter

2.6 Describe Cisco Wireless Architectures and AP Modes

WLAN Modes of Operation

  1. Ad-hoc Mode:
    • Devices communicate directly without an Access Point (AP).
  2. Infrastructure Mode:
    • Devices connect to a wired LAN, which supports two sub-modes:
      • Basic Service Set (BSS): Utilizes a single AP to create a WLAN.
      • Extended Service Set (ESS): Employs multiple APs to create a WLAN with roaming capabilities.
        • Roaming requires overlapping areas (10% to 15%) between adjacent APs.
        • Non-overlapping channels (e.g., channels 1, 6, 11) are used to avoid interference.

Wireless Network Types

Ad-hoc and Infrastructure Networks

WiFi Direct

Wireless Bridges and Mesh Networks

Wireless Access Points (WAPs)

Service Set Concepts

Wireless LAN Controllers (WLCs)

CAPWAP Protocol

Traffic Flow and Roaming

FlexConnect

2.7 Physical Infrastructure Connections of WLAN Components

Wireless Local Area Networks (WLANs) provide the convenience of wireless connectivity to devices within a certain range, enabling seamless communication without the need for physical cables. This guide delves into the physical infrastructure connections of WLAN components, including Access Points (APs), Wireless LAN Controllers (WLCs), and related configurations.

WLAN Overview

What is WLAN?

Basic Service Set (BSS) and Identifiers

Distribution System (DS)

Access Point and Wireless LAN Controller (WLC) Operations

Wireless LAN Controller (WLC)

Autonomous vs. Lightweight Access Points

Zero Touch Provisioning (ZTP)

CAPWAP Protocol

Split MAC Architecture

Switch Configurations for WLAN

Autonomous AP Configuration

VLAN Setup:

switch(config)# vlan 21
switch(config-vlan)# name Corporate
switch(config)# vlan 22
switch(config-vlan)# name Guest

Trunk Port Configuration:

switch(config)# interface GigabitEthernet1/0/1
switch(config-if)# switchport trunk encap dot1q
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan 21, 22

Lightweight AP Configuration

VLAN Setup for Management and WLANs:

switch(config)# vlan 10
switch(config-vlan)# name WLC-Management
switch(config)# vlan 11
switch(config-vlan)# name AP-Management

Trunk Port Configuration for WLC:

switch(config)# interface GigabitEthernet1/0/2
switch(config-if)# switchport trunk encap dot1q
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan 10, 11, 21, 22

Access Port Configuration for APs:

switch(config)# interface GigabitEthernet1/0/1
switch(config-if)# switchport mode access
switch(config-if)# switchport access vlan 11

Key Technologies and Features

Seamless Roaming

Conclusion

Understanding the physical infrastructure of WLAN components is critical for designing and managing scalable, efficient wireless networks. By leveraging technologies like WLCs, CAPWAP, and LAG, network administrators can ensure robust and seamless wireless connectivity.

2.8 Network Device Management Access: Methods and Protocols

Understanding network device management access methods is crucial for network administrators and CCNA candidates alike. These protocols and technologies facilitate secure and effective communication with network devices, enabling configuration, monitoring, and troubleshooting. Below is an in-depth exploration of various management access methods.


1. Telnet

Telnet is a remote login protocol that allows administrators to access and manage a network device. While functional, Telnet lacks encryption, making it insecure for use over untrusted networks. It should only be used in secure, internal environments where network traffic is not exposed to potential interception.


2. SSH (Secure Shell)

SSH is a secure alternative to Telnet, providing encrypted communication between a client and a server. Commonly used for accessing network devices like Access Points (APs) and Wireless LAN Controllers (WLCs), SSH ensures confidentiality and integrity, making it suitable for untrusted networks.


3. HTTP

HTTP is a widely used protocol for accessing web-based interfaces, such as the GUI of APs and WLCs. However, HTTP transmits data in plaintext, leaving it vulnerable to eavesdropping. Its use is generally discouraged unless combined with encryption methods.


4. HTTPS

HTTPS is the secure version of HTTP, leveraging SSL/TLS encryption to protect data during transmission. It is the recommended protocol for accessing network device GUIs.


5. Console Access

A console connection provides direct access to a device’s command-line interface (CLI) using a serial cable and terminal software. This method is particularly useful for:


6. TACACS+ and RADIUS

TACACS+ (Terminal Access Controller Access-Control System Plus)

TACACS+ is an Authentication, Authorization, and Accounting (AAA) protocol designed for secure management of network devices. It operates over TCP (port 49) and provides granular control over user roles and actions.

RADIUS (Remote Authentication Dial-In User Service)

RADIUS is another AAA protocol used for managing network access. Unlike TACACS+, RADIUS operates over UDP and is often implemented in scenarios like ISPs, Wi-Fi authentication, and remote access.


7. Cloud-Managed Access

Cloud-managed access shifts the management of network devices to a centralized cloud platform. Examples include AWS, Azure, or Meraki solutions, which provide administrators with a single interface for monitoring and configuring infrastructure.

Key Features:

Advantages:


2.9 Interpret the Wireless LAN GUI Configuration for Client Connectivity

This section focuses on understanding how to configure and interpret the wireless LAN (WLAN) settings, particularly for client connectivity. Key aspects include WLAN creation, security settings, Quality of Service (QoS) profiles, and advanced settings.

Quality of Service (QoS)

Quality of Service (QoS) is a mechanism used to prioritize network traffic to ensure that critical data, such as voice and video, is transmitted with minimal delays and maximum reliability. It guarantees that time-sensitive applications receive preferential treatment over less critical traffic.

QoS for Voice and Video

Voice and video applications require specific quality thresholds to ensure a smooth user experience. These applications are sensitive to delay, jitter, and packet loss, which are defined as:

These thresholds are one-way requirements, meaning that the latency and jitter must stay within the specified limits when a packet travels from the source to the destination. HD video and other high-quality media might have stricter requirements for latency and jitter.

Default Queuing Mechanism: FIFO

The default queuing mechanism used by most routers and switches is FIFO (First In, First Out). This means that when congestion occurs (i.e., the rate of incoming packets exceeds the rate of outgoing packets), the device will send out packets in the order they were received without any priority. This can lead to delays for time-sensitive traffic.

How FIFO Affects Network Traffic

QoS Queuing to Manage Traffic

QoS queuing mechanisms prioritize specific traffic types to reduce latency and ensure that important data, such as voice and video, are transmitted smoothly. By assigning higher priority to critical traffic, QoS can significantly reduce delays for time-sensitive applications.

tags: ccna - study - cisco