Cisco CCNA 2 Cheat Sheet
|
|
- Edgar Wade
- 7 years ago
- Views:
Transcription
1 Czyszczenie switcha i zapis konfiguracji Switch> enable Switch# show flash Switch# delete vlan.dat Switch# erase startup-config Switch# reload Switch# copy running-config startup-config Weryfikacja ustawień Switch> enable Switch# show running-config Switch# show startup-config Switch# show interface vlan1 Switch# show ip interface vlan1 Switch# show interfaces trunk Switch# show interface f0/1 switchport Switch# show port-security interface f0/5 Switch# show port-security address Switch# show version ( include ) Switch# show vlan Switch# show vlan brief Cisco CCNA 2 Cheat Sheet Switch# show mac address-table <PC MAC> Switch# show mac address-table dynamic Switch# clear mac address-table dynamic Switch# show flash Switch# dir flash: Switch# show ip ssh Switch# show ip http server status Router# show ip route Router# show ip ospf Router# show ip ospf neighbor Router# show ipv6 ospf neighbor Router# show ip ospf interface brief Router# show ip protocols Router# show ip interface brief Router# show ipv6 protocols Router# show ipv6 rip Test1 Router# show access-list 1
2 Router# show ip nat translations Router# show ip nat statistics Podstawowa konfiguracja Switch> enable Switch# configure terminal Switch(config)# hostname S1 S1(config)# service password-encryption S1(config)# security passwords min-length 5 S1(config)# enable secret class S1(config)# no ip domain-lookup S1(config)# no ip http server S1(config)# banner motd # Unauthorized access is strictly prohibited. # S1# configure terminal S1(config)# vlan 99 S1(config-vlan)# exit S1(config)# interface vlan99 S1(config-if)# ip address S1(config-if)# no shutdown S1(config)# interface range f0/1 24, g0/1 2 S1(config-if-range)# switchport access vlan 99 S1(config-if-range)# exit S1(config)# ip default gateway S1(config)# line con 0 S1(config-line)# password cisco S1(config-line)# exec-timeout 5 0 S1(config-line)# login S1(config-line)# logging synchronous S1(config-line)# exit S1(config)# line vty 0 15 S1(config-line)# password cisco S1(config-line)# exec-timeout 5 0 S1(config-line)# login S1(config-line)# logging synchronous S1(config-line)# exit S1(config)# mac address-table static BE.6C89 vlan 99 interface fastethernet 0/6 S1(config)# exit S1# SSH
3 S1(config)# ip domain-name CCNA-Lab.com S1(config)# username admin privilege 15 secret sshadmin S1(config)# line vty 0 4 S1(config-line)# transport input ssh S1(config-line)# login local S1(config-line)# exit S1(config)# crypto key generate rsa modulus 1024 S1(config)# ip ssh time-out 75 S1(config)# ip ssh authentication-retries 2 S1(config)# end VLAN switch S1(config)# vlan 99 S1(config-vlan)# name Management S1(config-vlan)# exit S1(config)# no vlan 30 S1(config)# interface vlan 99 S1(config-if)# ip address S1(config-if)# no shutdown S1(config-if)# end S1(config)# interface vlan 1 S1(config-if)# ipv6 address autoconfig S1(config-if)# end Interfejs switch S1(config)# interface f0/5 S1(config-if)# mac address aaaa.bbbb.cccc S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 99 S1(config-if)# shutdown S1(config-if)# switchport port-security mac-address XXXX.XXXX.XXXX S1(config-if)# switchport port-security mac-address sticky S1(config-if)# switchport port-security maximum 3 S1(config-if)# switchport port-security violation? S1(config-if)# no shutdown S1(config-if)# exit S1(config)# Trunk mode switch S1(config-if)# switchport mode dynamic desirable (DTP mode) LUB S1(config-if)# switchport mode trunk (manualnie) S1(config-if)# switchport trunk native vlan 99 S1(config-if)# switchport trunk allowed vlan 10,99 S1(config-if)# switchport nonegotiate (wył DTP mode) Interfejs router R1# configure terminal
4 R1(config)# interface fastethernet 0/1 R1(config-if)# description Connection to Hell R1(config-if)# ip address R1(config)# IPv6 router R1(config)# ipv6 unicast routing R1(config-if)# ipv6 address 2001:db8:acad:a::1/64 eui-64 R1(config-if)# ipv6 address fe80::1 link-local R1(config)# interface seria 0/0/1 R1(config-if)# ipv6 address FC00::1/ Q router.1 R1(config-subif)# encapsulation dot1q 1 R1(config-subif)# ip address R1(config-subif)# exit Routing statyczny ipv4 R1(config)# ip route f0/1 R1(config)# ip route R1(config)# ip route [ip/int] Routing statyczny ipv6 R1(config)# ipv6 route 2001:db8:acad:a::/64 serial 0/0/0 R1(config)# ipv6 route 2001:db8:acad:b::/64 FC00::2 R1(config)# ipv6 route ::/0 [ip/int] Routing RIPv2 R1(config)# router rip R1(config-router)# version 2 R1(config-router)# passive-interface g0/1 (wyłącza rozgłaszanie na interfejsie) R1(config-router)# network R1(config-router)# network R1(config-router)# default-information originate (rozsyla info o statycznej trasie domyślnej -> najpierw trzeba stworzyć) Routing RIPng R1(config-if)# ipv6 rip Test1 enable R1(config-if)# interface s0/0/0 R1(config-if)# ipv6 rip Test1 enable R1(config-if)# ipv6 rip Test1 default-information originate (najpierw trzeba stworzyć domyślną trasę) Routing OSPFv2 R1(config)# router ospf 1
5 R1(config-router)# network area 0 R1(config-router)# passive-interface g0/0 R1(config-router)# auto-cost reference-bandwidth R1(config)# interface s0/0/0 R1(config-if)# bandwidth 128 (na obu końcach) LUB R1(config-if)# ip ospf cost 1565 R1(config-router)# passive-interface default ZMIANA ID ROUTERA LOOPBACK INT. R1(config)# interface lo0 R1(config-if)# ip address R1(config-if)# end ZMIANA ID ROUTERA RĘCZNIE R1(config)# router ospf 1 R1(config-router)# router-id R1(config-router)# end R1(config)# clear ip ospf process Routing OSPFv3 (IPv6) R1(config)# ipv6 router ospf 1 R1(config-router)# router-id R1(config-router)# passive-interface g0/0 R1(config-router)# passive-interface default R1(config)# interface g0/0 R1(config-if)# ipv6 ospf 1 area 0 Numerowana ACL R1(config)# access-list 1 remark Allow R3 LANs Access R1(config)# access-list 1 permit R1(config)# access-list 1 permit host R1(config)# access-list 1 deny any (zawsze na końcu) R1(config)# ip access-group 1 out Nazywana ACL R1(config-std-nacl)# ip access-list standard BRANCH R1(config-std-nacl)# permit host R1(config-std-nacl)# permit R1(config-std-nacl)# deny any R1(config-std-nacl)# exit R1(config-if)# ip access-group BRANCH out MODYFIKACJA ACL R1(config)# ip access-list standart BRANCH R1(config-std-nacl)# 30 permit R1(config-std-nacl)# end
6 ACL DLA VTY R1(config)# line vty 0 15 R1(config-line)# access-class ADMIN-MGT in R1(config-line)# exit Rozszerzona numerowana ACL R1(config)# access-list 100 remark Allow WWW & SSH R1(config)# access-list 100 permit tcp host host eq 22 R1(config)# access-list 100 permit tcp any any eq 80 MODYFIKACJA R1(config)# ip access list extended 100 R1(config-ext-nacl)# 30 permit ip R1(config-ext-nacl)# end Rozszerzona nazywana ACL R1(config)# ip access-list extended WWW-POLICY R1(config-ext-nacl)# permit tcp host R1(config-ext-nacl)# permit tcp eq 80 MODYFIKACJA R1(config)# ip access-list extended WWW-POLICY R1(config-ext-nacl)# 30 permit ip R1(config-ext-nacl)# end ACL IPv6 R1(config)# ipv6 access-list RESTRICT-VTY R1(config-ipv6-acl)# permit tcp 2001:db8:acad:a::/64 any R1(config-ipv6-acl)# permit tcp any any eq 22 R1(config-ipv6-acl)# line vty 0 4 R1(config-line)# ipv6 access-class RESTRICT-VTY in R1(config-line)# end R1(config)# ipv6 access-list RESTRICTED-LAN R1(config-ipv6-acl)# remark Block Telnet from outside R1(config-ipv6-acl)# deny tcp any 2001:db8:acad:a::/64 eq telnet R1(config-ipv6-acl)# permit ipv6 any any R1(config-ipv6-acl)# end R1(config-if)# ipv6 traffic-filter RESTRICTED-LAN out R1(config-if)# end R1# clear ipv6 access-list RESTRICTED-LAN MODYFIKACJA R1(config)# ipv6 access-list RESTRICTED-LAN R1(config-ipv6-acl)# permit tcp 2001:db8:acad:b::/64 host 2001:db8 acad:a::a eq 23 sequence 15 DHCP IPv4 router R2(config)# ip dhcp excluded-address R2(config)# ip dhcp pool R1G0
7 R2(dhcp-config)# network R2(dhcp-config)# default-router R2(dhcp-config)# dns-server R2(dhcp-config)# domain-name ccna-lab.com R2(dhcp-config)# lease 2 (days) R2(dhcp-config)# exit R1(config)# interface g0/0 R1(config-if)# ip helper-address DHCP IPv4 switch S1(config)# sdm prefer lanbase-routing S1(config)# exit S1# reload S1(config)# ip dhcp excluded-address S1(config)# ip dhcp pool DHCP1 S1(dhcp-config)# network S1(dhcp-config)# default-router S1(dhcp-config)# dns-server S1(dhcp-config)# lease 3 S1(dhcp-config)# exit ROUTING ON SWITCH S1(config)# ip routing S1(config)# ip route DHCP IPv6 R1(config)# ipv6 dhcp pool IPV6POOL-A R1(config-dhcpv6)# domain-name ccna-dhcpv6.com R1(config-dhcpv6)# dns-server 2001:db8:acad:a::abcd R1(config-dhcpv6)# exit R1(config-if)# ipv6 dhcp server IPV6POOL-A R1(config-If)# ipv6 nd other-config-flag R1(config-if)# end MODYFIKACJA NA STATEFULL R1(config)# ipv6 dhcp pool IPV6POOL-A R1(config-dhcpv6)# address prefix 2001:db8:acad:a::/64 R1(config-dhcpv6)# end R1(config-if)# shutdown R1(config-if)# ipv6 nd managed-config-flag R1(config-if)# end Statyczny NAT R1(config)# ip nat inside source static
8 R1(config-if)# ip nat inside R1(config)# interface s0/0/1 R1(config-if)# ip nat outside Dynamiczny NAT R1(config)# access-list 1 permit R1(config)# ip nat pool public_access netmask R1(config)# ip nat inside source list 1 pool public_access Przeciążenie puli NAT R1(config)# access-list 1 permit R1(config)# ip nat pool public_access netmask R1(config)# ip nat inside source list 1 pool public_access overload PAT R1(config)# access-list 1 permit R1(config)# ip nat inside source list 1 interface serial 0/0/1 overload Inne router R1# clock set 15:00:00 13 Oct 2016 R1(config-if) clock rate (DCE) R1(config)# ip http server R1(config)# ip http secure-server R1(config)# ip http authentication local
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
More informationSkills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
More informationCase Study 1: Registering IP Phones with a remote Call
Case Study 1: Registering IP Phones with a remote Call Manager Objectives Place calls from IP Phones under R1 to IP Phones under R2 Place calls from any IP Phone (under R1 and under R2) to the regular
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationObjectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
More informationCCNA 2 v5.0 Routing Protocols Final Exam Answers
CCNA 2 v5.0 Routing Protocols Final Exam Answers 1 Refer to the exhibit. What can be concluded about network 192.168.1.0 in the R2 routing table? This network was learned through summary LSAs from an ABR.*
More informationObjectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
More informationChapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
More informationCCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...
CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA Switch S1 S1#sh ru Building configuration... Current configuration : 1639 bytes version 12.2 no service timestamps log datetime
More informationLab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
More informationPT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
More informationLab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP address Subnet mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
More informationLab 3.5.1: Basic VLAN Configuration (Instructor Version)
(Instructor Version) Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 172.17.99.11 255.255.255.0 N/A S2 VLAN 99 172.17.99.12 255.255.255.0
More informationExperts in Networking. CCNA Cheat Sheet. This CCNA command cheat sheet covers both ICND parts 1 & 2 and covers the current CCNA exam (640-802).
CCNA Cheat Sheet This CCNA command cheat sheet covers both ICND parts 1 & 2 and covers the current CCNA exam (640-802). Whilst not an exhaustive IOS command list it covers the majority of commands found
More informationLab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
More informationTotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
More informationLAB Configuring NAT. Objective. Background/Preparation
LAB Configuring NAT Objective Configure a router to use network address translation (NAT) to convert internal IP addresses, typically private addresses, into outside public addresses. Configure static
More informationNetwork Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
More informationCisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
More informationLab: Basic Router Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Def. Gateway R1 Fa0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 192.168.2.1 255.255.255.0 N/A R2 Fa0/0 192.168.3.1 255.255.255.0 N/A
More informationThis document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNP: Implementing
More informationConfiguring Port Security
CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:
More informationBasic Wireless Configuration
Basic Wireless Configuration Topology Diagram Learning Objectives Configure options in the Linksys Setup tab. Configure options in the Linksys Wireless tab. Configure options in the Linksys Administration
More informationBrest. Backup : copy flash:ppe_brest1 running-config
Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24
More informationTask 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:
More informationWiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A
WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
More informationLab 3.3 Configuring QoS with SDM
Lab 3.3 Configuring QoS with SDM Learning Objectives Configure Quality of Service tools with the SDM QoS wizard Monitor traffic patterns using the SDM QoS interface Topology Diagram Scenario Cisco Security
More informationCCNA Security 1.1 Student Lab Manual
1.1 Student Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationBrocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationThe Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
More informationLab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
More informationWelcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
More informationTopic 7 DHCP and NAT. Networking BAsics.
Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationLAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
More informationTP : Configuration de routeurs CISCO
TP : Configuration de routeurs CISCO Sovanna Tan Novembre 2010 révision décembre 2012 1/19 Sovanna Tan TP : Routeurs CISCO Plan 1 Présentation du routeur Cisco 1841 2 Le système d exploitation /19 Sovanna
More informationFelix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram
Felix Rohrer PT Activity 7.5.3: Troubleshooting Wireless WRT300N Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
More informationLab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 Customer Serial 0/0/1 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet 0/0 192.168.1.1
More informationConnect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationLab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands Device Host Name Interface IP Address Subnet Mask R1 CustomerRouter Serial 0/0/0 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet
More informationICND1 Lab Guide. 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by
ICND1 Lab Guide 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0 ii Interconnecting Cisco Networking Devices Part 1 100-101 Lab Guide LM20130929/BV2.01 iii 25 Century Blvd. Ste. 500
More informationLab 5-5 Configuring the Cisco IOS DHCP Server
Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology
More informationLab 8.3.3b Configuring a Remote Router Using SSH
Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH
More informationLab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
More informationSimple MPLS network topology for Dynamips/Olive
Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker
More informationConfiguring WAN Failover with a Cisco 881 Router and an AirLink ES440
Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440 When the AirLink ES440 is combined with a third-party router, the combined solution supports business continuity by providing primary
More informationInterconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
More informationConfiguring a Router
CHAPTER 3 Configuring a Router This chapter provides information and commands concerning the following topics: Configuring a router, specifically: Names Passwords Interfaces MOTD banners IP host tables
More informationCCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
More informationIntroduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
More informationChapter 7 Lab 7-1, Configuring Switches for IP Telephony Support
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution
More information- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
More informationInterconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
More informationLab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
More informationGeschreven door Administrator woensdag 13 februari 2013 17:37 - Laatst aangepast woensdag 13 februari 2013 18:05
Nexus 1000V returns the control of networking back to network administrators so that there is a clear boundary between server administrators and network administrators. For small businesses, one administrator
More informationConfiguring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
More informationWorldSkills Hong Kong Competition 2016. Test Project IT Network Systems Administration (Linux Module) English Version only 只 提 供 英 文 版 本
WorldSkills Hong Kong Competition 2016 Test Project IT Network Systems Administration (Linux Module) English Version only 只 提 供 英 文 版 本 Table of Content INTRODUCTION 2 DESCRIPTION OF PROJECT AND TASKS
More informationChapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls
Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A S1 FA0/5
More informationSwitch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
More informationLab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
More informationSkills Assessment Student Training (Answer Key)
CCNA: Connecting Networks Skills Assessment Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Assessment
More informationLab 6.1 Configuring a Cisco IOS Firewall Using SDM
Lab 6.1 Configuring a Cisco IOS Firewall Using SDM Learning Objectives Use SDM to configure a router as a firewall Understand basic firewall operation Configure basic routing through a firewall Verify
More informationSecuring the Connected Enterprise
Securing the Connected Enterprise ABID ALI, Network and Security Consultant. Why Infrastructure Matters Rapidly Growing Markets Global Network Infrastructure and Security Markets 13.7% CAGR over the next
More informationConfiguring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside
More informationConfiguring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
More informationConfiguring Server Load Balancing
CHAPTER 6 This chapter describes how to configure server load balancing (SLB) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About Server
More informationHow To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
More informationINTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
More informationConfiguring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
More informationTroubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
More informationRouter Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
More informationCentral America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security
City Guatemala 30 January - 1 February 07 Pedro Lorga (lorga@fccn.pt) Simon Muyal (muyal@renater.pt) Piers O'Hanlon (p.ohanlon@cs.ucl.ac.uk) Laboratory Exercise: Objectives In this laboratory exercise
More informationNetwork Security Pod Version 2.0
Network Security Pod Version 2.0 Planning and Installation Guide For Cisco Networking Academy Network Security 2.0 Curriculum Document Version: 2008-03-10 Copyright 2008, Network Development Group, Inc.
More information642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
More informationInterconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
More informationlogin timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30
logging enable logging console 4 logging timestamp logging trap 5 logging buffered 4 logging device id hostname logging host 10.0.128.240 udp/514 format emblem logging host 10.0.143.24 udp/514 login timeout
More informationCCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding
Http://elmaestrodelared.blogspot.com CCNA Exploration 4.0: (II) Routing Protocols and Concepts Chapter 1: Introduction to Routing and Packet Forwarding 1. If a router cannot find a valid configuration
More informationUsing LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
More informationCCNA Exploration 4.0.5.0 Routing Protocols and Concepts Student Lab Manual
4.0.5.0 Routing Protocols and Concepts Student Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution
More informationConfiguring a Cisco 2509-RJ Terminal Router
created by: Rainer Bemsel Version 1.0 Dated: Dec/08/2012 For my Cisco LAB, I ve purchased a used Cisco 2509-RJ with RJ45-RJ45 roll-over cables. This TechTip shows my configuration setup, so you can easily
More informationConfiguring Network Address Translation
CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections
More informationCisco IOS Switch Security Configuration Guide
Report Number: I33-010R-2004 Cisco IOS Switch Security Configuration Guide Switch Security Guidance Activity of the Systems and Network Attack Center (SNAC) Authors: Date: 21 June 2004 A. Borza Version:
More informationConfigurazione Rete VoIP
Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul
More informationLab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
More informationCCNP v2 Eğitimi İçeriği
Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNP v2 Eğitimi İçeriği Giriş seviyesi network bilgilerine sahip katılımcıları network'ün temeli olan Routing Switching alanında orta üst
More informationConfigurazione Rete VoIP
Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul
More informationCisco Configuration Professional Quick Start Guide
Cisco Configuration Professional Quick Start Guide April 29, 2011 This document explains how to start using Cisco Configuration Professional Express (Cisco CP Express) and Cisco Configuration Professional
More informationTable of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
More informationConnecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
More informationLab 3.10.2 Use Network Inspector to Observe STP Behavior
Lab 3.10.2 Use Network Inspector to Observe STP Behavior Objective The purpose of this lab is to observe STP behavior with the Network Inspector switch trace feature. Scenario A new switched network has
More informationWhat is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
More informationDocument ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
More informationLab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
More informationCisco CCNA 200-120 Exam
Cisco CCNA 200-120 Exam Vendor:Cisco Exam Code: 200-120 Exam Name: Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 QUESTION 1 Refer to the exhibit. What will Router1 do when it receives
More informationCisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2
More informationChapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM
Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 Fa0/1 192.168.1.1 255.255.255.0
More informationIntroduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
More informationTroubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
More informationBasic Router and Switch Instructions (Cisco Devices)
Basic Router and Switch Instructions (Cisco Devices) Basic Device Connection 1. Connect to the device via the console cable (light blue cable) and the use of a terminal program (Windows Hyperterminal,
More information