Network Config Summary Year2,3
Network Config Summary Year2,3
Practical
Omar Tamer
Chapter 0 :
Basic Info
Cabling
Cross over cabling is used to connect two
similar devices directly, such as two
computers, by swapping the transmit and
receive signals. Straight through cabling is
used to connect different devices, like a
computer to a switch or router, with the
transmit and receive signals in the same
order. Both types of cabling are essential
for creating functional networks and
ensuring proper communication between
devices.
Serial
Serial cabling is used to connect
networking devices like routers, switches,
and firewalls over long distances using
serial ports. It's commonly used in wide
area networks (WANs) to establish
connections between different locations.
Serial cabling allows for the transmission
of data over long distances and is often
used in scenarios where Ethernet or other
types of cabling are not feasible. It's a
reliable and cost-effective solution for
interconnecting networking equipment.
Console
Console cabling is used to establish a
direct connection to a device, such as a
router or switch, for configuration and
troubleshooting purposes. It allows
administrators to access the device's
command-line interface for initial setup,
password recovery, and troubleshooting
network issues. Console cabling is
essential for managing network devices
when they are not accessible through the
network due to configuration errors or
network connectivity problems. It
provides a direct and reliable way to
interact with networking equipment for
maintenance and troubleshooting.
Classless Vs Classful
Classful addressing divides IP addresses
into classes (A, B, C, etc.) with fixed network
and host portions, while classless
addressing allows for variable-length
subnet masking, enabling more efficient
use of IP addresses and better scalability.
Classful addressing can lead to inefficient
use of IP addresses and limitations in
network size, while classless addressing
provides more flexibility and allows for the
creation of subnets of different sizes within
a network. Classless addressing is the
modern standard for IP addressing and is
essential for the efficient allocation of IP
addresses in today's networks.
Network Addressing Classes
Network addressing classes are a method for
dividing the available IP address space into
different ranges for different network sizes.
There are five network addressing classes: A,
B, C, D, and E. Classes A, B, and C are used
for unicast addressing, which is used for one-
to-one communication. Class D is used
for multicast addressing, which is used for
one-to-many communication. Class E is
reserved for experimental use and is not
currently used for addressing devices on
networks.
Private IP
A private IP address is an address assigned to
a device on a local area network (LAN) that is
not accessible over the internet. Private IP
addresses are used to identify and
communicate with devices on a private
network, such as a home or office network.
Private IP addresses are not unique globally
and are assigned by the local network
administrator. Private IP addresses are
commonly used in conjunction with Network
Address Translation (NAT) to allow devices on
a private network to communicate with
devices on the internet using a single public
IP address.
OSI Model
The OSI (Open Systems Interconnection) model is
a conceptual framework that describes how
network protocols and communication should
work together. It consists of seven layers, each
with its own set of protocols and functions. The
layers are: Physical, Data Link, Network,
Transport, Session, Presentation, and
Application. The OSI model provides a standard
for network communication and allows devices
from different vendors to communicate with each
other.
OSI Model Protocols
The OSI (Open Systems Interconnection) model is
a conceptual framework that describes how
network protocols and communication should
work together. It consists of seven layers, each
with its own set of protocols and functions,
including the Physical, Data Link, Network,
Transport, Session, Presentation, and Application
layers. These layers provide a standard for
network communication and allow devices from
different vendors to communicate with each
other, while also providing reliable data
transfer, managing network routing, and
supporting user-level services and applications.
TCP VS UDP
TCP (Transmission Control Protocol) UDP (User Datagram Protocol )
TCP (Transmission Control Protocol) is a network UDP (User Datagram Protocol) is a network
protocol that provides a connectionless,
protocol that manages the transfer of data between
unreliable, and low-overhead data delivery
devices on a network. TCP provides reliable, ordered, service. UDP does not guarantee the delivery of
and error-checked delivery of data, ensuring that data packets and does not establish a
packets are transmitted in the correct sequence and connection before transmitting data
that missing or corrupted packets are retransmitted.
TCP/IP
TCP/IP (Transmission
Control Protocol/Internet Protocol) is a set
of networking protocols used to establish and
maintain communication between devices on the
internet and other networks. TCP/IP defines how
data is transmitted over the internet, including
addressing, routing, and error detection. It
consists of two main protocols: TCP, which
manages data transmission, and IP, which
manages network addressing and routing. TCP/IP
is the foundation of the internet and is used by
virtually all internet applications and services.
Chapter 1 :
Switching &
Security
Telnet Config
Switch# configure terminal
Switch(config)# feature telnet
Switch(config)# username we secret we
Switch(config)# line vty 0 4
Switch(config-line)#password Cisco
Switch(config-line)#login local
Switch(config-line)#transport input telnet
SSH Config
Switch# configure terminal
Switch(config)# ip domain name we
Switch(config)# crypto key generate
1024
Switch(config)# enable secret admin
Switch(config)# service password-encryption
Switch(config)# username we priv 15 secret we
Switch(config)# line vty 0 4 On the command prompt of the PC, open a SSH session
Switch(config-line)#password Cisco to the remote router by typing the command:
Switch(config-line)#login local ssh -l we 1.0.0.1
Switch(config-line)#transport input ssh
Vlan Config
Switch#config terminal
Switch(config)#vlan 10
Switch(config-vlan)#name SALES
Switch(config-vlan)#vlan 20
Switch(config-vlan)#name IT
Vlan Config
Switch>enable
Switch#config terminal
Switch(config)#int fa0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config-if)#int fa0/2
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config-if)#int fa0/3
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 20
Switch(config-if)#int fa0/4
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 20
Vlan Config
Switch(config)#int fa 0/5
Switch(config-if)#switchport mode trunk
………………………………………………………………………………..
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#no shutdown
Router(config-if)#int fa0/0.10
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#ip add 192.168.1.1 255.255.255.0
Router(config-subif)#
Router(config-subif)#int fa0/0.20
Router(config-subif)#encapsulation dot1q 20
Router(config-subif)#ip add 192.168.2.1 255.255.255.0
mode trunk
VTP Config
SW1(config)#vtp domain we
SW1(config)#vtp password cisco
SW1(config)#vlan 30
SW2(config)#vtp mode client
SW2(config)#vtp domain we
SW2(config)#vtp password cisco
SW3(config)#vtp mode client
SW3(config)#vtp domain we
SW3(config)#vtp password cisco
Etherchannel Config
Etherchannel Config PAgP
SW1(config)#interface GigabitEthernet 0/1
SW1(config-if)#channel-group 1 mode ?
active Enable LACP unconditionally
auto Enable PAgP only if a PAgP device is detected
desirable Enable PAgP unconditionally
on Enable EtherChannel only
passive Enable LACP only if a LACP device is detected
R2(config-router)#router ospf 1
R2(config-router)#network 192.168.0.0 0.0.0.255 area 0
R2(config-router)#network 172.16.0.0 0.0.255.255 area 0
#Router 2
Router(config)#router eigrp 20
Router(config-router)#network 192.168.1.248 0.0.0.3
Router(config-router)#network 192.168.1.252 0.0.0.3
Router(config-router)#
EIGRP Config
#Router 3
Router(config)#router eigrp 20
Router(config-router)#network 192.168.1.8 0.0.0.3
Router(config-router)#network 192.168.1.4 0.0.0.3
Router(config-router)#
#Router 4
Router(config)#router eigrp 20
Router(config-router)#network 192.168.1.4 0.0.0.3
Router(config-router)#network 192.168.1.0 0.0.0.3
Router(config-router)#
EIGRP Config
#Router 5
Router(config)#router eigrp 20
Router(config-router)#network 20.0.0.0
0.255.255.255
Router(config-router)#network 192.168.1.252 0.0.0.3
Router(config-router)#network 192.168.1.8 0.0.0.3
Router(config-router)#
BGP Config
#Router 1
Router1(config)#router bgp 1
Router1(config-router)#neighbor 192.168.10.2
remote-as 2
Router1(config-router)#neighbor 192.168.10.2
password cisco
#Router 2
Router2(config)#router bgp 2
Router2(config-router)#neighbor 192.168.10.1
remote-as 1
Router2(config-router)#neighbor 192.168.10.1
password cisco
HSRP Config
#R1 Configuration:
#R2 Configuration:
R1#show ip access-lists
Extended IP access list allow_traffic_fileshare
20 deny ip host 10.0.0.2 host 192.168.0.1
50 permit ip host 10.0.0.2 host 192.168.0.2
Static NAT Config
R1(config)#ip nat inside source static 10.0.0.2
59.50.50.1
R1(config)#interface fastEthernet 0/0
R1(config-if)#ip nat inside
R1(config-if)#interface fastEthernet 0/1
R1(config-if)#ip nat outside
Writing running-config...!!
[OK - 561 bytes]
Accessing tftp://192.168.0.10/R1-confg...
Loading R1-confg from 192.168.0.10: !
[OK - 561 bytes]
2. Expand Groups.