0% found this document useful (0 votes)
11 views3 pages

Day 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

Day 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

DAY 3:-

1. Working with Cisco Packet Tracer


 Packet Tracer: A network simulation tool provided by Cisco, used to
simulate networks and devices without the need for physical hardware. It's
commonly used for practice and learning purposes, especially in Cisco
certification courses like CCNA.
Key skills:
 Configuring network devices in a virtualized environment.
 Troubleshooting and simulating real-world network scenarios.
 Creating network topologies and testing configurations.
2. Introduction to Cisco IOS (Internetwork Operating System)
 Cisco IOS is the operating system used in Cisco routers and switches.
Understanding IOS commands and how to configure devices via CLI
(Command Line Interface) is crucial for any networking admin role.
 Basic tasks: Configuring interfaces, routing protocols, and security
features using IOS commands.
Key skills:
 Navigating the IOS command line interface.
 Basic device setup and configuration.
 Implementing and verifying network configurations.
3. Routing
 Routing involves directing data packets between different networks, either
within a local area network (LAN) or across multiple networks (WAN). This
is usually done through routers.
 Routing protocols: Common routing protocols include RIP (Routing
Information Protocol), OSPF (Open Shortest Path First), and EIGRP
(Enhanced Interior Gateway Routing Protocol).
 Static vs Dynamic Routing: Static routing requires manual configuration
of routing paths, while dynamic routing adjusts automatically based on
network conditions.
Key skills:
 Configuring and troubleshooting static and dynamic routing.
 Implementing various routing protocols.
 Optimizing routing paths and convergence times.
4. Switching
 Switching is the process of forwarding data frames between devices within
the same network or LAN. Switches operate at the data link layer (Layer 2)
of the OSI model.
 VLANs (Virtual Local Area Networks): Dividing a physical network into
logical networks for better traffic management and security.
 Spanning Tree Protocol (STP): Ensuring no loops occur in a network
with multiple switches.
 Layer 3 Switching: Combining routing and switching functionality,
enabling more efficient traffic management within a network.
Key skills:
 Configuring and managing VLANs.
 Implementing STP to prevent network loops.
 Troubleshooting common switching issues.
5. Security and Firewall
 Security is a critical aspect of network administration, involving the
implementation of measures to protect the network from threats.
 Firewalls: These are security devices (hardware or software) that control
incoming and outgoing network traffic based on predetermined security
rules. Cisco devices often use ASA (Adaptive Security Appliance) or
Firepower for firewalling.
 Access Control Lists (ACLs): ACLs define rules for allowing or denying
traffic based on IP address, port, or protocol.
 VPNs (Virtual Private Networks): Establish secure communication over
less secure networks (like the internet).
Key skills:
 Configuring basic firewall settings and policies.
 Implementing ACLs to control network access.
 Securing network communications with VPNs.

In a Networking Admin role, you should be able to:


1. Design and Implement Networks: Using tools like Packet Tracer and
GNS3 to simulate and design networks with routers, switches, and other
devices.
2. Configure Devices: Through IOS commands, configure routing,
switching, and security protocols to ensure efficient and secure
networking.
3. Troubleshoot: Identify and resolve network issues, whether they are
connectivity problems, routing errors, or security breaches.
4. Maintain Security: Implement network security measures, including
firewalls, VPNs, and ACLs to protect the network.

DHCP
Dynamic Host Configuration Protocol (DHCP) is a network protocol that
automatically assigns IP addresses and other configuration information to
devices on a network. DHCP allows devices to communicate with each other and
the internet.
DHCP works by sending messages to devices that connect to a network,
providing them with the information they need to communicate. When a device
joins a network, it broadcasts a "DHCP discover" message to request an IP
address and other configuration information. DHCP then automatically assigns an
IP address and other configuration parameters to the device.
DHCP can be used on small local networks and large enterprise networks. It's an
improvement on an older protocol called BOOTP.

HTTP
HTTP, or Hypertext Transfer Protocol, is a set of rules that allows web browsers
and web servers to communicate with each other. It's a fundamental part of the
World Wide Web, and is used to load web pages using hypertext links.

HTTPs
HTTPS stands for Hypertext Transfer Protocol Secure, a protocol that encrypts
data sent between a web browser and a website. HTTPS is the secure version of
HTTP, the primary protocol used to send data between a web browser and a
website.
HTTPS is important for sites that send sensitive information, such as credit card
information, billing addresses, and passwords. It ensures that the data
transmitted between the user and the website cannot be intercepted or
tampered with by unauthorized parties.
HTTPS URLs begin with "https://" and use port 443 by default. To enable HTTPS, a
web server administrator must create a public key certificate for the web server.
HTTPS can positively impact the user experience by fostering a sense of
trust. Users are increasingly aware that they should look for the padlock symbol
to confirm whether a website is safe.

You might also like