CCNA
CCNA
c Multicast Addresses
This method splits the 48-bit MAC address into two 24-bit parts
and inserts fffe in between, creating a 64-bit interface
identifier.
The Universal/Local (U/L) bit is flipped to indicate that the
address is a globally unique address.
Example conversion: For a MAC address 00:1A:2B:3C:4D:5E, the
EUI-64 address would be 001A:2BFF:FE3C:4D5E.
Summary
Unicast Addresses: Identify a single interface.
Global Unicast: Routable on the global internet.
Unique Local: Local communications within an organization.
Link-Local: Communication within a single link.
Anycast Addresses: Identifies multiple interfaces, with
data routed to the nearest one.
Multicast Addresses: Used for delivering packets to multiple
interfaces.
Modified EUI-64: Method for creating an IPv6 address from a
MAC address.
Understanding these IPv6 address types is crucial for
designing and managing IPv6 networks effectively.
1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
Windows
Using Command Prompt:
Press Win + R, type cmd, and press Enter to open the Command Prompt.
Type ipconfig and press Enter.
The command will display the IP configuration for all network adapters.
ipconfig
Look for the following details:
IPv4 Address
Subnet Mask
Default Gateway
DNS Servers
Using GUI:
Using GUI:
2.4 GHz Band: Channels 1, 6, and 11 are commonly used because they
do not overlap, reducing the likelihood of interference from
adjacent channels.
5 GHz Band: There are many more channels available in the 5 GHz band,
with several non-overlapping channels, allowing for better performance
and less interference.
1.11.b SSID (Service Set Identifier)
The SSID is the name assigned to a Wi-Fi network. It is used to identify
and differentiate one wireless network from another. Devices use the SSID
to connect to the desired network.
Broadcast SSID: The SSID can be broadcast by the access point so that it
appears in the list of available networks on client devices.
Hidden SSID: The SSID can also be hidden, meaning it won't appear in the list
of available networks. Clients need to know the SSID in advance to connect.
1. Server Virtualization
Concept: Server virtualization involves dividing a physical
server into multiple virtual servers, each running its own
operating system and applications. This maximizes the
utilization of physical resources and reduces costs.
Example Technologies: VMware ESXi, Microsoft Hyper-V, KVM
2. Containers
Concept: Containers are a lightweight form of virtualization
that package an application and its dependencies together.
Containers share the host OS kernel but run isolated from each
other.
Example Technologies: Docker, Kubernetes
3. Virtual Routing and Forwarding (VRFs)
Containers
Frame Flooding
Day 07
Topology
sw110
1 e1
0- /2
e 1/ -3
3 e1
2- /2
/ -3
e1
e2/0-1 e2/0-1
sw101 sw102
Objective
Configure VLANs 2000 and 2001 on all three switches and ensure
proper communication across the switches using Ethernet interfaces.
Step-by-Step Configuration
1. Configure VLANs on SW110
2. Configure VLANs on SW101
3. Configure VLANs on SW102
Verification
Verify VLAN Configuration
On SW110
SW110# show vlan brief
On SW101
SW101# show vlan brief
On SW102
SW102# show vlan brief
Verify Trunk Ports
On SW110
SW110# show interfaces trunk
On SW101
SW101# show interfaces trunk
On SW102
SW102# show interfaces trunk
Verify VLANs on Access Ports
On SW110
SW110# show interfaces status
On SW101
SW101# show interfaces status
On SW102
SW102# show interfaces status
Explanation
VLAN Configuration:
VLANs 2000 and 2001 are created and named on each switch.
Trunk ports are configured on the uplink interfaces to allow
VLAN traffic between switches.
Access ports are assigned to VLANs 2000 and 2001 for end devices.
Verification:
The show vlan brief command verifies that VLANs are created and
active.
The show interfaces trunk command verifies that trunk links are
correctly configured.
The show interfaces status command checks the status and VLAN
assignment of access ports.
2.1 Configure and verify VLANs (normal range) spanning multiple
switches
2.1.a Access ports (data and voice)
2.1.b Default VLAN
2.1.c InterVLAN connectivity
Topology
sw110
1 e1
/0- /2
e 1 -3
e1
2-3 /2
/ -3
e1
e2/0-1 e2/0-1
sw101 sw102
2.1 Configure and verify VLANs (normal range) spanning multiple switches
2.1.a Access ports (data and voice)
2.1.b Default VLAN
2.1.c InterVLAN connectivity
Updated Network Topology
VLANs
VLAN 2000 (Sales)
VLAN 2001 (Engineering)
VLAN 100 (Voice)
2.1 Configure and verify VLANs (normal range) spanning multiple switches
Step-by-Step Configuration
1. Configure VLANs on SW110
2. Configure VLANs on SW101
3. Configure VLANs on SW102
2.1.a Access Ports (Data and Voice)
Configure Access Ports for Data and Voice on SW110
Configure Access Ports for Data and Voice on SW101
Configure Access Ports for Data and Voice on SW102
2.1.b Default VLAN
Verify and Configure Default VLAN on SW110, SW101, and SW102
By default, all ports are in VLAN 1, which is the default VLAN. If needed,
we can verify and configure it.
2.1.c InterVLAN Connectivity
Configure InterVLAN Routing on SW110 (Assuming it is a Layer 3 Switch or Router
on a Stick)
For InterVLAN routing, you typically need a Layer 3 device. If SW110 is a Layer 3
switch or we use a router, we can configure InterVLAN routing.
Verification
Verify VLAN Configuration
SW110# show vlan brief
SW101# show vlan brief
SW102# show vlan brief
Verify Trunk Ports
SW110# show interfaces trunk
SW101# show interfaces trunk
SW102# show interfaces trunk
Verify Access Ports
SW110# show interfaces status
SW101# show interfaces status
SW102# show interfaces status
Verify InterVLAN Routing
SW110# show ip interface brief
SW110# show ip route
Ping Test for InterVLAN Connectivity
# From a device in VLAN 2000
ping 192.168.201.1
# From a device in VLAN 2001
ping 192.168.200.1
# From a device in VLAN 100
ping 192.168.200.1
ping 192.168.201.1
Summary
2.2.b 802.1Q:
Set the native VLAN to 100 on all trunk ports using the command
switchport trunk native vlan 100.
2.3 Configure and verify Layer 2 discovery protocols (Cisco
Discovery Protocol and LLDP)
Layer 2 Protocols
Layer 2 protocols play a crucial role in the functioning and management of switches
within a network. Here, we will cover the following protocols:
CDP and LLDP
Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are network
discovery protocols used to share information about directly connected devices.
CDP (Cisco Discovery Protocol)
CDP is a Cisco proprietary protocol used to discover and share information about
other Cisco devices connected to the same network.
Enabling CDP:
conf t
cdp run
Disabling CDP:
conf t
no cdp run
Enabling CDP on an Interface:
conf t
interface <interface-id>
cdp enable
conf t
interface <interface-id>
no cdp enable
Enabling LLDP:
conf t
lldp run
Disabling LLDP:
conf t
no lldp run
Enabling LLDP on an Interface:
conf t
interface <interface-id>
lldp transmit
lldp receive
Disabling LLDP on an Interface:
conf t
interface <interface-id>
no lldp transmit
no lldp receive
conf t
interface range <interface-id-range>
channel-group <group-number> mode active
Example:
conf t
interface range GigabitEthernet0/1 - 2
channel-group 1 mode active
Modes:
conf t
interface range <interface-id-range>
channel-group <group-number> mode on
Example:
conf t
interface range GigabitEthernet0/1 - 2
channel-group 1 mode on
Example: 10 20
3 e1
conf t e 1/
2- /2
- 3
conf t
spanning-tree mode pvst
Rapid PVST+ (Rapid Per-VLAN Spanning Tree Plus):
Topology
sw110
e0/0 0
e0/
Enabling Rapid PVST+: -1 e1
1 /0 /2
e -3
conf t 10
1
20
2
Root Bridge
The root bridge is the logical center of the Spanning Tree topology. It is the
bridge with the lowest bridge ID (priority + MAC address). All path
calculations are based on the root bridge.
Root Port
The root port is the port on a non-root switch that has the lowest cost
path to the root bridge. Each non-root switch has one root port.
Designated Port
The designated port is the port on each segment that has the lowest path
cost to the root bridge. This port is responsible for forwarding frames
towards the root bridge.
Alternate Port
The alternate port is a backup to the root port and provides an alternate
path to the root bridge in case the root port fails.
Example:
Assume SW110 is the root bridge. Here is how ports might be
designated:
SW110:
All ports are designated ports since it is the root bridge.
SW101:
The port connected to SW110 is the root port.
The port connected to SW102 is either designated or alternate
depending on path cost.
SW102:
Learning: The port does not forward frames but can learn MAC
addresses and process BPDUs.
Forwarding: The port forwards frames, learns MAC addresses,
and processes BPDUs.
Loop Guard
BPDU Guard
BPDU Guard disables the port if a BPDU is received. It is typically
used on ports configured with PortFast to prevent topology loops.
SW110# configure terminal
SW110(config)# interface Ethernet0/4
SW110(config-if)# spanning-tree bpduguard enable
SW110(config-if)# end
Part 2: PortFast, Root Guard, Loop Guard, BPDU Filter, and BPDU Guard
Explanation
Root Bridge, Root Port, Designated Port, Alternate Port: These are
roles and selections made by the Spanning Tree Protocol to prevent
loops and ensure a loop-free topology.
Root Guard, Loop Guard, BPDU Filter, and BPDU Guard: These features
provide additional protection and stability to the network by
preventing unintended changes to the topology and ensuring
consistent BPDU handling.
Day 09