Study Guide Cisco Certified Network Associate 3.0 CCNA 3.0 Version 1

64 563 0
Study Guide Cisco Certified Network Associate 3.0 CCNA 3.0 Version 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

640-607 640-607 Study Guide Cisco Certified Network Associate 3.0 CCNA 3.0 Version www.testking.com -1- 640-607 CCNA FOUNDATIONS OSI Model Upper Layer Lower Layers Data Link Layer Tasks Network Layer Tasks Transport Layer Tasks LAN Physical Layer Implementations CISCO DEVICE BASICS 10 Command Modes 10 Basis Switch Commands 11 Switch Configuration using the Command Line 11 Basic Router Information 12 Common CLI Error Messages 12 Basic Router Commands 13 Advance Router Configuration 14 OBTAINING NETWORK INFORMATION 16 CDP 16 CDP Related Commands 16 Telnet Application 17 Router Basics 18 Router components 18 CATALYST 1900 SWITCH 21 Functions 21 Frame Decisions 21 Avoiding Loops 21 Spanning Tree Protocol 22 Spanning Tree Path Cost 23 Spanning Tree Protocol elections 23 Spanning Tree States 24 How Frame Are Sent 24 Switch communication 25 Catalyst 1900 Switch Configuration 25 Configuration commands 26 Virtual LANs 27 TCP/IP 28 TCP Connection Establishment 29 Windowing 29 TCP/IP Internet Layer 29 ICMP 30 IP Addressing Basics 30 www.testking.com -2- 640-607 Address Classes 31 Broadcast 32 Subnetting 33 Configuring IP Addresses 35 ROUTING 101 36 Route Selection 36 Routing Protocols 37 Administrative Distance 37 Routing Protocol Classes 37 RIP 40 IGRP 40 ACCESS LISTS 42 Access List Types 42 Access List Guidelines 42 Standard IP Access List 43 Extended IP Access Lists 45 Verifying and Monitoring Access Lists 46 NOVELL INTERNETWORK PACKET EXCHANGE (IPX) PROTOCOL SUITE 47 IPX 47 Encapsulation Types 48 CISCO AND WIDE AREA NETWORK (WAN) 50 WAN Connection Types 50 WAN Layer Encapsulation 50 HDLC 51 PPP 51 ISDN 52 FRAME RELAY 54 LMI 54 Subinterface Connection Types 55 Obtain Frame Relay Information 56 LABS 57 Lab – Configure a name and passwords for a router 57 Lab – Configuring Router Interfaces 59 Lab – Configuring Static Routes 61 Lab – Configuring RIP and Restoring Configuration 62 Lab – Configuring IGRP 63 Lab – Access List 64 www.testking.com -3- 640-607 CCNA Foundations OSI Model One of the keys to understanding Cisco is the OSI model The OSI model permits people to understand how internetwork works and it serves as a guideline or framework for creating and implementing network standards, devices, and internetworking schemes Some of the advantages of the OSI model include: • • • It allows for the breaking down of complex operation into simple elements; Enables engineers to specialize the design and development of modular elements; and It provides standards for plug and play and multivendor integration The OSI reference model has layers: Application Appliction (Upper) Layers Presentation Session Transport Layer Network Layer Data Link Layer Media Access Control (MAC) Sublayer Presentation Layer Data Flow Layers Logical Link Control (LLC) Sublayer To assist in remembering the OSI model layers in the proper area you might want to try either of the following sentences: All Application People Presentation Seem Session To Transport Need Network Data Data Link Processing Physical www.testking.com -4- 640-607 Or from the bottom of the OSI model to the top Please Do Not Throw Sausage Pizza Away Upper Layer Upper Layers – The upper layers of the OSI model deal with user interface, data formatting, and application access Specifically these layers the following: Application Layer – this is where the user/applications access the network Presentation layer – determines how data is presented and special processing such as encryption Session Layer – controls the establishment the establishing, managing and terminating communications sessions between presentation layers Lower Layers The four lower layers are in charge of how data is transferred across a physical wire, through internetwork devices, to desired end station, and finally to the application on the other side Specifically these layers the following: Transport – provides for both reliable and unreliable delivery and error correction before retransmit Network – provides logical addressing which device us for path destinations Data Link – Combines bits into bytes and bytes into frames, provided access to media using MAC addresses, and error detection Physical – responsible to move bits between devices and specifies voltage, wire speed and pin-out cables Encapsulation The method of passing data down the stack and adding headers and trailers is called encapsulation For the each of the lower four layers the unit are as follows: Transport Network Data Link Physical Segment Packet Frame Bits www.testking.com -5- 640-607 Collision vs Broadcast Domains Collision domain is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals Broadcast Domains is a group of devices in the network that receive one another’s broadcast messages Data Link Layer Tasks The data link layer provides network traffic with information on where it is to go and what it is to once it gets there In order to provide this functions the IEEE data link layer is defined into two sublayers: Media Access Control (MAC) Sublayer (802.3) – This sublayers is responsible for how the data is transported over the physical wire This is the part of the data link layer that communicates downward to the physical layer The MAC address is a 48-bit address expressed as 12 hexadecimal digits The first 24 bits or hexadecimal digits of the MAC address contain a manufacturer identification or vendor code This can also be called the Organizationally Unique Identifier (OUI) The last 24 bits or hexadecimal are administered by each vendor and often represents the interface serial number Logical Link Control (LLC) Sublayer (802.2) – This sublayer is responsible for logically identifying different protocol types and then encapsulating them in the order to be transmitted across the network The data link layer has two types of devices: bridges and Layer switches Layer switching is hardware-based bridging When a bridge hears a frame on the network it must decide to filter, flood or copy the frame onto another segment This is decided as follows: If the destination in on the same segment it is filtered That is, if the frame is from the same segment then it is blocked from going onto segments If the destination is on another segment it is forwarded to the proper segment If the destination is not known to the bridge then the bridge will flood the frame That is, it is sent to all other segment other than the originating one Bridged/switched networks have the following characteristics: Each segment is a collision domain www.testking.com -6- 640-607 All devices connected to the same bridge/switch are part of the same broadcast domain All segments must use the same data link layer implementation: Ethernet and all Token Ring In switched environment, there can be one device per segment, and each device can send frames at the same time, thus allowing the primary pathway to be shared Network Layer Tasks The network layer defines how to transport traffic between devices that are not locally attached in the same broadcast domain In order for this to occur the following is required: A logical address associated with the source and destination stations A path through the network to reach the desired destination The logical network address consists of two parts: one part to identify the network and the other to uniquely identify the host Routers work at the network level The router performs the following tasks: • • • • • • • • Routers identify networks and provide connectivity Router not forward Layer broadcast or multicast frames Routers attempt to determine the optimal path through a routed network based on routing algorithms Routers strip Layer frames and forward packets based on Layer destination address Routers map a single Layer logical address to a single network device; therefore, routers can limit or secure network traffic based on identifiable attributes within each packet These options, controlled via access lists, can be applied to inbound or outbound packets Routers can be configured to perform both bridging and routing functions Routers provide connectivity between different virtual LANs (VLANs) in a switched environment Routers can be used to deploy quality of service parameters for specified types of network traffic www.testking.com -7- 640-607 Transport Layer Tasks For two devices to communicate within a network a connection or session must be established The transport layer defines the guidelines for the connection between the two devices The transport layer define the following functions: • Allows end stations to assemble and disassemble multiple upper-layer segments into the same transport layer data stream This is accomplished by assigning upper-layer application identifiers • Allows applications to request reliable data transport between communicating and systems This is done through a connection-oriented relationship between the communicating end systems to accomplish the following: o Ensure the segments delivered will be acknowledged back to the sender o Provide for retransmission of any segments that are not acknowledged o Put segments back into their correct sequence order at the receiving station o Provide congestion avoidance and control LAN Physical Layer Implementations Cabling exist at the Physical Layer of the OSI model The CCNA exam focus on the Ethernet as the physical and data link connections The term Ethernet refers to a family of LAN implementations The three major categories are: Ethernet (DIX) and IEEE 802.3 – this operates at 10 Mbps over coaxial cable, UTP and fiber 100 Mbps Ethernet (IEEE 802.3u) – this is also known as the Fast Ethernet that operates over UTP or fiber 1000 Mbps Ethernet – this is known as the Gigabit Ethernet that operates at 1000 Mbps over fiber www.testking.com -8- 640-607 Ethernet Cabling Specifications Cable 10Base5 10BaseT 100BaseTX 100BaseFX Coax Thick Cat 3,4,5 UTP, pair Cat UTP, pair Multimode fiber Maximum Segment Length 500 meters 100 meters Topology Connector Bus Star AUI RJ-45 100 meters Star RJ-45 400 meters Point-to-point Duplex media interface connector (MIC) ST www.testking.com -9- 640-607 Cisco Device Basics When a switch or a router is first started operations occur: Step 1: The power on self-test (POST) is performed The device finds hardware and performs hardware checking routines Step 2: After the hardware is confirmed functional, the start up routine is performed The switch/router looks for and loads the operating system software Step 3: After the operating system is loaded, the device will find and apply configuration settings that are required for network operations Command Modes Cisco IOS software uses a command-line interface as its traditional console environment There is two default access levels: user EXEC level and privileged EXEC level The user EXEC level allows user access to a limited number of basic monitoring commands Privileged EXEC level provides access to all router commands This can be passwordprotected to allow only authorized users to configure or maintain the router When a device is in EXEC mode, this is represented by the > symbol The following represents this: hostname> More commands are accessible from the privilege EXEC mode, to change the device to this mode you would issue the enable command The switch or router prompt will change to he following: hostname# To return to the user EXEC mode you will need to type disable www.testking.com -10- 640-607 Cisco and Wide Area Network (WAN) WANs make data connections across a broad geographic area Companies use WAN to connect various company sites to facilitate communication between distance offices As a result you must use line from a service provider WAN Connection Types There are three general connections types that can be selected from: Leased line – a leased line, as called point-to-point or dedicated connection, provides a single connection from the customer location through the service provider to the remote company location This line is not shared (and has a guarantee bandwidth) but they can be very expensive Circuit switched – A dedicated link is provided between the sender and receiver location for the duration of the communication This are often used for WAN usage is only occasional Packet switched – Packet switched is a WAN switching method that network devices share a single point-to-point link to transport data (broken down into packets) from source to destination across carrier network To provide end-to-end connectivity is done by virtual circuits (VC) Packet switching offers service like leased line, except with a shared line, which lowers the cost WAN Layer Encapsulation WAN has a number of encapsulation types that can be used This include: • Cisco High-Level Data Link Control (HDLC) – the default encapsulation type for point-to-point dedicated links and circuit-switched connections • Point-to-Point Protocol (PPP) – this provides router-router and host-to-network connections over synchronous and asynchronous circuits It works with both IP and IPX It has built in security features such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) • Serial Line Internet Protocol (SLIP) – is the standard point-to-point serial connections for TCP/IP PPP has generally replace SLIP www.testking.com -50- 640-607 • X.25/Link Access Procedure, Balance (LAPB) – a standard that controls connections between DTE and DCE • Frame Relay – is the industry standard for switched data link protocol that handles virtual circuits This is the next generation of X.25 • Asynchronous Transfer Mode (ATM) – the international standard for cell relay in which multiple services types are conveyed in fixed-length cells HDLC As stated earlier Cisco has its own version of HDLC Cisco HDLC frame includes a proprietary type field that is used to indicate protocol This makes possible multiple network layer protocols to share the same serial link To enable this use the following command: router(config-if)#encapsulation hdlc PPP PPP is a data link layer protocol with network services As a result PPP can be broken into sublayers: data link layer and physical layer PPP use Network Control Program (NCP) to encapsulate multiple protocols PPP session consists of the three stages: Link Establishment Authentication Phase (optional) Network layer protocol phase To enable PPP authentication you will use the following commands: router(config)#hostname {name} The router must have name {name} will be the name you select for the router If you wanted to call your router testking you would use the following command: router(config)#hostname testking www.testking.com -51- 640-607 Next you need to provide the router with the name and password that should be expected from the remote router You would use the following command: testking(config)#username {name} password {password} Both parameters are case sensitive The final step is to configure PPP authentication The command would be as follows: testking(config-if)#ppp authentication {chap|chap pap|pap chap|pap} ISDN Integrated Services Digital Network (ISDN) is a digital service designed to run over existing telephone networks ISDN can support both data and voice simultaneously ISDN encompasses the OSI Physical, Data Link, and Network Layers ISDN networking can provide up to 128 Kbps with a PPP Multilink connection to corporate networks or the Internet A Basic Rate Interface (BRI) connection can also be used as a backup line in case the primary link goes down In this case you have to set the desirability of the ISDN link to be very low In other words only use if there is no other way ISDN has the following benefits over standard telephone connections: • • • Data transfer is faster than typical modems Call setup is faster ISDN can carry voice, video, and data traffic ISDN Protocols These protocols deal with ISDN issues: • • • E – Specifies ISDN on the existing telephone network I – Specifies Concepts, terminology, and Services Q – Specifies switching and signaling ISDN Function Groups Devices connected to the ISDN network are known as terminals and have the following types: www.testking.com -52- 640-607 • • TE1 – Terminal Equipment type understands ISDN standards Such as a BRI Interface on a router TE2 – Terminal Equipment type predates ISDN standards To use a TE2, you must have a Terminal Adapter (TA) ISDN Reference Points ISDN uses four different reference points to define logical interfaces They are as follows: • • • • R – Defines the reference point between non ISDN equipment and a TA S – Defines the reference point between user terminals and an NT2 T – Defines the reference point between NT1 and NT2 devices U – Defines the reference point between NT1 devices and Line Termination Equipment (North America Only) ISDN offers the following benefits: • • • • Full-time connectivity is spoofed on routers using DDR SOHO sites can be cheaply supported Can be used as a backup for leased lines Using modem cards can eliminate modem racking ISDN can either be Basic Rate ISDN (BRI) or Primary Rate ISDN (PRI) BRI is 64 Kbps B Channels for data and one 16 Kbps D Channel for link management and connects to NT1 for 4-wire connection PRI is 23 B Channels and D Channel in the US or 30 B Channel and D Channel in Europe Occasionally when configuring ISDN you will need to configure a Service Profile ID (SPID) A SPID is a series of characters which can look like phone numbers These numbers will identify your connection to the Switch at the CO The SPIDs are processed during each call setup operation www.testking.com -53- 640-607 Frame Relay Frame relay is a fast WAN protocol that operates at the Physical and Data Link layers (mostly Data Link layer) of the OSI model Frame relay is used between DTE and DCE devices Uses Packet Switching DTE consists of terminals, PC’s, routers and bridges, all of which are customer owned end node devices The service provider owns DCE devices such as packet switchers Frame Relay uses Permanent Virtual Circuits (PVCs) Data Link Connection Identifier (DLCI) is used to identify connection Frame Relay offers speeds between 56 Kbps and 2,078 Mbps However, the default setting for a serial DCE interface is T1 Frame Relay uses a CRC, bad packets are discarded and the receiving station requests re-transmission of any missing frames Data Link Connection Identifiers (DLCI) – Used to identify the virtual circuits DLCIs can be set to a number between 16 and 1007 LMI Local Management Interfaces (LMI) – Provide information about the DLCI values and the status of virtual circuits The default is Cisco but there are possible settings: • • • Cisco (Default) ANSI Q933a To set up frame relay on an interface just set the encapsulation to frame-relay Frame relay encapsulation can either be Cisco (Default) or IETF You must use Cisco encapsulation to connect two Cisco routers or IETF if a third party router is involved Frame Relay configuration is done in the interface configuration mode Although LMI type is configurable, the Cisco router will try to autosense which LMI type the switch is using: router(config-if)#encapsulation frame-relay {cisco|ietf} To assign a DLCI to an interface you would type: router(config-if)#frame-relay interface-dlci {number 16-1007} To set the LMI type you enter: router(config-if)#frame-relay lmi-type {cisco|ansi|q933a} www.testking.com -54- 640-607 A keepalive interval must be set to enable LMI on an interface This is 10 seconds by default and can be set by typing: router(config-if)#frame-relay keepalive {number of seconds} Frame Relay Maps The Frame Relay Map tells the network protocol how to get from a specific protocol and address pair to the correct DLCI There are two ways to make this happen, you can use the frame-relay map command or you can use the inverse-arp function The “frame-relay map” command can be used to show which routers are reachable router(config-if)#frame-relay inverse-arp {protocol} {dlci} router(config-if)#frame-relay map {protocol} {protocol address} {dlci} [broadcast] [cisco|ietf] With frame-relay you can use subinterfaces to allow multiple virtual circuits on a single serial interface and each subinterface can be treated as a separate interface You use the interface s0.interface number command: router(config-if)#interface s0.{subinterface-number} {point-to-point|multipoint} Subinterface Connection Types You can configure subinterfaces to support the following connection types: • Point-to-point – A single subinterface is used to establish one PVC connection to another physical interface on a remote router Each interface would be on the same subnet and have a single DLCI Each point-to-point connection is its own subnet and act like a leased line • Multipoint – A single subinterface is used to establish multiple PVC connections to multiple physical interfaces on a remote router All participating interfaces are in the same subnet and each interface would have it’s own DLCI The subinterface acts like a NBMA network and broadcasts are subject to split horizon rules It is worthwhile creating a subinterface with a number that matches the DLCI identifier Committed Information Rate (CIR) – the rate, in bits per second, at which the Frame Relay switch agrees to transfer data www.testking.com -55- 640-607 Obtain Frame Relay Information To display Frame Relay information you could use the following: show frame-relay ip - Shows frame relay ip statistics show frame-relay lmi - Shows LMI statistics show frame-relay map - Shows map table show frame-relay pvc - Shows PVC Statistics Also DLCI Info show frame-relay route - Shows frame relay routes show frame-relay traffic - Shows protocol statistics The show Interface command also shows Frame Relay information on a specific interface The show ip route command will also show which routers are reachable www.testking.com -56- 640-607 Labs Lab – Configure a name and passwords for a router You have been tasked to change some of the configurations on one of your company’s router Specifically you tasks are: Change the name of the router to test_king Restrict access to privileged EXEC mode The password should be Paris Task You will need to log onto your router You should see a prompt that looks like: Router> In order to configure parameters you will need to be the privileged EXEC mode Therefore the first step will be to use the enable command Router>enable Router# It is now necessary to enter the global configuration mode To this you will need to the following: Router#config terminal Now you are ready to change the name of your router You will need to the following: Router(config)#hostname test_king test_king(config)# Task You now need to configure a password for the router You will need to the following: test_king(config)#enable password Paris test_king(config)# You know you need to backup these configuration changes to the startup configuration You will need to the following: www.testking.com -57- 640-607 test_king(config)#copy running-configuration startup-configuration test_king(config)# You have completed the tasks assigned to you It is now time to exit the global configuration mode and the privilege EXEC mode You will need to the following: test_king(config)#exit test_king#disable test_king>exit You report back to your supervisor and he says that he forgot to tell you that he also wanted an enable secret password (Denmark) and he wanted a copy of the most current running configuration on the TFTP server (10.1.1.1) You will need to log onto your router You will need to begin with the enable secret password You return and take the following actions to start: test_king> test_king>enable Password:***** test_king#config t test_king(config)# Now it is time to configure the new secret password You will need to the following: test_king(config)#enable secret Denmark test_king(config)# Now you need to save this change to the startup configuration and then copy the running configuration to TFTP server You will need to the following: test_king(config)#copy running startup test_king(config)#copy running-config tftp Address or name of remote host []? 10.1.1.1 Destination filename [running-config]? test_king.fg test_king(config)# Now it is time to exit the router You will need to the following: test_king(config)#exit test_king#disable test_king>exit www.testking.com -58- 640-607 Lab – Configuring Router Interfaces Day of your new job has come and gone You are feeling pretty good about how things have been going You know a new day brings new challenges and you know you are up for it You boss says he would like you to work on the router test_king again You wants you to configure the interfaces on it On the Ethernet interface he would like the IP address 192.5.5.1 and for the serial interface he needs the IP address 201.100.11.1 He reminds you that this is a 56K connection You set out to complete your two tasks You start with the Ethernet interface You take the following action: test_king>enable Password:******* test_king#config terminal test_king(config)#interface ethernet test_king(config-if)#ip address 192.5.5.1 255.255.255.0 The interface no has an IP address configured It is now required to enable the interface You would need to take the following action: test_king(config-if)#no shutdown test_king(config-if)#exit test_king(config)# The Ethernet Interface is now configured and enabled Time to configure the serial interface You would need to take the following action: test_king(config)#interface serial test_king(config-if)#ip address 201.100.11.1 255.255.255.0 test_king(config-if)#bandwidth 56 test_king(config-if)#no shutdown test_king(config-if)#exit test_king(config)# You remember that now that you have changed the running configuration you will need to back it up to the NVRAM (startup configuration) and to the TFTPP server You would need to take the following action: test_king(config)#copy running startup test_king(config)#copy running-config tftp Address or name of remote host []? 10.1.1.1 Destination filename [running-config]? test_king.fg www.testking.com -59- 640-607 test_king(config)#exit test_king#disable test_king>exit www.testking.com -60- 640-607 Lab – Configuring Static Routes Now it is time to configure some static routes for another one of your companies routers (test_king2) The two destinations are 204.204.7.2 and 204.204.7.1 To reach these destinations the traffic will need to traverse 210.100.13.1 and 210.100.13.3 respectively The enable secret password for test_king2 is Sweden1a You set off to complete the necessary work test_king2>enable Password:******** test_king2#config t test_king2(config)#ip route 204.204.7.2 255.255.255.0 210.100.13.1 test_king2(config)#ip route 204.204.7.1 255.255.255.0 210.100.13.3 As is standard for your company you now backup the new configuration test_king2(config)#copy running startup test_king2(config)#copy running-config tftp Address or name of remote host []? 10.1.1.1 Destination filename [running-config]? test_king2.fg test_king(config)#exit test_king#disable test_king>exit Your boss has changed his mind he want both static routes removed from this test_king2 and the backups to reflect this action You take the following actions: test_king2>enable Password:******** test_king2#config t test_king2(config)#no ip route 204.204.7.2 255.255.255.0 210.100.13.1 test_king2(config)#no ip route 204.204.7.1 255.255.255.0 210.100.13.3 test_king2(config)#copy running startup test_king2(config)#copy running-config tftp Address or name of remote host []? 10.1.1.1 Destination filename [running-config]? test_king2.fg test_king(config)#exit test_king#disable test_king>exit www.testking.com -61- 640-607 Lab – Configuring RIP and Restoring Configuration Your boss has decided to configure RIP on test_king He turns to you to complete this task for him He reminds you to remove the static routes that have been configured You have just completed removing the static routes off of test_king2 so you are confident that you can complete this task quickly test_king>enable Password:******* test_king#config terminal test_king(config)#no ip route 172.16.30.0 255.255.255.0 test_king(config)#no ip route 172.16.40.0 255.255.255.0 test_king(config)#no ip route 172.16.50.0 255.255.255.0 test_king(config)#router rip test_king(config-router)#network 192.5.0.0 test_king(config-router)#exit You decided that a change like this should definitely backup this new configuration You need to take the following actions: test_king(config)#copy running startup test_king(config)#copy running-config tftp Address or name of remote host []? 10.1.1.1 Destination filename [running-config]? test_king.fg test_king(config)#exit test_king#disable test_king>exit A month later your boss says that something has gone wrong with test_king and it needs to be restored You first thought is “no problem, I’ll just copy startup configuration to the running configuration Your boss must be reading your mind and tells you that the startup configuration is corrupted You know that you will need to copy the file from the TFTP server You need to take the following actions: test_king>enable Password:******* test_king# test_king#copy tftp running-config Address or name of remote host []? 10.1.1.1 Destination filename [running-config]? test_king.fg Accessing tftp://10.1.1.1 (via Ethernet): !! [OK – 487/4096 bytes] 487 bytes copied in 5.400 secs (97 bytes/sec) test_king# www.testking.com -62- 640-607 Lab – Configuring IGRP A test network has been established to test possible future configurations You decide to use experiment with IGRP You select tk_a1 to be configured tk_a1 will be advertising both 210.204.0.0 and 172.16.0.0 tk_a1 has no passwords configured, it’s a test network after all, and belongs to autonomous system 13 You need to take the following actions: tk_a1>enable tk_a1#config terminal tk_a1(config)#router igrp 13 tk_a1(config-router)#network 210.204.0.0 tk_a1(config-router)#network 172.16.0.0 tk_a1(config-router)#exit tk_a1(config)#exit tk_a1#copy running-configuration startup-configuration www.testking.com -63- 640-607 Lab – Access List You have been tasked to prevent ICMP traffic from 204.204.7.2 from reaching test_king All other IP traffic is to be permitted To met these objectives you take the following actions: test_king>enable Password: ******* test_king#config t test_king(config)#access-list 103 deny icmp 204.204.7.2 0.0.0.0 any test_king(config)#access list 103 permit ip any any test_king(config)#interface Ethernet 0/0 test_king(config)#ip access-group 101 out test_king(config)#exit You decide to confirm this access list You take the following actions and receive the following results: test_king#show access-list 103 Extended IP access list 101 deny icmp host 204.204.7.2 any permit ip any any Your boss calls and tells you that he just wanted to give you some practice with access list and now wants you to remove the access list As a result, you take the following actions: test_king#config t test_king(config)#no access-list 101 test_king(config)#exit test_king#exit test_king> The end result is no change to the running configuration Therefore there is no need to back it up www.testking.com -64- ... process 17 2 17 2 .16 .2 .16 0 255.255.255 .19 2 17 2 .16 .2 .12 8 17 2 .16 .2 .19 1 17 2 .16 .2 .12 9 17 2 .16 .2 .19 0 Step Step Step Step Step Step Step Step Step 10 1 011 00 11 111 111 10 1 011 00 10 1 011 00 10 1 011 00 10 1 011 00 16 16 0... 10 1 011 00 16 16 0 00 010 000 11 111 111 00 010 000 00 010 000 00 010 000 00 010 000 00000 010 11 111 111 00000 010 00000 010 00000 010 00000 010 10 100000 11 000000 10 000000 10 111 111 10 0000 01 1 011 111 0 Write the 32 bit... of Subnets 14 30 62 12 6 254 510 10 22 2046 4094 819 0 16 382 Number of Hosts 16 382 819 0 4094 2046 10 22 510 254 12 6 62 30 14 Class C Subnet Table Number of Bits Subnet Mask 255.255.255 .19 2 255.255.255.224

Ngày đăng: 22/10/2013, 17:15

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan