<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[rebar]]></title><description><![CDATA[rebar]]></description><link>https://rebar.it</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 16:02:04 GMT</lastBuildDate><atom:link href="https://rebar.it/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[CCNA 200-301 Study (1)]]></title><description><![CDATA[CCNA Volume 1
Introduction to TCP/IP
Network Protocol




Protocol CharacteristicDescription



Message formatWhen a message is sent, it must use a specific format or structure. Message formats depend on the type of message and the channel that is us...]]></description><link>https://rebar.it/ccna-200-301-study-1-1</link><guid isPermaLink="true">https://rebar.it/ccna-200-301-study-1-1</guid><dc:creator><![CDATA[rebar hama]]></dc:creator><pubDate>Sat, 07 Feb 2026 14:24:06 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1521542464131-cb30f7398bc6?ixlib=rb-4.0.3&amp;q=85&amp;fm=jpg&amp;crop=entropy&amp;cs=srgb" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-ccna-volume-1">CCNA Volume 1</h2>
<h2 id="heading-introduction-to-tcpip">Introduction to TCP/IP</h2>
<h1 id="heading-network-protocol">Network Protocol</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Protocol Characteristic</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Message format</strong></td><td>When a message is sent, it must use a specific format or structure. Message formats <em><strong>depend on the type of message and the channel that is used to deliver the message</strong></em>.</td></tr>
<tr>
<td><strong>Message size</strong></td><td>The rules that govern the size of the pieces communicated across the network are very strict. They can also be different, <em><strong>depending on the channel used</strong></em>. When a long message is sent from one host to another over a network, it may be necessary to <em><strong>break the message into smaller pieces in order to ensure that the message can be delivered reliably.</strong></em></td></tr>
<tr>
<td><strong>Timing</strong></td><td>Many network communication <em><strong>functions are dependent on timing</strong></em>. Timing determines the <em><strong>speed</strong></em> at which the bits are transmitted across the network. It also affects when an individual host can send data and the total amount of data that can be sent in any one transmission.</td></tr>
<tr>
<td><strong>Encapsulation</strong></td><td><em><strong>Each message transmitted on a network</strong></em> must include a <strong>header</strong> that contains <u><em><strong>addressing information that identifies the source and destination hosts</strong></em></u>, otherwise it cannot be delivered. <strong>Encapsulation is the process of adding this information to the pieces of data that make up the message</strong>. In addition to addressing, there may be other information in the header that ensures that the message is <u><strong>delivered to the correct application on the destination host.</strong></u></td></tr>
<tr>
<td><strong>Message pattern</strong></td><td>Some <em><strong>messages require an acknowledgment before the next message can be sent.</strong></em> <strong>This type of request/response pattern is a common aspect of many networking protocols</strong>. However, there are other types of messages that may be simply streamed across the network, without concern as to whether they reach their destination.</td></tr>
</tbody>
</table>
</div><h2 id="heading-common-methods-of-data-transmission"><strong>Common Methods of Data Transmission</strong></h2>
<ul>
<li><strong>Electrical signal</strong> transmission is achieved by representing data as <strong>electrical pulses on copper</strong> wire.</li>
<li><strong>Optical signals: t</strong>ransmission is achieved by converting the electrical signals into <strong>light pulses</strong>.</li>
<li><strong>Wireless signal</strong> transmission is achieved by using <strong>infrared, microwave, or radio waves</strong> through the air.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e92b40a4-c42c-4d08-ad26-48ae274253d9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d58a8054-9354-4b57-8dd8-b75dad6c3db6.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>UTP (Unshielded Twisted Pair):</strong> <strong>No shielding</strong>, <strong>cheaper</strong>, more flexible, but less resistant to interference. Used in home and office networks.</li>
<li><strong>STP (Shielded Twisted Pair):</strong> Has shielding to reduce interference, but is more <strong>expensive</strong> and less flexible. Used in industrial or high-EMI environments.</li>
</ul>
<h3 id="heading-types-of-fiber-optic-cables"><strong>Types of Fiber Optic Cables</strong></h3>
<ol>
<li><strong>Single-Mode Fiber (SMF)</strong><ul>
<li>Uses a <strong>single beam of light</strong> (<strong>laser</strong>).</li>
<li>Supports <strong>long distances</strong> (up to 100+ km).</li>
<li>Higher bandwidth but more <strong>expensive</strong>.</li>
</ul>
</li>
<li><strong>Multi-Mode Fiber (MMF)</strong><ul>
<li>Uses <strong>multiple beams of light</strong> (<strong>LED</strong>).</li>
<li>Supports <strong>shorter distances</strong> (up to 2 km).</li>
<li><strong>Cheaper</strong> but has more signal loss due to modal dispersion</li>
</ul>
</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6a996b89-2c43-4dec-b5ee-bd600528e7f2.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-network-documentation">Network Documentation</h1>
<p>Network documentation is essential for managing, troubleshooting, and securing a network. </p>
<h3 id="heading-physical-documentation"><strong>Physical Documentation</strong></h3>
<p>Focuses on hardware and cabling layout.</p>
<p>🔹 Includes:</p>
<p>✔ Network topology diagrams (physical)</p>
<p>✔ Rack elevation and cabling layout</p>
<p>✔ Hardware inventory (routers, switches, firewalls)</p>
<p>✔ Power &amp; cooling systems</p>
<p>✅ Used for troubleshooting hardware, expansion planning, and audits.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/406cec5e-6ed2-4711-93f6-46f01dc34b1c.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-logical-documentation"><strong>📌 Logical Documentation</strong></h3>
<p>Focuses on data flow and network configurations.</p>
<p>🔹 Includes:</p>
<p>✔ Logical network topology diagrams</p>
<p>✔ IP addressing, VLANs, and routing tables</p>
<p>✔ Security policies and firewall rules</p>
<p>✔ Performance and monitoring reports</p>
<p>✅ Helps in troubleshooting, security management, and network planning.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/666b72a2-f9f8-44a3-8f47-03d53b74764b.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-bandwidth-vs-throughput">Bandwidth Vs Throughput</h1>
<p><strong>Bandwidth</strong> is the <strong>capacity of a medium to carry data</strong>. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in the number of bits that (theoretically) can be sent across the media in a second. Common bandwidth measurements are as follows: </p>
<p>Thousands of bits per second (Kbps)</p>
<p>Millions of bits per second (Mbps)</p>
<p>Billions of bits per second (Gbps)</p>
<p>Like bandwidth, <strong>throughput</strong> <strong>measures the transfer of bits across the media over a given period</strong>. However, due to several factors, <strong>throughput does not usually match the specified bandwidth</strong>. Many factors influence throughput, including: </p>
<ul>
<li>The amount of data being sent and received over the connection.</li>
<li>The types of data being transmitted.</li>
<li>The <strong>latency</strong> is created by the number of network devices encountered between the source and the destination.</li>
</ul>
<p><strong>Latency</strong> refers to the amount of time, including delays, for data to travel from one given point to another.</p>
<p><strong>TCP</strong> (<u><strong>Transmission Control Protocol</strong></u>) is a standard protocol that defines how to establish and maintain a network connection through which an application program can exchange data.</p>
<p>Th<strong>e TCP/IP mode</strong>l both defines and references a large collection of protocols that allow computers to communicate.</p>
<p>The name <strong>TCP/IP</strong> is simply the name of the two most common <strong>protocols (TCP and IP</strong>) separated by, which means the model refers to the most preferred protocols.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/05bc2904-ed90-482b-b74c-01d83325836c.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e93dbcc-8560-42bb-826c-d235378423db.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Application Layer:</strong> Refers to interfaces between the network and application software. It also includes authentication services.</p>
<p>Note: The application layer does not define the application itself.</p>
<p><strong>Transport Layer:</strong> Provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmission.  the two most commonly used transport layer protocols are the <strong>Transmission control protocol (TCP)</strong> and the <strong>user datagram protocol (UDP)</strong>.</p>
<p><strong>Network:</strong> Refers to logical addressing, routing, and path determination.</p>
<p><strong>Data Link:</strong> Formats data into frames appropriate for transmission onto some physical medium. Defines rules for when the medium can be used. Defines the means by which to recognize
transmission errors.</p>
<p><strong>Physical:</strong> Defines the electrical, optical, cabling, connectors, and procedural details required for transmitting bits, represented as some form of energy passing over a physical medium.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>TCP</td><td>UDP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Full form</strong></td><td>It stands for <strong>Transmission Control Protocol</strong>.</td><td>It stands for <strong>User Datagram Protocol</strong>.</td></tr>
<tr>
<td><strong>Type of connection</strong></td><td>It is a <strong>connection-oriented protocol</strong>, which means that the connection needs to be established before the data is transmitted over the network.</td><td>It is a <strong>connectionless protocol,</strong> which means that it sends the data without checking whether the system is ready to receive or not.</td></tr>
<tr>
<td><strong>Reliable</strong></td><td><strong>reliable</strong> protocol as it provides assurance for the delivery of data packets.</td><td><strong>unreliable</strong> protocol as it does not take a guarantee for the delivery of packets.</td></tr>
<tr>
<td><strong>Speed</strong></td><td><strong>slower</strong> than UDP as it performs error checking, flow control, and provides assurance for the delivery of data.</td><td><strong>faster</strong> than TCP as it does not guarantee the delivery of data packets.</td></tr>
<tr>
<td><strong>Header size</strong></td><td>The size of TCP is <strong>20</strong> <strong>bytes</strong>.</td><td>The size of the UDP is <strong>8</strong> <strong>bytes.</strong></td></tr>
<tr>
<td><strong>Acknowledgment</strong></td><td>TCP uses the <strong>three-way handshake concept</strong>. In this concept, if the sender receives the ACK, then the sender will send the data. TCP also has the ability to <strong>resend the lost data.</strong></td><td>UDP does <strong>not wait for any acknowledgmen</strong>t; it just sends the data.</td></tr>
<tr>
<td><strong>Flow control mechanism</strong></td><td>It follows the <strong>flow control</strong> mechanism in which <strong>too many packets cannot be sent to the receiver at the same time</strong>.</td><td>This protocol follows no such mechanism.</td></tr>
<tr>
<td><strong>Error checking</strong></td><td>TCP performs <strong>error checking</strong> by using a <strong>checksum</strong>. When the data is corrected, then the data is <strong>retransmitted to the receiver</strong>.</td><td>It does not perform any <strong>error checking</strong>, and also does not resend the lost data packets.</td></tr>
<tr>
<td><strong>Applications</strong></td><td>This protocol is mainly used where a <strong>secure and reliable communication process</strong> is required, like <u>military services, web browsing, and e-mail.</u></td><td>This protocol is used where fast communication is required and <strong>does not care about reliability</strong> like <u>VoIP, game streaming, video and music streaming, et</u><u>c.</u></td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dd7beb31-0f6b-4125-b12e-937f25c4208f.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Which two TCP header fields are used to confirm receipt of data?</strong></p>
<ul>
<li>Sequence Number</li>
<li>Acknowledge number</li>
</ul>
<h2 id="heading-how-does-tcp-communicate">How does TCP communicate?</h2>
<ul>
<li>Three-way handshake.</li>
<li>SYN, ACK, FIN, RST.</li>
<li>Windows size (65,535)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ad274cf5-389c-4ad0-8e52-be73b86e9c6a.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-the-six-control-bits-flags-are-as-follows">The six control bits flags are as follows:</h3>
<ol>
<li><strong>SYN:</strong> It is used to establish a connection between the hosts.</li>
<li><strong>ACK:</strong> Acknowledgment flag used in connection establishment and session termination. If the ACK is set to 0, then it means that the data packet does not contain an acknowledgement.</li>
<li><strong>PSH:</strong>  is a control flag used to indicate that the receiving device should deliver the data to the receiving application as soon as possible<strong>, rather than buffering it</strong>.</li>
<li><strong>RST:</strong> Reset the connection when an error or timeout occurs.</li>
<li><strong>URG:</strong> It represents an urgent pointer. If it is set, then the data is processed urgently.</li>
<li><strong>FIN:</strong>  No more data from sender and used in session termination</li>
</ol>
<p>When the PSH flag is set, it instructs the receiving device to deliver the data immediately to the application layer without waiting for more data to arrive.</p>
<h2 id="heading-establish-tcp-connection">Establish TCP Connection:</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1b248233-ba15-48f3-ae6f-8ede80ebf6cc.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d12b0420-51b3-487f-a1f7-a336befa3aed.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-terminate-tcp-connection">Terminate TCP connection:</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a6c58bc3-0024-460f-b1fc-89da375182a2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>How many exchanges are needed to end both sessions between two hosts?</strong></p>
<p>Four exchanges.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8c28e909-7c59-48ef-916d-f3d22205b183.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-tcp-reliability-data-loss-and-retransmission">TCP Reliability - Data Loss and Retransmission</h3>
<p>The <strong>Sequence (SEQ) number</strong> and <strong>Acknowledge (ACK) number</strong> are used together to confirm <strong>receipt of the bytes of data contained in the transmitted</strong> segments.</p>
<ul>
<li>What field is used by the destination host to reassemble segments into the original order?
<strong>Sequence Number</strong></li>
<li><p>What field is used to provide flow control?
<strong>Window Size</strong></p>
<p><strong>Flow control</strong> is the amount of data that the destination can receive and process reliably.</p>
</li>
</ul>
<ul>
<li>Which field in the TCP header indicates the status of the three-way handshake process?
<strong>control bits</strong></li>
<li>Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?</li>
</ul>
<p><strong>The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/26533ea8-ad2d-431e-8b18-f87c51fc6fa2.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-the-four-fields-in-the-udp-header-are-as-follows">The four fields in the UDP header are as follows:</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Source Port</td><td>Identify the source application by port number.</td></tr>
</thead>
<tbody>
<tr>
<td>Destination Port</td><td>Identify the destination application by port number.</td></tr>
<tr>
<td>Length</td><td>length of the UDP datagram header</td></tr>
<tr>
<td>Checksum</td><td>used for error checking of the datagram header and data</td></tr>
</tbody>
</table>
</div><h1 id="heading-ports">Ports</h1>
<p>When a message is delivered using either TCP or UDP, the Protocols and services requested are identified by a <strong>port number</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/10e2920e-20d6-46de-a75c-e1a5f1776611.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/092c2cb8-a18b-4cfb-97fc-a8e4f03f3e57.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-what-are-well-known-ports"><strong>What are well-known ports?</strong></h2>
<p>These are <strong>standardized ports assigned by IANA</strong> (Internet Assigned Numbers Authority) for widely used services and protocols.</p>
<ul>
<li>Range: 0 – 1023</li>
<li>Assigned to common protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6dc63429-86fa-4cfb-8adc-4f97a921b970.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 DNS uses Both <strong>TCP and UDP</strong>. DNS uses <strong>UDP</strong> when <u><strong>clients send requests to a DNS serve</strong></u>r. However, <strong>communication</strong> between <u><strong>DNS servers always uses TCP</strong></u>.</p>
<p>💡 <strong>POP3</strong>: used to retrieve emails from a mail server and delete them from the mail server.<br /><strong>IMAP</strong>: used to retrieve emails from a mail server without deleting them on the server.   </p>
<p><strong>SMTP:</strong> Used by an email client to send emails.</p>
</blockquote>
<p>    <strong>IMAP</strong>: used to retrieve emails from a mail server without deleting them on the server. </p>
<p>    <strong>SMTP:</strong> Used by an email client to send emails. </p>
<h2 id="heading-what-are-registered-ports"><strong>What are registered ports?</strong></h2>
<p>These ports are assigned by IANA to specific software applications and services <strong>that are not as universal as Well-Known Ports</strong> but are still used widely.</p>
<ul>
<li><strong>Range:</strong> 1024 – 49151</li>
<li><strong>Used by specific applications</strong> (e.g., MySQL, RDP, VoIP services).</li>
</ul>
<p><strong>Register port</strong> <strong>used by  Both TCP / UDP</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Name</td><td>port</td></tr>
</thead>
<tbody>
<tr>
<td>Ms SQL</td><td>1433</td></tr>
<tr>
<td>WAP</td><td>2948</td></tr>
</tbody>
</table>
</div><h2 id="heading-what-are-dynamic-ports">What are Dynamic Ports?</h2>
<p>Temporary ports are used by client devices for outgoing connections.</p>
<ul>
<li><strong>Range:</strong>  49152 – 65535</li>
<li><strong>Not registered with IANA</strong>; used randomly for short-lived communication.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>concept</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>Same-layer interaction on different computers</td><td>The two computers use the protocol to communicate with the same layer on another computer. the protocol defines a header that communicates what each computer wants to do.</td></tr>
<tr>
<td>Adjacent(uh·jay·snt) نزیک-layer interaction on the same computer</td><td><strong>On a single Computer</strong>, one lower layer provides a service to the layer above.</td></tr>
</tbody>
</table>
</div><p><strong>What are two characteristics of multicast transmission?</strong></p>
<ul>
<li>Multicast transmission can be used by <strong>routers to exchange routing information</strong>.</li>
<li>A single <strong>packet can be sent to a group of host</strong>s.</li>
</ul>
<p><strong>Which two OSI model layers have the same functionality as the two layers of the TCP/IP model?</strong> </p>
<ul>
<li>Network</li>
<li>Transport</li>
</ul>
<p><strong>How are port numbers used in the TCP/IP encapsulation process?</strong></p>
<p>If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.</p>
<p>Both UDP and TCP use port numbers to provide a unique identifier for each conversation. <strong>Source port numbers are randomly generated</strong> and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator.</p>
<p><strong>Which category of network components includes wires and cables used in a wired network?</strong></p>
<ul>
<li><strong>media</strong></li>
</ul>
<p><strong>Which three elements do all communication methods have in common? (Choose three.)</strong></p>
<ul>
<li>Message source.</li>
<li>Message Destination.</li>
<li>Message medium.</li>
</ul>
<p><strong>What two criteria are used to help select a network medium from various network media?</strong></p>
<ul>
<li>The distance the selected medium can successfully carry a signal.</li>
<li>The environment where the selected medium is to be installed.</li>
</ul>
<h2 id="heading-network-troubleshooting">Network Troubleshooting</h2>
<p>A number of software utility programs are available that can help identify network problems, most of these software are provided by the operating system as a command line interface (CLI). </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>IPconfig</td><td>Displays IP configuration Information on Windows Operation System.</td></tr>
</thead>
<tbody>
<tr>
<td>IFconfig</td><td>Displays IP configuration Information on Linux Operation System.</td></tr>
<tr>
<td>Ping</td><td>Test connection to other hosts.</td></tr>
<tr>
<td>Netstat</td><td>Display network connections.</td></tr>
<tr>
<td>Tracert</td><td>Displays the route taken to the destination.</td></tr>
<tr>
<td>NSlookup</td><td>Directly queries the name server for information on a destination domain.</td></tr>
</tbody>
</table>
</div><p><code>ping 192.168.1.1 repeat  9999999</code>  = ping 192.167.1.1 -t</p>
<pre><code class="lang-javascript">ping -t <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>-t</strong> refers to continuous ping on Linux, you don’t need -t option.</p>
<pre><code class="lang-javascript">ping -n <span class="hljs-number">10</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> (windows)
ping -c <span class="hljs-number">10</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> (Linux)
</code></pre>
<p>-n and -c refer to a set number of packets, by default, the number of packets is 4 echo packets.</p>
<pre><code class="lang-javascript">nslookup google.com <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
</code></pre>
<p>Query a specific DNS server</p>
<pre><code class="lang-javascript">nslookup <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
</code></pre>
<p>get hostname from IP</p>
<pre><code class="lang-javascript">netstat -o
</code></pre>
<p>Display process IDs</p>
<pre><code class="lang-javascript">netstat -n
</code></pre>
<p>-n option can be used to display IP addresses and port numbers.</p>
<pre><code class="lang-javascript">netstat -p tcp
netstat -p udp
</code></pre>
<p>Show protocol-specific connections</p>
<pre><code class="lang-javascript">netstat -aon | find <span class="hljs-string">"443"</span>
</code></pre>
<p>Find a Process Using a Specific Port</p>
<pre><code class="lang-javascript">netstat -an | find <span class="hljs-string">"192.168.1.1"</span>
</code></pre>
<pre><code class="lang-javascript">netstat -ano
</code></pre>
<p>We can use more than one option together -a -n -o </p>
<p>Which command can be used on a Windows host to display the <strong>routing table</strong>?</p>
<pre><code class="lang-f#">netstat -r
</code></pre>
<p>Which command can be used on a Windows host to display the <strong>ARP table</strong>?</p>
<pre><code class="lang-f#">arp -a
</code></pre>
<p>Which command can be used on a Windows host to display the routing table IPv6?</p>
<pre><code class="lang-f#">route print
</code></pre>
<h1 id="heading-verifying-network-connectivity">Verifying Network Connectivity</h1>
<p>Using and interpreting the output of various testing tools is often the first step in isolating the cause
of a network connectivity issue. The ping command can systematically test connectivity by looking
for answers to the following questions, in this order:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Step 1. Can an end device ping itself?</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Step 2. Can an end device ping its default gateway?</strong></td></tr>
<tr>
<td><strong>Step 3. Can an end device ping the destination?</strong></td></tr>
</tbody>
</table>
</div><h1 id="heading-seven-step-troubleshooting-process"><strong>Seven-Step Troubleshooting Process</strong></h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a5e72b01-120e-43bb-9605-611d3e84512f.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>Define Problem:</strong> Define what the problem is. Problems are usually identified by a sign (e.g., the network is slow or has stopped working). Network issues may appear in many different forms, including alerts from the network management system, console messages, and user complaints. In an organization, problems are typically assigned to network technicians as trouble tickets.</p>
<p><strong>Gather Information</strong>: In this step, targets (i.e., hosts, devices) to be investigated must be identified, access to the target devices must be obtained, and information gathered.</p>
<p><strong>Analyze Information:</strong> Possible causes must be identified. The gathered information is interpreted and analyzed using network documentation, network baselines, searching organizational knowledge bases, searching the internet, and talking with other technicians.</p>
<p><strong>Eliminate Possible Causes:</strong> If multiple causes are identified, then the list must be reduced by progressively eliminating possible causes to eventually identify the most probable cause. Troubleshooting experience is extremely valuable to quickly eliminate causes and identify the most probable cause.</p>
<p><strong>Purpose Hypothesis</strong>: When the most probable cause has been identified, a solution must be formulated. At this stage, troubleshooting experience is very valuable when proposing a plan.</p>
<p><strong>Test Hypothesis:</strong> Before testing the solution, it is important to assess the impact and urgency of the problem. For instance, could the solution have an adverse effect on other systems or processes? The severity of the problem should be weighed against the impact of the solution. For example, if a critical server or router must be offline for a significant amount of time, it may be better to wait until the end of the workday to implement the fix.</p>
<p><strong>Solve the Problem:</strong> When the problem is solved, inform the users and anyone involved in the troubleshooting process that the problem has been resolved. Other IT team members should be informed of the solution. It is important to properly document the cause and solution as this can assist other support technicians to prevent and solve similar problems in the future.</p>
<p># </p>
<h1 id="heading-establish-a-network-baseline"><strong>Establish a Network Baseline</strong></h1>
<p> A baseline is used to <strong>establish normal network or system performance</strong> to determine the “personality” of a network under normal conditions.</p>
<p><strong>A network baseline should answer the following questions:</strong></p>
<ul>
<li>How does the network perform during a normal or average day?</li>
<li>Where are the most errors occurring?</li>
<li>What part of the network is most heavily used?</li>
<li>What part of the network is least used?</li>
<li>Which devices should be monitored and what alert thresholds should be set?</li>
<li>Can the network meet the identified policies?</li>
</ul>
<p># </p>
<p><strong>Structured Troubleshooting Methods</strong></p>
<h3 id="heading-bottom-up"><strong>Bottom-Up</strong></h3>
<p>In bottom-up troubleshooting, you start with the <strong>physical layer and the physical components</strong> of the network.</p>
<p>The disadvantage of the bottom-up troubleshooting approach is that it requires that you check every device and interface on the network until the possible cause of the problem is found.</p>
<h3 id="heading-top-down"><strong>Top-Down</strong></h3>
<p>top-down troubleshooting starts with the <strong>end-user applications</strong> and moves down through the layers of the OSI model until the cause of the problem has been identified.</p>
<h3 id="heading-divide-and-conquer"><strong>Divide-and-Conquer</strong></h3>
<p>The network administrator <strong>selects a layer</strong> and tests in both directions from that layer.</p>
<p>In divide-and-conquer troubleshooting, you start by collecting user experiences of the problem, document the symptoms and then, using that information, make an informed guess as to which OSI layer to start your investigation.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d4c14a1e-32e5-436a-b6e6-47f60acbfc4d.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-network-device-documentation">Network Device Documentation</h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5eeecd25-eef6-47ba-82f1-94781f41197b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d3d54ea2-96d9-475f-921b-40bf2bb97f78.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7c82c43d-2fad-4624-97e3-7ab1ab5f1b6f.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-network-topology-and-architectures">Network Topology and Architectures</h2>
<h2 id="heading-soho">SOHO</h2>
<ul>
<li>Small office/home office (SOHO) LAN, use only Ethernet LAN technology.</li>
<li>Switch and routes may be combined.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e78ed84d-64be-491b-a8d4-f815d41648b2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0660508d-ca77-4c75-bbbc-1aafb32784a5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/008fbd51-f48d-4283-ac17-a16e1ddf34b0.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-wan">Wan</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5382afdb-7293-4e19-8f06-ea0f6934a4e5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Private WAN</strong> infrastructure: Service providers may offer dedicated point-to-point leased lines, circuit-switched, such as PSTN or ISDN, and packet-switched links, such as Ethernet Wan, ATM, or frame Relay.</p>
<p><strong>Public WAN</strong> Infrastructure: Service providers provide Internet access using broadband services such as DLS, cable, and satellite access, broadband connections. Data travelling between corporate sites over the public Wan infrastructure should be protected by using a VPN.</p>
<h2 id="heading-private-wan-leased-line">Private WAN: Leased Line</h2>
<p>A point-to-point link is used to provide a pre-established WAN communication path from the customer premises to the provider network. Point-to-point Lines are usually leased from a service provider and are called leased lines. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/65cede01-a5f6-4517-8922-f49dfe9bdbdf.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-private-wan-frame-relay">Private Wan: Frame Relay</h2>
<p>is a simple layer 2 non-broadcast multi-access(<strong>NBMA</strong>)</p>
<p>WAN technology is used to interconnect enterprise LANs. A single router interface can be used to connect multiple sites.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e3d47a07-f07f-4c3b-8537-4e507b338301.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Note: old and useless and fast.</strong> </p>
<h2 id="heading-private-wan-ethernet-wan">Private WAN: Ethernet WAN</h2>
<p>Newer Ethernet standards using fiber-optic cables have made Ethernet a reasonable WAN access option. IEEE 1000BASE-LX standard supports fiber-optic cable lengths of 5km, white IEEE 1000BASE-ZX standard supports cable lengths up to 70 Km.</p>
<h3 id="heading-the-ethernet-wan-types">The Ethernet WAN Types:</h3>
<ul>
<li>Metropolitan Ethernet(<strong>MetroE</strong>)</li>
<li>Ethernet over MPLS (<strong>EoMPLS</strong>) <strong>popular</strong></li>
<li>Virtual Private LAN Service(<strong>VPLS</strong>)</li>
</ul>
<blockquote>
<p>Note: when you see IEEE it’s purpose of layer 1 or 2 technology , IEEE organization made Layer 1 and  layer 2 as a standard  </p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cbaf5685-49b1-4c3e-9084-778b876ea153.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-private-wan-mpls">Private WAN: MPLS</h2>
<ul>
<li>Multiprotocol Label Switching(MPLS) is a multiprotocol high-performance WAN technology that directs data from one router to the next. MPLS is based on <strong>short path labels</strong> rather than IP network addresses.</li>
<li>It is multiprotocol, has the ability to carry any payload including IPV4, IPv6, Ethernet, ATM, DSL, and frame relay traffic. It uses labels that tell a router what to do with a packet. The labels identify paths between distant routes rather than endpoints, and while MPLS actually routes IPv4 and IPv6 packets, everything else is switched.</li>
<li>MPLS can deliver any type of packet between sites. MPLS can encapsulate packets of various network protocols. It supports a wide range of WAN technologies including T-carrier/E-carrier links, Carrier Ethernet, ATM, Frame relay, and DSL.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7340efca-742d-45ec-bd56-0809dd8e367f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Note: MPLS is described as layer 2.5.</strong></p>
<p>The MPLS layer lies between layers 2 and 3 of the model ie the Data Link and the Network Layer. That’s why it is also known as the 2.5 layer protocol or “shim” protocol.</p>
<p>The MPLS header is 32 bits.</p>
<p><a target="_blank" href="https://towardsdatascience.com/multiprotocol-label-switching-mpls-explained-aac04f3c6e94">bookmark</a></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/47cc243f-6d71-40a1-9563-573c239d6726.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-private-wan-vsat">Private WAN: VSAT</h2>
<ul>
<li>A very small aperture terminal(VSAT) is a solution that creates a private WAN using satellite communications. A VSAT is a small satellite dissimilar to those used for home internet and TV. VSATs create a private WAN while providing connectivity to remote locations.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c00653f1-d29f-4c45-877a-5509bb154f52.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-public-wan">Public WAN</h2>
<ul>
<li>DSL, ADSL, or cables</li>
<li>Wireless(3G/4G, LTE, or WIMAX)</li>
<li>VPN ( Site to Site VPN)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/882d0b64-0bc1-44c6-b43f-6b9a9b3a50aa.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/67f4fe61-8568-443c-8cad-e067e230f3f0.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-introducing-cisco-ios">Introducing Cisco IOS</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5532b860-b955-4fa4-adc7-bf5ce30e3afa.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>User EXEC Mode</strong> - This mode has limited <strong>capabilities but is useful for basic operations</strong>. It allows only a limited number of <strong>basic monitoring commands</strong> but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the <strong>&gt;</strong> symbol.</li>
<li><strong>Privileged EXEC Mode</strong> - To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the <strong>#</strong> symbol.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2bc1afbd-63ff-4b65-b8e3-4f29ae0ce05f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c8e692d4-498c-4f95-bfe9-5adcc70446fc.png" alt="CCNA 200-301 Study (1)" /></p>
<p>An <strong>uplink port</strong> is a switch port designed to connect to another <strong>switch, router, or modem</strong> for network expansion. Traditionally, uplink ports required <strong>straight-through cables</strong> to connect to other network devices.</p>
<p>🔹 <strong>Common Uses:</strong></p>
<ul>
<li>Connecting <strong>switch-to-switch</strong> (e.g., trunk links).</li>
<li>Connecting a switch to a <strong>router</strong> (router-on-a-stick).</li>
<li>Connecting to an <strong>ISP modem</strong> or fiber uplink.</li>
</ul>
<p>🔹 <strong>Labeling on Cisco Switches:</strong></p>
<ul>
<li>Typically labeled <strong>G0/1, G1/1, or GigabitEthernet 1/0/1</strong>.</li>
</ul>
<p>A <strong>normal port</strong> (also called an <strong>access port</strong>) is a standard switch port used to connect <strong>end devices</strong> like PCs, printers, and IP phones.</p>
<p><strong>Rollover Cable:</strong> Used for <strong>device configuration</strong> via the console port.</p>
<p><strong>Crossover Cable:</strong> Used for network connections between similar devices (e.g., switch-to-switch, PC-to-PC in older networks)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c29ff11e-9612-4563-beaa-0857471dcf0b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: </p>
<ul>
<li>Use the <strong>straight cable</strong> to connect two <strong>different devices</strong>.</li>
<li>Use the <strong>crossover cable</strong> for connecting two <strong>of the same type.</strong></li>
</ul>
<p>Today, all new devices of different types can be connected through a straight cable</p>
<p>### </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/03fd3ac2-75d8-4cf9-b2b1-b814bf5910a8.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7d13c434-a338-43d7-b3f2-eb7945fd000b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>RAM</strong>: RAM stores <strong>running configuration, CDP information, ARP memory, routing table, etc</strong>.</p>
<p><strong>NVRAM</strong>: This memory stores the <strong>system configuration by typing the copy run start command.</strong></p>
<p><strong>FLASH</strong>: The FLASH memory is the <strong>router's IOS (Internetwork Operating System) memory</strong>.</p>
<p><strong>ROM:</strong> Stands for <strong>Read Only Memory</strong>. This memory stores the boot or bootstrap of the system</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/60704806-1064-4d8a-bc58-532e1d765f9f.png" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>Power supply</li>
<li>Fan</li>
<li>Protection for WAN (WIC) or high-speed WIC (HWIC) interface card</li>
<li>Dynamic synchronous RAM (SDRAM) is used to keep the configuration running and routing tables.</li>
<li>Non-volatile RAM (NVRAM) and boot flash memory are used to store the ROMMON boot code and NVRAM data.</li>
<li>CPU</li>
<li>The connection of the advanced integration module (AIM) downloads functions that demand a lot from the processor, such as encryption from the main CPU.</li>
<li>Protection for WAN (WIC) or high-speed WIC (HWIC) interface card</li>
</ol>
<h2 id="heading-access-to-cisco-ios-cli"><strong>Access to Cisco IOS CLI</strong></h2>
<p>Before entering any commands, we need access to the CLI. Here are three options:</p>
<ul>
<li><strong>Console</strong> - Uses a low-speed serial or USB connection to provide direct connect, out-of-band management access to a Cisco device.</li>
<li><strong>SSH</strong> - Method for remotely accessing a CLI session across an active network interface, including the management interface.</li>
<li><strong>AUX port</strong> - Used for remote management of the router using a dial-up telephone line and modem.</li>
<li>‌<strong>HTTP/HTTPS</strong> - Some routers and switches support <strong>web-based management</strong> connections, allowing administrators access using HTTP.</li>
</ul>
<blockquote>
<p>💡 To securely configure and monitor a router from a remote location, you use <strong>HTTPS</strong> to access the router's web-based management interface, ensuring that all transmitted data is encrypted.</p>
</blockquote>
<h2 id="heading-in-band-and-out-of-band-device-management"><strong>In-Band and Out-of-Band Device Management</strong></h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Aspect</td><td>In-band Management</td><td>Out-of-band Management</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Network</strong></td><td>Same as user traffic network</td><td>Dedicated, separate management network</td></tr>
<tr>
<td><strong>Access Methods</strong></td><td>SSH, Telnet, HTTP/HTTPS, SNMP</td><td>Serial console, dedicated interfaces (e.g., iLO, DRAC)</td></tr>
<tr>
<td><strong>Security</strong></td><td>Risk of exposure to attacks</td><td>More secure due to isolation from user traffic</td></tr>
<tr>
<td><strong>Availability</strong></td><td>Dependent on network availability</td><td>Available even if the main network is down</td></tr>
<tr>
<td><strong>Cost</strong></td><td>Lower cost, no need for extra infrastructure</td><td>Higher cost due to separate network setup</td></tr>
<tr>
<td><strong>Convenience</strong></td><td>Easier to configure and access</td><td>Less convenient, requires additional setup</td></tr>
</tbody>
</table>
</div><p><strong>out-of-band management  example:</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f47e502e-4392-4551-b67d-e51d38500f47.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0a655ef5-f642-4134-88f1-76d3767fbfcc.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>A terminal server and a console serve</strong>r a hardware or virtual devices used by network and system administrators to provide secure, remote access to the <strong>console ports</strong> (usually serial ports) of network equipment such as Routers, switches, servers, and firewalls.</p>
</blockquote>
<p><strong>Guidelines for OOB Management:</strong></p>
<ul>
<li>Provide the highest level of security when using console ports and management interfaces.</li>
<li>Mitigate the risk of passing insecure management protocols over the production network.</li>
</ul>
<p><strong>Guidelines for In-Band Management:</strong></p>
<ul>
<li>Apply to devices that need to be managed or monitored.</li>
<li>Use IPsec, SSH, or SSL when possible.</li>
<li>Decide whether the management channel needs to be open at all times.</li>
</ul>
<h2 id="heading-webui-configuration-example"><strong>WebUI Configuration Example</strong></h2>
<p>Cisco IOS-XE routers and Catalyst switches come with a web-based management interface known as the WebUI or web GUI (Graphical User Interface). This tool allows administrators to configure and monitor the device using a web browser, offering a more visual approach to network management.</p>
<p>To configure a Cisco router or switch for WebUI access, you will need a <strong>username</strong> command configured and some <strong>ip http</strong> commands. In addition, securing WebUI with an access control list is recommended. For example, the following configuration allows secure WebUI access to R1 through the 192.168.1.1/24 interface by any user on the 192.168.1.0/24 network.</p>
<pre><code class="lang-java">R1(config)# <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">GigabitEthernet0</span>/0/1
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">address</span> 192.168.1.1 255.255.255.252
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>)# <span class="hljs-title">no</span> <span class="hljs-title">shutdown</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">exit</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">username</span> <span class="hljs-title">admin</span> <span class="hljs-title">privilege</span> 15 <span class="hljs-title">secret</span> <span class="hljs-title">cisco123</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">no</span> <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">server</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">secure</span>-<span class="hljs-title">server</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">authentication</span> <span class="hljs-title">local</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">access</span>-<span class="hljs-title">list</span> 10 <span class="hljs-title">permit</span> 192.168.1.0 0.0.0.255
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">access</span>-<span class="hljs-title">class</span> <span class="hljs-title">ipv4</span> 10</span>
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Creates a user named "admin" with full <strong>administrative access (privilege 15)</strong> and sets the password to "cisco123" (encrypted).</td></tr>
</thead>
<tbody>
<tr>
<td><strong>no ip http server:</strong> Disables the standard HTTP server.</td></tr>
<tr>
<td><strong>ip http secure-server:</strong> Enables the HTTPS server.</td></tr>
<tr>
<td>Uses the local username and password database for HTTP authentication.</td></tr>
<tr>
<td>Creates an ACL (numbered 10) permitting access from devices in the IP range 192.168.1.0 to 192.168.1.25</td></tr>
<tr>
<td><strong>ip http access-class ipv4 10:</strong> Applies the ACL (numbered 10) to restrict HTTP access to the specified IP range.</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>IOS</strong> defines two <strong>privilege</strong> levels by default<strong>: 0 (user mode) and 15 (privileged mode)</strong>.</p>
</blockquote>
<p><strong>Cloud Device Management</strong></p>
<p>Cisco offers two advanced cloud applications that provide comprehensive graphical interfaces:  <strong>Cisco Catalyst Center (formerly Cisco DNA Center) and Cisco Meraki</strong> Dashboard.</p>
<ul>
<li><strong>Cisco Catalyst Center: Large, complex networks requiring detailed oversight and control.</strong></li>
<li><strong>Small to medium-sized businesses or distributed networks.</strong></li>
</ul>
<h2 id="heading-console-cabling">Console Cabling</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/997d3f03-bac9-4171-92a8-39eab3291478.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/698ddf39-058d-42e2-b2ac-999bc3e934b3.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 Routers and switches have a blue colour cable used to  connect to the console port to pc and perform configuration </p>
</blockquote>
<h3 id="heading-how-to-save-the-configuration">How to save the Configuration?</h3>
<blockquote>
<p>💡 Copy  running-config startup-config     </p>
<p>then enter   </p>
<hr />
<p>WR (tab)  </p>
<p>enter</p>
</blockquote>
<p>    Copy  running-config startup-config   </p>
<p>    then enter </p>
<hr />
<p>    WR (tab)</p>
<p>    enter</p>
<h2 id="heading-how-to-remove-the-saved-configuration-in-nvram-and-reset-the-router">How to remove the saved configuration in NVRAM and reset the router?</h2>
<blockquote>
<p>💡 write erase</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/37aaa5b5-13f5-4707-93cf-1640c0ff39e0.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-changing-host-name-and-adding-a-banner-to-cisco-devices">Changing Host Name and  adding a banner to Cisco Devices</h3>
<p><strong>hostname</strong>: change the name of the router example: </p>
<p><strong>hostname</strong> ISU-R1</p>
<p>Banner: A simple message shows up when we log in to the router through the terminal.</p>
<pre><code class="lang-javascript">banner motd $ don’t access to <span class="hljs-built_in">this</span> router without sysadmin permission $
</code></pre>
<blockquote>
<p>💡 <code>Switch(config)#</code><strong><code>service password-encryption</code></strong></p>
</blockquote>
<p>The <strong>service password-encryption</strong> command will encrypt every plaintext password.</p>
<h2 id="heading-set-password-to-privilege-global-mode">Set password to Privilege (global)  mode</h2>
<p>To set a password to privilege mode, use the commands below:</p>
<blockquote>
<p>💡 ISU-R1(config)# enable <strong>password [</strong>your-password]</p>
</blockquote>
<p>When we use show <strong>running-configuration command,</strong> the password shows as <strong>plain text.</strong> Use this command to set a secure password</p>
<blockquote>
<p>💡 ISU-R1(config)# enable <strong>secret [</strong>your-password]</p>
</blockquote>
<p>To remove a password or a secret, just add no before the command, for example:</p>
<pre><code class="lang-bash">no <span class="hljs-built_in">enable</span> password
</code></pre>
<h2 id="heading-set-password-to-user-exec-mode">Set  password to User EXEC mode</h2>
<p>To set a password for the router, the user should  enter the password before the user mode opens and connect the cabling using the commands below: </p>
<p><strong>line con 0  (line port always is zero)</strong></p>
<p><strong>line aux 0</strong>   (both console and aux port used to router configuration, aux port working as a backup port when the console port is not working )</p>
<p><strong>line vty 0 4</strong>  “vty” (stands for Virtual teletype: it is a virtual line you can virtually configure the router)</p>
<p>Note: 0 4 means 5 connections can be established at the same time.</p>
<pre><code class="lang-javascript">Router(config)#line <span class="hljs-built_in">console</span> <span class="hljs-number">0</span>

Router(config-line)#password your-password

Router(config-line)#login
</code></pre>
<p>When you run this command, it shows the running-config</p>
<p>The console line should show logging, which means a login is required to enter the router and perform configuration </p>
<pre><code class="lang-javascript">line con <span class="hljs-number">0</span>
password rebar
login
!
line aux <span class="hljs-number">0</span>
!
line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span>
login
!
</code></pre>
<h2 id="heading-set-the-username-and-password-account-to-the-router-account">Set the Username and password account to the router account</h2>
<p>If an employee leaves the company, others are required to change the password on all routers. Adding individual user accounts is a better approach to address this issue.</p>
<pre><code class="lang-javascript">Router(config)#userame your-username secret your-password
</code></pre>
<pre><code class="lang-javascript">Router(config)#line con <span class="hljs-number">0</span>

Router(config-line)#login local <span class="hljs-comment">//using local databse to check username and password</span>
</code></pre>
<h1 id="heading-virtual-login-to-the-router-telnet">Virtual login to the router (Telnet)</h1>
<pre><code class="lang-javascript">R1-isu(config)#line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span>
</code></pre>
<pre><code class="lang-javascript">R1-isu(config-line)#password rebar
</code></pre>
<pre><code class="lang-javascript">R1-isu(config-line)#login <span class="hljs-comment">// if you want to login with only password </span>
R1-isu(config-line)#login local  <span class="hljs-comment">// use this command if you want to loing with user and passowrd</span>
</code></pre>
<p>After adding a password, you can log in to the router through Telnet </p>
<pre><code class="lang-javascript">telnet IP-address(router)
</code></pre>
<p>Then enter the password and log in to the router </p>
<blockquote>
<p>💡 <strong>Note: Telnet is less secure because it transfers data as plain text without encryption</strong></p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5a723c2b-6a33-4295-943b-53e4c164c514.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6448d5ba-287a-43ab-a9a7-7920848f4cca.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1-isu(config)#no ip domain-lookup
</code></pre>
<p>Use the command above when you write a command by mistake, as it  takes a lot of time</p>
<p>Translating "ded"...domain server (255.255.255.255)</p>
<h1 id="heading-virtual-login-to-the-router-ssh">Virtual login to the router (SSH)</h1>
<h3 id="heading-step-1-verify-ssh-support"><strong>Step 1. Verify SSH support.</strong></h3>
<p>Use the <strong>show ip ssh</strong> command to verify that the switch supports SSH. If the switch is not running an IOS that supports cryptographic features, this command is unrecognized.</p>
<h3 id="heading-step-2-configure-the-ip-domain"><strong>Step 2. Configure the IP domain.</strong></h3>
<pre><code class="lang-javascript">isu-R1(config)#ip domain-name [Enter Your Domain Name]
isu-R1(config)#ip domain-name ISU-Airport
</code></pre>
<p>### 
<strong>Step 3. Generate RSA key pairs.</strong></p>
<pre><code class="lang-javascript">isu-R1(config)#crypto key generate rsa
</code></pre>
<p>After entering the set key length of encryption recommended value is 1024 or 2048 </p>
<pre><code class="lang-javascript">isu-R1(config)#ip ssh version <span class="hljs-number">2</span> [Version <span class="hljs-number">2</span> is the newest version <span class="hljs-keyword">of</span> SSH]
</code></pre>
<p>### </p>
<p><strong>Step 4. Configure user authentication.</strong></p>
<p>The SSH server can authenticate users <strong>locally or use an authentication server</strong>.</p>
<ul>
<li>Username and password  Account</li>
</ul>
<pre><code class="lang-javascript">isu-R1(config)#userame your-username secret your-password
</code></pre>
<p>### 
Step 5. Configure the vty lines.</p>
<pre><code class="lang-javascript">isu-R1(config)#line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span>
</code></pre>
<pre><code class="lang-javascript">isu-R1(config-line)#transport input ssh
</code></pre>
<p>with transport input, you can choose which protocol can be used for virtual configuration like telnet, SSH… etc.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c181ea2d-a23a-4c22-b58f-1d1da5335e5f.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1-isu(config-line)#login local  <span class="hljs-comment">// use this command if you want to loing with user and passowrd</span>
</code></pre>
<h1 id="heading-change-interface-speed-and-duplex">Change interface speed and Duplex</h1>
<p> When we have multiple switches, if we want to change the speed between the switches, use the commands below </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cf58efc0-1aa2-4330-80a5-19138499d92a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, we want to change the speed ISU Switch to 10 bits from auto speed </p>
<pre><code class="lang-javascript">ISUSW#show interfaces status
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4a37c98e-92b7-4db6-9675-1df8ae275e14.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, FastEthernet0/5 speed is auto, and duplex by default is auto.</p>
<h1 id="heading-what-is-a-duplex">What is a Duplex?</h1>
<ul>
<li>means the ability to send and receive data or signals between two points.</li>
<li><strong>Full-duplex</strong> all nodes can <strong>send and receive data</strong> on their port at the <strong>same time.</strong> The following types of connections can use full duplex: <strong>Switch to Switch,</strong> <strong>Switch to Host, Host to Host</strong></li>
<li><strong>Half-duplex:</strong> When <strong>one node sends data</strong> and <strong>can’t receive data</strong> at the same time. The following types of connections can use half duplex: <strong>Hub to Hub, Switch to Hub</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/91d34f5e-4a20-4b80-840b-7776dcbf995e.webp" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Type:10/100baseTx: it means 10 (<strong>Mbps)</strong> megabit / 100 (<strong>Mbps)</strong> megabit per second</li>
</ul>
<pre><code class="lang-javascript">ISUSW(config-<span class="hljs-keyword">if</span>)#speed <span class="hljs-number">100</span>
</code></pre>
<p>When we changed one router's speed to 100 Mbps, nothing happened to the next router because its speed was set to auto by default. However, when we changed the second router's speed from auto to 10 Mbps, an error occurred due to the mismatch in speeds between the two connected lines.</p>
<h2 id="heading-how-to-change-duplex">How to change duplex</h2>
<pre><code class="lang-javascript">ISUSW(config-<span class="hljs-keyword">if</span>)#duplex full
</code></pre>
<pre><code class="lang-javascript">EBLSW(config-<span class="hljs-keyword">if</span>)#duplex full
</code></pre>
<blockquote>
<p>💡 Both switches should have the same duplex setting.</p>
</blockquote>
<p>Note: <strong>B**</strong>y default, duplex is set to auto. However, it's generally recommended to change it to a full duplex for optimal performance.**</p>
<h2 id="heading-packet-capturing-with-wireshark">Packet Capturing with Wireshark</h2>
<h2 id="heading-arpaddress-resolution-protocol">ARP(Address Resolution Protocol)</h2>
<p>is a network protocol used to <strong>find out the hardware (MAC) address of a device</strong> <strong>from an IP address</strong> It is used when a device wants to communicate with some other device on a local network (for example on an Ethernet network that requires physical addresses to be known before sending packets).</p>
<p>ARP request packets are sent to the broadcast addresses (<strong>FF:FF:FF:FF:FF:FF</strong> for the <strong>Ethernet broadcasts</strong> and <strong>255.255.255.255</strong> for the <strong>IP broadcast</strong>).</p>
<p>We can track computer requests when the process of releasing and renewing IP addresses occurred.</p>
<p> CMD → ipconfig /release the ipconfig /release</p>
<p>ipconfig /release sends a command to the DHCP server instructing it to dump the network configuration and then deletes the current network configuration for all adapters (IP address, DNS servers, gateway, etc).</p>
<p>/renew will instruct your computer to request a new IP address from the DHCP server as well as DNS, gateway, and whatever other information the DHCP server is set to configure.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/39f3e301-121e-43a3-9515-2a189b7ea474.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3df633a9-bb1a-40f0-ac53-25cff6ac8720.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-mac-addresses-and-basic-switching-concepts">MAC Addresses and Basic Switching Concepts</h2>
<h1 id="heading-what-is-an-ethernet-frame"><strong>What is an Ethernet Frame?</strong></h1>
<p>An Ethernet frame is a data unit used in computer networks to transmit information between devices on a local area network (LAN). It contains the <strong>source and destination MAC addresses</strong>, payload data, and error-checking information, forming the basic structure for communication in Ethernet networks.</p>
<p><strong>Ethernet</strong> protocols define how data is formatted and transmitted over a wired network.</p>
<p><strong>Ethernet</strong> is defined by data link layer and physical layer protocols.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3e046f2a-79c6-4b23-b559-5c028ebd64de.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Preamble:</strong> It helps synchronize the receiving device’s clock with the incoming data.</p>
<p><strong>SDF:</strong> marks the end of the preamble and the beginning of the rest of the frame. </p>
<p><strong>Destination MAC:</strong> identifies the receiving device.</p>
<p><strong>Source MAC:</strong> identifies the sending device. </p>
<p><strong>Type</strong>: This indicates the length of the entire Ethernet frame (Usually IPv4 or IPv6).</p>
<p><strong>FCS: Frame check sequence</strong> is used to detect errors in a frame.</p>
<h3 id="heading-which-ethernet-frame-field-indicates-the-beginning-of-an-ethernet-frame">Which Ethernet frame field indicates the beginning of an Ethernet frame?</h3>
<p><strong>Preamble and SFD</strong></p>
<h1 id="heading-what-is-a-mac-address">What is a MAC Address?</h1>
<p><strong>Media Access Control(MAC):</strong> the <strong>physical address</strong>, which <strong>uniquely identifies</strong> each device on a given network. To communicate between two networked devices, we need two addresses: an <strong>IP address and a MAC address**</strong>.<strong>
 It is assigned to the </strong>NIC** (Network Interface Card) of each device that can be connected to the internet.</p>
<p>It is globally unique: it <strong>means two devices cannot have the same MAC address</strong>. It is represented in a <strong>hexadecimal</strong> format on each device, such as <strong>00:0a:95:9d:67:16.</strong></p>
<p>It is <strong>12 digits, 48 bits (6 bytes)</strong> long, out of which the first 24 bits(first 6 digits) are used for OUI(Organization Unique Identifier), for example (3C-8B-7F), and 24 bits(second 6 digits)  for NIC/vendor-<em>specific.</em></p>
<p>It works on the <strong>data-link layer</strong> of the OSI model.</p>
<p><strong>IPV4 →</strong> uses <strong>ARP protocol</strong> to associate the logical address with the MAC Address. </p>
<p><strong>IPV6 →</strong> uses <strong>ICMPV6 Neighbor Discovery(ND)</strong>  to associate the logical address with the MAC Address. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e173ca09-ed40-4147-ad55-5242e7af2675.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-why-should-the-mac-address-be-unique-in-the-lan-network">Why should the MAC address be unique in the LAN network?</h3>
<p>If a LAN network has two or more devices with the same MAC address, that network will not work. </p>
<h3 id="heading-there-are-two-primary-addresses-assigned-to-a-device-on-an-ethernet-lan">There are two primary addresses assigned to a device on an Ethernet LAN:</h3>
<ul>
<li><strong>Physical Address (The MAC address) -</strong> used for <strong>NIC-to-NIC communication</strong> on the same Ethernet network.</li>
<li><strong>Logical Address (the IP address) -</strong> used to send the <strong>packet from the source device to the destination device</strong>. The destination device may be on the same network as the source, or it may be on a remote network.</li>
</ul>
<h3 id="heading-destination-on-the-same-network">Destination on the Same network</h3>
<p>Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame with the encapsulated IP packet from one NIC to another NIC that is on the same network. If the destination IP address is on the same network, the destination MAC address will be that of the destination device.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/75e9f977-8a73-46a1-a199-f524457fa498.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-destination-on-the-remote-network">Destination on the Remote network</h3>
<p>When the destination IP address(IPv4 or IPV6) is on a remote network, the destination MAC address will be the address of the host default gateway(i.e., the router interface).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bb38ed71-2778-43d9-89d0-a697e81a06f3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Routers examine the destination IPv4 address to determine the best path to forward the IPv4 packet. <strong>When the router receives the Ethernet frame, it de-encapsulates the Layer 2 information. Using the destination IPv4 address,g it determines the next-hop device and then encapsulates the IPv4 packet in a new data link frame for the outgoing interface</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/998d5e9a-81af-45c0-aa59-4c08bb7a0294.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Along each link in a path, an IP packet is encapsulated in a frame. The frame is specific to the data link technology that is associated with that link, such as Ethernet. If the next-hop device is the final destination, the destination MAC address will be that of the device's Ethernet NIC, as shown in the figure.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8f6204ff-036f-4577-8a93-db120681c05b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c8773ac6-02f6-436c-b9ed-9dad5e9c2adb.gif" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-ethernet-lan-switching">Ethernet LAN Switching</h1>
<p>An <strong>Ethernet switch</strong> examines its <strong>MAC address table</strong> to make a forwarding decision for each frame.</p>
<h2 id="heading-switch-learning-and-forwarding"><strong>Switch Learning and Forwarding</strong></h2>
<ul>
<li><strong>Learn</strong>
Every frame that enters a switch is checked for new information to learn. It does this by examining the source MAC address of the frame and the port number where the frame entered the switch. If the source MAC address does not exist, it is added to the table along with the incoming port number.</li>
<li><strong>Forwarding</strong>
If the destination MAC address is a unicast address, the switch will look for a match between the destination MAC address of the frame and an entry in its MAC address table. If the destination MAC address is in the table, it will forward the frame out the specified port. If the destination MAC address is not in the table, the switch will forward the frame out all ports except the incoming port. This is called an <strong>unknown unicast.</strong></li>
</ul>
<p>Which network device has the primary function of sending data to a specific destination based on the information found in the MAC address table?</p>
<ul>
<li><strong>switch</strong></li>
</ul>
<p>Ethernet switches add entries to their MAC address table based on what field of the Ethernet frame?</p>
<ul>
<li><strong>source MAC address</strong></li>
</ul>
<p>When a switch receives an Ethernet frame and the destination MAC address of that frame is not in its MAC address table, the switch will:</p>
<ul>
<li><strong>Forward the frame out of all ports except in the incoming port.</strong></li>
</ul>
<p>What addressing information is recorded by a switch to build its MAC address table?</p>
<ul>
<li><strong>The source Layer 2 address of incoming frames</strong></li>
</ul>
<p>What is one function of a Layer 2 switch?</p>
<ul>
<li><strong>Determines which interface is used to forward a frame based on the destination MAC address</strong></li>
</ul>
<p>Which information does a switch use to keep the MAC address table information current?</p>
<ul>
<li><strong>The source MAC address and the incoming port.</strong></li>
</ul>
<p>What <strong>will a host on an Ethernet network do</strong> if it receives a frame with a unicast destination MAC address that does not match its own MAC address?</p>
<ul>
<li><strong>It will discard the frame.</strong></li>
</ul>
<p>What kind of frame does a switch flood out of all interfaces except the one it was received on?</p>
<ul>
<li><strong>Unknown Unicast</strong></li>
</ul>
<p>What happens to runt frames received by a Cisco Ethernet switch?
• <strong>The frame is dropped.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a7d31b8e-ac5b-454f-8375-8d693de65d9f.gif" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-arpaddress-resolution-protocol-1">ARP(Address Resolution Protocol)</h2>
<p>ARP is a network protocol used to <strong>find out the hardware (MAC) address of a device</strong> <strong>from an IP address</strong> ( <strong>layer 3 address).</strong> It is used when a device wants to communicate with another device on a local network (for example, on an Ethernet network that requires physical addresses to be known before sending packets).</p>
<p>ARP request packets are sent to the <strong>broadcast</strong> addresses (<strong>FF:FF:FF:FF:FF: FF</strong> for the <strong>Ethernet broadcasts</strong> and <strong>255.255.255.255</strong> for the <strong>IP broadcasts</strong>).</p>
<p><strong>Consists of two messages:</strong></p>
<p><strong>ARP Request</strong> is <strong>Broadcast</strong> = sent to all hosts on the network.</p>
<p><strong>ARP Replay</strong> is <strong>Unicast</strong> = sent only to one host (The host that sent the request).</p>
<p><strong>ARP provides two basic functions:</strong></p>
<ul>
<li>Resolving IPv4 addresses to MAC addresses.</li>
<li>Maintaining a table of IPv4 to MAC address mappings.</li>
</ul>
<p>The sending device will search its <strong>ARP table</strong> for a destination IPv4 address and a corresponding MAC address.</p>
<ul>
<li>If the packet’s destination IPv4 address is <strong>on the same network</strong> as the source IPv4 address, the device will search the ARP table for the destination IPv4 address.</li>
<li>Suppose the destination IPv4 address is <strong>on a different network</strong> from the source IPv4 address. In that case, the device will search the ARP table for the <strong>IPv4 address of the default gateway</strong>., It uses the ARP process to determine the <strong>MAC address of the default gateway</strong>.</li>
<li>The ARP table temporarily saves (caches) the mapping for the devices on the LAN.</li>
<li>The packet is dropped if <strong>no device responds to the ARP request</strong> because a frame cannot be created.</li>
<li>Entries in the ARP table are <strong>time-stamped.</strong> If a device does not receive a frame from a particular device before the timestamp expires, the entry for this device is removed from the ARP table.</li>
</ul>
<blockquote>
<p>💡 <strong>Note</strong>: IPv6 uses a similar process to ARP for IPv4, known as ICMPv6 Neighbor Discovery (ND). IPv6 uses neighbor solicitation and neighbor advertisement messages, similar to IPv4 ARP requests and ARP replies.</p>
</blockquote>
<p>On a Cisco router, the <strong>show ip arp</strong> command is used to display the ARP table</p>
<pre><code class="lang-javascript">R1# show ip arp
</code></pre>
<p>On a Windows  PC, the <strong><code>arp –a</code></strong> command is used to display the ARP table</p>
<pre><code class="lang-javascript">C:∖Users∖PC&gt; arp -a
</code></pre>
<h2 id="heading-arp-security">ARP Security</h2>
<p>In some cases, the use of ARP can lead to a potential security risk. A threat actor can use ARP spoofing to perform an ARP poisoning attack. This is a technique used by a threat actor to <strong>reply to an ARP request for an IPv4 address that belongs to another device, such as the default gateway</strong>, as shown in the figure. The threat actor sends an ARP reply with its own MAC address. The receiver of the ARP reply will add the wrong MAC address to its ARP table and send these packets to the threat actor.</p>
<p>Enterprise-level switches include mitigation techniques known as <strong>dynamic ARP inspection (DAI)**</strong>.**</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7325e8e3-3df0-441b-8e2b-1d7e43b1e724.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://www.networkacademy.io/sites/default/files/inline-images/arp-man-in-the-middle.gif" alt="CCNA 200-301 Study (1)" /></p>
<p>We can track computer requests when the process of releasing and renewing IP addresses occurs.</p>
<p> CMD → ipconfig /release the ipconfig /release</p>
<p>ipconfig /release sends a command to the DHCP server instructing it to dump the network configuration and then deletes the current network configuration for all adapters (IP address, DNS servers, gateway, etc).</p>
<p>/renew will instruct your computer to request a new IP address from the DHCP server as well as DNS, gateway, and whatever other information the DHCP server is set to configure.</p>
<p>ARP request packets are sent to the broadcast addresses (<strong>FF:FF:FF:FF:FF:FF</strong> for the <strong>Ethernet broadcasts</strong> and <strong>255.255.255.255</strong> for the <strong>IP broadcasts</strong>).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/79b8924a-e840-48a0-a58f-db5327d74324.png" alt="CCNA 200-301 Study (1)" /></p>
<p>We can track computer requests when the process of releasing and renewing IP addresses occurs.</p>
<p> CMD → ipconfig /release the ipconfig /release</p>
<p>ipconfig /release sends a command to the DHCP server instructing it to dump the network configuration and then deletes the current network configuration for all adapters (IP address, DNS servers, gateway, etc).</p>
<p>/renew will instruct your computer to request a new IP address from the DHCP server as well as DNS, gateway, and whatever other information the DHCP server is set to configure.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f392fda4-b3cc-4fd1-b7ce-cc3b855224a0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6a94bf78-210a-4f55-a63f-0505340aa71a.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-mac-address-transmission-types">MAC Address Transmission types?</h1>
<h2 id="heading-unicast-mac-address"><strong>Unicast MAC address:</strong></h2>
<p>The Unicast MAC address represents the specific NIC on the network. A Unicast MAC address frame is only sent out to the interface that is assigned to a specific NIC and hence transmitted to the <strong>single destination device</strong>. If the LSB (least significant bit) of t<strong>he first octet of an address is set to zero</strong>, the frame is meant to reach only <strong>one destination NIC</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dcd09b94-d27c-4acc-aa56-710732551da0.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-multicast-mac-address"><strong>Multicast MAC Address</strong></h3>
<p>Multicast addresses enable the source <strong>device to transmit a data frame to multiple devices or NICs</strong>. In Layer-2 (Ethernet) Multicast address, the LSB (least significant bit) or the <strong>first 3 bytes of the first octet of an address is set to one and reserved for the multicast addresses.</strong> The rest 24 bits are used by the device that wants to send the data in a group. The multicast address always starts with the prefix <strong>01-00-5E.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/095d81a0-f17f-4754-a7a6-e239d548eec6.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-broadcast-mac-address"><strong>Broadcast MAC address</strong></h3>
<p>It represents all devices within a Network. In broadcast MAC address, Ethernet frames with ones in all bits of the <strong>Destination address</strong> <strong>(FF-FF-FF-FF-FF-FF</strong>) are known as a <strong>broadcast address</strong>
. All these bits are the reserved addresses for the broadcast. Frames that are destined with MAC address FF-FF-FF-FF-FF-FF will reach every computer belonging to that LAN segment. Hence if a source device wants to send the data to all the devices within a network, it can use the broadcast address as the destination MAC address.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/42e8c41b-13b5-41a1-90c4-4f8234555007.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-how-to-find-a-mac-address-vendor">How to find a MAC Address vendor?</h3>
<p>Use the website below to find the vendor who creates the NIC card:</p>
<p><a target="_blank" href="http://macvendors.com">bookmark</a></p>
<h3 id="heading-practice-mac-address">Practice MAC Address</h3>
<p>When we connect two or more devices through a switch and run this command below in the switch </p>
<pre><code class="lang-javascript">ISUSW1#show mac address-table
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fdca0a10-3fb5-4b12-b223-db011d3c04f7.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, no MAC address record is found because no data was transmitted over the switch.</p>
<p>After executing the ping command from one PC to another, run the current command on the switch.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3c1b2d3b-441d-4370-a179-d9619115cc09.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Now, all MAC addresses are connected to the switch and visible because <strong>the switches have a self-learning feature.</strong></p>
<p>When we have two connected switches, as shown in the images below:</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3874903-d399-49ef-b000-76a1b219b0a3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>While sending a ping message from one pc to another pc connected to the other switch </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9d960703-bd58-4ba7-bf7d-aeb54b48a8ae.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Why are there three MAC addresses showing through port FA0/3?</p>
<p>because the MAC addresses of other computers are received by the switch through port 0/3</p>
<ul>
<li>Use the command below on your switch device to see the MAC address age</li>
</ul>
<pre><code class="lang-javascript">EBLSW#show mac-address-table aging-time
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6b29c728-949a-4c49-b8aa-1aad76a68d0f.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>After</strong> <strong>300 seconds (5 minutes)</strong> <strong>of inactivity on the switch, it automatically resets the MAC address table.</strong></p>
</blockquote>
<ul>
<li>Use the commands below on your switch device to clean the MAC table</li>
</ul>
<pre><code class="lang-javascript">Switch#clear mac address-table dynamic
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/46a584b3-36e6-4cd0-b273-a8b6a7f880e1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Additionally, we can delete a specific MAC address or interface from incoming frames.</p>
<p><strong>Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?</strong></p>
<p><img src="https://itexamanswers.net/wp-content/uploads/2016/02/p39-prac-final-ccna2.jpg" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Source MAC: <strong>00E0.FE91.7799</strong> Source <strong>IP: 10.1.1.10</strong></li>
</ul>
<h1 id="heading-what-is-cdp">What is CDP?</h1>
<p><strong>Cisco Discovery Protocol(CDP)</strong> is a network <strong>discovery tool</strong> that assists network administrators and engineers in <strong>identifying neighbouring Cisco devices.</strong> CDP is a <strong>layer 2 proprietary protocol that is default-enabled on all Cisco devices, including routers and switche</strong>s.  </p>
<pre><code class="lang-javascript">EBLSW#show cdp neighbors
</code></pre>
<p>Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID    Local Intrfce   Holdtme    Capability   Platform    Port ID
ISUSW        Fas 0/3          149            S       2960        Fas 0/20</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>(config)# <strong>cdp run</strong></td><td>Enables CDP globally on device.</td></tr>
</thead>
<tbody>
<tr>
<td>(config)# <strong>no cdp run</strong></td><td>Disables CDP globally on device.</td></tr>
<tr>
<td>(config-if)# <strong>cdp enable</strong></td><td>Enables CDP on an interface device if CDP isn’t enabled globally.</td></tr>
<tr>
<td>(config-if)# <strong>no cdp enable</strong></td><td>Disables CDP on an interface device.</td></tr>
<tr>
<td>(config)# <strong>cdp timer &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies CDP packets transmission frequency. Default <strong>60 sec</strong>.</td></tr>
<tr>
<td>(config)# <strong>cdp holdtime &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies time limit for which a receiving device should hold information before discarding. Default <strong>180 sec</strong></td></tr>
<tr>
<td>R1(config)# <strong>[no] cdp advertise-v2</strong></td><td>Enable/disable CDPv2</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <code>cdp run</code> Enable CDP globally on the device.  </p>
<p><code>cdp enable</code>  Enable CDP on a specific interface.</p>
<p>💡 Note: <strong>This protocol is exclusive to Cisco products only.</strong></p>
</blockquote>
<p>In a CDP environment, what happens when the CDP interface on an adjacent device is configured without an IP address?</p>
<ul>
<li><strong>CDP operates normally, but it cannot provide IP address information for that neighbor</strong></li>
</ul>
<h2 id="heading-what-is-lldp">What is LLDP?</h2>
<p><strong>Link Layer Discovery Protocol (LLDP)</strong> is a <strong>layer 2</strong> neighbour discovery protocol that allows devices to advertise device information to their directly connected peers/neighbours. It is best practice to enable LLDP globally to standardize network topology across <strong>all devices, especially in multi-vendor networks.</strong></p>
<blockquote>
<p>💡 ● LLDP is usually globally disabled by default.<br />● LLDP is also disabled on each interface by default.</p>
</blockquote>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>(config)# lldp run</strong></td><td>Enables LLDP globally on device.</td></tr>
</thead>
<tbody>
<tr>
<td>(config)# <strong>no lldp  run</strong></td><td>Disables LLDP globally on device.</td></tr>
<tr>
<td><strong>(config-if)# lldp transmit</strong></td><td>Enables LLDP on an interface device if LLDP  isn’t enabled globally.(use together with receive)</td></tr>
<tr>
<td><strong>(config-if)# lldp receive</strong></td><td>Enables LLDP on an interface device if LLDP  isn’t enabled globally. (use together with transmit)</td></tr>
<tr>
<td>(config)# <strong>lldp timer &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies CDP packets transmission frequency. Default 30 seconds.</td></tr>
<tr>
<td>(config)# <strong>lldp holdtime &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies time limit for which a receiving device should hold information before discarding. Default 120 seconds.</td></tr>
<tr>
<td>R1(config)# <strong>lldp reinit </strong></td><td>this timer will delay the actual initialization of LLDP. 2 seconds by default.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/70032721-e545-41c8-9b1f-09846210d721.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Local Interface</strong>:  the physical port on your switch where the neighbor is connected.</p>
<p><strong>Port ID:</strong> the neighbor’s interface identifier (how the neighbor advertises its port).</p>
<p>Refer to the exhibit. The network administrator must prevent the switch Cat9K-2 IP address from
being visible in LLDP without disabling the protocol.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f5fc6ba5-4a60-49bf-96e1-614ace0aede0.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Which action must be taken must be taken to complete the task?</p>
<p>A. Configure the no lldp tlv-select-management-address command globally on Cat9K-2
B. Configure the no lldp transmit command on interface G1/0/21 in Cat9K-1
C. Configure the no lldp receive command on interface G1/0/21 on Cat9K-1
D. Configure the no lldp mac-phy-cfg command globally on Cat9K-2</p>
<blockquote>
<p>💡 To hide Cat9K‑2’s IP without disabling LLDP, stop advertising the <strong>Management Address TLV</strong> on the device that’s sending it. On Cat9K‑2: no lldp tlv-select management-address  </p>
</blockquote>
<h2 id="heading-introducing-ip-addresses">Introducing IP Addresses</h2>
<h2 id="heading-what-is-an-ip-address">What is an IP Address?</h2>
<p><strong>Internet protocol(IP)</strong>address: an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ebd18649-2be0-4423-abb2-583e10640a94.png" alt="CCNA 200-301 Study (1)" /></p>
<p>IP Addresses are <strong>32-bit</strong> numbers that are typically displayed in dotted decimal notation. A 32-bit address contains <strong>two primary parts:</strong> <strong>The network prefix</strong> and <strong>the host prefix</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ea840e45-d0f7-4f2f-84ed-9a84db6229a8.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-ip-address-to-binary">IP Address  to Binary</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0c18b4c0-e93b-4d28-bfc1-e268e45c078c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note:  0-255  includes 256 IP addresses.</p>
<h2 id="heading-characteristics-of-ip"><strong>Characteristics of IP</strong></h2>
<ul>
<li><strong>Connectionless:</strong> There is <strong>no connection with the destination</strong> established before sending data packets.</li>
<li><strong>Best Effort:</strong> IP is inherently unreliable because packet delivery is <strong>not guaranteed</strong>.</li>
<li><strong>Media Independent:</strong> Operation is <strong>independent of the medium</strong> (e.g., copper, fiber-optic, or wireless) carrying the data.</li>
</ul>
<h2 id="heading-ip-addresses-classes">IP Addresses Classes</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4f53d5a0-5fcd-42a3-8eae-821fd2455387.png" alt="CCNA 200-301 Study (1)" /></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>Public IP Range</td><td>Private IP Range</td><td>Subnet Mask</td><td># of Networks</td><td># of Hosts per Network</td><td></td></tr>
</thead>
<tbody>
<tr>
<td>Class A</td><td>1.0.0.0 to127.0.0.0</td><td>10.0.0.0 to10.255.255.255</td><td>255.0.0.0</td><td>126</td><td>16,777,214</td><td></td></tr>
<tr>
<td>Class B</td><td>128.0.0.0 to191.255.0.0</td><td>172.16.0.0 to172.31.255.255</td><td>255.255.0.0</td><td>16,382</td><td>65,534</td><td></td></tr>
<tr>
<td>Class C</td><td>192.0.0.0 to223.255.255.0</td><td>192.168.0.0 to192.168.255.255</td><td>255.255.255.0</td><td>2,097,150</td><td>254</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>The starting IP</strong> is called the Network address and is not usable.<br /><strong>The ending IP</strong> address is called the broadcast address, which is not usable.</p>
</blockquote>
<p>    <strong>The ending IP</strong> address is called the broadcast address, which is not usable.</p>
<p><strong>Network Part</strong></p>
<p>The network part of an IPv4 address is located on the left side. It identifies the specific network to which the address belongs and indicates the IP address class. This portion is crucial for routing and network identification.</p>
<p>For example, we have the IPv4 address 192.168.10.100 and a /24 subnet mask. /24 simply means that the first 24 bits, starting from the left side, are the network portion of the IPv4 address. The 8 remaining bits of the 32 bits will be the host portion.</p>
<p><strong>Host Part</strong></p>
<p>The host portion of the IPv4 address uniquely identifies the device or the interface on your network. Hosts that have the same network portion can communicate with one another directly, without the need for the traffic to be routed.</p>
<ul>
<li><strong>Network Portion</strong>: Identifies the network to which the IP address belongs.</li>
<li><strong>Host Portion</strong>: Identifies the specific device within that network.</li>
</ul>
<h2 id="heading-class-a">Class A</h2>
<ul>
<li><strong>1.0.0.1</strong>  to <strong>126.255.255.254</strong>(useable address).</li>
<li>Support <strong>16 million</strong> hosts on each of <strong>126 networks</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/17d22932-3f8f-4aa9-946a-41a1396972cd.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Class A addresses are for networks with a large number of total hosts.</p>
<h2 id="heading-class-b">Class B</h2>
<ul>
<li><strong>128.1.0.1</strong> to <strong>191.255.255.254</strong></li>
<li>Supports <strong>65,000  hots</strong> on each of <strong>16,000 networks</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d597bd31-0ae2-40af-ad7e-0bef7af12ad1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>If you use a class B, you can build more networks, but fewer hosts per network.</p>
<h2 id="heading-class-c">Class C</h2>
<ul>
<li><strong>192.0.1.1</strong> to <strong>223.255.254.254</strong></li>
<li>Support <strong>254</strong> hosts on each of <strong>2</strong> million networks.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/90f2e15a-cf58-41e8-9e05-48db09a1969a.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-class-d">Class D</h2>
<ul>
<li><strong>224.0.0.0</strong> to <strong>239.255.255.255</strong>.</li>
<li>Reserved for multicast groups.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Range Start Address</td><td>Range end Address</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>224</strong>.0.0.0</td><td>224.0.0.255</td><td>Reserved for special “ well-know” multicast addresses.</td></tr>
<tr>
<td>224.0.1.0</td><td>238.255.255.255</td><td>Globally-scoped(internet-wide) multicast addresses</td></tr>
<tr>
<td><strong>239</strong>.0.0.0</td><td>239.255.255.255</td><td>Administratively-scoped(local) multicast addresses</td></tr>
</tbody>
</table>
</div><p>When the IP Address Started from <strong>224 to 239</strong></p>
<h3 id="heading-class-e">Class E</h3>
<ul>
<li><strong>240.0.0.0</strong> to <strong>254.255.255.254</strong></li>
<li><strong>reserved for future use, or research and development purposes</strong></li>
<li><strong>This IP class is reserved for experimental purposes only for R&amp;D or study.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/91b4a14b-8761-486b-adf4-b36b4acc2592.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-how-to-know-the-class-of-an-ip-address-from-binary">How to know the class of an IP address from binary?</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f5976027-6827-4bf7-bfff-e82a4863977a.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Class A: The first bit always has to be 0.</li>
<li>Class B: The first 2 bits always have to be 10.</li>
<li>Class C: The first 3 bits always have to be 110.</li>
</ul>
<h2 id="heading-subnet-mask">Subnet Mask</h2>
<p>A subnet mask is a number that <strong>defines a range of IP addresses available within a network</strong>. A single subnet mask limits the number of Valid IPs for a specific network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/488265cc-e6fd-4dd8-a197-163afa66cce8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this Image, three 255s are assigned to the network, and 0 octet is assigned to the host </p>
<h2 id="heading-gateway">Gateway</h2>
<p>A gateway IP refers to a device on a network that <strong>routes local network traffic to other networks</strong>. The subnet mask defines the boundary between the network and host portions of an IP address, helping to determine which devices are on the same local network.</p>
<h2 id="heading-public-and-private-ip-addresses">Public and Private IP addresses</h2>
<ul>
<li><strong>Public IP</strong> addresses are used on the Internet.</li>
<li><strong>Private IP</strong> addresses are used on your local area network and should not be used on the internet.</li>
</ul>
<p>These are the Private IP address ranges:</p>
<ul>
<li>Class A: 10.0.0.0 – 10.255.255.255</li>
<li>Class B: 172.16.0.0 – 172.31.255.255</li>
<li>Class C: 192.168.0.0 – 192.168.255.255</li>
</ul>
<p><strong>Class A and B</strong> networks have a <strong>very large number of host addresses,</strong> and <strong>Class C has very few</strong>. Class A networks accounted for 50% of the IPv4 networks. This caused most of the available IPv4 addresses to go unused.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/95e10c74-0b9c-4491-8cc5-ce369e187da3.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-loopback-address">Loopback Address</h2>
<p>A loopback address is a special IP address, 127.0.0.1, reserved by InterNIC for use in testing network cards, this IP address responds to the software loopback interface of the network card, which does not have hardware associated with it and does not require a physical connection to a network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/054bc759-223c-429e-bed4-48cd92e170ff.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-apipa">APIPA</h2>
<p>Automatic Private IP Addressing(APIPA) is a feature in operating systems ( such as Windows) that enables computers to automatically self-configure an IP address and subnet mask when <strong>their DHCP server isn’t reachable</strong>. The IP Address range for APIPA is <strong>169.254.0.1 to 169.254.255.254,</strong> with the subnet mask of <strong>255.255.0.0</strong></p>
<p><strong>What are two features of IPv4 addresses? (Choose two.)</strong></p>
<ul>
<li><strong>IPv4 is a logical addressing scheme.</strong></li>
<li><strong>An IPv4 addressing scheme is hierarchical.</strong></li>
</ul>
<h1 id="heading-assignment-of-an-ip-address">Assignment of an IP address</h1>
<p>Both IPv4 and IPv6 addresses are managed by the <strong>Internet Assigned Numbers Authority (IANA)</strong>{ee·a·nuh}. The IANA manages and allocates blocks of IP addresses to the <strong>Regional Internet Registries (RIRs)</strong>. </p>
<p>RIRs are responsible for allocating IP addresses to ISPs that provide IPv4  blocks to organizations and smaller ISPs. </p>
<p><strong>Regional Internet Registries</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/822e2dfa-8738-40ca-9d08-38b9f62c1d73.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?</p>
<p><strong>RIRs</strong></p>
<p><strong>Refer to the exhibit. An administrator is troubleshooting connectivity on the office network. PC1 is able to send print jobs to Printer1, but is unable to access File Server1. Which action would correct the problem?</strong></p>
<p><img src="https://itexamanswers.net/wp-content/uploads/2022/11/i207787v1n2_207787.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Change the R1 Fa0/1 interface IP address to 10.231.64.1.</li>
<li>Change the R1 Fa0/0 interface subnet mask to 255.255.0.0.</li>
<li>Change the File Server1 IP address to 10.231.96.253.</li>
<li>Change the PC1 IP address to 10.231.64.115.</li>
</ul>
<p>Subnet ranges:</p>
<ul>
<li><code>10.231.64.0 – 10.231.95.255</code> → <strong>Network B</strong></li>
<li><code>10.231.96.0 – 10.231.127.255</code> → <strong>Network A</strong></li>
</ul>
<h3 id="heading-ip-address-placement"><strong>IP Address Placement</strong></h3>
<ul>
<li><strong>PC1</strong>: <code>10.231.92.115</code> — in <strong>Network B</strong> (<code>10.231.64.0/19</code>) ✅</li>
<li><strong>Printer1</strong>: <code>10.231.95.252</code> — also in <strong>Network B</strong> ✅</li>
<li><strong>File Server1</strong>: <code>10.231.127.253</code> — in <strong>Network A</strong> ✅</li>
<li><strong>R1 Fa0/1</strong>: <code>10.231.128.1</code> — <strong>⚠️ This is the problem</strong></li>
<li><strong>Change the R1 Fa0/1 interface IP address to 10.231.64.1. (correct answer)</strong></li>
</ul>
<h2 id="heading-network-segmentation-basic-of-subnetting">Network Segmentation (Basic of Subnetting)</h2>
<p><strong>Broadcast Domain:</strong> is a collection of network devices that receive broadcast traffic from each other.</p>
<p><strong>Subnetting</strong> is the practice of <strong>dividing a network into two or more smaller networks</strong>. It increases <strong>routing efficiency</strong>, enhances network <strong>security</strong>, and <strong>reduces the size of the broadcast domain**</strong>.**</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9c064d6e-b72c-4df7-b72a-cfffd449d168.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Routers do not propagate broadcasts. When a router <strong>receives a broadcast</strong>, it does <strong>not forward it out</strong> other interfaces. For instance, when R1 receives a broadcast on its Gigabit Ethernet 0/0 interface, <strong>it does not forward it out another interface.</strong></p>
<p>Therefore, each <strong>router interface connects to a broadcast domain, and broadcasts are only</strong> propagated within that specific broadcast domain.</p>
<h2 id="heading-problems-with-large-broadcast-domains">Problems with Large Broadcast  Domains</h2>
<p>A  large broadcast domain is a network that connects many hosts. A problem with a large broadcast domain is that these hosts can generate excessive broadcast traffic, which negatively affects the network. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/03f2c3c7-fa08-47d1-8ec0-35547d158747.png" alt="CCNA 200-301 Study (1)" /></p>
<p>LAN 1 connects 400 users, which could generate an excessive amount of broadcast traffic. This results in <strong>slow network operations</strong> due to the significant amount of traffic it can cause, and slow device operations because a device must accept and process each broadcast packet. </p>
<p>The solution is to reduce the size of the network to create smaller broadcast domains in a process called subnetting.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e229b29a-660b-489e-92c5-39f35eb0daa8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In the figure, the 400 users in LAN 1 with network address 172.16.0.0 /16 have been <strong>divided into two subnets of 200 users each</strong>: <strong>172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only propagated within the smaller broadcast domains</strong>. Therefore, a broadcast in LAN 1 would not propagate to LAN 2.</p>
<blockquote>
<p>💡 Notice how prefix length has changed from a <strong>single /16 network</strong> to <strong>two /24 networks</strong>. This is the basics of subnetting </p>
</blockquote>
<h1 id="heading-reasons-for-segmenting-networks">Reasons for Segmenting Networks</h1>
<p>Subnetting <strong>reduces overall network traffic</strong> and <strong>improves network performance</strong>. It also enables network administrators to implement <strong>security policies such as which subnets are allowed or not allowed to communicate together</strong>. Another reason is that it r<strong>educes the number of devices affected by abnormal broadcast due to misconfiguration, hardware/software problems, or malicious intent</strong>.</p>
<h3 id="heading-network-administrator-can-group-devices-and-services-into-subnets">Network Administrator can group devices and services into subnets</h3>
<ul>
<li><strong>Subnetting by Locations</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2d9036d4-c57a-4361-af68-15f23dea71b1.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Subnetting by group or function</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20e58565-957d-45ad-88b8-9ea39c972eeb.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Subnetting by device type</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/50754f54-a667-4568-b953-e95493f13170.png" alt="CCNA 200-301 Study (1)" /></p>
<p>### </p>
<p>Which devices will not forward an IPv4 broadcast packet by default?</p>
<ul>
<li><strong>router</strong></li>
</ul>
<p>Which two situations are the result of excessive broadcast traffic?</p>
<ul>
<li><strong>slow device operations</strong></li>
<li><strong>slow network operations</strong></li>
</ul>
<h3 id="heading-class-a-1">class A</h3>
<p>10.0.0.0<strong>/8 (network prefix)</strong>  meaning  8-bit located for the n<strong>etwork ID</strong> portion and 24-bits for the <strong>host portion</strong> </p>
<p>10.0.0.0   255.0.0.0 <strong>(subnet mask) — equivalent to writing prefixes.</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Subnet mask (decimal)</td><td>255</td><td>0</td><td>0</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Subnet mask (binary)</td><td>11111111</td><td>00000000</td><td>00000000</td><td>00000000</td></tr>
</tbody>
</table>
</div><h3 id="heading-class-b-1">class B</h3>
<p>172.16.0.0<strong>/16 (network prefix)</strong>  meaning 16 bits are located for the n<strong>etwork ID</strong> portion and 16 bits for the <strong>host portion</strong> </p>
<p>172.16.0.0   255.255.0.0 <strong>(Subnet mask) equivalent to writing prefixes.</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Subnet mask (decimal)</td><td>255</td><td>255</td><td>0</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Subnet mask (binary)</td><td>11111111</td><td>11111111</td><td>00000000</td><td>00000000</td></tr>
</tbody>
</table>
</div><p>192.168.1.0<strong>/24 (network prefix)</strong>  meaning  24-bit located for the n<strong>etwork ID</strong> portion and 8-bits for the <strong>host portion</strong> </p>
<p>192.168.1.0    255.255.255.0 <strong>(Subnet mask) equivalent to writing prefixes.</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Subnet mask (decimal)</td><td>255</td><td>255</td><td>255</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Subnet mask (binary)</td><td>11111111</td><td>11111111</td><td>11111111</td><td>00000000</td></tr>
</tbody>
</table>
</div><h2 id="heading-scenarios">Scenarios</h2>
<p>Someone tells you to create three different networks for my organization or company </p>
<h3 id="heading-class-c-1">Class C</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/08c499ff-fb0c-484e-b3df-2f4aafe6240b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we have created three networks in Class C. The third octet has been changed, and two routes have been added to route data from one network to another. </p>
<p>Note: if we don’t change the third octet, all devices are in the same network.</p>
<blockquote>
<p>⚠️ This class includes 254 IP addresses for the host portion, unsuitable for large organizations.</p>
</blockquote>
<h3 id="heading-class-b-2">Class B</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd7c124f-3d69-49b1-9056-e694cf078c1d.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-class-a-2">Class A</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8ff48d73-adb0-4506-98da-0818be0bd48a.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-classlesscidr">Classless(CIDR)</h2>
<ul>
<li>In the classful addressing method, millions of class <strong>A addresses are wasted</strong>.</li>
<li>Many of the class B <strong>addresses are wasted</strong>.</li>
<li>Class C is so small that it cannot cater to the needs of organizations.</li>
<li>Classful networking was replaced by Classless Inter-Domain Routing(CIDR) in 1993</li>
</ul>
<h2 id="heading-subnetting">Subnetting</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cd5e902c-d1fc-4675-8948-36f405f2a551.png" alt="CCNA 200-301 Study (1)" /></p>
<p> $2^n$<em><strong>=</strong></em><strong>number of required network = total number of subnets</strong></p>
<p>192.168.23.117/24   subnet this IP to  7 subnets      </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f4b70d9a-81cc-46a1-b677-69a0c9417935.png" alt="CCNA 200-301 Study (1)" /></p>
<p> $2^n$<em><strong>=number of the required network</strong></em> </p>
<p> $2^n$<em><strong>(number of remaining bits for a host) - 2 =  total hosts in the network.</strong></em></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>128</td><td>64</td><td>32</td><td>16</td><td>8</td><td>4</td><td>2</td><td>1</td></tr>
</thead>
<tbody>
<tr>
<td>2<em><strong>^7</strong></em></td><td>2<em><strong>^6</strong></em></td><td>2<em><strong>^5</strong></em></td><td>2<em><strong>^4</strong></em></td><td>2<em><strong>^3</strong></em></td><td>2<em><strong>^2</strong></em></td><td>2<em><strong>^1</strong></em></td><td>2<em><strong>^0</strong></em></td></tr>
</tbody>
</table>
</div><p>2_<strong>^</strong>_3=8  any number but should be greater than 7 </p>
<p>Now we borrow three bits from the host portion for the network portion.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>128</td><td>64</td><td>32</td><td>16</td><td>8</td><td>4</td><td>2</td><td>1</td></tr>
</thead>
<tbody>
<tr>
<td>1</td><td>1</td><td><strong>1</strong></td><td>0</td><td>0</td><td>0</td><td>0</td><td><em><strong>0</strong></em></td></tr>
</tbody>
</table>
</div><p>128+64+32= 224 new subnet mask   255.255.255.224</p>
<p>The last 1 bit decides how the network is incremented.</p>
<p>In this example, our network incremented by 32 after minus 2 for the network ID and broadcast 14 active IPs for each subnet. 32-2=30</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Network.id</td><td>First valid host</td><td>Last Valid host</td><td>Broadcast.id</td></tr>
</thead>
<tbody>
<tr>
<td>192.168.23.<strong>0</strong></td><td>192.168.0<strong>.1</strong></td><td>192.168.23.<strong>30</strong></td><td>192.168.23.<strong>31</strong></td></tr>
<tr>
<td>192.168.23.<strong>32</strong></td><td>192.168.0<strong>.33</strong></td><td>192.168.23<strong>.62</strong></td><td>192.168.23.<strong>63</strong></td></tr>
<tr>
<td>192.168.23<strong>.64</strong></td><td>192.168.0<strong>.65</strong></td><td>192.168.23.<strong>94</strong></td><td>192.168.23.<strong>95</strong></td></tr>
<tr>
<td>192.168.23<strong>.96</strong></td><td>192.168.0<strong>.97</strong></td><td>192.168.23.<strong>126</strong></td><td>192.168.23.<strong>127</strong></td></tr>
<tr>
<td>192.168.23<strong>.128</strong></td><td>192.168.0<strong>.129</strong></td><td>192.168.23.<strong>158</strong></td><td>192.168.23.<strong>159</strong></td></tr>
<tr>
<td>192.168.23<strong>.160</strong></td><td>192.168.0<strong>.161</strong></td><td>192.168.23<strong>.190</strong></td><td>192.168.23.1<strong>91</strong></td></tr>
<tr>
<td>192.168.23<strong>.192</strong></td><td>192.168.0<strong>.193</strong></td><td>192.168.23.<strong>222</strong></td><td>192.168.23.<strong>223</strong></td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 First, write all network IDs, then write broadcast IDs, and then write the first and the last host.<br /><strong>Network ID</strong>: <strong>T**</strong>he last octet is always an even number.**  </p>
<p><strong>Broadcast ID</strong>: <strong>The last octet is always an odd number.</strong>  </p>
<p><strong>Network ID</strong> = incremented by the last bit value as I described.  </p>
<p><strong>Broadcast Id</strong> = Network ID before -1.  </p>
<p><strong>First valid hos</strong>t= Network.id+1.  </p>
<p><strong>Last Valid host id</strong> = <a target="_blank" href="http://broadcast.id/">broadcast.id</a> -1</p>
</blockquote>
<p>    <strong>Network ID</strong>: <strong>T**</strong>he last octet is always an even number.**</p>
<p>    <strong>Broadcast ID</strong>: <strong>The last octet is always an odd number.</strong></p>
<p>    <strong>Network ID</strong> = incremented by the last bit value as I described.</p>
<p>    <strong>Broadcast Id</strong> = Network ID before -1.</p>
<p>    <strong>First valid hos</strong>t= Network.id+1.</p>
<p>    <strong>Last Valid host id</strong> = <a target="_blank" href="http://broadcast.id/">broadcast.id</a> -1</p>
<p><strong>If you would like to give an IP address to 30 hosts from your IP prefix, which subnet mask do you use most effectively?</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>A</strong></td><td>255.255.255.128</td></tr>
</thead>
<tbody>
<tr>
<td><strong>B</strong></td><td>255.255.255.240</td></tr>
<tr>
<td><strong>C</strong></td><td>255.255.255.248</td></tr>
<tr>
<td><strong>D</strong></td><td>255.255.255.254</td></tr>
<tr>
<td><strong>E</strong></td><td>255.255.255.224</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/994f3ace-07d6-47d1-9b08-79b369b35167.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-pc1s-ip-address-is-108910723327-what-is-the-network-address-of-its-subnet">PC1's IP address is 10.89.107.233/27. What is the <strong>network address</strong> of its subnet?</h2>
<p>## 
Here are a few <strong>super-fast</strong> ways:</p>
<h3 id="heading-quick-formula"><code>Quick Formula</code></h3>
<ul>
<li><strong><code>Block size</code></strong> <code>= 256 − mask_octet</code></li>
<li><strong><code>Network</code></strong> <code>= (⌊IP_octet ÷ block⌋ × block)</code></li>
<li><strong><code>Broadcast</code></strong> <code>= Network + block − 1</code></li>
</ul>
<h3 id="heading-given"><code>Given:</code></h3>
<ul>
<li><code>IP =</code> <strong><code>10.89.107.233/27</code></strong></li>
<li><code>Subnet mask</code> <strong><code>/27</code></strong> <code>→</code> <strong><code>255.255.255.224</code></strong></li>
<li><code>Block size =</code> <strong><code>256 − 224 = 32</code></strong></li>
</ul>
<h3 id="heading-formula"><code>Formula:</code></h3>
<p><strong><code>Network = (⌊octet ÷ block⌋ × block)</code></strong></p>
<ul>
<li><code>Focus on the</code> <strong><code>last octet</code></strong> <code>(233).</code></li>
<li><code>Divide: 233 ÷ 32 =</code> <strong><code>7.28…</code></strong></li>
<li><code>Floor =</code> <strong><code>7</code></strong></li>
<li><code>Multiply: 7 × 32 =</code> <strong><code>224</code></strong></li>
</ul>
<h3 id="heading-result"><code>Result:</code></h3>
<p><strong><code>Network address = 10.89.107.224/27</code></strong> <code>✅</code></p>
<h3 id="heading-broadcast-address"><code>Broadcast Address</code></h3>
<p><strong><code>Broadcast</code></strong> <code>= Network + block − 1</code></p>
<p><strong><code>Broadcast</code></strong> <code>= 224 + 32 = 256-1 = 255</code></p>
<p><strong><code>Broadcast address = 10.89.107.255/27</code></strong> <code>✅</code></p>
<h3 id="heading-step-1-understand-the-27-subnet-mask"><strong>Step 1: Understand the /27 Subnet Mask</strong></h3>
<ul>
<li>A <strong>/27 subnet</strong> means <strong>27 bits for the network</strong> and <strong>5 bits for the hosts</strong>.</li>
<li>The <strong>subnet mask</strong> is:<strong>255.255.255.224</strong><ul>
<li><strong>224</strong> in the fourth octet = <strong>11100000</strong> in binary.</li>
</ul>
</li>
<li>The <strong>block size</strong> (increment) in the <strong>fourth octet</strong> is:</li>
</ul>
<p>$256−224=32$</p>
<ul>
<li>This means <strong>subnets increase in steps of 32</strong> in the <strong>fourth octet</strong>.</li>
</ul>
<h3 id="heading-step-2-identify-the-network-address"><strong>Step 2: Identify the Network Address</strong></h3>
<ul>
<li>The <strong>fourth octet</strong> of <strong>10.89.107.233</strong> is <strong>233</strong>.</li>
<li>Find the  <strong>X*32</strong> that is <strong>≤ 233</strong>: (x<em>32 smaller than 233)
$7</em>32=224 ≤ 233$</li>
<li><strong>So, the network address is</strong>: <strong>10.89.107.224/27</strong>.</li>
</ul>
<h2 id="heading-question-2-a-host-has-the-ip-address-19216824917728-what-is-the-broadcast-address-of-its-subnet">Question 2: A host has the IP address 192.168.249.177/28. What is the broadcast address of its subnet?</h2>
<h3 id="heading-step-1-understand-the-28-subnet-mask"><strong>Step 1: Understand the /28 Subnet Mask</strong></h3>
<ul>
<li>A <strong>/28 subnet</strong> means <strong>28 bits for the network</strong> and <strong>4 bits for hosts</strong>.</li>
<li>The <strong>subnet mask</strong> is: <strong>255.255.255.240</strong></li>
<li>The <strong>block size</strong> (increment) in the <strong>fourth octet</strong> is:
$256−240=16$</li>
<li>This means <strong>subnets increase in steps of 16</strong> in the <strong>fourth octet.</strong></li>
</ul>
<h3 id="heading-step-2-find-the-broadcast-address"><strong>Step 2: Find the Broadcast Address</strong></h3>
<ul>
<li>The <strong>fourth octet</strong> of <strong>192.168.249.177</strong> is <strong>177</strong>.</li>
<li>Find the <strong>X*16</strong> that is <strong>≥ 177</strong> (x*16 greater than 177):</li>
</ul>
<p>$12*16 =192 ≥ 177 $</p>
<ul>
<li>The <strong>broadcast address</strong> is <strong>one less than the next subnet</strong>:<ul>
<li><strong>192.168.249.192 - 1 = 192.168.249.191</strong>.</li>
</ul>
</li>
</ul>
<p><strong>Easy way to find network ID (Subnet ID - network ID)</strong> </p>
<p>172.25.167.176</p>
<p>255.255.240.0 </p>
<p>172.255. .0 </p>
<h2 id="heading-3-rules-applied-to-subnet-mask">3 rules applied to subnet mask</h2>
<ol>
<li>If the subnet mask <strong>value=255</strong> writes the same IP, for example, <strong>255 above 172.</strong></li>
<li>If the subnet mask <strong>value=0</strong>, just <strong>set 0 zero instead of the IP</strong>.</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/39c543c5-691d-44c3-a40b-90014be4ae17.png" alt="CCNA 200-301 Study (1)" /></p>
<p>3-     256- subnet mask = Network increment </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3b2867b3-e7d7-4d13-bd2c-a51978df1e07.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-we-have-three-rules-for-broadcast">We have three rules for Broadcast</h2>
<ol>
<li><strong>255 → Ip</strong></li>
<li><strong>0 → 255</strong></li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/59a65ff9-7b30-4bf8-a3d4-488a3136aae7.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-ccna-subnetting-find-the-valid-host-range-for-a-network"><strong>CCNA SUBNETTING: Find the Valid Host Range for a network</strong></h2>
<h3 id="heading-find-a-valid-host-range-17213014613319">Find a valid Host range 172.130.146.133/19?</h3>
<p>Now we need to find the ‌‌<strong>Host ID and Broadcast ID</strong> </p>
<h3 id="heading-network-id">Network ID</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9d98c70d-d2aa-4ffb-8640-3b1a89f41561.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For the subnet mask, we chose a smaller number.</p>
<h3 id="heading-broadcast-id">Broadcast ID</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aaad290a-0e33-4062-bf78-4a97504304e5.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-differences-between-flsm-subnetting-and-vlsm-subnetting">Differences between FLSM Subnetting and VLSM Subnetting</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>FLSM (<strong>Fixed</strong> <strong>Length Subnet Masks</strong>) Subnetting</td><td>VLSM (<strong>Variable</strong> <strong>Length Subnet Masks</strong>) Subnetting</td></tr>
</thead>
<tbody>
<tr>
<td>All subnets are <strong>equal in size</strong>.</td><td>Subnets are <strong>variable in size</strong>.</td></tr>
<tr>
<td>All subnets have <strong>equal number of hosts</strong>.</td><td>Subnets have <strong>variable number of hosts.</strong></td></tr>
<tr>
<td>All subnets use <strong>same subnet mask</strong>.</td><td>Subnets use <strong>different subnet masks</strong>.</td></tr>
<tr>
<td>It is <strong>easy</strong> to configuration and administration.</td><td>It is <strong>complex</strong> in configuration and administration.</td></tr>
<tr>
<td>It <strong>wastes a lot of IP</strong> addresses.</td><td>It <strong>wastes minimum IP</strong> addresses.</td></tr>
<tr>
<td>It is also known as <strong>classfull</strong> Subnetting.</td><td>It is also known as <strong>classless Subnetting.</strong></td></tr>
<tr>
<td>It supports both <strong>classfull and classless routing protocols like RIP-2 .</strong></td><td>It supports <strong>only classless routing protocols like OSPF and EIGRP,</strong>.</td></tr>
</tbody>
</table>
</div><h2 id="heading-vlsm-subnetting"><strong>VLSM Subnetting</strong></h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/94bbb385-841a-46ee-9c07-60f0e7990feb.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p>In this network: -</p>
<ul>
<li>The development department has 74 computers.</li>
<li>The production department has 52 computers.</li>
<li>The administration department has 28 computers.</li>
<li>Departments are connected via the WAN links.</li>
<li>Each WAN link requires two IP addresses.</li>
<li>The given address space is 192.168.1.0/24.</li>
</ul>
<p><strong>VLSM</strong></p>
<ul>
<li>Assign the <strong>largest</strong> at the start of the address space.</li>
<li>Assign the <strong>second-largest</strong> subnet after it.</li>
<li>Repeat <strong>the process until all subnets have been assigned</strong>.</li>
</ul>
<h2 id="heading-subnetting-question">Subnetting Question</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d6991a66-5725-4f15-855f-30e115472d93.png" alt="CCNA 200-301 Study (1)" /></p>
<p>10.10.13.160/29 
The subnet mask is <strong>255.255.255.248</strong> (block size 8). That subnet covers <strong>10.10.13.160–10.10.13.167</strong> with usable hosts <strong>.161–.166</strong> and <strong>.167</strong> as broadcast.</p>
<p><strong>D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7811910c-9eb2-4059-98d7-80eb6e4c2bab.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Netmask: <code>0xffffe000</code> → this hex mask equals <strong>255.255.224.0</strong>, i.e. <strong>/19</strong>.</p>
<p><strong>C ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/922b9fdc-3a5e-426b-ad67-cc4d01e52ce1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><code>The prefix</code> <strong><code>/32</code></strong> <code>(mask</code> <strong><code>255.255.255.255</code></strong><code>) is a</code> <strong><code>host route</code></strong>—it matches exactly one IP address, here <strong>10.0.1.3</strong>. So that entry represents a route to just that single host,</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1f0506c1-4644-4f84-be27-c0543f939089.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The destination is the IP of <strong>GigabitEthernet0/0/0</strong>, which the table shows as the local route:</p>
<pre><code class="lang-javascript">L <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.3</span>/<span class="hljs-number">32</span> is directly connected, GigabitEthernet0/<span class="hljs-number">0</span>/<span class="hljs-number">0</span>
</code></pre>
<p>Routing uses the <strong>longest prefix match</strong>. Between <code>10.10.10.0/24</code> and <code>10.10.10.3/32</code>The/32 host route is more specific, so it’s the destination route. A /32 corresponds to the subnet mask <strong>255.255.255.255</strong>.
<strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/51c5a48a-8f04-4712-9814-55e3d0a2f703.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The destination IP is <strong>172.16.32.8</strong>. From the routing table, the matching routes are:</p>
<ul>
<li><code>172.16.32.0/26</code></li>
<li><code>172.16.32.0/24</code></li>
<li><code>172.16.32.0/19</code></li>
</ul>
<p>the <strong>/26</strong> network. By <strong>longest-prefix match</strong>, <code>/26</code> is preferred over <code>/24</code> and <code>/19</code></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ca90972d-cef1-4df9-909e-5f9e6682356f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><code>255.255.255.252</code> → mask is /30 </p>
<p><code>10.2.1.3 255.255.255.252</code> → mask is /30 (correct), but <strong>.3</strong> in a /30 is the <strong>broadcast</strong> of the block (.0–.3), so <strong>not usable</strong>.</p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8d07bb71-66a3-4bb2-83c2-5ef4032fcb3e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>8 floors × 30–40 users = <strong>about 320 users total</strong>.
All users must be in <strong>one subnet</strong>.
Need a subnet that can support at least <strong>320 usable hosts</strong>.</p>
<p>2^9
<strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20cdec83-92c0-42c3-b80a-7895e2a1cca0.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Each floor needs ≈ 22–29 hosts → choose <strong>/27</strong> (255.255.255.224), which gives <strong>30 usable</strong> IPs per floor.</p>
<p>Four /27 subnets (4 × 32 addresses) occupy <strong>128 addresses total</strong>, which aggregates perfectly into a <strong>/25</strong> block.</p>
<p><strong>If you have 4 (subnet) × /27</strong></p>
<ul>
<li>4 <strong>(subnet)</strong>× 32 <strong>(block size)</strong> =<strong>128</strong> addresses total</li>
<li>That means the four /27 networks together span <strong>128 consecutive addresses</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3de574a3-0aea-4987-985e-e4cdc89469a0.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The packet is going to: <strong>172.16.3.254</strong></p>
<h3 id="heading-which-network-covers-172163254">Which network covers 172.16.3.254?</h3>
<ul>
<li><strong>172.16.1.33/32</strong> → only 172.16.1.33, does <strong>not</strong> cover 172.16.3.254.</li>
<li><strong>172.16.2.1/32</strong> → only 172.16.2.1, does <strong>not</strong> cover 172.16.3.254.</li>
<li><strong>172.16.2.0/23</strong> → covers <strong>172.16.2.0 – 172.16.3.255</strong>, and <strong>yes</strong>, 172.16.3.254 is inside this range.</li>
</ul>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e21dc3f-a703-46cd-ac3d-1f36b7252e1b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/883f3068-fdfb-415e-bc94-2731c94f8831.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Group needing 24 hosts →/27 (255.255.255.224)</p>
<p>A and D → <strong>255.255.254.0</strong></p>
<ul>
<li><strong>A: 10.70.148.1 /23</strong> → network 10.70.148.0/23, and <strong>.1</strong> is the first usable. ✅</li>
<li><strong>D</strong> misaligns a /23 (159 is odd; /23 networks start on even octets: …148.0, 150.0, 152.0, …, 158.0). ❌</li>
</ul>
<p>Group needing 472 hosts → /23 (255.255.254.0)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a288e92e-42b0-4692-a3a0-52bd5e36c752.png" alt="CCNA 200-301 Study (1)" /></p>
<p> D. <code>ip route 10.10.2.1 255.255.255.255 192.168.1.4 100</code>
The administrative distance <strong>100</strong> keeps it preferred over OSPF (110) even if prefix lengths were equal (not needed here, but harmless).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9420a8e6-f68e-4176-b535-bd1a663f3369.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>10.10.13.0 → 255.255.255.128</strong> ( /25 )</li>
<li><strong>10.10.13.128 → 255.255.255.240</strong> ( /28 )</li>
<li><strong>10.10.13.160 → 255.255.255.248</strong> ( /29 )</li>
<li><strong>10.10.13.252 → 255.255.255.252</strong> ( /30 )</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6f60b4b5-dd99-4f6a-a8a9-75b81ab056d1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=-ldJlyf6ONA">bookmark</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=yxcexmct2EU">bookmark</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=rJMb5l30Dg8&amp;list=PL_d87bH2yH6j-t6KppEn6cpsFoVTHlLua&amp;index=13">bookmark</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=ZVzHhd1q9v0">bookmark</a></p>
<h2 id="heading-ip-v6">IP V6</h2>
<h1 id="heading-intro-to-ipv6-address">Intro to IPV6 Address</h1>
<ul>
<li><strong>128-bit</strong> Addresses are written as <strong>32 hexadecimal</strong> digits.</li>
<li>Digits are arranged into <strong>8 groups</strong> of four to improve readability.</li>
<li>Groups are separated by <strong>colons</strong>.</li>
</ul>
<p>Hex:2001:0718:1c01:0016:20d:56ff:fe77:52a3</p>
<h3 id="heading-why-was-hexadecimal-used-in-ipv6"><strong>Why was Hexadecimal used in IPv6?</strong></h3>
<p>to create a large amount of unique IP addresses</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>IPv4</td><td>IPv6</td></tr>
</thead>
<tbody>
<tr>
<td>Total IP addresses 4,294,967,296</td><td>Total IP Addresses:(2^128)</td></tr>
<tr>
<td>32-bit</td><td>128-bit</td></tr>
<tr>
<td>Binary bits are separated by a dot (.)</td><td>Binary bits are separated by a colon(:)</td></tr>
<tr>
<td>Exmple:192.168.1.1</td><td>Example:2001:0718:1c01:0016;020d:56ff:fe77:52a3</td></tr>
<tr>
<td>Five different classes of IP address</td><td>No <strong>Classifications</strong></td></tr>
<tr>
<td>IPV4 supports <strong>broadcast</strong></td><td>IPv6 <strong>doesn’t</strong> support broadcast</td></tr>
<tr>
<td>4 octets</td><td>8 hextet</td></tr>
</tbody>
</table>
</div><h2 id="heading-zero-suppression">Zero Suppression</h2>
<ul>
<li>Zero compression can only be used to compress a single contiguous series of 16-bit blocks expressed in colon hexadecimal notation.</li>
<li>Zero compression can only be used once in a given address.</li>
</ul>
<p>Rules </p>
<ol>
<li>If we have equal or more than <strong>two</strong> groups of <strong>0000</strong> we can change it to<strong>::</strong>   <strong>(The double colon (::) can only be used once within an address, otherwise there would be more than one possible resulting address.)</strong>
Here is an example of the <strong>incorrect</strong> use of the double colon: 2001:db8::abcd::1234.</li>
<li>Change 0000 to 0 only.</li>
<li>Leading zero can be removed.
<strong>01ab</strong> can be represented as <strong>1ab
00ab</strong> can be represented as <strong>ab
0a**</strong>00<strong> can be represented as </strong>a<strong>**00</strong></li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ec02d217-90eb-44d7-bb4c-639006c35b16.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Original</strong>:2041:000:140f:<strong>0000:0000:0000:</strong>875B:131B</p>
<p><strong>short</strong>:2041:<strong>0000</strong>:140F<strong>::</strong>875B:131B</p>
<p><strong>shorter</strong>:2041:<strong>0</strong>:140F::875B:131B</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2496b090-4f7d-45be-9512-dcb27f96d741.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b4c977bd-a36d-4986-9008-8e091b0649b8.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-ipv6-prefixes">IPV6 Prefixes</h1>
<ul>
<li>The prefix is the part of the address that indicates the bits that have fixed values or are the bits of the subnet prefix.</li>
<li>Prefixes for IPv6 subnets are expressed in the same way as (CIDR) notation for IPv4.</li>
<li>For example, 21DA:D3::/<strong>48</strong> and 21DA:D3:0:2F3b::/<strong>64</strong> are IPv6 address prefixes.</li>
<li><strong>A subnet mask is not used for IPv6; only the prefix length notation is supported.</strong></li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Type</strong></td><td><strong>Prefix</strong></td><td><strong>Scope</strong></td><td><strong>Purpose / Use</strong></td><td><strong>Example</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Global Unicast</strong></td><td><code>2000::/3</code></td><td>Global (Internet)</td><td>Public IPv6 address, routable on the Internet (like IPv4 public addresses).</td><td><code>2001:db8::1</code></td></tr>
<tr>
<td><strong>Unique Local (ULA)</strong></td><td><code>FC00::/7</code> (<code>FDxx::</code>)</td><td>Local (Private)</td><td>Works like private IPv4 (<code>10.x.x.x</code>, <code>192.168.x.x</code>), used in internal networks.</td><td><code>FD12:3456:789A::1</code></td></tr>
<tr>
<td><strong>Link-Local</strong></td><td><code>FE80::/10</code></td><td>Link (single segment)</td><td>Automatically assigned to every interface, used for local comms (neighbor discovery, routing).</td><td><code>FE80::1</code></td></tr>
<tr>
<td><strong>Multicast</strong></td><td><code>FF00::/8</code></td><td>One-to-many</td><td>Packets delivered to multiple devices at once (routing protocols, discovery).</td><td><code>FF02::1</code> (all nodes), <code>FF02::2</code> (all routers)</td></tr>
<tr>
<td><strong>Anycast</strong></td><td>(uses Unicast)</td><td>Nearest (routing-based)</td><td>Same address assigned to multiple devices → traffic goes to closest one.</td><td>Common for DNS servers</td></tr>
<tr>
<td><strong>Loopback</strong></td><td><code>::1/128</code></td><td>Host only</td><td>Used by a host to test itself (like IPv4 <code>127.0.0.1</code>).</td><td><code>::1</code></td></tr>
<tr>
<td><strong>Unspecified</strong></td><td><code>::/128</code></td><td>None</td><td>Represents “no address”, used as source before a device gets an IP.</td><td><code>::</code></td></tr>
<tr>
<td><strong>IPv4-mapped</strong></td><td><code>::FFFF/96</code></td><td>Transition</td><td>Allows IPv6-only nodes to talk to IPv4 nodes.</td><td><code>::FFFF:192.0.2.128</code></td></tr>
</tbody>
</table>
</div><h2 id="heading-ipv6-header">IPv6 Header</h2>
<p>Simpler than IPv4:</p>
<ul>
<li>Fixed 40-byte header.</li>
<li>no checksum → faster processing.</li>
</ul>
<ul>
<li><strong>Loopback IPv6 address:</strong> an IPv6 address used on a loopback interface. the IPv6 loopback address is 0:0:0:0:0:0:0:1 which can be notated as ::1/128.</li>
<li><strong>Unspecified address:</strong> an IPv6 unspecified address is 0:0:0:0:0:0:0:0, which can be notated as :<strong>::/128</strong></li>
</ul>
<h1 id="heading-link-local">Link-Local</h1>
<ul>
<li>IPv6 link-local addresses are equivalent to IPv4 link-local addresses(169.254.0.0/16).</li>
<li>IPv4 link-local addresses are known as automatic private IP addressing (<strong>APIPA</strong>) addresses for computers running the current Microsoft Windows operating system.</li>
<li>A Link-local address is required for Neighbor Discovery(NDP) processes and is always automatically configured, even in the absence of all other unicast addresses.</li>
</ul>
<h1 id="heading-link-localeui-64">Link-local(EUI-64)</h1>
<ul>
<li>used only between nodes connected on the <strong>same local link.</strong></li>
<li>When an <strong>IPv6 stack</strong> is enabled on a node, one link-local address is automatically assigned to each interface of the node at boot time.</li>
<li>IPv6 link-local prefix <strong>FE80::/10</strong> is used, and the interface identifier in Extended Unique Identifier 64 (EUI-65) format is appended as the address's low-order 64-bit.</li>
<li>Link-local addresses ar<strong>e only for</strong> link-local scope and must never be routed between subnets within a site.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/73da63b7-df98-4475-8c05-012144ed335c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>There's a challenge with creating the second 64 bits from the MAC address, as MAC addresses are only 48 bits long. To solve this, we insert <strong>FFFE</strong> in the middle of the MAC address.</p>
<p><strong>Example Calculation:</strong></p>
<ol>
<li><strong>MAC Address:</strong> <code>AA:BB:CC:DD:EE:FF</code></li>
<li><strong>Split the MAC Address:</strong> <code>AA:BB:CC</code> | <code>DD:EE:FF</code></li>
<li><strong>Insert FFFE:</strong> <code>AA:BB:CC:FF:FE:DD:EE:FF</code></li>
<li><strong>Flip the 7th Bit in AA (10101010 → 10101000)</strong>: <code>A8:BB:CC:FF:FE:DD:EE:FF</code></li>
<li><strong>Final EUI-64 Interface ID:</strong> <code>A8BB:CCFF:FEDD:EEFF</code></li>
</ol>
<pre><code class="lang-javascript">Router <span class="hljs-number">2</span> (config)# interface FastEthernet0/<span class="hljs-number">0</span>
Router <span class="hljs-number">2</span> (config-<span class="hljs-keyword">if</span>)# ipv6 enable
Router <span class="hljs-number">2</span> (config-<span class="hljs-keyword">if</span>)# ipv6 address autoconfig
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b201c5d1-9236-438d-b096-c3d81ac5c0da.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-loopback-address-1">Loopback address</h1>
<ul>
<li>The loopback address(0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling the node to send a packet to itself.</li>
<li>It is equivalent to the IPv4 loopback address of 127.0.0.1.</li>
<li>Packets addressed to the loopback address must never be sent on a link or forwarded by an IPv6.</li>
</ul>
<h1 id="heading-broadcast">Broadcast</h1>
<p>• <strong>Broadcast</strong> - There are no broadcast addresses in IPv6. Broadcast functionality is implemented using multicast addresses. </p>
<h1 id="heading-anycast-not-very-important">Anycast (not very important)</h1>
<ul>
<li>An Anycast is an address that is assigned to a set of interfaces that typically belong to different nodes. A packet sent to an anycast address is delivered to the closest interface identified by the anycast address.</li>
<li>Assigning a unicast address to more than one interface makes a unicast address an anycast address.</li>
<li>Anycast is a network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receivers, though it may be sent to several nodes, all identified by the same destination address. Example: Used in DNS query.</li>
</ul>
<h1 id="heading-ipv6-transaction">IPv6 Transaction</h1>
<ul>
<li><strong>Dual-stack:</strong> means a device runs <strong>both IPv4 and IPv6</strong> at the same time. This allows networks to support both protocols during the transition from IPv4 to IPv6.</li>
</ul>
<p>In a dual-stack environment, which protocol does a device prefer if both IPv4 and IPv6 are available?</p>
<ul>
<li>IPv6 is preferred if available</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/732ef06d-0c55-4bc1-bb37-70c738ffc1da.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Tunneling</strong> is a method of <strong>transporting an IPv6 packet over an IPv4 network</strong>. The IPv6 packet is <strong>encapsulated inside an IPv4 packet</strong>, similar to other types of data.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0629fb2c-6af3-4000-90ea-4278c4c7c438.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Translation: Network Address Translation 64</strong> (<strong>NAT64</strong>) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a <strong>translation technique similar to NAT for IPv4</strong>. <strong>An IPv6 packet is translated to an IPv4 packet, and an IPv4 packet is translated to an IPv6 packet.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8a877c5e-0422-4367-9186-484588d7bdd3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>What is the most important motivating factor for moving to IPv6?</p>
<ul>
<li><strong>Depletion of IPv4 addresses.</strong></li>
</ul>
<p>What is the default route address of IPv6?</p>
<ul>
<li><strong>::/0</strong></li>
</ul>
<p><strong>Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?</strong></p>
<p><strong>• Hop Limit</strong></p>
<p><strong>What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?</strong></p>
<ul>
<li><strong>2001:DB8:BC15:A</strong></li>
</ul>
<p><strong>SLAAC (Stateless Address Auto Config):</strong></p>
<p>a method used in IPv6 networks that allows devices to automatically configure their IPv6 addresses without the need for a DHCP server</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b9c5d7cf-7c83-4f69-a9ad-65f9feea77e3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d2672b72-01b9-432a-a3e1-2858cb466a76.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong><code>3ffe:e54d:620a:a87a:f00d</code></strong> is a <strong>Global Unicast Address</strong> because it starts with <code>3</code> , which is part of the <code>2000::/3</code> range for globally routable addresses.</p>
<p>An <strong>Anycast Address</strong> is similar to a unicast address because it is assigned to multiple devices, but traffic sent to this address is delivered to the closest (nearest) device in the group</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e32a8fe7-bab2-46f8-a445-aa6faa22edbf.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Anycast Address</strong> is <strong>similar to a unicast address</strong> because it is assigned to multiple devices, but traffic sent to this address is delivered to the closest (nearest) device in the group</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/624c0473-5c95-475a-b97c-34c53b1042e8.png" alt="CCNA 200-301 Study (1)" /></p>
<p> The correct prefix length for the IPv6 address would be <strong>/128</strong> because it refers to one specific host (the router interface).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1ee9e239-47c8-40a0-ab4b-dcf01106ceba.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Take the MAC</strong> of R1’s LAN interface (E0/1 in the figure):</p>
<p><code>13-19-be-67-00-01</code> → in hex bytes: <code>13:19:be:67:00:01</code>. </p>
<p><strong>Split and insert</strong> <strong><code>ff:fe</code></strong></p>
<p>in the middle (that’s how EUI-64 expands 48-bit MAC to 64-bit):</p>
<p><code>13:19:be</code> + <code>ff:fe</code> + <code>67:00:01</code> → <code>13:19:be:ff:fe:67:00:01</code>.</p>
<p><strong>Flip the U/L bit</strong> (the 7th bit) of the <strong>first byte</strong>:</p>
<p>Resulting interface ID bytes: <code>11:19:be:ff:fe:67:00:01</code>.</p>
<p><strong>Group into hextets</strong> (two bytes each):
<code>1119:beff:fe67:0001</code> → <code>1119:beff:fe67:1</code>.</p>
<p><strong>Attach the /64 prefix</strong> for R1’s LAN shown in the diagram:</p>
<p>Prefix = <code>2001:db8:1006:1968::/64</code>.</p>
<p>Final IPv6 address: <strong><code>2001:db8:1006:1968:1119:BEFF:FE67:1</code></strong> → option <strong>B</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2ad7b319-7ad3-4326-b6a6-c4240d0e4b11.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A. <code>ipv6 route 2000::1/128 2012::1</code> </p>
<p>   [route loopback through next router IP 2012::1 IP addresses of Se0/0/0 interface]</p>
<p>E. <code>ipv6 route 2000::1/128 2023::3 5</code>
This is a <strong>floating static</strong> backup via Washington (Washington S0/0/0 = <strong>2023::3</strong>) with a higher administrative distance (<strong>5</strong>).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a98bf085-bf7f-415e-94d2-59ed4abaf03d.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 ipv6 route <strong>::/0</strong>  next-hop IPv6 or existing interface.</p>
</blockquote>
<p>Answer: A
On those two routers, the interface that faces New-York is <strong>Serial 0/0/0</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/50dbc35d-5ed7-4e65-9db6-adf97ca4e988.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The current default route is <code>ND</code> and the syntax [X/Y] shows the administrative distance (X) and the metric (Y). Therefore, the primary default route, learned via <strong>Neighbor Discovery (ND)</strong>, has an administrative distance of <strong>2</strong>.</p>
<p><code>ipv6 route ::/0 2001:db8:1234:2::1 3</code> Correct [Higher AD for the Backup Route]</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8e32f68c-11bf-4700-a217-50a333a57568.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Correct: B.</strong> <strong><code>2001:db8:0234:cae3::1/128</code></strong></p>
<ul>
<li>Anycast in IPv6 uses <strong>global unicast addresses</strong> (/128) that are configured on multiple devices.</li>
</ul>
<h2 id="heading-vlan">VLAN</h2>
<h1 id="heading-collision-domain">Collision Domain</h1>
<p>A <strong>collision domain</strong> is a network segment where devices share the same communication medium, and if two devices transmit data at the same time, their signals can <strong>collide</strong>, causing the transmission to fail and requiring retransmission. It happens only in <strong>half-duplex mode.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5f203a9a-1ca4-46cc-b425-6e503dcda085.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, a hub is one collision domain. If one port stops working, all ports stop working.</p>
<h1 id="heading-broadcast-domain">Broadcast Domain</h1>
<p>When a device sends out a broadcast message, all devices present in its broadcast domain must pay attention to it. This creates a lot of congestion in the network, commonly referred to as LAN congestion, which affects the bandwidth available to users within that network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0ab546da-cd99-4a22-bd33-00a8b539e5de.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In a switch, each port has a collision domain, without affecting other ports. When one port receives data, it broadcasts it to all other ports  (which means broadcasting a message to all ports and telling them I have received a packet, for which of you?), then, network engineers decided to separate switches into small parts by using VLANs.</p>
<ul>
<li>One broadcast domain for the whole network or only the user network can lead to unnecessary broadcast traffic, which, upon a traffic loop, might cause a complete service outage.</li>
<li>Secondly, but even more important, <strong>large broadcast domains are vulnerable to traffic sniffing and easier man-in-the-middle kind of attacks</strong>.</li>
<li>A lack of VLANs can cause an administrative mess.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>Collision Domain</td><td>Broadcast Domain</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Definition</strong></td><td>A network segment where collisions can occur</td><td>A network segment where broadcasts are forwarded</td></tr>
<tr>
<td><strong>Devices involved</strong></td><td>Hubs, repeaters, old shared Ethernet networks</td><td>Switches (unless VLANs are used), all devices in a VLAN</td></tr>
<tr>
<td><strong>Effect on traffic</strong></td><td>Causes retransmissions due to collisions</td><td>Causes network congestion due to excessive broadcasts</td></tr>
<tr>
<td><strong>Separation method</strong></td><td>Switches (each port is a separate collision domain)</td><td>Routers or VLANs</td></tr>
<tr>
<td><strong>Example devices</strong></td><td>Hub-based networks</td><td>Switch-based networks without VLANs</td></tr>
</tbody>
</table>
</div><p>PC1 --- Hub --- PC2 --- Switch --- PC3</p>
<ul>
<li>Hub side (PC1 + PC2) = <strong>1 collision domain</strong>.</li>
<li>Switch separates PC3 into its <strong>own collision domain</strong>.</li>
<li>So total = <strong>2 collision domains</strong>.</li>
</ul>
<blockquote>
<p>💡 - <strong>Switch increases collision domains</strong> (per port).  </p>
<ul>
<li><strong>Hub shares 1 collision domain</strong> for all.</li>
</ul>
</blockquote>
<ul>
<li><strong>Switch increases collision domains</strong> (per port).</li>
<li><strong>Hub shares 1 collision domain</strong> for all.</li>
</ul>
<h1 id="heading-vlan-1">VLAN</h1>
<p>VLANs(Virtual LANs) are a <strong>logical grouping</strong> of devices in the same broadcast domain. VLANs are usually <strong>configured on switches by placing some interfaces into one broadcast domain and some interfaces into another</strong>. Each VLAN acts as a subgroup of the switch ports in an Ethernet LAN.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/339846e1-1952-4860-a514-1e288512c261.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Note</strong>: All nodes from VLAN one can’t access the nodes in VLAN two.</p>
<p><strong>Note</strong>: VLAN one (VLAN 1) is allocated for the default VLAN(native VLAN).</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Range</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>VLAN 1:</td><td>This is a default VLAN of switches. You cannot delete or edit this VLAN, but it can be used.</td></tr>
<tr>
<td>VLAN 2-4094:</td><td>It is a normal VLAN range. You can create, edit, and delete it.</td></tr>
</tbody>
</table>
</div><h1 id="heading-advantages-of-using-vlan">Advantages of using VLAN</h1>
<ul>
<li>It solves a <strong>broadcast problem</strong>. By <strong>reducing the size</strong> <strong>of broadcast domains and</strong> <strong>increasing the number</strong> <strong>of Broadcast domains</strong>. (the primary advantage of using VLAN)</li>
<li>VLAN allows you to add an <strong>additional layer of security</strong>.</li>
<li>It can make <strong>device management simple and easier</strong>.</li>
<li>VLAN makes <strong>managing physical devices less complex</strong>.</li>
<li>It lets <strong>you easily segment your network.</strong></li>
<li>Make a single switch into <strong>multiple switches.</strong></li>
</ul>
<h1 id="heading-native-vlan">Native VLAN</h1>
<p>The <strong>native VLAN</strong> is a special VLAN designated on a <strong>trunk port for carrying untagged traffic.</strong></p>
<p>When a switch port is set as a trunk, any incoming Ethernet <strong>frame with</strong><em><strong>out a VLAN tag is assigned to the native VLAN</strong></em><strong>.</strong></p>
<blockquote>
<p>💡 <strong>VLAN Hopping Attacks</strong>: By default, using VLAN 1 as the native VLAN can pose a security risk. A best practice is to configure the native VLAN as an unused or less critical VLAN to prevent potential <strong>VLAN hopping</strong> attacks.</p>
</blockquote>
<p>Which VLANs exist by default on a Cisco switch and cannot be deleted?</p>
<ul>
<li>1, 1002-1005</li>
</ul>
<p># 
Tagged VLANs</p>
<p>Tagged VLANs are a method of <strong>marking Ethernet frames with a VLAN identifier</strong> so that switches and network devices can distinguish between traffic from different VLANs on the same physical link. distinguish between traffic from different</p>
<p>The tagging standard used is <strong>IEEE 802.1Q</strong>.</p>
<p>When traffic is sent over a <strong>trunk port</strong>, each frame includes a <strong>VLAN tag</strong> (a <strong>4-byte field added to the Ethernet frame header</strong>). This tag contains the <strong>VLAN ID</strong>, which specifies which VLAN the frame belongs to.</p>
<p><strong>Trunk ports</strong>  = Tagged ports </p>
<p><strong>Access port</strong> =  Untagged Ports </p>
<h2 id="heading-vlan-configuration">VLAN Configuration</h2>
<pre><code class="lang-javascript">SW1#show vlan
SW1(config)#vlan <span class="hljs-number">10</span> (a number you assigned to the vlan)
SW1(config-vlan)# name sales (your vlan name)
SW1(config-vlan)#exit

SW1(config)# int fa0/<span class="hljs-number">3</span> (<span class="hljs-keyword">switch</span> port that connected to the computer)
SW1(config)#switchport mode access(it means the port is not available on vlan1 and gets out <span class="hljs-keyword">from</span> public accessing (valn1) and should be accessed by a VLAN I will assign to it.) 
SW1(config)#switchport access vlan <span class="hljs-number">10</span> ( your vlan number)
SW1(config)#end
</code></pre>
<p>Note: if you have multiple switches, the same configuration should be applied to all of them.</p>
<p><strong>VLAN 3 is not yet configured on your switch. What happens if you set the switchport access VLAN 3 command interface configuration mode?</strong></p>
<p>The command is accepted, and the respective VLAN is added to vlan.dat.</p>
<h3 id="heading-how-do-you-see-all-vlans-created-and-ports-assigned-to-the-specific-vlan">How do you see all VLANs created and ports assigned to the specific VLAN?</h3>
<pre><code class="lang-javascript">SW1#show vlan
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7d5ebd72-3738-4035-914c-afedf51f5402.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-remove-a-port-from-a-vlan-sefos"><strong>Remove a Port From a VLAN (SEFOS)</strong></h2>
<pre><code class="lang-javascript"><span class="hljs-keyword">switch</span>(config)# interface gigabitethernet <span class="hljs-number">0</span>/<span class="hljs-number">2</span>
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)#no switchport access vlan [number]
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<h2 id="heading-how-to-remove-vlans">How to remove VLANs</h2>
<pre><code class="lang-javascript">SW1(config)#no vlan <span class="hljs-number">10</span>(vlan number you want to <span class="hljs-keyword">delete</span> it).
</code></pre>
<h1 id="heading-trunk">Trunk</h1>
<p>A <strong>trunk</strong> is a <strong>network link that carries multiple VLANs</strong> between devices, such as between switches, routers, or other network devices. It allows the transmission of traffic for more than one VLAN over a single physical link, reducing the number of physical connections required.</p>
<p><strong>Encapsulation Types</strong></p>
<p>802.1 IEEE can be used on all vendor devices. </p>
<p>ISL →previously used by Cisco, not usable today.</p>
<ul>
<li><strong>Access Port</strong>: A port that can be assigned to a single VLAN. This type of interface is configured on switch ports that are connected to end devices, such as workstations or printers.</li>
<li><p><strong>Trunk Port:</strong> A port that is connected to another switch. This type of interface can carry traffic of multiple VLANs.</p>
<p>  <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d4822004-7691-400e-8d16-8332c15ea6ae.jpeg" alt="CCNA 200-301 Study (1)" /></p>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/88fe0592-3f09-45ec-9051-1770b840a495.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-f#">Swith1(config)#interface fa0/0
Swith1(config-if)switchport mode trunk
Swith1(config-if)#switchport trunk allowed vlan (Vlan ID or range).
Swith1(config-if)#swithport nonegotiaite
</code></pre>
<h1 id="heading-dynamic-trunking-protocol">Dynamic Trunking  Protocol</h1>
<ul>
<li><strong>Dynamic Trunking Protocol</strong> is a Cisco proprietary protocol used for negotiating a trunk link between two switches, as well as the encapsulation type. It is a layer 2 protocol and is enabled by default.</li>
<li>S<strong>witchport mode dynamic auto:</strong> This is a default mode on the older CISCO switches. This mode makes the interface able to convert to a trunk link. The interface will become a trunk link if the neighboring interface is set to trunk or desirable mode. If both switches’ interface mode is auto, then the trunk will not be formed.</li>
<li><strong>Switchport mode dynamic desirable:</strong> the interface will actively attempt to convert the link into a trunk link. The interface will become a trunk link port if the neighbouring interface is set to trunk. desirable or auto.</li>
<li><strong>Switchport nonegotiate (</strong>very usable technique)<strong>:</strong> This mode prevents the interface from generating DTP frames. This command is used only when the switch port mode is accessed or turned on. You must manually configure the neighboring interface as a trunk interface to establish a trunk link.</li>
</ul>
<h1 id="heading-router-on-a-stick-one-armed-router">Router on a stick (one-armed router)</h1>
<p>A router on a stick is one method for allowing routing between VLANs. That kind of setup consists of a router and a switch connected through one Ethernet link configured as an 802.1q trunk link. Such a configuration is typical in networks where no layer-3 switch exists.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b3838f76-9f88-46a0-a42b-08eddd6da05e.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config-<span class="hljs-keyword">if</span>)# int fa0/<span class="hljs-number">0.10</span> (we should create <span class="hljs-number">2</span> sub interfaces to each VLAN)
Router(config-subif)#encapuslation dot1q <span class="hljs-number">10</span> (VLAN ID)
Router(config-subif)#ip address <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.55</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> (Assign an IP address <span class="hljs-keyword">from</span> vlan <span class="hljs-number">10</span> to the sub-interface) 
------------second sub-interface -------------
Router(config-<span class="hljs-keyword">if</span>)# int fa0/<span class="hljs-number">0.20</span> 
Router(config-subif)#encapuslation dot1q <span class="hljs-number">10</span>
Router(config-subif)#ip address <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.55</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
</code></pre>
<p>Use the same command to create a sub-interface to the  second VLAN, then write the command no shutdown </p>
<blockquote>
<p>💡 The subinterface number <strong>does not</strong> have to match the VLAN Number. However, it is <strong>highly recommended</strong> that they do match, to make it easier to understand.</p>
<p>💡 The gateway of all devices in VLAN 10 should be the IP address assigned to the sub-interface. </p>
<p>💡 The switch port connected to the router in the switch should be changed to a trunk.</p>
</blockquote>
<h1 id="heading-vlan-troubleshooting-commands">VLAN Troubleshooting Commands</h1>
<p>| show vlan
show vlan brief                                         | Lists each VLAN and all interfaces assigned to that VLAN (but
does not include operational trunks)                                                   |
| ----------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- |
| show vlan id num                                                  | Lists both access and trunk ports in the VLAN                                                                                                        |
| show interfaces switchport
show interfaces type number
switchport | Identifies the interface’s access VLAN and voice VLAN, the
configured and operational mode (access or trunk), and the state
of the port (up or down) |
| show interface status                                             | Summarizes the status listing for all interfaces (connected, notconnect,
err-disabled), the VLAN, duplex, speed, and type of port                    |</p>
<p>Which interfaces are shown in the output of "show vlan brief"?</p>
<ul>
<li><strong>Access Ports</strong></li>
</ul>
<h2 id="heading-trunking-troubleshooting">Trunking Troubleshooting</h2>
<p><strong>Step 1:</strong> Identify all access interfaces and their assigned access VLANs, and reassign them into the
correct VLANs, as needed.</p>
<p><strong>Step 2:</strong> Determine whether the VLANs exist and are active on each switch. If needed, configure
and activate the VLANs to resolve problems.</p>
<p><strong>Step 3:</strong> Check the allowed VLAN lists on the switches on both ends of the trunk and ensure
that the lists of allowed VLANs are the same.</p>
<p><strong>Step 4:</strong> Ensure that, for any links that should use trunking, one switch does not think it is
trunking, while the other switch does not think it is trunking.</p>
<h1 id="heading-vlan-trunking-protocolvtp">VLAN Trunking Protocol(VTP)</h1>
<ul>
<li>The purpose of VTP is to provide a way to manage Cisco switches as a single group for VLAN configuration purposes. For example, if VTP is enabled on Cisco switches, the creation of a new VLAN on one switch makes that VLAN available to all switches within the <strong>same VTP management domain**</strong>.** A switch can be part of only one VTP management domain at a time, and is part of no VTP management domain by default.</li>
</ul>
<p>To show VTP details </p>
<pre><code class="lang-javascript">Router#show vtp status
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/71114f03-1f6c-4f33-9c11-948772aaf9b6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>VTP Operating Type: type of VTP.</p>
<h3 id="heading-how-to-set-the-vtp-domain">How to set the VTP domain</h3>
<pre><code class="lang-javascript">Router(config)#vtp domain your-domain-name
</code></pre>
<h3 id="heading-vtp-operating-type">VTP Operating Type:</h3>
<p><strong>Server</strong>: Receives and sends configuration from neighbouring switches. </p>
<p><strong>Client</strong>: We only receive VLANs from the server switch and can’t create any VLAN with this mode.</p>
<p><strong>Transparent</strong>: does not synchronize VLAN configuration information with other switches.</p>
<pre><code class="lang-javascript">Router(config)#vtp mode your-mode
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/afdf9aff-d44e-4aac-b2a8-5446716f62df.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C. configure ports in a black hole VLAN</strong></p>
<p>Because assigning unused ports to a blackhole VLAN ensures they are isolated, secure, and cannot be exploited if someone plugs into them.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e2acc31f-4fa9-448c-8d94-c77bc8bf8710.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5b9e06c4-e5b2-4f91-a237-d2c724aa2ce2.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>C</strong> → isolate unused ports in a dedicated, unused VLAN (blackhole VLAN).</li>
<li><strong>D</strong> → shut them down so no traffic pass</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6c6aae1c-6691-437d-841d-9e2a7a793d8c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a3ae5733-4325-4234-9be2-0d299d235373.png" alt="CCNA 200-301 Study (1)" /></p>
<p>B and C</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cf7b9e60-54ff-42e0-aed9-ee66be2d130b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Answer: C</strong> — The router will not accept the addressing scheme.</p>
<p>In the diagram, Router1 has two physical interfaces in the same IP subnet (192.168.1.0/24).
Cisco IOS <strong>does not allow</strong> assigning the same subnet to two different routed interfaces</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e47dadef-374e-4a0b-a4b5-67b6271a32a3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Answer: A</strong> — VLAN 1 (On Cisco switches, the <strong>default VLAN</strong> is always <strong>VLAN 1)</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c1dbe8bc-67cd-49a1-8426-e8e69e14ef7a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B. It sends the traffic to VLAN 100.</strong>
Frames in the native VLAN are sent untagged on an 802.1Q trunk.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1387b7d1-8504-42e6-8af5-d97f9a4a197a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Correct Answer: B (</strong>When a PC sends <strong>untagged traffic</strong> to the IP phone, the phone simply <strong>forwards it unchanged (still untagged)</strong> toward the switch.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b7a2877b-e32f-44fd-9d4a-04b7c1a02ecf.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B.</strong> The phone uses <strong>VLAN 50</strong>, while the attached PC uses <strong>VLAN 1</strong>.</p>
<p><code>switchport voice vlan 50</code> tells the switch to expect <strong>tagged voice traffic</strong> from the Cisco IP phone on VLAN 50. PC traffic arriving via the phone is <strong>untagged</strong> and is placed into the port’s <strong>access VLAN</strong>—which, since none is configured, defaults to <strong>VLAN 1</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ae4d55e1-e609-4b64-8efc-f769a19cdaaa.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C and E</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e26080b2-4b20-4d66-8d0c-1bce21b79c30.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A and C</strong></p>
<h2 id="heading-vlan-lab">VLAN Lab</h2>
<p>In this scenario, we will configure VLANs on switches across multiple locations. We'll use trunking to allow devices in the same VLAN to connect, even when they're in different locations. Also providing routing between VLAN 10 and VLAN 30 through the Router on Stick technique.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/38f304a8-3e14-478b-a8ae-6a3da31dee4a.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-north-branch-switch"><strong>North Branch Switch</strong></h1>
<p><strong>Creating VLAN 10</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW(config)#vlan <span class="hljs-number">10</span> 
Branch-SW(config-vlan)#name support 
Branch-SW(config-vlan)#exit
Branch-SW(config)#<span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">range</span> <span class="hljs-title">e0</span>/0-1 
<span class="hljs-title">Branch</span>-<span class="hljs-title">SW</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>-<span class="hljs-title">range</span>)#<span class="hljs-title">switchport</span> <span class="hljs-title">mode</span> <span class="hljs-title">access</span>
<span class="hljs-title">Branch</span>-<span class="hljs-title">SW</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>-<span class="hljs-title">range</span>)#<span class="hljs-title">switchport</span> <span class="hljs-title">access</span> <span class="hljs-title">vlan</span> 10</span>
</code></pre>
<p><strong>Creating VLAN 20</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW(config)#vlan <span class="hljs-number">20</span> 
Branch-SW(config-vlan)#name marketing
Branch-SW(config-vlan)#exit
Branch-SW(config)#<span class="hljs-keyword">int</span> e <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport mode  access
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport access vlan <span class="hljs-number">20</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#exit
Branch-SW(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">3</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport mode access
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport access vlan <span class="hljs-number">20</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<h3 id="heading-verifying-created-vlans">Verifying Created VLANs</h3>
<pre><code class="lang-java">Branch-SW#show vlan brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e22437bf-34df-4ebb-9deb-b38482e5e071.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-south-branch-switch"><strong>South Branch Switch</strong></h1>
<p><strong>Creating VLAN 30</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW-South(config)#vlan <span class="hljs-number">30</span>
Branch-SW-South(config-vlan)#name sales 
Branch-SW-South(config-vlan)#exit
Branch-SW-South(config)#<span class="hljs-keyword">int</span> range e0/<span class="hljs-number">1</span>-<span class="hljs-number">2</span>
Branch-SW-South(config-<span class="hljs-keyword">if</span>-range)#switchport mode access
Branch-SW-South(config-<span class="hljs-keyword">if</span>-range)#switchport access vlan <span class="hljs-number">30</span>
Branch-SW-South#wr
</code></pre>
<p><strong>Creating VLAN 10</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW-South(config)#vlan <span class="hljs-number">10</span>
Branch-SW-South(config-vlan)#name support 
Branch-SW-South(config)#vlan <span class="hljs-number">99</span> <span class="hljs-comment">//this vlan for native vlan, we use it in the trunking step</span>
Branch-SW-South(config-vlan)#name managment <span class="hljs-comment">//this vlan for native vlan</span>
Branch-SW-South(config-vlan)#exit
Branch-SW-South(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">3</span>
Branch-SW-South(config-<span class="hljs-keyword">if</span>-range)#switchport mode access
Branch-SW-South(config-<span class="hljs-keyword">if</span>)#switchport access vlan <span class="hljs-number">10</span>
Branch-SW-South#wr
</code></pre>
<h3 id="heading-verifying-created-vlans-1">Verifying Created VLANs</h3>
<pre><code class="lang-java">Branch-SW-South#show vlan brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5298140d-3056-40bf-b1c9-5251f4762267.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-trunk-port-configuration">Trunk Port Configuration</h1>
<h3 id="heading-north-switch">North Switch</h3>
<pre><code class="lang-java">Branch-SW-North(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">2</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk  allowed vlan <span class="hljs-number">10</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span> (<span class="hljs-keyword">for</span> security reason change the <span class="hljs-keyword">native</span> vlan to <span class="hljs-number">99</span>)
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport nonegotiate 
Branch-SW-North#wr
</code></pre>
<h3 id="heading-verify-trunk">Verify Trunk</h3>
<pre><code class="lang-java">Branch-SW-North(config)#<span class="hljs-keyword">do</span> show interfaces trunk 
Branch-SW-North(config)#<span class="hljs-keyword">do</span> show <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">ethernet</span> 0/2 <span class="hljs-title">switchport</span></span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b1249b86-1fab-47bb-8889-36596a62b1e2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2bdba076-a86f-4edf-8f77-b5c3a35ded7c.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-core-switch">Core Switch</h3>
<pre><code class="lang-java">Core-SW(config)#vlan <span class="hljs-number">99</span>
Core-SW(config-vlan)#name managment
Core-SW(config-vlan)#vlan <span class="hljs-number">9910</span>
Core-SW(config-vlan)#support
Core-SW(config-vlan)#<span class="hljs-number">20</span>
Core-SW(config-vlan)#name sales
Core-SW(config)#<span class="hljs-keyword">int</span> range ethernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>-<span class="hljs-number">3</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk allowed vlan <span class="hljs-number">10</span>,<span class="hljs-number">30</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport nonegotiate 

Core-SW#wr
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3172a4d-fa28-4dc3-8275-f74e6d2ea0e2.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-south-switch">South Switch</h3>
<pre><code class="lang-java">Branch-SW-North(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">0</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport nonegotiate 
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunkin  allowed vlan <span class="hljs-number">10</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span> (<span class="hljs-keyword">for</span> security reason change the <span class="hljs-keyword">native</span> vlan to <span class="hljs-number">99</span>)
Branch-SW-North#wr
</code></pre>
<h3 id="heading-finally-we-have-access-between-the-same-vlan-on-different-locations">Finally, we have access between the same VLAN on different locations</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/658d1fe7-76ff-48fb-85cd-8e7e23d33547.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-router-on-stick">Router On Stick</h1>
<p>To establish routing between VLANs, we configure a router using a technique called "Router on a Stick." </p>
<h3 id="heading-configuring-the-trunk-on-the-switch-port-connected-to-the-router">Configuring the Trunk on the Switch Port Connected to the Router</h3>
<pre><code class="lang-java">Core-SW(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">2</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span>
Core-SW(config-<span class="hljs-keyword">if</span>)# switchport trunk allowed vlan <span class="hljs-number">10</span>,<span class="hljs-number">30</span>
</code></pre>
<h3 id="heading-configure-the-router-to-establish-routing-between">Configure the Router to establish routing between</h3>
<pre><code class="lang-java">router(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
router(config-<span class="hljs-keyword">if</span>)#<span class="hljs-keyword">int</span> fa0/<span class="hljs-number">0.10</span>
router(config-subif)#ip address <span class="hljs-number">172.17</span>.<span class="hljs-number">10.55</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span>
router(config-subif)#<span class="hljs-function">exit
<span class="hljs-title">router</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">router</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#<span class="hljs-keyword">int</span> fa0/0.30
<span class="hljs-title">router</span><span class="hljs-params">(config-subif)</span>#encapsulation dot1Q 30
<span class="hljs-title">router</span><span class="hljs-params">(config-subif)</span>#ip address 172.17.30.55 255.255.255.0 
<span class="hljs-title">router</span><span class="hljs-params">(config-subif)</span>#exit
<span class="hljs-title">router</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/defbcf5b-c445-4188-b96f-191ce569c9a3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>We have now successfully established connectivity between two distinct VLANs.</p>
<h2 id="heading-spanning-tree-protocol-stp">Spanning Tree Protocol (STP)</h2>
<h1 id="heading-what-is-stp">What is STP</h1>
<p><strong>Spanning Tree Protocol</strong> (STP) is a <strong>Layer 2 network protocol</strong> that prevents loops in networks with redundant links. It logically <strong>blocks physical loops</strong> in a Layer 2 network by placing redundant ports in a blocking state, essentially disabling the interface.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/802964cc-dfde-4bfa-9de3-8fb79345cca1.gif" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Interfaces in a <strong>forwarding state</strong> behave normally, they send and receive all normal traffic.</li>
<li>Interfaces act as backups that can enter a forwarding state if an active interface fails.</li>
<li>Interfaces in a <strong>blocking state</strong> only send and receive  STP messages (Called <strong>BPDUs</strong>= <strong>B</strong>ridge <strong>P</strong>rotocol <strong>D</strong>ata <strong>U</strong>nits)</li>
<li>By selecting which ports are forwarding and which ports are blocking, STP creates a single path to/from each point in the network.</li>
<li>There is a set of processes that STP uses to determine which port should be <strong>forwarding</strong> and which should be <strong>blocking.</strong></li>
<li>STP-enabled switches send/receive <strong>Hello BPDUs</strong> out of all interfaces; the default timer is <strong>2 seconds.</strong></li>
<li>If a switch receives a <strong>Hello BPDU</strong> on an interface, it knows that the interface is connected to another switch (routers, PCs, etc, do not use STP, so they do not send Hello BPDUs)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d1f0b656-e871-454f-bd1f-a0cf2b852a71.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Bridge Priority Data Unit(BPDU)</strong>: It contains the <strong>Bridge ID</strong>, the Sender’s bridge ID cost to the root bridge, and the Timer values on the root bridge.</p>
<p>All switches exchange BPDU in order to elect the root bridge. The switch with the <strong>lowest bridge ID</strong>, is elected as the <strong>root Bridge.</strong> </p>
<p><strong>Bridge ID:</strong> an <strong>8-byte field</strong> that combines the <strong>bridge priority (2 bytes)</strong> and <strong>Base Mac address(6 bytes) of a device</strong>. If there is a tie on bridge priority, then the base MAC address is considered.</p>
<p><strong>Bridge Priority:</strong> The default priority value for all Cisco Switches is the decimal value <strong>32768</strong>.</p>
<p><strong>Root Bridge: T</strong>he root bridge is the bridge with <strong>the lowest Bridge ID.</strong> All decisions, like which port is the root port (The port with the best path to the root bridge), are made from the perspective of the root bridge.</p>
<p><strong>Path Cost:</strong> A switch may encounter one or more switches in the path to the root bridge. All the paths analyzed and the <strong>path with the lowest cost will be selected.</strong> </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Speed</td><td>Link Cost</td></tr>
</thead>
<tbody>
<tr>
<td><strong>100 Mbps</strong></td><td><strong>19</strong></td></tr>
<tr>
<td><strong>10 Mbps</strong></td><td><strong>100</strong></td></tr>
<tr>
<td><strong>100 Gbps</strong></td><td>2</td></tr>
<tr>
<td><strong>1 Gbps</strong></td><td>4</td></tr>
</tbody>
</table>
</div><h2 id="heading-stp-ports">STP Ports</h2>
<ul>
<li><strong>Root Port(RP)</strong>: The port on a <strong>non-root switch</strong> that has the shortest path to the root bridge. It forwards traffic to the <strong>root bridge</strong>.</li>
<li><strong>Designated Port:</strong>  The designated port forwards traffic from a segment to the root bridge. All STP-enabled switches have one or more designated ports.</li>
</ul>
<blockquote>
<p>💡 <strong>Note:</strong> The root bridge only has designated ports.</p>
</blockquote>
<h2 id="heading-steps-to-a-loop-free-topology">Steps to a Loop-Free Topology</h2>
<p>1-<strong>Selecting Root Bridge</strong>: When two switches are configured with the <strong>same priority and have the same extended system ID</strong>, the switch having <strong>the mac address with the lowest value</strong>, will have the <strong>Lower BID</strong>(Bridge ID) selected as the root bridge and no port of the switch blocked.</p>
<p>2-<strong>Select Designated Ports</strong>: All ports from <strong>the root bridge</strong> are called designated ports.</p>
<p>3-<strong>Select Root port:</strong></p>
<ul>
<li><strong>Lowest root cost</strong></li>
<li><strong>Lowest neighbor bridge ID</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/85a6b10c-a7b6-416e-8167-f5106a04a993.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Switch 2 was selected as a root bridge, Switch 3 has the same cost from both sides, and which neighbour has the lowest Bridge ID will be selected as the root port in this diagram. SW1 has a lower Bridge ID.</p>
<ul>
<li><strong>Lowest neighbor pot ID</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b50f9c80-2187-4406-8c5e-7d509db686c4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>STP Port ID</strong> = <strong>Port priority(default</strong> <strong>128**</strong>) + port number.**
for example: Gi0/0 lower than Gi 0/1</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5bb1b966-66cc-4027-9d83-73ead32de4c4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Switch 3 has two connections with SW1 and a lower port ID will selected as a root port G0/1 lower than G0/2.</p>
<blockquote>
<p>💡 The neighbor switch's port ID is used to determine the tie, not the local switch's port ID.</p>
</blockquote>
<p>4-<strong>Bock Port:</strong> After the root bridge is selected,  one of the remaining switches with a high Mac address value should block one of the ports.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/808d6e3a-bcff-4f87-b0a1-7073fdce3844.png" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>Low Bridge ID selected, and SW3 is a root bridge.</li>
<li>If SW2 has multiple paths with the same cost, the path through the <strong>neighbor with the lowest Bridge ID</strong> is selected.</li>
<li>We have two connections between SW1 and SW2 <strong>Lowest neighbor port ID</strong> will be selected G0/0 smaller than G0/2.</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/25369a4a-993d-45e3-9b71-a34a6a222586.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: Blocking port depends on the <strong>cost;</strong> for the best path to the root bridge, the cost should be low. cost can be determined by the type of cables connected to the switches  </p>
<p>The cost of switch number 2 (S2) to the root bridge through S1 = <strong>38.</strong></p>
<p>But directly from S2 to the root bridge is <strong>19,</strong> therefore, the Line between S1 to S2 is <strong>blocked</strong>. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bc019904-b4e3-47f2-8767-a5faa0071e3b.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 Root/Designated ports remain <strong>stable in the Forwarding</strong> state.<br />Non-designated ports remain <strong>stable in the Blocking state</strong>.</p>
</blockquote>
<p>    Non-designated ports remain <strong>stable in the Blocking state</strong>. </p>
<h2 id="heading-how-do-you-know-which-switch-is-a-root-bridge">How do you know which switch is a root bridge?</h2>
<pre><code class="lang-javascript">Switch#show spanning-tree
</code></pre>
<p>After writing this command, if the switch is selected as the root bridge in the Root ID shows this message: “ This is the root bridge“</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/147f61f2-c8bf-4710-a443-bfc42e387c2f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Also, the bridge root ports have the same role as designated ports.</p>
<h3 id="heading-using-the-same-command-on-the-switch-one-of-the-ports-has-been-blocked">Using the same command on the switch, one of the ports has been blocked.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a1b8496f-8e86-485c-92a3-f8aa6b7e66db.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-spanning-tree-timers">Spanning Tree Timers</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>STP Timer</td><td>Purpose</td><td>Duration</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Hello</strong></td><td>How often Root Bridge sends hello BPDUs</td><td>2Sec</td></tr>
<tr>
<td><strong>Forward Delay</strong></td><td>How long the switch will stay in the listening and learning state(each state 15 seconds = total 30 seconds)</td><td>30Sec</td></tr>
<tr>
<td><strong>Max Age</strong></td><td>How long an interface will wait after ceasing to receive Hello BPDUs to change the STP topology.</td><td>20Sec</td></tr>
</tbody>
</table>
</div><h1 id="heading-port-fast-and-bpdu-guard">Port Fast and BPDU guard</h1>
<ul>
<li><strong>PortFast</strong> is a Cisco Feature for PVST+ environments. When a switch port is configured with port fast, that port transitions from <strong>blocking</strong> to the <strong>forwarding</strong> state <strong>immediately</strong>, <strong>bypassing</strong> the usual <strong>802.1D</strong> STP transition states(the <strong>Listening</strong> and <strong>learning</strong> state).</li>
</ul>
<blockquote>
<p>⚠️ If used, it must be <u><strong>enabled only on ports connected to end hosts</strong></u>.<br />If enabled on a port connected to another switch, it could cause a layer 2 loop.</p>
</blockquote>
<h2 id="heading-port-fast-configuration">Port Fast Configuration</h2>
<p>Enable Port Fast per Interface </p>
<pre><code class="lang-javascript">s1(config)# interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s1(config-<span class="hljs-keyword">if</span>)# spanning-tree portfast
</code></pre>
<p>Disable port fast on an interface</p>
<pre><code class="lang-javascript">s1(config)# interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s1(config-<span class="hljs-keyword">if</span>)# spanning-tree portfast disable
</code></pre>
<p>Enable port fast on all access ports (not trunk ports) </p>
<pre><code class="lang-javascript">s1(config)# spanning-tree portfast <span class="hljs-keyword">default</span>
</code></pre>
<p>Portfast is a great feature for getting a switch port connected to an end host like a PC  running quickly without having to wait for 30 seconds.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fb0c2c7d-ec44-4f41-960f-199e765a465e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When plugging the cable into the switch port, we should wait for 30 Seconds for the listening and learning state (orange light). After that, the switch could forward data from the mentioned port.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4dd2eefc-e557-42d6-a0eb-ab13431789b0.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After enabling portfast on the switch port, when the cable is plugged in, the switch immediately starts forwarding (Indicated by a Green Light) and ignores the listening and learning states.</p>
<h3 id="heading-bpdu-guard">BPDU Guard</h3>
<ul>
<li><strong>BPDU Guard:</strong> This is a feature used to <strong>protect the Layer 2 Spanning Tree Protocol (STP) topology</strong> from <strong>BPDU-related attacks.</strong> When a BPDU Guard-enabled port receives a BPDU from the connected device, BPDU Guard disables the port and puts it into the <strong><code>errdisable</code></strong> state.</li>
</ul>
<blockquote>
<p>For example, if PortFast is enabled on interface G0/3 for end-user devices, and an end-user mistakenly connects a switch to that port instead of a PC, <strong>BPDU Guard</strong> will protect the STP topology by automatically disabling the port upon receiving BPDUs.</p>
</blockquote>
<p><strong>BPDU Guard should be configured on:</strong></p>
<ul>
<li><strong>Access ports</strong> connecting to end devices (workstations, printers, etc.).</li>
<li>Ports connecting to <strong>servers or virtualization hosts</strong> that do not participate in the STP topology.</li>
</ul>
<blockquote>
<p>⚠️ When used alongside PortFast, BPDU Guard ensures that an access port remains stable and does not inadvertently participate in the spanning tree, preventing potential topology changes.  </p>
<ul>
<li><p>BPDU Guard protects the network from unauthorized switches being connected and participating in STP.  </p>
</li>
<li><p>It can be configured separately from <strong>PortFast</strong>, but they are typically used together on edge/access ports.  </p>
</li>
<li><p><strong>BPDU Guard-enabled ports do not send BPDUs</strong>. If a BPDU is <strong>received</strong>, the port is placed in <strong><code>error-disabled</code></strong> state.</p>
</li>
</ul>
</blockquote>
<ul>
<li>BPDU Guard protects the network from unauthorized switches being connected and participating in STP.</li>
<li>It can be configured separately from <strong>PortFast</strong>, but they are typically used together on edge/access ports.</li>
<li><strong>BPDU Guard-enabled ports do not send BPDUs</strong>. If a BPDU is <strong>received</strong>, the port is placed in <strong><code>error-disabled</code></strong> state.</li>
</ul>
<p>Enable BPDU Guard Per Interface</p>
<pre><code class="lang-javascript">s2(config)# interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s2(config-<span class="hljs-keyword">if</span>)# spanning-tree bpduguard enable
s2(config-<span class="hljs-keyword">if</span>)# end
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/197d34a7-e94b-4fc5-be90-b14d3ee1d476.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Enable BPDU Guard on all portfast interfaces</p>
<pre><code class="lang-javascript">s2(config)# spanning-tree porfast bpduguard <span class="hljs-keyword">default</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/523f4561-0e9a-4930-a081-4586aec9b265.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-recovery-from-bpdu-guard">Recovery from BPDU Guard:</h2>
<h3 id="heading-manually-recovery">Manually Recovery</h3>
<p>If a port is <strong><code>errdisable</code></strong>Due to BPDU Guard, it can be recovered <strong>manually</strong> or <strong>automatically</strong> by using the following command </p>
<pre><code class="lang-javascript">s2(config)#interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s2(config-<span class="hljs-keyword">if</span>)#shutdown 
s2(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h3 id="heading-automatically-recovery">Automatically Recovery</h3>
<pre><code class="lang-javascript">s2#show errdisble recovery
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7c91b8c4-099c-4fd2-a168-1ef90daf56bd.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">s2(config)#errdisable recovery cause bpdugurad 
s2(config)#<span class="hljs-keyword">do</span> show errdisable recovery
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/356308f5-bbbd-4fc3-b229-cd55e54ec32d.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>⚠️ If you didn’t solve the problem and the port is still connected to the switch and receives BPDU messages, the port will be disabled again. </p>
<p>💡 Best practice:  </p>
<ul>
<li><p>Use <strong>PortFast + BPDU Guard</strong> on <strong>all access ports</strong>.  </p>
</li>
<li><p>Never enable on trunk ports.</p>
</li>
</ul>
</blockquote>
<ul>
<li>Use <strong>PortFast + BPDU Guard</strong> on <strong>all access ports</strong>.</li>
<li>Never enable on trunk ports.</li>
</ul>
<h2 id="heading-bpdu-filter">BPDU Filter</h2>
<p>Prevent a port from <strong>sending BPDU</strong> messages </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0a507df6-5bfc-4869-a5d4-e1c2eb113cb8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>If the port doesn't connect to a switch, sending BPDUs is unnecessary and undesirable for a couple of reasons: </p>
<ol>
<li>Sending BPDUs uses some <strong>bandwidth</strong> and <strong>processing power</strong> on the switch.</li>
<li>BPDUs contain information <strong>about the LAN’s STP topology</strong>. (You should avoid sending this information to end users)</li>
</ol>
<p><strong>BPDU Filter</strong> solves this by preventing the port from sending BPDUs.</p>
<p>Enable BPDU Filter Per Interface</p>
<pre><code class="lang-javascript">s2(config-<span class="hljs-keyword">if</span>)# spanning-tree bpdufilter enable
</code></pre>
<ul>
<li>The port will not send BPDUs.</li>
<li>The port will ignore any BPDUs it receives.</li>
<li><strong>In effect, this disables STP on the port. Use with caution</strong></li>
</ul>
<p>Enable BPDU Filter on all interfaces (Global Mode) </p>
<pre><code class="lang-javascript">s2(config)# spanning-tree portfast bpdufilter <span class="hljs-keyword">default</span>
</code></pre>
<ul>
<li>BPDU filter will be activated on <u><strong>all portfast-enabled ports.</strong></u></li>
<li>The port will not send BPDU packets.</li>
</ul>
<p><strong>Disable</strong> BPDU filter per port</p>
<pre><code class="lang-javascript">s2(config-<span class="hljs-keyword">if</span>)# spanning-tree bpdufilter disable
</code></pre>
<blockquote>
<p>💡 Enable PBDU filter by default (Global Config Mode). This is highly recommended </p>
</blockquote>
<p>BPDU Guard and BPDU Filter can be enabled on the same port at the same time. </p>
<ul>
<li>If BPDU Filter is enabled in <u><strong>global config mode</strong></u> and the port receives BPDU:</li>
<li><strong>BPDU filter</strong> will be <strong>disabled</strong>.</li>
<li><strong>BPDU Guard</strong> will be <strong>triggered</strong>( errdisbale the interface).</li>
<li>IF BPDU Filter is enabled in <u><strong>Interface config mode</strong></u> and the port receives BPDU:</li>
<li>The BPDU will be <strong>ignored</strong>.</li>
<li><strong>BPDU Guard</strong> will <strong>not be triggered.</strong></li>
</ul>
<blockquote>
<p>💡 <strong>Caution:</strong> Do not configure a port with BPDU Guard and BPDU Filter. Enabling both on the same interface effectively cancels the BPDU Guard feature. Specifically, a port configured with both features will not error-disable the port when a BPDU is received. Instead, it will default to the BPDU Filter and simply ignore the BPDUs.</p>
</blockquote>
<h2 id="heading-root-guard">Root guard</h2>
<p>Root Guard is a feature in Spanning Tree Protocol (STP) that <strong>prevents a port from becoming a root port</strong> if it receives <strong>superior BPDUs</strong> (A BPDU that has a lower Bridge ID). When a switch port configured with Root Guard receives a BPDU that indicates a <strong>better root bridge</strong> (one with a lower bridge ID), the port is <strong>disabled</strong> and placed into a <strong>root-inconsistent state</strong>. This action enforces the <strong>current root bridge</strong> and ensures that the topology remains stable by preventing unauthorized or unintended switches from claiming root bridge status</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/57760004-0ff4-4e6b-a9e2-0108ab225d0e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this example, the Service Provider's switches are connected to the customer's switches, and the customer's root bridge ID is lower than the Service Provider's root bridge ID. The Service Provider wants to protect its STP topology and prevent it from being affected by the customer's root bridge</p>
<p><strong>Root Guard</strong> can be configured to protect the STP topology by <strong>preventing the service provider switch from accepting superior BPDUs from outside of service provider control.</strong>  </p>
<h2 id="heading-root-guard-configuration">Root Guard Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c355b5a0-fdab-4e10-82fe-ff6971479234.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Root Guard will be configured on the ports connected to switches outside of the control.  </p>
<pre><code class="lang-javascript">s2(config-<span class="hljs-keyword">if</span>)# spanning-tree guard root
</code></pre>
<blockquote>
<p>💡 - <strong>Loop Guard</strong> does not have a global default command  </p>
<ul>
<li><p>If a <strong>Root Guard-enabled port</strong> receives a BPDU, it will enter the <strong>broken state</strong>, effectively disabling it.  </p>
</li>
<li><p>The port will <strong>not be able to forward data frames and will discard</strong> any frames it receives.  </p>
</li>
<li><p>SW1, SW2, and SW3 <strong>won’t accept</strong> SW6 as a root Bridge.  </p>
</li>
<li><p>To re-enable the ports disabled by Root Guard, you must solve the issue that disabled the port.<br />The Disabled ports must stop receiving superior BPDUs.<br />Tell the customer to increase the priority value of their switch.  </p>
</li>
<li><p>Ports in <strong>root-inconsistent</strong> state <strong>recover automatically</strong> after the port stops receiving superior BPDUs. Unlike BPDU guard, <strong>manual intervention is not required</strong>.</p>
</li>
</ul>
</blockquote>
<ul>
<li><strong>Loop Guard</strong> does not have a global default command</li>
<li>If a <strong>Root Guard-enabled port</strong> receives a BPDU, it will enter the <strong>broken state</strong>, effectively disabling it.</li>
<li>The port will <strong>not be able to forward data frames and will discard</strong> any frames it receives.</li>
<li>SW1, SW2, and SW3 <strong>won’t accept</strong> SW6 as a root Bridge.</li>
<li>To re-enable the ports disabled by Root Guard, you must solve the issue that disabled the port.
The Disabled ports must stop receiving superior BPDUs.
Tell the customer to increase the priority value of their switch.</li>
<li>Ports in <strong>root-inconsistent</strong> state <strong>recover automatically</strong> after the port stops receiving superior BPDUs. Unlike BPDU guard, <strong>manual intervention is not required</strong>.</li>
</ul>
<h2 id="heading-loop-guard">Loop Guard</h2>
<p><strong>Loop Guard</strong> is a Spanning Tree Protocol (STP) feature designed to <strong>prevent Layer 2 loops</strong>, especially those caused by <strong>unidirectional link failures</strong> (e.g., a broken fiber pair where only one direction fails)</p>
<p><img src="https://www.networkacademy.io/sites/default/files/inline-images/Fiber-optic%20Ethernet%20link.gif" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://cdn.networkacademy.io/sites/default/files/2025-05/fibercut.gif" alt="CCNA 200-301 Study (1)" /></p>
<p>                                                             <em><strong>Unidirectional Fiber cut</strong></em>
If a port <strong>stops receiving BPDUs</strong>, Loop Guard places that port into a <strong>loop-inconsistent blocking</strong> state to prevent it inadvertently transitioning to forwarding and forming a loop</p>
<blockquote>
<p>💡 <strong>Note:</strong> <strong>Loop guard and root guard</strong> should be configured together. While Root Guard protects against unauthorized switches attempting to become the root bridge, <strong>Loop Guard</strong> protects against <u><strong>unintended loops caused by link failures</strong></u>. Together, these features help maintain the integrity and stability of the spanning tree topology.</p>
</blockquote>
<p><strong>Loop Guard Per Interface Configuration</strong></p>
<pre><code class="lang-javascript">S4(config-<span class="hljs-keyword">if</span>)#spanning-tree guard loop
</code></pre>
<blockquote>
<p>💡 Unlike BPDU Guard or Root Guard, there is <strong>no global command</strong> (like <code>spanning-tree loopguard default</code>).</p>
</blockquote>
<h1 id="heading-stp-versions">STP Versions</h1>
<p>As you can see, when a loop occurs in the network, STP needs some time to block one of the switch ports. We are waiting for a few seconds until the green light has been changed to green. After that, STP is updated, and 5 generations of it are created.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9eff5ac6-650a-42bb-bf4d-91927f1ab23c.png" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li><strong>Common Spanning Tree (</strong>CST) or IEEE <strong>802.1D</strong> (Standard)</li>
<li><strong>R</strong>apid <strong>S</strong>panning <strong>T</strong>ree <strong>P</strong>rotocol (<strong>RSTP</strong>)  or <strong>IEEE 802.1W</strong> (Standard)</li>
<li><strong>P</strong>er <strong>V</strong>LAN <strong>S</strong>panning <strong>T</strong>ree + (PVST+)  by <strong>Cisco</strong></li>
<li><strong>R</strong>apid <strong>P</strong>er <strong>V</strong>LAN <strong>S</strong>panning <strong>T</strong>ree+ <strong>(RPVST+</strong>) by <strong>Cisco</strong></li>
<li><strong>M</strong>ultiple <strong>S</strong>panning <strong>T</strong>ree IEEE 802.1s. (Standard)</li>
</ol>
<h2 id="heading-stp-8021d-vs-rstp8021w">STP (802.1D) VS RSTP(802.1W)</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td><strong>STP (802.1D)</strong></td><td><strong>RSTP (802.1w)</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Standard</strong></td><td>IEEE 802.1D</td><td>IEEE 802.1w</td></tr>
<tr>
<td><strong>Convergence Time</strong></td><td>30–50 seconds</td><td>1–10 seconds</td></tr>
<tr>
<td><strong>Port Roles</strong></td><td>Root, Designated, Blocked</td><td>Root, Designated, <strong>Alternate</strong>, <strong>Backup</strong>, <strong>Discarding</strong></td></tr>
<tr>
<td><strong>Port States</strong></td><td>Blocking, Listening, Learning, Forwarding, Disabled</td><td>Discarding, Learning, Forwarding</td></tr>
<tr>
<td><strong>BPDU Handling</strong></td><td>BPDUs only sent by Root Bridge</td><td>BPDUs are sent by all switches every 2s</td></tr>
<tr>
<td><strong>Port Fast Equivalent</strong></td><td>Not native (uses Cisco "PortFast")</td><td>Natively supports edge ports (like PortFast)</td></tr>
<tr>
<td><strong>Loop Recovery</strong></td><td>Slow, waits for timers</td><td>Fast, uses handshake mechanism</td></tr>
<tr>
<td><strong>Typical Use</strong></td><td>Older networks</td><td>Modern networks needing faster failover</td></tr>
</tbody>
</table>
</div><p><strong>Alternate Port</strong>: Alternate ports are in <strong>a discarding state</strong> and quickly transition to the <strong>forwarding state when the root port path</strong> fails. Alternate ports are typically found on non-root bridges and help ensure rapid convergence in the event of a link failure.</p>
<p><strong>Backup Port:</strong> Backup ports serve as a <strong>backup to designated ports on a switch</strong>. Backup ports discard traffic and <strong>immediately transition to the forwarding state</strong> if the designated port fails.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Port Role</td><td>Direction</td><td>Typical State</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Root Port</strong></td><td>Best path <strong>to Root</strong></td><td>Forwarding</td><td>Main path to root bridge</td></tr>
<tr>
<td><strong>Designated Port</strong></td><td>Best path <strong>to Segment</strong></td><td>Forwarding</td><td>Forwarding for that LAN</td></tr>
<tr>
<td><strong>Alternate Port</strong></td><td>Backup path <strong>to Root</strong></td><td>Discarding</td><td>Replaces Root Port if it fails</td></tr>
<tr>
<td><strong>Backup Port</strong></td><td>Backup path <strong>to Designated</strong></td><td>Discarding</td><td>Replaces Designated Port if it fails</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fd464d6c-477c-43aa-b348-10684ec7ff1b.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-per-vlan-spanning-tree-pvst">Per VLAN Spanning Tree+ (PVST+)</h2>
<p><strong>PVST+</strong> is a proprietary Cisco feature that finds the root bridge per V. LAN. It is the default version of STP from Cisco. It finds separate 802.1d spanning-tree instances for each VLAN. It also provides backward compatibility with 802.1d or CST. This is more optimized for the IEEE because it provides optimal path selection as a separate instance of STP per VLAN is found. This is as slow as CST.</p>
<p><strong>Advantages:</strong></p>
<ul>
<li>Provide more optimization on the performance of a network than CST, as it selects the root bridge per VLAN.</li>
<li>Bandwidth consumption is less than CST.</li>
<li>Optimum load balancing is achieved.</li>
</ul>
<p><strong>Disadvantages:</strong></p>
<ul>
<li>This is as slow as CST, and the convergence time is slow. By default, Cisco switches take 50 seconds to converge.</li>
<li>More resources (CPU and memory) are required.</li>
<li><strong>Rapid Per VLAN Spanning Tree + (RPVST+):</strong> This is a spanning tree standard by Cisco that provides faster convergence than PVST+ and finds a separate instance of 802.1w per VLAN. It requires much more CPU and memory than other STP standards.</li>
</ul>
<h3 id="heading-8021smultiple-spanning-tree">802.1s(Multiple Spanning Tree)</h3>
<ul>
<li>802.1s(Multiple Spanning Tree): This standard is developed by IEEE, in which grouping of VLANs is done, and for every single group, RSTP is run. This is basically a spanning tree protocol running over another spanning tree protocol.</li>
</ul>
<h3 id="heading-advantages">Advantages:</h3>
<ul>
<li>High redundancy.</li>
<li>Load balancing can be achieved.</li>
<li>Lower CPU and Memory usage is required</li>
</ul>
<h3 id="heading-disadvantages">Disadvantages:</h3>
<ul>
<li>More configuration is required, and not easy to implement.</li>
</ul>
<h2 id="heading-spanning-tree-configuration">Spanning Tree Configuration</h2>
<pre><code class="lang-javascript">s3(config)# spanning-tree vlan <span class="hljs-number">20</span> root primary
s3(config)# spanning-tree vlan <span class="hljs-number">10</span> root secondary [secondary <span class="hljs-keyword">switch</span> add when primary root bridge removed the second one be a root bridge]
s3(config)# spanning-tree vlan <span class="hljs-number">20</span> priority <span class="hljs-number">4096</span>
 s3# show spanning-tree
 s3# conf t
 s3(config)#spanning-tree mode rapid-pvst
 s3# show spanning-tree vlan <span class="hljs-number">10</span>
</code></pre>
<p><strong>Which one is the first step in STP operation?</strong></p>
<p>• <strong>Select the Root Bridge</strong> ✅</p>
<p><strong>Which one is the last step in STP operation?</strong></p>
<p>• <strong>Block all Non-Root &amp; Non-DP’s</strong> ✅</p>
<p><strong>What is the maximum number of Root Ports that each Cisco switch can have in the STP Topology?</strong></p>
<p>• <strong>1</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e2aa3c3-9a81-49d3-9a6f-506d30b2d14e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D. Learning E. Forwarding</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2430f5df-e8f8-4cea-b58e-01babfb27bff.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D. Learning</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ce9461d5-c39a-4215-9396-c6a450f3a262.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B.</strong> (In RSTP terms, this means <em>discarding state</em> (blocking equivalent in classic STP). The Backup Port is exactly this: a redundant path toward the <strong>designated bridge</strong> on a shared segment.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/493dc1fa-5493-431a-b5c7-e5b35584bdf8.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8c579c56-4ea8-42e5-8cd8-7fe17a759b3c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/adafb585-fd33-4bd7-83da-f1724de8ec76.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2f728524-293f-47c0-a0d4-94609a22e97f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Correct answers: A and E</strong></p>
<p><strong>panning tree enabled protocol rstp”</strong> ➜ on Cisco that means <strong>Rapid PVST+</strong></p>
<p>Under <strong>Root ID,</strong> it shows <strong>Cost 19</strong> and <strong>Port 1 (FastEthernet 2/1)</strong>. When a switch is <strong>not</strong> the root, the interface listed here is the <strong>root port</strong> (the port used to reach the root bridge).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/09018efd-859b-43fa-a928-d5c0989837e4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A  E</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/93512c84-53ab-4da0-834e-373eb9bf6b36.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong></p>
<h2 id="heading-etherchannel">EtherChannel</h2>
<h1 id="heading-what-is-etherchannel">What is EtherChannel?</h1>
<ul>
<li>EtherChannel(<strong>link aggregation</strong>) is a port <strong>link aggregation</strong> <strong>technology</strong> in which multiple physical port links are grouped into one logical link. <strong>It provides high speed and redundancy, load sharing, and increased bandwidth</strong> between switches, routers, and servers.</li>
<li><strong>A maximum of 8 links can be aggregated.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8ad69973-0a85-48fe-8149-683eb3051d7f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: only an even number of cables can be used between the switches, for example 2-4-6 cables, not odd numbers like 1-3-5. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/67d04fdb-d4db-48be-bda7-0c5d2dffbe7e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When the bandwidth of the interfaces connected to end hosts is greater than the bandwidth of the connection to the distribution switch(es), this is called <strong>oversubscription</strong>. Some oversubscription is acceptable, but excessive oversubscription can cause congestion. To address this, the network administrator adds multiple links between the access switch and the distribution switch.”</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/82c7df7f-8029-4a08-99b1-7987f640612e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c2ca95c0-ba7a-45c6-90f6-4bf69a8b2f98.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>EtherChannel</strong> <u><strong>groups multiple interfaces together to act as a single, high-bandwidth link</strong></u>. Without EtherChannel, in a redundant link environment, each link would be treated as a separate entity by <strong>Spanning Tree Protocol (STP)</strong>. This would result in only one link being active, while the others remain in a blocking state</p>
<h2 id="heading-requirement">Requirement</h2>
<ol>
<li>Same duplex.</li>
<li>Same speed</li>
<li>Same VLAN configuration</li>
<li>Switch port modes should be the same ( access or trunk mode).</li>
</ol>
<h2 id="heading-port-aggregation-protocolpagp">Port Aggregation Protocol(PAgP)</h2>
<p><strong>Port Aggregation Protocol (PAgP)</strong> is a <strong>Cisco proprietary</strong> protocol used with an EtherChannel. </p>
<p>There are different modes in which you can configure your interface.</p>
<ul>
<li>On: n<strong>o negotiation takes place</strong>. (No protocol used.)</li>
<li><strong>Desirable</strong>: Actively negotiates EtherChannel.</li>
<li><strong>Auto</strong>: Passive, waits for the other side to initiate.</li>
<li><strong>Off</strong>: No EtherChannel configured on the interface.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>SW1</td><td>SW2</td><td>Channel Established</td></tr>
</thead>
<tbody>
<tr>
<td><strong>ON</strong></td><td><strong>ON</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td><strong>Auto/Desirable</strong></td><td><strong>Desirable</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td>On/Auto/Desirable</td><td>Not Configured</td><td>No</td></tr>
<tr>
<td>ON</td><td>Desirable</td><td>No</td></tr>
<tr>
<td>Auto/on</td><td>Auto</td><td>No</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 Up to <strong>8 Interfaces</strong> can be formed into a single EtherChannel (<strong>LACP allows up to 16 links</strong>, but only <strong>8 will be active</strong>, the other <strong>8 will be in standby mode</strong>, waiting for an active interface to fail) </p>
</blockquote>
<h2 id="heading-link-aggregation-control-protocollacp">Link Aggregation Control Protocol(LACP)</h2>
<p><strong>Link Aggregation Control Protocol</strong> is <strong>an IEEE protocol</strong>, originally defined in 802.3ad, used to form an EtherChannel. This protocol is almost similar to Cisco PAgP. There are different modes in which you can configure your interface.</p>
<ul>
<li><strong>ON</strong>: In this mode, the interface will be a part of EthernetChannel, but no negotiation takes place.</li>
<li><strong>Active</strong>: Actively negotiates EtherChannel.</li>
<li><strong>Passive</strong>: Passive, waits for initiation</li>
<li><strong>Off</strong>: No EtherChannel configured on the interface.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>SW1</td><td>SW2</td><td>Channel Established</td></tr>
</thead>
<tbody>
<tr>
<td><strong>On</strong></td><td><strong>ON</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td><strong>Active/Passive</strong></td><td><strong>Active</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td>On/Active/Passsive</td><td>Not Configured</td><td>NO</td></tr>
<tr>
<td>ON</td><td>Active</td><td>NO</td></tr>
<tr>
<td>Passive/ON</td><td>ON</td><td>NO</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>ON</strong> mode only works with <strong>ON</strong> mode ( ON+ Active or On + Desirable will  not work)</p>
</blockquote>
<pre><code class="lang-javascript">ASW1(config-<span class="hljs-keyword">if</span>-range)#channel-group [<span class="hljs-number">1</span><span class="hljs-number">-255</span>] number mode (ative <span class="hljs-keyword">for</span> LACP, Desrible <span class="hljs-keyword">for</span> PAgP)
</code></pre>
<p><strong>What is the status of the port channel if LACP is misconfigured?</strong></p>
<p>Disabled ✅</p>
<p><strong>You have configured three trunk ports in an EtherChannel group. What will happen when one port in the grouping fails?</strong></p>
<p>The channel cost has increased. ✅  (Because the EtherChannel group has lost some bandwidth, the cost of the grouped link is increased.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cd2085d7-5796-4bd8-9019-f23177ed26e2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C ( Not D because D adds 300 and removes other VLANs)</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11620f54-f7ab-4670-b0ba-9f6ea6a2dd83.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/59fa2895-c891-45a7-9150-55c18807a570.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D and E</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/69c621a5-1615-4cbb-9139-a8c0ec21d4e3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong>
Creating the port-channel interface and using <code>port-channel min-links 1</code> tells the switch to keep the Port-Channel (Po1) operational as long as <strong>at least one</strong> member link is up. </p>
<h2 id="heading-etherchannel-lab">EtherChannel LAB</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fb82eca0-d8c5-469c-87df-6e5a614dcfd5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will implement EtherChannel Layer 2 and Layer 3 with different types of EtherChannel protocols, Static, PAgP, and LACP, for this topology.</p>
<h3 id="heading-etherchannel-configuration-on-access-switch-1-using-lacp-protocol">EtherChannel Configuration on Access Switch 1 Using LACP Protocol</h3>
<pre><code class="lang-javascript">ASW1#conf t
ASW1(config)#interface range e0/<span class="hljs-number">2</span><span class="hljs-number">-3</span>
ASW1(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode active
ASW1(config)#int po1 [port-channel <span class="hljs-number">1</span>]
ASW1(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1
ASW1(config-<span class="hljs-keyword">if</span>)#switchport mode  trunk
</code></pre>
<h3 id="heading-verify-etherchannel-configuration-on-access-switch-1">Verify EtherChannel Configuration on Access Switch 1</h3>
<pre><code class="lang-javascript">ASW1#show etherchannel summary
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7470d9f9-a4db-4ce8-9879-17dfafede9af.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-etherchannel-configuration-on-distribution-switch-1-using-lacp-protocol-access-switch-side">EtherChannel Configuration on Distribution Switch 1 Using LACP Protocol (Access Switch Side)</h3>
<pre><code class="lang-javascript">DSW1#conf t
DSW1(config)#int range e0/<span class="hljs-number">2</span><span class="hljs-number">-3</span>
DSW1(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode active
DSW1(config)#int po1
DSW1(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
DSW1(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c0cc5f2-2d1f-45a5-acdd-a06b5acca97b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>An EtherChannel connection has been established between the Access and Distribution switches using LACP.</p>
<h3 id="heading-configure-svi-switch-virtual-interface-as-a-default-gateway">Configure SVI (Switch Virtual Interface) as a Default gateway</h3>
<pre><code class="lang-javascript">DSW1(config)#int vlan <span class="hljs-number">1</span>
DSW1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.100</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DSW1(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<p>A <strong>Switch Virtual Interface (SVI)</strong> is a logical interface on a network switch that enables Layer 3 functionality for a VLAN. It allows the switch to perform routing between VLANs and provides IP connectivity for the VLAN.</p>
<blockquote>
<p>💡 An EtherChannel is just a <strong>link bundle</strong>. A <em>default gateway</em> must be an <strong>IP address on a Layer-3 interface</strong>, not a link.</p>
</blockquote>
<h3 id="heading-etherchannel-configuration-on-access-switch-2-using-pagp-protocol">EtherChannel Configuration on <strong>Access Switch 2</strong> Using PAgP Protocol</h3>
<pre><code class="lang-javascript">ASW2(config)#int range e0/<span class="hljs-number">1</span><span class="hljs-number">-2</span>
ASW2(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode desirable 
ASW2(config-<span class="hljs-keyword">if</span>-range)#int po1 
ASW2(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q 
ASW2(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
ASW2#show etherchannel summary
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/29f7458e-ae85-467b-a318-52b80704d6d9.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-etherchannel-configuration-on-distribution-switch-2-using-pagp-protocol-access-switch-side">EtherChannel Configuration on Distribution Switch 2 Using PAgP Protocol (Access Switch Side)</h3>
<pre><code class="lang-javascript">DSW2(config)#int range e0/<span class="hljs-number">0</span><span class="hljs-number">-1</span>
DSW2(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode desirable
DSW2(config-<span class="hljs-keyword">if</span>-range)#no shutdown 
DSW2(config-<span class="hljs-keyword">if</span>-range)#int po1
DSW2(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
DSW2(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
DSW2#show etherchannel summary
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/07d7eddd-813e-4c64-92b4-592b1af37350.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-configure-svi-switch-virtual-interface-as-a-default-gateway-1">Configure SVI (Switch Virtual Interface) as a Default gateway</h3>
<pre><code class="lang-javascript">DSW2(config)#int vlan <span class="hljs-number">1</span>
DSW2(config-<span class="hljs-keyword">if</span>)# ip address <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DSW2(config-<span class="hljs-keyword">if</span>)#no shut
</code></pre>
<h3 id="heading-layer-3-etherchannel-configuration-between-two-layer-3-switches">Layer 3 EtherChannel Configuration between two Layer 3 Switches</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/75a6763e-e5b8-4d7a-88cd-d5674c11ed59.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-distribution-switch-1-configuration">Distribution Switch 1 Configuration</h3>
<pre><code class="lang-javascript">DSW1(config)#int range e0/<span class="hljs-number">0</span><span class="hljs-number">-1</span>
DSW1(config-<span class="hljs-keyword">if</span>-range)#no switchport /change to routed port/
DSW1(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">2</span> mode on
DSW1(config-<span class="hljs-keyword">if</span>-range)#no shutdown 
DSW1(config-<span class="hljs-keyword">if</span>-range)#int po2
DSW1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
</code></pre>
<h3 id="heading-distribution-switch-2-configuration">Distribution Switch 2 Configuration</h3>
<pre><code class="lang-javascript">DSW2(config)#int range e0/<span class="hljs-number">02</span><span class="hljs-number">-3</span>
DSW2(config-<span class="hljs-keyword">if</span>-range)#no switchport 
DSW2(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">2</span> mode on
DSW2(config-<span class="hljs-keyword">if</span>-range)#no shutdown 
DSW2(config-<span class="hljs-keyword">if</span>-range)#int po2
DSW2(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3db1ce46-2c27-4ffa-8ee6-82d8f53a7fc4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>EtherChannel layer 3 has been established between two layer 3 switches.  </p>
<h2 id="heading-configure-a-static-route-to-reach-the-it-department-pc-to-the-server-in-the-data-center">Configure a static route to reach the IT Department pc to the Server in the Data Center</h2>
<pre><code class="lang-javascript">DSW1(config)#ip routing
DSW1(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span>
</code></pre>
<pre><code class="lang-javascript">DSW2(config)#ip routing
DSW2(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1fab2deb-1a29-4c71-b31d-e2c2f16bb006.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After completing the configuration, clients from the IT department have established a connection with the server located in the data center.</p>
<h3 id="heading-notes">Notes:</h3>
<ul>
<li><strong>Channel-Group</strong> should be unique and not repeated <strong>on the same switch.</strong></li>
<li><strong>PO</strong>= port-channel.</li>
<li>Before starting the configuration of channel groups, make sure all interfaces are <strong>down</strong>.</li>
</ul>
<p>Question #: 1266</p>
<p>Question #: 1339</p>
<h2 id="heading-routing">Routing</h2>
<h1 id="heading-what-is-a-router">What is a Router?</h1>
<ul>
<li>A router is a <strong>layer 3</strong> device used for interconnecting <strong>networks at layer 3**</strong>.**</li>
<li><strong>Routing</strong> is the process of identifying the best path to a destination.</li>
<li><strong>Routers</strong> make their forwarding decision based on <strong>Layer 3 (IP Address)</strong>, unlike <strong>Switches</strong>, which make their decision based on <strong>Layer 2 ( MAC Address)</strong>.</li>
<li>Generally, a router has at least two interfaces, but with the use of VLANs, it can have only one interface.</li>
<li><strong>The router</strong> receives the message, de-encapsulates the Ethernet frame, and then <strong>reads the destination IP address (Network portion) in the IP packet</strong>. It then determines where to forward the message. It re-encapsulates the packet back into a new frame and forwards the frame to its destination.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/301bedfd-efbc-47a6-b0a7-054acd21ce65.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d50c7cb6-d9b9-4532-95ea-03ff014c692b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/79b0a3b2-520f-489e-879c-349a10ad3e74.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-the-routing-table">The Routing Table</h2>
<ul>
<li>A <strong>routing table</strong> is a <strong>data structure</strong> used by routers and networked devices (like servers, PCs, and switches with Layer 3 capabilities) to <strong>determine the best path for forwarding packets</strong> to their destinations.</li>
<li><strong>Routing table</strong> updates are done in two ways:</li>
<li><strong>Dynamically:</strong> Remote routes are automatically learned using a <strong>dynamic routing protocol</strong>.</li>
<li><strong>Manually:</strong> Remote networks are <strong>manually</strong> entered into the route table using <strong>static routes</strong>.</li>
<li>If the router can't determine where to forward a message, <strong>it will drop it</strong>. The Network Administrator configures a <u><strong>static default route that is placed into the routing table so that a packet will not be dropped due to the destination network not being in the routing table</strong></u>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3922fa84-9b2f-4bf9-b142-f8f0d49e6364.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Directly connected: means that the router is connected to the network directly.</p>
<h2 id="heading-default-gateway">Default Gateway</h2>
<p>A <strong>default gateway</strong> is the <strong>router IP address</strong> on your local network that your device uses to send traffic <strong>outside of its subnet</strong>.</p>
<p>Think of it as the <strong>“exit door”</strong> from your local network to other networks (like the internet).</p>
<blockquote>
<p>💡 Hosts with an <strong>incorrect default gateway</strong> can communicate with other hosts on a local network, but can’t communicate with hosts in other networks. </p>
</blockquote>
<p><strong>What is the purpose of ARP in an IPv4 network?</strong></p>
<ul>
<li>to obtain a specific MAC address when an IP address is known.</li>
</ul>
<p><strong>The ARP table in a switch maps which two types of addresses together?</strong></p>
<ul>
<li>Layer 3 address to a Layer 2 address</li>
</ul>
<p><strong>What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2?</strong></p>
<ul>
<li>It reassembles the frame with MAC addresses different from the original frame.</li>
</ul>
<p><strong>A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?</strong></p>
<ul>
<li>the broadcast MAC address</li>
</ul>
<p>When we configure an IP address on an Interface and enable the interface, <strong>two routes are automatically added to the routing table</strong>:</p>
<ul>
<li><strong>Connected Route C</strong> (Code <strong>C</strong> in the routing table): represents a <strong>network directly attached</strong> to the router interface,</li>
<li><strong>Local Route L</strong> (Code <strong>L</strong> in the Routing table) represents the <strong>IP address assigned and configured</strong> to the router's specific interface and is always <strong>a /32 (host route).</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c48e3b98-5b45-4d37-b053-df3e1a9eddbf.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-router-vs-l3-switch">Router VS L3 Switch</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Attribute</td><td>Layer 3 switch</td><td>Router</td></tr>
</thead>
<tbody>
<tr>
<td>Scope</td><td>LAN for office, data center, and campus environment</td><td>WAN For  office,Datacenter and campus environment</td></tr>
<tr>
<td>Key functionality</td><td>Routes across different subnets or VLANs on a campus LAN</td><td>Routes across different networks across WAN are communicated and routed by a router.</td></tr>
<tr>
<td>Edge technologies support</td><td>Not supporting</td><td>NAT, Firewalling, tunneling, IPsec</td></tr>
<tr>
<td>Size of routing tabel</td><td>Smaller routing table compared to router</td><td>Bigger to support multiple route entries</td></tr>
<tr>
<td>Interface support</td><td>Ethernet ports(copper/fiber)</td><td>Ethernet ports(copper/fiber), interface like SONT, OC-N, T1/T3 etc</td></tr>
<tr>
<td>Throughput</td><td>High Throughput (because of large amount ports)</td><td>Low than layer 3 switches (because of less amount ports)</td></tr>
<tr>
<td>Switching capacity</td><td>High switching capacity</td><td>Lower than layer 3 switches</td></tr>
<tr>
<td>Cost</td><td>Low cost</td><td>High cost</td></tr>
<tr>
<td>Port Density</td><td>High</td><td>Low</td></tr>
</tbody>
</table>
</div><p><strong>The port density</strong> of a switch refers to <strong>the number of ports available on a single switch.</strong></p>
<h2 id="heading-type-of-routing">Type of Routing</h2>
<h3 id="heading-static-routing">Static Routing</h3>
<p>Static routes are mainly configured when routing from a particular network to a stub network. </p>
<pre><code class="lang-javascript">Router(config)# ip route <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> [next-hop ip address or exit interface]
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/370012cf-a1d3-48fc-b1ae-11359f159625.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5011fbfb-9a3a-4bbf-a4f1-078a6e0d1aed.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-default-route-gateway-of-last-resort">Default Route (gateway of last resort)</h2>
<p>A <strong>gateway of Last Resort</strong> is a route that a router uses when it does not have a more specific match for a destination in its routing table. It is essentially the <strong>default route</strong>, directing traffic to a next-hop router when no other routes match.</p>
<pre><code class="lang-javascript">Router(config)# ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> [next-hop ip address or exit interface]
</code></pre>
<p>Gateway of last resort is 192.168.1.1 to network 0.0.0.0</p>
<pre><code class="lang-javascript">Gateway <span class="hljs-keyword">of</span> last resort is <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> to network <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>

     <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.0</span>/<span class="hljs-number">24</span> is directly connected, Gig0/<span class="hljs-number">0</span>
     <span class="hljs-number">172.16</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>/<span class="hljs-number">16</span> is directly connected, Gig0/<span class="hljs-number">1</span>
     <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>/<span class="hljs-number">0</span> [<span class="hljs-number">1</span>/<span class="hljs-number">0</span>] via <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<ul>
<li>The router knows about <code>10.10.10.0/24</code> and <code>172.16.0.0/16</code>.</li>
<li>If traffic is going to, say, <code>8.8.8.8</code> (Google DNS), It doesn’t match any specific route.</li>
<li>So the router sends it to the <strong>gateway of last resort:</strong> <strong><code>192.168.1.1</code></strong>.</li>
</ul>
<h2 id="heading-static-route">Static Route</h2>
<h3 id="heading-advantage">Advantage:</h3>
<ul>
<li>No <strong>routing overhead for the router CPU</strong>, which means a cheaper router can be used to do routing.</li>
<li>It adds <strong>security</strong> because only the administrator can allow routing to particular networks.</li>
<li>No <strong>bandwidth usage between routes</strong>, and any updating did not happen between routes, such as dynamic routing)</li>
</ul>
<h3 id="heading-disadvantage">Disadvantage:</h3>
<ul>
<li>For a large network, it is hectic for the administrator to manually add each route for the network in the routing table on each router.</li>
<li>The administrator should have good knowledge of the topology. If a new administrator comes, then he has to manually add each route, so he should have a very good knowledge of the router topology.</li>
</ul>
<h2 id="heading-static-route-lab">Static Route Lab</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3272d4e4-7ca7-4592-adf9-e4c0cbd940fc.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we have three departments, each with a unique subnet. We will establish a connection between the departments through static routing and forward unknown destinations to the internet.</p>
<h2 id="heading-operation-router-configuration">Operation Router Configuration</h2>
<pre><code class="lang-javascript">OPS-Router#conf t
OPS-Router(config)#int fa0/<span class="hljs-number">0</span>
OPS-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
OPS-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
OPS-Router(config-<span class="hljs-keyword">if</span>)#exit
SUP-Router#conf t
OPS-Router(config)#int fa1/<span class="hljs-number">0</span>
OPS-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
OPS-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h2 id="heading-support-router-configuration">Support Router Configuration</h2>
<pre><code class="lang-javascript">SUP-Router#conf t
SUP-Router(config)#int fa1/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
SUP-Router(config-<span class="hljs-keyword">if</span>)#exit


SUP-Router(config)#int fa2/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown 


SUP-Router(config)#int fa0/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown 


SUP-Router(config)#int fa3/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h2 id="heading-development-router-configuration">Development Router Configuration</h2>
<pre><code class="lang-javascript">DEV-Router#conf t
DEV-Router(config)#int fa1/<span class="hljs-number">0</span>
DEV-Router(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
DEV-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
DEV-Router(config-<span class="hljs-keyword">if</span>)#exit

DEV-Router(config)#int fa0/<span class="hljs-number">0</span>
DEV-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
EV-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h2 id="heading-internet-router-configuration">Internet Router Configuration</h2>
<pre><code class="lang-javascript">Internet#conf t
Internet(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Internet(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Internet(config-<span class="hljs-keyword">if</span>)#no shutdown 
Internet#wr
</code></pre>
<h2 id="heading-pc-configuration-operation-department">PC Configuration Operation Department</h2>
<pre><code class="lang-javascript">PC<span class="hljs-number">-02</span>&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<h2 id="heading-pc-configuration-support-department">PC Configuration Support Department</h2>
<pre><code class="lang-javascript">Support-PC02&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h2 id="heading-pc-configuration-development-department">PC Configuration Development Department</h2>
<pre><code class="lang-javascript">DEV-PC01&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
</code></pre>
<h2 id="heading-operation-router-static-route-configuration">Operation Router Static Route Configuration</h2>
<pre><code class="lang-javascript">OPS-Router#conf t
OPS-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
OPS-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
OPS-Router(config)#ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
OPS-Router(config)#exit
OPS-Router#wr
</code></pre>
<pre><code class="lang-javascript">OPS-Router#show ip route <span class="hljs-keyword">static</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ef9ab0f0-b419-43dc-b33b-cb02edac4d67.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-support-router-static-route-configuration">Support Router Static Route Configuration</h2>
<pre><code class="lang-javascript">SUP-Router#conf t
SUP-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
SUP-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span>
SUP-Router(config)#ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
SUP-Router(config)#exit
SUP-Router#wr
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8598d388-2632-4c53-ac56-f7e2a2224ebf.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">DEV-Router#conf t
DEV-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
DEV-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
DEV-Router(config)#ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
DEV-Router(config)#exit
DEV-Router#wr
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/da078e93-67c5-4f01-9b61-023f3f987e1b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6f7b2a0e-245a-4319-8bd3-ce4b1688527c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Now, as you can see, the connection between departments has been established.</p>
<h2 id="heading-dynamic-routing">Dynamic Routing</h2>
<ul>
<li>Dynamic routing makes automatic adjustments to the routes according to the current state of the route in the routing table. Dynamic routing uses protocols to discover network destinations and the routes to reach them.</li>
</ul>
<h3 id="heading-dynamic-protocols-have-the-following-features">Dynamic protocols have the following features:</h3>
<ul>
<li>The routers should have the same dynamic protocol running in order to exchange routes.</li>
<li>When a router finds a change in the topology, the router broadcasts it to all other routers.</li>
</ul>
<h3 id="heading-advantages-1">Advantages:</h3>
<ul>
<li>Easy to configure</li>
<li>More <strong>effective at selecting the best route to</strong> the destination remote network and also for discovering remote networks.</li>
</ul>
<h3 id="heading-disadvantage-1">Disadvantage:</h3>
<ul>
<li>Consumes <strong>more bandwidth for communication with other neighbours</strong>.</li>
<li><strong>Less secure</strong> than static routing. (because we decided in which path the data should be transferred).</li>
</ul>
<h2 id="heading-dynamic-routing-protocols">Dynamic Routing Protocols:</h2>
<ul>
<li><strong>Routing Protocols:</strong> Help routers add information to their routing tables from connected routers automatically. These types of protocols also send out topology updates whenever changes happen in the topology.</li>
</ul>
<h2 id="heading-type-of-routing-protocols">Type of Routing Protocols</h2>
<ul>
<li>Distance Victor or Link state protocols.</li>
<li><strong>I</strong>nterior <strong>G</strong>ateway Protocols (<strong>IGP</strong>) or <strong>E</strong>xterior <strong>G</strong>ateway <strong>P</strong>rotocols (<strong>EGP</strong>).</li>
<li>Classful or Classless Protocols. (old not useful, classful can not be subnetted)</li>
</ul>
<h2 id="heading-type-of-routing-protocols-1">Type of Routing Protocols</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8e6a8889-d024-4b5b-817e-7ca9a2ff61a0.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>IGP (Interior Gateway Protocol):</strong> Used for routing <strong>inside</strong> a single organization or network (Autonomous System). It helps routers within the same network share routes. Examples: <strong>OSPF, EIGRP, RIP, and IS-IS.</strong></li>
<li><strong>EGP (Exterior Gateway Protocol):</strong> Used for routing <strong>between</strong> different organizations or networks (Autonomous Systems). It helps networks on the internet share routes. The main example today is <strong>BGP (Border Gateway Protocol).</strong></li>
</ul>
<h2 id="heading-distance-vector-routing-protocol">Distance Vector Routing Protocol</h2>
<ul>
<li>Distance Vector Protocol broadcasts its routing table to every directly connected neighbour at specific time intervals, using a <strong>lot of bandwidth</strong> and <strong>slow convergence**</strong>.** In the Distance Vector Routing protocol, when a route becomes unavailable, all router tables need to be updated with new information.</li>
</ul>
<h2 id="heading-distance-vector-protocols-work-best-in-these-situations">Distance Vector Protocols work best in these situations:</h2>
<ul>
<li>When the network is <strong>simple and flat,</strong> and doesn’t require a <strong>hierarchical design</strong>.</li>
<li>When the administrators <strong>don’t have enough knowledge</strong> to configure and troubleshoot <strong>link-state protocols</strong>.</li>
<li>When <strong>worst-case convergence times</strong> in a network are <strong>not a concern.</strong> (that the speed at which the network protocols adjust to changes, such as topology updates, link failures, or new configurations, is not critical to the network's operation or performance requirements)</li>
</ul>
<h2 id="heading-link-state-protocols">Link State Protocols</h2>
<ul>
<li>Link State protocols find the <strong>best routing path</strong> by <strong>sharing information with other routes in proximity</strong>. The route is calculated based on <strong>the speed of the path</strong> to the destination and <strong>the cost of resources</strong>.</li>
<li>One key difference to a distance vector protocol is that link state protocols <strong>don’t send out routing tables</strong> instead, routes <strong>notify each other quickly when route changes are detected.</strong></li>
<li>Link State protocols use more resources (CPU) on the router because more information is shared.</li>
</ul>
<h2 id="heading-link-state-works-best-in-these-situations">Link-State works best in these situations:</h2>
<ul>
<li>When the network design is <strong>hierarchical</strong>.</li>
<li>When the administrators have <strong>good knowledge</strong> of the implemented <strong>link-state routing protocol.</strong></li>
<li>When the <strong>fast convergence</strong> of the network is <strong>crucial</strong>.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Distance Vector</td><td>Link State</td></tr>
</thead>
<tbody>
<tr>
<td>Distance Vector Protocol <strong>sends the entire routing table</strong>.</td><td>Link State Protocol sends <strong>only link-state information</strong></td></tr>
<tr>
<td>It is allowing to routing loops</td><td>it is less allowing to routing loops</td></tr>
<tr>
<td>Updates sometimes sent using <strong>broadcast</strong></td><td>Uses only <strong>multicast</strong> method for routing updates.</td></tr>
<tr>
<td>It is <strong>simple</strong> to configure</td><td>It is <strong>hard</strong> to configure</td></tr>
<tr>
<td><strong>Doesn’t know</strong> network topology</td><td><strong>Know</strong> the entire topology</td></tr>
<tr>
<td>Example: Rip, IGRP</td><td>Example: OSPF, IS-IS</td></tr>
</tbody>
</table>
</div><div class="hn-table">
<table>
<thead>
<tr>
<td>RIP</td><td><strong>R</strong>outing <strong>I</strong>nformation <strong>P</strong>rotocol</td></tr>
</thead>
<tbody>
<tr>
<td>IGRP</td><td><strong>I</strong>nterior <strong>G</strong>ateway <strong>R</strong>outing <strong>P</strong>rotocol</td></tr>
<tr>
<td>OSPF</td><td><strong>O</strong>pen <strong>S</strong>hortest <strong>P</strong>ath <strong>F</strong>irst</td></tr>
<tr>
<td>ISIS</td><td><strong>I</strong>ntermediate <strong>S</strong>ystem to <strong>I</strong>ntermediate <strong>S</strong>ystem.</td></tr>
<tr>
<td>EIGRP</td><td>Enhanced Interior Gateway Routing Protocol</td></tr>
<tr>
<td>BGP</td><td><strong>B</strong>order <strong>G</strong>ateway <strong>P</strong>rotocol</td></tr>
</tbody>
</table>
</div><div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Routing protocol</strong></td><td><strong>Metric</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>RIPv1,2</strong></td><td>Hop count</td><td>The number of routers between the source and destination network.</td></tr>
<tr>
<td><strong>EIGRP</strong></td><td>Matric based on bandwidth and delay (by default</td><td>A combination of several values used to determine the best path. The composite metric will be discussed in the chapter on EIGRP.</td></tr>
<tr>
<td><strong>OSPFv2</strong></td><td>Cost</td><td>The cost of each link is calculated based on bandwidth.</td></tr>
</tbody>
</table>
</div><p>The total matric is the total cost of each link in the route.                                                         |
| <strong>IS-IS</strong>            | Cost                                            | The total metric is the total cost of each link in the route. <strong>the cost of each link is not automatically calculated by defaul</strong>t. All Links have a cost <strong>10 by default.</strong>  |</p>
<h2 id="heading-administrative-distance">Administrative Distance</h2>
<p>Routers use this featur<strong>e to select the best path when there are two or more routes to the same destination using different routing protocols.</strong> Administrative distance <strong>defines the reliability of the routing protocol</strong>. </p>
<p><strong>Lower AD is Preferred</strong>: The route with the lowest AD value is selected.</p>
<p><strong>Static Value</strong>: Assigned by default but can be adjusted manually.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Directly connected</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Static</td><td>1</td></tr>
<tr>
<td>External BGP</td><td>20</td></tr>
<tr>
<td>EIGRP</td><td>90</td></tr>
<tr>
<td>IGRP</td><td>100</td></tr>
<tr>
<td>OSPF</td><td>110</td></tr>
<tr>
<td>IS-IS</td><td>115</td></tr>
<tr>
<td>RIP</td><td>120</td></tr>
<tr>
<td>EIGRP(External)</td><td>170</td></tr>
<tr>
<td>Internal BGP</td><td>200</td></tr>
</tbody>
</table>
</div><h2 id="heading-metrics">Metrics</h2>
<p>A <strong>metric</strong> is a value that routing protocols use to determine the <strong>best path</strong> to a destination network. When <strong>multiple routes exist with the same routing protocol</strong>, the router chooses the path with the <strong>lowest metric</strong> because it is considered the most efficient.</p>
<ul>
<li>The following routes to the destination network 10.1.1.0/24 are learned:</li>
<li>next hop 192.168.1.1, learned via RIP, metric 5</li>
<li>next hop 192.168.2.1, learned via RIP, metric 3</li>
<li>next hop 192.168.3.1, learned via OSPF, metric 10</li>
</ul>
<p>Which route to 10.1.1.0/24 will be added to the route table?</p>
<p><strong>next hop 192.168.3.1, learned via OSPF, metric 10</strong> </p>
<blockquote>
<p>💡 We don't consider the metric directly because the routes are learned from different routing protocols. Each protocol has its own Administrative Distance (AD), and this value is used to select the best route. OSPF typically has a lower AD, making its routes more preferred</p>
</blockquote>
<h3 id="heading-how-to-check-the-administrative-distance-and-metric-of-each-route">How to check the Administrative Distance and Metric of each Route</h3>
<pre><code class="lang-java">R1#show ip route
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e5f836d8-6558-4f04-be74-3cc46c18c7fe.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Administrative Distance</strong> = 90             <strong>Metric</strong>=30720</p>
<h2 id="heading-autonomous-system">Autonomous System</h2>
<p>An <strong>Autonomous System (AS)</strong> is a set of Internet-routable IP prefixes belonging to a network or a collection of networks that are all managed, controlled, and supervised by a single entity or organization.  The AS is assigned a globally unique <strong>16-digit identification numbe</strong>r一known as the autonomous system number or <strong>ASN</strong>一by th e <strong>Internet Assigned Numbers Authority (IANA)</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dd3955a8-4386-4284-bcd7-a35cfe83f5a5.svg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-routing-information-protocol-rip">Routing Information Protocol (RIP)</h1>
<ul>
<li>Routing Information Protocol(RIP): This is one of the first routing protocols to be created. There are multiple versions of RIP, including RIPv1 and RIPv2. The original version, <strong>RIPv1,</strong> determines network paths based on the IP destination and hop count of the journey and uses the <strong>broadcast address</strong>.</li>
<li><strong>RIPv2</strong> is a little more sophisticated than this and sends its routing table to a <strong>multicast address.</strong> RIPv2 also uses authentication to keep data more secure and choose a subnet mask and gateway for future traffic. <strong>The main limitation of RIP is that it has a maximum hop count of</strong> <strong>15,</strong> <strong>which makes it unsuitable for a large network.</strong></li>
<li><strong>RIPng</strong>(RIP Next Generation), used for IPv6</li>
<li>It uses two messages every 30 seconds:
<strong>Request</strong>: To ask RIP-enabled neighbour routers to send their routing table.
<strong>Response:</strong> To send the local router’s routing table to neighbouring routers</li>
</ul>
<h2 id="heading-ripampeigrp-lab">RIP&amp;EIGRP Lab</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3e434eaa-53d9-4232-83ba-be4db9c38aac.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will be establishing dynamic routing between Network 1 in North Erbil and Network 2 in South Erbil using the RIP protocol.</p>
<h2 id="heading-network-1-basic-ip-configuration">Network 1 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit

R1(config)#int fa0/<span class="hljs-number">0</span> 
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h2 id="heading-network-2-basic-ip-configuration">Network 2 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-1">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration-1">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa1/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit

R2(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-rip-routing-information-protocol-configuration">RIP (Routing Information Protocol) Configuration</h2>
<h3 id="heading-rip-protocol-configuration-network-1">RIP Protocol Configuration Network 1</h3>
<pre><code class="lang-javascript">R1(config)#router rip 
R1(config-router)#version <span class="hljs-number">2</span>
R1(config-router)#no auto-summary 
R1(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>
R1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>
R1(config-router)#passive-interface fa1/<span class="hljs-number">0</span> [prevent the router <span class="hljs-keyword">from</span> sending routing table to the mentioned interface]
R1(config-router)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-rip-protocol-configuration-network-2">RIP Protocol Configuration Network 2</h3>
<pre><code class="lang-javascript">R2(config)#router  rip
R2(config-router)#version <span class="hljs-number">2</span>
R2(config-router)#no auto-summary 
R2(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>
R2(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>
R2(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
R2(config-router)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-rip-routing-verification">RIP Routing Verification</h2>
<pre><code class="lang-javascript">R1#show ip route rip
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/08eddbe6-0a23-4203-aefb-e6048b143021.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1#debug ip rip
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bf314743-892e-44d1-813c-a1c361ae159e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see each router exchanges the routing table with neighbours, routing table entries are not advertised on interfaces connected to end devices. This is a key benefit of using the '<strong>passive-interface</strong>' command in routing protocols.</p>
<pre><code class="lang-javascript">R1#show ip protocols
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ddef4000-b9b2-42f1-9a03-039005ad7b5c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cf1baada-eee9-45fb-8d5d-7cd5859dcf32.png" alt="CCNA 200-301 Study (1)" /></p>
<p>It can be seen that a connection between network 1 and network 2 has been established using the RIP protocol.</p>
<h1 id="heading-eigrp">EIGRP</h1>
<ul>
<li>Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol. EIGRP was a Cisco proprietary (till 2013) protocol that was designed to follow the original IGRP protocol. When using EIGRP, a router takes information from its neighbours’ routing tables through a multicast message.</li>
</ul>
<h2 id="heading-eigrp-lab">EIGRP LAB</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/694a1117-e372-4565-a29d-6c82d176d322.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will be establishing dynamic routing between Network 1 in North Sulaymaniyah and Network 2 in South Sulaymaniyah using the EIGRP protocol.</p>
<h2 id="heading-network-1-basic-ip-configuration-1">Network 1 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-2">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration-2">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa0/<span class="hljs-number">0</span>   
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit


R1(config)#int fa1/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h2 id="heading-network-2-basic-ip-configuration-1">Network 2 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-3">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt;  ip <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r2-ip-configuration">Router R2 IP configuration</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa1/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit

R2(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-eigrpenhanced-interior-gateway-routing-protocol-configuration">EIGRP(Enhanced Interior Gateway Routing Protocol) Configuration</h2>
<h3 id="heading-eigrp-protocol-configuration-network-1">EIGRP Protocol Configuration Network 1</h3>
<pre><code class="lang-javascript">R1(config)#router eigrp <span class="hljs-number">100</span> (<span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">u</span>&gt;</span>**Autonomous Systems (AS) ID**<span class="hljs-tag">&lt;/<span class="hljs-name">u</span>&gt;</span></span> )
R1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> ip wildcard (<span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> = <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> [<span class="hljs-number">255</span><span class="hljs-number">-252</span>])
R1(config-router)#network <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
R1(config-router)#no auto-summary 
R1(config-router)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-note">Note:</h3>
<ul>
<li>All routers within an Autonomous System (AS) <strong>should have the same AS number,</strong> which is considered a unique identifier for a network.</li>
<li>Auto-summary: This feature automatically <strong>summarizes routes to their classful network boundaries</strong>. For example, <strong>a network with a /26 or /27 prefix would be summarized as a /24</strong>. This can lead to subnetting issues and is generally not recommended for most modern networks.</li>
</ul>
<h3 id="heading-eigrp-protocol-configuration-network-2">EIGRP Protocol Configuration Network 2</h3>
<pre><code class="lang-javascript">R2(config)#router eigrp <span class="hljs-number">100</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span>  
R2(config-router)#no auto-summary
R2(config-router)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-eigrp-routing-verification">EIGRP Routing Verification</h2>
<pre><code class="lang-javascript">R1#show ip route  eigrp
</code></pre>
<pre><code class="lang-javascript">R1#show ip protocols
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a1e0fc85-441c-4697-8730-1b91bdc106d6.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1#show ip eigrp neighbors
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/64faef28-9a38-4d1c-b0ea-0d832d204b85.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/465c80e9-cf48-4fe9-ab44-a5cc42286bde.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A connection between Network 1 and Network 2 has been established using the EIGRP protocol.</p>
<h1 id="heading-floating-static-route">Floating Static Route</h1>
<p>Static routes have a very low <strong>distance value of 1</strong>. This means the router will prefer a static route over any routes learned through a dynamic routing protocol. If we want to use a static route as a backup route, we should change the administrative distance value of the static route. This is called a <strong>floating static route</strong>.</p>
<h2 id="heading-floating-static-route-1">Floating Static Route</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5dd0dfb9-1859-4744-82b5-d62438e0c8f4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will be establishing dynamic routing between Network 1 in North Sulaymaniyah and Network 2 in South Sulaymaniyah using the EIGRP protocol. A floating static route will be configured as a backup, ensuring network connectivity even if the EIGRP protocol encounters issues.</p>
<h2 id="heading-network-1-basic-ip-configuration-2">Network 1 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-4">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration-3">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa0/<span class="hljs-number">0</span>   
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit

R1(config)#int fa <span class="hljs-number">2</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit

R1(config)#int fa1/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h2 id="heading-network-2-basic-ip-configuration-2">Network 2 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-5">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt;  ip <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r2-ip-configuration-1">Router R2 IP configuration</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa1/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit

R2(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit

R2(config)#int fa2/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R2(config-<span class="hljs-keyword">if</span>)#no shu
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 

R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h3 id="heading-router-r3-ip-configuration">Router R3 IP configuration</h3>
<pre><code class="lang-javascript">R3#conf t 
R3(config)#int fa1/<span class="hljs-number">0</span>
R3(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
R3(config-<span class="hljs-keyword">if</span>)#no shut


R3(config-<span class="hljs-keyword">if</span>)#exit
R3(config)#int fa0/<span class="hljs-number">0</span> 
R3(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>     
R3(config-<span class="hljs-keyword">if</span>)#no shut

R3(config-<span class="hljs-keyword">if</span>)#exit
R3(config)#exit
R3#wr
</code></pre>
<h3 id="heading-static-routing-configuration">Static Routing Configuration</h3>
<pre><code class="lang-java">R1(config)#ip route <span class="hljs-number">172.17</span>.<span class="hljs-number">2.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.2</span>.<span class="hljs-number">0.2</span> 
R1(config)#ip route <span class="hljs-number">10.3</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.252</span> <span class="hljs-number">10.2</span>.<span class="hljs-number">0.2</span>  


R3(config)#ip route <span class="hljs-number">172.17</span>.<span class="hljs-number">2.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.3</span>.<span class="hljs-number">0.1</span>
R3(config)#ip route <span class="hljs-number">172.17</span>.<span class="hljs-number">2.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.3</span>.<span class="hljs-number">0.1</span>


 R2(config)#ip route  <span class="hljs-number">172.17</span>.<span class="hljs-number">1.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.3</span>.<span class="hljs-number">0.2</span>
 R2(config)#ip route  <span class="hljs-number">10.2</span>.<span class="hljs-number">0.0</span>  <span class="hljs-number">255.255</span>.<span class="hljs-number">255.252</span>  <span class="hljs-number">10.3</span>.<span class="hljs-number">0.2</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f72ce019-7455-48b3-9c1a-3adee4767b63.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After configuring the static route, data is forwarded through the static route because of the low administrative distance value.</p>
<h3 id="heading-configure-floating-static-route">Configure Floating Static Route</h3>
<p>Our network topology is configured with EIRGP, and the default distance value of EIRGP is <strong>90</strong> our static route will be used as a backup. Let’s set the distance value to <strong>91</strong>.</p>
<pre><code class="lang-javascript">R1(config)#ip route <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">91</span>
R1(config)#ip route <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span>  <span class="hljs-number">91</span>


 R3(config)#ip route <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">91</span>
 R3(config)#ip route <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>  <span class="hljs-number">91</span>


  R2(config)#ip route  <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span>  <span class="hljs-number">91</span>
  R2(config)#ip route  <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>  <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>  <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">91</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eaa179c1-cccf-41c4-a1e3-cc48df9277ab.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After configuring a floating static route, the routers in Network 1 and Network 2  utilize the EIGRP to route data between each other, and the static route works as a backup. </p>
<h2 id="heading-ospf">OSPF</h2>
<ul>
<li><strong>Open Shortest Path First (OSPF)</strong> is a link-state routing protocol that is used to find the best path between the source and the destination router using its own Shortest Path First.</li>
<li>The protocol <strong>recalculates routes when a link fails and the network topology changes,</strong> Using the <strong>Dijkstra(dike·struh) algorithm</strong>, and minimizes the routing protocol traffic that it generates.</li>
<li>It provides a multi-level hierarchy called “area routing” so that information about the topology within the defined area of the AS is hidden from routes outside this area. This enables an additional level of <strong>routing protection</strong> and <strong>reduction in routing protocol traffic</strong>.</li>
<li>All protocol <strong>exchanges can be authenticated</strong> so that only <strong>trusted routers can join in the routing exchanges for the AS</strong></li>
</ul>
<h2 id="heading-benefits-of-ospf">Benefits of OSPF:</h2>
<ul>
<li>Fast convergence.</li>
<li>Efficient use of network resources.</li>
<li>Support for large, complex networks.</li>
<li>Ability to route IPv4 and IPv6 traffic (OSPFv2 for IPv4, OSPFv3 for IPv6).</li>
<li>Redundancy and fault tolerance.</li>
<li>VLSM (Classless Routing) and route summarization</li>
</ul>
<h2 id="heading-ospf-concepts">OSPF Concepts</h2>
<h3 id="heading-area">Area</h3>
<ul>
<li>An <strong>area</strong> is a logical collection of OSPF networks, routers, and links that have the same area identification.</li>
<li>The most important area in OSPF is the <strong>backbone area</strong>, also known as <strong>area 0</strong>. The backbone area is the central area that interconnects all other areas.</li>
<li>In a large network, a single-area design can have negative effects:</li>
<li>The SFP algorithm takes more time to calculate routes and it causes the algorithm to require more processing power. </li>
<li>Any small change in the network causes every router to flood LSAs and run the SPF algorithm again. </li>
<li>By dividing a large OSPF network into several smaller areas, you can avoid the above negative effects.</li>
</ul>
<h3 id="heading-neighbour">Neighbour</h3>
<ul>
<li>Routers running OSPF need to establish a neighbour relationship before exchanging routing updates. Neighbours are dynamically discovered by sending <strong>Hello packets</strong> out of each OSPF-enabled interface.</li>
<li><p><strong>Hello Packets</strong>:</p>
<p>OSPF uses <strong>multicast addresses</strong> to communicate and exchange Hello Packets  between routers </p>
<ul>
<li><strong>224.0.0.5:</strong> All OSPF routers.</li>
<li><strong>224.0.0.6</strong>: All OSPF designated routers (DRs) and backup designated routers (BDRs).</li>
</ul>
</li>
<li><strong>Hello Interval</strong>:<ul>
<li>The OSPF router sends a hello message on an interface. It is <strong>10 seconds</strong> by default.</li>
</ul>
</li>
<li><strong>Dead Interval</strong>:<ul>
<li>The Dead interval is four times the Hello interval, which means a Dead interval of <strong>40 seconds</strong></li>
<li>If a router does not receive at least one Hello packet from a neighbour within the Dead interval, the neighbour is considered <strong>down</strong>.</li>
</ul>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0eff1551-732f-45dc-ad5f-e1621bf67261.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-abr-and-asbr">ABR and ASBR</h2>
<ul>
<li><strong>Area Border Router(**</strong>ABR<strong>**):</strong> a router that connects two or more OSPF areas, one of which must be the backbone area (area 0).</li>
<li><strong>Autonomous System Boundary Router(**</strong>ASBR<strong>**)</strong> is a router that connects two different <strong>Autonomous Systems (AS)</strong> and helps them communicate with each other. It usually runs <strong>BGP (Border Gateway Protocol)</strong> to exchange routing information between the <strong>AS</strong>, while <strong>OSPF</strong> is used within an AS. It is responsible for importing and redistributing routes from non-OSPF sources into the OSPF routing source.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1ccbff8c-4b83-44c1-8987-df52cf2c3536.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7b1d9a4a-0914-42cc-a1e4-a9565be01cde.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-designated-router-and-backup-designated-router">Designated Router and Backup Designated Router</h2>
<ul>
<li><strong>Designated Router (**</strong>DR<strong><strong>) and Backup Designated Router(</strong></strong>BDR<strong>**)</strong> are to act as <strong>a central point for exchanging OSPF information between multiple routers on the same network</strong>. <u>Each non-DR and non-BDR router only exchanges routing information with the DR and BDR</u>, instead of exchanging updates with every router on the segment. This significantly reduces the amount of OSPF updates sent across the network.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9cc6ffea-658e-43e4-92a9-951fd0e8b7fa.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dr-and-bdr-election">DR and BDR Election</h2>
<p>OSPF uses the following tie-breaker order:</p>
<p>1- <strong>Interface priority</strong> (0–255, <strong>default = 1</strong>; if set to 0, the router never becomes DR/BDR).</p>
<pre><code class="lang-javascript">R1(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
</code></pre>
<p>2- <strong>Highest router ID</strong> is a <strong>32-bit</strong> number that uniquely identifies every OSPF router.</p>
<pre><code class="lang-javascript">R1# conf t 
R1#(config) router ospf <span class="hljs-number">100</span>(OSPF process number).
R1#(config-router)# router-id <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p>3- <strong>Highest IP</strong> address on a loopback address (<strong>first check loopback if no loopback IP configuration, then check physical interface IP</strong>) or an active physical interface.</p>
<blockquote>
<p>💡 - OSPF Router ID should not be changed after the OSPF process has started and the OSPF neighborships have been established. <strong>If you change the OSPF Router ID, we need to either</strong> <strong>reload the IOS</strong> or use the command (<strong><code>clear ip ospf process</code></strong>), for the OSPF Router ID change to take effect. Reloading the IOS or using the command [<strong>clear ip ospf process</strong>] <strong>can cause a temporary network outage.</strong></p>
</blockquote>
<ul>
<li>OSPF Router ID should not be changed after the OSPF process has started and the OSPF neighborships have been established. <strong>If you change the OSPF Router ID, we need to either</strong> <strong>reload the IOS</strong> or use the command (<strong><code>clear ip ospf process</code></strong>), for the OSPF Router ID change to take effect. Reloading the IOS or using the command [<strong>clear ip ospf process</strong>] <strong>can cause a temporary network outage.</strong></li>
</ul>
<blockquote>
<p>💡 <strong>Best Practice (What Network Engineers Prefer)</strong><br /><strong>Use interface priority to control DR/BDR election.</strong>  </p>
<ul>
<li><p>Set the router you want as <strong>DR</strong> with a higher priority (<strong>e.g., 100</strong>).  </p>
</li>
<li><p>Set critical backups as <strong>BDR</strong> with a slightly <strong>lower priority</strong>.  </p>
</li>
<li><p>Set devices that should <strong>never be DR</strong> (like access switches or less powerful routers) to <strong>priority 0</strong>.</p>
</li>
</ul>
</blockquote>
<p>    <strong>Use interface priority to control DR/BDR election.</strong></p>
<ul>
<li>Set the router you want as <strong>DR</strong> with a higher priority (<strong>e.g., 100</strong>).</li>
<li>Set critical backups as <strong>BDR</strong> with a slightly <strong>lower priority</strong>.</li>
<li>Set devices that should <strong>never be DR</strong> (like access switches or less powerful routers) to <strong>priority 0</strong>.</li>
</ul>
<h2 id="heading-loopback-interface-configuration">Loopback Interface Configuration</h2>
<pre><code class="lang-javascript">R1#conf t 
R1(config)#interface loopback <span class="hljs-number">0</span> 
R1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<h2 id="heading-ospf-process-id">OSPF Process ID</h2>
<ul>
<li>The process ID is the ID of the OSPF process to which the interface belongs. The process ID is local to the router, and <strong>two OSPF neighbouring routers can have different OSPF process IDs</strong>. (Not like EIGRP). Cisco IOS software can run <strong>multiple OSPF processes on the same router**</strong>,<strong> The Router ID should be a </strong>positive integer;<strong> for example, </strong>the process ID is 1**</li>
</ul>
<p>## 
<strong>Link State Advertisement</strong> <strong>(LSAs)</strong></p>
<ul>
<li><strong>Link-State Advertisement (LSA)</strong> is a packet used to <strong>share routing and topology information between routers within the same area</strong>. LSAs help OSPF routers build a complete map of the network.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>LSA Type 1:</td><td>Router LSA</td></tr>
</thead>
<tbody>
<tr>
<td>LSA Type 2:</td><td>Network LSA</td></tr>
<tr>
<td>LSA Type 3:</td><td>Summary LSA</td></tr>
<tr>
<td>LSA Type 4:</td><td>Summary ASBR LSA</td></tr>
<tr>
<td>LSA Type 5:</td><td>Autonomous system external LSA</td></tr>
<tr>
<td>LSA Type 6:</td><td>Multicast OSPF LSA</td></tr>
<tr>
<td>LSA Type 7:</td><td>Not-so-stubby area LSA</td></tr>
<tr>
<td>LSA Type 8:</td><td>External attribute LSA for BGP</td></tr>
</tbody>
</table>
</div><h2 id="heading-ospf-concepts-main-lsas">OSPF Concepts: Main LSAs</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>LSA Type</td><td>name</td><td>Generated by</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>LSA Type 1:</td><td>Router LSA</td><td>Generated by each internal router within an area, per area link</td><td>Flooded within an single area only.</td></tr>
<tr>
<td>LSA Type 2:</td><td>Network LSA</td><td>Generated by the DR</td><td>Flooded within a single area only.</td></tr>
<tr>
<td>LSA Type 3:</td><td>Summary LSA</td><td>Generated by the BDR</td><td>Describes inter-area routes</td></tr>
<tr>
<td>LSA Type 4:</td><td>Summary ASBR LSA</td><td>Generated by the ABR.</td><td>Describes the path to the ASBR.</td></tr>
<tr>
<td>LSA Type 5:</td><td>Autonomous system external LSA</td><td>Generated by ASBR.</td><td>Describes the redistributed routes that have been injected into the OSPF domain from an external AS by The ASBR</td></tr>
<tr>
<td>LSA Type 7:</td><td>Not-so-stubby area(NSSAs)  LSA</td><td>Generated by the ASBR, within a not-so-stubby area.</td><td>Describes external routes. sent from ASBR to ABR and converted into a type 5 by the ABR, which then floods to its areas.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/76e4103e-9ff5-4ec7-8074-7f80ef66134b.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 - <strong>Hello messages</strong> are used for establishing and maintaining OSPF neighbour relationships.  </p>
<ul>
<li><strong>LSAs</strong> are used to share detailed routing and topology information within the OSPF domain.</li>
</ul>
</blockquote>
<ul>
<li><strong>Hello messages</strong> are used for establishing and maintaining OSPF neighbour relationships.</li>
<li><strong>LSAs</strong> are used to share detailed routing and topology information within the OSPF domain.</li>
</ul>
<h2 id="heading-cost">Cost</h2>
<ul>
<li>Open Shortest Path First(OSPF) uses <strong>cost</strong> as the value of metric value and uses a reference bandwidth of <strong>100</strong>  Mbps for cost calculation. The formula to calculate the cost is Reference Bandwidth divided by interface bandwidth. For example, in the case of 10 Mbps Ethernet, OSPF metric cost value is <strong>100 Mbps / 10 Mbps</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c361234f-9559-480b-ad55-96c1fcd92c54.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-modify-the-reference-bandwidth">Modify the reference bandwidth</h3>
<pre><code class="lang-javascript">R1(config-router) **auto-cost reference-bandwidth** <span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">u</span>&gt;</span>megabits-per-second<span class="hljs-tag">&lt;/<span class="hljs-name">u</span>&gt;</span></span>
</code></pre>
<h3 id="heading-manually-configure-the-cost-of-an-interface">Manually configure the cost of an interface:</h3>
<pre><code class="lang-javascript">R1(config-<span class="hljs-keyword">if</span>)**ip ospf cost** <span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">u</span>&gt;</span>cost<span class="hljs-tag">&lt;/<span class="hljs-name">u</span>&gt;</span></span>
</code></pre>
<h3 id="heading-modify-the-interface-bandwidth">Modify the interface bandwidth:</h3>
<pre><code class="lang-javascript">R1(config-<span class="hljs-keyword">if</span>)**bandwith** kilobits-per-second
</code></pre>
<p>Which of these commands can be used to make a FastEthernet interface have an OSPF cost of 100? </p>
<ul>
<li>R(config-router)# auto-cost reference bandwidth 1000</li>
</ul>
<p><strong>Reference bandwidth</strong>/<strong>Interface bandwidth</strong> = cost</p>
<p>10000/100=100</p>
<blockquote>
<p>💡 The SPF algorithm uses the cost of <strong>the outgoing interfaces</strong> toward the destination subnet, including the cost of the interface that connects to the subnet. The logic is illustrated in the following diagram.</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/82f22b14-22d7-425e-a44d-eda3924d836e.svg" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-example-scenario"><strong>Example Scenario</strong></h3>
<p><strong>Scenario</strong>: You have two paths from Router A to Router D:</p>
<ol>
<li>Path 1: A → B → D (10 Mbps and 100 Mbps links, respectively).</li>
<li>Path 2: A → C → D (100 Mbps links only).</li>
</ol>
<p><strong>Default Cost Calculation</strong>:</p>
<ul>
<li>Path 1: Cost = 10 (A → B) + 1 (B → D) = <strong>11</strong>.</li>
<li>Path 2: Cost = 1 (A → C) + 1 (C → D) = <strong>2</strong>.</li>
</ul>
<p><strong>Result</strong>:</p>
<ul>
<li>OSPF chooses <strong>Path 2</strong> because it has a lower total cost.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f2668f93-8e57-415b-8ee1-c9aff44f05bb.svg" alt="CCNA 200-301 Study (1)" /></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Path</strong></td><td><strong>Total Cost</strong> [lower is better]</td></tr>
</thead>
<tbody>
<tr>
<td>R1-R2-R3-R4-R5-R8</td><td>5</td></tr>
<tr>
<td>R1-R5-R6-R8</td><td>4</td></tr>
<tr>
<td>R1-R7-R8</td><td>3 (best)</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f8fd2a64-9618-4411-b476-87331c70cb4c.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-wild-card-mask">Wild Card Mask</h2>
<ul>
<li>Wildcard masks are used to specify a range of network addresses. They are usually used with routing protocols <strong>(Such as OSPF) and access lists</strong>.</li>
<li>A Wildcard mask is <strong>32-bit</strong> long. It is an inverted subnet mask, with the zero bits indicating that the corresponding bit position must match the same bit position in the IP address.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bbfed5c7-75b7-4330-aaf3-de6261b232ba.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: Change all 0s to 255 and all 255s to 0. In the second one, the last number is 255 − 192 = 063.</p>
<h3 id="heading-ospf-states">OSPF States</h3>
<ul>
<li><strong>Down State</strong>: No Hello received.</li>
<li><strong>Init State:</strong> Hello packet received, but <strong>no 2-way</strong> communication yet<strong>.</strong> At this stage, Communication is <strong>One-way.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ce89e673-60ac-41c7-a1c6-a0bf8840cc94.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>2-Way State</strong>: Bi-directional communication established (seen in DR/BDR election on broadcast/NBMA).</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4ca24bd9-4c29-4e8f-854e-d2c1a9a09fd9.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>ExStart State</strong>: Routers decide who will be master/slave for the database description (DBD) exchange.</li>
<li><strong>Exchange State</strong>: Routers <strong>exchange DBD</strong> packets (summaries of LSAs).</li>
<li><strong>Loading State:</strong> Routers send <strong>LSRs</strong> (Link State Requests) for missing <strong>LSAs</strong>.</li>
<li><strong>Full State: LSDBs fully synchronized between neighbors.</strong>.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>ID</td><td>Name</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td>1</td><td><strong>Hello</strong></td><td>Neighbor Discovery and Maintenance</td></tr>
<tr>
<td>2</td><td><strong>Database Description</strong></td><td>Summary of the LSDB of the router.</td></tr>
<tr>
<td>3</td><td><strong>Link-State Request (LSR)</strong></td><td>Request specific LSAs from the neighbor.</td></tr>
<tr>
<td>4</td><td><strong>Link-State Update (LSU)</strong></td><td>Sends specific LSAs to the neighbor.</td></tr>
<tr>
<td>5</td><td><strong>Link -State Acknowledgement(LSAck)</strong></td><td>Used to acknowledge that the router received a massage.</td></tr>
</tbody>
</table>
</div><pre><code class="lang-javascript">Router(config)# router ospf &lt;process-id&gt;      ! Start OSPF process (<span class="hljs-number">1</span>–<span class="hljs-number">65535</span>, local to router)
Router(config-router)# router-id &lt;x.x.x.x&gt;    ! (Optional) <span class="hljs-built_in">Set</span> OSPF Router-ID
Router(config-router)# network &lt;ip&gt; &lt;wildcard&gt; area &lt;area-id&gt;   ! Advertise networks


Router(config)# router ospf 1
Router(config-router)# router-id 1.1.1.1
Router(config-router)# network 192.168.1.0 0.0.0.255 area 0
Router(config-router)# network 10.0.0.0 0.0.0.3 area 0
</code></pre>
<pre><code class="lang-javascript">IR1(config)# router ospf <span class="hljs-number">1</span>
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>

**VS**

R1(config)# router ospf <span class="hljs-number">1</span>
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
</code></pre>
<ul>
<li>Use <strong><code>192.168.1.0 0.0.0.255</code></strong> When enabling OSPF on all interfaces within the <code>192.168.1.0/24</code> subnet.</li>
<li>Use <strong><code>192.168.1.1 0.0.0.0</code></strong> When enabling OSPF on a specific interface with the IP address <code>192.168.1.1</code>.</li>
</ul>
<p><strong>Tip</strong>: To reduce manual configuration effort, use <strong>subnet-based configuration</strong> (<code>192.168.1.0 0.0.0.255</code>) for a larger network or dynamic environment. For specific control or precision, use <strong>interface-based configuration</strong> (<code>192.168.1.1 0.0.0.0</code>).</p>
<h3 id="heading-verification-commands"><strong>Verification Commands</strong></h3>
<pre><code class="lang-javascript">show ip ospf neighbor      ! See adjacency &amp; states
show ip ospf interface     ! Check OSPF timers, priority, area
show ip route ospf         ! Verify OSPF routes
show ip protocols          ! Protocol info &amp; networks advertised
</code></pre>
<h3 id="heading-configuring-a-default-route-in-ospf"><strong>Configuring a Default Route in OSPF</strong></h3>
<pre><code class="lang-javascript">Router(config)# router ospf <span class="hljs-number">1</span>
Router(config-router)# <span class="hljs-keyword">default</span>-information originate always
</code></pre>
<p>The <strong><code>default-information originate always</code></strong> command in OSPF <strong>forces</strong> the advertisement of a default route (<code>0.0.0.0/0</code>) <strong>even if the router does not have a default static route</strong> in its routing table.</p>
<ul>
<li><strong>Without</strong> <strong><code>always</code>**</strong>:** Only advertises if the router already knows a default route.</li>
<li><strong>With</strong> <strong><code>always</code>**</strong>:** Forces advertisement, even if no default exists.</li>
</ul>
<p><img src="https://cdn.networkacademy.io/sites/default/files/2024-08/main-ospf-network-types.svg" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-ospf-on-point-to-point-links"><strong>OSPF on Point-to-Point Links</strong></h3>
<ul>
<li><strong>Point-to-point links</strong> are direct links between two routers.</li>
<li>In OSPF, <strong>point-to-point networks</strong> <strong>do not need DR/BDR elections</strong>.</li>
<li>Each router advertises its <strong>connected networks</strong> via <strong>LSAs (Link-State Advertisements)</strong>.</li>
</ul>
<pre><code class="lang-javascript">Router(config)# interface g0/<span class="hljs-number">0</span> [interface connected to the neighbor router]
Router(config-<span class="hljs-keyword">if</span>)# ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Router(config-<span class="hljs-keyword">if</span>)# ip ospf <span class="hljs-number">1</span> area <span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)# ip ospf network point-to-point
</code></pre>
<h2 id="heading-ccna-ospf-questions">CCNA OSPF  Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fd25d706-4c20-4b16-be6a-0362893d3844.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B  (</strong>When multiple routing protocols advertise the same destination, the router installs the route with the <strong>lowest administrative distance (AD)</strong>.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0212bad8-462d-4851-8e4a-a2d5b52d924f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e4ff3e52-d6cc-46b7-b74b-46718b5b8de9.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-check-which-routes-contain-1921681216">Check which routes contain 192.168.12.16</h3>
<ul>
<li><strong>EIGRP: 192.168.12.0/24</strong> → range is 192.168.12.0–192.168.12.255 → ✅ contains 192.168.12.16</li>
<li><strong>RIP: 192.168.12.0/27</strong> → range is 192.168.12.0–192.168.12.31 → ✅ contains 192.168.12.16</li>
<li><strong>OSPF: 192.168.12.0/28</strong> → range is 192.168.12.0–192.168.12.15 → ❌ does <em>not</em> contain 192.168.12.16</li>
</ul>
<p><strong>Apply longest prefix match: 27</strong> (RIP) is more specific than <strong>/24</strong> (EIGRP). (Longest prefix match <strong>always wins</strong>, regardless of administrative distance.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5e629024-ca94-41fe-a994-e89943a9aeee.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>EIGRP (D):</strong> 192.168.10.0/24 → 192.168.10.0 – 192.168.10.255</li>
<li><strong>RIP (R):</strong> 192.168.10.0/27 → 192.168.10.0 – 192.168.10.31</li>
<li><strong>OSPF (O):</strong> 192.168.10.0/23 → 192.168.10.0 – 192.168.11.255</li>
<li><strong>IS-IS (i L1):</strong> 192.168.10.0/13 → 192.168.8.0 – 192.168.15.255</li>
</ul>
<p>All of these routes include <strong>192.168.10.16</strong>. ✅</p>
<h3 id="heading-apply-the-longest-prefix-match-rule">Apply the <strong>longest prefix match rule</strong></h3>
<ul>
<li>/13 → 8192 addresses (least specific)</li>
<li>/23 → 512 addresses</li>
<li>/24 → 256 addresses</li>
<li>/27 → 32 addresses (most specific)
<strong>Since /27 is the longest prefix (most specific match), the router will choose the RIP route.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/93f6f41b-f9a0-48a7-a19c-4a115a18cfbe.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A and D</strong> ✅ (Because both of them have the lowest administrative distance)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d402273b-81a0-432a-93ad-2d0372b3310e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C. broadcast</strong> ✅ <strong>Ethernet (including FastEthernet and GigabitEthernet) interfaces</strong>, the default OSPF network type is <strong>broadcast</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e3aa24ec-a2ea-4dd1-b4e8-7ec729f02b28.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong> ✅  If a router has <strong>two static routes</strong> to the same destination <strong>with the same administrative distance and metric</strong>, they are considered <strong>equal-cost routes</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/da25ef64-991a-4e9d-848f-c09252feb26b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong> ✅
 The OSPF route present is <strong>10.10.13.0/25</strong> (via two next-hops). That covers addresses <strong>10.10.13.0–10.10.13.127</strong>. The destination in question is <strong>10.10.13.128/25</strong> (addresses <strong>10.10.13.128–10.10.13.255</strong>), which is a different /25, and <strong>no route</strong> for that network appears in the table. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d126b654-795a-4c46-8eba-95dd6e34b23b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A B✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7604b109-afe0-484e-a779-c11f03e286a2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5d40be76-bcd8-4561-a781-28162b6e665e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/469bd8a0-6a16-4ab4-ac12-e53c4bc0aa63.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A B E ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a56377b1-37a6-47f8-bcf4-9628be5f9da9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C E ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cdf8b5e9-c585-4d7e-a2a7-083161439e34.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D ✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/744b034c-ccb8-49e5-a8a7-da08b2f31c86.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D E ✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20a4d841-08ab-4911-a809-99a57c52290c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D ✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4a76eb85-a6f7-483d-8e51-2e0e8348f479.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5fe777e5-5d39-463a-9d35-4ee327c64f45.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/acd0b0bb-2c51-4e42-9af7-077eee6c7ad0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A ✅</strong> 
The OSPF neighbors are stuck in the <strong>EXCHANGE state</strong>. This usually happens when the routers have <strong>different MTU sizes</strong>, so they cannot finish sharing database packets. Making both MTUs the same will let OSPF move to the <strong>FULL state</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fc5ff290-4a1d-4f75-9ef8-a2e34d6b6cc5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C.</strong>  ✅
R1 has no default route, so it can’t advertise one with <code>default-information originate</code>. Adding a static default (<code>ip route 0.0.0.0 0.0.0.0 10.10.10.18</code>Let's R1 reach the Internet and share the route with R2 and Site B.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d76ad1ed-2c28-4b7c-8fbd-b36b4f4daec9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D.</strong>  ✅
Changing the interface to <strong><code>ip ospf network point-to-point</code></strong> removes the DR/BDR election and makes the adjacency form as FULL/- instead of FULL/DR.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Neighbor State</strong></td><td><strong>What it Means</strong></td><td><strong>When it Happens</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>FULL/DR</strong></td><td>Neighbor is fully adjacent, and the neighbor is the <strong>Designated Router (DR)</strong>.</td><td>On broadcast/multi-access networks (like Ethernet) when the neighbor wins DR election.</td></tr>
<tr>
<td><strong>FULL/BDR</strong></td><td>Neighbor is fully adjacent, and the neighbor is the <strong>Backup Designated Router (BDR)</strong>.</td><td>On broadcast/multi-access networks when the neighbor is elected as BDR.</td></tr>
<tr>
<td><strong>FULL/-</strong></td><td>Neighbor is fully adjacent, but there is <strong>no DR/BDR election</strong>.</td><td>On <strong>point-to-point</strong> links, point-to-multipoint links, or loopbacks.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6f9fb4ce-ffc6-4265-b5d8-3f18ed9762d5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C.</strong>  ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6a467164-8c77-4056-bf52-927fd3a35b60.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C.</strong>  ✅ [During adjacency formation, OSPF checks that both neighbors have the <strong>same MTU</strong>.]</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/15016652-dc3d-4295-9114-c9431034a515.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D F</strong>  ✅ </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/19fa1272-98d8-4ea6-9f56-20c0499fe62a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Network 192.168.12.64 0.0.0.63 equals to network 192.168.12.64/26. </p>
<p>192.168.12.64(Net ID) <strong>[192.168.12.65-192.168.12.126]</strong> 192.168.12.127(Broadcast Address) (Increment: 64)</p>
<p><strong>B</strong>  <strong>C D</strong>✅ </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ce3db73d-c4e2-4e59-a424-9a81ab09dddd.png" alt="CCNA 200-301 Study (1)" /></p>
<p>R2 has several possible sources for 10.1.1.0/24 (static, eBGP, OSPF, and EIGRP is misconfigured).</p>
<p>Cisco routers pick the route with the <strong>lowest administrative distance static route (0)</strong></p>
<p><strong>A✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1b49ec3e-72c8-4400-b4f4-77571566c19f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Internet:</strong> 10.10.10.16, 10.10.13.129, 10.10.100.128</p>
<p><strong>Router1:</strong> 10.10.13.1, 10.10.13.150</p>
<p><strong>Why:</strong> Router2 has OSPF routes only for <strong>10.10.13.0/25</strong> and <strong>10.10.13.144/28</strong> (to Router1). Addresses outside those (10.10.10.16, 10.10.13.129, 10.10.100.128) match no specific route, so they go via the <strong>default route to the Internet (0.0.0.0/0 → 10.10.10.13)</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11fb2ce2-0b24-4ff7-8d47-3759c4909f79.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c2592fd3-9bd1-491b-bb91-6e433dd3119a.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-d"><strong>D✅</strong></h3>
<p>🔑 Easy Trick:</p>
<ol>
<li><p><strong>Look at the lowest subnet</strong></p>
<p> → Here it’s <code>10.1.40.0/25</code>.</p>
</li>
<li><p><strong>Look at the highest subnet</strong></p>
<p> → Here it’s <code>10.1.41.224/29</code>.</p>
</li>
<li><p><strong>Find the smallest network that covers from lowest to highest</strong>:</p>
<ul>
<li>Lowest = 10.1.40.x</li>
<li><p>Highest = 10.1.41.x</p>
<p>  👉 Both fall under <code>10.1.40.0/23</code>.</p>
</li>
</ul>
</li>
<li><p><strong>Check the options</strong></p>
<ul>
<li>Only <code>/23</code> includes both 10.1.40.x <strong>and</strong> 10.1.41.x.</li>
</ul>
</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c1db7d1c-2228-471d-814b-ee67a305727b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A and D have <strong>MTU mismatches</strong> (1400 vs 1500) — risky for adjacency/DBD.</p>
<p><strong>Option B</strong>:</p>
<ul>
<li>The commands are presented in a scrambled/incorrect place (some <code>ip ospf priority</code>/<code>router-id</code> appear under the wrong context), so it’s not a clean, valid interface-level OSPF config even though it tries to make R14 the DR.</li>
</ul>
<p>C<strong>✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/93d62dc5-6c41-43f8-9284-cc0be592993c.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>A:</strong> MTU mismatch (R86 uses MTU 1400) — can break adjacency/DBD exchange.</li>
<li><strong>B:</strong> The commands are presented in a scrambled/incorrect place (some <code>ip ospf priority</code>/<code>router-id</code> appear under the wrong context), so it’s not a clean, valid interface-level OSPF config even though it tries to make R14 the DR.</li>
<li><strong>C:</strong> R14 is set to <strong>priority 0</strong> (cannot become DR), so it cannot be the central point.</li>
</ul>
<p><strong>D✅</strong> </p>
<h2 id="heading-single-area-ospf-configuration">Single Area OSPF Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f524d601-d978-4cf6-b6b5-77f2f1ef07a8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will configure an <strong>OSPF Single Area (Area 0) Configuration</strong> for an enterprise setup with a <strong>central data center</strong> and two <strong>branch offices</strong>.</p>
<h3 id="heading-key-components"><strong>Key Components:</strong></h3>
<ul>
<li><strong>IQ Sulaymaniyah Data Center</strong>: Hosts an <strong>ERP web server</strong>, a switch, and <strong>IQSUL-DC1-RT1</strong>, which connects to the <strong>Internet</strong> and branches via <strong>IQ-Core-RT1</strong>.</li>
<li><strong>IQ Core Router (IQ-Core-RT1)</strong>: The main hub, linking the data center to branches using <strong>/30 P2P connections</strong>.</li>
<li><strong>IQ Large Branch</strong>: Has <strong>two routers (LB-RT1 &amp; LB-RT2)</strong> for redundancy, with <strong>10.20.1.0/24</strong> and <strong>10.20.2.0/24</strong> subnets for end-user PCs.</li>
<li><strong>IQ Small Branch</strong>: Uses <strong>IQSUL-SB-RT1</strong> and the <strong>10.20.3.0/24</strong> subnet for local PCs.</li>
</ul>
<h1 id="heading-basic-ip-configuration">Basic IP Configuration</h1>
<h3 id="heading-end-point-devices-ip-configuration-vpc">End-Point Devices IP configuration  (VPC)</h3>
<pre><code class="lang-javascript">LB-PC1&gt; ip <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
LB-PC1&gt; save



LB-PC2&gt; ip <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
LB-PC2&gt; save



SB-PC1&gt; ip <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
SB-PC1&gt; save
</code></pre>
<h3 id="heading-iq-large-branch-routers-ip-configuration">IQ Large  Branch Routers IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-LB-RT1#
IQSUL-LB-RT1#conf t
IQSUL-LB-RT1(config)#int fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-LB-RT1(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span> 
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-LB-RT1(config)#exit
IQSUL-LB-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IQSUL-LB-RT2#
IQSUL-LB-RT2#conf t
IQSUL-LB-RT2(config)#int fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#exit


IQSUL-LB-RT2(config)#int fa1/<span class="hljs-number">0</span>
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#no shut 
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-LB-RT2(config)#exit
IQSUL-LB-RT2#wr
</code></pre>
<h3 id="heading-iq-large-branch-routers-ip-configuration-1">IQ Large  Branch Routers IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-SB-RT1#conf t
IQSUL-SB-RT1(config)#int fa0/<span class="hljs-number">0</span>
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#exit   
IQSUL-SB-RT1(config)#int fa1/<span class="hljs-number">0</span>
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-SB-RT1(config)#exit
IQSUL-SB-RT1#wr
</code></pre>
<h3 id="heading-iq-core-router-ip-configuration">IQ Core Router IP Configuration</h3>
<pre><code class="lang-javascript">IQ-Core-RT1#conf t 
IQ-Core-RT1(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

IQ-Core-RT1(config)#int fa <span class="hljs-number">3</span>/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

IQ-Core-RT1(config)#int fa1/<span class="hljs-number">0</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

IQ-Core-RT1(config)#int fa2/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut

IQ-Core-RT1(config)#exit
IQ-Core-RT1#wr
</code></pre>
<h3 id="heading-iq-data-center-router-ip-configuration">IQ Data Center Router IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-DC1-RT1#conf t 
IQSUL-DC1-RT1(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-RT1(config)#int fa <span class="hljs-number">2</span>/<span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-DC1-RT1(config)#int fa0/<span class="hljs-number">0</span> 
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.248</span> 
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-DC1-RT1(config)#exit
IQSUL-DC1-RT1#wr
</code></pre>
<pre><code class="lang-javascript">
Internet#conf t 
Internet(config)#int fa0/<span class="hljs-number">0</span>
Internet(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Internet(config-<span class="hljs-keyword">if</span>)#no shut
Internet(config-<span class="hljs-keyword">if</span>)#exit
Internet(config)#exi
</code></pre>
<h3 id="heading-iq-web-server-ip-configuration">IQ Web Server  IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-DC1-WEB1#conf t 
IQSUL-DC1-WEB1(config)#int fa0/<span class="hljs-number">0</span> 
IQSUL-DC1-WEB1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.248</span> 
IQSUL-DC1-WEB1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-WEB1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-DC1-WEB1(config)#exit
IQSUL-DC1-WEB1#wr
</code></pre>
<h1 id="heading-ospf-configuration">OSPF Configuration</h1>
<h3 id="heading-iq-large-branch-ospf-configuration">IQ Large  Branch OSPF Configuration</h3>
<pre><code class="lang-javascript">IQSUL-LB-RT1#conf t
IQSUL-LB-RT1(config)#
IQSUL-LB-RT1(config)#router ospf <span class="hljs-number">1</span>
IQSUL-LB-RT1(config-router)#router-id <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
IQSUL-LB-RT1(config-router)#network <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT1(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT1(config-router)#exit
IQSUL-LB-RT1(config)#exit
IQSUL-LB-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IQSUL-LB-RT2#conf t
IQSUL-LB-RT2(config)#
IQSUL-LB-RT2(config)#router ospf <span class="hljs-number">1</span> 
IQSUL-LB-RT2(config-router)#router-id <span class="hljs-number">2.2</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> 
IQSUL-LB-RT2(config-router)#network <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT2(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT2(config-router)#exit
IQSUL-LB-RT2(config)#exit
IQSUL-LB-RT2#exit 
IQSUL-LB-RT2#wr
</code></pre>
<h3 id="heading-iq-small-branch-routers-ospf-configuration">IQ Small Branch Routers OSPF Configuration</h3>
<pre><code class="lang-javascript">IQSUL-SB-RT1#conf t
IQSUL-SB-RT1(config)#
IQSUL-SB-RT1(config)#router ospf <span class="hljs-number">1</span>
IQSUL-SB-RT1(config-router)#router-id <span class="hljs-number">3.3</span><span class="hljs-number">.3</span><span class="hljs-number">.3</span>
IQSUL-SB-RT1(config-router)#network <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span> 
IQSUL-SB-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>  area <span class="hljs-number">0</span>
IQSUL-SB-RT1(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-SB-RT1(config-router)#exit
IQSUL-SB-RT1(config)#exit
IQSUL-SB-RT1#
IQSUL-SB-RT1#wr
</code></pre>
<h3 id="heading-iq-core-router-ospf-configuration">IQ Core Router OSPF Configuration</h3>
<pre><code class="lang-javascript">IQ-Core-RT1#
IQ-Core-RT1#conf t 
IQ-Core-RT1(config)#int fa0/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config)#int fa3/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQ-Core-RT1(config)#<span class="hljs-keyword">in</span> fa1/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQ-Core-RT1(config)#<span class="hljs-keyword">in</span> fa2/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQ-Core-RT1(config)#exit
IQ-Core-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IQ-Core-RT1#conf t
IQ-Core-RT1(config)#
IQ-Core-RT1(config)#router ospf <span class="hljs-number">1</span>
IQ-Core-RT1(config-router)#router-id <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.10</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#exit
IQ-Core-RT1(config)#EXIT
IQ-Core-RT1#clear ip ospf proces
</code></pre>
<h3 id="heading-iq-data-center-router-ospf-configuration">IQ Data Center Router OSPF Configuration</h3>
<pre><code class="lang-javascript">IQSUL-DC1-RT1#
IQSUL-DC1-RT1#conf t
IQSUL-DC1-RT1(config)#router ospf <span class="hljs-number">1</span>
IQSUL-DC1-RT1(config-router)#router-id <span class="hljs-number">6.6</span><span class="hljs-number">.6</span><span class="hljs-number">.6</span>
IQSUL-DC1-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span> 
IQSUL-DC1-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.7</span> area <span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-router)#exit
IQSUL-DC1-RT1(config)#exit
IQSUL-DC1-RT1#exit
</code></pre>
<p>debug ip icmp
debug ip packet detail</p>
<h2 id="heading-multi-area-ospf-configuration">Multi-Area OSPF Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/15f53146-6871-4509-ae3f-4799989d9d9e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will configure a <strong>multi-area OSPF</strong> network within a single autonomous system for a travel technology company.</p>
<ul>
<li><strong>Area 0 (Backbone):</strong> Connects all areas and external networks.</li>
<li><strong>Area 4 (Dev &amp; IT):</strong> Hosts development resources and IT infrastructure.</li>
<li><strong>Area 8 (Booking &amp; API Servers):</strong> Houses critical booking and payment servers.</li>
<li><strong>Area 26 (Customer Support):</strong> Manages customer support operations.</li>
</ul>
<h1 id="heading-basic-ip-configuration-1">Basic IP Configuration</h1>
<h3 id="heading-core-routers-ip-configuration">Core Routers IP Configuration</h3>
<pre><code class="lang-javascript">Core-RT1#conf t                       
Core-RT1(config)#int fa0/<span class="hljs-number">0</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

Core-RT1(config)#int fa1/<span class="hljs-number">0</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

Core-RT1(config)#int fa2/<span class="hljs-number">0</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut


Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
Core-RT1(config)#exit
Core-RT1#wr
</code></pre>
<pre><code class="lang-javascript">Core-RT2#conf t
Core-RT2(config)#int fa0/<span class="hljs-number">0</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#no shu

Core-RT2(config-<span class="hljs-keyword">if</span>)#exit
Core-RT2(config)#int fa1/<span class="hljs-number">0</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Core-RT2(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT2(config-<span class="hljs-keyword">if</span>)#exit

Core-RT2(config)#int fa2/<span class="hljs-number">0</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#ip add  <span class="hljs-number">10.10</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
Core-RT2(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT2(config-<span class="hljs-keyword">if</span>)#exit
Core-RT2(config)#exit
Core-RT2#wr
</code></pre>
<h3 id="heading-area-border-router-abr-ip-configuration">Area Border Router (ABR) IP Configuration</h3>
<pre><code class="lang-javascript">ABR1#conf t
ABR1(config)#int fa0/<span class="hljs-number">0</span> 
ABR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ABR1(config-<span class="hljs-keyword">if</span>)#no shut
ABR1(config-<span class="hljs-keyword">if</span>)#exit

ABR1(config)#int fa1/<span class="hljs-number">0</span>
ABR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ABR1(config-<span class="hljs-keyword">if</span>)#no shut
ABR1(config-<span class="hljs-keyword">if</span>)#exit
ABR1(config)#int fa2/<span class="hljs-number">0</span>
ABR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
ABR1(config-<span class="hljs-keyword">if</span>)#no shut
ABR1(config-<span class="hljs-keyword">if</span>)#exit
ABR1(config)#exit
ABR1#wr
</code></pre>
<pre><code class="lang-javascript">ARB2(config)#int fa1/<span class="hljs-number">0</span>
ARB2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
ARB2(config-<span class="hljs-keyword">if</span>)#no shut
ARB2(config-<span class="hljs-keyword">if</span>)#exit

ARB2(config)#int fa0/<span class="hljs-number">0</span>
ARB2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ARB2(config-<span class="hljs-keyword">if</span>)#no shut
ARB2(config-<span class="hljs-keyword">if</span>)#exit
ARB2(config)#exit
ARB2#wr
</code></pre>
<h3 id="heading-autonomous-system-border-router-asbr-ip-configuration">Autonomous System Border Router  (ASBR) IP Configuration</h3>
<pre><code class="lang-javascript">ASBR1(config)#int fa1/<span class="hljs-number">0</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#no shut 
ASBR1(config-<span class="hljs-keyword">if</span>)#exit
ASBR1(config)#int fa0/<span class="hljs-number">0</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#no shut
ASBR1(config-<span class="hljs-keyword">if</span>)#exit
ASBR1(config)#exit
ASBR1#wr
</code></pre>
<h3 id="heading-support-router-and-end-device-ip-configuration">Support Router and End-Device  IP Configuration</h3>
<pre><code class="lang-javascript">Support-RT1#conf t
Support-RT1(config)#int fa0/<span class="hljs-number">0</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Support-RT1(config-<span class="hljs-keyword">if</span>)#exit
Support-RT1(config)#int fa1/<span class="hljs-number">0</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Support-RT1(config-<span class="hljs-keyword">if</span>)#exit
Support-RT1(config)#exit
Support-RT1#q 
Support-RT1#wr
</code></pre>
<pre><code class="lang-javascript">Support-PC01&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
Support-PC01&gt; save
</code></pre>
<h3 id="heading-booking-router-and-end-device-ip-configuration">Booking Router and End-Device  IP Configuration</h3>
<pre><code class="lang-javascript">Booking-RT1#conf t
Booking-RT1(config)#int fa0/<span class="hljs-number">0</span>
Booking-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Booking-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Booking-RT1(config-<span class="hljs-keyword">if</span>)#exit
Booking-RT1(config)#int f1/<span class="hljs-number">0</span>
Booking-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>  
Booking-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Booking-RT1(config-<span class="hljs-keyword">if</span>)#exit
Booking-RT1(config)#exit
Booking-RT1#wr
</code></pre>
<pre><code class="lang-javascript">API-SRV&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
API-SRV&gt; save
</code></pre>
<pre><code class="lang-javascript">PAY-SRV&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.3</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
PAY-SRV&gt; save
</code></pre>
<h3 id="heading-devampit-router-and-end-device-ip-configuration">DEV&amp;IT Router and End-Device  IP Configuration</h3>
<pre><code class="lang-javascript">DEVOPS-RT1#conf t                      
DEVOPS-RT1(config)#int fa0/<span class="hljs-number">0</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#no shut
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#exit

DEVOPS-RT1(config)#int fa1/<span class="hljs-number">0</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#no shut
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#exit
DEVOPS-RT1(config)#exit
DEVOPS-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IT-PC01&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
IT-PC01&gt; save
</code></pre>
<h1 id="heading-ospf-configuration-1">OSPF Configuration</h1>
<h3 id="heading-area-border-router-abr-1-ospf-configuration">Area Border Router (ABR) 1 OSPF Configuration</h3>
<pre><code class="lang-javascript">ABR1(config)#router ospf <span class="hljs-number">10</span>
ABR1(config-router)#router-id <span class="hljs-number">12.12</span><span class="hljs-number">.12</span><span class="hljs-number">.12</span> 
ABR1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">4</span>
ABR1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">8</span>
ABR1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
ABR1(config-router)#exit
ABR1(config)#exit
ABR1#wr
</code></pre>
<h3 id="heading-devampit-router-ospf-configuration">DEV&amp;IT Router OSPF Configuration</h3>
<pre><code class="lang-javascript">DEVOPS-RT1#conf t
DEVOPS-RT1(config)#router ospf <span class="hljs-number">1</span>
DEVOPS-RT1(config-router)#router-id <span class="hljs-number">4.4</span><span class="hljs-number">.4</span><span class="hljs-number">.4</span>
DEVOPS-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">4</span>
DEVOPS-RT1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">4</span>
DEVOPS-RT1(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
DEVOPS-RT1(config-router)#exit
DEVOPS-RT1(config)#exit
DEVOPS-RT1#wr
</code></pre>
<h3 id="heading-booking-router-ospf-configuration">Booking Router OSPF Configuration</h3>
<pre><code class="lang-idris">Booking-RT1(config)#router ospf 8
Booking-RT1(config-router)#router-id 8.8.8.8
Booking-RT1(config-router)#network 10.1.6.1 0.0.0.0 area 8
Booking-RT1(config-router)#network 172.16.2.0 0.0.0.255 area 8
Booking-RT1(config-router)#passive-interface fa1/0
Booking-RT1(config-router)#exit
Booking-RT1(config)#exit
Booking-RT1#wr
</code></pre>
<h3 id="heading-area-border-router-abr-2-ospf-configuration">Area Border Router (ABR) 2 OSPF Configuration</h3>
<pre><code class="lang-javascript">ARB2(config)#router ospf <span class="hljs-number">11</span>
ARB2(config-router)#router-id <span class="hljs-number">12.12</span><span class="hljs-number">.12</span><span class="hljs-number">.12</span>
ARB2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
ARB2(config-router)# network <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">26</span> 
ARB2(config-router)#exit              
ARB2(config)#exit
ARB2#wr
</code></pre>
<h3 id="heading-support-router-ospf-configuration">Support Router OSPF Configuration</h3>
<pre><code class="lang-javascript">Support-RT1(config)#router ospf <span class="hljs-number">26</span>
Support-RT1(config-router)#router-id <span class="hljs-number">9.9</span><span class="hljs-number">.9</span><span class="hljs-number">.9</span> 
Support-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">26</span>
Support-RT1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>  <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">26</span>
Support-RT1(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
Support-RT1(config-router)#exit
Support-RT1(config)#exit
Support-RT1#
</code></pre>
<h3 id="heading-core-routers-ospf-configuration">Core Routers OSPF Configuration</h3>
<pre><code class="lang-javascript">Core-RT1(config)#router ospf <span class="hljs-number">5</span>
Core-RT1(config-router)#router-id <span class="hljs-number">3.3</span><span class="hljs-number">.3</span><span class="hljs-number">.3</span>
Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>   
Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span> 
Core-RT1(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span> 
Core-RT1(config-router)#exit
Core-RT1(config)#exit
</code></pre>
<pre><code class="lang-javascript">
Core-RT2#conf t
Core-RT2(config)#router ospf <span class="hljs-number">6</span>
Core-RT2(config-router)#router-id <span class="hljs-number">2.2</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span>
Core-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
Core-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
Core-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
Core-RT2(config-router)#exit
Core-RT2(config)#exit
Core-RT2#
</code></pre>
<h2 id="heading-verify-ospf-configuration">Verify OSPF Configuration</h2>
<pre><code class="lang-javascript">R#show ip ospf neighbor
R# show ip ospf neighbor detail
</code></pre>
<pre><code class="lang-javascript">R#show ip ospf interface brief
</code></pre>
<pre><code class="lang-javascript">R# debug ip ospf adj
</code></pre>
<pre><code class="lang-javascript">R# debug ip ospf ?
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>adj</td><td>OSPF adjacency events</td></tr>
</thead>
<tbody>
<tr>
<td>capability</td><td>OSPF Capability</td></tr>
<tr>
<td>database-timer</td><td>OSPF database timer</td></tr>
<tr>
<td>events</td><td>OSPF events</td></tr>
<tr>
<td>flood</td><td>OSPF flooding</td></tr>
<tr>
<td>hello</td><td>OSPF hello events</td></tr>
<tr>
<td>lsa-generation</td><td>OSPF lsa generation</td></tr>
<tr>
<td>monitor</td><td>OSPF spf monitoring</td></tr>
<tr>
<td>tree</td><td>OSPF database tree</td></tr>
<tr>
<td>packet</td><td>OSPF packets</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fcd48a4c-5ec8-47da-ae9f-b736ba087fbe.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-lab">LAB</h2>
<h2 id="heading-ospf-configuration-single-area">OSPF configuration Single Area</h2>
<pre><code class="lang-javascript">R1(confgi)# router ospf <span class="hljs-number">1</span>[process id] 
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span> [backbone area]
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span>



R2(confgi)# router ospf <span class="hljs-number">1</span>[process id] 
R2(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span> [backbone area]
R2(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/74cc8073-41d7-4f87-b7fa-ebc0e10d7e93.png" alt="CCNA 200-301 Study (1)" /></p>
<p>.</p>
<pre><code class="lang-javascript">R1(confgi)# show ip ospf interface
</code></pre>
<p>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/52fe2cc9-e0eb-4d8d-a31f-4edc75392cd1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, The router connected into two interfaces[<strong>192.168.0.10-192.168.1.10</strong>] <strong>highest</strong> IP address elected as a router ID <strong>192.168.1.10</strong> is the router ID. </p>
<p>Also selected as a <strong>DR</strong> and the another router selected as a <strong>BDR</strong></p>
<pre><code class="lang-javascript">Router#show ip ospf neighbor
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/429bc0e2-f335-4dd2-ad34-2d9106069976.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-implementing-single-area-cost">Implementing Single Area cost</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/921e5b21-c48c-4ce4-8a34-5c64be74b75b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To know which path used by the OSPF to send data to other computer we use the command below on the on PC0 </p>
<p>.</p>
<pre><code class="lang-javascript">tracert [ip]
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e6d839b7-1636-4fc3-a83a-346d087b557e.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-we-using-exit-ports-to-count-cost">We using exit ports to count cost</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfdbcf68-9deb-4ca8-925b-8a48d585e416.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: as you can see the cost of Fast Ethernet =1  and the summation of all existing interfaces = 4
but cost of Ethernet = 10 + 3 Fast Ethernet = 13 not acceptable by  OSPF. </p>
<h2 id="heading-dr-and-bdr-election-1">DR and BDR Election</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c0946879-c1b2-43d7-beca-6ad81aee189c.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 In this example, Router ID is not configured and the IP Address of the router is defined as a Router ID </p>
</blockquote>
<ul>
<li>Using this command below you could track every step of the process of the election</li>
</ul>
<pre><code class="lang-javascript">Router#debug ip ospf adj
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ce5788f6-52b0-4e4e-92fe-6bca67348e1b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The highest IP address was elected as DR and the second Highest IP address was elected as BDR.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/27dbbecd-ca90-479d-b7ae-2b745e1c6dce.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ebb04a33-6a49-41eb-a82e-234f6c551965.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When Router is configured OSPF protocol elects the highest ID as a DR and the second Highest as a BDR.</p>
<h2 id="heading-multi-area-ospf-configuration-1">Multi-Area OSPF Configuration</h2>
<p>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d26c882e-b39d-4f28-8c4e-64712ac8a2b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>At first, adding both two areas to the R1 and setting a higher router Id to become Designated Router (RD) </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a4e09b09-f083-4688-9369-f05d885ae4c5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After OSPF configuration was added to the topology, a static route was applied between these two routers:</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c7424f3a-7304-4f02-b47c-fa77645a0a5a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Now after adding the default route pc can't reach 8.8.8.8 defined as an internet </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/66ab6669-0e2f-4f0d-82b7-e0ddc77bb179.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The reason for the unreachable is that the no default route add to the OSPF routing table</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3363776-e6c4-4fa1-bc14-cbd5d52b8115.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config)#router ospf <span class="hljs-number">1</span>
Router(config-router)#<span class="hljs-keyword">default</span>-information originate
</code></pre>
<p>use the command to automatically share the <strong>default route</strong> with other OSPF routers </p>
<p>Note: in packet tracer, only <strong>default-information originate</strong>  working but at EVE you can use extra commands </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4397fa4d-a824-4dbf-a0b6-a91051024a40.png" alt="CCNA 200-301 Study (1)" /></p>
<p>it is better to use <strong>always</strong> with this command, which always means if the connection drops the default route continuously routing the default route. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/365199ff-de26-47ee-9383-70ee77cc0c34.png" alt="CCNA 200-301 Study (1)" /></p>
<p>then open one of the OSPF routers you and enter show ip route </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4c598c1d-0c60-4f61-983f-b00a091ad6c7.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, Default Route was added to the routing table through OSPF as an external network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/186fea74-999e-43ee-a4b9-b88597ba7215.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dynamic-addressing-with-dhcp">Dynamic Addressing with DHCP</h2>
<h1 id="heading-dynamic-addressing-with-dhcp-1">Dynamic Addressing with DHCP</h1>
<p><strong>DHCP(Dynamic Host Configuration Protocol)</strong> is a network protocol that is used to assign unique IP address to a network devices. </p>
<p>DHCP is a <strong>client-server protocol</strong>. <strong>A Client DHCP</strong> is a device that configured to use DHCP Services From DHCP Server. <strong>A DHCP Server</strong> maintains a pool of available IP addresses and assign them to hosts. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/236e01d4-0351-4694-85f7-6020d6355b38.png" alt="CCNA 200-301 Study (1)" /></p>
<p>DHCP is generally the preferred method of assigning IPv4  addresses to hosts on large networks because it <strong>reduces the burden on network support staff and virtually eliminates entry errors</strong>.</p>
<p>Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of time. <strong>If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is especially useful with mobile users that can come and go on a network</strong>. </p>
<p><strong>Lease time in DHCP</strong> refers to the amount of time that a DHCP server assigns an IP address to a client device. During this time, the client can use the assigned IP address without needing to request a new one. Once the lease expires, the client must either renew the lease or request a new IP address from the server.</p>
<blockquote>
<p>💡 The wireless Router is both <strong>DHCP Server-Client</strong>, acts as a client to receive its IPv4  configuration from the ISP, and then acts as a DHCP server for internal hosts on the local  network.</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd9c2503-2fde-4662-98bb-a4d97ece70fe.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>A DHCP Client sends a (<strong>DHCP Discover</strong>) to discover DHCP servers on the LAN network. DHCP Discover is a broadcast packet with a <strong>Destination IPV4 address</strong> of <strong>255.255.255.255</strong> and a <strong>Destination MAC address</strong> of  <strong>FF:FF:FF:FF:FF:FF</strong>.</li>
<li>A DHCP Server receives the <strong>DHCP Discover</strong> packet and responds with <strong>DHCP offer</strong> packets, offering IP addressing information.</li>
<li>If the client receives the DHCP offer packets from multiple DHCP servers, the first DHCP offer is accepted.  the client responds by broadcasting a <strong>DHCP Request packet</strong>.</li>
<li>The DHCP server approves the lease with a <strong>DHCP acknowledgment</strong> packet, which includes lease duration and other configuration information.</li>
</ol>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Discover</td><td>Client→ Server</td><td><strong>Broadcast</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Offer</td><td>Server → Client</td><td><strong>Broadcast or Unicast</strong></td></tr>
<tr>
<td>Request</td><td>Client → Server</td><td><strong>Broadcast</strong></td></tr>
<tr>
<td>ACK</td><td>Server → Client</td><td><strong>Broadcast or Unicast</strong></td></tr>
</tbody>
</table>
</div><p>Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?</p>
<ul>
<li><strong>Broadcast DHCPREQUEST</strong></li>
</ul>
<p><strong>Which three statements describe a DHCP Discover message? (Choose three.)</strong></p>
<ul>
<li>The destination IP address is <strong>255.255.255.255</strong>.</li>
<li>The message comes from a client <strong>seeking an IP address</strong>.</li>
<li>All hosts receive the message, <strong>but only a DHCP server replies</strong>.</li>
</ul>
<h2 id="heading-dhcp-relay-agent">DHCP Relay agent</h2>
<p>When a device is configured as a Dynamic Host Configuration Protocol (DHCP) client, it sends a broadcast packet to discover DHCP servers on the network. Routers don't forward broadcast packets by default. I<strong>f the DHCP server is on a different network from the DHCP clients, it won't receive the DHCP discover packets from the clients.</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c64d28b4-7d0f-4a5d-9dfc-03d750523013.webp" alt="CCNA 200-301 Study (1)" /></p>
<p>R2 can be configured as a DHCP Server, but R1 doesn't forward the DHCP Discover to the DHCP Server.  We can configure R1 as a DHCP Relay Agent to forward DHCP Client packets to the DHCP Server. <strong>IP helper-address (IP of DHCP Server).</strong> Apply this command on the R1 Router interface connected to the DHCP Client </p>
<pre><code class="lang-java">
R1(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">172.16</span>.<span class="hljs-number">0.2</span>
</code></pre>
<blockquote>
<p>💡 If your DHCP server is on another network, configure the <strong>interface closest to clients</strong></p>
</blockquote>
<p><strong>To verify a DHCP relay agent</strong></p>
<pre><code class="lang-javascript">show ip helper-address
</code></pre>
<h3 id="heading-dhcp-server-configuration-commands">DHCP Server Configuration  Commands</h3>
<pre><code class="lang-javascript">
# Step <span class="hljs-number">1</span>: Exclude addresses (gateway + reserved IPs)
Router(config)# ip dhcp excluded-address <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>

# Step <span class="hljs-number">2</span>: Create a DHCP pool
Router(config)# ip dhcp pool LAN-POOL

# Step <span class="hljs-number">3</span>: Define network and mask
Router(dhcp-config)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>

# Step <span class="hljs-number">4</span>: Define <span class="hljs-keyword">default</span> gateway
Router(dhcp-config)# <span class="hljs-keyword">default</span>-router <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>

# Step <span class="hljs-number">5</span>: Define DNS server
Router(dhcp-config)# dns-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>

# Step <span class="hljs-number">6</span> (optional): Domain name
Router(dhcp-config)# domain-name ccna.local

# Step <span class="hljs-number">7</span> (optional): Lease time (days hours minutes)
Router(dhcp-config)# lease <span class="hljs-number">0</span> <span class="hljs-number">12</span> <span class="hljs-number">0</span>
Router(dhcp-config)# exit
Router(config)# end
</code></pre>
<pre><code class="lang-javascript">Router# show ip dhcp binding       # See which clients got IPs
Router# show ip dhcp pool          # Check pool statistics
Router# debug ip dhcp server events  # Debug DHCP process
</code></pre>
<h2 id="heading-dhcp-lab">DHCP Lab</h2>
<h1 id="heading-dhcp-server-and-relay-agent-configuration">DHCP Server and Relay Agent Configuration</h1>
<p>In this scenario, we will configure a DHCP server for a company with three departments, each of which has its own subnet and connects to a departmental router.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/16620a98-e311-4d2f-b5d4-95d86798a5a8.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-ip-configuration"><strong>IP configuration</strong></h3>
<p><strong>Core router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Core-R01
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been set up as core router$  
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.6 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 2/0 
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.10 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 3/0
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.14 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.2 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<p><strong>Marketing router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Marketing-R01
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been setup <span class="hljs-keyword">for</span> the marketing department$  
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 10.0.0.1 255.0.0.0
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.1 255.255.255.252
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<p><strong>Sales  router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Sales-R01
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been set up <span class="hljs-keyword">for</span> the sales department$  
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.5 255.255.255.252
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 20.0.0.1 255.0.0.0 
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<p><strong>Finance router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Finance-R01
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been set up <span class="hljs-keyword">for</span> the finance department$  
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.9 255.255.255.252
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 20.0.0.1 255.0.0.0 
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<h3 id="heading-configuring-rip-routing">Configuring RIP routing</h3>
<p><strong>Core router</strong> </p>
<pre><code class="lang-java">Core-R01#conf t
Core-R01(config)#router rip 
Core-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.0</span>
Core-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">4.0</span>
Core-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">8.0</span>
Core-R01(config-router)#no auto-summary
Core-R01(config-router)#exit
Core-R01#wr
</code></pre>
<p><strong>Marketing router</strong> </p>
<pre><code class="lang-java">Marketing-R01(config)#router rip
Marketing-R01(config-router)#network <span class="hljs-number">10.0</span>.<span class="hljs-number">0.0</span>
Marketing-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.0</span>
Marketing-R01(config-router)#no auto-summary
</code></pre>
<p><strong>Sales  router</strong> </p>
<pre><code class="lang-java">Sales-R01#conf t
Sales-R01(config)#router rip 
Sales-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.4</span>
Sales-R01(config-router)#network <span class="hljs-number">20.0</span>.<span class="hljs-number">0.0</span>
Sales-R01(config-router)#no auto-summary 
Sales-R01(config)#exit
Sales-R01#wr
</code></pre>
<p><strong>Finance router</strong> </p>
<pre><code class="lang-java">Finance-R01#conf t
Finance-R01(config)#router rip
Finance-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.8</span>
Finance-R01(config-router)#network <span class="hljs-number">30.0</span>.<span class="hljs-number">0.0</span>  
Finance-R01(config-router)#no auto-summary
Finance-R01(config)#exit
Finance-R01#wr
</code></pre>
<h3 id="heading-assigning-a-static-ip-to-the-dhcp-server">Assigning a static IP to the DHCP server</h3>
<p>Before we configure the DHCP service on the server, we have to assign a static IP address to the server.</p>
<pre><code class="lang-java">Router&gt;ena
Router#<span class="hljs-function">conf t
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname DHCP-Server 
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.13 255.255.255.252
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown 
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config)</span>#exit
DHCP-Server#wr</span>
</code></pre>
<h3 id="heading-enabling-and-configuring-dhcp-service-on-the-server">Enabling and Configuring DHCP Service on the Server</h3>
<p>Create DHCP Pools for Subnets and assign one pool to each subnet. </p>
<pre><code class="lang-java">

DHCP-Server#conf t
DHCP-Server(config)#ip dhcp pool marketing-pool
DHCP-Server(dhcp-config)#network <span class="hljs-number">10.0</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.0</span>.<span class="hljs-number">0.0</span>
DHCP-Server(dhcp-config)#dns-server <span class="hljs-number">8.8</span>.<span class="hljs-number">8.8</span>
DHCP-Server(dhcp-config)#domain-name rebar.it
DHCP-Server(dhcp-config)#<span class="hljs-keyword">default</span>-router <span class="hljs-number">10.0</span>.<span class="hljs-number">0.1</span>


DHCP-Server(config)# ip dhcp pool sales-pool
DHCP-Server(dhcp-config)#network <span class="hljs-number">20.0</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.0</span>.<span class="hljs-number">0.0</span> 
DHCP-Server(dhcp-config)#dns-server <span class="hljs-number">8.8</span>.<span class="hljs-number">8.8</span>
DHCP-Server(dhcp-config)#domain-name rebar.it
DHCP-Server(dhcp-config)#<span class="hljs-keyword">default</span>-router <span class="hljs-number">20.0</span>.<span class="hljs-number">0.1</span>


DHCP-Server(config)#ip dhcp pool finance-pool
DHCP-Server(dhcp-config)#network <span class="hljs-number">30.0</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.0</span>.<span class="hljs-number">0.0</span> 
DHCP-Server(dhcp-config)#dns-server <span class="hljs-number">8.8</span>.<span class="hljs-number">8.8</span>
DHCP-Server(dhcp-config)#domain-name rebar.it
DHCP-Server(dhcp-config)#<span class="hljs-keyword">default</span>-router <span class="hljs-number">30.0</span>.<span class="hljs-number">0.1</span>
</code></pre>
<ul>
<li>Each DHCP pool is usually associated with a specific subnet.</li>
<li>When a client sends a DHCP request, the router or DHCP server checks the <strong>source IP subnet</strong> (if relay is used) or the <strong>incoming interface</strong> to determine which pool to use.</li>
<li>The DHCP pool that matches the <strong>subnet of the incoming request</strong> is used.</li>
</ul>
<h3 id="heading-configure-routers-to-act-as-dhcp-relay-agents"><strong>Configure routers to act as DHCP relay agents.</strong></h3>
<p>Configure the DHCP relay agent on the router interface directly connected to the local subnet.</p>
<p><strong>Marketing Router</strong> </p>
<pre><code class="lang-java">Marketing-R01#conf t
Marketing-R01(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
Marketing-R01(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">192.168</span>.<span class="hljs-number">1.13</span>
Marketing-R01(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<p><strong>Sales Router</strong> </p>
<pre><code class="lang-java">Sales-R01#conf t
Sales-R01(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Sales-R01(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">192.168</span>.<span class="hljs-number">1.13</span>
Sales-R01(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<p><strong>Finance Router</strong> </p>
<pre><code class="lang-java">Finance-R01#conf t
Finance-R01(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Finance-R01(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">192.168</span>.<span class="hljs-number">1.13</span>
Finance-R01(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<blockquote>
<p>💡 Put the helper on the router interface that <em>is</em> the client’s default gateway (the access/branch router facing each department).</p>
</blockquote>
<h2 id="heading-verifying-dhcp-relay">Verifying DHCP relay</h2>
<p>To verify that the DHCP Service is working and each Client Received an IP address from the DHCP Pool, go to the  client device and write in the terminal the command below:</p>
<pre><code class="lang-javascript">C:\Users\AB&gt;ipconfig /all
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3d5f9eaa-f7f4-40d8-beab-373e3c2da969.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, devices from different departments or subnets have successfully obtained IP addresses from the DHCP Server.</p>
<h3 id="heading-dhcp-server-verification">DHCP Server Verification</h3>
<p>To verify which IP addresses have been assigned to devices, use the following command:</p>
<pre><code class="lang-javascript">DHCP-Server#show ip dhcp  binding
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cacabb53-4c9d-4a4f-9e17-9ab391c58ef6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To get more information about DHCP Server, use the following command: </p>
<pre><code class="lang-javascript">DHCP-Server#show ip dhcp  server  statistics
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c60e1bb-2e6a-401b-b824-acc2d1fd189c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To check the DHCP Server to find out and detect any IP address conflict, use the following command:</p>
<pre><code class="lang-javascript">DHCP-Server#show ip dhcp conflict
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd867f6d-2c1c-4664-8da8-1158d3a25064.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we encountered two issues with these subnets because we're using these IP addresses statically and configured them as default gateways for each subnet. </p>
<p>To resolve this issue, use the following command to exclude these IP addresses from the DHCP Server Pool range: </p>
<pre><code class="lang-javascript">DHCP-Server(config)# ip dhcp excluded-address (Ip <span class="hljs-keyword">of</span> range <span class="hljs-keyword">of</span> Ip)
DHCP-Server(config)# ip dhcp excluded-address  <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.10</span>
DHCP-Server(config)##ip dhcp excluded-address  <span class="hljs-number">203.0</span><span class="hljs-number">.113</span><span class="hljs-number">.1</span>
</code></pre>
<blockquote>
<p>💡 I suggest leaving at least the first of 10 IPs of each subnet for devices that require a static IP, such as printers or servers, .etc. </p>
</blockquote>
<p>For our lab use the following command:</p>
<pre><code class="lang-javascript">DHCP-Server(config)# ip dhcp excluded-address <span class="hljs-number">20.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
DHCP-Server(config)# ip dhcp excluded-address <span class="hljs-number">30.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
</code></pre>
<p>After choking the server again, no conflict is displayed.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ae6eda96-e25c-4349-8f5e-5d9d3b1e77f6.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dchp-questions">DCHP Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2ba2e10f-8abf-4a74-9503-7d5db849ef08.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D.</strong> <strong><code>show ip interface</code></strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b090bd78-6f51-403c-b009-b3e947f988fb.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A.</strong> ✅</p>
<p>When a <strong>Cisco IOS DHCP server</strong> detects an IP conflict (either through <strong>ping</strong> before assigning or from a client reporting it via <strong>Gratuitous ARP</strong>), the server will:</p>
<ul>
<li><strong>Mark that IP as “conflicted.”</strong></li>
<li><strong>Remove it from the available address pool</strong> so it will not be handed out to other clients.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/514234ad-bc39-43ef-972d-453c6ffa52d6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A <strong>spurious DHCP server</strong> is <strong>an unauthorized DHCP server operating on a network,</strong> <em><strong>potentially</strong></em> <strong>a malicious attacker trying to intercept traffic, or an accidental configuration by a user adding a rogue router</strong>.</p>
<p>When a DHCP client starts up, it sends a <strong>DHCPDISCOVER</strong> broadcast to look for servers.</p>
<ul>
<li><strong>Legitimate and spurious (unauthorized/rogue) DHCP servers</strong> on the network will both reply with a <strong>DHCPOFFER</strong> message.</li>
<li>By analyzing these <strong>DHCPOFFER</strong> messages (for example, checking the source IP/MAC address of the server), you can detect <strong>rogue DHCP servers</strong>.</li>
<li>Network admins often use tools like <strong>DHCP snooping</strong> on Cisco switches to prevent unauthorized offers from being accepted.</li>
</ul>
<p><strong>D</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e17d4708-819b-4d2e-b472-9a89993df541.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C D</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/81181e77-c6f4-4db8-8ca2-667d42a5e620.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Subnet Mask:</strong> 255.255.255.248 → valid (range: <code>10.2.2.1 – 10.2.2.6</code> usable, with .0 as network, .7 as broadcast).</li>
<li><strong>Default Gateway:</strong> <code>10.2.2.10</code> → ❌ incorrect, because <strong>10.2.2.10 is outside the valid subnet (10.2.2.0/29)</strong>. The gateway must be in the same subnet as the host.</li>
<li><strong>DNS Servers:</strong> 8.8.8.8 → valid (Google DNS).</li>
<li><strong>DHCP Server:</strong> 0.0.0.0 → irrelevant here since the host already has an IP manually set.</li>
</ul>
<p><strong>C</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/14ac0a48-db92-4220-849e-5573bef65c9d.png" alt="CCNA 200-301 Study (1)" /></p>
<p>If the port connected to the workstation is blocked, it will not forward traffic, including DHCP requests, preventing the workstation from obtaining an IP address.</p>
<p><strong>A</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b4a6313f-b1e0-4804-ac86-d9c5ecf543a5.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>B</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4f670dc6-5438-46c4-b0f5-12b720c74145.png" alt="CCNA 200-301 Study (1)" /></p>
<p>the router interface is shown as <strong>10.2.2.1/27</strong> (mask <strong>255.255.255.224</strong>) while the PC is configured with <strong>255.255.255.192</strong> (/26). The PC and router must be in the same IP subnet mask space so the PC sends traffic for the default gateway and off-net destinations correctly. </p>
<p> <strong>A</strong>✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b2c4d82a-3e3c-4b06-b196-e1c2ef95506c.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>B D</strong>✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d8dc500e-507c-49b7-9d10-26599bd4b5b7.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>R1</strong> needs to request an IP address via DHCP (so <code>ip address dhcp</code> is required).</li>
<li><p><strong>R2</strong> must forward those DHCP broadcasts from R1 to the DHCP server on another network (so <code>ip helper-address</code> is required).</p>
<p><strong>B C</strong>✅</p>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/98d358ee-aae2-47bb-b8a0-080199b60975.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a938cf59-f440-43c5-b9dc-742f18f757a5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/285dd4bf-51bd-4abf-b4ba-e5bc6f31977c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0677eeef-35cc-4471-80af-86a5fd0ea5b8.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Preferred</strong> means the IP address is currently valid, usable, and active.
Because the host is using DHCP and the “Preferred” state means it is currently bound to the IP address and will <strong>request the same address again</strong> during lease renewal.</p>
<p><strong>B  ✅</strong></p>
<p>Just for information (Not CCNA Topic)</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>State</strong></td><td><strong>Meaning</strong></td><td><strong>Can the host use it?</strong></td><td><strong>When it happens</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Tentative</strong></td><td>Address is being tested for duplicates (DAD in progress).</td><td>❌ No (not yet usable).</td><td>Right after assignment (DHCP, static, or autoconfig).</td></tr>
<tr>
<td><strong>Preferred</strong></td><td>Address is valid and active.</td><td>✅ Yes (full communication).</td><td>After DAD succeeds and lease is valid.</td></tr>
<tr>
<td><strong>Deprecated</strong></td><td>Address should not be used for new sessions, but existing ones can continue.</td><td>⚠️ Limited (only existing connections).</td><td>Lease expired or admin marked it deprecated.</td></tr>
</tbody>
</table>
</div><h2 id="heading-dns">DNS</h2>
<h1 id="heading-domain-name-system-dns">Domain Name System DNS</h1>
<p>DNS is a <strong>distributed hierarchical system (Root → TLD → Authoritative).</strong> used to resolve domain names into IP addresses. Instead of remembering complex IP addresses, users can type a domain name, and the DNS will find the corresponding IP address.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a536584d-0251-44e5-9211-5960091f4b99.gif" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-dns-resolution-flow-resolver-name-servers">🌐 DNS Resolution Flow (Resolver → Name Servers)</h1>
<h3 id="heading-example-you-type-wwwciscocom-in-your-browser">Example: You type <code>www.cisco.com</code> in your browser.</h3>
<hr />
<h2 id="heading-1-resolver-client-side">1️⃣ Resolver (Client Side)</h2>
<ul>
<li>Your <strong>resolver</strong> (inside PC/router/OS) checks:<ul>
<li>Local <strong>cache</strong> (has this domain been resolved recently?).</li>
<li>Local <strong>hosts file</strong> (<code>/etc/hosts</code> or <code>C:\Windows\System32\drivers\etc\hosts</code>).</li>
</ul>
</li>
<li>If not found, → sends a query to the configured <strong>DNS server</strong> (like 8.8.8.8).</li>
</ul>
<hr />
<h2 id="heading-2-recursive-name-server-eg-8888">2️⃣ Recursive Name Server (e.g., 8.8.8.8)</h2>
<ul>
<li>Acts as your <strong>helper</strong>.</li>
<li>If it doesn’t already know the answer, it goes step by step:<ul>
<li>Root → TLD → Authoritative server.</li>
</ul>
</li>
</ul>
<hr />
<h2 id="heading-3-root-name-server">3️⃣ Root Name Server</h2>
<ul>
<li>Knows where to find <strong>Top-Level Domains (TLDs)</strong> like <code>.com</code>, <code>.net</code>, <code>.org</code>.</li>
<li>Returns: <em>“Go ask a</em> <em><code>.com</code></em> <em>name server.”</em></li>
</ul>
<hr />
<h2 id="heading-4-tld-name-server-com-server">4️⃣ TLD Name Server (.com server)</h2>
<ul>
<li>Knows which <strong>authoritative server</strong> holds info for <code>cisco.com</code>.</li>
<li>Returns: <em>“Go ask the authoritative server for</em> <em><code>cisco.com</code>__.”</em></li>
</ul>
<hr />
<h2 id="heading-5-authoritative-name-server-for-ciscocom">5️⃣ Authoritative Name Server (for <code>cisco.com</code>)</h2>
<ul>
<li>Has the real <strong>A record</strong> for <code>www.cisco.com</code>.</li>
<li>Example: <code>72.163.4.185</code>.</li>
<li>Sends back the IP to the <strong>recursive DNS server</strong>.</li>
</ul>
<hr />
<h2 id="heading-6-back-to-the-resolver">6️⃣ Back to the Resolver</h2>
<ul>
<li>A recursive DNS server answers (IP) back to your <strong>resolver</strong>.</li>
<li>Resolver gives it to the <strong>browser</strong>, and the connection starts.</li>
</ul>
<hr />
<p>✅ Now your PC knows that <code>www.cisco.com = 72.163.4.185</code>.</p>
<p>✅ Next time, it will use the <strong>cached entry</strong> (faster).</p>
<pre><code class="lang-javascript">[PC Resolver] ---&gt; [Recursive DNS Server (<span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>)]
                       |
                       v
                 [Root Name Server]
                       |
                       v
                 [TLD Server (.com)]
                       |
                       v
         [Authoritative Server <span class="hljs-keyword">for</span> cisco.com]
                       |
                       v
[Recursive DNS] ---&gt; [PC Resolver] ---&gt; [Browser gets IP]
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b51a3eac-6fa1-4ea9-b052-6c5a81e17c5c.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dns-record-types"><strong>DNS Record Types</strong></h2>
<p>DNS uses different <strong>record types</strong> to store various information about domains.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Record Type</td><td>Description</td><td>Example</td></tr>
</thead>
<tbody>
<tr>
<td><strong>A</strong></td><td>Maps a domain to an IPv4 address</td><td><code>google.com → 142.250.190.78</code></td></tr>
<tr>
<td><strong>AAAA</strong></td><td>Maps a domain to an IPv6 address</td><td><code>google.com → 2607:f8b0:4005:805::200e</code></td></tr>
<tr>
<td><strong>CNAME</strong></td><td>Alias for another domain</td><td><code>mail.example.com → gmail.com</code></td></tr>
<tr>
<td><strong>MX</strong></td><td>Mail exchange record for emails</td><td><code>example.com → mail server IP</code></td></tr>
<tr>
<td><strong>NS</strong></td><td>Specifies name servers for a domain</td><td><code>example.com → ns1.example.com</code></td></tr>
<tr>
<td><strong>TXT</strong></td><td>Stores text information (SPF, DKIM)</td><td>Used for authentication &amp; security</td></tr>
<tr>
<td>PTR</td><td>reverse lookup (IP → name).</td><td>10.2.0.192.in-addr.arpa → <a target="_blank" href="http://www.example.com/">www.example.com</a></td></tr>
<tr>
<td>SOA</td><td>authoritative information about a DNS zone.</td><td><a target="_blank" href="http://example.com/">example.com</a>.   IN  SOA  <a target="_blank" href="http://ns1.example.com/">ns1.example.com</a>. <a target="_blank" href="http://admin.example.com/">admin.example.com</a>. (</td></tr>
</tbody>
</table>
</div><p>2025091401 ; Serial
7200       ; Refresh (2 hours)
3600       ; Retry (1 hour)
1209600    ; Expire (14 days)
86400 )    ; Minimum TTL (1 day) |</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td><strong>Recursive Query</strong></td><td><strong>Iterative Query</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Who asks?</strong></td><td>DNS client (resolver) → DNS server</td><td>DNS server → other DNS servers</td></tr>
<tr>
<td><strong>Workload</strong></td><td>DNS server does <em>all the work</em> and returns the final answer</td><td>Each DNS server gives the <em>best possible answer</em> it knows</td></tr>
<tr>
<td><strong>Answer Type</strong></td><td>Always returns the <strong>final resolved IP</strong> (or an error)</td><td>Returns either the IP or a <strong>referral</strong> to another DNS server</td></tr>
<tr>
<td><strong>Example Flow</strong></td><td>PC → Recursive DNS → (Root, TLD, Authoritative) → IP</td><td>Recursive DNS asks Root → gets referral → asks TLD → gets referral → asks Authoritative → gets IP</td></tr>
<tr>
<td><strong>Traffic</strong></td><td>More workload on DNS server, less on client</td><td>More queries across multiple DNS servers</td></tr>
<tr>
<td><strong>Default in Clients</strong></td><td>Used by PCs, routers, end devices</td><td>Used between DNS servers (resolver ↔ root ↔ TLD ↔ authoritative)</td></tr>
</tbody>
</table>
</div><h2 id="heading-dns-configuration-cisco-ios">DNS Configuration Cisco  IOS</h2>
<p><strong>Enable DNS Lookup</strong></p>
<pre><code class="lang-javascript">Router(config)# ip domain-lookup
</code></pre>
<p><strong>Set a Domain Name</strong></p>
<pre><code class="lang-javascript">Router(config)# ip domain-name rebar.lab
</code></pre>
<ul>
<li>Defines the local domain name for the device.</li>
<li>Required for features like SSH key generation.</li>
</ul>
<p><strong>Configure DNS Servers</strong></p>
<pre><code class="lang-javascript">Router(config)# ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
Router(config)# ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.4</span><span class="hljs-number">.4</span>
</code></pre>
<p><strong>Static Host Mapping</strong></p>
<pre><code class="lang-javascript">Router(config)# ip host R2 <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
Router(config)# ip host WebSrv <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span>
</code></pre>
<p>Creates manual hostname → IP mappings (local DNS table).</p>
<p><strong>Verify DNS Resolution</strong></p>
<pre><code class="lang-javascript">Router# ping www.cisco.com
Router# traceroute www.cisco.com
Router# telnet R2
Router# show hosts
</code></pre>
<h3 id="heading-basic-lab-configuration">Basic Lab Configuration</h3>
<pre><code class="lang-javascript">R1(config)#<span class="hljs-keyword">do</span> ping rebar.it
Translating <span class="hljs-string">"rebar.it"</span>
% Unrecognized host or address, or protocol not running.
</code></pre>
<pre><code class="lang-javascript">R1(config)#ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>  [Configure R1 to use the specified DNS server.]
R1(config)#ip domain lookup   [Enable R1 to perform DNS queries. (<span class="hljs-keyword">default</span>)]
</code></pre>
<pre><code class="lang-javascript">R1(config)#<span class="hljs-keyword">do</span> ping rebar.it
Translating <span class="hljs-string">"rebar.it"</span>...domain server (<span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>) [OK]
Type <span class="hljs-built_in">escape</span> sequence to abort.
Sending <span class="hljs-number">5</span>, <span class="hljs-number">100</span>-byte ICMP Echos to <span class="hljs-number">172.217</span><span class="hljs-number">.25</span><span class="hljs-number">.110</span>, timeout is <span class="hljs-number">2</span> seconds:
!!!!!
Success rate is <span class="hljs-number">100</span> percent (<span class="hljs-number">5</span>/<span class="hljs-number">5</span>), round-trip min/avg/max = <span class="hljs-number">8</span>/<span class="hljs-number">10</span>/<span class="hljs-number">13</span> ms
</code></pre>
<h3 id="heading-config-router-as-a-dns-server">Config Router As a DNS Server</h3>
<pre><code class="lang-javascript">R1(config)#ip dns server [Configure R1 to act <span class="hljs-keyword">as</span> a DNS server]

R1(config)#ip host R1 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
R1(config)#ip host PC1 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.101</span>  
R1(config)#ip host PC2 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.102</span>
R1(config)#ip host PC3 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.103</span>
[Configure a list <span class="hljs-keyword">of</span> hostname/IP address mappings.]

R1(config)#ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span> [Configure a DNS server that R1 will query <span class="hljs-keyword">if</span>
the requested record isn’t <span class="hljs-keyword">in</span> its host table.]
R1(config)#ip domain lookup [Enable R1 to perform DNS queries.]
</code></pre>
<p><strong>shows the cached name/IP address mappings learned via DNS:</strong></p>
<pre><code class="lang-javascript">R1#show hosts
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/51c0bb1a-90e1-4105-a3ff-389b3aea983e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ab386c5e-23b4-457d-ac72-d7540329a3fd.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cd85dba0-5c91-4ae9-a7ad-4da004d947e6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D E</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0762b1bf-dbbc-4d16-bf9a-c5124a12914c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong>  ✅</p>
<p>Normally, when you use <strong>Telnet</strong> on a Cisco device, you enter the <strong>IP address</strong> of the remote device:</p>
<pre><code class="lang-bash">R1<span class="hljs-comment"># telnet 192.168.1.2</span>
</code></pre>
<p>But what if you just want to type the <strong>hostname</strong> instead?</p>
<pre><code class="lang-bash">R1<span class="hljs-comment"># telnet R2</span>
</code></pre>
<p>For this to work, the router/switch must be able to <strong>resolve the hostname into an IP address</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0b908c90-1b94-4e06-9381-825ee31c1578.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cbf7b345-ef84-43df-bbda-19afebba8dcd.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d289d167-36ef-42a8-836e-3f5583c8a141.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3f047c86-db0f-418f-b988-dc1091a009b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong>  ✅</p>
<h2 id="heading-implementing-wireless-lan">Implementing Wireless LAN</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>feature</td><td>2.4 GHz</td><td>5 GHz</td></tr>
</thead>
<tbody>
<tr>
<td>Speed</td><td>Slower data transmission.</td><td>Faster data transmission.</td></tr>
<tr>
<td>Range</td><td>Longer area coverage.</td><td>Short area coverage</td></tr>
<tr>
<td>Channels</td><td><strong>14</strong> Channels (only 1,6,11 are non-oversleeping).</td><td>Many non-overlapping Channels(36-165)</td></tr>
</tbody>
</table>
</div><p>Wireless technologies most frequently used in home networks are in the unlicensed <strong>2.4 GHz and 5 GHz</strong> frequency ranges.</p>
<p>Wi-Fi is a wireless network to connect local area devices. It uses radio waves to send and receive data.</p>
<ul>
<li>The Standards we use for wireless LABs are defined in <strong>IEEE 802.11.</strong></li>
<li>Wi-Fi is a trademark of the <strong>Wi-Fi Alliance,</strong> not directly connected to IEEE.</li>
<li>Wi-Fi uses two main bands (Frequency range)  <strong>2.4 GHz and 5 GHz.</strong></li>
<li>In the 2.4 GHz band, it is recommended to use channels <strong>1,6, and 11 (non-overlapping channels)</strong>.</li>
</ul>
<h3 id="heading-overlapping-channels">Overlapping Channels</h3>
<ul>
<li>In wireless networking, <strong>overlapping channels</strong> occur when multiple Wi-Fi networks operate on the same or adjacent channels, causing <strong>interference and reducing network performance</strong>. This is especially common in the <strong>2.4 GHz band</strong>, where only <strong>three non-overlapping channels (1, 6, and 11)</strong> are available in most regions.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7ad5344f-e8f9-46da-a814-60a06b5ec2fa.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>Best Practice:</strong> Use <strong>automatic channel selection</strong> or analyze your environment with tools like <strong>Wi-Fi Analyzer</strong> to choose the best channel.</p>
</blockquote>
<p>💡 <strong>Which One to Use?</strong></p>
<ul>
<li><strong>For better speed:</strong> Use <strong>5 GHz</strong>.</li>
<li><strong>For better range &amp; wall penetration:</strong> Use <strong>2.4 GHz</strong>.</li>
<li><strong>For minimal interference:</strong> Prefer <strong>5 GHz</strong>, especially in crowded areas.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Standard</td><td>Frequencies</td><td>Max Data Rate</td><td></td></tr>
</thead>
<tbody>
<tr>
<td>802.11</td><td>2.4 GHz</td><td>2 Mbps</td><td></td></tr>
<tr>
<td>802.11 b</td><td>2.4 GHz</td><td>11 Mbps</td><td></td></tr>
<tr>
<td>802.11 a</td><td>5 GHz</td><td>54 Mbps</td><td></td></tr>
<tr>
<td>802.11 g</td><td>2.4 GHz</td><td>54 Mbps</td><td></td></tr>
<tr>
<td>802.11n</td><td>2.4 GHz / 5 GHz</td><td>600 Mbps</td><td>Wi-Fi 4</td></tr>
<tr>
<td>802.11ac</td><td>5 GHz</td><td>6.93 Gbps</td><td>Wi-Fi 5</td></tr>
<tr>
<td>802.11ax</td><td>2.4 GHz / 5/6 GHz</td><td>4*802.11ac</td><td>Wi-Fi 6</td></tr>
</tbody>
</table>
</div><ul>
<li><strong>Band</strong>: A broad range of frequencies (e.g., 2.4 GHz, 5 GHz, 6 GHz) used for wireless communication.</li>
<li><strong>Channel</strong>: A specific frequency or range within a band that devices use to communicate</li>
</ul>
<h1 id="heading-rssi">RSSI</h1>
<p>RSS standard for <strong>Received Signal Strength Indicator</strong> is a <strong>measure of the power level that an access point or wireless device receives from another device</strong>. It’s used to estimate signal strength in a wireless network. </p>
<ul>
<li>RSSI is usually measured in <strong>dBm</strong>(Decibels milliwatts). Value range from <strong>-100 dBm</strong> (very weak signal)  to <strong>0 dBm</strong> (Strongest possible signal).</li>
</ul>
<h3 id="heading-rssi-values"><strong>RSSI Values:</strong></h3>
<ul>
<li><strong>-30 dBm</strong>: Excellent signal (very close to the AP).</li>
<li><strong>-50 dBm</strong>: Good signal (stable connection).</li>
<li><strong>-70 dBm</strong>: Fair signal (may experience slower speeds).</li>
<li><strong>-90 dBm</strong>: Poor signal (unstable or dropped connection).</li>
<li><strong>-100 dBm</strong>: Very poor signal (no connection).</li>
</ul>
<h2 id="heading-snr">SNR</h2>
<p><strong>SNR(signal-to-noise ratio)</strong> measures the strength of a <strong>Wi-Fi signal compared</strong> to background noise (Interference).</p>
<p>It is expressed in <strong>Decibels (dB)</strong> and determines the <strong>quality</strong> of a wireless network. A higher SNR means a cleaner signal.</p>
<p>$SNR=Signal Strength (dBm)−Noise Level (dBm)$</p>
<h2 id="heading-service-set">Service Set</h2>
<p>A  Service Set defines a group of wireless devices that communicate using the same Wi-Fi network(SSID).</p>
<p><strong>There are three main types:</strong></p>
<ul>
<li>Independent Basic Service Set  (IBSS).</li>
<li>Infrastructure</li>
<li>Mesh</li>
</ul>
<h2 id="heading-independent-basic-service-set-ibss">Independent Basic Service Set (IBSS)</h2>
<p><strong>Independent Basic Service Set (IBSS)</strong> is a wireless network in which two or more wireless devices are connected directly without using an <strong>Access Point(AP).</strong> </p>
<ul>
<li>Also called an <strong>Ad hoc</strong> network.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f54fc4bb-6189-4d2e-95cd-ba5c2cf080dc.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-basic-service-set-bss">Basic Service Set (BSS)</h2>
<p>A <strong>BSS (Basic Service Set)</strong> is a kind of infrastructure Service Set in which clients connect to each other via an <strong>AP(Access Point)</strong>, but not directly to each other.</p>
<ul>
<li>A <strong>BSSID (Basic Service Set ID)</strong> uniquely identifies the AP. The BSSID is the MAC address of the AP’s radio.</li>
<li><strong>Service set identifier (SSID):</strong> This is a human-readable, non-unique identifier used by the AP to <strong>advertise its wireless service</strong>.</li>
<li>Other <strong>APs</strong> can use the same <strong>SSID</strong>, but <strong>not the same BSSID.</strong></li>
<li>Wireless devices request to associate with the <strong>BSS</strong>. Wireless devices that are associated with the BSS are called <strong>“Client” or “Station”</strong>.</li>
<li>The area around an AP where its signal is usable is called a <strong>BSA (Basic Service Area).</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bf720804-6452-4b9e-a197-935bdcdb4cee.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-extended-service-set-ess">Extended Service Set (ESS)</h2>
<p>A Wi-Fi network that consists of multiple <strong>Access Points (APs)</strong> working together under <strong>the same SSID</strong> to provide a wider coverage and support roaming between APs.</p>
<ul>
<li>Each BSS uses the same <strong>SSID</strong>.</li>
<li>Each BSS has a unique <strong>BSSID</strong>.</li>
<li>Each <strong>BSS</strong> uses a different channel to avoid interference.</li>
<li>Clients can pass between APs without having to reconnect.</li>
<li>The <strong>BSAs</strong> should overlap <strong>about 10-15%</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f2601422-f9fb-42a1-8a76-65e99fe59158.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-mesh-basic-service-set-mbss">Mesh Basic Service Set (MBSS)</h2>
<p>A <strong>Mesh Basic Service Set (MBSS)</strong> is a <strong>wireless mesh network</strong> where multiple <strong>Access Points (APs)</strong> (called <strong>Mesh Nodes</strong>) communicate with each other <strong>without a wired backbone</strong>. It is used to provide <strong>large coverage and self-healing capabilities</strong>.</p>
<ul>
<li>At least one AP is connected to the wired network, it is called <strong>RAP (Root Access Point).</strong></li>
<li><strong>No wired connections</strong> between nodes—only wireless links.</li>
<li>The other APs are called <strong>MAPs(Mesh Access Points)</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d20409ea-c05b-492a-9731-8b46bdcfdba3.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-distribution-system">Distribution System</h2>
<p>Refers to the upstream wired Ethernet as the distribution system (DS) for wireless BSS.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7621d2a7-5a84-4f4f-9fe0-185899fdc812.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-workgroup-bridge-wgb">WorkGroup Bridge (WGB)</h2>
<p><strong>WorkGroup Bridge(WGB)</strong> is a Wi-Fi client device that connects <strong>a wired device</strong> to a wireless network by acting as a <u><strong>bridge between an Ethernet network and a Wi-Fi access Point (AP)</strong></u>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e331857d-c602-4140-83bd-b7fda21051d0.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-outdoor-bridge">Outdoor Bridge</h2>
<p>An <strong>outdoor Bridge</strong> is a <strong>wireless connection</strong> between two or more locations, used to extend a network over <strong>long distances</strong> without cables. It is commonly used for <strong>connection building and remote offices.</strong> The connection can be point-to-point or point-to-multipoint.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e6be608d-2ba7-4bcc-9412-842c24b0b029.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-wireless-architectures">Wireless Architectures</h1>
<p>There are three main wireless AP deployment methods:</p>
<ul>
<li>Autonomous</li>
<li>Lightweight</li>
<li>Cloud-Based</li>
</ul>
<h2 id="heading-autonomous-architecture">Autonomous Architecture</h2>
<p>An <strong>Autonomous AP</strong> is a <strong>self-contained access point</strong> that operates <strong>independently</strong>, without requiring a <strong>centralized wireless controller</strong>. it is commonly used in <strong>small networks</strong> when a few APs are needed.</p>
<ul>
<li><strong>Self-Managed,</strong> no need for a separate controller.</li>
<li>Each AP has its configuration(SSID, Security, QoS Rules, etc.).</li>
</ul>
<h2 id="heading-lightweight-architecture">Lightweight Architecture</h2>
<p>A <strong>Lightweight Access Point(LWAP)</strong> is a Wi-Fi access point that relies on a <strong>Wireless LAN Controller(WLC)</strong> for configuration, management, and traffic handling. Unlike <strong>autonomous APs</strong>, LWAPs do not function <strong>independently</strong> and require a centralized controller.  </p>
<ul>
<li><strong>Lightweight APs</strong> handle <strong>real-time</strong> operations like transmitting/receiving RF traffic, and encrypting/decrypting traffic.</li>
<li>Other functions are carried out by a <strong>WLC</strong>, for example, RF management, Security/QoS management, client authentication, client association/roaming management, etc.</li>
<li>This is called <strong>split-MAC architecture.</strong></li>
<li>The <strong>WLC</strong> is used to centrally configure the Lightweight APs.</li>
<li>The <strong>WLC and Lightweight</strong> use a protocol called <strong>CAPWAP</strong>(Control And Provisioning Of Wireless Access Points) to communicate.
<details><summary>Two tunnels are created between each AP and WLC:</summary></details></li>
<li><strong>Control tunnel (UDP port 5246):</strong> this tunnel is used to <strong>configure the APs , and control/manage the operation</strong>. All traffic in this tunnel is <strong>encrypted by default.</strong></li>
<li><strong>Data tunnel (UDP  port 5247): all traffic from wireless clients</strong> is sent through this tunnel to the WLC (It does not go directly to the wired network).</li>
</ul>
<p></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3d290a2f-265a-4b7d-a053-4f6d4c5f44b8.webp" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Controlled Access Point works as the client of the <strong>Wireless LAN Controller (WLC)</strong>. Technically a controlled access point is known as the <strong>Lightweight Access Point (LWAP)</strong>. The WLC based on the security configuration, makes the decision whether the received frame should be forwarded or discarded.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/76a8de80-822e-4999-8cfe-839f73e9023a.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ae37848f-3f46-4e44-9bf2-d6369010dd63.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>An access point controller (AP controller)</strong> is a device that manages and controls wireless access points (APs) in a wireless network. It allows for centralized management of APs, which can simplify configuration and troubleshooting. AP controllers can also provide features such as load balancing, roaming, and security.</p>
<h2 id="heading-here-are-some-of-the-benefits-of-using-an-access-point-controller">Here are some of the benefits of using an access point controller</h2>
<ul>
<li><strong>Centralized management:</strong> AP controllers allow for centralized management of APs, which can simplify configuration and troubleshooting.</li>
<li><strong>Improved performance:</strong> AP controllers can improve performance by load-balancing traffic across multiple APs and providing roaming.</li>
<li><strong>Enhanced security</strong>: AP controllers can provide enhanced security by encrypting traffic and authenticating users.</li>
<li><strong>Scalability</strong>: AP controllers can scale to accommodate larger networks.</li>
</ul>
<h3 id="heading-wlc-ports-and-interfaces">WLC Ports and Interfaces</h3>
<ul>
<li><strong>WLC Ports</strong> are physical ports that cables connect to.</li>
<li><strong>WLC Interfaces</strong> are the logical interfaces within the WLC(ie. SVIs on a switch).</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2fe8c0e9-6272-4f7c-8140-2f9acfb20e3f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Service Port:</strong> Used for out-of-band management(not user traffic).</p>
<ul>
<li>Management access via <strong>SSH, HTTP(S), or Telnet</strong>.</li>
<li>Software upgrades and troubleshooting.</li>
<li>Cannot be used for normal wireless traffic.</li>
</ul>
<p><strong>Distribution Port/ Network Port:</strong>  Connect to a switch (trunk mode) for AP traffic and VLAN communication.</p>
<p><strong>Redundancy Port:</strong> connects two WLCs for high availability. </p>
<p><strong>Console Port:</strong> This is a stand console port, either RJ45 or USB. </p>
<p>How the Internet Flows Through a WLC Network</p>
<blockquote>
<p>💡 Internet → Router/Firewall → Core Switch → WLC (via Distribution Ports) → Access Points → Wireless Clients</p>
</blockquote>
<h2 id="heading-cloud-based-architecture"><strong>Cloud-Based Architecture</strong></h2>
<p>A <strong>Cloud-Based Architecture</strong> in wireless networking refers to a system where <strong>Wi-Fi Access Points (APs) are managed remotely</strong> through a <strong>cloud controller</strong>, instead of a traditional on-premises Wireless LAN Controller (WLC).</p>
<p><strong>Cisco Meraki</strong> – Cloud-managed networking for enterprises.</p>
<h3 id="heading-how-cloud-based-architecture-works"><strong>How Cloud-Based Architecture Works:</strong></h3>
<p>1️⃣ <strong>Access Points (APs) connect to the internet</strong> and communicate with a cloud-based controller.</p>
<p>2️⃣ <strong>The cloud controller manages all APs</strong> centrally from a web-based dashboard.</p>
<p>3️⃣ <strong>Network admins configure, monitor, and troubleshoot Wi-Fi</strong> from anywhere.</p>
<p>4️⃣ <strong>APs receive real-time updates, security patches, and configurations</strong> from the cloud</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c6e756f3-e7fd-4cb0-9138-d972eee64cad.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-access-point">Access Point</h2>
<ul>
<li>An access point is a device that <strong>allows multiple wireless devices to connect**</strong>.** connects various devices in a single or multiple wired LAN network, and an access point connects various wireless devices in a single or multiple wireless network.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e82a9006-2f01-4dcd-bd15-270b0a1df067.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-types-of-access-points">Types of Access Points</h2>
<ul>
<li>Standalone access Point. (Heavyweight or Fat).</li>
<li>Multifunction Access Point.</li>
<li>Controlled Access Point(Lightweight).</li>
</ul>
<h2 id="heading-standalone-access-point">Standalone Access Point</h2>
<ul>
<li>A standalone access point provides the same functionality in a wireless network tha<strong>t a switch or hub provides in a wired networ</strong>k. It provides connectivity between the different wireless devices. It accepts a frame from the connected device and, based on its physical address, forwards it to the destination device.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5ce69b75-edc0-4657-b2d0-815c9f92118e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1a578684-81e6-4ef8-a0c2-431bdc9e37be.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Ethernet Ports:</strong> These ports connect to the internal switch portion of the router. These ports are usually labelled “Ethernet” or “LAN”, as shown in the figure. All devices connected to the switch ports are on the same local network.</p>
<p><strong>Internet Port:</strong> This port is used to connect the device to another network. The internet port connects the router to a network different from the Ethernet ports. This port is often used to connect to the cable or DSL modem in order to access the internet.</p>
<h2 id="heading-multifunction-access-point">Multifunction Access Point</h2>
<ul>
<li>A multifunction access point is the same combination of two or more devices. in this combination, an additional device or devices are merged with the access point to provide the additionalities along with the existing functionality of the access point.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/27c726ce-573c-4862-a599-2dff75a53e4e.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-why-it-is-called-a-multifunction-access-point">Why it is called a Multifunction access point?</h3>
<p>It works as A router routing local networks to other networks like Internet Networks.</p>
<p>it is used as an access point connecting all wireless devices together </p>
<p>It can be used as a switch because of having Ethernet ports.</p>
<h2 id="heading-wireless-lan-controller">Wireless Lan Controller</h2>
<ul>
<li>first, make a connection between Pc and WLC devices, then login to the WLC Through browser 192.168.1.1 and do the basic configuration</li>
<li>We Add a DHCP Server to assign IP to each access point, it is an easy way to assign IP to each AP instead of Manually.</li>
<li>Create SSID for each WLAN In WLC Web-based interface.</li>
<li>Then create a group for AP Devices, all access points grouped by SSID</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7bceb98c-20fb-4b75-ae31-16aecec5ad39.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11bb6d67-03c8-4834-8585-c332f4eb399c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0dac3044-0949-480a-8e14-1e6f4f59f1c4.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-wireless-security">Wireless Security</h1>
<h2 id="heading-open-authentication">Open Authentication</h2>
<p><strong>Open Authentication (Open System Authentication)</strong> is the simplest form of Wi-Fi authentication where any device can <strong>connect to the wireless network without requiring a password or credentials</strong>. The problem with this method is that the SSID is typically broadcast and if it is not, it can be easy to figure out with passive capturing techniques. <strong>Used in public Wi-Fi hotspots</strong>, cafes, and guest networks.</p>
<h2 id="heading-8021xeap">802.1x/EAP</h2>
<p>Extensible Authentication Protocol (EAP) is the most widely used authentication method in enterprises. It relies on an authentication server to verify user credentials through various authentication mechanisms.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dca2d25d-d8f7-4819-b643-ed6869f67594.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Supplicant:</strong> The device trying to connect (mobile, laptop…etc.)</li>
<li><strong>Authenticator:</strong> The network device enforcing authentication. <strong>forwards the request</strong> to the RADIUS server using EAP.</li>
<li><strong>Authentication Server</strong>: Usually <strong>Radius Server</strong> verifies credentials and grants or denies network access.</li>
</ul>
<h2 id="heading-types-of-8021xeap">Types of 802.1x/EAP</h2>
<ol>
<li><strong>LEAP</strong>(<strong>L</strong>ightweight <strong>E</strong>xtensible <strong>A</strong>uthentication <strong>P</strong>rotocol), is an EAP authentication type used primarily in Cisco Aironet * WLANs, It encrypts data transmissions using dynamically generated WEP keys and supports mutual authentications.</li>
<li><strong>EAP-FAST</strong>(Flexible Authentication via Secure Tunneling) is used for enterprises that can’t enforce <strong>a strong password policy</strong> and <strong>don’t want to deploy certifications for authentication</strong>.</li>
<li><strong>PEAP(P</strong>rotected <strong>E</strong>xtensible <strong>A</strong>uthentication <strong>P</strong>rotocol) provides a method to <strong>transport securely authentication data, including legacy password-based-protocols</strong>, <strong>via 802.11 Wi-Fi</strong> networks(deployed by MS and Cisco)</li>
</ol>
<blockquote>
<p>💡 for example, in hotels, you can’t use strong passwords or deploy a certification on end-user devices.</p>
</blockquote>
<ol>
<li><strong>EAP-TLS</strong>(Transport Level Security), while very secure, r<strong>equires client certificates to be installed on each WI-FI workstation</strong>. Maintenance of a PKI infrastructure requires additional administrative expertise and time in addition to that of maintaining the WLAN itself.</li>
</ol>
<h2 id="heading-wireless-privacy-and-integrity-methods">Wireless Privacy and Integrity Methods</h2>
<h3 id="heading-wep-wireless-equivalent-privacy">WEP (Wireless Equivalent Privacy)</h3>
<ul>
<li>The first widely used standard for wireless LANs was 802.11(prime), this included the wired Equivalent Privacy(WEP) algorithm which was used for security. WEP utilizes <strong>RC4 for encryption</strong> and has been appreciated because <strong>of vulnerabilities that can be used to find the security keys</strong></li>
</ul>
<h3 id="heading-wpawi-fi-protected-access">WPA(Wi-Fi Protected Access)</h3>
<ul>
<li>In response to the vulnerabilities found in WEP, Wi-Fi Protected Access(WPA) was defined. <strong>WPA utilizes the Temporal Key Integration Protocol(TKIP), which utilizes dynamic keys that were not supported with WEP and RC4 for encryption</strong>. The TKIP method used with WPA was utilized until vulnerabilities were found in TKIP. These vulnerabilities center on the fact that TKIP uses the same mechanisms that WEP  does, which allow similar attacks.</li>
</ul>
<h3 id="heading-wpa-2">WPA 2</h3>
<ul>
<li>In response to the <strong>vulnerabilities in WPA/TKIP</strong>, The IEE 802.11i  standard was defined and implemented, the IEEE 802.11i standard is also referred to as WPA2, WPA2 <strong>replaced TKIP with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)</strong> which is <strong>based on Advanced Encryption Standard(AES) AES-128</strong>, it is common for the WPA2 encryption method to be referred to as AES, <strong>There are on easy methods that have been found to break AES.</strong></li>
</ul>
<h3 id="heading-wpa-3">WPA 3</h3>
<ul>
<li>The WPA 3 provides new features for personal and enterprise use, such as <strong>256-bit Galois/Counter Mode Protocol (GCMP-256), 384-bit Hash Message Authentication Mode(HMAM), and 256-bit Broadcast/Multicast Integrity Protocol (BIP-GMAC-256).</strong> WPA 3 also supports security measures such as perfect forward secrecy.</li>
</ul>
<p>The Wi-Fi Alliance has developed WPA-WPA2-WPA3, all of which support two <strong>authentication modes</strong>:</p>
<ul>
<li><strong>Personal mode</strong>: Used for home and small office networks,  A <strong>pre-shared key (PSK)</strong> is used for authentication no special authentication server is required.</li>
<li><strong>Enterprise Mode:</strong> Used for enterprise and large networks require a <strong>remote authentication server (RADIUS SERVER)</strong> for user authentication. The user must authenticate using the 802.1x standard which uses Extensible Authentication Protocol for authentication.</li>
</ul>
<blockquote>
<p>💡 Which organization is responsible for testing wireless LAN devices?<br /><strong>Wi-Fi Alliance</strong></p>
</blockquote>
<p>    <strong>Wi-Fi Alliance</strong></p>
<h2 id="heading-encryption-methods">Encryption Methods</h2>
<ul>
<li><strong>RC4(40-bit) (**</strong>Rivest Cipher 4<strong>**)</strong> is a stream cipher. while it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure.</li>
<li><strong>Temporal Key Integrity Protocol (**</strong>TKIP<strong>) is a wireless network security protocol of IEEE 802.11. Assigning a </strong>unique 48-bit sequencing number to each packet using 128-bit encryption keys and 64-bit authentication keys.**</li>
<li><strong>AES:(AES-CCMP)</strong>: This algorithm provides enhanced security over TKIP and is the only encryption algorithm supported by the 802.11i standard (the standard that introduced WPA2).</li>
<li><strong>AES-GCMP-256</strong>: Galois Counter Mode Protocol (GCMP) is supported by <strong>802.11ac</strong>, is more efficient than AES-CCMP, and provides better performance for wireless clients. AES-GCMP-256 uses <strong>256-bit AES encryption keys</strong>.</li>
</ul>
<p><strong>Standard Channel:</strong> Specifies the channel over which communication will occur. By default, this is set to <strong>Auto</strong> to allow the access point (AP) to determine the optimum channel to use.</p>
<p>A <strong>mixed-mode</strong> wireless network environment can include devices that use any of the existing Wi-Fi standards. This environment provides easy access for older devices that need a wireless connection but do not support the latest standards.</p>
<h3 id="heading-what-is-the-difference-between-5g-and-5-ghz-just-for-information-not-ccna-topic"><strong>What is the difference between 5G and 5 GHz? (Just For Information, Not CCNA topic)</strong></h3>
<ul>
<li><strong>5G</strong> refers to the <strong>fifth generation of cellular network technology</strong>. It uses radio waves in the 3.5GHz to 3.7GHz range to transmit data. <strong>5G offers much faster speeds and lower latency than previous cellular generations, such as 4G LTE**</strong>.**</li>
<li><strong>5GHz</strong> refers to a <strong>frequency band that is used by some Wi-Fi systems</strong>. It is located in the 5.1GHz to 5.8GHz range and offers faster speeds than the 2.4GHz Wi-Fi band. However, 5GHz has a shorter range and is more susceptible to interference.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Feature</strong></td><td><strong>5G</strong></td><td><strong>5GHz</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Technology</td><td>Cellular network</td><td>Wi-Fi</td></tr>
<tr>
<td>Frequency range</td><td>3.5GHz to 3.7GHz</td><td>5.1GHz to 5.8GHz</td></tr>
<tr>
<td>Typical speeds</td><td>Up to 20Gbps</td><td>Up to 1Gbps</td></tr>
<tr>
<td>Range</td><td>Shorter</td><td>Longer</td></tr>
<tr>
<td>Susceptibility to interference</td><td>Less susceptible</td><td>More susceptible</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 The wireless technologies most frequently used in home networks are in the <strong>unlicensed 2.4 GHz and 5 GHz frequency ranges</strong>.</p>
</blockquote>
<h2 id="heading-wlan-ccna-questions">WLAN CCNA Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/187bb1a9-33b1-4f36-8c5f-e763596f7bbc.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>CPU ACL</strong> → Blocks or allows management access (SSH, HTTPS, SNMP) to the WLC from specific networks.
<strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfd36b3b-565f-4cf5-8beb-67a73c703c83.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-layer-2-security-mechanisms">Layer 2 Security Mechanisms</h3>
<ul>
<li><strong>WPA + WPA2</strong></li>
<li><strong>802.1X</strong></li>
</ul>
<p>👉 Layer 2 deals with encryption and authentication before a client can join the WLAN.</p>
<h3 id="heading-layer-3-security-mechanisms-for-wlan">Layer 3 Security Mechanisms (for WLAN)</h3>
<ul>
<li><strong>Web policy</strong></li>
<li><strong>Passthrough</strong></li>
</ul>
<p>👉 Because Layer 3 mechanisms kick in after association, often for user authentication or web redirection.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c84cff90-28ec-48c5-bc82-f761136b34f5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The <strong>Passive Client</strong> feature on the Cisco Wireless LAN Controller (WLC) ensures that devices with static IPs (like printers, scanners, or IoT devices) can still associate and pass traffic correctly.</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/de4736a3-25bc-4bd6-ae59-0410b0df3e4e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Discovery request</strong> — because that’s the first message an AP sends to the WLC AP-Manager interface during the join process.
<strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d9201425-d085-48c0-8fe5-bffac818492e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Lightweight AP supports different operational modes (Local Mode, Monitor Mode, Sniffer Mode)</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfd36b00-4072-4d81-9d72-a33d06e11cb3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9a928567-1d6f-4939-8d72-5418b40c6622.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/71975724-985c-4c04-93aa-e1aad9c42770.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>TACACS+</strong> — because it supports separate authentication and authorization.</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4472d9c5-1131-4226-bea6-4f6cae712074.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/949a8e63-3599-4b07-af23-8ea86b8c5f52.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d7837d75-51f1-43e3-b04a-175004c37ab7.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ce3d082d-529b-44ef-8cd6-136a7f1b91e0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6d682334-c60a-45ad-a4e5-5e923a2ee950.png" alt="CCNA 200-301 Study (1)" /></p>
<p>LAG on WLC treats all ports as one logical port.
<strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9b2fac23-a88c-4906-8712-aa718b282127.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Access Points that use <strong>Power over Ethernet (PoE)</strong> need to “negotiate” how much power they can draw from the switch.</li>
<li>This negotiation is done using <strong>Cisco Discovery Protocol (CDP)</strong> or <strong>LLDP (industry standard)</strong>.</li>
</ul>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/db0eb64f-a25f-4ce4-b5cd-81c7ba0ec54a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11e88eed-cd9c-457d-b977-7b847ffbb3b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5a7f26c9-6132-4b4e-95fb-96656f46116e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When more than one AP-manager interface is configured, an AP  will join the controller by selecting the least-loaded AP Manager.</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/98d0f667-c066-4b57-bf08-f8e8c71c3011.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3ef8c2ef-59cb-4519-a1a4-e28174abf307.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Layer 3 Web Authentication (web policy) allows only <strong>DHCP and DNS packets before the user authenticates</strong>. All other traffic is blocked until authentication succeeds.</p>
<p>C<strong>✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/243f0081-4705-421d-bc21-9956fbdcadf2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1dbed46a-2776-4ad5-a374-03193e62a25f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2bd653c5-57d7-46bf-bd60-57d0958b793c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f2b9f568-7298-4e49-aec7-1f37584939f5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong>   </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a2b5bedd-271c-452a-8938-93c038def733.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>AP-manager = CAPWAP tunnel source</strong>.</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7b2d13a4-89d1-4c5c-a8af-13a8cbf13a93.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7d968c40-2c79-480f-b635-b669e2a66dad.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>802.11w = Protected Management Frames (PMF).</strong></li>
<li>In the exhibit, you see <strong>PMF (Disabled)</strong>.</li>
</ul>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/70279731-b246-4e27-8e1d-37e303e2eec9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0a11c2ec-247b-4180-9c81-f834a1450ad9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>CD✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/01357a46-6f92-4875-afed-3555d9b4d68c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6d151e62-33dd-4580-931a-633efae24b7a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2dbcaef8-d53c-40c1-a5c5-f6a5111b6b9c.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Opportunistic Wireless Encryption (OWE)</strong> is defined in <strong>WPA3</strong>.</li>
<li>It provides <strong>encryption without authentication</strong>.</li>
<li>This means that even on an <strong>open Wi-Fi network</strong> (no password), traffic is <strong>still encrypted</strong> between the client and the AP.</li>
</ul>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c16b0824-7461-4d72-bb01-917ed8a1a76d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd6dd2e6-dec4-4f81-8f93-5aa5b66dbf16.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/941a4e3d-2342-47d5-9faf-938332842010.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11d4ad78-064d-4b28-92f8-49b8ef947acc.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>The goal is to <strong>minimize association (roaming) time</strong> as clients move between APs.</li>
<li><strong>802.11k</strong> helps with this by letting the AP provide the client with a <strong>neighbor report</strong> (list of nearby APs on both 2.4 GHz and 5 GHz).</li>
</ul>
<p><strong>D</strong>✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3dd6c85c-64f4-430c-ab6f-9900c4ddeda6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/18eaf90e-2d38-4bca-9bb5-9d2222bebcc0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B E ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4507d018-5c07-494f-a03f-d33f41e7acac.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Load balancers</strong> → WLC handles balancing by itself.❌</p>
<p>When you add a new WLC, the two extra things you should set up are:</p>
<ul>
<li><strong>Configure additional VLANs</strong> so that different SSIDs (such as guest, voice, and corporate) can be mapped to the correct networks.</li>
<li><strong>Configure additional security policies</strong> → to protect the WLAN (WPA2/WPA3, ACLs, RADIUS, etc.).</li>
</ul>
<p><strong>B E ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bb05dba8-6574-494b-87ac-01cdb5702768.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When setting up a new WLAN on a Cisco WLC, the <strong>basic workflow</strong> is:</p>
<ol>
<li><strong>Authentication server</strong> (RADIUS/TACACS) configuration.</li>
<li><strong>Dynamic interface</strong> creation (maps SSIDs to VLANs).</li>
<li><strong>Create the WLAN</strong> (SSID) and <strong>bind it</strong> to the dynamic interface. 👉 This step connects the wireless side (SSID) to the wired side (VLAN).</li>
</ol>
<p><strong>D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b90c8594-543c-4edb-b985-82bbaacebb54.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>AB ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4cf80c59-48c2-4baa-aabc-6a4290a0fc2e.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>802.11a</strong> works in the <strong>5 GHz band</strong>.</li>
<li>Advantage: it provides <strong>more nonoverlapping channels</strong> (much more than 2.4 GHz’s 3 channels).</li>
</ul>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/046d8e99-3615-4d93-b5d0-d4d09ad390c7.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When configuring a <strong>RADIUS server on a Cisco WLC</strong>:</p>
<ul>
<li><strong>Server Status = Enabled</strong> → Makes the RADIUS server active.</li>
<li>To use the RADIUS server for <strong>wireless client authentication</strong>, you must check <strong>Network User (Enable)</strong>.</li>
<li>Without this, the WLC will not send wireless client authentication requests to the RADIUS server.</li>
</ul>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/63f7b580-de0b-4ac7-bea3-861583d80dc5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>802.11g uses 2.4GHz and throughput up to 54 Mbit/s.
“enhanced SSID security” = hiding the SSID, so we must uncheck the Broadcast SSID option</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/56b02fb8-8018-4837-9932-c1ecd72f2804.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d2024348-3bc3-43a4-b913-e40e32c8963d.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>FlexConnect Local Switching</strong> — allows branch APs to handle data traffic locally instead of sending it back to the WLC.</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6ff8b8e6-6351-4a71-a16e-ff3995682936.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9932a3bd-3230-4731-85bb-1ed08b706485.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5d4c56fc-8395-447c-8f4b-395428cf4d9e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>802.11g</strong> → Operates at <strong>2.4 GHz</strong></p>
<ul>
<li>By default, the WLAN is mapped to the <strong>guest interface</strong> (seen in the exhibit).</li>
<li>To make this production-ready, you need to <strong>map the WLAN to another interface</strong> (e.g., a corporate VLAN instead of guest).</li>
</ul>
<p><strong>B D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c5e9a78f-8f0d-494e-b970-415d879ef5c2.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0c0e1000-ad33-46eb-8198-6602cac2fd3f.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>B D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ae569e33-7a70-4fe3-ab04-9b7c91b19905.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To get the <strong>highest security with domain credentials (LDAP)</strong>:</p>
<ul>
<li>Use <strong>WPA2</strong> (strongest encryption). ✅</li>
<li>Use <strong>802.1X</strong> (Enterprise authentication with usernames/passwords). ✅</li>
</ul>
<p><strong>C D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfe80b68-df51-4f66-9d4b-afd491d7cc35.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ba3935d3-9340-4ed3-a8f0-85746b094443.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c220a837-7e72-4f9d-95e1-bb9a23d34796.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The fix: install a <strong>publicly trusted third-party certificate</strong> (e.g., DigiCert, GoDaddy, Let’s Encrypt) on Cisco ISE so <strong>both employees and contractors</strong> trust it automatically.</p>
<p><strong>B ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5dda4039-3380-4ca5-b900-3b65684aa1ae.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To make <strong>SIP Call Admission Control</strong> work on WLC:</p>
<ol>
<li><strong>Turn on Media Session Snooping</strong> → so the WLC can detect SIP calls.</li>
<li><strong>Set QoS to Platinum</strong> → highest priority for voice traffic.</li>
</ol>
<p><strong>C D  ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e7da8eda-bc74-47aa-b974-f4e6e3094b17.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c583963c-003b-4c3b-a5e4-3986ffe8f2f2.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Local mode</strong> = 2 CAPWAP tunnels (all traffic to WLC).</li>
<li><strong>FlexConnect</strong> = traffic can stay local (no tunnel for data).</li>
</ul>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e2e8265f-743b-4441-b305-149b9a08d7bb.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>In <strong>local mode</strong>, an AP forms a <strong>CAPWAP tunnel (control + data)</strong> with the WLC.</li>
<li>This tunnel runs over <strong>IP (UDP ports 5246 for control, 5247 for data)</strong>.</li>
<li>As long as the AP can <strong>reach the WLC’s management/AP-manager interface IP</strong> (through L2/L3 network), it doesn’t matter which switch it’s connected to.</li>
</ul>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/85de88ed-0700-46f4-aab8-4f9de51ba3e1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>BC ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/274f909a-1481-413d-a012-341131821fe2.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>A <strong>CA</strong> issues and manages certificates.</li>
<li>A <strong>CRL</strong> is a list of revoked certificates.</li>
</ul>
<p><strong>BD ✅</strong></p>
<h2 id="heading-ccna-volume-2">CCNA Volume 2</h2>
<h2 id="heading-access-control-list">Access Control List</h2>
<h1 id="heading-what-is-an-access-control-list">What is an Access Control List</h1>
<ul>
<li><strong>An access list (ACL)</strong> is a set of rules for <strong>controlling traffic</strong> and <strong>reducing network attacks</strong>. ALCs <strong>filter traffic</strong> based on rules(<strong>IP address, protocol, or port)</strong> defined for incoming and outgoing traffic on the network.</li>
</ul>
<h1 id="heading-access-control-list-feature">Access Control List Feature</h1>
<ul>
<li>Configuring an ACL in <strong>global config</strong> mode will not make the ACL take effect.</li>
<li>The ACL must be applied to an <strong>interface</strong>.</li>
<li>ACLs are applied either <strong>inbound or outbound</strong>.</li>
<li>When the router checks a packet against the ACL, it processes the ACEs (Access Control Entries) in order,  <strong>top to down in sequential order.</strong></li>
<li>If the <strong>packet matches one of the ACEs in the ACL</strong>, the router takes the action and <strong>stops
processing the ACL</strong>. All entries below the matching entry will be ignored.</li>
<li>The <strong>interface will take action based on the match condition.</strong> There are two possible actions: <strong>permit</strong> and <strong>deny</strong>.</li>
<li>If the <strong>permit condition</strong> matches, a packet will be <strong>allowed</strong> to <strong>pass from the interface.</strong></li>
<li>If the <strong>deny condition</strong> matches, the <strong>packet will be destroyed immediately</strong></li>
<li>A maximum of one ACL can be applied to a single interface per direction.
Inbound: Maximum one ACL
Outbound: Maximum one ACL</li>
<li>Every ACL has a <strong>default</strong> <strong>deny</strong> <strong>statement</strong> at the <strong>end of it</strong>.</li>
<li>What will happen if a <strong>packet doesn’t match any of the entries in an ACL</strong>?</li>
</ul>
<p>There is an ‘<strong>implicit deny</strong>’  (if source IP = any, then deny) at the end of all ACLs there’s an <strong>invisible rule</strong>.
The <strong>implicit deny</strong> tells the router to deny all traffic that doesn’t match any of the configured
entries in the ACL.</p>
<pre><code class="lang-java">deny any
</code></pre>
<p>So if you forget to add a <code>permit</code> statement, all traffic gets blocked.</p>
<h1 id="heading-type-of-access-control-list">Type of Access Control List</h1>
<ul>
<li><strong>Standard Access List (Basic):</strong> Filter traffic <strong>based only on source IP address</strong>.
By <strong>using numbers 1-99 or 1300-1999, the router</strong> will understand it as a standard ACL and the specified address as the source IP address. Typically <strong>applied close to the destination</strong>.</li>
</ul>
<pre><code class="lang-php">
! Step <span class="hljs-number">1</span>: Define ACL
access-<span class="hljs-keyword">list</span> &lt;<span class="hljs-number">1</span><span class="hljs-number">-99</span>&gt; permit|deny &lt;source&gt; &lt;wildcard&gt;

! Step <span class="hljs-number">2</span>: Apply ACL to <span class="hljs-class"><span class="hljs-keyword">interface</span>
<span class="hljs-title">interface</span> &lt;<span class="hljs-title">interface</span>-<span class="hljs-title">id</span>&gt;
 <span class="hljs-title">ip</span> <span class="hljs-title">access</span>-<span class="hljs-title">group</span> &lt;1-99&gt; <span class="hljs-title">in</span> | <span class="hljs-title">out</span></span>
</code></pre>
<ul>
<li><strong>Extended Access List (Advanced):</strong> Filter traffic based on <strong>source and destination IP addresses, protocols, port numbers</strong>, and other criteria. T<strong>hese use ranges from 100-199 and 2000-2699.</strong> <strong>Typically applied close to the source.</strong></li>
</ul>
<pre><code class="lang-php">access-<span class="hljs-keyword">list</span> &lt;number&gt; permit|deny &lt;protocol&gt; &lt;source&gt; &lt;src_wildcard&gt; &lt;destination&gt; &lt;dest_wildcard&gt; [eq &lt;port&gt;]
</code></pre>
<h1 id="heading-applying-access-control-list">Applying Access Control List</h1>
<h3 id="heading-inbound-access-list"><strong>Inbound access list:</strong></h3>
<ul>
<li><strong>Definition</strong>: Traffic <strong>entering</strong> the router through an interface <strong>before routing decisions</strong> are made.</li>
<li>Think: "Packets coming into the door."</li>
<li>If denied, the router <strong>drops the packet immediately</strong>—saves CPU and bandwidth.</li>
<li><strong>Use Case</strong>: Good for filtering unwanted traffic <strong>as close to the source as possible</strong>.</li>
</ul>
<h3 id="heading-outbound-access-list"><strong>Outbound access list:</strong></h3>
<ul>
<li><strong>Definition</strong>: Traffic <strong>leaving</strong> the router through an interface <strong>after routing decisions</strong> are made.</li>
<li>Think: "Packets going out the door."</li>
<li>The router first checks the routing table → then applies ACL rules on the <strong>outbound</strong> interface.</li>
<li><strong>Use Case</strong>: Useful when you want to control traffic <strong>leaving for a specific destination network.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a56b323a-111e-4b90-ada3-348ce8927bcd.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5058abde-66b7-48ff-a7b3-bd1e0c7e1d97.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a6b5d3ee-24f1-4402-94c9-77a70dbefa6a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/150c4050-4baf-4bc8-a75f-4a43540d8927.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-applying-the-access-control-list">Applying the Access Control List</h1>
<ul>
<li><strong>Numbered access list:</strong> These are <strong>the access lists that cannot be deleted, specifically, one created.</strong> If we want to remove any rule from an access list, then this is not permitted in the case of a numbered access list. I<strong>f we attempt to delete a rule from the access list, the entire access list will be deleted.</strong> The numbered access list <strong>can be used</strong> with both <strong>standard and extended access</strong> lists.</li>
</ul>
<h3 id="heading-numbered-acl-vs-named-acl"><strong>🔢 Numbered ACL vs 🏷️ Named ACL</strong></h3>
<h2 id="heading-1-numbered-acl">1. Numbered ACL</h2>
<ul>
<li>Uses <strong>numbers</strong> to identify the ACL.</li>
<li>Example ranges:<ul>
<li><strong>Standard ACL</strong>: 1–99 (expanded: 1300–1999)</li>
<li><strong>Extended ACL</strong>: 100–199 (expanded: 2000–2699)</li>
</ul>
</li>
<li><strong>Editing</strong>: If you want to change one entry, you usually need to <strong>remove the entire ACL</strong> and re-create it.</li>
<li><strong>Usage</strong>: Simple, fast for small configs.</li>
</ul>
<h2 id="heading-2-named-acl">2. Named ACL</h2>
<ul>
<li>Uses a <strong>name</strong> (instead of a number) to identify the ACL.</li>
<li>Easier to read and understand (e.g., <code>BLOCK-PC1</code> instead of <code>10</code>).</li>
<li><strong>Editing</strong>: You can enter ACL configuration mode and add/remove individual lines without deleting the whole ACL.</li>
<li><strong>Usage</strong>: Preferred in modern configs for flexibility and clarity.</li>
</ul>
<pre><code class="lang-php">no ip access-<span class="hljs-keyword">list</span> {standard | extended} &lt;NAME&gt;
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7c761d03-3770-41ac-86f8-c69fe44449b8.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 We added 0.0.0.0 as a wildcard, which means only denying this IP address. If we add 0.0.0.255 as a wildcard, all IPs get denied.      </p>
<p> <strong>Router(config-std-nacl)#deny 192.168.1.0  0.0.0.255 it means deny all the network completely</strong>  </p>
<p>A <strong>remark</strong> in an access list is simply a <strong>comment or description</strong> you add to make the ACL more readable and understandable</p>
</blockquote>
<ul>
<li><strong>Named Access List: I</strong>n this type of access list, <strong>a name is assigned to identify an access list.</strong> These can be used with both standards and extended access lists.</li>
</ul>
<pre><code class="lang-javascript">R1(config)# access-list standard [name ] MY_ACL
R1(config-std-nacl)# deny <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
R1(config-std-nacl)#permit any
</code></pre>
<pre><code class="lang-javascript">R1(config)# int fa0/<span class="hljs-number">5</span>
R1(config-<span class="hljs-keyword">if</span>)# ip access-group MY_ACL out
</code></pre>
<h2 id="heading-how-can-the-staff-department-be-denied-access-to-the-server"><strong>How can the staff department be denied access to the server?</strong></h2>
<p>The administrator can fix this problem in two ways. He can apply an <strong>inboard</strong> ACL to the <strong>F0/0</strong> interface, or he can apply an <strong>outbound</strong> ACL to the <strong>F0/2</strong> interface </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f74a1ad6-9e58-4a2a-a4f2-80946874afd4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.computernetworkingnotes.com/ccna-study-guide/basic-concepts-and-fundamentals-of-acls.html">bookmark</a></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c201c787-8a37-4661-894f-449834701142.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>D</strong></li>
</ul>
<h2 id="heading-how-to-delete-a-rule-inside-the-access-list">How to delete a rule inside the access list?</h2>
<ul>
<li><strong>Numbered Access List</strong></li>
</ul>
<pre><code class="lang-javascript">
Router(config)#ip access-list extended <span class="hljs-number">101</span>
</code></pre>
<blockquote>
<p>💡 This deletes <strong>all entries</strong> in access-list 100.<br />numbered ACLs, you have to delete the entire ACL and re-create it without the unwanted entries.</p>
</blockquote>
<p>    numbered ACLs, you have to delete the entire ACL and re-create it without the unwanted entries.</p>
<ul>
<li><strong>Named Access List</strong></li>
</ul>
<pre><code class="lang-javascript">Router#show access-lists 
Extended IP access list <span class="hljs-number">101</span>
    <span class="hljs-number">20</span> deny tcp host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.20</span> host <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.100</span> eq www (<span class="hljs-number">27</span> match(es))
    <span class="hljs-number">30</span> deny icmp host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span> host <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.100</span> (<span class="hljs-number">4</span> match(es))
    <span class="hljs-number">40</span> permit ip any any


Router(config)#ip access-list extended <span class="hljs-number">101</span>
Router(config-ext-nacl)#no <span class="hljs-number">20</span> (sequence number) **or** no <span class="hljs-number">30</span> deny icmp host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span> host <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.100</span>
</code></pre>
<h2 id="heading-extended-access-list-advanced">Extended Access List (Advanced)</h2>
<p>In the standard Access List, <strong>we permit the device for everything</strong>, but with the <strong>Extended Access List, you can specify with service permit and with service deny</strong>  </p>
<p>With Extended Access lists, you can evaluate additional packet information, such as: </p>
<ul>
<li>Source and destination IP address</li>
<li>Type of TCP/IP Protocol(TCP, UDP, IP)</li>
<li>source and destination port numbers.</li>
</ul>
<pre><code class="lang-javascript">Router(config)#access-list [number <span class="hljs-number">100</span>–<span class="hljs-number">199</span> | <span class="hljs-number">2000</span>–<span class="hljs-number">2699</span>] [permit | deny] [protocol] [source IP] [wildcard] [destination IP] [wildcard] [operator] [port]
</code></pre>
<p><strong>operator:</strong></p>
<p>● <strong>eq 80</strong> = equal to port 80
● <strong>gt 80</strong> = greater than 80 (81 and greater)
● <strong>lt 80</strong> = less than 80 (79 and less)
● <strong>neq 80</strong> = NOT 80
<strong>● range 80 100</strong> = from port 80 to port 100</p>
<p>Allow traffic from 10.0.0.0/16 to access the server at 2.2.2.2/32 using HTTPS (<strong>Numbered Access List</strong>)</p>
<pre><code class="lang-javascript">Router(config)# access-list <span class="hljs-number">110</span> permit tcp <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.255</span><span class="hljs-number">.255</span> <span class="hljs-number">2.2</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> eq <span class="hljs-number">443</span>
</code></pre>
<p>Hosts in 192.168.1.0/24 can’t use HTTPS to access SRV1. (<strong>Named Access List</strong>) </p>
<pre><code class="lang-javascript">R1(config)#ip access-list extended HTTP_SRV1
R1(config-ext-nacl)#deny tcp <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> host <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span> eq <span class="hljs-number">443</span>
R1(config-ext-nacl)#permit ip any any
R1(config-ext-nacl)#interface g0/<span class="hljs-number">1</span>
R1(config-<span class="hljs-keyword">if</span>)#ip access-group HTTP_SRV1 <span class="hljs-keyword">in</span>
Extended ACLs
</code></pre>
<p>### 
ACL sequence numbers:</p>
<ul>
<li><strong>Numbered ACLs</strong> → ❌ No <em>sequence</em> numbers. Rules are applied in the order you type them. To edit, you usually delete and rebuild.</li>
<li><strong>Named ACLs</strong> → ✅ Support <em>sequence</em> numbers (default: 10, 20, 30 …) <em>sequence</em> numbers (default<ul>
<li>You can <strong>insert</strong> a rule at a specific number.</li>
<li>You can <strong>remove</strong> a rule using its number (<code>no 15</code>).</li>
<li>You can <strong>re-</strong><em><strong>sequence</strong></em> to clean up numbering (<code>ip access-list resequence NAME 10 10</code>).</li>
</ul>
</li>
</ul>
<pre><code class="lang-php">ip access-<span class="hljs-keyword">list</span> standard BLOCK-PC
  <span class="hljs-number">10</span> deny host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>
  <span class="hljs-number">20</span> permit any
</code></pre>
<pre><code class="lang-php">ip access-<span class="hljs-keyword">list</span> standard BLOCK-PC
  <span class="hljs-number">15</span> deny host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.20</span>
</code></pre>
<h2 id="heading-standard-access-list-lab">Standard Access-List lab</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/63d643ff-0c94-4fc3-8c7d-8b7b0c85578f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we are using standard access lists to perform the following network traffic control tasks:</p>
<ul>
<li><strong>Block</strong> <strong>PC1</strong> from accessing SRV1 (using a numbered standard access list).</li>
<li><strong>Allow</strong> only <strong>PC3</strong> to access SRV2 (using a named standard access list).</li>
</ul>
<h2 id="heading-basic-ip-configuration-2">Basic IP Configuration</h2>
<h3 id="heading-end-user-devices">End-User Devices</h3>
<pre><code class="lang-javascript">PC1&gt;ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span>

PC2&gt;  ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span>


PC3&gt;ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>  <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span>

PC4&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span>
</code></pre>
<h3 id="heading-routerr1">Router(R1)</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa1/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#int fa2/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#int fa0/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-router-r2">Router (R2)</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa0/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shut
R2(config)#int fa1/<span class="hljs-number">0</span> 
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span>  <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shut
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#int fa2/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shut
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h3 id="heading-server">Server</h3>
<pre><code class="lang-javascript">SRV1&gt; ip <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span> 


SRV2&gt; ip <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>  <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span>
</code></pre>
<h2 id="heading-ospf-configuration-2">OSPF Configuration</h2>
<h3 id="heading-router-r1">Router R1</h3>
<pre><code class="lang-javascript">R1#conf t    
R1(config)#
R1(config)#router ospf <span class="hljs-number">1</span>
R1(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> area <span class="hljs-number">0</span>
R1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R1(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
R1(config-router)#passive-interface fa2/<span class="hljs-number">0</span>
R1(config-router)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-router-r2-1">Router R2</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)# 
R2(config)#router ospf <span class="hljs-number">1</span>
R2(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> area <span class="hljs-number">0</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>  <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>  <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R2(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
R2(config-router)#passive-interface fa2/<span class="hljs-number">0</span>
R2(config-router)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-access-list-configuration">Access List Configuration</h2>
<blockquote>
<p>💡 Standard Access List uses the source IP address. It is <strong>highly recommended that it be applied to the router near the destination if the destination is under your control.</strong></p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f488e23f-c513-4019-a626-7102a16ba2d8.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R2#conf t
R2(config)# access-list <span class="hljs-number">1</span> deny <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>  
**R2(config)# access-list <span class="hljs-number">1</span> permit any**  
R2(config)#int fa1/<span class="hljs-number">0</span>    
R2(config-<span class="hljs-keyword">if</span>)#ip access-group <span class="hljs-number">1</span> out
R2(config-<span class="hljs-keyword">if</span>)#exit 

R2(config)#ip access-list standard allow_SRV1
R2(config-std-nacl)#permit <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
R2(config-std-nacl)#exit
R2(config)#int fa2/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip access-group allow_SRV1  out
R2(config-<span class="hljs-keyword">if</span>)#exit 
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-important-the-permit-any-rule-is-essential"><strong>Important: The permit any rule is essential</strong></h2>
<p>By default, the access list ends with a hidden '<strong>deny any role</strong>' entry. We use the command below to permit other devices.</p>
<pre><code class="lang-javascript">**R2(config)# access-list <span class="hljs-number">1</span> permit any**
</code></pre>
<h2 id="heading-access-list-verification">Access List verification</h2>
<pre><code class="lang-javascript">R2#show access-list
</code></pre>
<p>This command is useful for verifying whether your access lists are working properly. It shows you how <strong>many packets matched</strong> each <strong>rule</strong> in your configuration.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e218decd-9386-48c8-b7ef-1c03a8b4e206.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/416ae9ff-c84c-443b-b5d3-2361fb0ea2c3.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-extended-acess-list">Extended Acess-List</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2db3de43-d158-4f12-b703-6db367a20cbc.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we are using extended  access lists to perform the following network traffic control tasks:</p>
<ul>
<li><strong>Block</strong> <strong>Sales Department</strong> from accessing <strong>ACCWeb-SER01</strong> (using a numbered extended  access list).</li>
<li><strong>Block</strong> <strong>Accounting Department</strong> from accessing <strong>SalesWeb-SER01</strong> (using a named standard access list).</li>
<li>Accounting PCs <strong>couldn’t</strong> access Sales PCs.</li>
</ul>
<h2 id="heading-basic-ip-configuration-3">Basic IP Configuration</h2>
<h3 id="heading-end-user-devices-1">End-User Devices</h3>
<pre><code class="lang-javascript">SalesPC<span class="hljs-number">-01</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>


SalesPC<span class="hljs-number">-02</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.3</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<pre><code class="lang-javascript">ACCPC<span class="hljs-number">-01</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
ACCPC<span class="hljs-number">-01</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.3</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-routersluhq">Router(SLU_HQ)</h3>
<pre><code class="lang-javascript">SLU_HQ#conf t
SLU_HQ(config)#
SLU_HQ(config)#int fa1/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
SLU_HQ(config-<span class="hljs-keyword">if</span>)#no shut
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#int fa0/<span class="hljs-number">0</span> 
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#no shut
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#int fa2/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#no shut
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<h3 id="heading-router-dcr01">Router (DC_R01)</h3>
<pre><code class="lang-javascript">DC_R01#conf t 
DC_R01(config)#int fa2/<span class="hljs-number">0</span>
DC_R01(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
DC_R01(config-<span class="hljs-keyword">if</span>)#no shut
DC_R01(config-<span class="hljs-keyword">if</span>)#exit

DC_R01(config)#int fa0/<span class="hljs-number">0</span>
DC_R01(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DC_R01(config-<span class="hljs-keyword">if</span>)#no shut
DC_R01(config-<span class="hljs-keyword">if</span>)#exit

DC_R01(config)#int fa1/<span class="hljs-number">0</span>         
DC_R01(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
DC_R01(config-<span class="hljs-keyword">if</span>)#no shut
DC_R01(config-<span class="hljs-keyword">if</span>)#exit
DC_R01(config)#exit
DC_R01#wr
</code></pre>
<h2 id="heading-rip-configuration">RIP Configuration</h2>
<h3 id="heading-routersluhq-1">Router(SLU_HQ)</h3>
<pre><code class="lang-javascript">DC_R01#conf t                       
DC_R01(config)#router rip
DC_R01(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.0</span>
DC_R01(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>  
DC_R01(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>
DC_R01(config-router)#no auto-summary 
DC_R01(config-router)#version <span class="hljs-number">2</span>
DC_R01(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
DC_R01(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
DC_R01(config-router)#exit
DC_R01(config)#exit
DC_R01#wr
</code></pre>
<h3 id="heading-router-dcr01-1">Router (DC_R01)</h3>
<pre><code class="lang-javascript">SLU_HQ#conf t
SLU_HQ(config)#
SLU_HQ(config)#router rip
SLU_HQ(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.0</span>
SLU_HQ(config-router)#network <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>
SLU_HQ(config-router)#network <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>
SLU_HQ(config-router)#no auto-summary 
SLU_HQ(config-router)#version <span class="hljs-number">2</span>
SLU_HQ(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
SLU_HQ(config-router)#passive-interface fa2/<span class="hljs-number">0</span>
SLU_HQ(config-router)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<h2 id="heading-access-list-configuration-1">Access List Configuration</h2>
<blockquote>
<p>💡 Extended Access List is <strong>highly recommended to be applied to the router nearest the source.</strong></p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c46c4afe-5479-45f9-b5e6-c9f9769e19e4.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">SLU_HQ(config)#access-list <span class="hljs-number">101</span> deny tcp <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> host <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> eq <span class="hljs-number">80</span>

SLU_HQ(config)#access-list <span class="hljs-number">101</span> deny ip <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>

SLU_HQ(config)#access-list <span class="hljs-number">101</span> **permit ip any any**

SLU_HQ(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip access-group <span class="hljs-number">101</span> <span class="hljs-keyword">in</span>

SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<pre><code class="lang-javascript">SLU_HQ(config)#ip access-list extended  Acc_Rules 
SLU_HQ(config-ext-nacl)#deny tcp <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> host <span class="hljs-number">10.0</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> eq <span class="hljs-number">80</span>
SLU_HQ(config-ext-nacl)#deny ip <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
SLU_HQ(config-ext-nacl)#**permit ip any any**
SLU_HQ(config-ext-nacl)#exit
SLU_HQ(config)#int fa2/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip access-group Acc_Rules <span class="hljs-keyword">in</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<blockquote>
<p>💡 By default, the access list ends with an implicit <strong><code>deny any</code></strong>. We use the command <strong><code>permit ip any any</code></strong> to allow traffic from all other devices.</p>
</blockquote>
<h2 id="heading-access-list-verification-1">Access List verification</h2>
<pre><code class="lang-javascript">R2#show access-list
</code></pre>
<p>This command is very useful for verifying if your access lists are working and tells you how <strong>many packets matched</strong> each <strong>rule</strong>.</p>
<h3 id="heading-before-applying-the-extended-access-list">Before applying the extended access list</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d208c1fd-c2a0-4a4e-9c8e-d3e373398e78.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-after-applying-the-extended-access-list">After applying the extended access list</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3b132a1d-121b-450b-a4e4-cf14e853268a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6c32a3d2-19fb-4a5f-93b8-2c7a850418ee.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-access-list-questions">Access List Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/65ada921-df1c-40bd-86fe-4e490970487b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>FastEthernet0/1</strong> = LAN interface,  DHCP uses <strong>UDP</strong> 
Between A and D </p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfc90a98-d694-45b7-ba1e-c6f9b12da0c6.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>The ACL has a line: <code>deny ip any 10.20.1.0 0.0.0.255</code></li>
<li>That line blocks <strong>all traffic</strong> to the entire 10.20.1.0/24 network.</li>
<li>SSH permit (<code>permit tcp any 10.20.1.0 0.0.0.127 eq 22</code>) is written <strong>after</strong> it, but ACLs work <strong>top-down</strong></li>
</ul>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3484b5ef-560d-4843-beec-4cd3ced738d5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/390011c8-510b-452f-944a-1504db434957.png" alt="CCNA 200-301 Study (1)" /></p>
<p>between A and D:
To restrict <strong>VTY</strong> (remote CLI) access, you must use <strong><code>access-class</code></strong> under the VTY lines, not <code>access-group</code> (that’s for interfaces).</p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f9b71dc1-9860-486b-90ae-03951e7906a9.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Best way: <strong>add one line</strong> to the ACL with a <em>sequence</em> number for efficiency.<em>sequence</em> number for efficiency</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0ba8b21b-f4dd-4524-8bf3-643e4c8cf998.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>CB ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a4d5f9c3-7d54-4396-b64a-4e136b0ef2b2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B E ✅</strong></p>
<p><strong>B. A matching permit statement is too broadly defined</strong> ✅</p>
<ul>
<li>Example: <code>permit ip any any</code>.</li>
<li>This will match all packets immediately and allow everything.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5e8ea250-042d-4ce5-a7a6-f3009ec455e6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Add</strong> <strong><code>permit ip any any</code></strong> <strong>at the end</strong> – without a final permit, the implicit deny would block all other traffic. This line allows everything else after the specific denies.</p>
<p> <strong>Swap source and destination in ACL 101</strong> – the denies are written with <strong>source = 10.0.20.0/26</strong> and <strong>destination = 10.0.10.0/26</strong>, but we need to block traffic <strong>from 10.0.10.0/26 to 10.0.20.0/26</strong> on ports 25 and 80. So the addresses must be reversed.</p>
<p><strong>AD ✅</strong></p>
<h2 id="heading-securing-cisco-devices">Securing Cisco Devices</h2>
<h1 id="heading-security-planes">Security Planes</h1>
<p><strong>Management Plane:</strong> The management plane is used to access, configure, manage, and monitor a network device. (This phase is about securing network  devices)</p>
<p><strong>Control Plane:</strong> The Control Plane consists of the protocols and processes that communicate between network devices in order to move data from source to destination. This includes routing protocols such as BGP, OSPF, and signaling protocols. (<strong>Responsible for building and maintaining the routing and switching tables</strong>.) In this phase, you can control which devices are allowed to receive OSPF updates.</p>
<p><strong>Data plane:</strong> The data plane <strong>is responsible for transferring data from the source to the destination**</strong>.** This is where most data packets flow within the network device. (This phase is about securing user data moved across a network.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/56d7ed50-0908-4c37-bdc3-9e43235b0a73.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e1a434f7-b00f-4d3c-87d2-48d2e9cdadb3.png" alt="CCNA 200-301 Study (1)" /></p>
<p> Data plane function (switch tagging/untagging VLANs)</p>
<p>Data plane (switch forwarding decision).
<strong>CD✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b1eeb041-9fbd-4a24-aeaa-7475b28c6064.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b4729776-226a-440f-b833-8a714c2311c3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Control plane</strong> → Handles routing protocols, builds routing tables, and makes forwarding decisions.
<strong>D✅</strong></p>
<h1 id="heading-aaa-servers">AAA Servers</h1>
<ul>
<li>AAA Server is a server that provide<strong>s three important functions for network security</strong>: <strong>Authentication</strong>, <strong>Authorization</strong>, and <strong>Accounting</strong>  (AAA). You can easily change/enable/disable account passwords, enforce strong password policies, and monitor account usage and user access.</li>
</ul>
<p><strong>Authentication:</strong> This is a process of <strong>verifying the identity of a user or a device</strong> attempting to access network resources.  </p>
<p><strong>Authorization:</strong> This is the process of <strong>determining what resources and services a user or device is allowed</strong> to access after authentication. </p>
<p><strong>Accounting:</strong> This is the process of <strong>tracking user activity</strong> on a network.</p>
<h2 id="heading-the-benefit-of-using-an-aaa-server">The benefit of using an AAA server</h2>
<p><strong>Improve  Security:</strong> By centralizing authentication and authorization, an AAA server can help to improve the security of a network <strong>by reducing the risk of unauthorized access.</strong></p>
<p>I<strong>ncreased Scalability:</strong> AAA servers can be <strong>scaled</strong> to support large networks.</p>
<p><strong>Reduced Administrative overhead:</strong> AAA Server can help to <strong>reduce administrative overhead</strong> by automating the process of authenticating and authorizing users. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/763968f7-270c-496e-a9d2-6d8537ef73d6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><code>aaa new-model</code> is the <strong>master command</strong> that turns on AAA (Authentication, Authorization, and Accounting) on a Cisco device.
<strong>A✅</strong></p>
<h1 id="heading-aaa-external-server">AAA External Server</h1>
<ul>
<li>Radius Server</li>
<li>LDAP Server</li>
<li>Active-Directory Server</li>
<li>TACACS+ Server</li>
<li>Cisco Secure Access Control Server (ACS)</li>
<li>Microsoft Active Directory</li>
<li>Juniper Networks Contrail Access Control</li>
<li>F5 BIG-IP Access Policy Manager (APM)</li>
<li>Aruba ClearPass Policy Manager</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Feature</strong></td><td><strong>TACACS+</strong></td><td><strong>RADIUS</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Developed by</td><td>Cisco</td><td>Livingston Enterprises</td></tr>
<tr>
<td>Supports</td><td>Authentication and authorization</td><td>Authentication only</td></tr>
<tr>
<td>Transport protocol</td><td>TCP</td><td>UDP</td></tr>
<tr>
<td>Packet encryption</td><td>All packets are encrypted</td><td>Only the password is encrypted</td></tr>
<tr>
<td>Command authorization</td><td>Supported</td><td>Not supported</td></tr>
</tbody>
</table>
</div><h1 id="heading-apply-tacacs">Apply TACACS+</h1>
<h2 id="heading-aaa-server-lab">AAA Server LAB</h2>
<p>In this scenario, we will create an AAA server and generate a username and password. After preparing the AAA server, we will apply the AAA configuration to the router. Consequently, when a device attempts to access the router, it should be authorized by requiring the entry of a username and password.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/14c5bdeb-7c03-449e-a436-ce19bb03fed1.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-configuring-aaa-service-on-the-server">Configuring AAA Service on the server</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3ceac4a0-fdad-41af-a06b-760288611eb8.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-network-configuration-section">Network Configuration Section</h3>
<p><strong>Client Name:</strong> Name of the device to which you want to apply AAA rules. </p>
<p><strong>Client IP:</strong> the IP address of the client, in this case, I added the IP address of the router.</p>
<p><strong>Server Type: S</strong>elect which type of server you need.</p>
<h3 id="heading-user-setup">User Setup</h3>
<p>Add your username and password as required. </p>
<h1 id="heading-configuring-tacacs-aaa-server-on-a-router">Configuring TACACS+ AAA Server on A router</h1>
<pre><code class="lang-javascript">Router# Config terminal 
Router(config)# enable secret (your password)  <span class="hljs-comment">//create first password </span>
Router(config)#aaa <span class="hljs-keyword">new</span>-model  <span class="hljs-comment">//enable the aaa service </span>
Router(config)# aaa authentication login myauth[your name] group tacacs+ enable 
Router(config)# tacacs-server host <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>(server IP) key mykey (key generated at the server side) 

Router(config)# line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span> 
Router(config)#login authentication myauth[your name] <span class="hljs-comment">//Apple AAA authentication to VTY lines(Telnet,SSh etc) </span>
Router(config)#exit

Router(config)# line vty <span class="hljs-number">0</span>   <span class="hljs-comment">/// by using this command you can apply AAA configuration to console port </span>
Router(config-line)# login authentication <span class="hljs-keyword">default</span>
</code></pre>
<pre><code class="lang-javascript">**R1#show aaa sessions**
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cce7df50-d3f5-4531-a454-99967cadb00a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we have access to the router from two different users on two different devices.</p>
<h1 id="heading-configuring-radius-aaa-server-on-a-router">Configuring Radius AAA Server on A router</h1>
<p>We have the same scenario with the same approach, but some of the commands have changed </p>
<pre><code class="lang-javascript">Router# Config terminal 
Router(config)# enable secret (your password)  <span class="hljs-comment">//create first password </span>
Router(config)#aaa <span class="hljs-keyword">new</span>-model  <span class="hljs-comment">//enable the aaa service </span>
Router(config)# aaa authentication login myauth[your name] group **radius** enable 
**Router(config)# radius server  iserver(yourname)(key generated at the server side) 
R1(config-radius-server)#address ipv4  host <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>(server IP)
R1(config-radius-server)#key  mykey (key generated at the server side)** 
Router(config)# line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span> 
Router(config-line)#login authentication myauth[your name] <span class="hljs-comment">//Apple AAA authentication to VTY lines(Telnet,SSh etc) </span>
Router(config)#exit

Router(config)# line vty <span class="hljs-number">0</span>   <span class="hljs-comment">/// by using this command you can apply AAA configuration to console port </span>
Router(config-line)# login authentication <span class="hljs-keyword">default</span>
</code></pre>
<h1 id="heading-use-local-accounts">Use Local Accounts</h1>
<ul>
<li>If you can’t install and use an external AAA server as discussed in the previous section, at a bare minimum, create separate local accounts for anyone who will give access to your device</li>
</ul>
<pre><code class="lang-javascript">Router# config terminal 

Router(config)# username admin(write your user) secret admin122 (write your password)
</code></pre>
<p>to encrypt the password with a very secure algorithm, SHA1</p>
<pre><code class="lang-javascript">Switch(config)#username rebar algorithm-type sha256 secret cisco
</code></pre>
<blockquote>
<p>💡 If line vty 0 4 is configured for the AAA server, we should change the configuration </p>
</blockquote>
<pre><code class="lang-javascript">Router(config-line)#login authentication myauth[your name]

to 

Router(config-line)#login local
</code></pre>
<h1 id="heading-maximum-failed-attempts">Maximum Failed Attempts</h1>
<ul>
<li>To avoid brute-force password attacks on the devices, you can configure a maximum number of failed login attempts so that a user will be locked out after their threshold.</li>
</ul>
<pre><code class="lang-javascript">Router# config terminal 
Router(config)#login block-<span class="hljs-keyword">for</span> &lt;block-time-period&gt; attempts &lt;fail-attempts&gt; within &lt;login-attempt-time-period&gt;
</code></pre>
<p><strong>:</strong> Time to block login (sec)</p>
<p><strong>:</strong> number of login attempts</p>
<p><strong>&lt;login-attempt-time-period</strong>: Time to watch for login Attempt</p>
<p><strong>Example:</strong> If a login 3 times in 60 seconds, the user will be prevented from logging in for 120 seconds.</p>
<pre><code class="lang-javascript">Router(config)#login block-<span class="hljs-keyword">for</span> <span class="hljs-number">120</span> attempts <span class="hljs-number">3</span> within <span class="hljs-number">60</span>
</code></pre>
<p>This feature is applied to the local account.pkt</p>
<h2 id="heading-ip-service-device-management">IP Service - Device Management</h2>
<h1 id="heading-ntpnetwork-time-protocol-server">NTP(Network Time Protocol) Server</h1>
<p><strong>Internal System Clock</strong>: It is a software-based clock that relies on the device’s CPU and internal timer to keep track of time.</p>
<ul>
<li>The system clock retains the current time only while the device is <strong>powered on</strong>, <strong>once the router reboots, it resets</strong>.</li>
<li>If the router doesn’t have a backup hardware clock, it may default to <strong>reference time(00:00 on January 1, 1970) after rebooting</strong>.</li>
</ul>
<h2 id="heading-a-synchronized-clock-is-crucial-for-a-network-device-for-several-reasons">A synchronized clock is crucial for a network device for several reasons:</h2>
<ul>
<li><strong>Logging and Troubleshooting:</strong> Network devices generate log messages (Syslog) for events such as configuration changes, errors, and network incidents. Accurate timestamps are essential to <strong>understand the order and timing of these events</strong>.</li>
<li><strong>Security(Authentication and Encryption):</strong> Security protocols, such as IPsec and SSL/TLS, rely on synchronized clocks to function correctly.</li>
<li><strong>Compliance:</strong> Many industries have regulatory requirements( Such as PCI DSS) that <strong>mandate accurate timekeeping for logging and auditing</strong>.</li>
<li><strong>Time-Based Access Lists:</strong> Some devices may be configured with time-based access list or firewall rules that allow or deny traffic <strong>based on the time of the day</strong>.</li>
<li><strong>Network Automation: S</strong>ome devices rely on the clock for scheduling tasks like backups. configuration updates.</li>
</ul>
<h2 id="heading-time-configuration">Time configuration</h2>
<p><strong>Software Clock</strong>: the clock the router uses to timestamp logs, routing updates, and other software events. Stored in <strong>RAM</strong> and managed by the operating system.</p>
<p><code>clock set</code> command is used to update software clock.</p>
<p><code>clock read calendar</code> command is used to update software clock from hardware clock. 
<code>show clock</code>  command is used to view the current time of the device.</p>
<p><code>show clock detail</code>   command is used to view the device's current time with the time source.</p>
<pre><code class="lang-javascript">C7200#clock set HH:MM:SS MONTH DAY YEAR
C7200#clock set <span class="hljs-number">10</span>:<span class="hljs-number">45</span>:<span class="hljs-number">30</span> <span class="hljs-number">17</span> Apr <span class="hljs-number">2024</span>

C7200#show clock detail
<span class="hljs-number">10</span>:<span class="hljs-number">45</span>:<span class="hljs-number">51.871</span> UTC Wed Apr <span class="hljs-number">17</span> <span class="hljs-number">2024</span>
Time source is **user configuration**  

C7200#clock read-calendar
C7200#show clock detail 
<span class="hljs-number">09</span>:<span class="hljs-number">20</span>:<span class="hljs-number">51.783</span> UTC Thu Apr <span class="hljs-number">17</span> <span class="hljs-number">2025</span>
Time source is hardware calendar
</code></pre>
<p><strong>Hardware Clock</strong>: A battery-powered clock that runs independently of the router’s OS. Inside the hardware(Real Time clock Chip).</p>
<p> <code>calendar set</code> command is used to update the hardware clock. </p>
<pre><code class="lang-javascript">C7200#calendar set <span class="hljs-number">14</span>:<span class="hljs-number">35</span>:<span class="hljs-number">00</span> <span class="hljs-number">27</span> Dec <span class="hljs-number">2020</span>

C7200#show calendar
<span class="hljs-number">14</span>:<span class="hljs-number">35</span>:<span class="hljs-number">07</span> UTC Sun Dec <span class="hljs-number">27</span> <span class="hljs-number">2020</span>
</code></pre>
<p><code>clock update-calendar</code> command is used to update hardware clock from software clock. </p>
<blockquote>
<p>💡  <code>calendar set</code> <code>clock update-calendar</code>  aren't working on emulators like GNS3, EVE-Ng.  </p>
</blockquote>
<h3 id="heading-updating-time-zone">Updating Time zone</h3>
<pre><code class="lang-javascript">Router(config)# clock timezone &lt;ZONE_NAME&gt; <span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">UTC_OFFSET</span>&gt;</span></span>
</code></pre>
<ul>
<li><code>&lt;ZONE_NAME&gt;</code> – Just a <strong>label</strong> you define (e.g., <code>IRAQ</code>, <code>Baghdad</code>, or anything).</li>
<li><code>&lt;UTC_OFFSET&gt;</code> – Offset in <strong>hours</strong> from UTC. Use <strong>positive numbers</strong> for time ahead of UTC (like Iraq), and <strong>negative</strong> for behind.</li>
</ul>
<pre><code class="lang-javascript">C7200(config)#clock timezone Iraq <span class="hljs-number">3</span>
</code></pre>
<h2 id="heading-ntp-network-time-protocol">NTP (Network Time Protocol)</h2>
<p><strong>Network Time Protocol</strong> is an application layer protocol for time synchronization between TCP/IP network hosts.</p>
<ul>
<li>NTP clients request the time from NTP servers.</li>
<li>A device can be an NTP Server and an NTP client at the same time.</li>
<li>NTP uses UDP <strong>port 123</strong> to communicate.</li>
<li>Cisco devices can operate in three NTP modes: <strong>Server mode, Client mode, and Symmetric mode(Devices can also ‘peer’ with devices at the same stratum to provide more accurate time)</strong>.</li>
<li>You can either configure an <strong>internal or external NTP server</strong> (there are several public NTP servers that you can use as well)</li>
</ul>
<h3 id="heading-reference-clock">Reference Clock</h3>
<p>Reference Clock is usually a very accurate time device, like an atomic clock or a GPS clock </p>
<ul>
<li>Reference clocks are <strong>stratum 0</strong> within the NTP hierarchy.</li>
<li>NTP Servers directly connected to reference clocks are <strong>Stratum 1,</strong> also called <strong>primary servers.</strong></li>
<li>An NTP client can sync to multiple NTP servers.</li>
<li></li>
</ul>
<p><img src="https://cdn.networkacademy.io/sites/default/files/2024-10/cisco-ntp-stratums.svg" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">t1# config terminal
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.0</span> prefer
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.4</span>
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.8</span>
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.12</span>
</code></pre>
<p>If you don't use the <code>prefer</code> keyword, you can configure the Cisco IOS to automatically select the most suitable NTP server.</p>
<pre><code class="lang-javascript">Router# show ntp associations
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6119ac49-4d5e-47de-a228-c5dbd5e5e037.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1#show ntp status
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5144b699-d8a4-4e56-bd2a-422318366f80.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-configuring-ntp-server-mode">Configuring NTP server mode</h3>
<pre><code class="lang-javascript">R2(config)#ntp server <span class="hljs-number">10.0</span><span class="hljs-number">.12</span><span class="hljs-number">.1</span> (R1 configured <span class="hljs-keyword">as</span> a client, receive NTP updates <span class="hljs-keyword">from</span> <span class="hljs-number">10.0</span><span class="hljs-number">.12</span><span class="hljs-number">.1</span>)
</code></pre>
<h3 id="heading-configuring-ntp-symmetric-active-mode">Configuring NTP symmetric active mode</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9d55001e-c8e1-484e-862a-f8472c542e74.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-simple-network-management-protocolsnmp">Simple Network Management Protocol(SNMP)</h1>
<ul>
<li><strong>SNMP</strong> is an <strong>Application Layer protocol</strong> used for <strong>monitoring and managing network devices</strong> like routers, switches, servers, printers, etc.</li>
<li><strong>SNMP Agent</strong> = UDP 161 <strong>SNMP Manager</strong> = UDP 162</li>
</ul>
<h2 id="heading-key-components-of-snmp">Key Components of SNMP</h2>
<ol>
<li><strong>SNMP Manager</strong><ul>
<li>A central system that collects and processes data from devices.</li>
<li>Usually, a <strong>Network Management System (NMS)</strong>.</li>
</ul>
</li>
<li><strong>SNMP Agent</strong><ul>
<li>Software running on network devices.</li>
<li>Responds to requests from the SNMP Manager.</li>
</ul>
</li>
<li><strong>MIB (Management Information Base)</strong><ul>
<li>A database on the agent side.</li>
<li>Stores variables that the manager can query or set (e.g., CPU load, interface status).</li>
</ul>
</li>
</ol>
<h2 id="heading-how-snmp-works">How SNMP Works</h2>
<ul>
<li>The manager sends <strong>GET</strong> requests to retrieve information.</li>
<li>Agents respond with the requested data.</li>
<li>Agents can also send <strong>TRAPs</strong> (unsolicited alerts) when something critical happens (e.g., interface down).</li>
</ul>
<blockquote>
<p>💡 Trap:  A notification is sent from the agent to the manager. The manager does not send a Response message to acknowledge that it received the Trap, so these messages are ‘unreliable’.</p>
</blockquote>
<h3 id="heading-snmp-commands">SNMP Commands</h3>
<ul>
<li><code>GET</code>: Retrieve one value.</li>
<li><code>GET-NEXT</code>: Retrieve the next value in MIB.</li>
<li><code>SET</code>: Change a value.</li>
<li><code>TRAP</code>: Agent to Manager notification.</li>
</ul>
<h3 id="heading-real-world-example">Real-World Example</h3>
<p>A network admin wants to monitor a switch’s port status:</p>
<ol>
<li>The NMS sends a <strong>GET</strong> request for the interface status OID.</li>
<li>The switch’s SNMP agent replies with the port status (e.g., up/down).</li>
<li>If a port goes down unexpectedly, the agent sends a <strong>TRAP</strong> to the NM</li>
</ol>
<h1 id="heading-syslog">Syslog</h1>
<p>Syslog stands for <strong>System Logging Protocol</strong>. It’s used by <strong>network devices</strong> (routers, switches, firewalls, etc.) to s<strong>end log messages</strong> about their <strong>operational status, errors, and system events</strong> to a central server called a Syslog server.</p>
<ul>
<li>The messages can be displayed in the CLI, saved in the device’s RAM, or sent to an external Syslog server.</li>
<li><strong>Syslog and SNMP</strong> are both used for monitoring and troubleshooting of devices. They are complementary, but their functionalities are different.</li>
</ul>
<h3 id="heading-syslog-message-format">Syslog Message Format</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6cbba85f-da98-4bd4-8c6b-6370db9db49f.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">*Feb <span class="hljs-number">11</span> <span class="hljs-number">03</span>:<span class="hljs-number">02</span>:<span class="hljs-number">55.304</span>: %LINK<span class="hljs-number">-3</span>-UPDOWN: Interface GigabitEthernet0/<span class="hljs-number">0</span>, changed state to up
</code></pre>
<h3 id="heading-syslog-severity-levels">Syslog Severity Levels</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Level Number</td><td>Name</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>0</td><td><strong>Emergency</strong></td><td>System is unusable</td></tr>
<tr>
<td>1</td><td><strong>Alert</strong></td><td>Immediate action needed</td></tr>
<tr>
<td>2</td><td><strong>Critical</strong></td><td>Critical condition</td></tr>
<tr>
<td>3</td><td><strong>Error</strong></td><td>Error condition</td></tr>
<tr>
<td>4</td><td><strong>Warning</strong></td><td>Warning condition</td></tr>
<tr>
<td>5</td><td><strong>Notification</strong></td><td>Normal but significant event</td></tr>
<tr>
<td>6</td><td><strong>Informational</strong></td><td>Informational messages</td></tr>
<tr>
<td>7</td><td><strong>Debugging</strong></td><td>Debugging messages</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>E</strong>very <strong>A</strong>wesome <strong>C</strong>isco <strong>E</strong>ngineer <strong>W</strong>ill  <strong>N</strong>eed <strong>I</strong>ce cream <strong>D</strong>aily </p>
</blockquote>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>Syslog</td><td>SNMP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Purpose</strong></td><td>Logs events and system messages</td><td>Monitors and manages network devices</td></tr>
<tr>
<td><strong>Direction</strong></td><td>Mostly <strong>device → server</strong> (one-way)</td><td><strong>Manager ↔ Agent</strong> (two-way communication)</td></tr>
<tr>
<td><strong>Data Type</strong></td><td>Text-based messages (logs)</td><td>Structured data (counters, statuses, configs)</td></tr>
<tr>
<td><strong>Event Reporting</strong></td><td>Sends alerts automatically (logs)</td><td>Sends info when polled or traps when event occurs</td></tr>
<tr>
<td><strong>Security</strong></td><td>Basic (unless combined with secure transport)</td><td>SNMPv3 offers encryption and authentication</td></tr>
</tbody>
</table>
</div><h3 id="heading-syslog-configuration">Syslog Configuration</h3>
<pre><code class="lang-javascript">R1(config)# logging [server-ip]
R1(config)# logging <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span>
or 
R1(config)# logging host [server-ip]
R1(config)# logging host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span>
</code></pre>
<ul>
<li>By default, logging messages displayed in the CLI while you are in the middle of typing a command will result in something like this:</li>
</ul>
<pre><code class="lang-javascript">R1#show ip <span class="hljs-keyword">in</span>
*Feb <span class="hljs-number">11</span> <span class="hljs-number">09</span>:<span class="hljs-number">38</span>:<span class="hljs-number">41.607</span>: %SYS<span class="hljs-number">-5</span>-CONFIG_I: Configured <span class="hljs-keyword">from</span> <span class="hljs-built_in">console</span> by Rebar on
consoleterface brief
</code></pre>
<p>To prevent this, you should use the logging synchronous on the appropriate line.</p>
<pre><code class="lang-javascript">R1(config)# no logging synchronous
</code></pre>
<h2 id="heading-ftp-vs-tfp">FTP vs TFP</h2>
<p><strong>File Transfer Protocol</strong>: is a communications protocol used to send files from computer to computer, with one of them acting as the server.</p>
<p><strong>TFTP(Trivial File Transfer Protocol)</strong> is a simplified version of FTP, it is designed to be easy and simple.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/10649915-fcf8-4f5e-ae36-d225d5d92d4d.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-security-architecture">Security Architecture</h2>
<h2 id="heading-security-principles-cia"><strong>Security Principles CIA</strong></h2>
<ul>
<li>Data <strong>confidentiality</strong> prevents the disclosure of information to <strong>unauthorized people</strong>, resources, or processes. It may require using cryptographic encryption algorithms such as AES to encrypt and decrypt data.</li>
<li>Data <strong>integrity</strong> refers to the accuracy and consistency of data, ensuring that data is <strong>not tampered with by unauthorized users</strong>. It requires the use of cryptographic hashing algorithms such as SHA.</li>
<li>Data <strong>availability</strong> ensures that <strong>information is accessible by authorized users</strong> when needed. It requires implementing redundant services, gateways, and links.</li>
</ul>
<h2 id="heading-data-states">Data States</h2>
<p>The cyberspace domain contains a considerable amount of critically important data. But in what state? The second dimension of the cybersecurity cube represents the three possible data states:</p>
<ul>
<li>Data <strong>in transit.</strong></li>
<li>Data <strong>at rest</strong> or in storage.</li>
<li>Data <strong>in process</strong>.</li>
</ul>
<h2 id="heading-security-terms">Security Terms</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Term</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Assets</strong></td><td>Anything of value to the organization,</td></tr>
<tr>
<td><strong>Vulnerability</strong></td><td>A weakness in a system or its design that could be exploited by threat hacker.</td></tr>
<tr>
<td><strong>Exploit</strong></td><td>A mechanism that takes advantage of a vulnerability</td></tr>
<tr>
<td><strong>Spoofing</strong></td><td>Impersonating a trusted entity. Fakes identity (IP, MAC, DNS, email, etc.)</td></tr>
<tr>
<td><strong>Sniffing</strong></td><td>Intercepting and monitoring network traffic</td></tr>
<tr>
<td><strong>Mitigation</strong></td><td>The process of taking countermeasures to reduce severity of a potential threat and risk.</td></tr>
</tbody>
</table>
</div><h3 id="heading-the-most-commonly-known-spoofing-attacks-are"><strong>The most commonly known spoofing attacks are:</strong></h3>
<ul>
<li>IP Spoofing,</li>
<li>Email Spoofing,</li>
<li>DNS Spoofing,</li>
<li>ARP Spoofing,</li>
<li>GPS Spoofing</li>
<li>Website Spoofing</li>
<li>MAC Spoofing</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/15b21ec0-bfbb-422c-99e0-daa42773affb.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-denial-of-service-dos-attacks">Denial-of-Service (DOS) Attacks</h2>
<p>A Denial-of-service attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.</p>
<p>The most common DDoS attack occurs in <strong>the network layer (layer 3) and the transport layer(layer 4)**</strong>.** This is because these two layers are responsible for routing traffic and establishing connections between different networks. By flooding the network with traffic, the attacker can overwhelm the network and make it unavailable to legitimate users.</p>
<p><strong>TCP SYN flood.</strong>
→ TCP three-way handshake: <strong>SYN</strong> | <strong>SYN-ACK</strong> | ❌<strong>ACK</strong>
→ The <strong>attacker</strong> sends countless TCP SYN messages to the <strong>target</strong>.
→ The <strong>target</strong> sends a SYN-ACK message in response to each SYN it receives.
→ The <strong>attacker</strong> never replies with the final ACK of the TCP three-way handshake.
→ The incomplete connections fill up the <strong>target’s</strong> TCP connection table.
→ The <strong>attacker</strong> continues sending SYN messages.
→ The target is no longer able to make legitimate TCP connections.</p>
<p><img src="https://www.imperva.com/learn/wp-content/uploads/sites/13/2019/01/syn-flood.jpg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dhcp-exhaustion-attack-spoofing">DHCP exhaustion attack (Spoofing)</h2>
<p>● An attacker uses spoofed MAC addresses to flood DHCP Discover messages.
● The target <strong>server’s DHCP pool</strong> becomes full, resulting in a <strong>denial-of-service to other devices</strong>.</p>
<p><img src="https://robodin.com/wp-content/uploads/2022/09/dhcp1.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-man-in-the-middle-attacks">Man-in-the-middle-attacks</h2>
<p>A man-in-the-middle attack is a type of eavesdropping attack where attackers interrupt an existing conversation or data transfer. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1684d5b2-e294-4339-85e5-62c528e1693c.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-buffer-overflow">Buffer overflow</h2>
<p>A buffer overflow is a type of software security vulnerability that can be exploited by an attacker to gain control of a computer system. It occurs when a program attempts to write more data to a buffer than the buffer can hold. The extra data overwrites adjacent memory locations, which can corrupt data or even crash the program.</p>
<h2 id="heading-malware">Malware</h2>
<p><strong>Malware</strong>, short for <strong>malicious software</strong>, is a software program that is designed to harm a computer system or its users. It can be installed on a computer in a variety of ways, such as clicking on a malicious link, opening an infected attachment, or downloading a file from an untrusted source.</p>
<ul>
<li>A <strong>virus</strong> is malicious software that executes a specific, unwanted, often harmful function on a computer.</li>
<li>A <strong>Trojan horse</strong> is harmful software that is <strong>disguised as legitimate software</strong>. They are spread through user interaction, such as opening email attachments or downloading a file from the Internet.</li>
<li><strong>A worm</strong> executes arbitrary code and installs copies of itself in the memory of the infected compute<strong>r. The main purpose of a worm is to automatically replicate itself and spread across the network from system to system</strong>.</li>
</ul>
<h2 id="heading-human-vulnerability">Human Vulnerability</h2>
<p>Human vulnerability in the IT sector refers to how humans can be exploited by attackers to gain access to system data.</p>
<h3 id="heading-the-most-common-human-vulnerability">The most common Human vulnerability</h3>
<ul>
<li>Phishing</li>
<li>Social Engineering (refers to any attempt to manipulate people into doing something they would not normally do)</li>
<li>Weak password</li>
<li>Poor Security Practices: such as not using a firewall or antivirus software, and not patching software.</li>
</ul>
<h2 id="heading-firewall">Firewall</h2>
<p>In networking, a Firewall is a network device, either hardware or software-based, that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of rules. </p>
<h2 id="heading-intrusion-detection-system-ids">Intrusion Detection System (IDS)</h2>
<p>An intrusion detection system <strong>is a device or software application that monitors network traffic for malicious activity or policy violations.</strong> Any malicious activity or violation is <strong>typically reported or collected centrally</strong> using a security information and event management system.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f9fc43cb-f14b-4d5d-8b4a-a044c0717bd8.webp" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 Unlike IPS, a Network Intrusion Detection System (IDS) is <strong>not in line with the data path, so</strong> it can <strong>only alert and alarm on the detection</strong> of anomalies.</p>
</blockquote>
<h2 id="heading-intrusion-prevention-system-ips">Intrusion Prevention System (IPS)</h2>
<p>An <strong>Intrusion Prevention System</strong> <strong>works to detect and prevent identified threats. The IPS reports these events to system administrators and takes preventative action,</strong> such as closing access points and configuring firewalls to prevent future attacks. IPS solutions can also be used to identify issues with corporate security policies.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2cd7fe99-a248-4934-9c60-5463fab91640.webp" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>Placement and configuration in</strong> <strong>inline mode</strong> <strong>and generally being in layer 2 after the firewall, inline mode traffic passes into one of the device’s Ethernet ports and out of the other</strong> </p>
<p>💡 Intrusion Prevention System <strong>must work efficiently to avoid decreasing network performance.</strong> It must be quick because exploits might occur at any time.</p>
</blockquote>
<h2 id="heading-cisco-next-generation-firewalls">Cisco Next-Generation firewalls</h2>
<ul>
<li><strong>Next-generation firewalls (NGFWs) combine tr**</strong>aditional firewall technology with additional functionality, such as encrypted traffic inspection, intrusion prevention systems, anti-virus, and more. M<strong>ost notably, </strong>it includes deep packet inspection (DPI). While basic firewalls only look at packet headers<strong>**,</strong> deep packet inspection examines the data within the packet itself, enabling users to identify, categorize, or stop packets with malicious data.</li>
</ul>
<h3 id="heading-an-ngfw-typically-has-the-following-features">An NGFW typically has the following features</h3>
<ul>
<li><strong>Traditional Firewall:</strong> such as stateful filtering, NAT, PAT, and VPN termination.</li>
<li><strong>Application visibility and control (AVC):</strong> makes it possible to look deeply into the application layer data to defend against attacks that use random port numbers.</li>
<li><strong>Advanced Malware Protection:</strong> Block file transfers that would install malware and save copies of files for later analysis.</li>
<li><strong>Uniform resource locator(URL):</strong> URL filtering examines the URLs in each web request, categorizes the URLs, and either filters or rate-limits the traffic based on rules.</li>
<li><strong>NGIPS</strong>: Cisco’s NGFW products can also run their NGIPS <strong>Next-Generation Intrusion Prevention System</strong> feature along with the firewall.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5c69c169-ffaf-4afb-bb0a-c7eb823d53b8.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-switch-port-security">Switch Port Security</h2>
<h1 id="heading-what-is-port-security">What is Port Security?</h1>
<ul>
<li>Port Security is a <strong>layer two (layer-2) traffic control feature</strong> on Cisco Switches. It enables switch <strong>port configuration to allow only a specified number of source MAC addresses</strong> to use the port.</li>
<li>An action will be taken if an <strong>unauthorized source MAC address enters the port</strong>. →The default action is to place the interface in an ‘<strong>err-disabled</strong>’ state.</li>
<li>You can configure the <strong>allowed MAC address manually</strong>. →If you don’t configure it manually, the switch will allow the <strong>first source MAC address</strong> that enters the interface.</li>
<li>You can change the <strong>maximum</strong> number of MAC addresses allowed.</li>
</ul>
<h1 id="heading-violation-mode">Violation mode</h1>
<ol>
<li><strong>Protect:</strong> The switch <strong>port will permit traffic from known MAC addresses</strong> to continue sending while <strong>dropping traffic from unknown MAC addresses.</strong></li>
</ol>
<p>→ The interface is not disabled. 
→ It does not generate syslog/SNMP messages for unauthorized traffic.
→ It does not increment the violation counter.</p>
<ol start="2">
<li><strong>Restrict</strong>: T<strong>he switch port will permit traffic from known MAC addresses to continue sending traffic</strong> while <strong>dropping traffic from unknown  MAC addresses.</strong></li>
</ol>
<p>→ The interface is not disabled. 
→ <strong>It generates syslog/SNMP messages for unauthorized traffic.</strong>
→ <strong>It increments the violation counter by 1 for each unauthorized frame.</strong></p>
<ol start="3">
<li><strong>Shut Down:</strong> <strong>The switch port shuts down immediately if unauthorized access is done.</strong></li>
</ol>
<p>→ <strong>It generates syslog/SNMP messages for unauthorized traffic.</strong>
→ <strong>It increments the violation counter by 1 for each unauthorized frame.</strong>
→ The switch port will be placed in the <strong>err-disabled</strong> state ( <em>this state until manually removed by the administrator by performing a (no shutdown) command</em>).</p>
<blockquote>
<p>💡 <strong>Shut down</strong> is a default switch port violation mode.<br /><strong>Errdisbale</strong> is a feature that automatically disables a port on a Cisco Catalyst switch </p>
</blockquote>
<h1 id="heading-enabling-port-security">Enabling Port Security</h1>
<ul>
<li>Port Security can be enabled with default parameters by issuing a single command on an interface.</li>
</ul>
<pre><code class="lang-javascript"><span class="hljs-keyword">switch</span>(config)# interface f0/<span class="hljs-number">3</span> (selected interface)
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)# switchport port-security  (<span class="hljs-keyword">switch</span> port security enabled)
or 
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)# switchport port-security mac-address <span class="hljs-number">000</span>a<span class="hljs-number">.000</span>a<span class="hljs-number">.000</span>a (switchport manually adding mac address)


<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)# switchport port-security violation [mode] (Changing viloation mode shutdown is defualt)  

<span class="hljs-keyword">switch</span># show port-security interface f0/<span class="hljs-number">3</span>
</code></pre>
<h3 id="heading-how-to-reset-an-interface-that-is-disabled-due-to-a-violation-of-port-security"><strong>How to reset an interface that is disabled due to a violation of port security</strong></h3>
<ul>
<li>Disconnect the unauthorized device.</li>
<li>shutdown and then no shutdown the interface</li>
</ul>
<pre><code class="lang-javascript">SW1(config)#interface g0/<span class="hljs-number">1</span>
SW1(config-<span class="hljs-keyword">if</span>)#shutdown
SW1(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h3 id="heading-2-by-using-the-command-below-you-can-reset-your-connection-status-from-down-to-up">2- By using the command below, you can reset your connection status from down to up.</h3>
<pre><code class="lang-javascript">Switch(config)# errdisable recovery cause psecure-violation
Switch(config)#errdisble recovery interval <span class="hljs-number">60</span>
</code></pre>
<p>Please note that this command does not work in Packet Tracer!</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>interval 30</td><td>It means when the port shuts down due to shutdown violation mode recovery the port to upstate after <strong>n</strong> seconds</td></tr>
</thead>
<tbody>
<tr>
<td></td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 Every 5 minutes (by default), all err-disabled interfaces will be re-enabled if err-disable recovery has been enabled for the cause of the interface’s disablement.</p>
</blockquote>
<h1 id="heading-sticky">Sticky</h1>
<p><strong>Switch Port Security with Sticky MAC Addressing</strong> is a Cisco switch feature that allows a port to <strong>dynamically learn MAC addresses</strong> and <strong>automatically convert them to static</strong> secure MAC addresses.</p>
<ul>
<li>For example, if the user provides a <strong>maximum limit of 2 the the first two MAC addresses learned on that port will be placed in the running configuration</strong> after the 2nd learned MAC address. <strong>If the 3rd MAC address wants to access, then the appropriate action will be taken according to the violation mode applied.</strong></li>
</ul>
<pre><code class="lang-javascript">Switch(config)# interface FastEthernet0/<span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)# switchport mode access
Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security
Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security maximum <span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security mac-address sticky [automatically mac address <span class="hljs-keyword">of</span> the first desvice]

or  

Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security mac-address sticky **<span class="hljs-number">000</span>a<span class="hljs-number">.000</span>a<span class="hljs-number">.000</span>a** [<span class="hljs-keyword">static</span> set mac address <span class="hljs-keyword">as</span> sticky]


Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security violation shutdown
</code></pre>
<p>This:</p>
<ul>
<li>Enables port security.</li>
<li>Allows <strong>only 1 MAC address</strong>.</li>
<li>Learns and sticks the MAC of the connected device.</li>
<li>Shuts the port if a violation occurs.</li>
</ul>
<h3 id="heading-tip">🧠 Tip:</h3>
<p>After learning MACs via sticky, you can <strong>save them to the startup config</strong> using:</p>
<pre><code class="lang-javascript">Switch# copy running-config startup-config
</code></pre>
<p>Otherwise, they will be lost on reboot.</p>
<h3 id="heading-mac-address-table">MAC Address Table</h3>
<p>Secure MAC addresses will be added to the MAC address table like any other MAC address.
→ Sticky and Static secure MAC addresses will have a type of STATIC
→ Dynamically-learned secure MAC addresses will have a type of DYNAMIC
→ You can view all secure MAC addresses with <strong>show mac address-table secure</strong> command</p>
<pre><code class="lang-java">SW1#show mac address-table secure
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
<span class="hljs-number">1</span> <span class="hljs-number">000</span>a.<span class="hljs-number">000</span>a.<span class="hljs-number">000</span>a STATIC Gi0/<span class="hljs-number">1</span>
</code></pre>
<h3 id="heading-how-to-remove-the-mac-address-from-the-mac-table-when-it-has-not-been-active-for-a-while">How to remove the MAC address from the MAC table when it has not been active for a while</h3>
<pre><code class="lang-javascript">Switch(config-<span class="hljs-keyword">if</span>)switchport port-security aging time <span class="hljs-number">3</span> (time <span class="hljs-keyword">in</span> minutes)
</code></pre>
<p>After 3 minutes of <strong>inactivity</strong>, <strong>the MAC address was removed from the MAC address table, a</strong>nd then the switch was ready to add another MAC address to the MAC address table.</p>
<blockquote>
<p>💡 By default, secure MAC addresses will not ‘age out’ (Aging Time : 0 mins)</p>
</blockquote>
<h2 id="heading-lab-1">LAB</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dd9520ac-1e00-446c-b982-f45b62c1b69f.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">SW1(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">0</span> 
SW1(config-<span class="hljs-keyword">if</span>)#switchport port-security 
Command rejected: Ethernet0/<span class="hljs-number">0</span> is a dynamic port. 
SW1(config-<span class="hljs-keyword">if</span>)#<span class="hljs-function">switchport mode access 
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport port-security 
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit       
<span class="hljs-title">SW1</span><span class="hljs-params">(config)</span>#exit</span>
</code></pre>
<pre><code class="lang-java">SW1#show port-security <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">e0</span>/0</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/63e94c34-3a61-46d9-835c-0d7536f3fd55.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">SW1#
SW1#<span class="hljs-function">conf t
<span class="hljs-title">SW1</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> eth0/2
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport mode access 
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#<span class="hljs-keyword">switch</span> port-security maximum 1
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport port-security mac-address sticky 0050.7966.68dc
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport port-security violation shutdown</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd770680-fa5a-4f7d-9dcb-a44c7e312731.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">SW1#show port-security
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/71fbca6d-7bca-44c0-a45a-2b0f37c9ffd8.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-dhcp-snooping-and-arp-inspection">DHCP Snooping and ARP Inspection</h1>
<p><strong>DHCP Snooping</strong> is a <strong>security technology</strong> on a <strong>layer 2 network</strong> switch that can <strong>prevent unauthorized DHCP servers from accessing your network</strong>, It is a protection from untrusted hosts that want to become DHCP servers. <strong>DHCP snooping works as protection from man-in-the-middle attacks</strong>. <strong>DHCP itself operates on layer 3</strong> of the OSI model, while <strong>DHCP snooping operates on layer 2</strong> devices to filter the traffic that is coming from DHCP clients.</p>
<ul>
<li>DHCP snooping only <strong>filters DHCP messages</strong>. Non-DHCP messages aren’t affected.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/30af8886-44a5-4c50-a7e6-0c09c07826ed.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dhcp-exhaustion-attack-spoofing-1">DHCP exhaustion attack (Spoofing)</h2>
<p>● An attacker uses spoofed MAC addresses to flood DHCP Discover messages.
● The target <strong>server’s DHCP pool</strong> becomes full, resulting in a <strong>denial-of-service to other devices</strong>.</p>
<p><img src="https://robodin.com/wp-content/uploads/2022/09/dhcp1.webp" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-the-first-step-is-to-trust-the-interface">the first Step is to trust the interface</h3>
<pre><code class="lang-javascript">Switch(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)#ip dhcp snooping trust
</code></pre>
<h3 id="heading-second-step-enable-dhcp-snooping">Second Step Enable DHCP Snooping</h3>
<pre><code class="lang-javascript">Switch(config)#ip  dhcp snooping
Switch(config)#no ip  dhcp snooping information option ( <span class="hljs-keyword">for</span> now disable it)
Switch(config)#ip dhcp snooping vlan <span class="hljs-number">1</span> (select the VLAN you want to apply snooping <span class="hljs-keyword">for</span> now we select Vlan <span class="hljs-number">1</span>)
</code></pre>
<h3 id="heading-third-stage-verification">Third Stage verification</h3>
<pre><code class="lang-javascript">Switch#show ip dhcp snooping
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/03b9184f-f123-4582-b6f3-e1b7e2b81053.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Switch#show ip dhcp snooping binding
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/399009fe-d16b-4892-9826-2ebde2a3c8c2.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Displays a list of IP-to-MAC address bindings dynamically learned via DHCP snooping.</p>
<h1 id="heading-dynamic-arp-inspection">Dynamic ARP Inspection</h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a8566241-1dc3-4f61-b623-18c2371b8620.webp" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>First, PC 1 <strong>checks its ARP table for PC2’s IP address</strong> (10.10.10.100)</li>
<li>If there <strong>is no cache</strong>, PC1 will send <strong>ARP Request</strong> and <strong>broadcast</strong> message (<strong>Source: AAAA.AAAA.AAAA,</strong> <strong>destination: FFFF.FFFF.FFFF</strong>) to all hosts on the same subnet.</li>
<li>All hosts will receive the ARP request, but only PC2 will <strong>reply.</strong> PC2 will send an <strong>ARP reply</strong> containing its own MAC address  (EEEE.EEEE.EEEE).</li>
<li>PC1 receives the <strong>MAC Address</strong> and saves it to <strong>its ARP Table.</strong></li>
</ol>
<h2 id="heading-arp-inspection">ARP Inspection</h2>
<p><strong>Dynamic ARP Inspection</strong> (<strong>DAI</strong>) is a <strong>security feature that rejects invalid and malicious ARP packets(ARP spoofing) .</strong> The feature prevents a class of man-in-the-middle attacks. When DAI is enabled, the switch <strong>drops ARP packets</strong> if the <strong>sender MAC address</strong> and <strong>sender IP address</strong> <strong>do not match any entry in the DHCP snooping bindings database</strong>. </p>
<ul>
<li><strong>DAI</strong> only filters ARP messages. Non-ARP messages aren’t affected.</li>
<li>All ports are <strong>untrusted</strong> by default.
→ Typically, all ports connected to other network devices (switches, routers) should be
configured as <strong>trusted</strong>, while interfaces connected to end hosts should remain <strong>untrusted</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/24eaeb9c-01bf-4034-b23e-09bb466fcd92.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Dynamic ARP Inspection <strong>monitors ARP packets on untrusted ports</strong> and <strong>validates them against a trusted source</strong>, usually the <strong>DHCP snooping binding table</strong>. If an ARP packet is invalid or doesn't match the table, it is dropped.</li>
<li>It relies on <strong>DHCP snooping to verify IP-MAC bindings.</strong></li>
<li>Helps maintain <strong>integrity</strong> in <strong>Layer 2 switched</strong> networks.</li>
</ul>
<p>### 
<strong>Why Do We Need Dynamic ARP Inspection (DAI)?</strong></p>
<p>You may be asking why we need Dynamic ARP Inspection (DAI). In our first example, a rogue peer, PC3, is connected to one of the switch ports. PC3 can send a <strong>Gratuitous ARP</strong> or an ARP Reply that was not prompted by an ARP Request to update the ARP mapping of the other hosts on the network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/252eec64-9427-4ba5-878d-bd6069d9aaf0.webp" alt="CCNA 200-301 Study (1)" /></p>
<p>Unknowingly, PC2 will update its ARP Cache and change the MAC address of PC1 to the MAC address of PC3. Same with the other direction, PC3 can spoof PC2 by lying about its MAC address. This attack, or ARP spoofing, is also called a Man-in-the-Middle attack.</p>
<h3 id="heading-enable-arp-inspection">Enable ARP Inspection</h3>
<pre><code class="lang-javascript">Switch(config)#IP arp inspection vlan <span class="hljs-number">1</span>
</code></pre>
<h3 id="heading-dynamic-arp-inspection-verification">Dynamic ARP Inspection Verification</h3>
<pre><code class="lang-javascript">Switch#show ip arp inspection
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8d7cd58d-4dc0-42eb-8665-1dc129b2bd18.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Switch#show ip  arp inspection statistics

Switch#show ip arp inspection interfaces
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/57353cc8-a989-4d4a-91ff-f684c870a42a.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-to-trust-interfaces-between-network-devices-should-be-trusted">To Trust Interfaces between network devices should be trusted</h3>
<pre><code class="lang-javascript">Switch(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)#ip arp inspection trust
</code></pre>
<pre><code class="lang-javascript">Switch(config)#ip arp inspection validation [des-mac, ip, src-mac]
</code></pre>
<h2 id="heading-how-to-detect-an-arp-cache-poisoning-attack"><strong>How to Detect an ARP Cache Poisoning Attack</strong></h2>
<pre><code class="lang-powershell">arp <span class="hljs-literal">-a</span>
</code></pre>
<p>The output will look something like this:</p>
<pre><code class="lang-powershell">Internet Address    Physical Address

**<span class="hljs-number">192.168</span>.<span class="hljs-number">5.1</span>        <span class="hljs-number">00</span><span class="hljs-literal">-14</span><span class="hljs-literal">-22</span><span class="hljs-literal">-01</span><span class="hljs-literal">-23</span><span class="hljs-literal">-45</span>**
<span class="hljs-number">192.168</span>.<span class="hljs-number">5.201</span>      <span class="hljs-number">40</span><span class="hljs-literal">-d4</span><span class="hljs-literal">-48</span><span class="hljs-literal">-cr</span><span class="hljs-literal">-55</span><span class="hljs-literal">-b8</span>
<span class="hljs-number">192.168</span>.<span class="hljs-number">5.202</span>      **<span class="hljs-number">00</span><span class="hljs-literal">-14</span><span class="hljs-literal">-22</span><span class="hljs-literal">-01</span><span class="hljs-literal">-23</span><span class="hljs-literal">-45</span>**
</code></pre>
<p>If the table contains two different IP addresses that have the same MAC address, this indicates an ARP attack is taking place. Because the IP address 192.168.5.1 can be recognized as the router, the attacker’s IP is probably 192.168.5.202.</p>
<p>no</p>
<h2 id="heading-nat-network-address-translation">NAT (Network  Address Translation)</h2>
<ul>
<li>NAT (<strong>Network Address Translation</strong>) is a process of mapping multiple private addresses inside a local network to a public address.</li>
</ul>
<h2 id="heading-advantages-of-nat">Advantages of NAT</h2>
<ul>
<li>Connecting a l<strong>arge number of hosts to the global Internet using a smaller number of public (external) IP addresses,</strong> thereby conserving IP address space</li>
<li>It provides <strong>privacy as the device’s IP address,</strong> sending and receiving the traffic, will be hidden.</li>
<li>Eliminates address renumbering when a network evolves. (If the number of private IPs increased or decreased, it didn’t affect the  Public IP)</li>
</ul>
<h2 id="heading-disadvantages-of-nat">Disadvantages of NAT</h2>
<ul>
<li>Translation results in <strong>switching path delays**</strong>.**</li>
<li>Certain <strong>applications will not function while NAT is enabled</strong>. (For example, when gamers have an issue with NAT, they prefer NAT Type 2 to NAT Type 3 for gaming)</li>
<li><strong>Complicates</strong> tunneling protocols such as IPsec.</li>
</ul>
<h2 id="heading-type-of-nat">Type of NAT</h2>
<ul>
<li><strong>Static NAT</strong>: Translate <strong>one private IP</strong> to <strong>one public IP</strong>(one-to-one mapping).</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0381c9c6-0d77-4ea1-bcd4-defc7185a36b.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Dynamic NAT: P</strong>rivate IP addresses are mapped to the pool of public IP addresses. If the IP addresses from the pool are not free, then <strong>the packet will be dropped</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/31475ac1-b5f5-4ba1-860c-91b34ee2e7d5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>At this point, all the shared IP addresses have been used. When <strong>Host D (10.7.7.74)</strong> attempts to initiate a connection to <strong>86.8.6.9</strong>, <strong>the packet is dropped because there are no available public IP addresses on the router.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/432e56ff-c5bb-4466-8eeb-20625d05f7f5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Therefore, using PAT is the best solution,</p>
<ul>
<li><strong>Port Address Translation</strong>: one public address is used for all internal devices, but a <strong>different port is assigned to each private IP address</strong>. Also known as <strong>NAT overload.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8823b54c-049b-4faf-ba6a-d312cb8a1d57.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we can use one public IP by PAT, many devices can use the same public IP address, and PCs B and C can access the server through different port numbers. <strong>Using one Public IP address to send out a large range of private IPs with different ports</strong> </p>
<h2 id="heading-nat-terminology">NAT Terminology</h2>
<p><strong>Inside Local</strong>: The <strong>private IP address</strong> of your device inside the local network.</p>
<p><strong>Inside Global</strong>: The <strong>public IP address</strong> assigned by NAT for your internal host to use outside.</p>
<p> <strong>Outside  Local:</strong> the <strong>IP addresses</strong> of the <strong>outside host</strong>, from the perspective of the local network     (Public IP).</p>
<p><strong>Outside Global:</strong> Outside global address is the <strong>public IP address</strong> assigned to the end device on the other network to communicate with other devices on the internet. </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Inside Local address</td><td>Outside Local Address</td><td>Inside Global address</td><td>Outside Global  Address</td></tr>
</thead>
<tbody>
<tr>
<td>192.168.1.10/20</td><td>111.1.1.1:80</td><td>200.1.1.1</td><td>111.1.1.1:80</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e71497e5-dc78-4475-b85c-a5015a965fbe.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8a3f7a6b-ba8e-47a3-b09d-b6e077d6b8f6.gif" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/86082a04-29c9-47fb-ab9b-7bdb17ea2d48.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-static-nat-configuration">Static  NAT Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0b90be5a-c7b2-4c26-ae52-48f6b266f936.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p>In this lab, static NAT is configured on the selected area, and <strong>Global IP addresses</strong> are translated to <strong>Local IP addresses</strong> based on the static mapping of these IP addresses.</p>
<h3 id="heading-the-first-step-define-which-interface-is-inside-or-outside">The first step define which interface is <strong>Inside</strong> or Outside.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cc06a554-be53-4a75-997a-5c1751be681f.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat outside (interface connected to the external network)

Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat inside
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b956bddb-30e5-4d5e-8bb5-054b61fc88bf.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config)#ip nat ([inside or outside] dway awa alet nawa bo  darawa yan darawa bo nawawa nat akit) 
Router(config)#ip nat inside (wata nawaw la darawa bbinret) source [<span class="hljs-keyword">static</span> or list] (now <span class="hljs-keyword">in</span> <span class="hljs-built_in">this</span> <span class="hljs-keyword">case</span> we have a one <span class="hljs-keyword">static</span> IP)
Router(config)#ip nat inside source <span class="hljs-keyword">static</span> <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> [Inside local IP address] <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> [your public ip address operated by you]
Router(config)# ip nat  inside source <span class="hljs-keyword">static</span> <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> [final command should be like <span class="hljs-built_in">this</span>]
</code></pre>
<pre><code class="lang-javascript">Router#show ip nat translations 
Pro  Inside <span class="hljs-built_in">global</span>     Inside local       Outside local      Outside <span class="hljs-built_in">global</span>
---  <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>           <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>        ---                ---
</code></pre>
<p>As you can see, we have a global IP address that NATs to a local IP address. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8a064edd-b8b6-4b73-9a1f-d796630f79a9.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p>Enter the public IP address of the server in the client browser you can see the server content, because the public IP is translated to the local address of the server.</p>
<p><strong>To verify these NAT translations:</strong></p>
<pre><code class="lang-shell">R1#show ip nat translations
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3bea6300-496b-4b0e-be6b-54e8a40e1109.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a6452570-0e45-4618-9d3b-40d438677a1b.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 If you have already statically mapped a private IP address to a public IP address, if you try to map another private IP to the same Public IP, the command will be rejected.</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/77a0a091-9c29-4019-a03a-857639be3089.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-dynamic-nat-and-pat">Dynamic NAT and PAT</h1>
<ul>
<li><strong>Configure Inside and Outside Interfaces.</strong></li>
<li>Create an Access List to Match Inside Hosts.</li>
<li>Define a NAT Pool.</li>
<li>Bind the Access List to the Pool.</li>
</ul>
<h3 id="heading-pat-configuration">PAT Configuration</h3>
<ul>
<li>PAT Configuration has the same configuration as Dynamic NAT, just add <strong>overload</strong> to the end.</li>
<li>There's no need to define a pool for a single IP.</li>
</ul>
<pre><code class="lang-javascript">ip nat inside source list <span class="hljs-number">1</span> interface fa0/<span class="hljs-number">1</span> [Inside Gloabal Interface] overload
</code></pre>
<p>This simpler and directly ties NAT to the interface’s IP </p>
<ul>
<li>In case  of using a pool, you can use the pool like this:</li>
</ul>
<pre><code class="lang-javascript">ip nat pool SINGLEPAT <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> netmask <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
</code></pre>
<h3 id="heading-first-we-need-to-configure-the-routers-inside-and-outside-nat-interfaces">First, we need to configure the router’s <strong>inside</strong> and <strong>outside</strong> NAT interfaces:</h3>
<pre><code class="lang-javascript">Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat inside
Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat outside
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dbc671da-340d-44cb-bdd1-269c80881679.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-we-need-to-configure-an-acl-that-includes-a-list-of-the-inside-source-addresses-that-will-be-translated">We need to configure an ACL that includes a list of the inside source addresses that will be translated.</h3>
<pre><code class="lang-javascript">Router(config)#access-list <span class="hljs-number">1</span> permit <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
</code></pre>
<h3 id="heading-we-need-to-configure-a-pool-of-global-public-ip-addresses-available-on-the-outside-interfaces">We need to configure a  pool of global (Public) IP addresses available on the outside interfaces</h3>
<pre><code class="lang-javascript">Router(config)#ip nat pool [Pool Name] [Start IP address] [End IP address] netmask [Subnet mask]
Router(config)#ip nat poo1l nat-pool <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span> <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.20</span>  netmask <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
</code></pre>
<p>[Start IP address] [End IP address] is the range of IP addresses you purchased from your ISP. In this example, we purchased 10 IPs from the ISP.</p>
<h3 id="heading-lastly-we-need-to-enable-dynamic-pat-nat">Lastly, we need  to enable Dynamic / PAT NAT</h3>
<pre><code class="lang-javascript">Router(config)#ip nat inside source list [access list name or number] pool [pool name]
Router(config)#ip nat  inside source list <span class="hljs-number">1</span> pool nat-pool  (**without overload command it be dynamic NAT**)
**Router(config)#ip nat  inside source list <span class="hljs-number">1</span> pool nat-pool overload [PAT]**
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9408df89-5117-4c9c-b974-2b74b897211f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, different port numbers are used for NAT</p>
<h2 id="heading-qos-quality-of-service">QOS Quality of Service</h2>
<h1 id="heading-what-is-qos">What is QOS?</h1>
<p>QoS (<strong>Quality of service)</strong>  refers to the set of technologies used to <strong>manage network traffic</strong> to meet the service requirements of specific applications, especially real-time ones like:</p>
<ul>
<li>Voice over IP (VoIP)</li>
<li>Video conferencing</li>
<li>Online gaming</li>
</ul>
<h3 id="heading-why-is-qos-important">Why is QoS Important?</h3>
<p>Without QoS, all traffic is treated equally, leading to congestion and poor performance of delay-sensitive traffic.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d6b7e1b7-be5c-4fed-ae4a-b0e8672ad228.png" alt="CCNA 200-301 Study (1)" /></p>
<p>                           Visualizing network bandwidth with and without QOS</p>
<h1 id="heading-qos-queueing">QOS Queueing</h1>
<p><strong>QoS Queuing</strong> is a method used in Quality of Service (QoS) to manage how packets are <strong>stored and transmitted</strong> through network devices (like routers and switches) when there is <strong>congestion</strong>. When multiple packets compete for the same output interface, queuing (Priority Queuing) decides <strong>which packets go first</strong> and which must <strong>wait or get dropped</strong>. <strong>Queues</strong> are <strong>high-performance memory buffers in routers and switches. W</strong>hen a packet is assigned a <strong>higher priority</strong>, it is moved to a dedicated queue that pushes data faster rate</p>
<ul>
<li>If the queue is <strong>full,</strong> n<strong>ew packets will be dropped</strong>, this is called a <strong>tail drop.</strong></li>
<li>Tail drop is harmful because it can lead to <strong>TCP Global Synchronization.</strong></li>
</ul>
<h2 id="heading-type-of-network-traffic">Type of Network Traffic</h2>
<p>QoS is used to manage the following characteristics of network traffic:</p>
<ul>
<li><strong>Bandwidth</strong> is the speed of the link, usually measured as <strong>bits per second(bps).</strong> <strong>QoS can tell a router how to use bandwidth</strong>. For example,  we can configure the router <strong>so that</strong> <strong>one queue gets 50% of the bandwidth</strong>, <strong>queue two gets 20% of the bandwidth</strong>, and <strong>queue three gets 30% of the bandwidth.</strong></li>
<li><strong>Delay(latency)</strong></li>
</ul>
<p>The amount of time it takes for packets of data to travel from <strong>source</strong> to <strong>destination is</strong> = <strong>one-way delay.</strong></p>
<p>The amount of time it takes for packets of data to travel from <strong>source</strong> to <strong>destination</strong> and <strong>return</strong> =<strong>two-way delay.</strong></p>
<ul>
<li><strong>Jitter:</strong> the variation in <strong>one-way delay between packets sent by the same application</strong>. For example, <strong>The first packet is sent</strong> and the <strong>second packet is sent after 50 milliseconds</strong> (MS), <strong>the time it takes for the second packet to be sent after the first packet was sent is the jitter</strong> and, it is 50 Ms. which can result in packets arriving late and out of the sequence. This can cause <strong>distortion or gaps in audio and video being delivered</strong>.   (A better connection should have less jitter)</li>
<li><strong>Loss:</strong> 
The percentage of packets sent that <strong>do not reach their destination</strong>.
can be caused by Faulty Hardware, Software Issues, or Network Congestion.<br />It can also be caused when a <strong>device’s packet queue gets full</strong> and the device starts discarding packets.</li>
</ul>
<h2 id="heading-the-standard-recommendation-for-acceptable-interactive-voice">The standard recommendation for acceptable interactive voice:</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>One-way-delay</strong></td><td><strong>150</strong> ms or less</td></tr>
</thead>
<tbody>
<tr>
<td>Jitter</td><td><strong>30</strong> ms or less</td></tr>
<tr>
<td>Loss</td><td><strong>1%</strong> or  less</td></tr>
</tbody>
</table>
</div><ul>
<li>If these standards are not met, there could be a noticeable reduction in the quality of the phone call</li>
</ul>
<h1 id="heading-quality-of-service-qos-mechanism">Quality of Service (QOS) Mechanism</h1>
<ol>
<li><strong>Classification</strong>: organizes network traffic (packets) into traffic classes (categories) (e.g., VoIP, video, data).</li>
<li><strong>Marking:</strong> Labeling packets (e.g., using DSCP or CoS) so they can be prioritized.</li>
<li><strong>Queueing</strong>-<strong>Congestion management:</strong> <strong>Prioritize the transmission of each packet</strong> by queueing on each interface. (enabling queueing and allowing high priority can join the queue quickly).</li>
<li><strong>Congestion Avoidance:</strong> Techniques like WRED to drop low-priority packets to avoid tail drop.</li>
<li><strong>Policing</strong> is a QoS feature that <strong>monitors and controls traffic rates</strong> on an interface. It compares traffic to a set rate called the <strong>CIR (Committed Information Rate)</strong>. If traffic exceeds this rate, the excess packets are either <strong>dropped</strong> or r<strong>emarked</strong> with a lower QoS value.</li>
<li><strong>Shaping</strong> is a QoS feature that <strong>controls traffic rate</strong> by <strong>buffering excess packets</strong> instead of <strong>dropping</strong> them. When traffic exceeds the configured <strong>CIR (Committed Information Rate)</strong>, the shaper <strong>holds the packets in a buffer</strong> and sends them later when bandwidth becomes available.</li>
</ol>
<blockquote>
<p>💡 - Instead of waiting for policer of the ISP to drop your traffic.  </p>
<ul>
<li><p>We can shape the outgoing traffic towards the ISP so that they <strong>do not drop it</strong>.  </p>
</li>
<li><p>We can use <strong>shaping</strong> to make sure that everything will be sent until its buffer is full.</p>
</li>
</ul>
</blockquote>
<ul>
<li>Instead of waiting for policer of the ISP to drop your traffic.</li>
<li>We can shape the outgoing traffic towards the ISP so that they <strong>do not drop it</strong>.</li>
<li>We can use <strong>shaping</strong> to make sure that everything will be sent until its buffer is full.</li>
</ul>
<p><strong>CBWFQ</strong> (<strong>Class-Based Weighted Fair Queuing)</strong> is a popular scheduling method that uses a weighted round-robin scheduler while guaranteeing each queue a certain percentage of the interface’s bandwidth during congestion.</p>
<p>Which two QoS tools provide congestion management?</p>
<ul>
<li><strong>CBWFQ</strong></li>
<li><strong>PR</strong></li>
</ul>
<p>Which IP header field is changed by a Cisco device when QoS marking is enabled?</p>
<ul>
<li><strong>Type of Service.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/af6786fc-e38b-4c94-820d-ff3ad960456e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a6a8883b-549a-4015-a70c-80160401b68a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/be49a579-d371-4043-bb9f-7d08968dd257.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-qos-quality-of-service-implementation">QOS Quality of Service Implementation</h1>
<h3 id="heading-classification">Classification:</h3>
<pre><code class="lang-javascript">Router(config)#<span class="hljs-class"><span class="hljs-keyword">class</span>-<span class="hljs-title">map</span> <span class="hljs-title">Web</span>-<span class="hljs-title">Traffic</span>  [<span class="hljs-title">class</span>-<span class="hljs-title">map</span> <span class="hljs-title">name</span>]
<span class="hljs-title">Router</span>(<span class="hljs-title">config</span>-<span class="hljs-title">cmap</span>)#<span class="hljs-title">match</span> <span class="hljs-title">protocol</span> <span class="hljs-title">HTTP</span>(<span class="hljs-title">which</span> <span class="hljs-title">protocol</span> <span class="hljs-title">used</span>)</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d52a35db-3a7a-4f90-a59c-a0452b4c0094.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-policing">Policing:</h3>
<pre><code class="lang-javascript">Router(config)#policy-map  web-traffic-policy [policy name] 
Router(config-pmap)#<span class="hljs-class"><span class="hljs-keyword">class</span> <span class="hljs-title">web</span>-<span class="hljs-title">traffic</span>   [<span class="hljs-title">assign</span> <span class="hljs-title">the</span> <span class="hljs-title">class</span> <span class="hljs-title">to</span> <span class="hljs-title">the</span> <span class="hljs-title">policy</span>]
<span class="hljs-title">Router</span>(<span class="hljs-title">config</span>-<span class="hljs-title">pmap</span>-<span class="hljs-title">c</span>)#<span class="hljs-title">bandwidth</span> 1000  [<span class="hljs-title">in</span> <span class="hljs-title">this</span> <span class="hljs-title">rule</span> <span class="hljs-title">we</span> <span class="hljs-title">set</span> 1<span class="hljs-title">mbps</span> <span class="hljs-title">to</span> <span class="hljs-title">web</span> <span class="hljs-title">traffic</span>]</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/706a6cfa-ca8b-4e59-a11f-e76095d30be8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>### 
Applying to the interface </p>
<pre><code class="lang-javascript">Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Router(config-<span class="hljs-keyword">if</span>)#service-policy output  web-traffic-policy [policy name]
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Input</td><td>Assign policy-map to the <strong>input</strong> of an interface</td></tr>
</thead>
<tbody>
<tr>
<td>output</td><td>Assign policy-map to the <strong>output</strong> of an interface</td></tr>
</tbody>
</table>
</div><h2 id="heading-ip-services">IP Services</h2>
<p>Networks need redundant links and should always be designed to maximize availability. A router's power supply might fail, a cable could break, or a switch might lose power.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/51eb4c4a-8942-4c41-a734-4637229ef9f4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, if one of the routers goes down, a backup router can take over and continue forwarding packets to their destination.</p>
<blockquote>
<p>💡 To achieve redundancy, we should have a <strong>Virtual IP</strong> as a gateway to switch between routers.</p>
</blockquote>
<h2 id="heading-first-hope-redundancy-protocol">First Hope Redundancy Protocol</h2>
<p>A <strong>first Hope Redundancy Protocol(FHRP)</strong> is a <strong>layer 3</strong> protocol designed to protect and ensure the availability of the <strong>gateway</strong> for end devices on a local subnet by allowing two or more routers to provide backup for that address. </p>
<h3 id="heading-type-of-fhrp-protocols">Type of FHRP protocols:</h3>
<ul>
<li><strong>Hot Standby Router Protocol (</strong>HSRP)</li>
<li><strong>Virtual Router Redundancy Protocol (</strong>VRRP<strong>)</strong></li>
<li><strong>Gateway Load Balancing Protocol(</strong>GLBP<strong>)</strong></li>
</ul>
<h3 id="heading-how-fhrp-works-basic-idea">How FHRP Works (Basic Idea)</h3>
<ul>
<li>A <strong>virtual IP</strong> is configured on the two routers.</li>
<li>One Router is <strong>active</strong> (forwarding traffic), and others are in <strong>standby or backup</strong> mode.</li>
<li>Each network host is configured to use the <strong>virtual IP as their default gateway</strong>.</li>
<li>If the active router fails, the standby becomes the next active router.</li>
</ul>
<h2 id="heading-hsrp">HSRP</h2>
<p><strong>Hot Standby Router Protocol (HSRP)</strong> is a <strong>Cisco proprietary protocol</strong> that provides redundancy for a local subnet. It is an <strong>active/standby</strong> router model.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d4d2d7af-165c-4de5-bf37-b8b29c088820.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-vrrp">VRRP</h2>
<p><strong>Virtual Router Redundancy Protocol (VRRP)</strong> is very similar to HSRP and can be used to create a virtual gateway. It is a <strong>Master/Backup</strong> router model and is more usable by companies because it is a global protocol. </p>
<h2 id="heading-glbp">GLBP</h2>
<p><strong>Gateway Load Balancing Protocol(GLBP):</strong> protects data traffic from a failed router or circuit, like (HSRP) and (VRRP), while <strong>allowing packet load sharing between a group of redundant routers</strong>. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/43447d8a-4d69-41fc-8f3f-400d2296b49c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, all routers are working and forwarding packets, <strong>and none of them are standing by.</strong> </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>HSRP</td><td>VRRP</td><td>GLBP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Cisco</strong> Propriety</td><td>Standardized</td><td><strong>Cisco</strong> propriety</td></tr>
<tr>
<td>Active and Standby mode only.</td><td>Active and Standby mode only.</td><td>Multiple routers pass traffic thus achieving load balancing.</td></tr>
<tr>
<td>Must configure a separate IP for the Virtual.</td><td><strong>Virtual IP can be the same as the physical IP of one of the routers</strong></td><td>Most configure separate IPs for the Virtual</td></tr>
<tr>
<td>Default Priority = 100</td><td>Default Priority = 100</td><td>Default Priority = 100</td></tr>
<tr>
<td>Higher priority (above 100) makes the <strong>router active</strong>. otherwise, a Higher IP makes the <strong>router active</strong>.</td><td>Higher priority (above 100) makes the r<strong>outer active.</strong> otherwise, a Higher IP makes the <strong>router active.</strong></td><td>Higher priority (above 100) makes the <strong>router the primary forwarder</strong>. otherwise, a higher IP makes the <strong>router the primary forwarde</strong>r</td></tr>
<tr>
<td><strong>Tracking support</strong>(e.g. interface state, routing info, reachability of remote host, etc.)</td><td><strong>Tracking support</strong>(e.g. interface state, routing info, reachability of remote host, etc.)</td><td><strong>Tracking support</strong>(e.g. interface state, routing info, reachability of remote host, etc.)</td></tr>
<tr>
<td>support <strong>IPV6</strong></td><td><strong>No support for IPv6 on the original VRRP</strong> implementation. however, VRRP v3 supports it</td><td>Support <strong>IPV6</strong></td></tr>
<tr>
<td>Support timer and delay adjustments for failover</td><td>Support timer and delay adjustment for failover</td><td>Support timer and delay adjustment for failover</td></tr>
</tbody>
</table>
</div><h1 id="heading-vrrp-labs">VRRP Labs</h1>
<pre><code class="lang-javascript">Router(config)#interface fa2/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> [<span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">1-255</span>&gt;</span>  Group number] ip  192.168.1.1 (virtual IP) 
Router(config-if)#vrrp 1 priority 150 (1 to 254) [by default is 100 we change it to 150 to ensure it remains as a master]</span>
</code></pre>
<h3 id="heading-verify-the-configuration">Verify the configuration</h3>
<pre><code class="lang-javascript">Master#show vrrp
Master#show vrrp brief
</code></pre>
<h2 id="heading-track-object">Track Object</h2>
<ul>
<li>First, create object tracking and select which interface to track.</li>
</ul>
<pre><code class="lang-javascript">Router(config)#track <span class="hljs-number">1</span> &lt;<span class="hljs-number">1</span><span class="hljs-number">-500</span>&gt;Tracked object ( the what you want to track)
Router(config)#track <span class="hljs-number">1</span>  interface fastEthernet <span class="hljs-number">1</span>/<span class="hljs-number">0</span>  [IP or line-protocol] 
Router(config)#track <span class="hljs-number">1</span> interface fa0/<span class="hljs-number">0</span> line-protocol
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>interface</td><td>Select an interface to track</td></tr>
</thead>
<tbody>
<tr>
<td>IP</td><td>IP protocol</td></tr>
<tr>
<td>List</td><td>Group objects in a list</td></tr>
<tr>
<td>sub-object</td><td>Stub tracking object</td></tr>
</tbody>
</table>
</div><div class="hn-table">
<table>
<thead>
<tr>
<td>line-protocol</td><td>When the interface gets down physically or logically, it represents as a down</td></tr>
</thead>
<tbody>
<tr>
<td></td></tr>
</tbody>
</table>
</div><ul>
<li>Second, apply the created track to the VRRP.</li>
</ul>
<pre><code class="lang-javascript">Router(config)#interface fa <span class="hljs-number">2</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> track <span class="hljs-number">1</span> (Id <span class="hljs-keyword">of</span> the created track you want to apply to the VRRP)
Router(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> track <span class="hljs-number">1</span> decrement <span class="hljs-number">50</span> [decreaament the priority]
</code></pre>
<h2 id="heading-vrrp-1">VRRP</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eca942dd-4032-4e0c-96c7-c677b26e01bc.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, two routers are connected to the ISP. We will proceed with configuring VRRP, designating one router as the master and the other as the backup.</p>
<h3 id="heading-basic-ip-configuration-4">Basic IP Configuration</h3>
<pre><code class="lang-java">PC1&gt; ip <span class="hljs-number">192.168</span>.<span class="hljs-number">1.2</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">192.168</span>.<span class="hljs-number">1.1</span>
</code></pre>
<pre><code class="lang-java">Master#<span class="hljs-function">conf t
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.4 255.255.255.0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.2 255.255.255.0 
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown 
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#exit
Master#wr</span>
</code></pre>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.5 255.255.255.0 
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address  4.2.2.2 255.255.255.0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown

<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#exit
BackUp#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 4.2.2.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-ospf-configuration-3">OSPF Configuration</h3>
<pre><code class="lang-java">Master#<span class="hljs-function">conf t

<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#net     
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0    
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#exit
Master#wr</span>
</code></pre>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t                       
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0    
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#exit
BackUp#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-vrrp-master-router-configuration">VRRP Master Router Configuration</h3>
<pre><code class="lang-java">Master#<span class="hljs-function">conf t
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 ip 192.168.1.1
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 priority 150
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 preempt
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#exit
Master#</span>
</code></pre>
<h3 id="heading-vrrp-master-router-configuration-1">VRRP Master Router Configuration</h3>
<pre><code class="lang-java">Master#show vrrp
Master#show vrrp brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a61f90a4-a163-44d2-aec4-a02e98710c5c.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-vrrp-master-router-configuration-2">VRRP Master Router Configuration</h3>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 ip 192.168.1.1        
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 preempt 
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#exit
BackUp#wr</span>
</code></pre>
<h3 id="heading-apply-tracker-to-the-specific-interface">Apply Tracker to the specific interface</h3>
<pre><code class="lang-java">Master(config)#track <span class="hljs-number">1</span> <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">fa0</span>/0 <span class="hljs-title">line</span>-<span class="hljs-title">protocol</span></span>
</code></pre>
<h3 id="heading-mapping-tracker-to-the-vrrp">Mapping Tracker to the VRRP</h3>
<pre><code class="lang-java">Master(config)#<span class="hljs-keyword">int</span> fa1/<span class="hljs-number">0</span>
Master(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> <span class="hljs-function">tra
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 track 1 
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 track 1 decrement 60 [ decrement  Priority decrement]</span>
</code></pre>
<h3 id="heading-testing-tracker-and-switching-traffic-from-master-to-backup">Testing tracker and switching traffic from master to backup</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6d38d08d-3711-4a4a-ad2c-3e50f7db9156.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, after the shutdown of interface Fa0/0, the traffic switched from the master to the backup, and the state of the routes changed.</p>
<h3 id="heading-when-the-status-of-the-tracked-interface-changed-to-up-the-traffic-and-states-of-the-switches-reverted-to-their-previous-status">When the status of the tracked interface changed to 'up,' the traffic and states of the switches reverted to their previous status.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ca60c028-f432-4fe0-97c5-8c626f4871aa.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dd0118a7-7c13-4f1c-85fa-0c4053350c14.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-hsrp-1">HSRP</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8ac12a3f-6e3a-419a-9df4-aae570410eaa.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, two routers are connected to the ISP. We will proceed with configuring VRRP, designating one router as the Active and the other as the backup.</p>
<h3 id="heading-basic-ip-configuration-5">Basic IP Configuration</h3>
<pre><code class="lang-java">PC1&gt; ip <span class="hljs-number">192.168</span>.<span class="hljs-number">1.2</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">192.168</span>.<span class="hljs-number">1.1</span>
</code></pre>
<pre><code class="lang-java">Active#<span class="hljs-function">conf t
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.4 255.255.255.0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.2 255.255.255.0 
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown 
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#exit
Active#wr</span>
</code></pre>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.5 255.255.255.0 
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address  4.2.2.2 255.255.255.0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown

<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#exit
StandBy#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 4.2.2.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-ospf-configuration-4">OSPF Configuration</h3>
<pre><code class="lang-java">Active#<span class="hljs-function">conf t

<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#net     
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0    
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#exit
Active#wr</span>
</code></pre>
<pre><code class="lang-java">StandBy#<span class="hljs-function">conf t                       
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0    
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#exit
StandBy#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-vrrp-active-router-configuration">VRRP Active Router Configuration</h3>
<pre><code class="lang-java">Active#<span class="hljs-function">conf t
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 ip 192.168.1.1
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby1 priority 150
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 preempt
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#exit
Active#</span>
</code></pre>
<h3 id="heading-hsrp-active-router-configuration">HSRP Active Router Configuration</h3>
<pre><code class="lang-java">Active#show standby
Active#show standby brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/22bc9293-49af-45e8-b038-a92a895b2034.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-hsrp-standby-router-configuration">HSRP Standby Router Configuration</h3>
<pre><code class="lang-java">StandBy#<span class="hljs-function">conf t
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 ip 192.168.1.1            
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 preempt 
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#exit
StandBy#wr</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/884dc5c0-b34d-49f1-8c69-9dfde825b827.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-apply-tracker-to-the-specific-interface-1">Apply Tracker to the specific interface</h3>
<pre><code class="lang-java">Active(config)#track <span class="hljs-number">1</span> <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">fa0</span>/0 <span class="hljs-title">line</span>-<span class="hljs-title">protocol</span></span>
</code></pre>
<h3 id="heading-mapping-tracker-to-the-vrrp-1">Mapping Tracker to the VRRP</h3>
<pre><code class="lang-java">Active(config)#<span class="hljs-keyword">int</span> fa1/<span class="hljs-number">0</span>
Active(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> track <span class="hljs-number">1</span> decrement <span class="hljs-number">60</span> [ decrement  Priority decrement]
</code></pre>
<h3 id="heading-testing-tracker-and-switching-traffic-from-active-to-standby">Testing tracker and switching traffic from Active to StandBy</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cb59e206-8ba9-4e62-bf46-3fbe46fd1660.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, after the shutdown of interface Fa0/0, the traffic switched from the Active to the StandBy, and the state of the routes changed.</p>
<h3 id="heading-when-the-status-of-the-tracked-interface-changed-to-up-the-traffic-and-states-of-the-switches-reverted-to-their-previous-status-1">When the status of the tracked interface changed to 'up,' the traffic and states of the switches reverted to their previous status.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/96ae13d3-ad95-4c87-9621-d555f720da4f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4599eee8-b1ba-4d28-9cff-b3307592890f.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-hot-standby-router-protocol-hsrp">Hot Standby Router Protocol (HSRP)</h2>
<blockquote>
<p>💡 I tried for more than 2 days to perform this configuration, but I had an issue with both routers’ states being active. It was resolved by adding this command to the switch </p>
</blockquote>
<pre><code class="lang-javascript">Use command <span class="hljs-string">" no ip igmp snooping "</span> on <span class="hljs-keyword">switch</span>
</code></pre>
<h3 id="heading-on-the-active-router"><strong>On the active router</strong></h3>
<pre><code class="lang-javascript">Router(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>
Router(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> priority <span class="hljs-number">150</span>   [ to ensure the router remain active]
</code></pre>
<p>On a Standby router</p>
<pre><code class="lang-javascript">Router(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>
</code></pre>
<p>Then verify configuration </p>
<pre><code class="lang-javascript">Router#show standby
</code></pre>
<pre><code class="lang-javascript">Router#show arp
</code></pre>
<p>You can see the MAC address assigned to the virtual IP address </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/22c07de0-a338-4af5-a620-f367baf1d2a9.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The last number of the MAC address refers to the group ID of the standby.</p>
<p>As you can see, after the shutdown  selected interface standby starts working as an active one and forwards packets to the destination </p>
<h2 id="heading-glbp-gateway-load-balancing-protocol">GLBP ( Gateway Load Balancing Protocol)</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f0f39cd9-88ec-411e-acdc-22c98f656d40.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-glbp-terms">GLBP terms</h3>
<p><strong>Active Virtual Gateway (AVG)</strong>: It is <strong>one of the routers operating GLBP</strong> in a single group which is responsible for <strong>assigning a</strong> <strong>Virtual Mac Address</strong> <strong>to all other devices running GLBP</strong> and for responding to the <strong>ARP request coming from the devices</strong>, Th<strong>e AVG has the highest priority value or IP addresses in the group</strong>.</p>
<p><strong>Active Virtual Forwarder (AVF):</strong> Responsible for forwarding data after they are assigned by the AVG for the task. In case AVG goes down, one of the AVFs can become the AVG. </p>
<p><strong>Preempt:</strong> It <strong>is a state in which one of the AVFs will become the AVG router</strong> (<strong>when the AVG router goes down</strong>). Also, <strong>when the AVG router comes up again,</strong> it will become the AVG router as its priority is still higher.</p>
<p><strong>Object Tracking:</strong> GLBP uses a weighting scheme to determine the forwarding capacity of each router in the GLBP group. <strong>GLBP tracks the interface and adjusts its weighting</strong> i.e if the tracked interface goes down, then it reduces by a certain value (according to the configuration).</p>
<h3 id="heading-load-balancing-methods">Load Balancing Methods:</h3>
<ul>
<li><strong>Round Robin:</strong> AVG will assign the virtual Mac addresses serial-wise, like the first virtual Mac address is assigned to AVF1, then to AVF2, etc. (<strong>Used By Default</strong>)</li>
<li><strong>Host-Dependent:</strong> A Host can use the same Virtual Mac Address of an AVF as long as it is reachable.</li>
<li><strong>Weighted:</strong> If you want <strong>some AVFs to forward more traffic than o</strong>thers you can assign them a <strong>different weight</strong>. (For example, we have 2 routers one of the routers has a higher performance than the other one, and you can use weighted to send most of the traffic to the high-performance router.)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8cec23df-3d5c-4159-90a1-7d2d86947b13.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this lab, we will configure GLBP on both routers, making GLBP_2 an active router. </p>
<p><strong>GLBP Router:</strong> </p>
<pre><code class="lang-javascript">Router(config)#<span class="hljs-keyword">in</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> (id)  ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>GLBP_2 Router:</strong> </p>
<pre><code class="lang-javascript">Router(config)#<span class="hljs-keyword">in</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> preempt 
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> priority <span class="hljs-number">140</span>
</code></pre>
<p>GLBP_2 is now active and can be returned to the active state if it goes down.</p>
<h3 id="heading-now-to-verify-and-check-the-configuration">Now to verify and check the configuration:</h3>
<pre><code class="lang-javascript">Router#show glbp
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dca12ac7-be50-4f23-8f38-4c7e5b43a052.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router#show glbp brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1cf19fba-36a3-441d-b82b-4d0f9d71b304.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-changing-load-balancing-type">Changing Load Balancing Type</h2>
<pre><code class="lang-javascript">Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> load-balancing weighted
</code></pre>
<p>host-dependent  Load balance equally, source MAC determines the forwarder choice
round-robin     Load balance equally using each forwarder in turn
weighted        Load balance in proportion to forwarder weighting</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0e3c15eb-9ff7-4510-b10a-6f27d336af2e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>First, change the load balancing type on both routers </p>
<pre><code class="lang-javascript">Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> load-balancing weighted
</code></pre>
<pre><code class="lang-javascript">Router(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> weighting <span class="hljs-number">100</span> lower <span class="hljs-number">50</span> upper <span class="hljs-number">95</span>
</code></pre>
<p>#Configuring the weighting threshold; this command sets the default weight value, and if the value which is tracked by the weighting track be less than the lower-threshold, it will lose AVF state, and if it becomes more than the upper-threshold it will change to AVF state. This can also be configured on the interfaces that we want to act as an AVF, and not only for AVG. glbp x weighting 200 lower 150 upper 180</p>
<p>Then, on the router, we want to add a track and apply this command </p>
<pre><code class="lang-javascript">
Router(config)#track <span class="hljs-number">1</span> interface fastEthernet <span class="hljs-number">1</span>/<span class="hljs-number">0</span> line-protocol
Router(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> weighting track <span class="hljs-number">1</span> decrement <span class="hljs-number">30</span> (Enter the value <span class="hljs-keyword">of</span> the decrement)
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5742d789-4937-4aa3-aa61-c0a5fa94d7d7.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, when the tracked interface goes down, another router from beside my router starts forwarding packets.</p>
<h2 id="heading-vpn">VPN</h2>
<p>A <strong>virtual private network</strong>, or <strong>VPN</strong>, is an <strong>encrypted connection over the internet from a device to a network.</strong> the encrypted connection helps ensure that sensitive data is safely transmitted.  it prevents unauthorized people from eavesdropping on the traffic and allows users to conduct work remotely</p>
<p>Using a VPN will cost you nothing as it is completely free since most organizations have firewalls already installed with a built-in VPN feature. VPN also provides security for all the traffic that is sent outside your network through VPN tunnels. Lastly, VPN is scalable in that you can add unlimited tunnels and users.</p>
<h2 id="heading-vpn-benefits">VPN Benefits</h2>
<ul>
<li><strong>Cost saving:</strong> Eliminate the need <strong>for expensive dedicated WAN links</strong>.</li>
<li><strong>Security:</strong> use <strong>advanced encryption and authentication protocols</strong> that protect data from unauthorized access.</li>
<li><strong>Scalability</strong>: can add a large amount of capacity <strong>without adding significant infrastructure</strong>.</li>
<li><strong>Compatibility with broadband  technology:</strong> supported by <strong>broadband service providers</strong>, so mobile workers and telecommuters can take advantage of their home high-speed Internet service to access their corporate networks</li>
</ul>
<h1 id="heading-type-of-vpn">Type of VPN</h1>
<p>## 
Remote Access (TLS)</p>
<p><strong>Remote Access VPN</strong> permits <strong>a user to connect to a private network and access all its services and resources remotely</strong>. The connection between the user and the private network occurs through the <strong>internet</strong> and the connection is <strong>secure</strong> and <strong>private</strong>, Remote Access VPN is useful for <strong>home users</strong> and <strong>business users</strong> both.   (<strong>which mostly used for staff to access the company network through the Internet)</strong></p>
<p><strong>Example:</strong> An employee in Baghdad logs into the company network from a laptop using VPN.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5b8bdbde-7168-44f3-a5de-21a1100aa1a9.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-site-to-site-vpn-ipsec">Site-to-Site VPN (IPsec)</h2>
<p>A <strong>Site-to-Site</strong> is also called a <strong>Router-to-Router VPN</strong> and is commonly used in <strong>large companies or organizations</strong>, with branch offices in different locations, to connect the network of one office location to the network at another office location. </p>
<p><strong>Example:</strong> A company’s London office and Erbil branch share resources over a VPN.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b0438999-3212-4e83-8217-41633eb80b54.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e44dd790-e84f-4766-bf2d-1699fe13d54d.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>In a  <strong>site-to-site</strong>  VPN, a tunnel is formed only between two tunnel endpoints (for example, the two routers connected to the Internet).</li>
<li>All other devices in each site don’t need to create a VPN for themselves. They can send unencrypted data to their site’s router, which will encrypt it and forward it in the tunnel as described above.</li>
</ul>
<h3 id="heading-there-are-two-ways-to-implement-site-to-site-vpn">There are two ways to implement site-to-site VPN:</h3>
<p><strong>Intranet VPN:</strong>  it provides secured site-to-site connectivity <strong>within the company or internally</strong>.</p>
<p><strong>Extranet VPN</strong>: it provides secured site-to-site connectivity <strong>outside the company</strong>. for example, customers or partners can securely access the <strong>shared resources of the company</strong>. </p>
<blockquote>
<p>💡 <strong>IPsec</strong> doesn’t support <strong>broadcast and multicast traffic</strong>, only <strong>unicast</strong>. This means that routing protocols such as OSPF can’t be used over the tunnels, because they rely on multicast traffic. (This can be solved with <strong>GRE over IPsec</strong>)</p>
</blockquote>
<h2 id="heading-ssl-vpn"><strong>SSL VPN</strong></h2>
<p><em><strong>SSL VPN (Secure Sockets Layer Virtual Private Network):</strong></em> is a type of VPN that uses the <strong>SSL protocol to secure the connection between the user and the VPN server</strong>. It allows remote users to securely access a private network by establishing an encrypted tunnel between the user’s device and the VPN server. SSL VPNs are typically <strong>accessed through a web browser.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b5b1d90a-5d8a-4f8f-b468-83a55860877d.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-cloud-vpn"><strong>Cloud VPN</strong></h2>
<p>Cloud VPN, sometimes referred to as hosted VPN or VPN as a service (VPNaaS), is a VPN approach tailored for cloud environments. This VPN allows users to securely access a business's resources, data, and applications in the cloud through a web interface or a dedicated app on a desktop or mobile.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d3d04fe8-a84e-42f9-8de1-7ecd89ca2b79.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-vpn-terminology">VPN Terminology</h1>
<ul>
<li>Encryption</li>
<li>Hashing</li>
<li>ISAKMP</li>
<li>IPSec (VPN Protocol)</li>
<li>IKE</li>
<li>ESP</li>
</ul>
<h1 id="heading-encryption">Encryption</h1>
<p>Encryption is a way of scrambling data so that only authorized parties understand the information. </p>
<h2 id="heading-what-are-the-different-types-of-encryption">What are the different types of Encryption?</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Symmetric Encryption</strong></td><td><strong>Asymmetric Encryption</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Uses a <strong>single key</strong> to encrypt and decrypt data</td><td>Uses a <strong>public key to encrypt</strong> data and a <strong>private key to decrypt</strong> data</td></tr>
<tr>
<td><strong>Faster</strong> encryption process</td><td><strong>Slower</strong> encryption process</td></tr>
<tr>
<td>Example key sizes are <strong>128 or 256-bit</strong> long</td><td>Example key sizes are <strong>2048-bit or longer</strong></td></tr>
<tr>
<td>Doesn’t use a <strong>lot of resources</strong></td><td>Uses <strong>more resources</strong></td></tr>
<tr>
<td>Cipher text is smaller, or the same size as the original plain text</td><td>Cipher text is larger or the same size as the original cipher text</td></tr>
<tr>
<td>Both symmetric and asymmetric algorithms provide authentication capability</td><td>Both symmetric and asymmetric algorithms provide authentication capability. Only non-repudiation can be achieved using an asymmetric algorithm<em>.</em></td></tr>
<tr>
<td>Example algorithms are <strong>AES, DES, 3DES, IDEA and Blowfish</strong></td><td>Example algorithms are <strong>RSA, ECC, DSA and El Gamal algorithms</strong></td></tr>
<tr>
<td>Better at handling and <strong>transferring large amounts of data</strong></td><td>Better at handling and <strong>transferring smaller amounts of data</strong></td></tr>
<tr>
<td>Has the risk of someone stealing the key if it is not managed properly</td><td>Has the risk of losing the private key (the keypair is irrevocable)</td></tr>
</tbody>
</table>
</div><h1 id="heading-hashing-the">Hashing the</h1>
<p><em><strong>Hashing</strong></em> is a <strong>process that transforms your data into a random fixed-length value</strong>, using a hash function. For example, a piece of plain text (a password, for example) can be turned into a hashed value, making it very hard to decipher. Some common hashing algorithms include <strong>MD5, SHA-1, SHA-2, NTLM, and LANMAN.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1e93d199-6979-45b5-af9f-c7612ea7e951.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-isakmp">ISAKMP</h1>
<p>ISAKMP <em><strong>Internet Security Association and Key Management Protocol(ISKAMP)</strong></em>  is like the <strong>“negotiator”</strong> in VPNs.</p>
<p>It helps two devices <strong>agree on how to build a secure connection</strong> (like a VPN tunnel) by handling:</p>
<ul>
<li>🔐 <strong>Authentication</strong> – making sure both sides are who they say they are</li>
<li>🗝️ <strong>Key Exchange</strong> – safely sharing encryption keys</li>
<li>📋 <strong>Security Policy Agreement</strong> – agreeing on which encryption and hash methods to use</li>
</ul>
<h1 id="heading-types-of-virtual-private-network-vpn-protocols"><strong>Types of Virtual Private Network (VPN) Protocols:</strong></h1>
<ul>
<li><em><strong>Internet Protocol Security (IPsec):</strong></em> Internet Protocol Security, Known as IPsec, is used to secure internet communication across an IP network. IPsec secures Internet Protocol communication by <strong>verifying the session and encrypting each packet of data during the connection</strong>.</li>
<li><em><strong>Layer 2 Tunneling Protocol(L2TP):</strong></em> is a tunneling protocol that is often combined with another VPN security protocol like IPsec to establish a highly secure VPN connection. L2TP generates a tunnel between two L2TP connection points and IPsec encrypts the data and maintains secure communication between the tunnel.</li>
<li><em><strong>Point-to-Point Tunneling Protocol(</strong></em><strong>PPTP)</strong><em><strong>:</strong></em> an old VPN protocol that uses PPP and GRE, is <strong>insecure and should not be used anymore</strong>.</li>
<li><em><strong>Secure Socket Tunneling Protocol (SSTP)</strong></em>: A VPN protocol <strong>developed by Microsoft for Windows users</strong> that uses <strong>SSL</strong> to secure to secure the connection.</li>
<li><em><strong>IKEv2(Internet Key Exchange):</strong></em> is often used in <strong>combination with IPsec</strong>, <strong>IKE2 creates a secure tunnel connecting the user to the VPN server</strong>, <strong>While IPsec provides encryption and authentication</strong>.</li>
</ul>
<blockquote>
<p>💡 <strong>IKE is a part of IPsec</strong>, A suite of protocols and algorithms used to secure sensitive data transmitted across networks, The <strong>Internet Engineering Task Force (IETS)</strong> developed IPsec to <strong>provide security through authentication and encryption of IP Network packets and secure VPNs**</strong>.** </p>
</blockquote>
<ul>
<li><strong>O</strong><em><strong>penVPN:</strong></em> An <strong>open-source VPN protocol that is highly configurable and secure</strong>, OpenVPN is a widely compatible protocol that offers multiple different configuration options.</li>
<li><em><strong>WireGurad:</strong></em> A relatively new and lightweight VPN protocol that aims to be faster, simpler, and more secure than existing VPN protocols.</li>
<li><em><strong>GRE (Generic Routing Encapsulation):</strong></em> is a computer networking tunneling technology that is used to encapsulate one protocol inside another. It is <strong>not a security protocol like IPSEC</strong> but rather a versatile protocol for <strong>establishing a virtual point-to-point connection between two networks</strong>.</li>
</ul>
<blockquote>
<p>💡 GRE is a <strong>tunneling protocol</strong> that is used to <strong>transport multicast, broadcast, and non-IP packets like IPX</strong>, etc. <strong>IPSec is an encryption protocol.</strong> IPSec <strong>can only transport unicast packets not multicast &amp; broadcast</strong>. Hence we wrap it GRE first and then into IPSec which is called <strong>GRE over IPSec</strong>.</p>
</blockquote>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Protocal</strong></td><td><strong>Security</strong></td><td><strong>Speed</strong></td><td><strong>Popularity</strong></td></tr>
</thead>
<tbody>
<tr>
<td>OpenVPN</td><td><strong>Very strong</strong></td><td><strong>Fast</strong></td><td><strong>Very high</strong></td></tr>
<tr>
<td>WireGuard</td><td><strong>Very strong</strong></td><td><strong>Very fast</strong></td><td><strong>Growing</strong></td></tr>
<tr>
<td>IKEv2</td><td><strong>Strong</strong></td><td><strong>Very fast</strong></td><td><strong>High</strong></td></tr>
<tr>
<td>L2TP</td><td>Strong</td><td>Slow</td><td>Low</td></tr>
<tr>
<td>PPTP</td><td>Weak</td><td>Very fast</td><td>Low</td></tr>
<tr>
<td>SSTP</td><td>Strong</td><td>Fast</td><td>Low</td></tr>
</tbody>
</table>
</div><p><strong>Encapsulating Security Protocol (ESP):</strong> ESP encrypts the IP header and the payload for each packet — unless transport mode is used, in which case it only encrypts the payload. ESP adds its own header and a trailer to each data packet</p>
<h2 id="heading-vpn-implementation">VPN Implementation</h2>
<h1 id="heading-site-to-site-vpn-implementation">Site-to-Site VPN Implementation</h1>
<ol>
<li><strong>Create an Access List.</strong></li>
<li><strong>Configure ISAKMP policy.</strong>   <strong>Phase 1</strong></li>
<li><strong>IPSec Transform Set,</strong> <strong>phase 2</strong></li>
<li><strong>Create crypto MAP. (connecting the tunnels created in Phase 1 and Phase 2).</strong></li>
<li><strong>Apply a cryptographic map on the interface. (exit interface)</strong></li>
</ol>
<p>IPsec VPN negotiation occurs in <strong>two phases</strong>. In Phase 1, <strong>participants establish a secure channel in which to negotiate the IPsec security association (SA).</strong> <strong>In Phase 2, participants negotiate the IPsec SA for authenticating traffic that will flow through the tunnel.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eea62270-fb8d-4f17-af09-0f689d8bb3a1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will create a site-to-site VPN using IPsec between two airports in Iraq. </p>
<h3 id="heading-step-1-define-interesting-traffic">Step 1: Define interesting traffic</h3>
<p>To make use of the <em><strong>IPsec encryption with the VPN</strong></em>, it is necessary to <strong>define extended access lists to tell the router which traffic to encrypt</strong>. A packet that is permitted by an access list used for defining IPsec traffic is <strong>encrypted</strong> if the IPsec session is configured correctly. <strong>A packet that is denied by the IPsec access list is not dropped. It is sent unencrypted</strong></p>
<pre><code class="lang-javascript">access-list <span class="hljs-number">100</span> permit ip <span class="hljs-number">192.168</span><span class="hljs-number">.16</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> <span class="hljs-number">192.168</span><span class="hljs-number">.45</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
</code></pre>
<h3 id="heading-create-the-isakmp-policy-phase-1">Create the ISAKMP Policy (Phase 1)</h3>
<pre><code class="lang-javascript">BGW-Router(config)#crypto isakmp policy <span class="hljs-number">10</span>

BGW-Router(config-isakmp)#encryption aes <span class="hljs-number">256</span> 
_**after the isakam tunnel created, then we Choose <span class="hljs-keyword">with</span> which encryption algorithm the tunnel should be encrypted.**_

BGW-Router(config-isakmp)#authentication pre-share
_**the key will be shared.**_

BGW-Router(config-isakmp)#group <span class="hljs-number">5</span>
_**Diffie-Hellman is a protocol <span class="hljs-keyword">for</span> creating a shared secret between two sides <span class="hljs-keyword">of</span> a communication.**_
</code></pre>
<h2 id="heading-verify-isakmp-policy">Verify ISAKMP  policy</h2>
<pre><code class="lang-javascript">BGW-Router#show crypto isakmp policy
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/19b2b20d-00b3-44b0-a809-f2f36caa2c83.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">BGW-Router#show crypto isakmp sa
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fa02e65f-2101-46ec-99b1-e64284f85373.png" alt="CCNA 200-301 Study (1)" /></p>
<p>It is showing we have a tunnel with active status.</p>
<h3 id="heading-configure-pre-shared-keys">Configure pre-shared keys.</h3>
<pre><code class="lang-javascript">BGW-Router(config)#crypto isakmp key [Strong password] address ip ( IP address <span class="hljs-keyword">of</span> the remote peer)
BGW-Router(config)#crypto isakmp key iqairport address <span class="hljs-number">40.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>Note: There should be the same password on each side.</strong></p>
<p>we told this router, we have the router from the other side and have a public IP, by using this public IP create a VPN connection.</p>
<p>Because pre-shared keys are used as the authentication method in the IKE policy, a key must be configured on each router that points to the other VPN endpoint. These keys must match for authentication to be successful. The global configuration mode crypto isakmp key key-string address ip-address command is used to enter a pre-shared key. Use the IP address of the remote peer, which is the remote interface that the peer would use to route traffic to the local router.</p>
<pre><code class="lang-java">BGW-Router#show crypto isakmp key
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/80c631ab-0595-4e37-a87c-242a0817bb7c.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-configure-ipsec-second-tunnel-phase-2">Configure IPsec (second tunnel) <strong>phase 2</strong></h3>
<pre><code class="lang-javascript">BGW-Router(config)#crypto ipsec transform-set **BGW-EBL** [name] esp-aes <span class="hljs-number">256</span>[Encryption Algorithm] esp-sha-hmac [hasing algorithm]
</code></pre>
<h3 id="heading-create-and-apply-a-crypto-map">Create and apply a crypto map</h3>
<pre><code class="lang-javascript">crypto map [name] [sequence-num] [type]

BGW-Router(config)# crypto map **airport-map** <span class="hljs-number">10</span> ipsec-isakmp 

BGW-Router(config-crypto-map)#set peer <span class="hljs-number">40.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
_**(ip <span class="hljs-keyword">of</span> the next router we connecting together)**_ 

BGW-Router(config-crypto-map)#set pfs group1
**when you use a key never reuse it again.**


BGW-Router(config-crypto-map)#set security-association lifetime seconds <span class="hljs-number">3600</span>
_**every one hour the key will be changed**_  


BGW-Router(config-crypto-map)#set transform-set BGW-EBL **[name <span class="hljs-keyword">of</span> IPSec]**      


BGW-Router(config-crypto-map)match address <span class="hljs-number">100</span> (Access list number we defined <span class="hljs-keyword">in</span> the first step)
_**which IP addresses have permission to use the created tunnel.**_
</code></pre>
<p>Now we have two tunnels, and we create a connection between them through a crypto map.</p>
<p><strong>perfect forward secrecy (PFS)</strong> when requesting new security associations for this crypto map entry, or that IPSec requires PFS when receiving requests for new security associations, use the set pfs crypto map configuration command</p>
<pre><code class="lang-java">BGW-Router#show crypto map
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/71ed577a-6934-495b-a750-709195b16811.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-apply-the-crypto-map-to-the-exiting-interface">Apply the crypto map to the exiting interface</h3>
<pre><code class="lang-javascript">BGW-Router#conf t
BGW-Router(config)#int FastEthernet1/<span class="hljs-number">0</span>
BGW-Router(config-<span class="hljs-keyword">if</span>)#


BGW-Router(config-<span class="hljs-keyword">if</span>)#crypto map **airport-map**
</code></pre>
<p>*Mar 28 11:25:39.315: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON</p>
<blockquote>
<p>💡 <strong>The same configuration will be applied to the router on the other side.</strong></p>
</blockquote>
<h2 id="heading-verification">Verification</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/54670312-cb38-4918-afa4-b5487f8b849b.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">BGW-Router#show crypto ipsec sa
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/638f013c-034f-4f89-8cc8-6f8fb959babf.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, 4 packets were encrypted and transmitted to the other airport, and 4 packets were decrypted.</p>
<h2 id="heading-network-architectures">Network Architectures</h2>
<p>## 
<strong>LAN  Architecture</strong></p>
<ul>
<li>Topologies</li>
<li>Network Design Layers</li>
<li>PoE</li>
</ul>
<h2 id="heading-wan-architecture">WAN Architecture</h2>
<ul>
<li>Metro Ethernet</li>
<li>MPLS</li>
<li>VPN</li>
</ul>
<h2 id="heading-cloud-architecture">Cloud Architecture</h2>
<ul>
<li>Virtualization and Cloud Computing</li>
</ul>
<h3 id="heading-lan-topology">LAN Topology</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/89af748e-ff50-42de-892e-2e66ad7ee622.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-1-star-topology-most-common-today">⭐ <strong>1. Star Topology</strong> — ✅ <strong>Most Common Today</strong></h3>
<h3 id="heading-structure">🧱 Structure:</h3>
<ul>
<li>All devices connect to a <strong>central switch or hub</strong>.</li>
<li>Think of it like a wheel: the switch is the center, devices are the spokes.</li>
</ul>
<h3 id="heading-why-its-most-commonly-used">✅ <strong>Why it's most commonly used:</strong></h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Reason</td><td>Explanation</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Easy to manage</strong></td><td>Centralized control from the switch</td></tr>
<tr>
<td><strong>Easy to add/remove devices</strong></td><td>No disruption to the whole network</td></tr>
<tr>
<td><strong>Good performance</strong></td><td>Switch reduces collisions</td></tr>
<tr>
<td><strong>Fault isolation</strong></td><td>A failure in one cable/device doesn’t affect others</td></tr>
</tbody>
</table>
</div><h2 id="heading-network-design">Network Design</h2>
<h3 id="heading-network-design-three-tier-architecture">Network Design: Three-Tier Architecture</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c1834c41-a367-468f-be74-90deb9729438.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfc144f0-c8bd-4111-9833-aab59622745b.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Access layer</strong>: provides a connection point for end-user devices to the network and allows multiple hosts to connect to other hosts through a network device, usually a switch, such as the Cisco 2960-XR shown in the figure, or a wireless access point. Typically, all devices within a single access layer will have the same network portion of the IP address.</li>
<li>the layer that end hosts connect to (PCs, printers, cameras, etc.)</li>
<li>typically Access Layer Switches have lots of ports for end hosts to connect to</li>
<li>QoS marking is typically done here</li>
<li>Security services like port security, DAI, etc. are typically performed here</li>
<li><p>switchports might be PoE-enabled for wireless APs, IP phones, etc.</p>
<p>  <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3937e30b-f7c1-4b6a-abf0-606fd6099413.jpeg" alt="CCNA 200-301 Study (1)" /></p>
</li>
<li><p><strong>Distribution layer</strong>: The distribution layer in network topology serves as <strong>the communication point between the access layer and the core**</strong>,<strong> providing routing, filtering, WAN access, and determining the fastest way to handle network service requests, Distribution layer devices control the type and amount of traffic that flows from the access layer to the core layer. It typically includes </strong>routers and multilayer switches.**</p>
<p>  <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d1b8febb-34c7-445a-8927-84f20be01957.jpeg" alt="CCNA 200-301 Study (1)" /></p>
</li>
<li><p><strong>Core layer</strong>: The core layer in network topology, also known as the <strong>network backbone</strong>, is responsible for <strong>quickly transporting large amounts of traffic and providing interconnectivity between distribution layer devices</strong>. It typically consists of h<strong>igh-speed devices like high-end routers and switches with redundant links.</strong></p>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f203959a-d6ed-470f-bdf8-969ba2c0199d.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-network-design-two-tier-architecture-collapsed-core">Network Design Two-Tier Architecture (collapsed core)</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/48fb9333-e21a-4bef-aba3-9c5ecbffc27c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/22cdc34b-8321-448a-a1ac-16f25f09c78a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/afed3073-6f71-4b9a-95f3-581de6cb0e72.png" alt="CCNA 200-301 Study (1)" /></p>
<p>many Small enterprise networks do not grow significantly larger over time, Therefore, A two-tier hierarchical design where the core and distribution layers are collapsed into one layer is often more practical .
<strong>Collapsed Core</strong> is when the <strong>distribution layer and Core layer</strong> functions are implemented by a <strong>single device.</strong> </p>
<h2 id="heading-spine-leaf-architecture"><strong>Spine-leaf Architecture</strong></h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/474157ec-2624-42db-9f6a-4f43cfac06ca.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>The spine-leaf architecture</strong> has become a popular data center architecture, bringing many advantages to the data center, such as <strong>scalability</strong>, <strong>network performance</strong>, etc. The benefits of spine-leaf architecture in modern networks are summarized here in three points.</p>
<p><strong>Increased redundancy:</strong> The spine-leaf architecture connects the servers with the core network, and has higher flexibility in hyper-scale data centers. In this case, the <strong>leaf switch can be deployed as a bridge between the server and the core network</strong>. Each <strong>leaf switch connects to all spine switches, which creates a large non-blocking fabric</strong>, increasing the level of redundancy and reducing traffic bottlenecks.</p>
<p><strong>Performance enhancement:</strong> The spine-leaf architecture can effectively avoid traffic congestion by applying protocols or techniques such as transparent interconnection of multiple links (TRILL) and shortest path bridging (SPB). The spine-leaf architecture can be Layer 2 or Layer 3, so uplinks can be added to the spine switch to expand inter-layer bandwidth and reduce oversubscription to secure network stability.</p>
<p><strong>Scalability:</strong> The spine-leaf architecture has multiple links that can carry traffic. The addition of switches will improve scalability and help enterprises expand their business later.</p>
<p>There are some rules about Spine-Leaf architecture:
→ Every Leaf switch is connected to every Spine switch.
→ Every Spine switch is connected to every Leaf switch.
→ Leaf switches do not connect to other Leaf switches.
→ Spine switches do not connect to other Spine switches.
→ End hosts (servers etc.) only connect to Leaf switches.</p>
<ul>
<li>The path taken by traffic is randomly chosen to balance the traffic load among the Spine switches.</li>
<li>Each server is separated by the same number of ‘hops’ (except those connected to the same Leaf), providing consistent latency for East-West traffic.</li>
</ul>
<h1 id="heading-how-to-design-a-network">How to Design a Network?</h1>
<ul>
<li>A clear map of the network</li>
<li>The structure and layout of  the cabling required</li>
<li>The quantity, type, and location of all devices on the network.</li>
<li>Your IP Addressing structure.</li>
<li>Details of your network security architecture and processes.</li>
<li>Budgets and Scalability.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2f0b30ed-701e-426e-9bbc-723cc7ff7b99.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6af0e009-6e1d-4478-8447-e874355d3617.png" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=srV9gKvuTC0">https://www.youtube.com/watch?v=srV9gKvuTC0</a></p>
<h2 id="heading-poe">POE</h2>
<p>Sending electricity over the unused Ethernet wires to power a connected device. Through inline power or using power over Ethernet (POE). Cisco IP phones, devices such as wireless access points, and video surveillance equipment can also use PoE.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/57948fe4-aeb1-43eb-bce3-e5726d0d8dee.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, 4 of the lines are used to receive and transmit data, and 4 other lines are used to send power. </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>PoE Extender</td><td>to extend the reach of both power and data signals over Ethernet cables. <strong>(the standard 100-meter (328 feet) limit)</strong></td></tr>
</thead>
<tbody>
<tr>
<td>POE Injector</td><td>Connects POE-enabled network devices to a non-PoE LAN Switch port</td></tr>
<tr>
<td>POE Splitter</td><td>A small device that separates the data and power signals in a power over Ethernet(POE) cable, providing power to a non-PoE device</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/db5b318d-dc81-49dd-883d-9a32f520502e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/60e253a5-12cc-4ffa-8af0-4fba20a57206.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ee1525f4-7fa5-4696-9f06-be6945526120.webp" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-wan-architecture-1">WAN Architecture</h1>
<ul>
<li><strong>Metro Ethernet</strong></li>
<li><strong>MPLS</strong></li>
<li><strong>VPN</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aaefd0c6-3a9b-4ffd-a7a2-25c8cb78a113.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-metro-ethernet">Metro Ethernet</h2>
<p>Metro Ethernet is an Ethernet transport network that provides point-to-point or multipoint connectivity services over a <em>metropolitan area network (MAN).</em> Ethernet originated as a <strong>LAN technology</strong> and became a replacement for l<strong>ow-speed WAN technologies</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f0553a1b-8132-4921-be31-4afcbaf3f2ac.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c8986d52-1bbb-4d48-be0b-314281f7844a.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-mpls">MPLS</h1>
<p><strong>Multiprotocol Label Switching</strong> (MPLS) is a <strong>data-forwarding technology</strong> that <strong>increases the speed and controls the flow of network traffic</strong>. With MPLS, data is directed through a path via labels instead of requiring <strong>complex lookups in a routing table at every loop.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3cf2baef-b4e7-45e8-a464-1e769bce3c4e.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-when-is-mpls-used"><strong>When is MPLS used?</strong></h2>
<p>MPLS can be used when speed and <strong>reliability are highly important.</strong> Applications that require near-immediate data delivery are known as <strong>real-time applications.</strong> Voice calls and video calls are two common examples of real-time applications. </p>
<p>## </p>
<p><strong>What are the drawbacks of MPLS?</strong></p>
<ol>
<li><strong>Cost:</strong> MPLS is more expensive than regular internet service.</li>
<li><strong>Long Setup Time:</strong>  Setting up complicated paths across one or more large networks takes time.</li>
<li><strong>Lack of encryption:</strong> MPLS is not encrypted; any attacker who intercepts packets on MPLS paths can read them in plaintext. Encryption has to be set up separately.</li>
</ol>
<pre><code class="lang-javascript">MPLS packets: Not encrypted by <span class="hljs-keyword">default</span>.
Security options: VPNs <span class="hljs-keyword">for</span> encryption, traffic isolation, and secure network infrastructure.
</code></pre>
<blockquote>
<p>💡 MPLS routers work as a switch just forwarding the incoming packets, without decapsulating the packet in layer 3 to check the IP of the destination and checking the routing table. </p>
</blockquote>
<h2 id="heading-virtualization">Virtualization</h2>
<p><strong>Virtualization</strong> is the ability to <strong>run multiple operating systems</strong> on a single physical system and share the underlying hardware resources.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b290a931-7ffe-4a1c-8ad8-6ea1ea79c4d3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>## 
Hypervisor</p>
<p>A hypervisor is software that creates and runs virtual machines (VMS). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. </p>
<h2 id="heading-two-types-of-hypervisor">Two Types of Hypervisor</h2>
<h3 id="heading-type-1">Type 1</h3>
<p><strong>Type 1, or “bare metal,”</strong> is more optimized because it is <strong>already installed and runs directly on the hardware it came included with</strong>. It replaces a host operating system, and <strong>VM resources are scheduled directly to the hardware by the hypervisor</strong>.   </p>
<blockquote>
<p>💡 This type of hypervisor is most common in an <em><strong>enterprise data center or other server-based environment.</strong></em>   </p>
</blockquote>
<p><strong>KVM, Microsoft Hyper-V, and VMware vSphere</strong> are examples of type 1 hypervisors. KVM was merged into the Linux kernel in 2007. If you are using a modern version of Linux, you already have access to KVM</p>
<h3 id="heading-type-2">Type 2</h3>
<p>A <strong>type 2 hypervisor</strong> is also known as a hosted hypervisor and is run on <em><strong>a conventional operating system as a software layer or application</strong></em>. </p>
<blockquote>
<p>💡 A type 2 hypervisor is better for <em><strong>individual users who want to run multiple operating</strong></em> systems on a personal computer.</p>
</blockquote>
<p><strong>VMware Workstation and Oracle VirtualBox</strong> are examples of a type 2 hypervisor.</p>
<h2 id="heading-containers-vs-vms-optional"><strong>Containers vs. VMs (optional)</strong></h2>
<p><strong>Containers</strong> and <strong>virtual machines</strong> are very similar resource v<strong>irtualization technologies. Virtualization is the process in which a system's singular resource like RAM, CPU, Disk, or Networking,</strong> can be ‘virtualized’ and represented as multiple resources. The key differentiator between containers and virtual machines is that v<strong>irtual machines virtualize an entire machine down to the hardware layers,</strong> and <strong>containers only virtualize software layers above the operating system level.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/02162461-1709-4344-8630-668aaec0c423.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-types-of-virtualization">Types of Virtualization</h2>
<ul>
<li>Application Virtualization</li>
<li>Desktop Virtualization</li>
<li>Hardware Virtualization</li>
<li>Network virtualization (VLAN)</li>
<li>Storage Virtualization</li>
</ul>
<h2 id="heading-cloud-computing">Cloud Computing</h2>
<p><strong>On-premise (or on-premises)</strong> refers to software, hardware, or IT infrastructure that is <strong>physically located within</strong> <strong>a company's facilities</strong>, rather than being hosted remotely (like in the cloud).</p>
<h2 id="heading-cloud-computing-1">Cloud Computing</h2>
<p><strong>Cloud computing</strong> is a model that allows customers <strong>simple</strong>, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) from anywhere. These resources can be rapidly provisioned and released with minimal management effort or interaction with the service provider. This cloud model is composed of five essential characteristics, three service models, and four deployment models.</p>
<h2 id="heading-essential-characteristics-of-cloud">Essential Characteristics of Cloud</h2>
<ul>
<li><p><strong>On-Demand self-service:</strong> Users can automatically provision computing resources like storage or processing <strong>without human interaction</strong> with the <strong>service provider</strong>.</p>
<p>   ✅ Example: Creating a virtual machine instantly through a cloud dashboard.</p>
</li>
<li><p><strong>Broad Network Access:</strong> Cloud services are available over the network and can be accessed via <strong>standard devices</strong> such as laptops, smartphones, and tablets.</p>
<p>     ✅ Example: Accessing cloud storage like Google Drive or Dropbox from any device with internet.</p>
</li>
<li><p><strong>Resource Pooling:</strong> Cloud providers use <strong>multi-tenant models</strong> to serve multiple customers using shared resources (like memory, storage, and bandwidth), dynamically assigned and reassigned according to demand.</p>
<p>      ✅ Example: One physical server running virtual machines for multiple clients.</p>
</li>
<li><p><strong>Rapid Elasticity:</strong>  Resources can be quickly <strong>scaled up or down</strong>, sometimes automatically, to meet demand.</p>
<p>       ✅ Example: Auto-scaling web servers during traffic spikes.</p>
</li>
</ul>
<ul>
<li><p><strong>Measured service:</strong> Cloud Systems automatically control and optimize resource use by <strong>metering usage</strong>, so customers pay only for what they use.</p>
<p>✅ Example: Paying per gigabyte of storage or per hour of compute time.</p>
</li>
</ul>
<h2 id="heading-cloud-computing-service-models">Cloud Computing Service models</h2>
<ul>
<li><strong>Software as a service (SaaS)</strong>: Instead of users installing <strong>an application</strong> on their device, SaaS applications are hosted on cloud servers, for example, <strong>Salesforce, Mailchimp, and Slack</strong>.</li>
<li><strong>Platform as a Service (PaaS):</strong> <a target="_blank" href="https://www.cloudflare.com/learning/serverless/glossary/platform-as-a-service-paas/">PaaS</a> vendors offer everything necessary for building an application, including development tools, infrastructure, and operating systems, over the Internet. PaaS can be compared to renting all the tools and equipment necessary for building a house, instead of renting the house itself. PaaS examples include Heroku and Microsoft Azure.</li>
<li><strong>Infrastructure as a Service (IaaS)</strong>: The cloud provider is responsible for giving IT managers access to the <strong>network equipment, virtualized network services, and supporting network</strong> infrastructure. Using this cloud service allows IT managers to deploy and run software code, which can include operating systems and applications. Examples include Amazon EC2 and Google Compute Engine.</li>
</ul>
<h2 id="heading-cloud-computing-deployments">Cloud Computing Deployments</h2>
<p><strong>Public Cloud:</strong> Cloud-based applications and services offered in a public cloud are made available to the general population. Service may be free or offered on a pay-per-use model.</p>
<p><strong>Private Cloud (On-premise Cloud):</strong> Cloud-based applications and services offered in a private environment to one organization. </p>
<p><strong>Hybrid cloud</strong>: deployments c<strong>ombine public and private clouds</strong>, and may even include on-premises legacy servers. An organization may use its <strong>private cloud for some services</strong> and its public cloud for others, or it may use the public cloud as a backup for its private cloud.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ee9057c5-e4aa-4490-9c6e-c7914c0785e9.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-network-automation">Network Automation</h2>
<h1 id="heading-what-is-automation">What is Automation?</h1>
<ul>
<li><strong>Network Automation</strong> is the <strong>process of automating the configuration, management, testing, deployment, and operation of physical and virtual devices within a network.</strong> With everyday network tasks and functions automated and repetitive processes controlled and managed automatically, network service availability is ensured.</li>
</ul>
<h1 id="heading-why-automation">Why Automation?</h1>
<ul>
<li>Remove the <strong>risk of human erro</strong>r.</li>
<li>Easy control of device <strong>configuration for consistency and accuracy</strong>.</li>
<li>Reduces the workload for IT staff.</li>
<li>Standardize processes. (Vendor free)</li>
<li>Zero-touch provisioning. (without touching the router for configuration)</li>
<li>fast and accurate deployment of patches and updates.</li>
</ul>
<h1 id="heading-sdn">SDN</h1>
<ul>
<li><strong>SDN stands for Software-Defined Network,</strong> which is a <strong>networking architecture approach</strong>. It enables the control and management of the network devices using <strong>software applications</strong>. Through Software Defined Network (SDN), the networking behavior of the entire network and its devices is programmed in a centrally controlled manner through software applications using open APIs.</li>
</ul>
<p>To understand software-defined networks, it is essential to comprehend the various planes involved in networking.</p>
<ul>
<li><strong>Data Plane</strong></li>
<li><strong>Control Plane</strong></li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>CONTROL PLANE</strong></td><td><strong>DATA PLANE</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Control plane</strong> refers to the <strong>all functions and processes</strong> that determine <strong>which path to use to send the packet or frame</strong>.</td><td><strong>Data plane</strong> refers to <strong>all the functions and processes</strong> that <strong>forward packets/frames from one interface to another based on control plane logic</strong>.</td></tr>
<tr>
<td>It is responsible for <strong>building and maintaining the IP routing table and how packets should be forwarded.</strong></td><td>It is responsible for <strong>forwarding actual IP packet and moving packets from source to destination.</strong></td></tr>
<tr>
<td><strong>Control plane</strong> performs its <strong>task independently</strong>.</td><td><strong>Data plane</strong> performs its <strong>task depending on Control plane.</strong></td></tr>
<tr>
<td>In general we can say in control plane it is learned what and how it can be done.</td><td>In general we can say in data plane the actual task is performed based on what is learned.</td></tr>
<tr>
<td>It includes <strong>Spanning Tree Protocol (STP),Address Resolution Protocol (ARP),Routing Information Protocol (RIP), Dynamic Host Configuration Protocol (DHCP) etc**</strong>.**</td><td>It includes <strong>decrementing Time To Live (TTL), recomputing IP header checksum etc**</strong>.**</td></tr>
<tr>
<td>Control plane acts as a <strong>decision maker</strong> in data forwarding.</td><td>Data plane acts as a <strong>decision implementer</strong> in data forwarding.</td></tr>
<tr>
<td><strong>Routing</strong> is performed in the <strong>control plane.</strong></td><td><strong>Switching</strong> is performed in the <strong>data plane</strong>.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a46c6bd9-0293-4faf-9dc5-7bf39d01f7be.webp" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/01548742-b73c-453f-b223-e0d228a04500.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/75ce3418-ec6a-47af-9d7e-7836e024681b.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-sdn-elements">SDN Elements</h1>
<ul>
<li><strong>Controller</strong>: the <strong>core of an SDN architecture,</strong> which enables centralized management and control, automation, and policy enforcement across physical and virtual network environments.</li>
<li><strong>Southbound API:</strong> relay information between the controller and the individual network devices (Such as switches, access points, routers, and firewalls).</li>
<li><strong>Northbound API:</strong> relays information between the <strong>controller and the application plane</strong>.</li>
</ul>
<h1 id="heading-sdn-controllers-and-protocols">SDN Controllers and Protocols</h1>
<h3 id="heading-protocols">Protocols:</h3>
<ul>
<li>Two of the most well-known protocols used by <strong>SDN controllers to communicate with the switches/routers</strong> are <strong>OpenFlow</strong> and <strong>Open Virtual Switch Database (OVSDB).</strong></li>
</ul>
<h3 id="heading-controller">Controller:</h3>
<ul>
<li>The first SDN controller was NOX.</li>
</ul>
<h1 id="heading-different-models-of-sdn">Different Models of SDN</h1>
<ul>
<li>Open SDN</li>
<li>SDN via APIs</li>
<li>SDN via Hypervisor-based Overlay network.</li>
<li>Hybrid SDN.</li>
</ul>
<h1 id="heading-why-sdn-is-important">Why SDN is Important?</h1>
<ul>
<li><strong>Better Network Connectivity.</strong></li>
<li><strong>Better Deployment of Applications.</strong></li>
<li><strong>Better Security.</strong></li>
<li><strong>Better Control with high speed.</strong></li>
</ul>
<h1 id="heading-sdn-architecture">SDN Architecture</h1>
<ul>
<li><strong>Underlay</strong> is the <strong>physical or basic IP network</strong> that provides <strong>connectivity between devices</strong> (switches, routers, servers, etc.).</li>
<li><strong>Overlay</strong> is a <strong>virtual network</strong> built <strong>on top of the underlay</strong> using <strong>encapsulation</strong> technologies,  such as VXLAN, OTV, VPLS, <em><strong>or</strong></em> MPLS-VPN.</li>
<li><strong>Fabric</strong> is a <strong>network topology and architecture</strong> that interconnects all devices using consistent and often automated policies. It's typically used in data centers and campus networks.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/876d3f7d-6b0a-458d-8f99-f269619f73d4.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-vxlan">VXLAN</h1>
<p><strong>VXLAN stands for</strong> <strong>Virtual Extensible LAN**</strong>.<strong>
It’s a networking technology used to create </strong>virtual Layer 2 networks<strong> (like VLANs) over a </strong>Layer 3 (IP)<strong> </strong>network<strong>, typically used in </strong>data centers<strong> and </strong>cloud environments**.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/23da7cef-11e3-41d6-adb4-720db2345927.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a11eade9-6ba8-4869-b50c-61631e4d9a4e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>VXLAN is designed to deliver reliable and scalable data center networking services to managed service customers and is a technology for next-generation data center construction.</p>
<h1 id="heading-cisco-dna-controller">Cisco DNA Controller</h1>
<ul>
<li><strong>Cisco DNA Controller</strong> (Also called Cisco Digital Network Architecture) is a <strong>powerful SDN controller and management dashboard</strong> that allows you to take control of your network, optimize your network, and secure your remote workforce.</li>
</ul>
<p>It is an appliance that provides a centralized graphical interface to design your network, add and configure devices, monitor your network and devices, and troubleshoot.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/905d97e3-c00c-472a-835d-96d2f93c25ac.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-api">API</h1>
<ul>
<li>API(Application Programming Interface): is a software intermediately that <strong>allows two applications to communicate with each other</strong>, APIs enable applications to exchange data and functionality easily and securely.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/99b2ebb1-6c94-4336-b354-5d93d23ac36b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In SDN Architecture, APIs are used to communicate between <u><strong>apps and the SDN Controller</strong></u>(via The <strong>NBI</strong>), and between the <u><strong>SDN controller and the network devices</strong></u> (via the <strong>SBI</strong>).</p>
<p>The NBI typically uses REST APIs </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/60de0b3d-c1e6-4fe3-9015-1f9d91b5314f.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-rest-api">REST API</h1>
<ul>
<li>A REST API (<strong>Representational State Transfer</strong>) or RESTful API) is a way applications communicate with each other using a set of rules.</li>
<li><strong>REST APIs</strong> use familiar commands like <strong>GET, POST, PUT, and DELETE.</strong> These commands are like asking the waiter to get (read), add (create), update, or delete information.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/edb5b9e7-86ae-400e-ae42-3bb6c4964d48.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><p>REST APIs communicate via <strong>HTTP</strong> requests to perform standard database functions like <strong>creating, reading, updating, and deleting records</strong> ( also known as CRUD) within resources.</p>
<h1 id="heading-crud-and-http-methods">CRUD and HTTP Methods</h1>
</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>HTTP method</td><td>CRUD</td><td>Example</td></tr>
</thead>
<tbody>
<tr>
<td>GET</td><td>Read</td><td><strong>200(ok),</strong> what is the value of “ip_address”</td></tr>
<tr>
<td>POST</td><td>Create</td><td><strong>201(created)</strong>, create variable “ip_address” and set the value to “192.168.3.1”</td></tr>
<tr>
<td>PUT/PATCH</td><td>update</td><td><strong>405(Method not allowed)</strong>, unless you want to update every resource in the entire collection of resource. Example: change the value of “ip_address” to “192.168.0.2”</td></tr>
<tr>
<td>Delete</td><td>Delete</td><td><strong>405(Method not allowed),</strong> unless you want to delete the whole collection: delete “ip_address”</td></tr>
</tbody>
</table>
</div><h1 id="heading-data-serialization">Data Serialization</h1>
<ul>
<li><p>Serialization is the process of <u><strong>converting a data objec</strong></u>t—a combination of code and data represented within a region of data storage — into a series of bytes that saves the state of the object in an easily transmittable form.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/00158b1d-3fb9-41e2-b212-e24f245c4ccd.png" alt="CCNA 200-301 Study (1)" /></p>
</li>
<li><p><strong>Data formats</strong> such as <strong>JSON and XML</strong> are often used for sorting serialized data.</p>
</li>
<li>JSON(JavaScript Object Notation)</li>
<li>XML(eXtensible Markup language)</li>
<li><p>YAML</p>
<h1 id="heading-json">JSON</h1>
</li>
<li><p>JSON(JavaScript Object Notation) is a lightweight data interchange format. it is easy for humans to read and write.</p>
</li>
<li><p>The whitespace is <strong>insignificant</strong>.</p>
<h1 id="heading-json-keys-and-values">JSON keys and Values</h1>
</li>
<li><p><strong>Key</strong>: a key is always string enclosed in quotation marks.</p>
</li>
<li><p>Value: A value can be a string, number, Boolean expression, array, or object.</p>
<h2 id="heading-type-of-value">Type of value:</h2>
</li>
<li><p><strong>Array:</strong> an associative array of values.</p>
</li>
<li><strong>Boolean:</strong> True or False.</li>
<li><strong>Number:</strong> An integer.</li>
<li><strong>Object:</strong> an associative value of key/value pairs.</li>
<li><p><strong>String: a</strong> plain text character that usually forms a word.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dde8a2e5-84de-4ba1-b36a-bd0eda082bac.png" alt="CCNA 200-301 Study (1)" /></p>
</li>
</ul>
<h1 id="heading-xml">XML</h1>
<ul>
<li>Extensible Markup Language (XML)  is a tag-based language and if you know HTML, this will look familiar. each item you add has to start with .</li>
<li><p>The whitespace is <strong>insignificant</strong>.</p>
<h1 id="heading-yaml">YAML</h1>
</li>
<li><p><strong>YAML</strong> is a <u><strong>data serialization</strong></u> language that is often <u><strong>used for writing configuration files</strong></u>. YAML stands for <strong>yet another markup language,</strong> or YAML, <strong>not markup language</strong>, which <strong>emphasizes that YAML is for data</strong>, <strong>not documents</strong>.</p>
</li>
<li><p>whitespace is <strong>significant</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/623e5098-e560-46c3-b97b-88f280e193d4.png" alt="CCNA 200-301 Study (1)" /></p>
</li>
</ul>
<blockquote>
<p>💡 <strong>JSON</strong>, with its compact syntax and wide-ranging support, has become the de facto standard for web applications and data interchange. Its simplicity ensures rapid parsing and broad compatibility across platforms</p>
</blockquote>
<h1 id="heading-rest-api-authentication">REST API Authentication</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>Basic Auth</td><td>API Key</td><td>Access Token</td><td>OAuth 2.0</td></tr>
</thead>
<tbody>
<tr>
<td>Identifies User?</td><td>✅ (username)</td><td>❌ (app only)</td><td>✅ (if user-scoped)</td><td>✅ (via access token)</td></tr>
<tr>
<td>Authorization Level</td><td>Basic</td><td>App-level</td><td>Granular (scopes)</td><td>Granular (scopes)</td></tr>
<tr>
<td>Credential Rotation</td><td>Manual</td><td>Manual</td><td>Auto (refresh)</td><td>Auto (refresh)</td></tr>
<tr>
<td>Token Expiration</td><td>❌ No</td><td>❌ No</td><td>✅ Yes</td><td>✅ Yes</td></tr>
<tr>
<td>Security Best Practice</td><td>❌ Weak</td><td>⚠️ Medium</td><td>✅ Strong</td><td>✅✅ Strongest</td></tr>
<tr>
<td>Complexity</td><td>✅ Simple</td><td>✅ Simple</td><td>⚠️ Medium</td><td>❌ Complex</td></tr>
<tr>
<td>Ideal Use Case</td><td>Testing, Legacy</td><td>Internal APIs</td><td>User-access APIs</td><td>Web/Mobile login</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>REST-based authentication methods</strong> should always be used <strong>using HTTPS</strong> to prevent credentials from being <strong>intercepted</strong>.</p>
</blockquote>
<h3 id="heading-how-oauth-20-works"><strong>How OAuth 2.0 Works</strong></h3>
<p>    <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/05bfbbe5-46e7-408f-baf1-81bec9601a51.png" alt="CCNA 200-301 Study (1)" /></p>
<p>    The details of the steps in the figure are as follows:</p>
<ol>
<li><strong>Authorization Request:</strong><ul>
<li>User clicks "Log in with Google" on the music platform.</li>
<li>The music platform redirects the user to Google's login page, requesting access to their Gmail profile and email.</li>
</ul>
</li>
<li><strong>Authorization Grant:</strong><ul>
<li>User logs into Gmail and grants permission.</li>
</ul>
</li>
<li><strong>Access Token Request:</strong><ul>
<li>The music platform sends the authorization code and its own credentials to Google to request an access token.</li>
</ul>
</li>
<li><strong>Access Token:</strong><ul>
<li>Google verifies the code and the music platform's identity.</li>
<li>Google issues an access token to the music platform.</li>
</ul>
</li>
<li><strong>Resource Request:</strong><ul>
<li>The music platform uses the access token to request the user's profile and email from Google.</li>
</ul>
</li>
<li><p><strong>Protected Resource:</strong></p>
<ul>
<li>If the access token is valid, Google provides the requested information to the music platform.</li>
</ul>
<h1 id="heading-configuration-management">Configuration Management</h1>
</li>
<li><p><strong>Configuration Management</strong> is the process of maintaining a computer system, server, and software in a desired, consistent state. It’s a way to <strong>make sure that a system performs as it’s expected as changes are made over time</strong>.</p>
<p><strong>Infrastructure as Code (IaC)</strong> is the practice of <strong>provisioning and managing infrastructure</strong> (Server, networks, cloud resources) using a machine-readable configuration file (code) instead of manual configuration (e.g, CLI/GUI)</p>
</li>
</ol>
<h1 id="heading-configuration-management-tools">Configuration Management Tools</h1>
<ul>
<li>Ansible</li>
<li>CFEngine</li>
<li>Puppet</li>
<li>Chef</li>
<li>Salt</li>
</ul>
<h2 id="heading-type-of-configuration-management-tools">Type of Configuration Management Tools</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/34fd6161-6b33-4a6a-9862-4468bb41314f.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-push-base-configuration-management-tools">Push Base configuration management tools</h3>
<p><strong>Push configuration management tools</strong> initiate and push configuration changes from <strong>a central server or control node to the target system</strong>. The central server actively sends the updated configurations to the target systems.</p>
<ul>
<li><strong>Centralized Control</strong>: A central server or control node is responsible for initiating and distributing configuration changes to the target systems.</li>
<li><strong>Immediate Updates:</strong> The target system receives and applies the configuration changes immediately from the configuration management server.</li>
<li><strong>Real-Time Interaction</strong>: Push-based configuration management typically involves real-time communication between the configuration server and the target systems.</li>
<li><strong>Agentless or Light Agents:</strong> push-based configuration management can be agentless, where the target systems fetch configuration changes using protocols like HTTP or SSH.</li>
</ul>
<h3 id="heading-pull-base-configuration-management-tools">Pull Base configuration management tools</h3>
<p><strong>Pull-based configuration management</strong> tools enable <strong>target systems to independently fetch configuration from a central repository or server when needed.</strong> The target systems periodically or on demand request and retrieve the updated configurations. </p>
<ul>
<li><strong>Decentralized Control:</strong> Configuration changes are stored in a central repository on the server, but the target systems independently retrieve changes when needed.</li>
<li><strong>Delay Updates:</strong> The target systems update their configuration only when they request and retrieve the updated configuration from the central server. Changes are not applied immediately upon availability.</li>
<li><strong>Scheduled or Triggered Retrieval:</strong> The target system can be configured to retrieve the configuration changes periodically, based on a schedule, or triggered by specific events or conditions.</li>
<li><strong>Agent-based Approach:</strong> Pull-based configuration management often relies on <strong>agents or client software installed on the target systems.</strong> These agents establish communication with the configuration management server and receive configuration updates.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7d733bb7-e857-43a0-8322-d195e8a0da25.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-ansible">Ansible</h1>
<ul>
<li>Ansible is an <strong>open-source</strong> community project sponsored by <strong>Red Hat</strong>.</li>
<li>Ansible is the <u><em><strong>automation language</strong></em></u> that can be used across entire IT teams from systems and network administrators to developers and managers.</li>
<li>It has only <strong>a master running on the server machine</strong>, but <strong>no agents running on the client machine.</strong> It uses an <strong>SSH connection to log in to client systems or nodes you want to configure</strong>.</li>
<li>Ansible relies on modules and Python libraries to communicate with other devices.</li>
<li>Modules can be written in different programming languages (mostly Python) to accomplish different tasks.</li>
<li>Cisco devices can communicate with Ansible through <strong>SSH and SNMP</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/882e769e-026b-4da8-ad22-60cba69c7163.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/edc0597e-8bd8-41ed-bc27-7533327a33e6.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Playbooks</strong> are the files where Ansible code is written. Playbooks are <strong>written in YAML format</strong>. YAML stands for Yet Another Markup Language. <strong>Playbooks</strong> are one of the core features of Ansible and tell <u><strong>Ansible what to execute</strong></u>. They are like a to-do list for Ansible that contains a list of tasks.</p>
<p><strong>“command_ios.yml” Playbook</strong></p>
<pre><code class="lang-javascript">---
- name: IOS Show Commands
<span class="hljs-attr">hosts</span>: <span class="hljs-string">"ios_devices"</span>
<span class="hljs-attr">gather_facts</span>: <span class="hljs-literal">false</span>
<span class="hljs-attr">connection</span>: local

<span class="hljs-attr">vars</span>:
  cli:
    host: <span class="hljs-string">"{{ ansible_host }}"</span>
    <span class="hljs-attr">username</span>: <span class="hljs-string">"{{ username }}"</span>
    <span class="hljs-attr">password</span>: <span class="hljs-string">"{{ password }}"</span>
    <span class="hljs-attr">transport</span>: cli

<span class="hljs-attr">tasks</span>:
  - name: ios show commands
    <span class="hljs-attr">ios_command</span>:
      commands:
        - show version | i IOS
        - show run | i hostname
      <span class="hljs-attr">provider</span>: <span class="hljs-string">"{{ cli }}"</span>

    <span class="hljs-attr">register</span>: output

    - name: show output <span class="hljs-keyword">of</span> IOS
      <span class="hljs-attr">debug</span>:
        <span class="hljs-keyword">var</span>: output
</code></pre>
<p><strong>Inventory:</strong> The Ansible inventory file defines the hosts and groups of hosts upon which commands, modules, and tasks in a playbook operate.</p>
<p><strong>“hosts” Inventory</strong></p>
<pre><code class="lang-javascript">[cisco_routers]
<span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> ansible_connection=network_cli ansible_network_os=ios ansible_user=your_username ansible_password=your_password ansible_become=yes ansible_become_method=enable ansible_become_password=your_enable_password


[cisco_switches]

<span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.5</span> ansible_connection=network_cli ansible_network_os=ios ansible_user=your_username ansible_password=your_password ansible_become=yes ansible_become_method=enable ansible_become_password=your_enable_password
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/89df7598-0843-44ef-8385-daf117a4b052.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡  In a production environment, the best practice is to use a more secure method, such as <strong>Ansible Vault or Ansible Tower</strong>. </p>
</blockquote>
<h1 id="heading-terraform">Terraform</h1>
<p><strong>Terraform</strong> is an open-source  LaC tool developed by <strong>HashiCorp</strong>, designed to help professionals efficiently build, change, and version infrastructure safely and predictably.</p>
<p>Terraform uses <strong>providers</strong>, which are plugins that interact with devices through APIs like <strong>RESTCONF</strong> or <strong>NETCONF</strong>.</p>
<blockquote>
<p>💡 <strong>RESTCONF and NETCONF</strong> are network configuration protocols that allow direct interaction with network devices. They provide standardized APIs for secure communication, used to modify device configurations and retrieve operational data.</p>
</blockquote>
<ul>
<li>Like <strong>Ansible</strong>, it uses a push model and is <strong>agentless</strong>.</li>
<li>A <strong>Terraform provider</strong> is essentially a plugin that allows Terraform to interact with different technologies. For example, Cisco offers several Terraform providers to configure devices.</li>
<li><strong>HCL</strong> is a configuration language designed to be both human-readable and machine-friendly, similar to JSON and XML.</li>
<li><strong>HCL</strong> is similar to JSON in data structure and uses braces for blocks and lists. However, HCL also includes features for configuration management, such as comments and a more flexible syntax.</li>
</ul>
<p><strong>Step 1: Create the Terraform configuration file.</strong></p>
<pre><code class="lang-bash"><span class="hljs-comment"># Assuming there is a provider that supports Cisco IOS XE RESTCONF</span>
provider <span class="hljs-string">"cisco_ios_xe"</span> {
  host     = <span class="hljs-string">"192.168.10.1"</span>
  username = <span class="hljs-string">"admin"</span>
  password = <span class="hljs-string">"adminpass"</span>
  secure   = <span class="hljs-literal">true</span>  <span class="hljs-comment"># Assuming secure implies HTTPS/RESTCONF is being used securely</span>
}

<span class="hljs-comment"># Resource configuration for an interface</span>
resource <span class="hljs-string">"cisco_ios_xe_interface"</span> <span class="hljs-string">"gigabit1"</span> {
  name        = <span class="hljs-string">"GigabitEthernet1"</span>
  description = <span class="hljs-string">"Uplink Interface"</span>
  enabled     = <span class="hljs-literal">true</span>
}

<span class="hljs-comment"># Output the operational status of the interface</span>
output <span class="hljs-string">"interface_status"</span> {
  value = cisco_ios_xe_interface.gigabit1.operational_status
  description = <span class="hljs-string">"Operational status of the GigabitEthernet1 interface."</span>
}
</code></pre>
<p><strong>Step 2. Use the Terraform Provider.</strong></p>
<p>On the PC running Terraform, you need to install and configure the Cisco IOS XE Terraform Provider plugin. and enable RESTCONF or NETCONF on the target IOS XE device by entering the global configuration commands</p>
<pre><code class="lang-bash">Router1&gt; <span class="hljs-built_in">enable</span>
Router1<span class="hljs-comment"># configure terminal</span>
Router1(config)<span class="hljs-comment"># restconf</span>
Router1(config)<span class="hljs-comment"># netconf-yang</span>
Router1(config)<span class="hljs-comment"># end</span>
Router1<span class="hljs-comment"># write memory</span>
</code></pre>
<p><strong>Step 3. Run Terraform Commands</strong></p>
<pre><code class="lang-bash">admin@pc:~/terraform_project$ terraform init

admin@pc:~/terraform_project$ terraform plan

admin@pc:~/terraform_project$ terraform apply
</code></pre>
<ul>
<li>The <strong>terraform init</strong> command initializes the Terraform working directory.</li>
<li>The <strong>terraform plan</strong> command creates an execution plan specifying <strong>what actions Terraform will take.</strong></li>
<li>The <strong>terraform apply</strong> command applies the changes required to reach the desired state of the configuration.</li>
</ul>
<h1 id="heading-puppet">Puppet</h1>
<p><strong>Puppet</strong> is a configuration automation and deployment orchestration solution. It’s an open-source tool <u><strong>based on Ruby.</strong></u> For working, it is based on a <strong>Customized Domain Scripting</strong> <strong>Language (DLS) nearer to JSON</strong>. It runs as a <strong>master-client</strong> setup and uses a model-driven approach. Large enterprises use it widely to automate sysadmins who spend ages configuring, provisioning, troubleshooting, and maintaining server operations. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c0ffb387-02e7-4882-ac01-7bbb16d5dab5.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-chef">Chef</h1>
<ul>
<li>Chef is an automation platform that provides an effective way to configure and manage infrastructure. Chef is <strong>based on Ruby and uses DL for writing the configurations</strong>. Its architecture is like the puppet <strong>master-agent model</strong>. It’s a <u><strong>pull-based</strong></u> configuration tool.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c88b424b-465e-4109-b0de-607fe34d5e82.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Ansible:</strong> Known for its ease of use and agentless architecture, making it a good choice for beginners or smaller teams.</li>
<li><strong>Puppet:</strong> Excels in managing large-scale deployments and complex configurations, with a strong focus on security.</li>
<li><strong>Chef:</strong> Offers a high degree of flexibility and integrates well with infrastructure as code practices.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>Ansible</td><td>Puppet</td><td>Chef</td></tr>
</thead>
<tbody>
<tr>
<td>Key files defining actions</td><td>Playbook</td><td>Manifest</td><td>Recipe, Run-List</td></tr>
<tr>
<td>Communication Protocol</td><td>SSH</td><td>HTTPS(via REST API)</td><td>HTTPS (Via RESTAPI)</td></tr>
<tr>
<td>Key Port</td><td>22 (SSH Port)</td><td>8140</td><td>10002</td></tr>
<tr>
<td>Agent/Agentless Based</td><td>Agentless</td><td>Agent-based(or agentless)</td><td>Agent-based</td></tr>
<tr>
<td>Push/Pull</td><td>Push</td><td>Pull</td><td>Pull</td></tr>
<tr>
<td>Architecture</td><td>Only Master</td><td>master-agent</td><td>master-agent</td></tr>
</tbody>
</table>
</div><h2 id="heading-artificial-intelligence-and-machine-learning">Artificial Intelligence and Machine Learning</h2>
<p><strong>Artificial Intelligence (AI)</strong> can be explained as the simulation of human intelligence by computer systems. This includes <strong>understanding language, recognizing patterns, solving complex problems</strong>, and learning from experience. These processes include learning, reasoning, and self-correction.</p>
<p><strong>Machine Learning (ML)</strong> is a subset of AI. ML enables machines to mimic intelligent human behavior by learning from data without being explicitly programmed.</p>
<p><strong>Narrow AI</strong>  focuses on executing <strong>particular tasks with high proficiency</strong>, such as  <strong>Google Translate</strong> </p>
<p>This service uses Neural Machine Translation (NMT) to convert text or speech from one language to another. It improves over time by processing vast amounts of bilingual data.</p>
<p><strong>Generative AI</strong> refers to artificial intelligence systems that create new content, such as text, images, music, or code, based on patterns and knowledge learned from large datasets.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d7a02019-e9bf-4559-bf02-24dca808b1ac.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Discriminative AI</strong> focuses on <strong>classifying or predicting</strong> by learning the <strong>differences between classes</strong>, not how the data is generated.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2aff03ac-0247-4e4c-9a0c-24169c40f51f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Descriptive AI</strong> analyzes data to describe <strong>what is happening or has happened</strong>. It focuses on understanding past and present data to provide insights and a clear picture of current or historical events, such as <strong>Tableau, Google Analytics.</strong></p>
<p><strong>Predictive AI</strong> refers to artificial intelligence systems designed to make predictions about future events or outcomes based on historical data. </p>
<p>Predictive AI is widely used in various fields, such as finance for stock market forecasting, healthcare for predicting patient outcomes, and marketing for customer behavior prediction</p>
<h2 id="heading-how-ai-learns"><strong>How AI Learns</strong></h2>
<ul>
<li><strong>Supervised Learning</strong> is a machine learning technique where an algorithm learns from a <strong>labeled dataset</strong> to make predictions or decisions.</li>
</ul>
<p>In network security, supervised machine learning is utilized to <strong>categorize network traffic</strong> or predict security threats by training AI systems with datasets that have already been tagged with outcomes, such as "<strong>safe</strong>" or "<strong>malicious</strong>" traffic, as shown in the figure.</p>
<p><img src="https://media.geeksforgeeks.org/wp-content/uploads/20231121154747/Supervised-learning.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Unsupervised Learning</strong> does not rely on <strong>pre-labeled data.</strong> In situations where <strong>there are vast amounts of data</strong>, unsupervised learning can be used to find potentially useful insights.</li>
</ul>
<p><img src="https://databasetown.com/wp-content/uploads/2023/05/Unsupervised-Learning-1536x1090.jpg" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, video services such as Netflix capture the video habits of their large customer base. Using this information and these algorithms, it can identify customers with similar viewing habits and recommend specific movies for them to watch.</p>
<ul>
<li><strong>Reinforcement Learning</strong> is a type of machine learning where an <strong>agent learns to make decisions by performing actions in an environment and receiving rewards or penalties</strong> based on the outcomes. The goal is to maximize cumulative rewards over time.</li>
</ul>
<p>AlphaZero used reinforcement learning to teach itself chess. It played many games against itself, starting with random moves and gradually improving its strategies. AlphaZero used a reward function that gave positive values for winning and negative values for losing, which encouraged it to find better strategies for success.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/57e06254-9084-4530-9200-ef6b07b250ec.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-hallucination-and-rag"><strong>Hallucination and RAG</strong></h2>
<p>AI systems learn from vast amounts of data to make predictions and generate content, but they are not perfect. For example, even if you provide detailed and accurate prompts to a generative AI model like ChatGPT, it can still produce incorrect or misleading information. This issue is known as <strong>hallucination.</strong></p>
<p><strong>Retrieval-Augmented Generation (RAG)</strong> is a technique that helps <strong>reduce hallucination</strong> and outdated answers in LLMs. RAG combines a <strong>retrieval system with a generative model</strong>. When given a prompt, the retrieval system first fetches relevant documents or information from a large database or knowledge source. Then, the generative model uses this information to generate a response</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2c8597de-d786-4226-b94a-6ff984683013.png" alt="CCNA 200-301 Study (1)" /></p>
<p>You can use your own RAG system with ChatGPT by uploading a PDF document and directing ChatGPT to consult it when responding. For example, if you upload the PDF manual of the Cisco OSPF Configuration Guide, you can query ChatGPT for step-by-step instructions, such as: “How do I configure OSPF directly on the interfaces?” In this way, you make sure that it’s using the PDF instead of its training data to answer your questions.</p>
<h2 id="heading-from-sdn-to-ibn-and-ai"><strong>From SDN to IBN and AI</strong></h2>
<p><strong>Intent-Based Networking (IBN)</strong> is a modern approach to <strong>network management</strong> that uses <strong>automation and artificial intelligence</strong> to bridge the gap between <strong>what a network</strong> <em><strong>needs to do</strong></em> <strong>(intent) and how it is</strong> <em><strong>actually configured and operating</strong></em>. It's designed to make networks more agile, secure, and easier to manage at scale.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2a30ec36-77f1-4f3d-8dbf-01e95e207a56.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In a network with AI and IBN enabled, it begins with <strong>AI and ML</strong>, which provide analytics and predictions to the <strong>Intent-Based Networking (IBN)</strong> system. This IBN system then offers intent and configuration to the <strong>Network Programmability and Automation</strong> component, which implements intent and network monitoring in <strong>The Network</strong>. The network sends data back to the AI and ML system to conduct further analysis and predictions.</p>
<h3 id="heading-what-can-ibn-and-ai-solve"><strong>What can IBN and AI solve?</strong></h3>
<ol>
<li><strong>High Latency:</strong> Due to inefficient routing and traffic congestion.</li>
<li><strong>Security Vulnerabilities:</strong> Inconsistent firewall configurations across different network segments.</li>
<li><strong>Manual Configuration Errors:</strong> Leading to Network Downtime and Performance Issues.</li>
<li><strong>Scalability Challenges:</strong> Difficulty in scaling the network to accommodate new devices and users.</li>
</ol>
<h2 id="heading-two-types-of-ai-systems">Two types of AI systems</h2>
<p><strong>Black Box AI</strong> models operate <strong>without showing their internal workings or logic to the user</strong>. <strong>AlphaZero</strong> is an example of this; it makes decisions that are not clear to the user.</p>
<p><strong>Explainable AI (XAI)</strong> aims to make <strong>AI processes and decisions clear and understandable to humans.</strong> It ensures transparency and trust in AI decisions, allowing professionals to understand and validate the AI's reasoning.</p>
<p>Example: <strong>XAI</strong> enables network administrators to comprehend AI-driven decisions regarding network configurations, security measures, and optimizations, ensuring that network management is transparent and trustworthy.</p>
<h2 id="heading-ai-in-network-optimization"><strong>AI in Network Optimization</strong></h2>
<p><strong>AI</strong> is revolutionizing network optimization by <strong>enhancing traffic analysis, reliability, and resource utilization. It analyzes traffic patterns to predict congestion, routes data to minimize latency, and identifies potential failures to ensure continuous service.</strong> This dynamic adaptation ensures optimal performance in modern digital communications.</p>
<h2 id="heading-ai-in-network-security"><strong>AI in Network Security</strong></h2>
<p>AI plays a crucial role in network security by using advanced machine learning models to <strong>protect against cyber threats. By learning from network data and user behavior, AI can identify potential security incidents</strong>, providing a dynamic defense that adapts to evolving threats.</p>
<h2 id="heading-additional-info">Additional Info</h2>
<h2 id="heading-what-is-the-idrac-port"><strong>What is the iDRAC Port?</strong></h2>
<p>The iDRAC Port is a network port on Dell servers that allows for remote management and server monitoring through the Integrated Dell Remote Access Controller (iDRAC). iDRAC is a powerful tool that provides IT administrators access to system diagnostics, hardware components, system logs, and BIOS settings. The iDRAC Port provides a separate IP address that connects to the iDRAC, allowing administrators to manage the server regardless of its power state remotely.</p>
<h1 id="heading-single-point-of-failure">Single Point of Failure</h1>
<p>A singe point of failure is a <strong>point where the entire system</strong> can <strong>crash</strong> in case that <strong>point crashes</strong>. </p>
<ul>
<li>For example, if we have only one database in a system and it crashes then our whole system will stop functioning. even if other services are working, it won’t matter.</li>
</ul>
<h2 id="heading-identifying-a-single-point-of-failure-in-a-system"><strong>Identifying a Single Point of Failure in a system</strong></h2>
<p>IF we have all the components connected to a single component  then the single component will become a single point of failure. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eafce823-d895-449a-9d46-fe3f3c4346e1.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-avoiding-single-point-of-failure"><strong>Avoiding Single Point of Failure</strong></h2>
<ul>
<li><strong>Adding more nodes</strong></li>
</ul>
<p>If the gateway service is a single point of failure then <strong>we can add another node</strong>. If the first one crashes we can use the second one. Or we can <strong>distribute load</strong> across <strong>both the nodes</strong>.</p>
<ul>
<li><strong>Adding Load Balancers</strong></li>
</ul>
<p>When we are using multiple nodes for a service we also need to distribute load across the nodes. For that, we use the load balancer. Since a single load balancer is a Single Point of Failure, we will use multiple load balancers.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4d73d9f6-e919-4b7c-9c44-1fbffff4ca7d.webp" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=wwwAXlE4OtU">https://www.youtube.com/watch?v=wwwAXlE4OtU</a></p>
<p><a target="_blank" href="https://medium.com/@interviewready/single-point-of-failure-591f853ee5aa">https://medium.com/@interviewready/single-point-of-failure-591f853ee5aa</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?app=desktop&amp;v=ZmLxb8HzQX4">https://www.youtube.com/watch?app=desktop&amp;v=ZmLxb8HzQX4</a></p>
<h1 id="heading-peer-to-peer-applications"><strong>Peer-to-Peer Applications</strong></h1>
<p>A P2P application allows a device to act as both a client and a server within the same communication, as shown in the figure. In this model, every client is a server and every server is a client. P2P applications require that each end device provide a user interface and run a background service.</p>
<p>Some P2P applications use a hybrid system where resource sharing is decentralized, but the indexes that point to resource locations are stored in a centralized directory. In a hybrid system, each peer accesses an index server to get the location of a resource stored on another peer.</p>
<p>Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected. The availability of cellular internet access is a real benefit for people in areas that would otherwise have no internet connectivity at all, or for people who are constantly on the move. The downside of cellular connectivity is that the carrier usually meters the bandwidth usage of the connection and may charge extra for bandwidth that exceeds the contract data plan.</p>
<h1 id="heading-switch-configuration-for-first-time">Switch configuration for First Time</h1>
<ul>
<li><strong>Step 1</strong>: Plug in and power on the <strong>switch</strong> (ensure it is fully booted).</li>
<li><strong>Step 2</strong>: Connect <strong>Ethernet cables</strong> from network devices (e.g., computers, routers, IP phones) to the <strong>switch ports</strong>.</li>
<li><strong>Step 3</strong>: Check the link lights to confirm that the connections are active and the devices are recognized by the switch.</li>
</ul>
<p><a target="_blank" href="https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/how-to-setup-network-switch.html#~next-steps">bookmark</a></p>
]]></content:encoded></item><item><title><![CDATA[CCNA 200-301 Study (1)]]></title><description><![CDATA[CCNA Volume 1
Introduction to TCP/IP
Network Protocol




Protocol CharacteristicDescription



Message formatWhen a message is sent, it must use a specific format or structure. Message formats depend on the type of message and the channel that is us...]]></description><link>https://rebar.it/ccna-200-301-study-1</link><guid isPermaLink="true">https://rebar.it/ccna-200-301-study-1</guid><dc:creator><![CDATA[rebar hama]]></dc:creator><pubDate>Sat, 07 Feb 2026 14:22:21 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1521542464131-cb30f7398bc6?ixlib=rb-4.0.3&amp;q=85&amp;fm=jpg&amp;crop=entropy&amp;cs=srgb" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-ccna-volume-1">CCNA Volume 1</h2>
<h2 id="heading-introduction-to-tcpip">Introduction to TCP/IP</h2>
<h1 id="heading-network-protocol">Network Protocol</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Protocol Characteristic</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Message format</strong></td><td>When a message is sent, it must use a specific format or structure. Message formats <em><strong>depend on the type of message and the channel that is used to deliver the message</strong></em>.</td></tr>
<tr>
<td><strong>Message size</strong></td><td>The rules that govern the size of the pieces communicated across the network are very strict. They can also be different, <em><strong>depending on the channel used</strong></em>. When a long message is sent from one host to another over a network, it may be necessary to <em><strong>break the message into smaller pieces in order to ensure that the message can be delivered reliably.</strong></em></td></tr>
<tr>
<td><strong>Timing</strong></td><td>Many network communication <em><strong>functions are dependent on timing</strong></em>. Timing determines the <em><strong>speed</strong></em> at which the bits are transmitted across the network. It also affects when an individual host can send data and the total amount of data that can be sent in any one transmission.</td></tr>
<tr>
<td><strong>Encapsulation</strong></td><td><em><strong>Each message transmitted on a network</strong></em> must include a <strong>header</strong> that contains <u><em><strong>addressing information that identifies the source and destination hosts</strong></em></u>, otherwise it cannot be delivered. <strong>Encapsulation is the process of adding this information to the pieces of data that make up the message</strong>. In addition to addressing, there may be other information in the header that ensures that the message is <u><strong>delivered to the correct application on the destination host.</strong></u></td></tr>
<tr>
<td><strong>Message pattern</strong></td><td>Some <em><strong>messages require an acknowledgment before the next message can be sent.</strong></em> <strong>This type of request/response pattern is a common aspect of many networking protocols</strong>. However, there are other types of messages that may be simply streamed across the network, without concern as to whether they reach their destination.</td></tr>
</tbody>
</table>
</div><h2 id="heading-common-methods-of-data-transmission"><strong>Common Methods of Data Transmission</strong></h2>
<ul>
<li><strong>Electrical signal</strong> transmission is achieved by representing data as <strong>electrical pulses on copper</strong> wire.</li>
<li><strong>Optical signals: t</strong>ransmission is achieved by converting the electrical signals into <strong>light pulses</strong>.</li>
<li><strong>Wireless signal</strong> transmission is achieved by using <strong>infrared, microwave, or radio waves</strong> through the air.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aa75a69c-7c53-4099-ab3c-d7bbc592f641.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4911fc02-1dd4-4c6e-a402-01e04c7df9bf.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>UTP (Unshielded Twisted Pair):</strong> <strong>No shielding</strong>, <strong>cheaper</strong>, more flexible, but less resistant to interference. Used in home and office networks.</li>
<li><strong>STP (Shielded Twisted Pair):</strong> Has shielding to reduce interference, but is more <strong>expensive</strong> and less flexible. Used in industrial or high-EMI environments.</li>
</ul>
<h3 id="heading-types-of-fiber-optic-cables"><strong>Types of Fiber Optic Cables</strong></h3>
<ol>
<li><strong>Single-Mode Fiber (SMF)</strong><ul>
<li>Uses a <strong>single beam of light</strong> (<strong>laser</strong>).</li>
<li>Supports <strong>long distances</strong> (up to 100+ km).</li>
<li>Higher bandwidth but more <strong>expensive</strong>.</li>
</ul>
</li>
<li><strong>Multi-Mode Fiber (MMF)</strong><ul>
<li>Uses <strong>multiple beams of light</strong> (<strong>LED</strong>).</li>
<li>Supports <strong>shorter distances</strong> (up to 2 km).</li>
<li><strong>Cheaper</strong> but has more signal loss due to modal dispersion</li>
</ul>
</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f82ffef4-17a6-453f-8965-f398fa855472.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-network-documentation">Network Documentation</h1>
<p>Network documentation is essential for managing, troubleshooting, and securing a network. </p>
<h3 id="heading-physical-documentation"><strong>Physical Documentation</strong></h3>
<p>Focuses on hardware and cabling layout.</p>
<p>🔹 Includes:</p>
<p>✔ Network topology diagrams (physical)</p>
<p>✔ Rack elevation and cabling layout</p>
<p>✔ Hardware inventory (routers, switches, firewalls)</p>
<p>✔ Power &amp; cooling systems</p>
<p>✅ Used for troubleshooting hardware, expansion planning, and audits.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1af21171-bf24-4f8b-9d71-5faf9ab674b3.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-logical-documentation"><strong>📌 Logical Documentation</strong></h3>
<p>Focuses on data flow and network configurations.</p>
<p>🔹 Includes:</p>
<p>✔ Logical network topology diagrams</p>
<p>✔ IP addressing, VLANs, and routing tables</p>
<p>✔ Security policies and firewall rules</p>
<p>✔ Performance and monitoring reports</p>
<p>✅ Helps in troubleshooting, security management, and network planning.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a9d39840-7c88-4aa5-8ed8-958bd93f3af0.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-bandwidth-vs-throughput">Bandwidth Vs Throughput</h1>
<p><strong>Bandwidth</strong> is the <strong>capacity of a medium to carry data</strong>. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in the number of bits that (theoretically) can be sent across the media in a second. Common bandwidth measurements are as follows: </p>
<p>Thousands of bits per second (Kbps)</p>
<p>Millions of bits per second (Mbps)</p>
<p>Billions of bits per second (Gbps)</p>
<p>Like bandwidth, <strong>throughput</strong> <strong>measures the transfer of bits across the media over a given period</strong>. However, due to several factors, <strong>throughput does not usually match the specified bandwidth</strong>. Many factors influence throughput, including: </p>
<ul>
<li>The amount of data being sent and received over the connection.</li>
<li>The types of data being transmitted.</li>
<li>The <strong>latency</strong> is created by the number of network devices encountered between the source and the destination.</li>
</ul>
<p><strong>Latency</strong> refers to the amount of time, including delays, for data to travel from one given point to another.</p>
<p><strong>TCP</strong> (<u><strong>Transmission Control Protocol</strong></u>) is a standard protocol that defines how to establish and maintain a network connection through which an application program can exchange data.</p>
<p>Th<strong>e TCP/IP mode</strong>l both defines and references a large collection of protocols that allow computers to communicate.</p>
<p>The name <strong>TCP/IP</strong> is simply the name of the two most common <strong>protocols (TCP and IP</strong>) separated by, which means the model refers to the most preferred protocols.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c9cc4b0-b725-4f87-8dab-a12c1a37a217.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/db886912-651d-4046-bb7a-0f18c8aafb2e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Application Layer:</strong> Refers to interfaces between the network and application software. It also includes authentication services.</p>
<p>Note: The application layer does not define the application itself.</p>
<p><strong>Transport Layer:</strong> Provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmission.  the two most commonly used transport layer protocols are the <strong>Transmission control protocol (TCP)</strong> and the <strong>user datagram protocol (UDP)</strong>.</p>
<p><strong>Network:</strong> Refers to logical addressing, routing, and path determination.</p>
<p><strong>Data Link:</strong> Formats data into frames appropriate for transmission onto some physical medium. Defines rules for when the medium can be used. Defines the means by which to recognize
transmission errors.</p>
<p><strong>Physical:</strong> Defines the electrical, optical, cabling, connectors, and procedural details required for transmitting bits, represented as some form of energy passing over a physical medium.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>TCP</td><td>UDP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Full form</strong></td><td>It stands for <strong>Transmission Control Protocol</strong>.</td><td>It stands for <strong>User Datagram Protocol</strong>.</td></tr>
<tr>
<td><strong>Type of connection</strong></td><td>It is a <strong>connection-oriented protocol</strong>, which means that the connection needs to be established before the data is transmitted over the network.</td><td>It is a <strong>connectionless protocol,</strong> which means that it sends the data without checking whether the system is ready to receive or not.</td></tr>
<tr>
<td><strong>Reliable</strong></td><td><strong>reliable</strong> protocol as it provides assurance for the delivery of data packets.</td><td><strong>unreliable</strong> protocol as it does not take a guarantee for the delivery of packets.</td></tr>
<tr>
<td><strong>Speed</strong></td><td><strong>slower</strong> than UDP as it performs error checking, flow control, and provides assurance for the delivery of data.</td><td><strong>faster</strong> than TCP as it does not guarantee the delivery of data packets.</td></tr>
<tr>
<td><strong>Header size</strong></td><td>The size of TCP is <strong>20</strong> <strong>bytes</strong>.</td><td>The size of the UDP is <strong>8</strong> <strong>bytes.</strong></td></tr>
<tr>
<td><strong>Acknowledgment</strong></td><td>TCP uses the <strong>three-way handshake concept</strong>. In this concept, if the sender receives the ACK, then the sender will send the data. TCP also has the ability to <strong>resend the lost data.</strong></td><td>UDP does <strong>not wait for any acknowledgmen</strong>t; it just sends the data.</td></tr>
<tr>
<td><strong>Flow control mechanism</strong></td><td>It follows the <strong>flow control</strong> mechanism in which <strong>too many packets cannot be sent to the receiver at the same time</strong>.</td><td>This protocol follows no such mechanism.</td></tr>
<tr>
<td><strong>Error checking</strong></td><td>TCP performs <strong>error checking</strong> by using a <strong>checksum</strong>. When the data is corrected, then the data is <strong>retransmitted to the receiver</strong>.</td><td>It does not perform any <strong>error checking</strong>, and also does not resend the lost data packets.</td></tr>
<tr>
<td><strong>Applications</strong></td><td>This protocol is mainly used where a <strong>secure and reliable communication process</strong> is required, like <u>military services, web browsing, and e-mail.</u></td><td>This protocol is used where fast communication is required and <strong>does not care about reliability</strong> like <u>VoIP, game streaming, video and music streaming, et</u><u>c.</u></td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b1d721b6-7ea1-4722-a459-55c4ec576d35.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Which two TCP header fields are used to confirm receipt of data?</strong></p>
<ul>
<li>Sequence Number</li>
<li>Acknowledge number</li>
</ul>
<h2 id="heading-how-does-tcp-communicate">How does TCP communicate?</h2>
<ul>
<li>Three-way handshake.</li>
<li>SYN, ACK, FIN, RST.</li>
<li>Windows size (65,535)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/86b5d615-29f5-4c6f-bfd8-652554de7212.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-the-six-control-bits-flags-are-as-follows">The six control bits flags are as follows:</h3>
<ol>
<li><strong>SYN:</strong> It is used to establish a connection between the hosts.</li>
<li><strong>ACK:</strong> Acknowledgment flag used in connection establishment and session termination. If the ACK is set to 0, then it means that the data packet does not contain an acknowledgement.</li>
<li><strong>PSH:</strong>  is a control flag used to indicate that the receiving device should deliver the data to the receiving application as soon as possible<strong>, rather than buffering it</strong>.</li>
<li><strong>RST:</strong> Reset the connection when an error or timeout occurs.</li>
<li><strong>URG:</strong> It represents an urgent pointer. If it is set, then the data is processed urgently.</li>
<li><strong>FIN:</strong>  No more data from sender and used in session termination</li>
</ol>
<p>When the PSH flag is set, it instructs the receiving device to deliver the data immediately to the application layer without waiting for more data to arrive.</p>
<h2 id="heading-establish-tcp-connection">Establish TCP Connection:</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ecb48246-f035-4d46-93fa-dffc464895c0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0a54063a-5e17-441f-b652-5f46c10c5eda.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-terminate-tcp-connection">Terminate TCP connection:</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/374eb41d-b186-4944-82e8-f0b8a1554e72.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>How many exchanges are needed to end both sessions between two hosts?</strong></p>
<p>Four exchanges.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8d463607-7763-4520-bcec-b5da7a9abbdb.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-tcp-reliability-data-loss-and-retransmission">TCP Reliability - Data Loss and Retransmission</h3>
<p>The <strong>Sequence (SEQ) number</strong> and <strong>Acknowledge (ACK) number</strong> are used together to confirm <strong>receipt of the bytes of data contained in the transmitted</strong> segments.</p>
<ul>
<li>What field is used by the destination host to reassemble segments into the original order?
<strong>Sequence Number</strong></li>
<li><p>What field is used to provide flow control?
<strong>Window Size</strong></p>
<p><strong>Flow control</strong> is the amount of data that the destination can receive and process reliably.</p>
</li>
</ul>
<ul>
<li>Which field in the TCP header indicates the status of the three-way handshake process?
<strong>control bits</strong></li>
<li>Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?</li>
</ul>
<p><strong>The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/447f4ece-bcc1-4a7c-ad34-d57c577e0ebe.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-the-four-fields-in-the-udp-header-are-as-follows">The four fields in the UDP header are as follows:</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Source Port</td><td>Identify the source application by port number.</td></tr>
</thead>
<tbody>
<tr>
<td>Destination Port</td><td>Identify the destination application by port number.</td></tr>
<tr>
<td>Length</td><td>length of the UDP datagram header</td></tr>
<tr>
<td>Checksum</td><td>used for error checking of the datagram header and data</td></tr>
</tbody>
</table>
</div><h1 id="heading-ports">Ports</h1>
<p>When a message is delivered using either TCP or UDP, the Protocols and services requested are identified by a <strong>port number</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfa92c7a-a467-4fe9-a009-ca029f7a9e3b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3e90c9a-acbe-4365-bc7e-9208e4ab4adf.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-what-are-well-known-ports"><strong>What are well-known ports?</strong></h2>
<p>These are <strong>standardized ports assigned by IANA</strong> (Internet Assigned Numbers Authority) for widely used services and protocols.</p>
<ul>
<li>Range: 0 – 1023</li>
<li>Assigned to common protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3a7a036b-8e23-458e-8599-60c2f85077c4.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 DNS uses Both <strong>TCP and UDP</strong>. DNS uses <strong>UDP</strong> when <u><strong>clients send requests to a DNS serve</strong></u>r. However, <strong>communication</strong> between <u><strong>DNS servers always uses TCP</strong></u>.</p>
<p>💡 <strong>POP3</strong>: used to retrieve emails from a mail server and delete them from the mail server.<br /><strong>IMAP</strong>: used to retrieve emails from a mail server without deleting them on the server.   </p>
<p><strong>SMTP:</strong> Used by an email client to send emails.</p>
</blockquote>
<p>    <strong>IMAP</strong>: used to retrieve emails from a mail server without deleting them on the server. </p>
<p>    <strong>SMTP:</strong> Used by an email client to send emails. </p>
<h2 id="heading-what-are-registered-ports"><strong>What are registered ports?</strong></h2>
<p>These ports are assigned by IANA to specific software applications and services <strong>that are not as universal as Well-Known Ports</strong> but are still used widely.</p>
<ul>
<li><strong>Range:</strong> 1024 – 49151</li>
<li><strong>Used by specific applications</strong> (e.g., MySQL, RDP, VoIP services).</li>
</ul>
<p><strong>Register port</strong> <strong>used by  Both TCP / UDP</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Name</td><td>port</td></tr>
</thead>
<tbody>
<tr>
<td>Ms SQL</td><td>1433</td></tr>
<tr>
<td>WAP</td><td>2948</td></tr>
</tbody>
</table>
</div><h2 id="heading-what-are-dynamic-ports">What are Dynamic Ports?</h2>
<p>Temporary ports are used by client devices for outgoing connections.</p>
<ul>
<li><strong>Range:</strong>  49152 – 65535</li>
<li><strong>Not registered with IANA</strong>; used randomly for short-lived communication.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>concept</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>Same-layer interaction on different computers</td><td>The two computers use the protocol to communicate with the same layer on another computer. the protocol defines a header that communicates what each computer wants to do.</td></tr>
<tr>
<td>Adjacent(uh·jay·snt) نزیک-layer interaction on the same computer</td><td><strong>On a single Computer</strong>, one lower layer provides a service to the layer above.</td></tr>
</tbody>
</table>
</div><p><strong>What are two characteristics of multicast transmission?</strong></p>
<ul>
<li>Multicast transmission can be used by <strong>routers to exchange routing information</strong>.</li>
<li>A single <strong>packet can be sent to a group of host</strong>s.</li>
</ul>
<p><strong>Which two OSI model layers have the same functionality as the two layers of the TCP/IP model?</strong> </p>
<ul>
<li>Network</li>
<li>Transport</li>
</ul>
<p><strong>How are port numbers used in the TCP/IP encapsulation process?</strong></p>
<p>If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.</p>
<p>Both UDP and TCP use port numbers to provide a unique identifier for each conversation. <strong>Source port numbers are randomly generated</strong> and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator.</p>
<p><strong>Which category of network components includes wires and cables used in a wired network?</strong></p>
<ul>
<li><strong>media</strong></li>
</ul>
<p><strong>Which three elements do all communication methods have in common? (Choose three.)</strong></p>
<ul>
<li>Message source.</li>
<li>Message Destination.</li>
<li>Message medium.</li>
</ul>
<p><strong>What two criteria are used to help select a network medium from various network media?</strong></p>
<ul>
<li>The distance the selected medium can successfully carry a signal.</li>
<li>The environment where the selected medium is to be installed.</li>
</ul>
<h2 id="heading-network-troubleshooting">Network Troubleshooting</h2>
<p>A number of software utility programs are available that can help identify network problems, most of these software are provided by the operating system as a command line interface (CLI). </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>IPconfig</td><td>Displays IP configuration Information on Windows Operation System.</td></tr>
</thead>
<tbody>
<tr>
<td>IFconfig</td><td>Displays IP configuration Information on Linux Operation System.</td></tr>
<tr>
<td>Ping</td><td>Test connection to other hosts.</td></tr>
<tr>
<td>Netstat</td><td>Display network connections.</td></tr>
<tr>
<td>Tracert</td><td>Displays the route taken to the destination.</td></tr>
<tr>
<td>NSlookup</td><td>Directly queries the name server for information on a destination domain.</td></tr>
</tbody>
</table>
</div><p><code>ping 192.168.1.1 repeat  9999999</code>  = ping 192.167.1.1 -t</p>
<pre><code class="lang-javascript">ping -t <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>-t</strong> refers to continuous ping on Linux, you don’t need -t option.</p>
<pre><code class="lang-javascript">ping -n <span class="hljs-number">10</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> (windows)
ping -c <span class="hljs-number">10</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> (Linux)
</code></pre>
<p>-n and -c refer to a set number of packets, by default, the number of packets is 4 echo packets.</p>
<pre><code class="lang-javascript">nslookup google.com <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
</code></pre>
<p>Query a specific DNS server</p>
<pre><code class="lang-javascript">nslookup <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
</code></pre>
<p>get hostname from IP</p>
<pre><code class="lang-javascript">netstat -o
</code></pre>
<p>Display process IDs</p>
<pre><code class="lang-javascript">netstat -n
</code></pre>
<p>-n option can be used to display IP addresses and port numbers.</p>
<pre><code class="lang-javascript">netstat -p tcp
netstat -p udp
</code></pre>
<p>Show protocol-specific connections</p>
<pre><code class="lang-javascript">netstat -aon | find <span class="hljs-string">"443"</span>
</code></pre>
<p>Find a Process Using a Specific Port</p>
<pre><code class="lang-javascript">netstat -an | find <span class="hljs-string">"192.168.1.1"</span>
</code></pre>
<pre><code class="lang-javascript">netstat -ano
</code></pre>
<p>We can use more than one option together -a -n -o </p>
<p>Which command can be used on a Windows host to display the <strong>routing table</strong>?</p>
<pre><code class="lang-f#">netstat -r
</code></pre>
<p>Which command can be used on a Windows host to display the <strong>ARP table</strong>?</p>
<pre><code class="lang-f#">arp -a
</code></pre>
<p>Which command can be used on a Windows host to display the routing table IPv6?</p>
<pre><code class="lang-f#">route print
</code></pre>
<h1 id="heading-verifying-network-connectivity">Verifying Network Connectivity</h1>
<p>Using and interpreting the output of various testing tools is often the first step in isolating the cause
of a network connectivity issue. The ping command can systematically test connectivity by looking
for answers to the following questions, in this order:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Step 1. Can an end device ping itself?</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Step 2. Can an end device ping its default gateway?</strong></td></tr>
<tr>
<td><strong>Step 3. Can an end device ping the destination?</strong></td></tr>
</tbody>
</table>
</div><h1 id="heading-seven-step-troubleshooting-process"><strong>Seven-Step Troubleshooting Process</strong></h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0a284d8d-5c4d-40c4-b3f8-07b2d1f7828d.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>Define Problem:</strong> Define what the problem is. Problems are usually identified by a sign (e.g., the network is slow or has stopped working). Network issues may appear in many different forms, including alerts from the network management system, console messages, and user complaints. In an organization, problems are typically assigned to network technicians as trouble tickets.</p>
<p><strong>Gather Information</strong>: In this step, targets (i.e., hosts, devices) to be investigated must be identified, access to the target devices must be obtained, and information gathered.</p>
<p><strong>Analyze Information:</strong> Possible causes must be identified. The gathered information is interpreted and analyzed using network documentation, network baselines, searching organizational knowledge bases, searching the internet, and talking with other technicians.</p>
<p><strong>Eliminate Possible Causes:</strong> If multiple causes are identified, then the list must be reduced by progressively eliminating possible causes to eventually identify the most probable cause. Troubleshooting experience is extremely valuable to quickly eliminate causes and identify the most probable cause.</p>
<p><strong>Purpose Hypothesis</strong>: When the most probable cause has been identified, a solution must be formulated. At this stage, troubleshooting experience is very valuable when proposing a plan.</p>
<p><strong>Test Hypothesis:</strong> Before testing the solution, it is important to assess the impact and urgency of the problem. For instance, could the solution have an adverse effect on other systems or processes? The severity of the problem should be weighed against the impact of the solution. For example, if a critical server or router must be offline for a significant amount of time, it may be better to wait until the end of the workday to implement the fix.</p>
<p><strong>Solve the Problem:</strong> When the problem is solved, inform the users and anyone involved in the troubleshooting process that the problem has been resolved. Other IT team members should be informed of the solution. It is important to properly document the cause and solution as this can assist other support technicians to prevent and solve similar problems in the future.</p>
<p># </p>
<h1 id="heading-establish-a-network-baseline"><strong>Establish a Network Baseline</strong></h1>
<p> A baseline is used to <strong>establish normal network or system performance</strong> to determine the “personality” of a network under normal conditions.</p>
<p><strong>A network baseline should answer the following questions:</strong></p>
<ul>
<li>How does the network perform during a normal or average day?</li>
<li>Where are the most errors occurring?</li>
<li>What part of the network is most heavily used?</li>
<li>What part of the network is least used?</li>
<li>Which devices should be monitored and what alert thresholds should be set?</li>
<li>Can the network meet the identified policies?</li>
</ul>
<p># </p>
<p><strong>Structured Troubleshooting Methods</strong></p>
<h3 id="heading-bottom-up"><strong>Bottom-Up</strong></h3>
<p>In bottom-up troubleshooting, you start with the <strong>physical layer and the physical components</strong> of the network.</p>
<p>The disadvantage of the bottom-up troubleshooting approach is that it requires that you check every device and interface on the network until the possible cause of the problem is found.</p>
<h3 id="heading-top-down"><strong>Top-Down</strong></h3>
<p>top-down troubleshooting starts with the <strong>end-user applications</strong> and moves down through the layers of the OSI model until the cause of the problem has been identified.</p>
<h3 id="heading-divide-and-conquer"><strong>Divide-and-Conquer</strong></h3>
<p>The network administrator <strong>selects a layer</strong> and tests in both directions from that layer.</p>
<p>In divide-and-conquer troubleshooting, you start by collecting user experiences of the problem, document the symptoms and then, using that information, make an informed guess as to which OSI layer to start your investigation.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/65ac20a3-1ac3-44d9-8f4a-5e4ce0aa2a3f.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-network-device-documentation">Network Device Documentation</h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/06d9fba1-c093-4578-99e9-485f22732e77.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dab37e21-a9e1-498d-a591-32cbea4c1d2f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/df9f62fc-e018-4480-bb82-7b5aef0ca3d3.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-network-topology-and-architectures">Network Topology and Architectures</h2>
<h2 id="heading-soho">SOHO</h2>
<ul>
<li>Small office/home office (SOHO) LAN, use only Ethernet LAN technology.</li>
<li>Switch and routes may be combined.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7e2aa8bd-d979-4558-8d1e-7f5a05a33a45.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3915b88b-e0b8-4753-b88e-4b7db9e0b364.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3392bbf8-9b86-4316-b660-cbb6b4a2dd05.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-wan">Wan</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2d15682f-2b21-4789-a530-8a01a3af8920.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Private WAN</strong> infrastructure: Service providers may offer dedicated point-to-point leased lines, circuit-switched, such as PSTN or ISDN, and packet-switched links, such as Ethernet Wan, ATM, or frame Relay.</p>
<p><strong>Public WAN</strong> Infrastructure: Service providers provide Internet access using broadband services such as DLS, cable, and satellite access, broadband connections. Data travelling between corporate sites over the public Wan infrastructure should be protected by using a VPN.</p>
<h2 id="heading-private-wan-leased-line">Private WAN: Leased Line</h2>
<p>A point-to-point link is used to provide a pre-established WAN communication path from the customer premises to the provider network. Point-to-point Lines are usually leased from a service provider and are called leased lines. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cfdec0ca-cae1-42c5-98a0-8718b24d052d.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-private-wan-frame-relay">Private Wan: Frame Relay</h2>
<p>is a simple layer 2 non-broadcast multi-access(<strong>NBMA</strong>)</p>
<p>WAN technology is used to interconnect enterprise LANs. A single router interface can be used to connect multiple sites.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11c2f968-b60c-416b-8d70-faf2ccb165be.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Note: old and useless and fast.</strong> </p>
<h2 id="heading-private-wan-ethernet-wan">Private WAN: Ethernet WAN</h2>
<p>Newer Ethernet standards using fiber-optic cables have made Ethernet a reasonable WAN access option. IEEE 1000BASE-LX standard supports fiber-optic cable lengths of 5km, white IEEE 1000BASE-ZX standard supports cable lengths up to 70 Km.</p>
<h3 id="heading-the-ethernet-wan-types">The Ethernet WAN Types:</h3>
<ul>
<li>Metropolitan Ethernet(<strong>MetroE</strong>)</li>
<li>Ethernet over MPLS (<strong>EoMPLS</strong>) <strong>popular</strong></li>
<li>Virtual Private LAN Service(<strong>VPLS</strong>)</li>
</ul>
<blockquote>
<p>Note: when you see IEEE it’s purpose of layer 1 or 2 technology , IEEE organization made Layer 1 and  layer 2 as a standard  </p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b354c336-4ae5-4419-a58f-5a036034b23c.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-private-wan-mpls">Private WAN: MPLS</h2>
<ul>
<li>Multiprotocol Label Switching(MPLS) is a multiprotocol high-performance WAN technology that directs data from one router to the next. MPLS is based on <strong>short path labels</strong> rather than IP network addresses.</li>
<li>It is multiprotocol, has the ability to carry any payload including IPV4, IPv6, Ethernet, ATM, DSL, and frame relay traffic. It uses labels that tell a router what to do with a packet. The labels identify paths between distant routes rather than endpoints, and while MPLS actually routes IPv4 and IPv6 packets, everything else is switched.</li>
<li>MPLS can deliver any type of packet between sites. MPLS can encapsulate packets of various network protocols. It supports a wide range of WAN technologies including T-carrier/E-carrier links, Carrier Ethernet, ATM, Frame relay, and DSL.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd300d76-22e0-4f7e-99d9-60a93d9a7830.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Note: MPLS is described as layer 2.5.</strong></p>
<p>The MPLS layer lies between layers 2 and 3 of the model ie the Data Link and the Network Layer. That’s why it is also known as the 2.5 layer protocol or “shim” protocol.</p>
<p>The MPLS header is 32 bits.</p>
<p><a target="_blank" href="https://towardsdatascience.com/multiprotocol-label-switching-mpls-explained-aac04f3c6e94">bookmark</a></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d9d7f00c-7055-4676-a1cb-175bfad101ee.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-private-wan-vsat">Private WAN: VSAT</h2>
<ul>
<li>A very small aperture terminal(VSAT) is a solution that creates a private WAN using satellite communications. A VSAT is a small satellite dissimilar to those used for home internet and TV. VSATs create a private WAN while providing connectivity to remote locations.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/80a1c67e-c34e-4690-a7d4-ca0d87dff736.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-public-wan">Public WAN</h2>
<ul>
<li>DSL, ADSL, or cables</li>
<li>Wireless(3G/4G, LTE, or WIMAX)</li>
<li>VPN ( Site to Site VPN)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/55d9ac8b-3048-4e37-8bb2-dd9b882eac59.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7fdb6927-ac1d-4eb9-8170-fe4c5153b1d4.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-introducing-cisco-ios">Introducing Cisco IOS</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ee1ef33e-c19f-4ee1-be4b-159166b44ac5.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>User EXEC Mode</strong> - This mode has limited <strong>capabilities but is useful for basic operations</strong>. It allows only a limited number of <strong>basic monitoring commands</strong> but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the <strong>&gt;</strong> symbol.</li>
<li><strong>Privileged EXEC Mode</strong> - To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the <strong>#</strong> symbol.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4e154d10-7da7-478a-a09f-2d9594acde31.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fd1419da-f85b-4029-9b86-c1c4e5c6386b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>An <strong>uplink port</strong> is a switch port designed to connect to another <strong>switch, router, or modem</strong> for network expansion. Traditionally, uplink ports required <strong>straight-through cables</strong> to connect to other network devices.</p>
<p>🔹 <strong>Common Uses:</strong></p>
<ul>
<li>Connecting <strong>switch-to-switch</strong> (e.g., trunk links).</li>
<li>Connecting a switch to a <strong>router</strong> (router-on-a-stick).</li>
<li>Connecting to an <strong>ISP modem</strong> or fiber uplink.</li>
</ul>
<p>🔹 <strong>Labeling on Cisco Switches:</strong></p>
<ul>
<li>Typically labeled <strong>G0/1, G1/1, or GigabitEthernet 1/0/1</strong>.</li>
</ul>
<p>A <strong>normal port</strong> (also called an <strong>access port</strong>) is a standard switch port used to connect <strong>end devices</strong> like PCs, printers, and IP phones.</p>
<p><strong>Rollover Cable:</strong> Used for <strong>device configuration</strong> via the console port.</p>
<p><strong>Crossover Cable:</strong> Used for network connections between similar devices (e.g., switch-to-switch, PC-to-PC in older networks)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20707aed-c4d2-4cd3-899b-0747a812f88e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: </p>
<ul>
<li>Use the <strong>straight cable</strong> to connect two <strong>different devices</strong>.</li>
<li>Use the <strong>crossover cable</strong> for connecting two <strong>of the same type.</strong></li>
</ul>
<p>Today, all new devices of different types can be connected through a straight cable</p>
<p>### </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a2961eee-c522-4179-a22f-d5dbb41aa039.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1e3836b3-fa50-4008-8b4f-815a800cf28c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>RAM</strong>: RAM stores <strong>running configuration, CDP information, ARP memory, routing table, etc</strong>.</p>
<p><strong>NVRAM</strong>: This memory stores the <strong>system configuration by typing the copy run start command.</strong></p>
<p><strong>FLASH</strong>: The FLASH memory is the <strong>router's IOS (Internetwork Operating System) memory</strong>.</p>
<p><strong>ROM:</strong> Stands for <strong>Read Only Memory</strong>. This memory stores the boot or bootstrap of the system</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dab5e444-c0b0-400c-9732-f7b7abf35b8f.png" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>Power supply</li>
<li>Fan</li>
<li>Protection for WAN (WIC) or high-speed WIC (HWIC) interface card</li>
<li>Dynamic synchronous RAM (SDRAM) is used to keep the configuration running and routing tables.</li>
<li>Non-volatile RAM (NVRAM) and boot flash memory are used to store the ROMMON boot code and NVRAM data.</li>
<li>CPU</li>
<li>The connection of the advanced integration module (AIM) downloads functions that demand a lot from the processor, such as encryption from the main CPU.</li>
<li>Protection for WAN (WIC) or high-speed WIC (HWIC) interface card</li>
</ol>
<h2 id="heading-access-to-cisco-ios-cli"><strong>Access to Cisco IOS CLI</strong></h2>
<p>Before entering any commands, we need access to the CLI. Here are three options:</p>
<ul>
<li><strong>Console</strong> - Uses a low-speed serial or USB connection to provide direct connect, out-of-band management access to a Cisco device.</li>
<li><strong>SSH</strong> - Method for remotely accessing a CLI session across an active network interface, including the management interface.</li>
<li><strong>AUX port</strong> - Used for remote management of the router using a dial-up telephone line and modem.</li>
<li>‌<strong>HTTP/HTTPS</strong> - Some routers and switches support <strong>web-based management</strong> connections, allowing administrators access using HTTP.</li>
</ul>
<blockquote>
<p>💡 To securely configure and monitor a router from a remote location, you use <strong>HTTPS</strong> to access the router's web-based management interface, ensuring that all transmitted data is encrypted.</p>
</blockquote>
<h2 id="heading-in-band-and-out-of-band-device-management"><strong>In-Band and Out-of-Band Device Management</strong></h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Aspect</td><td>In-band Management</td><td>Out-of-band Management</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Network</strong></td><td>Same as user traffic network</td><td>Dedicated, separate management network</td></tr>
<tr>
<td><strong>Access Methods</strong></td><td>SSH, Telnet, HTTP/HTTPS, SNMP</td><td>Serial console, dedicated interfaces (e.g., iLO, DRAC)</td></tr>
<tr>
<td><strong>Security</strong></td><td>Risk of exposure to attacks</td><td>More secure due to isolation from user traffic</td></tr>
<tr>
<td><strong>Availability</strong></td><td>Dependent on network availability</td><td>Available even if the main network is down</td></tr>
<tr>
<td><strong>Cost</strong></td><td>Lower cost, no need for extra infrastructure</td><td>Higher cost due to separate network setup</td></tr>
<tr>
<td><strong>Convenience</strong></td><td>Easier to configure and access</td><td>Less convenient, requires additional setup</td></tr>
</tbody>
</table>
</div><p><strong>out-of-band management  example:</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2435ff30-f350-4b4c-b887-73880197c4ec.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1bebcb46-6573-44eb-b9fa-4bd3595f16ef.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>A terminal server and a console serve</strong>r a hardware or virtual devices used by network and system administrators to provide secure, remote access to the <strong>console ports</strong> (usually serial ports) of network equipment such as Routers, switches, servers, and firewalls.</p>
</blockquote>
<p><strong>Guidelines for OOB Management:</strong></p>
<ul>
<li>Provide the highest level of security when using console ports and management interfaces.</li>
<li>Mitigate the risk of passing insecure management protocols over the production network.</li>
</ul>
<p><strong>Guidelines for In-Band Management:</strong></p>
<ul>
<li>Apply to devices that need to be managed or monitored.</li>
<li>Use IPsec, SSH, or SSL when possible.</li>
<li>Decide whether the management channel needs to be open at all times.</li>
</ul>
<h2 id="heading-webui-configuration-example"><strong>WebUI Configuration Example</strong></h2>
<p>Cisco IOS-XE routers and Catalyst switches come with a web-based management interface known as the WebUI or web GUI (Graphical User Interface). This tool allows administrators to configure and monitor the device using a web browser, offering a more visual approach to network management.</p>
<p>To configure a Cisco router or switch for WebUI access, you will need a <strong>username</strong> command configured and some <strong>ip http</strong> commands. In addition, securing WebUI with an access control list is recommended. For example, the following configuration allows secure WebUI access to R1 through the 192.168.1.1/24 interface by any user on the 192.168.1.0/24 network.</p>
<pre><code class="lang-java">R1(config)# <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">GigabitEthernet0</span>/0/1
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">address</span> 192.168.1.1 255.255.255.252
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>)# <span class="hljs-title">no</span> <span class="hljs-title">shutdown</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">exit</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">username</span> <span class="hljs-title">admin</span> <span class="hljs-title">privilege</span> 15 <span class="hljs-title">secret</span> <span class="hljs-title">cisco123</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">no</span> <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">server</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">secure</span>-<span class="hljs-title">server</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">authentication</span> <span class="hljs-title">local</span>
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">access</span>-<span class="hljs-title">list</span> 10 <span class="hljs-title">permit</span> 192.168.1.0 0.0.0.255
<span class="hljs-title">R1</span>(<span class="hljs-title">config</span>)# <span class="hljs-title">ip</span> <span class="hljs-title">http</span> <span class="hljs-title">access</span>-<span class="hljs-title">class</span> <span class="hljs-title">ipv4</span> 10</span>
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Creates a user named "admin" with full <strong>administrative access (privilege 15)</strong> and sets the password to "cisco123" (encrypted).</td></tr>
</thead>
<tbody>
<tr>
<td><strong>no ip http server:</strong> Disables the standard HTTP server.</td></tr>
<tr>
<td><strong>ip http secure-server:</strong> Enables the HTTPS server.</td></tr>
<tr>
<td>Uses the local username and password database for HTTP authentication.</td></tr>
<tr>
<td>Creates an ACL (numbered 10) permitting access from devices in the IP range 192.168.1.0 to 192.168.1.25</td></tr>
<tr>
<td><strong>ip http access-class ipv4 10:</strong> Applies the ACL (numbered 10) to restrict HTTP access to the specified IP range.</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>IOS</strong> defines two <strong>privilege</strong> levels by default<strong>: 0 (user mode) and 15 (privileged mode)</strong>.</p>
</blockquote>
<p><strong>Cloud Device Management</strong></p>
<p>Cisco offers two advanced cloud applications that provide comprehensive graphical interfaces:  <strong>Cisco Catalyst Center (formerly Cisco DNA Center) and Cisco Meraki</strong> Dashboard.</p>
<ul>
<li><strong>Cisco Catalyst Center: Large, complex networks requiring detailed oversight and control.</strong></li>
<li><strong>Small to medium-sized businesses or distributed networks.</strong></li>
</ul>
<h2 id="heading-console-cabling">Console Cabling</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/10662e6b-628f-4f17-b7c8-d24abfde2bc1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/984143c9-a264-4c93-b669-1d5cd950bad6.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 Routers and switches have a blue colour cable used to  connect to the console port to pc and perform configuration </p>
</blockquote>
<h3 id="heading-how-to-save-the-configuration">How to save the Configuration?</h3>
<blockquote>
<p>💡 Copy  running-config startup-config     </p>
<p>then enter   </p>
<hr />
<p>WR (tab)  </p>
<p>enter</p>
</blockquote>
<p>    Copy  running-config startup-config   </p>
<p>    then enter </p>
<hr />
<p>    WR (tab)</p>
<p>    enter</p>
<h2 id="heading-how-to-remove-the-saved-configuration-in-nvram-and-reset-the-router">How to remove the saved configuration in NVRAM and reset the router?</h2>
<blockquote>
<p>💡 write erase</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ed508a0d-f0f3-4e3f-a7cb-494cbf6c0931.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-changing-host-name-and-adding-a-banner-to-cisco-devices">Changing Host Name and  adding a banner to Cisco Devices</h3>
<p><strong>hostname</strong>: change the name of the router example: </p>
<p><strong>hostname</strong> ISU-R1</p>
<p>Banner: A simple message shows up when we log in to the router through the terminal.</p>
<pre><code class="lang-javascript">banner motd $ don’t access to <span class="hljs-built_in">this</span> router without sysadmin permission $
</code></pre>
<blockquote>
<p>💡 <code>Switch(config)#</code><strong><code>service password-encryption</code></strong></p>
</blockquote>
<p>The <strong>service password-encryption</strong> command will encrypt every plaintext password.</p>
<h2 id="heading-set-password-to-privilege-global-mode">Set password to Privilege (global)  mode</h2>
<p>To set a password to privilege mode, use the commands below:</p>
<blockquote>
<p>💡 ISU-R1(config)# enable <strong>password [</strong>your-password]</p>
</blockquote>
<p>When we use show <strong>running-configuration command,</strong> the password shows as <strong>plain text.</strong> Use this command to set a secure password</p>
<blockquote>
<p>💡 ISU-R1(config)# enable <strong>secret [</strong>your-password]</p>
</blockquote>
<p>To remove a password or a secret, just add no before the command, for example:</p>
<pre><code class="lang-bash">no <span class="hljs-built_in">enable</span> password
</code></pre>
<h2 id="heading-set-password-to-user-exec-mode">Set  password to User EXEC mode</h2>
<p>To set a password for the router, the user should  enter the password before the user mode opens and connect the cabling using the commands below: </p>
<p><strong>line con 0  (line port always is zero)</strong></p>
<p><strong>line aux 0</strong>   (both console and aux port used to router configuration, aux port working as a backup port when the console port is not working )</p>
<p><strong>line vty 0 4</strong>  “vty” (stands for Virtual teletype: it is a virtual line you can virtually configure the router)</p>
<p>Note: 0 4 means 5 connections can be established at the same time.</p>
<pre><code class="lang-javascript">Router(config)#line <span class="hljs-built_in">console</span> <span class="hljs-number">0</span>

Router(config-line)#password your-password

Router(config-line)#login
</code></pre>
<p>When you run this command, it shows the running-config</p>
<p>The console line should show logging, which means a login is required to enter the router and perform configuration </p>
<pre><code class="lang-javascript">line con <span class="hljs-number">0</span>
password rebar
login
!
line aux <span class="hljs-number">0</span>
!
line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span>
login
!
</code></pre>
<h2 id="heading-set-the-username-and-password-account-to-the-router-account">Set the Username and password account to the router account</h2>
<p>If an employee leaves the company, others are required to change the password on all routers. Adding individual user accounts is a better approach to address this issue.</p>
<pre><code class="lang-javascript">Router(config)#userame your-username secret your-password
</code></pre>
<pre><code class="lang-javascript">Router(config)#line con <span class="hljs-number">0</span>

Router(config-line)#login local <span class="hljs-comment">//using local databse to check username and password</span>
</code></pre>
<h1 id="heading-virtual-login-to-the-router-telnet">Virtual login to the router (Telnet)</h1>
<pre><code class="lang-javascript">R1-isu(config)#line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span>
</code></pre>
<pre><code class="lang-javascript">R1-isu(config-line)#password rebar
</code></pre>
<pre><code class="lang-javascript">R1-isu(config-line)#login <span class="hljs-comment">// if you want to login with only password </span>
R1-isu(config-line)#login local  <span class="hljs-comment">// use this command if you want to loing with user and passowrd</span>
</code></pre>
<p>After adding a password, you can log in to the router through Telnet </p>
<pre><code class="lang-javascript">telnet IP-address(router)
</code></pre>
<p>Then enter the password and log in to the router </p>
<blockquote>
<p>💡 <strong>Note: Telnet is less secure because it transfers data as plain text without encryption</strong></p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d7d9b1cd-7d4c-4f59-96c7-949a0d44de3e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/16401aab-9e52-4b44-acff-3929755c1db8.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1-isu(config)#no ip domain-lookup
</code></pre>
<p>Use the command above when you write a command by mistake, as it  takes a lot of time</p>
<p>Translating "ded"...domain server (255.255.255.255)</p>
<h1 id="heading-virtual-login-to-the-router-ssh">Virtual login to the router (SSH)</h1>
<h3 id="heading-step-1-verify-ssh-support"><strong>Step 1. Verify SSH support.</strong></h3>
<p>Use the <strong>show ip ssh</strong> command to verify that the switch supports SSH. If the switch is not running an IOS that supports cryptographic features, this command is unrecognized.</p>
<h3 id="heading-step-2-configure-the-ip-domain"><strong>Step 2. Configure the IP domain.</strong></h3>
<pre><code class="lang-javascript">isu-R1(config)#ip domain-name [Enter Your Domain Name]
isu-R1(config)#ip domain-name ISU-Airport
</code></pre>
<p>### 
<strong>Step 3. Generate RSA key pairs.</strong></p>
<pre><code class="lang-javascript">isu-R1(config)#crypto key generate rsa
</code></pre>
<p>After entering the set key length of encryption recommended value is 1024 or 2048 </p>
<pre><code class="lang-javascript">isu-R1(config)#ip ssh version <span class="hljs-number">2</span> [Version <span class="hljs-number">2</span> is the newest version <span class="hljs-keyword">of</span> SSH]
</code></pre>
<p>### </p>
<p><strong>Step 4. Configure user authentication.</strong></p>
<p>The SSH server can authenticate users <strong>locally or use an authentication server</strong>.</p>
<ul>
<li>Username and password  Account</li>
</ul>
<pre><code class="lang-javascript">isu-R1(config)#userame your-username secret your-password
</code></pre>
<p>### 
Step 5. Configure the vty lines.</p>
<pre><code class="lang-javascript">isu-R1(config)#line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span>
</code></pre>
<pre><code class="lang-javascript">isu-R1(config-line)#transport input ssh
</code></pre>
<p>with transport input, you can choose which protocol can be used for virtual configuration like telnet, SSH… etc.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c08b881-a558-40b7-878c-056d37e78b68.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1-isu(config-line)#login local  <span class="hljs-comment">// use this command if you want to loing with user and passowrd</span>
</code></pre>
<h1 id="heading-change-interface-speed-and-duplex">Change interface speed and Duplex</h1>
<p> When we have multiple switches, if we want to change the speed between the switches, use the commands below </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/93bffd6b-b891-48b1-8551-701b0c2935e6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, we want to change the speed ISU Switch to 10 bits from auto speed </p>
<pre><code class="lang-javascript">ISUSW#show interfaces status
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7564a253-90c0-4c90-b742-6c1c09eae5b5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, FastEthernet0/5 speed is auto, and duplex by default is auto.</p>
<h1 id="heading-what-is-a-duplex">What is a Duplex?</h1>
<ul>
<li>means the ability to send and receive data or signals between two points.</li>
<li><strong>Full-duplex</strong> all nodes can <strong>send and receive data</strong> on their port at the <strong>same time.</strong> The following types of connections can use full duplex: <strong>Switch to Switch,</strong> <strong>Switch to Host, Host to Host</strong></li>
<li><strong>Half-duplex:</strong> When <strong>one node sends data</strong> and <strong>can’t receive data</strong> at the same time. The following types of connections can use half duplex: <strong>Hub to Hub, Switch to Hub</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6a93efc7-ac61-4a60-955d-3865b68c1185.webp" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Type:10/100baseTx: it means 10 (<strong>Mbps)</strong> megabit / 100 (<strong>Mbps)</strong> megabit per second</li>
</ul>
<pre><code class="lang-javascript">ISUSW(config-<span class="hljs-keyword">if</span>)#speed <span class="hljs-number">100</span>
</code></pre>
<p>When we changed one router's speed to 100 Mbps, nothing happened to the next router because its speed was set to auto by default. However, when we changed the second router's speed from auto to 10 Mbps, an error occurred due to the mismatch in speeds between the two connected lines.</p>
<h2 id="heading-how-to-change-duplex">How to change duplex</h2>
<pre><code class="lang-javascript">ISUSW(config-<span class="hljs-keyword">if</span>)#duplex full
</code></pre>
<pre><code class="lang-javascript">EBLSW(config-<span class="hljs-keyword">if</span>)#duplex full
</code></pre>
<blockquote>
<p>💡 Both switches should have the same duplex setting.</p>
</blockquote>
<p>Note: <strong>B**</strong>y default, duplex is set to auto. However, it's generally recommended to change it to a full duplex for optimal performance.**</p>
<h2 id="heading-packet-capturing-with-wireshark">Packet Capturing with Wireshark</h2>
<h2 id="heading-arpaddress-resolution-protocol">ARP(Address Resolution Protocol)</h2>
<p>is a network protocol used to <strong>find out the hardware (MAC) address of a device</strong> <strong>from an IP address</strong> It is used when a device wants to communicate with some other device on a local network (for example on an Ethernet network that requires physical addresses to be known before sending packets).</p>
<p>ARP request packets are sent to the broadcast addresses (<strong>FF:FF:FF:FF:FF:FF</strong> for the <strong>Ethernet broadcasts</strong> and <strong>255.255.255.255</strong> for the <strong>IP broadcast</strong>).</p>
<p>We can track computer requests when the process of releasing and renewing IP addresses occurred.</p>
<p> CMD → ipconfig /release the ipconfig /release</p>
<p>ipconfig /release sends a command to the DHCP server instructing it to dump the network configuration and then deletes the current network configuration for all adapters (IP address, DNS servers, gateway, etc).</p>
<p>/renew will instruct your computer to request a new IP address from the DHCP server as well as DNS, gateway, and whatever other information the DHCP server is set to configure.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6a098f64-63dc-4b43-b0b5-eced628e0eeb.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/08140718-3d4b-48e4-9136-3f6aee9d83e8.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-mac-addresses-and-basic-switching-concepts">MAC Addresses and Basic Switching Concepts</h2>
<h1 id="heading-what-is-an-ethernet-frame"><strong>What is an Ethernet Frame?</strong></h1>
<p>An Ethernet frame is a data unit used in computer networks to transmit information between devices on a local area network (LAN). It contains the <strong>source and destination MAC addresses</strong>, payload data, and error-checking information, forming the basic structure for communication in Ethernet networks.</p>
<p><strong>Ethernet</strong> protocols define how data is formatted and transmitted over a wired network.</p>
<p><strong>Ethernet</strong> is defined by data link layer and physical layer protocols.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3a1c55c4-06dd-406d-8da4-26760793b2d4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Preamble:</strong> It helps synchronize the receiving device’s clock with the incoming data.</p>
<p><strong>SDF:</strong> marks the end of the preamble and the beginning of the rest of the frame. </p>
<p><strong>Destination MAC:</strong> identifies the receiving device.</p>
<p><strong>Source MAC:</strong> identifies the sending device. </p>
<p><strong>Type</strong>: This indicates the length of the entire Ethernet frame (Usually IPv4 or IPv6).</p>
<p><strong>FCS: Frame check sequence</strong> is used to detect errors in a frame.</p>
<h3 id="heading-which-ethernet-frame-field-indicates-the-beginning-of-an-ethernet-frame">Which Ethernet frame field indicates the beginning of an Ethernet frame?</h3>
<p><strong>Preamble and SFD</strong></p>
<h1 id="heading-what-is-a-mac-address">What is a MAC Address?</h1>
<p><strong>Media Access Control(MAC):</strong> the <strong>physical address</strong>, which <strong>uniquely identifies</strong> each device on a given network. To communicate between two networked devices, we need two addresses: an <strong>IP address and a MAC address**</strong>.<strong>
 It is assigned to the </strong>NIC** (Network Interface Card) of each device that can be connected to the internet.</p>
<p>It is globally unique: it <strong>means two devices cannot have the same MAC address</strong>. It is represented in a <strong>hexadecimal</strong> format on each device, such as <strong>00:0a:95:9d:67:16.</strong></p>
<p>It is <strong>12 digits, 48 bits (6 bytes)</strong> long, out of which the first 24 bits(first 6 digits) are used for OUI(Organization Unique Identifier), for example (3C-8B-7F), and 24 bits(second 6 digits)  for NIC/vendor-<em>specific.</em></p>
<p>It works on the <strong>data-link layer</strong> of the OSI model.</p>
<p><strong>IPV4 →</strong> uses <strong>ARP protocol</strong> to associate the logical address with the MAC Address. </p>
<p><strong>IPV6 →</strong> uses <strong>ICMPV6 Neighbor Discovery(ND)</strong>  to associate the logical address with the MAC Address. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a3a71693-6852-46b3-834e-e4bdecd03f1d.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-why-should-the-mac-address-be-unique-in-the-lan-network">Why should the MAC address be unique in the LAN network?</h3>
<p>If a LAN network has two or more devices with the same MAC address, that network will not work. </p>
<h3 id="heading-there-are-two-primary-addresses-assigned-to-a-device-on-an-ethernet-lan">There are two primary addresses assigned to a device on an Ethernet LAN:</h3>
<ul>
<li><strong>Physical Address (The MAC address) -</strong> used for <strong>NIC-to-NIC communication</strong> on the same Ethernet network.</li>
<li><strong>Logical Address (the IP address) -</strong> used to send the <strong>packet from the source device to the destination device</strong>. The destination device may be on the same network as the source, or it may be on a remote network.</li>
</ul>
<h3 id="heading-destination-on-the-same-network">Destination on the Same network</h3>
<p>Layer 2 physical addresses (i.e., Ethernet MAC addresses) are used to deliver the data link frame with the encapsulated IP packet from one NIC to another NIC that is on the same network. If the destination IP address is on the same network, the destination MAC address will be that of the destination device.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/03c751d1-67ab-4617-938c-76ad9627a4b0.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-destination-on-the-remote-network">Destination on the Remote network</h3>
<p>When the destination IP address(IPv4 or IPV6) is on a remote network, the destination MAC address will be the address of the host default gateway(i.e., the router interface).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c8827d3e-b10b-41a1-92fd-fd59062f95c5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Routers examine the destination IPv4 address to determine the best path to forward the IPv4 packet. <strong>When the router receives the Ethernet frame, it de-encapsulates the Layer 2 information. Using the destination IPv4 address,g it determines the next-hop device and then encapsulates the IPv4 packet in a new data link frame for the outgoing interface</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b8bdec11-f691-49f8-9cf2-e7d18f3c9934.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Along each link in a path, an IP packet is encapsulated in a frame. The frame is specific to the data link technology that is associated with that link, such as Ethernet. If the next-hop device is the final destination, the destination MAC address will be that of the device's Ethernet NIC, as shown in the figure.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7300ad71-3914-456f-be20-200857bfb9ad.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c297d165-dd9d-425b-b568-51ee2490268c.gif" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-ethernet-lan-switching">Ethernet LAN Switching</h1>
<p>An <strong>Ethernet switch</strong> examines its <strong>MAC address table</strong> to make a forwarding decision for each frame.</p>
<h2 id="heading-switch-learning-and-forwarding"><strong>Switch Learning and Forwarding</strong></h2>
<ul>
<li><strong>Learn</strong>
Every frame that enters a switch is checked for new information to learn. It does this by examining the source MAC address of the frame and the port number where the frame entered the switch. If the source MAC address does not exist, it is added to the table along with the incoming port number.</li>
<li><strong>Forwarding</strong>
If the destination MAC address is a unicast address, the switch will look for a match between the destination MAC address of the frame and an entry in its MAC address table. If the destination MAC address is in the table, it will forward the frame out the specified port. If the destination MAC address is not in the table, the switch will forward the frame out all ports except the incoming port. This is called an <strong>unknown unicast.</strong></li>
</ul>
<p>Which network device has the primary function of sending data to a specific destination based on the information found in the MAC address table?</p>
<ul>
<li><strong>switch</strong></li>
</ul>
<p>Ethernet switches add entries to their MAC address table based on what field of the Ethernet frame?</p>
<ul>
<li><strong>source MAC address</strong></li>
</ul>
<p>When a switch receives an Ethernet frame and the destination MAC address of that frame is not in its MAC address table, the switch will:</p>
<ul>
<li><strong>Forward the frame out of all ports except in the incoming port.</strong></li>
</ul>
<p>What addressing information is recorded by a switch to build its MAC address table?</p>
<ul>
<li><strong>The source Layer 2 address of incoming frames</strong></li>
</ul>
<p>What is one function of a Layer 2 switch?</p>
<ul>
<li><strong>Determines which interface is used to forward a frame based on the destination MAC address</strong></li>
</ul>
<p>Which information does a switch use to keep the MAC address table information current?</p>
<ul>
<li><strong>The source MAC address and the incoming port.</strong></li>
</ul>
<p>What <strong>will a host on an Ethernet network do</strong> if it receives a frame with a unicast destination MAC address that does not match its own MAC address?</p>
<ul>
<li><strong>It will discard the frame.</strong></li>
</ul>
<p>What kind of frame does a switch flood out of all interfaces except the one it was received on?</p>
<ul>
<li><strong>Unknown Unicast</strong></li>
</ul>
<p>What happens to runt frames received by a Cisco Ethernet switch?
• <strong>The frame is dropped.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9be56fc5-04de-4b2f-9399-8ad1152d4b31.gif" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-arpaddress-resolution-protocol-1">ARP(Address Resolution Protocol)</h2>
<p>ARP is a network protocol used to <strong>find out the hardware (MAC) address of a device</strong> <strong>from an IP address</strong> ( <strong>layer 3 address).</strong> It is used when a device wants to communicate with another device on a local network (for example, on an Ethernet network that requires physical addresses to be known before sending packets).</p>
<p>ARP request packets are sent to the <strong>broadcast</strong> addresses (<strong>FF:FF:FF:FF:FF: FF</strong> for the <strong>Ethernet broadcasts</strong> and <strong>255.255.255.255</strong> for the <strong>IP broadcasts</strong>).</p>
<p><strong>Consists of two messages:</strong></p>
<p><strong>ARP Request</strong> is <strong>Broadcast</strong> = sent to all hosts on the network.</p>
<p><strong>ARP Replay</strong> is <strong>Unicast</strong> = sent only to one host (The host that sent the request).</p>
<p><strong>ARP provides two basic functions:</strong></p>
<ul>
<li>Resolving IPv4 addresses to MAC addresses.</li>
<li>Maintaining a table of IPv4 to MAC address mappings.</li>
</ul>
<p>The sending device will search its <strong>ARP table</strong> for a destination IPv4 address and a corresponding MAC address.</p>
<ul>
<li>If the packet’s destination IPv4 address is <strong>on the same network</strong> as the source IPv4 address, the device will search the ARP table for the destination IPv4 address.</li>
<li>Suppose the destination IPv4 address is <strong>on a different network</strong> from the source IPv4 address. In that case, the device will search the ARP table for the <strong>IPv4 address of the default gateway</strong>., It uses the ARP process to determine the <strong>MAC address of the default gateway</strong>.</li>
<li>The ARP table temporarily saves (caches) the mapping for the devices on the LAN.</li>
<li>The packet is dropped if <strong>no device responds to the ARP request</strong> because a frame cannot be created.</li>
<li>Entries in the ARP table are <strong>time-stamped.</strong> If a device does not receive a frame from a particular device before the timestamp expires, the entry for this device is removed from the ARP table.</li>
</ul>
<blockquote>
<p>💡 <strong>Note</strong>: IPv6 uses a similar process to ARP for IPv4, known as ICMPv6 Neighbor Discovery (ND). IPv6 uses neighbor solicitation and neighbor advertisement messages, similar to IPv4 ARP requests and ARP replies.</p>
</blockquote>
<p>On a Cisco router, the <strong>show ip arp</strong> command is used to display the ARP table</p>
<pre><code class="lang-javascript">R1# show ip arp
</code></pre>
<p>On a Windows  PC, the <strong><code>arp –a</code></strong> command is used to display the ARP table</p>
<pre><code class="lang-javascript">C:∖Users∖PC&gt; arp -a
</code></pre>
<h2 id="heading-arp-security">ARP Security</h2>
<p>In some cases, the use of ARP can lead to a potential security risk. A threat actor can use ARP spoofing to perform an ARP poisoning attack. This is a technique used by a threat actor to <strong>reply to an ARP request for an IPv4 address that belongs to another device, such as the default gateway</strong>, as shown in the figure. The threat actor sends an ARP reply with its own MAC address. The receiver of the ARP reply will add the wrong MAC address to its ARP table and send these packets to the threat actor.</p>
<p>Enterprise-level switches include mitigation techniques known as <strong>dynamic ARP inspection (DAI)**</strong>.**</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1af7c64e-608d-4d47-8e56-4c03885aeea3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://www.networkacademy.io/sites/default/files/inline-images/arp-man-in-the-middle.gif" alt="CCNA 200-301 Study (1)" /></p>
<p>We can track computer requests when the process of releasing and renewing IP addresses occurs.</p>
<p> CMD → ipconfig /release the ipconfig /release</p>
<p>ipconfig /release sends a command to the DHCP server instructing it to dump the network configuration and then deletes the current network configuration for all adapters (IP address, DNS servers, gateway, etc).</p>
<p>/renew will instruct your computer to request a new IP address from the DHCP server as well as DNS, gateway, and whatever other information the DHCP server is set to configure.</p>
<p>ARP request packets are sent to the broadcast addresses (<strong>FF:FF:FF:FF:FF:FF</strong> for the <strong>Ethernet broadcasts</strong> and <strong>255.255.255.255</strong> for the <strong>IP broadcasts</strong>).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/143dab42-a905-41f1-8281-107948b027e5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>We can track computer requests when the process of releasing and renewing IP addresses occurs.</p>
<p> CMD → ipconfig /release the ipconfig /release</p>
<p>ipconfig /release sends a command to the DHCP server instructing it to dump the network configuration and then deletes the current network configuration for all adapters (IP address, DNS servers, gateway, etc).</p>
<p>/renew will instruct your computer to request a new IP address from the DHCP server as well as DNS, gateway, and whatever other information the DHCP server is set to configure.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8bebe153-7900-4700-a0aa-877e04db58f9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1b55b8b8-05f8-4ddf-a74d-8b0557d1222d.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-mac-address-transmission-types">MAC Address Transmission types?</h1>
<h2 id="heading-unicast-mac-address"><strong>Unicast MAC address:</strong></h2>
<p>The Unicast MAC address represents the specific NIC on the network. A Unicast MAC address frame is only sent out to the interface that is assigned to a specific NIC and hence transmitted to the <strong>single destination device</strong>. If the LSB (least significant bit) of t<strong>he first octet of an address is set to zero</strong>, the frame is meant to reach only <strong>one destination NIC</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/599ea45c-73ca-4fd2-970c-9934b2ebcac3.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-multicast-mac-address"><strong>Multicast MAC Address</strong></h3>
<p>Multicast addresses enable the source <strong>device to transmit a data frame to multiple devices or NICs</strong>. In Layer-2 (Ethernet) Multicast address, the LSB (least significant bit) or the <strong>first 3 bytes of the first octet of an address is set to one and reserved for the multicast addresses.</strong> The rest 24 bits are used by the device that wants to send the data in a group. The multicast address always starts with the prefix <strong>01-00-5E.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6eaf713c-dfc8-4073-a51c-2da527757cbd.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-broadcast-mac-address"><strong>Broadcast MAC address</strong></h3>
<p>It represents all devices within a Network. In broadcast MAC address, Ethernet frames with ones in all bits of the <strong>Destination address</strong> <strong>(FF-FF-FF-FF-FF-FF</strong>) are known as a <strong>broadcast address</strong>
. All these bits are the reserved addresses for the broadcast. Frames that are destined with MAC address FF-FF-FF-FF-FF-FF will reach every computer belonging to that LAN segment. Hence if a source device wants to send the data to all the devices within a network, it can use the broadcast address as the destination MAC address.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c403a784-70e7-4719-962b-5830e838a9ed.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-how-to-find-a-mac-address-vendor">How to find a MAC Address vendor?</h3>
<p>Use the website below to find the vendor who creates the NIC card:</p>
<p><a target="_blank" href="http://macvendors.com">bookmark</a></p>
<h3 id="heading-practice-mac-address">Practice MAC Address</h3>
<p>When we connect two or more devices through a switch and run this command below in the switch </p>
<pre><code class="lang-javascript">ISUSW1#show mac address-table
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5f63eb9d-ac58-46d3-9b2e-136b71c96d73.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, no MAC address record is found because no data was transmitted over the switch.</p>
<p>After executing the ping command from one PC to another, run the current command on the switch.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6b625437-1396-4431-a5a3-242ecc02dd39.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Now, all MAC addresses are connected to the switch and visible because <strong>the switches have a self-learning feature.</strong></p>
<p>When we have two connected switches, as shown in the images below:</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c9844d4-d02e-4984-9100-ad8e6997d567.png" alt="CCNA 200-301 Study (1)" /></p>
<p>While sending a ping message from one pc to another pc connected to the other switch </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/80e461bd-54fe-4116-bdea-9356a20bbfe7.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Why are there three MAC addresses showing through port FA0/3?</p>
<p>because the MAC addresses of other computers are received by the switch through port 0/3</p>
<ul>
<li>Use the command below on your switch device to see the MAC address age</li>
</ul>
<pre><code class="lang-javascript">EBLSW#show mac-address-table aging-time
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8dd38137-20d3-4ffa-98fc-ca2b499aa8dd.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>After</strong> <strong>300 seconds (5 minutes)</strong> <strong>of inactivity on the switch, it automatically resets the MAC address table.</strong></p>
</blockquote>
<ul>
<li>Use the commands below on your switch device to clean the MAC table</li>
</ul>
<pre><code class="lang-javascript">Switch#clear mac address-table dynamic
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/94dbc0e1-1698-49e9-94af-80ed08b94d58.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Additionally, we can delete a specific MAC address or interface from incoming frames.</p>
<p><strong>Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?</strong></p>
<p><img src="https://itexamanswers.net/wp-content/uploads/2016/02/p39-prac-final-ccna2.jpg" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Source MAC: <strong>00E0.FE91.7799</strong> Source <strong>IP: 10.1.1.10</strong></li>
</ul>
<h1 id="heading-what-is-cdp">What is CDP?</h1>
<p><strong>Cisco Discovery Protocol(CDP)</strong> is a network <strong>discovery tool</strong> that assists network administrators and engineers in <strong>identifying neighbouring Cisco devices.</strong> CDP is a <strong>layer 2 proprietary protocol that is default-enabled on all Cisco devices, including routers and switche</strong>s.  </p>
<pre><code class="lang-javascript">EBLSW#show cdp neighbors
</code></pre>
<p>Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID    Local Intrfce   Holdtme    Capability   Platform    Port ID
ISUSW        Fas 0/3          149            S       2960        Fas 0/20</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>(config)# <strong>cdp run</strong></td><td>Enables CDP globally on device.</td></tr>
</thead>
<tbody>
<tr>
<td>(config)# <strong>no cdp run</strong></td><td>Disables CDP globally on device.</td></tr>
<tr>
<td>(config-if)# <strong>cdp enable</strong></td><td>Enables CDP on an interface device if CDP isn’t enabled globally.</td></tr>
<tr>
<td>(config-if)# <strong>no cdp enable</strong></td><td>Disables CDP on an interface device.</td></tr>
<tr>
<td>(config)# <strong>cdp timer &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies CDP packets transmission frequency. Default <strong>60 sec</strong>.</td></tr>
<tr>
<td>(config)# <strong>cdp holdtime &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies time limit for which a receiving device should hold information before discarding. Default <strong>180 sec</strong></td></tr>
<tr>
<td>R1(config)# <strong>[no] cdp advertise-v2</strong></td><td>Enable/disable CDPv2</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <code>cdp run</code> Enable CDP globally on the device.  </p>
<p><code>cdp enable</code>  Enable CDP on a specific interface.</p>
<p>💡 Note: <strong>This protocol is exclusive to Cisco products only.</strong></p>
</blockquote>
<p>In a CDP environment, what happens when the CDP interface on an adjacent device is configured without an IP address?</p>
<ul>
<li><strong>CDP operates normally, but it cannot provide IP address information for that neighbor</strong></li>
</ul>
<h2 id="heading-what-is-lldp">What is LLDP?</h2>
<p><strong>Link Layer Discovery Protocol (LLDP)</strong> is a <strong>layer 2</strong> neighbour discovery protocol that allows devices to advertise device information to their directly connected peers/neighbours. It is best practice to enable LLDP globally to standardize network topology across <strong>all devices, especially in multi-vendor networks.</strong></p>
<blockquote>
<p>💡 ● LLDP is usually globally disabled by default.<br />● LLDP is also disabled on each interface by default.</p>
</blockquote>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>(config)# lldp run</strong></td><td>Enables LLDP globally on device.</td></tr>
</thead>
<tbody>
<tr>
<td>(config)# <strong>no lldp  run</strong></td><td>Disables LLDP globally on device.</td></tr>
<tr>
<td><strong>(config-if)# lldp transmit</strong></td><td>Enables LLDP on an interface device if LLDP  isn’t enabled globally.(use together with receive)</td></tr>
<tr>
<td><strong>(config-if)# lldp receive</strong></td><td>Enables LLDP on an interface device if LLDP  isn’t enabled globally. (use together with transmit)</td></tr>
<tr>
<td>(config)# <strong>lldp timer &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies CDP packets transmission frequency. Default 30 seconds.</td></tr>
<tr>
<td>(config)# <strong>lldp holdtime &lt;</strong><em><strong>seconds</strong></em><strong>&gt;</strong></td><td>Specifies time limit for which a receiving device should hold information before discarding. Default 120 seconds.</td></tr>
<tr>
<td>R1(config)# <strong>lldp reinit </strong></td><td>this timer will delay the actual initialization of LLDP. 2 seconds by default.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/00a9a9de-6219-4d65-b537-c55e6db5a277.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Local Interface</strong>:  the physical port on your switch where the neighbor is connected.</p>
<p><strong>Port ID:</strong> the neighbor’s interface identifier (how the neighbor advertises its port).</p>
<p>Refer to the exhibit. The network administrator must prevent the switch Cat9K-2 IP address from
being visible in LLDP without disabling the protocol.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ee3a2cb2-3ea7-431c-ac3e-4fdfdb0a72a8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Which action must be taken must be taken to complete the task?</p>
<p>A. Configure the no lldp tlv-select-management-address command globally on Cat9K-2
B. Configure the no lldp transmit command on interface G1/0/21 in Cat9K-1
C. Configure the no lldp receive command on interface G1/0/21 on Cat9K-1
D. Configure the no lldp mac-phy-cfg command globally on Cat9K-2</p>
<blockquote>
<p>💡 To hide Cat9K‑2’s IP without disabling LLDP, stop advertising the <strong>Management Address TLV</strong> on the device that’s sending it. On Cat9K‑2: no lldp tlv-select management-address  </p>
</blockquote>
<h2 id="heading-introducing-ip-addresses">Introducing IP Addresses</h2>
<h2 id="heading-what-is-an-ip-address">What is an IP Address?</h2>
<p><strong>Internet protocol(IP)</strong>address: an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e59087cb-2384-475c-b3b9-dbc6512adc93.png" alt="CCNA 200-301 Study (1)" /></p>
<p>IP Addresses are <strong>32-bit</strong> numbers that are typically displayed in dotted decimal notation. A 32-bit address contains <strong>two primary parts:</strong> <strong>The network prefix</strong> and <strong>the host prefix</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a8e829ae-ab7a-47a7-a2ef-31abcaa5cd6f.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-ip-address-to-binary">IP Address  to Binary</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/041055e4-9bf1-4c0a-9bf4-75443f839399.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note:  0-255  includes 256 IP addresses.</p>
<h2 id="heading-characteristics-of-ip"><strong>Characteristics of IP</strong></h2>
<ul>
<li><strong>Connectionless:</strong> There is <strong>no connection with the destination</strong> established before sending data packets.</li>
<li><strong>Best Effort:</strong> IP is inherently unreliable because packet delivery is <strong>not guaranteed</strong>.</li>
<li><strong>Media Independent:</strong> Operation is <strong>independent of the medium</strong> (e.g., copper, fiber-optic, or wireless) carrying the data.</li>
</ul>
<h2 id="heading-ip-addresses-classes">IP Addresses Classes</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/96073151-b442-4742-a13b-5206c5191426.png" alt="CCNA 200-301 Study (1)" /></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>Public IP Range</td><td>Private IP Range</td><td>Subnet Mask</td><td># of Networks</td><td># of Hosts per Network</td><td></td></tr>
</thead>
<tbody>
<tr>
<td>Class A</td><td>1.0.0.0 to127.0.0.0</td><td>10.0.0.0 to10.255.255.255</td><td>255.0.0.0</td><td>126</td><td>16,777,214</td><td></td></tr>
<tr>
<td>Class B</td><td>128.0.0.0 to191.255.0.0</td><td>172.16.0.0 to172.31.255.255</td><td>255.255.0.0</td><td>16,382</td><td>65,534</td><td></td></tr>
<tr>
<td>Class C</td><td>192.0.0.0 to223.255.255.0</td><td>192.168.0.0 to192.168.255.255</td><td>255.255.255.0</td><td>2,097,150</td><td>254</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>The starting IP</strong> is called the Network address and is not usable.<br /><strong>The ending IP</strong> address is called the broadcast address, which is not usable.</p>
</blockquote>
<p>    <strong>The ending IP</strong> address is called the broadcast address, which is not usable.</p>
<p><strong>Network Part</strong></p>
<p>The network part of an IPv4 address is located on the left side. It identifies the specific network to which the address belongs and indicates the IP address class. This portion is crucial for routing and network identification.</p>
<p>For example, we have the IPv4 address 192.168.10.100 and a /24 subnet mask. /24 simply means that the first 24 bits, starting from the left side, are the network portion of the IPv4 address. The 8 remaining bits of the 32 bits will be the host portion.</p>
<p><strong>Host Part</strong></p>
<p>The host portion of the IPv4 address uniquely identifies the device or the interface on your network. Hosts that have the same network portion can communicate with one another directly, without the need for the traffic to be routed.</p>
<ul>
<li><strong>Network Portion</strong>: Identifies the network to which the IP address belongs.</li>
<li><strong>Host Portion</strong>: Identifies the specific device within that network.</li>
</ul>
<h2 id="heading-class-a">Class A</h2>
<ul>
<li><strong>1.0.0.1</strong>  to <strong>126.255.255.254</strong>(useable address).</li>
<li>Support <strong>16 million</strong> hosts on each of <strong>126 networks</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/920beadb-3dd0-4cf3-910e-1f52fd816707.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Class A addresses are for networks with a large number of total hosts.</p>
<h2 id="heading-class-b">Class B</h2>
<ul>
<li><strong>128.1.0.1</strong> to <strong>191.255.255.254</strong></li>
<li>Supports <strong>65,000  hots</strong> on each of <strong>16,000 networks</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6cd59da7-33a9-4ecf-891d-2273d0972394.png" alt="CCNA 200-301 Study (1)" /></p>
<p>If you use a class B, you can build more networks, but fewer hosts per network.</p>
<h2 id="heading-class-c">Class C</h2>
<ul>
<li><strong>192.0.1.1</strong> to <strong>223.255.254.254</strong></li>
<li>Support <strong>254</strong> hosts on each of <strong>2</strong> million networks.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f1353934-316b-457c-8015-886e88f529e1.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-class-d">Class D</h2>
<ul>
<li><strong>224.0.0.0</strong> to <strong>239.255.255.255</strong>.</li>
<li>Reserved for multicast groups.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Range Start Address</td><td>Range end Address</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>224</strong>.0.0.0</td><td>224.0.0.255</td><td>Reserved for special “ well-know” multicast addresses.</td></tr>
<tr>
<td>224.0.1.0</td><td>238.255.255.255</td><td>Globally-scoped(internet-wide) multicast addresses</td></tr>
<tr>
<td><strong>239</strong>.0.0.0</td><td>239.255.255.255</td><td>Administratively-scoped(local) multicast addresses</td></tr>
</tbody>
</table>
</div><p>When the IP Address Started from <strong>224 to 239</strong></p>
<h3 id="heading-class-e">Class E</h3>
<ul>
<li><strong>240.0.0.0</strong> to <strong>254.255.255.254</strong></li>
<li><strong>reserved for future use, or research and development purposes</strong></li>
<li><strong>This IP class is reserved for experimental purposes only for R&amp;D or study.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d3e02403-7647-494a-a1db-592dca7d1710.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-how-to-know-the-class-of-an-ip-address-from-binary">How to know the class of an IP address from binary?</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7adc48c0-af13-446d-a952-83f08d8e51a1.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Class A: The first bit always has to be 0.</li>
<li>Class B: The first 2 bits always have to be 10.</li>
<li>Class C: The first 3 bits always have to be 110.</li>
</ul>
<h2 id="heading-subnet-mask">Subnet Mask</h2>
<p>A subnet mask is a number that <strong>defines a range of IP addresses available within a network</strong>. A single subnet mask limits the number of Valid IPs for a specific network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/800749ab-92ea-4f81-9729-f34afb23836a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this Image, three 255s are assigned to the network, and 0 octet is assigned to the host </p>
<h2 id="heading-gateway">Gateway</h2>
<p>A gateway IP refers to a device on a network that <strong>routes local network traffic to other networks</strong>. The subnet mask defines the boundary between the network and host portions of an IP address, helping to determine which devices are on the same local network.</p>
<h2 id="heading-public-and-private-ip-addresses">Public and Private IP addresses</h2>
<ul>
<li><strong>Public IP</strong> addresses are used on the Internet.</li>
<li><strong>Private IP</strong> addresses are used on your local area network and should not be used on the internet.</li>
</ul>
<p>These are the Private IP address ranges:</p>
<ul>
<li>Class A: 10.0.0.0 – 10.255.255.255</li>
<li>Class B: 172.16.0.0 – 172.31.255.255</li>
<li>Class C: 192.168.0.0 – 192.168.255.255</li>
</ul>
<p><strong>Class A and B</strong> networks have a <strong>very large number of host addresses,</strong> and <strong>Class C has very few</strong>. Class A networks accounted for 50% of the IPv4 networks. This caused most of the available IPv4 addresses to go unused.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a001fe20-0660-4f87-8a54-a9994264d14a.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-loopback-address">Loopback Address</h2>
<p>A loopback address is a special IP address, 127.0.0.1, reserved by InterNIC for use in testing network cards, this IP address responds to the software loopback interface of the network card, which does not have hardware associated with it and does not require a physical connection to a network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/05b91d84-8dfd-47a7-ac4b-9a15f11cb17a.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-apipa">APIPA</h2>
<p>Automatic Private IP Addressing(APIPA) is a feature in operating systems ( such as Windows) that enables computers to automatically self-configure an IP address and subnet mask when <strong>their DHCP server isn’t reachable</strong>. The IP Address range for APIPA is <strong>169.254.0.1 to 169.254.255.254,</strong> with the subnet mask of <strong>255.255.0.0</strong></p>
<p><strong>What are two features of IPv4 addresses? (Choose two.)</strong></p>
<ul>
<li><strong>IPv4 is a logical addressing scheme.</strong></li>
<li><strong>An IPv4 addressing scheme is hierarchical.</strong></li>
</ul>
<h1 id="heading-assignment-of-an-ip-address">Assignment of an IP address</h1>
<p>Both IPv4 and IPv6 addresses are managed by the <strong>Internet Assigned Numbers Authority (IANA)</strong>{ee·a·nuh}. The IANA manages and allocates blocks of IP addresses to the <strong>Regional Internet Registries (RIRs)</strong>. </p>
<p>RIRs are responsible for allocating IP addresses to ISPs that provide IPv4  blocks to organizations and smaller ISPs. </p>
<p><strong>Regional Internet Registries</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/59eef674-94d8-4c56-b19e-e08ffa20d048.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?</p>
<p><strong>RIRs</strong></p>
<p><strong>Refer to the exhibit. An administrator is troubleshooting connectivity on the office network. PC1 is able to send print jobs to Printer1, but is unable to access File Server1. Which action would correct the problem?</strong></p>
<p><img src="https://itexamanswers.net/wp-content/uploads/2022/11/i207787v1n2_207787.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Change the R1 Fa0/1 interface IP address to 10.231.64.1.</li>
<li>Change the R1 Fa0/0 interface subnet mask to 255.255.0.0.</li>
<li>Change the File Server1 IP address to 10.231.96.253.</li>
<li>Change the PC1 IP address to 10.231.64.115.</li>
</ul>
<p>Subnet ranges:</p>
<ul>
<li><code>10.231.64.0 – 10.231.95.255</code> → <strong>Network B</strong></li>
<li><code>10.231.96.0 – 10.231.127.255</code> → <strong>Network A</strong></li>
</ul>
<h3 id="heading-ip-address-placement"><strong>IP Address Placement</strong></h3>
<ul>
<li><strong>PC1</strong>: <code>10.231.92.115</code> — in <strong>Network B</strong> (<code>10.231.64.0/19</code>) ✅</li>
<li><strong>Printer1</strong>: <code>10.231.95.252</code> — also in <strong>Network B</strong> ✅</li>
<li><strong>File Server1</strong>: <code>10.231.127.253</code> — in <strong>Network A</strong> ✅</li>
<li><strong>R1 Fa0/1</strong>: <code>10.231.128.1</code> — <strong>⚠️ This is the problem</strong></li>
<li><strong>Change the R1 Fa0/1 interface IP address to 10.231.64.1. (correct answer)</strong></li>
</ul>
<h2 id="heading-network-segmentation-basic-of-subnetting">Network Segmentation (Basic of Subnetting)</h2>
<p><strong>Broadcast Domain:</strong> is a collection of network devices that receive broadcast traffic from each other.</p>
<p><strong>Subnetting</strong> is the practice of <strong>dividing a network into two or more smaller networks</strong>. It increases <strong>routing efficiency</strong>, enhances network <strong>security</strong>, and <strong>reduces the size of the broadcast domain**</strong>.**</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/69a7737d-50ac-47b9-b488-331c8c6b3043.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Routers do not propagate broadcasts. When a router <strong>receives a broadcast</strong>, it does <strong>not forward it out</strong> other interfaces. For instance, when R1 receives a broadcast on its Gigabit Ethernet 0/0 interface, <strong>it does not forward it out another interface.</strong></p>
<p>Therefore, each <strong>router interface connects to a broadcast domain, and broadcasts are only</strong> propagated within that specific broadcast domain.</p>
<h2 id="heading-problems-with-large-broadcast-domains">Problems with Large Broadcast  Domains</h2>
<p>A  large broadcast domain is a network that connects many hosts. A problem with a large broadcast domain is that these hosts can generate excessive broadcast traffic, which negatively affects the network. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c2e1fc2-aff0-4e53-90ce-0fd7106a9427.png" alt="CCNA 200-301 Study (1)" /></p>
<p>LAN 1 connects 400 users, which could generate an excessive amount of broadcast traffic. This results in <strong>slow network operations</strong> due to the significant amount of traffic it can cause, and slow device operations because a device must accept and process each broadcast packet. </p>
<p>The solution is to reduce the size of the network to create smaller broadcast domains in a process called subnetting.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/617a6e15-eaf1-4124-90d3-55b82d1474a8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In the figure, the 400 users in LAN 1 with network address 172.16.0.0 /16 have been <strong>divided into two subnets of 200 users each</strong>: <strong>172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only propagated within the smaller broadcast domains</strong>. Therefore, a broadcast in LAN 1 would not propagate to LAN 2.</p>
<blockquote>
<p>💡 Notice how prefix length has changed from a <strong>single /16 network</strong> to <strong>two /24 networks</strong>. This is the basics of subnetting </p>
</blockquote>
<h1 id="heading-reasons-for-segmenting-networks">Reasons for Segmenting Networks</h1>
<p>Subnetting <strong>reduces overall network traffic</strong> and <strong>improves network performance</strong>. It also enables network administrators to implement <strong>security policies such as which subnets are allowed or not allowed to communicate together</strong>. Another reason is that it r<strong>educes the number of devices affected by abnormal broadcast due to misconfiguration, hardware/software problems, or malicious intent</strong>.</p>
<h3 id="heading-network-administrator-can-group-devices-and-services-into-subnets">Network Administrator can group devices and services into subnets</h3>
<ul>
<li><strong>Subnetting by Locations</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eceb89ad-3e93-48bd-bdac-2822d975d1da.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Subnetting by group or function</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7ce1e6aa-3b57-44ee-a3b2-d5c9f214c95c.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Subnetting by device type</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/133db667-32dd-4491-99e3-0cc9d87867ce.png" alt="CCNA 200-301 Study (1)" /></p>
<p>### </p>
<p>Which devices will not forward an IPv4 broadcast packet by default?</p>
<ul>
<li><strong>router</strong></li>
</ul>
<p>Which two situations are the result of excessive broadcast traffic?</p>
<ul>
<li><strong>slow device operations</strong></li>
<li><strong>slow network operations</strong></li>
</ul>
<h3 id="heading-class-a-1">class A</h3>
<p>10.0.0.0<strong>/8 (network prefix)</strong>  meaning  8-bit located for the n<strong>etwork ID</strong> portion and 24-bits for the <strong>host portion</strong> </p>
<p>10.0.0.0   255.0.0.0 <strong>(subnet mask) — equivalent to writing prefixes.</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Subnet mask (decimal)</td><td>255</td><td>0</td><td>0</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Subnet mask (binary)</td><td>11111111</td><td>00000000</td><td>00000000</td><td>00000000</td></tr>
</tbody>
</table>
</div><h3 id="heading-class-b-1">class B</h3>
<p>172.16.0.0<strong>/16 (network prefix)</strong>  meaning 16 bits are located for the n<strong>etwork ID</strong> portion and 16 bits for the <strong>host portion</strong> </p>
<p>172.16.0.0   255.255.0.0 <strong>(Subnet mask) equivalent to writing prefixes.</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Subnet mask (decimal)</td><td>255</td><td>255</td><td>0</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Subnet mask (binary)</td><td>11111111</td><td>11111111</td><td>00000000</td><td>00000000</td></tr>
</tbody>
</table>
</div><p>192.168.1.0<strong>/24 (network prefix)</strong>  meaning  24-bit located for the n<strong>etwork ID</strong> portion and 8-bits for the <strong>host portion</strong> </p>
<p>192.168.1.0    255.255.255.0 <strong>(Subnet mask) equivalent to writing prefixes.</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Subnet mask (decimal)</td><td>255</td><td>255</td><td>255</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Subnet mask (binary)</td><td>11111111</td><td>11111111</td><td>11111111</td><td>00000000</td></tr>
</tbody>
</table>
</div><h2 id="heading-scenarios">Scenarios</h2>
<p>Someone tells you to create three different networks for my organization or company </p>
<h3 id="heading-class-c-1">Class C</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/01a24457-45dc-479d-afc5-f3b4bfff465c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we have created three networks in Class C. The third octet has been changed, and two routes have been added to route data from one network to another. </p>
<p>Note: if we don’t change the third octet, all devices are in the same network.</p>
<blockquote>
<p>⚠️ This class includes 254 IP addresses for the host portion, unsuitable for large organizations.</p>
</blockquote>
<h3 id="heading-class-b-2">Class B</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5532f630-7936-4da5-8b0b-53fa001dee13.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-class-a-2">Class A</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/054a6bb7-abc8-4c72-b5ea-ccecb591162c.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-classlesscidr">Classless(CIDR)</h2>
<ul>
<li>In the classful addressing method, millions of class <strong>A addresses are wasted</strong>.</li>
<li>Many of the class B <strong>addresses are wasted</strong>.</li>
<li>Class C is so small that it cannot cater to the needs of organizations.</li>
<li>Classful networking was replaced by Classless Inter-Domain Routing(CIDR) in 1993</li>
</ul>
<h2 id="heading-subnetting">Subnetting</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/07a8724c-cf6d-4136-ba57-5b94b2318303.png" alt="CCNA 200-301 Study (1)" /></p>
<p> $2^n$<em><strong>=</strong></em><strong>number of required network = total number of subnets</strong></p>
<p>192.168.23.117/24   subnet this IP to  7 subnets      </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8df74658-8108-4c62-89f6-467482558573.png" alt="CCNA 200-301 Study (1)" /></p>
<p> $2^n$<em><strong>=number of the required network</strong></em> </p>
<p> $2^n$<em><strong>(number of remaining bits for a host) - 2 =  total hosts in the network.</strong></em></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>128</td><td>64</td><td>32</td><td>16</td><td>8</td><td>4</td><td>2</td><td>1</td></tr>
</thead>
<tbody>
<tr>
<td>2<em><strong>^7</strong></em></td><td>2<em><strong>^6</strong></em></td><td>2<em><strong>^5</strong></em></td><td>2<em><strong>^4</strong></em></td><td>2<em><strong>^3</strong></em></td><td>2<em><strong>^2</strong></em></td><td>2<em><strong>^1</strong></em></td><td>2<em><strong>^0</strong></em></td></tr>
</tbody>
</table>
</div><p>2_<strong>^</strong>_3=8  any number but should be greater than 7 </p>
<p>Now we borrow three bits from the host portion for the network portion.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>128</td><td>64</td><td>32</td><td>16</td><td>8</td><td>4</td><td>2</td><td>1</td></tr>
</thead>
<tbody>
<tr>
<td>1</td><td>1</td><td><strong>1</strong></td><td>0</td><td>0</td><td>0</td><td>0</td><td><em><strong>0</strong></em></td></tr>
</tbody>
</table>
</div><p>128+64+32= 224 new subnet mask   255.255.255.224</p>
<p>The last 1 bit decides how the network is incremented.</p>
<p>In this example, our network incremented by 32 after minus 2 for the network ID and broadcast 14 active IPs for each subnet. 32-2=30</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Network.id</td><td>First valid host</td><td>Last Valid host</td><td>Broadcast.id</td></tr>
</thead>
<tbody>
<tr>
<td>192.168.23.<strong>0</strong></td><td>192.168.0<strong>.1</strong></td><td>192.168.23.<strong>30</strong></td><td>192.168.23.<strong>31</strong></td></tr>
<tr>
<td>192.168.23.<strong>32</strong></td><td>192.168.0<strong>.33</strong></td><td>192.168.23<strong>.62</strong></td><td>192.168.23.<strong>63</strong></td></tr>
<tr>
<td>192.168.23<strong>.64</strong></td><td>192.168.0<strong>.65</strong></td><td>192.168.23.<strong>94</strong></td><td>192.168.23.<strong>95</strong></td></tr>
<tr>
<td>192.168.23<strong>.96</strong></td><td>192.168.0<strong>.97</strong></td><td>192.168.23.<strong>126</strong></td><td>192.168.23.<strong>127</strong></td></tr>
<tr>
<td>192.168.23<strong>.128</strong></td><td>192.168.0<strong>.129</strong></td><td>192.168.23.<strong>158</strong></td><td>192.168.23.<strong>159</strong></td></tr>
<tr>
<td>192.168.23<strong>.160</strong></td><td>192.168.0<strong>.161</strong></td><td>192.168.23<strong>.190</strong></td><td>192.168.23.1<strong>91</strong></td></tr>
<tr>
<td>192.168.23<strong>.192</strong></td><td>192.168.0<strong>.193</strong></td><td>192.168.23.<strong>222</strong></td><td>192.168.23.<strong>223</strong></td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 First, write all network IDs, then write broadcast IDs, and then write the first and the last host.<br /><strong>Network ID</strong>: <strong>T**</strong>he last octet is always an even number.**  </p>
<p><strong>Broadcast ID</strong>: <strong>The last octet is always an odd number.</strong>  </p>
<p><strong>Network ID</strong> = incremented by the last bit value as I described.  </p>
<p><strong>Broadcast Id</strong> = Network ID before -1.  </p>
<p><strong>First valid hos</strong>t= Network.id+1.  </p>
<p><strong>Last Valid host id</strong> = <a target="_blank" href="http://broadcast.id/">broadcast.id</a> -1</p>
</blockquote>
<p>    <strong>Network ID</strong>: <strong>T**</strong>he last octet is always an even number.**</p>
<p>    <strong>Broadcast ID</strong>: <strong>The last octet is always an odd number.</strong></p>
<p>    <strong>Network ID</strong> = incremented by the last bit value as I described.</p>
<p>    <strong>Broadcast Id</strong> = Network ID before -1.</p>
<p>    <strong>First valid hos</strong>t= Network.id+1.</p>
<p>    <strong>Last Valid host id</strong> = <a target="_blank" href="http://broadcast.id/">broadcast.id</a> -1</p>
<p><strong>If you would like to give an IP address to 30 hosts from your IP prefix, which subnet mask do you use most effectively?</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>A</strong></td><td>255.255.255.128</td></tr>
</thead>
<tbody>
<tr>
<td><strong>B</strong></td><td>255.255.255.240</td></tr>
<tr>
<td><strong>C</strong></td><td>255.255.255.248</td></tr>
<tr>
<td><strong>D</strong></td><td>255.255.255.254</td></tr>
<tr>
<td><strong>E</strong></td><td>255.255.255.224</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c25a11e6-f0b7-439e-902b-e02eba7d21fc.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-pc1s-ip-address-is-108910723327-what-is-the-network-address-of-its-subnet">PC1's IP address is 10.89.107.233/27. What is the <strong>network address</strong> of its subnet?</h2>
<p>## 
Here are a few <strong>super-fast</strong> ways:</p>
<h3 id="heading-quick-formula"><code>Quick Formula</code></h3>
<ul>
<li><strong><code>Block size</code></strong> <code>= 256 − mask_octet</code></li>
<li><strong><code>Network</code></strong> <code>= (⌊IP_octet ÷ block⌋ × block)</code></li>
<li><strong><code>Broadcast</code></strong> <code>= Network + block − 1</code></li>
</ul>
<h3 id="heading-given"><code>Given:</code></h3>
<ul>
<li><code>IP =</code> <strong><code>10.89.107.233/27</code></strong></li>
<li><code>Subnet mask</code> <strong><code>/27</code></strong> <code>→</code> <strong><code>255.255.255.224</code></strong></li>
<li><code>Block size =</code> <strong><code>256 − 224 = 32</code></strong></li>
</ul>
<h3 id="heading-formula"><code>Formula:</code></h3>
<p><strong><code>Network = (⌊octet ÷ block⌋ × block)</code></strong></p>
<ul>
<li><code>Focus on the</code> <strong><code>last octet</code></strong> <code>(233).</code></li>
<li><code>Divide: 233 ÷ 32 =</code> <strong><code>7.28…</code></strong></li>
<li><code>Floor =</code> <strong><code>7</code></strong></li>
<li><code>Multiply: 7 × 32 =</code> <strong><code>224</code></strong></li>
</ul>
<h3 id="heading-result"><code>Result:</code></h3>
<p><strong><code>Network address = 10.89.107.224/27</code></strong> <code>✅</code></p>
<h3 id="heading-broadcast-address"><code>Broadcast Address</code></h3>
<p><strong><code>Broadcast</code></strong> <code>= Network + block − 1</code></p>
<p><strong><code>Broadcast</code></strong> <code>= 224 + 32 = 256-1 = 255</code></p>
<p><strong><code>Broadcast address = 10.89.107.255/27</code></strong> <code>✅</code></p>
<h3 id="heading-step-1-understand-the-27-subnet-mask"><strong>Step 1: Understand the /27 Subnet Mask</strong></h3>
<ul>
<li>A <strong>/27 subnet</strong> means <strong>27 bits for the network</strong> and <strong>5 bits for the hosts</strong>.</li>
<li>The <strong>subnet mask</strong> is:<strong>255.255.255.224</strong><ul>
<li><strong>224</strong> in the fourth octet = <strong>11100000</strong> in binary.</li>
</ul>
</li>
<li>The <strong>block size</strong> (increment) in the <strong>fourth octet</strong> is:</li>
</ul>
<p>$256−224=32$</p>
<ul>
<li>This means <strong>subnets increase in steps of 32</strong> in the <strong>fourth octet</strong>.</li>
</ul>
<h3 id="heading-step-2-identify-the-network-address"><strong>Step 2: Identify the Network Address</strong></h3>
<ul>
<li>The <strong>fourth octet</strong> of <strong>10.89.107.233</strong> is <strong>233</strong>.</li>
<li>Find the  <strong>X*32</strong> that is <strong>≤ 233</strong>: (x<em>32 smaller than 233)
$7</em>32=224 ≤ 233$</li>
<li><strong>So, the network address is</strong>: <strong>10.89.107.224/27</strong>.</li>
</ul>
<h2 id="heading-question-2-a-host-has-the-ip-address-19216824917728-what-is-the-broadcast-address-of-its-subnet">Question 2: A host has the IP address 192.168.249.177/28. What is the broadcast address of its subnet?</h2>
<h3 id="heading-step-1-understand-the-28-subnet-mask"><strong>Step 1: Understand the /28 Subnet Mask</strong></h3>
<ul>
<li>A <strong>/28 subnet</strong> means <strong>28 bits for the network</strong> and <strong>4 bits for hosts</strong>.</li>
<li>The <strong>subnet mask</strong> is: <strong>255.255.255.240</strong></li>
<li>The <strong>block size</strong> (increment) in the <strong>fourth octet</strong> is:
$256−240=16$</li>
<li>This means <strong>subnets increase in steps of 16</strong> in the <strong>fourth octet.</strong></li>
</ul>
<h3 id="heading-step-2-find-the-broadcast-address"><strong>Step 2: Find the Broadcast Address</strong></h3>
<ul>
<li>The <strong>fourth octet</strong> of <strong>192.168.249.177</strong> is <strong>177</strong>.</li>
<li>Find the <strong>X*16</strong> that is <strong>≥ 177</strong> (x*16 greater than 177):</li>
</ul>
<p>$12*16 =192 ≥ 177 $</p>
<ul>
<li>The <strong>broadcast address</strong> is <strong>one less than the next subnet</strong>:<ul>
<li><strong>192.168.249.192 - 1 = 192.168.249.191</strong>.</li>
</ul>
</li>
</ul>
<p><strong>Easy way to find network ID (Subnet ID - network ID)</strong> </p>
<p>172.25.167.176</p>
<p>255.255.240.0 </p>
<p>172.255. .0 </p>
<h2 id="heading-3-rules-applied-to-subnet-mask">3 rules applied to subnet mask</h2>
<ol>
<li>If the subnet mask <strong>value=255</strong> writes the same IP, for example, <strong>255 above 172.</strong></li>
<li>If the subnet mask <strong>value=0</strong>, just <strong>set 0 zero instead of the IP</strong>.</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/05566133-e557-42f0-9feb-cbbdeab400d4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>3-     256- subnet mask = Network increment </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cb24bc6e-dfec-44f4-9a98-5dd5d50ba40e.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-we-have-three-rules-for-broadcast">We have three rules for Broadcast</h2>
<ol>
<li><strong>255 → Ip</strong></li>
<li><strong>0 → 255</strong></li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/208c369b-ba55-4338-9d67-dde6a34d9226.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-ccna-subnetting-find-the-valid-host-range-for-a-network"><strong>CCNA SUBNETTING: Find the Valid Host Range for a network</strong></h2>
<h3 id="heading-find-a-valid-host-range-17213014613319">Find a valid Host range 172.130.146.133/19?</h3>
<p>Now we need to find the ‌‌<strong>Host ID and Broadcast ID</strong> </p>
<h3 id="heading-network-id">Network ID</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/28b5be8e-cf1d-4d70-af67-75355796b2d2.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For the subnet mask, we chose a smaller number.</p>
<h3 id="heading-broadcast-id">Broadcast ID</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ab6f70ad-87a8-47d2-8e3c-a7a3146a90f3.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-differences-between-flsm-subnetting-and-vlsm-subnetting">Differences between FLSM Subnetting and VLSM Subnetting</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>FLSM (<strong>Fixed</strong> <strong>Length Subnet Masks</strong>) Subnetting</td><td>VLSM (<strong>Variable</strong> <strong>Length Subnet Masks</strong>) Subnetting</td></tr>
</thead>
<tbody>
<tr>
<td>All subnets are <strong>equal in size</strong>.</td><td>Subnets are <strong>variable in size</strong>.</td></tr>
<tr>
<td>All subnets have <strong>equal number of hosts</strong>.</td><td>Subnets have <strong>variable number of hosts.</strong></td></tr>
<tr>
<td>All subnets use <strong>same subnet mask</strong>.</td><td>Subnets use <strong>different subnet masks</strong>.</td></tr>
<tr>
<td>It is <strong>easy</strong> to configuration and administration.</td><td>It is <strong>complex</strong> in configuration and administration.</td></tr>
<tr>
<td>It <strong>wastes a lot of IP</strong> addresses.</td><td>It <strong>wastes minimum IP</strong> addresses.</td></tr>
<tr>
<td>It is also known as <strong>classfull</strong> Subnetting.</td><td>It is also known as <strong>classless Subnetting.</strong></td></tr>
<tr>
<td>It supports both <strong>classfull and classless routing protocols like RIP-2 .</strong></td><td>It supports <strong>only classless routing protocols like OSPF and EIGRP,</strong>.</td></tr>
</tbody>
</table>
</div><h2 id="heading-vlsm-subnetting"><strong>VLSM Subnetting</strong></h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/de694f75-83b4-4556-a11c-ec8621e28bef.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p>In this network: -</p>
<ul>
<li>The development department has 74 computers.</li>
<li>The production department has 52 computers.</li>
<li>The administration department has 28 computers.</li>
<li>Departments are connected via the WAN links.</li>
<li>Each WAN link requires two IP addresses.</li>
<li>The given address space is 192.168.1.0/24.</li>
</ul>
<p><strong>VLSM</strong></p>
<ul>
<li>Assign the <strong>largest</strong> at the start of the address space.</li>
<li>Assign the <strong>second-largest</strong> subnet after it.</li>
<li>Repeat <strong>the process until all subnets have been assigned</strong>.</li>
</ul>
<h2 id="heading-subnetting-question">Subnetting Question</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/30585d9a-e126-4c07-a12f-6b50d227473d.png" alt="CCNA 200-301 Study (1)" /></p>
<p>10.10.13.160/29 
The subnet mask is <strong>255.255.255.248</strong> (block size 8). That subnet covers <strong>10.10.13.160–10.10.13.167</strong> with usable hosts <strong>.161–.166</strong> and <strong>.167</strong> as broadcast.</p>
<p><strong>D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8dce2fb0-e895-4f47-81cd-03eb4c0b5c08.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Netmask: <code>0xffffe000</code> → this hex mask equals <strong>255.255.224.0</strong>, i.e. <strong>/19</strong>.</p>
<p><strong>C ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/408bda42-99d0-4eaf-8f96-f09443b258da.png" alt="CCNA 200-301 Study (1)" /></p>
<p><code>The prefix</code> <strong><code>/32</code></strong> <code>(mask</code> <strong><code>255.255.255.255</code></strong><code>) is a</code> <strong><code>host route</code></strong>—it matches exactly one IP address, here <strong>10.0.1.3</strong>. So that entry represents a route to just that single host,</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c20e16a0-8d84-4162-95c4-b95d7e6eb1fc.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The destination is the IP of <strong>GigabitEthernet0/0/0</strong>, which the table shows as the local route:</p>
<pre><code class="lang-javascript">L <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.3</span>/<span class="hljs-number">32</span> is directly connected, GigabitEthernet0/<span class="hljs-number">0</span>/<span class="hljs-number">0</span>
</code></pre>
<p>Routing uses the <strong>longest prefix match</strong>. Between <code>10.10.10.0/24</code> and <code>10.10.10.3/32</code>The/32 host route is more specific, so it’s the destination route. A /32 corresponds to the subnet mask <strong>255.255.255.255</strong>.
<strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/72407c1d-ed2a-48e8-9ff2-241284a432b9.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The destination IP is <strong>172.16.32.8</strong>. From the routing table, the matching routes are:</p>
<ul>
<li><code>172.16.32.0/26</code></li>
<li><code>172.16.32.0/24</code></li>
<li><code>172.16.32.0/19</code></li>
</ul>
<p>the <strong>/26</strong> network. By <strong>longest-prefix match</strong>, <code>/26</code> is preferred over <code>/24</code> and <code>/19</code></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/665b202c-fa6d-4bed-8d35-5c3c76d15599.png" alt="CCNA 200-301 Study (1)" /></p>
<p><code>255.255.255.252</code> → mask is /30 </p>
<p><code>10.2.1.3 255.255.255.252</code> → mask is /30 (correct), but <strong>.3</strong> in a /30 is the <strong>broadcast</strong> of the block (.0–.3), so <strong>not usable</strong>.</p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/676406ac-261d-49d7-af2f-fd7de240129c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>8 floors × 30–40 users = <strong>about 320 users total</strong>.
All users must be in <strong>one subnet</strong>.
Need a subnet that can support at least <strong>320 usable hosts</strong>.</p>
<p>2^9
<strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/75432a7c-f3c0-46e5-97d0-c831a5e1b216.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Each floor needs ≈ 22–29 hosts → choose <strong>/27</strong> (255.255.255.224), which gives <strong>30 usable</strong> IPs per floor.</p>
<p>Four /27 subnets (4 × 32 addresses) occupy <strong>128 addresses total</strong>, which aggregates perfectly into a <strong>/25</strong> block.</p>
<p><strong>If you have 4 (subnet) × /27</strong></p>
<ul>
<li>4 <strong>(subnet)</strong>× 32 <strong>(block size)</strong> =<strong>128</strong> addresses total</li>
<li>That means the four /27 networks together span <strong>128 consecutive addresses</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/846c1c76-7570-4568-8ef7-79592a38ccf6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The packet is going to: <strong>172.16.3.254</strong></p>
<h3 id="heading-which-network-covers-172163254">Which network covers 172.16.3.254?</h3>
<ul>
<li><strong>172.16.1.33/32</strong> → only 172.16.1.33, does <strong>not</strong> cover 172.16.3.254.</li>
<li><strong>172.16.2.1/32</strong> → only 172.16.2.1, does <strong>not</strong> cover 172.16.3.254.</li>
<li><strong>172.16.2.0/23</strong> → covers <strong>172.16.2.0 – 172.16.3.255</strong>, and <strong>yes</strong>, 172.16.3.254 is inside this range.</li>
</ul>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9428e935-7a11-45ac-bb72-85136d88c02c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7cf5d106-35d2-4754-be80-5104005932f2.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Group needing 24 hosts →/27 (255.255.255.224)</p>
<p>A and D → <strong>255.255.254.0</strong></p>
<ul>
<li><strong>A: 10.70.148.1 /23</strong> → network 10.70.148.0/23, and <strong>.1</strong> is the first usable. ✅</li>
<li><strong>D</strong> misaligns a /23 (159 is odd; /23 networks start on even octets: …148.0, 150.0, 152.0, …, 158.0). ❌</li>
</ul>
<p>Group needing 472 hosts → /23 (255.255.254.0)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bcf5230e-d778-40d8-bad1-46335b8844ad.png" alt="CCNA 200-301 Study (1)" /></p>
<p> D. <code>ip route 10.10.2.1 255.255.255.255 192.168.1.4 100</code>
The administrative distance <strong>100</strong> keeps it preferred over OSPF (110) even if prefix lengths were equal (not needed here, but harmless).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/294f8958-55ae-4d5c-8c26-bd275e5ca6c5.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>10.10.13.0 → 255.255.255.128</strong> ( /25 )</li>
<li><strong>10.10.13.128 → 255.255.255.240</strong> ( /28 )</li>
<li><strong>10.10.13.160 → 255.255.255.248</strong> ( /29 )</li>
<li><strong>10.10.13.252 → 255.255.255.252</strong> ( /30 )</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e3709bd3-d55e-40ce-96d7-7da331480f1f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=-ldJlyf6ONA">bookmark</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=yxcexmct2EU">bookmark</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=rJMb5l30Dg8&amp;list=PL_d87bH2yH6j-t6KppEn6cpsFoVTHlLua&amp;index=13">bookmark</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=ZVzHhd1q9v0">bookmark</a></p>
<h2 id="heading-ip-v6">IP V6</h2>
<h1 id="heading-intro-to-ipv6-address">Intro to IPV6 Address</h1>
<ul>
<li><strong>128-bit</strong> Addresses are written as <strong>32 hexadecimal</strong> digits.</li>
<li>Digits are arranged into <strong>8 groups</strong> of four to improve readability.</li>
<li>Groups are separated by <strong>colons</strong>.</li>
</ul>
<p>Hex:2001:0718:1c01:0016:20d:56ff:fe77:52a3</p>
<h3 id="heading-why-was-hexadecimal-used-in-ipv6"><strong>Why was Hexadecimal used in IPv6?</strong></h3>
<p>to create a large amount of unique IP addresses</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>IPv4</td><td>IPv6</td></tr>
</thead>
<tbody>
<tr>
<td>Total IP addresses 4,294,967,296</td><td>Total IP Addresses:(2^128)</td></tr>
<tr>
<td>32-bit</td><td>128-bit</td></tr>
<tr>
<td>Binary bits are separated by a dot (.)</td><td>Binary bits are separated by a colon(:)</td></tr>
<tr>
<td>Exmple:192.168.1.1</td><td>Example:2001:0718:1c01:0016;020d:56ff:fe77:52a3</td></tr>
<tr>
<td>Five different classes of IP address</td><td>No <strong>Classifications</strong></td></tr>
<tr>
<td>IPV4 supports <strong>broadcast</strong></td><td>IPv6 <strong>doesn’t</strong> support broadcast</td></tr>
<tr>
<td>4 octets</td><td>8 hextet</td></tr>
</tbody>
</table>
</div><h2 id="heading-zero-suppression">Zero Suppression</h2>
<ul>
<li>Zero compression can only be used to compress a single contiguous series of 16-bit blocks expressed in colon hexadecimal notation.</li>
<li>Zero compression can only be used once in a given address.</li>
</ul>
<p>Rules </p>
<ol>
<li>If we have equal or more than <strong>two</strong> groups of <strong>0000</strong> we can change it to<strong>::</strong>   <strong>(The double colon (::) can only be used once within an address, otherwise there would be more than one possible resulting address.)</strong>
Here is an example of the <strong>incorrect</strong> use of the double colon: 2001:db8::abcd::1234.</li>
<li>Change 0000 to 0 only.</li>
<li>Leading zero can be removed.
<strong>01ab</strong> can be represented as <strong>1ab
00ab</strong> can be represented as <strong>ab
0a**</strong>00<strong> can be represented as </strong>a<strong>**00</strong></li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ed8314c0-3673-4c7e-8681-683554508053.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Original</strong>:2041:000:140f:<strong>0000:0000:0000:</strong>875B:131B</p>
<p><strong>short</strong>:2041:<strong>0000</strong>:140F<strong>::</strong>875B:131B</p>
<p><strong>shorter</strong>:2041:<strong>0</strong>:140F::875B:131B</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fdc54e16-4ed9-43d3-9094-3c97b59cb81a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6c76fa28-a463-46aa-b5ec-69bab81c9973.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-ipv6-prefixes">IPV6 Prefixes</h1>
<ul>
<li>The prefix is the part of the address that indicates the bits that have fixed values or are the bits of the subnet prefix.</li>
<li>Prefixes for IPv6 subnets are expressed in the same way as (CIDR) notation for IPv4.</li>
<li>For example, 21DA:D3::/<strong>48</strong> and 21DA:D3:0:2F3b::/<strong>64</strong> are IPv6 address prefixes.</li>
<li><strong>A subnet mask is not used for IPv6; only the prefix length notation is supported.</strong></li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Type</strong></td><td><strong>Prefix</strong></td><td><strong>Scope</strong></td><td><strong>Purpose / Use</strong></td><td><strong>Example</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Global Unicast</strong></td><td><code>2000::/3</code></td><td>Global (Internet)</td><td>Public IPv6 address, routable on the Internet (like IPv4 public addresses).</td><td><code>2001:db8::1</code></td></tr>
<tr>
<td><strong>Unique Local (ULA)</strong></td><td><code>FC00::/7</code> (<code>FDxx::</code>)</td><td>Local (Private)</td><td>Works like private IPv4 (<code>10.x.x.x</code>, <code>192.168.x.x</code>), used in internal networks.</td><td><code>FD12:3456:789A::1</code></td></tr>
<tr>
<td><strong>Link-Local</strong></td><td><code>FE80::/10</code></td><td>Link (single segment)</td><td>Automatically assigned to every interface, used for local comms (neighbor discovery, routing).</td><td><code>FE80::1</code></td></tr>
<tr>
<td><strong>Multicast</strong></td><td><code>FF00::/8</code></td><td>One-to-many</td><td>Packets delivered to multiple devices at once (routing protocols, discovery).</td><td><code>FF02::1</code> (all nodes), <code>FF02::2</code> (all routers)</td></tr>
<tr>
<td><strong>Anycast</strong></td><td>(uses Unicast)</td><td>Nearest (routing-based)</td><td>Same address assigned to multiple devices → traffic goes to closest one.</td><td>Common for DNS servers</td></tr>
<tr>
<td><strong>Loopback</strong></td><td><code>::1/128</code></td><td>Host only</td><td>Used by a host to test itself (like IPv4 <code>127.0.0.1</code>).</td><td><code>::1</code></td></tr>
<tr>
<td><strong>Unspecified</strong></td><td><code>::/128</code></td><td>None</td><td>Represents “no address”, used as source before a device gets an IP.</td><td><code>::</code></td></tr>
<tr>
<td><strong>IPv4-mapped</strong></td><td><code>::FFFF/96</code></td><td>Transition</td><td>Allows IPv6-only nodes to talk to IPv4 nodes.</td><td><code>::FFFF:192.0.2.128</code></td></tr>
</tbody>
</table>
</div><h2 id="heading-ipv6-header">IPv6 Header</h2>
<p>Simpler than IPv4:</p>
<ul>
<li>Fixed 40-byte header.</li>
<li>no checksum → faster processing.</li>
</ul>
<ul>
<li><strong>Loopback IPv6 address:</strong> an IPv6 address used on a loopback interface. the IPv6 loopback address is 0:0:0:0:0:0:0:1 which can be notated as ::1/128.</li>
<li><strong>Unspecified address:</strong> an IPv6 unspecified address is 0:0:0:0:0:0:0:0, which can be notated as :<strong>::/128</strong></li>
</ul>
<h1 id="heading-link-local">Link-Local</h1>
<ul>
<li>IPv6 link-local addresses are equivalent to IPv4 link-local addresses(169.254.0.0/16).</li>
<li>IPv4 link-local addresses are known as automatic private IP addressing (<strong>APIPA</strong>) addresses for computers running the current Microsoft Windows operating system.</li>
<li>A Link-local address is required for Neighbor Discovery(NDP) processes and is always automatically configured, even in the absence of all other unicast addresses.</li>
</ul>
<h1 id="heading-link-localeui-64">Link-local(EUI-64)</h1>
<ul>
<li>used only between nodes connected on the <strong>same local link.</strong></li>
<li>When an <strong>IPv6 stack</strong> is enabled on a node, one link-local address is automatically assigned to each interface of the node at boot time.</li>
<li>IPv6 link-local prefix <strong>FE80::/10</strong> is used, and the interface identifier in Extended Unique Identifier 64 (EUI-65) format is appended as the address's low-order 64-bit.</li>
<li>Link-local addresses ar<strong>e only for</strong> link-local scope and must never be routed between subnets within a site.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/648c2f48-b21c-43cb-8cc0-bdcaa0fd1713.png" alt="CCNA 200-301 Study (1)" /></p>
<p>There's a challenge with creating the second 64 bits from the MAC address, as MAC addresses are only 48 bits long. To solve this, we insert <strong>FFFE</strong> in the middle of the MAC address.</p>
<p><strong>Example Calculation:</strong></p>
<ol>
<li><strong>MAC Address:</strong> <code>AA:BB:CC:DD:EE:FF</code></li>
<li><strong>Split the MAC Address:</strong> <code>AA:BB:CC</code> | <code>DD:EE:FF</code></li>
<li><strong>Insert FFFE:</strong> <code>AA:BB:CC:FF:FE:DD:EE:FF</code></li>
<li><strong>Flip the 7th Bit in AA (10101010 → 10101000)</strong>: <code>A8:BB:CC:FF:FE:DD:EE:FF</code></li>
<li><strong>Final EUI-64 Interface ID:</strong> <code>A8BB:CCFF:FEDD:EEFF</code></li>
</ol>
<pre><code class="lang-javascript">Router <span class="hljs-number">2</span> (config)# interface FastEthernet0/<span class="hljs-number">0</span>
Router <span class="hljs-number">2</span> (config-<span class="hljs-keyword">if</span>)# ipv6 enable
Router <span class="hljs-number">2</span> (config-<span class="hljs-keyword">if</span>)# ipv6 address autoconfig
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d6277af0-2130-4c5d-b961-d080d8d94554.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-loopback-address-1">Loopback address</h1>
<ul>
<li>The loopback address(0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling the node to send a packet to itself.</li>
<li>It is equivalent to the IPv4 loopback address of 127.0.0.1.</li>
<li>Packets addressed to the loopback address must never be sent on a link or forwarded by an IPv6.</li>
</ul>
<h1 id="heading-broadcast">Broadcast</h1>
<p>• <strong>Broadcast</strong> - There are no broadcast addresses in IPv6. Broadcast functionality is implemented using multicast addresses. </p>
<h1 id="heading-anycast-not-very-important">Anycast (not very important)</h1>
<ul>
<li>An Anycast is an address that is assigned to a set of interfaces that typically belong to different nodes. A packet sent to an anycast address is delivered to the closest interface identified by the anycast address.</li>
<li>Assigning a unicast address to more than one interface makes a unicast address an anycast address.</li>
<li>Anycast is a network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receivers, though it may be sent to several nodes, all identified by the same destination address. Example: Used in DNS query.</li>
</ul>
<h1 id="heading-ipv6-transaction">IPv6 Transaction</h1>
<ul>
<li><strong>Dual-stack:</strong> means a device runs <strong>both IPv4 and IPv6</strong> at the same time. This allows networks to support both protocols during the transition from IPv4 to IPv6.</li>
</ul>
<p>In a dual-stack environment, which protocol does a device prefer if both IPv4 and IPv6 are available?</p>
<ul>
<li>IPv6 is preferred if available</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1bf634ef-2bff-475e-90db-84c0c5545fcb.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Tunneling</strong> is a method of <strong>transporting an IPv6 packet over an IPv4 network</strong>. The IPv6 packet is <strong>encapsulated inside an IPv4 packet</strong>, similar to other types of data.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/10c7049b-2577-4b33-b9b7-22f303d3bf40.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Translation: Network Address Translation 64</strong> (<strong>NAT64</strong>) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a <strong>translation technique similar to NAT for IPv4</strong>. <strong>An IPv6 packet is translated to an IPv4 packet, and an IPv4 packet is translated to an IPv6 packet.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c57d7bdd-45f5-4d01-80c9-bb5c3da9d9ce.png" alt="CCNA 200-301 Study (1)" /></p>
<p>What is the most important motivating factor for moving to IPv6?</p>
<ul>
<li><strong>Depletion of IPv4 addresses.</strong></li>
</ul>
<p>What is the default route address of IPv6?</p>
<ul>
<li><strong>::/0</strong></li>
</ul>
<p><strong>Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?</strong></p>
<p><strong>• Hop Limit</strong></p>
<p><strong>What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?</strong></p>
<ul>
<li><strong>2001:DB8:BC15:A</strong></li>
</ul>
<p><strong>SLAAC (Stateless Address Auto Config):</strong></p>
<p>a method used in IPv6 networks that allows devices to automatically configure their IPv6 addresses without the need for a DHCP server</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f593363d-c99a-4f2c-82b5-d329a623d2f4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/28aff14d-07ce-41d4-af6c-7e5bcb4a15fa.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong><code>3ffe:e54d:620a:a87a:f00d</code></strong> is a <strong>Global Unicast Address</strong> because it starts with <code>3</code> , which is part of the <code>2000::/3</code> range for globally routable addresses.</p>
<p>An <strong>Anycast Address</strong> is similar to a unicast address because it is assigned to multiple devices, but traffic sent to this address is delivered to the closest (nearest) device in the group</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e8912ed1-c8c7-454e-8fdd-efd1304339d2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Anycast Address</strong> is <strong>similar to a unicast address</strong> because it is assigned to multiple devices, but traffic sent to this address is delivered to the closest (nearest) device in the group</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cd4c67be-3d06-41bf-9e2d-d50d3d5d9579.png" alt="CCNA 200-301 Study (1)" /></p>
<p> The correct prefix length for the IPv6 address would be <strong>/128</strong> because it refers to one specific host (the router interface).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5f1d9f96-570a-43ae-a5a0-87c14f35eaf6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Take the MAC</strong> of R1’s LAN interface (E0/1 in the figure):</p>
<p><code>13-19-be-67-00-01</code> → in hex bytes: <code>13:19:be:67:00:01</code>. </p>
<p><strong>Split and insert</strong> <strong><code>ff:fe</code></strong></p>
<p>in the middle (that’s how EUI-64 expands 48-bit MAC to 64-bit):</p>
<p><code>13:19:be</code> + <code>ff:fe</code> + <code>67:00:01</code> → <code>13:19:be:ff:fe:67:00:01</code>.</p>
<p><strong>Flip the U/L bit</strong> (the 7th bit) of the <strong>first byte</strong>:</p>
<p>Resulting interface ID bytes: <code>11:19:be:ff:fe:67:00:01</code>.</p>
<p><strong>Group into hextets</strong> (two bytes each):
<code>1119:beff:fe67:0001</code> → <code>1119:beff:fe67:1</code>.</p>
<p><strong>Attach the /64 prefix</strong> for R1’s LAN shown in the diagram:</p>
<p>Prefix = <code>2001:db8:1006:1968::/64</code>.</p>
<p>Final IPv6 address: <strong><code>2001:db8:1006:1968:1119:BEFF:FE67:1</code></strong> → option <strong>B</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1d5b4e30-f4c0-4f22-8067-cc2aaa1f21fa.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A. <code>ipv6 route 2000::1/128 2012::1</code> </p>
<p>   [route loopback through next router IP 2012::1 IP addresses of Se0/0/0 interface]</p>
<p>E. <code>ipv6 route 2000::1/128 2023::3 5</code>
This is a <strong>floating static</strong> backup via Washington (Washington S0/0/0 = <strong>2023::3</strong>) with a higher administrative distance (<strong>5</strong>).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2bbc1750-8438-46b4-88c8-6df101232b43.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 ipv6 route <strong>::/0</strong>  next-hop IPv6 or existing interface.</p>
</blockquote>
<p>Answer: A
On those two routers, the interface that faces New-York is <strong>Serial 0/0/0</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7e96702e-f2c4-4ad9-9c69-c811a10fd2a6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The current default route is <code>ND</code> and the syntax [X/Y] shows the administrative distance (X) and the metric (Y). Therefore, the primary default route, learned via <strong>Neighbor Discovery (ND)</strong>, has an administrative distance of <strong>2</strong>.</p>
<p><code>ipv6 route ::/0 2001:db8:1234:2::1 3</code> Correct [Higher AD for the Backup Route]</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/51f5d231-232c-480d-b5b2-20df9089e44a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Correct: B.</strong> <strong><code>2001:db8:0234:cae3::1/128</code></strong></p>
<ul>
<li>Anycast in IPv6 uses <strong>global unicast addresses</strong> (/128) that are configured on multiple devices.</li>
</ul>
<h2 id="heading-vlan">VLAN</h2>
<h1 id="heading-collision-domain">Collision Domain</h1>
<p>A <strong>collision domain</strong> is a network segment where devices share the same communication medium, and if two devices transmit data at the same time, their signals can <strong>collide</strong>, causing the transmission to fail and requiring retransmission. It happens only in <strong>half-duplex mode.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1f44629d-7622-4883-ac6b-ad9bd48eae97.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, a hub is one collision domain. If one port stops working, all ports stop working.</p>
<h1 id="heading-broadcast-domain">Broadcast Domain</h1>
<p>When a device sends out a broadcast message, all devices present in its broadcast domain must pay attention to it. This creates a lot of congestion in the network, commonly referred to as LAN congestion, which affects the bandwidth available to users within that network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f475e441-0e40-43fb-b11d-111705ead951.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In a switch, each port has a collision domain, without affecting other ports. When one port receives data, it broadcasts it to all other ports  (which means broadcasting a message to all ports and telling them I have received a packet, for which of you?), then, network engineers decided to separate switches into small parts by using VLANs.</p>
<ul>
<li>One broadcast domain for the whole network or only the user network can lead to unnecessary broadcast traffic, which, upon a traffic loop, might cause a complete service outage.</li>
<li>Secondly, but even more important, <strong>large broadcast domains are vulnerable to traffic sniffing and easier man-in-the-middle kind of attacks</strong>.</li>
<li>A lack of VLANs can cause an administrative mess.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>Collision Domain</td><td>Broadcast Domain</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Definition</strong></td><td>A network segment where collisions can occur</td><td>A network segment where broadcasts are forwarded</td></tr>
<tr>
<td><strong>Devices involved</strong></td><td>Hubs, repeaters, old shared Ethernet networks</td><td>Switches (unless VLANs are used), all devices in a VLAN</td></tr>
<tr>
<td><strong>Effect on traffic</strong></td><td>Causes retransmissions due to collisions</td><td>Causes network congestion due to excessive broadcasts</td></tr>
<tr>
<td><strong>Separation method</strong></td><td>Switches (each port is a separate collision domain)</td><td>Routers or VLANs</td></tr>
<tr>
<td><strong>Example devices</strong></td><td>Hub-based networks</td><td>Switch-based networks without VLANs</td></tr>
</tbody>
</table>
</div><p>PC1 --- Hub --- PC2 --- Switch --- PC3</p>
<ul>
<li>Hub side (PC1 + PC2) = <strong>1 collision domain</strong>.</li>
<li>Switch separates PC3 into its <strong>own collision domain</strong>.</li>
<li>So total = <strong>2 collision domains</strong>.</li>
</ul>
<blockquote>
<p>💡 - <strong>Switch increases collision domains</strong> (per port).  </p>
<ul>
<li><strong>Hub shares 1 collision domain</strong> for all.</li>
</ul>
</blockquote>
<ul>
<li><strong>Switch increases collision domains</strong> (per port).</li>
<li><strong>Hub shares 1 collision domain</strong> for all.</li>
</ul>
<h1 id="heading-vlan-1">VLAN</h1>
<p>VLANs(Virtual LANs) are a <strong>logical grouping</strong> of devices in the same broadcast domain. VLANs are usually <strong>configured on switches by placing some interfaces into one broadcast domain and some interfaces into another</strong>. Each VLAN acts as a subgroup of the switch ports in an Ethernet LAN.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e444c02c-e1b5-413d-b5f2-156467a92b8f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Note</strong>: All nodes from VLAN one can’t access the nodes in VLAN two.</p>
<p><strong>Note</strong>: VLAN one (VLAN 1) is allocated for the default VLAN(native VLAN).</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Range</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>VLAN 1:</td><td>This is a default VLAN of switches. You cannot delete or edit this VLAN, but it can be used.</td></tr>
<tr>
<td>VLAN 2-4094:</td><td>It is a normal VLAN range. You can create, edit, and delete it.</td></tr>
</tbody>
</table>
</div><h1 id="heading-advantages-of-using-vlan">Advantages of using VLAN</h1>
<ul>
<li>It solves a <strong>broadcast problem</strong>. By <strong>reducing the size</strong> <strong>of broadcast domains and</strong> <strong>increasing the number</strong> <strong>of Broadcast domains</strong>. (the primary advantage of using VLAN)</li>
<li>VLAN allows you to add an <strong>additional layer of security</strong>.</li>
<li>It can make <strong>device management simple and easier</strong>.</li>
<li>VLAN makes <strong>managing physical devices less complex</strong>.</li>
<li>It lets <strong>you easily segment your network.</strong></li>
<li>Make a single switch into <strong>multiple switches.</strong></li>
</ul>
<h1 id="heading-native-vlan">Native VLAN</h1>
<p>The <strong>native VLAN</strong> is a special VLAN designated on a <strong>trunk port for carrying untagged traffic.</strong></p>
<p>When a switch port is set as a trunk, any incoming Ethernet <strong>frame with</strong><em><strong>out a VLAN tag is assigned to the native VLAN</strong></em><strong>.</strong></p>
<blockquote>
<p>💡 <strong>VLAN Hopping Attacks</strong>: By default, using VLAN 1 as the native VLAN can pose a security risk. A best practice is to configure the native VLAN as an unused or less critical VLAN to prevent potential <strong>VLAN hopping</strong> attacks.</p>
</blockquote>
<p>Which VLANs exist by default on a Cisco switch and cannot be deleted?</p>
<ul>
<li>1, 1002-1005</li>
</ul>
<p># 
Tagged VLANs</p>
<p>Tagged VLANs are a method of <strong>marking Ethernet frames with a VLAN identifier</strong> so that switches and network devices can distinguish between traffic from different VLANs on the same physical link. distinguish between traffic from different</p>
<p>The tagging standard used is <strong>IEEE 802.1Q</strong>.</p>
<p>When traffic is sent over a <strong>trunk port</strong>, each frame includes a <strong>VLAN tag</strong> (a <strong>4-byte field added to the Ethernet frame header</strong>). This tag contains the <strong>VLAN ID</strong>, which specifies which VLAN the frame belongs to.</p>
<p><strong>Trunk ports</strong>  = Tagged ports </p>
<p><strong>Access port</strong> =  Untagged Ports </p>
<h2 id="heading-vlan-configuration">VLAN Configuration</h2>
<pre><code class="lang-javascript">SW1#show vlan
SW1(config)#vlan <span class="hljs-number">10</span> (a number you assigned to the vlan)
SW1(config-vlan)# name sales (your vlan name)
SW1(config-vlan)#exit

SW1(config)# int fa0/<span class="hljs-number">3</span> (<span class="hljs-keyword">switch</span> port that connected to the computer)
SW1(config)#switchport mode access(it means the port is not available on vlan1 and gets out <span class="hljs-keyword">from</span> public accessing (valn1) and should be accessed by a VLAN I will assign to it.) 
SW1(config)#switchport access vlan <span class="hljs-number">10</span> ( your vlan number)
SW1(config)#end
</code></pre>
<p>Note: if you have multiple switches, the same configuration should be applied to all of them.</p>
<p><strong>VLAN 3 is not yet configured on your switch. What happens if you set the switchport access VLAN 3 command interface configuration mode?</strong></p>
<p>The command is accepted, and the respective VLAN is added to vlan.dat.</p>
<h3 id="heading-how-do-you-see-all-vlans-created-and-ports-assigned-to-the-specific-vlan">How do you see all VLANs created and ports assigned to the specific VLAN?</h3>
<pre><code class="lang-javascript">SW1#show vlan
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/51543ad7-8ba6-42fe-ac4e-df79e027160a.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-remove-a-port-from-a-vlan-sefos"><strong>Remove a Port From a VLAN (SEFOS)</strong></h2>
<pre><code class="lang-javascript"><span class="hljs-keyword">switch</span>(config)# interface gigabitethernet <span class="hljs-number">0</span>/<span class="hljs-number">2</span>
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)#no switchport access vlan [number]
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<h2 id="heading-how-to-remove-vlans">How to remove VLANs</h2>
<pre><code class="lang-javascript">SW1(config)#no vlan <span class="hljs-number">10</span>(vlan number you want to <span class="hljs-keyword">delete</span> it).
</code></pre>
<h1 id="heading-trunk">Trunk</h1>
<p>A <strong>trunk</strong> is a <strong>network link that carries multiple VLANs</strong> between devices, such as between switches, routers, or other network devices. It allows the transmission of traffic for more than one VLAN over a single physical link, reducing the number of physical connections required.</p>
<p><strong>Encapsulation Types</strong></p>
<p>802.1 IEEE can be used on all vendor devices. </p>
<p>ISL →previously used by Cisco, not usable today.</p>
<ul>
<li><strong>Access Port</strong>: A port that can be assigned to a single VLAN. This type of interface is configured on switch ports that are connected to end devices, such as workstations or printers.</li>
<li><p><strong>Trunk Port:</strong> A port that is connected to another switch. This type of interface can carry traffic of multiple VLANs.</p>
<p>  <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ba3af2cc-0a25-4167-89c2-342f14006c89.jpeg" alt="CCNA 200-301 Study (1)" /></p>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/15463c2c-5cfe-4da9-b1a2-a574fe8d2c9d.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-f#">Swith1(config)#interface fa0/0
Swith1(config-if)switchport mode trunk
Swith1(config-if)#switchport trunk allowed vlan (Vlan ID or range).
Swith1(config-if)#swithport nonegotiaite
</code></pre>
<h1 id="heading-dynamic-trunking-protocol">Dynamic Trunking  Protocol</h1>
<ul>
<li><strong>Dynamic Trunking Protocol</strong> is a Cisco proprietary protocol used for negotiating a trunk link between two switches, as well as the encapsulation type. It is a layer 2 protocol and is enabled by default.</li>
<li>S<strong>witchport mode dynamic auto:</strong> This is a default mode on the older CISCO switches. This mode makes the interface able to convert to a trunk link. The interface will become a trunk link if the neighboring interface is set to trunk or desirable mode. If both switches’ interface mode is auto, then the trunk will not be formed.</li>
<li><strong>Switchport mode dynamic desirable:</strong> the interface will actively attempt to convert the link into a trunk link. The interface will become a trunk link port if the neighbouring interface is set to trunk. desirable or auto.</li>
<li><strong>Switchport nonegotiate (</strong>very usable technique)<strong>:</strong> This mode prevents the interface from generating DTP frames. This command is used only when the switch port mode is accessed or turned on. You must manually configure the neighboring interface as a trunk interface to establish a trunk link.</li>
</ul>
<h1 id="heading-router-on-a-stick-one-armed-router">Router on a stick (one-armed router)</h1>
<p>A router on a stick is one method for allowing routing between VLANs. That kind of setup consists of a router and a switch connected through one Ethernet link configured as an 802.1q trunk link. Such a configuration is typical in networks where no layer-3 switch exists.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2c361de1-7453-43bf-935d-b5c754d61c50.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config-<span class="hljs-keyword">if</span>)# int fa0/<span class="hljs-number">0.10</span> (we should create <span class="hljs-number">2</span> sub interfaces to each VLAN)
Router(config-subif)#encapuslation dot1q <span class="hljs-number">10</span> (VLAN ID)
Router(config-subif)#ip address <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.55</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> (Assign an IP address <span class="hljs-keyword">from</span> vlan <span class="hljs-number">10</span> to the sub-interface) 
------------second sub-interface -------------
Router(config-<span class="hljs-keyword">if</span>)# int fa0/<span class="hljs-number">0.20</span> 
Router(config-subif)#encapuslation dot1q <span class="hljs-number">10</span>
Router(config-subif)#ip address <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.55</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
</code></pre>
<p>Use the same command to create a sub-interface to the  second VLAN, then write the command no shutdown </p>
<blockquote>
<p>💡 The subinterface number <strong>does not</strong> have to match the VLAN Number. However, it is <strong>highly recommended</strong> that they do match, to make it easier to understand.</p>
<p>💡 The gateway of all devices in VLAN 10 should be the IP address assigned to the sub-interface. </p>
<p>💡 The switch port connected to the router in the switch should be changed to a trunk.</p>
</blockquote>
<h1 id="heading-vlan-troubleshooting-commands">VLAN Troubleshooting Commands</h1>
<p>| show vlan
show vlan brief                                         | Lists each VLAN and all interfaces assigned to that VLAN (but
does not include operational trunks)                                                   |
| ----------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- |
| show vlan id num                                                  | Lists both access and trunk ports in the VLAN                                                                                                        |
| show interfaces switchport
show interfaces type number
switchport | Identifies the interface’s access VLAN and voice VLAN, the
configured and operational mode (access or trunk), and the state
of the port (up or down) |
| show interface status                                             | Summarizes the status listing for all interfaces (connected, notconnect,
err-disabled), the VLAN, duplex, speed, and type of port                    |</p>
<p>Which interfaces are shown in the output of "show vlan brief"?</p>
<ul>
<li><strong>Access Ports</strong></li>
</ul>
<h2 id="heading-trunking-troubleshooting">Trunking Troubleshooting</h2>
<p><strong>Step 1:</strong> Identify all access interfaces and their assigned access VLANs, and reassign them into the
correct VLANs, as needed.</p>
<p><strong>Step 2:</strong> Determine whether the VLANs exist and are active on each switch. If needed, configure
and activate the VLANs to resolve problems.</p>
<p><strong>Step 3:</strong> Check the allowed VLAN lists on the switches on both ends of the trunk and ensure
that the lists of allowed VLANs are the same.</p>
<p><strong>Step 4:</strong> Ensure that, for any links that should use trunking, one switch does not think it is
trunking, while the other switch does not think it is trunking.</p>
<h1 id="heading-vlan-trunking-protocolvtp">VLAN Trunking Protocol(VTP)</h1>
<ul>
<li>The purpose of VTP is to provide a way to manage Cisco switches as a single group for VLAN configuration purposes. For example, if VTP is enabled on Cisco switches, the creation of a new VLAN on one switch makes that VLAN available to all switches within the <strong>same VTP management domain**</strong>.** A switch can be part of only one VTP management domain at a time, and is part of no VTP management domain by default.</li>
</ul>
<p>To show VTP details </p>
<pre><code class="lang-javascript">Router#show vtp status
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2f1b4dc5-82be-477c-ba00-ed8d3af50e92.png" alt="CCNA 200-301 Study (1)" /></p>
<p>VTP Operating Type: type of VTP.</p>
<h3 id="heading-how-to-set-the-vtp-domain">How to set the VTP domain</h3>
<pre><code class="lang-javascript">Router(config)#vtp domain your-domain-name
</code></pre>
<h3 id="heading-vtp-operating-type">VTP Operating Type:</h3>
<p><strong>Server</strong>: Receives and sends configuration from neighbouring switches. </p>
<p><strong>Client</strong>: We only receive VLANs from the server switch and can’t create any VLAN with this mode.</p>
<p><strong>Transparent</strong>: does not synchronize VLAN configuration information with other switches.</p>
<pre><code class="lang-javascript">Router(config)#vtp mode your-mode
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b53bcd62-72d9-4ce8-8485-2daf26b522d0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C. configure ports in a black hole VLAN</strong></p>
<p>Because assigning unused ports to a blackhole VLAN ensures they are isolated, secure, and cannot be exploited if someone plugs into them.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/094c9731-35ed-4fc2-b2f6-db77af50d347.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/714e7b07-5dd4-4062-906c-03d9a210f8e5.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>C</strong> → isolate unused ports in a dedicated, unused VLAN (blackhole VLAN).</li>
<li><strong>D</strong> → shut them down so no traffic pass</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/64f11d35-681e-450b-9a60-9539bcf373b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5c78d266-84e5-4856-b3e4-8796b7089cab.png" alt="CCNA 200-301 Study (1)" /></p>
<p>B and C</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ea48ec8a-4e34-478e-9a93-7a5a1be5b90e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Answer: C</strong> — The router will not accept the addressing scheme.</p>
<p>In the diagram, Router1 has two physical interfaces in the same IP subnet (192.168.1.0/24).
Cisco IOS <strong>does not allow</strong> assigning the same subnet to two different routed interfaces</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b38a7ee9-eb09-4561-83ee-d12a94fa7d5d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Answer: A</strong> — VLAN 1 (On Cisco switches, the <strong>default VLAN</strong> is always <strong>VLAN 1)</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/316c4d05-a03f-43b9-be91-060f75b08827.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B. It sends the traffic to VLAN 100.</strong>
Frames in the native VLAN are sent untagged on an 802.1Q trunk.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0196e2d3-6790-40ad-b99f-6416c3752f66.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Correct Answer: B (</strong>When a PC sends <strong>untagged traffic</strong> to the IP phone, the phone simply <strong>forwards it unchanged (still untagged)</strong> toward the switch.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/85e6c31f-75e9-44a3-ad04-379080dd0f66.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B.</strong> The phone uses <strong>VLAN 50</strong>, while the attached PC uses <strong>VLAN 1</strong>.</p>
<p><code>switchport voice vlan 50</code> tells the switch to expect <strong>tagged voice traffic</strong> from the Cisco IP phone on VLAN 50. PC traffic arriving via the phone is <strong>untagged</strong> and is placed into the port’s <strong>access VLAN</strong>—which, since none is configured, defaults to <strong>VLAN 1</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/72d7ec44-bc7a-4f72-95f3-0364d42e128a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C and E</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8ef5c921-9e2e-46a8-a73d-1ad7e472e149.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A and C</strong></p>
<h2 id="heading-vlan-lab">VLAN Lab</h2>
<p>In this scenario, we will configure VLANs on switches across multiple locations. We'll use trunking to allow devices in the same VLAN to connect, even when they're in different locations. Also providing routing between VLAN 10 and VLAN 30 through the Router on Stick technique.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/87b0d255-7c8c-416d-a2fd-c1afba782812.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-north-branch-switch"><strong>North Branch Switch</strong></h1>
<p><strong>Creating VLAN 10</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW(config)#vlan <span class="hljs-number">10</span> 
Branch-SW(config-vlan)#name support 
Branch-SW(config-vlan)#exit
Branch-SW(config)#<span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">range</span> <span class="hljs-title">e0</span>/0-1 
<span class="hljs-title">Branch</span>-<span class="hljs-title">SW</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>-<span class="hljs-title">range</span>)#<span class="hljs-title">switchport</span> <span class="hljs-title">mode</span> <span class="hljs-title">access</span>
<span class="hljs-title">Branch</span>-<span class="hljs-title">SW</span>(<span class="hljs-title">config</span>-<span class="hljs-title">if</span>-<span class="hljs-title">range</span>)#<span class="hljs-title">switchport</span> <span class="hljs-title">access</span> <span class="hljs-title">vlan</span> 10</span>
</code></pre>
<p><strong>Creating VLAN 20</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW(config)#vlan <span class="hljs-number">20</span> 
Branch-SW(config-vlan)#name marketing
Branch-SW(config-vlan)#exit
Branch-SW(config)#<span class="hljs-keyword">int</span> e <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport mode  access
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport access vlan <span class="hljs-number">20</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#exit
Branch-SW(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">3</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport mode access
Branch-SW(config-<span class="hljs-keyword">if</span>)#switchport access vlan <span class="hljs-number">20</span>
Branch-SW(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<h3 id="heading-verifying-created-vlans">Verifying Created VLANs</h3>
<pre><code class="lang-java">Branch-SW#show vlan brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/25515edd-dfca-4114-bc23-43ee0fe20f60.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-south-branch-switch"><strong>South Branch Switch</strong></h1>
<p><strong>Creating VLAN 30</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW-South(config)#vlan <span class="hljs-number">30</span>
Branch-SW-South(config-vlan)#name sales 
Branch-SW-South(config-vlan)#exit
Branch-SW-South(config)#<span class="hljs-keyword">int</span> range e0/<span class="hljs-number">1</span>-<span class="hljs-number">2</span>
Branch-SW-South(config-<span class="hljs-keyword">if</span>-range)#switchport mode access
Branch-SW-South(config-<span class="hljs-keyword">if</span>-range)#switchport access vlan <span class="hljs-number">30</span>
Branch-SW-South#wr
</code></pre>
<p><strong>Creating VLAN 10</strong></p>
<pre><code class="lang-java">Branch-SW#conf t
Branch-SW-South(config)#vlan <span class="hljs-number">10</span>
Branch-SW-South(config-vlan)#name support 
Branch-SW-South(config)#vlan <span class="hljs-number">99</span> <span class="hljs-comment">//this vlan for native vlan, we use it in the trunking step</span>
Branch-SW-South(config-vlan)#name managment <span class="hljs-comment">//this vlan for native vlan</span>
Branch-SW-South(config-vlan)#exit
Branch-SW-South(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">3</span>
Branch-SW-South(config-<span class="hljs-keyword">if</span>-range)#switchport mode access
Branch-SW-South(config-<span class="hljs-keyword">if</span>)#switchport access vlan <span class="hljs-number">10</span>
Branch-SW-South#wr
</code></pre>
<h3 id="heading-verifying-created-vlans-1">Verifying Created VLANs</h3>
<pre><code class="lang-java">Branch-SW-South#show vlan brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1fd13c1e-abb9-45f3-8efc-4e96de870720.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-trunk-port-configuration">Trunk Port Configuration</h1>
<h3 id="heading-north-switch">North Switch</h3>
<pre><code class="lang-java">Branch-SW-North(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">2</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk  allowed vlan <span class="hljs-number">10</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span> (<span class="hljs-keyword">for</span> security reason change the <span class="hljs-keyword">native</span> vlan to <span class="hljs-number">99</span>)
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport nonegotiate 
Branch-SW-North#wr
</code></pre>
<h3 id="heading-verify-trunk">Verify Trunk</h3>
<pre><code class="lang-java">Branch-SW-North(config)#<span class="hljs-keyword">do</span> show interfaces trunk 
Branch-SW-North(config)#<span class="hljs-keyword">do</span> show <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">ethernet</span> 0/2 <span class="hljs-title">switchport</span></span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/84c59e81-f828-49be-8e4c-6aacacbef936.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9ac9a672-5b47-42a2-8a4b-844d4c382050.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-core-switch">Core Switch</h3>
<pre><code class="lang-java">Core-SW(config)#vlan <span class="hljs-number">99</span>
Core-SW(config-vlan)#name managment
Core-SW(config-vlan)#vlan <span class="hljs-number">9910</span>
Core-SW(config-vlan)#support
Core-SW(config-vlan)#<span class="hljs-number">20</span>
Core-SW(config-vlan)#name sales
Core-SW(config)#<span class="hljs-keyword">int</span> range ethernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>-<span class="hljs-number">3</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk allowed vlan <span class="hljs-number">10</span>,<span class="hljs-number">30</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport nonegotiate 

Core-SW#wr
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0274658a-7389-49b7-8ee5-364da8a9710c.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-south-switch">South Switch</h3>
<pre><code class="lang-java">Branch-SW-North(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">0</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport nonegotiate 
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunkin  allowed vlan <span class="hljs-number">10</span>
Branch-SW-North(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span> (<span class="hljs-keyword">for</span> security reason change the <span class="hljs-keyword">native</span> vlan to <span class="hljs-number">99</span>)
Branch-SW-North#wr
</code></pre>
<h3 id="heading-finally-we-have-access-between-the-same-vlan-on-different-locations">Finally, we have access between the same VLAN on different locations</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5a0ff121-60c8-4ef1-b7ea-809fd813e418.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-router-on-stick">Router On Stick</h1>
<p>To establish routing between VLANs, we configure a router using a technique called "Router on a Stick." </p>
<h3 id="heading-configuring-the-trunk-on-the-switch-port-connected-to-the-router">Configuring the Trunk on the Switch Port Connected to the Router</h3>
<pre><code class="lang-java">Core-SW(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">2</span>
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
Core-SW(config-<span class="hljs-keyword">if</span>)#switchport trunk <span class="hljs-keyword">native</span> vlan <span class="hljs-number">99</span>
Core-SW(config-<span class="hljs-keyword">if</span>)# switchport trunk allowed vlan <span class="hljs-number">10</span>,<span class="hljs-number">30</span>
</code></pre>
<h3 id="heading-configure-the-router-to-establish-routing-between">Configure the Router to establish routing between</h3>
<pre><code class="lang-java">router(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
router(config-<span class="hljs-keyword">if</span>)#<span class="hljs-keyword">int</span> fa0/<span class="hljs-number">0.10</span>
router(config-subif)#ip address <span class="hljs-number">172.17</span>.<span class="hljs-number">10.55</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span>
router(config-subif)#<span class="hljs-function">exit
<span class="hljs-title">router</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">router</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#<span class="hljs-keyword">int</span> fa0/0.30
<span class="hljs-title">router</span><span class="hljs-params">(config-subif)</span>#encapsulation dot1Q 30
<span class="hljs-title">router</span><span class="hljs-params">(config-subif)</span>#ip address 172.17.30.55 255.255.255.0 
<span class="hljs-title">router</span><span class="hljs-params">(config-subif)</span>#exit
<span class="hljs-title">router</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b44d5c23-2e9c-4c19-9503-298d55c8f4de.png" alt="CCNA 200-301 Study (1)" /></p>
<p>We have now successfully established connectivity between two distinct VLANs.</p>
<h2 id="heading-spanning-tree-protocol-stp">Spanning Tree Protocol (STP)</h2>
<h1 id="heading-what-is-stp">What is STP</h1>
<p><strong>Spanning Tree Protocol</strong> (STP) is a <strong>Layer 2 network protocol</strong> that prevents loops in networks with redundant links. It logically <strong>blocks physical loops</strong> in a Layer 2 network by placing redundant ports in a blocking state, essentially disabling the interface.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/23c871cf-2912-4bd0-9d3c-6caa1d7d8c10.gif" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Interfaces in a <strong>forwarding state</strong> behave normally, they send and receive all normal traffic.</li>
<li>Interfaces act as backups that can enter a forwarding state if an active interface fails.</li>
<li>Interfaces in a <strong>blocking state</strong> only send and receive  STP messages (Called <strong>BPDUs</strong>= <strong>B</strong>ridge <strong>P</strong>rotocol <strong>D</strong>ata <strong>U</strong>nits)</li>
<li>By selecting which ports are forwarding and which ports are blocking, STP creates a single path to/from each point in the network.</li>
<li>There is a set of processes that STP uses to determine which port should be <strong>forwarding</strong> and which should be <strong>blocking.</strong></li>
<li>STP-enabled switches send/receive <strong>Hello BPDUs</strong> out of all interfaces; the default timer is <strong>2 seconds.</strong></li>
<li>If a switch receives a <strong>Hello BPDU</strong> on an interface, it knows that the interface is connected to another switch (routers, PCs, etc, do not use STP, so they do not send Hello BPDUs)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fba020cb-1c00-439b-86f7-80cba3ad5f07.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Bridge Priority Data Unit(BPDU)</strong>: It contains the <strong>Bridge ID</strong>, the Sender’s bridge ID cost to the root bridge, and the Timer values on the root bridge.</p>
<p>All switches exchange BPDU in order to elect the root bridge. The switch with the <strong>lowest bridge ID</strong>, is elected as the <strong>root Bridge.</strong> </p>
<p><strong>Bridge ID:</strong> an <strong>8-byte field</strong> that combines the <strong>bridge priority (2 bytes)</strong> and <strong>Base Mac address(6 bytes) of a device</strong>. If there is a tie on bridge priority, then the base MAC address is considered.</p>
<p><strong>Bridge Priority:</strong> The default priority value for all Cisco Switches is the decimal value <strong>32768</strong>.</p>
<p><strong>Root Bridge: T</strong>he root bridge is the bridge with <strong>the lowest Bridge ID.</strong> All decisions, like which port is the root port (The port with the best path to the root bridge), are made from the perspective of the root bridge.</p>
<p><strong>Path Cost:</strong> A switch may encounter one or more switches in the path to the root bridge. All the paths analyzed and the <strong>path with the lowest cost will be selected.</strong> </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Speed</td><td>Link Cost</td></tr>
</thead>
<tbody>
<tr>
<td><strong>100 Mbps</strong></td><td><strong>19</strong></td></tr>
<tr>
<td><strong>10 Mbps</strong></td><td><strong>100</strong></td></tr>
<tr>
<td><strong>100 Gbps</strong></td><td>2</td></tr>
<tr>
<td><strong>1 Gbps</strong></td><td>4</td></tr>
</tbody>
</table>
</div><h2 id="heading-stp-ports">STP Ports</h2>
<ul>
<li><strong>Root Port(RP)</strong>: The port on a <strong>non-root switch</strong> that has the shortest path to the root bridge. It forwards traffic to the <strong>root bridge</strong>.</li>
<li><strong>Designated Port:</strong>  The designated port forwards traffic from a segment to the root bridge. All STP-enabled switches have one or more designated ports.</li>
</ul>
<blockquote>
<p>💡 <strong>Note:</strong> The root bridge only has designated ports.</p>
</blockquote>
<h2 id="heading-steps-to-a-loop-free-topology">Steps to a Loop-Free Topology</h2>
<p>1-<strong>Selecting Root Bridge</strong>: When two switches are configured with the <strong>same priority and have the same extended system ID</strong>, the switch having <strong>the mac address with the lowest value</strong>, will have the <strong>Lower BID</strong>(Bridge ID) selected as the root bridge and no port of the switch blocked.</p>
<p>2-<strong>Select Designated Ports</strong>: All ports from <strong>the root bridge</strong> are called designated ports.</p>
<p>3-<strong>Select Root port:</strong></p>
<ul>
<li><strong>Lowest root cost</strong></li>
<li><strong>Lowest neighbor bridge ID</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d100ab3b-5ff5-4124-907f-2e8472c02977.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Switch 2 was selected as a root bridge, Switch 3 has the same cost from both sides, and which neighbour has the lowest Bridge ID will be selected as the root port in this diagram. SW1 has a lower Bridge ID.</p>
<ul>
<li><strong>Lowest neighbor pot ID</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9dc036c5-88e5-4c4a-8ca5-84ca61d3a72f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>STP Port ID</strong> = <strong>Port priority(default</strong> <strong>128**</strong>) + port number.**
for example: Gi0/0 lower than Gi 0/1</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/53fccdf4-4181-4ef4-9685-f1df5b56c701.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Switch 3 has two connections with SW1 and a lower port ID will selected as a root port G0/1 lower than G0/2.</p>
<blockquote>
<p>💡 The neighbor switch's port ID is used to determine the tie, not the local switch's port ID.</p>
</blockquote>
<p>4-<strong>Bock Port:</strong> After the root bridge is selected,  one of the remaining switches with a high Mac address value should block one of the ports.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5fc3908e-5c56-4452-9fc1-c81e1a492df5.png" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>Low Bridge ID selected, and SW3 is a root bridge.</li>
<li>If SW2 has multiple paths with the same cost, the path through the <strong>neighbor with the lowest Bridge ID</strong> is selected.</li>
<li>We have two connections between SW1 and SW2 <strong>Lowest neighbor port ID</strong> will be selected G0/0 smaller than G0/2.</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11b88be8-91b9-4202-a61e-75cdf61567e3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: Blocking port depends on the <strong>cost;</strong> for the best path to the root bridge, the cost should be low. cost can be determined by the type of cables connected to the switches  </p>
<p>The cost of switch number 2 (S2) to the root bridge through S1 = <strong>38.</strong></p>
<p>But directly from S2 to the root bridge is <strong>19,</strong> therefore, the Line between S1 to S2 is <strong>blocked</strong>. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0ea069c9-c16c-4884-b5b3-0eec41a57097.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 Root/Designated ports remain <strong>stable in the Forwarding</strong> state.<br />Non-designated ports remain <strong>stable in the Blocking state</strong>.</p>
</blockquote>
<p>    Non-designated ports remain <strong>stable in the Blocking state</strong>. </p>
<h2 id="heading-how-do-you-know-which-switch-is-a-root-bridge">How do you know which switch is a root bridge?</h2>
<pre><code class="lang-javascript">Switch#show spanning-tree
</code></pre>
<p>After writing this command, if the switch is selected as the root bridge in the Root ID shows this message: “ This is the root bridge“</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6a480358-ad7a-4c1c-94c4-7bfa595f6548.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Also, the bridge root ports have the same role as designated ports.</p>
<h3 id="heading-using-the-same-command-on-the-switch-one-of-the-ports-has-been-blocked">Using the same command on the switch, one of the ports has been blocked.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9f17b083-c7a8-47fb-b1ef-152d5f59a402.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-spanning-tree-timers">Spanning Tree Timers</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>STP Timer</td><td>Purpose</td><td>Duration</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Hello</strong></td><td>How often Root Bridge sends hello BPDUs</td><td>2Sec</td></tr>
<tr>
<td><strong>Forward Delay</strong></td><td>How long the switch will stay in the listening and learning state(each state 15 seconds = total 30 seconds)</td><td>30Sec</td></tr>
<tr>
<td><strong>Max Age</strong></td><td>How long an interface will wait after ceasing to receive Hello BPDUs to change the STP topology.</td><td>20Sec</td></tr>
</tbody>
</table>
</div><h1 id="heading-port-fast-and-bpdu-guard">Port Fast and BPDU guard</h1>
<ul>
<li><strong>PortFast</strong> is a Cisco Feature for PVST+ environments. When a switch port is configured with port fast, that port transitions from <strong>blocking</strong> to the <strong>forwarding</strong> state <strong>immediately</strong>, <strong>bypassing</strong> the usual <strong>802.1D</strong> STP transition states(the <strong>Listening</strong> and <strong>learning</strong> state).</li>
</ul>
<blockquote>
<p>⚠️ If used, it must be <u><strong>enabled only on ports connected to end hosts</strong></u>.<br />If enabled on a port connected to another switch, it could cause a layer 2 loop.</p>
</blockquote>
<h2 id="heading-port-fast-configuration">Port Fast Configuration</h2>
<p>Enable Port Fast per Interface </p>
<pre><code class="lang-javascript">s1(config)# interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s1(config-<span class="hljs-keyword">if</span>)# spanning-tree portfast
</code></pre>
<p>Disable port fast on an interface</p>
<pre><code class="lang-javascript">s1(config)# interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s1(config-<span class="hljs-keyword">if</span>)# spanning-tree portfast disable
</code></pre>
<p>Enable port fast on all access ports (not trunk ports) </p>
<pre><code class="lang-javascript">s1(config)# spanning-tree portfast <span class="hljs-keyword">default</span>
</code></pre>
<p>Portfast is a great feature for getting a switch port connected to an end host like a PC  running quickly without having to wait for 30 seconds.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a3cd2720-1d4b-47c0-8891-3f2e517375e2.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When plugging the cable into the switch port, we should wait for 30 Seconds for the listening and learning state (orange light). After that, the switch could forward data from the mentioned port.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/552b0ea5-3af0-461a-9a74-027917f0637c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After enabling portfast on the switch port, when the cable is plugged in, the switch immediately starts forwarding (Indicated by a Green Light) and ignores the listening and learning states.</p>
<h3 id="heading-bpdu-guard">BPDU Guard</h3>
<ul>
<li><strong>BPDU Guard:</strong> This is a feature used to <strong>protect the Layer 2 Spanning Tree Protocol (STP) topology</strong> from <strong>BPDU-related attacks.</strong> When a BPDU Guard-enabled port receives a BPDU from the connected device, BPDU Guard disables the port and puts it into the <strong><code>errdisable</code></strong> state.</li>
</ul>
<blockquote>
<p>For example, if PortFast is enabled on interface G0/3 for end-user devices, and an end-user mistakenly connects a switch to that port instead of a PC, <strong>BPDU Guard</strong> will protect the STP topology by automatically disabling the port upon receiving BPDUs.</p>
</blockquote>
<p><strong>BPDU Guard should be configured on:</strong></p>
<ul>
<li><strong>Access ports</strong> connecting to end devices (workstations, printers, etc.).</li>
<li>Ports connecting to <strong>servers or virtualization hosts</strong> that do not participate in the STP topology.</li>
</ul>
<blockquote>
<p>⚠️ When used alongside PortFast, BPDU Guard ensures that an access port remains stable and does not inadvertently participate in the spanning tree, preventing potential topology changes.  </p>
<ul>
<li><p>BPDU Guard protects the network from unauthorized switches being connected and participating in STP.  </p>
</li>
<li><p>It can be configured separately from <strong>PortFast</strong>, but they are typically used together on edge/access ports.  </p>
</li>
<li><p><strong>BPDU Guard-enabled ports do not send BPDUs</strong>. If a BPDU is <strong>received</strong>, the port is placed in <strong><code>error-disabled</code></strong> state.</p>
</li>
</ul>
</blockquote>
<ul>
<li>BPDU Guard protects the network from unauthorized switches being connected and participating in STP.</li>
<li>It can be configured separately from <strong>PortFast</strong>, but they are typically used together on edge/access ports.</li>
<li><strong>BPDU Guard-enabled ports do not send BPDUs</strong>. If a BPDU is <strong>received</strong>, the port is placed in <strong><code>error-disabled</code></strong> state.</li>
</ul>
<p>Enable BPDU Guard Per Interface</p>
<pre><code class="lang-javascript">s2(config)# interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s2(config-<span class="hljs-keyword">if</span>)# spanning-tree bpduguard enable
s2(config-<span class="hljs-keyword">if</span>)# end
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8f90938d-b90d-4f0b-9183-6b65a62ae92e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Enable BPDU Guard on all portfast interfaces</p>
<pre><code class="lang-javascript">s2(config)# spanning-tree porfast bpduguard <span class="hljs-keyword">default</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8570f850-68c9-4d39-bc9e-adba1ca12313.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-recovery-from-bpdu-guard">Recovery from BPDU Guard:</h2>
<h3 id="heading-manually-recovery">Manually Recovery</h3>
<p>If a port is <strong><code>errdisable</code></strong>Due to BPDU Guard, it can be recovered <strong>manually</strong> or <strong>automatically</strong> by using the following command </p>
<pre><code class="lang-javascript">s2(config)#interface FastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
s2(config-<span class="hljs-keyword">if</span>)#shutdown 
s2(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h3 id="heading-automatically-recovery">Automatically Recovery</h3>
<pre><code class="lang-javascript">s2#show errdisble recovery
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e6019d89-6f33-461e-b136-4889285bde60.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">s2(config)#errdisable recovery cause bpdugurad 
s2(config)#<span class="hljs-keyword">do</span> show errdisable recovery
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6bbb037e-036c-4bb0-bea9-ba3b7e3f2cf8.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>⚠️ If you didn’t solve the problem and the port is still connected to the switch and receives BPDU messages, the port will be disabled again. </p>
<p>💡 Best practice:  </p>
<ul>
<li><p>Use <strong>PortFast + BPDU Guard</strong> on <strong>all access ports</strong>.  </p>
</li>
<li><p>Never enable on trunk ports.</p>
</li>
</ul>
</blockquote>
<ul>
<li>Use <strong>PortFast + BPDU Guard</strong> on <strong>all access ports</strong>.</li>
<li>Never enable on trunk ports.</li>
</ul>
<h2 id="heading-bpdu-filter">BPDU Filter</h2>
<p>Prevent a port from <strong>sending BPDU</strong> messages </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f4283398-bc7e-430d-a318-3680292eed93.png" alt="CCNA 200-301 Study (1)" /></p>
<p>If the port doesn't connect to a switch, sending BPDUs is unnecessary and undesirable for a couple of reasons: </p>
<ol>
<li>Sending BPDUs uses some <strong>bandwidth</strong> and <strong>processing power</strong> on the switch.</li>
<li>BPDUs contain information <strong>about the LAN’s STP topology</strong>. (You should avoid sending this information to end users)</li>
</ol>
<p><strong>BPDU Filter</strong> solves this by preventing the port from sending BPDUs.</p>
<p>Enable BPDU Filter Per Interface</p>
<pre><code class="lang-javascript">s2(config-<span class="hljs-keyword">if</span>)# spanning-tree bpdufilter enable
</code></pre>
<ul>
<li>The port will not send BPDUs.</li>
<li>The port will ignore any BPDUs it receives.</li>
<li><strong>In effect, this disables STP on the port. Use with caution</strong></li>
</ul>
<p>Enable BPDU Filter on all interfaces (Global Mode) </p>
<pre><code class="lang-javascript">s2(config)# spanning-tree portfast bpdufilter <span class="hljs-keyword">default</span>
</code></pre>
<ul>
<li>BPDU filter will be activated on <u><strong>all portfast-enabled ports.</strong></u></li>
<li>The port will not send BPDU packets.</li>
</ul>
<p><strong>Disable</strong> BPDU filter per port</p>
<pre><code class="lang-javascript">s2(config-<span class="hljs-keyword">if</span>)# spanning-tree bpdufilter disable
</code></pre>
<blockquote>
<p>💡 Enable PBDU filter by default (Global Config Mode). This is highly recommended </p>
</blockquote>
<p>BPDU Guard and BPDU Filter can be enabled on the same port at the same time. </p>
<ul>
<li>If BPDU Filter is enabled in <u><strong>global config mode</strong></u> and the port receives BPDU:</li>
<li><strong>BPDU filter</strong> will be <strong>disabled</strong>.</li>
<li><strong>BPDU Guard</strong> will be <strong>triggered</strong>( errdisbale the interface).</li>
<li>IF BPDU Filter is enabled in <u><strong>Interface config mode</strong></u> and the port receives BPDU:</li>
<li>The BPDU will be <strong>ignored</strong>.</li>
<li><strong>BPDU Guard</strong> will <strong>not be triggered.</strong></li>
</ul>
<blockquote>
<p>💡 <strong>Caution:</strong> Do not configure a port with BPDU Guard and BPDU Filter. Enabling both on the same interface effectively cancels the BPDU Guard feature. Specifically, a port configured with both features will not error-disable the port when a BPDU is received. Instead, it will default to the BPDU Filter and simply ignore the BPDUs.</p>
</blockquote>
<h2 id="heading-root-guard">Root guard</h2>
<p>Root Guard is a feature in Spanning Tree Protocol (STP) that <strong>prevents a port from becoming a root port</strong> if it receives <strong>superior BPDUs</strong> (A BPDU that has a lower Bridge ID). When a switch port configured with Root Guard receives a BPDU that indicates a <strong>better root bridge</strong> (one with a lower bridge ID), the port is <strong>disabled</strong> and placed into a <strong>root-inconsistent state</strong>. This action enforces the <strong>current root bridge</strong> and ensures that the topology remains stable by preventing unauthorized or unintended switches from claiming root bridge status</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aec99c72-f6a0-4642-b2f5-ca2bbfb5369b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this example, the Service Provider's switches are connected to the customer's switches, and the customer's root bridge ID is lower than the Service Provider's root bridge ID. The Service Provider wants to protect its STP topology and prevent it from being affected by the customer's root bridge</p>
<p><strong>Root Guard</strong> can be configured to protect the STP topology by <strong>preventing the service provider switch from accepting superior BPDUs from outside of service provider control.</strong>  </p>
<h2 id="heading-root-guard-configuration">Root Guard Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/59316cc9-c2f1-4955-bb5a-2274b2729782.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Root Guard will be configured on the ports connected to switches outside of the control.  </p>
<pre><code class="lang-javascript">s2(config-<span class="hljs-keyword">if</span>)# spanning-tree guard root
</code></pre>
<blockquote>
<p>💡 - <strong>Loop Guard</strong> does not have a global default command  </p>
<ul>
<li><p>If a <strong>Root Guard-enabled port</strong> receives a BPDU, it will enter the <strong>broken state</strong>, effectively disabling it.  </p>
</li>
<li><p>The port will <strong>not be able to forward data frames and will discard</strong> any frames it receives.  </p>
</li>
<li><p>SW1, SW2, and SW3 <strong>won’t accept</strong> SW6 as a root Bridge.  </p>
</li>
<li><p>To re-enable the ports disabled by Root Guard, you must solve the issue that disabled the port.<br />The Disabled ports must stop receiving superior BPDUs.<br />Tell the customer to increase the priority value of their switch.  </p>
</li>
<li><p>Ports in <strong>root-inconsistent</strong> state <strong>recover automatically</strong> after the port stops receiving superior BPDUs. Unlike BPDU guard, <strong>manual intervention is not required</strong>.</p>
</li>
</ul>
</blockquote>
<ul>
<li><strong>Loop Guard</strong> does not have a global default command</li>
<li>If a <strong>Root Guard-enabled port</strong> receives a BPDU, it will enter the <strong>broken state</strong>, effectively disabling it.</li>
<li>The port will <strong>not be able to forward data frames and will discard</strong> any frames it receives.</li>
<li>SW1, SW2, and SW3 <strong>won’t accept</strong> SW6 as a root Bridge.</li>
<li>To re-enable the ports disabled by Root Guard, you must solve the issue that disabled the port.
The Disabled ports must stop receiving superior BPDUs.
Tell the customer to increase the priority value of their switch.</li>
<li>Ports in <strong>root-inconsistent</strong> state <strong>recover automatically</strong> after the port stops receiving superior BPDUs. Unlike BPDU guard, <strong>manual intervention is not required</strong>.</li>
</ul>
<h2 id="heading-loop-guard">Loop Guard</h2>
<p><strong>Loop Guard</strong> is a Spanning Tree Protocol (STP) feature designed to <strong>prevent Layer 2 loops</strong>, especially those caused by <strong>unidirectional link failures</strong> (e.g., a broken fiber pair where only one direction fails)</p>
<p><img src="https://www.networkacademy.io/sites/default/files/inline-images/Fiber-optic%20Ethernet%20link.gif" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://cdn.networkacademy.io/sites/default/files/2025-05/fibercut.gif" alt="CCNA 200-301 Study (1)" /></p>
<p>                                                             <em><strong>Unidirectional Fiber cut</strong></em>
If a port <strong>stops receiving BPDUs</strong>, Loop Guard places that port into a <strong>loop-inconsistent blocking</strong> state to prevent it inadvertently transitioning to forwarding and forming a loop</p>
<blockquote>
<p>💡 <strong>Note:</strong> <strong>Loop guard and root guard</strong> should be configured together. While Root Guard protects against unauthorized switches attempting to become the root bridge, <strong>Loop Guard</strong> protects against <u><strong>unintended loops caused by link failures</strong></u>. Together, these features help maintain the integrity and stability of the spanning tree topology.</p>
</blockquote>
<p><strong>Loop Guard Per Interface Configuration</strong></p>
<pre><code class="lang-javascript">S4(config-<span class="hljs-keyword">if</span>)#spanning-tree guard loop
</code></pre>
<blockquote>
<p>💡 Unlike BPDU Guard or Root Guard, there is <strong>no global command</strong> (like <code>spanning-tree loopguard default</code>).</p>
</blockquote>
<h1 id="heading-stp-versions">STP Versions</h1>
<p>As you can see, when a loop occurs in the network, STP needs some time to block one of the switch ports. We are waiting for a few seconds until the green light has been changed to green. After that, STP is updated, and 5 generations of it are created.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/27a0de1d-e03a-4ac3-84eb-dc44a4ae9b59.png" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li><strong>Common Spanning Tree (</strong>CST) or IEEE <strong>802.1D</strong> (Standard)</li>
<li><strong>R</strong>apid <strong>S</strong>panning <strong>T</strong>ree <strong>P</strong>rotocol (<strong>RSTP</strong>)  or <strong>IEEE 802.1W</strong> (Standard)</li>
<li><strong>P</strong>er <strong>V</strong>LAN <strong>S</strong>panning <strong>T</strong>ree + (PVST+)  by <strong>Cisco</strong></li>
<li><strong>R</strong>apid <strong>P</strong>er <strong>V</strong>LAN <strong>S</strong>panning <strong>T</strong>ree+ <strong>(RPVST+</strong>) by <strong>Cisco</strong></li>
<li><strong>M</strong>ultiple <strong>S</strong>panning <strong>T</strong>ree IEEE 802.1s. (Standard)</li>
</ol>
<h2 id="heading-stp-8021d-vs-rstp8021w">STP (802.1D) VS RSTP(802.1W)</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td><strong>STP (802.1D)</strong></td><td><strong>RSTP (802.1w)</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Standard</strong></td><td>IEEE 802.1D</td><td>IEEE 802.1w</td></tr>
<tr>
<td><strong>Convergence Time</strong></td><td>30–50 seconds</td><td>1–10 seconds</td></tr>
<tr>
<td><strong>Port Roles</strong></td><td>Root, Designated, Blocked</td><td>Root, Designated, <strong>Alternate</strong>, <strong>Backup</strong>, <strong>Discarding</strong></td></tr>
<tr>
<td><strong>Port States</strong></td><td>Blocking, Listening, Learning, Forwarding, Disabled</td><td>Discarding, Learning, Forwarding</td></tr>
<tr>
<td><strong>BPDU Handling</strong></td><td>BPDUs only sent by Root Bridge</td><td>BPDUs are sent by all switches every 2s</td></tr>
<tr>
<td><strong>Port Fast Equivalent</strong></td><td>Not native (uses Cisco "PortFast")</td><td>Natively supports edge ports (like PortFast)</td></tr>
<tr>
<td><strong>Loop Recovery</strong></td><td>Slow, waits for timers</td><td>Fast, uses handshake mechanism</td></tr>
<tr>
<td><strong>Typical Use</strong></td><td>Older networks</td><td>Modern networks needing faster failover</td></tr>
</tbody>
</table>
</div><p><strong>Alternate Port</strong>: Alternate ports are in <strong>a discarding state</strong> and quickly transition to the <strong>forwarding state when the root port path</strong> fails. Alternate ports are typically found on non-root bridges and help ensure rapid convergence in the event of a link failure.</p>
<p><strong>Backup Port:</strong> Backup ports serve as a <strong>backup to designated ports on a switch</strong>. Backup ports discard traffic and <strong>immediately transition to the forwarding state</strong> if the designated port fails.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Port Role</td><td>Direction</td><td>Typical State</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Root Port</strong></td><td>Best path <strong>to Root</strong></td><td>Forwarding</td><td>Main path to root bridge</td></tr>
<tr>
<td><strong>Designated Port</strong></td><td>Best path <strong>to Segment</strong></td><td>Forwarding</td><td>Forwarding for that LAN</td></tr>
<tr>
<td><strong>Alternate Port</strong></td><td>Backup path <strong>to Root</strong></td><td>Discarding</td><td>Replaces Root Port if it fails</td></tr>
<tr>
<td><strong>Backup Port</strong></td><td>Backup path <strong>to Designated</strong></td><td>Discarding</td><td>Replaces Designated Port if it fails</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cbeb1d4b-bf6c-4d89-a710-abc3f0470ae7.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-per-vlan-spanning-tree-pvst">Per VLAN Spanning Tree+ (PVST+)</h2>
<p><strong>PVST+</strong> is a proprietary Cisco feature that finds the root bridge per V. LAN. It is the default version of STP from Cisco. It finds separate 802.1d spanning-tree instances for each VLAN. It also provides backward compatibility with 802.1d or CST. This is more optimized for the IEEE because it provides optimal path selection as a separate instance of STP per VLAN is found. This is as slow as CST.</p>
<p><strong>Advantages:</strong></p>
<ul>
<li>Provide more optimization on the performance of a network than CST, as it selects the root bridge per VLAN.</li>
<li>Bandwidth consumption is less than CST.</li>
<li>Optimum load balancing is achieved.</li>
</ul>
<p><strong>Disadvantages:</strong></p>
<ul>
<li>This is as slow as CST, and the convergence time is slow. By default, Cisco switches take 50 seconds to converge.</li>
<li>More resources (CPU and memory) are required.</li>
<li><strong>Rapid Per VLAN Spanning Tree + (RPVST+):</strong> This is a spanning tree standard by Cisco that provides faster convergence than PVST+ and finds a separate instance of 802.1w per VLAN. It requires much more CPU and memory than other STP standards.</li>
</ul>
<h3 id="heading-8021smultiple-spanning-tree">802.1s(Multiple Spanning Tree)</h3>
<ul>
<li>802.1s(Multiple Spanning Tree): This standard is developed by IEEE, in which grouping of VLANs is done, and for every single group, RSTP is run. This is basically a spanning tree protocol running over another spanning tree protocol.</li>
</ul>
<h3 id="heading-advantages">Advantages:</h3>
<ul>
<li>High redundancy.</li>
<li>Load balancing can be achieved.</li>
<li>Lower CPU and Memory usage is required</li>
</ul>
<h3 id="heading-disadvantages">Disadvantages:</h3>
<ul>
<li>More configuration is required, and not easy to implement.</li>
</ul>
<h2 id="heading-spanning-tree-configuration">Spanning Tree Configuration</h2>
<pre><code class="lang-javascript">s3(config)# spanning-tree vlan <span class="hljs-number">20</span> root primary
s3(config)# spanning-tree vlan <span class="hljs-number">10</span> root secondary [secondary <span class="hljs-keyword">switch</span> add when primary root bridge removed the second one be a root bridge]
s3(config)# spanning-tree vlan <span class="hljs-number">20</span> priority <span class="hljs-number">4096</span>
 s3# show spanning-tree
 s3# conf t
 s3(config)#spanning-tree mode rapid-pvst
 s3# show spanning-tree vlan <span class="hljs-number">10</span>
</code></pre>
<p><strong>Which one is the first step in STP operation?</strong></p>
<p>• <strong>Select the Root Bridge</strong> ✅</p>
<p><strong>Which one is the last step in STP operation?</strong></p>
<p>• <strong>Block all Non-Root &amp; Non-DP’s</strong> ✅</p>
<p><strong>What is the maximum number of Root Ports that each Cisco switch can have in the STP Topology?</strong></p>
<p>• <strong>1</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ea770b1d-5dbd-4c42-a706-7949dfdfe034.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D. Learning E. Forwarding</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/63de8e50-f042-4c02-af7a-c2fa343b25b9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D. Learning</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/012d7da5-b566-4dba-a178-9d1a71aba99a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B.</strong> (In RSTP terms, this means <em>discarding state</em> (blocking equivalent in classic STP). The Backup Port is exactly this: a redundant path toward the <strong>designated bridge</strong> on a shared segment.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/22f08781-7ae0-4690-961e-81c810fc77c0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8e6208d1-b9c8-4a40-93a6-d8c0953270ae.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cbde740a-7ad6-457d-8cf7-71eccd04c5fb.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d10251b9-e211-4871-9af6-8d87b3347206.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Correct answers: A and E</strong></p>
<p><strong>panning tree enabled protocol rstp”</strong> ➜ on Cisco that means <strong>Rapid PVST+</strong></p>
<p>Under <strong>Root ID,</strong> it shows <strong>Cost 19</strong> and <strong>Port 1 (FastEthernet 2/1)</strong>. When a switch is <strong>not</strong> the root, the interface listed here is the <strong>root port</strong> (the port used to reach the root bridge).</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/59a87688-08fa-4153-aaf1-6fa9ff082976.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A  E</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8c170389-3456-4bca-abe1-4d91dee862b2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong></p>
<h2 id="heading-etherchannel">EtherChannel</h2>
<h1 id="heading-what-is-etherchannel">What is EtherChannel?</h1>
<ul>
<li>EtherChannel(<strong>link aggregation</strong>) is a port <strong>link aggregation</strong> <strong>technology</strong> in which multiple physical port links are grouped into one logical link. <strong>It provides high speed and redundancy, load sharing, and increased bandwidth</strong> between switches, routers, and servers.</li>
<li><strong>A maximum of 8 links can be aggregated.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/623fa852-eacc-4fb2-bb42-f02b8273bcea.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: only an even number of cables can be used between the switches, for example 2-4-6 cables, not odd numbers like 1-3-5. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b0472002-8ae2-4cc3-992d-118cd059c856.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When the bandwidth of the interfaces connected to end hosts is greater than the bandwidth of the connection to the distribution switch(es), this is called <strong>oversubscription</strong>. Some oversubscription is acceptable, but excessive oversubscription can cause congestion. To address this, the network administrator adds multiple links between the access switch and the distribution switch.”</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/587b8783-7aae-4cc4-8d40-82c816d916b8.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/18d0d488-d0c2-4929-b85e-01cfa60cc725.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>EtherChannel</strong> <u><strong>groups multiple interfaces together to act as a single, high-bandwidth link</strong></u>. Without EtherChannel, in a redundant link environment, each link would be treated as a separate entity by <strong>Spanning Tree Protocol (STP)</strong>. This would result in only one link being active, while the others remain in a blocking state</p>
<h2 id="heading-requirement">Requirement</h2>
<ol>
<li>Same duplex.</li>
<li>Same speed</li>
<li>Same VLAN configuration</li>
<li>Switch port modes should be the same ( access or trunk mode).</li>
</ol>
<h2 id="heading-port-aggregation-protocolpagp">Port Aggregation Protocol(PAgP)</h2>
<p><strong>Port Aggregation Protocol (PAgP)</strong> is a <strong>Cisco proprietary</strong> protocol used with an EtherChannel. </p>
<p>There are different modes in which you can configure your interface.</p>
<ul>
<li>On: n<strong>o negotiation takes place</strong>. (No protocol used.)</li>
<li><strong>Desirable</strong>: Actively negotiates EtherChannel.</li>
<li><strong>Auto</strong>: Passive, waits for the other side to initiate.</li>
<li><strong>Off</strong>: No EtherChannel configured on the interface.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>SW1</td><td>SW2</td><td>Channel Established</td></tr>
</thead>
<tbody>
<tr>
<td><strong>ON</strong></td><td><strong>ON</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td><strong>Auto/Desirable</strong></td><td><strong>Desirable</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td>On/Auto/Desirable</td><td>Not Configured</td><td>No</td></tr>
<tr>
<td>ON</td><td>Desirable</td><td>No</td></tr>
<tr>
<td>Auto/on</td><td>Auto</td><td>No</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 Up to <strong>8 Interfaces</strong> can be formed into a single EtherChannel (<strong>LACP allows up to 16 links</strong>, but only <strong>8 will be active</strong>, the other <strong>8 will be in standby mode</strong>, waiting for an active interface to fail) </p>
</blockquote>
<h2 id="heading-link-aggregation-control-protocollacp">Link Aggregation Control Protocol(LACP)</h2>
<p><strong>Link Aggregation Control Protocol</strong> is <strong>an IEEE protocol</strong>, originally defined in 802.3ad, used to form an EtherChannel. This protocol is almost similar to Cisco PAgP. There are different modes in which you can configure your interface.</p>
<ul>
<li><strong>ON</strong>: In this mode, the interface will be a part of EthernetChannel, but no negotiation takes place.</li>
<li><strong>Active</strong>: Actively negotiates EtherChannel.</li>
<li><strong>Passive</strong>: Passive, waits for initiation</li>
<li><strong>Off</strong>: No EtherChannel configured on the interface.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>SW1</td><td>SW2</td><td>Channel Established</td></tr>
</thead>
<tbody>
<tr>
<td><strong>On</strong></td><td><strong>ON</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td><strong>Active/Passive</strong></td><td><strong>Active</strong></td><td><strong>Yes</strong></td></tr>
<tr>
<td>On/Active/Passsive</td><td>Not Configured</td><td>NO</td></tr>
<tr>
<td>ON</td><td>Active</td><td>NO</td></tr>
<tr>
<td>Passive/ON</td><td>ON</td><td>NO</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>ON</strong> mode only works with <strong>ON</strong> mode ( ON+ Active or On + Desirable will  not work)</p>
</blockquote>
<pre><code class="lang-javascript">ASW1(config-<span class="hljs-keyword">if</span>-range)#channel-group [<span class="hljs-number">1</span><span class="hljs-number">-255</span>] number mode (ative <span class="hljs-keyword">for</span> LACP, Desrible <span class="hljs-keyword">for</span> PAgP)
</code></pre>
<p><strong>What is the status of the port channel if LACP is misconfigured?</strong></p>
<p>Disabled ✅</p>
<p><strong>You have configured three trunk ports in an EtherChannel group. What will happen when one port in the grouping fails?</strong></p>
<p>The channel cost has increased. ✅  (Because the EtherChannel group has lost some bandwidth, the cost of the grouped link is increased.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9b4ab8d9-2c70-4f97-b178-e2ca721c60a9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C ( Not D because D adds 300 and removes other VLANs)</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0da80e67-ac66-4bb5-88d8-69044915db11.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/02059b70-030e-4e0b-b3f5-ae587993e3c7.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D and E</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/afcd7133-aa74-446f-bd59-0e68c7ef7694.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong>
Creating the port-channel interface and using <code>port-channel min-links 1</code> tells the switch to keep the Port-Channel (Po1) operational as long as <strong>at least one</strong> member link is up. </p>
<h2 id="heading-etherchannel-lab">EtherChannel LAB</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/33a72dcc-cfd1-4728-bdce-3c616157fe32.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will implement EtherChannel Layer 2 and Layer 3 with different types of EtherChannel protocols, Static, PAgP, and LACP, for this topology.</p>
<h3 id="heading-etherchannel-configuration-on-access-switch-1-using-lacp-protocol">EtherChannel Configuration on Access Switch 1 Using LACP Protocol</h3>
<pre><code class="lang-javascript">ASW1#conf t
ASW1(config)#interface range e0/<span class="hljs-number">2</span><span class="hljs-number">-3</span>
ASW1(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode active
ASW1(config)#int po1 [port-channel <span class="hljs-number">1</span>]
ASW1(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1
ASW1(config-<span class="hljs-keyword">if</span>)#switchport mode  trunk
</code></pre>
<h3 id="heading-verify-etherchannel-configuration-on-access-switch-1">Verify EtherChannel Configuration on Access Switch 1</h3>
<pre><code class="lang-javascript">ASW1#show etherchannel summary
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ef0a84d5-6ab7-4fdf-a384-34a47ea3c1fe.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-etherchannel-configuration-on-distribution-switch-1-using-lacp-protocol-access-switch-side">EtherChannel Configuration on Distribution Switch 1 Using LACP Protocol (Access Switch Side)</h3>
<pre><code class="lang-javascript">DSW1#conf t
DSW1(config)#int range e0/<span class="hljs-number">2</span><span class="hljs-number">-3</span>
DSW1(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode active
DSW1(config)#int po1
DSW1(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
DSW1(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/37f042ef-a108-41e0-b2fe-bfa0a5b6b8b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>An EtherChannel connection has been established between the Access and Distribution switches using LACP.</p>
<h3 id="heading-configure-svi-switch-virtual-interface-as-a-default-gateway">Configure SVI (Switch Virtual Interface) as a Default gateway</h3>
<pre><code class="lang-javascript">DSW1(config)#int vlan <span class="hljs-number">1</span>
DSW1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.100</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DSW1(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<p>A <strong>Switch Virtual Interface (SVI)</strong> is a logical interface on a network switch that enables Layer 3 functionality for a VLAN. It allows the switch to perform routing between VLANs and provides IP connectivity for the VLAN.</p>
<blockquote>
<p>💡 An EtherChannel is just a <strong>link bundle</strong>. A <em>default gateway</em> must be an <strong>IP address on a Layer-3 interface</strong>, not a link.</p>
</blockquote>
<h3 id="heading-etherchannel-configuration-on-access-switch-2-using-pagp-protocol">EtherChannel Configuration on <strong>Access Switch 2</strong> Using PAgP Protocol</h3>
<pre><code class="lang-javascript">ASW2(config)#int range e0/<span class="hljs-number">1</span><span class="hljs-number">-2</span>
ASW2(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode desirable 
ASW2(config-<span class="hljs-keyword">if</span>-range)#int po1 
ASW2(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q 
ASW2(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
ASW2#show etherchannel summary
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b2496d7a-f429-4810-a2d1-605d83b57d61.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-etherchannel-configuration-on-distribution-switch-2-using-pagp-protocol-access-switch-side">EtherChannel Configuration on Distribution Switch 2 Using PAgP Protocol (Access Switch Side)</h3>
<pre><code class="lang-javascript">DSW2(config)#int range e0/<span class="hljs-number">0</span><span class="hljs-number">-1</span>
DSW2(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">1</span> mode desirable
DSW2(config-<span class="hljs-keyword">if</span>-range)#no shutdown 
DSW2(config-<span class="hljs-keyword">if</span>-range)#int po1
DSW2(config-<span class="hljs-keyword">if</span>)#switchport trunk encapsulation dot1q
DSW2(config-<span class="hljs-keyword">if</span>)#switchport mode trunk
DSW2#show etherchannel summary
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e152001-266c-4e89-a718-0c3da90c41d1.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-configure-svi-switch-virtual-interface-as-a-default-gateway-1">Configure SVI (Switch Virtual Interface) as a Default gateway</h3>
<pre><code class="lang-javascript">DSW2(config)#int vlan <span class="hljs-number">1</span>
DSW2(config-<span class="hljs-keyword">if</span>)# ip address <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DSW2(config-<span class="hljs-keyword">if</span>)#no shut
</code></pre>
<h3 id="heading-layer-3-etherchannel-configuration-between-two-layer-3-switches">Layer 3 EtherChannel Configuration between two Layer 3 Switches</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/35bbf7c1-b2dd-4e1a-8397-2ec06bf253af.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-distribution-switch-1-configuration">Distribution Switch 1 Configuration</h3>
<pre><code class="lang-javascript">DSW1(config)#int range e0/<span class="hljs-number">0</span><span class="hljs-number">-1</span>
DSW1(config-<span class="hljs-keyword">if</span>-range)#no switchport /change to routed port/
DSW1(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">2</span> mode on
DSW1(config-<span class="hljs-keyword">if</span>-range)#no shutdown 
DSW1(config-<span class="hljs-keyword">if</span>-range)#int po2
DSW1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
</code></pre>
<h3 id="heading-distribution-switch-2-configuration">Distribution Switch 2 Configuration</h3>
<pre><code class="lang-javascript">DSW2(config)#int range e0/<span class="hljs-number">02</span><span class="hljs-number">-3</span>
DSW2(config-<span class="hljs-keyword">if</span>-range)#no switchport 
DSW2(config-<span class="hljs-keyword">if</span>-range)#channel-group <span class="hljs-number">2</span> mode on
DSW2(config-<span class="hljs-keyword">if</span>-range)#no shutdown 
DSW2(config-<span class="hljs-keyword">if</span>-range)#int po2
DSW2(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aaa5f31f-5d7d-4e0c-a055-ce9c99543b2a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>EtherChannel layer 3 has been established between two layer 3 switches.  </p>
<h2 id="heading-configure-a-static-route-to-reach-the-it-department-pc-to-the-server-in-the-data-center">Configure a static route to reach the IT Department pc to the Server in the Data Center</h2>
<pre><code class="lang-javascript">DSW1(config)#ip routing
DSW1(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span>
</code></pre>
<pre><code class="lang-javascript">DSW2(config)#ip routing
DSW2(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fce74a4f-526d-4c72-9291-7a0504fd2e4f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After completing the configuration, clients from the IT department have established a connection with the server located in the data center.</p>
<h3 id="heading-notes">Notes:</h3>
<ul>
<li><strong>Channel-Group</strong> should be unique and not repeated <strong>on the same switch.</strong></li>
<li><strong>PO</strong>= port-channel.</li>
<li>Before starting the configuration of channel groups, make sure all interfaces are <strong>down</strong>.</li>
</ul>
<p>Question #: 1266</p>
<p>Question #: 1339</p>
<h2 id="heading-routing">Routing</h2>
<h1 id="heading-what-is-a-router">What is a Router?</h1>
<ul>
<li>A router is a <strong>layer 3</strong> device used for interconnecting <strong>networks at layer 3**</strong>.**</li>
<li><strong>Routing</strong> is the process of identifying the best path to a destination.</li>
<li><strong>Routers</strong> make their forwarding decision based on <strong>Layer 3 (IP Address)</strong>, unlike <strong>Switches</strong>, which make their decision based on <strong>Layer 2 ( MAC Address)</strong>.</li>
<li>Generally, a router has at least two interfaces, but with the use of VLANs, it can have only one interface.</li>
<li><strong>The router</strong> receives the message, de-encapsulates the Ethernet frame, and then <strong>reads the destination IP address (Network portion) in the IP packet</strong>. It then determines where to forward the message. It re-encapsulates the packet back into a new frame and forwards the frame to its destination.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1ed5ccb6-8a0d-4815-b47f-3e0b38317b45.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/32627859-658c-44ff-9a86-fc159b9904e2.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0e26d6b0-957c-4c8a-9783-94667e94b739.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-the-routing-table">The Routing Table</h2>
<ul>
<li>A <strong>routing table</strong> is a <strong>data structure</strong> used by routers and networked devices (like servers, PCs, and switches with Layer 3 capabilities) to <strong>determine the best path for forwarding packets</strong> to their destinations.</li>
<li><strong>Routing table</strong> updates are done in two ways:</li>
<li><strong>Dynamically:</strong> Remote routes are automatically learned using a <strong>dynamic routing protocol</strong>.</li>
<li><strong>Manually:</strong> Remote networks are <strong>manually</strong> entered into the route table using <strong>static routes</strong>.</li>
<li>If the router can't determine where to forward a message, <strong>it will drop it</strong>. The Network Administrator configures a <u><strong>static default route that is placed into the routing table so that a packet will not be dropped due to the destination network not being in the routing table</strong></u>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/32c842cd-068d-4982-bdd8-cee7fa71e2c2.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Directly connected: means that the router is connected to the network directly.</p>
<h2 id="heading-default-gateway">Default Gateway</h2>
<p>A <strong>default gateway</strong> is the <strong>router IP address</strong> on your local network that your device uses to send traffic <strong>outside of its subnet</strong>.</p>
<p>Think of it as the <strong>“exit door”</strong> from your local network to other networks (like the internet).</p>
<blockquote>
<p>💡 Hosts with an <strong>incorrect default gateway</strong> can communicate with other hosts on a local network, but can’t communicate with hosts in other networks. </p>
</blockquote>
<p><strong>What is the purpose of ARP in an IPv4 network?</strong></p>
<ul>
<li>to obtain a specific MAC address when an IP address is known.</li>
</ul>
<p><strong>The ARP table in a switch maps which two types of addresses together?</strong></p>
<ul>
<li>Layer 3 address to a Layer 2 address</li>
</ul>
<p><strong>What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2?</strong></p>
<ul>
<li>It reassembles the frame with MAC addresses different from the original frame.</li>
</ul>
<p><strong>A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?</strong></p>
<ul>
<li>the broadcast MAC address</li>
</ul>
<p>When we configure an IP address on an Interface and enable the interface, <strong>two routes are automatically added to the routing table</strong>:</p>
<ul>
<li><strong>Connected Route C</strong> (Code <strong>C</strong> in the routing table): represents a <strong>network directly attached</strong> to the router interface,</li>
<li><strong>Local Route L</strong> (Code <strong>L</strong> in the Routing table) represents the <strong>IP address assigned and configured</strong> to the router's specific interface and is always <strong>a /32 (host route).</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e7dbd08e-10aa-45aa-af19-20acb656ccbd.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-router-vs-l3-switch">Router VS L3 Switch</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Attribute</td><td>Layer 3 switch</td><td>Router</td></tr>
</thead>
<tbody>
<tr>
<td>Scope</td><td>LAN for office, data center, and campus environment</td><td>WAN For  office,Datacenter and campus environment</td></tr>
<tr>
<td>Key functionality</td><td>Routes across different subnets or VLANs on a campus LAN</td><td>Routes across different networks across WAN are communicated and routed by a router.</td></tr>
<tr>
<td>Edge technologies support</td><td>Not supporting</td><td>NAT, Firewalling, tunneling, IPsec</td></tr>
<tr>
<td>Size of routing tabel</td><td>Smaller routing table compared to router</td><td>Bigger to support multiple route entries</td></tr>
<tr>
<td>Interface support</td><td>Ethernet ports(copper/fiber)</td><td>Ethernet ports(copper/fiber), interface like SONT, OC-N, T1/T3 etc</td></tr>
<tr>
<td>Throughput</td><td>High Throughput (because of large amount ports)</td><td>Low than layer 3 switches (because of less amount ports)</td></tr>
<tr>
<td>Switching capacity</td><td>High switching capacity</td><td>Lower than layer 3 switches</td></tr>
<tr>
<td>Cost</td><td>Low cost</td><td>High cost</td></tr>
<tr>
<td>Port Density</td><td>High</td><td>Low</td></tr>
</tbody>
</table>
</div><p><strong>The port density</strong> of a switch refers to <strong>the number of ports available on a single switch.</strong></p>
<h2 id="heading-type-of-routing">Type of Routing</h2>
<h3 id="heading-static-routing">Static Routing</h3>
<p>Static routes are mainly configured when routing from a particular network to a stub network. </p>
<pre><code class="lang-javascript">Router(config)# ip route <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> [next-hop ip address or exit interface]
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/04a216a6-18d5-43a3-bd94-89c856493bcc.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a2c15780-be44-47ca-9547-27e83aade310.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-default-route-gateway-of-last-resort">Default Route (gateway of last resort)</h2>
<p>A <strong>gateway of Last Resort</strong> is a route that a router uses when it does not have a more specific match for a destination in its routing table. It is essentially the <strong>default route</strong>, directing traffic to a next-hop router when no other routes match.</p>
<pre><code class="lang-javascript">Router(config)# ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> [next-hop ip address or exit interface]
</code></pre>
<p>Gateway of last resort is 192.168.1.1 to network 0.0.0.0</p>
<pre><code class="lang-javascript">Gateway <span class="hljs-keyword">of</span> last resort is <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> to network <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>

     <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.0</span>/<span class="hljs-number">24</span> is directly connected, Gig0/<span class="hljs-number">0</span>
     <span class="hljs-number">172.16</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>/<span class="hljs-number">16</span> is directly connected, Gig0/<span class="hljs-number">1</span>
     <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>/<span class="hljs-number">0</span> [<span class="hljs-number">1</span>/<span class="hljs-number">0</span>] via <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<ul>
<li>The router knows about <code>10.10.10.0/24</code> and <code>172.16.0.0/16</code>.</li>
<li>If traffic is going to, say, <code>8.8.8.8</code> (Google DNS), It doesn’t match any specific route.</li>
<li>So the router sends it to the <strong>gateway of last resort:</strong> <strong><code>192.168.1.1</code></strong>.</li>
</ul>
<h2 id="heading-static-route">Static Route</h2>
<h3 id="heading-advantage">Advantage:</h3>
<ul>
<li>No <strong>routing overhead for the router CPU</strong>, which means a cheaper router can be used to do routing.</li>
<li>It adds <strong>security</strong> because only the administrator can allow routing to particular networks.</li>
<li>No <strong>bandwidth usage between routes</strong>, and any updating did not happen between routes, such as dynamic routing)</li>
</ul>
<h3 id="heading-disadvantage">Disadvantage:</h3>
<ul>
<li>For a large network, it is hectic for the administrator to manually add each route for the network in the routing table on each router.</li>
<li>The administrator should have good knowledge of the topology. If a new administrator comes, then he has to manually add each route, so he should have a very good knowledge of the router topology.</li>
</ul>
<h2 id="heading-static-route-lab">Static Route Lab</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7996a1a4-4ec6-477b-bd79-ccce0ce6130f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we have three departments, each with a unique subnet. We will establish a connection between the departments through static routing and forward unknown destinations to the internet.</p>
<h2 id="heading-operation-router-configuration">Operation Router Configuration</h2>
<pre><code class="lang-javascript">OPS-Router#conf t
OPS-Router(config)#int fa0/<span class="hljs-number">0</span>
OPS-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
OPS-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
OPS-Router(config-<span class="hljs-keyword">if</span>)#exit
SUP-Router#conf t
OPS-Router(config)#int fa1/<span class="hljs-number">0</span>
OPS-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
OPS-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h2 id="heading-support-router-configuration">Support Router Configuration</h2>
<pre><code class="lang-javascript">SUP-Router#conf t
SUP-Router(config)#int fa1/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
SUP-Router(config-<span class="hljs-keyword">if</span>)#exit


SUP-Router(config)#int fa2/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown 


SUP-Router(config)#int fa0/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown 


SUP-Router(config)#int fa3/<span class="hljs-number">0</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SUP-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h2 id="heading-development-router-configuration">Development Router Configuration</h2>
<pre><code class="lang-javascript">DEV-Router#conf t
DEV-Router(config)#int fa1/<span class="hljs-number">0</span>
DEV-Router(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
DEV-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
DEV-Router(config-<span class="hljs-keyword">if</span>)#exit

DEV-Router(config)#int fa0/<span class="hljs-number">0</span>
DEV-Router(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
EV-Router(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h2 id="heading-internet-router-configuration">Internet Router Configuration</h2>
<pre><code class="lang-javascript">Internet#conf t
Internet(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Internet(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Internet(config-<span class="hljs-keyword">if</span>)#no shutdown 
Internet#wr
</code></pre>
<h2 id="heading-pc-configuration-operation-department">PC Configuration Operation Department</h2>
<pre><code class="lang-javascript">PC<span class="hljs-number">-02</span>&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<h2 id="heading-pc-configuration-support-department">PC Configuration Support Department</h2>
<pre><code class="lang-javascript">Support-PC02&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h2 id="heading-pc-configuration-development-department">PC Configuration Development Department</h2>
<pre><code class="lang-javascript">DEV-PC01&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
</code></pre>
<h2 id="heading-operation-router-static-route-configuration">Operation Router Static Route Configuration</h2>
<pre><code class="lang-javascript">OPS-Router#conf t
OPS-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
OPS-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
OPS-Router(config)#ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
OPS-Router(config)#exit
OPS-Router#wr
</code></pre>
<pre><code class="lang-javascript">OPS-Router#show ip route <span class="hljs-keyword">static</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2e85cf4a-0b1c-45dd-b12a-504f3285b687.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-support-router-static-route-configuration">Support Router Static Route Configuration</h2>
<pre><code class="lang-javascript">SUP-Router#conf t
SUP-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
SUP-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span>
SUP-Router(config)#ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
SUP-Router(config)#exit
SUP-Router#wr
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4dda668e-12b3-4131-b8af-458e0376a1fe.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">DEV-Router#conf t
DEV-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
DEV-Router(config)#ip route <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
DEV-Router(config)#ip route <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
DEV-Router(config)#exit
DEV-Router#wr
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4cd1f981-dbb4-4477-a5a8-25b0e17d62d9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c12fa22f-5415-4786-9bd4-b9ecd55f85cd.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Now, as you can see, the connection between departments has been established.</p>
<h2 id="heading-dynamic-routing">Dynamic Routing</h2>
<ul>
<li>Dynamic routing makes automatic adjustments to the routes according to the current state of the route in the routing table. Dynamic routing uses protocols to discover network destinations and the routes to reach them.</li>
</ul>
<h3 id="heading-dynamic-protocols-have-the-following-features">Dynamic protocols have the following features:</h3>
<ul>
<li>The routers should have the same dynamic protocol running in order to exchange routes.</li>
<li>When a router finds a change in the topology, the router broadcasts it to all other routers.</li>
</ul>
<h3 id="heading-advantages-1">Advantages:</h3>
<ul>
<li>Easy to configure</li>
<li>More <strong>effective at selecting the best route to</strong> the destination remote network and also for discovering remote networks.</li>
</ul>
<h3 id="heading-disadvantage-1">Disadvantage:</h3>
<ul>
<li>Consumes <strong>more bandwidth for communication with other neighbours</strong>.</li>
<li><strong>Less secure</strong> than static routing. (because we decided in which path the data should be transferred).</li>
</ul>
<h2 id="heading-dynamic-routing-protocols">Dynamic Routing Protocols:</h2>
<ul>
<li><strong>Routing Protocols:</strong> Help routers add information to their routing tables from connected routers automatically. These types of protocols also send out topology updates whenever changes happen in the topology.</li>
</ul>
<h2 id="heading-type-of-routing-protocols">Type of Routing Protocols</h2>
<ul>
<li>Distance Victor or Link state protocols.</li>
<li><strong>I</strong>nterior <strong>G</strong>ateway Protocols (<strong>IGP</strong>) or <strong>E</strong>xterior <strong>G</strong>ateway <strong>P</strong>rotocols (<strong>EGP</strong>).</li>
<li>Classful or Classless Protocols. (old not useful, classful can not be subnetted)</li>
</ul>
<h2 id="heading-type-of-routing-protocols-1">Type of Routing Protocols</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ceedb947-46b6-464d-a793-844771d3d961.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>IGP (Interior Gateway Protocol):</strong> Used for routing <strong>inside</strong> a single organization or network (Autonomous System). It helps routers within the same network share routes. Examples: <strong>OSPF, EIGRP, RIP, and IS-IS.</strong></li>
<li><strong>EGP (Exterior Gateway Protocol):</strong> Used for routing <strong>between</strong> different organizations or networks (Autonomous Systems). It helps networks on the internet share routes. The main example today is <strong>BGP (Border Gateway Protocol).</strong></li>
</ul>
<h2 id="heading-distance-vector-routing-protocol">Distance Vector Routing Protocol</h2>
<ul>
<li>Distance Vector Protocol broadcasts its routing table to every directly connected neighbour at specific time intervals, using a <strong>lot of bandwidth</strong> and <strong>slow convergence**</strong>.** In the Distance Vector Routing protocol, when a route becomes unavailable, all router tables need to be updated with new information.</li>
</ul>
<h2 id="heading-distance-vector-protocols-work-best-in-these-situations">Distance Vector Protocols work best in these situations:</h2>
<ul>
<li>When the network is <strong>simple and flat,</strong> and doesn’t require a <strong>hierarchical design</strong>.</li>
<li>When the administrators <strong>don’t have enough knowledge</strong> to configure and troubleshoot <strong>link-state protocols</strong>.</li>
<li>When <strong>worst-case convergence times</strong> in a network are <strong>not a concern.</strong> (that the speed at which the network protocols adjust to changes, such as topology updates, link failures, or new configurations, is not critical to the network's operation or performance requirements)</li>
</ul>
<h2 id="heading-link-state-protocols">Link State Protocols</h2>
<ul>
<li>Link State protocols find the <strong>best routing path</strong> by <strong>sharing information with other routes in proximity</strong>. The route is calculated based on <strong>the speed of the path</strong> to the destination and <strong>the cost of resources</strong>.</li>
<li>One key difference to a distance vector protocol is that link state protocols <strong>don’t send out routing tables</strong> instead, routes <strong>notify each other quickly when route changes are detected.</strong></li>
<li>Link State protocols use more resources (CPU) on the router because more information is shared.</li>
</ul>
<h2 id="heading-link-state-works-best-in-these-situations">Link-State works best in these situations:</h2>
<ul>
<li>When the network design is <strong>hierarchical</strong>.</li>
<li>When the administrators have <strong>good knowledge</strong> of the implemented <strong>link-state routing protocol.</strong></li>
<li>When the <strong>fast convergence</strong> of the network is <strong>crucial</strong>.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Distance Vector</td><td>Link State</td></tr>
</thead>
<tbody>
<tr>
<td>Distance Vector Protocol <strong>sends the entire routing table</strong>.</td><td>Link State Protocol sends <strong>only link-state information</strong></td></tr>
<tr>
<td>It is allowing to routing loops</td><td>it is less allowing to routing loops</td></tr>
<tr>
<td>Updates sometimes sent using <strong>broadcast</strong></td><td>Uses only <strong>multicast</strong> method for routing updates.</td></tr>
<tr>
<td>It is <strong>simple</strong> to configure</td><td>It is <strong>hard</strong> to configure</td></tr>
<tr>
<td><strong>Doesn’t know</strong> network topology</td><td><strong>Know</strong> the entire topology</td></tr>
<tr>
<td>Example: Rip, IGRP</td><td>Example: OSPF, IS-IS</td></tr>
</tbody>
</table>
</div><div class="hn-table">
<table>
<thead>
<tr>
<td>RIP</td><td><strong>R</strong>outing <strong>I</strong>nformation <strong>P</strong>rotocol</td></tr>
</thead>
<tbody>
<tr>
<td>IGRP</td><td><strong>I</strong>nterior <strong>G</strong>ateway <strong>R</strong>outing <strong>P</strong>rotocol</td></tr>
<tr>
<td>OSPF</td><td><strong>O</strong>pen <strong>S</strong>hortest <strong>P</strong>ath <strong>F</strong>irst</td></tr>
<tr>
<td>ISIS</td><td><strong>I</strong>ntermediate <strong>S</strong>ystem to <strong>I</strong>ntermediate <strong>S</strong>ystem.</td></tr>
<tr>
<td>EIGRP</td><td>Enhanced Interior Gateway Routing Protocol</td></tr>
<tr>
<td>BGP</td><td><strong>B</strong>order <strong>G</strong>ateway <strong>P</strong>rotocol</td></tr>
</tbody>
</table>
</div><div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Routing protocol</strong></td><td><strong>Metric</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>RIPv1,2</strong></td><td>Hop count</td><td>The number of routers between the source and destination network.</td></tr>
<tr>
<td><strong>EIGRP</strong></td><td>Matric based on bandwidth and delay (by default</td><td>A combination of several values used to determine the best path. The composite metric will be discussed in the chapter on EIGRP.</td></tr>
<tr>
<td><strong>OSPFv2</strong></td><td>Cost</td><td>The cost of each link is calculated based on bandwidth.</td></tr>
</tbody>
</table>
</div><p>The total matric is the total cost of each link in the route.                                                         |
| <strong>IS-IS</strong>            | Cost                                            | The total metric is the total cost of each link in the route. <strong>the cost of each link is not automatically calculated by defaul</strong>t. All Links have a cost <strong>10 by default.</strong>  |</p>
<h2 id="heading-administrative-distance">Administrative Distance</h2>
<p>Routers use this featur<strong>e to select the best path when there are two or more routes to the same destination using different routing protocols.</strong> Administrative distance <strong>defines the reliability of the routing protocol</strong>. </p>
<p><strong>Lower AD is Preferred</strong>: The route with the lowest AD value is selected.</p>
<p><strong>Static Value</strong>: Assigned by default but can be adjusted manually.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Directly connected</td><td>0</td></tr>
</thead>
<tbody>
<tr>
<td>Static</td><td>1</td></tr>
<tr>
<td>External BGP</td><td>20</td></tr>
<tr>
<td>EIGRP</td><td>90</td></tr>
<tr>
<td>IGRP</td><td>100</td></tr>
<tr>
<td>OSPF</td><td>110</td></tr>
<tr>
<td>IS-IS</td><td>115</td></tr>
<tr>
<td>RIP</td><td>120</td></tr>
<tr>
<td>EIGRP(External)</td><td>170</td></tr>
<tr>
<td>Internal BGP</td><td>200</td></tr>
</tbody>
</table>
</div><h2 id="heading-metrics">Metrics</h2>
<p>A <strong>metric</strong> is a value that routing protocols use to determine the <strong>best path</strong> to a destination network. When <strong>multiple routes exist with the same routing protocol</strong>, the router chooses the path with the <strong>lowest metric</strong> because it is considered the most efficient.</p>
<ul>
<li>The following routes to the destination network 10.1.1.0/24 are learned:</li>
<li>next hop 192.168.1.1, learned via RIP, metric 5</li>
<li>next hop 192.168.2.1, learned via RIP, metric 3</li>
<li>next hop 192.168.3.1, learned via OSPF, metric 10</li>
</ul>
<p>Which route to 10.1.1.0/24 will be added to the route table?</p>
<p><strong>next hop 192.168.3.1, learned via OSPF, metric 10</strong> </p>
<blockquote>
<p>💡 We don't consider the metric directly because the routes are learned from different routing protocols. Each protocol has its own Administrative Distance (AD), and this value is used to select the best route. OSPF typically has a lower AD, making its routes more preferred</p>
</blockquote>
<h3 id="heading-how-to-check-the-administrative-distance-and-metric-of-each-route">How to check the Administrative Distance and Metric of each Route</h3>
<pre><code class="lang-java">R1#show ip route
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/78452726-683f-4ccb-8cb8-e4d5b00e93b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Administrative Distance</strong> = 90             <strong>Metric</strong>=30720</p>
<h2 id="heading-autonomous-system">Autonomous System</h2>
<p>An <strong>Autonomous System (AS)</strong> is a set of Internet-routable IP prefixes belonging to a network or a collection of networks that are all managed, controlled, and supervised by a single entity or organization.  The AS is assigned a globally unique <strong>16-digit identification numbe</strong>r一known as the autonomous system number or <strong>ASN</strong>一by th e <strong>Internet Assigned Numbers Authority (IANA)</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dbf4e63c-558a-4579-a169-e18b66dc95bd.svg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-routing-information-protocol-rip">Routing Information Protocol (RIP)</h1>
<ul>
<li>Routing Information Protocol(RIP): This is one of the first routing protocols to be created. There are multiple versions of RIP, including RIPv1 and RIPv2. The original version, <strong>RIPv1,</strong> determines network paths based on the IP destination and hop count of the journey and uses the <strong>broadcast address</strong>.</li>
<li><strong>RIPv2</strong> is a little more sophisticated than this and sends its routing table to a <strong>multicast address.</strong> RIPv2 also uses authentication to keep data more secure and choose a subnet mask and gateway for future traffic. <strong>The main limitation of RIP is that it has a maximum hop count of</strong> <strong>15,</strong> <strong>which makes it unsuitable for a large network.</strong></li>
<li><strong>RIPng</strong>(RIP Next Generation), used for IPv6</li>
<li>It uses two messages every 30 seconds:
<strong>Request</strong>: To ask RIP-enabled neighbour routers to send their routing table.
<strong>Response:</strong> To send the local router’s routing table to neighbouring routers</li>
</ul>
<h2 id="heading-ripampeigrp-lab">RIP&amp;EIGRP Lab</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fa164781-54ce-46cf-a928-383b29e82465.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will be establishing dynamic routing between Network 1 in North Erbil and Network 2 in South Erbil using the RIP protocol.</p>
<h2 id="heading-network-1-basic-ip-configuration">Network 1 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit

R1(config)#int fa0/<span class="hljs-number">0</span> 
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h2 id="heading-network-2-basic-ip-configuration">Network 2 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-1">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration-1">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa1/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit

R2(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-rip-routing-information-protocol-configuration">RIP (Routing Information Protocol) Configuration</h2>
<h3 id="heading-rip-protocol-configuration-network-1">RIP Protocol Configuration Network 1</h3>
<pre><code class="lang-javascript">R1(config)#router rip 
R1(config-router)#version <span class="hljs-number">2</span>
R1(config-router)#no auto-summary 
R1(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>
R1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>
R1(config-router)#passive-interface fa1/<span class="hljs-number">0</span> [prevent the router <span class="hljs-keyword">from</span> sending routing table to the mentioned interface]
R1(config-router)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-rip-protocol-configuration-network-2">RIP Protocol Configuration Network 2</h3>
<pre><code class="lang-javascript">R2(config)#router  rip
R2(config-router)#version <span class="hljs-number">2</span>
R2(config-router)#no auto-summary 
R2(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>
R2(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>
R2(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
R2(config-router)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-rip-routing-verification">RIP Routing Verification</h2>
<pre><code class="lang-javascript">R1#show ip route rip
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a2616218-f79a-4aad-bca9-f4b4aec38d35.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1#debug ip rip
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9a188c96-79de-4ccf-be3a-ddd8d104b0b3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see each router exchanges the routing table with neighbours, routing table entries are not advertised on interfaces connected to end devices. This is a key benefit of using the '<strong>passive-interface</strong>' command in routing protocols.</p>
<pre><code class="lang-javascript">R1#show ip protocols
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20a5a770-a4a1-4d9f-884e-349ab26209b5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9b1964aa-4de0-4bbc-ad13-6e86489d5403.png" alt="CCNA 200-301 Study (1)" /></p>
<p>It can be seen that a connection between network 1 and network 2 has been established using the RIP protocol.</p>
<h1 id="heading-eigrp">EIGRP</h1>
<ul>
<li>Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol. EIGRP was a Cisco proprietary (till 2013) protocol that was designed to follow the original IGRP protocol. When using EIGRP, a router takes information from its neighbours’ routing tables through a multicast message.</li>
</ul>
<h2 id="heading-eigrp-lab">EIGRP LAB</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b14ff5f3-4e86-45cf-a8d2-f2256fd27ae3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will be establishing dynamic routing between Network 1 in North Sulaymaniyah and Network 2 in South Sulaymaniyah using the EIGRP protocol.</p>
<h2 id="heading-network-1-basic-ip-configuration-1">Network 1 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-2">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration-2">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa0/<span class="hljs-number">0</span>   
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit


R1(config)#int fa1/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h2 id="heading-network-2-basic-ip-configuration-1">Network 2 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-3">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt;  ip <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r2-ip-configuration">Router R2 IP configuration</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa1/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit

R2(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-eigrpenhanced-interior-gateway-routing-protocol-configuration">EIGRP(Enhanced Interior Gateway Routing Protocol) Configuration</h2>
<h3 id="heading-eigrp-protocol-configuration-network-1">EIGRP Protocol Configuration Network 1</h3>
<pre><code class="lang-javascript">R1(config)#router eigrp <span class="hljs-number">100</span> (<span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">u</span>&gt;</span>**Autonomous Systems (AS) ID**<span class="hljs-tag">&lt;/<span class="hljs-name">u</span>&gt;</span></span> )
R1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> ip wildcard (<span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> = <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> [<span class="hljs-number">255</span><span class="hljs-number">-252</span>])
R1(config-router)#network <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
R1(config-router)#no auto-summary 
R1(config-router)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-note">Note:</h3>
<ul>
<li>All routers within an Autonomous System (AS) <strong>should have the same AS number,</strong> which is considered a unique identifier for a network.</li>
<li>Auto-summary: This feature automatically <strong>summarizes routes to their classful network boundaries</strong>. For example, <strong>a network with a /26 or /27 prefix would be summarized as a /24</strong>. This can lead to subnetting issues and is generally not recommended for most modern networks.</li>
</ul>
<h3 id="heading-eigrp-protocol-configuration-network-2">EIGRP Protocol Configuration Network 2</h3>
<pre><code class="lang-javascript">R2(config)#router eigrp <span class="hljs-number">100</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span>  
R2(config-router)#no auto-summary
R2(config-router)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-eigrp-routing-verification">EIGRP Routing Verification</h2>
<pre><code class="lang-javascript">R1#show ip route  eigrp
</code></pre>
<pre><code class="lang-javascript">R1#show ip protocols
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/acba1e58-6b28-4a29-9414-0a9185fff05a.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1#show ip eigrp neighbors
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/16f51951-4242-472d-8cdf-76700423d32f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7cc3572e-e2f0-4523-913b-866877faa033.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A connection between Network 1 and Network 2 has been established using the EIGRP protocol.</p>
<h1 id="heading-floating-static-route">Floating Static Route</h1>
<p>Static routes have a very low <strong>distance value of 1</strong>. This means the router will prefer a static route over any routes learned through a dynamic routing protocol. If we want to use a static route as a backup route, we should change the administrative distance value of the static route. This is called a <strong>floating static route</strong>.</p>
<h2 id="heading-floating-static-route-1">Floating Static Route</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2bdcdf05-1ab5-4aa8-808f-f26008f1074f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will be establishing dynamic routing between Network 1 in North Sulaymaniyah and Network 2 in South Sulaymaniyah using the EIGRP protocol. A floating static route will be configured as a backup, ensuring network connectivity even if the EIGRP protocol encounters issues.</p>
<h2 id="heading-network-1-basic-ip-configuration-2">Network 1 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-4">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt; ip <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r1-ip-configuration-3">Router R1 IP configuration</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa0/<span class="hljs-number">0</span>   
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit

R1(config)#int fa <span class="hljs-number">2</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit

R1(config)#int fa1/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h2 id="heading-network-2-basic-ip-configuration-2">Network 2 Basic IP Configuration</h2>
<h3 id="heading-pc-ip-address-5">PC IP Address</h3>
<pre><code class="lang-javascript">VPC&gt;  ip <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-router-r2-ip-configuration-1">Router R2 IP configuration</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa1/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit

R2(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit

R2(config)#int fa2/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R2(config-<span class="hljs-keyword">if</span>)#no shu
R2(config-<span class="hljs-keyword">if</span>)#no shutdown 

R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h3 id="heading-router-r3-ip-configuration">Router R3 IP configuration</h3>
<pre><code class="lang-javascript">R3#conf t 
R3(config)#int fa1/<span class="hljs-number">0</span>
R3(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
R3(config-<span class="hljs-keyword">if</span>)#no shut


R3(config-<span class="hljs-keyword">if</span>)#exit
R3(config)#int fa0/<span class="hljs-number">0</span> 
R3(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>     
R3(config-<span class="hljs-keyword">if</span>)#no shut

R3(config-<span class="hljs-keyword">if</span>)#exit
R3(config)#exit
R3#wr
</code></pre>
<h3 id="heading-static-routing-configuration">Static Routing Configuration</h3>
<pre><code class="lang-java">R1(config)#ip route <span class="hljs-number">172.17</span>.<span class="hljs-number">2.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.2</span>.<span class="hljs-number">0.2</span> 
R1(config)#ip route <span class="hljs-number">10.3</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.252</span> <span class="hljs-number">10.2</span>.<span class="hljs-number">0.2</span>  


R3(config)#ip route <span class="hljs-number">172.17</span>.<span class="hljs-number">2.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.3</span>.<span class="hljs-number">0.1</span>
R3(config)#ip route <span class="hljs-number">172.17</span>.<span class="hljs-number">2.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.3</span>.<span class="hljs-number">0.1</span>


 R2(config)#ip route  <span class="hljs-number">172.17</span>.<span class="hljs-number">1.0</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">10.3</span>.<span class="hljs-number">0.2</span>
 R2(config)#ip route  <span class="hljs-number">10.2</span>.<span class="hljs-number">0.0</span>  <span class="hljs-number">255.255</span>.<span class="hljs-number">255.252</span>  <span class="hljs-number">10.3</span>.<span class="hljs-number">0.2</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/46f75d42-4968-40f2-89a2-68f21503d80d.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After configuring the static route, data is forwarded through the static route because of the low administrative distance value.</p>
<h3 id="heading-configure-floating-static-route">Configure Floating Static Route</h3>
<p>Our network topology is configured with EIRGP, and the default distance value of EIRGP is <strong>90</strong> our static route will be used as a backup. Let’s set the distance value to <strong>91</strong>.</p>
<pre><code class="lang-javascript">R1(config)#ip route <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">91</span>
R1(config)#ip route <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span>  <span class="hljs-number">91</span>


 R3(config)#ip route <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">91</span>
 R3(config)#ip route <span class="hljs-number">172.17</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>  <span class="hljs-number">91</span>


  R2(config)#ip route  <span class="hljs-number">172.17</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span>  <span class="hljs-number">91</span>
  R2(config)#ip route  <span class="hljs-number">10.2</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>  <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>  <span class="hljs-number">10.3</span><span class="hljs-number">.0</span><span class="hljs-number">.2</span> <span class="hljs-number">91</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0083f2ec-f5b8-46d7-8f1c-06d6b100727c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After configuring a floating static route, the routers in Network 1 and Network 2  utilize the EIGRP to route data between each other, and the static route works as a backup. </p>
<h2 id="heading-ospf">OSPF</h2>
<ul>
<li><strong>Open Shortest Path First (OSPF)</strong> is a link-state routing protocol that is used to find the best path between the source and the destination router using its own Shortest Path First.</li>
<li>The protocol <strong>recalculates routes when a link fails and the network topology changes,</strong> Using the <strong>Dijkstra(dike·struh) algorithm</strong>, and minimizes the routing protocol traffic that it generates.</li>
<li>It provides a multi-level hierarchy called “area routing” so that information about the topology within the defined area of the AS is hidden from routes outside this area. This enables an additional level of <strong>routing protection</strong> and <strong>reduction in routing protocol traffic</strong>.</li>
<li>All protocol <strong>exchanges can be authenticated</strong> so that only <strong>trusted routers can join in the routing exchanges for the AS</strong></li>
</ul>
<h2 id="heading-benefits-of-ospf">Benefits of OSPF:</h2>
<ul>
<li>Fast convergence.</li>
<li>Efficient use of network resources.</li>
<li>Support for large, complex networks.</li>
<li>Ability to route IPv4 and IPv6 traffic (OSPFv2 for IPv4, OSPFv3 for IPv6).</li>
<li>Redundancy and fault tolerance.</li>
<li>VLSM (Classless Routing) and route summarization</li>
</ul>
<h2 id="heading-ospf-concepts">OSPF Concepts</h2>
<h3 id="heading-area">Area</h3>
<ul>
<li>An <strong>area</strong> is a logical collection of OSPF networks, routers, and links that have the same area identification.</li>
<li>The most important area in OSPF is the <strong>backbone area</strong>, also known as <strong>area 0</strong>. The backbone area is the central area that interconnects all other areas.</li>
<li>In a large network, a single-area design can have negative effects:</li>
<li>The SFP algorithm takes more time to calculate routes and it causes the algorithm to require more processing power. </li>
<li>Any small change in the network causes every router to flood LSAs and run the SPF algorithm again. </li>
<li>By dividing a large OSPF network into several smaller areas, you can avoid the above negative effects.</li>
</ul>
<h3 id="heading-neighbour">Neighbour</h3>
<ul>
<li>Routers running OSPF need to establish a neighbour relationship before exchanging routing updates. Neighbours are dynamically discovered by sending <strong>Hello packets</strong> out of each OSPF-enabled interface.</li>
<li><p><strong>Hello Packets</strong>:</p>
<p>OSPF uses <strong>multicast addresses</strong> to communicate and exchange Hello Packets  between routers </p>
<ul>
<li><strong>224.0.0.5:</strong> All OSPF routers.</li>
<li><strong>224.0.0.6</strong>: All OSPF designated routers (DRs) and backup designated routers (BDRs).</li>
</ul>
</li>
<li><strong>Hello Interval</strong>:<ul>
<li>The OSPF router sends a hello message on an interface. It is <strong>10 seconds</strong> by default.</li>
</ul>
</li>
<li><strong>Dead Interval</strong>:<ul>
<li>The Dead interval is four times the Hello interval, which means a Dead interval of <strong>40 seconds</strong></li>
<li>If a router does not receive at least one Hello packet from a neighbour within the Dead interval, the neighbour is considered <strong>down</strong>.</li>
</ul>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c9a2e39-dcdd-4522-9fb5-230272980263.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-abr-and-asbr">ABR and ASBR</h2>
<ul>
<li><strong>Area Border Router(**</strong>ABR<strong>**):</strong> a router that connects two or more OSPF areas, one of which must be the backbone area (area 0).</li>
<li><strong>Autonomous System Boundary Router(**</strong>ASBR<strong>**)</strong> is a router that connects two different <strong>Autonomous Systems (AS)</strong> and helps them communicate with each other. It usually runs <strong>BGP (Border Gateway Protocol)</strong> to exchange routing information between the <strong>AS</strong>, while <strong>OSPF</strong> is used within an AS. It is responsible for importing and redistributing routes from non-OSPF sources into the OSPF routing source.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/df333687-91c1-4adf-835e-f963f3ef2b6e.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/74a45c7c-c6a5-4bf6-afda-88ad768ff7eb.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-designated-router-and-backup-designated-router">Designated Router and Backup Designated Router</h2>
<ul>
<li><strong>Designated Router (**</strong>DR<strong><strong>) and Backup Designated Router(</strong></strong>BDR<strong>**)</strong> are to act as <strong>a central point for exchanging OSPF information between multiple routers on the same network</strong>. <u>Each non-DR and non-BDR router only exchanges routing information with the DR and BDR</u>, instead of exchanging updates with every router on the segment. This significantly reduces the amount of OSPF updates sent across the network.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b17f8ddf-68fc-4bbd-8254-4d6db245c287.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dr-and-bdr-election">DR and BDR Election</h2>
<p>OSPF uses the following tie-breaker order:</p>
<p>1- <strong>Interface priority</strong> (0–255, <strong>default = 1</strong>; if set to 0, the router never becomes DR/BDR).</p>
<pre><code class="lang-javascript">R1(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
</code></pre>
<p>2- <strong>Highest router ID</strong> is a <strong>32-bit</strong> number that uniquely identifies every OSPF router.</p>
<pre><code class="lang-javascript">R1# conf t 
R1#(config) router ospf <span class="hljs-number">100</span>(OSPF process number).
R1#(config-router)# router-id <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p>3- <strong>Highest IP</strong> address on a loopback address (<strong>first check loopback if no loopback IP configuration, then check physical interface IP</strong>) or an active physical interface.</p>
<blockquote>
<p>💡 - OSPF Router ID should not be changed after the OSPF process has started and the OSPF neighborships have been established. <strong>If you change the OSPF Router ID, we need to either</strong> <strong>reload the IOS</strong> or use the command (<strong><code>clear ip ospf process</code></strong>), for the OSPF Router ID change to take effect. Reloading the IOS or using the command [<strong>clear ip ospf process</strong>] <strong>can cause a temporary network outage.</strong></p>
</blockquote>
<ul>
<li>OSPF Router ID should not be changed after the OSPF process has started and the OSPF neighborships have been established. <strong>If you change the OSPF Router ID, we need to either</strong> <strong>reload the IOS</strong> or use the command (<strong><code>clear ip ospf process</code></strong>), for the OSPF Router ID change to take effect. Reloading the IOS or using the command [<strong>clear ip ospf process</strong>] <strong>can cause a temporary network outage.</strong></li>
</ul>
<blockquote>
<p>💡 <strong>Best Practice (What Network Engineers Prefer)</strong><br /><strong>Use interface priority to control DR/BDR election.</strong>  </p>
<ul>
<li><p>Set the router you want as <strong>DR</strong> with a higher priority (<strong>e.g., 100</strong>).  </p>
</li>
<li><p>Set critical backups as <strong>BDR</strong> with a slightly <strong>lower priority</strong>.  </p>
</li>
<li><p>Set devices that should <strong>never be DR</strong> (like access switches or less powerful routers) to <strong>priority 0</strong>.</p>
</li>
</ul>
</blockquote>
<p>    <strong>Use interface priority to control DR/BDR election.</strong></p>
<ul>
<li>Set the router you want as <strong>DR</strong> with a higher priority (<strong>e.g., 100</strong>).</li>
<li>Set critical backups as <strong>BDR</strong> with a slightly <strong>lower priority</strong>.</li>
<li>Set devices that should <strong>never be DR</strong> (like access switches or less powerful routers) to <strong>priority 0</strong>.</li>
</ul>
<h2 id="heading-loopback-interface-configuration">Loopback Interface Configuration</h2>
<pre><code class="lang-javascript">R1#conf t 
R1(config)#interface loopback <span class="hljs-number">0</span> 
R1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<h2 id="heading-ospf-process-id">OSPF Process ID</h2>
<ul>
<li>The process ID is the ID of the OSPF process to which the interface belongs. The process ID is local to the router, and <strong>two OSPF neighbouring routers can have different OSPF process IDs</strong>. (Not like EIGRP). Cisco IOS software can run <strong>multiple OSPF processes on the same router**</strong>,<strong> The Router ID should be a </strong>positive integer;<strong> for example, </strong>the process ID is 1**</li>
</ul>
<p>## 
<strong>Link State Advertisement</strong> <strong>(LSAs)</strong></p>
<ul>
<li><strong>Link-State Advertisement (LSA)</strong> is a packet used to <strong>share routing and topology information between routers within the same area</strong>. LSAs help OSPF routers build a complete map of the network.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>LSA Type 1:</td><td>Router LSA</td></tr>
</thead>
<tbody>
<tr>
<td>LSA Type 2:</td><td>Network LSA</td></tr>
<tr>
<td>LSA Type 3:</td><td>Summary LSA</td></tr>
<tr>
<td>LSA Type 4:</td><td>Summary ASBR LSA</td></tr>
<tr>
<td>LSA Type 5:</td><td>Autonomous system external LSA</td></tr>
<tr>
<td>LSA Type 6:</td><td>Multicast OSPF LSA</td></tr>
<tr>
<td>LSA Type 7:</td><td>Not-so-stubby area LSA</td></tr>
<tr>
<td>LSA Type 8:</td><td>External attribute LSA for BGP</td></tr>
</tbody>
</table>
</div><h2 id="heading-ospf-concepts-main-lsas">OSPF Concepts: Main LSAs</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>LSA Type</td><td>name</td><td>Generated by</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>LSA Type 1:</td><td>Router LSA</td><td>Generated by each internal router within an area, per area link</td><td>Flooded within an single area only.</td></tr>
<tr>
<td>LSA Type 2:</td><td>Network LSA</td><td>Generated by the DR</td><td>Flooded within a single area only.</td></tr>
<tr>
<td>LSA Type 3:</td><td>Summary LSA</td><td>Generated by the BDR</td><td>Describes inter-area routes</td></tr>
<tr>
<td>LSA Type 4:</td><td>Summary ASBR LSA</td><td>Generated by the ABR.</td><td>Describes the path to the ASBR.</td></tr>
<tr>
<td>LSA Type 5:</td><td>Autonomous system external LSA</td><td>Generated by ASBR.</td><td>Describes the redistributed routes that have been injected into the OSPF domain from an external AS by The ASBR</td></tr>
<tr>
<td>LSA Type 7:</td><td>Not-so-stubby area(NSSAs)  LSA</td><td>Generated by the ASBR, within a not-so-stubby area.</td><td>Describes external routes. sent from ASBR to ABR and converted into a type 5 by the ABR, which then floods to its areas.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eb6fff53-03f3-499c-b605-8b7341c5ab36.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 - <strong>Hello messages</strong> are used for establishing and maintaining OSPF neighbour relationships.  </p>
<ul>
<li><strong>LSAs</strong> are used to share detailed routing and topology information within the OSPF domain.</li>
</ul>
</blockquote>
<ul>
<li><strong>Hello messages</strong> are used for establishing and maintaining OSPF neighbour relationships.</li>
<li><strong>LSAs</strong> are used to share detailed routing and topology information within the OSPF domain.</li>
</ul>
<h2 id="heading-cost">Cost</h2>
<ul>
<li>Open Shortest Path First(OSPF) uses <strong>cost</strong> as the value of metric value and uses a reference bandwidth of <strong>100</strong>  Mbps for cost calculation. The formula to calculate the cost is Reference Bandwidth divided by interface bandwidth. For example, in the case of 10 Mbps Ethernet, OSPF metric cost value is <strong>100 Mbps / 10 Mbps</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5dd369e7-265f-4248-b82e-0c7266db402a.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-modify-the-reference-bandwidth">Modify the reference bandwidth</h3>
<pre><code class="lang-javascript">R1(config-router) **auto-cost reference-bandwidth** <span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">u</span>&gt;</span>megabits-per-second<span class="hljs-tag">&lt;/<span class="hljs-name">u</span>&gt;</span></span>
</code></pre>
<h3 id="heading-manually-configure-the-cost-of-an-interface">Manually configure the cost of an interface:</h3>
<pre><code class="lang-javascript">R1(config-<span class="hljs-keyword">if</span>)**ip ospf cost** <span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">u</span>&gt;</span>cost<span class="hljs-tag">&lt;/<span class="hljs-name">u</span>&gt;</span></span>
</code></pre>
<h3 id="heading-modify-the-interface-bandwidth">Modify the interface bandwidth:</h3>
<pre><code class="lang-javascript">R1(config-<span class="hljs-keyword">if</span>)**bandwith** kilobits-per-second
</code></pre>
<p>Which of these commands can be used to make a FastEthernet interface have an OSPF cost of 100? </p>
<ul>
<li>R(config-router)# auto-cost reference bandwidth 1000</li>
</ul>
<p><strong>Reference bandwidth</strong>/<strong>Interface bandwidth</strong> = cost</p>
<p>10000/100=100</p>
<blockquote>
<p>💡 The SPF algorithm uses the cost of <strong>the outgoing interfaces</strong> toward the destination subnet, including the cost of the interface that connects to the subnet. The logic is illustrated in the following diagram.</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/256d49a1-4ef0-4add-86ad-53cbc9692adf.svg" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-example-scenario"><strong>Example Scenario</strong></h3>
<p><strong>Scenario</strong>: You have two paths from Router A to Router D:</p>
<ol>
<li>Path 1: A → B → D (10 Mbps and 100 Mbps links, respectively).</li>
<li>Path 2: A → C → D (100 Mbps links only).</li>
</ol>
<p><strong>Default Cost Calculation</strong>:</p>
<ul>
<li>Path 1: Cost = 10 (A → B) + 1 (B → D) = <strong>11</strong>.</li>
<li>Path 2: Cost = 1 (A → C) + 1 (C → D) = <strong>2</strong>.</li>
</ul>
<p><strong>Result</strong>:</p>
<ul>
<li>OSPF chooses <strong>Path 2</strong> because it has a lower total cost.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4660f940-1197-4aa6-828f-8b715fbd7784.svg" alt="CCNA 200-301 Study (1)" /></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Path</strong></td><td><strong>Total Cost</strong> [lower is better]</td></tr>
</thead>
<tbody>
<tr>
<td>R1-R2-R3-R4-R5-R8</td><td>5</td></tr>
<tr>
<td>R1-R5-R6-R8</td><td>4</td></tr>
<tr>
<td>R1-R7-R8</td><td>3 (best)</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/12f61c6a-780d-4026-8935-85e70b7f7355.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-wild-card-mask">Wild Card Mask</h2>
<ul>
<li>Wildcard masks are used to specify a range of network addresses. They are usually used with routing protocols <strong>(Such as OSPF) and access lists</strong>.</li>
<li>A Wildcard mask is <strong>32-bit</strong> long. It is an inverted subnet mask, with the zero bits indicating that the corresponding bit position must match the same bit position in the IP address.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a954f024-1d58-49fb-991f-f02db4c35f3b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: Change all 0s to 255 and all 255s to 0. In the second one, the last number is 255 − 192 = 063.</p>
<h3 id="heading-ospf-states">OSPF States</h3>
<ul>
<li><strong>Down State</strong>: No Hello received.</li>
<li><strong>Init State:</strong> Hello packet received, but <strong>no 2-way</strong> communication yet<strong>.</strong> At this stage, Communication is <strong>One-way.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/feb2c433-b1d9-48bd-9449-9fe9686108a7.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>2-Way State</strong>: Bi-directional communication established (seen in DR/BDR election on broadcast/NBMA).</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/25c12e26-abef-4c5e-a6ef-7a4e7c5e6877.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>ExStart State</strong>: Routers decide who will be master/slave for the database description (DBD) exchange.</li>
<li><strong>Exchange State</strong>: Routers <strong>exchange DBD</strong> packets (summaries of LSAs).</li>
<li><strong>Loading State:</strong> Routers send <strong>LSRs</strong> (Link State Requests) for missing <strong>LSAs</strong>.</li>
<li><strong>Full State: LSDBs fully synchronized between neighbors.</strong>.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>ID</td><td>Name</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td>1</td><td><strong>Hello</strong></td><td>Neighbor Discovery and Maintenance</td></tr>
<tr>
<td>2</td><td><strong>Database Description</strong></td><td>Summary of the LSDB of the router.</td></tr>
<tr>
<td>3</td><td><strong>Link-State Request (LSR)</strong></td><td>Request specific LSAs from the neighbor.</td></tr>
<tr>
<td>4</td><td><strong>Link-State Update (LSU)</strong></td><td>Sends specific LSAs to the neighbor.</td></tr>
<tr>
<td>5</td><td><strong>Link -State Acknowledgement(LSAck)</strong></td><td>Used to acknowledge that the router received a massage.</td></tr>
</tbody>
</table>
</div><pre><code class="lang-javascript">Router(config)# router ospf &lt;process-id&gt;      ! Start OSPF process (<span class="hljs-number">1</span>–<span class="hljs-number">65535</span>, local to router)
Router(config-router)# router-id &lt;x.x.x.x&gt;    ! (Optional) <span class="hljs-built_in">Set</span> OSPF Router-ID
Router(config-router)# network &lt;ip&gt; &lt;wildcard&gt; area &lt;area-id&gt;   ! Advertise networks


Router(config)# router ospf 1
Router(config-router)# router-id 1.1.1.1
Router(config-router)# network 192.168.1.0 0.0.0.255 area 0
Router(config-router)# network 10.0.0.0 0.0.0.3 area 0
</code></pre>
<pre><code class="lang-javascript">IR1(config)# router ospf <span class="hljs-number">1</span>
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>

**VS**

R1(config)# router ospf <span class="hljs-number">1</span>
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
</code></pre>
<ul>
<li>Use <strong><code>192.168.1.0 0.0.0.255</code></strong> When enabling OSPF on all interfaces within the <code>192.168.1.0/24</code> subnet.</li>
<li>Use <strong><code>192.168.1.1 0.0.0.0</code></strong> When enabling OSPF on a specific interface with the IP address <code>192.168.1.1</code>.</li>
</ul>
<p><strong>Tip</strong>: To reduce manual configuration effort, use <strong>subnet-based configuration</strong> (<code>192.168.1.0 0.0.0.255</code>) for a larger network or dynamic environment. For specific control or precision, use <strong>interface-based configuration</strong> (<code>192.168.1.1 0.0.0.0</code>).</p>
<h3 id="heading-verification-commands"><strong>Verification Commands</strong></h3>
<pre><code class="lang-javascript">show ip ospf neighbor      ! See adjacency &amp; states
show ip ospf interface     ! Check OSPF timers, priority, area
show ip route ospf         ! Verify OSPF routes
show ip protocols          ! Protocol info &amp; networks advertised
</code></pre>
<h3 id="heading-configuring-a-default-route-in-ospf"><strong>Configuring a Default Route in OSPF</strong></h3>
<pre><code class="lang-javascript">Router(config)# router ospf <span class="hljs-number">1</span>
Router(config-router)# <span class="hljs-keyword">default</span>-information originate always
</code></pre>
<p>The <strong><code>default-information originate always</code></strong> command in OSPF <strong>forces</strong> the advertisement of a default route (<code>0.0.0.0/0</code>) <strong>even if the router does not have a default static route</strong> in its routing table.</p>
<ul>
<li><strong>Without</strong> <strong><code>always</code>**</strong>:** Only advertises if the router already knows a default route.</li>
<li><strong>With</strong> <strong><code>always</code>**</strong>:** Forces advertisement, even if no default exists.</li>
</ul>
<p><img src="https://cdn.networkacademy.io/sites/default/files/2024-08/main-ospf-network-types.svg" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-ospf-on-point-to-point-links"><strong>OSPF on Point-to-Point Links</strong></h3>
<ul>
<li><strong>Point-to-point links</strong> are direct links between two routers.</li>
<li>In OSPF, <strong>point-to-point networks</strong> <strong>do not need DR/BDR elections</strong>.</li>
<li>Each router advertises its <strong>connected networks</strong> via <strong>LSAs (Link-State Advertisements)</strong>.</li>
</ul>
<pre><code class="lang-javascript">Router(config)# interface g0/<span class="hljs-number">0</span> [interface connected to the neighbor router]
Router(config-<span class="hljs-keyword">if</span>)# ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Router(config-<span class="hljs-keyword">if</span>)# ip ospf <span class="hljs-number">1</span> area <span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)# ip ospf network point-to-point
</code></pre>
<h2 id="heading-ccna-ospf-questions">CCNA OSPF  Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dbd9122a-c936-4bb2-9c7d-cda9e2cc7538.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B  (</strong>When multiple routing protocols advertise the same destination, the router installs the route with the <strong>lowest administrative distance (AD)</strong>.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b5b0e4a1-1916-4975-8334-1e9e160366d9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fc80de91-b59b-455c-b2ba-49891eaa40b3.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-check-which-routes-contain-1921681216">Check which routes contain 192.168.12.16</h3>
<ul>
<li><strong>EIGRP: 192.168.12.0/24</strong> → range is 192.168.12.0–192.168.12.255 → ✅ contains 192.168.12.16</li>
<li><strong>RIP: 192.168.12.0/27</strong> → range is 192.168.12.0–192.168.12.31 → ✅ contains 192.168.12.16</li>
<li><strong>OSPF: 192.168.12.0/28</strong> → range is 192.168.12.0–192.168.12.15 → ❌ does <em>not</em> contain 192.168.12.16</li>
</ul>
<p><strong>Apply longest prefix match: 27</strong> (RIP) is more specific than <strong>/24</strong> (EIGRP). (Longest prefix match <strong>always wins</strong>, regardless of administrative distance.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bba59149-0b92-490c-bec0-5353cede3668.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>EIGRP (D):</strong> 192.168.10.0/24 → 192.168.10.0 – 192.168.10.255</li>
<li><strong>RIP (R):</strong> 192.168.10.0/27 → 192.168.10.0 – 192.168.10.31</li>
<li><strong>OSPF (O):</strong> 192.168.10.0/23 → 192.168.10.0 – 192.168.11.255</li>
<li><strong>IS-IS (i L1):</strong> 192.168.10.0/13 → 192.168.8.0 – 192.168.15.255</li>
</ul>
<p>All of these routes include <strong>192.168.10.16</strong>. ✅</p>
<h3 id="heading-apply-the-longest-prefix-match-rule">Apply the <strong>longest prefix match rule</strong></h3>
<ul>
<li>/13 → 8192 addresses (least specific)</li>
<li>/23 → 512 addresses</li>
<li>/24 → 256 addresses</li>
<li>/27 → 32 addresses (most specific)
<strong>Since /27 is the longest prefix (most specific match), the router will choose the RIP route.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/65ae8bde-b8fb-43ee-a05e-427cc8a7c447.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A and D</strong> ✅ (Because both of them have the lowest administrative distance)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/342ef2f2-3861-4fff-8126-0ec322c3255e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C. broadcast</strong> ✅ <strong>Ethernet (including FastEthernet and GigabitEthernet) interfaces</strong>, the default OSPF network type is <strong>broadcast</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/71836118-7100-4e8a-9843-df71c7eae3b4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong> ✅  If a router has <strong>two static routes</strong> to the same destination <strong>with the same administrative distance and metric</strong>, they are considered <strong>equal-cost routes</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7275323d-9f09-4f6b-a5d5-66d207f27209.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong> ✅
 The OSPF route present is <strong>10.10.13.0/25</strong> (via two next-hops). That covers addresses <strong>10.10.13.0–10.10.13.127</strong>. The destination in question is <strong>10.10.13.128/25</strong> (addresses <strong>10.10.13.128–10.10.13.255</strong>), which is a different /25, and <strong>no route</strong> for that network appears in the table. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/08e52295-45ee-46c9-8fbf-dfb50ce771fb.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A B✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a7a6f27e-f1e2-4092-a4f9-44d106b20c0d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5fdcfcfb-1517-42c1-803a-09c81d45b82b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/643aee0c-1699-4454-9afb-8c5e366adb6e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A B E ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/32341717-7412-4e1b-a75a-283da7e36bc4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C E ✅</strong>  </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/88e628f2-01eb-49a6-a0cf-f57ad35a5bf5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D ✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/08183ffe-c8b9-4d0b-86af-7c959dedab73.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D E ✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6df1cd11-648c-43d3-b527-170bac5afb88.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D ✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3601642-6705-45ba-92ab-597ab91ba402.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d950fbe1-59cc-463b-8734-4f68cc732242.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b48cb89f-fddc-456e-bb66-956df7997318.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A ✅</strong> 
The OSPF neighbors are stuck in the <strong>EXCHANGE state</strong>. This usually happens when the routers have <strong>different MTU sizes</strong>, so they cannot finish sharing database packets. Making both MTUs the same will let OSPF move to the <strong>FULL state</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/04011166-4a97-4f51-ba05-021cc1388861.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C.</strong>  ✅
R1 has no default route, so it can’t advertise one with <code>default-information originate</code>. Adding a static default (<code>ip route 0.0.0.0 0.0.0.0 10.10.10.18</code>Let's R1 reach the Internet and share the route with R2 and Site B.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/266a40e8-4cc0-4d1e-a4a2-f70b87cf7f81.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D.</strong>  ✅
Changing the interface to <strong><code>ip ospf network point-to-point</code></strong> removes the DR/BDR election and makes the adjacency form as FULL/- instead of FULL/DR.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Neighbor State</strong></td><td><strong>What it Means</strong></td><td><strong>When it Happens</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>FULL/DR</strong></td><td>Neighbor is fully adjacent, and the neighbor is the <strong>Designated Router (DR)</strong>.</td><td>On broadcast/multi-access networks (like Ethernet) when the neighbor wins DR election.</td></tr>
<tr>
<td><strong>FULL/BDR</strong></td><td>Neighbor is fully adjacent, and the neighbor is the <strong>Backup Designated Router (BDR)</strong>.</td><td>On broadcast/multi-access networks when the neighbor is elected as BDR.</td></tr>
<tr>
<td><strong>FULL/-</strong></td><td>Neighbor is fully adjacent, but there is <strong>no DR/BDR election</strong>.</td><td>On <strong>point-to-point</strong> links, point-to-multipoint links, or loopbacks.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/844fb805-9471-4f7b-9da3-b9eda529e416.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C.</strong>  ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bccdbe76-6536-4ab0-9f62-3750d392332d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C.</strong>  ✅ [During adjacency formation, OSPF checks that both neighbors have the <strong>same MTU</strong>.]</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ec1a0913-bbea-4a05-94d1-df0d1b856cb7.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D F</strong>  ✅ </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eae8c563-8c3b-4788-870f-9f201fe08bc7.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Network 192.168.12.64 0.0.0.63 equals to network 192.168.12.64/26. </p>
<p>192.168.12.64(Net ID) <strong>[192.168.12.65-192.168.12.126]</strong> 192.168.12.127(Broadcast Address) (Increment: 64)</p>
<p><strong>B</strong>  <strong>C D</strong>✅ </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/53ee5a4d-2fd6-40aa-b968-0e7cd39e0714.png" alt="CCNA 200-301 Study (1)" /></p>
<p>R2 has several possible sources for 10.1.1.0/24 (static, eBGP, OSPF, and EIGRP is misconfigured).</p>
<p>Cisco routers pick the route with the <strong>lowest administrative distance static route (0)</strong></p>
<p><strong>A✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/615ac903-e110-44a6-a3b3-e5354e7faf46.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Internet:</strong> 10.10.10.16, 10.10.13.129, 10.10.100.128</p>
<p><strong>Router1:</strong> 10.10.13.1, 10.10.13.150</p>
<p><strong>Why:</strong> Router2 has OSPF routes only for <strong>10.10.13.0/25</strong> and <strong>10.10.13.144/28</strong> (to Router1). Addresses outside those (10.10.10.16, 10.10.13.129, 10.10.100.128) match no specific route, so they go via the <strong>default route to the Internet (0.0.0.0/0 → 10.10.10.13)</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f811ae67-ea20-4ba0-bc2f-bcfae4e80779.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ef2ee3a2-7113-4fa6-903c-7667d743df2a.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-d"><strong>D✅</strong></h3>
<p>🔑 Easy Trick:</p>
<ol>
<li><p><strong>Look at the lowest subnet</strong></p>
<p> → Here it’s <code>10.1.40.0/25</code>.</p>
</li>
<li><p><strong>Look at the highest subnet</strong></p>
<p> → Here it’s <code>10.1.41.224/29</code>.</p>
</li>
<li><p><strong>Find the smallest network that covers from lowest to highest</strong>:</p>
<ul>
<li>Lowest = 10.1.40.x</li>
<li><p>Highest = 10.1.41.x</p>
<p>  👉 Both fall under <code>10.1.40.0/23</code>.</p>
</li>
</ul>
</li>
<li><p><strong>Check the options</strong></p>
<ul>
<li>Only <code>/23</code> includes both 10.1.40.x <strong>and</strong> 10.1.41.x.</li>
</ul>
</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a1065b52-9985-4545-aa3c-0f6cc1d4d71d.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A and D have <strong>MTU mismatches</strong> (1400 vs 1500) — risky for adjacency/DBD.</p>
<p><strong>Option B</strong>:</p>
<ul>
<li>The commands are presented in a scrambled/incorrect place (some <code>ip ospf priority</code>/<code>router-id</code> appear under the wrong context), so it’s not a clean, valid interface-level OSPF config even though it tries to make R14 the DR.</li>
</ul>
<p>C<strong>✅</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9c99236f-2e4a-4c6f-b6d7-a91c9f3b0834.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>A:</strong> MTU mismatch (R86 uses MTU 1400) — can break adjacency/DBD exchange.</li>
<li><strong>B:</strong> The commands are presented in a scrambled/incorrect place (some <code>ip ospf priority</code>/<code>router-id</code> appear under the wrong context), so it’s not a clean, valid interface-level OSPF config even though it tries to make R14 the DR.</li>
<li><strong>C:</strong> R14 is set to <strong>priority 0</strong> (cannot become DR), so it cannot be the central point.</li>
</ul>
<p><strong>D✅</strong> </p>
<h2 id="heading-single-area-ospf-configuration">Single Area OSPF Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b07fb750-0d97-4d59-adb8-994df97671f5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will configure an <strong>OSPF Single Area (Area 0) Configuration</strong> for an enterprise setup with a <strong>central data center</strong> and two <strong>branch offices</strong>.</p>
<h3 id="heading-key-components"><strong>Key Components:</strong></h3>
<ul>
<li><strong>IQ Sulaymaniyah Data Center</strong>: Hosts an <strong>ERP web server</strong>, a switch, and <strong>IQSUL-DC1-RT1</strong>, which connects to the <strong>Internet</strong> and branches via <strong>IQ-Core-RT1</strong>.</li>
<li><strong>IQ Core Router (IQ-Core-RT1)</strong>: The main hub, linking the data center to branches using <strong>/30 P2P connections</strong>.</li>
<li><strong>IQ Large Branch</strong>: Has <strong>two routers (LB-RT1 &amp; LB-RT2)</strong> for redundancy, with <strong>10.20.1.0/24</strong> and <strong>10.20.2.0/24</strong> subnets for end-user PCs.</li>
<li><strong>IQ Small Branch</strong>: Uses <strong>IQSUL-SB-RT1</strong> and the <strong>10.20.3.0/24</strong> subnet for local PCs.</li>
</ul>
<h1 id="heading-basic-ip-configuration">Basic IP Configuration</h1>
<h3 id="heading-end-point-devices-ip-configuration-vpc">End-Point Devices IP configuration  (VPC)</h3>
<pre><code class="lang-javascript">LB-PC1&gt; ip <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
LB-PC1&gt; save



LB-PC2&gt; ip <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
LB-PC2&gt; save



SB-PC1&gt; ip <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
SB-PC1&gt; save
</code></pre>
<h3 id="heading-iq-large-branch-routers-ip-configuration">IQ Large  Branch Routers IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-LB-RT1#
IQSUL-LB-RT1#conf t
IQSUL-LB-RT1(config)#int fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-LB-RT1(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span> 
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-LB-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-LB-RT1(config)#exit
IQSUL-LB-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IQSUL-LB-RT2#
IQSUL-LB-RT2#conf t
IQSUL-LB-RT2(config)#int fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#exit


IQSUL-LB-RT2(config)#int fa1/<span class="hljs-number">0</span>
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#no shut 
IQSUL-LB-RT2(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-LB-RT2(config)#exit
IQSUL-LB-RT2#wr
</code></pre>
<h3 id="heading-iq-large-branch-routers-ip-configuration-1">IQ Large  Branch Routers IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-SB-RT1#conf t
IQSUL-SB-RT1(config)#int fa0/<span class="hljs-number">0</span>
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#exit   
IQSUL-SB-RT1(config)#int fa1/<span class="hljs-number">0</span>
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-SB-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-SB-RT1(config)#exit
IQSUL-SB-RT1#wr
</code></pre>
<h3 id="heading-iq-core-router-ip-configuration">IQ Core Router IP Configuration</h3>
<pre><code class="lang-javascript">IQ-Core-RT1#conf t 
IQ-Core-RT1(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

IQ-Core-RT1(config)#int fa <span class="hljs-number">3</span>/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

IQ-Core-RT1(config)#int fa1/<span class="hljs-number">0</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

IQ-Core-RT1(config)#int fa2/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut

IQ-Core-RT1(config)#exit
IQ-Core-RT1#wr
</code></pre>
<h3 id="heading-iq-data-center-router-ip-configuration">IQ Data Center Router IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-DC1-RT1#conf t 
IQSUL-DC1-RT1(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-RT1(config)#int fa <span class="hljs-number">2</span>/<span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-DC1-RT1(config)#int fa0/<span class="hljs-number">0</span> 
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.248</span> 
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-DC1-RT1(config)#exit
IQSUL-DC1-RT1#wr
</code></pre>
<pre><code class="lang-javascript">
Internet#conf t 
Internet(config)#int fa0/<span class="hljs-number">0</span>
Internet(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Internet(config-<span class="hljs-keyword">if</span>)#no shut
Internet(config-<span class="hljs-keyword">if</span>)#exit
Internet(config)#exi
</code></pre>
<h3 id="heading-iq-web-server-ip-configuration">IQ Web Server  IP Configuration</h3>
<pre><code class="lang-javascript">IQSUL-DC1-WEB1#conf t 
IQSUL-DC1-WEB1(config)#int fa0/<span class="hljs-number">0</span> 
IQSUL-DC1-WEB1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.248</span> 
IQSUL-DC1-WEB1(config-<span class="hljs-keyword">if</span>)#no shut
IQSUL-DC1-WEB1(config-<span class="hljs-keyword">if</span>)#exit
IQSUL-DC1-WEB1(config)#exit
IQSUL-DC1-WEB1#wr
</code></pre>
<h1 id="heading-ospf-configuration">OSPF Configuration</h1>
<h3 id="heading-iq-large-branch-ospf-configuration">IQ Large  Branch OSPF Configuration</h3>
<pre><code class="lang-javascript">IQSUL-LB-RT1#conf t
IQSUL-LB-RT1(config)#
IQSUL-LB-RT1(config)#router ospf <span class="hljs-number">1</span>
IQSUL-LB-RT1(config-router)#router-id <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
IQSUL-LB-RT1(config-router)#network <span class="hljs-number">10.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT1(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT1(config-router)#exit
IQSUL-LB-RT1(config)#exit
IQSUL-LB-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IQSUL-LB-RT2#conf t
IQSUL-LB-RT2(config)#
IQSUL-LB-RT2(config)#router ospf <span class="hljs-number">1</span> 
IQSUL-LB-RT2(config-router)#router-id <span class="hljs-number">2.2</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> 
IQSUL-LB-RT2(config-router)#network <span class="hljs-number">10.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQSUL-LB-RT2(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-LB-RT2(config-router)#exit
IQSUL-LB-RT2(config)#exit
IQSUL-LB-RT2#exit 
IQSUL-LB-RT2#wr
</code></pre>
<h3 id="heading-iq-small-branch-routers-ospf-configuration">IQ Small Branch Routers OSPF Configuration</h3>
<pre><code class="lang-javascript">IQSUL-SB-RT1#conf t
IQSUL-SB-RT1(config)#
IQSUL-SB-RT1(config)#router ospf <span class="hljs-number">1</span>
IQSUL-SB-RT1(config-router)#router-id <span class="hljs-number">3.3</span><span class="hljs-number">.3</span><span class="hljs-number">.3</span>
IQSUL-SB-RT1(config-router)#network <span class="hljs-number">10.20</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span> 
IQSUL-SB-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span>  area <span class="hljs-number">0</span>
IQSUL-SB-RT1(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-SB-RT1(config-router)#exit
IQSUL-SB-RT1(config)#exit
IQSUL-SB-RT1#
IQSUL-SB-RT1#wr
</code></pre>
<h3 id="heading-iq-core-router-ospf-configuration">IQ Core Router OSPF Configuration</h3>
<pre><code class="lang-javascript">IQ-Core-RT1#
IQ-Core-RT1#conf t 
IQ-Core-RT1(config)#int fa0/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config)#int fa3/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQ-Core-RT1(config)#<span class="hljs-keyword">in</span> fa1/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQ-Core-RT1(config)#<span class="hljs-keyword">in</span> fa2/<span class="hljs-number">0</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
IQ-Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
IQ-Core-RT1(config)#exit
IQ-Core-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IQ-Core-RT1#conf t
IQ-Core-RT1(config)#
IQ-Core-RT1(config)#router ospf <span class="hljs-number">1</span>
IQ-Core-RT1(config-router)#router-id <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.10</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQ-Core-RT1(config-router)#exit
IQ-Core-RT1(config)#EXIT
IQ-Core-RT1#clear ip ospf proces
</code></pre>
<h3 id="heading-iq-data-center-router-ospf-configuration">IQ Data Center Router OSPF Configuration</h3>
<pre><code class="lang-javascript">IQSUL-DC1-RT1#
IQSUL-DC1-RT1#conf t
IQSUL-DC1-RT1(config)#router ospf <span class="hljs-number">1</span>
IQSUL-DC1-RT1(config-router)#router-id <span class="hljs-number">6.6</span><span class="hljs-number">.6</span><span class="hljs-number">.6</span>
IQSUL-DC1-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.4</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span> 
IQSUL-DC1-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.7</span> area <span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
IQSUL-DC1-RT1(config-router)#exit
IQSUL-DC1-RT1(config)#exit
IQSUL-DC1-RT1#exit
</code></pre>
<p>debug ip icmp
debug ip packet detail</p>
<h2 id="heading-multi-area-ospf-configuration">Multi-Area OSPF Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aa8e9675-efd5-4ea4-bb01-3cde45a9996c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will configure a <strong>multi-area OSPF</strong> network within a single autonomous system for a travel technology company.</p>
<ul>
<li><strong>Area 0 (Backbone):</strong> Connects all areas and external networks.</li>
<li><strong>Area 4 (Dev &amp; IT):</strong> Hosts development resources and IT infrastructure.</li>
<li><strong>Area 8 (Booking &amp; API Servers):</strong> Houses critical booking and payment servers.</li>
<li><strong>Area 26 (Customer Support):</strong> Manages customer support operations.</li>
</ul>
<h1 id="heading-basic-ip-configuration-1">Basic IP Configuration</h1>
<h3 id="heading-core-routers-ip-configuration">Core Routers IP Configuration</h3>
<pre><code class="lang-javascript">Core-RT1#conf t                       
Core-RT1(config)#int fa0/<span class="hljs-number">0</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

Core-RT1(config)#int fa1/<span class="hljs-number">0</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT1(config-<span class="hljs-keyword">if</span>)#exit

Core-RT1(config)#int fa2/<span class="hljs-number">0</span>
Core-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Core-RT1(config-<span class="hljs-keyword">if</span>)#no shut


Core-RT1(config-<span class="hljs-keyword">if</span>)#exit
Core-RT1(config)#exit
Core-RT1#wr
</code></pre>
<pre><code class="lang-javascript">Core-RT2#conf t
Core-RT2(config)#int fa0/<span class="hljs-number">0</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#no shu

Core-RT2(config-<span class="hljs-keyword">if</span>)#exit
Core-RT2(config)#int fa1/<span class="hljs-number">0</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Core-RT2(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT2(config-<span class="hljs-keyword">if</span>)#exit

Core-RT2(config)#int fa2/<span class="hljs-number">0</span>
Core-RT2(config-<span class="hljs-keyword">if</span>)#ip add  <span class="hljs-number">10.10</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
Core-RT2(config-<span class="hljs-keyword">if</span>)#no shut
Core-RT2(config-<span class="hljs-keyword">if</span>)#exit
Core-RT2(config)#exit
Core-RT2#wr
</code></pre>
<h3 id="heading-area-border-router-abr-ip-configuration">Area Border Router (ABR) IP Configuration</h3>
<pre><code class="lang-javascript">ABR1#conf t
ABR1(config)#int fa0/<span class="hljs-number">0</span> 
ABR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ABR1(config-<span class="hljs-keyword">if</span>)#no shut
ABR1(config-<span class="hljs-keyword">if</span>)#exit

ABR1(config)#int fa1/<span class="hljs-number">0</span>
ABR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ABR1(config-<span class="hljs-keyword">if</span>)#no shut
ABR1(config-<span class="hljs-keyword">if</span>)#exit
ABR1(config)#int fa2/<span class="hljs-number">0</span>
ABR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
ABR1(config-<span class="hljs-keyword">if</span>)#no shut
ABR1(config-<span class="hljs-keyword">if</span>)#exit
ABR1(config)#exit
ABR1#wr
</code></pre>
<pre><code class="lang-javascript">ARB2(config)#int fa1/<span class="hljs-number">0</span>
ARB2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
ARB2(config-<span class="hljs-keyword">if</span>)#no shut
ARB2(config-<span class="hljs-keyword">if</span>)#exit

ARB2(config)#int fa0/<span class="hljs-number">0</span>
ARB2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ARB2(config-<span class="hljs-keyword">if</span>)#no shut
ARB2(config-<span class="hljs-keyword">if</span>)#exit
ARB2(config)#exit
ARB2#wr
</code></pre>
<h3 id="heading-autonomous-system-border-router-asbr-ip-configuration">Autonomous System Border Router  (ASBR) IP Configuration</h3>
<pre><code class="lang-javascript">ASBR1(config)#int fa1/<span class="hljs-number">0</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#no shut 
ASBR1(config-<span class="hljs-keyword">if</span>)#exit
ASBR1(config)#int fa0/<span class="hljs-number">0</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
ASBR1(config-<span class="hljs-keyword">if</span>)#no shut
ASBR1(config-<span class="hljs-keyword">if</span>)#exit
ASBR1(config)#exit
ASBR1#wr
</code></pre>
<h3 id="heading-support-router-and-end-device-ip-configuration">Support Router and End-Device  IP Configuration</h3>
<pre><code class="lang-javascript">Support-RT1#conf t
Support-RT1(config)#int fa0/<span class="hljs-number">0</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Support-RT1(config-<span class="hljs-keyword">if</span>)#exit
Support-RT1(config)#int fa1/<span class="hljs-number">0</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
Support-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Support-RT1(config-<span class="hljs-keyword">if</span>)#exit
Support-RT1(config)#exit
Support-RT1#q 
Support-RT1#wr
</code></pre>
<pre><code class="lang-javascript">Support-PC01&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
Support-PC01&gt; save
</code></pre>
<h3 id="heading-booking-router-and-end-device-ip-configuration">Booking Router and End-Device  IP Configuration</h3>
<pre><code class="lang-javascript">Booking-RT1#conf t
Booking-RT1(config)#int fa0/<span class="hljs-number">0</span>
Booking-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
Booking-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Booking-RT1(config-<span class="hljs-keyword">if</span>)#exit
Booking-RT1(config)#int f1/<span class="hljs-number">0</span>
Booking-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>  
Booking-RT1(config-<span class="hljs-keyword">if</span>)#no shut
Booking-RT1(config-<span class="hljs-keyword">if</span>)#exit
Booking-RT1(config)#exit
Booking-RT1#wr
</code></pre>
<pre><code class="lang-javascript">API-SRV&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
API-SRV&gt; save
</code></pre>
<pre><code class="lang-javascript">PAY-SRV&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.3</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
PAY-SRV&gt; save
</code></pre>
<h3 id="heading-devampit-router-and-end-device-ip-configuration">DEV&amp;IT Router and End-Device  IP Configuration</h3>
<pre><code class="lang-javascript">DEVOPS-RT1#conf t                      
DEVOPS-RT1(config)#int fa0/<span class="hljs-number">0</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#no shut
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#exit

DEVOPS-RT1(config)#int fa1/<span class="hljs-number">0</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#no shut
DEVOPS-RT1(config-<span class="hljs-keyword">if</span>)#exit
DEVOPS-RT1(config)#exit
DEVOPS-RT1#wr
</code></pre>
<pre><code class="lang-javascript">IT-PC01&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span>/<span class="hljs-number">24</span> <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span>
IT-PC01&gt; save
</code></pre>
<h1 id="heading-ospf-configuration-1">OSPF Configuration</h1>
<h3 id="heading-area-border-router-abr-1-ospf-configuration">Area Border Router (ABR) 1 OSPF Configuration</h3>
<pre><code class="lang-javascript">ABR1(config)#router ospf <span class="hljs-number">10</span>
ABR1(config-router)#router-id <span class="hljs-number">12.12</span><span class="hljs-number">.12</span><span class="hljs-number">.12</span> 
ABR1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">4</span>
ABR1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.6</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">8</span>
ABR1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
ABR1(config-router)#exit
ABR1(config)#exit
ABR1#wr
</code></pre>
<h3 id="heading-devampit-router-ospf-configuration">DEV&amp;IT Router OSPF Configuration</h3>
<pre><code class="lang-javascript">DEVOPS-RT1#conf t
DEVOPS-RT1(config)#router ospf <span class="hljs-number">1</span>
DEVOPS-RT1(config-router)#router-id <span class="hljs-number">4.4</span><span class="hljs-number">.4</span><span class="hljs-number">.4</span>
DEVOPS-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.7</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">4</span>
DEVOPS-RT1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.3</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">4</span>
DEVOPS-RT1(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
DEVOPS-RT1(config-router)#exit
DEVOPS-RT1(config)#exit
DEVOPS-RT1#wr
</code></pre>
<h3 id="heading-booking-router-ospf-configuration">Booking Router OSPF Configuration</h3>
<pre><code class="lang-idris">Booking-RT1(config)#router ospf 8
Booking-RT1(config-router)#router-id 8.8.8.8
Booking-RT1(config-router)#network 10.1.6.1 0.0.0.0 area 8
Booking-RT1(config-router)#network 172.16.2.0 0.0.0.255 area 8
Booking-RT1(config-router)#passive-interface fa1/0
Booking-RT1(config-router)#exit
Booking-RT1(config)#exit
Booking-RT1#wr
</code></pre>
<h3 id="heading-area-border-router-abr-2-ospf-configuration">Area Border Router (ABR) 2 OSPF Configuration</h3>
<pre><code class="lang-javascript">ARB2(config)#router ospf <span class="hljs-number">11</span>
ARB2(config-router)#router-id <span class="hljs-number">12.12</span><span class="hljs-number">.12</span><span class="hljs-number">.12</span>
ARB2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
ARB2(config-router)# network <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">26</span> 
ARB2(config-router)#exit              
ARB2(config)#exit
ARB2#wr
</code></pre>
<h3 id="heading-support-router-ospf-configuration">Support Router OSPF Configuration</h3>
<pre><code class="lang-javascript">Support-RT1(config)#router ospf <span class="hljs-number">26</span>
Support-RT1(config-router)#router-id <span class="hljs-number">9.9</span><span class="hljs-number">.9</span><span class="hljs-number">.9</span> 
Support-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.5</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">26</span>
Support-RT1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>  <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">26</span>
Support-RT1(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
Support-RT1(config-router)#exit
Support-RT1(config)#exit
Support-RT1#
</code></pre>
<h3 id="heading-core-routers-ospf-configuration">Core Routers OSPF Configuration</h3>
<pre><code class="lang-javascript">Core-RT1(config)#router ospf <span class="hljs-number">5</span>
Core-RT1(config-router)#router-id <span class="hljs-number">3.3</span><span class="hljs-number">.3</span><span class="hljs-number">.3</span>
Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>   
Core-RT1(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span> 
Core-RT1(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span> 
Core-RT1(config-router)#exit
Core-RT1(config)#exit
</code></pre>
<pre><code class="lang-javascript">
Core-RT2#conf t
Core-RT2(config)#router ospf <span class="hljs-number">6</span>
Core-RT2(config-router)#router-id <span class="hljs-number">2.2</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span>
Core-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.3</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
Core-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
Core-RT2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>
Core-RT2(config-router)#exit
Core-RT2(config)#exit
Core-RT2#
</code></pre>
<h2 id="heading-verify-ospf-configuration">Verify OSPF Configuration</h2>
<pre><code class="lang-javascript">R#show ip ospf neighbor
R# show ip ospf neighbor detail
</code></pre>
<pre><code class="lang-javascript">R#show ip ospf interface brief
</code></pre>
<pre><code class="lang-javascript">R# debug ip ospf adj
</code></pre>
<pre><code class="lang-javascript">R# debug ip ospf ?
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>adj</td><td>OSPF adjacency events</td></tr>
</thead>
<tbody>
<tr>
<td>capability</td><td>OSPF Capability</td></tr>
<tr>
<td>database-timer</td><td>OSPF database timer</td></tr>
<tr>
<td>events</td><td>OSPF events</td></tr>
<tr>
<td>flood</td><td>OSPF flooding</td></tr>
<tr>
<td>hello</td><td>OSPF hello events</td></tr>
<tr>
<td>lsa-generation</td><td>OSPF lsa generation</td></tr>
<tr>
<td>monitor</td><td>OSPF spf monitoring</td></tr>
<tr>
<td>tree</td><td>OSPF database tree</td></tr>
<tr>
<td>packet</td><td>OSPF packets</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c172994b-e7d3-4216-9ba1-1fc03eb3c958.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-lab">LAB</h2>
<h2 id="heading-ospf-configuration-single-area">OSPF configuration Single Area</h2>
<pre><code class="lang-javascript">R1(confgi)# router ospf <span class="hljs-number">1</span>[process id] 
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span> [backbone area]
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span>



R2(confgi)# router ospf <span class="hljs-number">1</span>[process id] 
R2(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span> [backbone area]
R2(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> [wildcard mask] area <span class="hljs-number">0</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/baf43db8-acca-4091-b206-b7d22558b1ce.png" alt="CCNA 200-301 Study (1)" /></p>
<p>.</p>
<pre><code class="lang-javascript">R1(confgi)# show ip ospf interface
</code></pre>
<p>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a09b0add-e542-4d12-baa9-7b40aa06f94e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, The router connected into two interfaces[<strong>192.168.0.10-192.168.1.10</strong>] <strong>highest</strong> IP address elected as a router ID <strong>192.168.1.10</strong> is the router ID. </p>
<p>Also selected as a <strong>DR</strong> and the another router selected as a <strong>BDR</strong></p>
<pre><code class="lang-javascript">Router#show ip ospf neighbor
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9f5960b6-29ff-424b-8d34-25bce572e712.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-implementing-single-area-cost">Implementing Single Area cost</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8fd66ba1-81dd-4e31-91a8-a4204f707c32.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To know which path used by the OSPF to send data to other computer we use the command below on the on PC0 </p>
<p>.</p>
<pre><code class="lang-javascript">tracert [ip]
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/800d398a-debe-41c7-8564-735102db6d32.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-we-using-exit-ports-to-count-cost">We using exit ports to count cost</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f6f90c43-fda0-465a-9964-7b069b5fd56a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Note: as you can see the cost of Fast Ethernet =1  and the summation of all existing interfaces = 4
but cost of Ethernet = 10 + 3 Fast Ethernet = 13 not acceptable by  OSPF. </p>
<h2 id="heading-dr-and-bdr-election-1">DR and BDR Election</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/17531cdb-2386-4eb5-a526-5bcdc8710e4d.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 In this example, Router ID is not configured and the IP Address of the router is defined as a Router ID </p>
</blockquote>
<ul>
<li>Using this command below you could track every step of the process of the election</li>
</ul>
<pre><code class="lang-javascript">Router#debug ip ospf adj
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c9848537-8e6f-451b-ada5-e01e59dc320b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The highest IP address was elected as DR and the second Highest IP address was elected as BDR.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/de49ce53-5ef4-4442-98de-5513fb0b1477.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5b8a9f08-ac63-4116-aebb-e787a6316542.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When Router is configured OSPF protocol elects the highest ID as a DR and the second Highest as a BDR.</p>
<h2 id="heading-multi-area-ospf-configuration-1">Multi-Area OSPF Configuration</h2>
<p>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/218a10da-c50f-4c23-b7f9-f02a627c1b94.png" alt="CCNA 200-301 Study (1)" /></p>
<p>At first, adding both two areas to the R1 and setting a higher router Id to become Designated Router (RD) </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4ef93d7e-13f1-4534-856d-1f564b17543e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>After OSPF configuration was added to the topology, a static route was applied between these two routers:</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/283880fd-dfaa-4ebb-9a94-6ed05ccdfcf4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Now after adding the default route pc can't reach 8.8.8.8 defined as an internet </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/83ba3df1-f536-4bcd-bb72-2aedfa609e31.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The reason for the unreachable is that the no default route add to the OSPF routing table</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b7b9c483-1c5d-427a-bc39-46ef8a1d679a.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config)#router ospf <span class="hljs-number">1</span>
Router(config-router)#<span class="hljs-keyword">default</span>-information originate
</code></pre>
<p>use the command to automatically share the <strong>default route</strong> with other OSPF routers </p>
<p>Note: in packet tracer, only <strong>default-information originate</strong>  working but at EVE you can use extra commands </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/96a1e338-124d-4930-a1e2-ed2ad483a478.png" alt="CCNA 200-301 Study (1)" /></p>
<p>it is better to use <strong>always</strong> with this command, which always means if the connection drops the default route continuously routing the default route. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ff488dc0-2560-4252-b179-5cb975d957ad.png" alt="CCNA 200-301 Study (1)" /></p>
<p>then open one of the OSPF routers you and enter show ip route </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/326bf081-6934-4fe3-a09b-ea7acf4c3c9f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, Default Route was added to the routing table through OSPF as an external network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/36f31236-a0f5-44a4-950d-ba163edd5cb1.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dynamic-addressing-with-dhcp">Dynamic Addressing with DHCP</h2>
<h1 id="heading-dynamic-addressing-with-dhcp-1">Dynamic Addressing with DHCP</h1>
<p><strong>DHCP(Dynamic Host Configuration Protocol)</strong> is a network protocol that is used to assign unique IP address to a network devices. </p>
<p>DHCP is a <strong>client-server protocol</strong>. <strong>A Client DHCP</strong> is a device that configured to use DHCP Services From DHCP Server. <strong>A DHCP Server</strong> maintains a pool of available IP addresses and assign them to hosts. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1071bf40-ebc4-4cef-a9e9-3039e1473072.png" alt="CCNA 200-301 Study (1)" /></p>
<p>DHCP is generally the preferred method of assigning IPv4  addresses to hosts on large networks because it <strong>reduces the burden on network support staff and virtually eliminates entry errors</strong>.</p>
<p>Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of time. <strong>If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is especially useful with mobile users that can come and go on a network</strong>. </p>
<p><strong>Lease time in DHCP</strong> refers to the amount of time that a DHCP server assigns an IP address to a client device. During this time, the client can use the assigned IP address without needing to request a new one. Once the lease expires, the client must either renew the lease or request a new IP address from the server.</p>
<blockquote>
<p>💡 The wireless Router is both <strong>DHCP Server-Client</strong>, acts as a client to receive its IPv4  configuration from the ISP, and then acts as a DHCP server for internal hosts on the local  network.</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/04c62191-7b5d-43b2-b7a7-016f91487596.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>A DHCP Client sends a (<strong>DHCP Discover</strong>) to discover DHCP servers on the LAN network. DHCP Discover is a broadcast packet with a <strong>Destination IPV4 address</strong> of <strong>255.255.255.255</strong> and a <strong>Destination MAC address</strong> of  <strong>FF:FF:FF:FF:FF:FF</strong>.</li>
<li>A DHCP Server receives the <strong>DHCP Discover</strong> packet and responds with <strong>DHCP offer</strong> packets, offering IP addressing information.</li>
<li>If the client receives the DHCP offer packets from multiple DHCP servers, the first DHCP offer is accepted.  the client responds by broadcasting a <strong>DHCP Request packet</strong>.</li>
<li>The DHCP server approves the lease with a <strong>DHCP acknowledgment</strong> packet, which includes lease duration and other configuration information.</li>
</ol>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Discover</td><td>Client→ Server</td><td><strong>Broadcast</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Offer</td><td>Server → Client</td><td><strong>Broadcast or Unicast</strong></td></tr>
<tr>
<td>Request</td><td>Client → Server</td><td><strong>Broadcast</strong></td></tr>
<tr>
<td>ACK</td><td>Server → Client</td><td><strong>Broadcast or Unicast</strong></td></tr>
</tbody>
</table>
</div><p>Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?</p>
<ul>
<li><strong>Broadcast DHCPREQUEST</strong></li>
</ul>
<p><strong>Which three statements describe a DHCP Discover message? (Choose three.)</strong></p>
<ul>
<li>The destination IP address is <strong>255.255.255.255</strong>.</li>
<li>The message comes from a client <strong>seeking an IP address</strong>.</li>
<li>All hosts receive the message, <strong>but only a DHCP server replies</strong>.</li>
</ul>
<h2 id="heading-dhcp-relay-agent">DHCP Relay agent</h2>
<p>When a device is configured as a Dynamic Host Configuration Protocol (DHCP) client, it sends a broadcast packet to discover DHCP servers on the network. Routers don't forward broadcast packets by default. I<strong>f the DHCP server is on a different network from the DHCP clients, it won't receive the DHCP discover packets from the clients.</strong> </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7bf03135-2e8c-42ea-8776-07a8919dd7a9.webp" alt="CCNA 200-301 Study (1)" /></p>
<p>R2 can be configured as a DHCP Server, but R1 doesn't forward the DHCP Discover to the DHCP Server.  We can configure R1 as a DHCP Relay Agent to forward DHCP Client packets to the DHCP Server. <strong>IP helper-address (IP of DHCP Server).</strong> Apply this command on the R1 Router interface connected to the DHCP Client </p>
<pre><code class="lang-java">
R1(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">172.16</span>.<span class="hljs-number">0.2</span>
</code></pre>
<blockquote>
<p>💡 If your DHCP server is on another network, configure the <strong>interface closest to clients</strong></p>
</blockquote>
<p><strong>To verify a DHCP relay agent</strong></p>
<pre><code class="lang-javascript">show ip helper-address
</code></pre>
<h3 id="heading-dhcp-server-configuration-commands">DHCP Server Configuration  Commands</h3>
<pre><code class="lang-javascript">
# Step <span class="hljs-number">1</span>: Exclude addresses (gateway + reserved IPs)
Router(config)# ip dhcp excluded-address <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>

# Step <span class="hljs-number">2</span>: Create a DHCP pool
Router(config)# ip dhcp pool LAN-POOL

# Step <span class="hljs-number">3</span>: Define network and mask
Router(dhcp-config)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>

# Step <span class="hljs-number">4</span>: Define <span class="hljs-keyword">default</span> gateway
Router(dhcp-config)# <span class="hljs-keyword">default</span>-router <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>

# Step <span class="hljs-number">5</span>: Define DNS server
Router(dhcp-config)# dns-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>

# Step <span class="hljs-number">6</span> (optional): Domain name
Router(dhcp-config)# domain-name ccna.local

# Step <span class="hljs-number">7</span> (optional): Lease time (days hours minutes)
Router(dhcp-config)# lease <span class="hljs-number">0</span> <span class="hljs-number">12</span> <span class="hljs-number">0</span>
Router(dhcp-config)# exit
Router(config)# end
</code></pre>
<pre><code class="lang-javascript">Router# show ip dhcp binding       # See which clients got IPs
Router# show ip dhcp pool          # Check pool statistics
Router# debug ip dhcp server events  # Debug DHCP process
</code></pre>
<h2 id="heading-dhcp-lab">DHCP Lab</h2>
<h1 id="heading-dhcp-server-and-relay-agent-configuration">DHCP Server and Relay Agent Configuration</h1>
<p>In this scenario, we will configure a DHCP server for a company with three departments, each of which has its own subnet and connects to a departmental router.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/17500a70-18e1-4822-a06a-3490c7428a59.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-ip-configuration"><strong>IP configuration</strong></h3>
<p><strong>Core router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Core-R01
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been set up as core router$  
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.6 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 2/0 
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.10 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 3/0
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.14 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.2 255.255.255.252
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Core-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<p><strong>Marketing router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Marketing-R01
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been setup <span class="hljs-keyword">for</span> the marketing department$  
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 10.0.0.1 255.0.0.0
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.1 255.255.255.252
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Marketing-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<p><strong>Sales  router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Sales-R01
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been set up <span class="hljs-keyword">for</span> the sales department$  
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.5 255.255.255.252
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 20.0.0.1 255.0.0.0 
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Sales-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<p><strong>Finance router</strong> </p>
<pre><code class="lang-java">Router&gt;enable
Router#<span class="hljs-function">configure terminal
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname Finance-R01
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span># banner motd $This Router has been set up <span class="hljs-keyword">for</span> the finance department$  
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.9 255.255.255.252
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 20.0.0.1 255.0.0.0 
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
Finance-<span class="hljs-title">R01</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit</span>
</code></pre>
<h3 id="heading-configuring-rip-routing">Configuring RIP routing</h3>
<p><strong>Core router</strong> </p>
<pre><code class="lang-java">Core-R01#conf t
Core-R01(config)#router rip 
Core-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.0</span>
Core-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">4.0</span>
Core-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">8.0</span>
Core-R01(config-router)#no auto-summary
Core-R01(config-router)#exit
Core-R01#wr
</code></pre>
<p><strong>Marketing router</strong> </p>
<pre><code class="lang-java">Marketing-R01(config)#router rip
Marketing-R01(config-router)#network <span class="hljs-number">10.0</span>.<span class="hljs-number">0.0</span>
Marketing-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.0</span>
Marketing-R01(config-router)#no auto-summary
</code></pre>
<p><strong>Sales  router</strong> </p>
<pre><code class="lang-java">Sales-R01#conf t
Sales-R01(config)#router rip 
Sales-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.4</span>
Sales-R01(config-router)#network <span class="hljs-number">20.0</span>.<span class="hljs-number">0.0</span>
Sales-R01(config-router)#no auto-summary 
Sales-R01(config)#exit
Sales-R01#wr
</code></pre>
<p><strong>Finance router</strong> </p>
<pre><code class="lang-java">Finance-R01#conf t
Finance-R01(config)#router rip
Finance-R01(config-router)#network <span class="hljs-number">192.168</span>.<span class="hljs-number">1.8</span>
Finance-R01(config-router)#network <span class="hljs-number">30.0</span>.<span class="hljs-number">0.0</span>  
Finance-R01(config-router)#no auto-summary
Finance-R01(config)#exit
Finance-R01#wr
</code></pre>
<h3 id="heading-assigning-a-static-ip-to-the-dhcp-server">Assigning a static IP to the DHCP server</h3>
<p>Before we configure the DHCP service on the server, we have to assign a static IP address to the server.</p>
<pre><code class="lang-java">Router&gt;ena
Router#<span class="hljs-function">conf t
<span class="hljs-title">Router</span><span class="hljs-params">(config)</span>#hostname DHCP-Server 
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 0/0
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.13 255.255.255.252
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown 
DHCP-<span class="hljs-title">Server</span><span class="hljs-params">(config)</span>#exit
DHCP-Server#wr</span>
</code></pre>
<h3 id="heading-enabling-and-configuring-dhcp-service-on-the-server">Enabling and Configuring DHCP Service on the Server</h3>
<p>Create DHCP Pools for Subnets and assign one pool to each subnet. </p>
<pre><code class="lang-java">

DHCP-Server#conf t
DHCP-Server(config)#ip dhcp pool marketing-pool
DHCP-Server(dhcp-config)#network <span class="hljs-number">10.0</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.0</span>.<span class="hljs-number">0.0</span>
DHCP-Server(dhcp-config)#dns-server <span class="hljs-number">8.8</span>.<span class="hljs-number">8.8</span>
DHCP-Server(dhcp-config)#domain-name rebar.it
DHCP-Server(dhcp-config)#<span class="hljs-keyword">default</span>-router <span class="hljs-number">10.0</span>.<span class="hljs-number">0.1</span>


DHCP-Server(config)# ip dhcp pool sales-pool
DHCP-Server(dhcp-config)#network <span class="hljs-number">20.0</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.0</span>.<span class="hljs-number">0.0</span> 
DHCP-Server(dhcp-config)#dns-server <span class="hljs-number">8.8</span>.<span class="hljs-number">8.8</span>
DHCP-Server(dhcp-config)#domain-name rebar.it
DHCP-Server(dhcp-config)#<span class="hljs-keyword">default</span>-router <span class="hljs-number">20.0</span>.<span class="hljs-number">0.1</span>


DHCP-Server(config)#ip dhcp pool finance-pool
DHCP-Server(dhcp-config)#network <span class="hljs-number">30.0</span>.<span class="hljs-number">0.0</span> <span class="hljs-number">255.0</span>.<span class="hljs-number">0.0</span> 
DHCP-Server(dhcp-config)#dns-server <span class="hljs-number">8.8</span>.<span class="hljs-number">8.8</span>
DHCP-Server(dhcp-config)#domain-name rebar.it
DHCP-Server(dhcp-config)#<span class="hljs-keyword">default</span>-router <span class="hljs-number">30.0</span>.<span class="hljs-number">0.1</span>
</code></pre>
<ul>
<li>Each DHCP pool is usually associated with a specific subnet.</li>
<li>When a client sends a DHCP request, the router or DHCP server checks the <strong>source IP subnet</strong> (if relay is used) or the <strong>incoming interface</strong> to determine which pool to use.</li>
<li>The DHCP pool that matches the <strong>subnet of the incoming request</strong> is used.</li>
</ul>
<h3 id="heading-configure-routers-to-act-as-dhcp-relay-agents"><strong>Configure routers to act as DHCP relay agents.</strong></h3>
<p>Configure the DHCP relay agent on the router interface directly connected to the local subnet.</p>
<p><strong>Marketing Router</strong> </p>
<pre><code class="lang-java">Marketing-R01#conf t
Marketing-R01(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
Marketing-R01(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">192.168</span>.<span class="hljs-number">1.13</span>
Marketing-R01(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<p><strong>Sales Router</strong> </p>
<pre><code class="lang-java">Sales-R01#conf t
Sales-R01(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Sales-R01(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">192.168</span>.<span class="hljs-number">1.13</span>
Sales-R01(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<p><strong>Finance Router</strong> </p>
<pre><code class="lang-java">Finance-R01#conf t
Finance-R01(config)#<span class="hljs-keyword">int</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Finance-R01(config-<span class="hljs-keyword">if</span>)#ip helper-address <span class="hljs-number">192.168</span>.<span class="hljs-number">1.13</span>
Finance-R01(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<blockquote>
<p>💡 Put the helper on the router interface that <em>is</em> the client’s default gateway (the access/branch router facing each department).</p>
</blockquote>
<h2 id="heading-verifying-dhcp-relay">Verifying DHCP relay</h2>
<p>To verify that the DHCP Service is working and each Client Received an IP address from the DHCP Pool, go to the  client device and write in the terminal the command below:</p>
<pre><code class="lang-javascript">C:\Users\AB&gt;ipconfig /all
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2086f51c-fb43-45ed-b0eb-690c6baa1f2a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, devices from different departments or subnets have successfully obtained IP addresses from the DHCP Server.</p>
<h3 id="heading-dhcp-server-verification">DHCP Server Verification</h3>
<p>To verify which IP addresses have been assigned to devices, use the following command:</p>
<pre><code class="lang-javascript">DHCP-Server#show ip dhcp  binding
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/112ff25c-e6e9-4416-9ae6-24454e1b94e8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To get more information about DHCP Server, use the following command: </p>
<pre><code class="lang-javascript">DHCP-Server#show ip dhcp  server  statistics
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b128df09-ad81-4e5d-b0b9-cbddcd93eb2f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To check the DHCP Server to find out and detect any IP address conflict, use the following command:</p>
<pre><code class="lang-javascript">DHCP-Server#show ip dhcp conflict
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aade97ac-ebcb-4089-81e7-b0db2c97857a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we encountered two issues with these subnets because we're using these IP addresses statically and configured them as default gateways for each subnet. </p>
<p>To resolve this issue, use the following command to exclude these IP addresses from the DHCP Server Pool range: </p>
<pre><code class="lang-javascript">DHCP-Server(config)# ip dhcp excluded-address (Ip <span class="hljs-keyword">of</span> range <span class="hljs-keyword">of</span> Ip)
DHCP-Server(config)# ip dhcp excluded-address  <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.10</span>
DHCP-Server(config)##ip dhcp excluded-address  <span class="hljs-number">203.0</span><span class="hljs-number">.113</span><span class="hljs-number">.1</span>
</code></pre>
<blockquote>
<p>💡 I suggest leaving at least the first of 10 IPs of each subnet for devices that require a static IP, such as printers or servers, .etc. </p>
</blockquote>
<p>For our lab use the following command:</p>
<pre><code class="lang-javascript">DHCP-Server(config)# ip dhcp excluded-address <span class="hljs-number">20.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
DHCP-Server(config)# ip dhcp excluded-address <span class="hljs-number">30.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
</code></pre>
<p>After choking the server again, no conflict is displayed.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3c477b7e-c438-4954-a466-8e1eb7abd6c2.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dchp-questions">DCHP Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a7e31c77-ce27-483d-ae25-894c89a41e40.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D.</strong> <strong><code>show ip interface</code></strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7e8cf047-bc38-48c3-9a1e-14da52b8c303.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A.</strong> ✅</p>
<p>When a <strong>Cisco IOS DHCP server</strong> detects an IP conflict (either through <strong>ping</strong> before assigning or from a client reporting it via <strong>Gratuitous ARP</strong>), the server will:</p>
<ul>
<li><strong>Mark that IP as “conflicted.”</strong></li>
<li><strong>Remove it from the available address pool</strong> so it will not be handed out to other clients.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/10d92d10-c567-4f2f-b0f0-f775023b2d91.png" alt="CCNA 200-301 Study (1)" /></p>
<p>A <strong>spurious DHCP server</strong> is <strong>an unauthorized DHCP server operating on a network,</strong> <em><strong>potentially</strong></em> <strong>a malicious attacker trying to intercept traffic, or an accidental configuration by a user adding a rogue router</strong>.</p>
<p>When a DHCP client starts up, it sends a <strong>DHCPDISCOVER</strong> broadcast to look for servers.</p>
<ul>
<li><strong>Legitimate and spurious (unauthorized/rogue) DHCP servers</strong> on the network will both reply with a <strong>DHCPOFFER</strong> message.</li>
<li>By analyzing these <strong>DHCPOFFER</strong> messages (for example, checking the source IP/MAC address of the server), you can detect <strong>rogue DHCP servers</strong>.</li>
<li>Network admins often use tools like <strong>DHCP snooping</strong> on Cisco switches to prevent unauthorized offers from being accepted.</li>
</ul>
<p><strong>D</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c3dd86c8-5f0a-4eba-94c4-e34b559198cd.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C D</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a20a4b33-ae8f-4d07-a978-5588b247983d.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Subnet Mask:</strong> 255.255.255.248 → valid (range: <code>10.2.2.1 – 10.2.2.6</code> usable, with .0 as network, .7 as broadcast).</li>
<li><strong>Default Gateway:</strong> <code>10.2.2.10</code> → ❌ incorrect, because <strong>10.2.2.10 is outside the valid subnet (10.2.2.0/29)</strong>. The gateway must be in the same subnet as the host.</li>
<li><strong>DNS Servers:</strong> 8.8.8.8 → valid (Google DNS).</li>
<li><strong>DHCP Server:</strong> 0.0.0.0 → irrelevant here since the host already has an IP manually set.</li>
</ul>
<p><strong>C</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d6f0df1c-1c92-476a-ae82-8135d6c790f9.png" alt="CCNA 200-301 Study (1)" /></p>
<p>If the port connected to the workstation is blocked, it will not forward traffic, including DHCP requests, preventing the workstation from obtaining an IP address.</p>
<p><strong>A</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bf97f2ff-5a78-4d7a-a7e3-8298fd1bb0ff.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>B</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cc77b5d6-f8eb-409a-b978-7f2f5239f07f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>the router interface is shown as <strong>10.2.2.1/27</strong> (mask <strong>255.255.255.224</strong>) while the PC is configured with <strong>255.255.255.192</strong> (/26). The PC and router must be in the same IP subnet mask space so the PC sends traffic for the default gateway and off-net destinations correctly. </p>
<p> <strong>A</strong>✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8f31e45c-5981-41a3-8594-8b22748b8478.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>B D</strong>✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/acf23d2e-531a-49e5-bc78-f41b1c1a1251.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>R1</strong> needs to request an IP address via DHCP (so <code>ip address dhcp</code> is required).</li>
<li><p><strong>R2</strong> must forward those DHCP broadcasts from R1 to the DHCP server on another network (so <code>ip helper-address</code> is required).</p>
<p><strong>B C</strong>✅</p>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/96b50d9c-d4f2-4bc3-8c58-c06aeafeb992.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/38b39420-73ca-43e9-8f1e-2126a0f41e7c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cb778c17-40bb-469e-ad47-fdf94ff664fe.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cf1bd0b0-a992-4771-a7a7-5c46b0a3aa66.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Preferred</strong> means the IP address is currently valid, usable, and active.
Because the host is using DHCP and the “Preferred” state means it is currently bound to the IP address and will <strong>request the same address again</strong> during lease renewal.</p>
<p><strong>B  ✅</strong></p>
<p>Just for information (Not CCNA Topic)</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>State</strong></td><td><strong>Meaning</strong></td><td><strong>Can the host use it?</strong></td><td><strong>When it happens</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Tentative</strong></td><td>Address is being tested for duplicates (DAD in progress).</td><td>❌ No (not yet usable).</td><td>Right after assignment (DHCP, static, or autoconfig).</td></tr>
<tr>
<td><strong>Preferred</strong></td><td>Address is valid and active.</td><td>✅ Yes (full communication).</td><td>After DAD succeeds and lease is valid.</td></tr>
<tr>
<td><strong>Deprecated</strong></td><td>Address should not be used for new sessions, but existing ones can continue.</td><td>⚠️ Limited (only existing connections).</td><td>Lease expired or admin marked it deprecated.</td></tr>
</tbody>
</table>
</div><h2 id="heading-dns">DNS</h2>
<h1 id="heading-domain-name-system-dns">Domain Name System DNS</h1>
<p>DNS is a <strong>distributed hierarchical system (Root → TLD → Authoritative).</strong> used to resolve domain names into IP addresses. Instead of remembering complex IP addresses, users can type a domain name, and the DNS will find the corresponding IP address.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bc42c88b-45e7-45d7-940c-500271080b92.gif" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-dns-resolution-flow-resolver-name-servers">🌐 DNS Resolution Flow (Resolver → Name Servers)</h1>
<h3 id="heading-example-you-type-wwwciscocom-in-your-browser">Example: You type <code>www.cisco.com</code> in your browser.</h3>
<hr />
<h2 id="heading-1-resolver-client-side">1️⃣ Resolver (Client Side)</h2>
<ul>
<li>Your <strong>resolver</strong> (inside PC/router/OS) checks:<ul>
<li>Local <strong>cache</strong> (has this domain been resolved recently?).</li>
<li>Local <strong>hosts file</strong> (<code>/etc/hosts</code> or <code>C:\Windows\System32\drivers\etc\hosts</code>).</li>
</ul>
</li>
<li>If not found, → sends a query to the configured <strong>DNS server</strong> (like 8.8.8.8).</li>
</ul>
<hr />
<h2 id="heading-2-recursive-name-server-eg-8888">2️⃣ Recursive Name Server (e.g., 8.8.8.8)</h2>
<ul>
<li>Acts as your <strong>helper</strong>.</li>
<li>If it doesn’t already know the answer, it goes step by step:<ul>
<li>Root → TLD → Authoritative server.</li>
</ul>
</li>
</ul>
<hr />
<h2 id="heading-3-root-name-server">3️⃣ Root Name Server</h2>
<ul>
<li>Knows where to find <strong>Top-Level Domains (TLDs)</strong> like <code>.com</code>, <code>.net</code>, <code>.org</code>.</li>
<li>Returns: <em>“Go ask a</em> <em><code>.com</code></em> <em>name server.”</em></li>
</ul>
<hr />
<h2 id="heading-4-tld-name-server-com-server">4️⃣ TLD Name Server (.com server)</h2>
<ul>
<li>Knows which <strong>authoritative server</strong> holds info for <code>cisco.com</code>.</li>
<li>Returns: <em>“Go ask the authoritative server for</em> <em><code>cisco.com</code>__.”</em></li>
</ul>
<hr />
<h2 id="heading-5-authoritative-name-server-for-ciscocom">5️⃣ Authoritative Name Server (for <code>cisco.com</code>)</h2>
<ul>
<li>Has the real <strong>A record</strong> for <code>www.cisco.com</code>.</li>
<li>Example: <code>72.163.4.185</code>.</li>
<li>Sends back the IP to the <strong>recursive DNS server</strong>.</li>
</ul>
<hr />
<h2 id="heading-6-back-to-the-resolver">6️⃣ Back to the Resolver</h2>
<ul>
<li>A recursive DNS server answers (IP) back to your <strong>resolver</strong>.</li>
<li>Resolver gives it to the <strong>browser</strong>, and the connection starts.</li>
</ul>
<hr />
<p>✅ Now your PC knows that <code>www.cisco.com = 72.163.4.185</code>.</p>
<p>✅ Next time, it will use the <strong>cached entry</strong> (faster).</p>
<pre><code class="lang-javascript">[PC Resolver] ---&gt; [Recursive DNS Server (<span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>)]
                       |
                       v
                 [Root Name Server]
                       |
                       v
                 [TLD Server (.com)]
                       |
                       v
         [Authoritative Server <span class="hljs-keyword">for</span> cisco.com]
                       |
                       v
[Recursive DNS] ---&gt; [PC Resolver] ---&gt; [Browser gets IP]
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/25c6bff0-11a8-47d2-b8a8-183bb85950dc.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dns-record-types"><strong>DNS Record Types</strong></h2>
<p>DNS uses different <strong>record types</strong> to store various information about domains.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Record Type</td><td>Description</td><td>Example</td></tr>
</thead>
<tbody>
<tr>
<td><strong>A</strong></td><td>Maps a domain to an IPv4 address</td><td><code>google.com → 142.250.190.78</code></td></tr>
<tr>
<td><strong>AAAA</strong></td><td>Maps a domain to an IPv6 address</td><td><code>google.com → 2607:f8b0:4005:805::200e</code></td></tr>
<tr>
<td><strong>CNAME</strong></td><td>Alias for another domain</td><td><code>mail.example.com → gmail.com</code></td></tr>
<tr>
<td><strong>MX</strong></td><td>Mail exchange record for emails</td><td><code>example.com → mail server IP</code></td></tr>
<tr>
<td><strong>NS</strong></td><td>Specifies name servers for a domain</td><td><code>example.com → ns1.example.com</code></td></tr>
<tr>
<td><strong>TXT</strong></td><td>Stores text information (SPF, DKIM)</td><td>Used for authentication &amp; security</td></tr>
<tr>
<td>PTR</td><td>reverse lookup (IP → name).</td><td>10.2.0.192.in-addr.arpa → <a target="_blank" href="http://www.example.com/">www.example.com</a></td></tr>
<tr>
<td>SOA</td><td>authoritative information about a DNS zone.</td><td><a target="_blank" href="http://example.com/">example.com</a>.   IN  SOA  <a target="_blank" href="http://ns1.example.com/">ns1.example.com</a>. <a target="_blank" href="http://admin.example.com/">admin.example.com</a>. (</td></tr>
</tbody>
</table>
</div><p>2025091401 ; Serial
7200       ; Refresh (2 hours)
3600       ; Retry (1 hour)
1209600    ; Expire (14 days)
86400 )    ; Minimum TTL (1 day) |</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td><strong>Recursive Query</strong></td><td><strong>Iterative Query</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Who asks?</strong></td><td>DNS client (resolver) → DNS server</td><td>DNS server → other DNS servers</td></tr>
<tr>
<td><strong>Workload</strong></td><td>DNS server does <em>all the work</em> and returns the final answer</td><td>Each DNS server gives the <em>best possible answer</em> it knows</td></tr>
<tr>
<td><strong>Answer Type</strong></td><td>Always returns the <strong>final resolved IP</strong> (or an error)</td><td>Returns either the IP or a <strong>referral</strong> to another DNS server</td></tr>
<tr>
<td><strong>Example Flow</strong></td><td>PC → Recursive DNS → (Root, TLD, Authoritative) → IP</td><td>Recursive DNS asks Root → gets referral → asks TLD → gets referral → asks Authoritative → gets IP</td></tr>
<tr>
<td><strong>Traffic</strong></td><td>More workload on DNS server, less on client</td><td>More queries across multiple DNS servers</td></tr>
<tr>
<td><strong>Default in Clients</strong></td><td>Used by PCs, routers, end devices</td><td>Used between DNS servers (resolver ↔ root ↔ TLD ↔ authoritative)</td></tr>
</tbody>
</table>
</div><h2 id="heading-dns-configuration-cisco-ios">DNS Configuration Cisco  IOS</h2>
<p><strong>Enable DNS Lookup</strong></p>
<pre><code class="lang-javascript">Router(config)# ip domain-lookup
</code></pre>
<p><strong>Set a Domain Name</strong></p>
<pre><code class="lang-javascript">Router(config)# ip domain-name rebar.lab
</code></pre>
<ul>
<li>Defines the local domain name for the device.</li>
<li>Required for features like SSH key generation.</li>
</ul>
<p><strong>Configure DNS Servers</strong></p>
<pre><code class="lang-javascript">Router(config)# ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
Router(config)# ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.4</span><span class="hljs-number">.4</span>
</code></pre>
<p><strong>Static Host Mapping</strong></p>
<pre><code class="lang-javascript">Router(config)# ip host R2 <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>
Router(config)# ip host WebSrv <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span>
</code></pre>
<p>Creates manual hostname → IP mappings (local DNS table).</p>
<p><strong>Verify DNS Resolution</strong></p>
<pre><code class="lang-javascript">Router# ping www.cisco.com
Router# traceroute www.cisco.com
Router# telnet R2
Router# show hosts
</code></pre>
<h3 id="heading-basic-lab-configuration">Basic Lab Configuration</h3>
<pre><code class="lang-javascript">R1(config)#<span class="hljs-keyword">do</span> ping rebar.it
Translating <span class="hljs-string">"rebar.it"</span>
% Unrecognized host or address, or protocol not running.
</code></pre>
<pre><code class="lang-javascript">R1(config)#ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>  [Configure R1 to use the specified DNS server.]
R1(config)#ip domain lookup   [Enable R1 to perform DNS queries. (<span class="hljs-keyword">default</span>)]
</code></pre>
<pre><code class="lang-javascript">R1(config)#<span class="hljs-keyword">do</span> ping rebar.it
Translating <span class="hljs-string">"rebar.it"</span>...domain server (<span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>) [OK]
Type <span class="hljs-built_in">escape</span> sequence to abort.
Sending <span class="hljs-number">5</span>, <span class="hljs-number">100</span>-byte ICMP Echos to <span class="hljs-number">172.217</span><span class="hljs-number">.25</span><span class="hljs-number">.110</span>, timeout is <span class="hljs-number">2</span> seconds:
!!!!!
Success rate is <span class="hljs-number">100</span> percent (<span class="hljs-number">5</span>/<span class="hljs-number">5</span>), round-trip min/avg/max = <span class="hljs-number">8</span>/<span class="hljs-number">10</span>/<span class="hljs-number">13</span> ms
</code></pre>
<h3 id="heading-config-router-as-a-dns-server">Config Router As a DNS Server</h3>
<pre><code class="lang-javascript">R1(config)#ip dns server [Configure R1 to act <span class="hljs-keyword">as</span> a DNS server]

R1(config)#ip host R1 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>
R1(config)#ip host PC1 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.101</span>  
R1(config)#ip host PC2 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.102</span>
R1(config)#ip host PC3 <span class="hljs-number">192.168</span><span class="hljs-number">.0</span><span class="hljs-number">.103</span>
[Configure a list <span class="hljs-keyword">of</span> hostname/IP address mappings.]

R1(config)#ip name-server <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span> [Configure a DNS server that R1 will query <span class="hljs-keyword">if</span>
the requested record isn’t <span class="hljs-keyword">in</span> its host table.]
R1(config)#ip domain lookup [Enable R1 to perform DNS queries.]
</code></pre>
<p><strong>shows the cached name/IP address mappings learned via DNS:</strong></p>
<pre><code class="lang-javascript">R1#show hosts
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/05e188d0-3780-4dd4-8ef4-5e26ec027b20.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f71a5307-6f7a-4c70-8fa8-372d360198a9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5bdaab44-24af-4fe7-9313-40c2765902c6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D E</strong> ✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a91e8529-8251-4c90-a23b-4dd66f15f4f1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B</strong>  ✅</p>
<p>Normally, when you use <strong>Telnet</strong> on a Cisco device, you enter the <strong>IP address</strong> of the remote device:</p>
<pre><code class="lang-bash">R1<span class="hljs-comment"># telnet 192.168.1.2</span>
</code></pre>
<p>But what if you just want to type the <strong>hostname</strong> instead?</p>
<pre><code class="lang-bash">R1<span class="hljs-comment"># telnet R2</span>
</code></pre>
<p>For this to work, the router/switch must be able to <strong>resolve the hostname into an IP address</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f238a40c-36b5-47fe-bcb7-1c16034fde06.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f908abf2-ff91-45b6-a210-3ac10796d466.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c08de221-6565-4c8f-899a-fa63cf457da6.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2b4761f7-98ec-469f-a401-e98a40c0d81b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D</strong>  ✅</p>
<h2 id="heading-implementing-wireless-lan">Implementing Wireless LAN</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>feature</td><td>2.4 GHz</td><td>5 GHz</td></tr>
</thead>
<tbody>
<tr>
<td>Speed</td><td>Slower data transmission.</td><td>Faster data transmission.</td></tr>
<tr>
<td>Range</td><td>Longer area coverage.</td><td>Short area coverage</td></tr>
<tr>
<td>Channels</td><td><strong>14</strong> Channels (only 1,6,11 are non-oversleeping).</td><td>Many non-overlapping Channels(36-165)</td></tr>
</tbody>
</table>
</div><p>Wireless technologies most frequently used in home networks are in the unlicensed <strong>2.4 GHz and 5 GHz</strong> frequency ranges.</p>
<p>Wi-Fi is a wireless network to connect local area devices. It uses radio waves to send and receive data.</p>
<ul>
<li>The Standards we use for wireless LABs are defined in <strong>IEEE 802.11.</strong></li>
<li>Wi-Fi is a trademark of the <strong>Wi-Fi Alliance,</strong> not directly connected to IEEE.</li>
<li>Wi-Fi uses two main bands (Frequency range)  <strong>2.4 GHz and 5 GHz.</strong></li>
<li>In the 2.4 GHz band, it is recommended to use channels <strong>1,6, and 11 (non-overlapping channels)</strong>.</li>
</ul>
<h3 id="heading-overlapping-channels">Overlapping Channels</h3>
<ul>
<li>In wireless networking, <strong>overlapping channels</strong> occur when multiple Wi-Fi networks operate on the same or adjacent channels, causing <strong>interference and reducing network performance</strong>. This is especially common in the <strong>2.4 GHz band</strong>, where only <strong>three non-overlapping channels (1, 6, and 11)</strong> are available in most regions.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7c4a3ea5-ed2d-4450-ba34-cca008cee62a.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>Best Practice:</strong> Use <strong>automatic channel selection</strong> or analyze your environment with tools like <strong>Wi-Fi Analyzer</strong> to choose the best channel.</p>
</blockquote>
<p>💡 <strong>Which One to Use?</strong></p>
<ul>
<li><strong>For better speed:</strong> Use <strong>5 GHz</strong>.</li>
<li><strong>For better range &amp; wall penetration:</strong> Use <strong>2.4 GHz</strong>.</li>
<li><strong>For minimal interference:</strong> Prefer <strong>5 GHz</strong>, especially in crowded areas.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Standard</td><td>Frequencies</td><td>Max Data Rate</td><td></td></tr>
</thead>
<tbody>
<tr>
<td>802.11</td><td>2.4 GHz</td><td>2 Mbps</td><td></td></tr>
<tr>
<td>802.11 b</td><td>2.4 GHz</td><td>11 Mbps</td><td></td></tr>
<tr>
<td>802.11 a</td><td>5 GHz</td><td>54 Mbps</td><td></td></tr>
<tr>
<td>802.11 g</td><td>2.4 GHz</td><td>54 Mbps</td><td></td></tr>
<tr>
<td>802.11n</td><td>2.4 GHz / 5 GHz</td><td>600 Mbps</td><td>Wi-Fi 4</td></tr>
<tr>
<td>802.11ac</td><td>5 GHz</td><td>6.93 Gbps</td><td>Wi-Fi 5</td></tr>
<tr>
<td>802.11ax</td><td>2.4 GHz / 5/6 GHz</td><td>4*802.11ac</td><td>Wi-Fi 6</td></tr>
</tbody>
</table>
</div><ul>
<li><strong>Band</strong>: A broad range of frequencies (e.g., 2.4 GHz, 5 GHz, 6 GHz) used for wireless communication.</li>
<li><strong>Channel</strong>: A specific frequency or range within a band that devices use to communicate</li>
</ul>
<h1 id="heading-rssi">RSSI</h1>
<p>RSS standard for <strong>Received Signal Strength Indicator</strong> is a <strong>measure of the power level that an access point or wireless device receives from another device</strong>. It’s used to estimate signal strength in a wireless network. </p>
<ul>
<li>RSSI is usually measured in <strong>dBm</strong>(Decibels milliwatts). Value range from <strong>-100 dBm</strong> (very weak signal)  to <strong>0 dBm</strong> (Strongest possible signal).</li>
</ul>
<h3 id="heading-rssi-values"><strong>RSSI Values:</strong></h3>
<ul>
<li><strong>-30 dBm</strong>: Excellent signal (very close to the AP).</li>
<li><strong>-50 dBm</strong>: Good signal (stable connection).</li>
<li><strong>-70 dBm</strong>: Fair signal (may experience slower speeds).</li>
<li><strong>-90 dBm</strong>: Poor signal (unstable or dropped connection).</li>
<li><strong>-100 dBm</strong>: Very poor signal (no connection).</li>
</ul>
<h2 id="heading-snr">SNR</h2>
<p><strong>SNR(signal-to-noise ratio)</strong> measures the strength of a <strong>Wi-Fi signal compared</strong> to background noise (Interference).</p>
<p>It is expressed in <strong>Decibels (dB)</strong> and determines the <strong>quality</strong> of a wireless network. A higher SNR means a cleaner signal.</p>
<p>$SNR=Signal Strength (dBm)−Noise Level (dBm)$</p>
<h2 id="heading-service-set">Service Set</h2>
<p>A  Service Set defines a group of wireless devices that communicate using the same Wi-Fi network(SSID).</p>
<p><strong>There are three main types:</strong></p>
<ul>
<li>Independent Basic Service Set  (IBSS).</li>
<li>Infrastructure</li>
<li>Mesh</li>
</ul>
<h2 id="heading-independent-basic-service-set-ibss">Independent Basic Service Set (IBSS)</h2>
<p><strong>Independent Basic Service Set (IBSS)</strong> is a wireless network in which two or more wireless devices are connected directly without using an <strong>Access Point(AP).</strong> </p>
<ul>
<li>Also called an <strong>Ad hoc</strong> network.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dc0c42a5-f305-4a72-942a-38e6f9cf89e1.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-basic-service-set-bss">Basic Service Set (BSS)</h2>
<p>A <strong>BSS (Basic Service Set)</strong> is a kind of infrastructure Service Set in which clients connect to each other via an <strong>AP(Access Point)</strong>, but not directly to each other.</p>
<ul>
<li>A <strong>BSSID (Basic Service Set ID)</strong> uniquely identifies the AP. The BSSID is the MAC address of the AP’s radio.</li>
<li><strong>Service set identifier (SSID):</strong> This is a human-readable, non-unique identifier used by the AP to <strong>advertise its wireless service</strong>.</li>
<li>Other <strong>APs</strong> can use the same <strong>SSID</strong>, but <strong>not the same BSSID.</strong></li>
<li>Wireless devices request to associate with the <strong>BSS</strong>. Wireless devices that are associated with the BSS are called <strong>“Client” or “Station”</strong>.</li>
<li>The area around an AP where its signal is usable is called a <strong>BSA (Basic Service Area).</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/86c0189b-5992-464f-b10a-837d08fa6fc0.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-extended-service-set-ess">Extended Service Set (ESS)</h2>
<p>A Wi-Fi network that consists of multiple <strong>Access Points (APs)</strong> working together under <strong>the same SSID</strong> to provide a wider coverage and support roaming between APs.</p>
<ul>
<li>Each BSS uses the same <strong>SSID</strong>.</li>
<li>Each BSS has a unique <strong>BSSID</strong>.</li>
<li>Each <strong>BSS</strong> uses a different channel to avoid interference.</li>
<li>Clients can pass between APs without having to reconnect.</li>
<li>The <strong>BSAs</strong> should overlap <strong>about 10-15%</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4ea87ee9-0088-4da6-bf59-dc875a6ba755.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-mesh-basic-service-set-mbss">Mesh Basic Service Set (MBSS)</h2>
<p>A <strong>Mesh Basic Service Set (MBSS)</strong> is a <strong>wireless mesh network</strong> where multiple <strong>Access Points (APs)</strong> (called <strong>Mesh Nodes</strong>) communicate with each other <strong>without a wired backbone</strong>. It is used to provide <strong>large coverage and self-healing capabilities</strong>.</p>
<ul>
<li>At least one AP is connected to the wired network, it is called <strong>RAP (Root Access Point).</strong></li>
<li><strong>No wired connections</strong> between nodes—only wireless links.</li>
<li>The other APs are called <strong>MAPs(Mesh Access Points)</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cc1e8554-e451-4c01-8202-5284a10fbae8.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-distribution-system">Distribution System</h2>
<p>Refers to the upstream wired Ethernet as the distribution system (DS) for wireless BSS.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7ab52291-839d-4009-b5a3-47f89fef6712.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-workgroup-bridge-wgb">WorkGroup Bridge (WGB)</h2>
<p><strong>WorkGroup Bridge(WGB)</strong> is a Wi-Fi client device that connects <strong>a wired device</strong> to a wireless network by acting as a <u><strong>bridge between an Ethernet network and a Wi-Fi access Point (AP)</strong></u>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1e5ac03a-7ed4-4d71-b095-b8f92724e54e.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-outdoor-bridge">Outdoor Bridge</h2>
<p>An <strong>outdoor Bridge</strong> is a <strong>wireless connection</strong> between two or more locations, used to extend a network over <strong>long distances</strong> without cables. It is commonly used for <strong>connection building and remote offices.</strong> The connection can be point-to-point or point-to-multipoint.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/464aa4f9-4ce8-41b7-8447-248479f917b7.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-wireless-architectures">Wireless Architectures</h1>
<p>There are three main wireless AP deployment methods:</p>
<ul>
<li>Autonomous</li>
<li>Lightweight</li>
<li>Cloud-Based</li>
</ul>
<h2 id="heading-autonomous-architecture">Autonomous Architecture</h2>
<p>An <strong>Autonomous AP</strong> is a <strong>self-contained access point</strong> that operates <strong>independently</strong>, without requiring a <strong>centralized wireless controller</strong>. it is commonly used in <strong>small networks</strong> when a few APs are needed.</p>
<ul>
<li><strong>Self-Managed,</strong> no need for a separate controller.</li>
<li>Each AP has its configuration(SSID, Security, QoS Rules, etc.).</li>
</ul>
<h2 id="heading-lightweight-architecture">Lightweight Architecture</h2>
<p>A <strong>Lightweight Access Point(LWAP)</strong> is a Wi-Fi access point that relies on a <strong>Wireless LAN Controller(WLC)</strong> for configuration, management, and traffic handling. Unlike <strong>autonomous APs</strong>, LWAPs do not function <strong>independently</strong> and require a centralized controller.  </p>
<ul>
<li><strong>Lightweight APs</strong> handle <strong>real-time</strong> operations like transmitting/receiving RF traffic, and encrypting/decrypting traffic.</li>
<li>Other functions are carried out by a <strong>WLC</strong>, for example, RF management, Security/QoS management, client authentication, client association/roaming management, etc.</li>
<li>This is called <strong>split-MAC architecture.</strong></li>
<li>The <strong>WLC</strong> is used to centrally configure the Lightweight APs.</li>
<li>The <strong>WLC and Lightweight</strong> use a protocol called <strong>CAPWAP</strong>(Control And Provisioning Of Wireless Access Points) to communicate.
<details><summary>Two tunnels are created between each AP and WLC:</summary></details></li>
<li><strong>Control tunnel (UDP port 5246):</strong> this tunnel is used to <strong>configure the APs , and control/manage the operation</strong>. All traffic in this tunnel is <strong>encrypted by default.</strong></li>
<li><strong>Data tunnel (UDP  port 5247): all traffic from wireless clients</strong> is sent through this tunnel to the WLC (It does not go directly to the wired network).</li>
</ul>
<p></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/122cb12e-e9ab-4248-b0c8-cd56b97156af.webp" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Controlled Access Point works as the client of the <strong>Wireless LAN Controller (WLC)</strong>. Technically a controlled access point is known as the <strong>Lightweight Access Point (LWAP)</strong>. The WLC based on the security configuration, makes the decision whether the received frame should be forwarded or discarded.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/86932e69-4ccb-4a6c-bc93-21c544789d5a.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bb82fbaf-b3c8-4a85-ba4a-5dad08cfe638.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>An access point controller (AP controller)</strong> is a device that manages and controls wireless access points (APs) in a wireless network. It allows for centralized management of APs, which can simplify configuration and troubleshooting. AP controllers can also provide features such as load balancing, roaming, and security.</p>
<h2 id="heading-here-are-some-of-the-benefits-of-using-an-access-point-controller">Here are some of the benefits of using an access point controller</h2>
<ul>
<li><strong>Centralized management:</strong> AP controllers allow for centralized management of APs, which can simplify configuration and troubleshooting.</li>
<li><strong>Improved performance:</strong> AP controllers can improve performance by load-balancing traffic across multiple APs and providing roaming.</li>
<li><strong>Enhanced security</strong>: AP controllers can provide enhanced security by encrypting traffic and authenticating users.</li>
<li><strong>Scalability</strong>: AP controllers can scale to accommodate larger networks.</li>
</ul>
<h3 id="heading-wlc-ports-and-interfaces">WLC Ports and Interfaces</h3>
<ul>
<li><strong>WLC Ports</strong> are physical ports that cables connect to.</li>
<li><strong>WLC Interfaces</strong> are the logical interfaces within the WLC(ie. SVIs on a switch).</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1b9e3c1c-051a-4853-b44b-08c7fbdbdf48.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Service Port:</strong> Used for out-of-band management(not user traffic).</p>
<ul>
<li>Management access via <strong>SSH, HTTP(S), or Telnet</strong>.</li>
<li>Software upgrades and troubleshooting.</li>
<li>Cannot be used for normal wireless traffic.</li>
</ul>
<p><strong>Distribution Port/ Network Port:</strong>  Connect to a switch (trunk mode) for AP traffic and VLAN communication.</p>
<p><strong>Redundancy Port:</strong> connects two WLCs for high availability. </p>
<p><strong>Console Port:</strong> This is a stand console port, either RJ45 or USB. </p>
<p>How the Internet Flows Through a WLC Network</p>
<blockquote>
<p>💡 Internet → Router/Firewall → Core Switch → WLC (via Distribution Ports) → Access Points → Wireless Clients</p>
</blockquote>
<h2 id="heading-cloud-based-architecture"><strong>Cloud-Based Architecture</strong></h2>
<p>A <strong>Cloud-Based Architecture</strong> in wireless networking refers to a system where <strong>Wi-Fi Access Points (APs) are managed remotely</strong> through a <strong>cloud controller</strong>, instead of a traditional on-premises Wireless LAN Controller (WLC).</p>
<p><strong>Cisco Meraki</strong> – Cloud-managed networking for enterprises.</p>
<h3 id="heading-how-cloud-based-architecture-works"><strong>How Cloud-Based Architecture Works:</strong></h3>
<p>1️⃣ <strong>Access Points (APs) connect to the internet</strong> and communicate with a cloud-based controller.</p>
<p>2️⃣ <strong>The cloud controller manages all APs</strong> centrally from a web-based dashboard.</p>
<p>3️⃣ <strong>Network admins configure, monitor, and troubleshoot Wi-Fi</strong> from anywhere.</p>
<p>4️⃣ <strong>APs receive real-time updates, security patches, and configurations</strong> from the cloud</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a61cd405-023a-4ac6-b820-0483ad4de4a8.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-access-point">Access Point</h2>
<ul>
<li>An access point is a device that <strong>allows multiple wireless devices to connect**</strong>.** connects various devices in a single or multiple wired LAN network, and an access point connects various wireless devices in a single or multiple wireless network.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bf62aeb2-45b2-49db-8088-dc14777e1b07.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-types-of-access-points">Types of Access Points</h2>
<ul>
<li>Standalone access Point. (Heavyweight or Fat).</li>
<li>Multifunction Access Point.</li>
<li>Controlled Access Point(Lightweight).</li>
</ul>
<h2 id="heading-standalone-access-point">Standalone Access Point</h2>
<ul>
<li>A standalone access point provides the same functionality in a wireless network tha<strong>t a switch or hub provides in a wired networ</strong>k. It provides connectivity between the different wireless devices. It accepts a frame from the connected device and, based on its physical address, forwards it to the destination device.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e77d950a-ffb2-4a80-b9c8-dcc11184b846.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0455164d-4475-4c94-b3e5-d1d9782b5e76.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Ethernet Ports:</strong> These ports connect to the internal switch portion of the router. These ports are usually labelled “Ethernet” or “LAN”, as shown in the figure. All devices connected to the switch ports are on the same local network.</p>
<p><strong>Internet Port:</strong> This port is used to connect the device to another network. The internet port connects the router to a network different from the Ethernet ports. This port is often used to connect to the cable or DSL modem in order to access the internet.</p>
<h2 id="heading-multifunction-access-point">Multifunction Access Point</h2>
<ul>
<li>A multifunction access point is the same combination of two or more devices. in this combination, an additional device or devices are merged with the access point to provide the additionalities along with the existing functionality of the access point.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3cc37a1-b102-4d35-aab4-d5ed2d7ec744.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-why-it-is-called-a-multifunction-access-point">Why it is called a Multifunction access point?</h3>
<p>It works as A router routing local networks to other networks like Internet Networks.</p>
<p>it is used as an access point connecting all wireless devices together </p>
<p>It can be used as a switch because of having Ethernet ports.</p>
<h2 id="heading-wireless-lan-controller">Wireless Lan Controller</h2>
<ul>
<li>first, make a connection between Pc and WLC devices, then login to the WLC Through browser 192.168.1.1 and do the basic configuration</li>
<li>We Add a DHCP Server to assign IP to each access point, it is an easy way to assign IP to each AP instead of Manually.</li>
<li>Create SSID for each WLAN In WLC Web-based interface.</li>
<li>Then create a group for AP Devices, all access points grouped by SSID</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9b030e99-6585-4e5e-afa4-04aeddb43fa8.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/29142f18-f521-4cdd-b445-201b4c885cb9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2d0669d2-0d6a-426c-b3df-0f7bf0f03cd3.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-wireless-security">Wireless Security</h1>
<h2 id="heading-open-authentication">Open Authentication</h2>
<p><strong>Open Authentication (Open System Authentication)</strong> is the simplest form of Wi-Fi authentication where any device can <strong>connect to the wireless network without requiring a password or credentials</strong>. The problem with this method is that the SSID is typically broadcast and if it is not, it can be easy to figure out with passive capturing techniques. <strong>Used in public Wi-Fi hotspots</strong>, cafes, and guest networks.</p>
<h2 id="heading-8021xeap">802.1x/EAP</h2>
<p>Extensible Authentication Protocol (EAP) is the most widely used authentication method in enterprises. It relies on an authentication server to verify user credentials through various authentication mechanisms.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bd4380ea-77ed-4416-b2d5-fa8dae4f1d79.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Supplicant:</strong> The device trying to connect (mobile, laptop…etc.)</li>
<li><strong>Authenticator:</strong> The network device enforcing authentication. <strong>forwards the request</strong> to the RADIUS server using EAP.</li>
<li><strong>Authentication Server</strong>: Usually <strong>Radius Server</strong> verifies credentials and grants or denies network access.</li>
</ul>
<h2 id="heading-types-of-8021xeap">Types of 802.1x/EAP</h2>
<ol>
<li><strong>LEAP</strong>(<strong>L</strong>ightweight <strong>E</strong>xtensible <strong>A</strong>uthentication <strong>P</strong>rotocol), is an EAP authentication type used primarily in Cisco Aironet * WLANs, It encrypts data transmissions using dynamically generated WEP keys and supports mutual authentications.</li>
<li><strong>EAP-FAST</strong>(Flexible Authentication via Secure Tunneling) is used for enterprises that can’t enforce <strong>a strong password policy</strong> and <strong>don’t want to deploy certifications for authentication</strong>.</li>
<li><strong>PEAP(P</strong>rotected <strong>E</strong>xtensible <strong>A</strong>uthentication <strong>P</strong>rotocol) provides a method to <strong>transport securely authentication data, including legacy password-based-protocols</strong>, <strong>via 802.11 Wi-Fi</strong> networks(deployed by MS and Cisco)</li>
</ol>
<blockquote>
<p>💡 for example, in hotels, you can’t use strong passwords or deploy a certification on end-user devices.</p>
</blockquote>
<ol>
<li><strong>EAP-TLS</strong>(Transport Level Security), while very secure, r<strong>equires client certificates to be installed on each WI-FI workstation</strong>. Maintenance of a PKI infrastructure requires additional administrative expertise and time in addition to that of maintaining the WLAN itself.</li>
</ol>
<h2 id="heading-wireless-privacy-and-integrity-methods">Wireless Privacy and Integrity Methods</h2>
<h3 id="heading-wep-wireless-equivalent-privacy">WEP (Wireless Equivalent Privacy)</h3>
<ul>
<li>The first widely used standard for wireless LANs was 802.11(prime), this included the wired Equivalent Privacy(WEP) algorithm which was used for security. WEP utilizes <strong>RC4 for encryption</strong> and has been appreciated because <strong>of vulnerabilities that can be used to find the security keys</strong></li>
</ul>
<h3 id="heading-wpawi-fi-protected-access">WPA(Wi-Fi Protected Access)</h3>
<ul>
<li>In response to the vulnerabilities found in WEP, Wi-Fi Protected Access(WPA) was defined. <strong>WPA utilizes the Temporal Key Integration Protocol(TKIP), which utilizes dynamic keys that were not supported with WEP and RC4 for encryption</strong>. The TKIP method used with WPA was utilized until vulnerabilities were found in TKIP. These vulnerabilities center on the fact that TKIP uses the same mechanisms that WEP  does, which allow similar attacks.</li>
</ul>
<h3 id="heading-wpa-2">WPA 2</h3>
<ul>
<li>In response to the <strong>vulnerabilities in WPA/TKIP</strong>, The IEE 802.11i  standard was defined and implemented, the IEEE 802.11i standard is also referred to as WPA2, WPA2 <strong>replaced TKIP with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)</strong> which is <strong>based on Advanced Encryption Standard(AES) AES-128</strong>, it is common for the WPA2 encryption method to be referred to as AES, <strong>There are on easy methods that have been found to break AES.</strong></li>
</ul>
<h3 id="heading-wpa-3">WPA 3</h3>
<ul>
<li>The WPA 3 provides new features for personal and enterprise use, such as <strong>256-bit Galois/Counter Mode Protocol (GCMP-256), 384-bit Hash Message Authentication Mode(HMAM), and 256-bit Broadcast/Multicast Integrity Protocol (BIP-GMAC-256).</strong> WPA 3 also supports security measures such as perfect forward secrecy.</li>
</ul>
<p>The Wi-Fi Alliance has developed WPA-WPA2-WPA3, all of which support two <strong>authentication modes</strong>:</p>
<ul>
<li><strong>Personal mode</strong>: Used for home and small office networks,  A <strong>pre-shared key (PSK)</strong> is used for authentication no special authentication server is required.</li>
<li><strong>Enterprise Mode:</strong> Used for enterprise and large networks require a <strong>remote authentication server (RADIUS SERVER)</strong> for user authentication. The user must authenticate using the 802.1x standard which uses Extensible Authentication Protocol for authentication.</li>
</ul>
<blockquote>
<p>💡 Which organization is responsible for testing wireless LAN devices?<br /><strong>Wi-Fi Alliance</strong></p>
</blockquote>
<p>    <strong>Wi-Fi Alliance</strong></p>
<h2 id="heading-encryption-methods">Encryption Methods</h2>
<ul>
<li><strong>RC4(40-bit) (**</strong>Rivest Cipher 4<strong>**)</strong> is a stream cipher. while it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure.</li>
<li><strong>Temporal Key Integrity Protocol (**</strong>TKIP<strong>) is a wireless network security protocol of IEEE 802.11. Assigning a </strong>unique 48-bit sequencing number to each packet using 128-bit encryption keys and 64-bit authentication keys.**</li>
<li><strong>AES:(AES-CCMP)</strong>: This algorithm provides enhanced security over TKIP and is the only encryption algorithm supported by the 802.11i standard (the standard that introduced WPA2).</li>
<li><strong>AES-GCMP-256</strong>: Galois Counter Mode Protocol (GCMP) is supported by <strong>802.11ac</strong>, is more efficient than AES-CCMP, and provides better performance for wireless clients. AES-GCMP-256 uses <strong>256-bit AES encryption keys</strong>.</li>
</ul>
<p><strong>Standard Channel:</strong> Specifies the channel over which communication will occur. By default, this is set to <strong>Auto</strong> to allow the access point (AP) to determine the optimum channel to use.</p>
<p>A <strong>mixed-mode</strong> wireless network environment can include devices that use any of the existing Wi-Fi standards. This environment provides easy access for older devices that need a wireless connection but do not support the latest standards.</p>
<h3 id="heading-what-is-the-difference-between-5g-and-5-ghz-just-for-information-not-ccna-topic"><strong>What is the difference between 5G and 5 GHz? (Just For Information, Not CCNA topic)</strong></h3>
<ul>
<li><strong>5G</strong> refers to the <strong>fifth generation of cellular network technology</strong>. It uses radio waves in the 3.5GHz to 3.7GHz range to transmit data. <strong>5G offers much faster speeds and lower latency than previous cellular generations, such as 4G LTE**</strong>.**</li>
<li><strong>5GHz</strong> refers to a <strong>frequency band that is used by some Wi-Fi systems</strong>. It is located in the 5.1GHz to 5.8GHz range and offers faster speeds than the 2.4GHz Wi-Fi band. However, 5GHz has a shorter range and is more susceptible to interference.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Feature</strong></td><td><strong>5G</strong></td><td><strong>5GHz</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Technology</td><td>Cellular network</td><td>Wi-Fi</td></tr>
<tr>
<td>Frequency range</td><td>3.5GHz to 3.7GHz</td><td>5.1GHz to 5.8GHz</td></tr>
<tr>
<td>Typical speeds</td><td>Up to 20Gbps</td><td>Up to 1Gbps</td></tr>
<tr>
<td>Range</td><td>Shorter</td><td>Longer</td></tr>
<tr>
<td>Susceptibility to interference</td><td>Less susceptible</td><td>More susceptible</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 The wireless technologies most frequently used in home networks are in the <strong>unlicensed 2.4 GHz and 5 GHz frequency ranges</strong>.</p>
</blockquote>
<h2 id="heading-wlan-ccna-questions">WLAN CCNA Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1aac2cee-9f3b-4c35-b220-ca883fc7bd1c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>CPU ACL</strong> → Blocks or allows management access (SSH, HTTPS, SNMP) to the WLC from specific networks.
<strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/752935e6-192e-4b56-9ceb-e18edb4f1c48.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-layer-2-security-mechanisms">Layer 2 Security Mechanisms</h3>
<ul>
<li><strong>WPA + WPA2</strong></li>
<li><strong>802.1X</strong></li>
</ul>
<p>👉 Layer 2 deals with encryption and authentication before a client can join the WLAN.</p>
<h3 id="heading-layer-3-security-mechanisms-for-wlan">Layer 3 Security Mechanisms (for WLAN)</h3>
<ul>
<li><strong>Web policy</strong></li>
<li><strong>Passthrough</strong></li>
</ul>
<p>👉 Because Layer 3 mechanisms kick in after association, often for user authentication or web redirection.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/90cde68a-b5b5-4bcb-a9ac-4208c4d77c5b.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The <strong>Passive Client</strong> feature on the Cisco Wireless LAN Controller (WLC) ensures that devices with static IPs (like printers, scanners, or IoT devices) can still associate and pass traffic correctly.</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2694b7e6-cb25-4b32-bd25-5f5670e4dd2c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Discovery request</strong> — because that’s the first message an AP sends to the WLC AP-Manager interface during the join process.
<strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9a604fb4-cac5-45cb-a70a-1e0834300998.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Lightweight AP supports different operational modes (Local Mode, Monitor Mode, Sniffer Mode)</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4db99888-f607-4b38-8607-4125211673df.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/65b8a8ce-5bbf-4eb6-a460-c94ba79a8103.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c60756a-e3b0-4bc5-8272-ff1f8f328b98.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>TACACS+</strong> — because it supports separate authentication and authorization.</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1cf16038-60d8-4331-90b0-5d2c8c3dccfb.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ff1bd090-dd15-4c11-8a12-b96e009113ec.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f367aeb2-3587-4be9-b755-5554b1c94d0f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d3e81427-345f-4fcb-b260-6520e9c0fbe9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/03db9444-aaf4-4d7b-ab81-550a4d6a4968.png" alt="CCNA 200-301 Study (1)" /></p>
<p>LAG on WLC treats all ports as one logical port.
<strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a84f5b84-454c-45ee-b7d0-ef4fa1ed6f47.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Access Points that use <strong>Power over Ethernet (PoE)</strong> need to “negotiate” how much power they can draw from the switch.</li>
<li>This negotiation is done using <strong>Cisco Discovery Protocol (CDP)</strong> or <strong>LLDP (industry standard)</strong>.</li>
</ul>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3576a206-589f-44a2-8a99-c9075112207b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/21b5c44c-67e0-463e-9749-fafc0272af1d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b9acede0-afad-4014-947b-f3b4750d3f15.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When more than one AP-manager interface is configured, an AP  will join the controller by selecting the least-loaded AP Manager.</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20ea2297-673f-45b2-8406-80f92be9b4f1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d9c4efbd-44b4-4537-85d1-4199798ca1cf.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Layer 3 Web Authentication (web policy) allows only <strong>DHCP and DNS packets before the user authenticates</strong>. All other traffic is blocked until authentication succeeds.</p>
<p>C<strong>✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d282d119-c5f5-4fb0-b101-f2260e7054b1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e9e58726-7129-4ecd-bd7f-67aa922e2f75.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/97a9a9ba-d8d0-4019-8ef5-999a067901e3.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/93ebcdca-c14e-43c4-80bd-b706cd57e4ac.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong>   </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a33b8b73-c8c8-47ed-bdf2-c5f72a711123.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>AP-manager = CAPWAP tunnel source</strong>.</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1e56b4ac-439a-446c-8339-de9792684821.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e4c21961-a6f5-4439-9954-a8662aeaf16d.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>802.11w = Protected Management Frames (PMF).</strong></li>
<li>In the exhibit, you see <strong>PMF (Disabled)</strong>.</li>
</ul>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1c54490e-d553-44b6-b0ab-da3d127acf6d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2a7007fb-7d63-4a5f-be05-8a78d3e9de58.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>CD✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/87f9305e-8b22-470a-9dad-cb07cf369079.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/20969034-a77c-4397-bbe6-fb7917541c53.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e69fc0b-5148-4f54-9066-cf68752b1c5f.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Opportunistic Wireless Encryption (OWE)</strong> is defined in <strong>WPA3</strong>.</li>
<li>It provides <strong>encryption without authentication</strong>.</li>
<li>This means that even on an <strong>open Wi-Fi network</strong> (no password), traffic is <strong>still encrypted</strong> between the client and the AP.</li>
</ul>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4bdc7d85-3fde-4d9c-8da2-4ef3845b32d5.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/85aa3df3-cdd1-4a6f-adb8-a6c1fbc6bd96.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/53daf0c9-a51a-4de8-9ab0-c8fa9b2b6192.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fd70d6c1-3b8a-41ad-ac38-d91a066b8f56.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>The goal is to <strong>minimize association (roaming) time</strong> as clients move between APs.</li>
<li><strong>802.11k</strong> helps with this by letting the AP provide the client with a <strong>neighbor report</strong> (list of nearby APs on both 2.4 GHz and 5 GHz).</li>
</ul>
<p><strong>D</strong>✅</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f9809b23-2568-4b2b-a016-a509bc4966de.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/200d472b-06c3-4057-8a09-fb62d8ef66cb.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B E ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/12e16ab5-ac5c-4657-a068-b8a1b7ae209a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Load balancers</strong> → WLC handles balancing by itself.❌</p>
<p>When you add a new WLC, the two extra things you should set up are:</p>
<ul>
<li><strong>Configure additional VLANs</strong> so that different SSIDs (such as guest, voice, and corporate) can be mapped to the correct networks.</li>
<li><strong>Configure additional security policies</strong> → to protect the WLAN (WPA2/WPA3, ACLs, RADIUS, etc.).</li>
</ul>
<p><strong>B E ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c2e066db-5cab-41ac-98f8-156367b39c7e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When setting up a new WLAN on a Cisco WLC, the <strong>basic workflow</strong> is:</p>
<ol>
<li><strong>Authentication server</strong> (RADIUS/TACACS) configuration.</li>
<li><strong>Dynamic interface</strong> creation (maps SSIDs to VLANs).</li>
<li><strong>Create the WLAN</strong> (SSID) and <strong>bind it</strong> to the dynamic interface. 👉 This step connects the wireless side (SSID) to the wired side (VLAN).</li>
</ol>
<p><strong>D ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/94c0a439-473f-4cd4-9419-bf9943c826c8.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>AB ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/73fd16cb-67e5-494f-b4a1-6cbe1ce0a162.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>802.11a</strong> works in the <strong>5 GHz band</strong>.</li>
<li>Advantage: it provides <strong>more nonoverlapping channels</strong> (much more than 2.4 GHz’s 3 channels).</li>
</ul>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bf13fdf2-2c3b-43d7-ad3b-5a81b04ee255.png" alt="CCNA 200-301 Study (1)" /></p>
<p>When configuring a <strong>RADIUS server on a Cisco WLC</strong>:</p>
<ul>
<li><strong>Server Status = Enabled</strong> → Makes the RADIUS server active.</li>
<li>To use the RADIUS server for <strong>wireless client authentication</strong>, you must check <strong>Network User (Enable)</strong>.</li>
<li>Without this, the WLC will not send wireless client authentication requests to the RADIUS server.</li>
</ul>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/010b09f0-46c8-47d4-9fe8-652c4be2e460.png" alt="CCNA 200-301 Study (1)" /></p>
<p>802.11g uses 2.4GHz and throughput up to 54 Mbit/s.
“enhanced SSID security” = hiding the SSID, so we must uncheck the Broadcast SSID option</p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0e47819b-0eae-48f7-b69d-f6a123dc1602.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b357dad4-35c9-4fc9-bd36-99e894479b7c.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>FlexConnect Local Switching</strong> — allows branch APs to handle data traffic locally instead of sending it back to the WLC.</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f6c33954-f1ac-4965-a5ab-970070dffe5e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9761b04f-87fa-4524-b7b6-58d00eb6b1da.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>C D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f7ce64e0-7a32-48fb-bf4e-a76ae0b69d3a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>802.11g</strong> → Operates at <strong>2.4 GHz</strong></p>
<ul>
<li>By default, the WLAN is mapped to the <strong>guest interface</strong> (seen in the exhibit).</li>
<li>To make this production-ready, you need to <strong>map the WLAN to another interface</strong> (e.g., a corporate VLAN instead of guest).</li>
</ul>
<p><strong>B D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0a3f2043-19f4-4dce-bd09-3567dadc24b6.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d036ba57-edcb-433c-8df9-329fb0bf9501.png" alt="CCNA 200-301 Study (1)" /></p>
<p> <strong>B D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8954a18b-82e5-4d97-88bb-d61b213376df.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To get the <strong>highest security with domain credentials (LDAP)</strong>:</p>
<ul>
<li>Use <strong>WPA2</strong> (strongest encryption). ✅</li>
<li>Use <strong>802.1X</strong> (Enterprise authentication with usernames/passwords). ✅</li>
</ul>
<p><strong>C D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/08c687c6-12c8-41a2-8fda-2e47f3cf240d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/078a23bd-ef94-48d7-ac8b-69b35588f710.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/39f3ae57-df68-4551-8919-29986039340d.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The fix: install a <strong>publicly trusted third-party certificate</strong> (e.g., DigiCert, GoDaddy, Let’s Encrypt) on Cisco ISE so <strong>both employees and contractors</strong> trust it automatically.</p>
<p><strong>B ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1aad0a18-9a39-404e-b824-af8dc37cf261.png" alt="CCNA 200-301 Study (1)" /></p>
<p>To make <strong>SIP Call Admission Control</strong> work on WLC:</p>
<ol>
<li><strong>Turn on Media Session Snooping</strong> → so the WLC can detect SIP calls.</li>
<li><strong>Set QoS to Platinum</strong> → highest priority for voice traffic.</li>
</ol>
<p><strong>C D  ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/56df2d22-63f4-487d-97f5-778e56f8055b.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2a3d45d4-432e-4eb3-84b2-9414677b1cd9.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Local mode</strong> = 2 CAPWAP tunnels (all traffic to WLC).</li>
<li><strong>FlexConnect</strong> = traffic can stay local (no tunnel for data).</li>
</ul>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/34e3a95f-17c2-43cf-9486-195a9d29a99c.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>In <strong>local mode</strong>, an AP forms a <strong>CAPWAP tunnel (control + data)</strong> with the WLC.</li>
<li>This tunnel runs over <strong>IP (UDP ports 5246 for control, 5247 for data)</strong>.</li>
<li>As long as the AP can <strong>reach the WLC’s management/AP-manager interface IP</strong> (through L2/L3 network), it doesn’t matter which switch it’s connected to.</li>
</ul>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/73299f9a-a0f7-4357-9528-c29c288b3fff.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>BC ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/735b9e3d-682a-45c8-9b84-9d0cc70b879c.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>A <strong>CA</strong> issues and manages certificates.</li>
<li>A <strong>CRL</strong> is a list of revoked certificates.</li>
</ul>
<p><strong>BD ✅</strong></p>
<h2 id="heading-ccna-volume-2">CCNA Volume 2</h2>
<h2 id="heading-access-control-list">Access Control List</h2>
<h1 id="heading-what-is-an-access-control-list">What is an Access Control List</h1>
<ul>
<li><strong>An access list (ACL)</strong> is a set of rules for <strong>controlling traffic</strong> and <strong>reducing network attacks</strong>. ALCs <strong>filter traffic</strong> based on rules(<strong>IP address, protocol, or port)</strong> defined for incoming and outgoing traffic on the network.</li>
</ul>
<h1 id="heading-access-control-list-feature">Access Control List Feature</h1>
<ul>
<li>Configuring an ACL in <strong>global config</strong> mode will not make the ACL take effect.</li>
<li>The ACL must be applied to an <strong>interface</strong>.</li>
<li>ACLs are applied either <strong>inbound or outbound</strong>.</li>
<li>When the router checks a packet against the ACL, it processes the ACEs (Access Control Entries) in order,  <strong>top to down in sequential order.</strong></li>
<li>If the <strong>packet matches one of the ACEs in the ACL</strong>, the router takes the action and <strong>stops
processing the ACL</strong>. All entries below the matching entry will be ignored.</li>
<li>The <strong>interface will take action based on the match condition.</strong> There are two possible actions: <strong>permit</strong> and <strong>deny</strong>.</li>
<li>If the <strong>permit condition</strong> matches, a packet will be <strong>allowed</strong> to <strong>pass from the interface.</strong></li>
<li>If the <strong>deny condition</strong> matches, the <strong>packet will be destroyed immediately</strong></li>
<li>A maximum of one ACL can be applied to a single interface per direction.
Inbound: Maximum one ACL
Outbound: Maximum one ACL</li>
<li>Every ACL has a <strong>default</strong> <strong>deny</strong> <strong>statement</strong> at the <strong>end of it</strong>.</li>
<li>What will happen if a <strong>packet doesn’t match any of the entries in an ACL</strong>?</li>
</ul>
<p>There is an ‘<strong>implicit deny</strong>’  (if source IP = any, then deny) at the end of all ACLs there’s an <strong>invisible rule</strong>.
The <strong>implicit deny</strong> tells the router to deny all traffic that doesn’t match any of the configured
entries in the ACL.</p>
<pre><code class="lang-java">deny any
</code></pre>
<p>So if you forget to add a <code>permit</code> statement, all traffic gets blocked.</p>
<h1 id="heading-type-of-access-control-list">Type of Access Control List</h1>
<ul>
<li><strong>Standard Access List (Basic):</strong> Filter traffic <strong>based only on source IP address</strong>.
By <strong>using numbers 1-99 or 1300-1999, the router</strong> will understand it as a standard ACL and the specified address as the source IP address. Typically <strong>applied close to the destination</strong>.</li>
</ul>
<pre><code class="lang-php">
! Step <span class="hljs-number">1</span>: Define ACL
access-<span class="hljs-keyword">list</span> &lt;<span class="hljs-number">1</span><span class="hljs-number">-99</span>&gt; permit|deny &lt;source&gt; &lt;wildcard&gt;

! Step <span class="hljs-number">2</span>: Apply ACL to <span class="hljs-class"><span class="hljs-keyword">interface</span>
<span class="hljs-title">interface</span> &lt;<span class="hljs-title">interface</span>-<span class="hljs-title">id</span>&gt;
 <span class="hljs-title">ip</span> <span class="hljs-title">access</span>-<span class="hljs-title">group</span> &lt;1-99&gt; <span class="hljs-title">in</span> | <span class="hljs-title">out</span></span>
</code></pre>
<ul>
<li><strong>Extended Access List (Advanced):</strong> Filter traffic based on <strong>source and destination IP addresses, protocols, port numbers</strong>, and other criteria. T<strong>hese use ranges from 100-199 and 2000-2699.</strong> <strong>Typically applied close to the source.</strong></li>
</ul>
<pre><code class="lang-php">access-<span class="hljs-keyword">list</span> &lt;number&gt; permit|deny &lt;protocol&gt; &lt;source&gt; &lt;src_wildcard&gt; &lt;destination&gt; &lt;dest_wildcard&gt; [eq &lt;port&gt;]
</code></pre>
<h1 id="heading-applying-access-control-list">Applying Access Control List</h1>
<h3 id="heading-inbound-access-list"><strong>Inbound access list:</strong></h3>
<ul>
<li><strong>Definition</strong>: Traffic <strong>entering</strong> the router through an interface <strong>before routing decisions</strong> are made.</li>
<li>Think: "Packets coming into the door."</li>
<li>If denied, the router <strong>drops the packet immediately</strong>—saves CPU and bandwidth.</li>
<li><strong>Use Case</strong>: Good for filtering unwanted traffic <strong>as close to the source as possible</strong>.</li>
</ul>
<h3 id="heading-outbound-access-list"><strong>Outbound access list:</strong></h3>
<ul>
<li><strong>Definition</strong>: Traffic <strong>leaving</strong> the router through an interface <strong>after routing decisions</strong> are made.</li>
<li>Think: "Packets going out the door."</li>
<li>The router first checks the routing table → then applies ACL rules on the <strong>outbound</strong> interface.</li>
<li><strong>Use Case</strong>: Useful when you want to control traffic <strong>leaving for a specific destination network.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3f8541e2-b09d-49b3-a95a-a7a5e8b22821.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4e9143de-30d2-46a4-9224-bfd90a870aab.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/29ec752d-5454-4d20-8fb3-9534f9c4670d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/55afba0d-0ee1-45a6-9ee8-7b5d322d2a78.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-applying-the-access-control-list">Applying the Access Control List</h1>
<ul>
<li><strong>Numbered access list:</strong> These are <strong>the access lists that cannot be deleted, specifically, one created.</strong> If we want to remove any rule from an access list, then this is not permitted in the case of a numbered access list. I<strong>f we attempt to delete a rule from the access list, the entire access list will be deleted.</strong> The numbered access list <strong>can be used</strong> with both <strong>standard and extended access</strong> lists.</li>
</ul>
<h3 id="heading-numbered-acl-vs-named-acl"><strong>🔢 Numbered ACL vs 🏷️ Named ACL</strong></h3>
<h2 id="heading-1-numbered-acl">1. Numbered ACL</h2>
<ul>
<li>Uses <strong>numbers</strong> to identify the ACL.</li>
<li>Example ranges:<ul>
<li><strong>Standard ACL</strong>: 1–99 (expanded: 1300–1999)</li>
<li><strong>Extended ACL</strong>: 100–199 (expanded: 2000–2699)</li>
</ul>
</li>
<li><strong>Editing</strong>: If you want to change one entry, you usually need to <strong>remove the entire ACL</strong> and re-create it.</li>
<li><strong>Usage</strong>: Simple, fast for small configs.</li>
</ul>
<h2 id="heading-2-named-acl">2. Named ACL</h2>
<ul>
<li>Uses a <strong>name</strong> (instead of a number) to identify the ACL.</li>
<li>Easier to read and understand (e.g., <code>BLOCK-PC1</code> instead of <code>10</code>).</li>
<li><strong>Editing</strong>: You can enter ACL configuration mode and add/remove individual lines without deleting the whole ACL.</li>
<li><strong>Usage</strong>: Preferred in modern configs for flexibility and clarity.</li>
</ul>
<pre><code class="lang-php">no ip access-<span class="hljs-keyword">list</span> {standard | extended} &lt;NAME&gt;
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3ab55157-5908-4916-ac88-c47b1ef21b9f.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 We added 0.0.0.0 as a wildcard, which means only denying this IP address. If we add 0.0.0.255 as a wildcard, all IPs get denied.      </p>
<p> <strong>Router(config-std-nacl)#deny 192.168.1.0  0.0.0.255 it means deny all the network completely</strong>  </p>
<p>A <strong>remark</strong> in an access list is simply a <strong>comment or description</strong> you add to make the ACL more readable and understandable</p>
</blockquote>
<ul>
<li><strong>Named Access List: I</strong>n this type of access list, <strong>a name is assigned to identify an access list.</strong> These can be used with both standards and extended access lists.</li>
</ul>
<pre><code class="lang-javascript">R1(config)# access-list standard [name ] MY_ACL
R1(config-std-nacl)# deny <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
R1(config-std-nacl)#permit any
</code></pre>
<pre><code class="lang-javascript">R1(config)# int fa0/<span class="hljs-number">5</span>
R1(config-<span class="hljs-keyword">if</span>)# ip access-group MY_ACL out
</code></pre>
<h2 id="heading-how-can-the-staff-department-be-denied-access-to-the-server"><strong>How can the staff department be denied access to the server?</strong></h2>
<p>The administrator can fix this problem in two ways. He can apply an <strong>inboard</strong> ACL to the <strong>F0/0</strong> interface, or he can apply an <strong>outbound</strong> ACL to the <strong>F0/2</strong> interface </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/29397a75-c1c0-4338-9f88-cdfaf1ca72cd.png" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.computernetworkingnotes.com/ccna-study-guide/basic-concepts-and-fundamentals-of-acls.html">bookmark</a></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2f67df3c-098f-4d1d-a6e6-8df184709df3.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>D</strong></li>
</ul>
<h2 id="heading-how-to-delete-a-rule-inside-the-access-list">How to delete a rule inside the access list?</h2>
<ul>
<li><strong>Numbered Access List</strong></li>
</ul>
<pre><code class="lang-javascript">
Router(config)#ip access-list extended <span class="hljs-number">101</span>
</code></pre>
<blockquote>
<p>💡 This deletes <strong>all entries</strong> in access-list 100.<br />numbered ACLs, you have to delete the entire ACL and re-create it without the unwanted entries.</p>
</blockquote>
<p>    numbered ACLs, you have to delete the entire ACL and re-create it without the unwanted entries.</p>
<ul>
<li><strong>Named Access List</strong></li>
</ul>
<pre><code class="lang-javascript">Router#show access-lists 
Extended IP access list <span class="hljs-number">101</span>
    <span class="hljs-number">20</span> deny tcp host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.20</span> host <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.100</span> eq www (<span class="hljs-number">27</span> match(es))
    <span class="hljs-number">30</span> deny icmp host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span> host <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.100</span> (<span class="hljs-number">4</span> match(es))
    <span class="hljs-number">40</span> permit ip any any


Router(config)#ip access-list extended <span class="hljs-number">101</span>
Router(config-ext-nacl)#no <span class="hljs-number">20</span> (sequence number) **or** no <span class="hljs-number">30</span> deny icmp host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span> host <span class="hljs-number">192.168</span><span class="hljs-number">.3</span><span class="hljs-number">.100</span>
</code></pre>
<h2 id="heading-extended-access-list-advanced">Extended Access List (Advanced)</h2>
<p>In the standard Access List, <strong>we permit the device for everything</strong>, but with the <strong>Extended Access List, you can specify with service permit and with service deny</strong>  </p>
<p>With Extended Access lists, you can evaluate additional packet information, such as: </p>
<ul>
<li>Source and destination IP address</li>
<li>Type of TCP/IP Protocol(TCP, UDP, IP)</li>
<li>source and destination port numbers.</li>
</ul>
<pre><code class="lang-javascript">Router(config)#access-list [number <span class="hljs-number">100</span>–<span class="hljs-number">199</span> | <span class="hljs-number">2000</span>–<span class="hljs-number">2699</span>] [permit | deny] [protocol] [source IP] [wildcard] [destination IP] [wildcard] [operator] [port]
</code></pre>
<p><strong>operator:</strong></p>
<p>● <strong>eq 80</strong> = equal to port 80
● <strong>gt 80</strong> = greater than 80 (81 and greater)
● <strong>lt 80</strong> = less than 80 (79 and less)
● <strong>neq 80</strong> = NOT 80
<strong>● range 80 100</strong> = from port 80 to port 100</p>
<p>Allow traffic from 10.0.0.0/16 to access the server at 2.2.2.2/32 using HTTPS (<strong>Numbered Access List</strong>)</p>
<pre><code class="lang-javascript">Router(config)# access-list <span class="hljs-number">110</span> permit tcp <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.255</span><span class="hljs-number">.255</span> <span class="hljs-number">2.2</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> eq <span class="hljs-number">443</span>
</code></pre>
<p>Hosts in 192.168.1.0/24 can’t use HTTPS to access SRV1. (<strong>Named Access List</strong>) </p>
<pre><code class="lang-javascript">R1(config)#ip access-list extended HTTP_SRV1
R1(config-ext-nacl)#deny tcp <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> host <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span> eq <span class="hljs-number">443</span>
R1(config-ext-nacl)#permit ip any any
R1(config-ext-nacl)#interface g0/<span class="hljs-number">1</span>
R1(config-<span class="hljs-keyword">if</span>)#ip access-group HTTP_SRV1 <span class="hljs-keyword">in</span>
Extended ACLs
</code></pre>
<p>### 
ACL sequence numbers:</p>
<ul>
<li><strong>Numbered ACLs</strong> → ❌ No <em>sequence</em> numbers. Rules are applied in the order you type them. To edit, you usually delete and rebuild.</li>
<li><strong>Named ACLs</strong> → ✅ Support <em>sequence</em> numbers (default: 10, 20, 30 …) <em>sequence</em> numbers (default<ul>
<li>You can <strong>insert</strong> a rule at a specific number.</li>
<li>You can <strong>remove</strong> a rule using its number (<code>no 15</code>).</li>
<li>You can <strong>re-</strong><em><strong>sequence</strong></em> to clean up numbering (<code>ip access-list resequence NAME 10 10</code>).</li>
</ul>
</li>
</ul>
<pre><code class="lang-php">ip access-<span class="hljs-keyword">list</span> standard BLOCK-PC
  <span class="hljs-number">10</span> deny host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>
  <span class="hljs-number">20</span> permit any
</code></pre>
<pre><code class="lang-php">ip access-<span class="hljs-keyword">list</span> standard BLOCK-PC
  <span class="hljs-number">15</span> deny host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.20</span>
</code></pre>
<h2 id="heading-standard-access-list-lab">Standard Access-List lab</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dd8c6a0d-0882-4f6f-99a4-885ab0b6704a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we are using standard access lists to perform the following network traffic control tasks:</p>
<ul>
<li><strong>Block</strong> <strong>PC1</strong> from accessing SRV1 (using a numbered standard access list).</li>
<li><strong>Allow</strong> only <strong>PC3</strong> to access SRV2 (using a named standard access list).</li>
</ul>
<h2 id="heading-basic-ip-configuration-2">Basic IP Configuration</h2>
<h3 id="heading-end-user-devices">End-User Devices</h3>
<pre><code class="lang-javascript">PC1&gt;ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span>

PC2&gt;  ip <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span>


PC3&gt;ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>  <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span>

PC4&gt; ip <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span>
</code></pre>
<h3 id="heading-routerr1">Router(R1)</h3>
<pre><code class="lang-javascript">R1#conf t
R1(config)#int fa1/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#int fa2/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#no shutdown 
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#int fa0/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
R1(config-<span class="hljs-keyword">if</span>)#no shut
R1(config-<span class="hljs-keyword">if</span>)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-router-r2">Router (R2)</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)#int fa0/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shut
R2(config)#int fa1/<span class="hljs-number">0</span> 
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span>  <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shut
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#int fa2/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
R2(config-<span class="hljs-keyword">if</span>)#no shut
R2(config-<span class="hljs-keyword">if</span>)#exit
R2(config)#exit
R2#wr
</code></pre>
<h3 id="heading-server">Server</h3>
<pre><code class="lang-javascript">SRV1&gt; ip <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.254</span> 


SRV2&gt; ip <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>  <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.254</span>
</code></pre>
<h2 id="heading-ospf-configuration-2">OSPF Configuration</h2>
<h3 id="heading-router-r1">Router R1</h3>
<pre><code class="lang-javascript">R1#conf t    
R1(config)#
R1(config)#router ospf <span class="hljs-number">1</span>
R1(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> area <span class="hljs-number">0</span>
R1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R1(config-router)#network <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R1(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
R1(config-router)#passive-interface fa2/<span class="hljs-number">0</span>
R1(config-router)#exit
R1(config)#exit
R1#wr
</code></pre>
<h3 id="heading-router-r2-1">Router R2</h3>
<pre><code class="lang-javascript">R2#conf t
R2(config)# 
R2(config)#router ospf <span class="hljs-number">1</span>
R2(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.3</span> area <span class="hljs-number">0</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>  <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R2(config-router)#network <span class="hljs-number">10.1</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>  <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
R2(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
R2(config-router)#passive-interface fa2/<span class="hljs-number">0</span>
R2(config-router)#exit
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-access-list-configuration">Access List Configuration</h2>
<blockquote>
<p>💡 Standard Access List uses the source IP address. It is <strong>highly recommended that it be applied to the router near the destination if the destination is under your control.</strong></p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/62b0190f-67de-4601-b86d-5c0578839cdb.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R2#conf t
R2(config)# access-list <span class="hljs-number">1</span> deny <span class="hljs-number">172.16</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>  
**R2(config)# access-list <span class="hljs-number">1</span> permit any**  
R2(config)#int fa1/<span class="hljs-number">0</span>    
R2(config-<span class="hljs-keyword">if</span>)#ip access-group <span class="hljs-number">1</span> out
R2(config-<span class="hljs-keyword">if</span>)#exit 

R2(config)#ip access-list standard allow_SRV1
R2(config-std-nacl)#permit <span class="hljs-number">172.16</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
R2(config-std-nacl)#exit
R2(config)#int fa2/<span class="hljs-number">0</span>
R2(config-<span class="hljs-keyword">if</span>)#ip access-group allow_SRV1  out
R2(config-<span class="hljs-keyword">if</span>)#exit 
R2(config)#exit
R2#wr
</code></pre>
<h2 id="heading-important-the-permit-any-rule-is-essential"><strong>Important: The permit any rule is essential</strong></h2>
<p>By default, the access list ends with a hidden '<strong>deny any role</strong>' entry. We use the command below to permit other devices.</p>
<pre><code class="lang-javascript">**R2(config)# access-list <span class="hljs-number">1</span> permit any**
</code></pre>
<h2 id="heading-access-list-verification">Access List verification</h2>
<pre><code class="lang-javascript">R2#show access-list
</code></pre>
<p>This command is useful for verifying whether your access lists are working properly. It shows you how <strong>many packets matched</strong> each <strong>rule</strong> in your configuration.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/190af428-66fc-47bb-8821-2def3e9fc9be.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f890f4d7-6837-4523-aadf-329a60951438.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-extended-acess-list">Extended Acess-List</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/19c4939c-3e66-4dbc-8ffb-95059323655a.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we are using extended  access lists to perform the following network traffic control tasks:</p>
<ul>
<li><strong>Block</strong> <strong>Sales Department</strong> from accessing <strong>ACCWeb-SER01</strong> (using a numbered extended  access list).</li>
<li><strong>Block</strong> <strong>Accounting Department</strong> from accessing <strong>SalesWeb-SER01</strong> (using a named standard access list).</li>
<li>Accounting PCs <strong>couldn’t</strong> access Sales PCs.</li>
</ul>
<h2 id="heading-basic-ip-configuration-3">Basic IP Configuration</h2>
<h3 id="heading-end-user-devices-1">End-User Devices</h3>
<pre><code class="lang-javascript">SalesPC<span class="hljs-number">-01</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>


SalesPC<span class="hljs-number">-02</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.3</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<pre><code class="lang-javascript">ACCPC<span class="hljs-number">-01</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
ACCPC<span class="hljs-number">-01</span>&gt; ip <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.3</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>
</code></pre>
<h3 id="heading-routersluhq">Router(SLU_HQ)</h3>
<pre><code class="lang-javascript">SLU_HQ#conf t
SLU_HQ(config)#
SLU_HQ(config)#int fa1/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
SLU_HQ(config-<span class="hljs-keyword">if</span>)#no shut
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#int fa0/<span class="hljs-number">0</span> 
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.2</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.252</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#no shut
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#int fa2/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#no shut
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<h3 id="heading-router-dcr01">Router (DC_R01)</h3>
<pre><code class="lang-javascript">DC_R01#conf t 
DC_R01(config)#int fa2/<span class="hljs-number">0</span>
DC_R01(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
DC_R01(config-<span class="hljs-keyword">if</span>)#no shut
DC_R01(config-<span class="hljs-keyword">if</span>)#exit

DC_R01(config)#int fa0/<span class="hljs-number">0</span>
DC_R01(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
DC_R01(config-<span class="hljs-keyword">if</span>)#no shut
DC_R01(config-<span class="hljs-keyword">if</span>)#exit

DC_R01(config)#int fa1/<span class="hljs-number">0</span>         
DC_R01(config-<span class="hljs-keyword">if</span>)#ip add <span class="hljs-number">10.0</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span> 
DC_R01(config-<span class="hljs-keyword">if</span>)#no shut
DC_R01(config-<span class="hljs-keyword">if</span>)#exit
DC_R01(config)#exit
DC_R01#wr
</code></pre>
<h2 id="heading-rip-configuration">RIP Configuration</h2>
<h3 id="heading-routersluhq-1">Router(SLU_HQ)</h3>
<pre><code class="lang-javascript">DC_R01#conf t                       
DC_R01(config)#router rip
DC_R01(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.0</span>
DC_R01(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>  
DC_R01(config-router)#network <span class="hljs-number">10.0</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>
DC_R01(config-router)#no auto-summary 
DC_R01(config-router)#version <span class="hljs-number">2</span>
DC_R01(config-router)#passive-interface fa0/<span class="hljs-number">0</span>
DC_R01(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
DC_R01(config-router)#exit
DC_R01(config)#exit
DC_R01#wr
</code></pre>
<h3 id="heading-router-dcr01-1">Router (DC_R01)</h3>
<pre><code class="lang-javascript">SLU_HQ#conf t
SLU_HQ(config)#
SLU_HQ(config)#router rip
SLU_HQ(config-router)#network <span class="hljs-number">10.10</span><span class="hljs-number">.10</span><span class="hljs-number">.0</span>
SLU_HQ(config-router)#network <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span>
SLU_HQ(config-router)#network <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span>
SLU_HQ(config-router)#no auto-summary 
SLU_HQ(config-router)#version <span class="hljs-number">2</span>
SLU_HQ(config-router)#passive-interface fa1/<span class="hljs-number">0</span>
SLU_HQ(config-router)#passive-interface fa2/<span class="hljs-number">0</span>
SLU_HQ(config-router)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<h2 id="heading-access-list-configuration-1">Access List Configuration</h2>
<blockquote>
<p>💡 Extended Access List is <strong>highly recommended to be applied to the router nearest the source.</strong></p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2342cb3b-4c51-4542-90cf-311e386fd43e.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">SLU_HQ(config)#access-list <span class="hljs-number">101</span> deny tcp <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> host <span class="hljs-number">10.0</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> eq <span class="hljs-number">80</span>

SLU_HQ(config)#access-list <span class="hljs-number">101</span> deny ip <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>

SLU_HQ(config)#access-list <span class="hljs-number">101</span> **permit ip any any**

SLU_HQ(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip access-group <span class="hljs-number">101</span> <span class="hljs-keyword">in</span>

SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<pre><code class="lang-javascript">SLU_HQ(config)#ip access-list extended  Acc_Rules 
SLU_HQ(config-ext-nacl)#deny tcp <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> host <span class="hljs-number">10.0</span><span class="hljs-number">.2</span><span class="hljs-number">.2</span> eq <span class="hljs-number">80</span>
SLU_HQ(config-ext-nacl)#deny ip <span class="hljs-number">172.20</span><span class="hljs-number">.2</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> <span class="hljs-number">172.20</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
SLU_HQ(config-ext-nacl)#**permit ip any any**
SLU_HQ(config-ext-nacl)#exit
SLU_HQ(config)#int fa2/<span class="hljs-number">0</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#ip access-group Acc_Rules <span class="hljs-keyword">in</span>
SLU_HQ(config-<span class="hljs-keyword">if</span>)#exit
SLU_HQ(config)#exit
SLU_HQ#wr
</code></pre>
<blockquote>
<p>💡 By default, the access list ends with an implicit <strong><code>deny any</code></strong>. We use the command <strong><code>permit ip any any</code></strong> to allow traffic from all other devices.</p>
</blockquote>
<h2 id="heading-access-list-verification-1">Access List verification</h2>
<pre><code class="lang-javascript">R2#show access-list
</code></pre>
<p>This command is very useful for verifying if your access lists are working and tells you how <strong>many packets matched</strong> each <strong>rule</strong>.</p>
<h3 id="heading-before-applying-the-extended-access-list">Before applying the extended access list</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4936e982-6f54-42b6-b85e-8dbe384163ab.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-after-applying-the-extended-access-list">After applying the extended access list</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f488127f-4f54-42dd-98c1-a9969027501f.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9c4049d2-07a4-4aa5-924a-c822f1f34b19.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-access-list-questions">Access List Questions</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cc392101-4db3-4583-89a0-a05fdd09530e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>FastEthernet0/1</strong> = LAN interface,  DHCP uses <strong>UDP</strong> 
Between A and D </p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e272b31b-f09e-44a5-9aea-5bb6a9e9b695.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>The ACL has a line: <code>deny ip any 10.20.1.0 0.0.0.255</code></li>
<li>That line blocks <strong>all traffic</strong> to the entire 10.20.1.0/24 network.</li>
<li>SSH permit (<code>permit tcp any 10.20.1.0 0.0.0.127 eq 22</code>) is written <strong>after</strong> it, but ACLs work <strong>top-down</strong></li>
</ul>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/40cfd6ca-b6bc-4316-8a5f-db3b0d1a077d.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b7ef63a8-73a7-4289-b912-c6b462445950.png" alt="CCNA 200-301 Study (1)" /></p>
<p>between A and D:
To restrict <strong>VTY</strong> (remote CLI) access, you must use <strong><code>access-class</code></strong> under the VTY lines, not <code>access-group</code> (that’s for interfaces).</p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eaae542b-c532-4f1d-a8d1-04ba21df98c4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Best way: <strong>add one line</strong> to the ACL with a <em>sequence</em> number for efficiency.<em>sequence</em> number for efficiency</p>
<p><strong>B✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/73938d6c-aaa6-4bf8-8384-bb076dba1811.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>CB ✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/25f99359-1938-418c-9185-3e08001ad889.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>B E ✅</strong></p>
<p><strong>B. A matching permit statement is too broadly defined</strong> ✅</p>
<ul>
<li>Example: <code>permit ip any any</code>.</li>
<li>This will match all packets immediately and allow everything.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8fc5a68a-7a9b-4c88-b93f-221e8c57456c.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Add</strong> <strong><code>permit ip any any</code></strong> <strong>at the end</strong> – without a final permit, the implicit deny would block all other traffic. This line allows everything else after the specific denies.</p>
<p> <strong>Swap source and destination in ACL 101</strong> – the denies are written with <strong>source = 10.0.20.0/26</strong> and <strong>destination = 10.0.10.0/26</strong>, but we need to block traffic <strong>from 10.0.10.0/26 to 10.0.20.0/26</strong> on ports 25 and 80. So the addresses must be reversed.</p>
<p><strong>AD ✅</strong></p>
<h2 id="heading-securing-cisco-devices">Securing Cisco Devices</h2>
<h1 id="heading-security-planes">Security Planes</h1>
<p><strong>Management Plane:</strong> The management plane is used to access, configure, manage, and monitor a network device. (This phase is about securing network  devices)</p>
<p><strong>Control Plane:</strong> The Control Plane consists of the protocols and processes that communicate between network devices in order to move data from source to destination. This includes routing protocols such as BGP, OSPF, and signaling protocols. (<strong>Responsible for building and maintaining the routing and switching tables</strong>.) In this phase, you can control which devices are allowed to receive OSPF updates.</p>
<p><strong>Data plane:</strong> The data plane <strong>is responsible for transferring data from the source to the destination**</strong>.** This is where most data packets flow within the network device. (This phase is about securing user data moved across a network.)</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1689bb15-1d0d-46cb-945c-de7aaccb3c71.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>D✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/91e579cc-c11a-4a8f-b929-993631603f6f.png" alt="CCNA 200-301 Study (1)" /></p>
<p> Data plane function (switch tagging/untagging VLANs)</p>
<p>Data plane (switch forwarding decision).
<strong>CD✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f6913529-bb34-4543-ac7e-8dd714e1e6ea.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>A✅</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8f85829b-4dad-4afc-91ef-2f51c9de3a81.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Control plane</strong> → Handles routing protocols, builds routing tables, and makes forwarding decisions.
<strong>D✅</strong></p>
<h1 id="heading-aaa-servers">AAA Servers</h1>
<ul>
<li>AAA Server is a server that provide<strong>s three important functions for network security</strong>: <strong>Authentication</strong>, <strong>Authorization</strong>, and <strong>Accounting</strong>  (AAA). You can easily change/enable/disable account passwords, enforce strong password policies, and monitor account usage and user access.</li>
</ul>
<p><strong>Authentication:</strong> This is a process of <strong>verifying the identity of a user or a device</strong> attempting to access network resources.  </p>
<p><strong>Authorization:</strong> This is the process of <strong>determining what resources and services a user or device is allowed</strong> to access after authentication. </p>
<p><strong>Accounting:</strong> This is the process of <strong>tracking user activity</strong> on a network.</p>
<h2 id="heading-the-benefit-of-using-an-aaa-server">The benefit of using an AAA server</h2>
<p><strong>Improve  Security:</strong> By centralizing authentication and authorization, an AAA server can help to improve the security of a network <strong>by reducing the risk of unauthorized access.</strong></p>
<p>I<strong>ncreased Scalability:</strong> AAA servers can be <strong>scaled</strong> to support large networks.</p>
<p><strong>Reduced Administrative overhead:</strong> AAA Server can help to <strong>reduce administrative overhead</strong> by automating the process of authenticating and authorizing users. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a605e7a7-3852-4e38-85a1-2c8744edc7a0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><code>aaa new-model</code> is the <strong>master command</strong> that turns on AAA (Authentication, Authorization, and Accounting) on a Cisco device.
<strong>A✅</strong></p>
<h1 id="heading-aaa-external-server">AAA External Server</h1>
<ul>
<li>Radius Server</li>
<li>LDAP Server</li>
<li>Active-Directory Server</li>
<li>TACACS+ Server</li>
<li>Cisco Secure Access Control Server (ACS)</li>
<li>Microsoft Active Directory</li>
<li>Juniper Networks Contrail Access Control</li>
<li>F5 BIG-IP Access Policy Manager (APM)</li>
<li>Aruba ClearPass Policy Manager</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Feature</strong></td><td><strong>TACACS+</strong></td><td><strong>RADIUS</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Developed by</td><td>Cisco</td><td>Livingston Enterprises</td></tr>
<tr>
<td>Supports</td><td>Authentication and authorization</td><td>Authentication only</td></tr>
<tr>
<td>Transport protocol</td><td>TCP</td><td>UDP</td></tr>
<tr>
<td>Packet encryption</td><td>All packets are encrypted</td><td>Only the password is encrypted</td></tr>
<tr>
<td>Command authorization</td><td>Supported</td><td>Not supported</td></tr>
</tbody>
</table>
</div><h1 id="heading-apply-tacacs">Apply TACACS+</h1>
<h2 id="heading-aaa-server-lab">AAA Server LAB</h2>
<p>In this scenario, we will create an AAA server and generate a username and password. After preparing the AAA server, we will apply the AAA configuration to the router. Consequently, when a device attempts to access the router, it should be authorized by requiring the entry of a username and password.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d4968a2f-f3ac-473f-82d6-af8765dc8afe.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-configuring-aaa-service-on-the-server">Configuring AAA Service on the server</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5a74e269-23fd-410d-8f52-0877dfa4a692.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-network-configuration-section">Network Configuration Section</h3>
<p><strong>Client Name:</strong> Name of the device to which you want to apply AAA rules. </p>
<p><strong>Client IP:</strong> the IP address of the client, in this case, I added the IP address of the router.</p>
<p><strong>Server Type: S</strong>elect which type of server you need.</p>
<h3 id="heading-user-setup">User Setup</h3>
<p>Add your username and password as required. </p>
<h1 id="heading-configuring-tacacs-aaa-server-on-a-router">Configuring TACACS+ AAA Server on A router</h1>
<pre><code class="lang-javascript">Router# Config terminal 
Router(config)# enable secret (your password)  <span class="hljs-comment">//create first password </span>
Router(config)#aaa <span class="hljs-keyword">new</span>-model  <span class="hljs-comment">//enable the aaa service </span>
Router(config)# aaa authentication login myauth[your name] group tacacs+ enable 
Router(config)# tacacs-server host <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>(server IP) key mykey (key generated at the server side) 

Router(config)# line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span> 
Router(config)#login authentication myauth[your name] <span class="hljs-comment">//Apple AAA authentication to VTY lines(Telnet,SSh etc) </span>
Router(config)#exit

Router(config)# line vty <span class="hljs-number">0</span>   <span class="hljs-comment">/// by using this command you can apply AAA configuration to console port </span>
Router(config-line)# login authentication <span class="hljs-keyword">default</span>
</code></pre>
<pre><code class="lang-javascript">**R1#show aaa sessions**
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ffd3f935-e841-45f1-b66f-0c609bb69456.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we have access to the router from two different users on two different devices.</p>
<h1 id="heading-configuring-radius-aaa-server-on-a-router">Configuring Radius AAA Server on A router</h1>
<p>We have the same scenario with the same approach, but some of the commands have changed </p>
<pre><code class="lang-javascript">Router# Config terminal 
Router(config)# enable secret (your password)  <span class="hljs-comment">//create first password </span>
Router(config)#aaa <span class="hljs-keyword">new</span>-model  <span class="hljs-comment">//enable the aaa service </span>
Router(config)# aaa authentication login myauth[your name] group **radius** enable 
**Router(config)# radius server  iserver(yourname)(key generated at the server side) 
R1(config-radius-server)#address ipv4  host <span class="hljs-number">10.1</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>(server IP)
R1(config-radius-server)#key  mykey (key generated at the server side)** 
Router(config)# line vty <span class="hljs-number">0</span> <span class="hljs-number">4</span> 
Router(config-line)#login authentication myauth[your name] <span class="hljs-comment">//Apple AAA authentication to VTY lines(Telnet,SSh etc) </span>
Router(config)#exit

Router(config)# line vty <span class="hljs-number">0</span>   <span class="hljs-comment">/// by using this command you can apply AAA configuration to console port </span>
Router(config-line)# login authentication <span class="hljs-keyword">default</span>
</code></pre>
<h1 id="heading-use-local-accounts">Use Local Accounts</h1>
<ul>
<li>If you can’t install and use an external AAA server as discussed in the previous section, at a bare minimum, create separate local accounts for anyone who will give access to your device</li>
</ul>
<pre><code class="lang-javascript">Router# config terminal 

Router(config)# username admin(write your user) secret admin122 (write your password)
</code></pre>
<p>to encrypt the password with a very secure algorithm, SHA1</p>
<pre><code class="lang-javascript">Switch(config)#username rebar algorithm-type sha256 secret cisco
</code></pre>
<blockquote>
<p>💡 If line vty 0 4 is configured for the AAA server, we should change the configuration </p>
</blockquote>
<pre><code class="lang-javascript">Router(config-line)#login authentication myauth[your name]

to 

Router(config-line)#login local
</code></pre>
<h1 id="heading-maximum-failed-attempts">Maximum Failed Attempts</h1>
<ul>
<li>To avoid brute-force password attacks on the devices, you can configure a maximum number of failed login attempts so that a user will be locked out after their threshold.</li>
</ul>
<pre><code class="lang-javascript">Router# config terminal 
Router(config)#login block-<span class="hljs-keyword">for</span> &lt;block-time-period&gt; attempts &lt;fail-attempts&gt; within &lt;login-attempt-time-period&gt;
</code></pre>
<p><strong>:</strong> Time to block login (sec)</p>
<p><strong>:</strong> number of login attempts</p>
<p><strong>&lt;login-attempt-time-period</strong>: Time to watch for login Attempt</p>
<p><strong>Example:</strong> If a login 3 times in 60 seconds, the user will be prevented from logging in for 120 seconds.</p>
<pre><code class="lang-javascript">Router(config)#login block-<span class="hljs-keyword">for</span> <span class="hljs-number">120</span> attempts <span class="hljs-number">3</span> within <span class="hljs-number">60</span>
</code></pre>
<p>This feature is applied to the local account.pkt</p>
<h2 id="heading-ip-service-device-management">IP Service - Device Management</h2>
<h1 id="heading-ntpnetwork-time-protocol-server">NTP(Network Time Protocol) Server</h1>
<p><strong>Internal System Clock</strong>: It is a software-based clock that relies on the device’s CPU and internal timer to keep track of time.</p>
<ul>
<li>The system clock retains the current time only while the device is <strong>powered on</strong>, <strong>once the router reboots, it resets</strong>.</li>
<li>If the router doesn’t have a backup hardware clock, it may default to <strong>reference time(00:00 on January 1, 1970) after rebooting</strong>.</li>
</ul>
<h2 id="heading-a-synchronized-clock-is-crucial-for-a-network-device-for-several-reasons">A synchronized clock is crucial for a network device for several reasons:</h2>
<ul>
<li><strong>Logging and Troubleshooting:</strong> Network devices generate log messages (Syslog) for events such as configuration changes, errors, and network incidents. Accurate timestamps are essential to <strong>understand the order and timing of these events</strong>.</li>
<li><strong>Security(Authentication and Encryption):</strong> Security protocols, such as IPsec and SSL/TLS, rely on synchronized clocks to function correctly.</li>
<li><strong>Compliance:</strong> Many industries have regulatory requirements( Such as PCI DSS) that <strong>mandate accurate timekeeping for logging and auditing</strong>.</li>
<li><strong>Time-Based Access Lists:</strong> Some devices may be configured with time-based access list or firewall rules that allow or deny traffic <strong>based on the time of the day</strong>.</li>
<li><strong>Network Automation: S</strong>ome devices rely on the clock for scheduling tasks like backups. configuration updates.</li>
</ul>
<h2 id="heading-time-configuration">Time configuration</h2>
<p><strong>Software Clock</strong>: the clock the router uses to timestamp logs, routing updates, and other software events. Stored in <strong>RAM</strong> and managed by the operating system.</p>
<p><code>clock set</code> command is used to update software clock.</p>
<p><code>clock read calendar</code> command is used to update software clock from hardware clock. 
<code>show clock</code>  command is used to view the current time of the device.</p>
<p><code>show clock detail</code>   command is used to view the device's current time with the time source.</p>
<pre><code class="lang-javascript">C7200#clock set HH:MM:SS MONTH DAY YEAR
C7200#clock set <span class="hljs-number">10</span>:<span class="hljs-number">45</span>:<span class="hljs-number">30</span> <span class="hljs-number">17</span> Apr <span class="hljs-number">2024</span>

C7200#show clock detail
<span class="hljs-number">10</span>:<span class="hljs-number">45</span>:<span class="hljs-number">51.871</span> UTC Wed Apr <span class="hljs-number">17</span> <span class="hljs-number">2024</span>
Time source is **user configuration**  

C7200#clock read-calendar
C7200#show clock detail 
<span class="hljs-number">09</span>:<span class="hljs-number">20</span>:<span class="hljs-number">51.783</span> UTC Thu Apr <span class="hljs-number">17</span> <span class="hljs-number">2025</span>
Time source is hardware calendar
</code></pre>
<p><strong>Hardware Clock</strong>: A battery-powered clock that runs independently of the router’s OS. Inside the hardware(Real Time clock Chip).</p>
<p> <code>calendar set</code> command is used to update the hardware clock. </p>
<pre><code class="lang-javascript">C7200#calendar set <span class="hljs-number">14</span>:<span class="hljs-number">35</span>:<span class="hljs-number">00</span> <span class="hljs-number">27</span> Dec <span class="hljs-number">2020</span>

C7200#show calendar
<span class="hljs-number">14</span>:<span class="hljs-number">35</span>:<span class="hljs-number">07</span> UTC Sun Dec <span class="hljs-number">27</span> <span class="hljs-number">2020</span>
</code></pre>
<p><code>clock update-calendar</code> command is used to update hardware clock from software clock. </p>
<blockquote>
<p>💡  <code>calendar set</code> <code>clock update-calendar</code>  aren't working on emulators like GNS3, EVE-Ng.  </p>
</blockquote>
<h3 id="heading-updating-time-zone">Updating Time zone</h3>
<pre><code class="lang-javascript">Router(config)# clock timezone &lt;ZONE_NAME&gt; <span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">UTC_OFFSET</span>&gt;</span></span>
</code></pre>
<ul>
<li><code>&lt;ZONE_NAME&gt;</code> – Just a <strong>label</strong> you define (e.g., <code>IRAQ</code>, <code>Baghdad</code>, or anything).</li>
<li><code>&lt;UTC_OFFSET&gt;</code> – Offset in <strong>hours</strong> from UTC. Use <strong>positive numbers</strong> for time ahead of UTC (like Iraq), and <strong>negative</strong> for behind.</li>
</ul>
<pre><code class="lang-javascript">C7200(config)#clock timezone Iraq <span class="hljs-number">3</span>
</code></pre>
<h2 id="heading-ntp-network-time-protocol">NTP (Network Time Protocol)</h2>
<p><strong>Network Time Protocol</strong> is an application layer protocol for time synchronization between TCP/IP network hosts.</p>
<ul>
<li>NTP clients request the time from NTP servers.</li>
<li>A device can be an NTP Server and an NTP client at the same time.</li>
<li>NTP uses UDP <strong>port 123</strong> to communicate.</li>
<li>Cisco devices can operate in three NTP modes: <strong>Server mode, Client mode, and Symmetric mode(Devices can also ‘peer’ with devices at the same stratum to provide more accurate time)</strong>.</li>
<li>You can either configure an <strong>internal or external NTP server</strong> (there are several public NTP servers that you can use as well)</li>
</ul>
<h3 id="heading-reference-clock">Reference Clock</h3>
<p>Reference Clock is usually a very accurate time device, like an atomic clock or a GPS clock </p>
<ul>
<li>Reference clocks are <strong>stratum 0</strong> within the NTP hierarchy.</li>
<li>NTP Servers directly connected to reference clocks are <strong>Stratum 1,</strong> also called <strong>primary servers.</strong></li>
<li>An NTP client can sync to multiple NTP servers.</li>
<li></li>
</ul>
<p><img src="https://cdn.networkacademy.io/sites/default/files/2024-10/cisco-ntp-stratums.svg" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">t1# config terminal
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.0</span> prefer
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.4</span>
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.8</span>
R1(config)#ntp server <span class="hljs-number">216.239</span><span class="hljs-number">.35</span><span class="hljs-number">.12</span>
</code></pre>
<p>If you don't use the <code>prefer</code> keyword, you can configure the Cisco IOS to automatically select the most suitable NTP server.</p>
<pre><code class="lang-javascript">Router# show ntp associations
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b28d8ab7-f4ec-4f7f-b30f-5eaa579bb06f.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">R1#show ntp status
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0d1a4594-4596-4275-bc09-88084a3c8021.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-configuring-ntp-server-mode">Configuring NTP server mode</h3>
<pre><code class="lang-javascript">R2(config)#ntp server <span class="hljs-number">10.0</span><span class="hljs-number">.12</span><span class="hljs-number">.1</span> (R1 configured <span class="hljs-keyword">as</span> a client, receive NTP updates <span class="hljs-keyword">from</span> <span class="hljs-number">10.0</span><span class="hljs-number">.12</span><span class="hljs-number">.1</span>)
</code></pre>
<h3 id="heading-configuring-ntp-symmetric-active-mode">Configuring NTP symmetric active mode</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5cee3cec-d3a1-48ad-a7d6-cd753f48342b.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-simple-network-management-protocolsnmp">Simple Network Management Protocol(SNMP)</h1>
<ul>
<li><strong>SNMP</strong> is an <strong>Application Layer protocol</strong> used for <strong>monitoring and managing network devices</strong> like routers, switches, servers, printers, etc.</li>
<li><strong>SNMP Agent</strong> = UDP 161 <strong>SNMP Manager</strong> = UDP 162</li>
</ul>
<h2 id="heading-key-components-of-snmp">Key Components of SNMP</h2>
<ol>
<li><strong>SNMP Manager</strong><ul>
<li>A central system that collects and processes data from devices.</li>
<li>Usually, a <strong>Network Management System (NMS)</strong>.</li>
</ul>
</li>
<li><strong>SNMP Agent</strong><ul>
<li>Software running on network devices.</li>
<li>Responds to requests from the SNMP Manager.</li>
</ul>
</li>
<li><strong>MIB (Management Information Base)</strong><ul>
<li>A database on the agent side.</li>
<li>Stores variables that the manager can query or set (e.g., CPU load, interface status).</li>
</ul>
</li>
</ol>
<h2 id="heading-how-snmp-works">How SNMP Works</h2>
<ul>
<li>The manager sends <strong>GET</strong> requests to retrieve information.</li>
<li>Agents respond with the requested data.</li>
<li>Agents can also send <strong>TRAPs</strong> (unsolicited alerts) when something critical happens (e.g., interface down).</li>
</ul>
<blockquote>
<p>💡 Trap:  A notification is sent from the agent to the manager. The manager does not send a Response message to acknowledge that it received the Trap, so these messages are ‘unreliable’.</p>
</blockquote>
<h3 id="heading-snmp-commands">SNMP Commands</h3>
<ul>
<li><code>GET</code>: Retrieve one value.</li>
<li><code>GET-NEXT</code>: Retrieve the next value in MIB.</li>
<li><code>SET</code>: Change a value.</li>
<li><code>TRAP</code>: Agent to Manager notification.</li>
</ul>
<h3 id="heading-real-world-example">Real-World Example</h3>
<p>A network admin wants to monitor a switch’s port status:</p>
<ol>
<li>The NMS sends a <strong>GET</strong> request for the interface status OID.</li>
<li>The switch’s SNMP agent replies with the port status (e.g., up/down).</li>
<li>If a port goes down unexpectedly, the agent sends a <strong>TRAP</strong> to the NM</li>
</ol>
<h1 id="heading-syslog">Syslog</h1>
<p>Syslog stands for <strong>System Logging Protocol</strong>. It’s used by <strong>network devices</strong> (routers, switches, firewalls, etc.) to s<strong>end log messages</strong> about their <strong>operational status, errors, and system events</strong> to a central server called a Syslog server.</p>
<ul>
<li>The messages can be displayed in the CLI, saved in the device’s RAM, or sent to an external Syslog server.</li>
<li><strong>Syslog and SNMP</strong> are both used for monitoring and troubleshooting of devices. They are complementary, but their functionalities are different.</li>
</ul>
<h3 id="heading-syslog-message-format">Syslog Message Format</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d76cfedb-f288-44eb-8ef2-21475bf2d74e.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">*Feb <span class="hljs-number">11</span> <span class="hljs-number">03</span>:<span class="hljs-number">02</span>:<span class="hljs-number">55.304</span>: %LINK<span class="hljs-number">-3</span>-UPDOWN: Interface GigabitEthernet0/<span class="hljs-number">0</span>, changed state to up
</code></pre>
<h3 id="heading-syslog-severity-levels">Syslog Severity Levels</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Level Number</td><td>Name</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>0</td><td><strong>Emergency</strong></td><td>System is unusable</td></tr>
<tr>
<td>1</td><td><strong>Alert</strong></td><td>Immediate action needed</td></tr>
<tr>
<td>2</td><td><strong>Critical</strong></td><td>Critical condition</td></tr>
<tr>
<td>3</td><td><strong>Error</strong></td><td>Error condition</td></tr>
<tr>
<td>4</td><td><strong>Warning</strong></td><td>Warning condition</td></tr>
<tr>
<td>5</td><td><strong>Notification</strong></td><td>Normal but significant event</td></tr>
<tr>
<td>6</td><td><strong>Informational</strong></td><td>Informational messages</td></tr>
<tr>
<td>7</td><td><strong>Debugging</strong></td><td>Debugging messages</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>E</strong>very <strong>A</strong>wesome <strong>C</strong>isco <strong>E</strong>ngineer <strong>W</strong>ill  <strong>N</strong>eed <strong>I</strong>ce cream <strong>D</strong>aily </p>
</blockquote>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>Syslog</td><td>SNMP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Purpose</strong></td><td>Logs events and system messages</td><td>Monitors and manages network devices</td></tr>
<tr>
<td><strong>Direction</strong></td><td>Mostly <strong>device → server</strong> (one-way)</td><td><strong>Manager ↔ Agent</strong> (two-way communication)</td></tr>
<tr>
<td><strong>Data Type</strong></td><td>Text-based messages (logs)</td><td>Structured data (counters, statuses, configs)</td></tr>
<tr>
<td><strong>Event Reporting</strong></td><td>Sends alerts automatically (logs)</td><td>Sends info when polled or traps when event occurs</td></tr>
<tr>
<td><strong>Security</strong></td><td>Basic (unless combined with secure transport)</td><td>SNMPv3 offers encryption and authentication</td></tr>
</tbody>
</table>
</div><h3 id="heading-syslog-configuration">Syslog Configuration</h3>
<pre><code class="lang-javascript">R1(config)# logging [server-ip]
R1(config)# logging <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span>
or 
R1(config)# logging host [server-ip]
R1(config)# logging host <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.100</span>
</code></pre>
<ul>
<li>By default, logging messages displayed in the CLI while you are in the middle of typing a command will result in something like this:</li>
</ul>
<pre><code class="lang-javascript">R1#show ip <span class="hljs-keyword">in</span>
*Feb <span class="hljs-number">11</span> <span class="hljs-number">09</span>:<span class="hljs-number">38</span>:<span class="hljs-number">41.607</span>: %SYS<span class="hljs-number">-5</span>-CONFIG_I: Configured <span class="hljs-keyword">from</span> <span class="hljs-built_in">console</span> by Rebar on
consoleterface brief
</code></pre>
<p>To prevent this, you should use the logging synchronous on the appropriate line.</p>
<pre><code class="lang-javascript">R1(config)# no logging synchronous
</code></pre>
<h2 id="heading-ftp-vs-tfp">FTP vs TFP</h2>
<p><strong>File Transfer Protocol</strong>: is a communications protocol used to send files from computer to computer, with one of them acting as the server.</p>
<p><strong>TFTP(Trivial File Transfer Protocol)</strong> is a simplified version of FTP, it is designed to be easy and simple.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4912fb6b-7466-4f26-8603-313693e5f920.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-security-architecture">Security Architecture</h2>
<h2 id="heading-security-principles-cia"><strong>Security Principles CIA</strong></h2>
<ul>
<li>Data <strong>confidentiality</strong> prevents the disclosure of information to <strong>unauthorized people</strong>, resources, or processes. It may require using cryptographic encryption algorithms such as AES to encrypt and decrypt data.</li>
<li>Data <strong>integrity</strong> refers to the accuracy and consistency of data, ensuring that data is <strong>not tampered with by unauthorized users</strong>. It requires the use of cryptographic hashing algorithms such as SHA.</li>
<li>Data <strong>availability</strong> ensures that <strong>information is accessible by authorized users</strong> when needed. It requires implementing redundant services, gateways, and links.</li>
</ul>
<h2 id="heading-data-states">Data States</h2>
<p>The cyberspace domain contains a considerable amount of critically important data. But in what state? The second dimension of the cybersecurity cube represents the three possible data states:</p>
<ul>
<li>Data <strong>in transit.</strong></li>
<li>Data <strong>at rest</strong> or in storage.</li>
<li>Data <strong>in process</strong>.</li>
</ul>
<h2 id="heading-security-terms">Security Terms</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Term</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Assets</strong></td><td>Anything of value to the organization,</td></tr>
<tr>
<td><strong>Vulnerability</strong></td><td>A weakness in a system or its design that could be exploited by threat hacker.</td></tr>
<tr>
<td><strong>Exploit</strong></td><td>A mechanism that takes advantage of a vulnerability</td></tr>
<tr>
<td><strong>Spoofing</strong></td><td>Impersonating a trusted entity. Fakes identity (IP, MAC, DNS, email, etc.)</td></tr>
<tr>
<td><strong>Sniffing</strong></td><td>Intercepting and monitoring network traffic</td></tr>
<tr>
<td><strong>Mitigation</strong></td><td>The process of taking countermeasures to reduce severity of a potential threat and risk.</td></tr>
</tbody>
</table>
</div><h3 id="heading-the-most-commonly-known-spoofing-attacks-are"><strong>The most commonly known spoofing attacks are:</strong></h3>
<ul>
<li>IP Spoofing,</li>
<li>Email Spoofing,</li>
<li>DNS Spoofing,</li>
<li>ARP Spoofing,</li>
<li>GPS Spoofing</li>
<li>Website Spoofing</li>
<li>MAC Spoofing</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7f621672-97f8-4a33-8af2-001fcc586547.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-denial-of-service-dos-attacks">Denial-of-Service (DOS) Attacks</h2>
<p>A Denial-of-service attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.</p>
<p>The most common DDoS attack occurs in <strong>the network layer (layer 3) and the transport layer(layer 4)**</strong>.** This is because these two layers are responsible for routing traffic and establishing connections between different networks. By flooding the network with traffic, the attacker can overwhelm the network and make it unavailable to legitimate users.</p>
<p><strong>TCP SYN flood.</strong>
→ TCP three-way handshake: <strong>SYN</strong> | <strong>SYN-ACK</strong> | ❌<strong>ACK</strong>
→ The <strong>attacker</strong> sends countless TCP SYN messages to the <strong>target</strong>.
→ The <strong>target</strong> sends a SYN-ACK message in response to each SYN it receives.
→ The <strong>attacker</strong> never replies with the final ACK of the TCP three-way handshake.
→ The incomplete connections fill up the <strong>target’s</strong> TCP connection table.
→ The <strong>attacker</strong> continues sending SYN messages.
→ The target is no longer able to make legitimate TCP connections.</p>
<p><img src="https://www.imperva.com/learn/wp-content/uploads/sites/13/2019/01/syn-flood.jpg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dhcp-exhaustion-attack-spoofing">DHCP exhaustion attack (Spoofing)</h2>
<p>● An attacker uses spoofed MAC addresses to flood DHCP Discover messages.
● The target <strong>server’s DHCP pool</strong> becomes full, resulting in a <strong>denial-of-service to other devices</strong>.</p>
<p><img src="https://robodin.com/wp-content/uploads/2022/09/dhcp1.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-man-in-the-middle-attacks">Man-in-the-middle-attacks</h2>
<p>A man-in-the-middle attack is a type of eavesdropping attack where attackers interrupt an existing conversation or data transfer. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/15c76484-8d3a-402a-8b3b-7048ab31dec5.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-buffer-overflow">Buffer overflow</h2>
<p>A buffer overflow is a type of software security vulnerability that can be exploited by an attacker to gain control of a computer system. It occurs when a program attempts to write more data to a buffer than the buffer can hold. The extra data overwrites adjacent memory locations, which can corrupt data or even crash the program.</p>
<h2 id="heading-malware">Malware</h2>
<p><strong>Malware</strong>, short for <strong>malicious software</strong>, is a software program that is designed to harm a computer system or its users. It can be installed on a computer in a variety of ways, such as clicking on a malicious link, opening an infected attachment, or downloading a file from an untrusted source.</p>
<ul>
<li>A <strong>virus</strong> is malicious software that executes a specific, unwanted, often harmful function on a computer.</li>
<li>A <strong>Trojan horse</strong> is harmful software that is <strong>disguised as legitimate software</strong>. They are spread through user interaction, such as opening email attachments or downloading a file from the Internet.</li>
<li><strong>A worm</strong> executes arbitrary code and installs copies of itself in the memory of the infected compute<strong>r. The main purpose of a worm is to automatically replicate itself and spread across the network from system to system</strong>.</li>
</ul>
<h2 id="heading-human-vulnerability">Human Vulnerability</h2>
<p>Human vulnerability in the IT sector refers to how humans can be exploited by attackers to gain access to system data.</p>
<h3 id="heading-the-most-common-human-vulnerability">The most common Human vulnerability</h3>
<ul>
<li>Phishing</li>
<li>Social Engineering (refers to any attempt to manipulate people into doing something they would not normally do)</li>
<li>Weak password</li>
<li>Poor Security Practices: such as not using a firewall or antivirus software, and not patching software.</li>
</ul>
<h2 id="heading-firewall">Firewall</h2>
<p>In networking, a Firewall is a network device, either hardware or software-based, that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of rules. </p>
<h2 id="heading-intrusion-detection-system-ids">Intrusion Detection System (IDS)</h2>
<p>An intrusion detection system <strong>is a device or software application that monitors network traffic for malicious activity or policy violations.</strong> Any malicious activity or violation is <strong>typically reported or collected centrally</strong> using a security information and event management system.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/9a6bb545-dfcf-44ab-9ab6-933e66f5545e.webp" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 Unlike IPS, a Network Intrusion Detection System (IDS) is <strong>not in line with the data path, so</strong> it can <strong>only alert and alarm on the detection</strong> of anomalies.</p>
</blockquote>
<h2 id="heading-intrusion-prevention-system-ips">Intrusion Prevention System (IPS)</h2>
<p>An <strong>Intrusion Prevention System</strong> <strong>works to detect and prevent identified threats. The IPS reports these events to system administrators and takes preventative action,</strong> such as closing access points and configuring firewalls to prevent future attacks. IPS solutions can also be used to identify issues with corporate security policies.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ee60ba2e-593d-46d7-a09b-fecca9c8d04a.webp" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 <strong>Placement and configuration in</strong> <strong>inline mode</strong> <strong>and generally being in layer 2 after the firewall, inline mode traffic passes into one of the device’s Ethernet ports and out of the other</strong> </p>
<p>💡 Intrusion Prevention System <strong>must work efficiently to avoid decreasing network performance.</strong> It must be quick because exploits might occur at any time.</p>
</blockquote>
<h2 id="heading-cisco-next-generation-firewalls">Cisco Next-Generation firewalls</h2>
<ul>
<li><strong>Next-generation firewalls (NGFWs) combine tr**</strong>aditional firewall technology with additional functionality, such as encrypted traffic inspection, intrusion prevention systems, anti-virus, and more. M<strong>ost notably, </strong>it includes deep packet inspection (DPI). While basic firewalls only look at packet headers<strong>**,</strong> deep packet inspection examines the data within the packet itself, enabling users to identify, categorize, or stop packets with malicious data.</li>
</ul>
<h3 id="heading-an-ngfw-typically-has-the-following-features">An NGFW typically has the following features</h3>
<ul>
<li><strong>Traditional Firewall:</strong> such as stateful filtering, NAT, PAT, and VPN termination.</li>
<li><strong>Application visibility and control (AVC):</strong> makes it possible to look deeply into the application layer data to defend against attacks that use random port numbers.</li>
<li><strong>Advanced Malware Protection:</strong> Block file transfers that would install malware and save copies of files for later analysis.</li>
<li><strong>Uniform resource locator(URL):</strong> URL filtering examines the URLs in each web request, categorizes the URLs, and either filters or rate-limits the traffic based on rules.</li>
<li><strong>NGIPS</strong>: Cisco’s NGFW products can also run their NGIPS <strong>Next-Generation Intrusion Prevention System</strong> feature along with the firewall.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6d85b0e6-3269-4f0a-8c39-2a0d96e6a425.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-switch-port-security">Switch Port Security</h2>
<h1 id="heading-what-is-port-security">What is Port Security?</h1>
<ul>
<li>Port Security is a <strong>layer two (layer-2) traffic control feature</strong> on Cisco Switches. It enables switch <strong>port configuration to allow only a specified number of source MAC addresses</strong> to use the port.</li>
<li>An action will be taken if an <strong>unauthorized source MAC address enters the port</strong>. →The default action is to place the interface in an ‘<strong>err-disabled</strong>’ state.</li>
<li>You can configure the <strong>allowed MAC address manually</strong>. →If you don’t configure it manually, the switch will allow the <strong>first source MAC address</strong> that enters the interface.</li>
<li>You can change the <strong>maximum</strong> number of MAC addresses allowed.</li>
</ul>
<h1 id="heading-violation-mode">Violation mode</h1>
<ol>
<li><strong>Protect:</strong> The switch <strong>port will permit traffic from known MAC addresses</strong> to continue sending while <strong>dropping traffic from unknown MAC addresses.</strong></li>
</ol>
<p>→ The interface is not disabled. 
→ It does not generate syslog/SNMP messages for unauthorized traffic.
→ It does not increment the violation counter.</p>
<ol start="2">
<li><strong>Restrict</strong>: T<strong>he switch port will permit traffic from known MAC addresses to continue sending traffic</strong> while <strong>dropping traffic from unknown  MAC addresses.</strong></li>
</ol>
<p>→ The interface is not disabled. 
→ <strong>It generates syslog/SNMP messages for unauthorized traffic.</strong>
→ <strong>It increments the violation counter by 1 for each unauthorized frame.</strong></p>
<ol start="3">
<li><strong>Shut Down:</strong> <strong>The switch port shuts down immediately if unauthorized access is done.</strong></li>
</ol>
<p>→ <strong>It generates syslog/SNMP messages for unauthorized traffic.</strong>
→ <strong>It increments the violation counter by 1 for each unauthorized frame.</strong>
→ The switch port will be placed in the <strong>err-disabled</strong> state ( <em>this state until manually removed by the administrator by performing a (no shutdown) command</em>).</p>
<blockquote>
<p>💡 <strong>Shut down</strong> is a default switch port violation mode.<br /><strong>Errdisbale</strong> is a feature that automatically disables a port on a Cisco Catalyst switch </p>
</blockquote>
<h1 id="heading-enabling-port-security">Enabling Port Security</h1>
<ul>
<li>Port Security can be enabled with default parameters by issuing a single command on an interface.</li>
</ul>
<pre><code class="lang-javascript"><span class="hljs-keyword">switch</span>(config)# interface f0/<span class="hljs-number">3</span> (selected interface)
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)# switchport port-security  (<span class="hljs-keyword">switch</span> port security enabled)
or 
<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)# switchport port-security mac-address <span class="hljs-number">000</span>a<span class="hljs-number">.000</span>a<span class="hljs-number">.000</span>a (switchport manually adding mac address)


<span class="hljs-keyword">switch</span>(config-<span class="hljs-keyword">if</span>)# switchport port-security violation [mode] (Changing viloation mode shutdown is defualt)  

<span class="hljs-keyword">switch</span># show port-security interface f0/<span class="hljs-number">3</span>
</code></pre>
<h3 id="heading-how-to-reset-an-interface-that-is-disabled-due-to-a-violation-of-port-security"><strong>How to reset an interface that is disabled due to a violation of port security</strong></h3>
<ul>
<li>Disconnect the unauthorized device.</li>
<li>shutdown and then no shutdown the interface</li>
</ul>
<pre><code class="lang-javascript">SW1(config)#interface g0/<span class="hljs-number">1</span>
SW1(config-<span class="hljs-keyword">if</span>)#shutdown
SW1(config-<span class="hljs-keyword">if</span>)#no shutdown
</code></pre>
<h3 id="heading-2-by-using-the-command-below-you-can-reset-your-connection-status-from-down-to-up">2- By using the command below, you can reset your connection status from down to up.</h3>
<pre><code class="lang-javascript">Switch(config)# errdisable recovery cause psecure-violation
Switch(config)#errdisble recovery interval <span class="hljs-number">60</span>
</code></pre>
<p>Please note that this command does not work in Packet Tracer!</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>interval 30</td><td>It means when the port shuts down due to shutdown violation mode recovery the port to upstate after <strong>n</strong> seconds</td></tr>
</thead>
<tbody>
<tr>
<td></td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 Every 5 minutes (by default), all err-disabled interfaces will be re-enabled if err-disable recovery has been enabled for the cause of the interface’s disablement.</p>
</blockquote>
<h1 id="heading-sticky">Sticky</h1>
<p><strong>Switch Port Security with Sticky MAC Addressing</strong> is a Cisco switch feature that allows a port to <strong>dynamically learn MAC addresses</strong> and <strong>automatically convert them to static</strong> secure MAC addresses.</p>
<ul>
<li>For example, if the user provides a <strong>maximum limit of 2 the the first two MAC addresses learned on that port will be placed in the running configuration</strong> after the 2nd learned MAC address. <strong>If the 3rd MAC address wants to access, then the appropriate action will be taken according to the violation mode applied.</strong></li>
</ul>
<pre><code class="lang-javascript">Switch(config)# interface FastEthernet0/<span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)# switchport mode access
Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security
Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security maximum <span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security mac-address sticky [automatically mac address <span class="hljs-keyword">of</span> the first desvice]

or  

Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security mac-address sticky **<span class="hljs-number">000</span>a<span class="hljs-number">.000</span>a<span class="hljs-number">.000</span>a** [<span class="hljs-keyword">static</span> set mac address <span class="hljs-keyword">as</span> sticky]


Switch(config-<span class="hljs-keyword">if</span>)# switchport port-security violation shutdown
</code></pre>
<p>This:</p>
<ul>
<li>Enables port security.</li>
<li>Allows <strong>only 1 MAC address</strong>.</li>
<li>Learns and sticks the MAC of the connected device.</li>
<li>Shuts the port if a violation occurs.</li>
</ul>
<h3 id="heading-tip">🧠 Tip:</h3>
<p>After learning MACs via sticky, you can <strong>save them to the startup config</strong> using:</p>
<pre><code class="lang-javascript">Switch# copy running-config startup-config
</code></pre>
<p>Otherwise, they will be lost on reboot.</p>
<h3 id="heading-mac-address-table">MAC Address Table</h3>
<p>Secure MAC addresses will be added to the MAC address table like any other MAC address.
→ Sticky and Static secure MAC addresses will have a type of STATIC
→ Dynamically-learned secure MAC addresses will have a type of DYNAMIC
→ You can view all secure MAC addresses with <strong>show mac address-table secure</strong> command</p>
<pre><code class="lang-java">SW1#show mac address-table secure
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
<span class="hljs-number">1</span> <span class="hljs-number">000</span>a.<span class="hljs-number">000</span>a.<span class="hljs-number">000</span>a STATIC Gi0/<span class="hljs-number">1</span>
</code></pre>
<h3 id="heading-how-to-remove-the-mac-address-from-the-mac-table-when-it-has-not-been-active-for-a-while">How to remove the MAC address from the MAC table when it has not been active for a while</h3>
<pre><code class="lang-javascript">Switch(config-<span class="hljs-keyword">if</span>)switchport port-security aging time <span class="hljs-number">3</span> (time <span class="hljs-keyword">in</span> minutes)
</code></pre>
<p>After 3 minutes of <strong>inactivity</strong>, <strong>the MAC address was removed from the MAC address table, a</strong>nd then the switch was ready to add another MAC address to the MAC address table.</p>
<blockquote>
<p>💡 By default, secure MAC addresses will not ‘age out’ (Aging Time : 0 mins)</p>
</blockquote>
<h2 id="heading-lab-1">LAB</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/95518f6e-71d6-4f64-a449-67767f3b9b68.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">SW1(config)#<span class="hljs-keyword">int</span> e0/<span class="hljs-number">0</span> 
SW1(config-<span class="hljs-keyword">if</span>)#switchport port-security 
Command rejected: Ethernet0/<span class="hljs-number">0</span> is a dynamic port. 
SW1(config-<span class="hljs-keyword">if</span>)#<span class="hljs-function">switchport mode access 
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport port-security 
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit       
<span class="hljs-title">SW1</span><span class="hljs-params">(config)</span>#exit</span>
</code></pre>
<pre><code class="lang-java">SW1#show port-security <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">e0</span>/0</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c641f9e8-971b-4c5e-ad62-ffdd2a205d21.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">SW1#
SW1#<span class="hljs-function">conf t
<span class="hljs-title">SW1</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> eth0/2
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport mode access 
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#<span class="hljs-keyword">switch</span> port-security maximum 1
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport port-security mac-address sticky 0050.7966.68dc
<span class="hljs-title">SW1</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#switchport port-security violation shutdown</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6427ab65-dfed-4ed0-978d-f7e31030eeaa.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">SW1#show port-security
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4801d8ab-4526-4bd9-a0e1-4577b37b6785.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-dhcp-snooping-and-arp-inspection">DHCP Snooping and ARP Inspection</h1>
<p><strong>DHCP Snooping</strong> is a <strong>security technology</strong> on a <strong>layer 2 network</strong> switch that can <strong>prevent unauthorized DHCP servers from accessing your network</strong>, It is a protection from untrusted hosts that want to become DHCP servers. <strong>DHCP snooping works as protection from man-in-the-middle attacks</strong>. <strong>DHCP itself operates on layer 3</strong> of the OSI model, while <strong>DHCP snooping operates on layer 2</strong> devices to filter the traffic that is coming from DHCP clients.</p>
<ul>
<li>DHCP snooping only <strong>filters DHCP messages</strong>. Non-DHCP messages aren’t affected.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/75d967db-3273-42a3-bd32-a4d6abb173a6.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-dhcp-exhaustion-attack-spoofing-1">DHCP exhaustion attack (Spoofing)</h2>
<p>● An attacker uses spoofed MAC addresses to flood DHCP Discover messages.
● The target <strong>server’s DHCP pool</strong> becomes full, resulting in a <strong>denial-of-service to other devices</strong>.</p>
<p><img src="https://robodin.com/wp-content/uploads/2022/09/dhcp1.webp" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-the-first-step-is-to-trust-the-interface">the first Step is to trust the interface</h3>
<pre><code class="lang-javascript">Switch(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)#ip dhcp snooping trust
</code></pre>
<h3 id="heading-second-step-enable-dhcp-snooping">Second Step Enable DHCP Snooping</h3>
<pre><code class="lang-javascript">Switch(config)#ip  dhcp snooping
Switch(config)#no ip  dhcp snooping information option ( <span class="hljs-keyword">for</span> now disable it)
Switch(config)#ip dhcp snooping vlan <span class="hljs-number">1</span> (select the VLAN you want to apply snooping <span class="hljs-keyword">for</span> now we select Vlan <span class="hljs-number">1</span>)
</code></pre>
<h3 id="heading-third-stage-verification">Third Stage verification</h3>
<pre><code class="lang-javascript">Switch#show ip dhcp snooping
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/83850cfc-d854-408a-bc3d-3f39ce730805.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Switch#show ip dhcp snooping binding
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3fdb8ef2-cc6c-4abd-a454-6bf00ee0816e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Displays a list of IP-to-MAC address bindings dynamically learned via DHCP snooping.</p>
<h1 id="heading-dynamic-arp-inspection">Dynamic ARP Inspection</h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0455f277-a602-48b2-a0dc-a994875f09a6.webp" alt="CCNA 200-301 Study (1)" /></p>
<ol>
<li>First, PC 1 <strong>checks its ARP table for PC2’s IP address</strong> (10.10.10.100)</li>
<li>If there <strong>is no cache</strong>, PC1 will send <strong>ARP Request</strong> and <strong>broadcast</strong> message (<strong>Source: AAAA.AAAA.AAAA,</strong> <strong>destination: FFFF.FFFF.FFFF</strong>) to all hosts on the same subnet.</li>
<li>All hosts will receive the ARP request, but only PC2 will <strong>reply.</strong> PC2 will send an <strong>ARP reply</strong> containing its own MAC address  (EEEE.EEEE.EEEE).</li>
<li>PC1 receives the <strong>MAC Address</strong> and saves it to <strong>its ARP Table.</strong></li>
</ol>
<h2 id="heading-arp-inspection">ARP Inspection</h2>
<p><strong>Dynamic ARP Inspection</strong> (<strong>DAI</strong>) is a <strong>security feature that rejects invalid and malicious ARP packets(ARP spoofing) .</strong> The feature prevents a class of man-in-the-middle attacks. When DAI is enabled, the switch <strong>drops ARP packets</strong> if the <strong>sender MAC address</strong> and <strong>sender IP address</strong> <strong>do not match any entry in the DHCP snooping bindings database</strong>. </p>
<ul>
<li><strong>DAI</strong> only filters ARP messages. Non-ARP messages aren’t affected.</li>
<li>All ports are <strong>untrusted</strong> by default.
→ Typically, all ports connected to other network devices (switches, routers) should be
configured as <strong>trusted</strong>, while interfaces connected to end hosts should remain <strong>untrusted</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a1aff257-579c-4e72-bb94-b5e1eb11db7f.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>Dynamic ARP Inspection <strong>monitors ARP packets on untrusted ports</strong> and <strong>validates them against a trusted source</strong>, usually the <strong>DHCP snooping binding table</strong>. If an ARP packet is invalid or doesn't match the table, it is dropped.</li>
<li>It relies on <strong>DHCP snooping to verify IP-MAC bindings.</strong></li>
<li>Helps maintain <strong>integrity</strong> in <strong>Layer 2 switched</strong> networks.</li>
</ul>
<p>### 
<strong>Why Do We Need Dynamic ARP Inspection (DAI)?</strong></p>
<p>You may be asking why we need Dynamic ARP Inspection (DAI). In our first example, a rogue peer, PC3, is connected to one of the switch ports. PC3 can send a <strong>Gratuitous ARP</strong> or an ARP Reply that was not prompted by an ARP Request to update the ARP mapping of the other hosts on the network.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f3fad906-2454-403e-8da2-3a23b2cc4db2.webp" alt="CCNA 200-301 Study (1)" /></p>
<p>Unknowingly, PC2 will update its ARP Cache and change the MAC address of PC1 to the MAC address of PC3. Same with the other direction, PC3 can spoof PC2 by lying about its MAC address. This attack, or ARP spoofing, is also called a Man-in-the-Middle attack.</p>
<h3 id="heading-enable-arp-inspection">Enable ARP Inspection</h3>
<pre><code class="lang-javascript">Switch(config)#IP arp inspection vlan <span class="hljs-number">1</span>
</code></pre>
<h3 id="heading-dynamic-arp-inspection-verification">Dynamic ARP Inspection Verification</h3>
<pre><code class="lang-javascript">Switch#show ip arp inspection
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6ac6a20e-f8d8-41a7-a84f-32662ddb203a.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Switch#show ip  arp inspection statistics

Switch#show ip arp inspection interfaces
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/67e1e695-5f91-40fb-9977-b3865a7bf4c0.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-to-trust-interfaces-between-network-devices-should-be-trusted">To Trust Interfaces between network devices should be trusted</h3>
<pre><code class="lang-javascript">Switch(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Switch(config-<span class="hljs-keyword">if</span>)#ip arp inspection trust
</code></pre>
<pre><code class="lang-javascript">Switch(config)#ip arp inspection validation [des-mac, ip, src-mac]
</code></pre>
<h2 id="heading-how-to-detect-an-arp-cache-poisoning-attack"><strong>How to Detect an ARP Cache Poisoning Attack</strong></h2>
<pre><code class="lang-powershell">arp <span class="hljs-literal">-a</span>
</code></pre>
<p>The output will look something like this:</p>
<pre><code class="lang-powershell">Internet Address    Physical Address

**<span class="hljs-number">192.168</span>.<span class="hljs-number">5.1</span>        <span class="hljs-number">00</span><span class="hljs-literal">-14</span><span class="hljs-literal">-22</span><span class="hljs-literal">-01</span><span class="hljs-literal">-23</span><span class="hljs-literal">-45</span>**
<span class="hljs-number">192.168</span>.<span class="hljs-number">5.201</span>      <span class="hljs-number">40</span><span class="hljs-literal">-d4</span><span class="hljs-literal">-48</span><span class="hljs-literal">-cr</span><span class="hljs-literal">-55</span><span class="hljs-literal">-b8</span>
<span class="hljs-number">192.168</span>.<span class="hljs-number">5.202</span>      **<span class="hljs-number">00</span><span class="hljs-literal">-14</span><span class="hljs-literal">-22</span><span class="hljs-literal">-01</span><span class="hljs-literal">-23</span><span class="hljs-literal">-45</span>**
</code></pre>
<p>If the table contains two different IP addresses that have the same MAC address, this indicates an ARP attack is taking place. Because the IP address 192.168.5.1 can be recognized as the router, the attacker’s IP is probably 192.168.5.202.</p>
<p>no</p>
<h2 id="heading-nat-network-address-translation">NAT (Network  Address Translation)</h2>
<ul>
<li>NAT (<strong>Network Address Translation</strong>) is a process of mapping multiple private addresses inside a local network to a public address.</li>
</ul>
<h2 id="heading-advantages-of-nat">Advantages of NAT</h2>
<ul>
<li>Connecting a l<strong>arge number of hosts to the global Internet using a smaller number of public (external) IP addresses,</strong> thereby conserving IP address space</li>
<li>It provides <strong>privacy as the device’s IP address,</strong> sending and receiving the traffic, will be hidden.</li>
<li>Eliminates address renumbering when a network evolves. (If the number of private IPs increased or decreased, it didn’t affect the  Public IP)</li>
</ul>
<h2 id="heading-disadvantages-of-nat">Disadvantages of NAT</h2>
<ul>
<li>Translation results in <strong>switching path delays**</strong>.**</li>
<li>Certain <strong>applications will not function while NAT is enabled</strong>. (For example, when gamers have an issue with NAT, they prefer NAT Type 2 to NAT Type 3 for gaming)</li>
<li><strong>Complicates</strong> tunneling protocols such as IPsec.</li>
</ul>
<h2 id="heading-type-of-nat">Type of NAT</h2>
<ul>
<li><strong>Static NAT</strong>: Translate <strong>one private IP</strong> to <strong>one public IP</strong>(one-to-one mapping).</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f94524e1-3636-48de-95f8-f8923a8a18a1.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Dynamic NAT: P</strong>rivate IP addresses are mapped to the pool of public IP addresses. If the IP addresses from the pool are not free, then <strong>the packet will be dropped</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6811ee54-7dd2-4555-9fa3-513503c2c8e5.png" alt="CCNA 200-301 Study (1)" /></p>
<p>At this point, all the shared IP addresses have been used. When <strong>Host D (10.7.7.74)</strong> attempts to initiate a connection to <strong>86.8.6.9</strong>, <strong>the packet is dropped because there are no available public IP addresses on the router.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/427bb1d7-1bcd-49a1-9ae2-f74ad474f5cb.png" alt="CCNA 200-301 Study (1)" /></p>
<p>Therefore, using PAT is the best solution,</p>
<ul>
<li><strong>Port Address Translation</strong>: one public address is used for all internal devices, but a <strong>different port is assigned to each private IP address</strong>. Also known as <strong>NAT overload.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/449b0a5a-59ec-4230-bf2a-1bc00ca2114d.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, we can use one public IP by PAT, many devices can use the same public IP address, and PCs B and C can access the server through different port numbers. <strong>Using one Public IP address to send out a large range of private IPs with different ports</strong> </p>
<h2 id="heading-nat-terminology">NAT Terminology</h2>
<p><strong>Inside Local</strong>: The <strong>private IP address</strong> of your device inside the local network.</p>
<p><strong>Inside Global</strong>: The <strong>public IP address</strong> assigned by NAT for your internal host to use outside.</p>
<p> <strong>Outside  Local:</strong> the <strong>IP addresses</strong> of the <strong>outside host</strong>, from the perspective of the local network     (Public IP).</p>
<p><strong>Outside Global:</strong> Outside global address is the <strong>public IP address</strong> assigned to the end device on the other network to communicate with other devices on the internet. </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Inside Local address</td><td>Outside Local Address</td><td>Inside Global address</td><td>Outside Global  Address</td></tr>
</thead>
<tbody>
<tr>
<td>192.168.1.10/20</td><td>111.1.1.1:80</td><td>200.1.1.1</td><td>111.1.1.1:80</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e5cf681e-9de8-4a83-9fa5-f9b2856688a3.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dc43ea4b-ed87-45d4-bf79-05beaca0746c.gif" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3b6c56ae-f8d2-4fff-b42b-4d02427fda5d.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-static-nat-configuration">Static  NAT Configuration</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e124a0d-5613-4df1-97b1-c71c368d070b.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p>In this lab, static NAT is configured on the selected area, and <strong>Global IP addresses</strong> are translated to <strong>Local IP addresses</strong> based on the static mapping of these IP addresses.</p>
<h3 id="heading-the-first-step-define-which-interface-is-inside-or-outside">The first step define which interface is <strong>Inside</strong> or Outside.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a7075173-3690-48f3-ad96-5a0cdc6a3a1b.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat outside (interface connected to the external network)

Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat inside
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11514a72-4ce2-465e-ac12-a26df85190cd.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router(config)#ip nat ([inside or outside] dway awa alet nawa bo  darawa yan darawa bo nawawa nat akit) 
Router(config)#ip nat inside (wata nawaw la darawa bbinret) source [<span class="hljs-keyword">static</span> or list] (now <span class="hljs-keyword">in</span> <span class="hljs-built_in">this</span> <span class="hljs-keyword">case</span> we have a one <span class="hljs-keyword">static</span> IP)
Router(config)#ip nat inside source <span class="hljs-keyword">static</span> <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> [Inside local IP address] <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> [your public ip address operated by you]
Router(config)# ip nat  inside source <span class="hljs-keyword">static</span> <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span> <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span> [final command should be like <span class="hljs-built_in">this</span>]
</code></pre>
<pre><code class="lang-javascript">Router#show ip nat translations 
Pro  Inside <span class="hljs-built_in">global</span>     Inside local       Outside local      Outside <span class="hljs-built_in">global</span>
---  <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.2</span>           <span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.1</span>        ---                ---
</code></pre>
<p>As you can see, we have a global IP address that NATs to a local IP address. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/36427b0d-7af2-4114-8931-06a278803220.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p>Enter the public IP address of the server in the client browser you can see the server content, because the public IP is translated to the local address of the server.</p>
<p><strong>To verify these NAT translations:</strong></p>
<pre><code class="lang-shell">R1#show ip nat translations
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/120b5589-dfb6-4b9a-887f-f2f652109bbf.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a01abb77-a25d-491a-868c-13a23ae84f91.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡 If you have already statically mapped a private IP address to a public IP address, if you try to map another private IP to the same Public IP, the command will be rejected.</p>
</blockquote>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a226cdf3-5ada-4d3f-8fa6-11ae978465bb.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-dynamic-nat-and-pat">Dynamic NAT and PAT</h1>
<ul>
<li><strong>Configure Inside and Outside Interfaces.</strong></li>
<li>Create an Access List to Match Inside Hosts.</li>
<li>Define a NAT Pool.</li>
<li>Bind the Access List to the Pool.</li>
</ul>
<h3 id="heading-pat-configuration">PAT Configuration</h3>
<ul>
<li>PAT Configuration has the same configuration as Dynamic NAT, just add <strong>overload</strong> to the end.</li>
<li>There's no need to define a pool for a single IP.</li>
</ul>
<pre><code class="lang-javascript">ip nat inside source list <span class="hljs-number">1</span> interface fa0/<span class="hljs-number">1</span> [Inside Gloabal Interface] overload
</code></pre>
<p>This simpler and directly ties NAT to the interface’s IP </p>
<ul>
<li>In case  of using a pool, you can use the pool like this:</li>
</ul>
<pre><code class="lang-javascript">ip nat pool SINGLEPAT <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> netmask <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
</code></pre>
<h3 id="heading-first-we-need-to-configure-the-routers-inside-and-outside-nat-interfaces">First, we need to configure the router’s <strong>inside</strong> and <strong>outside</strong> NAT interfaces:</h3>
<pre><code class="lang-javascript">Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat inside
Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Router(config-<span class="hljs-keyword">if</span>)#ip nat outside
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aa58877d-b6e6-412f-94d5-97e212c58dd0.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-we-need-to-configure-an-acl-that-includes-a-list-of-the-inside-source-addresses-that-will-be-translated">We need to configure an ACL that includes a list of the inside source addresses that will be translated.</h3>
<pre><code class="lang-javascript">Router(config)#access-list <span class="hljs-number">1</span> permit <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
</code></pre>
<h3 id="heading-we-need-to-configure-a-pool-of-global-public-ip-addresses-available-on-the-outside-interfaces">We need to configure a  pool of global (Public) IP addresses available on the outside interfaces</h3>
<pre><code class="lang-javascript">Router(config)#ip nat pool [Pool Name] [Start IP address] [End IP address] netmask [Subnet mask]
Router(config)#ip nat poo1l nat-pool <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span> <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.20</span>  netmask <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
</code></pre>
<p>[Start IP address] [End IP address] is the range of IP addresses you purchased from your ISP. In this example, we purchased 10 IPs from the ISP.</p>
<h3 id="heading-lastly-we-need-to-enable-dynamic-pat-nat">Lastly, we need  to enable Dynamic / PAT NAT</h3>
<pre><code class="lang-javascript">Router(config)#ip nat inside source list [access list name or number] pool [pool name]
Router(config)#ip nat  inside source list <span class="hljs-number">1</span> pool nat-pool  (**without overload command it be dynamic NAT**)
**Router(config)#ip nat  inside source list <span class="hljs-number">1</span> pool nat-pool overload [PAT]**
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/51f7a3d8-3c54-4368-9698-504ef3a41076.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, different port numbers are used for NAT</p>
<h2 id="heading-qos-quality-of-service">QOS Quality of Service</h2>
<h1 id="heading-what-is-qos">What is QOS?</h1>
<p>QoS (<strong>Quality of service)</strong>  refers to the set of technologies used to <strong>manage network traffic</strong> to meet the service requirements of specific applications, especially real-time ones like:</p>
<ul>
<li>Voice over IP (VoIP)</li>
<li>Video conferencing</li>
<li>Online gaming</li>
</ul>
<h3 id="heading-why-is-qos-important">Why is QoS Important?</h3>
<p>Without QoS, all traffic is treated equally, leading to congestion and poor performance of delay-sensitive traffic.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e2b9489c-5c3b-4da8-af86-a0fbaaf9f1a4.png" alt="CCNA 200-301 Study (1)" /></p>
<p>                           Visualizing network bandwidth with and without QOS</p>
<h1 id="heading-qos-queueing">QOS Queueing</h1>
<p><strong>QoS Queuing</strong> is a method used in Quality of Service (QoS) to manage how packets are <strong>stored and transmitted</strong> through network devices (like routers and switches) when there is <strong>congestion</strong>. When multiple packets compete for the same output interface, queuing (Priority Queuing) decides <strong>which packets go first</strong> and which must <strong>wait or get dropped</strong>. <strong>Queues</strong> are <strong>high-performance memory buffers in routers and switches. W</strong>hen a packet is assigned a <strong>higher priority</strong>, it is moved to a dedicated queue that pushes data faster rate</p>
<ul>
<li>If the queue is <strong>full,</strong> n<strong>ew packets will be dropped</strong>, this is called a <strong>tail drop.</strong></li>
<li>Tail drop is harmful because it can lead to <strong>TCP Global Synchronization.</strong></li>
</ul>
<h2 id="heading-type-of-network-traffic">Type of Network Traffic</h2>
<p>QoS is used to manage the following characteristics of network traffic:</p>
<ul>
<li><strong>Bandwidth</strong> is the speed of the link, usually measured as <strong>bits per second(bps).</strong> <strong>QoS can tell a router how to use bandwidth</strong>. For example,  we can configure the router <strong>so that</strong> <strong>one queue gets 50% of the bandwidth</strong>, <strong>queue two gets 20% of the bandwidth</strong>, and <strong>queue three gets 30% of the bandwidth.</strong></li>
<li><strong>Delay(latency)</strong></li>
</ul>
<p>The amount of time it takes for packets of data to travel from <strong>source</strong> to <strong>destination is</strong> = <strong>one-way delay.</strong></p>
<p>The amount of time it takes for packets of data to travel from <strong>source</strong> to <strong>destination</strong> and <strong>return</strong> =<strong>two-way delay.</strong></p>
<ul>
<li><strong>Jitter:</strong> the variation in <strong>one-way delay between packets sent by the same application</strong>. For example, <strong>The first packet is sent</strong> and the <strong>second packet is sent after 50 milliseconds</strong> (MS), <strong>the time it takes for the second packet to be sent after the first packet was sent is the jitter</strong> and, it is 50 Ms. which can result in packets arriving late and out of the sequence. This can cause <strong>distortion or gaps in audio and video being delivered</strong>.   (A better connection should have less jitter)</li>
<li><strong>Loss:</strong> 
The percentage of packets sent that <strong>do not reach their destination</strong>.
can be caused by Faulty Hardware, Software Issues, or Network Congestion.<br />It can also be caused when a <strong>device’s packet queue gets full</strong> and the device starts discarding packets.</li>
</ul>
<h2 id="heading-the-standard-recommendation-for-acceptable-interactive-voice">The standard recommendation for acceptable interactive voice:</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>One-way-delay</strong></td><td><strong>150</strong> ms or less</td></tr>
</thead>
<tbody>
<tr>
<td>Jitter</td><td><strong>30</strong> ms or less</td></tr>
<tr>
<td>Loss</td><td><strong>1%</strong> or  less</td></tr>
</tbody>
</table>
</div><ul>
<li>If these standards are not met, there could be a noticeable reduction in the quality of the phone call</li>
</ul>
<h1 id="heading-quality-of-service-qos-mechanism">Quality of Service (QOS) Mechanism</h1>
<ol>
<li><strong>Classification</strong>: organizes network traffic (packets) into traffic classes (categories) (e.g., VoIP, video, data).</li>
<li><strong>Marking:</strong> Labeling packets (e.g., using DSCP or CoS) so they can be prioritized.</li>
<li><strong>Queueing</strong>-<strong>Congestion management:</strong> <strong>Prioritize the transmission of each packet</strong> by queueing on each interface. (enabling queueing and allowing high priority can join the queue quickly).</li>
<li><strong>Congestion Avoidance:</strong> Techniques like WRED to drop low-priority packets to avoid tail drop.</li>
<li><strong>Policing</strong> is a QoS feature that <strong>monitors and controls traffic rates</strong> on an interface. It compares traffic to a set rate called the <strong>CIR (Committed Information Rate)</strong>. If traffic exceeds this rate, the excess packets are either <strong>dropped</strong> or r<strong>emarked</strong> with a lower QoS value.</li>
<li><strong>Shaping</strong> is a QoS feature that <strong>controls traffic rate</strong> by <strong>buffering excess packets</strong> instead of <strong>dropping</strong> them. When traffic exceeds the configured <strong>CIR (Committed Information Rate)</strong>, the shaper <strong>holds the packets in a buffer</strong> and sends them later when bandwidth becomes available.</li>
</ol>
<blockquote>
<p>💡 - Instead of waiting for policer of the ISP to drop your traffic.  </p>
<ul>
<li><p>We can shape the outgoing traffic towards the ISP so that they <strong>do not drop it</strong>.  </p>
</li>
<li><p>We can use <strong>shaping</strong> to make sure that everything will be sent until its buffer is full.</p>
</li>
</ul>
</blockquote>
<ul>
<li>Instead of waiting for policer of the ISP to drop your traffic.</li>
<li>We can shape the outgoing traffic towards the ISP so that they <strong>do not drop it</strong>.</li>
<li>We can use <strong>shaping</strong> to make sure that everything will be sent until its buffer is full.</li>
</ul>
<p><strong>CBWFQ</strong> (<strong>Class-Based Weighted Fair Queuing)</strong> is a popular scheduling method that uses a weighted round-robin scheduler while guaranteeing each queue a certain percentage of the interface’s bandwidth during congestion.</p>
<p>Which two QoS tools provide congestion management?</p>
<ul>
<li><strong>CBWFQ</strong></li>
<li><strong>PR</strong></li>
</ul>
<p>Which IP header field is changed by a Cisco device when QoS marking is enabled?</p>
<ul>
<li><strong>Type of Service.</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8c2910f3-993c-4f0a-901c-1337dd5e9ad1.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/94272c5c-eb73-47ae-bd87-0ff3522f23e4.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dc0c7005-d351-4639-8466-ea40a4fa34ab.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-qos-quality-of-service-implementation">QOS Quality of Service Implementation</h1>
<h3 id="heading-classification">Classification:</h3>
<pre><code class="lang-javascript">Router(config)#<span class="hljs-class"><span class="hljs-keyword">class</span>-<span class="hljs-title">map</span> <span class="hljs-title">Web</span>-<span class="hljs-title">Traffic</span>  [<span class="hljs-title">class</span>-<span class="hljs-title">map</span> <span class="hljs-title">name</span>]
<span class="hljs-title">Router</span>(<span class="hljs-title">config</span>-<span class="hljs-title">cmap</span>)#<span class="hljs-title">match</span> <span class="hljs-title">protocol</span> <span class="hljs-title">HTTP</span>(<span class="hljs-title">which</span> <span class="hljs-title">protocol</span> <span class="hljs-title">used</span>)</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b752feac-29a3-48bb-895f-b364417e8995.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-policing">Policing:</h3>
<pre><code class="lang-javascript">Router(config)#policy-map  web-traffic-policy [policy name] 
Router(config-pmap)#<span class="hljs-class"><span class="hljs-keyword">class</span> <span class="hljs-title">web</span>-<span class="hljs-title">traffic</span>   [<span class="hljs-title">assign</span> <span class="hljs-title">the</span> <span class="hljs-title">class</span> <span class="hljs-title">to</span> <span class="hljs-title">the</span> <span class="hljs-title">policy</span>]
<span class="hljs-title">Router</span>(<span class="hljs-title">config</span>-<span class="hljs-title">pmap</span>-<span class="hljs-title">c</span>)#<span class="hljs-title">bandwidth</span> 1000  [<span class="hljs-title">in</span> <span class="hljs-title">this</span> <span class="hljs-title">rule</span> <span class="hljs-title">we</span> <span class="hljs-title">set</span> 1<span class="hljs-title">mbps</span> <span class="hljs-title">to</span> <span class="hljs-title">web</span> <span class="hljs-title">traffic</span>]</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/06d8d850-b381-42e6-b719-c8800d41cc5e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>### 
Applying to the interface </p>
<pre><code class="lang-javascript">Router(config)#interface gigabitEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>/<span class="hljs-number">1</span>
Router(config-<span class="hljs-keyword">if</span>)#service-policy output  web-traffic-policy [policy name]
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Input</td><td>Assign policy-map to the <strong>input</strong> of an interface</td></tr>
</thead>
<tbody>
<tr>
<td>output</td><td>Assign policy-map to the <strong>output</strong> of an interface</td></tr>
</tbody>
</table>
</div><h2 id="heading-ip-services">IP Services</h2>
<p>Networks need redundant links and should always be designed to maximize availability. A router's power supply might fail, a cable could break, or a switch might lose power.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/37d8846d-aff5-4372-99be-b0b0f5938399.png" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, if one of the routers goes down, a backup router can take over and continue forwarding packets to their destination.</p>
<blockquote>
<p>💡 To achieve redundancy, we should have a <strong>Virtual IP</strong> as a gateway to switch between routers.</p>
</blockquote>
<h2 id="heading-first-hope-redundancy-protocol">First Hope Redundancy Protocol</h2>
<p>A <strong>first Hope Redundancy Protocol(FHRP)</strong> is a <strong>layer 3</strong> protocol designed to protect and ensure the availability of the <strong>gateway</strong> for end devices on a local subnet by allowing two or more routers to provide backup for that address. </p>
<h3 id="heading-type-of-fhrp-protocols">Type of FHRP protocols:</h3>
<ul>
<li><strong>Hot Standby Router Protocol (</strong>HSRP)</li>
<li><strong>Virtual Router Redundancy Protocol (</strong>VRRP<strong>)</strong></li>
<li><strong>Gateway Load Balancing Protocol(</strong>GLBP<strong>)</strong></li>
</ul>
<h3 id="heading-how-fhrp-works-basic-idea">How FHRP Works (Basic Idea)</h3>
<ul>
<li>A <strong>virtual IP</strong> is configured on the two routers.</li>
<li>One Router is <strong>active</strong> (forwarding traffic), and others are in <strong>standby or backup</strong> mode.</li>
<li>Each network host is configured to use the <strong>virtual IP as their default gateway</strong>.</li>
<li>If the active router fails, the standby becomes the next active router.</li>
</ul>
<h2 id="heading-hsrp">HSRP</h2>
<p><strong>Hot Standby Router Protocol (HSRP)</strong> is a <strong>Cisco proprietary protocol</strong> that provides redundancy for a local subnet. It is an <strong>active/standby</strong> router model.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3172595e-f0c5-4b8d-a399-c0145fd7d5fb.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-vrrp">VRRP</h2>
<p><strong>Virtual Router Redundancy Protocol (VRRP)</strong> is very similar to HSRP and can be used to create a virtual gateway. It is a <strong>Master/Backup</strong> router model and is more usable by companies because it is a global protocol. </p>
<h2 id="heading-glbp">GLBP</h2>
<p><strong>Gateway Load Balancing Protocol(GLBP):</strong> protects data traffic from a failed router or circuit, like (HSRP) and (VRRP), while <strong>allowing packet load sharing between a group of redundant routers</strong>. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b5c9ffcc-5714-4322-a125-4abd151e23bb.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, all routers are working and forwarding packets, <strong>and none of them are standing by.</strong> </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>HSRP</td><td>VRRP</td><td>GLBP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Cisco</strong> Propriety</td><td>Standardized</td><td><strong>Cisco</strong> propriety</td></tr>
<tr>
<td>Active and Standby mode only.</td><td>Active and Standby mode only.</td><td>Multiple routers pass traffic thus achieving load balancing.</td></tr>
<tr>
<td>Must configure a separate IP for the Virtual.</td><td><strong>Virtual IP can be the same as the physical IP of one of the routers</strong></td><td>Most configure separate IPs for the Virtual</td></tr>
<tr>
<td>Default Priority = 100</td><td>Default Priority = 100</td><td>Default Priority = 100</td></tr>
<tr>
<td>Higher priority (above 100) makes the <strong>router active</strong>. otherwise, a Higher IP makes the <strong>router active</strong>.</td><td>Higher priority (above 100) makes the r<strong>outer active.</strong> otherwise, a Higher IP makes the <strong>router active.</strong></td><td>Higher priority (above 100) makes the <strong>router the primary forwarder</strong>. otherwise, a higher IP makes the <strong>router the primary forwarde</strong>r</td></tr>
<tr>
<td><strong>Tracking support</strong>(e.g. interface state, routing info, reachability of remote host, etc.)</td><td><strong>Tracking support</strong>(e.g. interface state, routing info, reachability of remote host, etc.)</td><td><strong>Tracking support</strong>(e.g. interface state, routing info, reachability of remote host, etc.)</td></tr>
<tr>
<td>support <strong>IPV6</strong></td><td><strong>No support for IPv6 on the original VRRP</strong> implementation. however, VRRP v3 supports it</td><td>Support <strong>IPV6</strong></td></tr>
<tr>
<td>Support timer and delay adjustments for failover</td><td>Support timer and delay adjustment for failover</td><td>Support timer and delay adjustment for failover</td></tr>
</tbody>
</table>
</div><h1 id="heading-vrrp-labs">VRRP Labs</h1>
<pre><code class="lang-javascript">Router(config)#interface fa2/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> [<span class="xml"><span class="hljs-tag">&lt;<span class="hljs-name">1-255</span>&gt;</span>  Group number] ip  192.168.1.1 (virtual IP) 
Router(config-if)#vrrp 1 priority 150 (1 to 254) [by default is 100 we change it to 150 to ensure it remains as a master]</span>
</code></pre>
<h3 id="heading-verify-the-configuration">Verify the configuration</h3>
<pre><code class="lang-javascript">Master#show vrrp
Master#show vrrp brief
</code></pre>
<h2 id="heading-track-object">Track Object</h2>
<ul>
<li>First, create object tracking and select which interface to track.</li>
</ul>
<pre><code class="lang-javascript">Router(config)#track <span class="hljs-number">1</span> &lt;<span class="hljs-number">1</span><span class="hljs-number">-500</span>&gt;Tracked object ( the what you want to track)
Router(config)#track <span class="hljs-number">1</span>  interface fastEthernet <span class="hljs-number">1</span>/<span class="hljs-number">0</span>  [IP or line-protocol] 
Router(config)#track <span class="hljs-number">1</span> interface fa0/<span class="hljs-number">0</span> line-protocol
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td>interface</td><td>Select an interface to track</td></tr>
</thead>
<tbody>
<tr>
<td>IP</td><td>IP protocol</td></tr>
<tr>
<td>List</td><td>Group objects in a list</td></tr>
<tr>
<td>sub-object</td><td>Stub tracking object</td></tr>
</tbody>
</table>
</div><div class="hn-table">
<table>
<thead>
<tr>
<td>line-protocol</td><td>When the interface gets down physically or logically, it represents as a down</td></tr>
</thead>
<tbody>
<tr>
<td></td></tr>
</tbody>
</table>
</div><ul>
<li>Second, apply the created track to the VRRP.</li>
</ul>
<pre><code class="lang-javascript">Router(config)#interface fa <span class="hljs-number">2</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> track <span class="hljs-number">1</span> (Id <span class="hljs-keyword">of</span> the created track you want to apply to the VRRP)
Router(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> track <span class="hljs-number">1</span> decrement <span class="hljs-number">50</span> [decreaament the priority]
</code></pre>
<h2 id="heading-vrrp-1">VRRP</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ad4b95da-5b8e-47cb-afbf-6926d4e6ea78.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, two routers are connected to the ISP. We will proceed with configuring VRRP, designating one router as the master and the other as the backup.</p>
<h3 id="heading-basic-ip-configuration-4">Basic IP Configuration</h3>
<pre><code class="lang-java">PC1&gt; ip <span class="hljs-number">192.168</span>.<span class="hljs-number">1.2</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">192.168</span>.<span class="hljs-number">1.1</span>
</code></pre>
<pre><code class="lang-java">Master#<span class="hljs-function">conf t
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.4 255.255.255.0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.2 255.255.255.0 
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown 
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#exit
Master#wr</span>
</code></pre>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.5 255.255.255.0 
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address  4.2.2.2 255.255.255.0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown

<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#exit
BackUp#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 4.2.2.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-ospf-configuration-3">OSPF Configuration</h3>
<pre><code class="lang-java">Master#<span class="hljs-function">conf t

<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#net     
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0    
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#exit
Master#wr</span>
</code></pre>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t                       
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0    
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#exit
BackUp#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-vrrp-master-router-configuration">VRRP Master Router Configuration</h3>
<pre><code class="lang-java">Master#<span class="hljs-function">conf t
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 ip 192.168.1.1
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 priority 150
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 preempt
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Master</span><span class="hljs-params">(config)</span>#exit
Master#</span>
</code></pre>
<h3 id="heading-vrrp-master-router-configuration-1">VRRP Master Router Configuration</h3>
<pre><code class="lang-java">Master#show vrrp
Master#show vrrp brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5d2e0384-6205-4ab9-9966-1c9e959e126f.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-vrrp-master-router-configuration-2">VRRP Master Router Configuration</h3>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 ip 192.168.1.1        
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 preempt 
<span class="hljs-title">BackUp</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">BackUp</span><span class="hljs-params">(config)</span>#exit
BackUp#wr</span>
</code></pre>
<h3 id="heading-apply-tracker-to-the-specific-interface">Apply Tracker to the specific interface</h3>
<pre><code class="lang-java">Master(config)#track <span class="hljs-number">1</span> <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">fa0</span>/0 <span class="hljs-title">line</span>-<span class="hljs-title">protocol</span></span>
</code></pre>
<h3 id="heading-mapping-tracker-to-the-vrrp">Mapping Tracker to the VRRP</h3>
<pre><code class="lang-java">Master(config)#<span class="hljs-keyword">int</span> fa1/<span class="hljs-number">0</span>
Master(config-<span class="hljs-keyword">if</span>)#vrrp <span class="hljs-number">1</span> <span class="hljs-function">tra
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 track 1 
<span class="hljs-title">Master</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#vrrp 1 track 1 decrement 60 [ decrement  Priority decrement]</span>
</code></pre>
<h3 id="heading-testing-tracker-and-switching-traffic-from-master-to-backup">Testing tracker and switching traffic from master to backup</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7b383de3-c864-4c1d-808b-14d06498fda1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, after the shutdown of interface Fa0/0, the traffic switched from the master to the backup, and the state of the routes changed.</p>
<h3 id="heading-when-the-status-of-the-tracked-interface-changed-to-up-the-traffic-and-states-of-the-switches-reverted-to-their-previous-status">When the status of the tracked interface changed to 'up,' the traffic and states of the switches reverted to their previous status.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/4557c36a-27ef-4633-a75e-34d89f85d7f9.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7dc3d7f1-5944-40df-af11-6e14291677f6.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-hsrp-1">HSRP</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ef45b391-e1d4-4881-97b3-868a48464ea6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, two routers are connected to the ISP. We will proceed with configuring VRRP, designating one router as the Active and the other as the backup.</p>
<h3 id="heading-basic-ip-configuration-5">Basic IP Configuration</h3>
<pre><code class="lang-java">PC1&gt; ip <span class="hljs-number">192.168</span>.<span class="hljs-number">1.2</span> <span class="hljs-number">255.255</span>.<span class="hljs-number">255.0</span> <span class="hljs-number">192.168</span>.<span class="hljs-number">1.1</span>
</code></pre>
<pre><code class="lang-java">Active#<span class="hljs-function">conf t
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.4 255.255.255.0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.2 255.255.255.0 
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown 
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#exit
Active#wr</span>
</code></pre>
<pre><code class="lang-java">BackUp#<span class="hljs-function">conf t
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 192.168.1.5 255.255.255.0 
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address  4.2.2.2 255.255.255.0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shutdown

<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#exit
StandBy#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa 1/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 8.8.8.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit

<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa0/0
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#ip address 4.2.2.1 255.255.255.0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#no shut
<span class="hljs-title">ISP</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-ospf-configuration-4">OSPF Configuration</h3>
<pre><code class="lang-java">Active#<span class="hljs-function">conf t

<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#net     
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0    
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#exit
Active#wr</span>
</code></pre>
<pre><code class="lang-java">StandBy#<span class="hljs-function">conf t                       
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#network 192.168.1.0 0.0.0.255 area 0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0    
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#passive-interface fa1/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#exit
StandBy#wr</span>
</code></pre>
<pre><code class="lang-java">ISP#<span class="hljs-function">conf t
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#router ospf 1
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 8.8.8.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#network 4.2.2.0 0.0.0.255 area 0 
<span class="hljs-title">ISP</span><span class="hljs-params">(config-router)</span>#exit
<span class="hljs-title">ISP</span><span class="hljs-params">(config)</span>#exit
ISP#wr</span>
</code></pre>
<h3 id="heading-vrrp-active-router-configuration">VRRP Active Router Configuration</h3>
<pre><code class="lang-java">Active#<span class="hljs-function">conf t
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 ip 192.168.1.1
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby1 priority 150
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 preempt
<span class="hljs-title">Active</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">Active</span><span class="hljs-params">(config)</span>#exit
Active#</span>
</code></pre>
<h3 id="heading-hsrp-active-router-configuration">HSRP Active Router Configuration</h3>
<pre><code class="lang-java">Active#show standby
Active#show standby brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/846c85e8-571f-48a4-b507-e1a0c68546e0.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-hsrp-standby-router-configuration">HSRP Standby Router Configuration</h3>
<pre><code class="lang-java">StandBy#<span class="hljs-function">conf t
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#<span class="hljs-keyword">int</span> fa1/0
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 ip 192.168.1.1            
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#standby 1 preempt 
<span class="hljs-title">StandBy</span><span class="hljs-params">(config-<span class="hljs-keyword">if</span>)</span>#exit
<span class="hljs-title">StandBy</span><span class="hljs-params">(config)</span>#exit
StandBy#wr</span>
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/39924004-c233-4f7b-afeb-c1f99c93b15d.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-apply-tracker-to-the-specific-interface-1">Apply Tracker to the specific interface</h3>
<pre><code class="lang-java">Active(config)#track <span class="hljs-number">1</span> <span class="hljs-class"><span class="hljs-keyword">interface</span> <span class="hljs-title">fa0</span>/0 <span class="hljs-title">line</span>-<span class="hljs-title">protocol</span></span>
</code></pre>
<h3 id="heading-mapping-tracker-to-the-vrrp-1">Mapping Tracker to the VRRP</h3>
<pre><code class="lang-java">Active(config)#<span class="hljs-keyword">int</span> fa1/<span class="hljs-number">0</span>
Active(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> track <span class="hljs-number">1</span> decrement <span class="hljs-number">60</span> [ decrement  Priority decrement]
</code></pre>
<h3 id="heading-testing-tracker-and-switching-traffic-from-active-to-standby">Testing tracker and switching traffic from Active to StandBy</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7ed05da0-6203-48ed-b11f-1f413e8146cf.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, after the shutdown of interface Fa0/0, the traffic switched from the Active to the StandBy, and the state of the routes changed.</p>
<h3 id="heading-when-the-status-of-the-tracked-interface-changed-to-up-the-traffic-and-states-of-the-switches-reverted-to-their-previous-status-1">When the status of the tracked interface changed to 'up,' the traffic and states of the switches reverted to their previous status.</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/d700f32d-616f-4169-81e6-30eb22861974.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2fde492a-3108-424d-bb96-0345a58140fa.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-hot-standby-router-protocol-hsrp">Hot Standby Router Protocol (HSRP)</h2>
<blockquote>
<p>💡 I tried for more than 2 days to perform this configuration, but I had an issue with both routers’ states being active. It was resolved by adding this command to the switch </p>
</blockquote>
<pre><code class="lang-javascript">Use command <span class="hljs-string">" no ip igmp snooping "</span> on <span class="hljs-keyword">switch</span>
</code></pre>
<h3 id="heading-on-the-active-router"><strong>On the active router</strong></h3>
<pre><code class="lang-javascript">Router(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>
Router(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> priority <span class="hljs-number">150</span>   [ to ensure the router remain active]
</code></pre>
<p>On a Standby router</p>
<pre><code class="lang-javascript">Router(config)#int fa <span class="hljs-number">1</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#standby <span class="hljs-number">1</span> ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.10</span>
</code></pre>
<p>Then verify configuration </p>
<pre><code class="lang-javascript">Router#show standby
</code></pre>
<pre><code class="lang-javascript">Router#show arp
</code></pre>
<p>You can see the MAC address assigned to the virtual IP address </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6961984c-23e7-43a7-80bf-f4586ebede8c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>The last number of the MAC address refers to the group ID of the standby.</p>
<p>As you can see, after the shutdown  selected interface standby starts working as an active one and forwards packets to the destination </p>
<h2 id="heading-glbp-gateway-load-balancing-protocol">GLBP ( Gateway Load Balancing Protocol)</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/44c6ad90-b708-4b9c-99bb-ececa1ba495d.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-glbp-terms">GLBP terms</h3>
<p><strong>Active Virtual Gateway (AVG)</strong>: It is <strong>one of the routers operating GLBP</strong> in a single group which is responsible for <strong>assigning a</strong> <strong>Virtual Mac Address</strong> <strong>to all other devices running GLBP</strong> and for responding to the <strong>ARP request coming from the devices</strong>, Th<strong>e AVG has the highest priority value or IP addresses in the group</strong>.</p>
<p><strong>Active Virtual Forwarder (AVF):</strong> Responsible for forwarding data after they are assigned by the AVG for the task. In case AVG goes down, one of the AVFs can become the AVG. </p>
<p><strong>Preempt:</strong> It <strong>is a state in which one of the AVFs will become the AVG router</strong> (<strong>when the AVG router goes down</strong>). Also, <strong>when the AVG router comes up again,</strong> it will become the AVG router as its priority is still higher.</p>
<p><strong>Object Tracking:</strong> GLBP uses a weighting scheme to determine the forwarding capacity of each router in the GLBP group. <strong>GLBP tracks the interface and adjusts its weighting</strong> i.e if the tracked interface goes down, then it reduces by a certain value (according to the configuration).</p>
<h3 id="heading-load-balancing-methods">Load Balancing Methods:</h3>
<ul>
<li><strong>Round Robin:</strong> AVG will assign the virtual Mac addresses serial-wise, like the first virtual Mac address is assigned to AVF1, then to AVF2, etc. (<strong>Used By Default</strong>)</li>
<li><strong>Host-Dependent:</strong> A Host can use the same Virtual Mac Address of an AVF as long as it is reachable.</li>
<li><strong>Weighted:</strong> If you want <strong>some AVFs to forward more traffic than o</strong>thers you can assign them a <strong>different weight</strong>. (For example, we have 2 routers one of the routers has a higher performance than the other one, and you can use weighted to send most of the traffic to the high-performance router.)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e822edd-a6d6-40a9-93e4-d19d8b0b14d6.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this lab, we will configure GLBP on both routers, making GLBP_2 an active router. </p>
<p><strong>GLBP Router:</strong> </p>
<pre><code class="lang-javascript">Router(config)#<span class="hljs-keyword">in</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> (id)  ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>GLBP_2 Router:</strong> </p>
<pre><code class="lang-javascript">Router(config)#<span class="hljs-keyword">in</span> fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> ip <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> preempt 
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> priority <span class="hljs-number">140</span>
</code></pre>
<p>GLBP_2 is now active and can be returned to the active state if it goes down.</p>
<h3 id="heading-now-to-verify-and-check-the-configuration">Now to verify and check the configuration:</h3>
<pre><code class="lang-javascript">Router#show glbp
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/02f5b5c2-7ba0-4f97-85c2-f7889a3f9f6a.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-javascript">Router#show glbp brief
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c82bab5d-a73e-47dd-8bb7-4142a364b19a.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-changing-load-balancing-type">Changing Load Balancing Type</h2>
<pre><code class="lang-javascript">Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> load-balancing weighted
</code></pre>
<p>host-dependent  Load balance equally, source MAC determines the forwarder choice
round-robin     Load balance equally using each forwarder in turn
weighted        Load balance in proportion to forwarder weighting</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/fc49056b-0fec-4a5c-8954-029f717e40b8.png" alt="CCNA 200-301 Study (1)" /></p>
<p>First, change the load balancing type on both routers </p>
<pre><code class="lang-javascript">Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> load-balancing weighted
</code></pre>
<pre><code class="lang-javascript">Router(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> weighting <span class="hljs-number">100</span> lower <span class="hljs-number">50</span> upper <span class="hljs-number">95</span>
</code></pre>
<p>#Configuring the weighting threshold; this command sets the default weight value, and if the value which is tracked by the weighting track be less than the lower-threshold, it will lose AVF state, and if it becomes more than the upper-threshold it will change to AVF state. This can also be configured on the interfaces that we want to act as an AVF, and not only for AVG. glbp x weighting 200 lower 150 upper 180</p>
<p>Then, on the router, we want to add a track and apply this command </p>
<pre><code class="lang-javascript">
Router(config)#track <span class="hljs-number">1</span> interface fastEthernet <span class="hljs-number">1</span>/<span class="hljs-number">0</span> line-protocol
Router(config)#int fa <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
Router(config-<span class="hljs-keyword">if</span>)#glbp <span class="hljs-number">1</span> weighting track <span class="hljs-number">1</span> decrement <span class="hljs-number">30</span> (Enter the value <span class="hljs-keyword">of</span> the decrement)
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c7178fca-4f5b-4b44-973f-24d42cc14a3c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, when the tracked interface goes down, another router from beside my router starts forwarding packets.</p>
<h2 id="heading-vpn">VPN</h2>
<p>A <strong>virtual private network</strong>, or <strong>VPN</strong>, is an <strong>encrypted connection over the internet from a device to a network.</strong> the encrypted connection helps ensure that sensitive data is safely transmitted.  it prevents unauthorized people from eavesdropping on the traffic and allows users to conduct work remotely</p>
<p>Using a VPN will cost you nothing as it is completely free since most organizations have firewalls already installed with a built-in VPN feature. VPN also provides security for all the traffic that is sent outside your network through VPN tunnels. Lastly, VPN is scalable in that you can add unlimited tunnels and users.</p>
<h2 id="heading-vpn-benefits">VPN Benefits</h2>
<ul>
<li><strong>Cost saving:</strong> Eliminate the need <strong>for expensive dedicated WAN links</strong>.</li>
<li><strong>Security:</strong> use <strong>advanced encryption and authentication protocols</strong> that protect data from unauthorized access.</li>
<li><strong>Scalability</strong>: can add a large amount of capacity <strong>without adding significant infrastructure</strong>.</li>
<li><strong>Compatibility with broadband  technology:</strong> supported by <strong>broadband service providers</strong>, so mobile workers and telecommuters can take advantage of their home high-speed Internet service to access their corporate networks</li>
</ul>
<h1 id="heading-type-of-vpn">Type of VPN</h1>
<p>## 
Remote Access (TLS)</p>
<p><strong>Remote Access VPN</strong> permits <strong>a user to connect to a private network and access all its services and resources remotely</strong>. The connection between the user and the private network occurs through the <strong>internet</strong> and the connection is <strong>secure</strong> and <strong>private</strong>, Remote Access VPN is useful for <strong>home users</strong> and <strong>business users</strong> both.   (<strong>which mostly used for staff to access the company network through the Internet)</strong></p>
<p><strong>Example:</strong> An employee in Baghdad logs into the company network from a laptop using VPN.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/563e90b8-48b4-4b90-bb47-4582249d2e13.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-site-to-site-vpn-ipsec">Site-to-Site VPN (IPsec)</h2>
<p>A <strong>Site-to-Site</strong> is also called a <strong>Router-to-Router VPN</strong> and is commonly used in <strong>large companies or organizations</strong>, with branch offices in different locations, to connect the network of one office location to the network at another office location. </p>
<p><strong>Example:</strong> A company’s London office and Erbil branch share resources over a VPN.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6cbcbe4f-b7f3-48b4-bcb8-efe230b5d906.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a2d91907-e739-4020-8392-0d39f324e2b8.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li>In a  <strong>site-to-site</strong>  VPN, a tunnel is formed only between two tunnel endpoints (for example, the two routers connected to the Internet).</li>
<li>All other devices in each site don’t need to create a VPN for themselves. They can send unencrypted data to their site’s router, which will encrypt it and forward it in the tunnel as described above.</li>
</ul>
<h3 id="heading-there-are-two-ways-to-implement-site-to-site-vpn">There are two ways to implement site-to-site VPN:</h3>
<p><strong>Intranet VPN:</strong>  it provides secured site-to-site connectivity <strong>within the company or internally</strong>.</p>
<p><strong>Extranet VPN</strong>: it provides secured site-to-site connectivity <strong>outside the company</strong>. for example, customers or partners can securely access the <strong>shared resources of the company</strong>. </p>
<blockquote>
<p>💡 <strong>IPsec</strong> doesn’t support <strong>broadcast and multicast traffic</strong>, only <strong>unicast</strong>. This means that routing protocols such as OSPF can’t be used over the tunnels, because they rely on multicast traffic. (This can be solved with <strong>GRE over IPsec</strong>)</p>
</blockquote>
<h2 id="heading-ssl-vpn"><strong>SSL VPN</strong></h2>
<p><em><strong>SSL VPN (Secure Sockets Layer Virtual Private Network):</strong></em> is a type of VPN that uses the <strong>SSL protocol to secure the connection between the user and the VPN server</strong>. It allows remote users to securely access a private network by establishing an encrypted tunnel between the user’s device and the VPN server. SSL VPNs are typically <strong>accessed through a web browser.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e513e8d5-cc15-4902-b685-91798fa60200.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-cloud-vpn"><strong>Cloud VPN</strong></h2>
<p>Cloud VPN, sometimes referred to as hosted VPN or VPN as a service (VPNaaS), is a VPN approach tailored for cloud environments. This VPN allows users to securely access a business's resources, data, and applications in the cloud through a web interface or a dedicated app on a desktop or mobile.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8cbd521c-c20d-4faf-8386-9213cfecda9c.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-vpn-terminology">VPN Terminology</h1>
<ul>
<li>Encryption</li>
<li>Hashing</li>
<li>ISAKMP</li>
<li>IPSec (VPN Protocol)</li>
<li>IKE</li>
<li>ESP</li>
</ul>
<h1 id="heading-encryption">Encryption</h1>
<p>Encryption is a way of scrambling data so that only authorized parties understand the information. </p>
<h2 id="heading-what-are-the-different-types-of-encryption">What are the different types of Encryption?</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Symmetric Encryption</strong></td><td><strong>Asymmetric Encryption</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Uses a <strong>single key</strong> to encrypt and decrypt data</td><td>Uses a <strong>public key to encrypt</strong> data and a <strong>private key to decrypt</strong> data</td></tr>
<tr>
<td><strong>Faster</strong> encryption process</td><td><strong>Slower</strong> encryption process</td></tr>
<tr>
<td>Example key sizes are <strong>128 or 256-bit</strong> long</td><td>Example key sizes are <strong>2048-bit or longer</strong></td></tr>
<tr>
<td>Doesn’t use a <strong>lot of resources</strong></td><td>Uses <strong>more resources</strong></td></tr>
<tr>
<td>Cipher text is smaller, or the same size as the original plain text</td><td>Cipher text is larger or the same size as the original cipher text</td></tr>
<tr>
<td>Both symmetric and asymmetric algorithms provide authentication capability</td><td>Both symmetric and asymmetric algorithms provide authentication capability. Only non-repudiation can be achieved using an asymmetric algorithm<em>.</em></td></tr>
<tr>
<td>Example algorithms are <strong>AES, DES, 3DES, IDEA and Blowfish</strong></td><td>Example algorithms are <strong>RSA, ECC, DSA and El Gamal algorithms</strong></td></tr>
<tr>
<td>Better at handling and <strong>transferring large amounts of data</strong></td><td>Better at handling and <strong>transferring smaller amounts of data</strong></td></tr>
<tr>
<td>Has the risk of someone stealing the key if it is not managed properly</td><td>Has the risk of losing the private key (the keypair is irrevocable)</td></tr>
</tbody>
</table>
</div><h1 id="heading-hashing-the">Hashing the</h1>
<p><em><strong>Hashing</strong></em> is a <strong>process that transforms your data into a random fixed-length value</strong>, using a hash function. For example, a piece of plain text (a password, for example) can be turned into a hashed value, making it very hard to decipher. Some common hashing algorithms include <strong>MD5, SHA-1, SHA-2, NTLM, and LANMAN.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/10876700-6b21-44ed-862d-58e33063d610.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-isakmp">ISAKMP</h1>
<p>ISAKMP <em><strong>Internet Security Association and Key Management Protocol(ISKAMP)</strong></em>  is like the <strong>“negotiator”</strong> in VPNs.</p>
<p>It helps two devices <strong>agree on how to build a secure connection</strong> (like a VPN tunnel) by handling:</p>
<ul>
<li>🔐 <strong>Authentication</strong> – making sure both sides are who they say they are</li>
<li>🗝️ <strong>Key Exchange</strong> – safely sharing encryption keys</li>
<li>📋 <strong>Security Policy Agreement</strong> – agreeing on which encryption and hash methods to use</li>
</ul>
<h1 id="heading-types-of-virtual-private-network-vpn-protocols"><strong>Types of Virtual Private Network (VPN) Protocols:</strong></h1>
<ul>
<li><em><strong>Internet Protocol Security (IPsec):</strong></em> Internet Protocol Security, Known as IPsec, is used to secure internet communication across an IP network. IPsec secures Internet Protocol communication by <strong>verifying the session and encrypting each packet of data during the connection</strong>.</li>
<li><em><strong>Layer 2 Tunneling Protocol(L2TP):</strong></em> is a tunneling protocol that is often combined with another VPN security protocol like IPsec to establish a highly secure VPN connection. L2TP generates a tunnel between two L2TP connection points and IPsec encrypts the data and maintains secure communication between the tunnel.</li>
<li><em><strong>Point-to-Point Tunneling Protocol(</strong></em><strong>PPTP)</strong><em><strong>:</strong></em> an old VPN protocol that uses PPP and GRE, is <strong>insecure and should not be used anymore</strong>.</li>
<li><em><strong>Secure Socket Tunneling Protocol (SSTP)</strong></em>: A VPN protocol <strong>developed by Microsoft for Windows users</strong> that uses <strong>SSL</strong> to secure to secure the connection.</li>
<li><em><strong>IKEv2(Internet Key Exchange):</strong></em> is often used in <strong>combination with IPsec</strong>, <strong>IKE2 creates a secure tunnel connecting the user to the VPN server</strong>, <strong>While IPsec provides encryption and authentication</strong>.</li>
</ul>
<blockquote>
<p>💡 <strong>IKE is a part of IPsec</strong>, A suite of protocols and algorithms used to secure sensitive data transmitted across networks, The <strong>Internet Engineering Task Force (IETS)</strong> developed IPsec to <strong>provide security through authentication and encryption of IP Network packets and secure VPNs**</strong>.** </p>
</blockquote>
<ul>
<li><strong>O</strong><em><strong>penVPN:</strong></em> An <strong>open-source VPN protocol that is highly configurable and secure</strong>, OpenVPN is a widely compatible protocol that offers multiple different configuration options.</li>
<li><em><strong>WireGurad:</strong></em> A relatively new and lightweight VPN protocol that aims to be faster, simpler, and more secure than existing VPN protocols.</li>
<li><em><strong>GRE (Generic Routing Encapsulation):</strong></em> is a computer networking tunneling technology that is used to encapsulate one protocol inside another. It is <strong>not a security protocol like IPSEC</strong> but rather a versatile protocol for <strong>establishing a virtual point-to-point connection between two networks</strong>.</li>
</ul>
<blockquote>
<p>💡 GRE is a <strong>tunneling protocol</strong> that is used to <strong>transport multicast, broadcast, and non-IP packets like IPX</strong>, etc. <strong>IPSec is an encryption protocol.</strong> IPSec <strong>can only transport unicast packets not multicast &amp; broadcast</strong>. Hence we wrap it GRE first and then into IPSec which is called <strong>GRE over IPSec</strong>.</p>
</blockquote>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Protocal</strong></td><td><strong>Security</strong></td><td><strong>Speed</strong></td><td><strong>Popularity</strong></td></tr>
</thead>
<tbody>
<tr>
<td>OpenVPN</td><td><strong>Very strong</strong></td><td><strong>Fast</strong></td><td><strong>Very high</strong></td></tr>
<tr>
<td>WireGuard</td><td><strong>Very strong</strong></td><td><strong>Very fast</strong></td><td><strong>Growing</strong></td></tr>
<tr>
<td>IKEv2</td><td><strong>Strong</strong></td><td><strong>Very fast</strong></td><td><strong>High</strong></td></tr>
<tr>
<td>L2TP</td><td>Strong</td><td>Slow</td><td>Low</td></tr>
<tr>
<td>PPTP</td><td>Weak</td><td>Very fast</td><td>Low</td></tr>
<tr>
<td>SSTP</td><td>Strong</td><td>Fast</td><td>Low</td></tr>
</tbody>
</table>
</div><p><strong>Encapsulating Security Protocol (ESP):</strong> ESP encrypts the IP header and the payload for each packet — unless transport mode is used, in which case it only encrypts the payload. ESP adds its own header and a trailer to each data packet</p>
<h2 id="heading-vpn-implementation">VPN Implementation</h2>
<h1 id="heading-site-to-site-vpn-implementation">Site-to-Site VPN Implementation</h1>
<ol>
<li><strong>Create an Access List.</strong></li>
<li><strong>Configure ISAKMP policy.</strong>   <strong>Phase 1</strong></li>
<li><strong>IPSec Transform Set,</strong> <strong>phase 2</strong></li>
<li><strong>Create crypto MAP. (connecting the tunnels created in Phase 1 and Phase 2).</strong></li>
<li><strong>Apply a cryptographic map on the interface. (exit interface)</strong></li>
</ol>
<p>IPsec VPN negotiation occurs in <strong>two phases</strong>. In Phase 1, <strong>participants establish a secure channel in which to negotiate the IPsec security association (SA).</strong> <strong>In Phase 2, participants negotiate the IPsec SA for authenticating traffic that will flow through the tunnel.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ee94e2dc-7c44-4cf4-bd7c-56074aba4a33.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In this scenario, we will create a site-to-site VPN using IPsec between two airports in Iraq. </p>
<h3 id="heading-step-1-define-interesting-traffic">Step 1: Define interesting traffic</h3>
<p>To make use of the <em><strong>IPsec encryption with the VPN</strong></em>, it is necessary to <strong>define extended access lists to tell the router which traffic to encrypt</strong>. A packet that is permitted by an access list used for defining IPsec traffic is <strong>encrypted</strong> if the IPsec session is configured correctly. <strong>A packet that is denied by the IPsec access list is not dropped. It is sent unencrypted</strong></p>
<pre><code class="lang-javascript">access-list <span class="hljs-number">100</span> permit ip <span class="hljs-number">192.168</span><span class="hljs-number">.16</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> <span class="hljs-number">192.168</span><span class="hljs-number">.45</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span>
</code></pre>
<h3 id="heading-create-the-isakmp-policy-phase-1">Create the ISAKMP Policy (Phase 1)</h3>
<pre><code class="lang-javascript">BGW-Router(config)#crypto isakmp policy <span class="hljs-number">10</span>

BGW-Router(config-isakmp)#encryption aes <span class="hljs-number">256</span> 
_**after the isakam tunnel created, then we Choose <span class="hljs-keyword">with</span> which encryption algorithm the tunnel should be encrypted.**_

BGW-Router(config-isakmp)#authentication pre-share
_**the key will be shared.**_

BGW-Router(config-isakmp)#group <span class="hljs-number">5</span>
_**Diffie-Hellman is a protocol <span class="hljs-keyword">for</span> creating a shared secret between two sides <span class="hljs-keyword">of</span> a communication.**_
</code></pre>
<h2 id="heading-verify-isakmp-policy">Verify ISAKMP  policy</h2>
<pre><code class="lang-javascript">BGW-Router#show crypto isakmp policy
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/3a939f21-9a5c-4c37-a794-e5f9d761181a.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">BGW-Router#show crypto isakmp sa
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ea0ce96b-de57-4a1a-8b1e-ea17fe9f40c2.png" alt="CCNA 200-301 Study (1)" /></p>
<p>It is showing we have a tunnel with active status.</p>
<h3 id="heading-configure-pre-shared-keys">Configure pre-shared keys.</h3>
<pre><code class="lang-javascript">BGW-Router(config)#crypto isakmp key [Strong password] address ip ( IP address <span class="hljs-keyword">of</span> the remote peer)
BGW-Router(config)#crypto isakmp key iqairport address <span class="hljs-number">40.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>Note: There should be the same password on each side.</strong></p>
<p>we told this router, we have the router from the other side and have a public IP, by using this public IP create a VPN connection.</p>
<p>Because pre-shared keys are used as the authentication method in the IKE policy, a key must be configured on each router that points to the other VPN endpoint. These keys must match for authentication to be successful. The global configuration mode crypto isakmp key key-string address ip-address command is used to enter a pre-shared key. Use the IP address of the remote peer, which is the remote interface that the peer would use to route traffic to the local router.</p>
<pre><code class="lang-java">BGW-Router#show crypto isakmp key
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5eb93836-f1db-4cf7-8c86-afb2924b5171.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-configure-ipsec-second-tunnel-phase-2">Configure IPsec (second tunnel) <strong>phase 2</strong></h3>
<pre><code class="lang-javascript">BGW-Router(config)#crypto ipsec transform-set **BGW-EBL** [name] esp-aes <span class="hljs-number">256</span>[Encryption Algorithm] esp-sha-hmac [hasing algorithm]
</code></pre>
<h3 id="heading-create-and-apply-a-crypto-map">Create and apply a crypto map</h3>
<pre><code class="lang-javascript">crypto map [name] [sequence-num] [type]

BGW-Router(config)# crypto map **airport-map** <span class="hljs-number">10</span> ipsec-isakmp 

BGW-Router(config-crypto-map)#set peer <span class="hljs-number">40.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
_**(ip <span class="hljs-keyword">of</span> the next router we connecting together)**_ 

BGW-Router(config-crypto-map)#set pfs group1
**when you use a key never reuse it again.**


BGW-Router(config-crypto-map)#set security-association lifetime seconds <span class="hljs-number">3600</span>
_**every one hour the key will be changed**_  


BGW-Router(config-crypto-map)#set transform-set BGW-EBL **[name <span class="hljs-keyword">of</span> IPSec]**      


BGW-Router(config-crypto-map)match address <span class="hljs-number">100</span> (Access list number we defined <span class="hljs-keyword">in</span> the first step)
_**which IP addresses have permission to use the created tunnel.**_
</code></pre>
<p>Now we have two tunnels, and we create a connection between them through a crypto map.</p>
<p><strong>perfect forward secrecy (PFS)</strong> when requesting new security associations for this crypto map entry, or that IPSec requires PFS when receiving requests for new security associations, use the set pfs crypto map configuration command</p>
<pre><code class="lang-java">BGW-Router#show crypto map
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b09e70fc-504a-4998-8cb8-14593c4c300d.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-apply-the-crypto-map-to-the-exiting-interface">Apply the crypto map to the exiting interface</h3>
<pre><code class="lang-javascript">BGW-Router#conf t
BGW-Router(config)#int FastEthernet1/<span class="hljs-number">0</span>
BGW-Router(config-<span class="hljs-keyword">if</span>)#


BGW-Router(config-<span class="hljs-keyword">if</span>)#crypto map **airport-map**
</code></pre>
<p>*Mar 28 11:25:39.315: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON</p>
<blockquote>
<p>💡 <strong>The same configuration will be applied to the router on the other side.</strong></p>
</blockquote>
<h2 id="heading-verification">Verification</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1cbe2b0d-5605-41eb-b935-1026efcbad47.png" alt="CCNA 200-301 Study (1)" /></p>
<pre><code class="lang-java">BGW-Router#show crypto ipsec sa
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ad8ea1a7-533f-4101-b649-1888ad81447e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, 4 packets were encrypted and transmitted to the other airport, and 4 packets were decrypted.</p>
<h2 id="heading-network-architectures">Network Architectures</h2>
<p>## 
<strong>LAN  Architecture</strong></p>
<ul>
<li>Topologies</li>
<li>Network Design Layers</li>
<li>PoE</li>
</ul>
<h2 id="heading-wan-architecture">WAN Architecture</h2>
<ul>
<li>Metro Ethernet</li>
<li>MPLS</li>
<li>VPN</li>
</ul>
<h2 id="heading-cloud-architecture">Cloud Architecture</h2>
<ul>
<li>Virtualization and Cloud Computing</li>
</ul>
<h3 id="heading-lan-topology">LAN Topology</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/01e0a0f1-15bc-4111-b6bf-64ab437a435d.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-1-star-topology-most-common-today">⭐ <strong>1. Star Topology</strong> — ✅ <strong>Most Common Today</strong></h3>
<h3 id="heading-structure">🧱 Structure:</h3>
<ul>
<li>All devices connect to a <strong>central switch or hub</strong>.</li>
<li>Think of it like a wheel: the switch is the center, devices are the spokes.</li>
</ul>
<h3 id="heading-why-its-most-commonly-used">✅ <strong>Why it's most commonly used:</strong></h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Reason</td><td>Explanation</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Easy to manage</strong></td><td>Centralized control from the switch</td></tr>
<tr>
<td><strong>Easy to add/remove devices</strong></td><td>No disruption to the whole network</td></tr>
<tr>
<td><strong>Good performance</strong></td><td>Switch reduces collisions</td></tr>
<tr>
<td><strong>Fault isolation</strong></td><td>A failure in one cable/device doesn’t affect others</td></tr>
</tbody>
</table>
</div><h2 id="heading-network-design">Network Design</h2>
<h3 id="heading-network-design-three-tier-architecture">Network Design: Three-Tier Architecture</h3>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e55bb374-5a08-4a26-a119-a8350eb21131.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f906187e-3b61-4d52-9473-10b5b36141ef.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Access layer</strong>: provides a connection point for end-user devices to the network and allows multiple hosts to connect to other hosts through a network device, usually a switch, such as the Cisco 2960-XR shown in the figure, or a wireless access point. Typically, all devices within a single access layer will have the same network portion of the IP address.</li>
<li>the layer that end hosts connect to (PCs, printers, cameras, etc.)</li>
<li>typically Access Layer Switches have lots of ports for end hosts to connect to</li>
<li>QoS marking is typically done here</li>
<li>Security services like port security, DAI, etc. are typically performed here</li>
<li><p>switchports might be PoE-enabled for wireless APs, IP phones, etc.</p>
<p>  <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ccf996bb-79e3-4766-9343-bddf721d3edf.jpeg" alt="CCNA 200-301 Study (1)" /></p>
</li>
<li><p><strong>Distribution layer</strong>: The distribution layer in network topology serves as <strong>the communication point between the access layer and the core**</strong>,<strong> providing routing, filtering, WAN access, and determining the fastest way to handle network service requests, Distribution layer devices control the type and amount of traffic that flows from the access layer to the core layer. It typically includes </strong>routers and multilayer switches.**</p>
<p>  <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f68a11d4-17b6-4270-837f-736c5dd9910e.jpeg" alt="CCNA 200-301 Study (1)" /></p>
</li>
<li><p><strong>Core layer</strong>: The core layer in network topology, also known as the <strong>network backbone</strong>, is responsible for <strong>quickly transporting large amounts of traffic and providing interconnectivity between distribution layer devices</strong>. It typically consists of h<strong>igh-speed devices like high-end routers and switches with redundant links.</strong></p>
</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c94ffec5-484f-4a13-afda-8f25954f2f33.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-network-design-two-tier-architecture-collapsed-core">Network Design Two-Tier Architecture (collapsed core)</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/277d7de3-cccb-42a1-bd6a-00314df72c3e.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b164d88b-ea7c-48d4-b211-a107ec9516e7.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0c658b06-5089-474c-ab09-918e103d5b0c.png" alt="CCNA 200-301 Study (1)" /></p>
<p>many Small enterprise networks do not grow significantly larger over time, Therefore, A two-tier hierarchical design where the core and distribution layers are collapsed into one layer is often more practical .
<strong>Collapsed Core</strong> is when the <strong>distribution layer and Core layer</strong> functions are implemented by a <strong>single device.</strong> </p>
<h2 id="heading-spine-leaf-architecture"><strong>Spine-leaf Architecture</strong></h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/441bc82f-19f5-4131-af74-00ba31bb9f49.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>The spine-leaf architecture</strong> has become a popular data center architecture, bringing many advantages to the data center, such as <strong>scalability</strong>, <strong>network performance</strong>, etc. The benefits of spine-leaf architecture in modern networks are summarized here in three points.</p>
<p><strong>Increased redundancy:</strong> The spine-leaf architecture connects the servers with the core network, and has higher flexibility in hyper-scale data centers. In this case, the <strong>leaf switch can be deployed as a bridge between the server and the core network</strong>. Each <strong>leaf switch connects to all spine switches, which creates a large non-blocking fabric</strong>, increasing the level of redundancy and reducing traffic bottlenecks.</p>
<p><strong>Performance enhancement:</strong> The spine-leaf architecture can effectively avoid traffic congestion by applying protocols or techniques such as transparent interconnection of multiple links (TRILL) and shortest path bridging (SPB). The spine-leaf architecture can be Layer 2 or Layer 3, so uplinks can be added to the spine switch to expand inter-layer bandwidth and reduce oversubscription to secure network stability.</p>
<p><strong>Scalability:</strong> The spine-leaf architecture has multiple links that can carry traffic. The addition of switches will improve scalability and help enterprises expand their business later.</p>
<p>There are some rules about Spine-Leaf architecture:
→ Every Leaf switch is connected to every Spine switch.
→ Every Spine switch is connected to every Leaf switch.
→ Leaf switches do not connect to other Leaf switches.
→ Spine switches do not connect to other Spine switches.
→ End hosts (servers etc.) only connect to Leaf switches.</p>
<ul>
<li>The path taken by traffic is randomly chosen to balance the traffic load among the Spine switches.</li>
<li>Each server is separated by the same number of ‘hops’ (except those connected to the same Leaf), providing consistent latency for East-West traffic.</li>
</ul>
<h1 id="heading-how-to-design-a-network">How to Design a Network?</h1>
<ul>
<li>A clear map of the network</li>
<li>The structure and layout of  the cabling required</li>
<li>The quantity, type, and location of all devices on the network.</li>
<li>Your IP Addressing structure.</li>
<li>Details of your network security architecture and processes.</li>
<li>Budgets and Scalability.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/df45bc1c-5e08-4d32-b243-b6232929c3d3.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/67e4b588-688a-430e-835d-89d7caffe49a.png" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=srV9gKvuTC0">https://www.youtube.com/watch?v=srV9gKvuTC0</a></p>
<h2 id="heading-poe">POE</h2>
<p>Sending electricity over the unused Ethernet wires to power a connected device. Through inline power or using power over Ethernet (POE). Cisco IP phones, devices such as wireless access points, and video surveillance equipment can also use PoE.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/54087c14-fd48-4a8e-a4f9-c93596e2060e.png" alt="CCNA 200-301 Study (1)" /></p>
<p>As you can see, 4 of the lines are used to receive and transmit data, and 4 other lines are used to send power. </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>PoE Extender</td><td>to extend the reach of both power and data signals over Ethernet cables. <strong>(the standard 100-meter (328 feet) limit)</strong></td></tr>
</thead>
<tbody>
<tr>
<td>POE Injector</td><td>Connects POE-enabled network devices to a non-PoE LAN Switch port</td></tr>
<tr>
<td>POE Splitter</td><td>A small device that separates the data and power signals in a power over Ethernet(POE) cable, providing power to a non-PoE device</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/81c46567-8697-45d1-95e1-aa9e9d2b14bd.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/576a38aa-dac9-48f4-bc0f-07510e89db4d.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6083abe5-893e-41f5-b6c1-ae01c13cd812.webp" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-wan-architecture-1">WAN Architecture</h1>
<ul>
<li><strong>Metro Ethernet</strong></li>
<li><strong>MPLS</strong></li>
<li><strong>VPN</strong></li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e4b289ca-d117-4314-804b-b5439181f952.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-metro-ethernet">Metro Ethernet</h2>
<p>Metro Ethernet is an Ethernet transport network that provides point-to-point or multipoint connectivity services over a <em>metropolitan area network (MAN).</em> Ethernet originated as a <strong>LAN technology</strong> and became a replacement for l<strong>ow-speed WAN technologies</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/538eedbc-7220-470b-8062-e3e9986f68b3.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/119dd2c4-f0f4-4484-b95a-dcaecd1d7c65.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-mpls">MPLS</h1>
<p><strong>Multiprotocol Label Switching</strong> (MPLS) is a <strong>data-forwarding technology</strong> that <strong>increases the speed and controls the flow of network traffic</strong>. With MPLS, data is directed through a path via labels instead of requiring <strong>complex lookups in a routing table at every loop.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/97997518-9a33-4cd1-bcf7-ed1029525cc5.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-when-is-mpls-used"><strong>When is MPLS used?</strong></h2>
<p>MPLS can be used when speed and <strong>reliability are highly important.</strong> Applications that require near-immediate data delivery are known as <strong>real-time applications.</strong> Voice calls and video calls are two common examples of real-time applications. </p>
<p>## </p>
<p><strong>What are the drawbacks of MPLS?</strong></p>
<ol>
<li><strong>Cost:</strong> MPLS is more expensive than regular internet service.</li>
<li><strong>Long Setup Time:</strong>  Setting up complicated paths across one or more large networks takes time.</li>
<li><strong>Lack of encryption:</strong> MPLS is not encrypted; any attacker who intercepts packets on MPLS paths can read them in plaintext. Encryption has to be set up separately.</li>
</ol>
<pre><code class="lang-javascript">MPLS packets: Not encrypted by <span class="hljs-keyword">default</span>.
Security options: VPNs <span class="hljs-keyword">for</span> encryption, traffic isolation, and secure network infrastructure.
</code></pre>
<blockquote>
<p>💡 MPLS routers work as a switch just forwarding the incoming packets, without decapsulating the packet in layer 3 to check the IP of the destination and checking the routing table. </p>
</blockquote>
<h2 id="heading-virtualization">Virtualization</h2>
<p><strong>Virtualization</strong> is the ability to <strong>run multiple operating systems</strong> on a single physical system and share the underlying hardware resources.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/37caa93d-f422-44b8-b43d-b5f08a941eb1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>## 
Hypervisor</p>
<p>A hypervisor is software that creates and runs virtual machines (VMS). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. </p>
<h2 id="heading-two-types-of-hypervisor">Two Types of Hypervisor</h2>
<h3 id="heading-type-1">Type 1</h3>
<p><strong>Type 1, or “bare metal,”</strong> is more optimized because it is <strong>already installed and runs directly on the hardware it came included with</strong>. It replaces a host operating system, and <strong>VM resources are scheduled directly to the hardware by the hypervisor</strong>.   </p>
<blockquote>
<p>💡 This type of hypervisor is most common in an <em><strong>enterprise data center or other server-based environment.</strong></em>   </p>
</blockquote>
<p><strong>KVM, Microsoft Hyper-V, and VMware vSphere</strong> are examples of type 1 hypervisors. KVM was merged into the Linux kernel in 2007. If you are using a modern version of Linux, you already have access to KVM</p>
<h3 id="heading-type-2">Type 2</h3>
<p>A <strong>type 2 hypervisor</strong> is also known as a hosted hypervisor and is run on <em><strong>a conventional operating system as a software layer or application</strong></em>. </p>
<blockquote>
<p>💡 A type 2 hypervisor is better for <em><strong>individual users who want to run multiple operating</strong></em> systems on a personal computer.</p>
</blockquote>
<p><strong>VMware Workstation and Oracle VirtualBox</strong> are examples of a type 2 hypervisor.</p>
<h2 id="heading-containers-vs-vms-optional"><strong>Containers vs. VMs (optional)</strong></h2>
<p><strong>Containers</strong> and <strong>virtual machines</strong> are very similar resource v<strong>irtualization technologies. Virtualization is the process in which a system's singular resource like RAM, CPU, Disk, or Networking,</strong> can be ‘virtualized’ and represented as multiple resources. The key differentiator between containers and virtual machines is that v<strong>irtual machines virtualize an entire machine down to the hardware layers,</strong> and <strong>containers only virtualize software layers above the operating system level.</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/229de625-3fb2-4321-ad15-3dbdd1e9b4cc.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-types-of-virtualization">Types of Virtualization</h2>
<ul>
<li>Application Virtualization</li>
<li>Desktop Virtualization</li>
<li>Hardware Virtualization</li>
<li>Network virtualization (VLAN)</li>
<li>Storage Virtualization</li>
</ul>
<h2 id="heading-cloud-computing">Cloud Computing</h2>
<p><strong>On-premise (or on-premises)</strong> refers to software, hardware, or IT infrastructure that is <strong>physically located within</strong> <strong>a company's facilities</strong>, rather than being hosted remotely (like in the cloud).</p>
<h2 id="heading-cloud-computing-1">Cloud Computing</h2>
<p><strong>Cloud computing</strong> is a model that allows customers <strong>simple</strong>, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) from anywhere. These resources can be rapidly provisioned and released with minimal management effort or interaction with the service provider. This cloud model is composed of five essential characteristics, three service models, and four deployment models.</p>
<h2 id="heading-essential-characteristics-of-cloud">Essential Characteristics of Cloud</h2>
<ul>
<li><p><strong>On-Demand self-service:</strong> Users can automatically provision computing resources like storage or processing <strong>without human interaction</strong> with the <strong>service provider</strong>.</p>
<p>   ✅ Example: Creating a virtual machine instantly through a cloud dashboard.</p>
</li>
<li><p><strong>Broad Network Access:</strong> Cloud services are available over the network and can be accessed via <strong>standard devices</strong> such as laptops, smartphones, and tablets.</p>
<p>     ✅ Example: Accessing cloud storage like Google Drive or Dropbox from any device with internet.</p>
</li>
<li><p><strong>Resource Pooling:</strong> Cloud providers use <strong>multi-tenant models</strong> to serve multiple customers using shared resources (like memory, storage, and bandwidth), dynamically assigned and reassigned according to demand.</p>
<p>      ✅ Example: One physical server running virtual machines for multiple clients.</p>
</li>
<li><p><strong>Rapid Elasticity:</strong>  Resources can be quickly <strong>scaled up or down</strong>, sometimes automatically, to meet demand.</p>
<p>       ✅ Example: Auto-scaling web servers during traffic spikes.</p>
</li>
</ul>
<ul>
<li><p><strong>Measured service:</strong> Cloud Systems automatically control and optimize resource use by <strong>metering usage</strong>, so customers pay only for what they use.</p>
<p>✅ Example: Paying per gigabyte of storage or per hour of compute time.</p>
</li>
</ul>
<h2 id="heading-cloud-computing-service-models">Cloud Computing Service models</h2>
<ul>
<li><strong>Software as a service (SaaS)</strong>: Instead of users installing <strong>an application</strong> on their device, SaaS applications are hosted on cloud servers, for example, <strong>Salesforce, Mailchimp, and Slack</strong>.</li>
<li><strong>Platform as a Service (PaaS):</strong> <a target="_blank" href="https://www.cloudflare.com/learning/serverless/glossary/platform-as-a-service-paas/">PaaS</a> vendors offer everything necessary for building an application, including development tools, infrastructure, and operating systems, over the Internet. PaaS can be compared to renting all the tools and equipment necessary for building a house, instead of renting the house itself. PaaS examples include Heroku and Microsoft Azure.</li>
<li><strong>Infrastructure as a Service (IaaS)</strong>: The cloud provider is responsible for giving IT managers access to the <strong>network equipment, virtualized network services, and supporting network</strong> infrastructure. Using this cloud service allows IT managers to deploy and run software code, which can include operating systems and applications. Examples include Amazon EC2 and Google Compute Engine.</li>
</ul>
<h2 id="heading-cloud-computing-deployments">Cloud Computing Deployments</h2>
<p><strong>Public Cloud:</strong> Cloud-based applications and services offered in a public cloud are made available to the general population. Service may be free or offered on a pay-per-use model.</p>
<p><strong>Private Cloud (On-premise Cloud):</strong> Cloud-based applications and services offered in a private environment to one organization. </p>
<p><strong>Hybrid cloud</strong>: deployments c<strong>ombine public and private clouds</strong>, and may even include on-premises legacy servers. An organization may use its <strong>private cloud for some services</strong> and its public cloud for others, or it may use the public cloud as a backup for its private cloud.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/06196450-df5a-4076-884e-3fd60369aec9.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-network-automation">Network Automation</h2>
<h1 id="heading-what-is-automation">What is Automation?</h1>
<ul>
<li><strong>Network Automation</strong> is the <strong>process of automating the configuration, management, testing, deployment, and operation of physical and virtual devices within a network.</strong> With everyday network tasks and functions automated and repetitive processes controlled and managed automatically, network service availability is ensured.</li>
</ul>
<h1 id="heading-why-automation">Why Automation?</h1>
<ul>
<li>Remove the <strong>risk of human erro</strong>r.</li>
<li>Easy control of device <strong>configuration for consistency and accuracy</strong>.</li>
<li>Reduces the workload for IT staff.</li>
<li>Standardize processes. (Vendor free)</li>
<li>Zero-touch provisioning. (without touching the router for configuration)</li>
<li>fast and accurate deployment of patches and updates.</li>
</ul>
<h1 id="heading-sdn">SDN</h1>
<ul>
<li><strong>SDN stands for Software-Defined Network,</strong> which is a <strong>networking architecture approach</strong>. It enables the control and management of the network devices using <strong>software applications</strong>. Through Software Defined Network (SDN), the networking behavior of the entire network and its devices is programmed in a centrally controlled manner through software applications using open APIs.</li>
</ul>
<p>To understand software-defined networks, it is essential to comprehend the various planes involved in networking.</p>
<ul>
<li><strong>Data Plane</strong></li>
<li><strong>Control Plane</strong></li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>CONTROL PLANE</strong></td><td><strong>DATA PLANE</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Control plane</strong> refers to the <strong>all functions and processes</strong> that determine <strong>which path to use to send the packet or frame</strong>.</td><td><strong>Data plane</strong> refers to <strong>all the functions and processes</strong> that <strong>forward packets/frames from one interface to another based on control plane logic</strong>.</td></tr>
<tr>
<td>It is responsible for <strong>building and maintaining the IP routing table and how packets should be forwarded.</strong></td><td>It is responsible for <strong>forwarding actual IP packet and moving packets from source to destination.</strong></td></tr>
<tr>
<td><strong>Control plane</strong> performs its <strong>task independently</strong>.</td><td><strong>Data plane</strong> performs its <strong>task depending on Control plane.</strong></td></tr>
<tr>
<td>In general we can say in control plane it is learned what and how it can be done.</td><td>In general we can say in data plane the actual task is performed based on what is learned.</td></tr>
<tr>
<td>It includes <strong>Spanning Tree Protocol (STP),Address Resolution Protocol (ARP),Routing Information Protocol (RIP), Dynamic Host Configuration Protocol (DHCP) etc**</strong>.**</td><td>It includes <strong>decrementing Time To Live (TTL), recomputing IP header checksum etc**</strong>.**</td></tr>
<tr>
<td>Control plane acts as a <strong>decision maker</strong> in data forwarding.</td><td>Data plane acts as a <strong>decision implementer</strong> in data forwarding.</td></tr>
<tr>
<td><strong>Routing</strong> is performed in the <strong>control plane.</strong></td><td><strong>Switching</strong> is performed in the <strong>data plane</strong>.</td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/174390da-fade-44bd-afff-30665fe16e8b.webp" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/14aa56ec-8557-4dd1-9076-7470fc2cd0e0.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1309cd92-e19b-48fc-a78c-247abf4ecd70.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-sdn-elements">SDN Elements</h1>
<ul>
<li><strong>Controller</strong>: the <strong>core of an SDN architecture,</strong> which enables centralized management and control, automation, and policy enforcement across physical and virtual network environments.</li>
<li><strong>Southbound API:</strong> relay information between the controller and the individual network devices (Such as switches, access points, routers, and firewalls).</li>
<li><strong>Northbound API:</strong> relays information between the <strong>controller and the application plane</strong>.</li>
</ul>
<h1 id="heading-sdn-controllers-and-protocols">SDN Controllers and Protocols</h1>
<h3 id="heading-protocols">Protocols:</h3>
<ul>
<li>Two of the most well-known protocols used by <strong>SDN controllers to communicate with the switches/routers</strong> are <strong>OpenFlow</strong> and <strong>Open Virtual Switch Database (OVSDB).</strong></li>
</ul>
<h3 id="heading-controller">Controller:</h3>
<ul>
<li>The first SDN controller was NOX.</li>
</ul>
<h1 id="heading-different-models-of-sdn">Different Models of SDN</h1>
<ul>
<li>Open SDN</li>
<li>SDN via APIs</li>
<li>SDN via Hypervisor-based Overlay network.</li>
<li>Hybrid SDN.</li>
</ul>
<h1 id="heading-why-sdn-is-important">Why SDN is Important?</h1>
<ul>
<li><strong>Better Network Connectivity.</strong></li>
<li><strong>Better Deployment of Applications.</strong></li>
<li><strong>Better Security.</strong></li>
<li><strong>Better Control with high speed.</strong></li>
</ul>
<h1 id="heading-sdn-architecture">SDN Architecture</h1>
<ul>
<li><strong>Underlay</strong> is the <strong>physical or basic IP network</strong> that provides <strong>connectivity between devices</strong> (switches, routers, servers, etc.).</li>
<li><strong>Overlay</strong> is a <strong>virtual network</strong> built <strong>on top of the underlay</strong> using <strong>encapsulation</strong> technologies,  such as VXLAN, OTV, VPLS, <em><strong>or</strong></em> MPLS-VPN.</li>
<li><strong>Fabric</strong> is a <strong>network topology and architecture</strong> that interconnects all devices using consistent and often automated policies. It's typically used in data centers and campus networks.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/927d06cd-d29e-4ad0-b35a-a48ce09789f8.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-vxlan">VXLAN</h1>
<p><strong>VXLAN stands for</strong> <strong>Virtual Extensible LAN**</strong>.<strong>
It’s a networking technology used to create </strong>virtual Layer 2 networks<strong> (like VLANs) over a </strong>Layer 3 (IP)<strong> </strong>network<strong>, typically used in </strong>data centers<strong> and </strong>cloud environments**.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/ca01c7a8-641b-40b8-8292-a5f27b35b9fc.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/71c1939c-11ee-46be-a68d-05085c26abf1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>VXLAN is designed to deliver reliable and scalable data center networking services to managed service customers and is a technology for next-generation data center construction.</p>
<h1 id="heading-cisco-dna-controller">Cisco DNA Controller</h1>
<ul>
<li><strong>Cisco DNA Controller</strong> (Also called Cisco Digital Network Architecture) is a <strong>powerful SDN controller and management dashboard</strong> that allows you to take control of your network, optimize your network, and secure your remote workforce.</li>
</ul>
<p>It is an appliance that provides a centralized graphical interface to design your network, add and configure devices, monitor your network and devices, and troubleshoot.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/bf98524c-186f-41e5-83ee-23dad068bf25.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-api">API</h1>
<ul>
<li>API(Application Programming Interface): is a software intermediately that <strong>allows two applications to communicate with each other</strong>, APIs enable applications to exchange data and functionality easily and securely.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/99036e5d-3de7-4dfe-a609-2c36a807fbb3.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In SDN Architecture, APIs are used to communicate between <u><strong>apps and the SDN Controller</strong></u>(via The <strong>NBI</strong>), and between the <u><strong>SDN controller and the network devices</strong></u> (via the <strong>SBI</strong>).</p>
<p>The NBI typically uses REST APIs </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/02318b2f-44ba-416f-b06c-962b2311b4a3.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-rest-api">REST API</h1>
<ul>
<li>A REST API (<strong>Representational State Transfer</strong>) or RESTful API) is a way applications communicate with each other using a set of rules.</li>
<li><strong>REST APIs</strong> use familiar commands like <strong>GET, POST, PUT, and DELETE.</strong> These commands are like asking the waiter to get (read), add (create), update, or delete information.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/dd658c9f-b215-4dc5-8ebf-0491bed93065.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><p>REST APIs communicate via <strong>HTTP</strong> requests to perform standard database functions like <strong>creating, reading, updating, and deleting records</strong> ( also known as CRUD) within resources.</p>
<h1 id="heading-crud-and-http-methods">CRUD and HTTP Methods</h1>
</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>HTTP method</td><td>CRUD</td><td>Example</td></tr>
</thead>
<tbody>
<tr>
<td>GET</td><td>Read</td><td><strong>200(ok),</strong> what is the value of “ip_address”</td></tr>
<tr>
<td>POST</td><td>Create</td><td><strong>201(created)</strong>, create variable “ip_address” and set the value to “192.168.3.1”</td></tr>
<tr>
<td>PUT/PATCH</td><td>update</td><td><strong>405(Method not allowed)</strong>, unless you want to update every resource in the entire collection of resource. Example: change the value of “ip_address” to “192.168.0.2”</td></tr>
<tr>
<td>Delete</td><td>Delete</td><td><strong>405(Method not allowed),</strong> unless you want to delete the whole collection: delete “ip_address”</td></tr>
</tbody>
</table>
</div><h1 id="heading-data-serialization">Data Serialization</h1>
<ul>
<li><p>Serialization is the process of <u><strong>converting a data objec</strong></u>t—a combination of code and data represented within a region of data storage — into a series of bytes that saves the state of the object in an easily transmittable form.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/647d2740-61b0-407e-b9c5-8e61d45f0add.png" alt="CCNA 200-301 Study (1)" /></p>
</li>
<li><p><strong>Data formats</strong> such as <strong>JSON and XML</strong> are often used for sorting serialized data.</p>
</li>
<li>JSON(JavaScript Object Notation)</li>
<li>XML(eXtensible Markup language)</li>
<li><p>YAML</p>
<h1 id="heading-json">JSON</h1>
</li>
<li><p>JSON(JavaScript Object Notation) is a lightweight data interchange format. it is easy for humans to read and write.</p>
</li>
<li><p>The whitespace is <strong>insignificant</strong>.</p>
<h1 id="heading-json-keys-and-values">JSON keys and Values</h1>
</li>
<li><p><strong>Key</strong>: a key is always string enclosed in quotation marks.</p>
</li>
<li><p>Value: A value can be a string, number, Boolean expression, array, or object.</p>
<h2 id="heading-type-of-value">Type of value:</h2>
</li>
<li><p><strong>Array:</strong> an associative array of values.</p>
</li>
<li><strong>Boolean:</strong> True or False.</li>
<li><strong>Number:</strong> An integer.</li>
<li><strong>Object:</strong> an associative value of key/value pairs.</li>
<li><p><strong>String: a</strong> plain text character that usually forms a word.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/aa292c59-3f8b-4a03-b893-c9cb0085de05.png" alt="CCNA 200-301 Study (1)" /></p>
</li>
</ul>
<h1 id="heading-xml">XML</h1>
<ul>
<li>Extensible Markup Language (XML)  is a tag-based language and if you know HTML, this will look familiar. each item you add has to start with .</li>
<li><p>The whitespace is <strong>insignificant</strong>.</p>
<h1 id="heading-yaml">YAML</h1>
</li>
<li><p><strong>YAML</strong> is a <u><strong>data serialization</strong></u> language that is often <u><strong>used for writing configuration files</strong></u>. YAML stands for <strong>yet another markup language,</strong> or YAML, <strong>not markup language</strong>, which <strong>emphasizes that YAML is for data</strong>, <strong>not documents</strong>.</p>
</li>
<li><p>whitespace is <strong>significant</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/89298528-8cd1-43a2-bdc7-29428910be64.png" alt="CCNA 200-301 Study (1)" /></p>
</li>
</ul>
<blockquote>
<p>💡 <strong>JSON</strong>, with its compact syntax and wide-ranging support, has become the de facto standard for web applications and data interchange. Its simplicity ensures rapid parsing and broad compatibility across platforms</p>
</blockquote>
<h1 id="heading-rest-api-authentication">REST API Authentication</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Feature</td><td>Basic Auth</td><td>API Key</td><td>Access Token</td><td>OAuth 2.0</td></tr>
</thead>
<tbody>
<tr>
<td>Identifies User?</td><td>✅ (username)</td><td>❌ (app only)</td><td>✅ (if user-scoped)</td><td>✅ (via access token)</td></tr>
<tr>
<td>Authorization Level</td><td>Basic</td><td>App-level</td><td>Granular (scopes)</td><td>Granular (scopes)</td></tr>
<tr>
<td>Credential Rotation</td><td>Manual</td><td>Manual</td><td>Auto (refresh)</td><td>Auto (refresh)</td></tr>
<tr>
<td>Token Expiration</td><td>❌ No</td><td>❌ No</td><td>✅ Yes</td><td>✅ Yes</td></tr>
<tr>
<td>Security Best Practice</td><td>❌ Weak</td><td>⚠️ Medium</td><td>✅ Strong</td><td>✅✅ Strongest</td></tr>
<tr>
<td>Complexity</td><td>✅ Simple</td><td>✅ Simple</td><td>⚠️ Medium</td><td>❌ Complex</td></tr>
<tr>
<td>Ideal Use Case</td><td>Testing, Legacy</td><td>Internal APIs</td><td>User-access APIs</td><td>Web/Mobile login</td></tr>
</tbody>
</table>
</div><blockquote>
<p>💡 <strong>REST-based authentication methods</strong> should always be used <strong>using HTTPS</strong> to prevent credentials from being <strong>intercepted</strong>.</p>
</blockquote>
<h3 id="heading-how-oauth-20-works"><strong>How OAuth 2.0 Works</strong></h3>
<p>    <img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/a6095920-1053-445d-9687-da9b5b2c854f.png" alt="CCNA 200-301 Study (1)" /></p>
<p>    The details of the steps in the figure are as follows:</p>
<ol>
<li><strong>Authorization Request:</strong><ul>
<li>User clicks "Log in with Google" on the music platform.</li>
<li>The music platform redirects the user to Google's login page, requesting access to their Gmail profile and email.</li>
</ul>
</li>
<li><strong>Authorization Grant:</strong><ul>
<li>User logs into Gmail and grants permission.</li>
</ul>
</li>
<li><strong>Access Token Request:</strong><ul>
<li>The music platform sends the authorization code and its own credentials to Google to request an access token.</li>
</ul>
</li>
<li><strong>Access Token:</strong><ul>
<li>Google verifies the code and the music platform's identity.</li>
<li>Google issues an access token to the music platform.</li>
</ul>
</li>
<li><strong>Resource Request:</strong><ul>
<li>The music platform uses the access token to request the user's profile and email from Google.</li>
</ul>
</li>
<li><p><strong>Protected Resource:</strong></p>
<ul>
<li>If the access token is valid, Google provides the requested information to the music platform.</li>
</ul>
<h1 id="heading-configuration-management">Configuration Management</h1>
</li>
<li><p><strong>Configuration Management</strong> is the process of maintaining a computer system, server, and software in a desired, consistent state. It’s a way to <strong>make sure that a system performs as it’s expected as changes are made over time</strong>.</p>
<p><strong>Infrastructure as Code (IaC)</strong> is the practice of <strong>provisioning and managing infrastructure</strong> (Server, networks, cloud resources) using a machine-readable configuration file (code) instead of manual configuration (e.g, CLI/GUI)</p>
</li>
</ol>
<h1 id="heading-configuration-management-tools">Configuration Management Tools</h1>
<ul>
<li>Ansible</li>
<li>CFEngine</li>
<li>Puppet</li>
<li>Chef</li>
<li>Salt</li>
</ul>
<h2 id="heading-type-of-configuration-management-tools">Type of Configuration Management Tools</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/0c08fa1a-7d24-403f-96f3-2d49090c6873.png" alt="CCNA 200-301 Study (1)" /></p>
<h3 id="heading-push-base-configuration-management-tools">Push Base configuration management tools</h3>
<p><strong>Push configuration management tools</strong> initiate and push configuration changes from <strong>a central server or control node to the target system</strong>. The central server actively sends the updated configurations to the target systems.</p>
<ul>
<li><strong>Centralized Control</strong>: A central server or control node is responsible for initiating and distributing configuration changes to the target systems.</li>
<li><strong>Immediate Updates:</strong> The target system receives and applies the configuration changes immediately from the configuration management server.</li>
<li><strong>Real-Time Interaction</strong>: Push-based configuration management typically involves real-time communication between the configuration server and the target systems.</li>
<li><strong>Agentless or Light Agents:</strong> push-based configuration management can be agentless, where the target systems fetch configuration changes using protocols like HTTP or SSH.</li>
</ul>
<h3 id="heading-pull-base-configuration-management-tools">Pull Base configuration management tools</h3>
<p><strong>Pull-based configuration management</strong> tools enable <strong>target systems to independently fetch configuration from a central repository or server when needed.</strong> The target systems periodically or on demand request and retrieve the updated configurations. </p>
<ul>
<li><strong>Decentralized Control:</strong> Configuration changes are stored in a central repository on the server, but the target systems independently retrieve changes when needed.</li>
<li><strong>Delay Updates:</strong> The target systems update their configuration only when they request and retrieve the updated configuration from the central server. Changes are not applied immediately upon availability.</li>
<li><strong>Scheduled or Triggered Retrieval:</strong> The target system can be configured to retrieve the configuration changes periodically, based on a schedule, or triggered by specific events or conditions.</li>
<li><strong>Agent-based Approach:</strong> Pull-based configuration management often relies on <strong>agents or client software installed on the target systems.</strong> These agents establish communication with the configuration management server and receive configuration updates.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/44349353-ef93-4820-a7b8-8e44a79c1b26.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-ansible">Ansible</h1>
<ul>
<li>Ansible is an <strong>open-source</strong> community project sponsored by <strong>Red Hat</strong>.</li>
<li>Ansible is the <u><em><strong>automation language</strong></em></u> that can be used across entire IT teams from systems and network administrators to developers and managers.</li>
<li>It has only <strong>a master running on the server machine</strong>, but <strong>no agents running on the client machine.</strong> It uses an <strong>SSH connection to log in to client systems or nodes you want to configure</strong>.</li>
<li>Ansible relies on modules and Python libraries to communicate with other devices.</li>
<li>Modules can be written in different programming languages (mostly Python) to accomplish different tasks.</li>
<li>Cisco devices can communicate with Ansible through <strong>SSH and SNMP</strong>.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/713488ad-b5ea-480e-9f6b-19399d643930.png" alt="CCNA 200-301 Study (1)" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/67daec75-32eb-4c90-975a-d130a57d52df.jpeg" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Playbooks</strong> are the files where Ansible code is written. Playbooks are <strong>written in YAML format</strong>. YAML stands for Yet Another Markup Language. <strong>Playbooks</strong> are one of the core features of Ansible and tell <u><strong>Ansible what to execute</strong></u>. They are like a to-do list for Ansible that contains a list of tasks.</p>
<p><strong>“command_ios.yml” Playbook</strong></p>
<pre><code class="lang-javascript">---
- name: IOS Show Commands
<span class="hljs-attr">hosts</span>: <span class="hljs-string">"ios_devices"</span>
<span class="hljs-attr">gather_facts</span>: <span class="hljs-literal">false</span>
<span class="hljs-attr">connection</span>: local

<span class="hljs-attr">vars</span>:
  cli:
    host: <span class="hljs-string">"{{ ansible_host }}"</span>
    <span class="hljs-attr">username</span>: <span class="hljs-string">"{{ username }}"</span>
    <span class="hljs-attr">password</span>: <span class="hljs-string">"{{ password }}"</span>
    <span class="hljs-attr">transport</span>: cli

<span class="hljs-attr">tasks</span>:
  - name: ios show commands
    <span class="hljs-attr">ios_command</span>:
      commands:
        - show version | i IOS
        - show run | i hostname
      <span class="hljs-attr">provider</span>: <span class="hljs-string">"{{ cli }}"</span>

    <span class="hljs-attr">register</span>: output

    - name: show output <span class="hljs-keyword">of</span> IOS
      <span class="hljs-attr">debug</span>:
        <span class="hljs-keyword">var</span>: output
</code></pre>
<p><strong>Inventory:</strong> The Ansible inventory file defines the hosts and groups of hosts upon which commands, modules, and tasks in a playbook operate.</p>
<p><strong>“hosts” Inventory</strong></p>
<pre><code class="lang-javascript">[cisco_routers]
<span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> ansible_connection=network_cli ansible_network_os=ios ansible_user=your_username ansible_password=your_password ansible_become=yes ansible_become_method=enable ansible_become_password=your_enable_password


[cisco_switches]

<span class="hljs-number">192.168</span><span class="hljs-number">.2</span><span class="hljs-number">.5</span> ansible_connection=network_cli ansible_network_os=ios ansible_user=your_username ansible_password=your_password ansible_become=yes ansible_become_method=enable ansible_become_password=your_enable_password
</code></pre>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/26f0130b-2cd3-49a1-9bb6-cc13d89f27ef.png" alt="CCNA 200-301 Study (1)" /></p>
<blockquote>
<p>💡  In a production environment, the best practice is to use a more secure method, such as <strong>Ansible Vault or Ansible Tower</strong>. </p>
</blockquote>
<h1 id="heading-terraform">Terraform</h1>
<p><strong>Terraform</strong> is an open-source  LaC tool developed by <strong>HashiCorp</strong>, designed to help professionals efficiently build, change, and version infrastructure safely and predictably.</p>
<p>Terraform uses <strong>providers</strong>, which are plugins that interact with devices through APIs like <strong>RESTCONF</strong> or <strong>NETCONF</strong>.</p>
<blockquote>
<p>💡 <strong>RESTCONF and NETCONF</strong> are network configuration protocols that allow direct interaction with network devices. They provide standardized APIs for secure communication, used to modify device configurations and retrieve operational data.</p>
</blockquote>
<ul>
<li>Like <strong>Ansible</strong>, it uses a push model and is <strong>agentless</strong>.</li>
<li>A <strong>Terraform provider</strong> is essentially a plugin that allows Terraform to interact with different technologies. For example, Cisco offers several Terraform providers to configure devices.</li>
<li><strong>HCL</strong> is a configuration language designed to be both human-readable and machine-friendly, similar to JSON and XML.</li>
<li><strong>HCL</strong> is similar to JSON in data structure and uses braces for blocks and lists. However, HCL also includes features for configuration management, such as comments and a more flexible syntax.</li>
</ul>
<p><strong>Step 1: Create the Terraform configuration file.</strong></p>
<pre><code class="lang-bash"><span class="hljs-comment"># Assuming there is a provider that supports Cisco IOS XE RESTCONF</span>
provider <span class="hljs-string">"cisco_ios_xe"</span> {
  host     = <span class="hljs-string">"192.168.10.1"</span>
  username = <span class="hljs-string">"admin"</span>
  password = <span class="hljs-string">"adminpass"</span>
  secure   = <span class="hljs-literal">true</span>  <span class="hljs-comment"># Assuming secure implies HTTPS/RESTCONF is being used securely</span>
}

<span class="hljs-comment"># Resource configuration for an interface</span>
resource <span class="hljs-string">"cisco_ios_xe_interface"</span> <span class="hljs-string">"gigabit1"</span> {
  name        = <span class="hljs-string">"GigabitEthernet1"</span>
  description = <span class="hljs-string">"Uplink Interface"</span>
  enabled     = <span class="hljs-literal">true</span>
}

<span class="hljs-comment"># Output the operational status of the interface</span>
output <span class="hljs-string">"interface_status"</span> {
  value = cisco_ios_xe_interface.gigabit1.operational_status
  description = <span class="hljs-string">"Operational status of the GigabitEthernet1 interface."</span>
}
</code></pre>
<p><strong>Step 2. Use the Terraform Provider.</strong></p>
<p>On the PC running Terraform, you need to install and configure the Cisco IOS XE Terraform Provider plugin. and enable RESTCONF or NETCONF on the target IOS XE device by entering the global configuration commands</p>
<pre><code class="lang-bash">Router1&gt; <span class="hljs-built_in">enable</span>
Router1<span class="hljs-comment"># configure terminal</span>
Router1(config)<span class="hljs-comment"># restconf</span>
Router1(config)<span class="hljs-comment"># netconf-yang</span>
Router1(config)<span class="hljs-comment"># end</span>
Router1<span class="hljs-comment"># write memory</span>
</code></pre>
<p><strong>Step 3. Run Terraform Commands</strong></p>
<pre><code class="lang-bash">admin@pc:~/terraform_project$ terraform init

admin@pc:~/terraform_project$ terraform plan

admin@pc:~/terraform_project$ terraform apply
</code></pre>
<ul>
<li>The <strong>terraform init</strong> command initializes the Terraform working directory.</li>
<li>The <strong>terraform plan</strong> command creates an execution plan specifying <strong>what actions Terraform will take.</strong></li>
<li>The <strong>terraform apply</strong> command applies the changes required to reach the desired state of the configuration.</li>
</ul>
<h1 id="heading-puppet">Puppet</h1>
<p><strong>Puppet</strong> is a configuration automation and deployment orchestration solution. It’s an open-source tool <u><strong>based on Ruby.</strong></u> For working, it is based on a <strong>Customized Domain Scripting</strong> <strong>Language (DLS) nearer to JSON</strong>. It runs as a <strong>master-client</strong> setup and uses a model-driven approach. Large enterprises use it widely to automate sysadmins who spend ages configuring, provisioning, troubleshooting, and maintaining server operations. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/37f41e73-13ac-43ab-9468-276cb4e091cd.png" alt="CCNA 200-301 Study (1)" /></p>
<h1 id="heading-chef">Chef</h1>
<ul>
<li>Chef is an automation platform that provides an effective way to configure and manage infrastructure. Chef is <strong>based on Ruby and uses DL for writing the configurations</strong>. Its architecture is like the puppet <strong>master-agent model</strong>. It’s a <u><strong>pull-based</strong></u> configuration tool.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/43b1012e-e426-46dc-a2c7-ebf3601aa171.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Ansible:</strong> Known for its ease of use and agentless architecture, making it a good choice for beginners or smaller teams.</li>
<li><strong>Puppet:</strong> Excels in managing large-scale deployments and complex configurations, with a strong focus on security.</li>
<li><strong>Chef:</strong> Offers a high degree of flexibility and integrates well with infrastructure as code practices.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>Ansible</td><td>Puppet</td><td>Chef</td></tr>
</thead>
<tbody>
<tr>
<td>Key files defining actions</td><td>Playbook</td><td>Manifest</td><td>Recipe, Run-List</td></tr>
<tr>
<td>Communication Protocol</td><td>SSH</td><td>HTTPS(via REST API)</td><td>HTTPS (Via RESTAPI)</td></tr>
<tr>
<td>Key Port</td><td>22 (SSH Port)</td><td>8140</td><td>10002</td></tr>
<tr>
<td>Agent/Agentless Based</td><td>Agentless</td><td>Agent-based(or agentless)</td><td>Agent-based</td></tr>
<tr>
<td>Push/Pull</td><td>Push</td><td>Pull</td><td>Pull</td></tr>
<tr>
<td>Architecture</td><td>Only Master</td><td>master-agent</td><td>master-agent</td></tr>
</tbody>
</table>
</div><h2 id="heading-artificial-intelligence-and-machine-learning">Artificial Intelligence and Machine Learning</h2>
<p><strong>Artificial Intelligence (AI)</strong> can be explained as the simulation of human intelligence by computer systems. This includes <strong>understanding language, recognizing patterns, solving complex problems</strong>, and learning from experience. These processes include learning, reasoning, and self-correction.</p>
<p><strong>Machine Learning (ML)</strong> is a subset of AI. ML enables machines to mimic intelligent human behavior by learning from data without being explicitly programmed.</p>
<p><strong>Narrow AI</strong>  focuses on executing <strong>particular tasks with high proficiency</strong>, such as  <strong>Google Translate</strong> </p>
<p>This service uses Neural Machine Translation (NMT) to convert text or speech from one language to another. It improves over time by processing vast amounts of bilingual data.</p>
<p><strong>Generative AI</strong> refers to artificial intelligence systems that create new content, such as text, images, music, or code, based on patterns and knowledge learned from large datasets.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/32522e9a-5ce4-4f42-9d2e-d28fb729eb18.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Discriminative AI</strong> focuses on <strong>classifying or predicting</strong> by learning the <strong>differences between classes</strong>, not how the data is generated.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/e0a9e2a6-d71b-4d2f-be68-e350f7437282.png" alt="CCNA 200-301 Study (1)" /></p>
<p><strong>Descriptive AI</strong> analyzes data to describe <strong>what is happening or has happened</strong>. It focuses on understanding past and present data to provide insights and a clear picture of current or historical events, such as <strong>Tableau, Google Analytics.</strong></p>
<p><strong>Predictive AI</strong> refers to artificial intelligence systems designed to make predictions about future events or outcomes based on historical data. </p>
<p>Predictive AI is widely used in various fields, such as finance for stock market forecasting, healthcare for predicting patient outcomes, and marketing for customer behavior prediction</p>
<h2 id="heading-how-ai-learns"><strong>How AI Learns</strong></h2>
<ul>
<li><strong>Supervised Learning</strong> is a machine learning technique where an algorithm learns from a <strong>labeled dataset</strong> to make predictions or decisions.</li>
</ul>
<p>In network security, supervised machine learning is utilized to <strong>categorize network traffic</strong> or predict security threats by training AI systems with datasets that have already been tagged with outcomes, such as "<strong>safe</strong>" or "<strong>malicious</strong>" traffic, as shown in the figure.</p>
<p><img src="https://media.geeksforgeeks.org/wp-content/uploads/20231121154747/Supervised-learning.png" alt="CCNA 200-301 Study (1)" /></p>
<ul>
<li><strong>Unsupervised Learning</strong> does not rely on <strong>pre-labeled data.</strong> In situations where <strong>there are vast amounts of data</strong>, unsupervised learning can be used to find potentially useful insights.</li>
</ul>
<p><img src="https://databasetown.com/wp-content/uploads/2023/05/Unsupervised-Learning-1536x1090.jpg" alt="CCNA 200-301 Study (1)" /></p>
<p>For example, video services such as Netflix capture the video habits of their large customer base. Using this information and these algorithms, it can identify customers with similar viewing habits and recommend specific movies for them to watch.</p>
<ul>
<li><strong>Reinforcement Learning</strong> is a type of machine learning where an <strong>agent learns to make decisions by performing actions in an environment and receiving rewards or penalties</strong> based on the outcomes. The goal is to maximize cumulative rewards over time.</li>
</ul>
<p>AlphaZero used reinforcement learning to teach itself chess. It played many games against itself, starting with random moves and gradually improving its strategies. AlphaZero used a reward function that gave positive values for winning and negative values for losing, which encouraged it to find better strategies for success.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/41e080f4-4bd4-45e3-b547-26568ed9944f.png" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-hallucination-and-rag"><strong>Hallucination and RAG</strong></h2>
<p>AI systems learn from vast amounts of data to make predictions and generate content, but they are not perfect. For example, even if you provide detailed and accurate prompts to a generative AI model like ChatGPT, it can still produce incorrect or misleading information. This issue is known as <strong>hallucination.</strong></p>
<p><strong>Retrieval-Augmented Generation (RAG)</strong> is a technique that helps <strong>reduce hallucination</strong> and outdated answers in LLMs. RAG combines a <strong>retrieval system with a generative model</strong>. When given a prompt, the retrieval system first fetches relevant documents or information from a large database or knowledge source. Then, the generative model uses this information to generate a response</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2bd60d2c-e841-454b-bdd4-c86438668960.png" alt="CCNA 200-301 Study (1)" /></p>
<p>You can use your own RAG system with ChatGPT by uploading a PDF document and directing ChatGPT to consult it when responding. For example, if you upload the PDF manual of the Cisco OSPF Configuration Guide, you can query ChatGPT for step-by-step instructions, such as: “How do I configure OSPF directly on the interfaces?” In this way, you make sure that it’s using the PDF instead of its training data to answer your questions.</p>
<h2 id="heading-from-sdn-to-ibn-and-ai"><strong>From SDN to IBN and AI</strong></h2>
<p><strong>Intent-Based Networking (IBN)</strong> is a modern approach to <strong>network management</strong> that uses <strong>automation and artificial intelligence</strong> to bridge the gap between <strong>what a network</strong> <em><strong>needs to do</strong></em> <strong>(intent) and how it is</strong> <em><strong>actually configured and operating</strong></em>. It's designed to make networks more agile, secure, and easier to manage at scale.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cbb5561b-670b-44be-b254-a9cc00be29c1.png" alt="CCNA 200-301 Study (1)" /></p>
<p>In a network with AI and IBN enabled, it begins with <strong>AI and ML</strong>, which provide analytics and predictions to the <strong>Intent-Based Networking (IBN)</strong> system. This IBN system then offers intent and configuration to the <strong>Network Programmability and Automation</strong> component, which implements intent and network monitoring in <strong>The Network</strong>. The network sends data back to the AI and ML system to conduct further analysis and predictions.</p>
<h3 id="heading-what-can-ibn-and-ai-solve"><strong>What can IBN and AI solve?</strong></h3>
<ol>
<li><strong>High Latency:</strong> Due to inefficient routing and traffic congestion.</li>
<li><strong>Security Vulnerabilities:</strong> Inconsistent firewall configurations across different network segments.</li>
<li><strong>Manual Configuration Errors:</strong> Leading to Network Downtime and Performance Issues.</li>
<li><strong>Scalability Challenges:</strong> Difficulty in scaling the network to accommodate new devices and users.</li>
</ol>
<h2 id="heading-two-types-of-ai-systems">Two types of AI systems</h2>
<p><strong>Black Box AI</strong> models operate <strong>without showing their internal workings or logic to the user</strong>. <strong>AlphaZero</strong> is an example of this; it makes decisions that are not clear to the user.</p>
<p><strong>Explainable AI (XAI)</strong> aims to make <strong>AI processes and decisions clear and understandable to humans.</strong> It ensures transparency and trust in AI decisions, allowing professionals to understand and validate the AI's reasoning.</p>
<p>Example: <strong>XAI</strong> enables network administrators to comprehend AI-driven decisions regarding network configurations, security measures, and optimizations, ensuring that network management is transparent and trustworthy.</p>
<h2 id="heading-ai-in-network-optimization"><strong>AI in Network Optimization</strong></h2>
<p><strong>AI</strong> is revolutionizing network optimization by <strong>enhancing traffic analysis, reliability, and resource utilization. It analyzes traffic patterns to predict congestion, routes data to minimize latency, and identifies potential failures to ensure continuous service.</strong> This dynamic adaptation ensures optimal performance in modern digital communications.</p>
<h2 id="heading-ai-in-network-security"><strong>AI in Network Security</strong></h2>
<p>AI plays a crucial role in network security by using advanced machine learning models to <strong>protect against cyber threats. By learning from network data and user behavior, AI can identify potential security incidents</strong>, providing a dynamic defense that adapts to evolving threats.</p>
<h2 id="heading-additional-info">Additional Info</h2>
<h2 id="heading-what-is-the-idrac-port"><strong>What is the iDRAC Port?</strong></h2>
<p>The iDRAC Port is a network port on Dell servers that allows for remote management and server monitoring through the Integrated Dell Remote Access Controller (iDRAC). iDRAC is a powerful tool that provides IT administrators access to system diagnostics, hardware components, system logs, and BIOS settings. The iDRAC Port provides a separate IP address that connects to the iDRAC, allowing administrators to manage the server regardless of its power state remotely.</p>
<h1 id="heading-single-point-of-failure">Single Point of Failure</h1>
<p>A singe point of failure is a <strong>point where the entire system</strong> can <strong>crash</strong> in case that <strong>point crashes</strong>. </p>
<ul>
<li>For example, if we have only one database in a system and it crashes then our whole system will stop functioning. even if other services are working, it won’t matter.</li>
</ul>
<h2 id="heading-identifying-a-single-point-of-failure-in-a-system"><strong>Identifying a Single Point of Failure in a system</strong></h2>
<p>IF we have all the components connected to a single component  then the single component will become a single point of failure. </p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2ed85908-3c3a-49f9-a967-bf9d98ff636c.webp" alt="CCNA 200-301 Study (1)" /></p>
<h2 id="heading-avoiding-single-point-of-failure"><strong>Avoiding Single Point of Failure</strong></h2>
<ul>
<li><strong>Adding more nodes</strong></li>
</ul>
<p>If the gateway service is a single point of failure then <strong>we can add another node</strong>. If the first one crashes we can use the second one. Or we can <strong>distribute load</strong> across <strong>both the nodes</strong>.</p>
<ul>
<li><strong>Adding Load Balancers</strong></li>
</ul>
<p>When we are using multiple nodes for a service we also need to distribute load across the nodes. For that, we use the load balancer. Since a single load balancer is a Single Point of Failure, we will use multiple load balancers.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c9761328-7388-409d-bb5a-9383dbcfdf0c.webp" alt="CCNA 200-301 Study (1)" /></p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=wwwAXlE4OtU">https://www.youtube.com/watch?v=wwwAXlE4OtU</a></p>
<p><a target="_blank" href="https://medium.com/@interviewready/single-point-of-failure-591f853ee5aa">https://medium.com/@interviewready/single-point-of-failure-591f853ee5aa</a></p>
<p><a target="_blank" href="https://www.youtube.com/watch?app=desktop&amp;v=ZmLxb8HzQX4">https://www.youtube.com/watch?app=desktop&amp;v=ZmLxb8HzQX4</a></p>
<h1 id="heading-peer-to-peer-applications"><strong>Peer-to-Peer Applications</strong></h1>
<p>A P2P application allows a device to act as both a client and a server within the same communication, as shown in the figure. In this model, every client is a server and every server is a client. P2P applications require that each end device provide a user interface and run a background service.</p>
<p>Some P2P applications use a hybrid system where resource sharing is decentralized, but the indexes that point to resource locations are stored in a centralized directory. In a hybrid system, each peer accesses an index server to get the location of a resource stored on another peer.</p>
<p>Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected. The availability of cellular internet access is a real benefit for people in areas that would otherwise have no internet connectivity at all, or for people who are constantly on the move. The downside of cellular connectivity is that the carrier usually meters the bandwidth usage of the connection and may charge extra for bandwidth that exceeds the contract data plan.</p>
<h1 id="heading-switch-configuration-for-first-time">Switch configuration for First Time</h1>
<ul>
<li><strong>Step 1</strong>: Plug in and power on the <strong>switch</strong> (ensure it is fully booted).</li>
<li><strong>Step 2</strong>: Connect <strong>Ethernet cables</strong> from network devices (e.g., computers, routers, IP phones) to the <strong>switch ports</strong>.</li>
<li><strong>Step 3</strong>: Check the link lights to confirm that the connections are active and the devices are recognized by the switch.</li>
</ul>
<p><a target="_blank" href="https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/how-to-setup-network-switch.html#~next-steps">bookmark</a></p>
]]></content:encoded></item><item><title><![CDATA[Introduction to TCP/IP]]></title><description><![CDATA[Network Protocol




Protocol CharacteristicDescription



Message formatWhen a message is sent, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.

Message s...]]></description><link>https://rebar.it/introduction-to-tcpip</link><guid isPermaLink="true">https://rebar.it/introduction-to-tcpip</guid><dc:creator><![CDATA[rebar hama]]></dc:creator><pubDate>Sat, 07 Feb 2026 14:11:40 GMT</pubDate><content:encoded><![CDATA[<h1 id="heading-network-protocol">Network Protocol</h1>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Protocol Characteristic</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Message format</strong></td><td>When a message is sent, it must use a specific format or structure. Message formats <em><strong>depend on the type of message and the channel that is used to deliver the message</strong></em>.</td></tr>
<tr>
<td><strong>Message size</strong></td><td>The rules that govern the size of the pieces communicated across the network are very strict. They can also be different, <em><strong>depending on the channel used</strong></em>. When a long message is sent from one host to another over a network, it may be necessary to <em><strong>break the message into smaller pieces in order to ensure that the message can be delivered reliably.</strong></em></td></tr>
<tr>
<td><strong>Timing</strong></td><td>Many network communication <em><strong>functions are dependent on timing</strong></em>. Timing determines the <em><strong>speed</strong></em> at which the bits are transmitted across the network. It also affects when an individual host can send data and the total amount of data that can be sent in any one transmission.</td></tr>
<tr>
<td><strong>Encapsulation</strong></td><td><em><strong>Each message transmitted on a network</strong></em> must include a <strong>header</strong> that contains <u><em><strong>addressing information that identifies the source and destination hosts</strong></em></u>, otherwise it cannot be delivered. <strong>Encapsulation is the process of adding this information to the pieces of data that make up the message</strong>. In addition to addressing, there may be other information in the header that ensures that the message is <u><strong>delivered to the correct application on the destination host.</strong></u></td></tr>
<tr>
<td><strong>Message pattern</strong></td><td>Some <em><strong>messages require an acknowledgment before the next message can be sent.</strong></em> <strong>This type of request/response pattern is a common aspect of many networking protocols</strong>. However, there are other types of messages that may be simply streamed across the network, without concern as to whether they reach their destination.</td></tr>
</tbody>
</table>
</div><h2 id="heading-common-methods-of-data-transmission"><strong>Common Methods of Data Transmission</strong></h2>
<ul>
<li><strong>Electrical signal</strong> transmission is achieved by representing data as <strong>electrical pulses on copper</strong> wire.</li>
<li><strong>Optical signals: t</strong>ransmission is achieved by converting the electrical signals into <strong>light pulses</strong>.</li>
<li><strong>Wireless signal</strong> transmission is achieved by using <strong>infrared, microwave, or radio waves</strong> through the air.</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/6e75be80-c1c6-4215-98bf-4e5af21908a2.png" alt="Introduction to TCP/IP" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2eef7071-8386-4aa0-85b3-167abc0fbdcb.png" alt="Introduction to TCP/IP" /></p>
<ul>
<li><strong>UTP (Unshielded Twisted Pair):</strong> <strong>No shielding</strong>, <strong>cheaper</strong>, more flexible, but less resistant to interference. Used in home and office networks.</li>
<li><strong>STP (Shielded Twisted Pair):</strong> Has shielding to reduce interference, but is more <strong>expensive</strong> and less flexible. Used in industrial or high-EMI environments.</li>
</ul>
<h3 id="heading-types-of-fiber-optic-cables"><strong>Types of Fiber Optic Cables</strong></h3>
<ol>
<li><strong>Single-Mode Fiber (SMF)</strong><ul>
<li>Uses a <strong>single beam of light</strong> (<strong>laser</strong>).</li>
<li>Supports <strong>long distances</strong> (up to 100+ km).</li>
<li>Higher bandwidth but more <strong>expensive</strong>.</li>
</ul>
</li>
<li><strong>Multi-Mode Fiber (MMF)</strong><ul>
<li>Uses <strong>multiple beams of light</strong> (<strong>LED</strong>).</li>
<li>Supports <strong>shorter distances</strong> (up to 2 km).</li>
<li><strong>Cheaper</strong> but has more signal loss due to modal dispersion</li>
</ul>
</li>
</ol>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/5cd23f49-0f71-44b0-b155-399887b8613c.png" alt="Introduction to TCP/IP" /></p>
<h1 id="heading-network-documentation">Network Documentation</h1>
<p>Network documentation is essential for managing, troubleshooting, and securing a network. </p>
<h3 id="heading-physical-documentation"><strong>Physical Documentation</strong></h3>
<p>Focuses on hardware and cabling layout.</p>
<p>🔹 Includes:</p>
<p>✔ Network topology diagrams (physical)</p>
<p>✔ Rack elevation and cabling layout</p>
<p>✔ Hardware inventory (routers, switches, firewalls)</p>
<p>✔ Power &amp; cooling systems</p>
<p>✅ Used for troubleshooting hardware, expansion planning, and audits.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8344c098-9dda-4c49-88af-bd56bd753736.png" alt="Introduction to TCP/IP" /></p>
<h3 id="heading-logical-documentation"><strong>📌 Logical Documentation</strong></h3>
<p>Focuses on data flow and network configurations.</p>
<p>🔹 Includes:</p>
<p>✔ Logical network topology diagrams</p>
<p>✔ IP addressing, VLANs, and routing tables</p>
<p>✔ Security policies and firewall rules</p>
<p>✔ Performance and monitoring reports</p>
<p>✅ Helps in troubleshooting, security management, and network planning.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/18d609a8-9035-4cf4-9047-70af06e943fc.png" alt="Introduction to TCP/IP" /></p>
<h1 id="heading-bandwidth-vs-throughput">Bandwidth Vs Throughput</h1>
<p><strong>Bandwidth</strong> is the <strong>capacity of a medium to carry data</strong>. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in the number of bits that (theoretically) can be sent across the media in a second. Common bandwidth measurements are as follows: </p>
<p>Thousands of bits per second (Kbps)</p>
<p>Millions of bits per second (Mbps)</p>
<p>Billions of bits per second (Gbps)</p>
<p>Like bandwidth, <strong>throughput</strong> <strong>measures the transfer of bits across the media over a given period</strong>. However, due to several factors, <strong>throughput does not usually match the specified bandwidth</strong>. Many factors influence throughput, including: </p>
<ul>
<li>The amount of data being sent and received over the connection.</li>
<li>The types of data being transmitted.</li>
<li>The <strong>latency</strong> is created by the number of network devices encountered between the source and the destination.</li>
</ul>
<p><strong>Latency</strong> refers to the amount of time, including delays, for data to travel from one given point to another.</p>
<p><strong>TCP</strong> (<u><strong>Transmission Control Protocol</strong></u>) is a standard protocol that defines how to establish and maintain a network connection through which an application program can exchange data.</p>
<p>Th<strong>e TCP/IP mode</strong>l both defines and references a large collection of protocols that allow computers to communicate.</p>
<p>The name <strong>TCP/IP</strong> is simply the name of the two most common <strong>protocols (TCP and IP</strong>) separated by, which means the model refers to the most preferred protocols.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/be9a567a-6f9d-4126-b897-eb9337b342a1.jpeg" alt="Introduction to TCP/IP" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/b92e04d2-3ef8-4246-b513-c8e3790b72ba.png" alt="Introduction to TCP/IP" /></p>
<p><strong>Application Layer:</strong> Refers to interfaces between the network and application software. It also includes authentication services.</p>
<p>Note: The application layer does not define the application itself.</p>
<p><strong>Transport Layer:</strong> Provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmission.  the two most commonly used transport layer protocols are the <strong>Transmission control protocol (TCP)</strong> and the <strong>user datagram protocol (UDP)</strong>.</p>
<p><strong>Network:</strong> Refers to logical addressing, routing, and path determination.</p>
<p><strong>Data Link:</strong> Formats data into frames appropriate for transmission onto some physical medium. Defines rules for when the medium can be used. Defines the means by which to recognize
transmission errors.</p>
<p><strong>Physical:</strong> Defines the electrical, optical, cabling, connectors, and procedural details required for transmitting bits, represented as some form of energy passing over a physical medium.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td></td><td>TCP</td><td>UDP</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Full form</strong></td><td>It stands for <strong>Transmission Control Protocol</strong>.</td><td>It stands for <strong>User Datagram Protocol</strong>.</td></tr>
<tr>
<td><strong>Type of connection</strong></td><td>It is a <strong>connection-oriented protocol</strong>, which means that the connection needs to be established before the data is transmitted over the network.</td><td>It is a <strong>connectionless protocol,</strong> which means that it sends the data without checking whether the system is ready to receive or not.</td></tr>
<tr>
<td><strong>Reliable</strong></td><td><strong>reliable</strong> protocol as it provides assurance for the delivery of data packets.</td><td><strong>unreliable</strong> protocol as it does not take a guarantee for the delivery of packets.</td></tr>
<tr>
<td><strong>Speed</strong></td><td><strong>slower</strong> than UDP as it performs error checking, flow control, and provides assurance for the delivery of data.</td><td><strong>faster</strong> than TCP as it does not guarantee the delivery of data packets.</td></tr>
<tr>
<td><strong>Header size</strong></td><td>The size of TCP is <strong>20</strong> <strong>bytes</strong>.</td><td>The size of the UDP is <strong>8</strong> <strong>bytes.</strong></td></tr>
<tr>
<td><strong>Acknowledgment</strong></td><td>TCP uses the <strong>three-way handshake concept</strong>. In this concept, if the sender receives the ACK, then the sender will send the data. TCP also has the ability to <strong>resend the lost data.</strong></td><td>UDP does <strong>not wait for any acknowledgmen</strong>t; it just sends the data.</td></tr>
<tr>
<td><strong>Flow control mechanism</strong></td><td>It follows the <strong>flow control</strong> mechanism in which <strong>too many packets cannot be sent to the receiver at the same time</strong>.</td><td>This protocol follows no such mechanism.</td></tr>
<tr>
<td><strong>Error checking</strong></td><td>TCP performs <strong>error checking</strong> by using a <strong>checksum</strong>. When the data is corrected, then the data is <strong>retransmitted to the receiver</strong>.</td><td>It does not perform any <strong>error checking</strong>, and also does not resend the lost data packets.</td></tr>
<tr>
<td><strong>Applications</strong></td><td>This protocol is mainly used where a <strong>secure and reliable communication process</strong> is required, like <u>military services, web browsing, and e-mail.</u></td><td>This protocol is used where fast communication is required and <strong>does not care about reliability</strong> like <u>VoIP, game streaming, video and music streaming, et</u><u>c.</u></td></tr>
</tbody>
</table>
</div><p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/af68773d-6007-45bb-b5b6-1bc8ccc972c7.jpeg" alt="Introduction to TCP/IP" /></p>
<p><strong>Which two TCP header fields are used to confirm receipt of data?</strong></p>
<ul>
<li>Sequence Number</li>
<li>Acknowledge number</li>
</ul>
<h2 id="heading-how-does-tcp-communicate">How does TCP communicate?</h2>
<ul>
<li>Three-way handshake.</li>
<li>SYN, ACK, FIN, RST.</li>
<li>Windows size (65,535)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/7c3a3843-3666-4e7c-aa6a-862661ce5b31.png" alt="Introduction to TCP/IP" /></p>
<h3 id="heading-the-six-control-bits-flags-are-as-follows">The six control bits flags are as follows:</h3>
<ol>
<li><strong>SYN:</strong> It is used to establish a connection between the hosts.</li>
<li><strong>ACK:</strong> Acknowledgment flag used in connection establishment and session termination. If the ACK is set to 0, then it means that the data packet does not contain an acknowledgement.</li>
<li><strong>PSH:</strong>  is a control flag used to indicate that the receiving device should deliver the data to the receiving application as soon as possible<strong>, rather than buffering it</strong>.</li>
<li><strong>RST:</strong> Reset the connection when an error or timeout occurs.</li>
<li><strong>URG:</strong> It represents an urgent pointer. If it is set, then the data is processed urgently.</li>
<li><strong>FIN:</strong>  No more data from sender and used in session termination</li>
</ol>
<p>When the PSH flag is set, it instructs the receiving device to deliver the data immediately to the application layer without waiting for more data to arrive.</p>
<h2 id="heading-establish-tcp-connection">Establish TCP Connection:</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2262c99a-cdaf-4329-8c2a-e7661dde97c1.png" alt="Introduction to TCP/IP" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/49831881-d814-4a52-aceb-c9f30c097f2b.png" alt="Introduction to TCP/IP" /></p>
<h2 id="heading-terminate-tcp-connection">Terminate TCP connection:</h2>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/57bbbcc8-9a07-4c5f-9a22-b9e11353aa3b.png" alt="Introduction to TCP/IP" /></p>
<p><strong>How many exchanges are needed to end both sessions between two hosts?</strong></p>
<p>Four exchanges.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/f7e4fec3-d88e-4c1e-9f44-1ebb2a9e299e.png" alt="Introduction to TCP/IP" /></p>
<h3 id="heading-tcp-reliability-data-loss-and-retransmission">TCP Reliability - Data Loss and Retransmission</h3>
<p>The <strong>Sequence (SEQ) number</strong> and <strong>Acknowledge (ACK) number</strong> are used together to confirm <strong>receipt of the bytes of data contained in the transmitted</strong> segments.</p>
<ul>
<li>What field is used by the destination host to reassemble segments into the original order?
<strong>Sequence Number</strong></li>
<li><p>What field is used to provide flow control?
<strong>Window Size</strong></p>
<p><strong>Flow control</strong> is the amount of data that the destination can receive and process reliably.</p>
</li>
</ul>
<ul>
<li>Which field in the TCP header indicates the status of the three-way handshake process?
<strong>control bits</strong></li>
<li>Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?</li>
</ul>
<p><strong>The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination</strong></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/eea58bb1-1efc-4e1c-af88-c14a485d369a.png" alt="Introduction to TCP/IP" /></p>
<h2 id="heading-the-four-fields-in-the-udp-header-are-as-follows">The four fields in the UDP header are as follows:</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Source Port</td><td>Identify the source application by port number.</td></tr>
</thead>
<tbody>
<tr>
<td>Destination Port</td><td>Identify the destination application by port number.</td></tr>
<tr>
<td>Length</td><td>length of the UDP datagram header</td></tr>
<tr>
<td>Checksum</td><td>used for error checking of the datagram header and data</td></tr>
</tbody>
</table>
</div><h1 id="heading-ports">Ports</h1>
<p>When a message is delivered using either TCP or UDP, the Protocols and services requested are identified by a <strong>port number</strong>.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/8c527a9f-a286-485b-9525-63aef08d1afd.png" alt="Introduction to TCP/IP" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/cae7ced0-897d-4bf2-a8f4-df65e06e9fe1.png" alt="Introduction to TCP/IP" /></p>
<h2 id="heading-what-are-well-known-ports"><strong>What are well-known ports?</strong></h2>
<p>These are <strong>standardized ports assigned by IANA</strong> (Internet Assigned Numbers Authority) for widely used services and protocols.</p>
<ul>
<li>Range: 0 – 1023</li>
<li>Assigned to common protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.)</li>
</ul>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/2dca6890-df1b-45d8-b2b8-8faa29156500.png" alt="Introduction to TCP/IP" /></p>
<blockquote>
<p>💡 DNS uses Both <strong>TCP and UDP</strong>. DNS uses <strong>UDP</strong> when <u><strong>clients send requests to a DNS serve</strong></u>r. However, <strong>communication</strong> between <u><strong>DNS servers always uses TCP</strong></u>.</p>
<p>💡 <strong>POP3</strong>: used to retrieve emails from a mail server and delete them from the mail server.<br /><strong>IMAP</strong>: used to retrieve emails from a mail server without deleting them on the server.   </p>
<p><strong>SMTP:</strong> Used by an email client to send emails.</p>
</blockquote>
<p>    <strong>IMAP</strong>: used to retrieve emails from a mail server without deleting them on the server. </p>
<p>    <strong>SMTP:</strong> Used by an email client to send emails. </p>
<h2 id="heading-what-are-registered-ports"><strong>What are registered ports?</strong></h2>
<p>These ports are assigned by IANA to specific software applications and services <strong>that are not as universal as Well-Known Ports</strong> but are still used widely.</p>
<ul>
<li><strong>Range:</strong> 1024 – 49151</li>
<li><strong>Used by specific applications</strong> (e.g., MySQL, RDP, VoIP services).</li>
</ul>
<p><strong>Register port</strong> <strong>used by  Both TCP / UDP</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Name</td><td>port</td></tr>
</thead>
<tbody>
<tr>
<td>Ms SQL</td><td>1433</td></tr>
<tr>
<td>WAP</td><td>2948</td></tr>
</tbody>
</table>
</div><h2 id="heading-what-are-dynamic-ports">What are Dynamic Ports?</h2>
<p>Temporary ports are used by client devices for outgoing connections.</p>
<ul>
<li><strong>Range:</strong>  49152 – 65535</li>
<li><strong>Not registered with IANA</strong>; used randomly for short-lived communication.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>concept</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>Same-layer interaction on different computers</td><td>The two computers use the protocol to communicate with the same layer on another computer. the protocol defines a header that communicates what each computer wants to do.</td></tr>
<tr>
<td>Adjacent(uh·jay·snt) نزیک-layer interaction on the same computer</td><td><strong>On a single Computer</strong>, one lower layer provides a service to the layer above.</td></tr>
</tbody>
</table>
</div><p><strong>What are two characteristics of multicast transmission?</strong></p>
<ul>
<li>Multicast transmission can be used by <strong>routers to exchange routing information</strong>.</li>
<li>A single <strong>packet can be sent to a group of host</strong>s.</li>
</ul>
<p><strong>Which two OSI model layers have the same functionality as the two layers of the TCP/IP model?</strong> </p>
<ul>
<li>Network</li>
<li>Transport</li>
</ul>
<p><strong>How are port numbers used in the TCP/IP encapsulation process?</strong></p>
<p>If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.</p>
<p>Both UDP and TCP use port numbers to provide a unique identifier for each conversation. <strong>Source port numbers are randomly generated</strong> and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator.</p>
<p><strong>Which category of network components includes wires and cables used in a wired network?</strong></p>
<ul>
<li><strong>media</strong></li>
</ul>
<p><strong>Which three elements do all communication methods have in common? (Choose three.)</strong></p>
<ul>
<li>Message source.</li>
<li>Message Destination.</li>
<li>Message medium.</li>
</ul>
<p><strong>What two criteria are used to help select a network medium from various network media?</strong></p>
<ul>
<li>The distance the selected medium can successfully carry a signal.</li>
<li>The environment where the selected medium is to be installed.</li>
</ul>
<h2 id="heading-network-troubleshooting">Network Troubleshooting</h2>
<p>A number of software utility programs are available that can help identify network problems, most of these software are provided by the operating system as a command line interface (CLI). </p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>IPconfig</td><td>Displays IP configuration Information on Windows Operation System.</td></tr>
</thead>
<tbody>
<tr>
<td>IFconfig</td><td>Displays IP configuration Information on Linux Operation System.</td></tr>
<tr>
<td>Ping</td><td>Test connection to other hosts.</td></tr>
<tr>
<td>Netstat</td><td>Display network connections.</td></tr>
<tr>
<td>Tracert</td><td>Displays the route taken to the destination.</td></tr>
<tr>
<td>NSlookup</td><td>Directly queries the name server for information on a destination domain.</td></tr>
</tbody>
</table>
</div><p><code>ping 192.168.1.1 repeat  9999999</code>  = ping 192.167.1.1 -t</p>
<pre><code class="lang-javascript">ping -t <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>-t</strong> refers to continuous ping on Linux, you don’t need -t option.</p>
<pre><code class="lang-javascript">ping -n <span class="hljs-number">10</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> (windows)
ping -c <span class="hljs-number">10</span> <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> (Linux)
</code></pre>
<p>-n and -c refer to a set number of packets, by default, the number of packets is 4 echo packets.</p>
<pre><code class="lang-javascript">nslookup google.com <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
</code></pre>
<p>Query a specific DNS server</p>
<pre><code class="lang-javascript">nslookup <span class="hljs-number">8.8</span><span class="hljs-number">.8</span><span class="hljs-number">.8</span>
</code></pre>
<p>get hostname from IP</p>
<pre><code class="lang-javascript">netstat -o
</code></pre>
<p>Display process IDs</p>
<pre><code class="lang-javascript">netstat -n
</code></pre>
<p>-n option can be used to display IP addresses and port numbers.</p>
<pre><code class="lang-javascript">netstat -p tcp
netstat -p udp
</code></pre>
<p>Show protocol-specific connections</p>
<pre><code class="lang-javascript">netstat -aon | find <span class="hljs-string">"443"</span>
</code></pre>
<p>Find a Process Using a Specific Port</p>
<pre><code class="lang-javascript">netstat -an | find <span class="hljs-string">"192.168.1.1"</span>
</code></pre>
<pre><code class="lang-javascript">netstat -ano
</code></pre>
<p>We can use more than one option together -a -n -o </p>
<p>Which command can be used on a Windows host to display the <strong>routing table</strong>?</p>
<pre><code class="lang-f#">netstat -r
</code></pre>
<p>Which command can be used on a Windows host to display the <strong>ARP table</strong>?</p>
<pre><code class="lang-f#">arp -a
</code></pre>
<p>Which command can be used on a Windows host to display the routing table IPv6?</p>
<pre><code class="lang-f#">route print
</code></pre>
<h1 id="heading-verifying-network-connectivity">Verifying Network Connectivity</h1>
<p>Using and interpreting the output of various testing tools is often the first step in isolating the cause
of a network connectivity issue. The ping command can systematically test connectivity by looking
for answers to the following questions, in this order:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Step 1. Can an end device ping itself?</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Step 2. Can an end device ping its default gateway?</strong></td></tr>
<tr>
<td><strong>Step 3. Can an end device ping the destination?</strong></td></tr>
</tbody>
</table>
</div><h1 id="heading-seven-step-troubleshooting-process"><strong>Seven-Step Troubleshooting Process</strong></h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/c3050a4e-3d72-4cb4-830b-65153d1cc22c.png" alt="Introduction to TCP/IP" /></p>
<p> <strong>Define Problem:</strong> Define what the problem is. Problems are usually identified by a sign (e.g., the network is slow or has stopped working). Network issues may appear in many different forms, including alerts from the network management system, console messages, and user complaints. In an organization, problems are typically assigned to network technicians as trouble tickets.</p>
<p><strong>Gather Information</strong>: In this step, targets (i.e., hosts, devices) to be investigated must be identified, access to the target devices must be obtained, and information gathered.</p>
<p><strong>Analyze Information:</strong> Possible causes must be identified. The gathered information is interpreted and analyzed using network documentation, network baselines, searching organizational knowledge bases, searching the internet, and talking with other technicians.</p>
<p><strong>Eliminate Possible Causes:</strong> If multiple causes are identified, then the list must be reduced by progressively eliminating possible causes to eventually identify the most probable cause. Troubleshooting experience is extremely valuable to quickly eliminate causes and identify the most probable cause.</p>
<p><strong>Purpose Hypothesis</strong>: When the most probable cause has been identified, a solution must be formulated. At this stage, troubleshooting experience is very valuable when proposing a plan.</p>
<p><strong>Test Hypothesis:</strong> Before testing the solution, it is important to assess the impact and urgency of the problem. For instance, could the solution have an adverse effect on other systems or processes? The severity of the problem should be weighed against the impact of the solution. For example, if a critical server or router must be offline for a significant amount of time, it may be better to wait until the end of the workday to implement the fix.</p>
<p><strong>Solve the Problem:</strong> When the problem is solved, inform the users and anyone involved in the troubleshooting process that the problem has been resolved. Other IT team members should be informed of the solution. It is important to properly document the cause and solution as this can assist other support technicians to prevent and solve similar problems in the future.</p>
<p># </p>
<h1 id="heading-establish-a-network-baseline"><strong>Establish a Network Baseline</strong></h1>
<p> A baseline is used to <strong>establish normal network or system performance</strong> to determine the “personality” of a network under normal conditions.</p>
<p><strong>A network baseline should answer the following questions:</strong></p>
<ul>
<li>How does the network perform during a normal or average day?</li>
<li>Where are the most errors occurring?</li>
<li>What part of the network is most heavily used?</li>
<li>What part of the network is least used?</li>
<li>Which devices should be monitored and what alert thresholds should be set?</li>
<li>Can the network meet the identified policies?</li>
</ul>
<p># </p>
<p><strong>Structured Troubleshooting Methods</strong></p>
<h3 id="heading-bottom-up"><strong>Bottom-Up</strong></h3>
<p>In bottom-up troubleshooting, you start with the <strong>physical layer and the physical components</strong> of the network.</p>
<p>The disadvantage of the bottom-up troubleshooting approach is that it requires that you check every device and interface on the network until the possible cause of the problem is found.</p>
<h3 id="heading-top-down"><strong>Top-Down</strong></h3>
<p>top-down troubleshooting starts with the <strong>end-user applications</strong> and moves down through the layers of the OSI model until the cause of the problem has been identified.</p>
<h3 id="heading-divide-and-conquer"><strong>Divide-and-Conquer</strong></h3>
<p>The network administrator <strong>selects a layer</strong> and tests in both directions from that layer.</p>
<p>In divide-and-conquer troubleshooting, you start by collecting user experiences of the problem, document the symptoms and then, using that information, make an informed guess as to which OSI layer to start your investigation.</p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/1d5cfa06-53c5-4cb9-866b-7cd7f535d9bf.png" alt="Introduction to TCP/IP" /></p>
<h1 id="heading-network-device-documentation">Network Device Documentation</h1>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/11fae767-5f78-4029-bd72-3f4ced15f54d.png" alt="Introduction to TCP/IP" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/648f58ce-46e4-4616-b98a-74b882b22f15.png" alt="Introduction to TCP/IP" /></p>
<p><img src="https://onepubli-sh.nyc3.digitaloceanspaces.com/uploads/27abea2c-eb76-4332-8616-c320f8a4f713.png" alt="Introduction to TCP/IP" /></p>
]]></content:encoded></item><item><title><![CDATA[Open Shortest Path First (OSPF)]]></title><description><![CDATA[Open Shortest Path First (OSPF) is a link-state routing protocol that is used to find the best path between the source and the destination router using its own Shortest Path First.

The protocol recalculates routes when a link fails and the network t...]]></description><link>https://rebar.it/open-shortest-path-first-ospf</link><guid isPermaLink="true">https://rebar.it/open-shortest-path-first-ospf</guid><category><![CDATA[ccna]]></category><category><![CDATA[ospf]]></category><category><![CDATA[routing]]></category><category><![CDATA[networking]]></category><category><![CDATA[network security]]></category><dc:creator><![CDATA[rebar hama]]></dc:creator><pubDate>Sat, 22 Mar 2025 09:40:26 GMT</pubDate><content:encoded><![CDATA[<ul>
<li><p><strong>Open Shortest Path First (OSPF)</strong> is a link-state routing protocol that is used to find the best path between the source and the destination router using its own Shortest Path First.</p>
</li>
<li><p>The protocol <strong>recalculates routes when a link fails and the network topology changes,</strong> Using the <strong>Dijkstra(dike·struh) algorithm</strong>, and minimizes the routing protocol traffic that it generates.</p>
</li>
<li><p>It provides a multi-level hierarchy called “area routing” so that information about the topology within the defined area of the AS is hidden from routes outside this area. This enables an additional level of <strong>routing protection</strong> and <strong>reduction in routing protocol traffic</strong>.</p>
</li>
<li><p>All protocol <strong>exchanges can be authenticated</strong> so that only <strong>trusted routers can join in the routing exchanges for the AS</strong></p>
</li>
</ul>
<h2 id="heading-benefits-of-ospf">Benefits of OSPF:</h2>
<ul>
<li><p>Fast convergence.</p>
</li>
<li><p>Efficient use of network resources.</p>
</li>
<li><p>Support for large, complex networks.</p>
</li>
<li><p>Ability to route IPv4 and IPv6 traffic (OSPFv2 for IPv4, OSPFv3 for IPv6).</p>
</li>
<li><p>Redundancy and fault tolerance.</p>
</li>
<li><p>VLSM (Classless Routing) and route summarization</p>
</li>
</ul>
<h2 id="heading-ospf-concepts">OSPF Concepts</h2>
<h3 id="heading-area">Area</h3>
<ul>
<li><p>An <strong>area</strong> is a logical collection of OSPF networks, routers, and links that have the same area identification.</p>
</li>
<li><p>The most important area in OSPF is the <strong>backbone area</strong>, also known as <strong>area 0</strong>. The backbone area is the central area that interconnects all other areas.</p>
</li>
<li><p>In a large network, a single-area design can have negative effects:</p>
</li>
<li><p>The SFP algorithm takes more time to calculate routes and it causes the algorithm to require more processing power.</p>
</li>
<li><p>Any small change in the network causes every router to flood LSAs and run the SPF algorithm again.</p>
</li>
<li><p>By dividing a large OSPF network into several smaller areas, you can avoid the above negative effects.</p>
</li>
</ul>
<h3 id="heading-neighbour">Neighbour</h3>
<ul>
<li><p>Routers running OSPF need to establish a neighbour relationship before exchanging routing updates, Neighbours are dynamically discovered by sending <strong>Hello packets</strong> out of each OSPF-enabled interface.</p>
</li>
<li><p><strong>Hello Packets</strong>:</p>
<p>  OSPF uses <strong>multicast addresses</strong> to communicate and exchange Hello Packets between routers</p>
</li>
<li><p><strong>224.0.0.5:</strong> All OSPF routers.</p>
</li>
<li><p><strong>224.0.0.6</strong>: All OSPF designated routers (DRs) and backup designated routers (BDRs).</p>
</li>
<li><p><strong>Hello Interval</strong>:</p>
<ul>
<li>The OSPF router sends a hello message on an interface. It is <strong>10 seconds</strong> by default.</li>
</ul>
</li>
<li><p><strong>Dead Interval</strong>:</p>
<ul>
<li><p>The Dead interval is four times the Hello interval, this means a Dead interval of <strong>40 seconds</strong></p>
</li>
<li><p>If a router does not receive at least one Hello packet from a neighbour within the Dead interval, the neighbour is considered down.</p>
</li>
</ul>
</li>
</ul>
<p><img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/1a65974c-2e09-43af-886c-5f166ac8cc6d/ospf_example_topology.jpg" alt="ospf_example_topology.jpg" /></p>
<h2 id="heading-abr-and-asbr">ABR and ASBR</h2>
<ul>
<li><p><strong>Area Border Router(ABR):</strong> a router that connects two or more OSPF areas, one of which must be the backbone area (area 0).</p>
</li>
<li><p><strong>Autonomous System Border Router(ASBR):</strong> a router that <strong>connects an OSPF domain to an external network or another routable domain</strong>, it is responsible for importing and redistribution routes from non-OSPF sources into the OSPF routing source.</p>
</li>
</ul>
<p><img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/b247563b-1adc-47ed-99d5-2439b5d28ac4/1ebdb827-1896-40d4-a080-2f5b244131f0/1729506083948.jpeg" alt="1729506083948.jpeg" /></p>
<p><img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/61dd3ae7-63ff-4c83-98b2-66def43b4e15/Screenshot_2023-02-21_104354.png" alt="Screenshot 2023-02-21 104354.png" /></p>
<h2 id="heading-designated-router-and-backup-designated-router">Designated Router and Backup Designated Router</h2>
<ul>
<li><strong>Designated Router (DR) and Backup Designated Router(BDR)</strong> is to act as <strong>a central point for exchanging of OSPF information between multiple routers on the same network</strong>. Each non-DR and non-BDR router only exchanges routing information with the DR and BDR, Instead of exchanging updates with every router on the segment. This significantly reduces the amount of OSPF updates sent across the network.</li>
</ul>
<p><img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/81063bb1-6c7e-4309-8674-3d36e90bab7b/Screenshot_2023-02-21_110657.png" alt="Screenshot 2023-02-21 110657.png" /></p>
<h3 id="heading-dr-and-bdr-election">DR and BDR Election</h3>
<ul>
<li>Upon the segment, each router will go through an election process, to elect A DR and BDR.</li>
</ul>
<p>There are two rules used to determine who is elected:</p>
<p>1- <strong>OSPF priority</strong> is a value between 0 and 255 that may be assigned to every router interface participating in OSPF. The <strong>default priority is 1</strong>. A priority of 0 means that the router is not eligible to become DR or BDR.</p>
<pre><code class="lang-jsx">R1(config)#interface fastEthernet <span class="hljs-number">0</span>/<span class="hljs-number">0</span>
R1(config-<span class="hljs-keyword">if</span>)#ip ospf priority <span class="hljs-number">200</span>
</code></pre>
<p>2- <strong>Router ID</strong> is a <strong>32-bit</strong> number that uniquely identifies every OSPF router.</p>
<ul>
<li><p>Manual Configuration.</p>
</li>
<li><p>A highest IP address on a loopback address.</p>
</li>
<li><p>A highest IP address on a physical address.</p>
</li>
<li><p>OSPF Router ID should not be changed after the OSPF process has started and the OSPF neighborships have been established. <strong>If you change the OSPF Router ID, We need to either reload the IOS</strong> or use the command (<strong>clear ip ospf process</strong>), for OSPF Router ID change to take effect. reloading the IOS or using the command [<strong>clear ip ospf process</strong>] <strong>can cause a temporary network outage.</strong></p>
</li>
</ul>
<h2 id="heading-router-id-selection-algorithm-works-as-below">Router ID Selection algorithm works as below:</h2>
<ol>
<li>If manually configured OSPF Router ID in OSPF process, it is selected as the OSPF Router ID.</li>
</ol>
<pre><code class="lang-jsx">R1# conf t 
R1#(config) router ospf <span class="hljs-number">100</span>(OSPF process number).
R1#(config-router)# router-id <span class="hljs-number">1.1</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span>
</code></pre>
<p><strong>Note:</strong> the router step-by-step checks each point if the router-id is configured manually other steps skipped</p>
<h2 id="heading-loopback-interface">Loopback interface</h2>
<ul>
<li><p>Loopback interfaces are logical(<strong>virtual</strong>) interfaces. using loopback interfaces with OSPF <strong>configuration ensures that an interface is always active for</strong> OSPF processes.</p>
</li>
<li><p>It is always up/up (unless you manually shut it down).</p>
</li>
<li><p>It is not dependent on a physical interface.</p>
</li>
<li><p>They can be used for diagnostic purposes as well as OSPF configuration. The reason to configure a loopback interface on a router is because if you don’t. the highest active IP address on a router at the time of bootup will become that router’s RID, The RID is used to advertise the routes as well as e<strong>lect the DR and BDR.</strong></p>
</li>
</ul>
<h2 id="heading-loopback-interface-configuration">Loopback Interface Configuration</h2>
<pre><code class="lang-jsx">R1#conf t 
R1(config)#interface loopback <span class="hljs-number">0</span> 
R1(config-<span class="hljs-keyword">if</span>)#ip address <span class="hljs-number">10.0</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span> <span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
R1(config-<span class="hljs-keyword">if</span>)#exit
</code></pre>
<p>&lt;aside&gt; 💡</p>
<p>Always manually configure the Router ID using the <code>router-id</code> command for stability and control.</p>
<p>&lt;/aside&gt;</p>
<h2 id="heading-ospf-process-id">OSPF Process ID</h2>
<ul>
<li>The process ID is the ID of the OSPF process to which the interface belongs. the process ID is local to the router, and <strong>two OSPF neighbouring routers can have different OSPF process IDs</strong>. (Not like EIGRP). Cisco IOS software can run <strong>multiple OSPF processes on the same router,</strong> The Router ID should be a <strong>positive integer,</strong> for example, <strong>the process ID is 1</strong></li>
</ul>
<h2 id="heading-link-state-advertisement-lsas"><strong>Link State Advertisement (LSAs)</strong></h2>
<ul>
<li>LSA(<strong>Link State Advertisement</strong>) packets are sent between routers within the same area of origin and do not leave the area. An OSPF router uses LSA packets to describe its own interfaces but also carries information about its neighbours to adjacent routers in the same area.</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>LSA Type 1:</td><td>Router LSA</td></tr>
</thead>
<tbody>
<tr>
<td>LSA Type 2:</td><td>Network LSA</td></tr>
<tr>
<td>LSA Type 3:</td><td>Summary LSA</td></tr>
<tr>
<td>LSA Type 4:</td><td>Summary ASBR LSA</td></tr>
<tr>
<td>LSA Type 5:</td><td>Autonomous system external LSA</td></tr>
<tr>
<td>LSA Type 6:</td><td>Multicast OSPF LSA</td></tr>
<tr>
<td>LSA Type 7:</td><td>Not-so-stubby area LSA</td></tr>
<tr>
<td>LSA Type 8:</td><td>External attribute LSA for BGP</td></tr>
</tbody>
</table>
</div><h2 id="heading-ospf-concepts-main-lsas">OSPF Concepts: Main LSAs</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>LSA Type</td><td>name</td><td>Generated by</td><td>Description</td></tr>
</thead>
<tbody>
<tr>
<td>LSA Type 1:</td><td>Router LSA</td><td>Generated by each internal router within an area, per area link</td><td>Flooded within an single area only.</td></tr>
<tr>
<td>LSA Type 2:</td><td>Network LSA</td><td>Generated by the DR</td><td>Flooded within a single area only.</td></tr>
<tr>
<td>LSA Type 3:</td><td>Summary LSA</td><td>Generated by the BDR</td><td>Describes inter-area routes</td></tr>
<tr>
<td>LSA Type 4:</td><td>Summary ASBR LSA</td><td>Generated by the ABR.</td><td>Describes the path to the ASBR.</td></tr>
<tr>
<td>LSA Type 5:</td><td>Autonomous system external LSA</td><td>Generated by ASBR.</td><td>Describes the redistributed routes that have been injected into the OSPF domain from an external AS by The ASBR</td></tr>
<tr>
<td>LSA Type 7:</td><td>Not-so-stubby area(NSSAs) LSA</td><td>Generated by the ASBR, within a not-so-stubby area.</td><td>Describes external routes. sent from ASBR to ABR and converted into a type 5 by the ABR, which then floods to its areas.</td></tr>
</tbody>
</table>
</div><p><img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/0b56cc60-fb96-4f55-a544-ceeb026afa91/ospf_wireshark_.png" alt="ospf wireshark .png" /></p>
<p>&lt;aside&gt; 💡</p>
<ul>
<li><p><strong>Hello messages</strong> are used for establishing and maintaining OSPF neighbour relationships.</p>
</li>
<li><p><strong>LSAs</strong> are used to share detailed routing and topology information within the OSPF domain. &lt;/aside&gt;</p>
</li>
</ul>
<h2 id="heading-cost">Cost</h2>
<ul>
<li>Open Shortest Path First(OSPF) uses <strong>cost</strong> as the value of metric and uses a reference bandwidth of <strong>100</strong> Mbps for cost calculation. The formula to calculate the cost is Reference Bandwidth divided by interface bandwidth. for example, in the case of 10 Mbps Ethernet, OSPF metric cost value is <strong>100 Mbps / 10 Mbps</strong>.</li>
</ul>
<p><img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/b247563b-1adc-47ed-99d5-2439b5d28ac4/407972e9-d770-4bc4-b5cb-f9a72319c06e/image.png" alt="image.png" /></p>
<h3 id="heading-modify-the-reference-bandwidth">Modify the reference bandwidth</h3>
<pre><code class="lang-jsx">R1(config-router) **auto-cost reference-bandwidth** megabits-per-second
</code></pre>
<h3 id="heading-manually-configure-the-cost-of-an-interface">Manually Configure the cost of an interface:</h3>
<pre><code class="lang-jsx">R1(config-<span class="hljs-keyword">if</span>)**ip ospf cost** cost
</code></pre>
<h3 id="heading-modify-the-interface-bandwidth">Modify the interface bandwidth:</h3>
<pre><code class="lang-jsx">R1(config-<span class="hljs-keyword">if</span>)**bandwith** kilobits-per-second
</code></pre>
<p>Which of these commands can be used to make a FastEthernet interface have an OSPF cost of 100?</p>
<ul>
<li>R(config-router)# auto-cost reference bandwidth 1000</li>
</ul>
<p><strong>Reference bandwidth</strong>/<strong>Interface bandwidth</strong> = cost</p>
<p>10000/100=100</p>
<h3 id="heading-example-scenario"><strong>Example Scenario</strong></h3>
<p><strong>Scenario</strong>: You have two paths from Router A to Router D:</p>
<ol>
<li><p>Path 1: A → B → D (10 Mbps and 100 Mbps links, respectively).</p>
</li>
<li><p>Path 2: A → C → D (100 Mbps links only).</p>
</li>
</ol>
<p><strong>Default Cost Calculation</strong>:</p>
<ul>
<li><p>Path 1: Cost = 10 (A → B) + 1 (B → D) = <strong>11</strong>.</p>
</li>
<li><p>Path 2: Cost = 1 (A → C) + 1 (C → D) = <strong>2</strong>.</p>
</li>
</ul>
<p><strong>Result</strong>:</p>
<ul>
<li>OSPF chooses <strong>Path 2</strong> because it has a lower total cost.</li>
</ul>
<p>&lt;aside&gt; 💡</p>
<p>the SPF algorithm uses the cost of <strong>the outgoing interfaces</strong> toward the destination subnet, including the cost of the interface that connects to the subnet. The logic is illustrated in the following diagram.</p>
<p>&lt;/aside&gt;</p>
<p><img alt="intra-area-adding-cost-logic.svg" /></p>
<p><img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/479d1d6a-87c0-4e35-90a6-18e76d3a0b76/Screenshot_2023-02-23_140910.png" alt="Screenshot 2023-02-23 140910.png" /></p>
<h2 id="heading-wild-card-mask">Wild Card Mask</h2>
<ul>
<li><p>Wildcard masks are used to specify a range of network addresses. They are usually used with routing protocols <strong>(Such as OSPF) and access lists</strong>.</p>
</li>
<li><p>A Wildcard mask is <strong>32-bit</strong> long. it is a sort of inverted subnet mask, with the zero bits indicate that the corresponding bit position must match the same bit position in the IP address.</p>
</li>
</ul>
<p><img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/375711ff-e16b-46ea-bc7a-7fb3bf1f65a2/Screenshot_2023-03-01_095726.png" alt="Screenshot 2023-03-01 095726.png" /></p>
<p>Note: change all <strong>0</strong> to <strong>255</strong> and all <strong>255</strong> to <strong>0</strong>, in the second one last number <strong>255-192=063</strong></p>
<h3 id="heading-ospf-states">OSPF States</h3>
<ul>
<li><p><strong>Down State</strong>: OSPF is activated on the router, The router sends out Hello packets to the multicast address 224.0.0.5. It doesn’t know about any OSPF neighbours yet, so the current neighbour state is <strong>Down</strong>.</p>
</li>
<li><p><strong>Init State:</strong> A Hello packet has been received from a neighbour, but the receiving router has not yet been listed in the neighbour's Hello Packet. At this stage, Communication is <strong>One-way.</strong></p>
</li>
</ul>
<p><img alt="image.png" /></p>
<ul>
<li><strong>2-Way State</strong>: The Router Hello packet now includes the neighbour’s Router ID, and the neighbour’s Hello packets include the local router ID, Two-way communication is established.</li>
</ul>
<p><img alt="image.png" /></p>
<ul>
<li><p><strong>ExStart State</strong>: The Master-slave relationship is negotiated, Where one router becomes the master and initiates databases. The routers with lower Router-ID will become the slave.</p>
</li>
<li><p><strong>Exchange State</strong>: The routers exchange <strong>DBDs</strong> which contain a list of the <strong>LSAs</strong> in their <strong>LSDB</strong>.</p>
</li>
<li><p><strong>Loading State:</strong> Routers send <strong>Link State Request(LSR)</strong> messages to request that their neighbours send them any LSAs they don’t have. LSAs are sent in <strong>Link State Update (LSU</strong>) messages.</p>
</li>
<li><p><strong>Full State:</strong> The Routers are fully synchronized and have established an adjacent. they continue to send and listen for Hello Packets.</p>
</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>ID</td><td>Name</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td>1</td><td><strong>Hello</strong></td><td>Neighbor Discovery and Maintenance</td></tr>
<tr>
<td>2</td><td><strong>Database Description</strong></td><td>Summary of the LSDB of the router.</td></tr>
<tr>
<td>3</td><td><strong>Link-State Request (LSR)</strong></td><td>Request specific LSAs from the neighbor.</td></tr>
<tr>
<td>4</td><td><strong>Link-State Update (LSU)</strong></td><td>Sends specific LSAs to the neighbor.</td></tr>
<tr>
<td>5</td><td><strong>Link -State Acknowledgement(LSAck)</strong></td><td>Used to acknowledge that the router received a massage.</td></tr>
</tbody>
</table>
</div><pre><code class="lang-jsx">R1(config)# router ospf <span class="hljs-number">1</span>
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.1</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.0</span> area <span class="hljs-number">0</span>

**VS**

R1(config)# router ospf <span class="hljs-number">1</span>
R1(config-router)# network <span class="hljs-number">192.168</span><span class="hljs-number">.1</span><span class="hljs-number">.0</span> <span class="hljs-number">0.0</span><span class="hljs-number">.0</span><span class="hljs-number">.255</span> area <span class="hljs-number">0</span>
</code></pre>
<ul>
<li><p>Use <code>192.168.1.0 0.0.0.255</code> when enabling OSPF on all interfaces within the <code>192.168.1.0/24</code> subnet.</p>
</li>
<li><p>Use <code>192.168.1.1 0.0.0.0</code> when enabling OSPF on a specific interface with the IP address <code>192.168.1.1</code>.</p>
</li>
</ul>
<p><strong>Tip</strong>: To reduce manual configuration effort, use <strong>subnet-based configuration</strong> (<code>192.168.1.0 0.0.0.255</code>) for a larger network or dynamic environment. For specific control or precision, use <strong>interface-based configuration</strong> (<code>192.168.1.1 0.0.0.0</code>).</p>
]]></content:encoded></item></channel></rss>