Cisco CCNA Notes

Mac address

Protocol data  unit is called a frame in layer 2. Dest. mac -> Source MAC -> ~DATA -> FCS, CRC FCS – Frame check sequence, it houses the CRC (cyclic redundancy check) – Algorithm inside the CRC upon checking. Operation of a swit [view]

By: fouz | Related Lesson: Layer 2 - Mac Addresses | Modified: March 26, 2018

router commands

service password-encryption – encrypts all current and future passwords copy running-config startup-config [view]

By: Michael Chrusciel | Related Lesson: Layer 2 - Cisco IOS LAB (Part 3) Changing the Router Log | Modified: March 26, 2018

Point to Point Protocol

Link Control Protocol (LCP) – Authentication     1- Password Authentication Protocol (PAP)     2- Challange Handshake Authentication Protocol (CHAP) – Compression – PPP Multilink [view]

By: sorchamnan | Related Lesson: Point to Point Protocol | Modified: March 25, 2018

IP Address LAB

#show ip interface [interface]–> show config for specific interface  #show ip interface brief–> see all interfaces at the same time (config-if)#ip address [ip address][subnet mask] –> assign IP to a port  (config-if)#no s [view]

By: kpatel111999 | Related Lesson: Layer 3 - IP Addressing LAB | Modified: March 25, 2018

Encapsulation/Deencapsulation and ARP (Address Resilution Protocol)

Packet at Layer 3  Destination IP —-Source IP —- Data—– FCS (CRC) Frame Check Sequence (FCS) –> houses the cyclical redundancy check (CRC)  In logical diagrams — exclude switches  Internet Control Messaging P [view]

By: kpatel111999 | Related Lesson: Layer 3 - Encapsulation / Decapsulation and ARP | Modified: March 25, 2018

Classless IP addressing (Part 2)

150.101.45.0/30 –> 255.255.255.252  –> networks in blocks of 4  150.101.45.0/30, 150.101.45.4/30,…,  .3,.7,.11 –> all broadcast addresses  for point to point connect, always use /30 or .252 mask  [view]

By: kpatel111999 | Related Lesson: Layer 3 - Classless IP Addressing (Part 2) | Modified: March 25, 2018

Vlans

Vlan 1 , 1002-1005 are default vlans normal range. 1006 -4094 are extended range vlans [view]

By: PHONEMANBEN | Related Lesson: Layer 2 - Virtual Local Area Connections | Modified: March 25, 2018

OSI Model

Open System Interconnect Model (OSI) 1) Physical Layer 2) Data Link Layer 3) Network Layer 4) Transport Layer 5) Session Layer 6) Presentation Layer 7) Application Layer * Network engineer w/ CCNA will on focus on layer 2, 3 & 4.  [view]

By: giovuro | Related Lesson: Open Systems Interconnect Model (OSI) Introduction | Modified: March 25, 2018

Spanning Tree Protocol

Prevents frames from looping around networks when redundant links are present between switches Two paths between switch 1 and switch 3 PC 1 send out frame to PC 3 PC 1 knows pc 3 exists going out of port 1 and port 2 If the switch doesn’t know [view]

By: oscarg91 | Related Lesson: Layer 2 - Spanning Tree Protocol (Part 1) | Modified: March 25, 2018

Data Link, Layer 2

Layer 2:  FRAME: -Destination MAC -Source Mac -Data -Frame Check Sequence/CRC CRC: Preforms calculation on FRAME and yields a number.  Receiving device receives FRAME and creates its own CRC  If both device crc’s match, there was no corrupti [view]

By: xtopherx | Related Lesson: Layer 2 - Mac Addresses | Modified: March 25, 2018

« First ‹ Previous 1 2 92 100 101 102 103 104 112 202 2500 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel