ICND1 Part I: Networking Basics

Module 1: Networking Concepts

Lesson 1: The Purpose of Networks

Lesson 2: Common Network Components

Legacy Network Components

Hub

MAU

Bridge

Network Media

Coaxial Cable

Twisted Pair

Fiber Optics

Lesson 3: Categorizing Networks

Classifying Networks by Geography

LAN

WAN

MAN

PAN

CAN

Classifying Networks by Topology

Ring Topology

Bus Topology

Star Topology

Hub and Spoke Topology

Full Mesh Topology

Partial Mesh Topology

Classifying Networks by Architecture

Client Server Architecture

Peer to Peer Architecture

Module 1 Summary

Module 2: Protocol Reference Models

Lesson 1: The OSI Model – Introduction

Layer 1 – The Physical Layer

Layer 2 – The Data Link Layer

Layer 3 – The Network Layer

Layer 4 – The Transport Layer

Layers 5 – 7 – The Upper Layers

Lesson 2: The TCP/IP Stack – Introduction

Network Interface Layer

Internet Layer

Transport Layer

Application Layer

Common TCP/IP Protocols

Module 2 Summary

Part I Review

Part I Review

Part II: LANs

Part II: LANs Introduction

Module 3: Ethernet

Ethernet Introduction

Lesson 1: History of Ethernet

Lesson 2: Ethernet Distance and Speed Limitations

Lesson 3: Switch Operation

MAC Addresses

CAM Table

Collision Domains

Broadcast Domains

Frame Forwarding Options

Cut-Through Switching

Store-and-Forward Switching

Fragment-Free Switching

Traffic Flow Through a Switched Network

Module 3 Summary

Module 4: Switch Configuration

Lesson 1: Switch Hardware

Switch LEDs

Port Addressing

Lesson 2: Logging In

Connecting via the Console

Configuring a Management IP Address ()

Configuring a Default Gateway

Setting Console and VTY Passwords

Checking for Connectivity with Ping

Enabling Telnet Access

Enabling SSH Access

Lesson 3: Viewing Switch Information

Version

Current Configuration

Interface Status

MAC Address Table

Port Security

Lesson 4: Basic Switch Configuration

Setting a Hostname

Setting the Enable Password

Setting the Exec Timeout

Encrypting Passwords

Creating a Banner

Specifying Port Speed and Duplex

Saving the Configuration

Lesson 5: Configuring VLANs

VLAN Theory

VLAN Creation

Assigning Ports to a VLAN

Lesson 6: Configuring Trunks

Trunking Theory

Trunking Modes

Creating a Trunk

Specifying the Native VLAN

Limiting VLANs on a Trunk

Lesson 7: Configuring VTP

VTP Theory

VTP Modes

VTP Operation Example

VTP Configuration

Resetting the Configuration Revision Number

Module 4 Summary

Module 5: Troubleshooting Switch Operation

Lesson 1: Isolating the Issue

Lesson 2: Checking Interface Status

Lesson 3: Checking for Interface Errors

Lesson 4: Discovering Neighbors

Lesson 5: Checking a Port’s VLAN Membership

Lesson 6: Checking Trunk Status

Module 5 Summary

Part II Review

Part II Review

Part III: Routing

Part III: Routing Introduction

Module 6: IPv4 Addressing

IPv4 Addressing Introduction

Lesson 1: Binary Numbering

Lesson 2: IPv4 Address Formatting

Lesson 3: Types of IPv4 Addresses

Address Classes

Private vs. Public IPv4 Addresses

Lesson 4: Types of IPv4 Traffic Patterns

Unicast

Broadcast

Multicast

Lesson 5: Assigning IPv4 Addresses

Lesson 6: The Need for Subnetting

Lesson 7: IPv4 Subnetting

Calculating Available Subnets

Calculating Available Hosts

Subnetting Practice Exercise #1

Subnetting Practice Exercise #2

Subnetting Practice Exercise #3

Calculating Ranges of Usable IPv4 Addresses

Subnetting Practice Exercise #4

Subnetting Practice Exercise #5

How to Get More Practice

Classless Inter-Domain Routing (CIDR)

Module 6 Summary

Module 7: IPv6 Addressing

Lesson 1: IPv6 Address Format

Lesson 2: Shortening an IPv6 Address

Practice Exercise

Lesson 3: IPv6 Address Types

Global Unicast

Multicast

Link Local

Unique Local

Loopback

Unspecified

Solicited-Node Multicast

EUI-64

Autoconfiguration

Lesson 4: IPv6 Traffic Flows

Module 7 Summary

Module 8: Basic Router Configuration

Basic Router Configuration Introduction

Lesson 1: Router Operation

Common Interface Types

IP Routing Table

Sources of Route Information

Traffic Flow Through a Routed Network

Packet Forwarding

Lesson 2: Router Hardware

Router LEDs

Interface Addressing

Lesson 3: Logging In

Console vs. VTY Lines

Checking for Connectivity with Ping

Connecting Insecurely with Telnet

Connecting Securely with SSH

Lesson 4: Viewing Router Information

Version

Current Configuration

Interface Status

IP Routing Table

Neighboring Devices

Lesson 5: Basic Router Configuration

Setting a Hostname

Setting the Enable Password

Setting the Exec Timeout

Encrypting Passwords

Assigning an IPv4 Address to an Interface

Assigning an IPv6 Address to an Interface

Creating Banners

Lesson 6: DEMO – Basic Router Setup

Module 8 Summary

Module 9: Configuring Routing

Lesson 1: Routing Protocol Characteristics

Distance Vector Routing Protocols

A vector has magnitude (distance) and direction (next-hop).

– RIP ( Routing Information Protocol) which uses Bellman-Ford Algorithm, it’s chatty protocol because it sends an update (entire list of network it knows about) to its neighbor every 30 seconds.
– RIP uses hop count as it’s metric, so it doesn’t consider link speed.
– RIP is limited to 15 hops so hop number 16 considered unreachable.

Split horizon role; if I learn about a network of one interface, I’m not going to use that interface to broadcast out that network information.

EIGRP (Enhanced Interior Gateway routing Protocol) uses DUAL (Diffusing Update Algorithm)
Only sends updates
Create Adjacency (neighbors), then adjacency inform the router with the Adve
Advertised Distance: the distance from our EIGRP neighbor to a specific network.
Feasible Distance; The distance to an EIGRP neighbor plus that neighbor’s advertised distance to a specific network.
Feasible Route; The primary path to a destination network, based on the best feasible distance.
Successor Route; a backup path to a destination network, based on the second best feasible distance.

Link State Routing Protocols

Passive Interfaces

Lesson 2: Configuring OSPF

OSPF Overview

OSPF Basics

Introduction to Dijkstra’s Algorithm

Dijkstra’s Algorithm Calculation

Some OSPF Terminology

Neighborship vs. Adjacency

Designated Routers

Electing a Designated Router

Forming an Adjacency

Measuring Cost

Areas

OSPF Network Types

Single-Area OSPF

Benefits

OSPFv2 Configuration and Verification

OSPFv3 Configuration and Verification

Lesson 3: Configuring InterVLAN Routing

Router-on-a-Stick

The Router-on-a-Stick Concept

Configuring a Router-on-a-Stick

Switch Virtual Interface

Defining an SVI

Configuring an SVI

Module 9 Summary

Module 10: Troubleshooting Routing Issues

Lesson 1: IP Address Issues

Lesson 2: Verifying Host Configuration

Lesson 3: Checking Connectivity with Ping

Lesson 4: Tracing a Route

Lesson 5: Understanding Layer 1

Lesson 6: Discovering Neighbors

Lesson 7: DEMO: Troubleshooting Case Study

Module 10 Summary

Part III Review

Part III Review

Part IV: Services and Security

Part IV: Services and Security Introduction

Module 11: Router Services

Router Services Introduction

Lesson 1: DHCP

DHCP Theory

IP Helper Address

Configuring a Router as a DHCP Server

Lesson 2: NAT

NAT Theory

NAT Terminology

Static NAT

Dynamic NAT

Port Address Translation (PAT)

Lesson 3: NTP

NTP Theory

NTP Configuration and Verification

Module 11 Summary

Module 12: Access Control Lists

Lesson 1: ACL Theory

Lesson 2: Standard ACLs

Lesson 3: Extended ACLs

Numbered ACLs

Named ACLs

Lesson 4: ACL Configuration Considerations

Lesson 5: Troubleshooting ACLs

Module 12 Summary

Module 13: Device Security

Device Security Introduction

Lesson 1: Securing Device Access

Physical Security

Connecting Securely

External Authentication

Lesson 2: Switch Port Security

Shutting Down Unused Ports

Review of Port Security

Putting Unused Ports in an Unused VLAN

Selecting a Non-Default Native VLAN

Module 13 Summary

Part IV Review

Part IV Review