2024 III CCNA 200-301 Slides
2024 III CCNA 200-301 Slides
2024 III CCNA 200-301 Slides
introduces
Cisco Certified
Network Associate
YouTube.com/@iiinetworking
Arabic IT Courses/Content
Page: Facebook.com/iiinetworking
Group: Facebook.com/groups/iiinetworking
Technical Discussion and Sharing
@III_Networking
Entertaining IT Content
Linkedin.com/in/ sajjad-ghaffoori-6b4674134
Linkedin.com/company/iii-networking
Direct Connection
https://t.me/+yDIoeSbd-3EwYzA0
Courses Channel
- Cisco Exams Roadmap
https://www.geeksforgeeks.org/open-systems-interconnection-model-osi/
https://www.geeksforgeeks.org/tcp-ip-model/
https://en.wikipedia.org/wiki/2.4_GHz_radio_use#/media/File:2.4_GHz_Wi-Fi_channels_(802.11b,g_WLAN).svg
*more channel width, means more frequencies included, thus, more data can be encoded
- Hypervisors:
- Schedules the VMs requests to the HW
- Distributes the HW resources between the VMs
*also, can create Port Group for Complete Isolating (like VLANs)
*there is another V.NIC for each VM (for Internet)
- Microsoft Hyper-V
- ESXi VSwitch
2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,HTTPS, console, and
TACACS+/RADIUS)
2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
2.9 Configure the components of a wireless LAN access for client connectivity using GUI only such
as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
- Who am I connected to
- can depend on the protocol and the version
- CDP and LLDP do Discovery negotiations between devices
- LACP uses:
- Active: initiates bundling negotiations
- Passive: waits for other side to initiate
- PAgP uses:
- Desirable: initiates bundling negotiations
- Auto: waits for other side to initiate
- Static:
- Mode ON: no negotiations, direct bundling
- to bundle/aggregate ports:
- WLC: use “channel-group mode on” on the switch, as it doesn’t support LACP/PAgP
- AP: either using “ON” or “LACP”, BUT, only with “local” APs, not the “Autonomous” APs
- APs and WLCs are just like other networking devices
- they can be managed by CLI (console, telnet, ssh) and GUI (http and https)
- Authorization access can also be done using AAA
- Antenna Types
- Dipole Antenna
- ordinary in Home-Routers
- omnidirectional
- low power gain
- horizontal streaming only
- Yagi Antenna
- linear in shape and in transmitting
- sends in only one way!!
- Patch Antenna
- also linear
- but wider than Yagi
- Parabolic-Dish Antenna
- outdoor, long distance
- very high power gain
- P2P connections
- Hidden Antenna (inside client devices)
https://iiinetworking.com || https://youtube.com/@iiinetworking || https://linkedin.com/in/sajjad-ghaffoori-6b4674134 || https://youtube.com/@iiibysajjad
- Module-3: IP Connectivity
3.1 Interpret the components of routing table 3.3 Configure and verify IPv4 and IPv6 static routing
3.1.e Administrative distance 3.4 Configure and verify single area OSPFv2
3.2 Determine how a router makes a forwarding decision by default 3.4.c Broadcast (DR/BDR selection)
3.2.b Administrative distance 3.5 Describe the purpose, functions, and concepts of first hop redundancy protocols
- Verification
- Router#show ip ospf database
- Router#show ip ospf neighbors
- Router#show ip ospf interfaces brief
- Router#show ip ospf border-routers
- Router#show ip route ospf
- Router#show ip protocols
https://iiinetworking.com || https://youtube.com/@iiinetworking || https://linkedin.com/in/sajjad-ghaffoori-6b4674134 || https://youtube.com/@iiibysajjad
- First Hop Redundancy Protocol
- Establishes a virtual gateway between a router and its redundancies
- Virtual IP and Virtual MAC will be assigned
- one vMAC means one GW at a time (Active/Standby)
- multiple vMACs means multiple GWs at the same time (Active/Active)
- can be tracked and manipulated upon events
- protocols including “HSRP, VRRP, and GLBP”
4.2 Configure and verify NTP operating in a client and server mode
4.3 Explain the role of DHCP and DNS within the network
4.5 Describe the use of syslog features including facilities and levels
4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing,
congestion, policing, shaping
- Shaping:
- From the Client side
- To avoid misunderstanding, or unwanted behavior with the provide
- Queues the excess egress (Outgoing) traffic in the “Egress Queue”
- This is called “Queuing”
- Scheduling:
- How to empty the sub-queues, by which criteria
- Congestion Management:
- Tools for Queuing and Scheduling
- Emptying the Queued traffic in the egress queue
- WFQ, CBWFQ, PQ, LLQ, WRR, SRR, Shaping
- Class-Maps
- create a list, that identifies/matches some characteristics of a traffic
- classify those “matched” traffic
- to provoke this list to operate, we will need a “Policy-Map”
- Service-Policy
- apply a “Policy-Map” to an interface
- either “INBOUND” or “OUTBOUND”
- Router(config)#line vty 0 4
- Router(config-line)#transport input ssh
- Router(config-line)#login local
- Data Transfer Protocols
- Volumes of data to be transferred remotely
- requires internal and/or external connection
- a server can host files for reference
- a transfer protocol can import and export files from and to the server
5.2 Describe security program elements (user awareness, training, and physical access control)
5.3 Configure and verify device access control using local passwords
5.4 Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
*NOT SECURED
*IPSec can help (GRE over IPSec, or IPSec over GRE)
*Site-to-Site VPN
6.3 Describe controller-based and software defined architectures (overlay, underlay, and fabric)
6.4 Compare traditional campus device management with Cisco DNA Center enabled device management
6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
- Controller-Based Networks
- Centralized Management
- Through a “software” you be able to run and administrate an entire network
- Automation is easy (API)
- New devices automatically finds an initial configuration (ZTP)
- Declarative Approach
- the control plane resides within the network device (just like before)
- the controller will declare the requirements of the all the
- forwarding/routing decisions to the networking devices
- the network devices will then decide how to translate the controller instructions into actions
http://cisco.com/c/en/us/td/docs/solutions/CVD/Campus/sda-sdg-2019oct.pdf
https://iiinetworking.com || https://youtube.com/@iiinetworking || https://linkedin.com/in/sajjad-ghaffoori-6b4674134 || https://youtube.com/@iiibysajjad
- Encoding Languages
- Structuring information into format
- using XML, JSON, YAML
- can be converted to and from python for integration
- JSON forms the vast-majority of REST-API’s requests data
- Postman is a FREE solution to push and pull REST-API’s containing JSON data format
- JavaScript Object Notation (JSON)
- simple, human-readable encoding language
- using curly braces { } and square brackets [ ]
- depending on the key:value pairs
- JSON Values
- always surrounded by a curly bracket { }
- name:value pairs
- a string must be enclosed with double quotes “ ”
- like = {“name”:”III”, “job”:”channel”, “location”:”YouTube”}
https://iiinetworking.com || https://youtube.com/@iiinetworking || https://linkedin.com/in/sajjad-ghaffoori-6b4674134 || https://youtube.com/@iiibysajjad
- JSON Encoding
- String:String
- the name is a string, also the value is a string
- {“name”:”III”}
- String:Number
- the value won’t need a double quote
- {“Count”:10}
- String:Arrays
- for a range of values
- {“Class”:[A, B, C, D]}
- String:Booleans
- True/False case
- the value won’t need a double quote
- {“Direct”:False}
- Null
- {“Route”:Null}
100 Continue The server received the request and is in the process of giving the response.
201 Created Request was fulfilled and the requested resource was created
202 Accepted Request has been accepted for processing, but not completed
301 Move permanently The resource requested has been permanently moved to a new location.
400 Bad Request The server could not interpret or understand the request
401 Unauthorized The requested resource is protected and requires the client’s credentials
403 Forbidden The server refuses to supply the resource, regardless of the identity of the client
404 Not Found The requested resource cannot be found on the server
500 Internal Server Error The server might have an error in the server-side program responding to the request
502 Bad Gateway The proxy or gateway indicates that it received a bad response from the upstream server
503 Service Unreachable The server cannot respond due to overloading or maintenance.
- Master/Agent Relation
- each component should be installed on its side
- agent mostly is built-in
- some programs are agentless
- just directly pushes the config to the nodes
- push, to send immediately or at a schedule
- pull, a client asks if there is a change periodically