CCNA
-
- Operation of IP Data Networks
- Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
- Select the components required to meet a given network specification
- Identify common applications and their impact on the network
- Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
- Predict the data flow between two hosts across a network
- Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
- LAN Switching Technologies
- Determine the technology and media access control method for Ethernet networks
- Identify basic switching concepts and the operation of Cisco switches
- Collision domains
- Broadcast domains
- Ways to switch
- Store
- Forward
- Cut through
- CAM Table
- Configure and verify initial switch configuration including remote access management
- Hostname
- IP default-gateway
- local user and password
- Enable secret password
- console and VTY logins
- exec-timeout
- service password encryption
- copy run start
- Verify network status and switch operation using basic utilities such as
- Ping
- telnet
- SSH
- Describe how VLANs create logically separate networks and the need for routing between them
- Explain network segmentation and basic traffic management concepts
- Configure and verify VLANs
- Configure and verify trunking on Cisco switches
- DTP (topic)
- Auto-negotiation
- IP Addressing (IPv4/IPv6)
- Describe the operation and necessity of using private and public IP addresses for IPv4 addressing.
- Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment.
- Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
- Describe the technological requirements for running IPv6 in conjunction with IPv4
- Dual stack
- Describe IPv6 addresses
- Global unicast
- Multicast
- Link local
- Unique local
- EUI 64
- Auto-configuration
- IP Routing Technologies
- Describe basic routing concepts
- Packet forwarding
- Router lookup process
- Process Switching/Fast Switching/CEF
- Configure and verify utilizing the CLI to set basic Router configuration.
- Hostname
- Local user & password
- Enable secret password
- Console & VTY logins
- exec-timeout
- Service password encryption
- Interface IP Address
- Loopback
- Banner
- copy run start
- Configure and verify operation status of an Ethernet interface.
- Describe basic routing concepts
Verify router configuration and network connectivity using
- Ping
- Extended ping
- Traceroute
- Telnet
- SSH
- Show cdp neighbors
- Configure and verify routing configuration for a static or default route given specific routing requirements
- Differentiate methods of routing and routing protocols
- Static vs. dynamic
- Link state vs. distance vector
- Next hop
- IP routing table
- Passive interfaces (how they work)
- Configure and verify OSPF (single area)
- Benefit of single area
- Configure OSPv2 in a single area
- Configure OSPv3 in a single area
- Router ID
- Passive interface
- Configure and verify inter VLAN routing (router on a stick)
- Sub interfaces
- Upstream routing
- Encapsulation
- Configure SVI interfaces
- IP Services
- Configure and verify DHCP (IOS router)
- Configuring router interfaces to use DHCP
- DHCP options (Basic overview and functionality)
- Excluded addresses
- Lease time
- Describe the types, features, and applications of ACLs
- Standard (editing and sequence numbers)
- Extended
- Named
- Numbered
- Log option
- Configure and verify ACLs in a network environment
- Named
- Numbered
- Log option
- Identify the basic operation of NAT
- Purpose
- Pool
- Static
- 1 to 1
- Overloading
- Source addressing
- One-way NAT
- Configure and verify NAT for given network requirements
- Configure and verify NTP as a client
- Configure and verify DHCP (IOS router)
- Network Device Security
- Configure and verify network device security features
- Device password security
- Enable secret vs. enable
-
- Disable telnet
- SSH
- VTYs
- Physical security
- Service password
- Describe external authentication methods
- Configure and verify switch port security
- Configure and verify ACLs to filter network traffic
- Configure and verify ACLs to limit telnet and SSH access to the router
- Troubleshooting
- Troubleshoot and correct common problems associated with IP addressing and host configurations
- Troubleshoot and resolve VLAN problems
- Identify that VLANs are configured
- Verify port membership is correct
- Correct IP address is configured
- Troubleshoot and resolve trunking problems on Cisco switches
- Verify correct trunk states
- Verify correct encapsulation is configured
- Correct VLANs are allowed
- Troubleshoot and resolve ACL issues
- Verify statistics
- Verify permitted networks
- Verify direction
- Interface
- Troubleshoot and resolve Layer 1 problems
- Framing
- CRC
- Runts
- Giants
- Dropped Packets
- Late Collisions
- Input/output errors
- Configure and verify network device security features
- LAN Switching Technologies
- Identify enhanced switching technologies
- RSTP
- PVSTP
- Ether Channels
- RSTP
- Configure and verify PVSTP operation
- Identify enhanced switching technologies
- IP Routing Technologies
- Describe the boot process of Cisco IOS routers
- Configure and verify the operation status of a serial interface
- Manage Cisco IOS files
- Boot Preferences
- Cisco IOS Images (15)
- Licensing
- Show license
- Change license
- Differentiate methods of routing and routing protocols
- Administrative distance
- Split horizon
- Metric
- Next hop
- 2015Configure and verify OSPF (multi-area)
Neighbor adjacencies
- OSPF states
- Configure OSPv2
- Configure OSPv3
- Router ID
- Understand LSA types and purpose
- Configure and verify EIGRP (single AS)
- Feasible distance/feasible successors/administrative distance
- Feasibility condition
- Metric composition
- Router ID
- auto summary
- Path Selection
- Load Balancing
- Unequal
- Equal
- Passive Interface
- IP Services
- Recognize high availability (FHRP)
- VRRP
- HSRP
- GLBP
- Configure and verify syslog
- Utilize syslog output
- Describe SNMP v2 and v3
- Recognize high availability (FHRP)
- Troubleshooting
- Identify and correct common network problems
- Utilize net flow data
- Troubleshoot and resolve spanning tree operation issues
- Verify root switch
- Verify priority
- Verify mode is correct
- Verify port states
- Troubleshoot and resolve routing issues
- Verify routing is enabled (extensible and Hierarchical Interaction Protocol (SHIP))
- Verify routing table is correct
- Verify correct path selection
- Troubleshoot and resolve OSPF problems
- Verify neighbor adjacencies
- Verify hello and dead timers
- Verify OSPF area
- Verify interface MTU
- Verify network types
- Verify neighbor states
- Review OSPF topology table
- Troubleshoot and resolve EIGRP problems
- Verify neighbor adjacencies
- Verify AS number
- Verify load balancing
- Verify split horizon
- Troubleshoot and resolve inter VLAN routing problems
- Verify connectivity
- Verify encapsulation
- Verify subnet
- Verify native VLAN
- Port mode trunk status
- Troubleshoot and resolve WAN implementation issues
- serial interfaces
- Frame relay
- PPP
- Monitor Net Flow statistics
- 10 TS Ether Channel problems
- serial interfaces
- WAN Technologies
- Identify different WAN Technologies
- Metro Ethernet
- VSAT
- Cellular 3g/4g
- MPLS
- T1/E1
- ISDN
- DSL
- Frame relay
- Cable
- VPn
- Configure and verify a basic WAN serial connection
- Configure and verify a PPP connection between Cisco routers
- Configure and verify Frame Relay on Cisco routers
- Identify different WAN Technologies
Implement and troubleshoot
- Operation of IP Data Networks