ii

Cisco CCNA Exam #640-507 Certification Guide

Wendell Odom

Copyright© 2000 Lacidar Unlimited, Inc.

Cisco Press logo is a trademark of Cisco Systems, Inc.

Published by:

Cisco Press

201 West 103rd Street

Indianapolis, IN 46290 USA

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,

electronic or mechanical, including photocopying, recording, or by any information storage and retrieval

system, without written permission from the publisher, except for the inclusion of brief quotations in a

review.

Printed in the United States of America 1 2 3 4 5 6 7 8 9 0

Library of Congress Cataloging-in-Publication Number: 99-67898

ISBN: 0-7357-0971-8

Warning and Disclaimer

This book is designed to provide information about the Cisco CCNA #640-507 exam. Every effort has been

made to make this book as complete and as accurate as possible, but no warranty or fitness is implied.

The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have

neither liability nor responsibility to any person or entity with respect to any loss or damages arising from

the information contained in this book or from the use of the discs or programs that may accompany it.

The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

Trademark Acknowledgments

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately

capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a

term in this book should not be regarded as affecting the validity of any trademark or service mark.

Feedback Information

At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is

crafted with care and precision, undergoing rigorous development that involves the unique expertise of

members from the professional technical community.

Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could

improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through

e-mail at ciscopress@mcp.com. Please make sure to include the book title and ISBN in your message.

We greatly appreciate your assistance.

iii

Publisher John Wait

Executive Editor John Kane

Cisco Systems Program Manager Jim LeValley

Managing Editor Patrick Kanouse

Development Editor Christopher Cleveland

Senior Editor Jennifer Chisholm

Copy Editor Krista Hansing

Technical Editors David Barnes

Tinjin Chang

Steve Kalman

Frank Knox

Barbara Nolley

Team Coordinator Amy Lewis

Book Designer Gina Rexrode

Cover Designer Louisa Klucznik

Production Team Argosy

Indexer Christopher Cleveland

Copyright © 2000 Cisco Systems, Inc. All rights reserved. Printed in the USA. Access Registrar, AccessPath, Any to Any, AtmDirector, CCDA, CCDE, CCDP, CCIE, CCNA,

CCNP, CCSI, CD-PAC, the Cisco logo, Cisco Certified Internetwork Expert logo,

CiscoLink

, the Cisco Management Connection logo, the Cisco Net

Works

logo, the Cisco

Powered Network logo, Cisco Systems Capital, the Cisco Systems Capital logo, Cisco Systems Networking Academy, the Cisco Systems Networking Academy logo, the

Cisco Technologies logo, ConnectWay, ControlStream, Fast Step, FireRunner, GigaStack, IGX, Internet Quotient, Kernel Proxy, MGX, Natural Network Viewer, NetSonar,

Network Registrar,

Packet

, PIX, Point and Click Internetworking, Policy Builder, Precept, RouteStream, Secure Script, ServiceWay, SlideCast, SMARTnet, StreamView,

The

Cell

, TrafficDirector, TransPath, ViewRunner, VirtualStream, VisionWay, VlanDirector, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We

Work, Live, Play, and Learn, Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and ASIST, BPX, Catalyst,

Cisco, Cisco IOS, the Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub,

FastLink, FastPAD, FastSwitch, GeoTel, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Registrar, StrataView Plus, Stratm, TeleRouter, and VCO are

registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document are the property of

their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any of its resellers. (9908R)

Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on

the Cisco Connection Online Web site at http://www.cisco.com/offices.

Argentina • Australia • Austria • Belgium • Brazil • Canada • Chile • China • Colombia • Costa Rica • Croatia • Czech Republic

• Denmark • Dubai, UAE Finland • France • Germany • Greece • Hong Kong • Hungary • India • Indonesia • Ireland • Israel

• Italy • Japan • Korea • Luxembourg • Malaysia • Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines •

Poland • Portugal • Puerto Rico • Romania • Russia • Saudi Arabia • Singapore • Slovakia • Slovenia • South Africa • Spain •

Sweden • Switzerland • Taiwan • Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela

Corporate Headquarters

Cisco Systems, Inc.

170 West Tasman Drive

San Jose, CA 95134-1706

USA

http://www.cisco.com

Tel: 408 526-4000

800 553-NETS (6387)

Fax: 408 526-4100

European Headquarters

Cisco Systems Europe s.a.r.l.

Parc Evolic, Batiment L1/L2

16 Avenue du Quebec

Villebon, BP 706

91961 Courtaboeuf Cedex

France

http://www-europe.cisco.com

Tel: 33 1 69 18 61 00

Fax: 33 1 69 28 83 26

American

Headquarters

Cisco Systems, Inc.

170 West Tasman Drive

San Jose, CA 95134-1706

USA

http://www.cisco.com

Tel: 408 526-7660

Fax: 408 527-0883

Asia Headquarters

Nihon Cisco Systems K.K.

Fuji Building, 9th Floor

3-2-3 Marunouchi

Chiyoda-ku, Tokyo 100

Japan

http://www.cisco.com

Tel: 81 3 5219 6250

Fax: 81 3 5219 6001

iv

About the Author

Wendell Odom

has worked with networking technology for 15 years. He is currently a Cisco Systems

Senior Systems Engineer in the Atlanta, Georgia office, assigned to several large Cisco customers. Prior to

joining Cisco in 1999, Wendell provided consulting services on large networks as well as training services.

He spent his first eight years in networking working for IBM, helping customers evolve their SNA networks

into multiprotocol networks. Wendell is CCIE #1624, is a Certified Cisco Systems Instructor, is Cisco CIPcertified,

and is a CCNA-WAN. He has taught various Cisco-certified courses, including Introduction to

Cisco Router Configuration (ICRC), Advanced Cisco Router Configuration (ACRC), Cisco SNA for Multiprotocol

Administrators (SNAM), Cisco Channel Interface Processor (CIP), MPLS over Cisco WAN

Switches, and Cisco ATM (CATM). Wendell is one of the first Cisco instructors certified without a probationary

testing period and is the first non-Cisco instructor in the United States to teach Cisco’s SNAM, CIP,

and DLSw courses.

About the Technical Reviewers

David Barnes

is a Network Consulting Engineer for Cisco Systems in Dallas, Texas. He is a Cisco Certified

Design Professional, MCSE+Internet, and Master CNE. David specializes in large-scale network design and

optimization. He has designed, implemented, and managed networks for numerous Fortune 500 companies

over the past 10 years.

Tinjin Chang

, CCIE #5137 and CCSI, is an instructor and consultant for Chesapeake Network Solutions,

Inc. Tinjin has more than seven years of experience in planning, deploying, and troubleshooting complex

and large-scale IP and multiprotocol networks. Prior to joining Chesapeake, he was the lead network engineer

at Discover Brokerage, where his design and troubleshooting skills minimized downtime and guaranteed

network availability. Discover Brokerage was named the Best Online Broker by

Barron’s

magazine for

the two years that he worked there.

Steve Kalman

is a data communications trainer. He is the author or tech editor of 12 CBT titles and has

been the author, tech editor, or trainer for eight instructor-led courses. Steve also is beginning a new distance-

learning project as both author and presenter. In addition to those responsibilities, he runs a consulting

company, Esquire Micro Consultants, that specializes in data network design.

Frank Knox

, CCIE #3698, is a consultant and instructor currently involved in design, implementation, and

customer training for mixed SNA-IP networks. He is considered to be an expert in the area of mainframe

attached routers. Frank has more than 33 years of networking experience with IBM, GTE, and Skyline Computer

Corp.; during that time, he has worked in field service and support, product planning, education, and

management. In addition, he has developed and taught several courses for the University of Dallas (Telecommunications

MBA program). Frank has a master’s degree in telecommunications from Pace University.

Barb Nolley

is the president and principal consultant for BJ Consulting, Inc., a small consulting firm that

specializes in networking education. Since starting BJ Consulting, Barb has developed and taught training

courses for Novell’s Master CNE certification, as well as several courses for Cisco System’s Engineering

Education group. Barb stays current on networking technologies by constantly reading published books and

perusing more than 50 industry publications each month. Prior to starting her own company in 1993, Barb

worked for Apple Computer, Tandem Computer, and Tymnet (now part of MCI), where she held positions in

everything from technical support to project management.

v

Dedication

My wife, Kris, was a great help to me during this latest writing project. While she took no direct role in the

book, everything I do in life is a lot better because the love of my life is with me! Thanks to my parents,

Raymond and Fay, who took care of many things during some health problems I had while writing the book.

And finally, but most importantly, thanks to Jesus Christ, especially for your joy, peace, and protection in the

midst of a tough year.

vi

Acknowledgments

Chris Cleveland, development editor for Cisco Press, is the best in the business! Chris made my job much

easier so that I could concentrate totally on the content. I’d probably refuse to write another book if Chris

wouldn’t be the development editor!

John Kane, executive editor for Cisco Press, provided a great deal of assistance, as usual. John’s frequent

e-mails and conference calls with Cisco’s Worldwide Training organization allowed him to gather the information

needed to guide Cisco Press’s Cisco certification books, and it also allowed me to focus on writing,

instead of sending e-mails and participating in conference calls! Thanks for everything, John.

Many people at Cisco Press have helped make this book a success. Amy Lewis helped greatly by taking care

of many details. Many others worked behind the scenes, and although I never met them, they are appreciated!

Cisco Press spends much more time producing the book than I do to simply write it—they have the

laborious tasks! Thanks to all on the team!

The technical editors deserve most, if not all, of the credit for making the content robust and complete.

There is no question that the book is immensely better after the edit process! While all the editors gave a

great deal of help, each brought some particular strengths to the task. Tinjin, thanks for pointing out topics

for which just a little deeper technical coverage would help to clear up a topic. Steve, thanks for the input

relating to points that come up in the many classes you teach. David, thanks for jumping into the fray in the

middle of the process and adding some great help. Barb, you get the most credit for removing errors from

the book! (Of course, I take full responsibility for any remaining errors.) And, to my old friend Frank,

thanks for all the help and the occasional good-bad joke in your editing comments! (An example: “What’s a

gateway? About 50 pounds!” If you didn’t get it, “gateway” sounds like “gate weigh.”) All the technical editors

were an immense help.

vii

Contents at a Glance

Introduction

xx

Chapter 1

All About the Cisco Certified Network Associate Certification 2

Chapter 2

Cisco Internetwork Operating System (IOS) Fundamentals 20

Chapter 3

OSI Reference Model & Layered Communication 68

Chapter 4

Bridges/Switches and LAN Design 128

Chapter 5

Network Protocols 210

Chapter 6

Routing 352

Chapter 7

Understanding Access List Security 454

Chapter 8

WAN Protocols and Design 514

Chapter 9

Scenarios for Final Preparation 638

Appendix A

Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 700

Appendix B

Decimal to Hexadecimal and Binary Conversion Table 776

Index

786

viii

Table of Contents

Introduction

xx

Chapter 1

All About the Cisco Certified Network Associate Certification 2

How This Book Can Help You Prepare and Pass the CCNA Exam 4

Overview of Cisco Certifications 4

Exams Required for Certification 6

Other Cisco Certifications 7

What’s on the CCNA Exam 8

Topics on the Exam 9

Recommended Training Path for CCNA 11

How to Use This Book to Pass the Exam 12

I’ve Taken ICND—Now What? 14

I’ve Taken ICRC—Now What? 15

I’ve Taken the Cisco Networking Academy Courses—Now What? 16

I’m New to Internetworking with Cisco, and I Will Not Be Taking the ICND Course—

Now What? 17

I’ve Learned a Lot About CCNA Topics Through Experience, But I Will Not Be Taking

the ICND Course—Now What? 18

Conclusion 18

Chapter 2

Cisco Internetwork Operating System (IOS) Fundamentals 20

How to Best Use This Chapter 21

“Do I Know This Already?” Quiz 22

The IOS and Its User Interface 26

Router Components 26

Command-Line Interface 28

Navigating the IOS CLI 30

Configuration Processes and the Configuration File 34

Example Configuration Process 37

Managing Configuration Files 39

Cisco Discovery Protocol (CDP) 45

Managing IOS Images 48

ix

Upgrading an IOS Image into Flash Memory 48

Choosing Which IOS Image to Load 50

Scenario 2-1 61

Questions on Scenario 2-1 62

Scenario 2-2 63

Questions on Scenario 2-2 63

Scenario 2-1 Answers 66

Scenario 2-2 Answers 66

Chapter 3

OSI Reference Model & Layered Communication 68

How to Best Use This Chapter 69

“Do I Know This Already?” Quiz 70

The OSI, TCP/IP, and NetWare Protocol Architectures 74

OSI: Origin and Evolution 74

OSI Layers 75

Layering Benefits and Concepts 78

Interaction Between OSI Layers 79

The TCP/IP and NetWare Protocols 86

OSI Transport Layer Functions 87

Connection-Oriented Versus Connectionless Protocols 87

How Error Recovery Is Accomplished 89

Flow Control 91

OSI Data Link Layer Functions 94

Data Link Function 1: Arbitration 95

Data Link Function 2: Addressing 96

Data Link Function 3: Error Detection 98

Data Link Function 4: Identifying the Encapsulated Data 98

Summary: Data Link Functions 102

OSI Network Layer Functions 103

Routing 103

Network Layer (Layer 3) Addressing 107

Scenario 3-1 121

Task 1 for Scenario 3-1 122

Task 2 for Scenario 3-1 123

Task 3 for Scenario 3-1 123

Answers to Task 1 for Scenario 3-1 124

x

Answers to Task 2 for Scenario 3-1 124

Answers to Task 3 for Scenario 3-1 126

Chapter 4

Bridges/Switches and LAN Design 128

How to Best Use This Chapter 129

“Do I Know This Already?” Quiz 130

LAN Overview 135

LAN Addressing 138

LAN Framing 140

Fast Ethernet and Gigabit Ethernet 142

LAN Standards 143

Bridging, Switching, and Spanning Tree 145

Transparent Bridging 145

LAN Switching 148

Comparison of LAN Segmentation Using Bridges, Switches, and Routers 155

Spanning Tree 158

Virtual LANs 171

VLAN Summary 177

LAN Switch Configuration 177

Basic 1900 Switch Configuration 178

Basic VLAN Configuration 187

VLAN Trunking Protocol (VTP) 194

Chapter 5

Network Protocols 210

How to Best Use This Chapter 211

“Do I Know This Already?” Quiz 212

TCP/IP Protocols 217

Transmission Control Protocol 217

User Datagram Protocol 224

Address Resolution Protocol 226

Internet Control Message Protocol 227

FTP and TFTP 232

IP Addressing and Subnetting 235

IP Addressing Review 235

Five Ways the Exam Will Test Your IP Addressing Knowledge 244

CIDR, Private Addressing, and NAT 267

xi

IP Configuration 272

Using Secondary Addresses 283

IP Addressing with Frame Relay Subinterfaces 284

MTU and Fragmentation 287

IP Naming Commands and Telnet 288

Default Routes and the ip classless Command 292

IPX Addressing and Routing 296

Internal Networks and Encapsulation Types 299

IPX Configuration 303

Scenario 5-1: IP Addressing and Subnet Calculation 328

Scenario 5-2: IP Subnet Design with a Class B Network 330

Scenario 5-3: IP Subnet Design with a Class C Network 331

Scenario 5-4: IPX Examination 333

Scenario 5-5: IPX Configuration 339

Answers to Scenario 5-1: IP Addressing and Subnet Calculation 340

Answers to Scenario 5-2: IP Subnet Design with a Class B Network 341

Answers to Task 1 for Scenario 5-2 341

Answers to Task 2 for Scenario 5-2 342

Answers to Task 3 for Scenario 5-2 343

Answers to Scenario 5-3: IP Subnet Design with a Class C Network 344

Answers to Task 1 for Scenario 5-3 344

Answers to Task 2 for Scenario 5-3 345

Answers to Task 3 for Scenario 5-3 346

Answers to Scenario 5-4: IPX Examination 347

Answers to Scenario 5-5: IPX Configuration 349

Answers to Task 1 for Scenario 5-5 349

Answers to Task 2 for Scenario 5-5 350

Chapter 6

Routing 352

How to Best Use This Chapter 353

“Do I Know This Already?” Quiz 354

Distance Vector Routing Protocols 359

Comparing Routing Protocols 360

Distance Vector Routing 362

Configuration of RIP and IGRP 374

xii

The network Command 375

IGRP Metrics 378

Split Horizon and Infinity 378

RIP-1 and IGRP—No Subnet Masks 383

RIP Version 2 386

Auto Summary and Route Aggregation 389

Multiple Routes to the Same Subnet 395

Troubleshooting Routing and Routing Protocols 396

IPX RIP, SAP, and GNS 403

Service Advertisement Protocol 403

Configuration of IPX 405

Tunneling 409

Tunneling for VPNs 411

Configuring Tunneling 412

Integrated Routing Protocols 413

Scenario 6-1: IP Configuration 1 426

Scenario 6-2: IP Configuration 2 427

Scenario 6-3: IP Addressing and Subnet Derivation 429

Scenario 6-4: IPX Examination 435

Answers to Scenario 6-1: IP Configuration 1 444

Answers to Task 1 for Scenario 6-1 444

Answers to Task 2 for Scenario 6-1 445

Answers to Task 3 for Scenario 6-1 445

Answers to Task 4 for Scenario 6-1 446

Answers to Task 5 for Scenario 6-1 446

Answers to Scenario 6-2: IP Configuration 2 446

Answers to Task 1 for Scenario 6-2 447

Answers to Task 2 for Scenario 6-2 448

Answers to Task 3 for Scenario 6-2 448

Answers to Task 4 for Scenario 6-2 449

Answers to Scenario 6-3: IP Addressing and Subnet Derivation 449

Answers to Task 1 for Scenario 6-3 449

Answers to Task 2 for Scenario 6-3 450

Answers to Task 3 for Scenario 6-3 450

Answers to Scenario 6-4: IPX Examination 450

Answers to Task 1 for Scenario 6-4 450

xiii

Answers to Task 2 for Scenario 6-4 452

Answers to Task 3 for Scenario 6-4 453

Answers to Task 4 for Scenario 6-4 453

Chapter 7

Understanding Access List Security 454

How to Best Use This Chapter 455

“Do I Know This Already?” Quiz 456

Filtering IP Traffic 460

Standard IP Access Lists 462

Extended IP Access Lists 466

Named IP Access Lists 472

Controlling vty Access with IP Access Lists 475

IP Access List Summary 476

Filtering IPX Traffic and SAPs 476

IPX Packet Filters (Access Lists) 478

Standard IPX Access Lists 479

Extended IPX Access Lists 484

SAP Filters 487

Named IPX Access Lists 490

Scenario 7-1: IP Filtering Sample 1 503

Scenario 7-2: IP Filtering Sample 2 504

Scenario 7-3: IP Filtering Sample 3 504

Scenario 7-4: IPX Filtering 505

Answers to Scenario 7-1: IP Filtering Sample 1 508

Answers to Scenario 7-2: IP Filtering Sample 2 508

Answers to Scenario 7-3: IP Filtering Sample 3 509

Answers to Scenario 7-4: IPX Filtering 510

Answers to Task 1 for Scenario 7-4 510

Answers to Task 2 for Scenario 7-4 511

Answers to Task 3 for Scenario 7-4 512

xiv

Chapter 8

WAN Protocols and Design 514

How to Best Use This Chapter 515

“Do I Know This Already?” Quiz 516

Point-to-Point Leased Lines 520

HDLC and PPP Configuration 523

WAN Cabling Standards 528

Frame Relay Protocols 529

Frame Relay Features and Terminology 530

LMI and Encapsulation Types 532

DLCI Addressing and Frame Relay Switching 534

Network Layer Concerns with Frame Relay 538

How Address Mapping Works 543

Review: Basic Frame Relay Initialization 549

Compression 549

Frame Relay Configuration 551

Configuring Networks Without Subinterfaces 553

Configuring Networks with Point-to-Point Subinterfaces 555

Configuring Networks with Coexisting Point-to-Point and Multipoint

Subinterfaces 559

Payload Compression Configuration 563

ISDN Protocols and Design 567

ISDN Channels 567

ISDN Protocols 568

ISDN Function Groups and Reference Points 570

Typical Use of ISDN 574

PAP and CHAP 574

Multilink PPP 577

Dial-on-Demand Routing and ISDN Configuration 578

DDR Legacy Concepts and Configuration 580

A Comparison of WAN Options 590

Scenario 8-1: Point-to-Point Verification 608

Scenario 8-2: Frame Relay Verification 612

Scenario 8-3: Point-to-Point Configuration 619

Scenario 8-4: Frame Relay Configuration 620

Scenario 8-5: Frame Relay Configuration Dissection 623

xv

Answers to Scenario 8-1: Point-to-Point Verification 626

Answers to Scenario 8-2: Frame Relay Verification 627

Answers to Scenario 8-3: Point-to-Point Configuration 629

Answers to Scenario 8-4: Frame Relay Configuration 631

Answers to Scenario 8-5: Frame Relay Configuration Dissection 636

Chapter 9

Scenarios for Final Preparation 638

How to Best Use This Chapter 640

Scenario 9-1 641

Scenario 9-1, Part A—Planning 641

Solutions to Scenario 9-1, Part A—Planning 644

Scenario 9-1, Part B—Configuration 645

Solutions to Scenario 9-1, Part B—Configuration 646

Scenario 9-1 Part C—Verification and Questions 647

Solutions to Scenario 9-1, Part C—Verification and Questions 656

Scenario 9-2 658

Scenario 9-2, Part A—Planning 658

Solutions to Scenario 9-2, Part A—Planning 660

Scenario 9-2, Part B—Configuration 662

Solutions to Scenario 9-2, Part B—Configuration 662

Scenario 9-2, Part C—Verification and Questions 664

Solutions to Scenario 9-2, Part C—Verification and Questions 673

Scenario 9-3 675

Scenario 9-3, Part A—Planning 675

Solutions to Scenario 9-3, Part A—Planning Answers 678

Scenario 9-3, Part B—Configuration 681

Solutions to Scenario 9-3, Part B—Configuration 681

Scenario 9-3, Part C—Verification and Questions 684

Solutions to Scenario 9-3, Part C—Verification and Questions 696

xvi

Appendix A

Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 700

Answers to the Chapter 2 “Do I Know This Already?” Quiz 701

Answers to the Chapter 2 Q&A Section 703

Answers to the Chapter 3 “Do I Know This Already?” Quiz 708

Answers to the Chapter 3 Q&A Section 710

Answers to the Chapter 4 “Do I Know This Already?” Quiz 715

Answers to the Chapter 4 Q&A Section 718

Answers to the Chapter 5 “Do I Know This Already?” Quiz 724

Answers to the Chapter 5 Q&A Section 728

Answers to the Chapter 6 “Do I Know This Already?” Quiz 745

Answers to the Chapter 6 Q&A Section 748

Answers to the Chapter 7 “Do I Know This Already?” Quiz 754

Answers to the Chapter 7 Q&A Section 757

Answers to the Chapter 8 “Do I Know This Already?” Quiz 766

Answers to the Chapter 8 Q&A Section 768

Appendix B

Decimal to Hexadecimal and Binary Conversion Table 776

Index

786

xvii

Figure Icons Used in This Book

Throughout the book, you will see the following icons used for networking devices:

xviii

Throughout the book, you will see the following icons used for peripherals and other devices.

xix

Throughout the book, you will see the following icons used for networks and network connections.

xx

Introduction: Overview of

Certification and How to Succeed

Professional certifications have been an important part of the computing industry for many years and will

continue to become more important. Many reasons exist for these certifications, but the most popularly cited

reason is that of credibility. All other considerations held equal, the certified employee/consultant/job candidate

is considered more valuable than one who is not.

Objectives and Methods

The most important and somewhat obvious objective of this book is to help you pass the CCNA exam

(640-507). In fact, if the primary objective of this book was different, then the book’s title would be misleading;

however, the methods used in this book to help you pass the CCNA exam are designed to also make

you much more knowledgeable about how to do your job. While this book and the accompanying CD

together have more than 500 questions, the method in which they are used is not to simply make you memorize

as many questions and answers as you possibly can.

One key methodology used in this book is to help you discover the exam topics about which you need more

review, to help you fully understand and remember those details, and to help you prove to yourself that you

have retained your knowledge of those topics. So, this book does not try to help you pass by memorization,

but by helping you truly learn and understand the topics. The CCNA exam is the foundation for many of the

Cisco professional certifications, and it would be a disservice to you if this guide did not help you truly learn

the material. So, this book will help you pass the CCNA exam by using the following methods:

• Helping you discover which test topics you have not mastered

• Providing explanations and information to fill in your knowledge gaps

• Supplying exercises and scenarios that enhance your ability to recall and deduce the answers to test

questions

• Providing practice exercises on the topics and the testing process via test questions on the CD

Who Should Read This Book?

This book is not designed to be a general networking topics book, although it can be used for that purpose.

This book is intended to tremendously increase your chances of passing the CCNA exam. Although other

objectives can be achieved from using this book, the book is written with one goal in mind: to help you pass

the exam.

So why should you want to pass the CCNA exam? To get a raise. To show your manager you are working

hard to increase your skills. To fulfill a requirement from your manager before he will spend money on

another course. To enhance your résumé. To please your reseller-employer, who needs more certified

employees for a higher discount from Cisco. To prove that you know the topic, if you learned via on-the-job

training (OJT) rather than from taking the prerequisite classes. Or, one of many other reasons.

Others who might want to use this book are those considering skipping Cisco’s Interconnecting Cisco Network

Devices (ICND) course to take Cisco’s Building Scalable Cisco Networks (BSCN) or Building Cisco

xxi

Multilayer Switched Networks (BCMSN) courses. If you can answer a high percentage of the questions in

this book, you should be ready for those courses.

Strategies for Exam Preparation

The strategy you use for CCNA preparation might be slightly different than strategies used by other readers,

mainly based on the skills, knowledge, and experience you already have obtained. For instance, if you have

attended Cisco’s Interconnecting Cisco Networking Devices (ICND) course, then you will need to take a

slightly different approach compared to someone who has learned Cisco knowledge via on-the-job training.

Chapter 1, “All About the Cisco Certified Network Associate Certification,” includes a strategy that should

closely match your background.

Regardless of the strategy you use or the background you have, the book is designed to help you get to the

point where you can pass the exam with the least amount of time required. For instance, there is no need for

you to practice or read about IP addressing and subnetting if you fully understand it already. However, many

people like to make sure that they truly know a topic and thus read over material that they already know.

Several book features will help you gain the confidence that you need to be convinced that you know some

material already, and to also help you know what topics you need to study more.

How This Book Is Organized

Although this book could be read cover-to-cover, it is designed to be flexible and allow you to easily move

between chapters and sections of chapters to cover just the material that you need more work with. Chapter

1 provides an overview of the CCNA certification, and offers some strategies for how to prepare for the

exam. Chapters 2 through 8 are the core chapters and can be covered in any order. If you do intend to read

them all, the order in the book is an excellent sequence to use. Chapter 9, “Scenarios for Final Preparation,”

provides many scenarios that will help you review and refine your knowledge, without giving you a false

sense of preparedness that you would get with simply reviewing a set of multiple-choice questions.

The core chapters, Chapters 2 through 8, cover the following topics:

• Chapter 2, “Cisco Internetwork Operating System (IOS) Fundamentals”

• The IOS is the software that runs on a variety of Cisco products, particularly in routers and in some

LAN switches. This chapter covers many of the features and functions of the IOS, as well as its

command-line interface (CLI). Also included in this chapter are details about router hardware.

• Chapter 3, “OSI Reference Model & Layered Communication”

• The OSI reference model is mainly used today for comparison to other protocol architectures. The

purposes and meanings behind the use of a layered model are discussed in this chapter. The features

typically implemented at the various layers also are covered, and example protocols for each layer are

given. Much of this information is conceptual and is not necessarily needed in order to implement

networks, but it is covered on the exam.

Also covered in Chapter 3 are the concepts involved in typical operation of the OSI network and data

link layers. This conceptual discussion is vital to complete understanding of OSI Layer 2 and Layer

3 operation.

xxii

• Chapter 4, “Bridges/Switches and LAN Design”

• LANs—in particular, the various forms of Ethernet—are covered in this chapter. The logic behind

transparent bridging and LAN switches is also discussed in depth, as is the operation of the Spanning-

Tree Protocol. LAN switch configuration on the 1900 series LAN switch, using its IOS CLI, is

covered as well.

• Chapter 5, “Network Protocols”

• This chapter discusses TCP/IP and NetWare protocols, as well as their configuration on Cisco routers.

IP addressing is covered in great depth, with many tools to prepare you for questions on the exam.

NetWare initialization flows and encapsulations are detailed as well.

• Chapter 6, “Routing”

• Routing protocols are used by routers to dynamically learn routing information. This chapter covers

the types of routing protocols, with a detailed look at distance vector routing protocol logic. The

implementation of IP RIP and IGRP, and Novell RIP and SAP, is covered here as well.

• Chapter 7, “Understanding Access List Security”

• Network security is a very broad subject area. This chapter focuses on the security topics covered on

the CCNA exam—namely access lists. IP standard access lists, both numbered and named, are

discussed as well. Likewise, numbered and named IPX and SAP access lists are described.

• Chapter 8, “WAN Protocols and Design”

• This chapter covers point-to-point serial links as the first type of WAN link and then discusses the

various data link protocols used on point-to-point links, both for concepts and configuration. Frame

Relay is covered in great detail, largely because point-to-point links and Frame Relay are the two

most popular WAN options in routers today. Finally, this chapter covers ISDN protocols and their use

in simple dial-on-demand (DDR) environments.

Additional scenarios in Chapter 9 provide a method of final preparation with more questions and exercises.

Example test questions and the testing engine on the CD allow simulated exams for final practice.

Each of these chapters uses several features to help you make best use of your time in that chapter. The features

are as follows:

“Do I Know This Already?” Quiz and Quizlets

—Each chapter begins with a quiz that helps you

determine the amount of time you need to spend studying that chapter. The quiz is broken into

subdivisions, called “quizlets,” that correspond to a section of the chapter. Following the directions at

the beginning of each chapter, the “Do I Know This Already?” quiz will direct you to study all or

particular parts of the chapter.

Foundation

—This is the core section of each chapter that explains the protocols, concepts, and

configuration for the topics in the chapter.

Foundation Summary

—Near the end of each chapter, a summary collects the most important tables

and figures from the chapter. The “Foundation Summary” section is designed to help you review the

key concepts in the chapter if you score well on the “Do I Know This Already?” quiz, and they are

excellent tools for last-minute review.

xxiii

Scenarios

—Located at the end of most chapters, as well as in Chapter 9, the scenarios allow a much

more in-depth examination of a network implementation. Rather than posing a simple question

asking for a single fact, the scenarios let you design and build networks (at least on paper) without

the clues inherent in a multiple-choice quiz format.

CD-based practice exam—The companion CD contains a large number of questions not included

in the text of the book. You can answer these questions by using the simulated exam feature, or by

using the topical review feature. This is the best tool for helping you prepare for the test-taking

process.

Approach

Retention and recall are the two features of human memory most closely related to performance on tests.

This exam preparation guide focuses on increasing both retention and recall of the topics on the exam. The

other human characteristic involved in successfully passing the exam is intelligence; this book does not

address that issue!

Adult retention is typically less than that of children. For example, it is common for 4-year-olds to pick up

basic language skills in a new country faster than their parents. Children retain facts as an end unto itself;

adults typically either need a stronger reason to remember a fact or must have a reason to think about that

fact several times to retain it in memory. For these reasons, a student who attends a typical Cisco course and

retains 50 percent of the material is actually quite an amazing student.

Memory recall is based on connectors to the information that needs to be recalled—the greater the number

of connectors to a piece of information, the better chance and better speed of recall. For example, if the

exam asks what ARP stands for, you automatically add information to the question. You know the topic is

networking because of the nature of the test. You might recall the term “ARP broadcast,” which implies that

ARP is the name of something that flows in a network. Maybe you do not recall all three words in the acronym,

but you recall that it has something to do with addressing. Of course, because the test is multiplechoice,

if only one answer begins with “address,” you have a pretty good guess. Having read the answer

“Address Resolution Protocol,” then you might even have the infamous “aha” experience, in which you are

then sure that your answer is correct (and possibly a brightly lit light bulb is hovering over your head). All

these added facts and assumptions are the connectors that eventually lead your brain to the fact that needs to

be recalled. Of course, recall and retention work together. If you do not retain the knowledge, it will be dif-

ficult to recall it.

This book is designed with features to help you increase retention and recall. It does this in the following

ways:

• By providing succinct and complete methods of helping you decide what you recall easily and what

you do not recall at all.

• By giving references to the exact passages in this book that review those concepts you did not recall

so that you can quickly be reminded about a fact or concept. Repeating information that connects to

another concept helps retention, and describing the same concept in several ways throughout a

chapter increases the number of connectors to the same piece of information.

xxiv

• By including exercise questions that supply fewer connectors than multiple-choice questions. This

helps you exercise recall and avoids giving you a false sense of confidence, as an exercise with only

multiple-choice questions might do. For example, fill-in-the-blank questions require you to have

better recall than a multiple-choice question.

• By pulling the entire breadth of subject matter together. A separate, larger chapter (Chapter 9)

contains scenarios and several related questions that cover every topic on the exam and gives

you the chance to prove that you have gained mastery over the subject matter. This reduces the

connectors implied by questions residing in a particular chapter and requires you to exercise other

connectors to remember the details.

• Finally, accompanying this book is a CD-ROM that has exam-like, multiple-choice questions. These

are useful for you to practice taking the exam and to get accustomed to the time restrictions imposed

during the exam.

C

H

A

P

T

E

R

1

All About the Cisco Certified

Network Associate Certification

Congratulations! You have made your first step in beginning your journey to joining the

Cisco Career Certifications group of certified professionals. CCNA is the first step into your

journey.

The Cisco Certified Network Associate (CCNA) certification is the most popular

certification among all Cisco certifications. CCNA certification is a prerequisite for several

other Cisco Certifications, which of course adds to its popularity.

The exam itself is a computer-based exam, with multiple choice, fill-in-the-blank, and dragand-

drop style questions. The CCNA exam is delivered by our testing vendor, Sylvan

Prometric, which you can reach at 1-800-829-NETS, or you may register online at

www.2test.com. As we continually update the exams, the duration and number of questions

per exam will vary. When you register for your exam, the registrar will reserve the

appropriate time. You should check with Sylvan Prometric for the exact length of the exam.

NOTE

Be aware that when you register for the exam, you might be notified of a specific length of

time, and when you actually log in to the testing software at the testing center, you might

find that the testing time is 15 minutes shorter; that’s because Sylvan Prometric expects

some time to be required for getting settled and taking the tutorial on the testing engine.

The CCNA exam is not an easy, read the book and you pass kind of exam. It is surprisingly

hard, but Cisco’s philosophy is that by passing the exam, you fully understand the concepts.

More importantly, Cisco wants to be sure that passing the exam proves that you have the

skills to actually implement the features, not just talk about them. For instance, you can

expect questions that ask for the name of a router command that displays a particular piece

of information—most of us don’t memorize all the types of things displayed by every

show

command! So, the difficulty helps enhance the value of the CCNA certification, which

ultimately is better for those of us who are getting certified.

Also, in order to ensure the exam proves that you know your stuff, the exam does NOT

allow you to go back and change an answer, as many other exams allow, and as the original

version of the CCNA exam allowed.

4

Chapter 1: All About the Cisco Certified Network Associate Certification

Although it is a difficult exam, if your time is spent on training, experience, and study, you are

preparing yourself for success. If you don’t prepare adequately, it is more than likely that you

will not pass the first time. The concepts and commands covered on the exam are not secrets

locked in some vault, though—the information is available in many places and forms, including

this book. So, while difficult, passing the exam is certainly attainable with proper training and

preparation.

How This Book Can Help You Prepare and Pass the CCNA

Exam

The first goal for this book came at the request of the Cisco Career Certifications team; they

asked that we build a book that didn’t just help you pass a test, but also for a book that helped

you really understand the concepts and implementation details. (Because Cisco Press is the only

Cisco authorized publisher, we tend to listen to Cisco!) A second goal was to make the content

of the book the most comprehensive coverage of CCNA-related topics available, but without a

lot of coverage of topics not on the exam. The third and ultimate goal is to get you from where

you are today to the point where you can confidently pass the CCNA exam. So, all the book

features, which are outlined in the Introduction, are geared toward helping you discover what

CCNA topics you do know well, what CCNA topics you don’t know well, and what information

and tools you need to fill in the gaps.

One key assumption this book makes is that the perfect audience is made up of people who

either have attended the Interconnecting Cisco Networking Devices class or the Introduction to

Cisco Router Configuration class, or have had similar experience with Cisco switches and

routers. If you are relatively new to Cisco networking and have not taken any classes, do not

despair! You can still use this book, but also should consider either taking the ICND class or

buying the book version of the ICND class from Cisco Press—

Interconnecting Cisco Network

Devices

. The ICND course, and therefore also the ICND book, are written for an audience of

those who are just starting out in the Cisco world.

Overview of Cisco Certifications

Cisco’s main motivation behind the current certification program is to provide a means of

measuring the skills of people working for Cisco Resellers and Certified Partners. Cisco fulfills

only a small portion of its orders via direct sale from Cisco; most times, a Cisco reseller is

involved. Also, Cisco has not attempted to become the primary source for consulting and

implementation services for network deployment using Cisco products; instead, the company

prefers to use partners as much as possible. With that business model, a great need arose to

certify the skill levels of the partner companies.

The Cisco Certified Internetworking Expert (CCIE) program was Cisco’s first foray into

certifications. Introduced in 1994, the CCIE was designed to be one of the most respected,

difficult-to-achieve certifications. To certify, a person must pass a written test (also given at

Overview of Cisco Certifications

5

Sylvan Prometric centers) and then pass a 2-day hands-on lab test administered by Cisco. Cisco

does not publish numbers on pass/fail rates for CCIE or the other certifications, but rumors have

it that the failure rate on all lab test-takers is more than 50 percent, with failure rate for firsttime

lab-takers at more than 80 percent.

By using the number of employed CCIEs as the guage, certifying resellers and services partners

worked well originally, partly because Cisco had significantly fewer partners than today. Cisco

uses the number of CCIEs on staff as part of the criteria in determining the level of partner status

for the company, which in turn dictates the discount received by the reseller when buying from

Cisco. (If you want a little more insight into reseller certification, look at www.cisco.com/warp/

public/767/chan/ptnrcert-matrix.html.) This practice continues to be a good way for Cisco to

judge the commitment of resellers to hire people with proven Cisco skills, which in turn

improves customer satisfaction—and customer satisfaction is tied to every Cisco executive’s

bonus plan.

The CCIE certification fell short of the goal to help certify resellers and other partners as the

number of partners increased. For instance, there are around 4500 CCIEs worldwide, and about

half that many resellers—and not all the CCIEs work for resellers, of course. More importantly,

many resellers that did not perform services did not need a CCIE on staff except to get a better

discount. Thus, Cisco needed certifications that were less rigorous than CCIE, which would

allow Cisco more granularity in judging the skills on staff at a partner company. So, Cisco

created several additional certifications, with CCNA included. Figure 1-1 shows the CCIE and

career certifications for routing and switching.

Two categories of certifications were developed: one to certify implementation skills, and the

other to certify design skills. Resellers working in a presale environment need more design

skills, whereas services companies need more implementation skills. So, the CCNA and CCNP

provide implementation-oriented certifications, whereas the CCDA and CCDP certifications

provide design-oriented certifications.

Rather than instituting just one level of certification besides CCIE, Cisco created two additioanl

levels: an Associate level and a Professional level. CCNA is the more basic, and CCNP is the

intermediate level between CCNA and CCIE. Likewise, CCDA is more basic than CCDP. You

can view these details at Cisco’s Web site, www.cisco.com/warp/public/10/wwtraining/

certprog/lan/course.html.

Several of the certifications require other certifications as a prerequsite. For instance, CCNP

certification requires CCNA first. Also, CCDP requires both CCDA and CCNA certification.

CCIE, however, does not require any other certification prior to the written and lab tests, mainly

for historical reasons.

Cisco certifications have taken on a much larger role in the networking industry. From a career

standpoint, Cisco certification certainly can be used to help you get a new job. Or, you can add

certification to your performance evaluation plan and justify a raise based on passing an exam.

If you are looking for a new job, not only might certification help you land the job, but it actually

might help you make more money!

6

Chapter 1: All About the Cisco Certified Network Associate Certification

Figure 1-1

Cisco Routing and Switching Certifications

Exams Required for Certification

To certify for CCNA, a single exam is required: Sylvan Prometric exam number 640-507. For

CCDA, a single exam is required as well, but multiple exams are required for CCNP and CCDP.

The exams generally match the same topics that are covered in one of the official Cisco courses,

but in most cases—and certainly on the CCNA exam—more topics are covered on the exam

than are in the course. Table 1-1 outlines the exams and the courses with which they are most

closely matched.

Table 1-1

Exam-to-Course Mappings

Certification

Exam

Number Name

Course Most Closely Matching Exam

Requirements

CCNA 640-507 CCNA Exam Interconnecting Cisco Network Devices (ICND)

CCDA 640-441 CCDP Exam Designing Cisco Networks

CCNP 640-503 Routing Exam Building Scalable Cisco Networks (BSCN)

640-504 Switching

Exam

Building Cisco Multilayer Switched Networks

(BCMSN)

640-505 Remote

Access Exam

Building Cisco Remote Access Networks

(BCRAN)

640-509* Foundation

Exam

BSCN, BCMSN, and BCRAN

640-506 Support Exam Cisco Internetwork Troubleshooting (CIT)

Overview of Cisco Certifications

7

* Exam 640-509 meets the same requirements as passing these three exams: 640-503, 640-504, and 640-505.

Be cautioned that, while the exam coverage and course coverage are similar, there are no

guarantees that you will pass the test if you know absolutely everything in the course. Cisco is

moving more toward tying the certifications to technology, not to specific courses; note that the

exam names do not match the course names, as they previously did. So, a study guide can help

you with the other certifications as well as CCNA, with the added guidance of stressing the most

important exam items and covering other topics not held in the prerequisite courses.

Other Cisco Certifications

The certifications mentioned so far are oriented toward routing and LAN switching. Cisco has

many other certifications as well, as summarized in Table 1-2. Refer to Cisco’s Web site at

www.cisco.com/warp/public/10/wwtraining/certprog/index.html for the latest information.

CCDP 640-503 Routing Exam Building Scalable Cisco Networks (BSCN)

640-504 Switching

Exam

Building Cisco Multilayer Switched Networks

(BCMSN)

640-505 Remote

Access Exam

Building Cisco Remote Access Networks

(BCRAN)

640-509* Foundation

Exam

BSCN, BCMSN, and BCRAN

640-025 CID Exam Cisco Internetwork Design (CID)

Table 1-2

Additional Cisco Certifications

Certification Purpose, Prerequisites

CCNA-WAN Basic certification for Cisco WAN switches.

CCNP-WAN Intermediate certification for Cisco WAN switches. Requires CCNAWAN.

CCDP-WAN Design certification for Cisco WAN switches. Requires CCNP-WAN.

CCIE-WAN Expert-level certification for Cisco WAN switches. No prerequisite.

Requires exam and lab.

CCIE-ISP Dial CCIE-level certification for Internet service provider (ISP) and dial

network skills. No prerequisite. Requires exam and lab.

Table 1-1

Exam-to-Course Mappings (Continued)

Certification

Exam

Number Name

Course Most Closely Matching Exam

Requirements

continues

8

Chapter 1: All About the Cisco Certified Network Associate Certification

What’s on the CCNA Exam

Every test-taker would like to know exactly what is on the CCNA exam, as well as the other

Cisco certification exams. Well, to be honest,

exactly

what is on the exam is a very closely

guarded secret. Only those who write the questions for Cisco, and who have access to the entire

question database, truly know what is really on the exam.

Cisco makes fairly general CCNA exam content available to the public at the Web site

www.cisco.com/warp/public/10/wwtraining/certprog/lan/course.html. In fact, two direct

quotes from this Web site sumarize the exam:

CCNA Certification skills: Install, configure, and operate simple-routed LAN, routed

WAN, and switched LAN networks.

What defines “simple” networks: IP, IGRP, IPX, Serial, AppleTalk, Frame Relay, IP RIP,

VLANs, IPX RIP, Ethernet, Access Lists.

Frankly, most people could guess more detail about the exam than what these two quotes say

about it. As Cisco’s authorized external publishing company, Cisco Press provides some

additional information, part of which includes some details that are expected to be posted on

Cisco’s Web site at a later date. At press time, Cisco had not finalized what other details about

the exam will be posted on the Web site, so none of those details can be discussed here.

Fortunately, you’ll have easy access to what Cisco does decide to post. Be sure to check Cisco’s

Web site for the latest information on the exam.

A couple of comments can be made about the exam in general:

If we at Cisco Press believe that a topic is definitely on the exam, it is covered in Chapters

2 through 8.

If we at Cisco Press believe that a topic is simply not in the Cisco CCNA question

database, then it is not covered in this book. The only exception would be a topic that is

not on the exam that must be explained in order to make a topic that is on the exam more

understandable.

CCIE-SNA-IP Expert-level certification for Cisco products and features used for melding

SNA and IP networks. No prerequisite. Requires exam and lab.

CCNP and CCDP

specializations

Several specialized certifications are available for CCNP and CCDP

(routing/switching); see www.cisco.com/warp/public/10/wwtraining/

certprog/special/course.html for more details.

Table 1-2

Additional Cisco Certifications (Continued)

Certification Purpose, Prerequisites

Topics on the Exam

9

Topics on the Exam

The following list outlines the topics that will be the focus of the exam. These topics are shown

corresponding to the chapters in which they are covered.

Chapter 2, “Cisco Internetwork Operating System (IOS) Fundamentals”

Router components

The IOS CLI

Managing configuration files

Cisco Discovery Protocol (CDP)

Upgrading flash memory

IOS initialization

Chapter 3, “OSI Reference Model & Layered Communication”

OSI layers, benefits of layering, interactions of OSI layers

TCP/IP and NetWare comparisons with OSI

Connectionless and connection-oriented protocols

Data link layer functions

Network layer functions: addressing and routing

Chapter 4, “Bridges/Switches and LAN Design”

LAN addressing and framing

Fast Ethernet and Gigabit Ethernet

LAN standards

Transparent bridging

LAN switching

Spanning-Tree Protocol

LAN switch configuration (1900 family)

VLAN trunking protocol

10

Chapter 1: All About the Cisco Certified Network Associate Certification

Chapter 5, “Network Protocols”

TCP/IP

IP addressing and subnetting

TCP/IP configuration

IPX addressing and routing

IPX configuration

Chapter 6, “Routing”

Distance vector routing protocols

Configuration of IP RIP and IP IGRP

Autosummarization and route aggregation

IPX RIP, SAP, and GNS concepts

IPX configuration

Tunneling

Integrated routing protocols

Chapter 7, “Understanding Access List Security”

Filtering IP traffic

Filtering IPX traffic

Chapter 8, “WAN Protocols and Design”

Frame Relay concepts and configuration

Point-to-point concepts and configuration

ISDN concepts

Dial-on-Demand Routing (DDR)

Recommended Training Path for CCNA

11

Recommended Training Path for CCNA

Cisco recommends that you take two courses before you take the CCNA exam. The first,

Internetworking Technology Multimedia (ITM), is a CD-based course that you can order

directly from Cisco (www.cisco.com/warp/customer/10/wwtraining/cust/course_itm.html)

currently for $50. This course covers many of the protocol basics needed for CCNA.

The other suggested course is the instructor-led Interconnecting Cisco Network Devices

(ICND) course, which is available from almost every Cisco training partner (for a list of training

partners, go to www.cisco.com/warp/public/10/wwtraining/listAllTP.html). The ICND course

replaces the old Introduction to Cisco Router Configuration (ICRC) course, as well as the lesspopular

Cisco Routing and LAN Switching (CRLS) course.

So, if you have taken or will take ICND, that’s the best way to prepare for the CCNA exam.

Reading the ITM CD will be helpful as well. But what if you took one of the older courses? Or,

what if you took the Cisco Networking Academy curriculum? Or, what if you simply choose

not to spend the money on an introductory course? The final section of this chapter suggests a

strategy for people from each background.

First, an outline of the ICND course, shown in Table 1-3, should be helpful. Remember,

although the CCNA exam is not a test on the ICND course, ICND is the course that most closely

matches the CCNA topics.

Table 1-3

ICND Course Summary

Module Title Topics in This Module

Interconnecting Cisco

Networking Devices Introduction

Typical administrative details.

Internetworking Concepts

Overview

OSI model details; common physical and data link specifications;

MAC address definition; description of Ethernet, Token Ring, and

FDDI operation; a brief explanation of WAN data links.

Assembling and Cabling Cisco

Devices

Short chapter on basic physical setup and cabling.

Operating and Configuring a

Cisco IOS Device

Logging in, initialization, modes of operation, passwords, help,

command editing, and various

show

commands.

Managing Your Network

Environment

Telnet, CDP, and managing the IOS and config files.

Catalyst 1900 Switch Operations LAN switching concepts, spanning tree, and 1900 switch

configuration.

Extending Switched Networks

with Virtual LANs

Virtual LANs, VLAN trunking, and VLAN configuration on 1900

switches.

continues

12

Chapter 1: All About the Cisco Certified Network Associate Certification

How to Use This Book to Pass the Exam

One way to use this book is to start at the beginning and read it cover to cover. Although that

certainly would help you prepare, most people would not take that much time, particularly if

you already knew a lot about some of the topics in the book.

The rest of you might want to consider a different strategy on how to best use this book,

depending on what training you have had. This book is designed to help you get the most out

of the time you take to study.

Interconnecting Networks with

TCP/IP

Protocol stack versus OSI; application layer examples; TCP error

recovery; TCP and UDP ports; TCP, UDP, and IP headers; and

ICMP. For Class A, B, and C networks: IP addresses, mask

subnetting, and planning; configuring IP addresses; configuring

host names; configuring DNS; and verifying operation with

ping

,

trace

, and

show

commands.

Determining IP Routes Configuring static routes; configuring default routes; interior

versus exterior routing protocols; configuring RIP; debugging

RIP; IGRP configuration; and IGRP

debug

and

show

commands.

Basic IP Traffic Management with

Access Lists

The purpose of using access lists, logic diagrams, standard and

extended access lists, and TCP/IP access lists; wildcard masks;

configuring standard IP access lists; configuring extended access

lists; monitoring IP access lists.

Configuring Novell IPX Protocol versus OSI, IPX addresses, Novell encapsulation

options, RIP, SAP, GNS, configuring IPX, displaying IPX,

debugging IPX, and IPX access-lists.

Establishing Serial Point-to-point

Connections

Telephone company service basics, survey of data link protocols

for WANs, SDLC/HDLC/PPP/LAPB framing, PPP functions,

PAP and CHAP authentication, and PAP and CHAP

configuration.

Completing an ISDN BRI Call ISDN Protocol basics and dial-on-demand routing (DDR).

Establishing a Frame Relay PVC

Connection

Terminology, LMI messages, Inverse ARP, addressing,

configuration, monitoring, configuration using subinterfaces,

NBMA, and full and partial mesh issues.

Table 1-3 ICND Course Summary (Continued)

Module Title Topics in This Module

How to Use This Book to Pass the Exam 13

The core material for the CCNA is covered in Chapters 2 through 8. At the beginning of each

chapter, you are instructed on how to make the best use of your time reading that chapter,

assuming that you are not going to read every detail. The instructions on how to use each

chapter are outlined in Figure 1-2.

Figure 1-2 How to Use Chapters 2 Through 8

 

Each of these chapters begins with a quiz, which is broken into subdivisions called “quizlets.”

If you get a high score, you might simply review the “Foundation Summary” section at the end

of the chapter. If you score well on one quizlet but low on another, you are directed to the

section of the chapter corresponding to the quizlet on which your score was low. If you score

less than 50 percent on the overall quiz, you should read the whole chapter. Of course, these are

simply guidelines—if you score well but want more review on that topic, read away!

After completing the core chapters (Chapters 2 through 8), you have several options for your

next study activity. Because Chapter 9, “Scenarios for Final Preparation,” is the next chapter in

succession, it outlines the directions on what to do next. These same directions are repeated here

as well. Figure 1-3 outlines your options for final study for the exam.

14 Chapter 1: All About the Cisco Certified Network Associate Certification

As shown, if you want even more final preparation, you can go over the many practice questions

located in each chapter and on the CD. All pre-chapter quiz and chapter-ending questions, with

answers, are in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Q&A

Sections.” You can read and review these conveniently located questions and explanations

quickly. The CD includes testing software, as well as many additional questions in the format

of the CCNA exam. These questions should be a valuable resource when performing final

preparations.

Anyone preparing for the CCNA exam can use the guidelines at the beginning of each chapter

as a study aid. However, for some additional guidance, the final parts of this chapter give a few

strategies for study, based on how you have prepared before buying this book. So, find the

section that most closely matches your background in the next few pages, and read about some

additional ideas to help you prepare. There is a section for people who have taken ICND, one

for those who have taken ICRC, one for those from the Cisco Networking Academies, one for

those who will not be taking any classes and have not had much experience, and a final set of

strategies for those who will not be taking any classes but who have some experience.

I’ve Taken ICND—Now What?

For starters, you’ve taken the best path to prepare yourself. But let me temper that with the fact

that if you retain more than 50 percent of what you heard in class, then you are an extraordinary

person! That said, you need the following three strategies:

How to Use This Book to Pass the Exam 15

Strategy 1: Use this book exactly as described in the opening pages of Chapters 2 through 8,

respectively. Each of the foundational chapters begins with a quiz that helps you assess what

you need to study. It then directs you to the appropriate sections in the chapter rather than

requiring you to read all of each chapter.

Strategy 2: Make it a point to read the sections of the book that cover topics not found in ICND.

These section titles are as follows:

Chapter 2—“Syslog and Debug”

Chapter 3—“The OSI, TCP/IP, and NetWare Protocol Architectures”

Chapter 3—“OSI Transport Layer Functions”

Chapter 5—“CIDR, Private Addressing, and NAT”

Chapter 6—“Distance Vector Routing Protocols”

Chapter 6—“Tunneling”

Strategy 3: Use the directions at the beginning of Chapter 9 to direct your final study before

the exam. Chapter 9 is designed to review many concepts, and it outlines a good process for

study in the days leading up to your exam.

By using these three strategies, you will fill in the gaps in your knowledge and be confident

taking your CCNA exam.

I’ve Taken ICRC—Now What?

The current version of the exam more closely matches the ICND class. However, if you

compared the two course books, you would find much more in common than is different. In

fact, more than half of ICND is directly taken from the ICRC course. Of course, if you retain

more than 50 percent of what you heard in class, then you are an extraordinary person, so you

probably still need to fill in some holes in your knowledge base. For you, the following

strategies will be most helpful:

Strategy 1: Begin with a complete study of Chapter 4, which covers LANs and LAN switching.

ICRC did not cover LAN switching and Spanning-Tree Protocol, which are covered here in

detail. Do not skip the configuration sections, either—they are very important.

Strategy 2: Use this book exactly as described in the opening pages of Chapters 2 through 8.

Each of the foundational chapters begins with a quiz that helps you assess what you need to

study. It then directs you to the appropriate sections in the chapter rather than requiring you to

read all of each chapter. In fact, you probably should use Chapter 4 this way as well, in spite of

having read it already, because that will validate what you have learned.

Strategy 3: Make it a point to read the sections of the book that cover topics not found in ICRC.

Other than almost all of Chapter 4 of this book, the section titles you will want to be sure to read

are as follows:

16 Chapter 1: All About the Cisco Certified Network Associate Certification

Chapter 2—“Syslog and Debug”

Chapter 3—“The OSI, TCP/IP, and NetWare Protocol Architectures”

Chapter 3—“OSI Transport Layer Functions”

Chapter 5—“CIDR, Private Addressing, and NAT”

Chapter 6—“Distance Vector Routing Protocols”

Chapter 6—“Tunneling”

Strategy 4: Use the directions at the beginning of Chapter 9 to direct your final study before

the exam. Chapter 9 is designed to review many concepts, and it outlines a good process for

study in the days leading up to your exam.

So, compared to those who have taken ICND, you should not require a lot of additional study

time. The ICRC course did a great job of explaining the basics, and hopefully this book will

help you retain enough to confidently pass the exam.

I’ve Taken the Cisco Networking Academy Courses—Now What?

First of all, congratulations on having the foresight to get into the Cisco Networking Academy

program—we need more people who can make this stuff work! (Those of you who didn’t take

the Cisco Networking Academy track and are wondering what it’s all about, check out

www.cisco.com/warp/public/779/edu/academy/.) Thankfully, the Networking Academy

curriculum actually does a great job of preparing you with the skills and knowledge you need

to pass the exam. Unfortunately, your study was probably spread over several semesters, and

possibly over a couple of years. So, the details that you do not use frequently may have been

forgotten. Now, on to the strategies for success on CCNA:

Strategy 1: Pull out your Networking Academy curriculum and notes, and reread them. Most

people’s memory is exercised better by seeing familiar material—and even more so when you

wrote it down yourself. If you have ever taken a test and pictured in your mind where the answer

was on your page of notes, then you can relate.

Strategy 2: Use this book exactly as described in the opening pages of Chapters 2 through 8.

Each of the foundational chapters begins with a quiz that helps you assess what you need to

study. It then directs you to the appropriate sections in the chapter rather than requiring you to

read all of each chapter.

Strategy 3: Make it a point to read the sections that cover some of the theory behind networking

and some of the standards. The biggest reason for that is that the Networking Academy is

oriented more toward building skills than theoretical knowledge. The suggested sections are

listed here:

Chapter 3—From the beginning of the “Foundation Topics” section up to the beginning

of the section “The TCP/IP and NetWare Protocols”

How to Use This Book to Pass the Exam 17

Chapter 4—“Spanning Tree”

Chapter 6—“Distance Vector Routing Protocols”

Strategy 4: Use the directions at the beginning of Chapter 9 to direct your final study before

the exam. Chapter 9 is designed to review many concepts, and it outlines a good process for

study in the days leading up to your exam.

This book should help you sift through the topics and choose the right areas for study, and it

also should help you to not waste your time. Congratulations on your Networking Academy

work—now add the CCNA certification to take away any doubt in the minds of prospective

employers that you know Cisco!

I’m New to Internetworking with Cisco, and I Will Not Be Taking the

ICND Course—Now What?

You can pass the CCNA exam without taking any courses. Of course, Cisco wants you to take

the recommended courses for all the exams—its motivation is not to make more money,

because Cisco does not actually deliver the training; the training partners do. Instead, Cisco

truly believes that the more people understand its products, ultimately the happier its customers

will be and the more products Cisco will sell. Cisco also believes that the official training is the

right way to teach people about Cisco products, so you’re encouraged to take the classes.

If you are not taking any course, however, there is no reason to worry. Truthfully, though, you

will need more than just this book. Cisco Press publishes the Interconnecting Cisco Networking

Devices book, which is a book version of the ICND course. The figures look exactly like those

in the course book, and the text comes from the course book, expanded and reorganized to work

well in book format. So, if you can’t get to the course, for not a lot of money you can buy the

ICND book.

Of course, this book will be helpful, too. Try these suggestions:

Strategy 1: Buy the ICND book and read it. Although CCNA is not a course-based test, the

ICND course is listed as the only leader-led prerequisite course for CCNA.

Strategy 2: After reading ICND, use this book exactly as described in the opening pages of

Chapters 2 through 8. Each of the foundational chapters begins with a quiz that helps you assess

what you need to study. It then directs you to the appropriate sections in the chapter rather than

requiring you to read all of each chapter.

Strategy 3: Make it a point to read the sections of the book that cover topics not found in ICND.

These section titles are as follows:

Chapter 2—“Syslog and Debug”

Chapter 3—“The OSI, TCP/IP, and NetWare Protocol Architectures”

18 Chapter 1: All About the Cisco Certified Network Associate Certification

Chapter 3—“OSI Transport Layer Functions”

Chapter 5—“CIDR, Private Addressing, and NAT”

Chapter 6—“Distance Vector Routing Protocols”

Chapter 6—“Tunneling”

Strategy 4: Use the directions at the beginning of Chapter 9 to direct your final study before

the exam. Chapter 9 is designed to review many concepts, and it outlines a good process for

study in the days leading up to your exam.

I’ve Learned a Lot About CCNA Topics Through Experience,

But I Will Not Be Taking the ICND Course—Now What?

If you feel that you know a fair amount about CCNA topics already but are worried about the

topics you simply just have not worked with, then this strategy is for you. This book is designed

to help you figure out what CCNA topics you need some help with and then help you learn

about them. Here’s the simple strategy for you:

Strategy 1: Use this book exactly as described in the opening pages of Chapters 2 through 8.

Each of the foundational chapters begins with a quiz that helps you assess what you need to

study. It then directs you to the appropriate sections in the chapter rather than requiring you to

read all of each chapter.

Strategy 2: Use the directions at the beginning of Chapter 9 to direct your final study before

the exam. Chapter 9 is designed to review many concepts, and it outlines a good process for

study in the days leading up to your exam.

You should be able to fill in the gaps in your knowledge this way and not risk being bored in

the ICND class when it covers the topics you already know.

Conclusion

The CCNA certification is arguably the most important Cisco certification. It certainly is the

most popular, is required for several other certifications, and is the first step in distinguishing

yourself as someone who has proven knowledge of Cisco.

The CCNA Exam 604-507 Certification Guide is designed to help you attain CCNA

certification. This is the CCNA certification book from the only Cisco-authorized publisher. We

at Cisco Press believe that this book certainly can help you achieve CCNA certification—but

the real work is up to you! I trust that your time will be well spent.

This chapter covers the following topics that you will need to master as a CCNA:

The IOS and Its User Interface

This section examines the types of memory used

by the IOS, in addition to the commands used to examine and change the contents.

This section also describes the basic functions and help for the command-line

interface (CLI), and discusses how syslog messages are treated.

Configuration Processes and the Configuration File

The configuration file used

for a router contains all the configuration for that router. This section covers all

commands used to change the configuration and manipulate the configuration file.

Managing IOS Images

This section covers in detail the processes for upgrading

the IOS in Flash memory, as well as the commands used to tell the router which IOS

image to use. Password recovery is included as well.

C

H

A

P

T

E

R

2

Cisco Internetwork Operating

System (IOS) Fundamentals

The CCNA exam requires that you understand the basics of the Cisco Internetwork

Operating System (IOS). In fact, the only operating system and user interface covered on

the CCNA exam is the IOS and its user interface. The omission of other user interfaces, in

particular the Catalyst 5000/5500 series user interface, is one of the most important facts to

note when determining what to study for the CCNA exam.

The IOS runs on some Cisco switch models and provides the familiar IOS command-line

interface (CLI). This chapter is geared toward the IOS CLI on a router. Chapter 4, “Bridges/

Switches and LAN Design,” covers some details of IOS CLI on LAN switches. The user

interface is the same, but some commands are different.

The exam also includes questions on both router and LAN switch usage of the IOS. No one

should be surprised that the CCNA exam covers IOS running on routers. Also covered on

the exam is the use of IOS running on Cisco 1900 series switches. User interfaces on other

switch platforms might seem to be like IOS and have similar features, but these details are

not covered on the exam. That should be particularly helpful for those of you with less

hands-on experience.

Cisco requires that CCNAs exhibit a solid recollection of the many details of the CLI. Of

course, the best way to learn about any user interface is to use it. If you can spend time using

a Cisco router, the knowledge and recall you gain will be of significant value. This chapter

is designed to remind you of details you might not notice when practicing and will provide

a reference for those of you who do not have access to routers for practice. Still, there is no

substitute for hands-on practice.

How to Best Use This Chapter

By taking the following steps, you can make better use of your study time:

Keep your notes and the answers for all your work with this book in one place,

for easy reference.

Take the “Do I Know This Already?” quiz, and write down your answers. Studies

show that retention is significantly increased through writing down facts and

concepts, even if you never look at the information again.

Use the diagram in Figure 2-1 to guide you to the next step.

22 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

“Do I Know This Already?” Quiz

The purpose of the “Do I Know This Already?” quiz is to help you decide what parts of this

chapter to use. If you already intend to read the entire chapter, you do not necessarily need to

answer these questions now.

This 12-question quiz helps you determine how to spend your limited study time. The quiz is

sectioned into three smaller four-question “quizlets,” which correspond to the three major topic

headings in the chapter. Figure 2-1 outlines suggestions on how to spend your time in this

chapter based on your quiz score. Use Table 2-1 to record your scores.

Table 2-1

Scoresheet for Quiz and Quizlets

Quizlet

Number

Foundation Topics Section Covering

These Questions Questions Score

1 The IOS and Its User Interface 1 to 4

2 Configuration Processes and the Configuration

File

5 to 8

3 Managing IOS Images 9 to 12

All questions 1 to 12

“Do I Know This Already?” Quiz

23

1

What are the two different names for the router’s mode of operation that, when accessed,

enables you to issue commands that could be disruptive to router operations?

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

2

What command would you use to receive command help if you knew that a

show

command option begins with a

c

, but you cannot recall the option?

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

3

After typing

show ip route

, which is the only command you issued since logging in to the

router, you now want to issue the

show ip arp

command. What steps would you take to

execute this command by using command recall keystrokes?

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

4

What is the name of the user interface mode of operation used when you cannot issue

disruptive commands?

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

5

What configuration command causes the router to require a password from a user at the

console? What configuration mode context must you be in—that is, what command(s)

must be typed before this command after entering configuration mode? List the

commands in the order in which they must be typed while in config mode.

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

6

What does CDP stand for?

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

24

Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

7

What does the NV stand for in NVRAM?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

8

Name two commands used to view the configuration that is currently used in a router.

Which one is a more recent addition to the IOS?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

9

What two methods could a router administrator use to cause a router to load the IOS stored

in ROM?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

10

What is the process used to update the contents of Flash memory so that a new IOS in a

file called c4500-d-mz.120-5.bin, on TFTP server 128.1.1.1, is copied into Flash

memory?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

11

Two different IOS files are in a router’s Flash memory: one called c2500-j-l.111-3.bin and

one called c2500-j-l.112-14.bin. Which one does the router use when it boots up? How

could you force the other IOS file to be used? Without looking at the router configuration,

what command could be used to discover which file was used for the latest boot of the

router?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

12

What are the primary purposes of Flash memory in a Cisco router?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

“Do I Know This Already?” Quiz

25

The answers to the “Do I Know This Already?” quiz are found in Appendix A, “Answers to the

‘Do I Know This Already?’ Quizzes and Q&A Sections,” on page 701. The suggested choices

for your next step are as follows:

6 or less overall score

—Read the entire chapter. This includes the “Foundation Topics”

and “Foundation Summary” sections, the Q&A section, and the scenarios at the end of the

chapter.

2 or less on any quizlet

—Review the subsection(s) of the “Foundation Topics” part of

this chapter, based on Table 2-1. Then move into the “Foundation Summary” section, the

Q&A section, and the scenarios at the end of the chapter.

7, 8, or 9 overall score

—Begin with the “Foundation Summary” section and then go to

the Q&A section and the scenarios at the end of the chapter.

10 or more overall score

—If you want more review on these topics, skip to the

“Foundation Summary” section and then go to the Q&A section and the scenarios at the

end of the chapter. Otherwise, move to the next chapter.

26

Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Foundation Topics

The IOS and Its User Interface

IOS, a registered trademark of Cisco Systems, is the name of the operating system found in

most of Cisco’s routers. The majority of Cisco routers run the IOS, with its familiar commandline

interface (CLI). Also, some routing cards in other devices run IOS. For example, the Route/

Switch Module (RSM) card for the Catalyst 5000 series LAN switches performs routing

functions and executes the IOS.

Fixes and code updates to the IOS can include new features and functions. To learn more about

the code release process, features added at particular IOS revision levels, and other terminology

that will help you talk to the Cisco Technical Assistance Center (TAC), check out a current

Cisco Product Bulletin describing the Software Release Process. One such example is Product

Bulletin #537 (http://www.cisco.com/warp/public/cc/cisco/mkt/ios/rel/prodlit/537_pp.htm).

The exam topics covered in this section will become second nature to you as you work with

Cisco routers and switches more often. In fact, because this book purposefully was written for

an audience that already has some training and experience with Cisco routers, several of the

details in this chapter might already be ingrained in your memory. If you would like more

review, or if you are still new to the IOS, read on—the details in this section are important to

using Cisco routers and switches. This chapter reviews such topics as router components, the

CLI, and how to navigate the IOS command set using Help and key sequences for command

edit and recall.

Router Components

Before examining the IOS, a review of hardware and hardware terminology is useful. In

addition to handling the logic of routing packets, the IOS controls the use of different physical

components, which includes memory, processor, and interfaces. This section of the book

reviews common hardware details.

All Cisco routers have a console port, and most have an auxiliary port. The console port is

intended for local administrative access from an ASCII terminal or a computer using a terminal

emulator. The auxiliary port, missing on a few models of Cisco routers, is intended for

asynchronous dial access from an ASCII terminal or terminal emulator; the auxiliary port is

often used for dial backup.

Each router has different types of memory, as follows:

RAM

—Sometimes called DRAM for

dynamic

random-access memory, RAM is used by

the router just as it is used by any other computer: for working storage.

The IOS and Its User Interface

27

ROM

—This type of memory (read-only memory) stores a bootable IOS image, which is

not typically used for normal operation. ROM contains the code that is used to boot the

router until the router knows where to get the full IOS image.

Flash memory

—Either an EEPROM or a PCMCIA card, Flash memory stores fully

functional IOS images and is the default where the router gets its IOS at boot time. Flash

memory also can be used to store configuration files on Cisco 7500 series platforms.

NVRAM

—Nonvolatile RAM stores the initial or

startup

configuration file.

All these types of memory are permanent memory except RAM. No hard disk or diskette

storage exists on Cisco routers. Figure 2-2 summarizes the use of memory in Cisco routers.

The processors in the routers vary from model to model. Although they are not specifically

listed as requirements for the CCNA exam, some reference to terminology is useful. In most

routers, only one processor option is available; thus, you would not order a specific processor

type or card. The exception to this is the 7200 and 7500 families of routers. For instance, on the

7500 series, you choose either a Route Switch Processor 1 (RSP-1), RSP-2, or RSP-4

processor. In any case, all 7200 and 7500 routers, as well as most of the other Cisco router

families, run IOS. This commonality enables Cisco to formulate exams, such as CCNA, that

cover the IOS features without having to cover many hardware details.

Interfaces are used by a router for routing packets and bridging frames through a router. The

types of interfaces available change over time due to new technology. For example, packetover-

SONET and voice interfaces are relatively recent additions to the product line. However,

some confusion exists about what to call the actual cards that house the physical interfaces.

Table 2-2 summarizes the terminology that might be referred to on the test.

Table 2-2

Samples of Router Interface Terminology

Model Series

What the IOS Calls

Interfaces

What the Product Catalog Calls the Cards

with the Interfaces on Them

2500 Interface Modules and WAN interface cards

3600 Interface Network modules and WAN interface cards

4500 Interface Network processor modules

7200 Interface Port adapters and service adapters

7500 Interface Interface processors, and versatile interface

processors with port adapters

28

Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Physical interfaces are referred to as

interfaces

by the IOS commands, as opposed to

ports

or

plugs

. IOS commands familiar on one platform will be familiar on another. Some nuances are

involved in numbering the interfaces, however. In some smaller routers, the interface number is

a single number. However, with some other families of routers, the interface is numbered first

with the slot in which the card resides, followed by a slash and then the port number on that

card. For example, port 3 on the card in slot 2 would be interface 2/3. Numbering starts with 0

for card slots and 0 for ports on any card. In some cases, the interface is defined by three

numbers: first the card slot, then the daughter card (typically called a port adapter), and then a

number for the physical interface on the port adapter. The 2600 and 3600 families also use a

slot/port numbering scheme.

In this book, the single-digit interface numbers are used simply for consistency and readability.

If you want to dig deeper, you might want to read about processors and interfaces in the Cisco

Product Catalog (http://www.cisco.com/univercd/cc/td/doc/pcat/).

Command-Line Interface

Cisco uses the acronym CLI to refer to the terminal user command-line interface to the IOS.

The term CLI implies that the user is typing commands at a terminal, terminal emulator, or

Telnet connection. Although you can pass the CCNA exam without ever having used the CLI,

actually using the CLI will greatly enhance your chances.

To access the CLI, use one of three methods, as illustrated in Figure 2-3.

The IOS and Its User Interface

29

Regardless of which access method is used, a CLI user initially is placed in user mode, or user

EXEC mode, after logging in.

EXEC

refers to the fact that the commands typed here are

executed, and some response messages are displayed onscreen. The alternative mode is

configuration mode

, which is covered in the next section.

Passwords can be required when accessing the CLI. In fact, the default configuration at IOS

12.x requires a password for Telnet and auxiliary port access, but no password is set—therefore,

you must configure passwords from the console first. Table 2-3 reviews the different types of

passwords and the configuration for each type.

The

login

command actually tells the router to display a prompt. The

password

commands

specify the text password to be typed by the user to gain access. The first command in each

configuration is a context-setting command, as described in the section “Configuration

Processes and the Configuration File,” later in this chapter. Typically, all three passwords have

the same value.

Several concurrent Telnet connections to a router are allowed. The

line vty

0 4

command

signifies that this configuration applies to vtys (virtual teletypes—terminals) 0 through 4. Only

these five vtys are allowed by the IOS unless it is an IOS for a dial access server, such as a Cisco

AS5300. All five vtys typically have the same password, which is handy because users

connecting to the router via a Telnet cannot choose which vty they get.

User EXEC mode is one of two command EXEC modes in the IOS user interface.

Enable

mode

(also known as

privileged

mode or

privileged EXEC

mode) is the other. Enable mode is so

named because of the command used to reach this mode, as shown in Figure 2-4; privileged

mode earns its name because powerful, or privileged, commands can be executed there.

Table 2-3

CLI Password Configuration

Access From . . . Password Type Configuration

Console Console password

line console

0

login

password

faith

Auxiliary Auxiliary password

line aux

0

login

password

hope

Telnet vty password

line vty

0 4

login

password

love

30 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Navigating the IOS CLI

Several references are available for help when you are using the IOS. IOS documentation is

available on CD and is free from Cisco if you own one router or switch under a current

maintenance agreement. Paper documentation is also available from Cisco. If you prefer, Cisco

Press offers the Cisco Documentation series (more information at www.ciscopress.com). In

addition, all Cisco documentation is available online at Cisco’s Web site (www.cisco.com/

univercd/home/home.htm); the IOS command reference is found at www.cisco.com/univercd/

cc/td/doc/product/software/ios120/12cgcr/index.htm.

No matter which documentation you use, it is incredibly unlikely that you will remember all

IOS commands. (The command reference manuals stack 14 inches high.) Therefore, you will

find tools and tricks to recall commands particularly useful. Table 2-4 summarizes command

recall help options available at the CLI. Note that in the first column, “Command” represents

any command. Likewise, “parm” represents a command’s parameter. For instance, the third row

lists “command ?,” which means that commands such as show ? and copy ? would list help for

the show and copy commands, respectively.

Table 2-4 IOS Command Help

What You Type The Help You Get

? Help for all commands available in this mode.

help Text describing how to get help. No actual command help is given.

command ? Text help describing all the first parameter options for the command

command.

com? A list of commands that start with “com.”

command parm? This style of help lists all parameters beginning with “parm.” (Notice, no

spaces exist between “parm” and the ?.)

The IOS and Its User Interface 31

* When you type the ?, the IOS’s CLI reacts immediately; that is, you don’t need to press the Enter key or any

other keys. The router also redisplays what you typed before the ? to save you some keystrokes. If you press Enter

immediately after the ?, the IOS tries to execute the command with only the parameters you have typed so far.

** “Command” represents any command, not the word “command.” Likewise, “parm” represents a command’s

parameter, not the word “parameter.”

The context in which help is requested is also important. For example, when ? is typed in user

mode, the commands allowed only in privileged EXEC mode are not displayed. Also, help is

available in configuration mode; only configuration commands are displayed in that mode of

operation.

Commands you use at the CLI are stored in a command history buffer that retains the last

10 commands you typed. You can change the history size with the terminal history size x

command, where x is the number of commands for the CLI to recall; this can be set to a value

between 0 and 256.

Of course, most people want to use a previously typed command (perhaps with a different

parameter). Commands you have previously used during the current console/aux/Telnet can be

retrieved and then edited to save you some time and effort. This is particularly useful when you

are typing long configuration commands. Table 2-5 lists the commands used to manipulate

previously typed commands.

command parm<Tab> If the user presses the Tab key midword, the CLI will either spell the rest

of this parameter at the command line for the user, or do nothing. If the

CLI does nothing, it means that this string of characters represents more

than one possible next parameter, so the CLI does not know which to

spell out.

command parm1 ? If a space is inserted before the question mark, the CLI lists all next

parameters and gives a brief explanation of each.

Table 2-5 Key Sequences for Command Edit and Recall

Keyboard Command What the User Gets

Up-arrow or Ctrl+p This displays the most recently used command. If pressed again, the

next most recent command appears, until the history buffer is

exhausted. (The p stands for previous.)

Down-arrow or Ctrl+n If you have gone too far back into the history buffer, these keys will go

forward, in order, to the more recently typed commands. (The n is for

next.)

Left-arrow or Ctrl+b This moves the cursor backward in the currently displayed command

without deleting characters. (The b stands for back.)

Table 2-4 IOS Command Help (Continued)

What You Type The Help You Get

continues

32 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

NOTE One goal of this book is to help you learn more and solidify your understanding of the materials

on the CCNA exam. Hopefully, Table 2-5 will further your understanding. Beware—these

details are covered on the exam questions.

Syslog and Debug

The IOS creates messages when different events occur and, by default, sends them to the

console. These messages are called syslog messages. If you have used the console of a router

for any length of time, you likely have noticed these messages—and when they are frequent,

you probably became a little frustrated.

The debug command is one of the key diagnostic tools for troubleshooting difficult problems

on a router. debug enables monitoring points in the IOS and generates messages that describe

what the IOS is doing and seeing. When any debug command option is enabled, the router

processes the messages with the same logic as other syslog messages. Beware—some debug

options create so many messages that the IOS cannot process them all, possibly crashing the

IOS.

Right-arrow or Ctrl+f This moves the cursor forward in the currently displayed command

without deleting characters. (The f stands for forward.)

Backspace This moves the cursor backward in the currently displayed command,

deleting characters.

Ctrl+a This moves the cursor directly to the first character of the currently

displayed command.

Ctrl+e This moves the cursor directly to the end of the currently displayed

command.

Esc+b This moves the cursor back one word in the currently displayed

command.

Esc+f This moves the cursor forward one word in the currently displayed

command.

Ctl+r This creates a new command prompt, followed by all the characters

typed since the last command prompt was written. This is particularly

useful if system messages confuse the screen and it is unclear what the

user has typed so far.

Table 2-5 Key Sequences for Command Edit and Recall (Continued)

Keyboard Command What the User Gets

The IOS and Its User Interface 33

NOTE The no debug all command disables all debugs. Before enabling an unfamiliar debug

command option, issue a no debug all and then issue the debug you want to use; then, quickly

retrieve the no debug all command. If the messages are voluminous, press Enter immediately

to try to prevent the router from crashing by immediately disabling all debugs.

Users might or might not be interested in seeing the messages as they occur. The console port

always receives syslog messages. When a user telnets to the router, however, no syslog

messages are seen unless the user issues the terminal monitor command. This command

simply means that this terminal is monitoring syslog messages. Another alternative for viewing

syslog messages is to have the IOS record the syslog messages in a buffer in RAM, and then

use the show logging command to display the messages. For Telnet users, having the messages

buffered using the global config command logging buffered is particularly useful. Because

Telnet users do not get syslog messages by default anyway, these users can wait and look

at syslog messages when desired. Finally, the logging synchronous line configuration

subcommand can be used for the console and vtys to tell the router to wait until the user’s last

command output is displayed before showing any syslog messages onscreen. That provides a

little less interruption for the user.

Syslog messages also can be sent to another device. Two alternatives exist: sending the

messages to a syslogD server, and sending the messages as SNMP traps to a management

station. The logging host command, where host is the IP address or host name of the syslog

server, is used to enable sending messages to the external server. After SNMP is configured, the

snmp-server enable trap tells the IOS to forward traps, including syslog messages.

Figure 2-5 summarizes the flow of syslog messages, including debug messages. For a more

detailed view of syslog messages, including restricting messages based on message severity,

refer to the IOS documentation CD manual called “Troubleshooting Commands.”

34 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Configuration Processes and the Configuration File

Cisco requires that CCNAs master the process of changing and manipulating the configuration

files in the IOS. This includes initially setting up an IOS device, handling ongoing

configuration, and moving configuration files.

As mentioned in Chapter 1, “All About the Cisco Certified Network Associate Certification”

configuration mode is another mode for the Cisco CLI. Changing the configuration of the router

by typing various configuration commands is the purpose of configuration mode. Figure 2-6

illustrates the relationships among configuration mode, user EXEC mode, and priviledged

EXEC mode.

Configuration Processes and the Configuration File 35

Commands typed in configuration mode update the active configuration file. Changes are

moved into the active configuration file each time the user presses the Enter key and are acted

upon immediately by the router.

In configuration mode, context-setting commands are used before most configuration

commands. These context-setting commands tell the router the topic about which you will type

commands. More importantly, they tell the router what commands to list when you ask for help.

After all, the whole reason for these contexts is to make online help more convenient and clear

for you.

NOTE Context setting is not a Cisco term—it’s just a term used here to help make sense of

configuration mode.

The interface command is the most commonly used context-setting configuration command.

As an example, the CLI user could enter interface configuration mode after typing the interface

ethernet 0 configuration command. Command help in Ethernet interface configuration mode

displays only commands that are useful when configuring Ethernet interfaces. Commands used

in this context are called subcommands—or, in this specific case, interface subcommands.

Figure 2-7 shows several different configuration mode contexts, including interface

configuration mode, and illustrates the relationships and methods of moving among them.

The labels on the lines in Figure 2-7 represent the action or command that moves the user from

one mode to another. For example, from console configuration mode (left box), the interface

ethernet 0 command could move you to the box on the right, which represents interface

configuration mode.

If you have significant experience using the CLI in configuration mode, much of this will be

second nature. From a CCNA exam perspective, recalling whether popular commands are

global commands or subcommands will be useful. No set rules exist for what commands are

global or subcommands, but generally, when multiple instances of a parameter can be set in

36 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

a single router, the command used to set the parameter is likely to be a configuration subcommand.

Items that are set once for the entire router are likely to be global commands. For

instance, the hostname command is a global command because there is only one host name per

router. The interface ethernet 0 command is a global configuration command because there

is only one such interface in this router. Finally, the ip address command is an interface

subcommand that sets the IP address on the interface; each interface will have a different IP

address.

Use Ctrl+z from any part of configuration mode (or use the exit command from global

configuration mode) to exit configuration mode and return to privileged EXEC mode. The

configuration mode end command also exits from any point in the configuration mode back to

privileged EXEC mode. The exit commands from submodes or contexts of configuration mode

back up one level toward global configuration mode.

Example Configuration Process

Example 2-1 illustrates how the console password is defined; provides banner, host name,

prompt, and interface descriptions; and shows the finished configuration. The lines beginning

with “!” are comment lines that highlight significant processes or command lines within the

example. The show running-config command output also includes comment lines with just a

“!” to make the output more readable—many comment lines in the examples in this book were

added to explain the meaning of the configuration.

Example 2-1 Configuration Process Example

This Here’s the Rootin-est Tootin-est Router in these here Parts!

User Access Verification

Password:

Yosemite>enable

Password:

Yosemite#configure terminal

Yosemite(config)#enable password lu

Yosemite(config)#line console 0

Yosemite(config-line)#login

Yosemite(config-line)#password cisco

Yosemite(config-line)#hostname Critter

Critter(config)#prompt Emma

Emma(config)#interface serial 1

Emma(config-if)#description this is the link to Albuquerque

Emma(config-if)#exit

Emma(config)#exit

Emma#

Emma#show running-config

Building configuration...

Current configuration:

!

version 11.2

! Version of IOS on router, automatic command

no service udp-small-servers

no service tcp-small-servers

!

continues

38 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

hostname Critter

prompt Emma

! Prompt overrides the use of the hostname as the prompt

!

enable password lu

! This sets the priviledge exec mode password

!

no ip domain-lookup

! Ignores all names resolutions unless locally defined on the router.

!

ipx routing 0000.3089.b170

! Enables IPX rip routing

!

interface Serial0

ip address 137.11.12.2 255.255.255.0

ipx network 12

!

interface Serial1

description this is the link to Albuquerque

ip address 137.11.23.2 255.255.255.0

ipx network 23

!

interface TokenRing0

ip address 137.11.2.2 255.255.255.0

ipx network CAFE

ring-speed 16

!

router rip

network 137.11.0.0

!

no ip classless

!

!

!

banner motd ^C This Here’s the Rootin-est Tootin-est Router in these here Parts! ^C

! Any text between the Ctl+C keystrokes is considered part of the banner, including

!the Enter key.!

line con 0

password cisco

login

! login tells the router to supply a prompt; password defines what the user must

!type!

!

line aux 0

line vty 0 4

password cisco

Login

!

End

Example 2-1 Configuration Process Example (Continued)

Configuration Processes and the Configuration File 39

Managing Configuration Files

The CCNA exam requires that you be able to distinguish between the configuration file used at

startup and the active configuration file. The startup configuration file is in NVRAM; the other

file, which is in RAM, is the one the router uses during operation. The router copies the stored

configuration file from NVRAM into RAM as part of the boot process. Exterior to the router,

configuration files can be stored as ASCII text files anywhere using TFTP.

Cisco provides several methods of manipulating configuration files. CiscoWorks and other

management products let you create configurations for one or many routers without logging on

to those routers. NetSys Connectivity Tools actually check all the configuration files in your

network, make suggestions for improvements, and uncover errors. The most basic method for

manipulating configuration files and moving them into and out of a router, however, is by using

a TFTP server. The copy command is used to move configuration files among RAM, NVRAM,

and a TFTP server. The files can be copied between any pair, as Figure 2-8 illustrates.

The commands can be summarized as follows:

copy {tftp | running-config | startup-config} {tftp | running-config | startup-config}

The first parameter is the “from” location; the next one is the “to” location. (Of course, choosing

the same option for both parameters is not allowed.)

Confusion about what these commands actually do is pervasive. Any copy command option

moving a file into NVRAM or a TFTP server replaces the existing file. Any copy command

option moving the file into RAM, however, is effectively an add or merge operation. For

example, only one host name Siberia configuration command is allowed. Therefore, a config

file copied into RAM with hostname Siberia in it replaces the previous hostname command

(if any). However, if the file being copied has the access-list 1 permit host 1.1.1.1 command

in it, and if an access list number 1 already exists in the RAM configuration file, then accesslist

1 permit host 1.1.1.1 is placed at the end of that existing access list (access lists are

comprised of a list of configuration commands referencing the same list number or name). The

40 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

old entries in access- list 1 are not deleted. This is because many access-list 1 commands are

allowed in the same access list. Effectively, any copy into RAM works just as if you typed the

commands in the order listed in the config file.

So, why did Cisco not include a replace action, similar to the action used to copy to NVRAM

or TFTP? Who knows? A replace action probably would require you to empty all routing tables,

which might cause an outage. Possibly, this particular nuance is a result of some Cisco

programmer who decided years ago to take the loaded gun out of users’ hands. However,

advanced users can accomplish the effect of a replace action by entering configuration mode

and issuing commands until the running config is changed as desired. This requires that the user

know whether each command will replace another that is like it in the RAM configuration file,

or whether each command will simply be added to the configuration, as with an access-list

command.

Two key commands can be used to erase the contents of NVRAM. The write erase command

is the older command, and the erase startup-config command is the newer command. Both

simply erase the contents of the NVRAM configuration file. Of course, if the router is reloaded

at this point, there will be no initial configuration.

Viewing the Configuration and Old-Style Configuration Commands

Once upon a time, commands that were used to move configuration files among RAM,

NVRAM, and TFTP did not use easy-to-recall parameters such as startup-config and

running-config. In fact, most people could not remember the commands or got the different

ones confused.

Figure 2-9 shows both the old and new commands used to view configurations.

Initial Configuration (Setup Mode)

To pass the CCNA exam, you will need to be familiar with the differences between

configuration mode and setup mode. Setup mode is a router configuration mode that prompts

the user for basic configuration parameters. A Cisco router can be configured using the CLI in

configuration mode without using setup mode. Some users like to use setup mode, however,

particularly until they become more familiar with the CLI.

Configuration Processes and the Configuration File 41

NOTE If you plan to work with Cisco routers much, you should become accustomed with the CLI

configuration mode discussed earlier. Setup mode allows only basic configuration.

Setup mode is a topic covered on the CCNA exam, so regardless of whether you plan to use it,

you must remember how it works. Figure 2-10 and Example 2-2 describe the process. Setup

mode is most frequently used when the router comes up with no configuration in NVRAM;

setup mode can be entered by using the setup command from privileged mode.

Example 2-2 shows a screen capture of using setup mode after booting a router with no

configuration in NVRAM.

Example 2-2 Router Setup Configuration Mode

Notice: NVRAM invalid, possibly due to write erase.

--- System Configuration Dialog ---

At any point you may enter a question mark ’?’ for help.

Use Ctrl+C to abort configuration dialog at any prompt.

Default settings are in square brackets ’[]’.Would you

like to enter the initial configuration dialog? [yes]:

continues

42 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

First, would you like to see the current interface summary? [yes]:

Any interface listed with OK? value “NO” does not have a valid configuration

Interface IP-Address OK? Method Status Protocol

Serial0 unassigned NO unset down down

Serial1 unassigned NO unset down down

Ethernet0 unassigned NO unset reset down

Configuring global parameters:

Enter host name [Router]: fred

The enable secret is a one-way cryptographic secret used

instead of the enable password when it exists.

Enter enable secret: cisco

The enable password is used when there is no enable secret

and when using older software and some boot images.

Enter enable password: cisco2

Enter virtual terminal password: cisco

Configure SNMP Network Management? [yes]: n

Configure IP? [yes]:

Configure IGRP routing? [yes]: n

Configure RIP routing? [no]: n

Configuring interface parameters:

Configuring interface Serial0:

Is this interface in use? [yes]:

Configure IP on this interface? [yes]:

IP address for this interface: 163.4.8.3

Number of bits in subnet field [0]: 0

Class B network is 163.4.0.0, 0 subnet bits; mask is /16

Configuring interface Serial1:

Is this interface in use? [yes]: n

Configuring interface Ethernet0:

Is this interface in use? [yes]: y

Configure IP on this interface? [yes]:

IP address for this interface: 163.5.8.3

Number of bits in subnet field [0]: 0

Class B network is 163.5.0.0, 0 subnet bits; mask is /16

The following configuration command script was created:

hostname fred

enable secret 5 $1$aMyk$eUxp9JmrPgK.vQ.nA5Tge.

enable password cisco2

line vty 0 4

password cisco

no snmp-server

!

Example 2-2 Router Setup Configuration Mode (Continued)

Configuration Processes and the Configuration File 43

As Example 2-2 illustrates, you can use two methods to get into setup mode. First, if you are at

the console and you power up the router, and if there is no configuration file in NVRAM, the

router asks whether you want to enter the “initial configuration dialog.” Answering y or yes puts

you in setup mode. Alternatively, the setup privileged EXEC command puts you in setup mode.

When you are finished with setup, you are asked whether you want to use this configuration. If

you answer yes, the configuration you created is placed in RAM and NVRAM. This is the only

operation in the IOS that changes both files to include the same contents based on a single

action.

As of IOS version 12.0, the setup mode prompts no longer ask for the number of subnet bits.

Instead, the subnet mask used is requested, which is probably a lot better for most people. Other

fine details of the setup mode prompts have changed as well. Example 2-3 shows an example

using IOS version 12.0 and is simply shown here for reference.

ip routing

!

interface Serial0

ip address 163.4.8.3 255.255.0.0

!

interface Serial1

shutdown

no ip address

!

interface Ethernet0

ip address 163.5.8.3 255.255.0.0

!

end

Use this configuration? [yes/no]: y

Building configuration...[OK]

Use the enabled mode ’configure’ command to modify this configuration.

Press ENTER to get started!

Example 2-3 Router Setup Configuration Mode—Version 12.0

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]: yes

At any point you may enter a question mark ’?’ for help.

Use Ctrl+c to abort configuration dialog at any prompt.

Default settings are in square brackets ’[]’.

Basic management setup configures only enough connectivity

for management of the system, extended setup will ask you

to configure each interface on the system

Example 2-2 Router Setup Configuration Mode (Continued)

continues

44 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Would you like to enter basic management setup? [yes/no]: no

First, would you like to see the current interface summary? [yes]:

Any interface listed with OK? value “NO” does not have a valid configuration

Interface IP-Address OK? Method Status Protocol

Serial0 unassigned NO unset down down

Serial1 unassigned NO unset down down

TokenRing0 unassigned NO unset reset down

Configuring global parameters:

Enter host name [Router]: fred

The enable secret is a password used to protect access to

privileged EXEC and configuration modes. This password, after

entered, becomes encrypted in the configuration.

Enter enable secret: cisco

The enable password is used when you do not specify an

enable secret password, with some older software versions, and

some boot images.

Enter enable password: cisco2

The virtual terminal password is used to protect

access to the router over a network interface.

Enter virtual terminal password: cisco

Configure SNMP Network Management? [yes]: n

Configure DECnet? [no]:

Configure AppleTalk? [no]:

Configure IPX? [no]:

Configure IP? [yes]:

Configure IGRP routing? [yes]: n

Configure RIP routing? [no]:

Configure bridging? [no]:

Configuring interface parameters:

Do you want to configure Serial0 interface? [yes]: y

Configure IP on this interface? [yes]:

IP address for this interface: 163.4.8.3

Subnet mask for this interface [255.255.0.0] : 255.255.255.0

Class B network is 163.4.0.0, 24 subnet bits; mask is /24

Do you want to configure Serial1 interface? [yes]: n

Do you want to configure Ethernet0 interface? [yes]: y

Configure IP on this interface? [yes]:

IP address for this interface: 163.5.8.3

Subnet mask for this interface [255.255.0.0] : 255.255.255.0

Class B network is 163.5.0.0, 24 subnet bits; mask is /24

The following configuration command script was created:

hostname fred

enable secret 5 $1$Qxix$Fi3buBVGTpEig9AIPgzxC.

enable password cisco2

Example 2-3 Router Setup Configuration Mode—Version 12.0 (Continued)

Configuration Processes and the Configuration File 45

In the example, notice that an early prompt gives you the choice of performing a simpler

configuration for basic management. For instance, you may have the configuration editing in a

file on your PC, and all you need is enough IP working so that you can Telnet into the router to

copy the configuration. Also note that you have an option to start over after answering the

questions, which is very convenient for those of us who are poor typists.

Cisco Discovery Protocol

Cisco Discovery Protocol (CDP) is used by Cisco routers and switches to ascertain basic

information about neighboring routers and switches. You can use this information to learn

addresses quickly for easier Simple Network Management Protocol (SNMP) management, as

well as learn the addresses of other devices when you do not have passwords to log in to the

other device.

line vty 0 4

password cisco

no snmp-server

!

no decnet routing

no appletalk routing

no ipx routing

ip routing

no bridge 1

!

interface Serial0

ip address 163.4.8.3 255.255.255.0

no mop enabled

!

interface Serial1

shutdown

no ip address

!

interface Ethernet0

ip address 163.5.8.3 255.255.255.0

!

end

[0] Go to the IOS command prompt without saving this config.

[1] Return back to the setup without saving this config.

[2] Save this configuration to nvram and exit.

Enter your selection [2]: 2

Building configuration...

[OK]Use the enabled mode ’configure’ command to modify this configuration._

Press ENTER to get started!

Example 2-3 Router Setup Configuration Mode—Version 12.0 (Continued)

46 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

CDP is a Cisco proprietary protocol; to support forwarding CDP messages over an interface,

that interface must support SNAP headers. Any LAN interface, HDLC, Frame Relay, and ATM

all support CDP. The router or switch can discover Layer 3 addressing details of neighboring

routers—without even configuring that Layer 3 protocol—because CDP is not dependent on

any particular Layer 3 protocol.

CDP discovers several useful details from the neighboring device:

Device Identifier—Typically the host name.

Address list—Network and data link addresses.

Port Identifier—Text that identifies the port, which is another name for an interface.

Capabilities list—Information on what the device does—for instance, a router or switch.

Platform—The model and OS level running in the device.

CDP is enabled in the configuration by default. The no cdp run global command disables CDP

for the entire device, and the cdp run global command re-enables CDP. Likewise, the no cdp

enable interface subcommand disables CDP just on that interface, and the cdp enable

command switches back to the default state of CDP being enabled.

A variety of show cdp command options are available. Example 2-4 lists the output of the

commands, with some commentary following.

Example 2-4 show cdp Command Options

Seville#show cdp neighbor

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

S - Switch, H - Host, I - IGMP, r - Repeater

Device ID Local Intrfce Holdtme Capability Platform Port ID

fred Ser 1 172 R 2500 Ser 1

Yosemite Ser 0.2 161 R 2500 Ser 0.2

Seville#show cdp entry fred

-------------------------

Device ID: fred

Entry address(es):

IP address: 163.5.8.3

Platform: cisco 2500, Capabilities: Router

Interface: Serial1, Port ID (outgoing port): Serial1

Holdtime : 168 sec

Version :

Cisco Internetwork Operating System Software

IOS (tm) 2500 Software (C2500-D-L), Version 12.0(6), RELEASE SOFTWARE (fc1)

Copyright 1986-1999 by cisco Systems, Inc.

Compiled Tue 10-Aug-99 23:52 by phanguye

Seville#show cdp neighbor detail

-------------------------

Device ID: fred

Entry address(es):

Configuration Processes and the Configuration File 47

The commands provide information about both the neighbors and the behavior of the CDP

protocol itself. In the show cdp entry fred command in Example 2-4, all the details learned by

CDP are shown and highlighted. To know that fred is the device identifier of a neighbor, the

show cdp neighbor command can be used to summarize the information about each neighbor.

Show cdp neighbor detail lists the detail of all neighbors, in the same format as show cdp

entry. In addition, show cdp traffic lists the overhead that CDP introduces to perform its

functions.

IP address: 163.5.8.3

Platform: cisco 2500, Capabilities: Router

Interface: Serial1, Port ID (outgoing port): Serial1

Holdtime : 164 sec

Version :

Cisco Internetwork Operating System Software

IOS (tm) 2500 Software (C2500-D-L), Version 12.0(6), RELEASE SOFTWARE (fc1)

Copyright 1986-1999 by cisco Systems, Inc.

Compiled Tue 10-Aug-99 23:52 by phanguye

-------------------------

Device ID: Yosemite

Entry address(es):

IP address: 10.1.5.252

Novell address: 5.0200.bbbb.bbbb

Platform: cisco 2500, Capabilities: Router

Interface: Serial0.2, Port ID (outgoing port): Serial0.2

Holdtime : 146 sec

Version :

Cisco Internetwork Operating System Software

IOS (tm) 2500 Software (C2500-D-L), Version 12.0(6), RELEASE SOFTWARE (fc1)

Copyright 1986-1999 by cisco Systems, Inc.

Compiled Tue 10-Aug-99 23:52 by phanguye

Seville#show cdp interface

Ethernet0 is up, line protocol is down

Encapsulation ARPA

Sending CDP packets every 60 seconds

Holdtime is 180 seconds

Serial0.2 is up, line protocol is up

Encapsulation FRAME-RELAY

Sending CDP packets every 60 seconds

Holdtime is 180 seconds

Serial1 is up, line protocol is up

Encapsulation HDLC

Sending CDP packets every 60 seconds

Holdtime is 180 seconds

Seville#show cdp traffic

CDP counters :

Packets output: 41, Input: 21

Hdr syntax: 0, Chksum error: 0, Encaps failed: 0

No memory: 0, Invalid packet: 0, Fragmented: 0

Example 2-4 show cdp Command Options (Continued)

48 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Managing IOS Images

One common task that CCNAs run into is migrating to a new level of IOS. IOS image is simply

a term referring to the file containing the IOS. Managing image files entails getting new IOS

images from Cisco; backing up the currently used, older version from your routers; updating

your routers with the new image; and testing. Also included in IOS image management is how

to tell a router to use a particular IOS the next time it boots.

IOS files are typically stored in Flash memory. Flash memory is rewritable, permanent storage,

which is ideal for storing files that need to be retained when the router loses power. Also,

because there are no moving parts, there is a smaller chance of failure as compared with disk

drives, which provides better availability.

Upgrading an IOS Image into Flash Memory

As Figure 2-11 illustrates, to upgrade an IOS image into Flash memory, you first must obtain

the IOS image from Cisco. Then, you must place the IOS image into the default directory of a

TFTP server. Finally, you must issue the copy command from the router, copying the file into

Flash memory.

Managing IOS Images 49

Example 2-5 provides an example of the final step, copying the IOS image into Flash memory.

Example 2-5 copy tftp flash Command Copies the IOS Image to Flash Memory

R1#copy tftp flash

System flash directory:

File Length Name/status

1 7530760 c4500-d-mz.120-2.bin

[7530824 bytes used, 857784 available, 8388608 total]

Address or name of remote host [255.255.255.255]? 134.141.3.33

Source file name? c4500-d-mz.120-5.bin

Destination file name [c4500-d-mz.120-5.bin]?

Accessing file c4500-d-mz.120-5.bin ’ on 134.141.3.33...

Loading c4500-d-mz.120-5.bin from 134.141.3.33 (via TokenRing0): ! [OK]

Erase flash device before writing? [confirm]

Flash contains files. Are you sure you want to erase? [confirm]

Copy ‘c4500-d-mz.120-5.bin ’ from server

as ‘c4500-d-mz.120-5.bin ’ into Flash WITH erase? [yes/no]y

Erasing device... eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee ...erased

Loading c4500-d-mz.120-5.bin from 134.141.3.33 (via TokenRing0):

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!

[OK – 7530760/8388608 bytes]

Verifying checksum... OK (0xA93E)

Flash copy took 0:04:26 [hh:mm:ss]

R1#

50 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

During this process of copying the IOS image into Flash memory, the router will need to

discover several important facts:

1 What is the IP address or host name of the TFTP server?

2 What is the name of the file?

3 Is space available for this file in Flash memory?

4 If not, will you let the router erase the old files?

The router will prompt you for answers, as necessary. Afterward, the router erases Flash

memory as needed, copies the file, and then verifies that the checksum for the file shows that

no errors occurred in transmission. The show flash command then can be used to verify the

contents of Flash memory (see Example 2-6). (The show flash output can vary between router

families.) Before the new IOS is used, however, the router must be reloaded.

In some cases, Flash memory could be in read-only mode. That is the case when a router loads

only part of the IOS into RAM, to conserve RAM. Other parts of the IOS file are kept in Flash

memory (Flash memory access time is much slower than RAM). In this case, if Flash memory

must be erased to make room for a new image, the IOS could not continue to run. So, if the

router is running from a portion of the IOS in Flash memory, the router first must be booted

using the IOS in ROM. Then the Flash memory will be in read/write mode, and the erase and

copy processes can be accomplished. The copy tftp flash command in later releases of the IOS

actually performs the entire process for you. In earlier releases, you had to boot the router from

ROM and then issue the copy tftp flash command.

Choosing Which IOS Image to Load

The CCNA exam requires you to be proficient in configuring a router to load an IOS image from

many sources. Two methods are used by a router to determine where it tries to obtain an IOS

image to execute. The first is based on the value of the configuration register, which is a 16-bit

software register in Cisco’s more recently developed routers. (Some older routers had a hardware

configuration register, with jumpers on the processor card, to set bits to a value of 0 or 1.)

The second method used to determine where the router tries to obtain an IOS image is through

the use of the boot system configuration command. Figure 2-12 shows an example binary

breakdown of the default value for the configuration register.

Example 2-6 Verifying Flash Memory Contents with the show flash Command

fred#show flash

System flash directory:

File Length Name/status

1 6181132 c4500-d-mz.120-5.bin

[4181196 bytes used, 4207412 available, 8388608 total]

8192K bytes of processor board System flash (Read ONLY)

Managing IOS Images 51

Figure 2-12 Binary Version of Configuration Register, Value Hex 2102

The boot field is the name of the low-order 4 bits of the configuration register. This field can

be considered a 4-bit value, represented as a single hexadecimal digit. Cisco represents

hexadecimal values by preceding the hex digit(s) with 0x—for example, 0xA would mean a

single hex digit A.

The router chooses the IOS image to load based on the boot field and the boot system commands

in the configuration. Table 2-6 summarizes the use of the configuration register and the boot

system command at initialization time. (If the files referred to in the boot system commands are

not found, then the router will never complete the boot process. The password recovery process

must be used to change the config register to 0x2161 so that the NVRAM configuration is

ignored and the boot commands can be repaired to point to a valid IOS file name. Refer to the

section “Password Recovery,” later in this chapter, for more details.)

Table 2-6 boot system Command

Value of

Boot Field Boot System Commands Result

0x0 Ignored if present ROM monitor mode, a low-level problem

determination mode, is entered.

0x1 Ignored if present IOS from ROM is loaded.

0x2-0xF No boot command The first IOS file in flash is loaded; if that

fails, the router broadcasts looking for an IOS

on a TFTP server. If that fails, IOS from ROM

is loaded.

0x2-0xF boot system ROM IOS from ROM is loaded.

0x2-0xF boot system flash The first file from Flash memory is loaded.

0x2-0xF boot system flash filename IOS with name filename is loaded from Flash

memory.

0x2-0xF boot system tftp 10.1.1.1 filename IOS with name filename is loaded from TFTP

server.

0x2-0xF Multiple boot system commands,

any variety

An attempt occurs to load IOS based on the

first boot command in configuration. If that

fails, the second boot command is used, and

so on, until one is successful.

15 14 13 12

0 0 1 0

11 10 9 8

0 0 0 1

7 6 5 4

0 0 0 0

3 2 1 0

0 0 1 0

52 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Password Recovery

Several additional concepts related to loading the IOS must be understood before password

recovery can be performed. First, software called the ROM monitor (rommon) is held in ROM

on all routers and actually provides the code that is first used to boot each router. rommon has

a rudimentary command structure that is used as part of the password recovery process. A

limited-function IOS is also held in either ROM or in additional Flash memory called bootflash;

in either case, the IOS in bootflash or ROM is used mainly in cases where the IOS in flash is

not available for some reason. Finally, bit 6 of the configuration register set to binary 1 means

that the router should ignore the NVRAM configuration when booting.

Password recovery revolves around the process of getting the router to boot while ignoring the

NVRAM configuration file. The router will be up, but with a default configuration; this enables

a console user to log in, enter privileged mode, and change any encrypted passwords or view

any unencrypted passwords. To cause the router to ignore NVRAM at boot time, the

configuration register must be changed. To do that, you must be in privileged mode—and if you

were already there, you could reset any encrypted passwords or view any unencrypted ones.

It seems to be a viscious circle.

The two keys to password recovery are knowing that rommon enables you to reset the

configuration register and that a console user can get into rommon mode by pressing the Break

key during the first 60 seconds after power-on of the router. Knowing how to reset the config

register enables you to boot the router (ignoring NVRAM), allowing the console user to see or

change the unencrypted or encrypted passwords, respectively.

The process is slightly different for different models of routers, although the concepts are

identical. Table 2-7 outlines the process for each type of router.

Table 2-7 Password Recovery

Step Function

How to Do This for 1600,

2600, 3600, 4500, 7200,

7500

How to Do This for 2000,

2500, 3000, 4000, 7000

1 Turn router off and then back

on again.

Use the power switch. Same as other routers.

2 Press the Break key within

the first 60 seconds.

Find the Break key on your

console devices keyboard.

Same as other routers.

3 Change the configuration

register so that bit 6 is 1.

Use the rommon command

confreg, and answer the

prompts.

Use the rommon command

o/r 0x2142.

4 Cause the router to load

an IOS.

Use the rommon reload

command or, if unavailable,

power off and on.

Use rommon command

initialize.

5 Avoid using setup mode,

which will be prompted for

at console.

Just say no. Same as other routers.

Managing IOS Images 53

A few nuances need further explanation. First, the confreg rommon command prompts you

with questions that correspond to the functions of the bits in the configuration register. When

the prompt asks, “Ignore system config info[y/n]?”, it is asking you about bit 6. Entering yes

sets the bit to 1. The rest of the questions can be defaulted. The last confreg question asks,

“Change boot characteristics[y/n]?”, which asks whether you want to change the boot field of

the config register. You don’t really need to change it, but the published password recovery

algorithm lists that step, which is the only reason that it is mentioned here. Just changing bit 6

to 1 is enough to get the router booted and you into privileged mode to find or change the

passwords.

The original configuration is lost through this process, but you can overcome that. When you

save the configuration in Step 10, you are overwriting the config in NVRAM. There was no

configuration in the running config except default and the few things you configured. So, before

Step 8, you might want to perform a copy startup-config running-config command and then

proceed with the process.

6 Enter privileged mode at

console.

Press Enter and use enable

command (no password

required).

Same as other routers.

7 View startup config to see

unencrypted passwords.

Use exec command show

startup-config.

Same as other routers.

8 Use appropriate config

commands to reset

encrypted commands.

For example, use enable

secret xyz123 command to

set enable secret password.

Same as other routers.

9 Change config register back

to original value.

Use config command

Config-reg 0x2102.

Same as other routers.

10 Reload the router after

saving the configuration.

Use the copy runningconfig

startup-config and

reload commands.

Same as other routers.

Table 2-7 Password Recovery (Continued)

Step Function

How to Do This for 1600,

2600, 3600, 4500, 7200,

7500

How to Do This for 2000,

2500, 3000, 4000, 7000

54 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Foundation Summary

The Foundation Summary is a collection of tables and figures that provide a convenient review

of many key concepts in this chapter. For those of you already comfortable with the topics in

this chapter, this summary could help you recall a few details. For those of you who just read

this chapter, this review should help solidify some key facts. For any of you doing your final

preparation before the exam, these tables and figures will be a convenient way to review the day

before the exam.

Table 2-8 reviews the different types of passwords and the configuration for each type.

Table 2-9 lists the commands used to manipulate previously typed commands.

Table 2-8 CLI Password Configuration

Access from . . . Password Type Configuration

Console Console password line console 0

login

password faith

Auxiliary Auxiliary password line aux 0

login

password hope

Telnet vty password line vty 0 4

login

password love

Table 2-9 Key Sequences for Command Edit and Recall

Keyboard Command What the User Gets

Up-arrow or Ctrl+p This calls up the most recently used command. If pressed again,

the next most recent command appears, until the history buffer is

exhausted. (The p stands for previous.)

Down-arrow or Ctrl+n If you have gone too far back into the history buffer, these keys will

go forward, in order, to the more recently typed commands.

(The n stands for next.)

Left-arrow or Ctrl+b This moves the cursor backward in the currently displayed

command without deleting characters. (The b stands for back.)

Right-arrow or Ctrl+f This moves the cursor forward in the currently displayed command

without deleting characters. (The f stands for forward.)

Foundation Summary 55

Table 2-10 summarizes the use of the configuration register and the boot system command at

initialization.

Backspace This moves the cursor backward in the currently displayed

command, deleting characters.

Ctrl+a This moves the cursor directly to the first character of the currently

displayed command.

Ctrl+e This moves the cursor directly to the end of the currently displayed

command.

Esc+b This moves the cursor back one word in the currently displayed

command.

Esc+f This moves the cursor forward one word in the currently displayed

command.

Ctrl+r This creates a new command prompt, followed by all the

characters typed since the previous command prompt. This is

particularly useful if system messages confuse the screen and it

is unclear what the user has typed so far.

Table 2-10 boot system Command

Value of

Boot Field Boot System Commands Result

0x0 Ignored if present ROM monitor mode, a low-level problem

determination mode, is entered.

0x1 Ignored if present IOS from ROM is loaded.

0x2-0xF No boot command The first IOS file in flash is loaded; if that

fails, IOS from ROM is loaded. If that fails,

the router broadcasts looking for an IOS on a

TFTP server.

0x2-0xF boot system ROM IOS from ROM is loaded.

0x2-0xF boot system flash The first file from Flash memory is loaded.

0x2-0xF boot system flash filename IOS with name filename is loaded from Flash

memory.

0x2-0xF boot system tftp 10.1.1.1 filename IOS with name filename is loaded from the

TFTP server.

0x2-0xF Multiple boot system commands,

any variety

An attempt occurs to load IOS based on the

first boot command in configuration. If that

fails, the second boot command is used, and

so on, until one is successful.

Table 2-9 Key Sequences for Command Edit and Recall (Continued)

Keyboard Command What the User Gets

56 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Figure 2-13 summarizes the use of memory in Cisco routers.

Figure 2-14 illustrates the relationships among configuration mode, user EXEC mode, and

priviledged EXEC mode.

The copy command is used to move configuration files among RAM, NVRAM, and a TFTP

server. The files can be copied between any pair, as Figure 2-15 illustrates.

58 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Q&A

As mentioned in Chapter 1, the questions and scenarios in this book are more difficult than what

you should experience on the actual exam. The questions do not attempt to cover more breadth

or depth than the exam; however, they are designed to make sure that you know the answer.

Rather than allowing you to derive the answer from clues hidden inside the question itself, the

questions challenge your understanding and recall of the subject. Questions from the “Do I

Know This Already?” quiz from the beginning of the chapter are repeated here to ensure that

you have mastered the chapter’s topic areas. Hopefully, these questions will help limit the

number of exam questions on which you narrow your choices to two options and then guess.

Make sure to use the CD and take the simulated exams.

The answers to these questions can be found in Appendix A, on page 703.

1 What are the two names for the router’s mode of operation that, when accessed, enables

you to issue commands that could be disruptive to router operations?

2 What are three methods of logging on to a router?

3 What is the name of the user interface mode of operation used when you cannot issue

disruptive commands?

4 Can the auxiliary port be used for anything besides remote modem user access to a router?

If so, what other purpose can it serve?

5 How many console ports can be installed on a Cisco 7500 router?

6 What command would you use to receive command help if you knew that a show

command option begins with a c, but you cannot recall the option?

7 While you are logged in to a router, you issue the command copy ? and get a response of

“Unknown command, computer name, or host.” Offer an explanation as to why this error

message appears.

8 Is the number of retrievable commands based on the number of characters in each

command, or is it simply a number of commands, regardless of their size?

9 How can you retrieve a previously used command? (Name two ways.)

10 After typing show ip route, which is the only command you typed since logging in to the

router, you now want to issue the show ip arp command. What steps would you take to

execute this command by using command recall keystrokes?

11 After typing show ip route 128.1.1.0, you now want to issue the command show ip route

128.1.4.0. What steps would you take to do so, using command recall and command

editing keystrokes?

Q&A 59

12 What configuration command causes the router to require a password from a user at the

console? What configuration mode context must you be in—that is, what command(s)

must be typed before this command after entering configuration mode? List the

commands in the order in which they must be typed while in config mode.

13 What configuration command is used to tell the router the password that is required at the

console? What configuration mode context must you be in—that is, what command(s)

must you type before this command after entering configuration mode? List the

commands in the order in which they must be typed while in config mode.

14 What are the primary purposes of Flash memory in a Cisco router?

15 What is the intended purpose of NVRAM memory in a Cisco router?

16 What does the NV stand for in NVRAM?

17 What is the intended purpose of RAM in a Cisco router?

18 What is the main purpose of ROM in a Cisco router?

19 What configuration command would be needed to cause a router to use an IOS image

named c2500-j-l.112-14.bin on TFTP server 128.1.1.1 when the router is reloaded? If you

forgot the first parameter of this command, what steps must you take to learn the correct

parameters and add the command to the configuration? (Assume that you are not logged

in to the router when you start.)

20 What command sets the password that would be required after typing the enable

command? Is that password encrypted by default?

21 To have the correct syntax, what must you add to the following configuration command:

banner This is Ivan Denisovich’s Gorno Router—Do Not Use

22 Name two commands that affect the text used as the command prompt.

23 When using setup mode, you are prompted at the end of the process as to whether you

want to use the configuration parameters you just typed in. Which type of memory is this

configuration stored into if you type yes?

24 What two methods could a router administrator use to cause a router to load the IOS stored

in ROM?

25 What could a router administrator do to cause a router to load file xyz123.bin from TFTP

server 128.1.1.1 upon the next reload? Is there more than one way to accomplish this?

26 What is the process used to update the contents of Flash memory so that a new IOS in a

file called c4500-d-mz.120-5.bin on TFTP server 128.1.1.1 is copied into Flash memory?

27 Name three possible problems that could prevent the command boot system tftp

c2500-j-l.112-14.bin 128.1.1.1 from succeeding.

60 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

28 Two different IOS files are in a router’s Flash memory: one called c2500-j-l.111-3.bin and

one called c2500-j-l.112-14.bin. Which one does the router use when it boots up? How

could you force the other IOS file to be used? Without looking at the router configuration,

what command could be used to discover which file was used for the latest boot of the

router?

29 What does CDP stand for?

30 On what type of interfaces is CDP enabled by default? (Assume IOS versions 11.0 and

later.)

31 What command can be used to provide as much detailed information as possible with

CDP?

32 Is the password required at the console the same one that is required when Telnet is used

to access a router?

33 How could a router administrator disable CDP?

34 Which IP routing protocols could be enabled using setup?

35 Name two commands used to view the configuration to be used at the next reload of the

router. Which one is a more recent addition to the IOS?

36 Name two commands used to view the configuration that is currently used in a router.

Which one is a more recent addition to the IOS?

37 True or False: The copy startup-config running-config command always changes the

currently used configuration for this router to exactly match what is in the startup

configuration file. Explain.

Scenario 2-1 61

Scenarios

Scenario 2-1

Compare the following output in Example 2-7 and Example 2-8. Example 2-7 was gathered at

11:00 a.m., 30 minutes earlier than Example 2-8. What can you definitively say happened to

this router during the intervening half hour?

Example 2-7 11:00 a.m. show running-config

hostname Gorno

!

enable password cisco

!

interface Serial0

ip address 134.141.12.1 255.255.255.0

!

interface Serial1

ip address 134.141.13.1 255.255.255.0

!

interface Ethernet0

ip address 134.141.1.1 255.255.255.0

!

router rip

network 134.141.0.0

!

line con 0

password cisco

login

line aux 0

line vty 0 4

password cisco

login

Example 2-8 11:30 a.m. show running-config

hostname SouthernSiberia

prompt Gorno

!

enable secret $8df003j56ske92

enable password cisco

!

interface Serial0

ip address 134.141.12.1 255.255.255.0

!

interface Serial1

ip address 134.141.13.1 255.255.255.0

!

interface Ethernet0

ip address 134.141.1.1 255.255.255.0

no cdp enable

continues

62 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Questions on Scenario 2-1

1 During the process of changing the configuration in Scenario 2-1, the command prompt

temporarily was SouthernSiberia(config)#. What configuration commands, and in what

order, could have changed the configuration as shown and allowed the prompt to

temporarily be SouthernSiberia(config)#?

2 Assuming that Figure 2-18 is complete, what effect does the no cdp enable command

have?

!

router rip

network 134.141.0.0

!

line con 0

password cisco

login

line aux 0

line vty 0 4

password cisco

Login

Example 2-8 11:30 a.m. show running-config (Continued)

Scenario 2-2 63

Scenario 2-2

Example 2-9 shows that the running-config command was executed on the Nova router.

Questions on Scenario 2-2

1 If this is all the information that you have, what IOS do you expect will be loaded when

the user reloads Nova?

2 Examine the following command output in Example 2-10, taken immediately before the

user is going to type the reload command. What IOS do you expect will be loaded?

Example 2-9 Configuration of Router Nova

hostname Nova

banner # This is the router in Nova Sibiersk; Dress warmly before entering! #

!

boot system tftp c2500-js-113.bin 134.141.88.3

boot system flash c2500-j-l.111-9.bin

boot system rom

!

enable password cisco

!

interface Serial0

ip address 134.141.12.2 255.255.255.0

!

interface Serial1

ip address 134.141.23.2 255.255.255.0

!

interface TokenRing0

ip address 134.141.2.2 255.255.255.0

!

router rip

network 134.141.0.0

!

line con 0

password cisco

login

line aux 0

line vty 0 4

password cisco

login

Example 2-10 show ip route on Nova

Nova#show ip route

Codes: C – connected, S - static, I - IGRP, R - RIP, M – mobile, B – BGP

D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

E1 - OSPF external type 1, E2 - OSPF external type 2, E – EGP

i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default

U - per-user static route, o – ODR

Gateway of last resort is not set

continues

64 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

3 Now examine the following show flash command in Example 2-11, which was issued

immediately after the show ip route command in Example 2-10, but before the user

issued the reload command. What IOS do you think would be loaded in this case?

4 Now examine the configuration in Example 2-12. Assume that there is now a route

to 134.141.88.0 and that the file c2500-j-l.111-9.bin is an IOS image in Flash memory.

What IOS do you expect will be loaded now?

134.141.0.0/24 is subnetted, 6 subnets

C 134.141.2.0 is directly connected, TokenRing0

R 134.141.3.0 [120/1] via 134.141.23.3, 00:00:15, Serial1

R 134.141.1.0 [120/1] via 134.141.12.1, 00:00:20, Serial0

C 134.141.12.0 is directly connected, Serial0

R 134.141.13.0 [120/1] via 134.141.12.1, 00:00:20, Serial0

[120/1] via 134.141.23.3, 00:00:15, Serial1

C 134.141.23.0 is directly connected, Serial1

Example 2-11 show flash on Router Nova

Nova#show flash

4096K bytes of flash memory sized on embedded flash.

File name/status

0 c2500-j-l.111-3.bin

[682680/4194304 bytes free/total]

Example 2-12 show running-config on Router Nova

hostname Nova

banner # This is the router in Nova Sibiersk; Dress warmly before entering! #

!

boot system tftp c2500-js-113.bin 134.141.88.3

boot system flash c2500-j-l.111-9.bin

!

enable password cisco

!

interface Serial0

ip address 134.141.12.2 255.255.255.0

!

interface Serial1

ip address 134.141.23.2 255.255.255.0

!

interface Ethernet0

ip address 134.141.2.2 255.255.255.0

!

router rip

network 134.141.0.0

!

line con 0

password cisco

login

Example 2-10 show ip route on Nova (Continued)

Scenario 2-2 65

line aux 0

line vty 0 4

password cisco

login

!

config-register 0x2101

Example 2-12 show running-config on Router Nova (Continued)

66 Chapter 2: Cisco Internetwork Operating System (IOS) Fundamentals

Answers to Scenarios

Scenario 2-1 Answers

In Scenario 2-1, the following commands were added to the configuration:

enable secret as a global command.

prompt as a global command.

no cdp enable as an Ethernet0 subcommand.

The hostname command also was changed.

The scenario questions’ answers are as follows:

1 If the host name was changed to SouthSiberia first and the prompt command was added

next, the prompt would have temporarily been SouthSiberia. Configuration commands are

added to the RAM configuration file immediately and are used. In this case, when the

prompt command was added, it caused the router to use “Gorno,” not the then-current

host name “SouthernSiberia,” as the prompt.

2 No practical effect takes place. Because no other Cisco CDP-enabled devices are on that

Ethernet, CDP messages from Gorno are useless. So, the only effect is to lessen the

overhead on that Ethernet in a very small way.

3 No effect takes place other than cleaning up the configuration file. The enable password

is not used if an enable secret is configured.

Scenario 2-2 Answers

The answers to the questions in Scenario 2-2 are as follows:

1 The first boot system statement would be used: boot system tftp c2500-js-113.bin

134.141.88.3.

2 The boot system flash command would be used. The TFTP boot would presumably fail

because there is not currently a route to the subnet of which the TFTP server is a part. It

is reasonable to assume that a route would not be learned 2 minutes later when the router

had reloaded. So, the next boot system command (flash) would be used.

3 The boot system ROM command would be used. Because there is no file in Flash called

c2500-j-l.111-9.bin, the boot from Flash memory would fail as well, leaving only one

boot command.

4 The IOS from ROM would be loaded due to the configuration register. If the configuration

register boot field is set to 0x1, boot system commands are ignored. So, having a route to

the 134.141.88.0/24 subnet and having c2500-j-l.111-9.bin in Flash memory does not

help.