1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu CCNA v2.0 Review Critical Concepts of the 640-802 CCNA Exam ppt

33 569 1
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Critical Concepts of the 640-802 CCNA Exam
Tác giả Rick Chapin
Người hướng dẫn Eric Vanderburg, certmag.com
Trường học Global Knowledge Training LLC
Chuyên ngành Networking/Cisco CCNA Certification
Thể loại Bài giảng
Năm xuất bản 2007
Định dạng
Số trang 33
Dung lượng 630,46 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

This new curriculum also includes but is not limited to the use of these protocols: IP,Enhanced Interior Gateway Routing Protocol EIGRP, Serial Line Interface Protocol Frame Relay, Routi

Trang 2

Rick Chapin, Global Knowledge Instructor

prod-On June 25, 2007, Cisco announced major updates to their CCNA curricula, including the new version of the CCNA Composite Exam

(640-802 CCNA) According to Cisco, this new curriculum includes “basic mitigation of security threats, introduction to wireless networking cepts and terminology, and performance-based skills This new curriculum also includes (but is not limited to) the use of these protocols: IP,Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2(RIPv2),VLANs, Ethernet, access control lists (ACLs).”1

con-To reflect these changes, we have updated our popluar overview,CCNA Review, to bring you CCNA v2.0 Review This paper can help dents understand what types of information would be required to pass the new version of the composite exam by providing a convenientreview of the exam’s critical concepts

Trang 3

stu-OSI Layer Upper or Data Flow Layer Network Reference Network Device

OSI Reference Points

Application Provides services to network applications This layer is

responsible for determining resource availability, fying communications peers, and synchronizing commu-nications between the applications

identi-• Simple Mail Transport Protocol (SMTP)

• Telnet

• File Transfer Protocol (FTP)

• Trivial File Transfer Protocol (TFTP)

• HyperText transfer Protocol (HTTP)Presentation Provides the coding and conversion functions that are

applied to the data to/from the Application layer Thislayer ensures that there is a common scheme used tobundle the data between the two ends There are vari-ous examples and this list is by no means complete

Text can be either ASCII or EBCDIC Images can beJPEG, GIF, or TIFF Sound can be MPEG or Quicktime

layer applications This layer is responsible for ing, maintaining, and terminating such sessions

establish-• Session Control Protocol (SPC)

• Remote Procedure Call (RPC) from Unix

• Zone Information Protocol (ZIP) from AppleTalkTransport Responsible for end-to-end data transmission These

communications can be either reliable ented) or non-reliable (connectionless) This layer organ-izes data from various upper layer applications intodata streams The transport layer also handles end-to-end flow control, multiplexing, virtual circuit manage-ment, and error checking and recovery

(connection-ori-• Transmission Control Protocol (TCP) from IP

• User Datagram Protocol (UDP) from IP

OSI Layers

Trang 4

Network Uses administrator-defined logical addressing to

com-bine many data flows into an internetwork This layerallows both connection-oriented and connectionless dataflows to access the network The network layer address-

es help define a network hierarchy Network devices arenormally grouped together based on their commonNetwork Layer address

• Internet Protocol (IP)

Data Link Provides either reliable or non-reliable transmission of

data across a physical medium Most networks use anon-reliable data link layer, such as Ethernet or TokenRing The data Link Layer provides a physical address toeach device called a Media Access Control (MAC)address MAC addresses are typically burned into thenetwork interface card (NIC) The Data Link Layer alsouses a Logical Link Control (LLC) to determine the type

of Network Layer data is traveling inside the frame

LAN:

• Ethernet/IEEE 802.3 (include Fast Ethernet)

• 802.3z (Gigabit Ethernet)

• Token Ring /IEEE 802.5

• FDDI (from ANSI)WAN:

• High-Level Data-link Control (HDLC)

• Point-to-Point Protocol (PPP)

• Frame RelayPhysical Defines the electrical, mechanical, and functional specifi-

cations for maintaining a physical link between networkdevices This layer is responsible for such characteristics

as voltage levels, timing and clock rates, maximum mission distances, and the physical connectors used

trans-LAN:

• Category 3 cabling (LAN)

• Category 5 cabling (LAN)WAN:

• EIA/TIA-232

• EIA/TIA-449

• V.35

Network Hierarchy

Core To move network traffic as fast as possible

Characteristics include fast transport to enterprise ices and no packet manipulation

serv-• High-speed routers

• Multi-layer switches

Distribution Perform packet manipulation such as filtering (security),

routing (path determination), and WAN access (frameconversion) The distribution layer collects the variousaccess layers Security is implemented here, as well asbroadcast and multicast control Media translationbetween LAN and WAN frame types also occurs here

• Routers

Access Where end-stations are introduced to the network This

is the entry point for virtually all workstations

• Switches

• Bridges

OSI Layers continued

Trang 5

LAN Switch Functions

Address Learning Dynamically learns MAC addresses that arrive in the switch by reading the sources MAC address of each

arriving frame If this address is not in the current MAC table, and there is enough space to store it, theaddress and the inbound port are stored

Forward/Filter Compare the destination MAC address of the arriving frame to the dynamically-learned MAC table If the

address is in the table only forward the frame out the port specified in the table, thus filtering it from otherports If the MAC address is not in the MAC table (unknown MAC address) or it is a broadcast or multicastframe, the frame is flooded out every other port except the one it arrived from

Loop Avoidance Since the default behavior of a switch is to forward unknown unicast, broadcast, and multicast frames, it is

possible for one frame to Loop endlessly through a redundant (multiple path) network Thus the SpanningTree Protocol (STP) is turned on to discourage loops in a redundant switch network

Sources of Switching/Bridging Loops

Redundant Topology Unknown Frames are flooded out all ports If there are multiple paths, than a flood would go out all ports,

except the originator, and come back in on the other ports, thus creating a loop

Multiple Frame Copies Two machines live (connect) on the same wire They send frames to each other without assistance If there

are two bridges/switches attached to the same wire, who are also connected together, then new frames(unknown) going from one machine (same wire) would go directly to the other machine (same wire) andwould also be flooded through the bridges/switches (connected wire) and be flooded back through thebridges/switches to the original wire The receiving machine would receive multiple copies of the same frame.MAC Database Instability Thanks to a bridging/switching loop (senairo above), one bridge/switch learns the same MAC address on dif-

ferent ports Thus, if a bridge/switch needed to forward a frame to its destination MAC address, it would havetwo possible destination ports

Solution to Bridging/Switching Loops – 802.1d Spanning Tree Protocol

• Bridges/switches communicate with Bridge Protocol Data Units (BPDUs) The BPDU carries the Bridge ID and the Root ID

• Each bridge/switch has a unique Bridge ID, which is the priority (or priority and extend system ID) followed by the base MAC address ofthe bridge/switch Only the priority (or priority and extend system ID) can be modified

• The device with the lowest Bridge ID becomes the Root

• Only the Root is allowed to send BPDUs

• Initially, prior to receiving any BPDUs from other devices, every bridge/switch thinks it is the Root, and thus sends a BPDU to every otherBridge/switch This always occurs when a new Bridge/switch is added to an existing network

• After the round of BPDUs, every bridge/switch becomes aware of the lowest Bridge ID (the Root device) Only the Root continues to sendBPDUs

• BPDUs are sent, by default, every two (2) seconds

• Every Bridge/switch receives BPDUs from the Root If multiple BPDUs are received, then there must be a loop in the network The BPDUwith the lowest cost is the best path to the Root

• The goal of every non-root bridge/switch is to find the most efficient path to the Root

• Ports that are not the most efficient path to the root, and are not needed to reach any other downstream bridge/switch, are blocked.Blocked ports still receive BPDUs

• If the primary path ceases to receive a BPDU, STP eventually forwards packets on an alternate port Blocked ports are re-evaluated to findthe most efficient and that port is un-blocked so a path can be reestablished to the root

Trang 6

• Forwarding ports are also called Designated ports (DP).

• Blocked ports are also called non-Designated ports (BLK)

• The port that is forwarding to the Root is called the Root port (RP)

• The Root Bridge/switch ports never block and are always designated ports (DP)

• Bridge/switch convergence is the time between a break occurring and an STP calculating an alternate path Typically 30 – 50 seconds

• Port convergence is the time it takes for STP to calculate whether a port will be in forwarding or blocking mode Typically 50 seconds

Solution to Bridging/switching Loops – 802.1w Rapid Spanning Tree Protocol

• Enhancement to the 802.1d Spanning Tree Protocol by providing for faster spanning tree convergence after a topology change

• Incorporates features equivalent to Cisco PortFast, UplinkFast and BackboneFast for faster network reconvergence

• Portfast provides immediate transition of the port into STP forwarding mode upon linkup The port still participates in STP so if the port is

to be a part of the loop, the port eventually transitions into STP blocking mode

• UplinkFast provides improved convergence time of the Spanning-Tree Protocol (STP) in the event of the failure of an uplink on an accessswitch UplinkFast only reacts to direct link failure so a port on the access switch must physically go down in order to trigger the feature

• BackboneFast, once enabled on all switches of a bridge network, can save a switch up to 20 seconds (max_age) when it recovers from anindirect link failure

• Changes have been introduced to the BPDU format Two flags, Topology Change (TC) and TC Acknowledgment (TCA), are defined and used

in 802.1d, now all six bits of the flag byte that remain are used to Encode the role and state of the port that originates the BPDU andHandle the proposal/agreement mechanism

• BPDU are sent every hello-time, and not simply relayed anymore

• BPDUs are now used as a keep-alive mechanism between bridges

• EDGE port basically corresponds to the PortFast feature, where a port that is directly connected to an end station cannot create a bridgingloop in the network so it transitions to the forwarding state, and skips the listening and learning stages

• LINK TYPE is automatically derived from the duplex mode of a port A port that operates in full-duplex is assumed to be point-to-point,while a half-duplex port is considered as a shared port by default

• There are only three port states left in RSTP that correspond to the three possible operational states The 802.1D disabled, blocking, andlistening states are merged into a unique 802.1w discarding state

STP (802.1D) Port State

RSTP (802.1w) Port State

Is Port Included in Active Topology?

Is Port Learning MAC Addresses?

Disabled Discarding No NoBlocking Discarding No NoListening Discarding Yes NoLearning Learning Yes Yes

Trang 7

Comparison of Bridges and Switches

Software Based Hardware-based (port-level ASICs)

Relatively Slow Comparatively fast

One STP per Bridge Possibly many STPs per switch (possibly one per VLAN)

Typically up to 16 Ports Possibly hundreds of ports

Forwarding Modes in a Switch

Store-and-Forward The entire frame is buffered, the CRC is examined for

errors and frame is checked for correct sizing (Ethernet

64 – 1518 bytes)

Relatively High Varies depending on frame size

Cut-Through The frame is forwarded once the destination MAC

address (first 6 bytes) arrives and is checked against theMAC address table Buffer until the 6th byte arrives

Lowest Fixed delay based on 6 bytes being buffered.Not configurable on a Catalyst 1900

Fragment-Free (Cisco) The frame is forwarded once the first 64 bytes have

arrived Buffering occurs until the 64th byte arrives

Ethernet collisions usually occur within the first 64bytes, thus if 64 bytes arrive there is no collision

Low Fixed delay based on 64 bytes being buffered.Default on Catalyst 1900

Half-Duplex vs Full-Duplex

Half-Duplex • Network devices us the same pair of wire to both transmit and receive

• Only possible to use 50% of the available bandwidth – must use the samebandwidth to send and receive

• Available bandwidth decreases as number of devices in the broadcast domainincreases

• Used through hubs (layer 1 devices) – everyone shares the available bandwidth

10 Mbps 100 Mbps ports if not ured for full-duplex or cannot be Auto-sensed

config-Full-Duplex • Uses one pair of wire for sending and another pair for receiving

• Effectively provides double the bandwidth – possible to send and receive atthe same time

• Must be point-to-point stations, such as pc/server-to-switch or router-to-switch

• Everyone has their own collision domain (individual bandwidth) on eachswitch port

100 Mbps ports if manually configuredfor full-duplex or can be Auto-sensed

Trang 8

LAN Segmentation = Dividing Up the Size of Collision Domains

Bridge Examines destination MAC address and makes filtering/forwarding decisions based on it Unknown, Broadcast, and

Multicast frames are flooded out all ports except the originator Each port of a bridge is a collision domain

Switch (VLANs) Examines destination MAC address and makes filtering/forwarding decisions based on it Unknown, Broadcast, and

Multicast frames are flooded out all ports within that VLAN except the originator Each port of a switch is a collisiondomain Each VLAN is a broadcast domain Benefits include simplifying moves, adds, and changes, reducing adminis-trative costs, controlling broadcasts, tightened security, load distribution, and moving servers into a secure location

Router Examines destination network (logical – layer3) address and makes filtering/forwarding decisions based on it

Unknown and broadcast frames are discarded Each port of a router is both a collision and broadcast domain

TCP/IP Layers

Protocol OSI Reference Function

Transmission Control

Protocol (TCP)

Session Layer – Layer 4 Reliable, connection-oriented, uses sequence and acknowledgement numbers

to provide reliability verifies that the remote end is listening prior to sendingdata (handshake)

User Datagram Protocol

(UDP)

Session Layer – Layer 4 Non-reliable, connectionless, no sequence or acknowledgement numbers, and

no far-end verification

Internet Protocol (IP) Network Layer – Layer 3 Provides the logical addressing structure Offers connectionless, best-effort

delivery of packets (datagrams)

Port Numbers

Well-known port numbers are 1 – 1023 (typically used for well-known applications), random port numbers are 1024 and above (typicallyrandom numbers are used by the client in a client/server application)

Trang 9

IP Protocols

Internet Control Message

Protocol (ICMP)

Provides control and feedback messages between IP devices

Address Resolution Protocol

(ARP)

Using a destination IP address, ARP resolves or discovers the appropriate destination MAC (layer 2) address

to use Map a Layer 3 address to a Layer 2 address

Reverse Address Resolution

Protocol (RARP)

Using a source MAC address, RARP retrieves an IP address form the RARP Server Map sources Layer 2address to a Layer 3 address RARP is an early form of BOOTP and DHCP

* 127 is used for the Loopback address

** Class D is used for Multicast Group addressing, and Class E is reserved for research use only

Class First Binary Bits Numerical Range Number of

Networks

Number of Hosts per Network

Number of Network Octets

Number of Hosts Octets

IP v4 Addresses

Subnetting

Number of networks: 2s– 2, where s = number of bits in the subnet (masked) field

Number of hosts per subnet: 2r– 2, where r = number of host (non-masked) bits

R + S = 32 (always), since there are 32 bits in an IP address and each bit is either a network or host bit S is the bit(s) after the standardClass number of bits (Mask – Class Bits = S)

Subnet Masks

1s in the subnet mask match the corresponding value of the IP address to be Network bits

0s in the subnet mask match the corresponding value in the IP address to be Host bits

Default Subnet Masks

Default Class A mask – 255.0.0.0 = N.H.H.H

Default Class B mask – 255.255.0.0 = N.N.H.H

Default Class C mask – 255.255.255.0 = N.N.N.H

Trang 10

Possible Subnet Mask Values for One Octet

Decimal Mask Network Bits (x) Host Bits (y) Number of Subnets

Possible Class C Subnet Masks

IPv4 vs IPv6 Address

IPv4 Addressing is 4 octets or 32 bits LONG IPv6 Addressing is 16 octets or 128 bits LONG

192.168.128.129 D1DC:C971:D1DC:CC71:D1DC:D971:D1DC:C971

11000000.10101000.10000000.10000001 11010001.11011100.11001001.01110001.11010001.11011100.11001100.01110001.11

010001.11011100.11001001.01110001.1101.0001.11011100.11001001.011100014,294,467,295 IP Addresses 3.4 X 1038 IP addresses

IPv6 Address Types

• Unicast

- Address is for a single interface

- IPv6 has several types (for example, global, reserved, link-local, and

site-local)

• Multicast

- One-to-many

- Enables more efficient use of the network

- Uses a larger address range

• Anycast

- One-to-nearest (allocated from unicast address space)

- Multiple devices share the same address

- All anycast nodes should provide uniform service

- Source devices send packets to anycast address

- Routers decide on closest device to reach that destination

- Suitable for load balancing and content delivery services

Trang 11

Source Description

Static • Manually configured by an administrator

• Must account for every destination network

• Each static route must be configured on each router

• No overhead in processing, sending, or receiving updates

• Saves bandwidth and router CPU

• Routing table maintained by administratorDynamic • A process that automatically exchanges information about available routes

• Uses metrics to determine the best path to a destination network

• The routing protocol must be configured on each router

• Bandwidth is consumed as routing updates are transmitted between routers

• Router CPU is used to process, send, and receive routing information

• Routing table maintained by routing process

Routing

The process of maintaining a table of destination network addresses A router will discard packets for unknown networks

Sources of Routing Information

IPv6 Advanced Features

Larger address space • Global reachability and flexibility

• IPsec mandatory (or native) for IPv6Simpler header • Routing efficiency

• Performance and forwarding rate scalability

• No broadcasts

• No checksums

• Extension headers

• Flow labelsTransition richness • Dual stack

• 6to4 and manual tunnels

Trang 12

Types of Routing Protocol

Interior • Used within a common administrative domain called an Autonomous System (AS)

• Typically a single AS is controlled by a single authority or company

• Interior routing protocols are used within a corporate networkExterior • Used to connect Autonomous Systems

• Exchanges routing information between different administrative domains

• Exterior protocols are used to connect sites within a very large corporate network, or are used to connect to the Internet

Classes of Routing Protocol

Distance Vector • Maintains a vector (direction and distance) to each network in the routing table

• Typically sends periodic (update interval) routing updates

• Typically sends entire routing table during update cycle

• Routing updates are processed and then resent by each router, thus the updates are second-hand information (routing

by rumor)

• Typically prone to routing loops (disagreement between routers) and count to infinity (routing metrics continue toaccumulate indefinitely)

• Solutions to these problems include:

- Spilt Horizon – do not send updates back to where they came from – eliminates back-to-back router loops

- Define a maximum metric – eliminates count to infinity problem

- Route poisoning – set the advertised metric to the maximum value on routes that have gone down

- Poison reverse – overrides split horizon by informing the source of a route that it has gone down

- Hold-down timers – eliminates long-distance loops by ignoring updates about “possibly down” routes that havemetrics worse than the current metric

- Triggered updates – send an individual update immediately when a route is thought to be down, rather than waitfor the periodic update timer (also called flash updates)

Link State • Maintains a complete topological map (database) of entire network, separate from the routing table (forwarding table)

• Sends updates only when necessary

• Only sends information that has changed, not the entire database

• Does not send information from the routing table, but rather from the database

• The initial routing update is sent to every link state router in the network (flooding) via a multicast IP address, not aprocessed copy as with distance vector protocols

• Routing table is individually calculated on each router from its database This process is called Shortest Path First orSPF

• The database typically requires as much memory as the routing table

• When SPF runs, it is CPU intensive

• Uses “hello” packets to maintain a database of link state neighbors throughout the network

Trang 13

Examples of Routing Protocols

Protocol DV or

LS

Internal or External Characteristics

Routing Information

Protocol (RIP)

DV Internal • Sends periodic updates every 30 seconds by default

• Sends the entire routing table out every interface, minus the routes learned from thatinterface (split horizon)

• Uses hop count as a metric

• Has a maximum reachable hop count of 15 (16 is the defined maximum)

• Sends updates out as a broadcast (RIP V1)

• RIP V2 uses a multicast address of 244.0.0.10Interior Gateway

Routing Protocol

(IGRP)

DV Internal • Sends periodic updates every 90 seconds by default

• Sends the entire routing table out every interface, minus the routes learned from thatinterface (split horizon)

• Uses a composite metric consisting of bandwidth, delay, reliability, load, and MTU

• Only uses bandwidth and delay by default (configurable)

• Does track hop count but only uses it as a tie-breaker

• Default maximum hop count is 100, but is configurable up to 255 maximum

• Sends updates out as a broadcastEnhanced Interior

Gateway Routing

Protocol (EIGRP)

Adv DV Internal • Considered an advanced distance vector routing protocol

• Uses a Diffusing update algorithm (DUAL)

• Sends triggered updates when necessary

• Sends only information that has changed, not entire routing table

• Uses a composite metric consisting of bandwidth, delay, reliability, load, and MTU

• Only uses bandwidth and delay by default (configurable)

• Does track hop count but only uses it as a tie-breaker

• Default maximum hop count is 224, but is configurable up to 255 maximum

• Sends updates out on a multicast address of 224.0.0.9Open Shortest Path

First (OSPF)

LS Internal • Sends triggered updates when necessary

• Sends only information that has changed, not entire routing table

• Uses a cost metric

• Interface bandwidth is used to calculate cost (Cisco)

• Uses two multicast addresses of 224.0.0.5 and 224.0.0.6Border Gateway

Protocol (BGP)

DV External • Actually a very advanced distance vector routing protocol

• Sends triggered updates when necessary

• Sends only information that has changed, not entire routing table

• Uses a complex metric system

Trang 14

Routing Configuration Commands

MVRAM Backup (startup) copy of the configuration file, single file only

ROM IOS subset (RxBoot) (only if the hardware supports it

ROM Monitor (ROMMON)Flash Compressed IOS (non-compressed if 2500 series)

Binary file storage capabilities (if enough space)PCMCIA Like Flash, some machines have multiple PCMCIA slots available

Static Router(config)# ip route dest-address subnet-mask next-hop or exit-interface

•dest-network is the network in question

•subnet-mask is the network in question

•next-hop is the network in question

•exit-interface is the network in question

- either the next-hop or exit-interface are used, but not both

Example:

Router# configure terminal

Router(config)# ip route 172.16.0.0 255.255.0.0 serial0

orRouter(config)# ip route 172.16.0.0 255.255.0.0 172.16.1.1

Dynamic Router(config)# router protocol keyword

Router(config-router) network network-number

•protocol is the routing protocol being used

•keyword is an optional parameter for some routing protocols

•network-number is the directly connected network that will be used to send and receive routing updates; enables allinterfaces that use that network address

Example 1:

Router# configure terminal

Router(config)# router rip

Trang 15

Operating Modes of a Router

User Router> • Read-only privileges

• Examine Interface status

• Examine router statusPrivileged Router# • Full privileges to read, write, modify, copy, and delete

• Examine interface status

• Examine router status

• Examine configuration file

• Change IOS and configuration file

Example:

Router> enablepassword password Router#

Configuration Router(config)# • Modify the active (running) configuration file

Example:

Router# configure terminalRouter(config)#

Password Configuration

User Console Port Router# configure terminal

Router(config)# line console 0Router(config-line)# password stringRouter(config-line)# login

User Auxiliary Port Router# configure terminal

Router(config)# line auxiliary 0Router(config-line)# password stringRouter(config-line)# login

User VTY Access Router# configure terminal

Router(config)# line vty 0 4Router(config-line)# password stringRouter(config-line)# login

Privilege (enable) N/A Router# configure terminal

Router(config)# enable password stringPrivilege (secret) N/A Router# configure terminal

Router(config)# enable secret string

Trang 16

Some Miscellaneous IOS Commands

Examine the backup configuration in NVRAM Privileged Router# show startup-config

Examine the active configuration in RAM Privileged Router# show running-config

Display the contents of Flash memory User of Privileged Router> show flash

Save the active configuration to NVRAM Privileged Router# copy running-config startup-configRestore the backup configuration to RAM Privileged Router# copy startup-config running-configSave the active configuration to a TFTP Server Privileged Router# copy running-config tftp

Restore a configuration file from a TFTP

Server

Privileged Router# copy tftp running-configWrite the current IOS out to a TFTP Server Privileged Router# copy flash tftp

Load a different IOS into the router Privileged Router# copy tftp flash

Erase the backup configuration from NVRAM Privileged Router erase startup-config

Boot using a different IOS in Flash Config Router(config)# boot system flash filenameBoot from a TFTP Server Config Router (config)# boot system tftpip-address

filenameConfigure the router as a TFTP Server Config Router(config)# tftp-server flashfilename

Display directly-connected Cisco neighbors User or Privileged Router> show cdp neighbor

Display the command history buffer User or Privileged Router> show history

Configure the length of the history buffer Privileged Router# terminal history size line-countDisplay the current IOS, router run-time,

amount of memory, and interfaces installed

User or Privileged Router> show versionConfigure logout delay Line Config Router(config-line)# exec-timeout minutes

secondsConfigure clocking on a DCE interface Interface Config Router(config-if)# clock rate bps-valueConfigure the bandwidth on an interface Interface Config Router(config-if)# bandwidth Kbps-valueDisplay the IP routing table User or Privileged Router> show ip route

Display the physical characteristics of an

interface

User or Privileged Router> show interfaces type number

Ngày đăng: 17/01/2014, 06:20

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm