0% found this document useful (0 votes)
125 views

Cisco Ccna Commands and Notes

This document provides information on various Cisco CCNA commands and networking concepts. It discusses researching IT job opportunities using sites like Monster.com and Salary.com, viewing wireless and wired network interface card information using ipconfig, mapping the internet using tracert or traceroute to see network hops, using whois to determine domain ownership, how the Domain Name System works to translate names to IP addresses, and accessing network devices securely using SSH instead of unencrypted Telnet.

Uploaded by

Diatomspinalcord
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views

Cisco Ccna Commands and Notes

This document provides information on various Cisco CCNA commands and networking concepts. It discusses researching IT job opportunities using sites like Monster.com and Salary.com, viewing wireless and wired network interface card information using ipconfig, mapping the internet using tracert or traceroute to see network hops, using whois to determine domain ownership, how the Domain Name System works to translate names to IP addresses, and accessing network devices securely using SSH instead of unencrypted Telnet.

Uploaded by

Diatomspinalcord
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CISCO CCNA COMMANDS AND NOTES

Researching IT and Networking Job Opportunities


Open a web browser and go to a job listing website.
In the URL address bar type http://monster.com and press Enter.
Note: For job listings outside of the U.S., use the following link to search for your country:
http://www.monster.com/geo/siteselection/
Search for networking related jobs.
Type the word Network Administrator in the job title box. Click SEARCH to continue.
Now, focus your search by adding terms to the search for Network Administrator. Try terms
like Cisco CCNA, CCNP, CCNA Security, CCNA Voice, etc.
Now try refining your search by adding different geographical locations. Did you find jobs in
the locations you entered?
Try searching a different website. Go to http://salary.com and click the Job Search menu bar
button.
Note: For salary listings outside of the U.S., use the following link to search for your country:
http://www.payscale.com/rccountries.aspx

Viewing Wireless and Wired NIC Information


A wired Ethernet NIC cabled to one of the integrated switch ports on a wireless router and
with the Local Area Connection (wired) enabled. The wireless NIC was disabled initially. If
the wired and wireless NICs are both enabled the PC will receive two different IP addresses
and the wireless NIC will take precedence.

Analyze the MAC address for the PC-A NIC.


Before you analyze the MAC address on PC-A, look at an example from a different PC NIC. You can
issue the ipconfig /all command to view the MAC address of your NIC. An example screen output is
shown below. When using the ipconfig /all command, notice that MAC addresses are referred to as
physical addresses. Reading the MAC address from left to right, the first six hex digits refer to the
vendor (manufacturer) of this device. These first six hex digits (3 bytes) are also known as the
organizationally unique identifier (OUI). This 3-byte code is assigned to the vendor by the IEEE
organization. To find the manufacturer, you can use a tool like www.macvendorlookup.com or go to
the IEEE web site to find the registered OUI vendor codes. The IEEE web site address for OUI
information is http://standards.ieee.org/develop/regauth/oui/public.html. The last six digits are the NIC
serial number assigned by the manufacturer.

Mapping the Internet


Route tracing computer software is a utility that lists the networks data has to traverse from the user's
originating end device to a distant destination network.
This network tool is typically executed at the command line as:
tracert <destination network name or end device address>
(Microsoft Windows systems)
or
traceroute <destination network name or end device address>
(UNIX and similar systems)
The traceroute (or tracert) tool is often used for network troubleshooting. By showing a list of routers
traversed, it allows the user to identify the path taken to reach a particular destination on the network
or across internetworks. Each router represents a point where one network connects to another
network and through which the data packet was forwarded. The number of routers is known as the
number of "hops" the data traveled from source to destination.
Two trace routes between the same source and destination conducted some time apart may produce
different results. This is due to the "meshed" nature of the interconnected networks that comprise the
Internet and the Internet Protocols ability to select different pathways over which to send packets.
Command-line-based route tracing tools are usually embedded with the operating system of the end
device.
Routes traced can go through many hops and a number of different Internet Service
Providers (ISPs), depending on the size of your ISP, and the location of the source and
destination hosts. Each “hop” represents a router. A router is a specialized type of computer
used to direct traffic across the Internet.
The tracert tool shows you what path through the network a packet of information takes to
reach its final destination. The tracert tool also gives you an idea of how fast traffic is going
on each segment of the network. Three packets are sent to each router in the path, and the
return time is measured in milliseconds.
How could we determine if alter.net is another ISP or the same ISP?
There is an Internet tool known as whois. The whois tool allows us to determine who owns a domain
name. A web-based whois tool is found at http://whois.domaintools.com/. This domain is also owned
by Verizon according to the web-based whois tool.

Observing DNS Resolution


The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such
as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is
used. Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over
Secure Socket Layer (HTTPS), and File Transfer Protocol (FTP).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the
domain name (www.cisco.com) to an IP address to allow the source host to reach the destination
host.
Accessing Network Devices with SSH
In the past, Telnet was the most common network protocol used to remotely configure network
devices. Telnet does not encrypt the information between the client and server. This allows a network
sniffer to intercept passwords and configuration information.
Secure Shell (SSH) is a network protocol that establishes a secure terminal emulation connection to a
router or other networking device. SSH encrypts all information that passes over the network link and
provides authentication of the remote computer. SSH is rapidly replacing Telnet as the remote login
tool of choice for network professionals. SSH is most often used to log in to a remote device and
execute commands; however, it can also transfer files using the associated Secure FTP (SFTP) or
Secure Copy (SCP) protocols.
The network devices that are communicating must be configured to support SSH in order for SSH to
function. In this lab, you will enable the SSH server on a router and then connect to that router using a
PC with an SSH client installed. On a local network, the connection is normally made using Ethernet
and IP.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy