This document provides information on various Cisco CCNA commands and networking concepts. It discusses researching IT job opportunities using sites like Monster.com and Salary.com, viewing wireless and wired network interface card information using ipconfig, mapping the internet using tracert or traceroute to see network hops, using whois to determine domain ownership, how the Domain Name System works to translate names to IP addresses, and accessing network devices securely using SSH instead of unencrypted Telnet.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
125 views
Cisco Ccna Commands and Notes
This document provides information on various Cisco CCNA commands and networking concepts. It discusses researching IT job opportunities using sites like Monster.com and Salary.com, viewing wireless and wired network interface card information using ipconfig, mapping the internet using tracert or traceroute to see network hops, using whois to determine domain ownership, how the Domain Name System works to translate names to IP addresses, and accessing network devices securely using SSH instead of unencrypted Telnet.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
CISCO CCNA COMMANDS AND NOTES
Researching IT and Networking Job Opportunities
Open a web browser and go to a job listing website. In the URL address bar type http://monster.com and press Enter. Note: For job listings outside of the U.S., use the following link to search for your country: http://www.monster.com/geo/siteselection/ Search for networking related jobs. Type the word Network Administrator in the job title box. Click SEARCH to continue. Now, focus your search by adding terms to the search for Network Administrator. Try terms like Cisco CCNA, CCNP, CCNA Security, CCNA Voice, etc. Now try refining your search by adding different geographical locations. Did you find jobs in the locations you entered? Try searching a different website. Go to http://salary.com and click the Job Search menu bar button. Note: For salary listings outside of the U.S., use the following link to search for your country: http://www.payscale.com/rccountries.aspx
Viewing Wireless and Wired NIC Information
A wired Ethernet NIC cabled to one of the integrated switch ports on a wireless router and with the Local Area Connection (wired) enabled. The wireless NIC was disabled initially. If the wired and wireless NICs are both enabled the PC will receive two different IP addresses and the wireless NIC will take precedence.
Analyze the MAC address for the PC-A NIC.
Before you analyze the MAC address on PC-A, look at an example from a different PC NIC. You can issue the ipconfig /all command to view the MAC address of your NIC. An example screen output is shown below. When using the ipconfig /all command, notice that MAC addresses are referred to as physical addresses. Reading the MAC address from left to right, the first six hex digits refer to the vendor (manufacturer) of this device. These first six hex digits (3 bytes) are also known as the organizationally unique identifier (OUI). This 3-byte code is assigned to the vendor by the IEEE organization. To find the manufacturer, you can use a tool like www.macvendorlookup.com or go to the IEEE web site to find the registered OUI vendor codes. The IEEE web site address for OUI information is http://standards.ieee.org/develop/regauth/oui/public.html. The last six digits are the NIC serial number assigned by the manufacturer.
Mapping the Internet
Route tracing computer software is a utility that lists the networks data has to traverse from the user's originating end device to a distant destination network. This network tool is typically executed at the command line as: tracert <destination network name or end device address> (Microsoft Windows systems) or traceroute <destination network name or end device address> (UNIX and similar systems) The traceroute (or tracert) tool is often used for network troubleshooting. By showing a list of routers traversed, it allows the user to identify the path taken to reach a particular destination on the network or across internetworks. Each router represents a point where one network connects to another network and through which the data packet was forwarded. The number of routers is known as the number of "hops" the data traveled from source to destination. Two trace routes between the same source and destination conducted some time apart may produce different results. This is due to the "meshed" nature of the interconnected networks that comprise the Internet and the Internet Protocols ability to select different pathways over which to send packets. Command-line-based route tracing tools are usually embedded with the operating system of the end device. Routes traced can go through many hops and a number of different Internet Service Providers (ISPs), depending on the size of your ISP, and the location of the source and destination hosts. Each “hop” represents a router. A router is a specialized type of computer used to direct traffic across the Internet. The tracert tool shows you what path through the network a packet of information takes to reach its final destination. The tracert tool also gives you an idea of how fast traffic is going on each segment of the network. Three packets are sent to each router in the path, and the return time is measured in milliseconds. How could we determine if alter.net is another ISP or the same ISP? There is an Internet tool known as whois. The whois tool allows us to determine who owns a domain name. A web-based whois tool is found at http://whois.domaintools.com/. This domain is also owned by Verizon according to the web-based whois tool.
Observing DNS Resolution
The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is used. Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket Layer (HTTPS), and File Transfer Protocol (FTP). DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (www.cisco.com) to an IP address to allow the source host to reach the destination host. Accessing Network Devices with SSH In the past, Telnet was the most common network protocol used to remotely configure network devices. Telnet does not encrypt the information between the client and server. This allows a network sniffer to intercept passwords and configuration information. Secure Shell (SSH) is a network protocol that establishes a secure terminal emulation connection to a router or other networking device. SSH encrypts all information that passes over the network link and provides authentication of the remote computer. SSH is rapidly replacing Telnet as the remote login tool of choice for network professionals. SSH is most often used to log in to a remote device and execute commands; however, it can also transfer files using the associated Secure FTP (SFTP) or Secure Copy (SCP) protocols. The network devices that are communicating must be configured to support SSH in order for SSH to function. In this lab, you will enable the SSH server on a router and then connect to that router using a PC with an SSH client installed. On a local network, the connection is normally made using Ethernet and IP.