NWIT 252 - Cisco Networking 2
(G only) CE
An examination of initial router configuration, Cisco IOS Software management, routing protocol configuration, TCP/IP. Students configure routers, manage Cisco IOS Software, configure routing protocols, and manage VLSM. This course is the second in a series of four designed to help prepare students to take the CCNA certification exam. This course is equivalent to CyberWATCH course CW 151. PREREQUISITE(S): NWIT 151 or completion of Cisco Academy Semester 1 (Exploration 1), or consent of department. Three hours each week. Formerly NW 252.
3 semester hours
Upon course completion, a student will be able to:
- Describe different types of WAN connections, encapsulation, and protocols; the difference between a WAN and a LAN and the standards and protocols each uses; which organizations are responsible for WAN standards; the role of a router in a WAN; the physical characteristics of a router; the common ports on a router; the internal components of a router and their functions; and how Ethernet, serial WAN, and console ports are properly connected.
- Describe the steps required to establish a HyperTerminal session, the steps required to log in to a router, how to use the Help feature in the command-line interface (CLI), some ways to troubleshoot command errors, the basic operation and features of Cisco IOS Software, methods of troubleshooting Cisco IOS Software, uses of the show version command, the use of the various router user interfaces and modes, methods used to establish a CLI session with the router, and commands and steps used to alternate between the user command executive (EXEC) and privileged EXEC modes.
- Describe commands used to name a router, how administrators set passwords on a router, the use of the show commands, the command and steps required to configure a serial interface, the command and steps required to configure an Ethernet interface, how an administrator executes changes to a router, how an administrator saves changes to a router, the command and steps required to configure an interface description, the command and steps required to configure a log-in banner, the command and steps required to configure host tables, the purpose of backup documentation, and the steps for password recovery on a router.
- Describe some of the methods to implement, monitor, and maintain Cisco Discovery Protocol (CDP); how CDP creates a network map of the environment; the commands to disable and troubleshoot CDP; some of the reasons to Telnet remotely to other routers; the commands to verify, disconnect, and suspend a Telnet connection; the forms of alternative connectivity tests; uses of the show cdp neighbors command; how to determine which neighboring devices are connected to which local interfaces; how CDP gathers the neighboring devices, network address information; and the methods to troubleshoot remote terminal connections.
- Describe the stages of the router boot sequence, how Cisco devices locate and load Cisco IOS Software, what the boot system command is used for, the configuration register values, the methods and processes used to locate Cisco IOS Software, the processes and commands used to create and load a software image and configuration file backup, the Cisco IOS Software naming conventions, what files are used by the Cisco IOS and their functions, the locations of the router of the different file types, what each part of the IOS name represents, the steps and processes to save and restore configuration files using TFTP and copy-and-paste, the steps and commands to load an IOS image using TFTP, the steps and commands to load an IOS image using TFTP, and the steps and commands to load an IOS image using XModem.
- Describe the basic principles of routing, the difference between routed and routing protocols, what interior and exterior protocols are used for in routing, the difference between static versus dynamic routes, how static routes are configured, how default routes are configured, some methods for troubleshooting static route configurations, why dynamic routing protocols are necessary, distance vector routing, link-state routing, and how different routing protocols are used in context.
- Describe the steps for initial router configuration, the defining characteristics of RIP, steps and commands to configure a RIP routing scenario, the defining characteristics of IGRP, steps and commands to configure an IGRP routing scenario, load balancing over multiple paths, how routing loops occur in distance vector routing, methods used by distance vector routing protocols to ensure that routing information is accurate, the use of the ip classless command, and methods and techniques to troubleshoot RIP.
- Describe the important uses of ICMP, some of the ICMP error message types and how they are identified, potential causes of specific ICMP error messages and how they are identified, some of the kinds of ICMP control messages used in networks today, and some of the possible events that can cause ICMP control messages.
- Describe some methods of performing basic network testing, some methods used to examine the routing table, how the ping command is used to perform basic network connectivity tests, how the telnet command is used to verify the application layer software between source and destination hosts, some of the methods of troubleshooting by testing OSI layers, how the show interfaces command is used to confirm Layer 1 and Layer 2 problems, how the show ip route and show ip protocol commands are used to identify routing issues, how the show cdp command is used to verify Layer 2 connectivity, how the traceroute command is used to identify the path that a packet takes between networks, how the show controller serial command is used to ensure that the proper cable is attached, and how the basic debug command is used to show router activity.
- Describe a positive acknowledgement and retransmission (PAR) and how it relates to TCP, how TCP relates to multiple conversations between hosts, the ports used for services and clients, the well-known ports, the relationship between MAC addresses, IP addresses, and port numbers, the primary functions of TCP, TCP synchronization and flow control, the primary processes and operations of the User Datagram Protocol (UDP), and the common port numbers and what they are used for.
- Describe some of the uses and/or purposes of ACLs, how ACLs provide security and/or control to a network, how to determine which wildcard mask to use, the difference between standard ACLs, extended ACLs, and named ACLs, and ways in which ACLs relate to firewall architecture.
- Be prepared for more specialized networking skills such as: switching basics and intermediate routing
Click here for the Summer I 2020 Class Schedule
Click here for the Summer II 2020 Class Schedule
Click here for the Fall 2020 Class Schedule
Add to Favorites (opens a new window)