Criteria |
CCNA |
CCNP |
---|---|---|
Prerequisites | There are no prerequisites for taking CCNA. | While for CCNP, qualifying CCNA or CCIE in any track is a must. |
Knowledge required | It requires a test on routing fundamentals and switching. | While CCNP requires a deep understanding and knowledge of LANs and WANs. |
Skill Set | CCNA Builds up a strong networking base. | While CCNP exposes to the deep knowledge of advanced networking technologies. |
Job roles | Network technician, Service desk technician/Engineer, Helpdesk Engineer, Network support engineer, etc. | IT Team Leader, System Engineer, Network Engineer, Network Specialist, Network Analyst, etc. |
Router1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router1(config)#enable password oreilly
Router1(config)#line vty 0 4
Router1(config-line)#password cookbook
Router1(config-line)#line con 0
Router1(config-line)#password cookbook
Router1(config-line)#line aux 0
Router1(config-line)#password cookbook
Router1(config-line)#exit
Router1(config)#service password-encryption
Router1(config)#end
Router1#
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#service password-encryption
Router(config)#^Z
enable secret 5 $1$Guks$Ct2/uAcSKHkcxNKyavE1i1
enable password 7 02030A5A46160E325F59060B01
!
username jdoe password 7 09464A061C480713181F13253920
username rsmith password 7 095E5D0410111F5F1B0D17393C2B3A37
!
line con 0
exec-timeout 5 0
password 7 110A160B041D0709493A2A373B243A3017
login local
transport input none
line aux 0
exec-timeout 5 0
password 7 0005061E494B0A151C36435C0D
login tacacs
transport input all
line vty 0 4
exec-timeout 5 0
password 7 095A5A1054151601181B0B382F
login
transport input ssh
1 |
router#configure terminal |
Enters the device into global configuration mode |
2 |
router(config)#interface interface-id |
Enters the device into interface configuration mode |
3 |
router(config-if)#switchport mode {access | trunk} |
Statically configures the switchport into access or trunk mode |
4 |
router(config-if)#switchport port-security |
Enables switchport port security |
5 |
router(config-if)#switchport port-security maximum value [vlan {vlan-id | {access | voice}] |
Configures the maximum number of MAC addresses that are permitted by switchport security; by default this is set to 1 MAC address. |
6 |
router(config-if)#switchport port-security violation {protect | restrict | shutdown [vlan]} |
Configures the switchport security violation mode; by default this is set to shutdown. |
7 |
router(config-if)#switchport port-security mac-address mac-address [vlan {vlan-id | {access | voice}] |
Configures a static secure MAC address on a switchport |
8 |
router(config-if)#switchport port-security mac-address sticky |
Configures the use of sticky learning on a switchport |
9 |
router(config-if)#switchport port-security aging {static | time time| type {absolute | inactivity}} |
Configures the use of switchport port-security aging, the aging time and/or the aging type. The default is for switchport port-security aging to be disabled. |
Sources : Cisco, and more..