Prepare CCNA


มาเตรียมพร้อมไปสู่ การสอบ CCNA กัน


รายละเอียด การสอบ CCNA และ Resource คร่าวๆ

Learning resources:
  • หลักสูตรของ Cisco เองเลย มีทั้งทฤษฎี และปฏิบัติ ต้องเรียนไปคู่กัน 50/50% สอนตั้งแต่วิธีการติดตั้ง Program Simulate เลย แค่นี้ก็พอจะเป็น Network Engineer ได้แล้ว:


  • CCNA portable command self study pdf
  • CCNA Learning Resource
ข้อคิดเห็นเกี่ยวกับการสอบ Certificate
เฉลย Labs & Activities CCNA คับ (*.pka,*.pkt)
Networker Roadmap
Computer Network Presentations


Share your CCNA Experience


Simulator tool& IOS:
CCNA Simulator Tool
Cisco IOS PACK เอากันให้เครื่องเจ๊งไปเลยยยย

ผ่านสี่ครับท่าน กับทดสอบพระราชา
โทษฐานใช้ Brain Dump จนเคยตัว ต้องมาเริ่มใหม่เมื่อตั้งใจจะสอบ ie


ขั้นตอนการรับใบ Cert หลังจากสอบผ่าน


CCNA ภาษาไทย:
  3. Cisco Basic Network / Pre CCNA:
  4. CCNA 200-301:


200-120 CCNA | Free Cisco Video Training 2015




New member



น่าลองที่สุดๆๆๆๆๆๆๆๆ อีกไม่นานจะตามให้ทัน และแซงพวกพี่ให้ด้ อิอิ

โหะๆๆ ไอ้ตามทันพอไหว แต่จะแซง ยากหน่อย พี่ปืนเค้าขั้นเทพ



Mr.Kyaw wrote:
i am just passed CCNA today, 1-3-2011, from Myanmar.
my score is 1000/1000.
50 question, 2hr exam time.

i attended the CCNA class and i used these. (100%valid) from


  • A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Using either the read-write or read-only community string is most accurately describes how the SNMP agent on a router authenticates any SNMP Get requests received from the NMS.
    SNMPv1 and SNMPv2c use community strings to authenticate Get and Set messages from an NMS. The agent defines a read-only community and can define a read-write community as well. Get requests, which read information, will be accepted if the NMS sends either the read-only or the read-write community with those requests.
  • A router has been configured with the global command snmp-server community textvalue1 RO textvalue2. The meaning of this command are the router's read-only community is textvalue1, and filters incoming SNMP messages using IPv4 ACL textvalue2.
    The first parameter after the community keyword defines the community value. At the end of the command, if a text value is listed but without an ipv6 keyword, the text value is the name of an IPv4 ACL. The ACL (textvalue2 in this case) filters incoming SNMP messages received by the SNMP agent on the device.
  • A router has been configured with the following command: snmp-server group one v3 auth write v1default. A command snmp-server user fred4 one auth sha pass1 would correctly define a user to associate with this SNMPv3 group to correctly define security parameters to work with an SNMP manager.
    To work correctly with an SNMP manager, the snmp-server user command must configure its parameters based on the security level in the referenced group as defined in the referenced snmp-server group command. In this case, the referenced snmp-server group command lists a security level of auth, so the snmp-server user command needs the auth keyword and associated parameters, but not the priv keyword and its associated parameters.
  • show snmp commands primarily lists counters and status information, instead of configuration settings.
  • ICMP Echo-based IP SLA can collect and aggregate historical statistics.
    IP Service Level Agreement (IP SLA) can generate a variety of different types of probes, including some that use ICMP Echo messages, and some that mimic voice traffic. However, the question asks about "ICMP Echo-based" IP SLA, referring to the specific IP SLA probe that sends ICMP Echo Request messages.
    ICMP Echo probes with IP SLA do not require a router to be configured as an IP SLA responder, although many other types of IP SLA probes do require a responder. The Echo probes send a normal ICMP Echo Request, so the probe can be sent to any IP address, relying on that host to send back a normal ICMP Echo Reply.
    IP SLA on the source router will gather basic statistics. With the ICMP Echo probe, the probe does not measure jitter (ruling out another incorrect answer), but it does measure round-trip time (RTT). These statistics can be gathered into a history report, which can be useful when troubleshooting problems.
  • Examine the output taken from a router using IP SLA.


    The probe send ICMP Echos to address and the output confirms that an Echo Reply was received back as well.
    The show ip sla summary command lists one line of information about the most recent attempt to perform the actions of an IP SLA probe. The Type implies an ICMP Echo probe, and the destination defines the IP address to which the Echo is sent. The "OK" return code means not only was the probe message sent, but in this case, that an ICMP Echo Reply packet was received back.
    The Stats column lists the round-trip time (RTT), the two-way delay. The "1" on the far left of the output refers to the IP SLA operation number.
  • Host1 and Host2 connect to ports F0/1 and F0/2 on a LAN switch, respectively, so that frames sent by Host1 to Host2 will enter switch port Fa0/1 and exit switch port F0/2. All FastEthernet ports on the switch are access ports in VLAN 5. A network analyzer connects to port F0/9. A network engineer wants to use SPAN to direct traffic to the network analyzer. Use a SPAN source port of F0/2 for both direction of traffic for what traffic to direct to the analyzer with SPAN, if the goal is to gather all traffic sent between Host1 and Host2, but to avoid gathering multiple copies of the same frames. It will copy all frames sent by Host1 to Host2 (frames that the switch transmits out port F0/2), as well as frames sent by Host2 to Host1 (which will be frames received on switch port F0/2). This option does gather frames sent between Host2 and other hosts as well.
    If collecting from F0/1 for a single (transmit) direction, it gathers too little traffic. Frames sent by Host2 to Host1 would arrive in switch port F0/2 and then be sent out port F0/1 to Host1, and would be copied by the SPAN session. However, frames sent by Host1 would be received on switch port F0/1, and would not be copied by that SPAN session.
    If using VLAN 5 as a source would work, but because all FastEthernet ports on the switch are in VLAN 5, this option gathers more traffic than is necessary.
    If collecting traffic from both F0/1 and F0/2, but in both directions. This option would gather all frames sent between Host1 and Host2 twice, which would work, but more traffic than is required.
  • Using more than one SPAN source port in one SPAN session and an EtherChannel port as a SPAN source port are allowed when configuring Local SPAN sessions.
    Local SPAN has a variety of configuration dependencies. Each Local SPAN session can have multiple sources, but they must be either interfaces or VLANs, and not a mix. Source ports can include both access and trunk ports as well as EtherChannel interfaces. Finally, each SPAN destination port can be used in only one SPAN session at the same time. To reuse that destination port, you must first unconfigure the destination port from the original SPAN session (no monitor session destination) and then configure it to be part of another SPAN session.


  • PaaS cloud services is most likely to be used for software development.

    (Platform as a Service) supplies one or more virtual machines (VM) that

    have a working operating system (OS) as well as a predefined set of

    software development tools.
    Software as a Service (SaaS) supplies a

    predefined software application, but typically with no ability to then

    later install your own applications.
    IaaS (Infrastructure as a

    Service) supplies one or more working virtual machines (VMs), optionally

    with an OS installed, as a place where you can then customize the

    systems by installing your own applications, so it could be used for

    software development, but the developer would have to install a variety

    of development tools, making IaaS less useful than a PaaS service.และ-iaas-คืออะไร

    (Server Load Balancing as a Service) can be offered as a cloud service,

    but it is not a general service in which customers get access to VMs on

    which they can then install their own applications.
  • IaaS cloud services is most likely to be purchased and then used to later install your own software applications.

    as a Service (PaaS) could be used to install your own application,

    because PaaS does supply one or more VMs, but it is most likely used as a

    software development environment, a service designed specifically to be

    used for development, with VMs that include various tools that are

    useful for software development.
  • An enterprise plans to start using a public cloud service, and is considering different WAN options. Using private WAN connections directly to the cloud provider is the most issues if the company chooses one cloud provider but then later wants to change to use a different cloud provider instead.
    Both options that use the Internet allow for easier migration because public cloud providers typically provide easy access over the Internet. An intercloud exchange is a purpose-built WAN service that connects to enterprises as well as most public cloud providers, with the advantage of making the cloud migration process easier. The worst option in terms of being prepared for migrating to a new cloud provider - is to use a private WAN connection to one cloud provider. While useful in other ways, migrating when using this strategy would require installing a new private WAN connection to the new cloud provider.
  • An enterprise plans to start using a public cloud service, and is considering different WAN options. Using private WAN connections directly to the cloud provider and an intercloud exchange provide good security by keeping the data private while also providing good QoS services.
    Private WAN options use technologies like Ethernet WAN and MPLS, both of which keep data private by their nature and which include QoS services. An intercloud exchange is a purpose-built WAN service that connects to enterprises as well as most public cloud providers, using the same kinds of private WAN technology with those same benefits.
    For using an Internet connection with/without VPN, both use the Internet, so both cannot provide QoS services. The Internet VPN option does encrypt the data to keep it private.
  • A virtual network function in a public cloud service is a networking function implemented by the cloud provider for the customer as a VM that is directly accessible and configurable by the customer.
    A virtual network function (VNF) is a virtual version of a networking appliance, such as a virtual router (like the Cisco CSR) or virtual firewall (like the Cisco ASAv). VNFs are deployed as a VM, with customer access to the user interface, so that customers can then configure the VNF to meet their needs.
    Cloud providers can implement many networking services that create the cloud network, but not give the customer direct access to the VM or appliance. For instance, public cloud providers typically provide DNS services and address assignment services that use DHCP behind the scenes, but without giving the customer direct access to a VM that implements a DNS or DHCP server.

  • A Layer 2 switch examines a frame's destination MAC address and chooses to forward that frame out port G0/1 only. That action is an action that occurs as part of Data plane of the switch.
    The data plane includes all networking device actions related to the receipt, processing, and forwarding of each message.
    The term table plane is not used in networking.
    The management plane and control plane are not concerned with the per-message forwarding actions.
  • A router uses EIGRP to learn routes and adds those to the IPv4 routing table. That action is an action that occurs as part of Control plane of the switch.
    The control plane includes all networking device actions that create the information used by the data plane when processing messages.
    The control plane includes functions like IP routing protocols and Spanning Tree Protocol (STP).
    The management plane and data plane are not concerned with collecting the information that the data plane then uses.
  • A network uses an SDN architecture with switches and a centralized controller. Data plane functions found on the switches but not on the controller.
    Although many variations of SDN architectures exist, they typically use a centralized controller. That controller may centralize some or even all control plane functions in the controller. However, the data plane function of receiving messages, matching them based on header fields, taking actions (like making a forwarding decision), and forwarding the message still happens on the network elements (switches) and not on the controller.
    The control plane functions may all happen on the controller, or some may happen on the controller, and some on the switches. The Northbound and Southbound Interfaces are API interfaces on the controller, not on the switches.
  • Cisco Open SDN Controller uses a mostly centralized control plane model.
    The Cisco Open SDN Controller uses an Open SDN model with an OpenFlow Southbound Interface as defined by the Open Networking Foundation (ONF). The ONF SDN model centralizes most control plane functions.
    The APIC (Application Policy Infrastructure Controller) model for data centers partially centralizes control plane functions.
    The APIC-EM (APIC Enterprise Module) controller (as of time of publication) makes no changes to the control plane of routers and switches, leaving those to run with a completely distributed control plane.


  • Host A and Host B sit in two different subnets. The path between the

    subnets of these two hosts runs though three different Layer 3

    forwarding devices (routers and Layer 3 switches). A network engineer

    uses the APIC-EM Path Trace ACL Analysis tool to analyze the path used

    for Host A to send packets to Host B. Discovery of the topology that

    exists between the two hosts is done specifically by the ACL Analysis or

    ACL Trace part of the tool.
    APIC-EM does also these features:
    Analysis of the Layer 3 forwarding decisions in the path from Host A to B
    Analysis of the Layer 2 forwarding decisions in the path from Host A to B
    Analysis of the impact of ACLs on the packets that would flow from Host A to B

    has a built-in function to discover the topology of a network, using a

    variety of protocols such as SSH, CDP, and LLDP. Once discovered, the

    APIC-EM Path Trace feature analyzes the forwarding tables on each device

    in comparison to a source and destination as typed in by an APIC-EM

    user. Path Trace then determines the path through the network, including

    the Layer 2 and Layer 3 paths.
    The feature that uses the name Path

    Trace ACL Analysis (or Path Trace ACL Trace, or a similar name) refers

    to the additional analysis done by APIC-EM to then compare that

    imaginary packet to the ACLs that exist in the network. The tool shows

    the ACLs and points out which ACLs would deny (that is, discard) the

    packet based on its current configuration.
Cloud Terms
+ Cloud service catalog
+ Public cloud
+ Private cloud
+ Intercloud Exchange
+ Characteristics
- On-demand self-service
- Resource pooling
- Rapid elasticity
+ Services
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
+ Virtual Network Function (VNF)
- ASAv
- Cloud Services Router (CSR)
+ Virtualization
- Unified Computing System (UCS)
- Virtual machine
- Virtual CPU
- Hypervisor
- vNIC
- vSwitch
- Host (context: DC)Programability Terms
+ Planes
- Control Plane
- Data Plane
- Management Plane
- distributed control plane
- centralized control plane
+ Software Defined Networking (SDN)
+ Open Networking Foundation (ONF)
+ Application Centric Infrastructure (ACI)
+ OpenFlow
+ Ternary Content Addressable Memory (TCAM)
+ Application Specific Integrated Circuit (ASIC)
+ Controllers
- Application Policy Infrastructure Controller (APIC)
- Cisco Open SDN Controller (OSC)
- OpenDayLight (ODL)
- APIC Enterprise Module (APIC-EM)
+ Application Programming Interface (API)
- Southbound API
- Northbound API
- Southbound Interface (SBI)
- Northbound Interface (NBI)
- Representational State Transfer (REST)


Understanding Cisco Cloud Fundamentals

  • The year 2009 saw a huge interest in cloud computing. World financial crisis in 2007-2008 events was the biggest influence in creating this "cloud hype".
  • Mainframe time-sharing, Computation as a public utility (John McCartry, 1961), Intergalactic computer network (J.C.R. Licklider, 1963), and launch in 2009 represent a fundamental milestone toward cloud computing in the history of computing. Virtual local-area networks (Bellcore, 1984) does not.
  • Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction represents NIST's definition of cloud computing.
  • Server, Data storage, and Network bandwidth are data center resources that can be offered through cloud computing.
  • Service catalog in web portal tools gives cloud end users access to request resources.
  • Cloud capabilities can be scaled rapidly outward and inward according to demand characterizes elasticity according to the NIST definition of cloud computing.
  • Silos is best defines the opposite of the NIST essential characteristic "resource pooling" for cloud computing.
  • Automatic control, Resource optimization, and Transparency between provider and consumer are direct benefits from the cloud computing measured service characteristic.
  • Personal computer, Mobile phones, and Tablets represent devices that can utilize cloud resources.
  • Any application that requires isolation from other tenants is a tenant in the context of cloud computing.
  • Deployment and Service models represent NIST methods of classifying cloud implementations.



คู่มือการใช้งาน GNS 3

สวัสดีครับ วันนี้ผมจะมาขอแนะนำ Program "GNS3" ให้เพื่อนๆ พี่ๆ น้องๆ ได้รู้จักกัน เจ้า Program "GNS3" ตัวนี้ หลายๆ คนอาจจะเคยได้ยินชื่อหรือได้ทดลองใช้กันมาบ้าง สำหรับชาว Networker น่าจะรู้จัก Program ตัวนี้กันเป็นอย่างดี สำหรับหลายๆ ท่านที่อยากจะเข้าสู่เส้นทางอาชีพสาย Network อย่างมืออาชีพ ก็จำเป็นอย่างยิ่งที่จะต้องเรียนรู้ Program ตัวนี้ครับ ...แล้วประโยชน์ของเจ้า Program GNS3 ตัวนี้ คืออะไร?มันเป็น Program "จำลองระบบ Network (Network Simulation)"Program GNS3 ย่อมาจาก Graphic Network Simulator 3 เป็น Program ที่เลียนแบบการทำงานของ Software ระบบปฏิบัติการในอุปกรณ์ network (IOS)GNS 3 นี้ สามารถจำลองได้ทั้งของ Cisco และ Juniper ครับ ซึ่งสามารถทำงานได้ใกล้เคียงอุปกรณ์จริงได้ถึง 90%

Program นี้ จึงเหมาะสมสำหรับผู้ที่ทำงานด้าน Network โดยตรง ไปจนผู้ที่อยากศึกษา เรียนรู้ด้านนี้ และผู้ที่ต้องการเตรียมตัวสอบประกาศนียบัตรของ Cisco ในระดับ CCNA (ถึงขั้น Expert )ซึ่งทาง NineHua.Com ได้จัดทำคู่มือการใช้งาน Program GNS3 ให้ Download (แจก Free) ไปอ่านไปฝึกกันครับ (ทางเราก็หวังเป็นอย่างยิ่งว่าเอกสารนี้ จะเป็นประโยชน์แก่ผู้ที่สนใจ Network อยู่แล้ว หรือผู้ที่เริ่มศึกษาทุกท่าน) หมายเหตุ: มีจุดประสงค์เพื่อจะให้เรียนรู้กันอย่างเดียว ไม่อนุญาติให้เผยแพร่เพื่อการค้าและขอขอบคุณข้อมูลที่เผยแพร่ใน Internet, จากหนังสือหลายๆ เล่มที่ไม่ได้กล่าวถึงสุดท้ายนี้ ผมก็ขอขอบคุณพี่เล็ก (รุ่นพี่) ที่เป็นคนเสนอให้ทางเราทำเอกสารชุดนี้ขึ้นมาเพื่อเป็นประโยชน์กับทุกๆ คน ขอบคุณครับ