NAT · DHCP · DNS · NTP · SNMP · QoS · ACLs · VPN · AAA · Device Hardening
Study with Practice Tests →IP Services and Security Fundamentals together represent ~25% of the CCNA 200-301 exam — a major combined domain covering NAT, DHCP, DNS, NTP, SNMP, QoS, ACLs, VPN, AAA, and device hardening.
| Domain | Topic | Weight | ~Questions |
|---|---|---|---|
| 1 | Network Fundamentals | 20% | ~24 |
| 2 | Network Access | 20% | ~24 |
| 3 | IP Connectivity | 25% | ~30 |
| 4 | IP Services | 10% | ~12 |
| 5 | Security Fundamentals | 15% | ~18 |
| 6 | Automation & Programmability | 10% | ~12 |
Translates private (RFC 1918) addresses to public IPs. PAT (NAT overload) maps many inside hosts to one public IP using port numbers — the standard for home/office routers.
Four-step process: Discover → Offer → Request → Acknowledge. Use ip helper-address to forward DHCP broadcasts across subnets.
Standard (src IP only) vs Extended (src + dst + protocol + port). Implicit deny at end. Standard near destination, Extended near source. First match wins.
Site-to-site (IPsec, permanent tunnel) vs Remote-access (AnyConnect/SSL). IPsec uses IKE for key exchange; ESP provides authentication + encryption (preferred over AH).
Authentication (who?), Authorization (what?), Accounting (history). RADIUS (UDP 1812/1813) for network access. TACACS+ (TCP 49) for device administration — encrypts full payload.
Prioritizes delay-sensitive traffic (VoIP/video). DSCP EF=VoIP (46). LLQ best for VoIP (strict priority). Policing drops excess; Shaping buffers/delays excess traffic.
Key IP services tested on CCNA: NAT, DHCP, DNS, NTP, SNMP, Syslog, and QoS. Know the purpose, ports, config commands, and verification commands for each.
Purpose: Translate private RFC 1918 IPs to public IPs, conserving IPv4 address space.
NAT terminology: Inside local = private IP of inside device. Inside global = public IP seen by outside. Outside global = destination public IP.
! Mark interfaces
interface GigabitEthernet0/0
ip nat inside
interface GigabitEthernet0/1
ip nat outside
! PAT (NAT overload) — single public IP
access-list 1 permit 192.168.1.0 0.0.0.255
ip nat inside source list 1 interface GigabitEthernet0/1 overload
! Verify
show ip nat translations
show ip nat statistics
DORA Process: Discover (client broadcast, find server) → Offer (server proposes IP) → Request (client accepts offer) → Acknowledge (server confirms lease).
ip helper-address SERVER-IP on the router interface facing clients — forwards broadcasts to a DHCP server on a different subnet.! Verify leases and pools
show ip dhcp binding
show ip dhcp pool
show ip dhcp conflict
ip domain-lookup — enabled by default on Cisco devicesip name-server 8.8.8.8 — set DNS server for the devicePort 123, UDP. Synchronizes clocks across network devices. Essential for log correlation, digital certificates, and Kerberos authentication.
ntp server 192.0.2.1 ! Configure NTP client
show ntp status ! Check sync status and stratum
show clock ! View current time
Port 161 (agent), Port 162 (trap receiver), UDP.
Port 514, UDP. Sends log messages to a centralized syslog server.
| Level | Name | Description |
|---|---|---|
| 0 | Emergencies | System unusable |
| 1 | Alerts | Immediate action needed |
| 2 | Critical | Critical conditions |
| 3 | Errors | Error conditions |
| 4 | Warnings | Warning conditions |
| 5 | Notifications | Normal but significant |
| 6 | Informational | Informational messages |
| 7 | Debugging | Debug-level messages |
Mnemonic: "Every Awesome Cisco Engineer Will Need Debugging"
logging host 10.0.0.100 ! Send logs to syslog server
logging trap warnings ! Send levels 0–4
show logging ! View log buffer
Purpose: Prioritize delay-sensitive traffic (VoIP, video) over bulk data on congested links.
Security Fundamentals accounts for ~15% (~18 questions). Focus on threat recognition, ACL basics, VPN types, AAA protocols, and device hardening techniques.
IPsec Components:
| Feature | RADIUS | TACACS+ |
|---|---|---|
| Protocol | UDP | TCP |
| Ports | 1812 (auth), 1813 (acct) | 49 |
| Encryption | Password only | Full payload |
| Standard | Open standard | Cisco proprietary |
| Best for | 802.1X network access | Device administration |
| AuthN/AuthZ | Combined | Separated |
transport input sshcrypto key generate rsa modulus 2048ip ssh version 2enable secret (MD5 hash) — never enable password (cleartext)service password-encryptionsecurity passwords min-length 8login local, exec-timeout 5 0, logging synchronousbanner motd — warning message, NOT a welcome messageno cdp enableno ip http server! Enable SSH step-by-step
hostname ROUTER1
ip domain-name example.com
crypto key generate rsa modulus 2048
ip ssh version 2
username admin privilege 15 secret Str0ngP@ss
line vty 0 4
transport input ssh
login local
exec-timeout 10 0
enable secret Str0ngS3cret
service password-encryption
banner motd # Authorized access only. All sessions are logged. #
Access Control Lists (ACLs) filter traffic on Cisco devices. Understanding placement, wildcard masks, and processing order is critical for the exam.
deny any — unmatched traffic is always dropped.in = filter traffic entering the interface. out = filter traffic leaving the interface.| Feature | Standard ACL | Extended ACL |
|---|---|---|
| Numbers | 1–99 and 1300–1999 | 100–199 and 2000–2699 |
| Matches | Source IP only | Src IP, Dst IP, Protocol, Port |
| Placement | Closest to destination | Closest to source |
| Granularity | Low — can over-block | High — precise filtering |
| Named support | Yes | Yes |
0.0.0.0 = exact host match (same as host keyword)0.0.0.255 = match any host in a /24 subnet0.0.255.255 = match any host in a /16 subnet255.255.255.255 = match any host (same as any keyword)! Standard numbered ACL
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 deny any
! Apply to interface (standard — near destination)
interface GigabitEthernet0/1
ip access-group 10 out
! Extended numbered ACL
access-list 110 permit tcp 10.0.0.0 0.0.0.255 host 203.0.113.10 eq 80
access-list 110 permit tcp 10.0.0.0 0.0.0.255 host 203.0.113.10 eq 443
access-list 110 deny ip any any
! Apply to interface (extended — near source)
interface GigabitEthernet0/0
ip access-group 110 in
! Named ACL (easier to edit — can delete specific lines)
ip access-list extended FILTER-OUTBOUND
permit tcp 192.168.0.0 0.0.0.255 any eq 80
permit tcp 192.168.0.0 0.0.0.255 any eq 443
deny ip any any log
! Verify
show access-lists
show ip interface GigabitEthernet0/0
show running-config | include access
show access-lists — each entry shows hit countshow ip interface Gi0/0permit ip any any at end if neededno ip access-group removes ACL from interface without deleting it10 questions covering IP Services and Security Fundamentals. Select your answers then click Submit to see your score.
1. Which NAT type maps multiple inside local addresses to a single public IP using port numbers?
2. What is the correct order of the DHCP DORA process?
3. Which Syslog severity level indicates a critical condition (severity 2)?
4. An extended ACL should be placed as close as possible to which location?
5. Which VPN protocol provides both authentication and encryption?
6. What is the implicit rule at the end of every Cisco ACL?
7. Which AAA protocol encrypts the entire packet payload and uses TCP port 49?
8. NTP uses which transport protocol and port number?
9. Which SNMPv3 security feature provides both authentication and encryption?
10. A standard ACL numbered 150 is applied to an interface. What is wrong?
Six memorable mnemonics and mental models to lock in the most exam-critical IP Services and Security concepts.
ip helper-address on the router interface facing clients forwards the broadcast.logging trap 4 sends levels 0–4 to the syslog server.crypto key generate rsa. Use enable secret (not enable password). Encrypt passwords: service password-encryption. Set exec-timeout. Add legal banner motd. Disable unused ports and CDP on external interfaces.Click any card to flip it and reveal the full explanation. Use the Study Advisor below for targeted exam tips.
Click a card to flip it ↓
ip nat inside/ip nat outside on interfaces.host keyword). 255.255.255.255 = any host (= any). 0.0.255.255 = any host in /16. Formula: wildcard = 255.255.255.255 − subnet mask.show ntp status reveals current stratum.hostname ROUTER-NAME 2. ip domain-name domain.com 3. crypto key generate rsa modulus 2048 4. ip ssh version 2 5. VTY: transport input ssh 6. login local 7. username admin secret PASSWORDshow ip nat translations — memorize this verification commandip helper-address is configured on the router interface closest to DHCP clients, not the server