Top Banner
121

CCNA Presentation. (3)

Dec 11, 2015

Download

Documents

ukyuiyu;iouo
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CCNA Presentation. (3)
Page 2: CCNA Presentation. (3)

CISCO 60%40%

D-Link

3 Com

Nortel

Cygnus

Etc..

Cisco’s Market Share

Page 3: CCNA Presentation. (3)

Router is an internetworking component, that connects networks which are at different geographical

locations.

Page 4: CCNA Presentation. (3)

Serial 1 Serial 0 AUIE 0

Console

V.35 modem

modem

Telephone

PC

AUX

Diagram of 2501 series Router

Page 5: CCNA Presentation. (3)

Interfaces on a Router

Page 6: CCNA Presentation. (3)

1. Ethernet It is a LAN interface. Some of the models have an RJ45 port for 10baseT or 10/100. And some other have a 15 pin female connector AUI (Attachment Unit Interface).

2. Serial It is a 60 pin female WAN interface for leased line

3. BRI/PRI It is a RJ45 WAN interface for ISDN

4.Console It is a RJ45 Connector used to configure the Router for the first time.

5. Auxiliary RJ45 Connector for remote access administration.

Page 7: CCNA Presentation. (3)

Routers

Modular Fixed

Modular Routers

These type of routers have up gradable slots, and the number of ports can be increased just by adding cards in the slots.

Fixed Routers

These types of routers have fixed number of ports.

Page 8: CCNA Presentation. (3)

Cisco Router’s Series

Cisco 700, 800, 1600, 1700, 2500, 2600, 3600, 4000, 5000, 7000,10000, 12000.

Fixed Modular

700, 800,….2500 2600,….., 12000

1750 & 1751 exceptionally are Modular Routers.

Page 9: CCNA Presentation. (3)

Cisco’s Hierarchical Model

Page 10: CCNA Presentation. (3)

Access Layer- Manage access control and policy, separate collision domain, and also known as Desktop Layer.

700, …, 2500

Distribution Layer- It is also called communication point between core and access layer, Basic function is routing. Fault tolerance, Implement Policies.

2600, …, 5000

Core Layer- It is known as core of network and responsible to transfer heavy traffic reliable and in quick manner, protect from

workgroup access support.

7000, …, 12000

Page 11: CCNA Presentation. (3)

Transceiver

Page 12: CCNA Presentation. (3)

Internal Components of a Router

Page 13: CCNA Presentation. (3)
Page 14: CCNA Presentation. (3)

Boot ROM : It stores the mini IOS (Internet work Operating System) image with extremely limited capabilities and POST routines and core level OS for maintenance.

FLASH : It is an EPROM chip that holds most of the IOS Image. It maintains everything when router is turned off.

RAM : RAM holds running IOS configurations and provides caching. RAM is a volatile memory and looses its information when router is turned off. The configuration present in RAM is called Running configuration.

NVRAM : It is a re-write able memory area that holds router’s configuration file. NVRAM retains the information when ever router is rebooted. Once configuration is saved, it will be saved in NVRAM and this configuration is called Startup Configuration.

Page 15: CCNA Presentation. (3)

Configuration of a Router Router for the first time is configured through the CONSOLE

port.COM port of a PC is connected to the console port of router with a console cable by using a transceiver. Router is accessible by a tool. In windows, it is called HYPER TEMINAL. As soon as the router is powered on and accessed, the following things happen,

POST

BOOT STRAP

FLASH

NVRAM

Setup Mode

ROM (mini IOS)If IOS is Corrupted

Page 16: CCNA Presentation. (3)

• POST- A post is a program stored in ROM is executed first. Checks hardware components of the router first .

• BOOTSTRAP- The program is stored in ROM that is used to execute. This program find and locate the IOS from possible location of IOS can be Flash.TFTP server and mini IOS,by deafult IOS loaded from flash memory in all cisco router.

• Once he IOS is loaded. It finds and loads configuration file stored in NVRAM. This file is called Startup-configuration and is only there if we copies to running-config file into NVRAM. If a startup-config file is not in NVRAM, the router will start the setup mode

Page 17: CCNA Presentation. (3)

In Setup mode, there will be a message,

“Would You Like To Enter The Initial Configuration [Y/N]” :

If “Y” then, initial configuration starts.

If “N” would you like to terminate the auto installation?

Press “RETURN” to get started……You will land on the default prompt of the Router “ ROUTER >”.

Router>_

Page 18: CCNA Presentation. (3)

Working Modes Of a Router

1. User Mode (Default mode)

2. Privilege or Administrative Mode

3. Global Configuration Mode

4. Interface Configuration Mode

5. Line Configuration Mode

6. Router Mode

7. Sub-Interface Mode

Page 19: CCNA Presentation. (3)

USER MODE

Router> is the user mode, I,e the default prompt. It means that when ever a router boots successfully it lands into the user mode. Router cannot be configured from this mode, but it is used for just monitoring purpose. Router> en

Router #

Page 20: CCNA Presentation. (3)

PREVILEGE MODE

Router# it is the administrating mode, we can check whether the settings and configurations made have been implemented or not. Eg. “Router # Sh int e0”. If it is new router all the interfaces are by default shut down, so the message will be, “ Ethernet 0 is administratively down, line protocol is down.”

Page 21: CCNA Presentation. (3)

Router# Config t

Router (Config)#

Global Configuration Mode

As the name indicates, it is a global configuration mode I,e. we can configure any interface from this mode, just by entering into the interface mode.

Page 22: CCNA Presentation. (3)

The “Clock” Command

The clock command is used to set the clock of Router.

Syntax.

Router# clock set hh:mm:ss Day of week Month Year

E.g.

Router#clock set 16:35:00 1 April 2003

Note* This is the only configuration which can be done from privilege mode,every other configuration should be done at global configuration mode only.

Page 23: CCNA Presentation. (3)

Some of the important show commands in privilege mode

• Router#sh int (interface name eg e0)-Show interface information.

• #Sh history-Show router’s history store by default 10 commands.

• #Sh version-Show general information regarding router memory and type of interface,IOS image and uptime.

• #Sh running-config –Show the content of RAM & IP.

• # Sh startup-config-Show content of NVRAM

• #Sh ip interface-Show summary of interfaces.

To save configuration from RAM TO NVRAM

Router#Copy Running-config Startup-config (or)

Router#Write Memory.

• !!!!!!!!!- Symbol shows about successes in case of ping.

• ………...- Symbol failures in case of ping.

Page 24: CCNA Presentation. (3)

Configuration Telnet Password- Telnet password prevents access to operating system of router.Router(Config)# line vty ?(Password length)Router(Config-line)#line vty 0 to 5Router(Config-line)#Password ciscoRouter(Config-line)#Log in or no log inRouter(Config)#enable secret cisco (enable secret password should be necessary to set for telnet.)IN CMD- c:\>telnet router ip addr.

c:\>telnet 192.168.1.1

Page 25: CCNA Presentation. (3)

• To configure Hostname (or) Identification of Router over the network.

Router#config t

Router(config)#Hostname R_2503

Router(config)#^Z

Page 26: CCNA Presentation. (3)

Previlege PASSWORDS

Enable Password Enable Secret

Enable Password:- It is global command restricts access to the previlege mode, the password is in clear text.

Router(config)#Enable password 123

Enable Secret:-Here the password is in encrypted form.

Router(config)#Enable secret cisco

Page 27: CCNA Presentation. (3)

CONFIGURING INTERFACES

LAN interface (ETHERNET Port)

WAN interface (SERIAL Port)

Page 28: CCNA Presentation. (3)

ETHERNET

Router(config)#Interface Ethernet 0

Router(config-if)#Ip Address 200.150.1.254 255.255.255.0

Router(config-if)#no shutdown

Router(config-if)#^Z

Router#Show Int E0

Page 29: CCNA Presentation. (3)

SERIAL

Router(config)#Interface Serial 0

Router(config-if)#Ip Address 150.10.1.1 255.255.0.0Router(config)#clock rate 56000Router(Config-if)# bandwidth 64Router(config-if)#No shutdown

Router(config-if)#^Z

Page 30: CCNA Presentation. (3)

The “CDP”It’s a Cisco's proprietary protocol called the Cisco Discovery Protocol, that gives you a summary of all the directly connected Cisco devices. CDP is a L2 protocol, that discovers neighbor regardless of which protocol suite they are running. When a cisco device boots up, the CDP is loaded by default, but can be disabled at interface level.

* The CDP is limited to the immediate neighbors only…

The summary includes Device Identifier(eg. Switch configured name or domain name), Port Identifier (eg. Ethernet 0 and serial 0.), Capabilities list (eg. The device can act as a source route bridge as well as a router), Platform (eg. Cisco 2600).

Page 31: CCNA Presentation. (3)

CDP (Cisco’s Discovery Protocol)

Page 32: CCNA Presentation. (3)

Backup & Restoring Routers IOS Image

Using TFTP

(Trivial File Transfer Protocol)

TFTP Server allows you to take backup, upload and save your IOS Image and current configuration on it. TFTP is a software program of 1.3Mb. This should be installed on that TFTP server i.e., (Personnel Computer).

C:\Program files\cisco systems\cisco TFTP

* Note: Always while taking Backup or Restoration TFTP software should execute on that particular computer.

Page 33: CCNA Presentation. (3)

• Notification things1) First assign IP address on router’s

ethernet interface.2) Assign an IP address of TFTP server in

LAN card setting. This address also of PC on which we are working.

3) Ping both address successfully TFTP server address and router’s IP address.

Page 34: CCNA Presentation. (3)

Backup Sources :

1. Through Telnet Session.

2. Through Console Session.

3. Through Auxillary Port (Remote Session)

Page 35: CCNA Presentation. (3)

Backup of IOS Image

Router#Sh Flash

Router#Copy Flash:Tftp Address or name of the remote host [] (TFTP server ip add 192.16.1.10 )

Destination file name [ ] ? (Press enter key or a name)

Page 36: CCNA Presentation. (3)

Leased line WAN Setup

Case 1: The distance between the locations is greater than 5 Km.

Requirements

A pair of Routers, Leased line, pair of leased line modems V.35,

Pair of G.703 Modem.

Case 2: The distance between the two locations is less than 5Km.

Requirements

A pair of Routers, Leased line and pair of leased line modem.

Page 37: CCNA Presentation. (3)

Leased line Setup (< 5 km)

Internal Network Internal Network

V.35 Cable Csu/Dsu

Switch/hub

V.35 modem

S0

E0 S0 E0

Switch/hubRouter

V.35 modem

Leased line

Telephone

Exchange

Page 38: CCNA Presentation. (3)

RoutingRouting is of three types.

• Static - Static routing is done by the users. These paths are stored in the routing table.

•Advantage:No overhead on the router CPU,No bandwidth usage between routers, Security(administrator only allows routing to certain networks).

•Disadvantage: If one network is added to the internetwork the administrator must add a route to it on all routers. It is not feasible network because it would be a full time job.

Page 39: CCNA Presentation. (3)

• Dynamic - In dynamic routing, the path is fixed by the protocol. The paths will be changing depending on the length of the path. Always the shortest path is preferred. It is the process of using protocol to find and update routing tables on routers, and easier than static or default routing.

• Autonomous No. – It is group of router our network under single administrative control. unique number from 1-65,535 to differentiate for other AS. Routing updates of one AS is normally no forwarded other AS.

• Default - When the destination is known, static and dynamic routing is done. For unknown destinations, default routing is employed. It works on stub networks, means have only one exit port out of the network. To configure a default route, use wild cards in the network address and mask locations of a static route.

Page 40: CCNA Presentation. (3)

• Routing Protocol – Used by router to learn or find path by sending and receiving updates and decided best path which specific destination. E.g. RIP, EIGRP.

• Routed Protocol – Used to carry network traffic such as file download, upload e-mails, application data etc. e.g. IP, SPX

• Permanent – If the interface is shut down or he router cannot communicate to the next hop router, the route is automatically discarded from the routing table choosing the permanent option keeps the entry in the routing table no matters what happens.

Page 41: CCNA Presentation. (3)

• Administrative Distance – by default static routes have an administrative distance of 1. We can change the default value by adding an administrative weight at the end of the command. 0 – 255, for static routing 0-1. It is used to rate trustworthiness of routing information received on a router for a neighbor router. Where 0 is the most trusted and 255 means traffic will be passed via this route. Lowest value reliable.

• Default administrative Distance: Directly connected interface --- 0; Static Route --- 0,1; EIGRP --- 90; OSPF --- 110; IGRP --- 100; IS-IS --- 115; RIP --- 120; External EIGRP --- 170;

Unknown Destination --- 255

Page 42: CCNA Presentation. (3)

Example:

Switch/hub Switch/hub

E 0 E 0

S 0S 0

192.168.1.0/24 192.168.2.0/24

192.168.1.150/24 192.168.2.150/24

10.0.0.1/8 10.0.0.2/8

Location A Location B

Page 43: CCNA Presentation. (3)

Router(config)# ip routing

Router# sh ip route (it shows all the directly connected networks).

“ C 192.168.1.0/24 directly connected to E0”

“ C 10.0.0.0/8 “ ‘ ‘ ‘ S0”

“ C “ indicates connected networks.

Static Routing

Syntax

Router(config)# ip route (dest-network) (subnet mask) (next hop address)

Page 44: CCNA Presentation. (3)

Location A

Router(config)# ip routing

Router(config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2

Note* if we don’t know the address of next hop, we can just write the name of the hop.

Router(config)# ip route 192.168.2.0 255.255.255.0 S0

Location B

Router(config)# ip routing

Router(config)# ip route 192.168.1.0 255.255.255.0 10.0.0.1

Page 45: CCNA Presentation. (3)

Router# sh ip route

C 192.168.1.0/24 directly connected to E0

C 10.0.0.0/8 “ ‘ “ “ S0

S 192.168.2.0/24 [1/0] via 10.0.0.2

•“S” represents static. [a/b] ~ [1/0], here a=1 is the administrative distance value and b has no significance in static routing. For static and default routing b can be 0 or 1. Lesser the administrative distance value, higher the preference.

Page 46: CCNA Presentation. (3)

“Tracert”, “Trace Route” and “Route print”.C:\> tracert

C:\> route print

Router# trace route (gives the complete route)

Router# sh arp (to check MAC addresses)

Default Routing

Router(config)# ip routing

Router(config)#ip route DA (S/N mask next) (next hop address)

Router(config)# ip route 0.0.0.0 0.0.0.0 s1

Page 47: CCNA Presentation. (3)

Router# sh ip route

C 192.168.1.0/24 directly connected to E0

C 10.0.0.0/8 “ “ to S0

S* 0.0.0.0/0 “ “ to S0

Page 48: CCNA Presentation. (3)

• METRIC – Metric is used by protocol to decide best path reach specific destination different protocol take different approach and deciding best path.

e.g. RIP use hop count as metric while OSPF use and IGRP used bandwidth and delay.

Page 49: CCNA Presentation. (3)

Classification Of Routing Protocols

Distance Vector

Hybrid Routing

Link State

Distance Vector: the distance vector approach determines the direction and the distance to any link in the internetwork. When the topology in a distance vector routing protocol changes, routing table updates in the router must occur. This update process proceeds step-by-step router to router. E.g. RIP and IGRP.It is use local broadcast 255.255.255.255 to exchange routing updates

Link State : it recreates the exact topology of the entire network(at least the partition of the network where the router is situated).Typically called shortest path first, the routers each create three separate tables. One of these tables keeps track of directly attached neighbor E.g. OSPF.

Page 50: CCNA Presentation. (3)

• Hybrid Routing : it combines aspects of the link state and the distance vector

algorithm.

Functions of a distance vector routing protocol.

Identification of source of information

Discovering routes

Select the best route

Maintain Route information

Page 51: CCNA Presentation. (3)

• Note:

• Maximum 15 paths.“Hop count metric” selects the path. It is support load balancing updates 6 equal cost path(By default 4 path)

• Route updates are broadcast for every 30 seconds, invalid period of 180 seconds and flush period is 240 seconds.

• RIP works well in small networks but it is suffecient on large networks with slow WAN links or on networks with a large number of routers installed. RIP Version1 uses only classful routing which means that all devices in the network must use the same subnet mask. This is because RIP Version1 does not send updates with subnet mask information.

Page 52: CCNA Presentation. (3)

Router(config)# router rip

Router(config-router)# network (network ip S0, S1)

Router(config-router)# network (network ip e0)

Enabling RIP Configuration

Router# sh ip protocol (shows the current routing protocol)

Router# sh ip route

Page 53: CCNA Presentation. (3)

IGRPIGRP was created in part to overcome the

limitations of RIP (maximum hop count of only 15, and a single routing metric) when used within large networks. IGRP supports multiple metrics for each route. IGRP is considered a classful routing protocol.

Page 54: CCNA Presentation. (3)

172.16.1.0

E0 S2 S2 S3 S3 E0

192.168.1.0

172.16.1.1

10.1.1.1

10.1.1.2

10.2.2.2

10.2.2.3192.168.1.1

Router rip

Network 172.16.0.0

Network 10.0.0.0

Router rip

Network 10.0.0.0 Router rip

Network 192.168.1.0

Network 10.0.0.0

Page 55: CCNA Presentation. (3)

Configuring IGRPSyntaxes.

Router(config)#router igrp autonomous number

This defines IGRP as the routing protocol.

Router(config-router)#Network network-ip

Selects directly connected networks.

Router(config-router)#variance multiplier

Configures unequal-cost load balancing by defining difference between the best metric and the worst acceptable metric.

Page 56: CCNA Presentation. (3)

Autonomous System 100172.16.1.0

E0 S2 S2 S3 S3 E0

192.168.1.0

172.16.1.1

10.1.1.1

10.1.1.2

10.2.2.2

10.2.2.3192.168.1.1

Router igrp 100

Network 172.16.0.0

Network 10.0.0.0

Router igrp 100

Network 10.0.0.0

Router igrp 100

Network 192.168.1.0

Network 10.0.0.0

Page 57: CCNA Presentation. (3)

IP Classless CommandRouter(config)# ip classless

A router by default assumes that all the subnets of a directly connected network should be present in the routing table. If a packet is received with a destination address, of an unknown subnet of directly attached network, the router assumes that the subnet does not exists and drops the packet. This happens even if routing table has a default route.For the above condition if IP Classless is configured, and if any packet is received, then the router will match it to the default route and forward it to the next hop specified by the default route.

Page 58: CCNA Presentation. (3)

EIGRP• EIGRP is more of link state protocol.

EIGRP is still a distance vector protocol, but it uses a different algorithm, called the DUAL algorithm to calculate its routes. Enhanced Interior Gateway Routing Protocol (EIGRP) is considered a scalable routing protocol. It is a classless protocol permitting VLSMs, route authentication and supernetting. Routing updates are not performed periodically.

Page 59: CCNA Presentation. (3)

Calculation of Wildcard Mask

WCM = BCM-SNM

1. 192.168.1.0/24

255.255.255.255

- 255.255.255. 0

0 . 0 . 0 .255

2. 192.168.1.0/27

255.255.255.255

- 255.255.255.224

0 . 0 . 0 . 31

3. 192.160.1.10 0.0.0.0

Page 60: CCNA Presentation. (3)

OSPF

OSPF(Open Short Path First) is of two types : 1) Single Area OSPF and2) Multi Area OSPF.

Internal Routers

Area1

Area2

Area Border RouterIR

IR

ABR

ABR

Area0

S 0S 0

Page 61: CCNA Presentation. (3)

Router A Router B

S 0 192.168.1.195/252 192.168.1.192/252 S 0

E 0 1.65

192.168.1.32/255.255.255.224

192.168.1.64/255.255.255.224

E 0 1.33

OSPF under Single Area

Page 62: CCNA Presentation. (3)

(Config)# ip routing(Config-Router)# router OSPF 6573(Config-Router)# network 192.168.1.32 0.0.0.31 area 1(Config-Router)# area 1 range 192.168.1.32 255.255.255.224(Config-Router)# network 192.168.1.192 0.0.0.3 area 1(Config-Router)# area 1 range 192.168.1.192 255.255.255.224

Page 63: CCNA Presentation. (3)

(Config)# ip routing(Config-Router)# router OSPF 6573(Config-Router)# network 192.168.1.64 0.0.0.31 area 1(Config-Router)# area 1 range 192.168.1.64 255.255.255.224(Config-Router)# network 192.168.1.195 0.0.0.3 area 1(Config-Router)# area 1 range 192.168.1.195 255.255.255.252

Configuration of Router B--------------------------------

Page 64: CCNA Presentation. (3)

OSPF under Different Areas

Area 0

192.168.1.0 192.168.5.0

Area 1 Area 2

E0 E0

5.50

Router A Router B

1.50

Page 65: CCNA Presentation. (3)

(Config)# ip routing(Config-Router)# router OSPF 6573(Config-Router)# network 192.168.1.0 0.0.0.255 area 1(Config-Router)# area 1 range 192.168.1.0 255.255.255.0(Config-Router)# network 172.16.0.0 0.0.255.255 area 0(Config-Router)# area 0 range 172.16.0.0 255.255.0.0

Configuration of Router A--------------------------------

Page 66: CCNA Presentation. (3)

Configuration of Router B--------------------------------

(Config)# ip routing(Config-Router)# router OSPF 6573(Config-Router)# network 192.168.5.0 0.0.0.255 area 2(Config-Router)# area 2 range 192.168.5.0 255.255.255.0(Config-Router)# network 172.16.0.0 0.0.255.255 area 0(Config-Router)# area 0 range 172.16.0.0 255.255.0.0

Page 67: CCNA Presentation. (3)

Access Control ListIt is also called Network Traffic Control

Management (NTCM). We can provide restrictions to individual users, subnets and services etc.

ACL

Standard ACL Extended ACL

Any access list is identified by its number.

S. A. L 1 – 99

Ex. A. L 100 - 199

Page 68: CCNA Presentation. (3)

Rules for creating and implementing Access List

1. Access list must begin with the Deny Statements (If exists) then Permit Statements must follow.

2. There must be at least one Permit Statement as an Implicit “Deny All” always exists.

3. While Implementation of Access list, There must be only one Access list per Interface, per direction and per protocol.

Page 69: CCNA Presentation. (3)

Standard Access List

Router A Router B

S 0 172.16.1.1 172.16.1.2 S 0

E 0 5.50

1.1

1.21.3

1.45.1

5.2

5.4

5.3

E 0 1.50

Syntax

Router(config)# Access-list ALNO P/D Src Src-WCM

Router(config)# Int <name of interface>

Router(Config-if)#Ip Access-Group <Direction>

Page 70: CCNA Presentation. (3)

Configuration Standard Access-list For Router A

Restricting particular user(Config)# Access-list 1 deny 192.168.1.3 0.0.0.0(Config)# Access-list 1 permit 0.0.0.0 255.255.255.255 or

Access-list 1 permit anyRestricting a Network(Config)# Access-list 1 deny 192.168.3.0 0.0.0.255(Config)# Access-list 1 permit any

Page 71: CCNA Presentation. (3)

Extended Access List

Router A Router B

S 0 172.16.1.1 172.16.1.2 S 0

E 0 5.50

1.1

1.21.3

1.4 5.1

5.2

5.4

5.3

E 0 1.50

1.20

Page 72: CCNA Presentation. (3)

Configuration of Router A

(Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP

(Config)# Access-list 101 permit IP any any

Implementation

(Config)#int E0

(config-if)# IP Access-group 101 Out

Page 73: CCNA Presentation. (3)

NAT(Network Address Translation)

Router A Router B

S 0 172.16.1.1 172.16.1.2 S 0

E 0 5.50

1.1

1.2192.168.1.3

1.4 5.1

5.2

5.4

5.3

E 0 1.50

Note : 192.168.1.3 is denied from entering the network of 5.0.So it will enter with mask.

Page 74: CCNA Presentation. (3)

Configuration of Router A --------------------------------# Config t(Config)# int E 0(Config-if)# ip address 192.168.1.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.1 255.255.0.0(Config-if)# clock rate 56000(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2

(Config)# int E 0(Config-if)# ip nat inside

Page 75: CCNA Presentation. (3)

(Config)# int S 0(Config-if)# ip nat outside

(Config)# access-list 1 permit 192.168.1.3 0.0.0.0(Config)# ip nat inside source list 1 int S 0 overload

# Config t(Config)# int E 0(Config-if)# ip address 192.168.5.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.2 255.255.0.0(Config-if)# clock rate 56000(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

Configuration of Router B --------------------------------

Page 76: CCNA Presentation. (3)

(Config)# ip routing(Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1

(Config)# access-list 10 deny 192.168.1.3 0.0.0.0(Config)# access-list 10 permit any

(Config)# int E 0(Config-if)# ip access-group 10 out

Note : Only Public IP can go to the Internetworking world.

Page 77: CCNA Presentation. (3)

A Scenario of providing Net access to the IP's of Router B

Natting

Router ARouter B

Switch

Routing

Leased line

Routing5.0

5.501.50

172.16.1.1 172.16.1.2

192.168.1.99

Page 78: CCNA Presentation. (3)

Configuration of Router A --------------------------------

# Config t(Config)# int E 0(Config-if)# ip address 192.168.1.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.1 255.255.0.0(Config-if)# clock rate 56000(for DCE)(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 0.0.0.0 0.0.0.0 192.168.1.99

Page 79: CCNA Presentation. (3)

(Config)# int S 0(Config-if)# ip nat inside((Config-if)# exit

(Config)# access-list 10 permit 172.16.0.0 0.0.255.255(Config)# ip nat inside source list 10 int E 0 overload

(Config)# int E 0(Config-if)# ip nat outside(Config-if)# no shut(Config-if)# exit

Configuration of Router B --------------------------------# Config t(Config)# int E 0(Config-if)# ip address 192.168.5.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

Page 80: CCNA Presentation. (3)

(Config)# int S 0(Config-if)# ip address 172.16.1.2 255.255.0.0(Config-if)# clock rate 56000(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# int E 0(Config-if)# ip nat inside(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip nat outside(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 0.0.0.0 0.0.0.0 172.16.1.1

(Config)# access-list 10 permit 192.168.5.0 0.0.0.255(Config)# ip nat inside source list 10 int E 0 overload

Page 81: CCNA Presentation. (3)

PPP(Point-to-Point) using PAP protocol

Router A(ISDN)

Router B(Zoom)

S 0 172.16.1.1 172.16.1.2 S 0

E 0 5.501.1

1.21.3

1.4 5.1

5.2

5.4

5.3

E 0 1.50

Internet based leased line

NOTE : Passwords of both should be same.

Page 82: CCNA Presentation. (3)

Configuration of Router A --------------------------------# Config t(Config)# int E 0(Config-if)# ip address 192.168.1.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.1 255.255.0.0(Config-if)# clock rate 56000(for DCE)(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2

(Config)# int S 0(Config-if)# encapsulation ppp(Config-if)# ppp authentication PAP(Config-if)# ppp PAP sent-username zoom password cisco

Page 83: CCNA Presentation. (3)

Configuration of Router B --------------------------------

# Config t(Config)# int E 0(Config-if)# ip address 192.168.5.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.2 255.255.0.0(Config-if)# clock rate 56000(for DCE)(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1

(Config)# int S 0(Config-if)# encapsulation ppp(Config-if)# ppp authentication PAP(Config-if)# ppp PAP sent-username ISP password cisco

Page 84: CCNA Presentation. (3)

PPP(Point-to-Point) using CHAP protocol

Router A(ISDN)

Router B(Zoom)

S 0 172.16.1.1 172.16.1.2 S 0

E 0 5.50

1.1

1.21.3

1.4 5.1

5.2

5.4

5.3

E 0 1.50

Internet based leased line

NOTE : Passwords of both should be same.

Page 85: CCNA Presentation. (3)

Configuration of Router A --------------------------------

# Config t(Config)# int E 0(Config-if)# ip address 192.168.1.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.1 255.255.0.0(Config-if)# clock rate 56000(for DCE)(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2

(Config)# int S 0(Config-if)# encapsulation ppp(Config-if)# ppp authentication CHAP(Config-if)# ppp CHAP hostname zoom (Config-if)# ppp CHAP password cisco

Page 86: CCNA Presentation. (3)

Configuration of Router B --------------------------------# Config t(Config)# int E 0(Config-if)# ip address 192.168.5.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int S 0(Config-if)# ip address 172.16.1.2 255.255.0.0(Config-if)# clock rate 56000(for DCE)(Config-if)# bandwidth 64(Config-if)# no shut(Config-if)# exit

(Config)# ip routing(Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1

(Config)# int S 0(Config-if)# encapsulation ppp(Config-if)# ppp authentication CHAP(Config-if)# ppp CHAP hostname ISP(Config-if)# ppp CHAP password cisco

Page 87: CCNA Presentation. (3)

DDR(Dial on Demand Routing)

Router A Router B

S 0 172.16.1.1 172.16.1.2 S 0

E 0 5.50

1.1

1.21.3

1.4 5.1

5.2

5.4

5.3

E 0 1.50

ISP

Page 88: CCNA Presentation. (3)

# Config t(Config)# isdn switch-type basic-net 3

(Config)# int E 0/1(Config-if)# ip address 192.168.1.50 255.255.255.0(Config-if)# no shut(Config-if)# exit

(Config)# int Bri 1/0(Config-if)# no ip address(Config-if)# encapsulation ppp(Config-if)# no cdp enable(Config-if)# no shut(Config-if)# exit

(Config)# int dialer 1(Config-if)# ip address negotiated(Config-if)# encapsulation ppp(Config-if)# no cdp enable(Config-if)# ppp authentication CHAP PAP callin(Config-if)# ppp CHAP hostname unicomin@hd2(Config-if)# ppp CHAP password password

Page 89: CCNA Presentation. (3)

(Config-if)# ppp PAP sent-username unicomin@hd2 password password(Config-if)# dialer in-band (Config-if)# dialer string 3328400(Config-if)# dialer idle-time out 180(Config-if)# dialer hold-queue 10(Config-if)# exit

(Config)# access-list 1 permit 192.168.1.0 0.0.0.255(Config)# dialer-list 1 protocol ip permit

((Config)# int bri 1/0(Config-if)# dialer rotary-group 1(Config-if)# no shut(Config-if)# exit

(Config)# int dialer 1(Config-if)# dialer-group 1(Config-if)# exit

(Config)# ip routing(Config-router)# ip route 0.0.0.0 0.0.0.0 dialer 1 2

Page 90: CCNA Presentation. (3)

(Config)# ip name-server 202.54.30.2(Config)# ip name-server 202.54.2.30

(Config)# int E 0(Config-if)# ip nat inside(Config-if)# no shut(Config-if)# exit

(Config)# int Bri 1/0(Config-if)# ip nat outside(Config-if)# no shut(Config-if)# exit

(Config)# int dialer 1(Config-if)# ip nat outside(Config-if)# exit

(Config)# ip nat inside source list 1 int dialer 1 overload

Page 91: CCNA Presentation. (3)
Page 92: CCNA Presentation. (3)
Page 93: CCNA Presentation. (3)
Page 94: CCNA Presentation. (3)
Page 95: CCNA Presentation. (3)
Page 96: CCNA Presentation. (3)
Page 97: CCNA Presentation. (3)
Page 98: CCNA Presentation. (3)
Page 99: CCNA Presentation. (3)
Page 100: CCNA Presentation. (3)
Page 101: CCNA Presentation. (3)
Page 102: CCNA Presentation. (3)
Page 103: CCNA Presentation. (3)
Page 104: CCNA Presentation. (3)
Page 105: CCNA Presentation. (3)
Page 106: CCNA Presentation. (3)
Page 107: CCNA Presentation. (3)

Iso(OSI)International organization for standardizationIso has designed a reference model called osi reference model (open system interconnection). It has 7 layers. It says that Any n/w for comunication needs 7 layers1. Application layerThe user uses application layer to send the data. The protocols@ this layer are ftp,http,smtp(e-mail) telenet etc.2. Presentation layerPresentation layer takes the data from application layer and presentIn different formats for securing reason. The services offered @This layer areCompression – decompressionCoding – decodingEncryption - decryption

Page 108: CCNA Presentation. (3)

3. Session layerEstablishing the session or the conectivity n/w n/w 1 & n/w 2 is doneBy the session layer.It 1. Establishes a session

2. maintains it &3. Terminates it b/w the application

4. Transport layerEnd-end connectivity during a session b/w two application is doneBy the transport layer. It also decides the type of connection like tcp or udp i.e. connection oriented or connection less.Services:SequencingFlow ctrl, error detection & correctionTransport layer info + data is called segment.

Page 109: CCNA Presentation. (3)

5. Netwrok layerLogical addressing is done at thenetwork layer i.e. source address &destination address are attached to the data.

Protocols @network layer

Routed protocols routing protocolsEg: ip,ipx eg: rip,igrp,ospf

Routed protocols: they always carry the data along with themRouting protocol: they identify the path for routed protocol to carry the dataAt this layer routers & layer 3 switches forms packets.

Page 110: CCNA Presentation. (3)

Data link layer

MAC LLCMedia access control logical link control framing of data

Ip address is lik the pincode & MAC address is like house number.Here layer2 switches are used.Wab protocols used at this layer are PPP,HDLC,FP,X.25 etc.Here error checking CRC bits are added to the packetsDLL info+ packets --> frames

Page 111: CCNA Presentation. (3)

7 physical layerTakes care of physical connectivity i.e connector,cable etc. hereFrames are converted to bits (1’s & 0’s).The devices like hubs, repeaters,cables & connectors are used at this layer.

I P Addressing Now a days ip ver4 is followed. It is a 32-bit addressing scheme. 32bits are divided into 4 octets of 8 bits each.i.e 8-8-8-8. i.e (1’s & 0’s)-(1’s & 0s)-(1’s & 0’s)-(1’s & 0’s).(binary format). The ip address is maximum of 255 & min of 0.In future ip ver 6 is expected. It is 128 bit scheme.Ip adresses are clsassified into different classes.

Page 112: CCNA Presentation. (3)

Class A 0 - 127Class B 128 - 191Class C 192 - 223Class D 224 - 239Class E 240 - 255

8-8-8-8M.S.O Most Significant Ocate considering MSO

Page 113: CCNA Presentation. (3)

Through out class A, the MSB ‘0’ is constant in class B the Msbs are ‘101’ constant through out.Class D & E are not used for internetworking class D is used forMulticast network.“ E “ “ “ research.

class A0-0-0-0 should not be assigned for any divice127-0-0-0 is reserved for loopback127-0-0-1127-0-0-”127-0-0-” usually reserved for loopback127-0-0-”127-255-255-254

Page 114: CCNA Presentation. (3)

Hence 0 & 127 cannot be used for adressing so actual range will be 1 to 126.All ip addresses are divided into two.1.network I.d2.host I.d in class a address there is 1n\w I.d postion & 3 host I.d postion I,e N-H-H-H..Class A N-H-H-HClass B N-N-H-HClass C N-N-N-H

Network Ids are represented by 1s & host ids are by 0s.

Page 115: CCNA Presentation. (3)

Types of ip adresses IP address

public ip address private ip address

Public network: the public address is defined with routing over the Internet it is given by I.S.P & routing table is created on the internet.

Private network: for internal network I,e intranet, all the ip addresses Are governed by a body called INTERNIC. If we are a part of asiaPacefic then it is governed by APNIC.

We can run our private network with any ip addresses of our choice But it should not be connected to internet.

Page 116: CCNA Presentation. (3)

Range of addresses for private networkClass A 10.0.0.0 to 10.255.255.255Class B 172.16.0.0 to 172.31.255.255Class C 192.168.0.0 to 192.168.255.255

Private ip addresses donot have routing.To meet the demand of no.of networks, the network is broken Into smaller networks called subnets.Eg: find no.of subnets, hosts/s.n subnet mask & valid ip addressesFor a class c address.192.168.1.0/24‘24’ shows the network bits24= 3 octate position bits are enough, therefore no need to borrowAny bits from host position.=24 network & no hostDefault subet mask is 255.255.255.0 & valid ip addresses are 192.168.1.0 network

Page 117: CCNA Presentation. (3)

Switch An essential component of lan. Switches are of different types likeLayer 2 layer 3, layer 4, layer 5…..Layer 2 switch :Switch hub•Layer 2 layer 1•b.w is equal @ all ports b.w is shared•Identifies source with MAC cannot identifiy the source•Broad cast occur, till mac table alwaysbroad cast Is built•Collision occur when both A&B Many collisionsWants to reach D.•1 broad cast domain 4 collision 1 broad cast domain 1 collisionDomains domain

Page 118: CCNA Presentation. (3)

Switches

Access layer Distribution layer Core layer

Access layer swithc: catalyst 1912 Catalyst – manufacturer, but it is now owned by cisco.12 port switch

Page 119: CCNA Presentation. (3)

Switch

standard edition enterprise edition

To configure VLANS,go for enterprose edition as standard editionWill not support VLAN.For uplinking or cascading 100mbps is minimum required.

Functions of switch1. Adress learning 2. Filter & forwarding3. Loop avoidance

1. Address learningBooting 1.blocking state (15 secs)

2.Listening state (15 secs)3.Learning stage (20 secs)4.Forwarding stage (20 secs)

Page 120: CCNA Presentation. (3)

The switch will always learn the MAC address from the source itselfThe source should atleast communicate once to learn the MAC address.

2. Filter & forwarding : store & forward cut through fragment freeOn access layer the default is fragment free we can change to anyOf the3 mentioned above.

1.store & forward: it stores the whole information (1500 bytesEthernet) into buffer, then checks for errors, looks for destination In MAC table and then forward.

2. Cut through: no error checking.as soon as a packet arrivesIt looks into MAC table & forward.

Page 121: CCNA Presentation. (3)

3.loop avoidance: consider a scenario where pc1 wants to communicate To pc2. Switch a makes entry of pc1 in its MAC table as it is a new Switch. This looping is before the MAC table I s made. This is called Initial flood or broad cast storm.

STP: spanning tree protocol. To avoid loops in case of a cascaded Switch stp is enabled by default.