Top Banner
1
322
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CCNA Summary

1

Page 2: CCNA Summary

2

Course Introduction

Page 3: CCNA Summary

3

Cisco Career Certifications

Professional

CCIE

CCNP

CCNAAssociate

http://www.cisco.com/go/certifications

Recommended Training Through

Cisco Learning Partners

Required Exam

CCNA Cisco Certified Network Associate

Expert

CCNA Exam 640-802

Page 4: CCNA Summary

4

Cisco Different Certifications Fields

CCIE Routing

and Switching

CCNP

CCNA

Network Implementation Network Design

None

CCNP

CCDA

or

CCNA

CCIE

Service Provider

CCIP

CCNA

Network Service Provider

CCIE

Security

CCSP

CCNA

Network Security Voice Networks

CCIE

Service Provider

CCIP

CCNA

Storage Networking

CCIE

Voice

CCVP

CCNA CCNA

None

CCIE

Storage Networking

Page 5: CCNA Summary

5

Course Topics

- Introduction , OSI & TCP/IP

- OSI & TCP/IP Layers

- IP Addressing & Subnetting

- Introduction to Cisco IOS

- Routing

- Access lists

- Switching

- WAN

Page 6: CCNA Summary

6

• Network:

is basically all the components (H/W &

S/W) involved in connecting computer across

small and large distance

• Importance of Networks:

Easy access and sharing of information

Sharing of expensive devices and network

resources

Modern Technologies (IP telephony, Video

on Demand, ….etc)

Networking Technologies

Page 7: CCNA Summary

7

Network components

• Network has three main components

Computers (servers and hosts)

- Source of applications (network aware applications)

- ex: HTTP (Hyper Text Transmission Protocol),

FTP (File Transfer Protocol),

SNMP (Simple Network Management Protocol)

Telnet

Network Devices

- Devices that interconnect different computers together

- ex: Repeaters, hub, bridge, switch, router, NIC and modems

Connectivity

- Media that physically connect the computers and network devices

- ex: Wireless and cables

Page 8: CCNA Summary

8

Network Types

• LAN (Local Area Network):

It is a group of network components that work

within small area

• WAN (Wide Area Network):

It is a group of LANs that are interconnected

within large area

Page 9: CCNA Summary

9

Reference Models

- describe data transfer standards

- a framework (guideline) for network

implementation and troubleshooting

- Reference model types :

- OSI

- TCP/IP

Page 10: CCNA Summary

10

Reference Models

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Application

Transport

Internet

Network

Access

Page 11: CCNA Summary

11

The OSI Reference model

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Transmission example:-

AB

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Segment

Packet

Frame

Bits

User Data

Page 12: CCNA Summary

12

Encapsulation Process

Page 13: CCNA Summary

13

The Application Layer-7 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer deals with

networking applications.

Examples:

Email

Web browsers

Each application uses a

certain service from

Transport Layer

(reliable or unreliable)

PDU - User Data

Page 14: CCNA Summary

14

The Presentation Layer-6 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer is responsible

for presenting the data in

the required format which

may include:

Encryption

Compression

PDU - Formatted Data

Page 15: CCNA Summary

15

The Session Layer-5 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer establishes, manages,

and terminates sessions between

two communicating hosts.

Example:

Client Software

( Used for logging in)

PDU - Formatted Data

Page 16: CCNA Summary

16

The Transport Layer-4 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

- This layer breaks up the data

from the sending host and then

reassembles it in the receiver.

(segmentation)

- It also is used to insure reliable

data transport across the

network

(reliability and flow control)

PDU - Segments

Page 17: CCNA Summary

17

The Network Layer-3 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

- Logical addressing (IP address)

- Best Path Determination

(routing)

PDU - Packets

Page 18: CCNA Summary

18

The Data Link Layer-2 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This layer provides reliable

transit of data across a physical

link hop by hop .

Makes decisions based on

physical addresses

(usually MAC addresses)

PDU - Frames

Page 19: CCNA Summary

19

The Physical Layer-1 Layer

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

This is the physical media

through which the data,

represented as electronic

signals, is sent from the source

host to the destination host.

Examples:

UTP

Coaxial (like cable TV)

Fiber optic

PDU - Bits

Page 20: CCNA Summary

20

TCP/IP model

Application

Transport

Internet

Network

Access

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Page 21: CCNA Summary

21

Hierarchical Network Model

Page 22: CCNA Summary

22

22

The Physical Layer

Page 23: CCNA Summary

23

Physical Layer Responsibilities

Description of LAN/WAN cables & connectors

Description of LAN/WAN standards

(maximum length, bit rates, pin assignment, voltage levels)

Physical Layer Devices

Page 24: CCNA Summary

24

LAN Physical Layer

Ethernet cables :

- Copper ( UTP , STP , Coaxial )

- Fiber

Page 25: CCNA Summary

25

Unshielded Twisted Pair (UTP) Cable

CAT5 CAT 5e , CAT6

RJ-45

prevents EMI , RFI

to avoid attenuation

Page 26: CCNA Summary

26

Using UTP cable to connect devices

1- straight cable

2- cross cable

3- roll over cable

Page 27: CCNA Summary

27

Through or Crossover cables -Straight

PC

router

switch

hub

modem

Cross

cable

straight

cable

Cross

cable

Page 28: CCNA Summary

28

Shielded Twisted Pair (STP) Cable

Page 29: CCNA Summary

29

Coaxial Cable

thick coaxial , thin coaxial (200 m)

Page 30: CCNA Summary

30

Fiber Optic Cable

Page 31: CCNA Summary

31

Fiber Optic Connectors

single mode fiber

multimode fiber

Page 32: CCNA Summary

32

WAN Physical Layer

serial cables

Page 33: CCNA Summary

33

WAN Terminologies

DTE : DCE :

Page 34: CCNA Summary

34

Transmission modes

- Full duplex :

devices can send , receive data at the

same time (two ways for transmission)

- Half duplex:

one circuit for transmission , so only one

device can use the bus (send or receive)

at a time , if two devices sent at the same

time collision occurs .

Page 35: CCNA Summary

35

devices 1 Layer

Repeater-1

A repeater is a network device used to regenerate a signal.

Repeaters regenerate analog or digital signals distorted by

transmission loss due to attenuation. Rule : no more than four

repeaters can be used between hosts on a LAN.

Page 36: CCNA Summary

36

Hub-2

Hubs takes data bits from

input port and forward it to

all other ports

A Hub is a multi-port

Repeater

repeater and hub work in

half duplex mode

Page 37: CCNA Summary

37

37

The Data-Link Layer

Page 38: CCNA Summary

38

Link Layer Responsibilities-Data

Description of H/W addressing

MAC (Media Access Control) address

frame format

Error detection between hop to hop

Data-Link layer standards :

LAN: Ethernet, Token Ring, FDDI

WANs: HDLC, PPP, ISDN, X.25, Frame-Relay, ATM

Page 39: CCNA Summary

39

Ethernet Overview

- Ethernet is now the dominant LAN technology in the world.

- Ethernet is not one technology but a family of LAN

technologies.

- Ethernet specifications support different media,

bandwidths, and other Layer 1 and 2 variations.

Page 40: CCNA Summary

40

MAC Address

- MAC address is 48 bits in length and expressed as twelve

hexadecimal digits.

- MAC addresses are burned into read-only memory (ROM) of the NIC

- each NIC has a unique MAC address

- MAC address can represent unicast , broadcast and multicast

ex. A34C.52BD.1234

Page 41: CCNA Summary

41

Host can not send

whenever bus is busy

CSMA/CD operation in half duplex media

Page 42: CCNA Summary

42

Ethernet Frame Structure

DataTypeIEEE802.2

Page 43: CCNA Summary

43

devices2 Layer

• A layer 2 device is a device that understand MAC,

for example:

NIC (Network Interface Card)

Bridge :

- address learning

- forwarding decisions are based on software

- bridge is used for LAN segmentation

Switch:

- a multi-port bridge

- forwarding decisions are based on hardware ASIC

(faster than bridge)

Page 44: CCNA Summary

44

• Transparent Bridge and Switche has 3 main functions Address learning

Forward/filter decision

Loop avoidance

Ethernet Switches and Bridges

All ports of the

Switch and Bridge

are members in

single broadcast

domain, and

multiple collision

domains

Page 45: CCNA Summary

45

Address Learning-1

Switch learns which MAC’s are connected to which

ports by checking the frame source MAC address .

Page 46: CCNA Summary

46

Forwarding-2

- Forwarding is done by checking the destination MAC address

-- If the destination MAC is unknown unicast or broadcast or multicast

the frame will be flooded (sent out of all switch ports)

- for the known unicast, switch will forward frame through the learned port only

Page 47: CCNA Summary

47

Types of frame errors

1 – CRC error :

Frame contents changed during transmission

2 – Runt frame :

Frame size is less than 64 byte

3 – Giant Frame :

Frame size is larger than 1518 byte

Page 48: CCNA Summary

48

Store and Forward

Complete frame is received

and checked before

forwarding.

Forwarding modes

Cut-Through

• Switch checks destination

address and immediately

begins forwarding frame.

Fragment-Free

• Switch checks

the first 64 bytes, then

begins forwarding frame.

Page 49: CCNA Summary

49

loops2 Remove Layer -3

MAC port

A

A

3

1• Solution : using Spanning tree protocol (STP)

Page 50: CCNA Summary

50

Frame creation

Destination

MAC

Source

MAC

Source

IP

Destination

IP

Burned

on the NIC

- ARP

- Proxy ARP

- Static

- Dynamic

(RARP ,

BOOTP ,

DHCP)

DNS

Page 51: CCNA Summary

51

Source MAC-

Burned

on the NIC

Page 52: CCNA Summary

52

Source IP-

1- by static configuration

Page 53: CCNA Summary

53

Source IP-DHCP :-

- Dynamic host configuration

protocol

- DHCP allows a host to obtain

an IP address dynamically

without the network

administrator having to set

up an individual profile for

each device.

- a range of IP addresses on a

DHCP server is defined .

- the entire network

configuration of a computer

can be obtained in one

message from the server.

Page 54: CCNA Summary

54

Destination IP-

• Application specified in the TCP/IP suite

• Means to translate human-readable names into IP addresses

DNS :

Page 55: CCNA Summary

55

Destination MAC-

- ARP :

- each PC

form an

ARP table

containing

the learned

MAC’s

Page 56: CCNA Summary

56

Destination MAC-

A

Router R

Broadcast Message to all:

If your IP address matches “B”

then please tell me your

Ethernet address

B

A

B

Yes, I know the destination

network, let me give you my

Ethernet address

I take care, to forward

IP packets to B

Proxy ARP :-

Page 57: CCNA Summary

57

57

The Transport Layer

Page 58: CCNA Summary

58

The Transport Layer

reliable

service

unreliable

service

Page 59: CCNA Summary

Flow Control

- Windowing (PAR):

2error in

2

2 2

3

3

Page 60: CCNA Summary

60

Flow Control- Windowing (PAR):

Page 61: CCNA Summary

61

Addressing4 Layer

• Port Numbers :

• Port numbers are classified to

Well Known port (0-1023):

it identifies different applications,

ex:FTP(20,21), Telnet(23), SMTP(25), DNS(53), HTTP(80)

User defined port (1024-65535):

it is given randomly by the operating system for

each session initiated by the hot

Page 62: CCNA Summary

62

Multiplexing applications

12.0.0.1

12.0.0.213.0.0.1

web server

1

2

3

13.0.0.112.0.0.1 1200 801

13.0.0.112.0.0.1 1500 80

13.0.0.112.0.0.2 1200 80

2

3

Source IP Destination IP Source port Destination port

Page 63: CCNA Summary

TCP Header

Page 64: CCNA Summary

UDP Header

Page 65: CCNA Summary

65

65

The Application Layer

Page 66: CCNA Summary

66

• File transfer

– FTP

– TFTP

• E-mail

– Simple Mail Transfer Protocol

• Remote login

– Telnet

• Network management

– Simple Network Management Protocol

• Name management

– Domain Name System

TCP/IP Application Layer Overview

Page 67: CCNA Summary

67

Port Numbers

Page 68: CCNA Summary

68

68

The TCP/IP Internet Layer

Page 69: CCNA Summary

69

Internet Layer

• Internet Layer is responsible for the following:

Support of logical addressing for network components

Routing (Finding the best path for data)

Layer 3 devices

• Internet Layer protocols are

IP (Internet Protocol)

ICMP (Internet Control Management Protocol)

ARP (Address Resolution Protocol), RARP (Revere ARP)

Routing Protocols ex. OSPF , EIGRP ,

• IP has the following characteristics

Provide Logical addressing

Provide connectionless “best effort” delivery of data

Page 70: CCNA Summary

70

IP Packet

IP packets consist of the data from upper layers plus an IP

header. The IP header consists of the following:

Page 71: CCNA Summary

71

IP addressing

- Each host in the network must have a unique IP address

because duplicate addresses would make routing impossible

- IP Addressing is a hierarchical structure as the IP address

combines two identifiers into one number .

the first part identifies the network address , the second part,

called the host part, identifies which particular machine

it is on the network.

- IP address is a 32 bit (4 bytes= 4 octets) address that is

mainly divided to network part (representing the network ID

where the device is located in) & Host part (representing the

ID of the host)

- It is represented in a dotted decimal form, where each octet

is transformed to its decimal value.

ex. 192.168.1.3

Page 72: CCNA Summary

72

IP Address Classes

IP addresses are divided into classes to define the large,

medium, and small networks.Class A addresses are assigned to larger networks.

Class B addresses are used for medium-sized networks,

Class C for small networks,

Class D for Multicasting

Class E for Experimental purposes

Page 73: CCNA Summary

73

Identifying Address Classes

Note : for Class A , networks 0 & 127 are reserved (class A range 1 - 126)

Page 74: CCNA Summary

74

Public IP Addresses

- Unique addresses are required for each device on a network

- Originally, an organization known as the Internet Assigned

Numbers Authority (IANA) handled this procedure.

- No two machines that connect to a public network can have

the same IP address because public IP addresses are global

and standardized.

Page 75: CCNA Summary

75

Private IP Addresses

Private IP addresses are another solution to the problem of

the impending exhaustion of public IP addresses.As

mentioned, public networks require hosts to have unique IP

addresses.

However, private networks that are not connected to the

Internet may use any host addresses, as long as each host

within the private network is unique.

Page 76: CCNA Summary

76

IP address types

• IP address could be one of three categories

Network address

Host address

Broadcast address

Page 77: CCNA Summary

77

Network / Broadcast Addresses

- Network address :

the first IP address in it which all host part bits = 0

- Broadcast address:

the last IP address in the network which all host part bits = 1

no. of host bits

- other addresses are host addresses = 2 - 2

- Here are some examples:

Class Network Address Broadcast Address

A 12.0.0.0 12.255.255.255

B 172.16.0.0 172.16.255.255

C 192.168.1.0 192.168.1.255

Page 78: CCNA Summary

78

Subnet Mask

- 32 bit mask ( 1’s followed by 0’s )

- Used by routers and hosts to determine the number of

network- significant bits ( identified by 1’s )

and host- significant bits in an IP address (identified by 0’s)

- example :Class Network Address Default subnet mask

A 12.0.0.0 255.0.0.0 or /8

B 172.16.0.0 255.255.0.0 or /16

C 192.168.0.0 255.255.255.0 or /24

Page 79: CCNA Summary

79

Octet Values of a Subnet Mask

• Subnet masks like IP addresses can be represented in the dotted decimal format like 255.255.255.0.

Page 80: CCNA Summary

80

Subnetting

- Subnetting a network means to use the subnet mask to divide the

network and break a large network up into smaller, more efficient and

manageable segments, or subnets.

- Subnetting is done by taking part of host bits then add it to

the network part

Network part Host part

Subnet

bits

Network part Host part

IP

address

Page 81: CCNA Summary

81

Subnetting Example

Divide network 192.168.1.0/24 into 4 subnets

bits2 subnets need 4 Solution:

192.168.1 . 0

11 1111 00to 00 0000 00. 1 .168.192

11 1111 01to 00 0000 01. 1 .168.192

11 111110to 00 0000 10. 1 .168.192

11 111111to 00 0000 11. 1 .168.192

subnet mask is 255.255.255.192 or /26

The first subnet is 192.168.1.0/26

The second subnet is 192.168.1.64/26

The third subnet is 192.168.1.128/26

The fourth subnet is 192.168.1.192/26

0 - 63

64 - 127

128 - 191

192 - 255

Page 82: CCNA Summary

82

Divide network 192.168.1.0/24 into 4 subnets

Solution :

- 4 subnets need 2 bits

- subnet mask = 255.255.255.192

- interesting octet is 192

- hop count = 256 – 192 = 64

- The first subnet is 192.168.1.0/26

- The second subnet is 192.168.1.64/26

- The third subnet is 192.168.1.128/26

- The fourth subnet is 192.168.1.192/26

Page 83: CCNA Summary

83

Determine if this IP is network address or host

address or broadcast address

172.16.5.0/23

Solution :

- subnet mask = 255.255.254.0

- interesting octet is 254

- hop count = 256 – 254 = 2

- The first subnet is 172.16.0.0/23

- The second subnet is 172.16.2.0/23

- The third subnet is 172.16.4.0/23

- The fourth subnet is 172.16.6.0/23

So 172.16.5.0/23 is a host address 172.16.5.0/23

Page 84: CCNA Summary

84

- Which IP address should be assigned to PC B ?

A . 192.168.5.5

B . 192.168.5.32

C . 192.168.5.40

D . 192.168.5.63

E . 192.168.5.75 192.168.5.33/27

?

A

B

Answer : C

Page 85: CCNA Summary

85

- Given the choices below, which address

represents a unicast address?

Answer : E

A . 224.1.5.2

B . FFFF. FFFF. FFFF.

C . 192.168.24.59/30

D . 255.255.255.255

E . 172.31.128.255/18

Page 86: CCNA Summary

86

ICMP

D:\>ping 192.110.1.140

Pinging 192.110.1.140 with 32 bytes of data:

Request timed out

Internet control message protocol verifies

network devices connectivity (Ping)

Page 87: CCNA Summary

87

devices3 Layer

Router :- best path determination

- creating routing table

- connecting different LANs

All interfaces of the

router are members

in multiple broadcast

domains, and

multiple collision

domains

Page 88: CCNA Summary

88

Find number of broadcast domains and number

of collision domains

Solution :

no. of broadcast domains = 2

no. of collision domains = 4

Page 89: CCNA Summary

89

Page 90: CCNA Summary

90

90

Operating Cisco IOS Software

Page 91: CCNA Summary

91

Cisco Software components

• Cisco IOS (Internetwork Operating System)

It is the operating system that manages the hardware

platform it is working on.

• Configuration File

It is a program file that contains commands that

reflect how the router will react.

Page 92: CCNA Summary

92

Router Internal Components

Configuration

file

IOS

Current

Config.

Page 93: CCNA Summary

93

Router2600 External Components of a

Page 94: CCNA Summary

94

Computer/Terminal Console Connection

Page 95: CCNA Summary

95

HyperTerminal Session Properties

Page 96: CCNA Summary

96

Setup mode

- Permit the administrator to install a minimal configuration for a router

( appeared if no saved configuration , Ctrl-C to skip )

Page 97: CCNA Summary

97

Other Router Modes

Page 98: CCNA Summary

98

IOS Features

• Support context help and abbreviations ( ? )

• Support of auto complete ( Tab button )

• Support syntax error detection

Page 99: CCNA Summary

99

Context help features

Page 100: CCNA Summary

100

Configuring Router Identification

Page 101: CCNA Summary

101

Configuring a Router Password

Page 102: CCNA Summary

102

Configuring Interfaces

Router#config t

RouterA(config)# interface serial 0/0

RouterA(config-if)# ip address 192.168.1.1 255.255.255.252

RouterA(config-if)# no shutdown

RouterA(config-if)# clock rate 56000 (required for serial DCE only)

RouterB(config)# int serial 0/1

RouterB(config-if)# ip address 192.168.1.2 255.255.255.252

RouterB(config-if)# no shutdown

RouterB(config-if)# exit

RouterB(config)# exit

Router#

To know which interface is the DCE :

RouterA# show controller s0/0

S0/0S0/1

192.168.1.1/30192.168.1.2/30

Page 103: CCNA Summary

103

monitoring and debuggingshow commands are typed in the privileged EXEC mode (enable mode)

#show interface – Displays all the statistics for all the interfaces

#show interface s0/1 – Displays statistics for interface Serial 0/1

#show ip interface brief – Displays a summary about interfaces

#show controllers s0/0 – Displays information-specific to the

interface hardware

#show flash – Displays info about flash memory and what IOS in it

#show start – Displays the saved configuration located in NVRAM

#show run – Displays the configuration currently running in RAM

#show version – Displays info about the router and the IOS

#show ARP – Displays the ARP table of the router

#erase start – erase the saved configuration file in NVRAM

#reload – restart the router

#copy run start – save the current configuration in RAM into the NVRAM

Page 104: CCNA Summary

104

show flash command

Page 105: CCNA Summary

105

• Displays the current and saved configuration

config and -show running

config Commands-show startup

Page 106: CCNA Summary

106

show interfaces Command

Page 107: CCNA Summary

107

• Shows the cable type of serial cables

Serial Interface show controller

Command

Page 108: CCNA Summary

108

Using Telnet to Connect to

Remote Devices

Telnet is used to check all the TCP/IP stack

Page 109: CCNA Summary

109

Using the ping and trace

Commands

Ping commands tests the connectivity and path to a remote device

( test layer 3 in TCP/IP )

Page 110: CCNA Summary

110

Interpreting the Interface Status

Layer 1 status Layer 2 status

- Serial0/1 is administratively down , line protocol is down

interface is shut down

- Serial0/1 is down , line protocol is down

interface or cable H/W failure ( no keep-alives )

- Serial0/1 is up , line protocol is down

different encapsulation type ( PPP , HDLC , FR ) or no clock rate

on the DCE device.

Interface

is working

properly

Other interface status :

S0/1S0/0

Page 111: CCNA Summary

111

show version Command

Page 112: CCNA Summary

112

Configuration Register Values

0x2100

0x2101

0x2102 to

0x210F

The configuration register value set the boot option

The value 0x2142 is used to bypass the NVRAM

Page 113: CCNA Summary

113

Boot system command

- beside the configuration register you can

use the boot system command to force

booting location.

Router(config)# boot system flash

Router(config)# boot system rom

Router(config)# boot system tftp

Page 114: CCNA Summary

114

Discovering Neighbors with CDP

• CDP runs on routers with Cisco IOS

to get information about the direct

connected Cisco devices.

• Summary information

includes:

– Device identifiers

– Address list

– Port identifier

– Capabilities list

– Platform

Page 115: CCNA Summary

115

Using the show cdp

neighbors Command

RouterA# show cdp neighbors detail

provide also the neighbors ip addresses.

Page 116: CCNA Summary

116

Cisco IOS copy Command

#

#

#

#

#

#

To save IOS image or

configuration file

Page 117: CCNA Summary

TFTP

application

FLASH

Managing configuration file with

TFTP application

wg_ro_a#copy tftp flashAddress or name of remote host [10.1.1.1]?

Source filename []? c2500-js-l_120-3.bin

Destination filename [c2500-js-l_120-3.bin]?

Accessing tftp://10.1.1.1/c2500-js-l_120-3.bin...

Erase flash: before copying? [confirm]

Erasing the flash filesystem will remove all files! Continue? [confirm]

Erasing device... eeeee (output omitted) ...erased

Erase of flash: complete

Loading c2500-js-l_120-3.bin from 10.1.1.1 (via Ethernet0):

!!!!!!!!!!!!!!!!!!!!

(output omitted)

[OK - 10084696/20168704 bytes]

Verifying checksum... OK (0x9AA0)

10084696 bytes copied in 309.108 secs (32636 bytes/sec)

wg_ro_a#

Page 118: CCNA Summary

118

Managing configuration file with

TFTP applicationwg_ro_a# copy run tftp

Address or name of remote host []? 10.1.1.1

Destination filename [running-config]? wgroa.cfg

.!!

1684 bytes copied in 13.300 secs (129 bytes/sec)

wg_ro_a# copy tftp run

Address or name of remote host []? 10.1.1.1

Source filename []? wgroa.cfg

Destination filename [running-config]?

Accessing tftp://10.1.1.1/wgroa.cfg...

Loading wgroa.cfg from 10.1.1.1 (via Ethernet0): !

[OK - 1684/3072 bytes]

1684 bytes copied in 17.692 secs (99 bytes/sec)

Page 119: CCNA Summary

119

Page 120: CCNA Summary

120

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—3-120

Introducing

Routing

Page 121: CCNA Summary

121121

To route, a router needs to do the following:

• Discover the connected networks .

• Select the best paths (routes) to these networks.

• Maintain and verify routing information using a routing table.

What Is Routing ?

Page 122: CCNA Summary

122122

• Routing table contains the best paths discovered by a “ routing protocol “

Routing table

Page 123: CCNA Summary

123123

• Static Route

a route (path)

that a network

administrator

enters into the

router manually

• Dynamic Route

a route (path) that

a network routing

protocol discovers

automatically and

adjusted when

topology changes

Routing Protocols

Page 124: CCNA Summary

124124

Routing Protocols

Static Dynamic

Direct

connected

Static

route

Default

route

IGP EGP

(EGP ,

BGP)

Distance

vector

(RIPv1 ,

IGRP)

Link

state

(OSPF ,

ISIS)

Hybrid

(EIGRP ,

RIPv2)

Page 125: CCNA Summary

125125

Autonomous Systems: Interior or

Exterior Routing Protocols

Page 126: CCNA Summary

126126

Routing table creation

Routing table contains only the decisions of

the best routing protocol and the best

paths to reach networks.

- The best routing protocol is elected based

on its administrative distance.

- The best paths depend on its metric

Page 127: CCNA Summary

127127

Administrative Distance

it is a value between ( 0 – 255 ) that reflects the

truthfulness of routing protocol (the best protocol

has the least admin. distance)

OSPF

110

Page 128: CCNA Summary

128128

Selecting the

Best Route with Metrics

- The best path

has the least

metric.

- each routing

protocol use a

metric type

(hop count , BW ,

delay , load ,

reliability , MTU)

Page 129: CCNA Summary

129129

Static routing protocol

1- Direct connected networks :- Direct connected networks are automatically detected

by the router without configuration

- symbol in routing table is “ C ”

- admin. Distance = 0

10.0.0.0 11.0.0.0 12.0.0.0 13.0.0.0

10.0.0.0

11.0.0.0

11.0.0.0

12.0.0.0

12.0.0.0

13.0.0.0

C

C C

C

C

C

Page 130: CCNA Summary

130130

Static routing protocol

2- Static route :

- manually you can define a path to reach a certain network

- symbol in routing table is “ S ”

- admin. Distance = 1192.168.1.0/24

192.168.1.0 S0

12.0.0.1/812.0.0.2/8

OR 192.168.1.0 12.0.0.2

Internet

Page 131: CCNA Summary

131131

Static routing protocol

3- Default route :- This route allows the stub network to reach all known networks beyond router A (gateway of last resort)

- symbol in routing table is “ S* ”

192.168.1.0/24

12.0.0.1/812.0.0.2/8

12.0.0.1

Internet S0

Page 132: CCNA Summary

132132

Displaying the routing table

router# show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP

D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP

i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default

U - per-user static route

Gateway of last resort is 0.0.0.0 to network 0.0.0.0

C 12.0.0.0 is directly connected, Serial0

S* 0.0.0.0/0 is directly connected, Serial0

Page 133: CCNA Summary

133133

Dynamic routing protocols

Distance Vector Routing Protocols :- each router detects its direct connected networks and

form its initial routing table

- routers pass periodic copies of routing table to neighbor

routers and learn the best paths to all networks

( the paths with the least metric ) and form the final

routing table (convergence)

- after convergence periodic updates (full routing table) are

sent to indicate any change in the topology .

Page 134: CCNA Summary

134134

Distance Vector Routing

Protocols

10.0.0.0 11.0.0.0 12.0.0.0 13.0.0.0

10.0.0.0 11.0.0.0 12.0.0.0

11.0.0.0

12.0.0.0

13.0.0.0

12.0.0.0

10.0.0.0

13.0.0.0

13.0.0.0

11.0.0.0

10.0.0.0

Page 135: CCNA Summary

135135

Routing loops

10.0.0.0

10.0.0.0 E0 16

down

10.0.0.0 S0 16

10.0.0.0 S1 3

10.0.0.0 S0 2

- when network 10.0.0.0 fails , router A will mark its metric

by 16 (a max. hop count value to avoid counting to infinity)

and send its routing table to B after the periodic interval.

- before B sends its periodic update to C , router C sent its

routing table to B containing a path to 10.0.0.0 with a better

metric so B think that 10.0.0.0 can be reached by C while C

depends on B for that so loop occurs .

Page 136: CCNA Summary

136136

Routing loops solutions

- Split Horizon :

route learned from an interface can not be

sent back on the same interface

10.0.0.0

10.0.0.0 E0 16

down

10.0.0.0 S0 16 10.0.0.0 S0 2

Page 137: CCNA Summary

137137

Routing loops solutions

- Hold-down Timers :- router that informed with a failed route don’t accept any

update about it for a time equal to the hold down timer so

by the end of the timer all routers would know that route

failed ( it is useful in flapping networks ).

- hold finish if :

– The hold-down timer expires.

– Another update is received with a better metric.

10.0.0.0

10.0.0.0

10.0.0.0

Page 138: CCNA Summary

138138

Routing loops solutions

- Triggered Updates :instead of sending updates after a time interval , router

sends the update as soon as a route fails or any change

occurs so other routers immediately modify their routing

tables ( this is the most used solution ).

Page 139: CCNA Summary

139139

Properties of Distance Vector

Routing Protocols

- simple configuration

- low processing / memory usage

- bandwidth waste due to the periodic updates

- unreliable (no ack. for the protocol messages)

- updates are sent broadcast on all active interfaces so it may affect the hosts PCs

- classful :

do not include the subnet mask with the route advertisement and often sends a summary routes

- These are examples of distance vector protocols:

• RIP version 1 (RIPv1)

• IGRP

Page 140: CCNA Summary

140140

1RIP v- distance vector routing protocol

- symbol in routing table is “ R ”

- admin. Distance = 120

- metric is hop count , metric 16 means unreachable

- full routing tables are flooded in the network till

convergence occurs (use Bellman Ford algorithm)

- after convergence , periodic updates are sent every

30 seconds

- at change , triggered update is sent

- support load balancing if many paths to the same network

exist with an equal metric

- Classful

Page 141: CCNA Summary

141141

- Starts the RIP routing process

Router(config)#router rip

Router(config-router)#network direct connected network

- Advertise about the connected networks

RIP Configuration

Router# debug ip rip

Page 142: CCNA Summary

142142

RIP Configuration Example

Page 143: CCNA Summary

143143

Verifying the RIP Configuration

Page 144: CCNA Summary

144144

Displaying the

IP Routing Table

Page 145: CCNA Summary

145145

Page 146: CCNA Summary

146146

State Routing Protocols-Link

10.0.0.1/8

12.0.0.1/812.0.0.2/8 13.0.0.2/8

13.0.0.1/8

15.0.0.1/814.0.0.1/8

14.0.0.2/811.0.0.2/811.0.0.1/8

Operation :-

- each router will discover its direct connected neighbors

using the “hello protocol“ (layer-3 protocol)

- each router will form a packet called link state advertisement

(LSA)

10.0.0.1/8

11.0.0.1/8

12.0.0.1/8

State , Cost C

AL S

Page 147: CCNA Summary

147147

State Routing Protocols-Link

- each router will flood its LSA to all neighbors on special

multicast address then neighbors continue flooding of

the LSA’s to each other.

- each router will form the link state database (LSDB) from

the received LSA’s so all routers will have the same

LSDB form.

10.0.0.1/8

11.0.0.1/8

12.0.0.1/8

11.0.0.2/8

14.0.0.2/8

12.0.0.2/8

13.0.0.2/8

13.0.0.1/8

14.0.0.1/8

15.0.0.1/8

A

B

C

D

Page 148: CCNA Summary

148148

State Routing Protocols-Link

- every router will form the Link State Tree that describe

the actual connection of the network topology then apply

the Dijekstra algorithm on the tree to form the routing table.

after convergence: -

no periodic updates

at change: -

partial triggered update for the affected route is sent so all

routers repeat the link state process.

Page 149: CCNA Summary

149149

State Routing Protocols-Link

Page 150: CCNA Summary

150150

tate RoutingS-Benefits of Link

– Fast convergence:

changes are reported immediately by the source affected (partial triggered updates)

– Robustness against routing loops:• Routers know the topology.

• Link-state packets are sequenced and acknowledged (reliable protocol)

– Lower bandwidth waste:

no periodic updates

– classless

Page 151: CCNA Summary

151151

tate S-of Linkdisadvantages

Routing

– Significant demands for resources:

• Memory (three tables: adjacency, topology, forwarding)

• CPU (Dijkstra’s algorithm can be intensive, especially when a lot of instabilities are present.)

– Complex configuration

– Requires very strict network design (multiple areas)

Page 152: CCNA Summary

152152

OSPF

• Open standard

• Shortest path first (SPF) algorithm

• Link-state routing protocol

• Use Dijkstra’s algorithm

• Administrative Distance = 110

• Metric called cost = 10^8 / BW

• Hop-count is unlimited

• Symbol in routing table is O

• Loop free protocol

• Classless routing protocol

Page 153: CCNA Summary

153153

OSPF (Cont.)

• discover neighbors and maintain neighbor relationship using

hello protocol

• send hello every 10 seconds in point-to-point and broadcast

multi-access networks on multicast address 224.0.0.5 to reach

neighbors only

• dead interval = 4 hello timer (40 sec)

• send LSA’s (updates) on multicast address 224.0.0.5 (all

OSPF routers) and 224.0.0.6 (DR and BDR routers)

•Every OSPF router receives LSA updates it’s Link State

Database (LSDB) by copy of this LSA and flood it to all OSPF

neighbors except the one that send it, and then runs the

Dijkstra OSF algorithm to the new LSDB to draw the new

topology tree then form the routing table.

Page 154: CCNA Summary

154154

OSPF (Cont.)

• After convergence :

no periodic updates are sent except a periodic refreshment

message for LSDB every 30 minutes

• At change :

OSPF sends a triggered update for the affected route so

OSPF process repeated again

• OSPF tables :

1- neighbor table :

contains neighbor router ID’s and maintained by Hello’s

2- topology table :

all paths to all networks

3- routing table :

best paths to all networks

Page 155: CCNA Summary

155155

OSPF Hierarchical Routing

• OSPF supports Hierarchical multiple area design

• Multiple areas minimizes routing update traffic and limits the frequent SPF calculations and tends scalability to infinity

• Area 0 is the backbone area and all other areas must be connected to area 0

Page 156: CCNA Summary

156156

Router ID

• every router in OSPF environment is identified by RID

• RID is 32 bit value, it is selected to be :

1- the highest IP address of loopback interface if exist(logical interface that is always up)

to configure loopback interface :

(config)# interface loopback no.(config-if)# ip address ip mask

2- if no loopback interfaces the RID will take the highest IP of the active physical interfaces when the OSPF process get started

255.255.255.255

Page 157: CCNA Summary

157157

OSPF operation

1- in point to point topology : - neighbor discovery :

by sending hello messages periodically on multicast 224.0.0.5

• - for OSPF routers to be neighbors they must have:

- the same area ID

- same hello and dead intervals

- same authentication password

- route discovery :

exchange LSA’s on 224.0.0.5 so as each router has the same LSDB

- route selection :

form the routing table

Page 158: CCNA Summary

158158

Broadcast Multiple Access (BMA) Operation :-2

- Neighbor Discovery : as in point to point

- DR & BDR Election:

: Designated Router is a router that has DR -

1- highest priority (range 0 – 255 , default = 1)

2- if equal priorities , DR is the highest RID

that has the second highest priority : Backup DR is a routerBDR-

or RID

Note:

- if anew router with highest priority added ,it won’t be the DR

directly (non-preemptive)

- router with priority=0 can’t be the DR or BDR

- the routers that are not DR or BDR called drothers

OSPF operation

Page 159: CCNA Summary

159159

OSPF operation in BMA (cont.)

224.0.0.5Hello

new

Hellounicast

Unicast updatehere is my routing table

Ack.

Update to 224.0.0.6

here is my routing table

to other routers

- Route Selection:

- The router will form

a topology table

from all routing

tables it receives.

- Then apply the

Dijekstra algorithm

on the tree to

extract the routing

table

- Route Discovery:

form the adjacency with DR & BDR on 224.0.0.6

DR

Update to 224.0.0.5

update

Page 160: CCNA Summary

160160

OSPF operation in BMA (cont.)

224.0.0.6update

new

Ack.

Ack.

- Other routers repeat

the OSPF process

(SPF tree)

DR

- At change :

to other routers

Update to 224.0.0.5

update

Page 161: CCNA Summary

161

Configuring Single-Area OSPF

Router(config-router)#network network wildcard-mask area area-id

• Assigns networks to a specific OSPF area

Router(config)#router ospf process-id

• Defines OSPF as the IP routing protocol

Page 162: CCNA Summary

162

OSPF Configuration Example

0

0

255 area 0

255 area 0

RouterA(config)# interface serial 0/2

RouterA(config-if)# bandwidth 64 (a value in kbps)

Page 163: CCNA Summary

163

OSPF Configuration Example

Page 164: CCNA Summary

164

Router#show ip ospf interface

Verifying the OSPF

Configuration

• Displays area ID and adjacency information

Router#show ip protocols

• Verifies that OSPF is configured

Router#show ip route

• Displays all the routes learned by the router

Router#show ip ospf neighbor

• Displays OSPF neighbor information on a per-interface basis

Page 165: CCNA Summary

165165

OSPF debug Commands

Router#debug ip ospf events

OSPF:hello with invalid timers on interface Ethernet0

hello interval received 10 configured 10

net mask received 255.255.255.0 configured 255.255.255.0

dead interval received 40 configured 30

Router# debug ip ospf packet

OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.117

aid:0.0.0.0 chk:6AB2 aut:0 auk:

Router#debug ip ospf packet

OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116

aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0

Page 166: CCNA Summary

166166

Page 167: CCNA Summary

167167

Hybrid Routing Protocols

Page 168: CCNA Summary

168168

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—3-168

Determining IP Routes

Enabling EIGRP

Page 169: CCNA Summary

169169

EIGRP (Enhanced IGRP)

- advanced distance vector protocol.

- Cisco proprietary.

- maintain neighbor relationship using hello protocol.

- send hello every 5 sec. on fast link (>1.54Mbps).

- send hello every 60 sec. on slow link (<1.54Mbps).

- dead interval = 3 * hello interval.

- rapid convergence by using DUAL algorithm ( store a backup

route for each best route).

- support multiple network layer protocols (IP, IPX, Apple talk).

- support equal and unequal load balancing between many

paths to the same destination network.

- admin. Distance = 90 for internal routes.

- symbol ( D ) in routing table.

Page 170: CCNA Summary

170170

- Max. hop count = 224.

- Classless

- Reliable protocol.

- Have the same operation in all topologies.

- Use composite metric

- EIGRP routers to be neighbors:

1- Must have the same AS (autonomous system) number.

2- Must have the same K-values. (the same metric equation constants)

EIGRP (cont.)

– Bandwidth

– Delay

– Reliability

– Loading

– MTU

Page 171: CCNA Summary

171171

- Neighbor table: List of all neighbors.

- Topology table: list of all routes to destination networks.

- Routing table: list of best routes to all destination networks.

- Successor ( S ): best route to destination network , stored in routing table and topology.

- Feasible successor (FS): backup route to destination network, stored in topology table.

- Feasible distance (FD): metric between source and destination network.

- Advertised distance (AD): metric between my neighbor and the destination network .

EIGRP terminologies

- FD = next hop metric + AD.S

FS

AD

FD

Page 172: CCNA Summary

172172

EIGRP operation

224.0.0.10Hello

new

Hellounicast

Unicast updatehere is my routing table

Ack.

Update to 224.0.0.10

here is my routing table

Ack.

- The router will form

a topology table

from all routing

tables it receives.

- Then apply the

DAUL algorithm on

topology table to

extract the routing

table (S) and

calculate the

backup routes (FS).

At start up :-

Page 173: CCNA Summary

173173

At change:-

EIGRP operation (cont.)

224.0.0.10update

Ack.

1- New network appear :

After convergence:-

No periodic updates are sent

Page 174: CCNA Summary

174174

2- Network failure:

EIGRP operation (cont.)

- If there is a backup route (FS) :

224.0.0.10update

Ack.

The FS will be the new

successor for this rote

- If there is no backup route (FS) :

224.0.0.10query

Ack.

Yes / no

Ack.reply

Does any one know

another route to the

failed network

Page 175: CCNA Summary

175175

Configuring EIGRP

Router(config-router)# network network-number [wild card mask]

• Selects participating attached networks

Router(config)# router eigrp autonomous-system

• Defines EIGRP as the IP routing protocol

Page 176: CCNA Summary

176176

EIGRP Configuration Example

To advertise details (work as classles) we need to add command

(config-router)# no auto-summary

or advertise network by network using the wild card mask[wild card mask]number-networkrouter)# network -Router(config

Page 177: CCNA Summary

177177

Verifying the EIGRP Configuration

Router# show ip protocols

Router# show ip route eigrp

Router# show ip eigrp traffic

Router# show ip eigrp neighbors

Router# show ip eigrp topology

• Displays the neighbors discovered by IP EIGRP

• Displays the IP EIGRP topology table (S & FS)

• Displays the number of IP EIGRP packets sent and received

• Displays current EIGRP entries in the routing table (S only)

• Displays the parameters and current state of the active routing protocol process

Page 178: CCNA Summary

178178

debug ip eigrp Command

Router#debug ip eigrp

IP-EIGRP: Processing incoming UPDATE packet

IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 -

256000 104960

IP-EIGRP: Ext 192.168.0.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 -

256000 104960

IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 -

256000 104960

IP-EIGRP: 172.69.43.0 255.255.255.0, - do advertise out Ethernet0/1

IP-EIGRP: Ext 172.69.43.0 255.255.255.0 metric 371200 - 256000 115200

IP-EIGRP: 192.135.246.0 255.255.255.0, - do advertise out Ethernet0/1

IP-EIGRP: Ext 192.135.246.0 255.255.255.0 metric 46310656 - 45714176 596480

IP-EIGRP: 172.69.40.0 255.255.255.0, - do advertise out Ethernet0/1

IP-EIGRP: Ext 172.69.40.0 255.255.255.0 metric 2272256 - 1657856 614400

IP-EIGRP: 192.135.245.0 255.255.255.0, - do advertise out Ethernet0/1

IP-EIGRP: Ext 192.135.245.0 255.255.255.0 metric 40622080 - 40000000 622080

IP-EIGRP: 192.135.244.0 255.255.255.0, - do advertise out Ethernet0/1

Page 179: CCNA Summary

179179

EIGRP Load Balancing

Router(config)# router eigrp 100

Router(config-router)#traffic share-balance

Router(config-router)# variance multiplier

- Configuration :

Metric 20

Metric 40

Metric 60

Page 180: CCNA Summary

180180

2RIP v

• Advanced distance vector protocol.

• No periodic updates, only partial triggered updates.

• Updates are sent on multicast 224.0.0.9

• Classless.

• Admin. Distance = 120

• Symbol ( R ) in routing table.

• Metric = hop count.

Router(config)# router rip

Router(config-router)#network direct connected network

Router(config-router)# version 2

- Configuration :

Page 181: CCNA Summary

181181

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—3-181

Route Summarization

Page 182: CCNA Summary

182182

-It is grouping block of subnets and advertise them as a

single network address.

(single IP address represent group of contiguous subnets).

Route summarization

Page 183: CCNA Summary

183183

• Advantages of route summarization:

- reduce the size of routing table for the router who know

the summary only.

- summary requires less bandwidth.

- router that know the summary don’t affected by network

instability.

Route summarization (cont.)

Page 184: CCNA Summary

184184

-It is grouping of major networks into one address

Classless Inter domain Routing

(CIDR)

8.0.0.0/8

9.0.0.0/8

10.0.0.0/8

11.0.0.0/8

0000 10 00 . 0 . 0 . 0

0000 10 01 . 0 . 0 . 0

0000 10 10 . 0 . 0 . 0

0000 10 11 . 0 . 0 . 0

CIDR 8 . 0 . 0 . 0 / 6

EX :

Page 185: CCNA Summary

185185

Summarizing Routes in a

Discontiguous Network

– RIPv1 and IGRP do not advertise subnets, and therefore cannot support discontiguous subnets.

– OSPF, EIGRP, and RIPv2 can advertise subnets, and therefore can support discontiguous subnets.

Page 186: CCNA Summary

186186

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—3-186

Implementing Variable

Length Subnet Masks

(VLSM)

Page 187: CCNA Summary

187187

- VLSM means that in a single class A, B, or C network,

more than one subnet mask is used.

- VLSM allows some subnets to be smaller and some

subnets to be larger, which reduce the waste in IP

addresses.

- VLSM allows you to apply different subnet masks to the

same class address.

- Steps :

- begin with the largest subnet

- continue giving addresses with the suitable subnet mask

Variable Length

Subnet Mask (VLSM)

Page 188: CCNA Summary

188188

VLSM example

60 host

60 host

60 host

2 hosts

2 hosts

2 hosts

s1

s3

s2s5

s4

s6

- For s1, s2 , s3 to support 60

host we need 6 bits

- so subnet mask is

255.255.255.192

- hop count = 256-192 = 64

- s1 address 192.168.1.0 /26

s2 address 192.168.1.64 /26

s3 address 192.168.1.128 /26

- starting from address 192.168.1.192 give addresses to s4 , s5 , s6

- 2 hosts need 2 bits

- new subnet mask is 255.255.255.252 , hop count = 256-252 = 4

- s4 address 192.168.1.192 /30

s5 address 192.168.1.196 /30

s6 address 192.168.1.200 /30

VLSM is supported only by the

classless routing protocols

Divide network

192.168.1.0 /24

Page 189: CCNA Summary

189189

Page 190: CCNA Summary

190190

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—4-190

Managing IP Traffic with

Access Lists (ACL)

Page 191: CCNA Summary

191191

• Manage IP traffic as network access grows

• Filter packets as they pass through the router

Access control list (ACL)

Page 192: CCNA Summary

192192

- ACL is a set of commands that are grouped under certain

name or number to control traffic flow (permit or deny).

- Access list is configured on the router then activated on

interfaces.

• ACL processing:

- statements are checked from up to down.

- once a match found, no further checking.

- if no match found, the packet will be dropped due to the “ implicit deny “ statement at the end of the ACL.

- ACL must contain at least one permit statement otherwise all packets will be dropped.

- in any ACL , you can not add statement between statements (any new statements can only be added to the end of ACL).

- you can have one ACL per interface per protocol per direction.

ACL Structure

Page 193: CCNA Summary

193193

Note :

- in numbered ACL, you can not delete a certain statement , only delete the whole ACL.

- In named ACL, you can delete a certain statement between statements.

ACL types

ACL

Standard ACL

Numbered

1 - 99

1300 - 1999

Named

Extended ACL

NamedNumbered

100 - 199

2000 - 2699

Page 194: CCNA Summary

194194

Standard ACLs

- Configuration :

•Activates the list on an interface

•Sets inbound or outbound testing

•removes ACL from the interfacenumber-ACLgroup -no ip access

Router(config-if)# ip access-group ACL-number{in | out}

• IP standard ACLs use 1 to 99

• default wildcard mask = 0.0.0.0 (exactly match the ip address)

• 12.0.0.1 0.0.0.0 = host 12.0.0.1 & 0.0.0.0 255.255.255.255 = any

• no access-list ACL-number removes entire ACL

Router(config)# access-list ACL-number{permit|deny} source ip [w.c.mask]

- It filters the packets based on the source ip address

Page 195: CCNA Summary

195195

Standard IP ACL example

12.0.0.0

A

- Deny traffic from host 172.16.4.13 to host A and permit

all other traffic.

Note:

commands

order is

important

= host 172.16.4.13

= any

Page 196: CCNA Summary

196196

• control telnet access to router :

we want to restrict the telnet access from host 10.1.1.1 to

the router.

10 . 1 . 1 . 1

(config)# access-list 1 deny host 10.1.1.1

(config)# access-list 1 permit any

(config)# line vty 0 4

(config-line)# access-class 1 in

Standard ACL (cont.)

Page 197: CCNA Summary

197197

Router(config)# ip access-list standard name

Router(config-std-nacl)# {permit|deny} source ip [ w.c.mask ]

Router(config-std-nacl)# no {permit|deny} source ip [w.c.mask ]

Router(config-if)# ip access-group name {in | out}

Standard Named IP ACL

• Permit or deny statements have no prepended number.

• “no” removes the specific test from the named ACL.

• Activates the named IP ACL on an interface.

Page 198: CCNA Summary

198198

Host X

192.168.5.1/24Server

192.168.1.1/24

192.168.2.0/24

AC

B

- we want to restrict the user X from accessing the server.

C(config)# access-list 1 deny host 192.168.5.1

C(config)# access-list 1 permit any

C(config)# interface e0

C(config-if)# ip access-group 1 out

- Rule:

• Standard ACL is placed as close as possible to destination.

Placement of standard ACL

e0

Page 199: CCNA Summary

199199

Extended ACL

- It is more flexible than standard ACL.

- extended ACL can match on:

1- source IP , destination IP.

2- TCP/IP protocols ( IP, TCP, UDP, ICMP,…….).

3- protocol information ( port no. ).

Page 200: CCNA Summary

200200

Router(config-if)# ip access-group access-list-number

{in | out}

Extended IP ACL Configuration

• Activates the extended list on an interface

• Sets parameters for this list entry

Router(config)# access-list access-list-number

{permit | deny} protocol

source ip source-wildcard [operator port]

destination ip destination-wildcard [operator port]

Page 201: CCNA Summary

201201

• Note:

- 0.0.0.0 is called host mask.

- 12.0.0.1 0.0.0.0 = host 12.0.0.1

- 0.0.0.0 255.255.255.255 = any

- The operator and port values :

(eq) operator means equal

(Lt) operator means less than or equal.

(gt) operator means greater than or equal.

range 10 – 80 ---- all ports between 10 , 80

- eq 80 = eq http ---- put the port number or name

Extended ACL

Page 202: CCNA Summary

202202

Extended ACL example

– Deny FTP from subnet 172.16.4.0 to subnet 172.16.3.0– Permit all other traffic.

1

in

internet

Page 203: CCNA Summary

203203

Extended ACL example

– Deny only Telnet from subnet 172.16.4.0– Permit all other traffic.

internet

1

in

Page 204: CCNA Summary

204204

Router(config)# ip access-list extended name

Router(config-ext-nacl)# {permit | deny}

{ip access list test conditions}

Router(config-ext-nacl)# no {permit | deny}

{ip access list test conditions}

Router(config-if)# ip access-group name {in | out}

• Alphanumeric name string must be unique.

• Permit or deny statements have no prepended number.

• “no” removes the specific test from the named ACL.

• Activates the named IP ACL on an interface.

Extended Named ACL

Page 205: CCNA Summary

205205

Host X

192.168.5.1/24

Server

192.168.1.1/24

192.168.2.0/24

AC

B

- We want to restrict the user X from accessing the server

- Rule:

• Extended ACL is placed as close as possible to source.

Placement of Extended ACL

Page 206: CCNA Summary

206206

Monitoring ACL Statements

wg_ro_a#show access-lists

Standard IP access list 1

permit 10.2.2.1

permit 10.3.3.1

permit 10.4.4.1

permit 10.5.5.1

Extended IP access list 101

permit tcp host 10.22.22.1 any eq telnet

permit tcp host 10.33.33.1 any eq ftp

permit tcp host 10.44.44.1 any eq ftp-data

router# show {protocol} access-list {access-list number}

router# show access-lists {access-list number}

Page 207: CCNA Summary

207207

router# show ip interfaces e0

Ethernet0 is up, line protocol is up

Internet address is 10.1.1.11/24

Broadcast address is 255.255.255.255

Address determined by setup command

MTU is 1500 bytes

Helper address is not set

Directed broadcast forwarding is disabled

Outgoing access list is not set

Inbound access list is 1

Proxy ARP is enabled

Security level is default

Split horizon is enabled

ICMP redirects are always sent

ICMP unreachables are always sent

ICMP mask replies are never sent

IP fast switching is enabled

IP fast switching on the same interface is

disabled

IP Feature Fast switching turbo vector

IP multicast fast switching is enabled

IP multicast distributed fast switching is

disabled

<text ommitted>

Verifying ACLs

Page 208: CCNA Summary

208208

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—4-208

Scaling the Network

with NAT and PAT

Page 209: CCNA Summary

209209

- Address translation allows you to translate your internal private address to a public address before the packets leave your local network to the public network.

- NAT terminologies:

1- Inside local IP: an internal device that has a private IP.

2- Inside global IP: an internal device that has a public IP.

3- Outside local IP: an outside device that has a private IP.

4- Outside global IP: an outside device that has a public IP.

- Types of Address Translation:

• Static Translation.

• Dynamic Translation.

Network address translation

(NAT)

Page 210: CCNA Summary

210210

Static NAT

10.0.0.112.0.0.112.0.0.110.0.0.1

10.0.0.1 12.0.0.1

NAT table is

formed

manually

translating

private IPs to

public IPs.

- Static NAT is used when outside users are trying to

access your internal resources

Page 211: CCNA Summary

211211

Configuring Static Translation

• Establishes static translation between an inside local address and an inside global address

Router(config)# ip nat inside source static local-ip global-ip

• Marks the interface as connected to the inside

Router(config-if)# ip nat inside

• Marks the interface as connected to the outside

Router(config-if)# ip nat outside

Page 212: CCNA Summary

212212

Static NAT Example

Page 213: CCNA Summary

213213

- the router is given a pool of IPs that contains global IPs,

so every user tries to access a public network will be

given an IP from the pool.

- To configure Dynamic NAT:

1- Define the pool of IPs.

2- Define which inside addresses are allowed to be

translated. (ACL)

Dynamic NAT

Page 214: CCNA Summary

214214

Configuring Dynamic NAT

• Establishes dynamic source translation, specifying the ACL that was defined in the prior step.

Router(config)# ip nat inside source

list access-list-number pool pool-name

• Defines a pool of global addresses to be allocated as needed.

Router(config)# ip nat pool name start-ip end-ip{netmask netmask | prefix-length prefix-length}

• Defines a standard IP ACL permitting those inside local addresses that are to be translated.

Router(config)# access-list access-list-number permit

source ip [source-wildcard]

Page 215: CCNA Summary

215215

Dynamic NAT Example

Page 216: CCNA Summary

216216

- Static or dynamic NAT provide only one to one translation while PAT supports many to one translation using port numbers.

port address translation (PAT)

internet

13.0.0.1

10.0.0.1

10.0.0.2

10.0.0.1 13.0.0.1 2000 80

10.0.0.2 13.0.0.1 3000 80

12.0.0.1 13.0.0.1 2000 80

12.0.0.1 13.0.0.1 3000 80

Inside local ipInside local

portinside global ip

inside global

port

10.0.0.210.0.0.210.0.0.1 2000

30002000 12.0.0.1

12.0.0.112.0.0.1 2000

30004000

Page 217: CCNA Summary

217217

Configuring PAT

• Establishes dynamic source translation, specifying the ACL that was defined in the prior step

Router(config)# ip nat inside source list

access-list-number interface interface overload

• Defines a standard IP ACL that will be permit the inside local addresses that are to be translated

Router(config)# access-list access-list-number permit

source-ip source-wildcard

Page 218: CCNA Summary

218218

Dynamic NAT Example

overload

Page 219: CCNA Summary

219219

PAT Example

Page 220: CCNA Summary

220220

Displaying Information with show

Commands

• Displays translation statistics

Router# show ip nat statistics

• Displays active translations

Router# show ip nat translations

Router#show ip nat translation

Pro Inside global Inside local Outside local Outside global

--- 172.16.131.1 10.10.10.1 --- ---

Router#show ip nat statistics

Total active translations: 1 (1 static, 0 dynamic; 0 extended)

Outside interfaces:

Ethernet0, Serial2.7

Inside interfaces:

Ethernet1

Hits: 5 Misses: 0

Page 221: CCNA Summary

221221

Using the debug ip nat

Command

Router#debug ip nat

NAT: s=192.168.1.95->172.31.233.209, d=172.31.2.132 [6825]

NAT: s=172.31.2.132, d=172.31.233.209->192.168.1.95 [21852]

NAT: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6826]

NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23311]

NAT*: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6827]

NAT*: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6828]

NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23313]

NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23325]

Page 222: CCNA Summary

222222

Page 223: CCNA Summary

223223

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—1-223

Switching

Page 224: CCNA Summary

224224

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—1-224

Spanning Tree

Protocol

IEEE 802.1D

Page 225: CCNA Summary

225225

loops2 Layer

MAC port

A

A

3

1• Solution : using Spanning tree protocol (STP)

Page 226: CCNA Summary

226226

- provides a loop-free redundant network topology by

placing certain ports in the blocking state (logical blocking)

- STP protocol enables switches to become aware

of each other so they can negotiate a loop free path.

- when the used path fails the STP opens the blocked port

(activate the other path)

Spanning Tree Protocol

Page 227: CCNA Summary

227227

1- BPDU Flooding:

- BPDUs (bridge protocol data unit) are flooded from each

switch to the other switches on a well known multicast

MAC address.

- every switch will take a copy of the BPDU and resend it to

other switches.

- every switch will form a database from all the BPDUs.

- BPDU is sent every two seconds.

Spanning Tree Operation

Port IDaccumulated

path cost

bridge ID

(BID)BPDU

Page 228: CCNA Summary

228228

- Root bridge is the bridge with the lowest bridge ID

- Bridge ID =

2- Root Bridge election

2 bytes

default = 32768

Spanning Tree Operation (cont.)

priority Bridge MAC address

- Root bridge has the lowest priority ,

if equal priorities then it has the lowest MAC address

- after election, the root bridge only sends the BPDUs every 2 sec.

6 bytes

Page 229: CCNA Summary

229229

3- Root port election: (RP)

- each non-root switch will elect the best port to reach the root

switch.

- Root port is the port having:

1- the lowest accumulative path cost to the root switch.

2- If equal costs, it is the port that closer to the second

lowest switch BID.

3- if equal , it is the port that has the lowest serial number

Spanning Tree Operation (cont.)

Page 230: CCNA Summary

230230

Spanning Tree Operation (cont.)

RP

5

RP

RP4

6

8

7

3

21 A

B C

D

assume BID of

A < B < C < D A

is Root bridge

to get RP :

which port is

closer to A ?

(compare 4,6)

(compare 3,5)

(compare 7,8)

root bridge

Page 231: CCNA Summary

231231

4- Designated port election: (DP)

- DP has the lowest accumulative path cost from the root switch on every LAN segment.

5- Blocked Port: (BP)

- It is the port that neither RP nor DP.

- BP will logically blocked till any change happen.

Spanning Tree Operation (cont.)

Page 232: CCNA Summary

232232

Spanning Tree Operation (cont.)

RP

5

RP

RP4

6

8

3

21 A

B C

D

blocked port BP

is not RP or DP

(port 8)

to get DP :

which port is

closer to A ?

(compare 1,3)

(compare 2,4)

(compare 5,7)

(compare 6,8)

root bridge

7

DPDP

DP DP

BP

Page 233: CCNA Summary

233233

after convergence :

• ports are either forwarding (RP , DP) or blocked (BP)

• a blocked port keeps listening to BPDUs, if for 20 sec.

(Max. age time =10 BPDUs) hasn’t receive a BPDU,

then the port will automatically change its state

(move to listening state).

at change :

• the first switch which feels the change sends a BPDU

called TCN (Topology change notification) destined the

root switch indicating the change.

• the Root switch sends a configuration BPDU with TCN

flag to all switches then the STP will be recalculated.

• if a new switch added with a lower priority , it will be the

root switch

Spanning Tree Operation (cont.)

Page 234: CCNA Summary

234234

• Spanning tree transits each port through several

different states:

Spanning Tree Port States

STP convergence

time is from

30 sec. to 50 sec.

Page 235: CCNA Summary

235235

w)1.802Rapid STP (IEEE

• RSTP significantly speeds the recalculation of the spanning tree when the network topology change.

• to enhance the convergence time, RSTP :

1- elects a backup port for every RP or DP.

2- merges the Blocking state and Listening state into one state called Discarding state.

Page 236: CCNA Summary

236236

tree command-the show spanning

Page 237: CCNA Summary

237

Configuring the Root Bridge

Page 238: CCNA Summary

238238

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—2-238

Virtual LANs (VLAN)

Page 239: CCNA Summary

239239

Before VLANs:

- All switch ports are in single broadcast domain

After VLANs:

- each VLAN is a single broadcast domain and one logical subnet.

- VLANs provides:

1- Segmentation

2- Flexibility

3- Security

Virtual LANs (VLANs)

Page 240: CCNA Summary

240240

VLAN = Broadcast Domain = Logical Network (Subnet)

VLAN Overview

• Segmentation

• Flexibility

• Security

Page 241: CCNA Summary

241241

• Traffic can be transferred between only the same VLANs

on different switches.

• To transfer traffic between different Vlans , a router should

be used

• Trunks carry traffic for multiple VLANs.

VLAN Operation

Page 242: CCNA Summary

242242

1- Static VLAN membership:

- assign certain port to a certain VLAN ( port based VLAN )

- by default, all ports of the switch are assigned to VLAN 1

(native VLAN).

2- Dynamic VLAN membership:

- assign certain MAC to a certain VLAN ( MAC based VLAN )

- even if the PC changes its port on the switch , the PC still be

connected to its VLAN.

- This is done by using VMPS ( VLAN membership policy

server ).

VLAN membership

Page 243: CCNA Summary

243243

1- Access port:

- It is a port which is member in only one Vlan.

ex: a switch port that connected to a pc.

2- Trunk port:

- switch port that is member in all Vlans by default.

ex: a switch port that connected to another switch.

VLAN connection (Port) types

Page 244: CCNA Summary

244244

Vlan 1

Vlan 2

Vlan 1

Vlan 2

- if host B sends a broadcast to Vlan 2, the frames will be passed to

port 4 on switch F over the trunk link .

- the switch F will broadcast the frames to all ports 5,6 although port

6 is not a member in Vlan 2 because it doesn’t know the source

VLAN of the frame.

- Solution:

trunk add a field that identify the source Vlan ID to the frame

4

Trunking problem

A

B2

3

1 5

6

C

DE F

AB

C,D

123

12

all

CD

A,B

564

12

all

MAC port VLAN MAC port VLAN

Trunk

Page 245: CCNA Summary

245245

- to provide inter VLAN communication , frame tagging is

used to identify the frame source VLAN .

- Tagging methods:

1- ISL (Inter switch Link) for Ethernet.

2- IEEE 802.1q (dot1q) for Ethernet.

3- LANE for ATM.

4- IEEE 802.10 for FDDI.

- so for Ethernet we concerns on ISL and dot1q methods.

VLAN trunking Methods

Page 246: CCNA Summary

246246

ISL (Inter switch link)-1

- Cisco proprietary

- It encapsulates the original Ethernet frame with 30 bytes.

- 26 bytes header (contains 10 bits Vlan id) and 4 bytes trailer

- Vlan range: 0 – 1023 Vlan

- Vlan 1 - 1001 for Ethernet.

- Vlan 1002 - 1023 reserved .

( ex : 1002 - 1005 for token ring and FDDI )

- ISL is not supported now by Cisco.

Page 247: CCNA Summary

247247

- add 4 bytes tagging to the Ethernet frame and recalculate

new CRC.

- Vlan ID is 12 bits inside the Tag field so, the Vlan range is

0 - 4095.

- dot1q makes less overhead on frame than ISL.

- dot1q can support both tagged and untagged frames,

where the untagged Vlan traffic belongs to the Native Vlan

- by default, Native Vlan is VLAN 1.

- Native Vlan is a management Vlan where all management

traffic between switches are sent through it.

( BPDU, STP, VTP,….. ).

q)1q (dot1.802IEEE -2

Page 248: CCNA Summary

248248

- We have to use a router to route between different VLANs.

Method 1:

- Inter VLAN routing using access ports.

- Disadvantage:

for each Vlan you need 1 router interface and 1 switch port.

Inter VLAN routing

Vlan1

Vlan2

Vlan3

Vlan1

Vlan2

Vlan3

VLAN configuration:

1- Create VLAN.

2- Naming VLAN (optional).

3- Assign ports to VLAN.

Page 249: CCNA Summary

249249

To create and name VLAN:

- New method

(config)# vlan <vlan id>

(config-vlan)# name <name>

- Old method

# vlan database

(vlan)# vlan <valn id> [name <name>]

To assign port to vlan:

(config)# int <int. name>

(config-if)# switchport mode access

(config-if)# switchport access vlan <vlan id>

VLAN configuration

Page 250: CCNA Summary

250

To create and name VLAN:

Global Mode

Database Mode

VLAN configuration

To assign port to vlan:

(config)#interface fastethernet 0/2

(config-if)#switchport mode access

(config-if)#switchport access vlan 3

Page 251: CCNA Summary

251251

- Method 2:

- Router on stick:

Inter VLAN routing (cont.)

- Router sub-interface e0/0.1 configuration:

Router(config)# int e0/0.1

Router(config-if)# encapsulation {isl | dot1q} <vlan id>

Router(config-if)# ip address <ip> <mask>

Vlan1

Vlan2

Vlan3

trunk

e0/0.1e0/0.2e0/0.3

fa1/1

- Switch port fa1/1 configuration:

Switch(config)# int fa1/1

Switch(config-if)# switchport mode trunk

Switch(config-if)# switchport trunk encapsulation {isl | dot1q}

Page 252: CCNA Summary

252

Routing Between VLANs

Q Trunks1.802with

VLAN 3VLAN 2

3

3

Page 253: CCNA Summary

253253

Verifying a VLAN

switch# show vlan [brief | id vlan-id | name vlan-name]

Page 254: CCNA Summary

254254

Configuring the Switch IP Address

(config)# interface vlan 1

(config-if)# ip address <ip address> <mask>

(config-if)# no shutdown

• Configures an IP address and subnet mask for the switch VLAN1 interface to allow ping and telnet to switch

switch# show interfaces vlan 1

Vlan1 is up, line protocol is up

Hardware is CPU Interface, address is 0008.a445.9b40

(bia 0008.a445.9b40)

Internet address is 10.2.2.11/24

Page 255: CCNA Summary

255255

switch(config)# ip default-gateway <ip address>

• Configures the switch default gateway for the 2950 series switches

Configuring the Switch Default Gateway

Setting Duplex Options

switch(config)# interface fa0/1

switch(config-if)# duplex {auto | full | half}

Switch# show interfaces fa0/1

Page 256: CCNA Summary

256

Per VLAN Spanning Tree PVST+

Page 257: CCNA Summary

257257

Verifying STP for a VLAN

Page 258: CCNA Summary

258258

Verifying a Trunkswitch# show interfaces fa0/11 switchport

Name: Fa0/11

Switchport: Enabled

Administrative Mode: trunk

Operational Mode: down

Administrative Trunking Encapsulation: dot1q

Negotiation of Trunking: On

Access Mode VLAN: 1 (default)

Trunking Native Mode VLAN: 1 (default)

switch# show interfaces fa0/11 trunk

Port Mode Encapsulation Status

Native vlan

Fa0/11 desirable 802.1q trunking

Port Vlans allowed on trunk

Fa0/11 1-4094

Port Vlans allowed and active in management

domain

Fa0/11 1-13

Page 259: CCNA Summary

259259

• Cisco introduces an easy administration method to transfer Vlan

information between switches connected on the same domain

without repeating commands on all switches.

• VTP manages addition, deletion, and modification of Vlan

information in a certain VTP domain.

• VTP has a messaging system that advertises VLAN

configuration information from one switch to all others

• maintains VLAN configuration consistency throughout a common

administrative domain

• sends advertisements on trunk ports only

VTP (VLAN Trunknig Protocol)

- VTP domain:

Area with common VLAN requirements

(all switches have the same function and VLAN policy).

The switch can only be in one VTP domain.

Page 260: CCNA Summary

260260

- VTP Modes:

1- server mode: default mode on switch

- can add, delete, modify Vlans

- generate VTP messages to apply this configuration on the

other switches.

2- client mode:

- can not add, delete, modify Vlans

- accept VTP messages and apply it on itself then forward it

- can not generate VTP messages

3- transparent mode:

- can add, delete, modify Vlans locally (by console

configuration) and can not generate VTP messages

- forward VTP messages without applying it on itself

VTP modes

Page 261: CCNA Summary

261261

• VTP advertisements are sent as multicast frames.

• VTP servers and clients are synchronized to the latest

revision number (highest number overrides lower ones).

• VTP advertisements are sent every 5 minutes or when

there is a change.

VTP Operation

Page 262: CCNA Summary

262262

• Increases available bandwidth by reducing unnecessary flooded traffic

• Example: Station A sends broadcast, and broadcast is flooded only

toward any switch with ports assigned to the red VLAN

VTP Pruning

Page 263: CCNA Summary

263263

VTP configuration

New Method

switch(config)# vtp mode [ server | client | transparent ]

switch(config)# vtp domain <domain-name>

switch(config)# vtp password <password>

switch(config)# vtp pruning

switch(config)# end

switch# vlan database

switch(vlan)# vtp [ server | client | transparent ]

switch(vlan)# vtp domain <domain-name>

Old Method

Page 264: CCNA Summary

264

Switch(config)#vtp domain ICND

Switch(config)#vtp mode transparent

Switch#show vtp status

VTP Version : 2

Configuration Revision : 0

Maximum VLANs supported locally : 64

Number of existing VLANs : 17

VTP Operating Mode : Transparent

VTP Domain Name : ICND

VTP Pruning Mode : Disabled

VTP V2 Mode : Disabled

VTP Traps Generation : Disabled

MD5 digest : 0x7D 0x6E 0x5E 0x3D 0xAF 0xA0 0x2F

0xAA

Configuration last modified by 10.1.1.4 at 3-3-93 20:08:05

Switch#

VTP Troubleshooting

Page 265: CCNA Summary

265

DTP (Dynamic Trunking Protocol)

• It negotiates a common trunking mode between two

switches by sending periodic messages every 30 sec.

• The router can never participating in DTP.

• #show dtp

Trunk ?

(config-if)# switchport {mode dynamic {auto | desirable} | nonegotiate}

Page 266: CCNA Summary

266266

DTP Mode Generate DTP

frames

Trunking

Access

Trunk

Dynamic

desirable

Dynamic auto

Nonegotiate

Yes in case that other side:

-Trunk.

-Desirable.

-Auto.

Yes in case that other side:

-Trunk.

-Desirable.

Page 267: CCNA Summary

267267

Managing the MAC Address Table

switch# show mac-address-table

Mac Address Table

-------------------------------------------

Vlan Mac Address Type Ports

---- ----------- -------- -----

All 0008.a445.9b40 STATIC CPU

All 0100.0ccc.cccc STATIC CPU

All 0100.0ccc.cccd STATIC CPU

All 0100.0cdd.dddd STATIC CPU

1 0008.e3e8.0440 DYNAMIC Fa0/2

Total Mac Addresses for this criterion: 5

Setting a Static MAC Address

switch(config)# mac-address-table static

<mac-address> vlan <vlan-id>

interface <interface-id>

Page 268: CCNA Summary

268268

Configuring Port Security

switch(config-if)# switchport port-security

[mac-address <mac-address>] | [maximum value] |

[violation {protect |restrict | shutdown}]

switch(config)# interface fa0/1

switch(config-if)# switchport mode access

switch(config-if)# switchport port-security

switch(config-if)# switchport port-security maximum 1

switch(config-if)# switchport port-security mac-address

0008.eeee.eeee

switch(config-if)# switchport port-security violation

shutdown

Page 269: CCNA Summary

269269

switch# show port-security interface <interface-id>

Verifying Port Security on the Catalyst 2950 Series

switch# show port-security interface fastethernet 0/5

Port Security : Enabled

Port Status : Secure-up

Violation Mode : Shutdown

Aging Time : 20 mins

Aging Type : Absolute

SecureStatic Address Aging : Disabled

Maximum MAC Addresses : 1

Total MAC Addresses : 1

Configured MAC Addresses : 0

Sticky MAC Addresses : 0

Last Source Address : 0000.0000.0000

Security Violation Count : 0

Page 270: CCNA Summary

270270

Page 271: CCNA Summary

271271

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—5-271

Introducing Wide Area

Networks

Page 272: CCNA Summary

272272

WAN Overview

- WANs connects remote sites over large geographical area by using the infrastructure of the service provider.

- WANs are a L2 technologies concern by hop-to-hop delivery

- Connection requirements vary depending on user requirements, cost, and availability.

Page 273: CCNA Summary

273273

• Provider assigns connection parameters to subscriber

Interfacing Between

WAN Service Providers

Page 274: CCNA Summary

274274

- DTE: data terminal equipment, It is a source of data.

- DCE: data communication (circuit) equipment, a device that

terminates a connection and provides clocking &

synchronization for the connection.

- Demarcation point: this is where the responsibility of the

service provider is passed to you (logical boundary)

- CPE: customer premises equipment, this is your own

network equipments which include DTE & DCE.

- Local loop: this is the connection from the carrier’s switch to

the demarcation point.

- CO switch : central office switch (WAN switch)

- Toll network: this is the carrier infrastructure.

terminologiesWAN

Page 275: CCNA Summary

275275

WAN connections

WAN connection types

Dedicated

(leased line)Broadband

(Satellite,

Wireless,

cable modem,

DSL)

Packet switching

(X.25 , Frame relay

, ATM)

Circuit switching

(analog modem ,

ISDN)

Page 276: CCNA Summary

276276

Serial Point-to-Point Connections

Page 277: CCNA Summary

277277

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—5-277

Configuring Serial Point-

To-Point Encapsulation

Page 278: CCNA Summary

278278

• supports only single-protocol environments

HDLC Frame Format

• uses a proprietary data field to supportmultiprotocol environments (but is a Cisco proprietary)

• default encapsulation method on Cisco routers

Page 279: CCNA Summary

279279

Router(config-if)# encapsulation hdlc

• enables HDLC encapsulation

• uses the default encapsulation on synchronous

serial interfaces

Configuring HDLC Encapsulation

Page 280: CCNA Summary

280280

• Overview:

- data link layer protocol used on point to point WAN

connections.

- used in dedicated and circuit switching technologies

- works with synchronous & asynchronous serial

connections.

- support multiple network layer protocols.

- open standard by IETF. (RFC 1332, 1661 & 2153)

- PPP frame format :

Point to point protocol (PPP)

Flag address control protocol Payload FCS

Page 281: CCNA Summary

281281

1- Link control protocol (LCP) :

- responsible for negotiating & maintaining a PPP connection

including some options (establish, configure, negotiate

options, test, terminate the PPP connection).

- LCP options are:

authentication, compression, multilink, call back,

error detection

2- Network control protocol:

- negotiate the upper layer protocols that will be used during

the PPP connection.

PPP components

Page 282: CCNA Summary

282282

PPP operation

Open connection

OK

Negotiate options

What is my IP ?

Your IP is ….

What is my IPX ?

No IPX

LCP

NCP

Page 283: CCNA Summary

283283

1- Authentication:

a- PPP authentication protocol (PAP):

- 2 way handshaking

- 1 way authentication

PPP options

client server

Page 284: CCNA Summary

284284

PAP configuration:-

Client configuration :

(config-if)# encapsulation ppp

(config-if)# ppp authentication pap

(config-if)# ppp pap sent username <client username>

password <password>

Server configuration:

(config)# username <client username> password <password>

(config-if)# encapsulation ppp

(config-if)# ppp authentication pap

1- Authentication (cont.)

Page 285: CCNA Summary

285285

b- Challenge handshake authentication protocol (CHAP):

- 3 way handshaking.

- 2 way authentication.

1- Authentication (cont.)

Page 286: CCNA Summary

286286

(config)# hostname <local name>

(config)# username <remote name> password <password>

(config-if)# ppp authentication chap

CHAP configuration:-

1- Authentication (cont.)

Router(config-if)#ppp authentication

{chap | chap pap | pap chap | pap}

• Enables PAP or CHAP authentication

Page 287: CCNA Summary

287287

CHAP Configuration Example :-

1- Authentication (cont.)

Page 288: CCNA Summary

288288

Router#show interface s0

Serial0 is up, line protocol is up

Hardware is HD64570

Internet address is 10.140.1.2/24

MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255

Encapsulation PPP, loopback not set, keepalive set (10 sec)

LCP Open

Open: IPCP, CDPCP

Last input 00:00:05, output 00:00:05, output hang never

Last clearing of "show interface" counters never

Queueing strategy: fifo

Output queue 0/40, 0 drops; input queue 0/75, 0 drops

5 minute input rate 0 bits/sec, 0 packets/sec

5 minute output rate 0 bits/sec, 0 packets/sec

38021 packets input, 5656110 bytes, 0 no buffer

Received 23488 broadcasts, 0 runts, 0 giants, 0 throttles

0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort

38097 packets output, 2135697 bytes, 0 underruns

0 output errors, 0 collisions, 6045 interface resets

0 output buffer failures, 0 output buffers swapped out

482 carrier transitions

DCD=up DSR=up DTR=up RTS=up CTS=up

Verifying the HDLC and PPP encapsulation configuration :-

1- Authentication (cont.)

Page 289: CCNA Summary

289289

• debug ppp authentication shows successful CHAP output.

Verifying PPP Authentication :-

1- Authentication (cont.)

Page 290: CCNA Summary

290290

- B.W aggregation by combining multiple physical

interfaces into one link (logically).

- splitting L3 packets & send fragments over parallel links.

- Configuration:

(config-if)# ppp multilink.

2- Multilink :

PPP options (cont.)

Page 291: CCNA Summary

291291

3- Call back:

- enable a router to place a call and request call back.

- once the request is made, the call disconnect and the other router (server) dial the router (client) back.

4- Compression:

- to improve the throughput on slower links.

- PPP compression support :

1- Stack

2- Predictor

3- MPPC (Microsoft point to point)

4- TCP header

PPP options (cont.)

Page 292: CCNA Summary

292292

5- Error detection:

- using LQM (link quality monitor)

- getting a ratio between corrupted frames and the total no. of frames sent.

- if this ratio is more than certain reference no., the link will be dropped.

6- Looped link detection:

- using Magic no.

- every router have a magic no.

- if the router receives a frame have its own magic no., then the link is looped & would go down.

PPP options (cont.)

Page 293: CCNA Summary

293293

#debug ppp negotiation.

#debug ppp authentication.

Troubleshooting

# show interface s0/0.

the status of interface, encapsulation, LCP state, NCP state.

Page 294: CCNA Summary

294294

Page 295: CCNA Summary

295295

© 2004 Cisco Systems, Inc. All rights reserved. ICND v2.2—6-295

Frame Relay

Page 296: CCNA Summary

296

Frame Relay topology

•connections made by virtual circuits

•connection-oriented service

Page 297: CCNA Summary

297297

- FR is a data link layer protocol packet switching technology.

- defines only the interaction between the CPE and the FR

switch.

- FR is a multiple access technology depending on the virtual

circuit concept.

- FR is a connection oriented protocol through the FR feature

called LMI.

- Encapsulation protocol is LAPF , LAPF types are :

1- Cisco

2- IETF

- note : the same encapsulation type must be used in the

source and destination routers

Frame Relay overview

Page 298: CCNA Summary

298

• Frame Relay default: nonbroadcast multiaccess (NBMA)

Frame Relay Topologies

Page 299: CCNA Summary

299299

- DLCI number :

- DLCI ( data link connection identifier ) is the VCID of the FR (the L2 path address)

- DLCI no. is a local significant

- different DLCI’s on the same path doesn’t affect the connection

Frame Relay addressing

DLCI 100

DLCI 200

DLCI 300

DLCI 400

Page 300: CCNA Summary

300300

• LMI (Local Management Interface) :

- signaling protocol between the router and the FR switch.

- used for management purpose and allows directly connected devices to share the information about the status of VCs as well as their configuration.

- It is used so as a router can get its local DLCI from the FR switch.

- LMI types:

1- Cisco

2- ANSI (Annex-D)

3- Q.933a (Annex-A) (ITU-T)

- Note :

different LMI type on the same path doesn’t affect the connection

Frame Relay management

Page 301: CCNA Summary

301

- LMI status :

1- Active : connection using this DLCI is all right

2- Inactive : there is a problem in the remote site

3- Deleted : there is a problem in your local site

Frame Relay management (cont.)

Page 302: CCNA Summary

302302

- To map between destination ip and its DLCI :

1- manual resolution :

mapping between the DCLI no. and the next hop ip address

using configuration.

(config-if)# frame-relay map <protocol> <next hop address>

<dlci no.> [broadcast] [ietf]

2- Dynamic Resolution. (Inverse ARP) :

allows the router to automatically discover the address of

next hop on each VC that in active state.

Frame Relay Address Mapping

Page 303: CCNA Summary

303

LMI Signaling and Inverse ARP

Page 304: CCNA Summary

304

Inverse ARP (cont.)

Page 305: CCNA Summary

305

– Use LMI to get locally significant DLCI from the Frame Relay switch.

– Use Inverse ARP to map the local DLCI to the remote router network layer address.

Inverse ARP (cont.)

Page 306: CCNA Summary

306

Reachability Issues with Routing

Updates

• Problem:

– Broadcast traffic must be replicated for each active connection.

– Split-horizon rule prevents routing updates received on

an interface from being forwarded out the same interface.

Page 307: CCNA Summary

307

Resolving Reachability Issues

• split horizon can cause problems in NBMA environments.

• solution: sub-interfaces can resolve split-horizon issues.

• a single physical interface simulates multiple logical interfaces.

• each corresponding peers are in a separate subnet

• don’t assign ip address to the main interface

Use sub-interfaces

Page 308: CCNA Summary

308

Configuring Subinterfaces

– Point-to-point :

• Subinterfaces act like leased lines.

• Each point-to-point subinterface requires its own subnet.

• Point-to-point is applicable to hub-and-spoke topologies.

– Multipoint :

• Subinterfaces act like NBMA networks, so they do not resolve the

split-horizon issues.

• Multipoint can save address space because it uses a single subnet.

• Multipoint is applicable to partial mesh and full mesh topologies.

Page 309: CCNA Summary

309309

(config)# int s0/0

(config-if)# encapsulation frame-relay [cisco / ietf]

(config-if)# frame-relay lmi-type { cisco / q933a / ansi }

(config-if)# frame-relay map <protocol> <next hop address>

<dlci no.> [broadcast] [ietf]

Sub-interface configuration:

(config)# int s0/0.1 [ point-to-point / multipoint ]

(config-subif)# frame-relay interface dlci <dlci no.>

Frame Relay configuration

Page 310: CCNA Summary

310

Configuring a Static Frame Relay

Map

Page 311: CCNA Summary

311

Point -to-Configuring Point

Subinterfaces

Page 312: CCNA Summary

312

Multipoint Subinterfaces

Configuration Example

Page 313: CCNA Summary

313

Verifying Frame Relay Operation

Router#show interfaces name

• Displays information about Frame Relay DLCIs and the LMI

Router#show frame-relay lmi [int.name]

• Displays LMI statistics

Router#show frame-relay map

• Displays the current Frame Relay map entries

Router#show frame-relay pvc [int.name [dlci]]

• Displays PVC statistics

Router#show frame-relay traffic

• Displays Frame Relay traffic statistics

Page 314: CCNA Summary

314

show interfaces Example

– Displays line, protocol, DLCI, and LMI information

Router#show interfaces s0Serial0 is up, line protocol is up

Hardware is HD64570

Internet address is 10.140.1.2/24

MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255

Encapsulation FRAME-RELAY, loopback not set, keepalive set (10 sec)

LMI enq sent 19, LMI stat recvd 20, LMI upd recvd 0, DTE LMI up

LMI enq recvd 0, LMI stat sent 0, LMI upd sent 0

LMI DLCI 1023 LMI type is CISCO frame relay DTE

FR SVC disabled, LAPF state down

Broadcast queue 0/64, broadcasts sent/dropped 8/0, interface broadcasts 5

Last input 00:00:02, output 00:00:02, output hang never

Last clearing of "show interface" counters never

Queueing strategy: fifo

Output queue 0/40, 0 drops; input queue 0/75, 0 drops

<Output omitted>

Page 315: CCNA Summary

315

– Displays LMI information

Router#show frame-relay lmi

LMI Statistics for interface Serial0 (Frame Relay DTE) LMI TYPE = CISCO

Invalid Unnumbered info 0 Invalid Prot Disc 0

Invalid dummy Call Ref 0 Invalid Msg Type 0

Invalid Status Message 0 Invalid Lock Shift 0

Invalid Information ID 0 Invalid Report IE Len 0

Invalid Report Request 0 Invalid Keep IE Len 0

Num Status Enq. Sent 113100 Num Status msgs Rcvd 113100

Num Update Status Rcvd 0 Num Status Timeouts 0

relay lmi Example-show frame

Page 316: CCNA Summary

316

– Displays PVC traffic statistics

relay pvc Example-show frame

Router#show frame-relay pvc 100

PVC Statistics for interface Serial0 (Frame Relay DTE)

DLCI = 100, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0

input pkts 28 output pkts 10 in bytes 8398

out bytes 1198 dropped pkts 0 in FECN pkts 0

in BECN pkts 0 out FECN pkts 0 out BECN pkts 0

in DE pkts 0 out DE pkts 0

out bcast pkts 10 out bcast bytes 1198

pvc create time 00:03:46, last time pvc status changed 00:03:47

Page 317: CCNA Summary

317

– Displays the route maps, either static or dynamic

Router# show frame-relay mapSerial0 (up): ip 10.140.1.1 dlci 100(0x64,0x1840), dynamic,

broadcast,, status defined, active

relay map Example-show frame

Page 318: CCNA Summary

318318

Troubleshooting Basic Frame Relay

Operations

• Displays LMI debug information

Router#debug frame-relay lmiFrame Relay LMI debugging is onDisplaying all Frame Relay LMI dataRouter#1w2d: Serial0(out): StEnq, myseq 140, yourseen 139, DTE up1w2d: datagramstart = 0xE008EC, datagramsize = 131w2d: FR encap = 0xFCF103091w2d: 00 75 01 01 01 03 02 8C 8B1w2d:1w2d: Serial0(in): Status, myseq 1401w2d: RT IE 1, length 1, type 11w2d: KA IE 3, length 2, yourseq 140, myseq 1401w2d: Serial0(out): StEnq, myseq 141, yourseen 140, DTE up1w2d: datagramstart = 0xE008EC, datagramsize = 131w2d: FR encap = 0xFCF103091w2d: 00 75 01 01 01 03 02 8D 8C1w2d:1w2d: Serial0(in): Status, myseq 1421w2d: RT IE 1, length 1, type 01w2d: KA IE 3, length 2, yourseq 142, myseq 1421w2d: PVC IE 0x7 , length 0x6 , dlci 100, status 0x2 , bw 0

Page 319: CCNA Summary

319319

Frame Relay Traffic Shaping

• CIR : committed information rate

• EIR : excessive information rate

• Rate < CIR , DE = 0

• CIR < Rate < EIR , DE = 1

• Rate > EIR , Frame will be dropped

• DE : discard eligibility

• FECN : forward explicit congestion notification

• BECN : backward explicit congestion notification

DE FECN BECNLAPF

Page 320: CCNA Summary

320320

Page 321: CCNA Summary

321

802.11b 802.11g 802.11a

Ratified 1999 2003 1999

Frequency band 2.4 GHz 2.4 GHz 5 GHz

No of channels 3 3 Up to 12

Transmission DSSS DSSS OFDM OFDM

Data rates

[Mbps]

1, 2, 5.5,

11

1, 2, 5.5,

11

6, 9, 12, 18,

24, 36, 48,

54

6, 9, 12, 18,

24, 36, 48, 54

Throughput

[Mbps]Up to 6 Up to 22 Up 28

Differences between WLAN standards

Page 322: CCNA Summary

322

In IEEE 802.11 terminology, any group of wireless devices is known as a service set.

The devices must share a common service set identifier (SSID), which is a text string

included in every frame sent.

If the SSIDs match across the sender and receiver, the two devices can communicate.

This is a summary of the different WLAN topologies:

Ad hoc mode:

This mode is called Independent Basic Service Set

(IBSS). Mobile clients connect directly without an

intermediate access point.

Infrastructure mode: In infrastructure mode, where

clients connect through an access point, there are two

modes:

— Basic Service Set (BSS): Mobile clients use a single

access point for connectivity to each other or to wired

network resources.

— Extended Services Set (ESS): In this mode, two or

more Basic Service Sets are connected by a common

distribution system. An Extended Services Set generally

includes a common SSID to allow roaming from access

point to access point without requiring client

configuration.