CCNA Review
CCNA Review
What Is a Network?
Characteristics of a Network
Speed Cost Security
Availability
Scalability Reliability Topology
OSI Layer
Standardizes interfaces
Facilitates modular engineering Ensures interoperable technology
Accelerates evolution
Simplifies teaching and learning
Data Encapsulation
Data De-Encapsulation
Peer-to-Peer Communication
Speed and throughput: 10 to 1000 Mb/s Average cost per node: Least expensive Media and connector size: Small Maximum cable length: Varies
RJ-45 Connector
EIA/TIA T568A
EIA/TIA T568B
ICND1 v1.02-23
MAC Addresses
Why IP Addresses?
They uniquely identify each device on an IP network. Every host (computer, networking device, peripheral) must have a unique address.
Host ID:
Identifies the individual host Is assigned by organizations to individual devices
The binary-to-decimal and decimal-tobinary conversion will be detailed later in this course.
IP Address Ranges
*127 (01111111) is a Class A address reserved for loopback testing and cannot be assigned to a network.
Reserved Address
Public IP Addresses
Private IP Addresses
Class
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255
Internetworking Fundamentals
ICND1 v1.02-36
Features to carry the chosen network protocols and functions Connectivity for high-speed traffic between devices Security to control access and prohibit unauthorized network use Scalability to add interfaces and capability as needed for network growth Reliability to ensure dependable access to networked resources
Configurations can come from many sources. Configurations will act in device memory.
Console-Line Commands
Configuring an Interface
RouterX(config)#interface type number RouterX(config-if)#
type includes serial, ethernet, token ring, fddi, hssi, loopback, dialer, null, async, atm, bri, tunnel, and so on number is used to identify individual interfaces
RouterX(config)#interface type slot/port RouterX(config-if)#
string is a comment or a description to help you remember what is attached to this interface. The maximum number of characters for the string argument is 238.
Configuring IP Addresses
Unique addressing allows communication between end stations Path choice is based on destination address
Saving Configurations
RouterX# RouterX#copy running-config startup-config Destination filename [startup-config]? Building configuration RourterX#
Example:
SwitchX(config)#interface vlan 1 SwitchX(config-if)#ip address 10.5.5.11 255.255.255.0 SwitchX(config-if)#no shutdown Note: It is necessary to use the no shutdown command to make the interface operational.
Example:
SwitchX(config)#ip default-gateway 172.20.137.1
Saving Configurations
SwitchX
SwitchX copy running-config startup-config Destination filename [startup-config]? Building configuration SwitchX
Laboratory
Routing Operations
Router Operations
A router needs to do the following: Know the destination address. Identify the sources from which the router can learn. Discover possible routes to the intended destination. Select the best route. Maintain and verify routing information.
Static route Uses a route that a network administrator enters into the router manually
Dynamic route Uses a route that a network routing protocol adjusts automatically for topology or traffic changes
Static Routing
Static Routes
Configure unidirectional static routes to and from a stub network to allow communications to occur.
or
Router(config)#ip route 172.16.1.0 255.255.255.0 s0/0/0
This is a unidirectional route. You must have a route configured in the opposite direction.
Default Routes
This route allows the stub network to reach all known networks beyond Router A.
RouterX# show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is subnetted, 1 subnets 10.1.1.0 is directly connected, Serial0/0/0 0.0.0.0/0 is directly connected, Serial0
C S*
Example
Laboratory 2
Given the topology below, configure static or default routing so that all network are reachable.
20 hosts
Router B
12 hosts
Router C
HQ
9 hosts
Router D
3 hosts
Router E
Long Method
VLSM 1 VLSM 2 N 192 SN 1 192 LAN A (192.168.5.32) SN 2 192 LAN B (192.168.5.64) SN 3 192 LAN C (192.168.5.96) SN 4 192 LAN D (192.168.5.112) SN 5 192 LAN E (192.168.5.128) SN 6 192 WAN A (192.168.5.136) 1 WAN B (192.168.5.140) 1 WAN C (192.168.5.144) 1 WAN D (192.168.5.148) 1 WAN E (192.168.5.152) 1 0 0 1 1 0 0 1 1 0 .153 .154 0 0 1 0 1 0 1 1 0 .149 .150 0 0 1 0 0 0 1 1 0 .145 .146 0 0 0 1 1 0 1 1 0 .141 .142 0 0 0 1 0 0 1 1 0 .137 .138 . . . N 168 168 168 . . . N 5 5 5 . . . SN X 0 0 SN X 0 0 SN X 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 .33 .62 .65 .94 .97 .126 .113 .126 .129 .134 X X X VLSM 3 X X
168
168
168
168
Shortcut ..
25 hosts 192.168.5.32/27 Router A 192.168.5.136/30
No. of host bits (m) No. of to accommodate hosts required 5 5 4 4 3 2 2 2 2 2 2m 32 32 16 16 8 4 4 4 4 4 Network Address (prev NA + 2m) 192.168.5.32 192.168.5.64 192.168.5.96 192.168.5.112 192.168.5.128 192.168.5.136 192.168.5.140 192.168.5.144 192.168.5.148 192.168.5.152 Prefix /(32-m) /27 /27 /28 /28 /29 /30 /30 /30 /30 /30
20 hosts 192.168.5.64/27
Router B 192.168.5.140/30
12 hosts 192.168.5.96/28
Router C 192.168.5.144/30
HQ
9 hosts 192.168.5.112/28
Router D
WAN A
192.168.5.148/30
WAN B WAN C
3 hosts 192.168.5.128/29
Router E 192.168.5.152/30
WAN D WAN E
seatwork
No. of
A Class C network 192.168.100.0/24 is assigned. You need to create an IP plan for this network using VLSM. Please fill-out the vlsm table
Prefix /(32m)
Enabling RIP
Routing protocols are used between routers to determine paths and maintain routing tables. After the path is determined, a router can route a routed protocol.
OSPF
IS-IS
Routers pass periodic copies of their routing table to neighboring routers and accumulate distance vectors
RIP Overview
Maximum is 16 equal-cost paths (default = 4) Hop-count metric selects the path Routes update every 30 seconds
RIPv1 Routing protocol Supports variable-length subnet mask? Sends the subnet mask along with the routing update? Addressing type Defined in Supports manual route summarization? Authentication support? Classful No No Broadcast RFC 1058 No No
RIPv2 Classless Yes Yes Multicast RFCs 1721, 1722, and 2453 Yes Yes
RIP Configuration
RouterX(config)# router rip
Routing Protocol is "rip" Sending updates every 30 seconds, next due in 6 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Recv Triggered RIP Key-chain FastEthernet0/0 2 2 Serial0/0/2 2 2 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 10.0.0.0 172.16.0.0 Routing Information Sources: Gateway Distance Last Update 10.1.1.2 120 00:00:25 Distance: (default is 120) RouterA#
RouterA# show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR T - traffic engineered route Gateway of last resort is not set 172.16.0.0/24 is subnetted, 1 subnets 172.16.1.0 is directly connected, fastethernet0/0 10.0.0.0/24 is subnetted, 2 subnets 10.2.2.0 [120/1] via 10.1.1.2, 00:00:07, Serial0/0/2 10.1.1.0 is directly connected, Serial0/0/2 192.168.1.0/24 [120/2] via 10.1.1.2, 00:00:07, Serial0/0/2
C R C R
RouterA# debug ip rip RIP protocol debugging is on RouterA# 00:06:24: RIP: received v1 update from 10.1.1.2 on Serial0/0/2 00:06:24: 10.2.2.0 in 1 hops 00:06:24: 192.168.1.0 in 2 hops 00:06:33: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.1.1) 00:06:34: network 10.0.0.0, metric 1 00:06:34: network 192.168.1.0, metric 3 00:06:34: RIP: sending v1 update to 255.255.255.255 via Serial0/0/2 (10.1.1.1) 00:06:34: network 172.16.0.0, metric 1
Configuring OSPF
After an initial flood of LSAs, link-state routers pass small, event-triggered link-state updates to all other routers.
OSPF Overview
Creates a neighbor relationship by exchanging hello packets Propagates LSAs rather than routing table updates Link: Router interface State: Description of an interface and its relationship to neighboring routers Floods LSAs to all OSPF routers in the area, not just directly connected routers Pieces together all the LSAs generated by the OSPF routers to create the OSPF link-state database Uses the SPF algorithm to calculate the shortest path to each destination and places it in the routing table
Requires very strict network design Configuration can be complex when tuning various parameters and when design is complex
SPF Algorithm
10 10 1 1
Places each router at the root of a tree and calculates the shortest path to each destination based on the cumulative cost
Router ID:
Number by which the router is known to OSPF Default: The highest IP address on an active interface at the moment of OSPF process startup Can be overridden by a loopback interface: Highest IP address of any active loopback interface Can be set manually using the router-id command
Number of areas in this router is 1. 1 normal 0 stub 0 nssa Number of areas transit capable is 0 External flood list length 0 Area BACKBONE(0) Area BACKBONE(0) Area has no authentication SPF algorithm last executed 00:01:25.028 ago SPF algorithm executed 7 times <output omitted>
Ethernet 0 is up, line protocol is up Internet Address 192.168.254.202, Mask 255.255.255.0, Area 0.0.0.0 AS 201, Router ID 192.168.99.1, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State OTHER, Priority 1
ID 10.199.199.137
Address 192.168.80.37
Interface FastEthernet0/0
172.16.48.1
172.16.48.200 10.199.199.137
1 FULL/DROTHER
1 FULL/DROTHER 5 FULL/DR
0:00:33
0:00:33 0:00:33
172.16.48.1
172.16.48.200 172.16.48.189
FastEthernet0/1
FastEthernet0/1 FastEthernet0/1
OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.117 aid:0.0.0.0 chk:6AB2 aut:0 auk:
OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116 aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0
Laboratory
OSPF Authentication
OSPF supports two types of authentication: Plaintext (or simple) password authentication
MD5 authentication
The router generates and checks every OSPF packet. The router authenticates the source of each routing update packet that it receives.
Configure a key (password); each participating neighbor must have the same key configured.
Specifies the authentication type for an interface (as of Cisco IOS Release 12.0) OR
RouterX(config-router)# area area-id authentication [message-digest]
Implementing EIGRP
EIGRP Implementation
ICND1 v1.02-119
EIGRP Features
Advanced distance vector Flexible network design Rapid convergence Multicast and unicast instead of broadcast address 100% loop-free classless routing Support for VLSM and discontiguous subne Easy configuration Manual summarization at any point in the Incremental updates internetwork Load balancing across equaland unequal-cost pathways Support for multiple network layer protocol
EIGRP Tables
EIGRP Configuration
RouterX(config)# router eigrp autonomous-system RouterX(config-router)# network network-number
EIGRP, by default, does not advertise subnets and, therefore, cannot support discontiguous subnets.
EIGRP with the no auto-summary parameter can advertise subnets and, therefore, can support discontiguous subnets.
Variance Example
Router E chooses router C to route to network 172.16.0.0 because it has the lowest feasible distance of 20. With a variance of 2, router E also chooses router B to route to network 172.16.0.0 (20 + 10 = 30) < [2 * (FD) = 40]. Router D is not considered to route to network 172.16.0.0 (because 25 > 20).
Switching Fundamentals
Signals degrade with transmission distance. Each Ethernet type has a maximum segment length.
Shares bandwidth
Collisions
Learning Addresses
Station A sends a frame to station C. The switch caches the MAC address of station A to port E0 by learning the source address of data frames. The frame from station A to station C is flooded out to all ports except port E0 (unknown unicasts are flooded).
Station D sends a frame to station C. The switch caches the MAC address of station D to port E3 by learning the source address of data frames. The frame from station D to station C is flooded out to all ports except port E3 (unknown unicasts are flooded).
Filtering Frames
Station A sends a frame to station C. The destination is known; the frame is not flooded.
The switch has the address for station B in the MAC address table.
Broadcast and multicast frames are flooded to all ports other than the originating port.
VLAN Operations
VLAN Overview
Segmentation Flexibility Security
Allocate one IP subnet per VLAN. Allocate IP address spaces in contiguous blocks.
VLAN Operation
Each logical VLAN is like a separate physical bridge. VLANs can span across multiple switches. Trunks carry traffic for multiple VLANs.
802.1Q Trunking
802.1Q Frame
VTP Features
VTP Modes
Create VLANs Modify VLANs Delete VLANs Sends and forwards advertisements Synchronizes
Synchronizes
VTP Operation
VTP advertisements are sent as multicast frames. VTP servers and clients are synchronized to the latest revision number.
VTP Pruning
SwitchX# configure terminal SwitchX(config)# vtp mode [ server | client | transparent ] SwitchX(config)# vtp domain domain-name SwitchX(config)# vtp password password SwitchX(config)# vtp pruning SwitchX(config)# end
SwitchX(config-if)#
Verifying a Trunk
SwitchX# show interfaces interface [switchport | trunk] SwitchX# show interfaces fa0/11 switchport Name: Fa0/11 Switchport: Enabled Administrative Mode: trunk Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) . . . SwitchX# show interfaces fa0/11 trunk Port Fa0/11 Port Fa0/11 Port Fa0/11 Mode desirable Encapsulation 802.1q Status trunking Native vlan 1
Vlans allowed on trunk 1-4094 Vlans allowed and active in management domain 1-13
If using VTP, the switch must be in VTP server or transparent mode to add or delete VLANs.
Adding a VLAN
Verifying a VLAN
SwitchX# show vlan id 2 VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------2 switchlab99 active Fa0/2, Fa0/12 VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ -----2 enet 100002 1500 0 0 . . . SwitchX#
SwitchX# configure terminal SwitchX(config)# interface range fastethernet 0/2 - 4 SwitchX(config-if)# switchport access vlan 2 SwitchX# show vlan VLAN ---1 2 Name Status Ports -------------------------------- --------- ---------------------default active Fa0/1 switchlab99 active Fa0/2, Fa0/3, Fa0/4
SwitchX# show vlan brief VLAN Name ---- -------------------------------1 default 2 switchlab99 3 vlan3 4 vlan4 1002 fddi-default 1003 token-ring-default VLAN ---1004 1005 Name -------------------------------fddinet-default trnet-default
SwitchX# show interfaces fa0/2 switchport Name: Fa0/2 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: static access Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: native Negotiation of Trunking: On Access Mode VLAN: 2 (switchlab99) Trunking Native Mode VLAN: 1 (default) --- output omitted ----
Laboratory
VTP Domain CITS Fa0 no ip adddess Fa0.1 192.168.1.1/24 Fa0.10 192.168.10.1/24 Fa0.20 192.168.20.1/24 Fa0.30 192.168.30.1/24 Fa0/3 Trunk Links assigned on Fa0/1- 3 Fa0/1 Fa0/2 Vlan 1 192.168.1.0/24 Vlan 10 192.168.10.0/24 Vlan 20 192.168.20.0/24 Vlan 30 192.168.30.0/24
Fa0/3 VTP Server STP Primary for Vlan 1, 10 STP Secondary for Vlan 20, 30 Trunk Links assigned on Fa0/1- 3
Fa0/3 VTP Server STP Primary for Vlan 20, 30 STP Secondary for Vlan 1, 10
Vlan 1
Fa0/2
Vlan 1
Vlan 10 Vlan 10 assigned on Ports Fa0/3-5 Vlan 20 assigned on Ports Fa0/6-8 Vlan 30 assigned on Ports Fa0/9-12
Vlan 10 assigned on Ports Fa0/3-5 Vlan 20 assigned on Ports Fa0/6-8 Vlan Vlan 30 assigned on Ports Fa0/9-12 20
Implementing STP
Redundant Topology
Redundant topology eliminates single points of failure. Redundant topology causes broadcast storms, multiple frame copies, and MAC address table instability problems.
Broadcast Frames
Broadcast Storms
Host X sends a broadcast. Switches continue to propagate broadcast traffic over and over.
Host X sends a unicast frame to router Y. The MAC address of router Y has not been learned by either switch. Router Y will receive two copies of the same frame.
Host X sends a unicast frame to router Y. The MAC address of router Y has not been learned by either switch. Switches A and B learn the MAC address of host X on port 1. The frame to router Y is flooded. Switches A and B incorrectly learn the MAC address of host X on port 2.
Provides a loop-free redundant network topology by placing certain ports in the blocking state
Spanning-Tree Operation
One root bridge per broadcast domain. One root port per nonroot bridge.
BPDU (default = sent every 2 seconds) Root bridge = bridge with the lowest bridge ID Bridge ID = Priority
Bridge MAC Address
Describing PortFast
spanning-tree portfast
Link Speed
2 4 19 100
1 1 10 100
Spanning-Tree Recalculation
No load sharing
Configures PVRST+
SwitchX#
Verifying PVRST+
SwitchX# show spanning-tree vlan 30 VLAN0030 Spanning tree enabled protocol rstp Root ID Priority 24606 Address 00d0.047b.2800 This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 24606 (priority 24576 sys-id-ext 30) Address 00d0.047b.2800 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 300 Interface Role Sts Cost Prio.Nbr Type -------- ----- --- --- -------- ---Gi1/1 Desg FWD 4 128.1 P2p Gi1/2 Desg FWD 4 128.2 P2p Gi5/1 Desg FWD 4 128.257 P2p
This command configures this switch to be the secondary root for VLAN 2.
OR
SwitchA(config)#
Laboratory
VTP Domain CITS Fa0 no ip adddess Fa0.1 192.168.1.1/24 Fa0.10 192.168.10.1/24 Fa0.20 192.168.20.1/24 Fa0.30 192.168.30.1/24 Fa0/3 Trunk Links assigned on Fa0/1- 3 Fa0/1 Fa0/2 Vlan 1 192.168.1.0/24 Vlan 10 192.168.10.0/24 Vlan 20 192.168.20.0/24 Vlan 30 192.168.30.0/24
Fa0/3 VTP Server STP Primary for Vlan 1, 10 STP Secondary for Vlan 20, 30 Trunk Links assigned on Fa0/1- 3
Fa0/3 VTP Server STP Primary for Vlan 20, 30 STP Secondary for Vlan 1, 10
Vlan 1
Fa0/2
Vlan 1
Vlan 10 Vlan 10 assigned on Ports Fa0/3-5 Vlan 20 assigned on Ports Fa0/6-8 Vlan 30 assigned on Ports Fa0/9-12
Vlan 10 assigned on Ports Fa0/3-5 Vlan 20 assigned on Ports Fa0/6-8 Vlan Vlan 30 assigned on Ports Fa0/9-12 20
Inter-Vlan Routing
VLAN-to-VLAN Overview
interface fastethernet 0/0 ip address 10.1.1.1 255.255.255.0 interface fastethernet 0/0.2 ip address 10.2.2.1 255.255.255.0 encapsulation dot1q 2
Laboratory
VTP Domain CITS Fa0 no ip adddess Fa0.1 192.168.1.1/24 Fa0.10 192.168.10.1/24 Fa0.20 192.168.20.1/24 Fa0.30 192.168.30.1/24 Fa0/3 Trunk Links assigned on Fa0/1- 3 Fa0/1 Fa0/2 Vlan 1 192.168.1.0/24 Vlan 10 192.168.10.0/24 Vlan 20 192.168.20.0/24 Vlan 30 192.168.30.0/24
Fa0/3 VTP Server STP Primary for Vlan 1, 10 STP Secondary for Vlan 20, 30 Trunk Links assigned on Fa0/1- 3
Fa0/3 VTP Server STP Primary for Vlan 20, 30 STP Secondary for Vlan 1, 10
Vlan 1
Fa0/2
Vlan 1
Vlan 10 Vlan 10 assigned on Ports Fa0/3-5 Vlan 20 assigned on Ports Fa0/6-8 Vlan 30 assigned on Ports Fa0/9-12
Vlan 10 assigned on Ports Fa0/3-5 Vlan 20 assigned on Ports Fa0/6-8 Vlan Vlan 30 assigned on Ports Fa0/9-12 20
Introducing ACL
ACL Applications
Permit or deny packets moving through the router. Permit or deny vty access to or from the router. Without ACLs, all packets could be transmitted onto all parts of your network.
Types of ACLs
Standard IP lists (1-99) test conditions of all IP packets from source addresses. Extended IP lists (100-199) test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports. Standard IP lists (1300-1999) (expanded range). Extended IP lists (2000-2699) (expanded range). Other ACL number ranges test conditions for other networking protocols. Named ACLs identify IP standard and extended ACLs with an alphanumeric string (name).
0 means check value of corresponding address bit. 1 means ignore value of corresponding address bit.
172.30.16.29 0.0.0.0 checks all the address bits. Abbreviate this wildcard mask using the IP address preceded by the keyword host (host 172.30.16.29).
Configuring ACL
Standard IP lists (1-99) Extended IP lists (100-199) Standard IP lists (1300-1999) (expanded range) Extended IP lists (2000-2699) (expanded range)
Sets parameters for this list entry IP standard ACLs use 1 to 99 Default wildcard mask = 0.0.0.0 no access-list access-list-number removes entire ACL remark lets you add a description for the ACL
Router(config)#access-list access-list-number {permit | deny} protocol source source-wildcard [operator port] destination destination-wildcard [operator port] [established] [log]
{in | out}
Deny FTP from subnet 172.16.4.0 to subnet 172.16.3.0 out E0. Permit all other traffic.
Deny only Telnet from subnet 172.16.4.0 out E0. Permit all other traffic.
Permit or deny statements have no prepended number. no removes the specific test from the named ACL.
Router(config-if)#ip access-group name {in | out}
Five virtual terminal lines (0 through 4) Filter addresses that can access into the router vty ports Filter vty access originating from the router
Set up an IP address filter with a standard ACL statement. Use line configuration mode to filter access with the access-class command. Set identical restrictions on every vty.
vty Commands
Permits only hosts in network 192.168.1.0 0.0.0.255 to connect to the router vty
Place extended ACLs close to the source. Place standard ACLs close to the destination.
Verifying ACLs
wg_ro_a#show ip interfaces e0 Ethernet0 is up, line protocol is up Internet address is 10.1.1.11/24 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is 1 Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP Feature Fast switching turbo vector IP multicast fast switching is enabled IP multicast distributed fast switching is disabled <text ommitted>
wg_ro_a#show access-lists Standard IP access list 1 permit 10.2.2.1 permit 10.3.3.1 permit 10.4.4.1 permit 10.5.5.1 Extended IP access list 101 permit tcp host 10.22.22.1 any eq telnet permit tcp host 10.33.33.1 any eq ftp permit tcp host 10.44.44.1 any eq ftp-data
An IP address is either local or global. Local IP addresses are seen in the inside network.
Establishes static translation between an inside local address and an inside global address
Defines a standard IP ACL permitting those inside local addresses that are to be translated.
Router(config)#ip nat inside source list access-list-number pool name
Establishes dynamic source translation, specifying the ACL that was defined in the prior step.
Configuring Overloading
Router(config)#access-list access-list-number permit source source-wildcard
Defines a standard IP ACL that will be permit the inside local addresses that are to be translated
Establishes dynamic source translation, specifying the ACL that was defined in the prior step
Clears a simple dynamic translation entry that contains an inside translation or both an inside and outside translation
Router#clear ip nat translation outside local-ip global-ip
Router#debug ip nat NAT: s=192.168.1.95->172.31.233.209, d=172.31.2.132 [6825] NAT: s=172.31.2.132, d=172.31.233.209->192.168.1.95 [21852] NAT: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6826] NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23311] NAT*: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6827] NAT*: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6828] NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23313] NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23325]
Wireless LANs
ICND1 v1.02-250
Market Trends
Institute of Electrical and Electronic Engineers 802.11 documents wireless technical standards
Wi-Fi Alliance:
Global nonprofit industry trade association Promote wireless growth through interoperability certification
No exclusive use
Best-effort Interference possible
Frequency band
No. of channels
2.4 GHz 3
Transmission
Wi-Fi Certification
Wi-Fi Alliance certifies interoperability between products.
Products include 802.11a, 802.11b, 802.11g, dual-band products, and security testing. Provides assurance to customers of migration and integration options.
Cisco is a founding member of the Wi-Fi Alliance. Certified products can be found at http://www.wi-fi.com.
Wireless LANs
ICND1 v1.02-258
WEP
Basic encryption
802.1x EAP
Dynamic keys Improved encryption User authentication 802.1X EAP (LEAP, PEAP) RADIUS
WPA
Standardized Improved encryption Strong, user authentication (such as, LEAP, PEAP, EAPFAST)
802.11i / WPA2
AES strong encryption
No strong authentication
Static, breakable keys Not scalable MAC filters and SSID-cloaking also used to complement WEP
Authentication
Dynamic key management
WPA
Enterprise mode (Business, education, Government) Authentication: IEEE 802.1X/EAP Encryption: TKIP/MIC
WPA2
Authentication: IEEE 802.1X/EAP Encryption: AES-CCMP
Personal mode
(SOHO, home and personal)
Authentication: PSK
Encryption: TKIP/MIC
Authentication: PSK
Encryption: AES-CCMP
Implementing a WLAN
Wireless LANs
ICND1 v1.02-265
Infrastructure mode:
Not connected
Radio not enabled Poor antenna location
WAN Connections
ICND1 v1.02-271
Wide-Area Network
WAN Devices
Routers Terminal servers Modems DSU/CSU WAN networking devices ATM switches Frame Relay switches PSTN
WANMultiple LANs
Packet Switching
DSL
DSL Considerations
Advantages
Speed Simultaneous voice and data transmission
Incremental additions
Always-on availability Backward compatibility with analog phones
Disadvantages
Limited availability
Local phone company requirements Security risks
Cable-Based WANs
ICND1 v1.02-287
What Is a VPN?
Virtual: Information within a private network is transported over a public network. Private: The traffic is encrypted to keep the data confidential.
Benefits of VPN
Site-to-Site VPNs
Remote-Access VPNs
VPN Clients
(legacy)
What Is IPsec?
Confidentiality (Encryption)
Encryption Algorithms
Encryption algorithms:
DES AES 3DES RSA
DH Key Exchange
Diffie-Hellman algorithms:
DH1 DH2
DH5
Data Integrity
Hashing algorithms:
HMAC-MD5
HMAC-SHA-1
Authentication
IPsec Framework
An Overview of PPP
PPP can carry packets from several protocol suites using NCP. PPP controls the setup of several link options using LCP.
This is an example of the Santa Cruz router authenticating to the HQ router Hash values, not actual passwords, are sent across the link. The local router or external server is in control of authentication attempts.
hostname RouterX username RouterY password sameone ! int serial 0 ip address 10.0.1.1 255.255.255.0 encapsulation ppp ppp authentication chap
hostname RouterY username RouterX password sameone ! int serial 0 ip address 10.0.1.2 255.255.255.0 encapsulation ppp ppp authentication chap
RouterX# debug ppp authentication 4d20h: %LINK-3-UPDOWN: Interface Serial0, changed state to up 4d20h: Se0 PPP: Treating connection as a dedicated line 4d20h: Se0 PPP: Phase is AUTHENTICATING, by both 4d20h: Se0 CHAP: O CHALLENGE id 2 len 28 from left" 4d20h: Se0 CHAP: I CHALLENGE id 3 len 28 from right" 4d20h: Se0 CHAP: O RESPONSE id 3 len 28 from left" 4d20h: Se0 CHAP: I RESPONSE id 2 len 28 from right" 4d20h: Se0 CHAP: O SUCCESS id 2 len 4 4d20h: Se0 CHAP: I SUCCESS id 3 len 4 4d20h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to up
ICND1 v1.02-317
LMI receives locally significant DLCI from the Frame Relay switch. Inverse ARP maps the local DLCI to the remote router network layer address.
RouterX# show interfaces s0 Serial0 is up, line protocol is up Hardware is HD64570 Internet address is 10.140.1.2/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255 Encapsulation FRAME-RELAY, loopback not set, keepalive set (10 sec) LMI enq sent 19, LMI stat recvd 20, LMI upd recvd 0, DTE LMI up LMI enq recvd 0, LMI stat sent 0, LMI upd sent 0 LMI DLCI 1023 LMI type is CISCO frame relay DTE FR SVC disabled, LAPF state down Broadcast queue 0/64, broadcasts sent/dropped 8/0, interface broadcasts 5 Last input 00:00:02, output 00:00:02, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops <Output omitted>
bw 0
Clears dynamically created Frame Relay maps, created by using Inverse ARP
RouterX# show frame-relay map Serial0 (up): ip 10.140.1.1 dlci 100(0x64,0x1840), dynamic, broadcast,, status defined, active RouterX# clear frame-relay-inarp RouterX# show frame map RouterX#
Transitioning to IPv6
ICND1 v1.02-336
What is IPv6
Also Known as IPng (next generation) A new version of the Internet Protocol Primarily designed to extend address space
History of IPv6
What happened to IPv5 Version 5 in IP header was assigned to ST protocol (Internet Streaming Protocol)
Currently, there are approximately 1.3 billion usable IPv4 addresses available.
What IP is Touching
Simpler header:
Routing efficiency Performance and forwarding rate scalability
No broadcasts
No checksums Extension headers Flow labels
Transition richness:
Dual stack 6to4 and manual tunnels Translation
IPv6 Terminology
IPv6 Terminology
IPv6 Terminology
IPv6 Terminology
IPv6 Terminology
IPv6 Terminology
IPv6 Terminology
IPv6 Terminology
Examples:
2031:0000:130F:0000:0000:09C0:876A:130B Can be represented as 2031:0:130f::9c0:876a:130b Cannot be represented as 2031::130f::9c0:876a:130b FF01:0:0:0:0:0:0:1 0:0:0:0:0:0:0:1 0:0:0:0:0:0:0:0 ::1 :: FF01::1
One-to-many
Enables more efficient use of the network Uses a larger address range Anycast: One-to-nearest (allocated from unicast address space)
IPv6 has the same address format for global unicast and for anycast addresses.
Uses a global routing prefixa structure that enables aggregation upward, eventually to the ISP.
A single interface may be assigned multiple addresses of any type (unicast, anycast, multicast).
Every IPv6-enabled interface contains at least one loopback (::1/128) and one link-local address. Optionally, every interface can have multiple unique local and global addresses.
Link-Local Addresses
Link-local addresses have a scope limited to the link and are dynamically created on all IPv6 interfaces by using a specific link-local prefix FE80::/10 and a 64-bit interface identifier. Link-local addresses are used for automatic address configuration, neighbor discovery, and router discovery. Link-local addresses are also used by many routing protocols. Link-local addresses can serve as a way to connect devices on the same local network without needing global addresses. When communicating with a link-local address, you must specify the outgoing interface because every interface is connected to FE80::/10.
Static assignment
Manual interface ID assignment EUI-64 interface ID assignment Dynamic assignment Stateless autoconfiguration DHCPv6 (stateful)
Cisco can use the EUI-64 format for interface identifiers. This format expands the 48-bit MAC address to 64 bits by inserting FFFE into the middle 16 bits. To make sure that the chosen address is from a unique Ethernet MAC address, the U/L bit is set to 1 for global scope (0 for local scope).
Stateless Autoconfiguration
DHCPv6 (Stateful)
DHCPv6 is an updated version of DHCP for IPv4:
Supports new addressing Enables more control than stateless autoconfiguration
DHCPv6 Operation
DHCPv6 operates in a way that is similar to DHCPv4, except:
Client first detects the presence of routers on the link. If a router is found, the router advertisement is examined to determine if DHCP can be used. If no router is found, or if the router says DHCP can be used, then: A DHCP solicit message is sent to the all-DHCP-agents multicast address. The client uses the link-local address as the source address.
IPv6 routing types: Static RIPng (RFC 2080) OSPFv3 (RFC 2740) IS-IS for IPv6 MP-BGP4 (RFC 2545/2858) EIGRP for IPv6 The ipv6 unicast-routing command is required to enable IPv6 before any routing protocol is configured.
IPv4-to-IPv6 Transition
Dual stack is an integration method in which a node has implementation and connectivity to both an IPv4 and IPv6 network.
When both IPv4 and IPv6 are configured on an interface, the interface is considered dual-stacked.
IPv6 Tunneling
Tunneling is an integration method in which an IPv6 packet is encapsulated within another protocol, such as IPv4. This method of encapsulation is IPv4.
Includes a 20-byte IPv4 header with no options and an IPv6 header and payload Requires dual-stack routers
Configured tunnels require: Dual-stack endpoints IPv4 and IPv6 addresses configured at each end
ipv6 unicast-routing
RouterX(config-if)#
Summary
IPv6 offers many additional benefits to IPv4 including a larger address space, easier address aggregation, and integrated security. The IPv6 address is 128 bits long and is made up of a 48-bit global prefix, a 16-bit subnet ID, and a 64-bit interface identifier.
There are several ways to assign IPv6 addresses: statically, stateless autoconfiguration, and DHCPv6.
Cisco supports all of the major IPv6 routing protocols: RIPng, OSPFv3, and EIGRP. Transitioning from IPv4 to IPv6 requires dual stacks, tunneling, and possibly NAT-PT. Use the ipv6 unicast-routing command to enable IPv6 and the ipv6 address ipv6-address/prefix-length command to assign interface addresses and enable an IPv6 routing protocol.