CCNA Tutorial
CCNA Tutorial
CCNA
NETWORKING ................................................................................................ 1
OSI Reference Model ...................................................................................... 9
TCP/IP Protocol ............................................................................................ 14
IP Address .................................................................................................... 16
IP Headers.................................................................................................... 19
TCP Header .................................................................................................. 21
UDP Header ................................................................................................. 22
SUBNETTING ................................................................................................ 23
Routers ........................................................................................................ 29
Understanding the Connectivity ................................................................... 37
Basic IP configuration .................................................................................. 38
WAN Protocols ............................................................................................. 42
Routing ........................................................................................................ 44
Routing Information Protocol V1 (RIP V1) .................................................... 54
Enhanced Interior Gateway Routing Protocol (EIGRP) .................................. 58
OSPF ............................................................................................................ 67
Access Control List (ACL) ............................................................................... 76
Network Address Translation (NAT) ............................................................. 85
Static NAT Practical ...................................................................................... 88
Dynamic NAT Practical ................................................................................. 91
Port Address Translation Practical ............................................................... 94
Password Reset of Router ............................................................................ 97
Backing Up and Restoring the Cisco OS ...................................................... 100
Switching ................................................................................................... 104
Trunking .................................................................................................... 111
DTP (Dynamic Trunking Protocol) ............................................................... 115
NETWORKING
Networks
A network is a group of devices that are connected together to communicate and
share network resources such as files and peripheral devices. No two networks
are alike in size or in configuration. Each network, however, includes common
components that provide the resources and communications channels necessary
for the network to operate.
Network Segments
A segment is a subdivision of a network that links a number of devices or serves
as a connection between two nodes. A segment is bounded by physical
internetworking devices such as switches and routers. All nodes attached to a
segment have common access to that portion of the network.
Simplex:
In simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can only
receive. Keyboards and traditional monitors are examples of simplex devices. The
keyboard can only introduce input; the monitor can only accept output. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
Half-Duplex:
In half-duplex mode, each station can both transmit and receive, but not
at the same time. When one device is sending, the other can only receive, and
vice versa. In a half-duplex transmission, the entire capacity of a channel is taken
over by whichever of the two devices is transmitting at the time. Walkie-talkies
and CB (citizens band) radios are both half-duplex systems. The halfduplex mode
is used in cases where there is no need for communication in both directions at
the same time; the entire capacity of the channel can be utilized for each direction.
Full-Duplex:
In full-duplex both stations can transmit and receive simultaneously. The
full-duplex mode is like a two way street with traffic flowing in both directions at
the same time. In full-duplex mode, signals going in one direction share the
capacity of the link: with signals going in the other direction. One common
example of full-duplex communication is the telephone network. When two people
are communicating by a telephone line, both can talk and listen at the same time.
all the time. The capacity of the channel, however, must be divided between the
two directions.
PHYSICAL TOPOLOGY:
The term physical topology refers to the way in which a network is laid out
physically. One or more devices connect to a link; two or more links form a
topology. The topology of a network is the geometric representation of the
relationship of all the links and linking devices (usually called nodes) to one
another. There are four basic topologies possible: mesh, star, bus, and ring.
1. Mesh:
In a mesh topology, every device has a dedicated point-to-point link to every
other device. The term dedicated means that the link carries traffic only between
the two devices it connects. To find the number of physical links in a fully
connected mesh network with n nodes, we first consider that each node must be
connected to every other node. Node 1 must be connected to n - I nodes, node 2
must be connected to n – 1 nodes, and finally node n must be connected to n - 1
nodes. We need n(n - 1) physical links. However, if each physical link allows
communication in both directions (duplex mode), we can divide the number of
links by 2. In other words, we can say that in a mesh topology, we need n(n -1)
/2 duplex-mode links. To accommodate that many links, every device on the
network must have n – 1 input/output ports to be connected to the other n - 1
stations.
Advantages:
The use of dedicated links guarantees that each connection can carry its own
data load, thus eliminating the traffic problems that can occur when links
must be shared by multiple devices.
A mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
There is the advantage of privacy or security. When every message travels
along a dedicated line, only the intended recipient sees it. Physical
boundaries prevent other users from gaining access to messages.
Point-to-point links make fault identification and fault isolation easy. Traffic
can be routed to avoid links with suspected problems. This facility enables
the network manager to discover the precise location of the fault and aids in
finding its cause and solution.
Disadvantages:
Disadvantage of a mesh are related to the amount of cabling because every
device must be connected to every other device.
Installation and reconnection are difficult.
The sheer bulk of the wiring can be greater than the available space (in walls,
ceilings, or floors) can accommodate.
The hardware required to connect each link (I/O ports and cable) can be
prohibitively expensive.
2. Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another.
Unlike a mesh topology, a star topology does not allow direct traffic between
devices. The controller acts as an exchange: If one device wants to send data to
another, it sends the data to the controller, which then relays the data to the other
connected device.
Advantages:
A star topology is less expensive than a mesh topology. In a star, each device
needs only one link and one I/O port to connect it to any number of others.
Easy to install and reconfigure.
Far less cabling needs to be housed, and additions, moves, and deletions
involve only one connection: between that device and the hub.
Other advantage include robustness. If one link fails, only that link is
affected. All other links remain active. This factor also lends itself to easy
fault identification and fault isolation. As long as the hub is working, it can
be used to monitor link problems and bypass defective links.
Disadvantages:
One big disadvantage of a star topology is the dependency of the whole
topology on one single point, the hub.
If the hub goes down, the whole system is dead. Although a star requires far
less cable than a mesh, each node must be linked to a central hub.
For this reason, often more cabling is required in a star than in some other
topologies (such as ring or bus).
3. BUS:
A bus topology is multipoint. One long cable acts as a backbone to link all the
devices in a network. Nodes are connected to the bus cable by drop lines and
taps. A drop line is a connection running between the device and the main cable.
A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core. As a signal
travels along the backbone, some of its energy is transformed into heat.
Therefore, it becomes weaker and weaker as it travels farther and farther. For
this reason there is a limit on the number of taps a bus can support and on the
distance between those taps.
Advantages:
Advantages of a bus topology include ease of installation.
Backbone cable can be laid along the most efficient path, then connected to
the nodes by drop lines of various lengths. In this way, a bus uses less cabling
than mesh or star topologies.
In a star, for example, four network devices in the same room require four
lengths of cable reaching all the way to the hub. In a bus, this redundancy is
eliminated. Only the backbone cable stretches through the entire facility.
Each drop line has to reach only as far as the nearest point on the backbone.
Disadvantages:
Disadvantages include difficult reconnection and fault isolation.
A bus is usually designed to be optimally efficient at installation. It can
therefore be difficult to add new devices. Signal reflection at the taps can
cause degradation in quality. This degradation can be controlled by limiting
the number and spacing of devices connected to a given length of cable.
Adding new devices may therefore require modification or replacement of the
backbone.
In addition, a fault or break in the bus cable stops all transmission, even
between devices on the same side of the problem. The damaged area reflects
signals back in the direction of origin, creating noise in both directions.
Advantages:
A ring is relatively easy to install and reconfigure.
Each device is linked to only its immediate neighbors (either physically or
logically). To add or delete a device requires changing only two connections.
The only constraints are media and traffic considerations (maximum ring
length and number of devices).
In addition, fault isolation is simplified. Generally in a ring, a signal is
circulating at all times. If one device does not receive a signal within a
specified period, it can issue an alarm. The alarm alerts the network
operator to the problem and its location.
Disadvantages:
Unidirectional traffic can be a disadvantage.
In a simple ring, a break in the ring (such as a disabled station) can disable
the entire network. This weakness can be solved by using a dual ring or a
switch capable of closing off the break.
Ring topology was prevalent when IBM introduced its local-area network
Token Ring. Today, the need for higher-speed LANs has made this topology
less popular.
Application
Presentation
Session
Transport
Network
Data Link
Physical
It deals with hardware addresses (MAC addresses).
MAC addresses are 12 digit Hexa-decimal identifiers used to identify the
devices uniquely on the network segment.
It also provides ERROR DETECTION using CRC (Cycle Redundancy
Check) and FRAMING (Encapsulation).
Examples: Ethernet, Token ring etc.
It deals with Layer 3 (Network layer).
Device works at data link layer are Switch, Bridge, NIC card.
TCP UDP
Transmission Control Protocol User Define Protocol
Connection Oriented Connection Less
Reliable Communication (With Unreliable communication (no Ack’s)
Ack’s) Faster data transportation
Slower data Transportation Protocol No is 17
Protocol No is 6 DNS, DHCP, TFTP
HTTP, FTP, SMTP
FTP 21
SMTP 25
TELNET 23
TFTP 69
Original Data
Application Data
Presentation Data
Session Data
Segment
Transport
Packet
Network
Frame
Data Link
Bits
Physical
Header Data
TCP/IP Protocol
The transmission Control Protocol / Internet Protocol (TCP/IP) suit was created by
the Department of Defense (DoD).
Application
Presentation Application
Session
Transport Transport
Network Internet
Data Link
Network Access
Physical
Process/Application Layer
TCP/IP application layer protocols provide service to the application software
running on a computer. The application layer does not define the application itself
but it defines services that applications need.
For example application protocol HTTP define how web browsers can pull the
content of a webpage from a web server.
Examples for this layer are: Telnet, FTP, TFTP, SNMP, NFS, DNS, DHCP etc.
HTTP
Allow to access webpage
Telnet
Telnet is used for Terminal Emulation.
To allows a user sitting on remote machine to access the resources of
another machine.
FTP (File Transfer Protocol)
It allows you to transfer files from one machine to another.
It also allows access to both directories and files.
TFTP
This is stripped down version of FTP.
It has no directory browsing abilities.
It can only send and receive files.
Transport Layer
TCP UDP
Transmission Control Protocol User Define Protocol
Connection Oriented Connection Less
Reliable Communication (With Unreliable communication (no
Ack’s) Ack’s)
Slower data Transportation Faster data transportation
Protocol No is 6 Protocol No is 17
HTTP, FTP, SMTP DNS, DHCP, TFTP
IP Address
IP Address is logical Address. It is network layer address (Layer 3).
IP address is given to every device in the network and it is used to identify the
device with in the network.
Two version of IP:
IP version 4 is a 32 bit address
IP Version 4
Bit is represented by 0 or 1 (Binary)
32 bit IP address are divided into 4 Octets:
01010101.00000101.10111111.00000001
IP version 6
128 bit address is divided along 16 bit boundaries and each 16 bit block is
converted to a 4 digit hexadecimal number and separated by colons.
FD00:0DB8:7654:3210:2C4C:BA17:7124:0032
Network Address
First IP address of the range.
It represents the complete network and cannot be assigned to any device.
The network address is represented with all bits as zero in the host portion of
the address.
Broadcast Address
The last IP address of the range.
Used to send the broadcast with the network and cannot be assigned to any device
in the network.
The broadcast address is represented with all bits as ones in the host portion of
the address.
Valid addresses
Valid IP addresses lie between the network address and the broadcast address.
Only valid IP address are assigned to hosts/clients or any other device in the
network.
Subnet mask
It’s an address which is used to identify the network and host portion of an IP
address.
Private IP Public IP
Used with the LAN or within the Used on public network (INTERNET).
organization.
Not recognized by the administrator. Recognized on internet.
Unique within the network or Given by the service provider (from
organization. IANA)
Globally unique.
Free. Pay to service provider (or IANA).
Unregistered IP. Registered.
Default Gateway
The IP address of the router Ethernet address connecting to the LAN.
It is an entry and exit point of the network.
IP Headers
Unlike a post office, a router or computer cannot determine the size of a package
without additional information. Therefore, additional information is required at the
internet layer, in addition to the source and destination IP addresses.
0 15 16 31
Version Length Type of Service Total Length
(4-bit) (4-Bit) (8-bit) (16-bit)
Identification Flag Fragment
(16-bit) (3-bit) (13-bit)
20 byte
Time to Live Protocol Checksum
(8-bit) (8-bit) (16-bit)
Data
Total Length
Specifies the length of the IP packet that includes the IP header and the user data.
The length field is 2 bytes, so the maximum size of an IP packet is 65,535 bytes.
Fragment
Used to fragmentation and reassembly if the packet is too large to put in frame.
Example consider 3980 Bytes of data and one fragment is about 1500 byte.
Version
A 4-bit field that identifies the IP version being used. The current version is 4, and
this version is referred to as IPv4.
Length
A 4-bit field containing the length of the IP header in 32-bit increments.
TCP Header
0 15 16 31
Data
HTTP 80
FTP 21
SMTP 25
TELNET 23
TFTP 69
Code
TCP uses a set of six standard and three extended control flags (each an individual
bit representing on or off) to manage data flow in specific situations
Window
TCP senders use a number called window size to regulate how much data they
send to a receiver before requiring an acknowledgment in return.
UDP Header
0 15 16 31
Data
SUBNETTING
Subnetting is the process of dividing a Single network into multiple smaller
networks.
Converting host bits into network bits i.e. converting 0’s into 1’s.
Subnetting helps in minimizing the wastage of IP address.
Subnetting can be performing in two ways.
1. FLSM (Fixed Length Subnet Mask)
2. VLSM (Variable Length Subnet Mask)
Subnetting can be done based on requirement.
Requirement of Hosts. (2h - 2 = requirement)
Requirement of Networks. (2n = requirement)
21 = 2 29 = 512
22 = 4 210 = 1024
23 = 8 211 = 2048
24 = 16 212 = 4096
25 = 32 213 = 8192
26 = 64 214 = 16384
27 = 128 215 = 32768
28 = 256 216 = 65536
FLSM Examples
Network – 1 Network - 2
192.168.1.0 Network IP 192.168.1.128 Network IP
192.168.1.1 192.168.1.129
. . . . . . . .
Host IP Host IP
. . . . . . . .
192.168.1.126 192.168.1.254
192.168.1.127 Broadcast IP 192.168.1.255 Broadcast IP
Network – 1 Network - 2
192.168.1.0 Network IP 192.168.1.32 Network IP
192.168.1.1 192.168.1.33
. . . . . . . .
Host IP Host IP
. . . . . . . .
192.168.1.30 192.168.1.62
192.168.1.31 Broadcast IP 192.168.1.63 Broadcast IP
N = 21 = 2 Network
H = 215 -2 = 32766 Host per network
Range = 256-128 = 128
Network – 1 Network - 2
130.5.0.0 Network IP 130.5.128.0 Network IP
130.5.0.1 130.5.128.1
. . . . . . . .
130.5.0.255 130.5.128.255
130.5.1.0 Host IP 130.5.129.0 Host IP
130.5.1.1 130.5.129.1
. . . . . . . .
. . . . . . . .
130.5.127.255 Broadcast IP 130.5.255.255 Broadcast IP
N = 24 = 16 Network
H = 212 -2 = 4094 Host per network
Range = 256-240 = 16
N = 21 = 2 Network
H = 223 -2 = 8388606 Host per network
Range = 256-128 = 128
Network – 1 Network - 2
11.0.0.0 Network IP 11.128.0.0 Network IP
11.0.0.1 11.128.0.1
. . . . . . . .
Host IP Host IP
11.1.0.0 11.129.0.0
. . . . . . . .
11.2.0.0 11.130.0.0
. . . . . . . .
. . . . . . . .
11.127.255.255 Broadcast IP 11.255.255.255 Broadcast IP
N = 25 = 32 Network
H = 219 - 2 = 524286 Host per network
Range = 256 - 248 = 8
VLSM
VLSM is used for proper implementation of IP addresses which allows more than
one subnet mask for a given network according to the individual needs.
Logically dividing one network into smaller networks is called as Subnetting or
VLSM.
Efficient use of IP addresses.
VLSM Examples
H = 2h - 2 = 100 Host required. So, here we can select h = 7 and we are getting
H = 126 (Nearer to 100)
N = 2n = 21 = 2 Network
Subnet mask = 255.255.255.128
Range = 256 - 128 = 128
200.10.10.0 to 200.10.10.127
(3) Find sub network for 500 Host and 1000 Host.
H = 2h - 2 = 500 Host required. So, here we can select h = 9 and we are getting
H = 510 (Nearer to 500).
N = 2n = 27 = 128 Network
Subnet mask = 255.255.254.0
Range = 256 – 254 = 2
122.16.0.0 to 122.16.1.255
H = 2h - 2 = 1000 Host required. So, here we can select h = 10 and we are getting
H = 1022 (Nearer to 1000).
N = 2n = 26 = 64 Network
Subnet mask = 255.255.252.0
Range = 256 - 252 = 4
122.16.2.0 to 122.16.5.255
(4) Find sub network for 100000 Host and 200000 Host.
Routers
Router is a device which makes communication possible between two or more
different networks present in same or different geographical locations.
It is an internetworking device used to connect two or more different networks.
It works on layer 3 (Network layer).
It does two basic things:
Select the best path from the routing table.
Forward the packet on that path.
Other vendors apart from Cisco
Nortel
Multicom
Juniper
Dlink
Linksys
Router Classification
Fixed Router Modular Router
None upgradable, cannot add or Upgradable can add and remove as
remove the Ethernet or serial per the requirements.
interfaces. Number of slot available depend on
Doesn’t have any slot. the series of the router.
Console Port
It is known as Local Administrative Port.
It is generally used for Initial Configuration, password recovery and Local
administration of the Router. It is Rj45 port.
Console connectivity
Connect a rollover cable to the router console port (Rj45 connector)
Connect the other end of the rollover cable to the rj45 to DB9 converter.
Attach the female DB9 converter to a PC serial port.
Serial Port
Serial pin configuration is 60 pin configuration female (15 pins and 4 rows) and
Smart serial pin configuration is 26 pin configuration female.
It is known as WAN port.
It is used for connecting to Router locations.
Auxiliary Port
It is known as Remote Administrative Port.
Used for remote administration.
It’s an RJ45 port
A console or a rollover cable is to be used.
Mini-IOS:
Also called the boot loader by Cisco, the mini-IOS is a small IOS in ROM that
can be used to bring up an interface and load a Cisco IOS into flash memory.
The mini-IOS can also perform a few other maintenance operations.
Flash Memory:
Stores the Cisco IOS by default. Flash memory is not erased when the router
is reloaded.
Modes of Routers
Setup Mode
The router enters in to a setup mode if the NVRAM is blank.
User Mode
Only some basic monitoring
Limited show commands, ping, trace route
Router>
Privileged Mode
Monitoring and some troubleshooting
All show commands, ping, trace, copy, erase
Router#
Basic Commands
User Mode:
Router>
Router>show flash
Router>ping 1.1.1.1
Router>enable
Privilege Mode:
Router#show running-config
Router#show flash
Router#show version
Router#config terminal
Router(config-if)#no shutdown
Router(config-line)#password <password>
Router(config-line)#login
Router(config-line)#exit
Router(config)#exit
Router>
Router(config-line)#password <password>
Router(config-line)#login
Router(config-line)#exit
Router(config)#exit
Router>
Router(config-line)#password <password>
Router(config-line)#login
Router(config-line)#exit
Router(config)#exit
Router>
OR Router#write memory
OR Router#write
Basic IP configuration
On Router 1
Router>enable
Router#config terminal
Router(config)#interface fa0/0
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface se0/0/0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
On Router 2
Router>enable
Router#config terminal
Router(config)#interface fa0/0
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface se0/0/0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
On Router 1
Router(config)#do show ip interface brief
Router(config)#
Example
Router 1:-
Fast Ethernet: 192.168.1.1
Serial 0: 10.0.0.1
Router 2:-
Fast Ethernet: 192.168.2.1
Serial 1: 20.0.0.1
Router 3:-
Fast Ethernet: 192.168.3.1
WAN Protocols
There are mainly two types of WAN encapsulation protocols:
1. High Data Link Protocol (HDLC)
2. Point to Point Protocol (PPP)
HDLC PPP
Higher level data link Point to Point protocol.
Control
protocol.
Default on serial links.
Doesn’t support Authentication. Support authentication.
Doesn’t support compression and Support error correction.
error correction.
PAP
PAP provides a simple method for a remote node to establish its identity using a
two-way handshake.
PAP is done only upon initial link establishment
PAP is not a strong authentication protocol.
Password are sent across the link in clear text.
CHAP
After the PPP link establishment phase is complete, the local router sends a unique
“challenge” message to the remote node.
The remote node responds with a value.
The local router checks the responds against its own calculation of the expected
hash value.
If the values match, the authentication is acknowledged. Otherwise, the
connection is terminated immediately.
Configuration of HDLC:
Router(config)#interface serial0/0
Router(config-if)#encapsulation hdlc
Configuration of PPP:
Router(config)#interface serial0/0
Router(config-if)#encapsulation ppp
Router(config-if)#encapsulation ppp
Router(config-if)#encapsulation ppp
Routing
Routed protocol enables to forward packet from one router to another.
Routing protocol sends and receives routing information packets to and from
other routers.
Forwarding of packets from one network to another network choosing the best
path from the routing table.
Routing makes possible for two or more different networks to communicate with
each other.
Routing table consist of only best routes for every destinations.
Types of Routing
1) Static Routing
2) Default Routing
3) Dynamic Routing
Static Routing
It is configured manually by the Administrator.
For every destination routing has to be done manually.
Used for small organization.
Advantages Disadvantages
No overhead on router CPU Used for small networks
No bandwidth usages between Every network has to be manually
routers. configured.
Add security because the admin Admin must understand the n/w and
choose to allow routing access to how each router is connected with
certain networks only. each other.
R1(config)#interface s0/0
R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#no shutdown
Router 1 (Routing)
R1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
R1#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 10.0.0.0/8 is directly connected, FastEthernet0/0
C 20.0.0.0/8 is directly connected, Serial0/0
S 30.0.0.0/8 [1/0] via 20.0.0.2
S 40.0.0.0/8 [1/0] via 20.0.0.2
S 50.0.0.0/8 [1/0] via 20.0.0.2
Router 2 (Routing)
R2#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
R2#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
S 10.0.0.0/8 [1/0] via 20.0.0.1
C 20.0.0.0/8 is directly connected, Serial0/0
C 30.0.0.0/8 is directly connected, FastEthernet0/0
C 40.0.0.0/8 is directly connected, Serial0/1
S 50.0.0.0/8 [1/0] via 40.0.0.2
Router 3 (Routing)
R3#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
R3#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
S 10.0.0.0/8 [1/0] via 40.0.0.1
S 20.0.0.0/8 [1/0] via 40.0.0.1
S 30.0.0.0/8 [1/0] via 40.0.0.1
C 40.0.0.0/8 is directly connected, Serial0/0
C 50.0.0.0/8 is directly connected, FastEthernet0/0
Router 1:-
Fast Ethernet: 192.168.1.1
Serial 0: 10.0.0.1
Router 2:-
Fast Ethernet: 192.168.2.1
Serial 1: 20.0.0.1
Router 3:-
Fast Ethernet: 192.168.3.1
Default Routing
In default routing configure ip route as shown below after configure all ip .
Router 1
R-1(config)#ip route 0.0.0. 0.0.0. 20.0.0.2
Router 2
R-2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1
Router 3
R-3(config)#ip route 0.0.0.0 0.0.0.0 40.0.0.1
Dynamic Routing
Advantage
There is no need to know the destination network.
Need to advertise the directly connected networks.
Updates the topology changes dynamically.
Administrator work is reduced.
Used for large organization.
Neighbor routers exchange routing information and build the routing table
automatically.
This is easier than using static or default routing.
IGP EGP
Interior Gateway Protocol Exterior Gateway Protocol
Routing protocols used within the Routing protocol used between
same autonomous system different autonomous systems.
number Routers in different AS need an
All routers will be routing within EGP.
the same Autonomous boundary. Example: Border Gateway
Example: RIP, IGRP, EIGRP, Protocol.
OSPF, IS-IS
Routing
IGP EGP
Interior Getway Protocol Exterior Gateway Protocol
Rip Timers
Update timer: 30 sec
Time between consecutive updates.
Invalid timer: 180 sec
Time a router to waits hear updates.
The router is marked unreachable if there is no update during the interval.
Flush timer: 240 sec
Time before the invalid route is removed from the routing table.
Hold down timer: 180 sec
Stabilizes routing information and helps preventing routing loops during
periods when the topology is converting on new information.
Once a route is marked as unreachable, it must stay in hold down long enough
for all routers in the topology to learn about the unreachable network.
Convergence time
It is the time taken by the router to use alternate route if the best route is
down.
RIP Version 2
Classless routing protocol (support default and sub networks)
Support VLSM.
Uses multicast address 224.0.0.9
Advantages of RIP
Easy to configure
No complexity
Less overhead
Disadvantages of RIP
Bandwidth utilization is very high as broadcast for every 30 second.
Works only on hop count (not consider the Bandwidth).
Slow convergence.
R1
Router#conf t
Router(config)#int f0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shut
Router(config-if)#int s0/0
Router(config-if)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shut
R2
Router>en
Router#conf t
Router(config)#int s0/0
Router(config-if)#ip address 20.0.0.2 255.0.0.0
R1
Router#conf t
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 10.0.0.0
Router(config-router)#network 20.0.0.0
R2
Router# conf t
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 20.0.0.0
Router(config-router)#network 30.0.0.0
R2
Router#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
R 10.0.0.0/8 [120/1] via 20.0.0.1, 00:00:21, Serial0/0
C 20.0.0.0/8 is directly connected, Serial0/0
R1
Router#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 10.0.0.0/8 is directly connected, FastEthernet0/0
C 20.0.0.0/8 is directly connected, Serial0/0
R 30.0.0.0/8 [120/1] via 20.0.0.2, 00:00:09, Serial0/0
Topology table
List of all the best routes learned from each neighbor.
#show ip eigrp topology
Routing table
The route to the destination
#show ip route
The neighbor and topology tables are stored in RAM and maintained through the
use of Hello and update packets. The routing table is also stored in RAM, but that
information is gathered only from the topology table.
Successor
It is the best route used to forward packet to destination network.
Present in Routing table and Topology table.
Feasible successor
A feasible successor is a second best route to a destination network.
It is considered a backup route.
Present in Topology table.
Used when the successor route goes down.
EIGRP used Diffusing Update Algorithm (DUAL) for selecting and maintaining the
best path to each remote network. This algorithm allows for the following:
Backup route determination if one in available.
Support of VSLM.
Dynamic route recoveries.
Queries for an alternate route if no route can be found.
Disadvantages of EIGRP
Works only on Cisco Routers
Example EIGRP
R1
Router>enable
Router# configure terminal
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/0
Router(config-if)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#clock rate 64000
Router(config-if)#exit
Router(config)#interface Serial0/1
Router(config-if)#ip address 30.0.0.1 255.0.0.0
Router(config-if)#no shutdown
R2
Router>enable
Router# configure terminal
Router(config)#interface Serial0/0
Router(config-if)#ip address 20.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#clock rate 64000
Router(config-if)#exit
Router(config)#interface Serial0/1
Router(config-if)#ip address 40.0.0.1 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
R3
Router>enable
Router# configure terminal
Router(config)#interface Serial0/0
Router(config-if)#ip address 30.0.0.2 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/1
Router(config-if)# ip address 50.0.0.1 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
R4
Router>enable
Router# configure terminal
Router(config)#interface Serial0/1
R1
Router# sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 10.0.0.0/8 is directly connected, FastEthernet0/0
C 20.0.0.0/8 is directly connected, Serial0/0
C 30.0.0.0/8 is directly connected, Serial0/1
Router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router eigrp 22
Router(config-router)#network 10.0.0.0 255.0.0.0
Router(config-router)#network 20.0.0.0 255.0.0.0
R2
Router# sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 20.0.0.0/8 is directly connected, Serial0/0
C 40.0.0.0/8 is directly connected, Serial0/1
Router# conf t
Router(config)#router eigrp 22
Router(config-router)#network 20.0.0.0 255.0.0.0
Router(config-router)#network 40.0.0.0 255.0.0.0
Router#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
D 10.0.0.0/8 [90/2172416] via 20.0.0.1, 00:04:38, Serial0/0
C 20.0.0.0/8 is directly connected, Serial0/0
D 30.0.0.0/8 [90/2681856] via 20.0.0.1, 00:04:38, Serial0/0
C 40.0.0.0/8 is directly connected, Serial0/1
D 50.0.0.0/8 [90/2681856] via 40.0.0.2, 00:01:56, Serial0/1
D 60.0.0.0/8 [90/2172416] via 40.0.0.2, 00:01:51, Serial0/1
R3
Router# sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 30.0.0.0/8 is directly connected, Serial0/0
C 50.0.0.0/8 is directly connected, Serial0/1
Router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router eigrp 22
Router(config-router)#network 30.0.0.0 255.0.0.0
Router(config-router)#network 50.0.0.0 255.0.0.0
Router#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
D 10.0.0.0/8 [90/2172416] via 30.0.0.1, 00:03:49, Serial0/0
D 20.0.0.0/8 [90/2681856] via 30.0.0.1, 00:03:49, Serial0/0
C 30.0.0.0/8 is directly connected, Serial0/0
D 40.0.0.0/8 [90/2681856] via 50.0.0.2, 00:02:24, Serial0/1
C 50.0.0.0/8 is directly connected, Serial0/1
D 60.0.0.0/8 [90/2172416] via 50.0.0.2, 00:02:20, Serial0/1
R4
Router# sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
OSPF
OSPF stand for Open Shortest Path First.
It is an open standard routing protocol that’s been implement by a wide variety
of network vendor, including Cisco.
It’s a link state protocol.
OSPF works by using the Dijkstra algorithm, first, a shortest path tree is
constructed, and then the routing table is populated with the resulting best paths.
Unlimited hop count.
It is a classless routing protocol.
Metric is cost. (Cost=10^8/B.W.)
Supports authentication.
Updates are sent through multicast address 224.0.0.5
Faster convergence.
Sends Hello packet every 10 seconds.
Router’s send only changes in updates and not the entire routing tables in periodic
updates.
Router ID
The highest IP address of the active physical interface of the router is Router ID.
If logical interface is configured, the highest IP address of the logical interface is
router ID
OSPF Process
(1) Establishing Bidirectional Communication
Advantages of OSPF
Open standard
No hop count limitations
Faster coverage
Disadvantages of OSPF
Consume more CPU resources
Complex to design and implement
R1 (ip assign)
Router>enable
Router# configure terminal
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/0
Router(config-if)#ip address 20.0.0.1 255.0.0.0
R2 (assign)
Router>enable
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 30.0.0.1 255.0.0.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0,
changed state to up
Router(config-if)#exit
Router(config)#interface Serial0/0
Router(config-if)#ip address 20.0.0.2 255.0.0.0
Router(config-if)#clock rate 64000
This command applies only to DCE interfaces
Router(config-if)#no shutdown
R1 (ospf configuration )
Router(config)#router ospf 22
Router(config-router)#network 10.0.0.0 0.255.255.255 area 0
Router(config-router)#network 20.0.0.0 0.255.255.255 area 0
Router# sh ip ro
Router# sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
R2 (ospf configuration )
Router(config)#router ospf 22
Router(config-router)#network 20.0.0.0 0.255.255.255 area 0
Router(config-router)#network 30.0.0.0 0.255.255.255 area 0
Router#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
O 10.0.0.0/8 [110/65] via 20.0.0.1, 00:00:56, Serial0/0
C 20.0.0.0/8 is directly connected, Serial0/0
C 30.0.0.0/8 is directly connected, FastEthernet0/0
Three things are very important to know before writing any ACL
statement
1) Selecting appropriate router to configure ACL.
2) Decide who is source and destination.
3) Understand In / Out and decide the right direction to implement ACL.
Wild cards are used with the host or network address to tell the router a range of
available address to filter.
Router#show access-list
Router#show access-list <no>
Operators:
eq (equal to)
neq (not equal to)
lt (less than)
gt (greater than)
IP
FTP DHCP
SMTP NNTP
If you want to filter by application layer protocol, you have to choose the
appropriate layer 4 transport protocol after the permit or deny statement.
For example, to filter Telnet or FTP, you choose TCP since both Telnet and FTP
use TCP at the Transport layer.
R1 (IP assign)
Router>enable
Router# configure terminal
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/0
Router(config-if)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
R2 (IP assign)
Router>enable
Router# configure terminal
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 30.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/0
Router(config-if)#ip address 20.0.0.2 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
R1 (Routing)
Router(config)#router rip
Router(config-router)#network 10.0.0.0
Router(config-router)#network 20.0.0.0
R2 (Routing)
Router(config)#router rip
Router(config-router)#network 20.0.0.0
Router(config-router)#network 30.0.0.0
Router 1:-
Fast Ethernet: 192.168.1.100
Serial 0: 10.0.0.1
PC6: 192.168.1.1
PC0: 192.168.1.2
PC1: 192.168.1.3
Router 2:-
Fast Ethernet: 192.168.2.100
Serial 1: 11.0.0.1
PC2: 192.168.2.1
PC3: 192.168.2.2
Router 3:-
Fast Ethernet: 192.168.3.100
PC4: 192.168.3.1
PC5: 192.168.3.2
Ans:-
Router 2:-
Router(config)#access-list 22 deny host 192.168.1.1
Router(config)#access-list 22 deny host 192.168.1.2
Router(config)#access-list 22 deny 192.168.3.0 0.0.0.255
Router(config)#access-list 22 permit any
Router(config)#interface f0/0
Router(config-if)#ip access-group 22 out
Task: - Configure the appropriate router as per the rule given below
Deny the user on LAN 192.168.2.0 should not access 192.168.1.3 HTTP service.
Deny the user on LAN 192.168.3.0 should not access 192.168.1.4 FTP service.
Deny the user on LAN 192.168.3.1 should not access 192.168.1.3 HTTP service.
Deny the user on LAN 192.168.2.0 should not get DNS service from DNS server
192.168.1.4
Deny the user from the host between 192.168.3.2 and 192.168.1.2 should not
be able to send ICMP (ping / Trace) message.
Remaining hosts and services should be permitted.
R1
R-1(config)#access-list 145 deny tcp 192.168.2.0 0.0.0.255 host 192.168.1.3
eq www
R-1(config)#access-list 145 deny tcp 192.168.3.0 0.0.0.255 host 192.168.1.4
eq ftp
R-1(config)#access-list 145 deny tcp host 192.168.3.1 host 192.168.1.3 eq
www
R-1(config)#access-list 145 deny udp 192.168.2.0 0.0.0.255 host 192.168.1.4
eq ?
Implementation:
R-1(config)#interface f0/0
R-1(config-if)#ip access-group 145 out
OR
R-1(config)#interface se0/0
R-1(config-if)#ip access-group 145 in
Here’s a list of situations when it’s best to have NAT on your side:
You need to connect to the internet and your hosts don’t have globally unique IP
addresses.
You change to a new ISP that requires you to remember your network.
You need to merge two intranets with duplicate addresses.
Advantages
Conserve legally registered addresses.
Reduce address overlap occurrence, increase flexibility when connecting to
Internet.
Disadvantages
Translation introduces switching path delays.
Loss of end-to-end IP traceability.
NAT Terminology
Inside Local Addresses:- Name of inside source address before translation
(private IP)
Inside Global Address:- Name of inside host after translation (public IP)
Outside local address:- Name of destination host before translation
Outside Global Address:- Name of outside destination host after translation
Types of NAT
1) Dynamic NAT
2) Static NAT
3) PAT
Static NAT
This type of NAT is designed to allow one-to-one mapping between local and global
addresses.
The static version requires you to have one real Internet IP address for every host
on your network.
Dynamic NAT
This version gives you the ability to map an unregistered IP address to a registered
IP address from out of a pool of registered IP addresses.
You don’t have to statically configure your router to map an inside to an outside
address as you would use static NAT, but you have to enough real IP addresses
for everyone who’s going to be sending packets to and receiving them from the
Internet.
Private IP Public IP
192.168.1.1 50.1.1.1
192.168.1.2 50.1.1.2
192.168.1.3 50.1.1.3
Router:-
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.1 255.255.255.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int fa0/0
Router(config-if)#ip address 192.168.1.100 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
ISP Router:-
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa0/1
Router(config-if)#ip address 200.1.1.100 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.2 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Task: Configure Dynamic NAT and make sure that the inside LAN users
(192.168.1.0 /24) get translation to public IP with the range of 50.1.1.1 –
50.1.1.200
Router:-
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.1 255.255.255.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int fa0/0
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
ISP Router:-
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa0/1
Router(config-if)#ip address 200.1.1.100 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.2 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Task: Configure the PAT (Dynamic NAT Overload) and make sure that the inside
LAN users (192.168.1.0 /24) get translated to single public IP (50.1.1.1) given
by the Service Provider.
Router:-
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.1 255.255.255.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int fa0/0
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
ISP Router:-
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa0/1
Router(config-if)#ip address 200.1.1.100 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int se0/1/0
Router(config-if)#ip address 100.1.1.2 255.0.0.0
Router(config-if)#clock rate 64000
Router(config-if)#no shutdown
Router(config-if)#exit
Step-4: After the router has booted into Cisco IOS, you’ll be
prompted by the initial configuration dialog, type n here and
press enter and you’ll be placed into user mode
--- System Configuration Dialog ---
Continue with configuration dialog? [yes/no]: n
Step-12: It will display massage that reload the router and the
register value set to again default.
Router#reload
Step-6: Without Flash File IOS can't Load so Booting Process Stop in
ROMMON Mode
rommon 1 >
Step-10 : If this massage is appear then you are on Right Way - type
Y
Do you wish to continue? y/n: [n]: y
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Step-11: After restore IOS type reset for Power cycle (POST) process
rommon 9 > reset
--- System Configuration Dialog ---
Continue with configuration dialog? [yes/no]: n
Press RETURN to get started!
Router>
Switching
It is data-link layer device (Layer 2).
It works with Physical addresses (MAC addresses).
It uses broadcast and unicast.
It has broadcast domain by default number of collision domains depends upon the
number of ports.
It maintains a MAC address table.
Broadcast Domain
Set of all devices that broadcast frames originating from any device within the
set.
Collision domain
In Ethernet, the network area within which frames that have collided are
propagated is called a collision domain.
A collision domain is a network segment with two or more devices sharing the
same bandwidth.
Types of Switches
Unmanageable switches
These switches are just plug and play.
No configurations and verifications can be done.
There is no console port.
Manageable switches
These switches are also plug and play.
If has console port and CLI access.
We can verify and modify configurations and can implement and test some
advance switching technologies (VLAN, trunking, STP).
Virtual LAN
Divides a single Broadcast domain into Multiple Broadcast domains.
By default all ports of the switch are in VLAN1. This VLAN1 is known as
Administrative VLAN or Management VLAN.
VLAN can be crated from 2 – 1001
Can be configured on a Manageable switch only
Two types of VLAN configuration
Static VLAN
Dynamic VLAN
Static VLAN
Static VLAN’s are based on port numbers.
Need to manually assign a port on a switch to a VLAN.
Also called Port-based VLAN.
Open port can be a member of any one VLAN.
Dynamic VLAN
Dynamic VLAN’s are based on the MAC address of a PC.
Switch automatically assigns the port to a VLAN.
Each port can be a member of multiple VLAN’s.
For Dynamic VLAN configuration, a software called VMPS (VLAN membership
Policy Server) is needed.
VLAN Practical
Switch 1:
Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 2
Switch(config-vlan)#name hr
Switch(config-vlan)#exit
Switch(config)#vlan 3
Switch(config-vlan)#name admin
Switch(config-vlan)#exit
Switch(config)#int f0/5
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch 2:
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 2
Switch(config-vlan)#name hr
Switch(config-vlan)#vlan 3
Switch(config-vlan)#name admin
Switch(config-vlan)#exit
Switch(config)#int f0/5
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------
1 default active Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Fa0/23, Fa0/24
2 hr active Fa0/1, Fa0/2
3 admin active Fa0/3, Fa0/4
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
Trunking
Types of link
Access link
This type of link is only part of one VLAN.
Any device attached to an access link is unaware of a VLAN membership, the
device just assumes it’s a part of a broadcast domain.
It has no understanding of the physical network.
Trunk link
Trunks can carry multiple VLANs traffic.
A trunk link is a 100 or 1000 Mbps point-to-point link between two switches,
between a switch and router, or between a switch and server.
These carry the traffic of multiple VLANs-from 1 to 1005 at a time.
Trunking protocols
Inter-Switch Link (ISL)
IEEE 802.1Q
Switch 0 (Server)
Server(config)#vtp domain ccna
Server(config)#vtp password 123
Server(config)#vtp mode server
Server(config)#interface f0/1
Server(config-if)#switchport mode trunk
Server(config)#vlan 2
Server(config-vlan)#vlan 3
Server(config-vlan)#vlan 4
Server(config-vlan)#vlan 5
Server(config-vlan)#vlan 6
Server(config-vlan)#vlan 7
Server(config-vlan)#vlan 8
Server(config-vlan)#vlan 9
Server#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/2, Fa0/3, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Fa0/23, Fa0/24
2 VLAN0002 active
3 VLAN0003 active
4 VLAN0004 active
5 VLAN0005 active
6 VLAN0006 active
7 VLAN0007 active
8 VLAN0008 active
9 VLAN0009 active
CLIENT1 Configuration
Client1(config)#vtp domain ccna
Client1(config)#vtp password 123
Client1(config)#vtp mode client
Client1(config)#interface range f0/1-2
Client1(config-if-range)#switchport mode trunk
Client1#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6
Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
Fa0/23, Fa0/24
2 VLAN0002 active
3 VLAN0003 active
4 VLAN0004 active
5 VLAN0005 active
6 VLAN0006 active
7 VLAN0007 active
8 VLAN0008 active
9 VLAN0009 active
TRANSPARENT Configuration
Trans(config)#vtp domain ccna
Trans(config)#vtp password 123
Trans(config)#vtp mode transparent
Trans(config)#interface range f0/1-2
Trans(config-if-range)#switchport mode trunk
CLIENT2 Configuration
Client2(config)#vtp domain ccna
Client2(config)#vtp password 123
Client2(config)#vtp mode client
Client2(config)#interface range f0/1-2
Client2(config-if-range)#switchport mode trunk
Client2#show vlan
*Note: Only client can update vlan database.
DTP Modes
Desirable
Desires to become trunk (always want to become trunk)
Sends and reply to DTP message
It becomes a trunk if the port on the other switch is set to tuunk, dynamic
desirable or dynamic auto mode.
Auto
Only reply to DTP messages (not send).
Default mode on most of the modern switches.
It becomes a trunk if the other end is set to trunk or dynamic desirable mode.
Trunk
Configuring trunk manually.
The port still negotiates trunking with the port on the other end of the link.
Access
Configuring access manually.
The port is a user port in a single VLAN.
No-Negotiate
Turn off DTP messages (disable DTP).
The port is a trunk and does not do DTP negotiation with the other side of
the link.
Inter-vlan Routing
Network devices in different VLANs cannot communicate with one another without
a router to route traffic between the VLANs. In the most network environments,
VLANs are associated with individual network or sub networks.
Configuring VLANs helps control the size of the broadcast domain and keeps local
traffic local.
However, when an end station in one VLALN needs to communicate with an end
station in another VLAN, inter VLAN communication as required.
This communication is supported by inter VLAN routing.
Switch
Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 2
Switch(config-vlan)#exit
Switch(config)#vlan 3
Switch(config-vlan)#exit
Switch(config)#int f0/5
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
2 VLAN0002 active Fa0/1, Fa0/2
3 VLAN0003 active Fa0/3, Fa0/4
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
2 enet 100002 1500 - - - - - 0 0
3 enet 100003 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
Router
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int f0/0
Router(config-if)#no ip address
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int f0/0.1
Router(config-subif)#encapsulation dot1Q 2
Router(config-subif)#ip address 10.0.0.1 255.0.0.0
Router(config-subif)#exit
Router(config)#int f0/0.2
Router(config-subif)#encapsulation dot1Q 3
Router(config-subif)#ip address 20.0.0.1 255.0.0.0
Router(config-subif)#exit
BPDU
All switches exchange information through what is called as bridge protocol data
units (BPDUs).
BPDUs contain a lot of information to help the switches determine the topology
and any loops that result from that topology.
BPDUs are sent every 2 Sec.
Switch 0:-
Switch>enable
Switch#sh spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0002.1718.218D
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch 1:-
Switch>enable
Switch#sh spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0002.1718.218D
Cost 19
Port 1(FastEthernet0/1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch 2:-
Switch>enable
Switch#sh spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0002.1718.218D
Cost 19
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
But now we have a problem: There is only one default gateway on each host,
so if Router1 is down and we want to access the Internet via Router2, we have
to change the default gateway (to 192.168.1.2). Also, when Router1 comes
back we have to manually change back to the IP address on Router1. And no
one can access to the Internet in the time of changing the default gateway.
HSRP can solve all these problems!
The first hop redundancy protocols are:
Hot Standby Router Protocol
Virtual Router Redundancy Protocol
Gateway Load Balancing Protocol
address is 192.168.1.254 and the virtual MAC is 0000.0c07.AC0A. All the hosts
will point their default gateway to this IP address.
One router, through the election process, is designated as active
router while the other router is designated as standby router. Both
active and standby router listen but only the active router proceeds and
forwards packets. Standby router is backup when active router fails by
monitoring periodic hellos sent by the active router (multicast to
224.0.0.2, UDP port 1985) to detect a failure of the active router.
When a failure on the active router detected, the standby router assumes the
role of the forwarding router. Because the new forwarding router uses the
same (virtual) IP and MAC addresses, the hosts see no disruption in
communication. A new standby router is also elected at that time (in the case
of there are more than two routers in a HSRP group).
Note: All routers in a HSRP group send hello packets. By default, the hello
timer is set to 3 seconds.
HSRP States
HSRP consists of 5 states:
State Description
Please notice that not all routers in a HSRP group go through all states above. In
a HSRP group, only one router reaches active state and one router reaches
standby state. Other routers will stop at listen state.
Now let’s take an example of a router passing through these states.
Suppose there are 2 routers A and B in the network; router A is turned
on first. It enters the initial state.
Then it moves to listen state in which it tries to hear if there are already
active or standby routers for this group.
After learning no one take the active or standby state, it determines to
take part in the election by moving tos peak state.
Now it starts sending hello messages containing its priority. These
messages are sent to the multicast address 224.0.0.2 (which can be
heard by all members in that group). When it does not hear a hello
message with a higher priority it assumes the role of active router and
moves to active state. In this state, it continues sending out periodic
hello messages.
Now router B is turned on.
It also goes through initial and listen state.
In listen state, it learns that router A has been already the active router
and no other router is taking standby role so it enters speak state to
compete for the standby router -> it promotes itself as standby router.
Suppose router A is in active state while router B is in standby state.
If router B does not hear hello messages from router A within the hold time
(10 seconds be default), router B goes into speak state to announce its priority
to all HSRP members and compete for the active state. But if at some time it
receives a message from the active router that has a lower priority than its
priority (because the administrator change the priority in either router), it can
take over the active role by sending out a hello packet with parameters
indicating it wants to take over the active router. This is called a coup hello
message.
Quick summarization:
HSRP is Cisco proprietary which allows several routers or multilayer switches
to appear as a single gateway IP address.
HSRP has 5 states: Initial, learn, listen, speak, standby and active.
HSRP allows multiple routers to share a virtual IP and MAC address so that the
end-user hosts do not realize when a failure occurs.
The active (or Master) router uses the virtual IP and MAC addresses.
Standby routers listen for Hellos from the Active router. A hello packet is sent
every 3 seconds by default. The hold time (dead interval) is 10 seconds.
Virtual MAC of 0000.0C07.ACxx , where xx is the hexadecimal number of HSRP
group.
The group numbers of HSRP version 1 range from 0 to 255. HSRP does support
group number of 0 (we do check it and in fact, it is the default group number
if you don’t enter group number in the configuration) so HSRP version 1
supports up to 256 group numbers. HSRP version 2 supports 4096 group
numbers.
other routers in the group stay idle until the active router fails. In other words,
the bandwidth of standby routers is not utilized and goes waste. Although it is
possible to configure multiple virtual router groups to achieve load balancing
in case of HSRP and VRRP, but it requires configuring different default
gateways on different hosts, which is an extra administrative burden.
The advantage of GLBP is that it provides load balancing in addition to
redundancy without requiring configuration of different default gateways on
different clients.
GLBP Operation
The routers participating in GLBS communicate with each other through hello
messages sent every 3 seconds to the multicast address 224.0.0.102, UDP
port 3222 (both source and destination). GLBP supports up to 1024 GLBP
groups on each physical interface, and up to four active virtual forwarders per
group.
Routers participating in GLBP form a group and elect one router as the AVG
(active virtual gateway) for that group. Other members of the group provide
backup for the AVG if it goes down. The AVG controls all members of the group
by assigning a virtual MAC address to each member. Each router takes
responsibility of forwarding packets sent to the virtual MAC address assigned
to it by the AVG. These routers are each called AVF (active virtual forwarder)
for their virtual MAC address. The AVG also responds to ARP (Address
Resolution Protocol) requests for the virtual IP address. This is the key to GLBP
operation as load balancing is actually achieved by the AVG replying to ARP
requests from different hosts with different virtual MAC addresses.
When a client sends an ARP message for the IP address of its default gateway,
the AVG responds with the virtual MAC address of one of the AVFs. When
another client sends an ARP message for default gateway address resolution,
the AVG returns the virtual MAC address of the next AVF. So each client gets
a different virtual MAC address for the same virtual IP address of the default
gateway. As a result, each client will send its traffic to separate routers despite
the fact that they are configured with the same default gateway.
HSRP Configuration
The figure below shows a basic HSRP topology with two routers forming an HSRP
or standby group. The router R1 is configured with a priority 110 that is higher
than the default priority 100. The router R2 is configured with the default priority
100. The Ethernet interfaces of R1 and R2 are configured with IP addressed
192.168.1.1 and 192.168.1.2, respectively. The IP address assigned to the HSRP
group 10 is 192.168.1.10 that is configured on both group members using
the standby ip command.
R1:
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface FastEthernet0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#standby version 2
R1(config-if)#standby 10 preempt
R1(config-if)#standby 10 priority 110
R1(config-if)#standby 10 ip 192.168.1.10
R1(config-if)#end
R2:
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface FastEthernet0/0
R2(config-if)#ip address 192.168.1.2 255.255.255.0
R2(config-if)#standby version 2
R2(config-if)#standby 10 preempt
R2(config-if)#standby 10 priority 100
R2(config-if)#standby 10 ip 192.168.1.10
R2(config-if)#end
It is time for verification using the show standby command. You can see from
the output for R1 below that it is the active router.
R1:
R1#show standby
FastEthernet0/0 – Group 10 (version 2)
State is Active
5 state changes, last state change 00:08:23
Virtual IP address is 192.168.1.10
Active virtual MAC address is 0000.0c9f.f00a
Local virtual MAC address is 0000.0c9f.f00a (v2 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.948 secs
Preemption enabled
Active router is local
Standby router is 192.168.1.2, priority 100 (expires in 9.412 sec)
Priority 110 (configured 110)
Group name is “hsrp-Fa0/0-10” (default)
R2:
R2#show standby
FastEthernet0/0 – Group 10 (version 2)
State is Standby
VRRP Configuration
The figure below shows a basic topology in which VRRP is configured. In this
example, routers R1, R2, and R3 are VRRP routers that together form a virtual
router or VRRP group. The IP address of the virtual router is the same as that
configured on the Ethernet interface of R1 (192.168.1.1).
Because the virtual router uses the IP address of the physical Ethernet interface
of R1, R1 assumes the role of virtual router master. The virtual router master is
also known as the IP address owner. There can be multiple virtual router
backups, though in the figure above routers R2 and R3 are virtual router
backups. If the virtual router master fails, the virtual router backup configured
with the highest priority will become the virtual router master. As a result, client
hosts on the LAN receive uninterrupted connectivity through their default
gateway (192.168.1.1).
R1:
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface FastEthernet0/0
R2:
R2#show vrrp
FastEthernet0/0 – Group 10
State is Backup
Virtual IP address is 192.168.1.1
Virtual MAC address is 0000.5e00.010a
Advertisement interval is 1.000 sec
Preemption enabled
Priority is 110
Master Router is 192.168.1.1, priority is 255
Master Advertisement interval is 1.000 sec
Master Down interval is 3.570 sec (expires in 2.806 sec)
R3:
R3#show vrrp
FastEthernet0/0 – Group 10
State is Backup
Virtual IP address is 192.168.1.1
Virtual MAC address is 0000.5e00.010a
Advertisement interval is 1.000 sec
Preemption enabled
Priority is 100
Master Router is 192.168.1.1, priority is 255
Master Advertisement interval is 1.000 sec
Master Down interval is 3.609 sec (expires in 2.633 sec)
R1:
R1(config)#interface FastEthernet0/0
R1(config-if)#shutdown
R1(config-if)#end
R2:
R2#show vrrp
FastEthernet0/0 – Group 10
State is Master
Virtual IP address is 192.168.1.1
Virtual MAC address is 0000.5e00.010a
Advertisement interval is 1.000 sec
Preemption enabled
Priority is 110
Master Router is 192.168.1.2 (local), priority is 110
Master Advertisement interval is 1.000 sec
Master Down interval is 3.570 sec
R3:
R3#show vrrp
FastEthernet0/0 – Group 10
State is Backup
Virtual IP address is 192.168.1.1
Virtual MAC address is 0000.5e00.010a
Advertisement interval is 1.000 sec
Preemption enabled
Priority is 100
Master Router is 192.168.1.2, priority is 110
Master Advertisement interval is 1.000 sec
Master Down interval is 3.609 sec (expires in 3.165 sec)
GLBP Configuration
The figure below shows a basic GLBP topology with R1 and R2 forming a GLBP
group. The router R1 is the AVG for the GLBP group and is responsible for the
virtual IP address 192.168.1.10. Router R1 is also the AVF for the virtual MAC
address 0007.b400.0a01. Router R2 is a member of the same GLBP group and
is the designated AVF for the virtual MAC address 0007.b400.0a02. Client 1
has a default gateway of 192.168.1.10 and a gateway MAC address of
0007.b400.0a01. Client 2 has the same default gateway 192.168.1.10 but
receives the gateway MAC address 0007.b400.0a02 because router R2 is
sharing the traffic load with R1.
R1:
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface FastEthernet0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#glbp 10 ip 192.168.1.10
R1(config-if)#end
R2:
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface FastEthernet0/0
R2(config-if)#ip address 192.168.1.2 255.255.255.0
R2(config-if)#glbp 10 ip
R2(config-if)#end
R2#
R1:
R1#show glbp
FastEthernet0/0 – Group 10
State is Active
2 state changes, last state change 00:07:32
Virtual IP address is 192.168.1.10
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.488 secs
Redirect time 600 sec, forwarder timeout 14400 sec
Preemption disabled
Active is local
Standby is 192.168.1.2, priority 100 (expires in 9.888 sec)
Priority 100 (default)
Weighting 100 (default 100), thresholds: lower 1, upper 100
Load balancing: round-robin
Group members:
c200.140c.0000 (192.168.1.1) local
c201.140c.0000 (192.168.1.2)
There are 2 forwarders (1 active)
Forwarder 1
State is Active
1 state change, last state change 00:07:22
MAC address is 0007.b400.0a01 (default)
Owner ID is c200.140c.0000
Redirection enabled
Preemption enabled, min delay 30 sec
Active is local, weighting 100
Forwarder 2
State is Listen
2 state changes, last state change 00:00:10
MAC address is 0007.b400.0a02 (learnt)
Owner ID is c201.140c.0000
Redirection enabled, 598.188 sec remaining (maximum 600 sec)
Time to live: 14398.188 sec (maximum 14400 sec)
Preemption enabled, min delay 30 sec
Active is 192.168.1.2 (primary), weighting 100 (expires in 8.188 sec)
R2:
R2#show glbp
FastEthernet0/0 – Group 10
State is Standby
1 state change, last state change 00:05:21
Virtual IP address is 192.168.1.10 (learnt)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.740 secs
Redirect time 600 sec, forwarder timeout 14400 sec
Preemption disabled
Active is 192.168.1.1, priority 100 (expires in 7.468 sec)
Standby is local
Priority 100 (default)
Weighting 100 (default 100), thresholds: lower 1, upper 100
Load balancing: round-robin
Group members:
c200.140c.0000 (192.168.1.1)
c201.140c.0000 (192.168.1.2) local
There are 2 forwarders (1 active)
Forwarder 1
State is Listen
MAC address is 0007.b400.0a01 (learnt)
Owner ID is c200.140c.0000
Time to live: 14397.456 sec (maximum 14400 sec)
Preemption enabled, min delay 30 sec
Active is 192.168.1.1 (primary), weighting 100 (expires in 8.888 sec)
Forwarder 2
State is Active
1 state change, last state change 00:05:07
MAC address is 0007.b400.0a02 (default)
Owner ID is c201.140c.0000
Preemption enabled, min delay 30 sec
Active is local, weighting 100