CH 2 Router and Switch
CH 2 Router and Switch
Central
Servers for
campus
Where to put Servers?
▪ Servers should be on a high speed interface off of your core
router
▪ Servers should be at your core location where there is good
power and air conditioning
Firewall/
Border Router Core Router All router
Traffic Shaper
interfaces on a
separate subnet
Servers
in core
Border Router
▪ Connects to outside world
▪ RENs and Peering are the reason you need them
▪ Must get Provider Independent IP address space to really make
this work right
Internet
Exchange REN
Campus
Network
Putting it all Together
Firewall/
Border Traffic Shaper
Router
REN switch
Core
Router
Core Servers
Firewall/
Border Router Core Router All router
Traffic Shaper
interfaces on a
separate subnet
Central
Servers for
campus
Where to put Servers?
• Servers should be on a high speed interface off of your core
router
• Servers should be at your core location where there is good
power and air conditioning
Firewall/
Border Router Core Router All router
Traffic Shaper
interfaces on a
separate subnet
Servers
in core
Border Router
• Connects to outside world
• RENs and Peering are the reason you need them
• Must get Provider Independent IP address space to really
make this work right
Internet
Exchange REN
Campus
Network
Putting it all Together
Firewall/
Border Traffic Shaper
Router
REN switch
Core
Router
Core Servers
Core Core
Router Switch
Core Servers
Core Switch
Local Internet
exchange switch
Core Router Fiber Links to remote buildings Core Router
Alternative Core Designs
• Wireless Links versus Fiber
Firewall/
Traffic Shaper
Border
Router
REN switch
Core
Router
Core Servers
Wireless Links
Configure a Switch with Initial Settings Switch Boot Sequence
▪After a switch is powered on, it goes through the following five-step boot
sequence:
oStep 1: First, the switch loads a power-on self-test (POST) program
stored in ROM. POST checks the CPU subsystem. It tests the CPU,
DRAM, and the portion of the flash device that makes up the flash
file system.
oStep 2: Next, the switch loads the boot loader software. The boot
loader is a small program stored in ROM that is run immediately
after POST successfully completes.
oStep 3: The boot loader performs low-level CPU initialization. It
initializes the CPU registers, which control where physical memory is
mapped, the quantity of memory, and its speed.
oStep 4: The boot loader initializes the flash file system on the system
board.
oStep 5: Finally, the boot loader locates and loads a default IOS
operating system software image into memory and gives control of
the switch over to the IOS.
Configure a Switch with Initial Settings The boot system Command
▪ The switch attempts to automatically boot by using information in
the BOOT environment variable. If this variable is not set, the
switch attempts to load and execute the first executable file it can
find.
▪ The IOS operating system then initializes the interfaces using the
(Cisco) IOS commands found in the startup-config file. The
startup-config file is called config.text and is located in flash.
▪ In the example, the BOOT environment variable is set using
the boot system global configuration mode command.
▪ Notice that the IOS is located in a distinct folder and the folder path is
specified. Use the command show boot to see what the current IOS boot
file is set to.
Configure a Switch with Initial Settings The boot system Command
▪ Notice that the IOS is located in a distinct folder and the folder
path is specified.
▪ Use the command show boot to see what the current IOS boot file is
set to.
Command Definition
▪The boot loader command line supports commands to format the flash file system,
reinstall the operating system software, and recover a lost or forgotten password. For
example, the dir command can be used to view a list of files within a specified
directory.
Configure a Switch with Initial Settings Recovering from a System
Crash
▪To prepare a switch for remote
management access, the switch must
be configured with an IP address and
a subnet mask.
o To manage the switch from a remote
network, the switch must be configured
with a default gateway. This is very
similar to configuring the IP address
information on host devices.
o In the figure, the switch virtual interface
(SVI) on S1 should be assigned an IP
address. The SVI is a virtual interface, not
a physical port on the switch. A console
cable is used to connect to a PC so that
the switch can be initially configured.
Configure a Switch with Initial Settings Switch SVI Configuration
Example
▪By default, the switch is configured to have its management
controlled through VLAN 1. All ports are assigned to VLAN 1 by
default. For security purposes, it is considered a best practice to use
a VLAN other than VLAN 1 for the management VLAN,
▪Step 1: Configure the Management Interface: From VLAN interface
configuration mode, an IPv4 address and subnet mask is applied to the
management SVI of the switch.
▪Note:-
▪The SVI for VLAN 99 will not appear as “up/up” until VLAN 99 is created
and there is a device connected to a switch port associated with VLAN 99.
▪The switch may need to be configured for IPv6. For example, before you
can configure IPv6 addressing on a Cisco Catalyst 2960 running IOS
version 15.0, you will need to enter the global configuration command sdm
prefer dual-ipv4-and-ipv6 default and then reload the switch.
Configure a Switch with Initial Settings
Switch SVI Configuration Example (Cont.)
Task IOS Commands
config.
Configure a Switch with Initial Settings
Switch SVI Configuration Example (Cont.)
Step 2: Configure the Default Gateway
• The switch should be configured with a default gateway if it will be managed
remotely from networks that are not directly connected.
• Note: Because, it will receive its default gateway information from a router advertisement
(RA) message, the switch does not require an IPv6 default gateway.
Task IOS Commands
Enter global configuration mode. S1# configure terminal
Configure the default gateway for S1(config)# ip default-gateway
the switch. 172.17.99.1
Return to the privileged EXEC
S1(config-if)# end
mode.
Save the running config to the
S1# copy running-config startup-config
startup config. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Configure a Switch with Initial Settings
Switch SVI Configuration Example (Cont.)
▪Step 3: Verify Configuration
▪The show ip interface brief and show ipv6 interface brief commands are
useful for determining the status of both physical and virtual interfaces. The
output shown confirms that interface VLAN 99 has been configured with an
IPv4 and IPv6 address.
▪Note: An IP address applied to the SVI is only for remote management access to
the switch; this does not allow the switch to route Layer 3 packets.
Lab – Basic Switch Configuration
▪In this lab, you will complete the following
objectives:
1. Cable the Network(you install Network emulator) and
Verify the Default Switch Configuration
2. Configure Basic Network Device Settings
3. Verify and Test Network Connectivity
4. Manage the MAC Address Table
Configure Switch Ports
Configure Switch Ports Duplex Communication
• Full-duplex communication increases bandwidth efficiency by allowing both
ends of a connection to transmit and receive data simultaneously. This is also
known as bidirectional communication and it requires microsegmentation.
• A microsegmented LAN is created when a switch port has only one device
connected and is operating in full-duplex mode. There is no collision domain
associated with a switch port operating in full-duplex mode.
• Unlike full-duplex communication, half-duplex communication is
unidirectional. Half-duplex communication creates performance issues because
data can flow in only one direction at a time, often resulting in collisions.
• Gigabit Ethernet and 10 Gb NICs require full-duplex connections to operate. In
full-duplex mode, the collision detection circuit on the NIC is disabled. Full-
duplex offers 100 percent efficiency in both directions (transmitting and
receiving). This results in a doubling of the potential use of the stated
bandwidth.
Configure Switch Ports
Configure Switch Ports at the Physical Layer
• Full-duplex communication increases bandwidth efficiency by allowing both
ends of a connection to transmit and receive data simultaneously. This is also
known as bidirectional communication and it requires microsegmentation.
• A microsegmented LAN is created when a switch port has only one device
connected and is operating in full-duplex mode. There is no collision domain
associated with a switch port operating in full-duplex mode.
• Unlike full-duplex communication, half-duplex communication is
unidirectional. Half-duplex communication creates performance issues because
data can flow in only one direction at a time, often resulting in collisions.
• Gigabit Ethernet and 10 Gb NICs require full-duplex connections to operate. In
full-duplex mode, the collision detection circuit on the NIC is disabled. Full-
duplex offers 100 percent efficiency in both directions (transmitting and
receiving). This results in a doubling of the potential use of the stated
bandwidth.
Configure Switch Ports Configure Switch Ports at the Physical Layer
• Switch ports can be manually configured with specific duplex and speed settings. The
respective interface configuration commands are duplex and speed.
• The default setting for both duplex and speed for switch ports on Cisco Catalyst 2960
and 3560 switches is auto. The 10/100/1000 ports operate in either half- or full-duplex
mode when they are set to 10 or 100 Mbps and operate only in full-duplex mode
when it is set to 1000 Mbps (1 Gbps).
• Autonegotiation is useful when the speed and duplex settings of the device
connecting to the port are unknown or may change. When connecting to known
devices such as servers, dedicated workstations, or network devices, a best practice is
to manually set the speed and duplex settings.
• When troubleshooting switch port issues, it is important that the duplex and speed
settings are checked.
Note: Mismatched settings for the duplex mode and speed of switch ports can cause
connectivity issues. Autonegotiation failure creates mismatched settings.
All fiber-optic ports, such as 1000BASE-SX ports, operate only at one preset speed and are
always full-duplex
Configure Switch Ports
Configure Switch Ports at the Physical Layer (Cont.)
Save the running config to the startup config. S1# copy running-config startup-config
Configure Switch Ports
Switch Verification Commands
Task IOS Commands
The first line of the output for the show interfaces fastEthernet 0/18 command indicates that the
FastEthernet 0/18 interface is up/up, meaning that it is operational. Further down, the output shows
that the duplex is full and the speed is 100 Mbps.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Configure Switch Ports
Network Access Layer Issues
The output from the show interfaces command is useful for detecting common media issues. One
of the most important parts of this output is the display of the line and data link protocol status, as
shown in the example.
The first parameter (FastEthernet0/18 is up) refers to the hardware layer and indicates whether the
interface is receiving a carrier detect signal. The second parameter (line protocol is up) refers to the
data link layer and indicates whether the data link layer protocol keepalives are being received.
Based on the output of the show interfaces command, possible problems can be fixed as follows:
• If the interface is up and the line protocol is down, a problem exists. There could be an encapsulation type mismatch,
the interface on the other end could be error-disabled, or there could be a hardware problem.
• If the line protocol and the interface are both down, a cable is not attached, or some other interface problem exists. For
example, in a back-to-back connection, the other end of the connection may be administratively down.
• If the interface is administratively down, it has been manually disabled (the shutdown command has been issued) in
the active configuration.
Configure Switch Ports
Network Access Layer Issues (Cont.)
Input Errors Total number of errors. It includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts.
Packets that are discarded because they are smaller than the minimum packet size for the medium.
Runts
For instance, any Ethernet packet that is less than 64 bytes is considered a runt.
Packets that are discarded because they exceed the maximum packet size for the medium. For
Giants
example, any Ethernet packet that is greater than 1,518 bytes is considered a giant.
CRC CRC errors are generated when the calculated checksum is not the same as the checksum received.
Sum of all errors that prevented the final transmission of datagrams out of the interface that is being
Output Errors
examined.
Late Collisions A collision that occurs after 512 bits of the frame have been transmitted
Configure Switch Ports
Interface Input and Output Errors
“Input errors” is the sum of all errors in datagrams that were received on the
interface being examined. This includes runts, giants, CRC, no buffer, frame,
overrun, and ignored counts. The reported input errors from the show
interfaces command include the following:
• Runt Frames - Ethernet frames that are shorter than the 64-byte minimum
allowed length are called runts. Malfunctioning NICs are the usual cause of
excessive runt frames, but they can also be caused by collisions.
• Giants - Ethernet frames that are larger than the maximum allowed size
are called giants.
• CRC errors - On Ethernet and serial interfaces, CRC errors usually
indicate a media or cable error. Common causes include electrical
interference, loose or damaged connections, or incorrect cabling. If you see
many CRC errors, there is too much noise on the link and you should
inspect the cable. You should also search for and eliminate noise sources.
Configure Switch Ports
Interface Input and Output Errors (Cont.)
“Output errors” is the sum of all errors that prevented the final
transmission of datagrams out the interface that is being examined.
The reported output errors from the show interfaces command
include the following:
• Collisions - Collisions in half-duplex operations are normal.
However, you should never see collisions on an interface
configured for full-duplex communication.
• Late collisions - A late collision refers to a collision that occurs
after 512 bits of the frame have been transmitted. Excessive
cable lengths are the most common cause of late collisions.
Another common cause is duplex misconfiguration.
1.3 Secure Remote Access
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Secure Remote Access
Telnet Operation
Telnet uses TCP port 23. It is an older
protocol that uses unsecure plaintext
transmission of both the login authentication
(username and password) and the data
transmitted between the communicating
devices.
A threat actor can monitor packets using
Wireshark. For example, in the figure the
threat actor captured the
username admin and password ccna from a
Telnet session.
Secure Remote Access
SSH Operation
Secure Shell (SSH) is a secure protocol that uses
TCP port 22. It provides a secure (encrypted)
management connection to a remote device. SSH
should replace Telnet for management connections.
SSH provides security for remote connections by
providing strong encryption when a device is
authenticated (username and password) and also
for the transmitted data between the communicating
devices.
To display the version and configuration data for SSH on the device that you
configured as an SSH server, use the show ip ssh command. In the example,
SSH version 2 is enabled.
Secure Remote Access Packet Tracer – Configure SSH
In this Packet Tracer, you will do the following:
• Secure passwords
• Encrypt communications
• Verify SSH implementation