Notes Net4
Notes Net4
The diagram you provided shows a Virtual Private Network (VPN) setup that connects various
locations and users securely to a main corporate network through the internet. Here’s a simple
breakdown:
Each external location or user connects over the public internet using secure tunnels
(VPN) to ensure that data is encrypted and protected.
The Cisco ASA Firewall at the main site acts as the central point, filtering incoming and
outgoing traffic to ensure security.
Through this setup, users and offices located anywhere can safely access corporate
systems as if they were on the same private network, without exposing sensitive data to
the public internet.
Early VPNs were simple IP tunnels without authentication or encryption. One example is Generic
Routing Encapsulation (GRE), a tunneling protocol developed by Cisco. GRE allows different types of
network layer protocol packets to be encapsulated inside IP tunnels, creating a virtual point-to-point link
between remote Cisco routers over an IP network. However, GRE lacks built-in encryption, meaning it
doesn't secure the data being transmitted.
EX. page 5
Early VPNs were like "virtual tunnels" for data, but they didn't have any locks (no encryption or
security). One example is Generic Routing Encapsulation (GRE), a tool made by Cisco.
Imagine you're sending a letter inside an envelope. GRE is like that envelope—it can carry
different kinds of information through the internet. But, here's the problem: the envelope
isn't sealed, so anyone could open it and read your letter (your data), because GRE doesn't
have encryption to protect it.
So while GRE helps create a connection between remote locations (like between two
routers), it doesn't keep your information secure.
Today, VPNs typically use encryption for security, like with IPsec VPNs. To set up a VPN, you need a
VPN gateway, which can be a router, firewall, or a Cisco Adaptive Security Appliance (ASA). The ASA
is a specialized firewall device that combines several functions: firewall, VPN concentrator, and intrusion
prevention, all in one.
1. VPN Gateway: This is like a door between two networks. It controls who can connect to
a private network over the internet. A VPN gateway can be a router, firewall, or special
device like a Cisco ASA.
2. IPsec VPN: This is a type of VPN that adds a lock to your data by encrypting it. It
makes sure that any information sent through the VPN is secure and can't be easily read
by anyone else.
3. ASA (Adaptive Security Appliance): This is a special all-in-one security device made
by Cisco. It works as a firewall (blocks unwanted traffic), a VPN concentrator (manages
secure VPN connections), and an intrusion prevention system (stops attacks). It's like a
powerful security guard for your network!
Here are some more specific speed benchmarks based on various tests and reports for each VPN
protocol. Keep in mind these are approximate and can vary:
1. OpenVPN:
o TCP (Transport Control Protocol): Typically around 50-150 Mbps.
o UDP (User Datagram Protocol): Typically around 100-200 Mbps.
o Factors Affecting Speed: TCP is more reliable but can be slower; UDP is faster but less
reliable. Encryption level and server load can also impact speeds.
2. WireGuard:
o Typical Speeds: Can often achieve 200-500 Mbps or more.
o Factors Affecting Speed: Known for its high speeds due to its efficient design and
modern cryptographic methods. Performance can be very close to your base internet
speeds, depending on server and network conditions.
3. IPSec/IKEv2:
o Typical Speeds: Generally 100-300 Mbps.
o Factors Affecting Speed: Offers a good balance between security and speed. Can
perform well due to efficient encryption and handling of network changes.
4. L2TP/IPSec:
o Typical Speeds: Usually in the range of 50-150 Mbps.
o Factors Affecting Speed: The combination of L2TP and IPSec can create additional
overhead, which often results in slower speeds compared to more modern protocols.
A DSL modem connects a single device or router to a DSL internet service, providing internet access
over a telephone line for homes or small offices. In contrast, a Modem Bank is a collection of multiple
modems grouped together to manage many dial-up connections simultaneously, typically used in larger
organizations or service providers before broadband became common.
A DSL modem (Digital Subscriber Line modem) is a device that connects your home to the
internet using your phone line, giving you faster internet than old dial-up.
ZTE ZXHN H108N: A modem/router used by Globe for their DSL subscribers. It
supports ADSL2+ technology and wireless functionality.
Huawei HG532d: ADSL2+ modem-router that Globe provides for some of its DSL
broadband plans.
A modem bank is a big box that has lots of modems inside it, allowing many people to use the
internet at the same time through dial-up, which was used before fast internet like DSL existed.
Scalability:
What it means: VPNs let companies easily add more users by using the internet they
already have. If they need to support more people, they can do it without buying a lot of
new equipment.
Why it’s helpful: It’s like being able to add more chairs to a table without needing a new
table. It makes growing the company easy and cheap.
What it means: VPNs let people who work from home or on the go use fast internet (like
DSL or cable) to connect to their company’s network.
Why it’s helpful: It’s like letting remote workers use their fast home internet to easily
get to work stuff. It saves money and makes working from different places more
convenient.
Regular TCP/IP Traffic: This is just how data normally travels on the internet. It
includes things like browsing the web or sending emails. TCP/IP are the rules that help
computers talk to each other.
Through a VPN Gateway: The VPN gateway is like a special security checkpoint. It
makes sure that the data being sent (like emails or website requests) is protected and
secure before it travels over the internet.
Security
o A Cisco ASA Firewall is used to protect the network from unauthorized access,
while allowing secure connections.
Encryption Protocols:
AES-256 Encryption: VPNs often use AES-256 (Advanced Encryption Standard with a
256-bit key) to encrypt data. This is a strong encryption standard that makes it extremely
difficult for anyone to decipher the data without the correct key.
Block Size: AES processes data in fixed-size blocks of 128 bits (16 bytes).
bit= 0 or a 1
RSA Encryption: For secure key exchange, VPNs might use RSA (Rivest-Shamir-
Adleman) encryption, which ensures that the keys used to encrypt and decrypt data are
transmitted securely.
Authentication Methods:
OpenVPN: This open-source protocol uses SSL/TLS for key exchange and provides
robust encryption and authentication methods.
IPSec/IKEv2: This combination of protocols ensures secure data transfer by encrypting
the data and using authentication methods to verify the identity of both ends of the
connection.
So, "regular TCP/IP traffic through a VPN gateway" means that your usual internet data is
sent through a secure checkpoint (the VPN gateway) that adds extra protection to keep it safe
while traveling.
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It’s a set of rules that
computers use to communicate over the internet. Here’s what each part means:
Transmission Control Protocol (TCP): Ensures that data sent from one computer to
another arrives correctly and in the right order.
Internet Protocol (IP): Handles the addressing and routing of data, so it knows where to
go and how to get there.
site-to-site VPN
Together, TCP/IP makes sure that data can travel across the internet efficiently and accurately.
This image shows how two locations connect securely using a site-to-site VPN. Here's a simpler
explanation:
1. Laptop on the left: The user (or device) doesn't need to know about the VPN. They use
the internet as usual.
2. VPN devices: Special devices (routers or firewalls) at both locations create a secure
"tunnel" through the internet to protect the data.
3. Internet: The data travels over the public internet, but it's encrypted (made secure) so no
one can see or steal it.
4. Destination: On the other side, the VPN device at the remote location (like a company
office) decrypts the data and lets it into the network.
Basically, it allows two different locations (like an office and a branch) to communicate securely
over the internet without users needing to do anything special.
"Tunneling" in a VPN refers to the method used to securely send data from one point to another
over the internet. Here’s what it means:
1. Data Encapsulation: Tunneling takes your data and wraps it in a secure "tunnel." This
tunnel is like a protective layer that hides your data from anyone who might try to
intercept it.
2. Secure Path: The "tunnel" is a private path through the public internet. Even though your
data travels over the public internet, it stays secure and hidden inside this tunnel.
3. End-to-End Security: The data travels from your device to a VPN server through this
secure tunnel. Once it reaches the VPN server, it is sent to its final destination, still
protected by the tunnel.
In essence, tunneling VPNs create a private, secure path for your data to travel over the internet,
keeping it safe from eavesdropping and unauthorized access.
REMOTE USER
This image shows how a remote worker connects securely to their company network using Cisco
AnyConnect VPN. Here's a simpler explanation:
1. Remote User: The person uses their laptop with Cisco AnyConnect software to connect.
2. VPN Tunnel: The connection between the laptop and the company is protected by a
secure "tunnel" over the internet. This keeps the data safe.
3. Firewall: The company's firewall (Cisco ASA) checks the connection to make sure it's
safe and only lets in authorized users.
4. VPN Server: Once approved, the user can access the company's network and resources.
In summary, this shows how a remote user can use Cisco AnyConnect to securely connect to a
company's network via a VPN tunnel, passing through a firewall (Cisco ASA) for protection and
authentication.
HUB SPOKE
This image shows a Hub-and-Spoke VPN topology, which is a common way to connect
multiple networks or locations securely. Here’s a simple explanation of how it works:
1. Hub:
o The Hub is the central point where all the connections come together. It controls the
communication between the other locations (called spokes).
2. Spokes (A, B, C):
o These are the different locations or networks (Spoke A, Spoke B, Spoke C). They
connect to the hub, but not directly to each other.
3. Hub-to-Spoke Tunnels:
o The green lines represent secure VPN connections (or tunnels) between each spoke and
the hub. All communication between spokes must go through the hub.
How it works:
If Spoke A wants to communicate with Spoke B, the traffic first goes to the Hub, which then
sends it to Spoke B.
The Hub manages and secures the data traffic between the spokes, ensuring everything stays
private and controlled.
This topology is commonly used in networks where a central office (hub) needs to manage
communication between multiple branch offices (spokes).
1. Hub: The central router (Hub) connects to all other routers (Spokes).
2. Spokes: These are the outer routers (Spoke A, B, and C) that connect to the Hub.
3. Green Lines (Hub-to-Spoke Tunnels): These lines show that each Spoke connects to
the Hub, so all communication usually goes through the Hub.
4. Orange Lines (Spoke-to-Spoke Tunnels): These lines show direct connections between
Spokes, allowing them to talk to each other without passing through the Hub.
In simple terms, Spokes can either talk to the Hub directly or to each other, depending on the
setup.
The key difference between DMVPN Hub-to-Spoke Tunnels and DMVPN Hub-to-Spoke and
Spoke-to-Spoke Tunnels lies in how traffic flows between the routers (spokes) in the network:
1. Hub Router (left side): This is the central router that acts as the main connection point.
In the diagram, it has:
o Gigabit Interface 0/0 (Gi0/0) connected with the IPv4 address 192.168.123.1.
o It's also connected to the cloud network with an IPv6 address prefix
2001:DB8::/64.
2. Spoke Routers (right side): These are remote routers that connect to the hub via the
cloud. There are two spokes:
o Spoke 1: Has an IPv4 address 192.168.123.2 on its Gigabit Interface 0/0 (Gi0/0),
and connects to the cloud.
o Spoke 2: Has an IPv4 address 192.168.123.3 on its Gigabit Interface 0/0 (Gi0/0),
and also connects to the cloud.
3. Cloud Connection: The cloud represents a network (often the internet or a VPN)
connecting the Hub to the Spokes. Both IPv6 and IPv4 addresses are used here, with the
Hub and Spokes sharing the same IPv6 network prefix 2001:DB8::/64.
Summary:
The hub connects to two spoke routers via a cloud using both IPv4 and IPv6 addresses.
IPv4 is used for direct router connections (e.g., Gi0/0 interfaces), while IPv6 is used as
the addressing scheme across the cloud network.
This topology is common in VPNs or MPLS networks, where the hub router manages
connections to multiple remote spokes.
24-26 (Sa Presentation and explanation)
28-29 Verifying GRE
Tunnel Verification:
The first command checks if the tunnel interface (e.g., Tunnel 0) is up and has an assigned IP address.
The second command verifies the GRE tunnel state, source and destination addresses, and supported GRE
mode.
The line protocol remains up as long as there’s a route to the tunnel destination.
Prerequisites for GRE Tunnels:
Before implementing a GRE tunnel, ensure IP connectivity exists between the physical interfaces at both
ends.
A routing protocol (e.g., OSPF) can exchange route information over the tunnel interface.
30-32 Trouble Shoot GRE
Use show ip interface brief on both routers.
Check that the tunnel interface is up and has the correct IP addresses for both the physical interface and
the tunnel interface.
Verify that the source interface on each router is also up and configured correctly
Use show ip ospf neighbor to check OSPF neighbor adjacency. NOTE: you can also use show ip route
Key Takeaways:
1. AS65001 and AS65002 are separate networks (ASs) that communicate with each other and the
Internet.
2. iBGP handles internal routing within an AS, while eBGP manages communication between ASs.
3. ISPs play a crucial role in connecting ASs to the global Interne
Overview
Purpose: eBGP is used for communication between different Autonomous Systems (ASs). An AS
represents a collection of IP networks and routers under a single administrative domain
Purpose: iBGP handles routing information exchange within a single AS.
AS – Autonomous System
BGP multihome involves maintaining links to multiple Internet providers (usually 2 or 3).
Benefits of BGP Multihoming:
Redundancy: Ensures that even if one ISP fails, your network remains operational.
Optimized Routing: Allows you to choose the best path to resources based on ISP performance.
Peace of Mind: Customers can rely on a reliable network connection.
•AS 65001 (ISP-1): Represents an Internet Service Provider (ISP). It’s connected to other ASes via BGP
(Border Gateway Protocol).
•AS 65002: Another AS, also using BGP for interconnections. Within AS 65002, there’s an internal
protocol called OSPF (Open Shortest Path First).
•AS 65003 (ISP-3): This ISP uses both BGP and EIGRP (Enhanced Interior Gateway Routing Protocol)
internally.
•AS 65004 (ISP-2): Another ISP, connected via BGP.
•AS 65005: A standalone AS, connected to AS 65004.
•Content Provider AS 65006: This AS is connected to AS 65003 via OSPF.
Key Takeaways:
1.The diagram illustrates the complexity of internet connectivity between different network service
providers and content providers.
2.BGP plays a crucial role in inter-domain routing, allowing ASes to exchange routing information.
3.OSPF and EIGRP handle intra-domain routing within specific ASes.
4.Overall, this diagram showcases the intricate web of connections that make up the global internet
39-41
DEFAULT ROUTE ONLY
Default Routes from ISPs:
The ISPs (Internet Service Providers) have configured default routes.
Company-A, however, doesn’t have its own default route—it relies on the ISPs’ defaults.
Suboptimal Routing Risk:
Since Company-A only receives default routes, it might choose the wrong ISP for certain destinations.
For instance, it could use ISP-1’s default route even when sending packets to networks in ISP-2’s A
DEFAULT ROUTE AND ISP ROUTES
Company-A and ISPs:
Company-A has multiple ISPs (Internet Service Providers).
Each ISP advertises specific networks.
Routing Decision:
For networks advertised by ISP-1, Company-A chooses ISP-1.
Otherwise, it uses one of the default routes.
But beware: suboptimal routing may happen for other Internet destinations.
In summary, it’s like picking the right road for specific destinations but taking a chance on the rest!
ALL INTERNET ROUTES
Scenario: Company-A receives all Internet routes from both ISPs (Internet Service Providers).
Benefit: Company-A can choose the best ISP for each network.
Challenge: Requires significant router resources to handle over 500,000 Internet networks.
The router bgp global configuration command enables BGP and identifies
the AS number for Company-A. A router can belong to only a single AS, so
only a single BGP process can run on a router.
The neighbor router configuration command identifies the BGP peer IP
address and AS number. Notice that the ISP AS number is different than the
Company-A AS number. This informs the BGP process that the neighbor is
in a different AS and is therefore an external BGP neighbor.
The network network-address [mask network-mask] router configuration
command enters the network-address into the local BGP table. The BGP
table contains all routes learned via BGP or advertised using BGP. eBGP will
then advertise the network-address to its eBGP neighbors.
The mask network-mask command parameter must be used when the
network advertised is different from its classful equivalent. In this example,
the 198.133.219.0/24 is equivalent to a class C network. Class C networks
have a /24 subnet mask, so in this case the mask option is not required. If
Customer-A were advertising the 198.133.0.0/16 network, the mask option
would be required. Otherwise, BGP would advertise the network with a /24
classful mask
POSSIBLE QUESTIONS:
what is ospf neighbor adjacency?
OSPF Neighbors:
what is autonomous system and how does it work? and give a brief example
The image highlights the essential BGP setup needed for Company-A to communicate
externally through ISP-1. It shows the networking scheme and how private IP addresses
are handled and translated for Internet connectivity. This configuration ensures that
Company-A’s internal networks can securely and efficiently interact with external
networks via the ISP.
In summary:
neighbor ... remote-as 65000 sets up the BGP connection between ISP-1 and Company-A.
network 0.0.0.0 advertises a default route, allowing Company-A to reach the Internet via
ISP-1.
BGP (Border Gateway Protocol) is typically used in more complex setups, such as when a network is
multi-homed (connected to more than one ISP) to handle routing policies, path selection, and
redundancy.
ISP-1 (AS 65001) Configuration:
Summary:
Company-A's router (AS 65000) is peering with ISP-1's router (AS 65001) via eBGP.
They establish communication using each other's IP addresses and specify their
respective AS numbers.
Company-A advertises the network 198.133.219.0/24, while ISP-1 advertises a default
route (0.0.0.0), which is typical in setups where an ISP provides internet access to a
company.
Basically, if Company-A’s router doesn’t know where to send traffic (for example, if you’re
trying to access a website on the Internet), it sends everything to the ISP’s router.
In short:
2. Neighbor:
209.165.201.1 is ISP-1’s router (the company that connects Company-A to the Internet).
65001 is ISP-1’s network number (its group).
3. Messages:
66 messages have been received from ISP-1.
66 messages have been sent to ISP-1.
This just means Company-A and ISP-1 are talking to each other and are in sync.
4. Table Version 3:
The BGP routing table has been updated 3 times since the connection started.
Both InQ and OutQ are 0, meaning there are no messages waiting to be processed or sent.
Everything is working smoothly.
6. Up/Down:
The connection between Company-A and ISP-1 has been up for 56 minutes.
7. State/PfxRcd:
The connection is healthy, and Company-A has received 1 route from ISP-1 (likely the default
route to the Internet).
Summary:
Company-A’s router and ISP-1’s router are talking to each other.
They’ve been connected for almost an hour, exchanged 66 messages each, and everything is
working fine with no issues. Company-A learned 1 route from ISP-1, probably to get to the
Internet.