Ccna 2
Ccna 2
Concepts
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
1.1 Router Initial
Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Router Functions
Characteristics of a Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Router Functions
Why Routing?
The router is responsible for the routing of traffic
between networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Router Functions
Routers are Computers
Routers are specialized computers containing the following
required components to operate:
• Central processing unit (CPU)
• Operating system (OS) - Routers use Cisco IOS
• Memory and storage (RAM, ROM, NVRAM, Flash, hard drive)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Router Functions
Routers are Computers (cont.)
Routers use specialized ports and network interface cards to
interconnect to other networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Router Functions
Routers are Computers
Router Memory
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Router Functions
Routers Interconnect Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Router Functions
Routers Choose Best Paths
Routers use static routes and dynamic routing protocols to learn
about remote networks and build their routing tables.
Routers use routing tables to determine the best path to send
packets.
Routers encapsulate the packet and forward it to the interface
indicated in routing table.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Router Functions
Packet Forwarding Methods
Process switching – An
older packet forwarding
mechanism still available for
Cisco routers.
Fast switching – A common
packet forwarding
mechanism which uses a
fast-switching cache to store
next hop information.
Cisco Express Forwarding
(CEF) – The most recent,
fastest, and preferred Cisco
IOS packet-forwarding
mechanism.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Connect Devices
Connect to a Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Connect Devices
Default Gateways
To enable network
access devices, must be
configured with the
following IP address
information:
IP address - Identifies a
unique host on a local
network.
Subnet mask - Identifies
the host’s network subnet.
Default gateway -
Identifies the router a
packet is sent to when the
destination is not on the
same local network
subnet.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Connect Devices
Document Network Addressing
Network documentation should include at least the following in a topology diagram
and addressing table:
Device names
Interfaces
IP addresses and
subnet masks
Default gateways
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Connect Devices
Enable IP on a Host
Statically Assigned IP address – The host is manually assigned an IP
address, subnet mask and default gateway. A DNS server IP address can
also be assigned.
• Used to identify specific network resources such as network servers
and printers.
• Can be used in very small networks with few hosts.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Connect Devices
Enable IP on a Host
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Connect Devices
Enable IP on a Host
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Connect devices
Device LEDs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Console Access
Connect Devices
Console Access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Connect Devices
Enable IP on a Switch
Network infrastructure devices require IP addresses to enable remote
management.
On a switch, the management IP address is assigned on a virtual
interface called a switched virtual interface (SVI)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Router Basic Settings
Configure Router Basic Settings
Name the device – Distinguishes
it from other routers
Secure management access –
Secures privileged EXEC, user
EXEC, and Telnet access, and
encrypts passwords .
Configure a banner – Provides
legal notification of unauthorized
access.
Save the Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Router Basic Settings
Configure an IPv4 Router Interface
To be available, a router interface
must be:
Configured with an address and subnet
mask.
Activated using no shutdown
command. By default LAN and WAN
interfaces are not activated.
Configured with the clock
rate command on the Serial cable end
labeled DCE.
Optional description can be included.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Router Basic Settings
Configure an IPv6 Router Interface
Configure interface with IPv6 address and subnet mask:
Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration
command.
Activate using the no shutdown command.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Router Basic Settings
Configure an IPv6 Router Interface (cont.)
IPv6 interfaces can support more than one address:
Configure a specified global unicast – ipv6address
ipv6-address /ipv6-length
Configure a global IPv6 address with an interface identifier (ID) in the
low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64
Configure a link-local address - ipv6address ipv6-address /ipv6-
length link-local
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Router Basic Settings
Configure an IPv4 Loopback Interface
A loopback interface is a logical interface that is internal to the
router:
It is not assigned to a physical port, it is considered a software interface that is
automatically in an UP state.
A loopback interface is useful for testing.
It is important in the OSPF routing process.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Verify Connectivity of Directly Connected Networks
Verify Interface Settings
Show commands are used to
verify operation and configuration
of interface:
show ip interfaces brief
show ip route
show running-config
Show commands that are used to
gather more detailed interface
information:
show interfaces
show ip interfaces
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Verify Connectivity of Directly Connected Networks
Verify Interface Settings (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Verify Connectivity of Directly Connected Networks
Verify IPv6 Interface Settings
Common commands to verify the IPv6 interface configuration:
show ipv6 interface brief - displays a summary for each of the interfaces.
show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6
addresses for this interface.
show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have
been installed in the IPv6 routing table.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Verify Connectivity of Directly Connected Networks
Filter Show Command Output
Show command output can be managed using the following
command and filters:
Use the terminal length number command to specify the number of lines to be
displayed.
To filter specific output of commands use the (|)pipe character after show command.
Parameters that can be used after pipe include:
• section, include, exclude, begin
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Verify Connectivity of Directly Connected Networks
Command History Feature
The command history feature temporarily stores a list of executed
commands for access:
To recall commands press Ctrl+P or the UP Arrow.
To return to more recent commands press Ctrl+N or the Down Arrow.
By default, command history is enabled and the system captures the last 10 commands
in the buffer. Use the show history privileged EXEC command to display the buffer
contents.
Use the terminal history size user EXEC command to increase or decrease size of
the buffer.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
1.2 Routing Decisions
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Switching Packets Between Networks
Router Switching Function
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Switching Packets Between Networks
Send a Packet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Switching Packets Between Networks
Forward to Next Hop
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Switching Packets Between Networks
Packet Routing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Switching Packets Between Networks
Reach the Destination
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Path Determination
Routing Decisions
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Path Determination
Best Path
Best path is selected by a routing protocol based on the value or
metric it uses to determine the distance to reach a network:
o A metric is the value used to measure the distance to a given network.
o Best path to a network is the path with the lowest metric.
Dynamic routing protocols use their own rules and metrics to build
and update routing tables:
o Routing Information Protocol (RIP) - Hop count
o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to
destination
o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Path Determination
Load Balancing
When a router has two or more paths to a destination with equal cost
metrics, then the router forwards the packets using both paths equally:
o Equal cost load balancing can improve network performance.
o Equal cost load balancing can be configured to use both dynamic routing protocols and
static routes.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Path Determination
Administrative Distance
If multiple paths to a destination are configured on a router, the path
installed in the routing table is the one with the lowest Administrative
Distance (AD):
o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an
AD of 90.
o A directly connected route with an AD of 0 is more reliable than a static route with an AD
of 1.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
1.3 Router Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Analyze the Routing Table
The Routing Table
A routing table is a file stored in RAM that contains information about:
o Directly connected routes
o Remote routes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Analyze the Routing Table
Routing Table Sources
The show ip route command is used to display the contents of the routing
table:
o Local route interfaces - Added to the routing table when an interface is configured.
(displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.)
o Directly connected interfaces - Added to the routing table when an interface is
configured and active.
o Static routes - Added when a route is manually configured and the exit interface is active.
o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and
networks are identified.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Analyze the Routing Table
Routing Table Sources (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Analyze the Routing Table
Remote Network Routing Entries
Interpreting the entries in the routing table
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Directly Connected Routes
Directly Connected Interfaces
A newly deployed router, without any configured interfaces, has an empty
routing table.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Directly Connected Routes
Directly Connected Routing Table Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Directly Connected Routes
Directly Connected Example
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Directly Connected Routes
Directly Connected IPv6 Example
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Statically Learned Routes
Static Routes
Static routes and default static routes can be implemented after
directly connected interfaces are added to the routing table:
o Static routes are manually configured.
o They define an explicit path between two networking devices.
o Static routes must be manually updated if the topology changes.
o Their benefits include improved security and control of resources.
o Configure a static route to a specific network using the ip route network
mask {next-hop-ip | exit-intf} command.
o A default static route is used when the routing table does not contain a
path for a destination network.
o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit-
intf | next-hop-ip} command.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Statically Learned Routes
Static Route Example
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Statically Learned Routes
Static Route Example (cont.)
Entering and Verifying a Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Dynamic Routing Protocols
Dynamic Routing
Dynamic routing is used by
routers to share information
about the reachability and
status of remote networks.
It performs network
discovery and maintains
routing tables.
Routers have converged
after they have finished
exchanging and updating
their routing tables.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Dynamic Routing Protocols
IPv4 Routing Protocols
Cisco routers can support a variety of dynamic IPv4 routing protocols
including:
• EIGRP – Enhanced Interior Gateway Routing Protocol
• OSPF – Open Shortest Path First
• IS-IS – Intermediate System-to-Intermediate System
• RIP – Routing Information Protocol
Use the router ? Command in global configuration mode to determine
which routing protocols are supported by the IOS.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Dynamic Routing Protocols
IPv4 Dynamic Routing Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
IPv6 Routing Protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Dynamic Routing Protocols
IPv6 Dynamic Routing Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Chapter 2: Static Routing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
2.1 Static Routing
Implementation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Static Routing
Reach Remote Networks
A router can learn about
remote networks in one of
two ways:
• Manually - Remote
networks are manually
entered into the route
table using static routes.
• Dynamically - Remote
routes are automatically
learned using a dynamic
routing protocol.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Static Routing
Why Use Static Routing?
Static routing provides some advantages over dynamic routing, including:
Static routes are not advertised over the network, resulting in better
security.
Static routes use less bandwidth than dynamic routing protocols, no
CPU cycles are used to calculate and communicate routes.
The path a static route uses to send data is known.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Static Routing
When to Use Static Routes
Static routing has three primary uses:
Providing ease of routing table maintenance in smaller networks.
Routing to and from stub networks. A stub network is a network
accessed by a single route, and the router has no other neighbors.
Using a single default route to represent a path to any network that does
not have a more specific match with another route in the routing table.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Types of Static Routes
Static Route Applications
Static Routes are often used to:
Connect to a specific network.
Provide a Gateway of Last Resort for a stub network.
Reduce the number of routes advertised by summarizing several
contiguous networks as one static route.
Create a backup route in case a primary route link fails.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Types of Static Routes
Standard Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Types of Static Routes
Default Static Route
A default static route is a route that matches all packets.
A default route identifies the gateway IP address to which the router
sends all IP packets that it does not have a learned or static route.
A default static route is simply a static route with 0.0.0.0/0 as the
destination IPv4 address.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
Types of Static Routes
Summary Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
Types of Static Routes
Floating Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
6.2 Configure Static and
Default Routes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
Configure IPv4 Static Routes
ip route Command
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
Configure IPv4 Static Routes
Next-Hop Options
The next hop can be identified by an IP address, exit interface, or both.
How the destination is specified creates one of the three following route
types:
Next-hop route - Only the next-hop IP address is specified.
Directly connected static route - Only the router exit interface is
specified.
Fully specified static route - The next-hop IP address and exit
interface are specified.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
Configure IPv4 Static Routes
Configure a Next-Hop Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
Configure IPv4 Static Routes
Configure Directly Connected Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
Configure IPv4 Static Routes
Configure a Fully Specified Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
Configure IPv4 Static Routes
Verify a Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
Configure IPv4 Static Routes
Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
Configure IPv4 Static Routes
Configure a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 86
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 91
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 92
Verify a Default Static Route
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 93
6.2 Troubleshoot Static
and Default Route Issues
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 94
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 95
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 96
Verify a Default Static Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 97
Chapter 3: Dynamic Routing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 98
3.1 Dynamic Routing
Protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 99
Dynamic Routing Protocol Overview
Dynamic Routing Protocol Evolution
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 100
Dynamic Routing Protocol Overview
Dynamic Routing Protocols Components
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 101
Dynamic Routing Protocol Overview
Dynamic Routing Protocols Components (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 103
Dynamic verses Static Routing
Static Routing Uses (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 104
Dynamic verses Static Routing
Static Routing Advantages and Disadvantages
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 105
Dynamic verses Static Routing
Dynamic Routing Advantages & Disadvantages
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 106
3.2 RIPv2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 107
Configuring the RIP Protocol
Router RIP Configuration Mode
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 108
Configuring the RIP Protocol
Verify RIP Routing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 109
Configuring the RIP Protocol
Enable and Verify RIPv2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 110
Configuring the RIP Protocol
Disable Auto Summarization
Similarly to RIPv1, RIPv2 automatically summarizes
networks at major network boundaries by default.
To modify the default RIPv2 behavior of automatic
summarization, use the no auto-summary router
configuration mode command.
This command has no effect when using RIPv1.
When automatic summarization has been disabled,
RIPv2 no longer summarizes networks to their classful
address at boundary routers. RIPv2 now includes all
subnets and their appropriate masks in its routing
updates.
The show ip protocols now states that automatic
network summarization is not in effect.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 111
Configuring the RIP Protocol
Configuring Passive Interfaces
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 112
Configuring the RIP Protocol
Propagate a Default Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 113
3.3 The Routing Table
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 114
Parts of an IPv4 Route Entry
Routing Table Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 115
Parts of an IPv4 Route Entry
Routing Table Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 116
Parts of an IPv4 Route Entry
Directly Connected Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 117
Parts of an IPv4 Route Entry
Remote Network Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 118
Dynamically Learned IPv4 Routes
Routing Table Terms
Routes are discussed
in terms of:
Ultimate route
Level 1 route
Level 1 parent route
Level 2 child routes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 119
Dynamically Learned IPv4 Routes
Ultimate Route
An ultimate route
is a routing table
entry that
contains either a
next-hop IP
address or an
exit interface.
Directly
connected,
dynamically
learned, and link
local routes are
ultimate routes.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 120
Dynamically Learned IPv4 Routes
Level 1 Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 121
Dynamically Learned IPv4 Routes
Level 1 Parent Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 122
Dynamically Learned IPv4 Routes
Level 2 Child Route
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 123
The IPv4 Route Lookup Process
Route Lookup Process
1. If the best match is a level 1 ultimate route, then this route is used
to forward the packet.
2. If the best match is a level 1 parent route, proceed to the next
step.
3. The router examines child routes (the subnet routes) of the parent
route for a best match.
4. If there is a match with a level 2 child route, that subnet is used to
forward the packet.
5. If there is not a match with any of the level 2 child routes, proceed
to the next step.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 124
The Ipv4 Route Lookup Process
Route Lookup Process (cont.)
6. The router continues searching level 1 supernet routes in the
routing table for a match, including the default route, if there is
one.
7. If there is now a lesser match with a level 1 supernet or default
routes, the router uses that route to forward the packet.
8. If there is not a match with any route in the routing table, the
router drops the packet.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 125
The IPv4 Route Lookup Process
Best Route = Longest Match
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 126
The IPv4 Route Lookup Process
IPv6 Routing Table Entries
Components of the IPv6 routing table are very similar to the
IPv4 routing table (directly connected interfaces, static routes,
and dynamically learned routes).
IPv6 is classless by design, all routes are effectively level 1
ultimate routes. There is no level 1 parent of level 2 child
routes.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 127
Analyze an IPVv6 Routing Table
Directly Connected Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 128
Analyze an IPVv6 Routing Table
Remote IPv6 Network Entries
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 129
Chapter 4: Switched
Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 130
4.1 LAN Design
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 131
Converged Networks
Growing Complexity of Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 132
Converged Networks
Elements of a Converged Network
To support collaboration, networks
employ converged solutions.
Data services include voice systems, IP
phones, voice gateways, video support,
and video conferencing.
Call control, voice messaging, mobility,
and automated attendant are also
common features.
Multiple types of traffic; only one network
to manage.
Substantial savings over installation and
management of separate voice, video,
and data networks.
Integrates IT management.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 133
Converged Networks
Cisco Borderless Networks
A network architecture
that allows organizations
to connect anyone,
anywhere, anytime, and
on any device securely,
reliably, and seamlessly.
Designed to address IT
and business challenges,
such as supporting the
converged network and
changing work patterns.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 134
Converged Networks
Hierarchy in the Borderless Switched Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 135
Converged Networks
Access, Distribution, and Core Layers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 136
Switched Networks
Role of Switched Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 137
Switched Networks
Form Factors
Fixed
Configuration
Switches
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 138
Switched Networks
Form Factors
Modular
Platform
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 139
Switched Networks
Form Factors
Stackable
Configuration
Switches
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 140
4.2 The Switched Environment
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 141
Frame Forwarding
Switching as a General Concept in Networking and
Telecommunications
A switch makes a decision based on ingress and a destination port.
A LAN switch keeps a table that it uses to determine how to forward
traffic through the switch.
Cisco LAN switches forward Ethernet frames based on the
destination MAC address of the frames.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 142
Frame Forwarding
Dynamically Populating a Switch MAC Address
Table
A switch must first learn which devices exist on each port before it
can transmit a frame.
As a switch learns the relationship of ports to devices, it builds a table
called a MAC address or content addressable memory (CAM) table.
CAM is a special type of memory used in high-speed searching
applications.
The information in the MAC address table is used to send frames.
When a switch receives an incoming frame with a MAC address that
is not found in the CAM table, it floods it to all ports, except the one
that received the frame.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 143
Frame Forwarding
Switch Forwarding Methods
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 144
Frame Forwarding
Store-and-Forward Switching
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 145
Frame Forwarding
Cut-Through Switching
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 146
Switching Domains
Collision Domains
Collision domain - Segment where devices compete to communicate.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 147
Switching Domains
Broadcast Domains
A broadcast domain is the extent of the network where a broadcast
frame can be heard.
Switches forward broadcast frames to all ports; therefore, switches
do not break broadcast domains.
All ports of a switch, with its default configuration, belong to the
same broadcast domain.
If two or more switches are connected, broadcasts are forwarded to
all ports of all switches, except for the port that originally received the
broadcast.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 148
Switching Domains
Alleviating Network Congestion
Switches help alleviate network congestion by:
Facilitating the segmentation of a LAN into separate collision
domains.
Providing full-duplex communication between devices.
Taking advantage of their high-port density.
Buffering large frames.
Employing high-speed ports.
Taking advantage of their fast internal switching process.
Having a low, per-port cost.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 149
Chapter 5: Switch
Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 150
5.1 Basic Switch
Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 151
Configure a Switch with Initial Settings
Switch Boot Sequence
1. Power-on self test (POST).
2. Run boot loader software.
3. Boot loader performs low-level CPU initialization.
4. Boot loader initializes the flash file system.
5. Boot loader locates and loads a default IOS operating system software
image into memory and passes control of the switch over to the IOS.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 152
Configure a Switch with Initial Settings
Switch Boot Sequence (cont.)
To find a suitable Cisco IOS image, the switch goes through the following steps:
Step 1. It attempts to automatically boot by using information in the BOOT environment
variable.
Step 2. If this variable is not set, the switch performs a top-to-bottom search through the flash
file system. It loads and executes the first executable file, if it can.
Step 3. The IOS software then initializes the interfaces using the Cisco IOS commands found in
the configuration file and startup configuration, which is stored in NVRAM.
Note: The boot system command can be used to set the BOOT environment variable. Use the
show boot command to see to what the current IOS boot file is set.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 153
Configure a Switch with Initial Settings
Recovering From a System Crash
The boot loader can also be used to manage the switch if the IOS cannot
be loaded.
The boot loader can be accessed through a console connection by:
1. Connecting a PC by console cable to the switch console port. Unplug
the switch power cord.
2. Reconnecting the power cord to the switch and press and hold
the Mode button.
3. The System LED turns briefly amber and then solid green. Release
the Mode button.
The boot loader switch: prompt appears in the terminal emulation
software on the PC.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 154
Configure a Switch with Initial Settings
Switch LED Indicators
Each port on Cisco Catalyst switches have status LED indicator lights.
By default, these LED lights reflect port activity, but they can also provide other information
about the switch through the Mode button.
The following modes are available on Cisco Catalyst 2960 switches:
• System LED
• Redundant Power System (RPS) LED
• Port Status LED
• Port Duplex LED
• Port Speed LED
• Power over Ethernet (PoE) Mode LED
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 155
Configure a Switch with Initial Settings
Preparing for Basic Switch Management
To remotely manage a Cisco switch, it must be configured to access the
network.
A console cable is used to connect a PC to the console port of a switch for configuration.
The IP information (address, subnet mask, gateway) is to be assigned to a switch virtual
interface (SVI).
If managing the switch from a remote network, a default gateway must also be configured.
Although these IP settings allow remote management and remote access to the switch, they
do not allow the switch to route Layer 3 packets.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 156
Configure a Switch with Initial Settings
Configuring Switch Management Access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 157
Configure a Switch with Initial Settings
Configuring Switch Management Access
(cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 158
Configure a Switch with Initial Settings
Configuring Switch Management Access
(cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 159
Configure Switch Ports
Duplex Communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 160
Configure Switch Ports
Configure Switch Ports at the Physical Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 161
Configure Switch Ports
Auto-MDIX
Certain cable types (straight-through or crossover) were historically required when
connecting devices.
The automatic medium-dependent interface crossover (auto-MDIX) feature eliminates
this problem.
When auto-MDIX is enabled, the interface automatically detects and appropriately
configures the connection.
When using auto-MDIX on an interface, the interface speed and duplex must be set to
auto.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 162
Configure Switch Ports
Auto-MDIX (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 163
Configure Switch Ports
Auto-MDIX (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 164
Configure Switch Ports
Verifying Switch Port Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 165
Configure Switch Ports
Network Access Layer Issue
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 166
Configure Switch Ports
Network Access Layer Issue (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 167
Configure Switch Ports
Troubleshooting Network Access Layer
Issues
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 168
5.2 Switch Security:
Management and
Implementation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 169
Secure Remote Access
SSH Operation
Secure Shell (SSH) is a protocol that provides a secure (encrypted),
command-line based connection to a remote device.
Because of strong encryption features, SSH should replace Telnet for
management connections.
SSH uses TCP port 22, by default.
Telnet uses TCP port 23.
A version of the IOS software, including cryptographic (encrypted)
features and capabilities, is required to enable SSH on Catalyst 2960
switches.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 170
Secure Remote Access
Configuring SSH
2. Configure the IP
domain.
4. Configure user
authentication.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 171
Secure Remote Access
Verifying SSH
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 172
Secure Remote Access
Verifying SSH (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 173
Switch Port Security
Secure Unused Ports
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 174
Switch Port Security
Port Security: Operation
The MAC addresses of legitimate devices are allowed access, while
other MAC addresses are denied.
Any additional attempts to connect by unknown MAC addresses
generate a security violation.
Secure MAC addresses can be configured in a number of ways:
Static secure MAC addresses – manually configured and added
to running configuration - switchport port-security mac-
address mac-address
Dynamic secure MAC addresses – removed when switch restarts
Sticky secure MAC addresses – added to running configuration
and learned dynamically - switchport port-security
mac-address sticky interface configuration mode command
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 175
Switch Port Security
Port Security: Violation Modes
IOS considers a security violation when:
The maximum number of secure MAC addresses for that interface have
been added to the CAM, and a station whose MAC address is not in the
address table attempts to access the interface.
There are three possible actions to take when a violation is detected:
Protect – no notification received
Restrict – notification received of security violation
Shutdown
switchport port-security
violation {protect | restrict |shutdown} interface
configuration mode command
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 176
Switch Port Security
Port Security: Violation Modes (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 177
Switch Port Security
Port Security: Configuring
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 178
Switch Port Security
Port Security: Verifying
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 179
Switch Port Security
Port Security: Verifying (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 180
Switch Port Security
Ports in Error Disabled State
A port security violation can put a switch in error disabled state.
A port in error disabled is effectively shutdown.
The switch communicates these events through console messages.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 181
Switch Port Security
Ports in Error Disabled State (cont.)
A shutdown or no shutdown
interface configuration mode
command must be issued to re-
enable the port.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 182
Chapter 6: VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 183
6.1 VLAN Segmentation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 184
Overview of VLANs
VLAN Definitions
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 185
Overview of VLANs
VLAN Definitions (cont.)
VLANs allow an administrator to segment networks based on factors such
as function, project team, or application, without regard for the physical
location of the user or device.
VLANs enable the implementation of access and security policies
according to specific groupings of users.
A VLAN is a logical partition of a Layer 2 network.
Multiple partitions can be created, allowing for multiple VLANs to co-exist.
Each VLAN is a broadcast domain, usually with its own IP network.
VLANs are mutually isolated, and packets can only pass between them
via a router.
The partitioning of the Layer 2 network takes place inside a Layer 2
device, usually via a switch.
The hosts grouped within a VLAN are unaware of the VLAN’s existence.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 186
Overview of VLANs
Benefits of VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 187
Overview of VLANs
Types of VLANs
Data VLAN – user generated traffic
Default VLAN – all switch ports become part of this VLAN until switch is
configured, show vlan brief
Native VLAN – used for untagged traffic
Management VLAN – used to access management capabilities
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 188
Overview of VLANs
Types of VLANs (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 189
Overview of VLANs
Voice VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 190
Overview of VLANs
Voice VLANs (cont.)
VoIP traffic is time-sensitive and requires:
• Assured bandwidth to ensure voice quality.
• Transmission priority over other types of network traffic.
• Ability to be routed around congested areas on the network.
• Delay of less than 150 ms across the network.
The voice VLAN feature enables access ports to carry IP voice traffic from
an IP phone.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 191
VLANs in a Multi-Switched Environment
VLAN Trunks
The links between switches S1 and S2, and S1 and S3 are configured to
transmit traffic coming from VLANs 10, 20, 30, and 99 across the network.
This network could not function without VLAN trunks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 192
VLANs in a Multi-Switched Environment
VLAN Trunks (cont.)
A VLAN trunk is a point-to-point link that carries more than one VLAN.
A VLAN trunk is usually established between switches so same-VLAN
devices can communicate, even if physically connected to different
switches.
A VLAN trunk is not associated to any VLANs; neither is the trunk ports
used to establish the trunk link.
Cisco IOS supports IEEE802.1q, a popular VLAN trunk protocol.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 193
VLANs in a Multi-Switched Environment
Controlling Broadcast Domains with VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 194
VLANs in a Multi-Switched Environment
Controlling Broadcast Domains with VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 195
VLANs in a Multi-Switched Environment
Controlling Broadcast Domains with VLANs
VLANs can be used to limit the reach of broadcast frames.
A VLAN is a broadcast domain of its own.
A broadcast frame sent by a device in a specific VLAN is forwarded within
that VLAN only.
VLANs help control the reach of broadcast frames and their impact in the
network.
Unicast and multicast frames are forwarded within the originating VLAN.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 196
VLANs in a Multi-Switched Environment
Tagging Ethernet Frames for VLAN
Identification
Frame tagging is the process of adding a VLAN identification header to
the frame.
It is used to properly transmit multiple VLAN frames through a trunk link.
Switches tag frames to identify the VLAN to which they belong.
Different tagging protocols exist; IEEE 802.1Q is a vey popular example.
The protocol defines the structure of the tagging header added to the
frame.
Switches add VLAN tags to the frames before placing them into trunk
links and remove the tags before forwarding frames through non-trunk
ports.
When properly tagged, the frames can transverse any number of switches
via trunk links and still be forwarded within the correct VLAN at the
destination.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 197
VLANs in a Multi-Switched Environment
Tagging Ethernet Frames for VLAN
Identification (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 198
VLANs in a Multi-Switched Environment
Native VLANs and 802.1Q Tagging
Control traffic sent on the native VLAN should not be tagged.
Frames received untagged, remain untagged and are placed in the native
VLAN when forwarded.
If there are no ports associated to the native VLAN and no other trunk
links, an untagged frame is dropped.
When configuring a switch port on a Cisco switch, configure devices so
that they do not send tagged frames on the native VLAN.
In Cisco switches, the native VLAN is VLAN 1, by default.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 199
VLANs in a Multi-Switched Environment
Voice VLAN Tagging
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 200
VLANs in a Multi-Switched Environment
Activity – Predict Switch Behavior
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 201
6.2 VLAN Implementations
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 202
VLAN Assignment
VLAN Ranges on Catalyst Switches
Cisco Catalyst 2960 and 3560 Series switches support over 4,000
VLANs.
VLANs are split into two categories:
• Normal range VLANs
• VLAN numbers from 1 to 1,005
• Configurations stored in the vlan.dat (in the flash memory)
• IDs 1002 through 1005 are reserved for Token Ring and Fiber
Distributed Data Interface (FDDI) VLANs, automatically created
and cannot be removed
• Extended Range VLANs
• VLAN numbers from 1,006 to 4,096
• Configurations stored in the running configuration (NVRAM)
• VLAN Trunking Protocol (VTP) does not learn extended VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 203
VLAN Assignment
VLAN Ranges on Catalyst Switches (cont.)
Normal Range VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 204
VLAN Assignment
Creating a VLAN
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 205
VLAN Assignment
Assigning Ports to VLANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 206
VLAN Assignment
Changing VLAN Port Membership
Remove VLAN Assignment
Interface F0/18 was previously assigned to VLAN 20 which is still active, F0/18
reset to VLAN1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 207
VLAN Assignment
Changing VLAN Port Membership (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 208
VLAN Assignment
Changing VLAN Port Membership (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 209
VLAN Assignment
Deleting VLANs
The entire vlan.dat file can be deleted using the delete flash:vlan.dat
privileged EXEC mode command
Abbreviated command version (delete vlan.dat) can be used if the
vlan.dat file has not been moved from its default location
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 210
VLAN Assignment
Verifying VLAN Information
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 211
VLAN Assignment
Verifying VLAN Information (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 212
VLAN Trunks
Configuring IEEE 802.1q Trunk Links
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 213
VLAN Assignment
Configuring IEEE 802.1q Trunk Links (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 214
VLAN Trunks
Resetting the Trunk to Default State
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 215
VLAN Trunks
Resetting the Trunk to Default State (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 216
VLAN Trunks
Verifying Trunk Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 217
Troubleshoot VLANs and Trunks
IP Addressing Issues with VLANs
It is a common practice to associate a VLAN with an IP network.
Because different IP networks only communicate through a router, all
devices within a VLAN must be part of the same IP network to
communicate.
The figure displays that PC1 cannot communicate to the server because
it has a wrong IP address configured.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 218
Troubleshoot VLANs and Trunks
Missing VLANs
If all the IP address mismatches have been solved, but the device still
cannot connect, check if the VLAN exists in the switch.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 219
Troubleshoot VLANs and Trunks
Missing VLANs (cont.)
If the VLAN to which a port belongs is deleted, the port becomes inactive. All ports
belonging to the VLAN that was deleted are unable to communicate with the rest of the
network.
Not functional until the missing VLAN is created using the vlan vlan_id global
configuration.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 220
Troubleshoot VLANs and Trunks
Introduction to Troubleshooting Trunks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 221
Troubleshoot VLANs and Trunks
Common Problems with Trunks
Trunking issues are usually associated with incorrect configurations.
The most common type of trunk configuration errors are:
Native VLAN mismatches
Trunk mode mismatches
Allowed VLANs on trunks
If a trunk problem is detected, the best practice guidelines
recommend to troubleshoot in the order shown above.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 222
Troubleshoot VLANs and Trunks
Common Problems with Trunks (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 223
Troubleshoot VLANs and Trunks
Incorrect Port Mode
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 224
Troubleshoot VLANs and Trunks
Incorrect VLAN List
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 225
Troubleshoot VLANs and Trunks
Incorrect VLAN List (cont.)
VLANs must be allowed in the trunk before their frames can be
transmitted across the link.
Use the switchport trunk allowed vlan command to specify which
VLANs are allowed in a trunk link.
Use the show interfaces trunk command to ensure the correct
VLANs are permitted in a trunk.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 226
6.3 Inter-VLAN Routing
Using Routers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 227
Inter-VLAN Routing Operation
What is Inter-VLAN Routing?
Layer 2 switches cannot forward traffic between VLANs without the
assistance of a router.
Inter-VLAN routing is a process for forwarding network traffic from one
VLAN to another, using a router.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 228
Inter-VLAN Routing Operation
Legacy Inter-VLAN Routing
In the past:
Actual routers were used to route between VLANs.
Each VLAN was connected to a different physical router interface.
Packets would arrive on the router through one interface, be routed and
leave through another.
Because the router interfaces were connected to VLANs and had IP
addresses from that specific VLAN, routing between VLANs was
achieved.
Large networks with large number of VLANs required many router
interfaces.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 229
Inter-VLAN Routing Operation
Legacy Inter-VLAN Routing (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 231
Inter-VLAN Routing Operation
Router-on-a-Stick Inter-VLAN Routing
(cont.)
Router interface configured to operate as a trunk link and is connected to a trunked switch
port. The router performs inter-VLAN routing by accepting VLAN-tagged traffic on the trunk
interface coming from the adjacent switch, and then, internally routing between the VLANs
using subinterfaces. The router then forwards the routed traffic, VLAN-tagged for the
destination VLAN, out the same physical interface as it used to receive the traffic.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 232
Inter-VLAN Routing Operation
Identify the Types of Inter-VLAN Routing
Activity
Legacy or Router-on-a-Stick?
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 233
Inter-VLAN Routing Operation
Identify the Types of Inter-VLAN Routing
Activity (cont.)
Legacy or Router-on-a-Stick?
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 234
Configure Legacy Inter-VLAN Routing
Configure Legacy Inter-VLAN Routing:
Preparation
Legacy inter-VLAN routing requires routers to have multiple physical interfaces.
Each one of the router’s physical interfaces is connected to a unique VLAN.
Each interface is also configured with an IP address for the subnet associated with the
particular VLAN.
Network devices use the router as a gateway to access the devices connected to the other
VLANs.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 235
Configure Legacy Inter-VLAN Routing
Configure Legacy Inter-VLAN Routing:
Switch Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 236
Configure Legacy Inter-VLAN Routing
Configure Legacy Inter-VLAN Routing:
Router Interface Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 237
Configure Router-on-a-Stick Inter-VLAN Routing
Configure Router-on-a Stick: Preparation
An alternative to legacy inter-VLAN routing is to use VLAN trunking and subinterfaces.
VLAN trunking allows a single physical router interface to route traffic for multiple VLANs.
The physical interface of the router must be connected to a trunk link on the adjacent switch.
On the router, subinterfaces are created for each unique VLAN.
Each subinterface is assigned an IP address specific to its subnet or VLAN and is also
configured to tag frames for that VLAN.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 238
Configure Router-on-a-Stick Inter-VLAN Routing
Configure Router-on-a Stick: Switch
Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 239
Configure Router-on-a-Stick Inter-VLAN Routing
Configure Router-on-a Stick: Router
Subinterface Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 240
Configure Router-on-a-Stick Inter-VLAN Routing
Configure Router-on-a Stick: Verifying
Subinterfaces
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 241
Configure Router-on-a-Stick Inter-VLAN Routing
Configure Router-on-a Stick: Verifying
Subinterfaces (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 242
Configure Router-on-a-Stick Inter-VLAN Routing
Configure Router-on-a Stick: Verifying
Routing
Access to devices on remote VLANs can be tested using
the ping command.
The ping command sends an ICMP echo request to the destination
address.
When a host receives an ICMP echo request, it responds with an ICMP
echo reply.
Tracert is a useful utility for confirming the routed path taken between
two devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 243
Chapter 7: Access Control
Lists
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 244
7.1 ACL Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 245
Purpose of ACLs
What is an ACL?
By default, a router does not have ACLs configured;
therefore, by default a router does not filter traffic.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 246
Purpose of ACLs
Packet Filtering
Packet filtering, sometimes called static packet filtering, controls access
to a network by analyzing the incoming and outgoing packets and
passing or dropping them based on given criteria, such as the source IP
address, destination IP addresses, and the protocol carried within the
packet.
A router acts as a packet filter when it forwards or denies packets
according to filtering rules.
An ACL is a sequential list of permit or deny statements, known as
access control entries (ACEs).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 247
Purpose of ACLs
ACL Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 248
Wildcard Masks in ACLs
Introducing ACL Wildcard Masking
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 249
Wildcard Masks in ACLs
Introducing ACL Wildcard Masking (cont.)
Example
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 250
Wildcard Masks in ACLs
Wildcard Mask Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 251
Wildcard Masks in ACLs
Wildcard Mask Examples (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 252
Wildcard Masks in ACLs
Calculating the Wildcard Mask
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 253
Wildcard Masks in ACLs
Wildcard Mask Keywords
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 254
Wildcard Masks in ACLs
Wildcard Mask Keyword Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 255
Guidelines for ACL Creation
General Guidelines for Creating ACLS
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 256
Guidelines for ACL Creation
ACL Best Practices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 257
Guidelines for ACL Placement
Where to Place ACLs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 258
Guidelines for ACL Placement
Where to Place ACLs (cont.)
Every ACL should be placed where it has the greatest impact on
efficiency. The basic rules are:
Extended ACLs - Locate extended ACLs as close as possible to
the source of the traffic to be filtered.
Standard ACLs - Because standard ACLs do not specify
destination addresses, place them as close to the destination as
possible.
Placement of the ACL, and therefore the type of ACL used, may
also depend on: the extent of the network administrator’s control,
bandwidth of the networks involved, and ease of configuration.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 259
Guidelines for ACL Placement
Standard ACL Placement
The administrator wants to prevent traffic originating in the
192.168.10.0/24 network from reaching the 192.168.30.0/24 network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 260
7.2 Standard IPv4 ACLs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 261
Configure Standard IPv4 ACLs
Numbered Standard IPv4 ACL Syntax
Router(config)# access-list access-list-number
{ deny | permit | remark } source [ source-wildcard ] [ log ]
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 262
Configure Standard IPv4 ACLs
Applying Standard IPv4 ACLs to Interfaces
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 263
Configure Standard IPv4 ACLs
Applying Standard IPv4 ACLs to Interfaces
(cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 264
Configure Standard IPv4 ACLs
Numbered Standard IPv4 ACL Examples
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 265
Configure Standard IPv4 ACLs
Numbered Standard IPv4 ACL Examples
(cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 266
Configure Standard IPv4 ACLs
Named Standard IPv4 ACL Syntax
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 267
Configure Standard IPv4 ACLs
Named Standard IPv4 ACL Syntax (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 268
Modify IPv4 ACLs
Method 1 – Use a Text Editor
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 269
Modify IPv4 ACLs
Method 2 – Use Sequence Numbers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 270
Modify IPv4 ACLs
Editing Standard Named ACLs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 271
Modify IPv4 ACLs
Verifying ACLs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 272
Modify IPv4 ACLs
ACL Statistics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 273
Securing VTY Ports with a Standard IPv4 ACL
The access-class Command
The access-class command configured in line configuration mode
restricts incoming and outgoing connections between a particular VTY
(into a Cisco device) and the addresses in an access list.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 274
Securing VTY Ports with a Standard IPv4 ACL
Verifying the VTY Port is Secured
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 275
7.3 Troubleshoot ACLs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 276
Processing Packet with ACLs
The Implicit Deny Any
At least one permit ACE must be configured in an ACL or all traffic is blocked.
For the network in the figure, applying either ACL 1 or ACL 2 to the S0/0/0 interface of R1 in
the outbound direction will have the same effect.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 277
Processing Packet with ACLs
The Order of ACEs in an ACL
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 278
Processing Packet with ACLs
The Order of ACEs in an ACL (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 279
Processing Packet with ACLs
Cisco IOS Reorders Standard ACLs
Notice that the statements are listed in a different order than they were entered.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 280
Processing Packet with ACLs
Cisco IOS Reorders Standard ACLs (cont.)
The order in which the standard ACEs are listed is the sequence used by the IOS to
process the list.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 281
Processing Packet with ACLs
Routing Processes and ACLs
As a frame enters an interface, the router checks to see whether the destination Layer 2
address matches its interface Layer 2 address, or whether the frame is a broadcast frame.
If the frame address is accepted, the frame information is stripped off and the router
checks for an ACL on the inbound interface.
If an ACL exists, the packet is tested against the statements in the list.
If the packet matches a statement, the packet is either permitted or denied.
If the packet is accepted, it is then checked against routing table entries to determine the
destination interface.
If a routing table entry exists for the destination, the packet is then switched to the
outgoing interface, otherwise the packet is dropped.
Next, the router checks whether the outgoing interface has an ACL. If an ACL exists, the
packet is tested against the statements in the list. If the packet matches a statement, it is
either permitted or denied.
If there is no ACL or the packet is permitted, the packet is encapsulated in the new Layer 2
protocol and forwarded out the interface to the next device.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 282
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 283
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 1 (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 284
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 2
Security Policy: The 192.168.11.0/24 network should not be able to
access the 192.168.10.0/24 network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 285
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 2 (cont.)
ACL 20 was applied to the wrong interface and in the wrong direction. All
traffic from the 192.168.11.0/24 is denied inbound access through the
G0/1 interface.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 286
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 2 (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 287
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 3
Problem
Security Policy:
Only PC1 is
allowed SSH
remote access to
R1.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 288
Common Standard IPv4 ACL Errors
Troubleshooting Standard IPv4 ACLs –
Example 3 (cont.)
Solution!
Security Policy:
Only PC1 is
allowed SSH
remote access to
R1.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 289
Chapter 8: DHCP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 290
8.1 DHCPv4
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 291
DHCPv4 Operation
Introducing DHCPv4
DHCPv4:
assigns IPv4 addresses and other network configuration information dynamically
useful and timesaving tool for network administrators
dynamically assigns, or leases, an IPv4 address from a pool of addresses
A Cisco router can be configured to provide DHCPv4 services.
Administrators configure DHCPv4 servers so that leases expire. Then
the client must ask for another address, although the client is typically
reassigned the same address.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 292
DHCPv4 Operation
DHCPv4 Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 293
DHCPv4 Operation
DHCPv4 Operation (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 294
DHCPv4 Operation
DHCPv4 Message Format
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 295
DHCPv4 Operation
DHCPv4 Discover and Offer Messages
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 296
DHCPv4 Operation
DHCPv4 Discover and Offer Messages
(cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 297
Configure DHCPv4 Server
Configure a Basic DHCPv4 Server
A Cisco router running the Cisco IOS software can be configured to act
as a DHCPv4 server. To set up DHCP:
1. Exclude addresses from the pool.
2. Set up the DHCP pool name.
3. Define the range of addresses and subnet mask. Use the
default-router command for the default gateway. Optional
parameters that can be included in the pool – dns server,
domain-name.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 298
Configure DHCPv4 Server
Verifying DHCPv4
Commands to verify DHCP:
show running-config | section dhcp
show ip dhcp binding
show ip dhcp server statistics
On the PC, issue the ipconfig /all command.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 299
Configure DHCPv4 Server
DHCPv4 Relay
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 300
Configure DHCPv4 Server
DHCPv4 Relay (cont.)
Using an IP helper address enables a router to forward DHCPv4
broadcasts to the DHCPv4 server. Acting as a relay.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 301
Configure DHCPv4 Client
Configuring a Router as a DHCPv4 client
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 302
Configure DHCPv4 Client
Configuring a Wireless Router as a DHCPv4
Client
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 303
Troubleshooting DHCPv4
Troubleshooting Tasks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 304
Troubleshooting DHCPv4
Verify Router DHCPv4 Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 305
Troubleshooting DHCPv4
Debugging DHCPv4
The figure shows an extended ACL permitting only packets with UDP destination ports of
67 or 68. These are the typical ports used by DHCPv4 clients and servers when sending
DHCPv4 messages. The extended ACL is used with the debug ip packet command to
display only DHCPv4 messages.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 306
8.2 DHCPv6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 307
SLAAC and DHCPv6
Stateless Address Autoconfiguration
(SLAAC)
SLAAC uses ICMPv6 Router Solicitation and Router Advertisement
messages to provide addressing and other configuration information that
would normally be provided by a DHCP server:
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 308
SLAAC and DHCPv6
SLAAC Operation
A router must have IPv6 routing enabled before it can send RA
messages: Router(config)# ipv6 unicast-routing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 309
SLAAC and DHCPv6
SLAAC and DHCPv6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 310
SLAAC and DHCPv6
SLAAC Option
SLAAC is the default option on Cisco routers. Both the M flag and
the O flag are set to 0 in the RA, as shown in the figure.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 311
SLAAC and DHCPv6
Stateless DHCPv6 Option
To modify the RA message sent on the interface of a router to indicate
stateless DHCPv6, use the following command: Router(config-
if)# ipv6 nd other-config-flag
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 312
SLAAC and DHCPv6
Stateful DHCPv6 Option
This option is the most similar to DHCPv4. In this case, the RA message informs the client
not to use the information in the RA message. All addressing information and configuration
information must be obtained from a stateful DHCPv6 server. Router(config-if)# ipv6 nd
managed-config-flag
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 313
SLAAC and DHCPv6
DHCPv6 Operations
If stateless or stateful
DHCPv6 is indicated in
the RA message, then
the device begins
DHCPv6 client/server
communications.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 314
Stateless DHCPv6
Configuring a Router as a Stateless DHCPv6
Server
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 315
Stateless DHCPv6
Configuring a Router as a Stateless DHCPv6
Client
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 316
Stateless DHCPv6
Verifying Stateless DHCPv6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 317
Stateful DHCPv6 Server
Configuring a Router as a Stateful DHCPv6
Server
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 318
Stateful DHCPv6 Server
Configuring a Router as a Stateful DHCPv6
Server (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 319
Stateful DHCPv6 Server
Configuring a Router as a Stateful DHCPv6
Client
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 320
Stateful DHCPv6 Server
Verifying Stateful DHCPv6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 321
Stateful DHCPv6 Server
Verifying Stateful DHCPv6 (cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 322
Stateful DHCPv6
Configuring a Router as a DHCPv6 Relay
Agent
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 323
Troubleshooting DHCPv6
Troubleshooting Tasks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 324
Troubleshooting DHCPv6
Verify Router DHCPv6 Configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 325
Troubleshooting DHCPv6
Debugging DHCPv6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 326
Chapter 9: NAT for IPv4
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 327
9.1 NAT Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 328
NAT Operation
NAT Characteristics
IPv4 Private Address Space
• 10.0.0.0 /8, 172.16.0.0 /12, and 192.168.0.0 /16
What is NAT?
• Process to translate network IPv4 address
• Conserve public IPv4 addresses
• Configured at the border router for translation
NAT Terminology
• Inside address
• Inside local address
• Inside global address
• Outside address
• Outside local address
• Outside global address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 329
NAT Operation
Types of NAT
Static NAT
• One-to-one mapping of local and global
addresses
• Configured by the network administrator and
remain constant.
Dynamic NAT
• Uses a pool of public addresses and assigns
them on a first-come, first-served basis
• Requires that enough public addresses for the
total number of simultaneous user sessions
Port Address Translation (PAT)
• Maps multiple private IPv4 addresses to a single
public IPv4 address or a few addresses
• Also known as NAT overload
• Validates that the incoming packets were
requested
• Uses port numbers to forward the response
packets to the correct internal device
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 330
NAT Operation
NAT Advantages
Advantages of NAT
• Conserves the legally registered addressing scheme
• Increases the flexibility of connections to the public network
• Provides consistency for internal network addressing schemes
• Provides network security
Disadvantages of NAT
• Performance is degraded
• End-to-end functionality is degraded
• End-to-end IP traceability is lost
• Tunneling is more complicated
• Initiating TCP connections can be disrupted
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 331
9.2 Configuring NAT
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 332
Configuring NAT
Configuring Static NAT
Configuring Static NAT
• Create the mapping between the inside local and outside local
addresses
ip nat inside source static local-ip global-ip
• Define which interfaces belong to the inside network and which belong
to the outside network
ip nat inside
ip nat outside
Analyzing Static NAT
Verifying Static NAT
show ip nat translations
show ip nat statistics
clear ip nat statistics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 333
Configuring NAT
Configuring Dynamic NAT
Dynamic NAT Operation
• The pool of public IPv4 addresses (inside global address pool) is
available to any device on the inside network on a first-come, first-
served basis.
• With dynamic NAT, a single inside address is translated to a single
outside address.
• The pool must be large enough to accommodate all inside devices.
• A device is unable to communicate to any external networks if no
addresses are available in the pool.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 334
Configuring NAT
Configuring Dynamic NAT (Cont.)
Configuring Dynamic NAT
• Create the mapping between the inside local and outside local
addresses
ip nat pool name start-ip end-ip {netmask netmask
| prefix-length prefix-length}
• Create a standard ACL to permit those addresses to be translated
access-list access-list-number permit source
[source-wildcard]
• Bind the ACL to the pool
ip nat inside source list access-list-number pool
name
• Identify the inside and outside interfaces
ip nat inside
ip nat outside
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 335
Configuring NAT
Configuring Dynamic NAT (Cont.)
Analyzing Dynamic NAT
Verifying Dynamic NAT
show ip nat translations
show ip nat translations verbose
clear ip nat statistics
clear ip nat translations *
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 336
Configuring NAT
Configuring Port Address Translations (PAT)
Configuring PAT: Address Pool
• Create the mapping between the inside local and outside local addresses
ip nat pool name start-ip end-ip {netmask netmask |
prefix-length prefix-length}
• Create a standard ACL to permit those addresses to be translated
access-list access-list-number permit source [source-
wildcard]
• Bind the ACL to the pool
ip nat inside source list access-list-number pool name
• Identify the inside and outside interfaces
ip nat inside
ip nat outside
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 337
Configuring NAT
Configuring Port Address Translations (PAT) (Cont.)
Configuring PAT: Single Address
• Define a standard ACL to permit those addresses to be translated
access-list access-list-number permit source [source-
wildcard]
• Establish dynamic source translation, specify the ACL, exit interface, and
overload option
ip nat inside source list access-list-number
interface type name overload
• Identify the inside and outside interfaces
ip nat inside
ip nat outside
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 338
Configuring NAT
Configuring Port Address Translations (PAT) (Cont.)
Analyzing PAT
Verifying PAT
show ip nat translations
show ip nat statistics
slear ip nat statistics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 339
Configuring NAT
Port Forwarding
Port Forwarding
• Port forwarding is the act of forwarding a network port from one network node to
another.
• A packet sent to the public IP address and port of a router can be forwarded to a private
IP address and port in inside network.
• Port forwarding is helpful in situations where servers have private addresses, not
reachable from the outside networks.
Wireless Router Example
Configuring Port Forwarding with IOS
ip nat inside source [static {tcp | udp local-ip local-port
global-ip global-port} [extendable]
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 340
Configuring NAT
Configuring NAT and IPv6
NAT for IPv6?
• IPv6 with a 128-bit address provides 340 undecillion addresses.
• Address space is not an issue for IPv6.
• IPv6 makes IPv4 public-private NAT unnecessary by design; however, IPv6 does implement
a form of private addresses, and it is implemented differently than they are for IPv4.
IPv6 Unique Local Address
• IPv6 unique local addresses (ULAs) are designed to allow IPv6 communications within a
local site.
• ULAs are not meant to provide additional IPv6 address space.
• ULAs have the prefix FC00::/7, which results in a first hextet range of FC00 to FDFF.
• ULAs are also known as local IPv6 addresses (not to be confused with IPv6 link-local
addresses).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 341
Configuring NAT
Configuring NAT and IPv6 (Cont.)
NAT for IPv6
• IPv6 also uses NAT, but in a much different context.
• In IPv6, NAT is used to provide transparent communication between IPv6 and IPv4.
• NAT64 is not intended to be a permanent solution; it is meant to be a transition
mechanism.
• Network Address Translation-Protocol Translation (NAT-PT) was another NAT-
based transition mechanism for IPv6, but is now deprecated by IETF.
• NAT64 is now recommended.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 342
9.3 Troubleshooting NAT
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 343
Troubleshooting NAT
Troubleshooting NAT Configurations
Troubleshooting NAT: show commands
clear ip nat statistics
clear ip nat translations *
show ip nat statistics
Show ip nat translations
Troubleshooting NAT: debug commands
debug ip nat
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 344
Chapter 10: Device
Discovery, Management,
and Maintenance
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 345
10.1 Device Discovery
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 346
Device Discovery
Device Discovery with CDP
CDP Overview
• Cisco Discovery Protocol
• Neighbor discovery of physically connected Cisco devices
Configure and Verify CDP
• show cdp neighbors
• show cdp interface
• cdp run
• cdp enable
Discover Devices Using CDP
• Device identifiers - The host name of the neighbor device
• Port identifier - The name of the local and remote port
• Capabilities list - Whether the device is a router or a switch
• Platform - The hardware platform of the device
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 347
Device Discovery
Device Discovery with LLDP
LLDP Overview
• A vendor neutral layer 2 neighbor discovery protocol, similar to CDP
Configure and Verify LLDP
• show lldp
• lldp run
• lldp transmit
• lldp receive
Discover Devices Using LLDP
• show lldp neighbors
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 348
10.2 Device Management
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 349
Device Management
Implement NTP
Setting the System Clock
• Manually configure the date and time
• Configure Network Time Protocol (NTP)
NTP Operation
• Hierarchical system of time sources
• Stratum 0 – Authoritative time source
• Stratum number indicates how far the server
is from the time source
Configure and Verify NTP
• ntp server ip-address
• show ntp associations
• show ntp status
• show clock
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 350
Device Management
Syslog Operation
Introduction to Syslog
• Allows devices to send their messages to syslog server
• Supported by most networking devices
• Primary functions:
log information
select the type
specify the destinations
Syslog Message Format
• Severity level from 0 – 7
• Facility – service identifiers
Service Timestamp
• Enhances real-time debugging and management
• service timestamps log datetime
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 351
Device Management
Syslog Configuration
Syslog Server
• Parses the output and places the messages into pre-defined columns
• Timestamps are displayed if configured on networking devices that generated the
log messages
• Allows the network administrators to navigate the large amount of data compiled on
a syslog server.
Default Logging
• Send log messages of all severity level to the console
• show logging
Router and Switch Commands for Syslog Clients
• logging ip-address
• logging trap level
• logging source-interface source-interface interface-number
Verifying Syslog
• show logging
• Use the pipe (|) to limit the amount of displayed
Presentation_ID
log messages
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 352
10.3 Device Maintenance
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 353
Device Maintenance
Router and Switch File Maintenance
Router and Switch File Systems
• show file systems – lists all available file system
• dir – lists the content of the file system
• pwd - verify the present working directory
• cd – changes the current directory
Backing up and Restoring using Text Files
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 354
Device Maintenance
Router and Switch File Maintenance (Cont.)
Backing up and Restoring using TFTP
• copy running-config tftp
• copy startup-config tftp
Using USB Ports for Backing Up and Restoring
• show file systems
• dir usbflash0:
• copy run usbflash0:/
Password Recovery
• Enter ROMMON mode
• Change configuration register to 0x2142
• Make changes to the original startup config
• Save the new configuration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 355
Device Maintenance
IOS System Files
IOS 15 System Image Packaging
• universalk9 images
• universalk9_npe images
• Technology packages: IP Base, Data, UC, SEC
• Data, UC, and SEC technology packages are activated through licensing
IOS Image Filenames
• Feature sets and version
• show flash
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 356
Device Maintenance
IOS Image Management
TFTP Servers as a Backup Location
• Backup location for IOS images and configuration files
Steps to Backup IOS Image to TFTP Server
• Verify access to TFTP server
• Verify sufficient disk space
• Copy the image to the TFTP server
copy source-url tftp:
Steps to Copy an IOS Image to a Device
• Download IOS image from Cisco.com and transfer it to TFTP server
• Verify access to TFTP server from device
• Verify sufficient disk space on device
• Copy the image from the TFTP server
copy tftp: destination-url
The boot system Command
• Command to load the new image during bootup
• boot system file-url
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 357
Device Maintenance
Software Licensing
Licensing Process
• Purchase the software package or feature
to install
• Obtain a license
Cisco License Manger
Cisco License Portal
Requires PAK number and UDI
show license udi
• Install the license
license install stored-
location-url
reload
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 358
Device Maintenance
License Verification and Management
License verification
• show version
• show license
Activate an evaluation right-to-use license
• license accept end user agreement
• license boot module module-name technology-package package-name
Back up the license
• license save file-sys://lic-location
Uninstall the license
• Disable the license
license boot module module-name technology-package package-name
disable
• Clear the license
license clear feature-name
no license boot module module-name technology-package package-
name disable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 359
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 360