Ccna Notes
Ccna Notes
Ccna Notes
Introduction
Cisco offers two options for obtaining the CCNA certification:
While you can use these notes to prepare for either exam, the notes are geared towards passing the
single exam. I recommend you study all of the material and take the single exam option rather than
taking two exams.
Cisco Device Icons
Icon
The following table lists the specific icons Cisco uses to represent network devices and
connections.
Represents
Hub
Bridge
Switch
Router
Access point
Network cloud
Ethernet connection
Serial Line
connection
Wireless connection
Virtual Circuit
103. Use the OSI and TCP/IP models and their associated protocols to explain how data
flows in a network
105. Describe the purpose and basic operation of the protocols in the OSI and TCP models
110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered
model approach
However, you must remember the following limitations of the OSI model.
OSI layers are theoretical and do not actually perform real functions.
Industry implementations rarely have a layer-to-layer correspondence with the OSI layers.
Different protocols within the stack perform different functions that help send or receive the
overall message.
A particular protocol implementation may not represent every OSI layer (or may spread
across multiple layers).
To help remember the layer names of the OSI model, try the following mnemonic devices:
Layer
Name
Mnemonic
Mnemonic
(Bottom to top) (Top to bottom)
All
Layer 5 Session
Seem
Sausage
People
Layer 4 Transport
Layer 3 Network
Throw
To
Not
Need
Do
Data
Please
Processing
Have some fun and come up with your own mnemonic for the OSI model, but stick to just one so
you don't get confused.
Lower OSI Layer Facts
The following table summarizes basic characteristics of the lower OSI model layers.
Layer
Description
Physical
The Physical layer of the OSI model sets standards for sending and receiving
electrical signals between devices. It describes how digital data (bits) are
converted to electric pulses, radio waves, or pulses of lights.
Devices that operate at the physical layer send and receive a stream of bits.
The Media Access Control (MAC) layer defines specifications for controlling
access to the media. The MAC sublayer is responsible for:
Media
Access
Control
(MAC)
The Logical Link Control (LLC) layer provides an interface between the MAC
layer and upper-layer protocols. LLC protocols are defined by the IEEE 802.2
committee. The LLC sublayer is responsible for:
Data
Link
Logical
Link
Control
(LLC)
The Network layer describes how data is routed across networks and on to the
destination. Network layer functions include:
Network
Determining the next network point to which data should be sent. Routers
use a routing protocol to take into account various factors such as the
number of hops in the path, link speed, and link reliability to select the
optimal path for data.
Packets forwarded from the Transport to the Network layer become datagrams
and network-specific (routing) information is added. Network layer protocols
then ensure that the data arrives at the intended destinations.
The Transport layer provides a transition between the upper and lower layers of
the OSI model, making the upper and lower layers transparent from each other.
Upper layers format and process data without regard for delivery
Lower layers prepare the data for delivery by fragmenting and attaching
transport required information
Transport
Port (or socket) numbers are used to identify distinct applications running
on the same system. This allows each host to provide multiple services.
The Transport layer receives large packets of information from higher
layers and breaks them into smaller packets called segments.
Segmentation is necessary to enable the data to meet network size and
format restrictions.
The receiving Transport layer uses packet sequence numbers to
reassemble segments into the original message.
Connection-oriented protocols perform error detection and correction and
identify lost packets for retransmission. A connection-oriented protocol is
a good choice where:
o Reliable, error-free communications are more important than
speed
o Larger chunks of data are being sent
Connectionless services assume an existing link between devices and
allow transmission without extensive session establishment.
Connectionless communications use no error checking, session
establishment, or acknowledgements. Connectionless protocols allow
quick, efficient communication at the risk of data errors and packet loss.
Connectionless protocols are a good choice where:
o Speed is important
o Smaller chunks of data are being sent
Description
The Application layer integrates network functionality into the host operating system,
and enables network services. The Application layer does not include specific
applications that provide services, but rather provides the capability for services to
operate on the network. These services include:
Application
The Application layer specifies many important network services that are used on the
Internet. These include:
HTTP
Telnet
FTP
TFTP
SNMP
Note: Most Application layer protocols operate at multiple layers down to the Session
and even Transport layers. However, they are classified as Application layer protocols
because they start at the Application layer (the Application layer is the highest layer
where they operate).
The Presentation layer formats or "presents" data into a compatible form for receipt by
the Application layer or the destination system. Specifically, the Presentation layer
ensures:
Presentation
The Presentation layer formats data for the Application layer. Therefore, it also sets
standards for multimedia and other file formats. These include standard file formats
such as:
The Session layer's primary function is managing the sessions in which data is
transferred. Functions at this layer may include:
Session
The Session layer protocols and interfaces coordinate requests and responses between
different hosts using the same application. These protocols and interfaces include:
Applicatio
n
Presentati
on
Protocols
HTTP
Telnet
FTP
TFTP
SNMP
JPEG,
BMP,
TIFF,
PICT
MPEG,
WMV,
AVI
ASCII,
EBCDIC
MIDI,
WAV
Session
Transport
Network
SQL
NFS
ASP
RPC
X
window
TCP
(connecti
onoriented)
UDP
(connecti
onless)
IP
IPX
AppleTal
k
DECNET
Devices
Encapsulat
ion
User
information
and data
Data
Data
Segments
Routers
Layer 3
switches
Packets
Logic
al
Link
Contr
ol
(LLC
)
Dat
a
Lin Medi
k a
Acce
ss
Contr
ol
(MA
C)
LAN
protocols
: 802.2
(LLC),
802.3
(Ethernet
), 802.5
(Token
Ring),
802.11
(Wireless
)
WAN
protocols
: HDLC,
PPP,
Frame
Relay,
ISDN,
ATM
Physical
EIA/TIA
232
(serial
signaling
)
V.35
(modem
signaling
)
Cat5
RJ45
Network
Interface
Card (NIC)
transceivers Frames
Switch
Bridge
Transmissi
on
media (cabl
e and
wires)
Media
connectors
Transceiver
s (including
transceivers
built into
NICs)
Bits
Modems
Repeaters
Hubs
Multiplexer
s
CSUs/DSU
s
Wireless
Access
Points
TCP/IP
As you study this section, answer the following questions:
103. Use the OSI and TCP/IP models and their associated protocols to explain how data
flows in a network
104. Describe common networked applications including web applications
105. Describe the purpose and basic operation of the protocols in the OSI and TCP models
106. Describe the impact of applications (Voice Over IP and Video Over IP) on a network
301. Describe the operation and benefits of using private and public IP addressing
The Application layer (also called the Process layer) corresponds to the Session,
Presentation, and Application layers of the OSI model.
The Host-to-host layer is comparable to the Transport layer of the OSI model and is
responsible for error checking and reliable packet delivery. Here, the data stream is broken
into segments that must be assigned sequence numbers so that the segments can be
reassembled correctly on the remote side after they are transported.
The Internet layer is comparable to the Network layer of the OSI model. It is responsible for
moving packets through a network. This involves addressing of hosts and making routing
decisions to identify how the packet transverses the network.
The Network Access layer corresponds to the functions of the Physical and Data Link layers
of the OSI model. It is responsible for describing the physical layout of the network and
how messages are formatted on the transmission medium. Sometimes this layer is divided
into the Network Access and the Physical layer.
Note: The TCP/IP model focuses specifically on the functions in the Internet layer and the Host-toHost layer. All other functions of the traditional OSI model are encompassed in the first and fourth
layers.
The following table lists several protocols in the TCP/IP protocol suite.
Protocol
Description
File Transfer
File Transfer Protocol (FTP) provides a
Protocol (FTP) generic method of transferring files. It
OSI Model
DoD Model Layer
Layer(s)
Application,
Application/Process
Presentation,
Hypertext
Transfer
Protocol
(HTTP)
Simple Mail
Transfer
Protocol
(SMTP)
Simple
Network
Management
Protocol
(SNMP)
Telnet
Network File
System (NFS)
Application,
Presentation, Application/Process
Session
Transport
Host-to-Host (Transport)
Host-to-Host (Transport)
Domain Name
System (DNS)
Host-to-Host (Transport)
Internet
Protocol (IP)
Internet
Internet
Internet Group
Membership
Protocol
(IGMP)
Network
Internet
Internet
Reverse
Address
Resolution
Protocol
(RARP)
Internet
Bootstrap
Protocol
(BOOTP)
Internet
Dynamic Host
Configuration
Protocol
(DHCP)
Network
Internet
Open Shortest
Path First
(OSPF)
Network
Internet
Routing
Information
Protocol (RIP)
Internet
The TCP/IP protocol suite was developed to work independently of the Physical layer
implementation. You can use a wide variety of architectures with the TCP/IP protocol suite.
IP Address and Class Facts
IP addresses allow hosts to participate on IP based networks. An IP address:
Is a 32-bit binary number represented as four octets (four 8-bit values). Each octet is
separated by a period.
IP addresses can be represented in one of two ways:
o Decimal (for example 131.107.2.200). In decimal notation, each octet must be
between 0 and 255.
o Binary (for example 10000011.01101011.00000010.11001000). In binary notation,
each octet is an 8-digit number.
The IP address includes both the network and the host address.
Each IP address has an implied address class that can be used to infer the network portion of
the address.
The subnet mask is a 32-bit number that is associated with each IP address that identifies
the network portion of the address. In binary form, the subnet mask is always a series of 1's
followed by a series of 0's (1's and 0's are never mixed in sequence in the mask). A simple
mask might be 255.255.255.0.
IP addresses have a default class. The address class identifies the range of IP addresses and a
default subnet mask used for the range. The following table shows the default address class for
each IP address range.
1.0.0.0 to 126.255.255.255
128.0.0.0 to 191.255.255.255
128-191
(10000000--10111111 binary)
255.255.0.0
192.0.0.0 to 223.255.255.255
192-223
(11000000--11011111 binary)
255.255.255.0
224.0.0.0 to 239.255.255.255
224-239
(11100000--11101111 binary)
n/a
240.0.0.0 to 255.255.255.255
240-255
(11110000--11111111 binary)
n/a
When using the default subnet mask for an IP address, you have the following number of subnet
addresses and hosts per subnet:
There are only 126 Class A network IDs (most of these addresses are already assigned).
Each class A address gives you 16,777,214 hosts per network.
There are 16,384 Class B network IDs. Each class B address gives you 65,534 hosts per
network.
There are 2,097,152 Class C network IDs. Each class C address gives you 254 hosts per
network.
Class D addresses are used for multicast groups rather than network and host IDs.
Class E addresses are reserved for experimental use.
Consideration
The first octet(s) in an address range is used to identify the network itself. For the
network address, the host portion of the address contains all 0's. For example:
Network
0.0.0.0 is the network address used by routers to specify the "default" route. Using a
generic value reduces the number of routing table entries. Some older routers use this
address as a broadcast address.
The range of IP addresses available to be assigned to network hosts is identified by the
subnet mask and/or the address class. For example:
Host
For the class A network address 115.0.0.0, the host range is 115.0.0.1 to
115.255.255.254.
For the class B network address 154.90.0.0, the host range is 154.90.0.1 to
154.90.255.254.
For the class C network address 221.65.244.0, the host range is 221.65.244.1 to
221.65.244.254.
Note: A special way to identify a host on a network is by setting the network portion of
the address to all 0's. For example, the address 0.0.64.128 means "host 64.128 on this
network."
Broadcast The last address in the range is used as the broadcast address and is used to send
messages to all hosts on the network. In binary form, the broadcast address has all 1's in
the host portion of the address. For example, assuming the default subnet masks are
used:
Two other formats you might see for the broadcast address:
Local
host
The broadcast address might also be designated by setting each of the network
address bits to 0. For example, 0.0.255.255 is the broadcast address of a Class B
address. This designation means "the broadcast address for this network."
255.255.255.255 indicates a broadcast message intended for all hosts on this
network.
Addresses in the 127.0.0.0 range are reserved for the local host (in other words "this"
host or the host you're currently working at). The most commonly-used address is
127.0.0.1 which is the loopback address.
The following address ranges have been reserved for private use:
Private
use
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Use addresses in these ranges for your private networks. Routers connected to the
Internet typically filter messages within these ranges and prevent them from being
propagated to the Internet.
Device Communication
As you study this section, answer the following questions:
Which OSI model layer uses service data units called frames?
When moving from top to bottom through the OSI model layers, which comes first, packets
or segments?
What gets added to the service data unit at the Network layer? At the Data Link layer?
103. Use the OSI and TCP/IP models and their associated protocols to explain how data
flows in a network
Upper layers--data
Transport layer--segments
Network layer--packets containing logical addresses
Data Link layer--framing that adds physical addresses
Physical layer--bits
Ethernet
As you study this section, answer the following questions:
What is the purpose of the jam signal and the back off in Ethernet communications?
What is the maximum cable length allowed for 100BaseTX?
What is the physical device address used on Ethernet networks?
Two devices are using full-duplex communications with the 1000BaseT standards. What is
the amount of bandwidth available?
Under what conditions can you disable collision detection on an Ethernet network?
109. Describe the components required for network and Internet communications
201. Select the appropriate media, cables, ports, and connectors to connect switches to other
network devices and hosts
202. Explain the technology and media access control method for Ethernet networks
403. Select the appropriate media, cables, ports, and connectors to connect routers to other
network devices and hosts
Topology
The physical topology is the mapping of the nodes of a network and the physical
connections between them, such as the layout of wiring, cables, the locations of
nodes, and the interconnections between the nodes and the cabling or wiring
system. The logical topology is the way messages are sent through the network
connections. Ethernet supports the following topologies:
Physical bus, logical bus
Physical star, logical bus
Physical star, logical star
Ethernet uses Carrier Sense, Multiple Access/Collision Detection (CSMA/CD) to
control access to the transmission medium. Devices use the following process to
send data:
Media access
1. Because all devices have equal access to the transmission media (multiple
access), a device with data to send first listens to the transmission medium to
determine if it is free (carrier sense).
2. If it is not free, the device waits a random time and listens again to the
transmission medium. When it is free, the device transmits its message.
3. If two devices transmit at the same time, a collision occurs. The sending
devices detect the collision (collision detection) and send a jam signal.
4. Both devices wait a random length of time before attempting to resend the
original message (called a backoff).
Ethernet supports the following cable types:
Transmission
media
The Ethernet frame size is 64 to 1518 bytes (this is the same for all Ethernet
standards). Four frame types are supported:
Frame type
The MAC address (also called the burned-in address) is the Data Link layer
physical device address.
Physical
address
Note: Some network cards allow you to change (logically assigned address) the
MAC address through jumpers, switches, or software. However, there is little
practical reason for doing so.
Ethernet Standards
The following table compares the characteristics of various Ethernet implementations.
Category
Standard
Bandwidth
Cable Type
Maximum Segment
Length
10Base5
10 Mbps
Coaxial
(thicknet)
500 meters
10Base2
10 Mbps
10BaseT
10 Mbps (half
duplex)
20 Mbps (full
duplex)
Twisted pair
(Cat3, 4, or 5)
Ethernet
100 meters
Fast
Ethernet
Gigabit
Ethernet
100BaseTX
Twisted pair
(Cat5)
100 meters
100BaseT4
Twisted pair
(Cat5)
100 meters
100BaseFX
Fiber optic
1000BaseSX
(short)
1000BaseT
100 meters
Fast Ethernet was designed to be as compatible with 10BaseT Ethernet as possible. This provides
an easy migration path from 10BaseT to 100BaseT/100BaseT4 (and even to Gigabit Ethernet).
Most new networking devices that are Fast or Gigabit Ethernet capable also support
10BaseT standards. Devices autosense the specifics of the network configuration and set
themselves to use the fastest communication method possible.
If your network uses 10BaseT and has Cat5 cable, you can slowly migrate from 10BaseT to
FastEthernet (remember that FastEthernet uses Cat5 cable). As you replace components
such as NICs and hubs with FastEthernet devices, portions of the network will begin
operating at FastEthernet speeds.
You can begin your upgrade with:
o Critical components, such as hubs, switches, and server NICs
o Segments that service mission-critical applications
o Workstations that have heavy bandwidth requirements
Collisions occur when two devices transmit at the same time. Devices needed to be able to
detect and recover from collisions.
Each device could either transmit or receive data at any given time. This meant that the
device was either receiving data or listening for incoming data. Devices were not able to
both send and receive at the same time (much like using a one-lane road for traffic in two
different directions).
Using twisted pair cable, multiple strands of wires are combined into a single cable. Devices
can use different wires to send and receive data (allowing them to do both simultaneously).
Using switches, devices are given a dedicated communication path. With a single device
connected to a switch port, collisions are eliminated.
With these problems solved, you can turn off collision detection. Devices can transmit and receive
data simultaneously, and can begin transmitting data as soon as they have data to send.
Devices with collision detection turned on operate in half-duplex mode; devices with collision
detection turned off operate in full-duplex mode.
Mode
Halfduplex
Description
Bandwidth
Collision detection is turned on
The device can only send or receive at
any given time
Up to the rated bandwidth (10 Mbps for
Devices connected to a hub must use
10BaseT, 100 Mbps for 100BaseT, etc.)
half-duplex communication
Fullduplex
Bridge Facts
A bridge is a data forwarding device that provides data transfer. You should understand the
following concepts relating to the operation of bridges.
Bridges connect two media segments that use the same protocol.
Bridges examine the source address to determine the media segment of network devices.
Bridges operate at the Data Link layer of the OSI model.
Bridges maintain a table of device addresses and their corresponding segments.
Each segment connected by a bridge can have the same network address.
Messages within a media segment are prevented from crossing over to another segment.
Bridges cannot link multiple architectures because different frame types are used.
Bridges cannot translate upper-layer protocols.
Bridges cannot forward packets to different networks based on the network address.
Bridges do not filter broadcast packets.
Use bridges to isolate traffic to a segment, or to prevent unwanted traffic from crossing over to
other segments, or to slow WAN links. When designing the placement of bridges on the network,
follow the 80/20 rule.
Switch Facts
A switch is a multiport bridge. It provides the same functionality, but with a higher port density. In
addition, switches provide features that cannot be found in bridges.
Switches are associated with the Data Link layer of the OSI Model.
Switches build a forwarding database in a manner similar to bridges. Switches examine the
source and destination Data Link address in each packet to build the database and make
forwarding decisions.
Switches connect multiple segments or devices and forward packets to only one specific
port.
You can connect a single device to a switch port or multiple devices to a switch port by
using a hub.
The process begins by examining the source address of an incoming packet. If the source
address is not in the forwarding database, an entry for the address is made in the database.
The port it came in on is also recorded.
The destination address is then examined.
o If the destination address is in the database, the packet is forwarded to the
appropriate port if the port is different than the one on which it was received.
o If the destination address is not in the database, the packet is sent out all ports except
for the one on which it was received. This is known as flooding.
o A broadcast packet is forwarded (flooded) to all ports except the one on which it was
received.
Transparent bridges forward packets only if the following conditions are met.
The frame contains data from the layers above the Data Link layer.
The frame's integrity has been verified through a valid Cyclic Redundancy Check (CRC).
The frame is not addressed to the bridge.
How switches forward packets depends on the switch type. The following table compares the
different methods the switch uses to forward packets (some Cisco switches support all three
methods).
Method
Store-andforward
Characteristics
Store-and-forward switches:
Cut-through switches:
Cut-through
Fragment-free switches:
Fragment-free
Note: Newer switches can monitor each port and determine which switching method to use. They
can automatically change to store-and-forward if the number of errors on a port exceeds a
configurable threshold.
Routing
As you study this section, answer the following questions:
Routing Facts
A router is a device that sends packets from one network to another network. Routers receive
packets, read their headers to find addressing information, and send them on to their correct
destination on the network or Internet. Routers can forward packets through an internetwork by
maintaining routing information in a database called a routing table. The routing table typically
contains the address of all known networks and routing information about that network such as:
Interface
Routing Path
Next Hop
Route Metric (Cost)
Route Timeout
Routers build and maintain their routing database by periodically sharing information with other
routers. The exact format of these exchanges is based on the routing protocol. The routing protocol
determines:
Regardless of the method used, changes in routing information take some time to be propagated to
all routers on the network. The term convergence is used to describe the condition when all routers
have the same (or correct) routing information.
Message Routing Facts
To send a message from one host to another on a different network, the following process is used:
1. The sending host prepares a packet to be sent. It uses its own IP address for the source
Network layer address, and the IP address of the final receiving device as the destination
Network layer address.
2. The sending host creates a frame by adding its own MAC address as the source Physical
layer address. For the destination Physical layer address, it uses the MAC address of the
default gateway router.
3. The sending host transmits the frame.
4. The next hop router reads the destination MAC address in the frame. Because the frame is
addressed to that router, it processes the frame.
5. The router strips off the frame header and examines the packet destination address. It uses a
routing protocol to identify the next hop router in the path.
6. The router repackages the packet into a new frame. It uses its own MAC address as the
source Physical layer address. It uses the MAC address of the next hop router for the
destination Physical layer address.
7. The router transmits the frame.
8. The next hop router repeats steps 4 through 7 as necessary, until the frame arrives at the last
router in the path.
9. The last router in the path receives the frame and checks the destination IP address
contained in the packet.
10. Because the destination device is on a directly connected network, the router creates a frame
using its own MAC address as the source address, and the MAC address of the destination
device as the destination physical address.
11. The router transmits the frame.
12. The destination device receives the frame. Inside the packet it finds the destination address
matching its own IP address, with the source IP address being that of the original sending
device.
Be aware of the following:
On an Ethernet network, the Data Link layer address is the MAC address. On an IP
network, the Network layer address is the IP address.
Both Data Link physical addresses and Network logical addresses are used to send packets
between hosts.
The Data Link address identifies the physical interface. The Network address contains both
a logical network address and a logical device address.
IP (Network layer) addresses are contained in the IP header; MAC (Data Link) addresses
are contained in the Ethernet frame header.
Both the source and destination Network and Data Link addresses are typically contained in
the packet.
Data Link addresses in the packet change as the packet is delivered from hop to hop. At any
point in the process, the Data Link destination address indicates the physical address of the
next hop on the route. The Data Link source address is the physical address of the device
sending the frame.
Network addresses remain constant as the packet is delivered from hop to hop. The
Network addresses indicate the logical address of the original sending device and the
address of the final destination device.
A router uses the logical network address specified at the Network layer to forward
messages to the appropriate network segment.
What HyperTerminal settings should you use to connect to the router console for the first
time?
What are the requirements for using a VTY (virtual terminal) connection to a Cisco device?
What type of cable do you use to connect a PC to a router console port?
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
405. Access and utilize the router to set basic parameters
Description
A console connection allows for a direct connection through a PC to the console
port on the device. The PC will need a terminal emulation program (such as
HyperTerminal and PuTTY) to connect to the device's command line interface. In
the terminal emulation program, use the following settings:
Console
Virtual
Terminal
(VTY)
Security Device
Manager
(SDM)
Note: A new router may not be completely configured for an SDM connection, so
you may need to make a console connection first.
Use the following cable types to make the initial connection to the switch or the router for device
management:
Cable Type
Pin-outs Use
1 --> 8
2 --> 7
3 --> 6
4 --> 5
5 --> 4
6 --> 3
7 --> 2
8 --> 1
Rollover Cable
1 --> 1
2 --> 2
3 --> 3
6 --> 6
1 --> 3
2 --> 6
3 --> 1
6 --> 2
System Startup
As you study this section, answer the following questions:
If the router can't find an IOS image in flash, where will it look next?
What happens if the router can't find a configuration file at startup?
What is the role of the configuration register?
What configuration register value tells the router to skip the startup-config file?
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
402. Describe the operation of Cisco routers (including: router bootup process, POST,
router components)
Startup Facts
The following graphic details the process used to boot the device.
When you turn the router on, it runs through the following boot process.
1. The Power-On Self Test (POST) checks the router's hardware. When the POST completes
successfully, the System OK LED indicator comes on.
2. The router checks the configuration register to identify where to load the IOS image from.
A setting of 0x2102 means that the router will use information in the startup-config file to
locate the IOS image. If the startup-config file is missing or does not specify a location, it
will check the following locations for the IOS image:
1. Flash (the default location)
2. TFTP server
3. ROM (used if no other source is found)
3. The router loads the configuration file into RAM (which configures the router). The router
can load a configuration file from:
1. NVRAM (startup-configuration file)
2. TFTP server
3. If a configuration file is not found, the router starts in setup mode.
Setup Mode Facts
If the router is brand new, it has no startup-config file. Therefore, when it boots, it immediately
enters Setup mode. Setup mode is a special, guided routine that asks you a series of questions and
uses your responses to make basic configuration entries.
There are two ways to enter setup mode:
Boot the router without the startup-config file. This happens when you erase the current
startup-config file, or when you boot a new router.
Use the setup command from privileged mode.
You can exit setup mode without answering all the questions by pressing Ctrl + C. The
information you've entered to that point will not be saved.
Cisco routers and switches come with the following defaults:
Note: Some Cisco switches allow you to enter an express setup mode. Be aware of the following
express setup details:
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
405. Access and utilize the router to set basic parameters
Command Mode Prompts and Commands
The following table summarizes basic command mode prompts and other commands.
Mode
Prompt
To Enter
User EXEC
Router>
Privileged
EXEC
Router#
enable
Global
Router(config)# config terminal
Configuration
Router(configline <type> <number>
Line
line)#
Interface
Router(configif)#
To Exit
exit
logout
disconnect
disable (exit
disconnects)
exit, ^Z*
exit, ^Z*
exit, ^Z*
interface <type>
<number>.<subnumber>
exit, ^Z*
router <type>
exit, ^Z*
None, interactive
dialog
setup
erase startup-config + reload
^C
ROM
Monitor
rommon>
RXBoot
<boot>
Subinterface
Router
Setup
Router(configsubif)#
Router(configrouter)#
*^Z (Ctrl + Z) exits all configuration modes to privileged EXEC mode. exit "backs up"
one configuration mode.
Command Help Facts
Help is available in all device modes. It is context sensitive, so the information you see
depends on what you are doing. Cisco bases this on the mode you are in and the words or
partial words you type with the ?.
To...
Show list of all commands available in the current
mode
Use...
Note: Typing ? acts as a return, and repeats the last command you entered after the Help
information displays. You do not need to retype the command after you ask for help on it.
When you use Help to display the possible keywords for a command, you will see the
following types of items.
<0-FFFFFF>
<cr>
A.B.C.D
Enter an IP address
To ...
Ctrl + A
Ctrl + E
Ctrl + B
Left arrow
Ctrl + F
Right arrow
Esc, then B
Go back one word
(press and release Esc, before pressing B)
Esc, then F
Move forward one word
(press and release Esc, before pressing F)
Ctrl + Z
terminal editing
terminal no editing
When you are in advanced editing mode, the $ indicator appears after the prompt. As you type,
commands longer than the command line appear to scroll under the prompt.
Note: The editing feature uses the same keystrokes as UNIX emacs editing.
Command History Command List
By default, the IOS automatically saves the last 10 commands in the command history buffer. The
command history is specific to the configuration mode you are in.
Use . . .
Ctrl + P or Up arrow
To . . .
Show the previous command
terminal no history
terminal history size <0-256> Set the size of the history buffer
show history
Solution
Use:
no logging console
Use:
When working with the device through a Telnet session, when you use terminal monitor
to send debug output to the
a debug command, output will not be shown.
telnet session.
Use:
logging buffered
to send logging
information to RAM, then
use:
show log
Where is the startup-config file stored? Where is the running-config file stored?
What is stored in ROM?
What is the generic syntax for loading a configuration file into RAM?
What does the boot system command do?
After finishing this section, you should be able to complete the following tasks:
Memory Type
ROM (ReadOnly Memory)
Characteristics
Preprogrammed, non-writable memory containing the bootstrap startup program,
an older, smaller-scale version of the operating system (IOS) software, and the
Power-on Self-Test (POST) program
Non-volatile but programmable memory containing the proprietary Cisco
operating system (IOS) images
Note: Older routers dont have flash memory
Flash
RAM (Random Volatile memory containing the running operating system and current (unsaved)
Access Memory) configuration information
NVRAM (NonVolatile RAM)
Non-volatile but persistent memory that contains the backup copy of the startup
configuration (startup-config) file and virtual configuration register
Note: On some routers, NVRAM holds the IOS image
The contents of non-volatile memory (such as ROM, flash, and NVRAM) remain when the
router is powered off. The contents of volatile memory (RAM) are lost when the router is
powered down.
Changes to the configuration are stored in RAM in the running-config file. To save your
configuration changes permanently, and to load different versions of the configuration files from
various locations, use the copy command in privileged EXEC mode.
Use . . .
Router#copy run start
To . . .
Save the contents of the running-config file to NVRAM
To . . .
Display information about hardware and firmware including
the configuration register value
configure memory
or
copy startup-config
running-config
configure terminal
Flash
TFTP server
ROM (limited version of the IOS software)
Use the boot system command in global configuration mode to identify alternate locations
for the IOS image. Use the copy command to archive, upgrade, or replace an IOS image.
Use . . .
Router(config)#boot system flash
<IOSfilename>
To . . .
Identify an IOS image file in flash to
use at boot.
Note: When you use the boot system command, you are not making backup copies of the IOS
image, nor are you replacing the default IOS search order. You are directing the router where to
look for the IOS image on boot-up. It tries each location in turn, until it finds a valid IOS image. If
one is not found, it returns to the default load sequence.
215. Interpret the output of various show and debug commands to verify the operational
status of a Cisco switched network
416. Verify router hardware and software operation using SHOW & DEBUG commands
Show Command List (Basic)
The following list summarizes common information you can display using common show
commands.
To...
View hardware configuration, running IOS version, ROM bootstrap
version, and RAM and processor information
show runningconfig
show startupconfig
or
show config
View the startup configuration file stored in NVRAM (the saved copy of
the configuration file)
show flash
View the size of the configuration files and the available flash memory
View information for all IOS image files stored on the router
show history
show protocols
or
show interfaces
View the IP addresses assigned to a specific interface
or
show ip
interfaces
show protocols
or
View the status of all interfaces
show interfaces
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
405. Access and utilize the router to set basic parameters
406. Connect, configure, and verify operation status of a device interface
Details
Bank
number
Port
number
Examples
Details
Examples
Slot/Port
numbering
FastEthernet2/1/0 (2nd
NM slot/2nd WIC subslot/1st FastEthernet port)
FastEthernet0/0/0 (builtin/1st WIC sub-slot/1st
FastEthernet port)
FastEthernet0/1/3 (builtin/2nd WIC sub-slot/4th
FastEthernet port)
Serial4/1/1 (4th NM
slot/2nd WIC subslot/2nd Serial port)
Serial0/1/0 (built-in/2nd
WIC sub-slot/1st Serial
port)
Ethernet1/0 (1st NM
slot/1st Ethernet port)
FastEthernet0/1 (builtin/2nd FastEthernet port)
To . . .
Change the host name of the router
Router(config)#int
Router(config)#int
Router(config)#int
0/1
Router(config)#int
Router(config)#int
Router(config)#int
Ethernet 0
interface type, such as:
ether0
FastEthernet
fa = FastEthernet
gi = Gigabit
Fa0/1
s = Serial
Gigabit 0/1
e = Ethernet
gi0/1
Router(config-if)#description
<description text>
Examples
The following set of commands sets the hostname of the router to ATL1:
Router#config t
Router(config)#hostname ATL1
ATL1(config)#
The following set of commands adds a description of ATL to NYC for the first serial interface on
the router:
Router(config)#int ser 0
Router(config-if)#description ATL to NYC
Note: To undo any configuration change, use the same command preceded by the no keyword
followed by the command. For example, to remove a description from an interface, use the
following command:
Router(config-if)#no description
Notice that in many cases you can leave off additional parameters when using the no command.
System Passwords
As you study this section, answer the following questions:
What is the difference between the enable and the enable secret passwords? Which one is
more secure?
How would you require a password when logging on through the console?
You have configured the VTY lines on a router with a password but you did not use the
login command. Will VTY login be allowed? Will a password be required?
What must you do to disable VTY login?
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
405. Access and utilize the router to set basic parameters
417. Implement basic router security
Description
Console
VTY
Controls the ability to log on to the router using a virtual terminal (VTY) connection
Controls the ability to switch to configuration modes. There are two different
passwords that might be used:
EXEC mode
Note: The router always uses the enable secret password if it exists.
Be aware of the following recommendations for configuring router passwords:
Use . . .
Router(config)#enable
secret <password>
To . . .
Set the encrypted password used for privileged mode access. The
enable secret is always used if it exists.
This command uses the Message-Digest 5 (MD5) hashing
algorithm to encrypt the password.
Router(config)#enable
password <password>
Router(config)#line con 0
Router(config)#line vty
<0-197> <1-197>
Router(configline)#password
Router(config-line)#login
Router(config)#no enable
secret
Router(config)#no enable
password
Router(config-line)#no
login
Router(config-line)#no
password
Router(config)#service
password-encryption
Note: If you do not use the login command in line mode, a password will not be required for
access, even though one is set.
Access to the console through a Telnet session is controlled by the login and the password entries.
To prevent VTY access, there must be a login entry without a password set. Access is allowed
based on the following conditions:
Banners
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
405. Access and utilize the router to set basic parameters
417. Implement basic router security
To . . .
Set the Message-of-the-day (MOTD) banner. The
MOTD banner displays immediately after a connection
is made.
Router(config)#banner
login
Set the login banner. The login banner displays after the
MOTD banner and before the login prompt.
Router(config)#banner
exec
Router(config)#banner
incoming
Router(config)#no banner
<type>
Note: The banner command without a keyword defaults to set the MOTD banner.
Follow the banner command with a delimiting character. The delimiter encloses the banner text,
and helps the router identify the beginning and ending of the banner. This allows you to
construct multiple-line banners.
Example
The following commands set the MOTD, login, and EXEC banners, using # as the delimiting
character and inserting a hard return between each banner:
Router(config)#banner motd # This is the Message-of-the-day banner!
#
Router(config)#banner login # This is the Login banner!
#
Router(config)#banner exec # This is the Exec banner!
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
405. Access and utilize the router to set basic parameters
406. Connect, configure, and verify operation status of a device interface
To . . .
Specify the amount of time that information in a packet is still
valid (default = 180 seconds)
Use the no cdp holdtime command to reset the value to its
default.
Router(config)#cdp run
Router(config-if)#cdp enable
Router(config-if)#no cdp
enable
Router#show cdp
Device ID
Local interface
Holdtime
Capability
Platform
Port ID
Examples
The following commands turn on CDP for the router and configures it to send CDP packets every
90 seconds.
Router(config)#cdp run
Router(config)#cdp timer 90
The following commands turn off CDP on the router's first Ethernet interface.
Router(config)#int eth 0
Router(config-if)#no cdp enable
Connecting Devices
As you study this section, answer the following questions:
When would you use a crossover cable when connecting to a Cisco device?
What type of cable do you use to connect two switches?
What is the SFP slot on a switch used for?
How does Auto-MDI/MDIX affect cable selection when connecting devices?
201. Select the appropriate media, cables, ports, and connectors to connect switches to other
network devices and hosts
403. Select the appropriate media, cables, ports, and connectors to connect routers to other
network devices and hosts
Type
1 --> 1
2 --> 2
3 --> 3
6 --> 6
Workstation to hub
Workstation to switch
Router to hub
Router to switch
Switch to switch
Switch to hub
Hub to hub
Workstation to router
Workstation to workstation
Router to router
Through Auto-MDI/MDIX, newer switches can determine what type of Ethernet cable is
needed and will internally change the sending/receiving pin positions if needed.
Some Cisco routers provide a generic Attachment Unit Interface (AUI) port. The AUI port
is designed to connect to an external transceiver for conversion to a specific media type,
such as coaxial or fiber optic.
To support LAN distances above twisted pair Ethernet limits (>100 meters), use the switch's
SFP slot (a Gigabit uplink port) and fiber optic media.
Switch Configuration
As you study this section, answer the following questions:
What configuration modes are unique to switches?
How do you identify ports which are administratively shut down?
What information does the SYST LED provide?
After finishing this section, you should be able to complete the following tasks:
Configure basic switch port parameters.
View port statuses.
SYST
(System)
Meaning
A single system light gives you information about the overall switch status.
A single RPS light shows the status of the redundant power supply.
RPS
(Redundant
Power Supply)
Each port has a light that indicates the status of the port. By pressing the Mode button, you
can view three different types of information for each port.
When the Mode button selects Stat:
Port Stat
(Port
status)
On a simple LAN, you can connect the switch to the network, connect devices, and it will
automatically begin switching traffic to the correct ports. The switch comes preconfigured to work
out-of-the-box without configuration. To customize the switch configuration, connect to the switch
in one of the following ways:
Console connection
Telnet session
Web management software (connect through the LAN through a Web browser)
Note: You must configure an IP address for the switch to manage it through a Telnet or Web
session.
Switch Configuration Modes
The following graphic illustrates some of the configuration modes of the switch.
The following table describes some of the configuration modes of the switch:
Mode
Details
Interface
configuration
Switch(configif)#
Config-vlan
VLAN
configuration
Command
switch(config-if)#speed
switch(config-if)#speed
switch(config-if)#speed
switch(config-if)#speed
10
100
1000
auto
switch(config-if)#duplex half
switch(config-if)#duplex full
switch(config-if)#duplex auto
switch(config-if)#no shutdown
switch(config-if)#shutdown
Show line and protocol status of all ports switch#show ip interface brief
Be aware of the following switch configuration details:
To...
List a large set of information about each interface.
switch#show ip interfaces
switch#show ip interfaces
brief
The following table summarizes some possible conditions indicated by the interface status for
Ethernet interfaces:
Line status
Protocol
status
Interface
status
Indicates...
administratively
down
down
disabled
down
down
notconnect
No cable is connected.
The cable is connected but is improperly wired
(or broken) so that signals cannot be sent or
received correctly.
The device on the other end of the cable is
powered off or the other interface is
administratively shut down.
down
down
up
up
connected
TCP/IP Configuration
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
205. Perform and verify initial switch configuration tasks including remote access
management
304. Implement static and dynamic addressing services for hosts in a LAN environment
405. Connect, configure, and verify operation status of a device interface
Identifies which portion of the IP address is the network address. Two devices on the
same network must be configured with the same subnet mask.
Default
gateway
Identifies the router to which packets for remote networks are sent. The default
gateway address is the IP address of the router interface on the same subnet as the
local host. Without a default gateway set, most clients will be unable to communicate
with hosts outside of the local subnet.
Host name
DNS server Identifies the DNS server that is used to resolve host names to IP addresses.
MAC
address
Note: A host requires an IP address and subnet mask to communicate on a single subnet. A default
gateway address is required to enable inter-subnet communications. At least one DNS server
address is required for the host to use hostnames when contacting other hosts.
Several of the TCP/IP configuration settings can be assigned through the following methods:
Method
Dynamic Host
Configuration
Protocol (DHCP)
Description
A DHCP server is a special server configured to pass out IP address and
other IP configuration information to network clients.
assign to hosts.
The DHCP server can also be configured to pass out other IP
configuration such as the default gateway and DNS server addresses.
The DHCP server ensures that each client has a unique IP address.
DHCP is a TCP/IP protocol. Any client configured to use DHCP can
get an IP address from any server configured for DHCP, regardless
of the operating system.
Automatic Private IP
Addressing (APIPA)
Use APIPA as a fail safe for when a DHCP server is unavailable to provide
limited communication capabilities.
Using static addressing, IP configuration information must be manually
configured on each host. Use static addressing:
Static (manual)
assignment
Basic switches operate at Layer 2, and therefore do not need an IP address to function. In
fact, a switch performs switching functions just fine without an IP address set.
You only need to configure a switch IP address if you want to manage the switch from a
Telnet or Web session.
The switch itself has only a single (active) IP address. Each switch port does not have an IP
address (unless the switch is performing Layer 3 switching, a function which is not
supported on all switches). The IP address identifies the switch as a host on the network but
is not required for switching functions.
To configure the switch IP address, you set the address on the VLAN interface. This is a logical
interface defined on the switch to allow management functions. By default, this VLAN is VLAN 1.
Use the following commands to configure the switch IP address:
switch#config terminal
switch(config)#interface vlan 1
switch(config-if)#ip address 1.1.1.1 255.255.255.0
switch(config-if)#no shutdown
To enable management from a remote network, you will also need to configure the default
gateway. Use the following command in global configuration mode:
switch(config)#ip default-gateway 1.1.1.254
Note: You can use the ip address dhcp command to configure a switch (or a router) to get its IP
address from a DHCP server. The DHCP server can be configured to deliver the default gateway
and DNS server addresses to the Cisco device as well. The manually-configured default gateway
address overrides any address received from DHCP.
DHCP
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
302. Explain the operation and benefits of using DHCP and DNS
303. Configure, verify and troubleshoot DHCP and DNS operation on a router
Address Resolution Protocols
You should know the following protocols that perform address resolution.
Protocol
Description
Address Resolution Used by hosts to discover the MAC address of a computer from its IP
Protocol (ARP)
address.
Reverse Address
Used by a host to discover the IP address of a computer from its MAC
Resolution Protocol
address.
(RARP)
Bootstrap Protocol
(BootP)
Dynamic Host
Configuration
Protocol (DHCP)
The address pool is the range of addresses which can be assigned to requesting hosts.
The DHCP server only assigns addresses within the address pool. The DHCP server
can also be configured to not assign specific addresses in the range, known as
exclusions.
Lease
The lease is the length of time for which the assignment is valid. It contains the
assigned IP address and other information for the client. Periodically and when the
client reboots, it contacts the DHCP server to renew the lease on the IP address.
In addition to the IP address and subnet mask, the DHCP server can also deliver the
following:
DHCP
options
Binding
Interface
DNS
After finishing this section, you should be able to complete the following tasks:
302. Explain the operation and benefits of using DHCP and DNS
303. Configure, verify and troubleshoot DHCP and DNS operation on a router
Details
A router's DNS name resolution looks for information in the following places (in this
order):
Router
Workstation
1.
2.
3.
4.
Note: Additional DNS servers are only consulted if the primary DNS server did not
respond (i.e. it is offline).
Use the following commands to configure DNS services on a router:
Use...
To...
router(config)#ip domain-name
<name>
router(config)#ip name-server
a.b.c.d
router(config)#ip domain-lookup
router(config)#no ip domainlookup
router#show hosts
Routing
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
401. Describe basic routing concepts (including: packet forwarding, router lookup process)
404. Configure, verify, and troubleshoot RIPv2
408. Perform and verify routing configuration tasks for a static or default route given
specific routing requirements
To configure a default route or a route out of a stub network (a stub network is one that has
a single route into and out of the network).
For small networks that do not change very often and that have only a few networks.
To turn off all routing protocols and reduce traffic or improve security.
To configure routes that are lost due to route summarization.
A default route is a route that is considered to match all destination IP addresses. With a default
route, when a packet's destination IP address does not match any other routes, the router uses the
default route for forwarding the packet. Be aware of the following default route details:
Default routes work best when only one path exists to a part of the network.
One default route in the routing table could replace hundreds of static route entries in the
routing table.
When the default route is not set, the router discards packets that do not match a route in the
routing table.
The following table lists the commands for configuring static routes:
Use . . .
Router(config)#ip route
<destination> <next_hop>
To . . .
Identify a next hop router to receive packets sent to the
specified destination network.
Router(config)#ip route
<destination> <interface>
Router(config)#ip classless
Router#show ip route
Note: Configuring a static route to network 0.0.0.0 with mask of 0.0.0.0 is the most common
method of configuring a default gateway. However, the following methods can also be used under
certain circumstances:
Use the ip default-network command to designate a route already in the routing table as
the default route. For example, if the router had learned of network 10.0.0.0/8 through a
routing protocol, you could use the following command to designate that network as the
default network:
ip default-network 10.0.0.0
Be aware that the ip default-network command only makes a route a candidate for the
default route, it does not necessarily guarantee that the route will be used to route packets to
unknown destinations.
Use the ip default-gateway command if IP routing has been disabled on the router. With IP
routing disabled, routes will not be learned through a routing protocol, nor will static routes
be used if configured. With IP routing enabled, the ip default-gateway setting will not be
used.
Examples
The following command creates a static route to network 192.168.1.0 through the router with the IP
address 192.168.1.35 and gives it an administrative distance value of 25.
Router(config)#ip route 192.168.1.0 255.255.255.0 192.168.1.35 25
The following command identifies a default route through an interface with address 10.1.1.2.
Router(config)#ip route 0.0.0.0 0.0.0.0 10.1.1.2
To . . .
Enable IP routing for the entire router. IP routing is enabled
by default. Use this command only if it has been disabled.
Router(configrouter)#version 2
Router(configrouter)#network
<address>
Router#show ip route
<hostname or address>
Example
The following commands enable IP routing and identify two networks that will participate in the
RIPv2 routing protocol.
Router(config)#ip routing
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 10.0.0.0
Router(config-router)#network 192.168.10.0
Routing Table Facts
The router uses the routing table to determine where to send packets. When a packet is received, it
compares the destination IP address contained in the packet with all known routes in the routing
table.
The destination address is compared to the networks in the routing table looking for a
match.
A match is made when the destination IP address is on the same subnet as indicated by the
route in the routing table.
The IP address might match more than one route in the routing table. If that is the case, the
most specific routing table entry is used (i.e. the network with the subnet mask that has the
greatest number of significant bits).
When a match is found, the packet is sent out the specified router interface to the next hop
router address.
If no match is found, the packet is dropped (not forwarded).
Use the show ip route command to view the routing table. A sample output of this command is
shown below.
Router1841#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.2.1 to network 0.0.0.0
R
R
C
C
S*
The following table describes important information shown in the command output:
Component
Gateway of last
resort
Description
The gateway of last resort identifies a route to use if the packet does not match
any other route. In this example, the route of 0.0.0.0 with a mask of 0.0.0.0
matches every packet. If the destination IP address does not match any other
route, the next hop address of 192.168.2.1 is used for this packet.
Note: If the output shows the line Gateway of last resort is not set, then the
router can only send packets to the specific routes listed in the routing table.
Packets that do not match a specific route will be dropped.
The first characters of a routing table entry identifies the source or type of the
route.
Route type
A route marked with * indicates a route that is a candidate for the default route.
The router uses this route to determine whether the route can be used to set the
gateway of last resort information. If it meets several conditions, the information
in the route marked with * is used for the gateway of last resort information.
Network
Following the route type is the network address and subnet mask. This identifies
the specific subnet address for the route.
The numbers in brackets following non-connected routes identify the following
two items:
Administrative
distance and cost
o
o
Note: Be aware that the administrative distance is used to select a route learned
between different protocols, while the cost is used to select the best route
learned by the same protocol.
The address indicated by via identifies the router address where packets will be
sent when sending to the destination network. The next hop router address is a
router on the same subnet as a directly connected interface. However, this does
not mean that the next hop router is connected directly to the destination
network, but rather that it is the next stop in the path to the destination.
Last update
For routes learned through a routing protocol, the time value (such as 00:00:08)
indicates the elapsed time since the last update about the route was received.
Most protocols periodically send information about known routes. The update
time helps you to know the age of the route information.
Out interface
The interface designation at the end of the route identifies the local router
interface used to reach the next hop router and therefore to reach the destination
network.
Connected routes will only show if the interface has been assigned an IP address and is also
up.
Static routes will only show if the interface used to reach the next hop router is up.
Having a route marked as a candidate default route does not necessarily mean that the router
has a gateway of last resort set. To determine whether the router will route packets to
unknown networks, examine the Gateway of last resort line for a next hop address.
What are the differences and similarities between ping and traceroute?
You can ping a device but can't open a Telnet session with that device. What is the
problem?
Which utility can you use to test upper-layer protocols as well as lower-layer connectivity?
Which utility would you use on a workstation to view the IP address received from the
DHCP server?
After finishing this section, you should be able to complete the following tasks:
110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered
model approach
206. Verify network status and switch operation using basic utilities (including: ping,
traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
309. Identify and correct common problems associated with IP addressing and host
configurations
407. Verify device configuration and network connectivity using ping, traceroute, telnet,
SSH or other utilities
414. Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
ICMP Messages
The Internet Control Message Protocol (ICMP) is a special-purpose message mechanism
added to the TCP/IP suite that lets computers and routers in an internetwork report errors or
provide information about unexpected circumstances. Remember that IP is a connectionless
protocol and as such, contains no procedures that help to monitor successful packet delivery
or test connectivity. Hosts use ICMP to send error messages to other hosts.
ICMP messages include the following types:
Message
Echo
Characteristics
The ICMP echo message is used to discover hosts and networks, and to verify that
they are reachable. The ping utility is a popular utility that uses ICMP echo
messages.
Destination
unreachable
The destination unreachable message is sent if a packet cannot reach its destination
for a variety of reasons. It might indicate the host is unavailable, or that there were
problems detected in the packet header.
Time exceeded
The time exceeded message is sent when the packet's time-to-live (TTL) counter
has expired.
Redirect
The redirect message is sent from a router to the sending device to indicate that a
different route should be chosen for the packet. The redirect message can be sent if
a better route is in the router's table, or if the selected route is unavailable or
congested.
The source quench message is sent by a receiving device to indicate that the flow
Source quench of packets is too fast. When a sending device receives a source quench message, it
slows its rate of transmission.
Router
discovery
TCP/IP Utilities
The following table describes three utilities you can use to test network connectivity between
devices. You can use these utilities on Windows workstations as well as Cisco devices.
Utility
Description
Ping sends an ICMP echo request/reply packet to a remote host. A response from the
target device verifies that the host can communicate with the destination.
Ping
Traceroute uses ICMP echo request/reply packets together with the Time-to-Live (TTL)
value in those packets to identify the path between two devices. Traceroute sends
successive ICMP messages to a destination with increasing TTL values. For example,
the first test pings the destination using a TTL of 1, the second pings with a TTL of 2,
and so on. By default, traceroute sends three ping tests for each TTL value.
Traceroute
Telnet
Note: A successful Telnet test means that ping and traceroute will also be successful. A
failed Telnet test only indicates a failure at the Application layer or below. By itself, it
does not tell you at which layer the problem exists.
Be aware of the following when working with these utilities on Cisco devices:
When using ping, an exclamation mark indicates a successful ping, while a period indicates
a failure.
Both ping and traceroute include a standard or an extended mode.
o Extended mode is available only in privileged EXEC mode.
o Use extended mode to modify the number of tests performed or the timeout period.
o Use extended mode to test non-IP protocols (such as AppleTalk or Novell IPX).
Responses to each test within the traceroute command are as follows:
o A time exceeded message indicates that a router has received the packet but the
TTL has expired. For example, if the TTL is set to 3, the third router in the path
responds with the time exceeded message.
o
o
A destination unreachable message indicates that the router in the path does not
have a route to the destination network or device, or the destination device is down.
An asterisk ( * ) indicates that the timer has expired without a response.
Note: The time exceeded and destination unreachable messages depend on the
configuration of the intermediary and destination devices. Many devices are configured to
not respond to ICMP messages, so you might see an asterisk even if the router in the path
has received the packet.
Description
Ipconfig displays IP configuration information for network adapters including:
Use ipconfig to view IP address, subnet mask, and default gateway configuration
Use ipconfig /all to view detailed configuration information.
Use ipconfig /release to release the IP configuration information obtained from
the DHCP server.
Use ipconfig /renew to request new IP configuration information from the
DHCP server.
The ARP cache keeps a mapping of IP address to MAC addresses. If the IP address or
MAC address changes, the value in the cache might be out of date.
Arp
Note: Switches used with arp are case-sensitive. Arp -a is not the same thing as arp -A.
Nslookup
Nslookup resolves (looks up) the IP address of a host name. Displays other name
resolution-related information such as the DNS server used for the lookup request.
IP Troubleshooting Tips
One important step in troubleshooting network communications is to verify the IP address, subnet
mask, and default gateway settings of each host. Keep in mind the following as you troubleshoot
IP:
Listed below are several common symptoms and things to try to correct communication problems.
Problem
A single host cannot
communicate with any other
host.
A single host can communicate
with all hosts on the same
network, but can't
communicate with any host on
any other network.
Symptoms
Ping to any other host
fails.
Solution
Because the problem exists with only one
host, troubleshoot the configuration of the
host with the problem.
not set.
The routing table has a
route to the destination
network. Traceroute on
the router times out.
LAN Segmentation
As you study this section, answer the following questions:
106. Describe the impact of applications (Voice Over IP and Video Over IP) on a network
203. Explain network segmentation and basic traffic management concepts
Segmentation Facts
LAN segmentation is the process of dividing the network to overcome problems such as excessive
collisions, broadcast traffic, or heavy network traffic. By segmenting a LAN, you can increase
network performance, maximize bandwidth, and reduce congestion.
As you segment the network, you will need to consider the collision and broadcast domains on the
network.
A collision domain is any network or subnetwork where devices share the same
transmission medium and where packets can collide. Collisions naturally increase as the
number of devices in a collision domain increase.
A broadcast domain is any network or subnetwork where computers can receive framelevel broadcasts from their neighbors. As you add devices to a network segment, the amount
of broadcast traffic on a segment also increases. Note: A special condition called a
broadcast storm happens when broadcast traffic is sent, regenerated, and responded to. In
this condition, the amount of broadcast traffic consumes network bandwidth and prevents
normal communications. Faulty devices or improper configuration conditions can lead to a
broadcast storm.
Segmentation may increase the number of both the collision and broadcast domains. Membership
within collision or broadcast domains differs depending on the connection device used.
Device
Hub
Collision Domain
Broadcast Domain
All devices connected to the hub
All devices are in the same broadcast domain.
are in the same collision domain.
Bridge
or
Switch
Router
Router
Switch
Bridge
Note: In most cases where you might use a bridge, choose a switch instead.
In general, follow these guidelines to make decisions about the appropriate connectivity device.
Use a bridge to segment the network (divide network traffic) and to provide fault tolerance.
Use a switch to reduce collisions and offer guaranteed bandwidth between devices.
Use a router to filter broadcast messages, implement security, or connect different networks.
LAN segmentation and design may be affected by the types of applications and protocols running
over the network. For instance, Voice over Internet Protocol (VoIP) requires a well-engineered,
end-to-end network that provides little latency for data stream transmission. Fine-tuning the
network to adequately support VoIP involves overcoming the following challenges:
VoIP requires a very low delay as data is transferred between the sending and receiving
phones, e.g. less than 200 milliseconds (.2 seconds).
During transfer, the jitter (variations in delay) must be low as well, e.g. less than 30
milliseconds (.03 seconds).
When packets do not arrive at the destination it is known as packet loss. If a VoIP packet
was lost in transit, there is no need to recover the packet. This is because by the time the
packet is recovered, it would sound like a break in the sound of the VoIP call.
Echo is hearing your own voice in the telephone receiver while you are talking. When timed
properly, echo is reassuring to the speaker; if the echo exceeds approximately 25
milliseconds, it can be distracting and cause breaks in the conversation. VoIP
implementations use echo cancellers to regulate the echo.
To secure VoIP data, the network should have a VoIP Virtual Private Network (VPN)
solution. A VPN is a network that uses encryption to allow IP traffic to travel securely over
the TCP/IP network. Without a VoIP VPN solution, it is relatively easy to eavesdrop on
VoIP calls and even change their content.
In some cases, IP telephones require Power over Ethernet (PoE). PoE is useful for powering
IP telephones and other appliances where it would be inconvenient, expensive, or infeasible
to supply power separately.
VoIP Considerations
Voice over IP (VoIP) is a protocol optimized for the transmission of voice through the Internet or
other packet switched networks. Voice over IP protocols carry telephony signals as digital audio
encapsulated in a data packet stream over IP.
VoIP requires a well-engineered, end-to-end network that provides little latency for data stream
transmission. Fine-tuning the network to adequately support VoIP involves overcoming the
following issues:
Issue
Description
Delay (or latency) is the amount of time required for the spoken voice to be carried to the
receiver's ear.
Delay
Delays cause long pauses between speaking and receiving, and might result in
callers continually interrupting each other.
Callers notice roundtrip delays of 250 milliseconds (ms) or more.
International standards call for a delay of 150 ms or less.
Ideally, Cisco recommends 0% packet loss, although very low (.1-.5% maximum)
might still be acceptable.
Echo is hearing your own voice in the telephone receiver while you are talking.
Echo
VoIP is typically implemented using switches with additional configuration required on both
switches and routers to ensure delivery of VoIP packets for acceptable quality.
To minimize the number of switch ports required, VoIP phones connect to the switch port,
and a corresponding workstation connects to the VoIP phone. Both voice and data traffic is
sent through the same switch port.
Switches with Power over Ethernet (PoE) capability provide electrical power through the
Cat 5 cable. This eliminates the need to have a separate power cable for the phone.
Switches and routers are configured with Quality of Service (QoS) settings to elevate the
priority of voice traffic. This helps control delay and jitter.
To secure VoIP data, the network should have a VoIP Virtual Private Network (VPN)
solution. A VPN is a network that uses encryption to allow IP traffic to travel securely over
the TCP/IP network. Without a VoIP VPN solution, it is relatively easy to eavesdrop on
VoIP calls and even change their content.
Wireless Standards
As you study this section, answer the following questions:
501. Describe standards associated with wireless media (including: IEEE WI-FI Alliance,
ITU/FCC)
Wireless Facts
Four organizations influence the standards used for wireless communication:
Organization
Details
International Telecommunication
Union Radiocommunications Sector
(ITU-R)
Wi-Fi Alliance
Wireless networks use radio waves for data transmission instead of electrical signals on Ethernet
cables. In order to use radio waves as the medium for transmission, specific characteristics of radio
waves are defined:
Characteristic
Description
Many radio devices operate within a specified frequency range which limits the
frequencies on which it is allowed to transmit. In the United States, radio
frequency wireless LANs use one of two frequency ranges defined by the FCC:
Frequency
range or band
Channel
The frequency range is divided into equal segments called channels. Wireless
networking channels are much like television channels, where each channel allows
for separate data transmission. However, channels within the range overlap with
adjacent channels. By using specific channels and not others, you can ensure that
the channels do not overlap, eliminating interference caused by wireless devices
In the 5 GHz range, there are 23 total channels. 12 channels are nonoverlapping channels.
In the 2.4 GHz range, there are 11 total channels, with 3 non-overlapping
channels.
When a device sends data over a wireless network, it can change (or modulate) the
radio signal's specifications. The three common modulation techniques used in
wireless networking include:
Modulation
technique
Standard
802.11g
802.11a
802.11b
5 GHz
(U-NII)
11 Mbps
54 Mbps
600 Mbps
300 Ft.
300 Ft.
1200 Ft.
Channels
23 (12)
(non-overlapped)
11 (3)
11 (3)
Modulation
technique
OFDM
DSSS, CCK,
DQPSK,
DBPSK
Backwardscompatibility
N/A
No
With 802.11b
Frequency
802.11n
With 802.11a/b/g,
depending on
implementation
Be aware of the following regarding the wireless network implementation:
The actual speed depends on several factors including distance, obstructions (such as walls),
and interference.
The actual maximum distance depends on several factors including obstructions, antenna
strength, and interference. For example, for communications in a typical environment (with
one or two walls), the actual distance would be roughly half of the maximums.
The speed of data transmission decreases as the distance between the transmitter and
receiver increases. In other words, in practice, you can get the maximum distance or the
maximum speed, but not both.
Some newer 802.11a or 802.11g devices provide up to 108 Mbps using 802.11n pre-draft
technologies (MIMO and channel bonding).
The ability of newer devices to communicate with older devices depends on the capabilities
of the transmit radios in the access point. For example:
o Some 802.11n devices can transmit at either 2.4 GHz or 5 GHz. This means that the
radio is capable of transmitting at either frequency. However, a single radio cannot
transmit at both frequencies at the same time.
o Most 802.11g devices can transmit using DSSS, CCK, DQPSK, and DBPSK for
backwards compatibility with 802.11b devices. However, the radio cannot transmit
using both DSSS and OFDM at the same time.
This means that when you connect a legacy device to the wireless network, all devices on
the network operate at the legacy speed. For example, connecting an 802.11b device to an
802.11n or 802.11g access point slows down the network to 802.11b speeds.
A dual band access point can use one radio to transmit at one frequency, and a different
radio to transmit at a different frequency. For example, you can configure many 802.11n
devices to use one radio to communicate at 5 GHz with 802.11a devices, and the remaining
radios to use 2.4 GHz to communicate with 802.11n devices. Dual band 802.11a and
802.11g devices are also available.
Wireless Infrastructure
As you study this section, answer the following questions:
502. Identify and describe the purpose of the components in a small wireless network.
(Including: SSID, BSS, ESS)
503. Identify the basic parameters to configure on a wireless network to ensure that devices
connect to the correct access point
Description
An ad hoc network works in peer-to-peer mode. The wireless NICs in each host
communicate directly with one another. An ad hoc network:
Ad Hoc
You will typically only use an ad hoc network to create a direct, temporary
connection between two hosts.
An infrastructure wireless network employs an access point (AP) that functions like
a hub on an Ethernet network. With an infrastructure network:
Infrastructure
You should implement an infrastructure network for all but the smallest of wireless
networks.
The following diagram shows a sample enterprise wireless network operating in infrastructure
mode:
The various components of a wireless network are described in the following table.
Component
Description
Station (STA)
Access Point
(AP)
An access point (AP), sometimes called a wireless access point, is the device that
coordinates all communications between wireless devices as well as the
connection to the wired network. It acts as a hub on the wireless side and a
bridge on the wired side. It also synchronizes the stations within a network to
minimize collisions.
A BSS, also called a cell, is the smallest unit of a wireless network. All devices
in the BSS can communicate with each other. The devices in the BSS depend on
the operating mode:
Basic Service
Set (BSS)
Independent
Basic Service
Set (IBSS)
Extended
Service Set
(ESS)
An ESS consists of multiple BSSs with a distribution system (DS). The graphic
above is an example of an ESS.
Distribution
System (DS)
The distribution system (DS) is the backbone or LAN that connects multiple APs
(and BSSs) together. The DS allows wireless clients to communicate with the
wired network and with wireless clients in other cells.
Identifier
Description
The Service Set Identifier (SSID), also called the network name, groups wireless
devices together into the same logical network.
Service Set
Identifier
(SSID)
All devices on the same network (within the BSS and ESS) must have the
same SSID.
The SSID is a 32-bit value that is inserted into each frame. The SSID is
case-sensitive.
The SSID is sometimes called the BSS ID (Basic Service Set ID) or the
ESS ID (Extended Service Set ID). In practice, each term means the same
thing.
Wireless Security
As you study this section, answer the following questions:
What is the difference between a rogue access point and a spoofed access point?
What does open authentication use to authenticate a device?
How does 802.1x authentication differ from shared key authentication?
What improvements did WPA make to overcome the weaknesses of WEP?
You have an older wireless access point that supports WEP. You would like to use WPA
instead. What action would you typically take to do this? What would you need to do to use
WPA2?
Which wireless security standards use Temporal Key Integrity Protocol (TKIP) encryption?
What are three actions you should take to increase the security of a wireless access point?
How does MAC address filtering improve security of a wireless access point? Why is this
action by itself insufficient to prevent unauthorized access?
504. Compare and contrast wireless security features and capabilities of WPA security
(including: open, WEP, WPA-1/2)
With war driving, an attacker scans an area looking for available wireless networks.
This is typically accomplished using a high-gain antenna, or by driving around
looking for wireless networks in various locations.
Hacker
Rogue access
point
Spoofed
access point
A hacker who gains access to your network can install a rogue wireless
access point, giving him access to the wired network. Using the rogue
access point, the hacker might capture network traffic, or attempt to access
other network resources.
Employees can easily purchase an access point and add it to the wired
network. Often this is done to give the employee wireless access to the
network, but is often done with little or no security implemented on the
access point. The access point becomes a possible point of entry for hackers
or war drivers.
A spoofed access point is an access point that is configured to look like a legitimate
access point. Spoofed access points generally occur in a public area, such as an
Internet cafe or public hotspot. The attacker sets up an open access point using an
SSID that resembles the business name. The attacker can then monitor traffic of
those connected to the spoofed access point.
Description
Authentication is the process of validating identity.
Authentication
Encryption
Intrusion Detection
System (IDS)
Cisco Structured
Wireless-Aware
Network (SWAN)
Description
WEP is an optional component of the 802.11 specifications and was deployed in
1997. WEP was designed to provide wireless connections with the same security
as wired connections. WEP has the following weaknesses:
Wired Equivalent
Privacy (WEP)
Static Pre-shared Keys (PSK) were given to the access point and client
and could not be dynamically changed or exchanged without
administration. As a result, every host on large networks usually use the
same key.
Because it doesn't change, the key can be captured and easily broken.
The key values were short, making it easy to predict.
Cisco's interim solution was deployed in 2001 to address the problems of WEP.
The solution included the following:
Cisco interim
solution
WPA is the implementation name for wireless security based on initial 802.11i
drafts and was deployed in 2003. It was intended as an intermediate measure to
take the place of WEP while a fully secured system (802.11i) was prepared.
WPA:
Wi-Fi Protected
Access (WPA)
Wi-Fi Protected
Access 2
(WPA2) or
802.11i
Note: WPA2 has the same advantages over WEP as WPA. While more secure
than WPA, its main disadvantage is that it requires new hardware for
implementation.
In addition to using the security measured outlined above, you can provide a level of security using
the following practices. These methods by themselves do not provide much security, but rather
keep curious people from trying to access the wireless network.
Method
Description
Change the
administrator
account name and
password
The access point typically comes configured with a default username and
password that is used to configure the access point settings. If possible, it is
important to change the administrator account name and password from the
defaults. This helps prevent outsiders from breaking into your system by
guessing the default username and password.
Update the firmware on the access point from the manufacturer's Web site
Update the firmware frequently to prevent your system from being exposed to known bugs and
security holes.
Enable the firewall
on the access point
Most wireless access points come with a built-in firewall that connects the
wireless network to a wired network.
Many manufacturers use a default SSID, so it is important to change your
SSID from the defaults. You can also disable the SSID broadcast for further
protection, this is known as SSID suppression or cloaking.
Note: Even with SSID broadcast turned off, a determined hacker can still
identify the SSID by analyzing wireless broadcasts.
Disable DHCP
Every network board has a unique code assigned to it called a MAC address.
By specifying which MAC addresses are allowed to connect to your network,
you can prevent unauthorized MAC addresses from connecting to the access
point. Configuring a MAC address filtering system is very time consuming
Enable MAC address
and demands upkeep.
filtering
Note: Attackers can still use tools to capture packets and then retrieve valid
MAC addresses. An attacker could then spoof their wireless adapter's MAC
address and circumvent the filter.
Wireless Configuration
As you study this section, answer the following questions:
You have a network with two wireless access points. Should the SSID be the same or
different? Should the channel on each be the same or different?
Where is the best place to locate your wireless access point?
What type of objects might obstruct radio frequency wireless transmissions?
How does range and antenna placement affect wireless networks?
When should you use open authentication on your wireless network?
What authentication type should you not use when using WEP for encryption?
What is required in order to implement 802.1x authentication?
After finishing this section, you should be able to complete the following tasks:
503. Identify the basic parameters to configure on a wireless network to ensure that devices
connect to the correct access point
505. Identify common issues with implementing wireless networks. (Including: Interface,
misconfiguration)
Description
The first step in implementing a wireless solution is to plan the wireless
network. Consider the following:
Click here for a diagram of a sample wireless network with multiple access
points.
Connect the
wireless access
point to the wired
Most access points require that you make a connection to the access point
through the wired network in order to complete access point configuration
tasks.
network
Before connecting the access point, you can verify that the wired
connection is valid by connecting a laptop to the network port.
Connect the access point to the existing network with a straightthrough Ethernet cable. Optionally, you could use a cross-over cable
and connect a laptop or desktop computer directly to the Ethernet port
on the access point.
Most access points come configured with a static IP address and a
subnet mask. On a host on the wired network, change the host's subnet
to the same subnet of the access point.
Most access points use a Web-based program for configuration. Use
your browser to connect to the default IP address of the access point,
then enter the default administrator name and password to connect to
the configuration utility.
Configure basic
access point
settings
Install and configure a wireless client, such as a laptop with an enabled radio.
When you install the wireless adapter, you use a wireless connection manager
to view and connect with wireless networks.
Configure a client
With most connection managers, you can view wireless networks in range that
are broadcasting the SSID. Simply select the wireless network and establish
the connection. A successful connection verifies that the client can
communicate with the access point.
If the access point is left connected to the network without security
Configure security implementations, attackers may connect to the network, potentially
on the access point circumventing all security on the wired portion of the network.
AES is used with WPA2. When using AES, all devices must be WPA2
capable.
TKIP is used with WPA. Most existing devices can use WPA. If not,
check to see if a firmware update is available to add WPA capabilities
to the device.
Use WEP only if no other encryption is supported. Note: Do not use
WEP together with Shared Key authentication.
Public networks typically require no encryption.
After configuring security on the access point, you will need to add security to
the wireless client. Manually configure the security settings that correspond to
the wireless network.
Configure client
security settings
When using WEP or Shared Key authentication, enter the same shared
key configured on the access point.
If using 802.1x authentication, enable 802.1x and configure any
necessary settings. Depending on the implementation, you might be
prompted for a username and password when you try to connect.
Select the encryption method used on the wireless access point.
After the security configurations are set, verify that the wireless client can still
connect to the wireless network.
A site survey is an evaluation of your wireless network configuration. The site
survey looks for advantages and problems with the wireless network and its
surroundings. When conducting the site survey:
Conduct a site
survey
Verify that the SSID broadcast and security settings are correctly
configured on each access point.
Assess the signal strength and direction of wireless access points. For
example, make sure that access points are not placed near outside walls
where the signals will be strong outside of the building where you do
not have physical control.
Check for obstructions that could affect the availability of the wireless
signal in various locations.
Check for other wireless networks in the area, and choose a channel
that does not conflict with other networks.
Perform cell-shaping. Cell-shaping uses directional antennae and
shielding methods to locate the wireless access points in secured areas
in order to adjust their transmittal power.
If you find something of concern during the site survey such as a strong signal
strength outside of the building, troubleshoot the issue and then conduct
another site survey to confirm that the issue is resolved.
Wireless Troubleshooting Facts
If you are having trouble establishing or keeping a wireless connection, consider the following:
Consideration
Description
Incorrect
configuration
Range and
obstructions
Channel
interference
Cordless telephones
Other access points in the area (for example, each of your neighbors
might have a wireless network, with each configured to use a similar
channel)
To avoid interference, try changing the channel used on the access point. If the
area has different wireless networks, configure each with a different channel
with at least two channels separating the channels in use (for example you can
use channels 1, 4, 8, and 11).
Atmospheric and
EMI conditions
Antennae
orientation
Directional antenna:
o Creates a narrow, focused signal in a particular direction.
o Focused signal provides greater signal strength increasing the
transmission distance.
o Provide a stronger point-to-point connection, better equipping
them to handle obstacles.
Omni-directional antenna:
o Disperses the RF wave in an equal 360-degree pattern.
For other devices such as infrared or satellite, the orientation of the receiving
device is critical. For these types of devices, make sure the receivers have a
line-of-sight path to communicate.
In some cases, especially when using 802.11n, the wireless client might not be
compatible with the wireless access point. Try updating the software that came
with the wireless client, update the firmware on the access point, and research
the manufacturer's Web site for additional information.
Subnet Operations
As you study this section, answer the following questions:
When should you use the 2n-2 formula to determine the amount of available subnets?
What is the magic number and how can it help while subnetting a network?
What is the difference between a classful and classless subnet mask?
After finishing this section, you should be able to complete the following tasks:
305. Calculate and apply an addressing scheme including VLSM IP addressing design to a
network
Subnetting, dividing a network address into multiple smaller subnets. For example, this
allows a single Class B or Class C addresses to be divided and used by multiple
organizations.
Supernetting, combining multiple network addresses into a single larger subnet. For
example, this allows multiple Class C addresses to be combined into a single network.
Route aggregation (also called route summarization), where multiple routes are combined in
a routing table as a single route.
For example, the routing table represents the address as 199.70.0.0/21, where 21 is the number of
bits in the custom subnet mask.
In addition to CIDR, the following other solutions were put into place to make efficient use of
available IP addresses:
IP version 6. IPv6 uses 128-bit addresses instead of the 32-bit addresses used with IPv4.
Private addressing with address translation. With private addressing, hosts are assigned an
unregistered address in a predefined range. All hosts on the private network use a single
registered IP address to connect to the Internet. A special router (called a Network Address
Translation or NAT router) translates the multiple private addresses into the single
registered IP address.
Binary Calculations
To perform subnetting operations, you will need to be proficient at converting decimal and
binary numbers. When working with IP addresses, work with each octet separately. The
following table shows the decimal value for various binary values with a single 1 bit.
128
64
32
16
To find the decimal value of a number with multiple 1 bits, simply add the decimal value of
the bits together. For example, the decimal value of the binary number 10010101 is:
10000000 = 128
00010000 = 16
00000100 = 4
00000001 = 1
Total = 128 + 16 + 4 + 1 = 149
To calculate the number of valid subnets or the number of hosts per subnet, you will need to
know how to find the exponential values of 2. Use the following chart to identify the
exponent values and the final possible number (after subtracting 2 from each exponent).
# of bits
1 2 3 4 5 6
1
10
11
12
10
11
212
Exponent
2 2 2 2 2 2
Exponent value
Tip: Memorize the shaded values. To find smaller or larger values, divide or multiply the
exponent value by 2.
Subnetting Operations
Use the following chart to identify the solutions to common subnetting tasks.
Scenario
Solution
Begin by converting the subnet mask to a binary number.
Then decide which formula to use (n is the number of
additional bits borrowed from the default mask):
Use 2n if:
Magic number
The magic number is the decimal value of the last 1 bit in the
subnet mask.
The magic number identifies:
Subnet address
Broadcast address
Valid host address range
Subnet Design
After finishing this section, you should be able to complete the following tasks:
Given a scenario, select and configure subnet addresses, masks, and host addresses.
305. Calculate and apply an addressing scheme including VLSM IP addressing design to a
network
Magic number
128 64 32 16 8
126 62 30 14 6
4
2
n/a n/a
16 32 n/a n/a
To construct the table, begin by writing the bit-count in the top row. Then compute the remaining
rows as follows:
To get the magic number, start at 128 and split the value in half for each column.
To get the decimal mask value, add the magic numbers to the left (for example, a /27 mask
can be calculated as 128 + 64 + 32 = 224).
To get the number of hosts per subnet, subtract 2 from the magic number.
To get the number of subnets, start at 2, then double the number for each column.
As an example of using the table, suppose you are given a subnet address of 199.166.12.32/29. Use
the /29 column to perform various subnetting operations. For example:
The next subnet address using this mask is 199.166.12.40 (add the magic number to the first
subnet address).
The broadcast address for the subnet is 199.166.12.39 (subtract 1 from the next subnet
address).
Using this mask, there are a total of 16 possible subnets.
Both /31 and /32 masks cannot be used because there are no host addresses available.
The table works best for subnetting the last octet. You can still use the table for finding the
decimal equivalent of bit-count masks that are less than 24-bits. Just subtract 8 from each
number in the first row. For example, a 21-bit mask would use the same column as a 29-bit
mask, and would have the same decimal value.
A /24 subnet has 254 available host addresses (256-2) on a single subnet. The magic
number is 256. If you need more hosts than this:
o Decrease the mask bit count (i.e. /23, /22, /21, and so on).
o Each time you decrease the bit count, double the magic number, then subtract 2.
Route Summarization
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
Given a scenario, select the appropriate subnet addresses and masks to prepare for
summarization.
Given a scenario, identify the summarized route.
306. Determine the appropriate classless addressing scheme using VLSM and
summarization to satisfy addressing requirements in a LAN/WAN environment
Summarization reduces the size of the routing table. A single route to the summarized
network takes the place of multiple routes to individual subnets.
Summarization speeds convergence. The reachability of each subnet address is indicated by
the reachability of the summarized address.
Summarization retains all necessary routing information, so all networks are still reachable
after summarization.
Summarization can happen in one of two ways:
Method
Description
With automatic summarization, the router identifies adjacent networks and
calculates the summarized route.
o
Automatic
o
o
o
Manual
Automatic summarization summarizes routes along class boundaries only when advertising
those routes on a network of a different classful network. Consider the following graphic:
To identify a summarized route for a group of subnets, identify a subnet address and mask that
includes all of the routes that need to be summarized. While in many cases you could simply
advertise the default class boundary, this will often result in a route being advertised that includes
subnets and addresses that aren't being used. To eliminate this problem, choose the subnet and
mask so that only existing subnets are included. To do this:
1. Convert the last significant octet of the first and the last subnet in the contiguous range to
binary. For example, if you had networks 172.16.16.0/24 through 172.16.31.0/24, you
would have the following two binary values:
16 = 0 0 0 1 0 0 0 0
31 = 0 0 0 1 1 1 1 1
2. Identify the last consecutive binary bit that is shared. In this case, the last shared bit is the
fourth bit position.
3. Convert all bits to the right of the shared bit to 0. In this example, this gives you the binary
value of 00010000. This will be the subnet address of the summarized route. In this
example, use 172.16.16.0.
4. Convert all bits to the left of the shared bit to 1. In this example, this gives you the binary
value of 11110000. This will be the mask value of the summarized route. In this example,
use 255.255.240.0.
5. Finally, identify any subnet addresses included in the range indicated by the advertised
subnet and mask. Be aware that you will be unable to use these subnets without additional
configuration for discontiguous networks. For example, if the first subnet you used in this
example was 172.16.17.0 and the last subnet was 172.16.30.0, you would be unable to use
the 172.16.16.0 and 172.16.31.0 subnets using a summarized route of 172.16.16.0/20.
How does a packet switched WAN service differ from a circuit switched WAN service?
Who is responsible for the local loop, the customer or the service provider?
What is the significance of the demarc?
What is the difference between the Data Terminal Equipment (DTE) and Data
Communication Equipment (DCE)?
Which WAN services use already-installed telephone lines?
What media type is used by ATM?
Method
Description
Point-toPoint
Circuit
Switching
A circuit switching network allows data connections that can be initiated when needed
and terminated when communication is complete, working much like a telephone line
for voice communication. A circuit switched network uses a dedicated connection
between sites. It is ideal for transmitting data that must arrive quickly in the order it is
sent, as is the case with real-time audio and video.
Packet
Switching
A packet switched network allows data to be broken up into packets and sent across
the shared resources. Packets are transmitted along the most efficient route to the
destination. Packet switching is ideal for transmitting data that can handle transmission
delays, as is often the case with Web pages and e-mail.
Component
Consumer Premises
Equipment (CPE)
Data Terminal
Equipment (DTE)
Description
Devices physically located on the subscriber's premises. CPE includes the
telephone wire, telephone, modem, and other equipment, both the devices
the subscriber owns and the ones leased from the WAN provider. The
wiring typically includes UTP cable with RJ-11 or RJ-45 connectors. CPE
is sometimes used synonymously with DTE.
A device on the network side of a WAN link that sends and receives data.
The DTE resides on the subscriber's premises, and marks the point of entry
between the LAN and the WAN. DTEs are usually routers, but computers
and multiplexers can also act as DTEs. Broadly, DTEs are any equipment
at the customer's site, and can include all computers. In a narrow sense, the
DTE is the device that communicates with the DCE at the other end.
Demarcation point
(demarc)
The point where the telephone company's telephone wiring connects to the
subscriber's wiring. The demarc can also be called the network interface or
point of presence.
Typically, the customer is responsible for all equipment on one side of the
demarc. The phone company is responsible for all equipment on the other
side of the demarc.
Local loop
Cable that extends from the demarc to the central telephone office. The
demarc media is owned and maintained by the telephone company.
Typically, it is UTP, but it can also be one or a combination of UTP, fiber
optic, or other media. Fiber optic cable to the demarc is rare.
The switching facility closest to the subscriber, and the nearest point of
presence for the WAN provider. It provides WAN-cloud entry and exit
points for incoming and outgoing calls, and acts as a switching point to
forward data to other central offices. A CO provides services such as
switching incoming telephone signals to outgoing trunk lines. It also
provides reliable DC power to the local loop to establish an electric circuit.
Data Communication
Equipment (DCE)
A device that communicates with both DTEs and the WAN cloud. DCEs
are typically routers at the service provider that relay messages between the
customer and the WAN cloud. In a strict sense, a DCE is any device that
supplies clocking signals to DTEs. Thus, a modem or CSU/DSU at the
customer site is often classified as a DCE. DCEs may be devices similar to
DTEs (such as routers), except that each device plays a different role.
WAN cloud
The hierarchy of trunks, switches, and central offices that make up the
network of telephone lines. It is represented as a cloud because the physical
structure varies, and different networks with common connection points
may overlap. Few people thoroughly understand where data goes as it is
switched through the "cloud." What is important is that data goes in, travels
through the line, and arrives at its destination.
Packet-Switching
Exchange (PSE)
Speed
Plain Old
Telephone
Service (POTS)
56 Kbps
T1 (a.k.a. DS1)
1.544 Mbps
Description
Existing wires use only one twisted pair
Analog signals are used through the local loop
A modem is required to convert digital signals to
analog
T3 (a.k.a. DS3)
44.736 Mbps
E1
2.048 Mbps
E3
34.368 Mbps
J1
1.544 Mbps
32.064 Mbps
J3
Note: WAN services also use fiber optic, wireless, satellite, and other transmission media.
However, the use of these media to the local loop is not common at this time.
If your organization needs WAN connectivity, you can choose from the following service options:
Service
Bandwidth
(Max.)
Line Type
Signaling
Method
Characteristics
Public Switched
Telephone Network
(PSTN)
56 Kbps
POTS
Analog
Leased lines
56 Kbps
POTS
Analog
X.25
64 Kbps
POTS
Analog
Dedicated line
Variable packet sizes
(frames)
Ideal for low-quality lines
Frame Relay
1.54 Mbps
POTS
T-1
T-3
Digital
Asynchronous
Transfer Mode
(ATM)
1.2 Gbps
Coaxial,
twisted pair,
fiber-optic
Digital
Digital
Digital
Integrated Services
Digital Network
(ISDN)
DSL
6.1 Mbps
(1.544 or lower
is more
common)
POTS
There is no clear distinction between WAN services such as Frame Relay and ISDN. For example,
you can use Frame Relay protocol over ISDN lines. Once a device connects to the WAN cloud,
internal protocols can convert data traffic into the necessary formats, then convert the data again at
the other end.
WAN Connections
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
403. Select the appropriate media, cables, ports, and connectors to connect routers to other
network devices and hosts
406. Connect, configure, and verify operation status of a device interface
801. Describe different methods for connecting to a WAN
802. Configure and verify a basic WAN serial connection
Details
When a device communicates over a serial interface, the interface operates in one of
the following modes:
Interface
operating
mode
When you configure a router to connect to a network through a serial interface, the
router must be connected to a device (such as a CSU/DSU or another router) that
provides clocking signals. When you configure two routers in a back-to-back
configuration through their serial ports, one router interface must be configured to
provide the clocking signals for the connection.
The following WAN service options will also affect which type of cable is needed
for a WAN connection:
Service
X.25
Frame Relay
Asynchronous Transfer Mode (ATM)
Integrated Services Digital Network (ISDN)
DSL
Type
Description
DB-60
Connector
Connector
Connector
Connector
Data Link layer protocols also describe the encapsulation method or the frame format. WAN
encapsulation methods are typically called HDLC (high-level data link control). This term is both a
generic name for Data Link protocols and the name of a specific protocol within a WAN protocol
suite or service. Depending on the WAN service and connection method, you will select one of the
following encapsulation methods.
Cisco HDLC for synchronous, point-to-point connections with other Cisco routers. This is
the default encapsulation method for synchronous serial links on Cisco routers. Note: Cisco
HDLC does not communicate with other vendors' implementations of HDLC.
LAPB for X.25 networks.
LAPD in combination with another protocol for the B channels in ISDN networks. LAPD is
a Layer 2 ISDN protocol that manages flow and signaling.
PPP for dial-up LAN access, circuit-switched WAN networks, and ISDN networks. PPP is
non-proprietary, so it works in implementations that use products from multiple vendors.
Cisco/IETF for Frame Relay networks.
Note: Routers on each side of a WAN link must use the same encapsulation method to be able to
communicate.
Serial Interface Configuration Command List
Use the following commands to configure the router.
Use . . .
To . . .
Set the clock rate on the DCE serial interface.
Router(config-if)#clock
rate <rate>
Router(config-if)#ip
Assign an IP address and subnet mask to the interface.
address <address> <mask>
Router(configif)#encapsulation hdlc
Modify the router encapsulation method.
Router(configif)#encapsulation ppp
Note: HDLC is the default encapsulation method. The
Router(configencapsulation method should match for both routers.
if)#encapsulation framerelay
Router#sh interfaces
Router#sh run
Router#sh controllers
<serial interface>
Examples
The following set of commands configures the IP address 192.168.1.229 with a mask of
255.255.255.0 for the first Serial interface on the router and activates the interface.
Router(config)#int ser 0/1/0
Router(config-if)#ip address 192.168.1.229 255.255.255.0
Router(config-if)#no shutdown
The following set of commands configures the second Serial interface on the router with PPP
encapsulation and activates the interface.
Router(config)#int ser 0/1/1
Router(config-if)#encapsulation ppp
Router(config-if)#no shutdown
PPP
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
PPP Facts
The following list represents some of the key features of the Point-to-Point Protocol (PPP):
PPP uses two main protocols to establish and maintain the link.
Protocol
Description
The Link Control Protocol (LCP) is responsible for establishing, maintaining, and
tearing down the PPP link. LCP packets are exchanged periodically to do the
following:
Link Control
Protocol
(LCP)
The Network Control Protocol (NCP) is used to agree upon and configure Network
layer protocols to use (such as IP, IPX, or AppleTalk). Each Network layer
Protocol
(NCP)
A single PPP link can run multiple control protocols, one for each Network-layer
protocol supported on the link.
PPP establishes communication in three phases.
1. LCP phase. LCPs are exchanged to open the link and agree upon link settings such as
encapsulation, packet size, and whether authentication will be used.
2. Authenticate phase (optional). During this phase, authentication-specific packets are
exchanged to configure authentication parameters and authenticate the devices. LCPs might
also be exchanged during this phase to maintain the link.
3. NCP phase. NCPs are exchanged to agree on upper-layer protocols to use. For example,
routers might exchange IPCP and CDPCP packets to agree upon using IP and CDP for
Network-layer communications. During this phase, LCPs might continue to be exchanged.
PPP Command List
PPP configuration is often done in connection with configuring other services. To configure PPP on
the router, complete the following tasks:
1. Set PPP encapsulation on the interface. You must set the encapsulation method to PPP
before you can configure authentication or compression.
2. Select CHAP and/or PAP as the authentication method (optional).
3. If authentication is used, configure username/password combinations.
PPP options are configured in interface mode for a specific interface.
Use . . .
Router(config-if)#encapsulation ppp
To . . .
Set the encapsulation type to PPP
Router(config-if)#ppp authentication
<chap|pap>
Router(config-if)#ppp authentication chap pap
Router(config-if)#ppp compression
Router(config-if)#ppp chap|pap
password <password>
Router(config)#username <hostname>
password <password>
Router(config)#bandwidth <value>
Router#show interface
To hide the CHAP password from view in the configuration file, use the service passwordencryption command from the global configuration mode.
Example
The following commands configure the SFO router to use PPP and enable it to connect to the LAX
router using PAP authentication.
SFO(config)#hostname LAX password cisco5
SFO(config)#int s0/1/0
SFO(config-if)#encap ppp
SFO(config-if)#ppp auth pap
NAT Facts
Network Address Translation (NAT) allows you to connect a private network to the Internet
without obtaining registered addresses for every host. Private addresses are translated to the public
address of the NAT router. NAT can be used to provide a measure of security for your private
network, or to provide Internet connectivity with a limited number of registered IP addresses.
As you work with NAT, it's important to understand the following terminology.
Term
Inside
Outside
Definition
The inside network is the private network.
A router interface that connects to the private network is also called the inside
interface.
The outside network is the public network (the Internet).
A router interface that connects to the public network is also called the outside
interface.
Inside local
The inside local address is the IP address of the host on the inside network.
address
Inside
global
address
The inside global address is the IP address of the host after it has been translated for
use on the Internet. The term global refers to the registered IP address that identifies
the inside host on the Internet.
Outside
global
address
The outside global address is an IP address of an Internet host. For example, when you
visit a Web site, your computer will use the global outside address to contact the Web
server.
Outside
local
address
An outside local address is an outside global address that has been translated for inside
(or private) use. In other words, the NAT router translates an Internet host IP address
into a private IP address. Instead of using the Web server address, the internal
computer will use the translated address instead.
Description
Static
Use static translation to translate a single outside address to a single inside address.
Overloaded
with PAT
Use overloaded NAT with Port Address Translation (PAT) to translate multiple
inside addresses to a single public address. Port numbers are used to identify specific
inside local hosts. The port number associated with the private host is appended to
the inside global IP address. Use this option to allow multiple inside hosts to access
the Internet using a single public IP address.
Dynamic
Configuring NAT on a Cisco router may be done through the command line interface (CLI) or the
Security Device Manager (SDM). When using the SDM to configure NAT, you start a wizard that
helps you choose the NAT configuration parameters.
Choose Basic NAT to identify the inside and outside interfaces. Selecting this option
configures overloaded NAT with PAT. The public address assigned to the public interface
is used for all private hosts.
Choose Advanced NAT to:
o Identify the outside interface.
o Configure additional public addresses that can be used for dynamic translation.
o Identify inside interfaces and additional network addresses that are not directly
connected to the NAT router that will be translated. This option lets you configure a
single NAT router for your entire private network, even when your network consists
of multiple subnets accessible through other routers on the private network.
o Perform static mappings that translate a public IP address to a private host address.
With this option, hosts on the private network are assigned a private IP address, and
the private IP address is mapped to a public IP address. Incoming communications
sent to the public IP address are translated and forwarded to the private host. The
wizard calls these mappings NAT rules.
Note: To start the NAT wizard, the router must have at least two enabled interfaces.
When configuring a router for NAT, be sure to use an IP address in the private IP address ranges
for the inside local IP addresses. Otherwise, hosts on your network might not be able to access
outside hosts with the same IP address. A Cisco router can be configured to overcome this problem,
but the configuration is difficult. Private IP addresses do not need to be registered, and fall within
the following ranges:
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
WAN Troubleshooting
As you study this section, answer the following questions:
407. Verify device configuration and network connectivity using ping, traceroute, telnet,
SSH or other utilities
414. Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
804. Troubleshoot WAN implementation issues
To...
List a large set of information about each interface.
router#show interface
status
router#show ip
interfaces
router#show ip
interfaces brief
router#show ip route
<ip address>
View details about the route the router would match for a
packet sent to the listed IP address.
router#show runningconfig
You can use the interface status to understand connectivity problems and quickly see whether the
link between the router and the network is operational. The following table summarizes some
possible conditions indicated by the interface status:
Line status
Protocol
status
Indicates...
administratively
down
down
down
down
up
down
up
up
After verifying that the interfaces have Layer 1 and Layer 2 connectivity, proceed to troubleshoot
TCP/IP connectivity including:
If a problem exists at Layer 1, you must correct that problem before troubleshooting Layer 2
connectivity. If a problem exists at Layer 2, you must correct that problem before you can
proceed to troubleshoot upper-layer connectivity.
Use ping and traceroute to verify Network-layer connectivity, and use Telnet to verify
Application-layer connectivity and configuration.
A failed ping or traceroute test might indicate Layer 1, Layer 2, or Layer 3 problems.
Examine the interface status to rule out Layer 1 and Layer 2 problems.
A successful Telnet test means that ping and traceroute will also be successful. A failed
Telnet test only indicates a failure at the Application layer or below. By itself, it does not
tell you at which layer the problem exists.
Because some devices do not respond to ICMP messages, you might have Network-layer
connectivity between devices even if ping or traceroute fail.
A successful ping test followed by an unsuccessful Telnet test means that Network-layer
connectivity exists. Troubleshoot the upper-layer configuration.
Even if Telnet to a router fails, the router might still be routing packets. This is because
routing happens at the Network layer, while Telnet happens at the Application layer.
After finishing this section, you should be able to complete the following tasks:
VLAN Facts
A virtual LAN (VLAN) can be defined as:
Using VLANs lets you assign devices on different switch ports to different logical (or virtual)
LANs. Although each switch can be connected to multiple VLANs, each switch port can be
assigned to only one VLAN at a time. The following graphic shows a single-switch VLAN
configuration.
In the graphic above, FastEthernet ports 0/1 and 0/2 are members of VLAN 1. FastEthernet
ports 0/3 and 0/4 are members of VLAN 2.
In the graphic above, workstations in VLAN 1 will not be able to communicate with
workstations in VLAN 2, even though they are connected to the same physical switch.
Defining VLANs creates additional broadcast domains. The above example has two
broadcast domains, each of which corresponds to one of the VLANs.
By default, switches come configured with several default VLANs:
o VLAN 1
o VLAN 1002
o VLAN 1003
o VLAN 1004
o VLAN 1005
By default, all ports are members of VLAN 1.
You can create virtual LANs based on criteria other than physical location (such as
workgroup, protocol, or service)
You can simplify device moves (devices are moved to new VLANs by modifying the port
assignment)
You can control broadcast traffic and create collision domains based on logical criteria
You can control security (isolate traffic within a VLAN)
You can load-balance network traffic (divide traffic logically rather than physically)
Note: VLANs are commonly used with Voice over IP (VoIP) to distinguish voice traffic from data
traffic. Traffic on the voice VLAN can be given a higher priority to ensure timely delivery.
Creating VLANs with switches offers the following benefits over using routers to create distinct
networks.
A disadvantage of using switches to create VLANs is that you might be tied to a specific vendor.
Details of how VLANs are created and identified can vary from vendor to vendor. Creating a
VLAN might mean you must use only that vendor's switches throughout the network. When using
multiple vendors in a switched network, be sure each switch supports the 802.1q standards if you
want to implement VLANs.
Despite advances in switch technology, routers are still needed to:
Task
Define a VLAN
Giving the VLAN a name is optional. VLAN names must be
unique.
Command(s)
Delete a VLAN
When you delete a VLAN, all ports assigned to the VLAN
switch(config)#no vlan
<1-4094>
switch(config)#vlan <1-4094>
switch(config-vlan)#name
WORD
switch(config-if)#switchport
access vlan <1-4094>
switch#show vlan
switch#show vlan brief
Example
The following commands create VLAN 12 named IS_VLAN, identifies port 0/12 as having
only workstations attached to it, and assigns the port to VLAN 12.
switch#config t
switch(config)#vlan 12
switch(config-vlan)#name IS_VLAN
switch(config-vlan)#interface fast 0/12
switch(config-if)#switchport access vlan 12
Trunking
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
Trunking Facts
Trunking is a term used to describe connecting two switches together. Trunking is important when
you configure VLANs that span multiple switches as shown in the diagram.
In the above graphic, each switch has two VLANs. One port on each switch has been
assigned to each VLAN.
Workstations in VLAN 1 can only communicate with workstations in VLAN 1. This means
that the two workstations connected to the same switch cannot communicate with each
other. Communications within the VLAN must pass through the trunk link to the other
switch.
Trunk ports identify which ports are connected to other switches.
Trunk ports can automatically carry traffic for all VLANs defined on the switch. You can
prevent traffic from a specific VLAN from being carried on the trunk through a specific
configuration.
Typically, Gigabit Ethernet ports are used for trunk ports, although any port can be a
trunking port.
When trunking is used, frames that are sent over a trunk port are tagged with the VLAN ID number
so that the receiving switch knows to which VLAN the frame belongs.
Tags are appended by the first switch in the path, and removed by the last.
Only VLAN-capable devices understand the frame tag.
Tags must be removed before a frame is forwarded to a non-VLAN-capable device.
The trunking protocol describes the format that switches use for tagging frames with the VLAN ID.
Cisco devices support two trunking protocols:
Trunking
Protocol
Inter-Switch Link
(ISL)
802.1Q
Characteristics
Cisco switches have the ability to automatically detect ports that are trunk ports, and to negotiate
the trunking protocol used between devices. Switches use the Dynamic Trunking Protocol (DTP) to
detect and configure trunk ports. For example, when you connect two switches together, they will
automatically recognize each other and select the trunking protocol to use.
Trunking Command List
The following table lists important commands for configuring and monitoring trunking on a switch.
Command
Switch(configif)#switchport mode trunk
Switch(config-if)#switchport
trunk encapsulation dot1q
Switch(config-if)#switchport
trunk encapsulation isl
Function
Enables trunking on the interface.
The port will not use DTP on the interface.
switches).
If a switch is not connected, it will communicate
as a normal port.
Mode
Encapsulation
Trunking status
VLAN assignments
Note: Two switches both configured to use desirable dynamic trunking will not trunk. At least one
of the switches must be set to manually trunk or to use auto dynamic trunking.
After finishing this section, you should be able to complete the following tasks:
VTP Facts
The VLAN Trunking Protocol (VTP) simplifies VLAN configuration on a multi-switch network by
propagating configuration changes to other switches. With the VTP, switches are placed in one of
the following three configuration modes.
Mode
Server
Characteristics
A switch in server mode is used to modify the VLAN configuration. On a server:
A switch in client mode receives changes from a VTP server and passes VTP
information to other switches. On a client:
Client
A switch in transparent mode allows for local configuration of VLANs, but does not
update its configuration based on the configuration of other switches. On a transparent
switch:
Transparent
To...
Switch(config)#vtp mode
server|client|transparent
Switch(config)#vtp pruning
If you add a switch to the network with a higher revision number, the VLAN configuration
on that switch will update (modify) the existing VLAN configuration on all other switches
in the domain. This is true even if the switch you add is a client. Client switches pass their
configuration information on to other switches. This information can be used to update
server or client switches with lower revision numbers.
If you add a switch to the network with a lower revision number, the switch's configuration
will be modified to match the configuration currently used on the network. This is true even
if the switch you add is a server.
To prevent disruptions to the existing configuration when adding new switches, reset the
revision number on all new switches before adding them to the network. The revision
number resets to 0 each time you:
o Change the domain name.
o Change the VTP mode to transparent.
Before adding a switch back into the network, change the domain name or the mode to
transparent, then change it back to its original setting.
Be sure to place switches in the same domain adjacent to each other through trunk links. If
you insert a switch with a different domain name between two switches, VTP information
will not be passed through the new switch. To correct this problem, use one of the following
solutions:
o Modify the domain name on the new switch to match the existing switches.
o Move the new switch so that switches in the same domain are connected directly
together.
Note: Once set, you cannot completely remove a domain name. In other words, once you
have configured a VTP domain name, you can only change the name, you cannot remove it
completely.
Spanning Tree
As you study this section, answer the following questions:
The spanning tree algorithm calculates the best loop-free path through a network by assigning a
role to each bridge or switch and by assigning roles to the ports of each bridge or switch. The
bridge role determines how the device functions in relation to other devices, and whether the device
forwards traffic to other segments.
Role
Characteristics
The root bridge is the master or controlling bridge.
Root bridge
There is only one root bridge in the network. The root bridge is the logical
center of the spanning-tree topology in a switched network.
The root bridge is determined by the switch with the lowest bridge ID (BID).
o The bridge ID is composed of two parts: a bridge priority number and
the MAC address assigned to the switch.
o The default priority number for all switches is 32,768. This means that
for unconfigured switches, the switch with the lowest MAC address
becomes the root bridge.
o You can manually configure the priority number to force a specific
switch to become the root switch.
The root bridge periodically broadcasts configuration messages. These
messages are used to select routes and reconfigure the roles of other bridges if
necessary.
All ports on a root bridge forward messages to the network.
Note: Newer switches add the VLAN number to the priority value. For example, if
you configure a priority value of 4096, the switch will use the priority of 4097 for
VLAN 1, 4098 for VLAN 2, and so on.
A designated bridge is any other device that participates in forwarding packets
through the network.
Designated
bridge
Backup bridges listen to network traffic and build the bridge database.
However, they will not forward packets.
A backup bridge can take over if the root bridge or a designated bridge fails.
Devices send special packets called Bridge Protocol Data Units (BPDUs) out each port. BPDUs
sent and received from other bridges are used to determine the bridge roles and port states, verify
that neighbor devices are still functioning, and recover from network topology changes. During the
negotiation process and normal operations, each switch port is in one of the following states:
Port State Description
A port in the disabled state is powered on but does not participate in listening to
Disabled network messages or forwarding them. A bridge must be manually placed in the
disabled state.
Blocking
When a device is first powered on, its ports are in the blocking state. In addition,
backup bridge ports are always in the blocking state. Ports in the blocking state receive
packets and BPDUs sent to all bridges, but will not process any other packets.
Listening
The listening state is a transitionary state between blocking and learning. The port
remains in the listening state for a specific period of time. This time period allows
network traffic to settle down after a change has occurred. For example, if a bridge
goes down, all other bridges go to the listening state for a period of time. During this
time the bridges redefine their roles.
Learning
A port in the learning state is receiving packets and building the bridge database
(associating MAC addresses with ports). A timer is also associated with this state. The
port goes to the forwarding state after the timer expires.
The root bridge and designated bridges are in the forwarding state when they can
Forwarding receive and forward packets. A port in the forwarding state can both learn and forward.
All ports of the root switch are in forwarding mode.
During the configuration process, ports on each switch are configured as one of the following
types:
Port type
Root port
Description
The port on the designated switch with the lowest port cost back to the root bridge is
identified as the root port.
Each designated switch has a single root port (a single path back to the route
bridge).
Root ports are in the forwarding state.
The root bridge does not have a root port.
One port on each segment is identified as the designated port. The designated port
identifies which port on the segment is allowed to send and receive frames onto that
segment. Designated ports are selected based on the lowest path cost to get back to the
root switch.
Designated
port
Blocking
port
All ports on the root bridge are designated ports (unless a switch port loops
back to a port on the same switch).
Designated ports are selected based on the lowest path cost to get back to the
root switch.
Designated ports are used to send frames back to the root bridge.
Designated ports are in the forwarding state.
A blocking port is any port that is not a root or a designated port. A blocking port is in
the blocking state.
When determining both the root port and designated ports on non-root bridge switches, the
switches use the following criteria to select the port that is closest to the root bridge.
1. The port with the lowest cost to get back to the root bridge becomes the root or designated
port. Default IEEE port costs include the following:
o 10 Mbps = 1000
o 100 Mbps = 19
o 1 Gbps = 4
o 10 Gbps = 2
2. If two paths have the same cost, the bridge ID of the next switches in each path is
compared. The path with the switch with the lowest bridge ID becomes the path back to the
root. Remember that the bridge ID is composed of two parts:
o The priority number assigned to the switch.
o The MAC address used by the switch.
If the priority numbers are the same on both switches, the switch with the lowest MAC
address is the path back to the root.
3. If the switch has two ports that have the same cost back to the root (for example, if two
connections exist to the same switch), the port on the switch with the lowest port ID
becomes the designated port.
o The port ID is derived from two numbers: the port priority and the port number.
o The port priority ranges from 0-255, with a default of 128.
o The port number is the number of the port. For example, the port number for Fa0/3
is 3.
o With the default port priority setting, the lowest port number becomes the
designated port.
The biggest disadvantage of STP is that it is slow to respond to topology changes. With a link
failure, convergence could take up to 30 seconds. By optimizing switch settings, this delay could be
reduced to about 14 seconds, but even this was too long. To improve convergence, Cisco
introduced several new proprietary features which can reduce this time to about 1 second. These
features include the following:
Port Fast allows ports that do not have any switches attached to transition immediately to
the forwarding state. This transition is possible because if a port does not have a switch
attached, bridging loops on that port are eliminated.
Uplink Fast enables a switch to maintain an alternate path back to the root bridge. If the root
port or link goes down, the alternate port can be used to quickly re-establish communication
with the root bridge.
If all switches had the same priority value, then switch B would have been the root bridge
because its MAC address is the lowest. Changing the root bridge would also change several
other port states.
Changing the priority on switch D to 8192 would have the following effects:
o The root port on switch C would change to Fa0/1. The path through switch D would
be preferred over the path through switch B because of the lower priority number.
o The designated port for segment 5 would change to Fa0/2 on switch D, while Fa0/2
on switch B would be blocking.
o Fa0/2 on switch C would change to blocking.
Assuming the default cost value of 19 for FastEthernet links, changing the cost of segment 1
to 100 would have the following effects:
o The root port on switch D would be Fa0/2. The total cost of that path would be 38.
o The designated port for segment 4 would be Fa0/1 on switch C. Port Fa0/3 on switch
D would now be blocking.
o Port Fa0/1 on switch D would be blocking because Fa0/2 would be used to reach the
root bridge.
RSTP Facts
Rapid Spanning Tree Protocol (RSTP) is based on the 802.1w standard and provides faster
spanning tree convergence after a topology change. Enhancements added to RSTP to improve
convergence are similar to the Port Fast and Uplink Fast features introduced by Cisco. RSTP
operates much like STP with Cisco's enhancements. RSTP uses the following port states:
RSTP Port
State
STP Port
State*
Disabled
Blocking
Discarding
Listening
Description
A port in discarding state:
Learning
Learning
Forwarding
In addition to the port roles, RSTP uses the port type to determine whether to use advanced features
that provide rapid convergence. These port types are:
Port Type Description
A point-to-point link is a port that connects only to another switch.
Point-topoint
Edge
Because the edge port does not have a switch, the possibility of a loop is
eliminated.
Edge ports can be put into the forwarding state immediately.
An edge port is like Cisco's Port Fast feature for STP.
If the port receives a BPDU, it treats the port as a point-to-point or shared link.
Note: When any RSTP port receives legacy 802.1d BPDU, it falls back to legacy STP and the
inherent fast convergence benefits of 802.1w are lost when it interacts with legacy bridges.
However, this allows you to mix RSTP and STP in the same topology during a staged migration
without any problems.
Spanning Tree Mode
The Cisco 2960 switch supports these spanning-tree modes:
Mode
Description
Per-VLAN Spanning Tree Protocol (PVST+ or PVST) is a spanning-tree
mode based on the 802.1d standard and Cisco proprietary extensions. It is
the default spanning-tree mode used on all Ethernet port-based VLANs.
PVST+ characteristics include the following:
Per-VLAN Spanning
Tree Protocol
(PVST+ or PVST)
Multiple STP (MSTP) is the spanning tree mode based on the 802.1s
standard. With MSTP you can map multiple VLANs to the same spanningtree instance. MSTP characteristics include the following:
Multiple STP
(MSTP)
Note: You cannot run both MSTP and PVST+ or both MSTP and rapid
PVST+ at the same time.
Be aware of the following regarding spanning tree on a Cisco switch:
To optimize how spanning tree works when multiple VLANs exist, a switch runs multiple
instances of the spanning tree protocol.
o Each instance includes a single VLAN (each VLAN can be part of only one
spanning tree instance).
o Ports associated with a VLAN participate in the spanning tree instance assigned to
the VLAN. Because a port can only be a member of one VLAN, each port is
associated with only one instance of spanning tree.
o Each instance of spanning tree elects its own root bridge. A single switch might be
the root bridge for all spanning tree instances, or it might be the root bridge for only
one of the instances running on the switch.
By default, spanning tree is enabled with a single instance of the spanning tree protocol for
VLAN1. By default, all switch ports are members of VLAN1, therefore all ports participate
in spanning tree by default.
When you create a new VLAN, a new instance of spanning tree runs automatically.
You cannot disable spanning tree for a switch port. You can, however, disable it for an
entire VLAN or the entire switch. In practice, there are few reasons to do this as disabling
spanning tree makes bridging loops possible.
Modifying the spanning tree mode if a mode other than PVST+ is desired.
Changing the bridge priority to control which switch becomes the root bridge.
Designating edge ports (ports with no attached switches).
For PVST+, configuring UplinkFast if desired.
The following table lists commands you would use to configure spanning tree:
Command
Switch(config)#spanning-tree
mode pvst|rapid-pvst|mst
Switch(config)#spanning-tree
vlan <1-4094> root primary
Function
Sets the spanning tree mode.
Forces the switch to be the root of the spanning tree.
Switch(config)#spanning-tree
vlan <1-4094> priority <061440>
Switch(config-if)#spanningtree portfast
Switch(config)#spanning-tree
uplinkfast
Switch#show spanning-tree
EtherChannel
As you study this section, answer the following questions:
EtherChannel Facts
EtherChannel combines multiple switch ports into a single, logical link between two switches. With
EtherChannel:
Inter-VLAN Routing
As you study this section, answer the following questions:
What is required before members of two VLANs can communicate with each other?
Why doesn't trunking enable inter-VLAN communication?
What method is used to allow a single router to perform inter-VLAN routing using a single
physical interface?
What protocol do you configure on a router to enable inter-VLAN routing?
After finishing this section, you should be able to complete the following tasks:
The following commands configure a router with a single interface to perform inter-VLAN routing
for VLAN 1 and VLAN 20:
Router(config)#interface fa0/1
Router(config-if)#no ip address
Router(config-if)#interface fa0/1.1
Router(config-if)#description subinterface for VLAN 1
Router(config-if)#encapsulation dot1Q 1
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#interface fa0/1.20
Router(config-if)#description subinterface for VLAN 20
Router(config-if)#encapsulation dot1Q 20
Router(config-if)#ip address 192.168.2.1 255.255.255.0
You want to create an access list that restricts traffic from host 12.0.15.166. What type of
access list can you use?
You want to create an access list that restricts ICMP traffic. What type of access list would
you choose?
How many access lists can be applied to a single interface?
What is the last statement in every access list?
How is a wildcard mask related to the subnet mask?
What does a 0 in a wildcard mask indicate?
After finishing this section, you should be able to complete the following tasks:
Given a subnet address and mask, calculate the wildcard mask value to use in an access list
statement.
When you create an access list, it automatically contains a deny any statement, although this
statement does not appear in the list itself. For a list to allow any traffic, it must have at least one
permit statement, either permitting a specific traffic type or permitting all traffic not specifically
restricted.
There are two general types of access lists: basic and extended.
Use a standard list to filter on... Use an extended list to filter on...
Source hostname or host IP address Source IP protocol (i.e. IP, TCP, UDP, etc.)
00001010.00001100.00010000.00000000
Subnet mask
11111111.11111111.11111000.00000000
255.255.248.0
00000000.00000000.00000111.11111111
Notice how the bits in the wildcard mask are exactly opposite of the bits in the subnet mask.
Suppose an access list were created with a statement as follows:
access-list 12 deny 10.12.16.0 0.0.7.255
Suppose that a packet addressed to 10.12.16.15 was received. The router uses the wildcard mask to
compare the bits in the address to the bits in the subnet address.
Address Type
Decimal Values
Binary Values
Subnet address
10.12.16.0
00001010.00001100.00010000.00000000
Wildcard mask
0.0.7.255
00000000.00000000.00000111.11111111
Target address #1
10.12.16.15
00001010.00001100.00010000.00001111
mmmmmmmm.mmmmmmmm.mmmmmiii.iiiiiiii
address
m=match
i=ignored
x=doesn't match
In this example, all bits identified with a 0 in the wildcard mask must match between the address
and the network address. Any bit identified with a 1 is ignored. In this example, 10.12.16.15
matches the access list statement and the traffic is denied.
Now suppose that a packet addressed to 10.13.17.15 was received. The router uses the wildcard
mask to compare the bits in the address to the bits in the subnet address.
Address Type
Decimal Values
Binary Values
Subnet address
10.12.16.0
00001010.00001100.00010000.00000000
Wildcard mask
0.0.7.255
00000000.00000000.00000111.11111111
Target address #1
10.13.17.15
00001010.00001101.00010001.00001111
m=match
i=ignored
x=doesn't match
mmmmmmmm.mmmmmmmx.mmmmmiii.iiiiiiii
Notice that this address does not match the access list statement as identified with the wildcard
mask. In this case, traffic would be permitted.
Tip: If you use a table to help you identify subnet masks, be aware that the wildcard mask value is
one less than the magic number, as shown in the following table:
Bits in the mask
Magic number
128 64 32 16 8
Decimal mask value 128 192 224 240 248 252 254 255
Wildcard mask value 127 63 31 15 7 3 1 0
The access list statement includes the access list number. The type of list (standard or
extended) is indicated by the access list number. Use the following number ranges to define
the access list:
o 1-99 = Standard IP access lists
o 100-199 = Extended IP access lists
A single access list can include multiple access list statements. The access list number
groups all statements into the same access list.
List statements include an action, either permit or deny.
To identify a host address in the access list statement, use the following formats:
n.n.n.n
n.n.n.n 0.0.0.0
OR host n.n.n.n
Where n.n.n.n is the IP address of the host.
To identify a network address, use the format:
n.n.n.n w.w.w.w
Where n.n.n.n is the subnet address and w.w.w.w is the wildcard mask.
Enter access list statements in order, with the most restrictive statements at the top. Traffic
is matched to access list statements in the order they appear in the list. If the traffic matches
a statement high in the list, subsequent statements will not be applied to the traffic.
Each access list has an implicit deny any statement at the end of the access list. Your access
list must contain at least one allow statement, or no traffic will be allowed.
When you remove an access list statement, the entire access list is deleted. Use Notepad or
another text editor to construct and modify access lists, then paste the list into the router
console.
A single access list can be applied to multiple interfaces.
Extended access lists include a protocol designation (such as IP, TCP, or UDP). Use IP to
match any Internet Protocol (including TCP and UDP). Use other keywords to match
specific protocols.
Newer routers include an access list command prompt mode.
o Before you can enter access list statements, you must first enter the configuration
mode for access lists. For example, typing ip access-list standard 3 creates the
o
o
standard IP address list number 3, and changes the router prompt to: Router(configstd-nacl)#
In access list mode, you can use a sequence number to identify the order of access
list statements.
Removing an access list statement removes only that statement, not the entire access
list.
Examples
The following commands create a standard IP access list that permits all outgoing traffic except the
traffic from network 10.0.0.0, and applies the list to the Ethernet0 interface.
Router(config)#access-list 1 deny 10.0.0.0 0.255.255.255
Router(config)#access-list 1 permit any
Router(config)#int e0
Router(config-if)#ip access-group 1 out
The following commands create a standard IP access list that rejects all traffic except traffic from
host 10.12.12.16, and applies the list to the Serial0 interface.
Router(config)#access-list 2 permit 10.12.12.16
Router(config)#int s0
Router(config-if)#ip access-group 2 in
The following commands create an extended IP access list that rejects packets from host 10.1.1.1
sent to host 15.1.1.1, and applies the list to the second serial interface.
Router(config)#access-list 101 deny ip 10.1.1.1 0.0.0.0 15.1.1.1 0.0.0.0
Router(config)#access-list 101 permit ip any any
Router(config)#int s1
Router(config-if)#ip access-group 101 in
The following commands create an extended IP access list that does not forward TCP packets from
any host on network 10.0.0.0 to network 11.12.0.0, and applies the list to the first serial interface.
Router(config)#access-list 111 deny tcp 10.0.0.0 0.255.255.255 11.12.0.0
0.0.255.255
Router(config)#access-list 111 permit ip any any
Router(config)#int s0
Router(config-if)#ip access-group 111 in
The following commands create a standard access list that allows VTY lines 0-4 access only from
the internal network of 192.168.1.0/24:
Router(config)#access-list 12 permit 192.168.1.0 0.0.0.255
Router(config)#line vty 0 4
Router(config-line)#access-class 12 in
Use...
show run
All access lists that exist on the router
show access-lists
All access lists applied to an interface
show ip int
show run
show log
show run
show ip access-lists
How do you identify where to place an access list (on a specific router, a specific interface,
and a specific direction)?
Why should each access list contain at least one allow statement?
After finishing this section, you should be able to complete the following tasks:
The access list is applied to traffic with a specific direction (either in or out).
Each interface can only have one inbound and one outbound access list for each protocol.
This means that an interface can have either a standard inbound or an extended inbound IP
access list, but not both.
You can have two access lists for the same direction applied to an interface if the lists
restrict different networking protocols. For example, you can have one outbound IP access
list and one outbound IPX access list.
When constructing access lists, place the most restrictive statements at the top. Traffic is
matched to access list statements in the order they appear in the list. If traffic matches a
statement high in the list, subsequent statements will not be applied to the traffic.
Each access list has an implicit deny any statement at the end of the access list. Your access
list must contain at least one allow statement, or no traffic will be allowed.
As a general rule, apply extended access lists as close to the source router as possible. This
keeps the packets from being sent throughout the rest of the network.
As a general rule, apply standard access lists as close to the destination router as possible.
This is because standard access lists can only filter on source address. Placing the list too
close to the source will prevent any traffic from the source from getting to any other parts of
the network.
When making placement decisions, carefully read all access lists statements and
requirements. Identify blocked and allowed traffic, as well as the direction that traffic will
be traveling. Place the access list on the interface where a single list will block (or allow) all
necessary traffic.
TCP/IP Ports
Network ports are logical connections, provided by the TCP or UDP protocols at the Transport
layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses
port numbers to determine what protocol incoming traffic should be directed to. Some
characteristics of ports are listed below:
Ports allow a single host with a single IP address to run network services. Each port number
identifies a distinct service.
Each host can have over 65,000 ports per IP address.
Port use is regulated by the Internet Corporation for Assigning Names and Numbers
(ICANN).
Dynamic
(Private or
High)
Characteristics
ICANN can assign a specific port for a newly created network service
Port numbers range from 1024 to 49151
Assigned when a network service establishes contact and released when the
session ends
Allows applications to 'listen' to the assigned port for other incoming requests
(traffic for a protocol can be received through a port other than the port which
the protocol is assigned, as long as the destination application or service is
'listening' for that type of traffic on that port)
Port numbers range from 49,152 to 65,535
The following table lists the well known ports that correspond to common Internet services.
Protocol(s) Port(s) Service
TCP
TCP
UDP
22
TCP
UDP
23
Telnet
TCP
UDP
25
TCP
UDP
53
UDP
UDP
69
TCP
80
TCP
110
TCP
119
UDP
123
NTP
TCP
143
UDP
TCP
UDP
TCP
UDP
389
TCP
443
Note: When creating access lists, allow only the port numbers that correspond to the services
running on the servers.
Routing Protocols
As you study this section, answer the following questions:
In this course, you will learn about the following interior gateway protocols:
Because routers using the distance vector method send their entire routing table at specified
intervals, they are susceptible to a condition known as a routing loop (also called a count-to-infinity
condition). Like a bridging loop, a routing loop occurs when two routers share different
information. The following methods can be used to minimize the effects of a routing loop.
Method
Split horizon
Characteristics
Using the split horizon method (also called best information), routers keep track of
where the information about a route came from. Routers do not report route
information to the routers on that path. In other words, routers do not report
information back to the router from which their information originated.
Split horizon
with poison
reverse
Using the split horizon with poison reverse method (also called poison reverse or
route poisoning), routers continue to send information about routes back to the next
hop router, but advertise the path as unreachable. If the next hop router notices that
the route is still reachable, it ignores the information. If, however, the path timeout
has been reached, the route is immediately set to unreachable (16 hops for RIP).
Convergence happens faster with poison reverse than with simple split horizon.
However, it results in greater network traffic because the entire table is broadcast
each time an update is sent.
Triggered
updates
With the triggered update method (also known as a flash updates), routers that
receive updated (changed) information broadcast those changes immediately rather
than waiting for the next reporting interval. With this method, routers broadcast
their routing tables periodically, punctuated by special broadcasts if conditions have
changed. This method reduces the convergence time.
Hold-downs
With the hold-down method, routers will, for a period of time, "hold" an update that
reinstates an expired link. The time period typically reflects the time required to
attain convergence on the network.
The hold-down timer is reset when the timer runs out or when a network change
occurs.
Stable and proven method (distance vector was the original routing algorithm)
Easy to implement and administer
Bandwidth requirements negligible for a typical LAN environment
Requires less hardware and processing power than other routing methods
Routers broadcast Link-State Packets (LSPs) to all routers (this process is known as
flooding).
Routers send information about only their own links.
Link-state protocols send hello packets to discover new neighbors.
LSPs are sent at regular intervals and when any of the following conditions occur.
o There is a new neighbor.
o A neighbor has gone down.
o The cost to a neighbor has changed.
Neighboring routers exchange Link-state Advertisements (LSAs) to construct a topological
database.
The Shortest Path First (SPF) algorithm is applied to the topological database to create an
SPF tree from which a table of routing paths and associated ports is built.
Routers use LSPs to build their tables and calculate the best route.
Routers use the SPF algorithm to select the shortest route.
Network administrators have greater flexibility in setting the metrics used to calculate
routes.
The link-state method has the following advantages over the distance vector method.
Although more stable than the distance vector method, the link-state method has the following
problems:
The link-state algorithm requires greater CPU and memory capability to calculate the
network topology and select the route because the algorithm re-creates the exact topology of
the network for route computation.
It generates a high amount of traffic when LSPs are initially flooded through the network or
when the topology changes. However, after the initial configuration occurs, the traffic from
the link-state method is smaller than that from the distance vector method.
It is possible for LSPs to get delayed or lost, resulting in an inconsistent view of the
network. This is particularly a problem for larger networks, if parts of the network come on
line at different times, or if the bandwidth between links varies (i.e. LSPs travel faster
through parts of the network than through others).
In particular, the last problem is of greatest concern. The following solutions are often implemented
to overcome some of the effects of inconsistent LSP information.
RIP
As you study this section, answer the following questions:
What are the differences between RIP version 1 and RIP version 2?
What is the metric used with RIP? What is the maximum metric value?
Can RIP v2 do load balancing across multiple paths? If so, what are the limitations?
How does RIP v2 perform auto-summarization?
After finishing this section, you should be able to complete the following tasks:
Enable IP routing.
Configure RIP networks.
RIP Facts
The Routing Information Protocol (RIP) is a simple, effective routing protocol for small- to
medium-sized networks. Be aware of the following facts about RIP:
Note: Because RIP uses the hop count in determining the best route to a remote network, it might
end up selecting a less than optimal route. For example, suppose that two routes exist between two
networks. One route uses a 56 Kbps link with a single hop, while the other route uses a Gigabit link
that has two hops. Because the first route has fewer hops, RIP will select this route as the optimal
route.
RIP Command List
The Routing Information Protocol (RIP) is a simple, effective routing protocol for small- to
medium-sized networks. By using a routing protocol, routers automatically share route information,
reducing the amount of administration required for maintaining routes between networks.
To . . .
Enable IP routing for the entire router. IP routing is enabled
Router(config)#ip routing by default. Use this command only if it has been disabled.
Use the no ip routing command to disable routing.
Enter router RIP configuration mode.
Router(config)#router rip Use the no router rip command to disable rip, removing all
defined networks.
Router(configEnable RIP version 2 on the router.
router)#version 2
Identify networks that will participate in the router protocol.
Notice that you identify networks, and not interfaces.
When you use the network command to identify the
networks that will participate in RIP routing, follow these
rules.
Router(configrouter)#network <address>
Router(config-router)#no
auto-summary
Router#show ip route
Example
The following commands enable IP routing and identify two networks that will participate in the
RIPv2 routing protocol.
Router(config)#ip routing
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 10.0.0.0
Router(config-router)#network 192.168.10.0
OSPF
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
OSPF Facts
The Open Shortest Path First (OSPF) routing protocol is a robust link state routing protocol wellsuited for large networks. OSPF:
can think of the backbone as the "master" or "root" area. Its address is always
0.0.0.0. All OSPF networks must have a backbone area.
A stub area is an area with a single path in to and out of the area.
To help minimize traffic caused by routing updates, OSPF defines the following router roles:
Role
Description
On each subnet, a single OSPF router is elected as the designated router (DR).
The DR is responsible for coordinating routing table updates for all routers on
the subnet.
Designated Router
(DR)
Backup Designated On each subnet, a single OSPF router is identified as the backup designated
Router (BDR)
router (BDR). The BDR becomes the DR if the DR becomes unavailable.
DROTHER
Based on the network link type, a DR/BDR might not be used. A DR/BDR is used on
broadcast networks (like Ethernet) where multiple routers exist on the same subnet. For
point-to-point networks, a DR/BDR is not used. By default, the network type is identified
based on the media type used. You can manually configure the network type if desired.
If the network type uses a DR/BDR, a single DR and a single BDR is identified for each
subnet.
When routers first come on line, they exchange hello packets. Part of this process is used to
elect (identify) the DR and the BDR.
The following values are used to elect the DR and BDR:
o The router with the highest OSPF priority becomes the DR. The priority value is a
number between 0-255. By default, all routers have a priority of 1.
o If two or more routers have the same highest priority value, the router with the
highest router ID becomes the DR. The router ID is a 32-bit number expressed in
A.B.C.D format. The router ID for a specific router is chosen in the following order:
1. For a specific OSPF process, you can manually configure a router ID. If a
router ID has been configured, that value is used.
2. If no router ID has been manually configured, the system uses the highest IP
address assigned to a loopback address.
3. If the router does not have a loopback address, the router ID is the highest IP
address assigned to any interface in the up state.
Note: Using a loopback address is preferred over using the interface IP address
because it allows you to control which router becomes the DR, and because
loopback interfaces never go down. If an interface address is used for the router ID,
the router ID might change if that interface goes down.
o In most cases, the BDR is the router with the next highest priority or router ID.
Configuring a priority of 0 for a router means that the router will never become the DR or
BDR.
Once a DR has been elected, it remains the DR, even if another router with a higher priority
or router ID comes on line. You must clear or reset the OSPF process to force a new
election.
If the DR goes down, the BDR automatically becomes the DR. When the original DR
comes back on line, it will not automatically resume the DR role unless a reset is performed.
OSPF routers share route information only with adjacent neighbor routers. The following
conditions must be met for two routers to become fully adjacent:
Both routers must be on the same subnet and use the same subnet mask.
Both routers must have the same hello and dead intervals configured.
o The hello interval identifies how frequently neighbor routers exchange hello
packets.
o The dead interval identifies the amount of time to allow without an expected hello
packet. If a periodic hello packet has not been received within the dead interval, the
router assumes that its neighbor has gone offline.
Both routers must use the same OSPF area.
If authentication is required, both routers must pass the authentication requirements.
The stub area flag (value) for each router must match.
Router(config)#router ospf
process-id
Purpose
Use to enter configuration mode for OSPF.
The process ID identifies a separate routing process
on the router. Note: Process IDs do not need to
match between routers (in other words, two routers
configured with different process IDs might still
share OSPF information).
Router(config-router)#network
a.b.c.d w.w.w.w area number
Router(config-router)#routerid a.b.c.d
Router(config)#interface
ethernet0/1
Router(config-if)#ip ospf
priority <0-255>
Router(config)#interface
loopback0
Router(config-if)#ip address
a.b.c.d m.m.m.m
Example
The following graphic shows a sample network with two OSPF areas.
router ospf 2
network 10.1.16.1 0.0.0.0 area 1
network 10.2.0.1 0.0.0.0 area 1
PHX
router ospf 1
network 10.1.32.0 0.0.15.255 area 1
network 10.3.0.0 0.0.255.255 area 1
The process ID on each router does not have to match. OSPF uses areas to identify sharing
of routes, not the process ID.
You can use the subnet address with the appropriate wildcard mask (as in 10.1.16.0
0.0.15.255), or you can use the IP address of the router interface with a mask of 0.0.0.0.
The network command identifies the subnet, wildcard mask, and the OSPF area of the
subnet. A subnet can only be in one area.
EIGRP
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
EIGRP Facts
Enhanced IGRP is a Cisco-proprietary balanced hybrid routing protocol that combines the best
features of distance vector and link state routing. EIGRP:
Sends the subnet mask in the routing update. It supports route summarization and VLSM.
Supports automatic classful route summarization at major network boundaries (this is the
default in EIGRP). Unlike IGRP and RIP, manual route summarization can also be
configured on arbitrary network boundaries to reduce the routing table size.
Is not susceptible to routing loops. Instead, EIGRP uses built-in loop avoidance techniques.
Under certain conditions, EIGRP will use split horizon, but not hold downs or flush timers.
Is scalable and does not have the 16 hop limitation of RIP.
Uses hello packets to discover neighbor routers. Hello intervals on EIGRP routers do not
need to match.
Exchanges the full routing table at startup, and then partial routing updates thereafter.
Uses unicasts or multicasts to 224.0.0.10 for routing updates. Hello packets always use the
multicast address.
Uses bandwidth, delay, reliability, and load for the route metric. The metric is expressed as
the number of microseconds.
o The degree to which each value is used to calculate the metric can be customized by
modifying one of five K values.
o By default, K1 and K3 are set to 1, while K2, K4, and K5 are set to 0. These settings
mean that with the default configuration, only delay and bandwidth have an effect
on the metric.
o On serial links, a default bandwidth of 1544 is used. EIGRP does not detect the
actual bandwidth on the link. You must manually configure bandwidth values for
accurate metric calculations.
Uses an autonomous system (AS) number to identify routers that are to share EIGRP
information. The AS number on both routers must match.
Maintains partial network topology information in addition to routes.
Supports load balancing on equal-cost and unequal cost links. This means that EIGRP can
keep multiple paths to a single network, even if they have a different cost. With IOS 12.4
and above, EIGRP supports up to 16 paths (earlier versions supported up to 6), with the
default being 4 equal-cost paths.
Minimizes network bandwidth usage for routing updates. During normal operation EIGRP
transmits only hello packets across the network. EIGRP does not send periodic routing
updates like RIP and IGRP. When change occurs, only routing table changes are propagated
in EIGRP not the entire table.
Requires less processing and memory than link state protocols.
Converges more quickly than distance vector protocols. In some cases, convergence can be
almost instantaneous because an EIGRP router stores backup routes for destinations. If no
appropriate route or backup exists in the routing table, EIGRP will query neighbor routers
to discover an alternate route. In this manner, EIGRP can quickly adapt to alternate routes
when changes occur.
Uses the DUAL link-state algorithm for calculating routes.
Supports multiple protocols. EIGRP can exchange routes for IP, AppleTalk and IPX/SPX
networks.
Uses a neighbors table to keep track of neighbor routers. The neighbors table includes the
following for each neighbor:
o A hold time. Each hello packet includes a hold time that identifies how long the
hello information is valid. If the hold time expires without receipt of a hello packet,
the neighbor is assumed to be unreachable.
o Round-trip timers that help the router identify cost values to reach the neighbor
router.
Uses a topology database to keep track of all known networks.
o The topology table has a list of each destination network and all neighbor routers
that reported routes to that network.
o The best routes that will be used for routing packets are copied from the topology
table into the routing table.
o The topology table holds up to 16 known routes (previously up to 6 before IOS
version 12.4).
To understand how EIGRP can provide load balancing and fast recovery for failed links, you need
to understand the following concepts:
Term
Definition
Advertised
The advertised distance (AD) is the cost to the destination network as reported by
Distance (AD) the neighbor router. The AD is also called the reported distance (RD).
The feasible distance (FD) is the lowest total cost to a destination network. The
feasible distance is identified for each destination network, and is determined as
follows:
Feasible
Distance (FD)
1. For each neighbor, a total cost to the network through the neighbor is
calculated by adding the AD to the cost required to reach the neighbor
router (the cost of the link used to reach the neighbor router).
2. The router compares the total cost of all routes. The lowest total cost to the
destination network is the feasible distance to the network.
Note: Sometimes the total cost for each neighbor route is referred to as a feasible
distance. However, the term more correctly identifies the lowest known cost to the
network, not the total cost for each reported (possible) route.
A successor is the route to a destination network with the lowest total cost.
Successor
When a new route is first learned, the total cost to the successor route is
used as the feasible distance to that network.
The successor route is copied from the topology table into the routing table.
You can have multiple successor routes if multiple routes to the same
network exist with the same lowest metric.
Satisfying the AD < FD condition ensures that the route is loop free. In
other words, the router knows for sure that the route does not include itself
in the path if the AD is lower than the FD. Note: Successor routes must also
meet this condition.
Feasible successor routes are kept in the topology table but are not copied to
the routing table.
Successor routes can also be classified as feasible successor routes.
When all successor routes to a network are lost, the router can immediately
begin to use the next best feasible successor route. This provides for rapid
recovery in the event of a topology change.
All known routes to a destination are kept in the topology table. Only successor routes are
copied to the routing table.
If the successor route goes down and there are no feasible successors, routes whose
advertised distance is greater than the feasible distance for the route are not used because
they might be routes that include loops.
When the last feasible successor route to a network is lost, the router recalculates all routes
for the lost neighbor. Instead of using other routes that are not feasible successor routes, it
first communicates with neighbor routers. If necessary, the router recalculates the feasible
distance for the route.
A route whose AD is greater than the FD does not prove that a loop exists, only that a loop
might exist. After the last feasible successor route is lost, a previously unacceptable route
could be identified as a feasible successor route as long as its AD is less than the newlycalculated FD.
By default, EIGRP uses equal-cost load balancing. To use unequal-cost load balancing,
configure the variance value. The variance is a multiplier that identifies the degree to which
alternate paths can be used.
o The variance value ranges from 1 to 255.
o The default variance is 1, meaning that only routes that match the best route can be
used.
o Setting the variance to 2 allows alternate routes to be used whose total costs are
within a factor of 2 (double or less) of the best cost route.
o Only feasible successor routes can be used. This means that a route whose AD is
greater than the FD cannot be used as an alternate route, even if its total cost is
within the variance amount.
For an EIGRP router to share information with a neighbor, the following conditions must be met:
Both routers are on the same subnet with the same subnet mask.
If used, authentication checks must pass.
Both routers must be configured with the same AS number.
Metric weight values (K values) must match on both routers.
EIGRP Command List
You configure EIGRP just the same as you would configure IGRP. The following table lists
the applicable commands.
Command
Router(config)#router
eigrp number
Function
Defines an EIGRP process.
The number must match between routers for information to be
shared.
Router(configrouter)#network n.n.n.n
Router(configrouter)#network n.n.n.n
w.w.w.w
Router(config-router)#no
auto-summary
Example
The following commands enable EIGRP on a router and define three networks that
participate in the routing process.
Router(config)#router eigrp 2
Router(config-network)#network 172.16.1.0 0.0.0.255
Router(config-network)#network 172.16.2.0 0.0.0.255
Router(config-network)#network 172.16.3.0 0.0.0.255
Command
show ip route
Features
View EIGRP-learned routes.
show eigrp
neighbors
View neighboring routers from which EIGRP routes can be learned. Lists the
IP address of the connected router.
show eigrp
interfaces
View the interfaces that are running EIGRP and the number of connected
routers.
Which routing protocols support route summarization and variable length subnet masks
(VLSM)?
Which routing protocols are public-standard protocols?
Which routing protocol uses areas for configuration?
Which routing protocol uses wildcard masks for configuration?
If a router learns of a route to network B through both EIGRP and OSPF, which route will it
prefer?
Characteristic
Routing method
RIP
Distance vector
OSPF
Link state
EIGRP
Balanced hybrid
Public standard
Yes
Yes
No
Metric
Hop count
Link cost
Bandwidth and
delay
VLSM support
Classless routing
Sends mask in updates
Version 2 only
Yes
Yes
Route summarization
Automatic and
manual, version 2
only
Automatic and
manual
Convergence time
Slow
Fast
No
Yes
Yes
Yes
No
No
Loop avoidance
Partial network
topology
Low
Can be high
Yes
No
No
Yes
Optional
Version 1 uses
broadcasts
Version 2 uses
multicasts to
224.0.0.9
Multicast to
224.0.0.10 for
hello packets
Unicast for
updates
*Note: Summarization with OSPF is only possible on area border routers (ABR) and
autonomous system border routers (ASBR). This means that you need multiple areas before
you can do route summarization with OSPF.
Administrative Distance
0
Static route
90
IGRP
100
OSPF
110
RIP
120
170
Note: You can modify how routes are selected by modifying the administrative distance associated
with a source.
Routers can learn about routes to other networks using multiple routing protocols. In addition, there
might be multiple paths between any two points. When making routing decisions, the router uses
the following criteria for choosing between multiple routes:
1. If a router has learned of two routes to a single network through different routing protocols
(such as RIP and OSPF), it will choose the route with the lowest administrative distance
(OSPF in this example).
2. If a router has learned of two routes through the same protocol (for example two routes
through EIGRP), the router will choose the route that has the best cost as defined by the
routing metric (for EIGRP the link with the highest bandwidth and least delay will be used).
Troubleshooting Routing
As you study this section, answer the following questions:
The show ip route command on a router does not show two directly-connected networks.
What conditions might be causing this problem?
When might static routes configured on a router not show in the routing table?
What does an asterisks ( * ) next to a route in the routing table indicate?
How can you tell how many paths a routing protocol can use for load balancing?
For the show ip protocols command, what does the Routing for Networks section
indicate?
Why might subnetted routes be missing from the routing table? Which settings control this
behavior?
Description
A route to every directly-connected network should appear in the routing table.
If a directly-connected network is missing, check the following:
Missing
connected route
Verify the operational status of the interface. Make sure that the interface
has not been shut down, and that you have Layer 1 and Layer 2
connectivity.
Verify the TCP/IP configuration for the interface. The interface must be
assigned an IP address before its network will show in the routing table.
Static routes appear in the routing table only if the interface used to reach the
next hop router is up and has been assigned an IP address. If a static route is
missing:
Missing static
route
Verify that the interface used to reach the next hop router has an entry as
a directly-connected network.
Verify that the static route was configured properly (with the correct out
interface or with a next hop router that is on the same subnet as an
interface that is up).
Note: Simply having a route labeled as a candidate for the default route (with the
asterisks * ) does not ensure that the default route is correctly configured. The
gateway of last resort entry must indicate the route and next hop router to be
valid.
If a route that should be learned from a routing protocol is missing, begin by
verifying that the interface used to learn the route has a directly-connected entry
in the routing table. If not, then troubleshoot the directly-connected routing table
entry first. If this entry exists, then the most likely problem is a misconfiguration
in the routing protocol at one or more of the routers. The exact parameters to
examine depend on the routing protocol.
Missing route
learned through a
routing protocol
For all routing protocols, verify that the correct network statements have
been configured. The router uses the network statements to identify the
network information to share with other routers, as well as the interfaces
on which to send and receive routing information. Verify that IP
addresses have been correctly configured for each interface.
If network information is being shared with neighbor routers, but routes
are not being learned from routers accessible on that interface, check for
a passive-interface statement. This configuration prevents routing
updates from being sent or received on that interface.
For RIP, verify that all routers are using the correct version. A missing
version statement indicates that the router is using version 1.
For OSPF, make sure that the network statements on each router use the
same area number. The process ID for the router section does not have
to match between routers.
For OSPF, make sure that the same hello and dead timer intervals are
used. Hello intervals do not need to match on EIGRP routers.
For EIGRP, make sure that the AS number for the router eigrp section
matches on both routers.
If specific routes have been replaced by summarized routes on RIP or
EIGRP, remove the auto-summary entry to prevent automatic
summarization.
For EIGRP and OSPF, verify that authentication settings match on all
routers.
If multiple routing protocols are being used, be aware that the route with
the lowest administrative distance will be used. This means that an
EIGRP route might replace a RIP or OSPF route.
Entry
Description
The command will show each routing process running on the router as a
separate section.
Routing Protocol
For OSPF, the entry includes the process ID defined with the router
ospf command.
For EIGRP, the entry includes the autonomous system number defined
with the router eigrp command.
You might have multiple OSPF or EIGRP sections if you have defined
multiple process or AS numbers. All RIP information is in a single
section.
The maximum path entry identifies the maximum number of paths that can be
used for load balancing.
Maximum path
Routing for
Networks
Routing
Information
Sources
Automatic
network
summarization
For RIP and EIGRP, the Automatic network summarization line indicates the
presence of the auto-summary parameter in the configuration file.
The Passive Interface(s) section lists the interfaces that are excluded from
Passive Interfaces sending and receiving routing updates. Interfaces in this section correspond to
the passive-interface entries in the configuration file.
Additional information depends on the routing protocol:
Additional
information
For OSPF, you can view the current router ID and the number of areas.
For RIP, you can view update intervals and the RIP version in use (see
the Default version control line).
For EIGRP, you can view the variance setting and the K values.
When routes are advertised with a neighbor router connected to the Ser0/1/0 interface, the
10.0.1.0/24 and 10.0.2.0/24 routes are not summarized. This is because the Ser0/1/0
interface is in the same classful network as the Fa0/0 and Fa0/1 interfaces.
When advertising routes to a neighbor on Ser0/1/1, all other routes will be summarized as
10.0.0.0/8.
When using multiple routing protocols to share routes about the same networks, you might
lose specific routes if those routes are included in summarized routes and if the source of
the routing information is preferred.
Troubleshooting RIP
After finishing this section, you should be able to complete the following tasks:
Interpret the output of the debug ip rip command to troubleshoot RIP routing.
Verify the RIP configuration of a network and correct any problems to restore full
connectivity.
RIP Debugging
You should be familiar with the RIP routing update sequences and messages. From the output of a
debug ip rip command, you should be able to identify the consequences of the various messages.
Listed below is sample output from the debug ip rip command.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Meaning
This line identifies the router and the interface where RIP updates are received. In
this example, the router is connected to two other routers:
1, 8
Indented below each RIP line are the specific routing entries that are received. This
example shows the following routes received:
2-3, 9-10
The hop count shown in the received route will be the metric used when the route is
placed in the routing table of the local router.
4, 11
This line identifies the interface on which RIP updates are sent. In this example, the
following interfaces have been enabled to share RIP information:
This means that the following commands have been entered on the router:
router rip
network 192.168.1.0
network 192.168.2.0
Notice that updates for version 2 are sent to the multicast address of 224.0.0.9.
Indented below the RIP line are the entries that are shared with other routers. Be
aware of the following items:
5-7, 12-14
Before sending the information, the router increments the hop count. To
identify the hop count in the local routing table, subtract 1 from the sent hop
count.
Line 7 (network 192.168.5.0) is advertised as inaccessible (16 hops). This is
because the local router has a hop count of 15 for that network. 16 hops is the
maximum hop count for RIP.
For comparison, here's how the routing table of the local router would appear:
R
C
C
R
R
R
Inaccessible routes
Mismatched RIP versions (one router using version 1, with another router using version 2)
Routes not being advertised as expected (caused by missing network statements)
R2
R3
Fa0/0
192.168.1.0/25
Fa0/1
192.168.1.128/25
S0/1/1
172.17.0.0/30
S0/1/0
172.17.0.0/30
Fa0/0
192.168.2.0/26
Fa0/1
192.168.2.128/26
S0/1/1
172.18.0.64/30
S0/1/0
172.18.0.64/30
Fa0/0
192.168.3.0/27
Fa0/1
192.168.3.128/27
For each scenario, one or more routers have been misconfigured. Your job is to diagnose and fix
the problem.
In each case, begin by verifying the problem. From router R1, ping the R3 Fa0/0 interface. The
following commands may be useful in identifying the problem.
ping or traceroute
show ip route
show ip protocols
sh int/sh ip int
show controllers
sh run (Note: While you could probably catch most problems by just examining the
running-config, you should be able to troubleshoot the problem without using this command
at all.)
For example, one way to use the sh ip route command in troubleshooting is to view the routing
table for each router, identifying which networks are missing from the routing table. Based on the
missing networks, you can then examine the configuration of specific routers to identify the
problem.
Troubleshooting OSPF
After finishing this section, you should be able to complete the following tasks:
Both routers must be on the same subnet and use the same subnet mask.
Both routers must have the same hello and dead intervals configured.
Both routers must use the same OSPF area.
If authentication is required, both routers must pass the authentication requirements.
Both routes must be using the same area type (stub area flag).
Note: The process ID used when configuring OSPF does not need to match between routers.
The following table lists some commands that are useful in monitoring and troubleshooting OSPF.
Command
show ip
protocols
Function
Use show ip protocols to view OSPF configuration information such as:
The process ID
The local router ID and its role (such as DR or BDR)
Configured areas
Use show ip ospf interface to view interfaces that are running OSPF
including the following information:
show ip ospf
interface
debug ip ospf
events
Most error messages shown in the debug output adequately describe the nature of the problem.
Shown below are some errors that display with the debug ip ospf events command:
Error
Meaning
Troubleshooting EIGRP
After finishing this section, you should be able to complete the following tasks:
Both routers must be on the same subnet with the same subnet mask.
If used, authentication checks must pass.
Both routers must be configured with the same AS number.
Metric weight values (K values) must match on both routers.
Function
Use show ip protocols to view:
show ip
protocols
Note: In the labs, this is the only listed troubleshooting command that has
been enabled.
show ip eigrp Use show ip eigrp interfaces to view interfaces that are sending and
interfaces
receiving EIGRP updates. Passive interfaces will not be shown.
Use show ip eigrp neighbors to view the following information for neighbor
routers:
show ip eigrp
neighbors
IP address
Local interface to reach the neighbor router
Use show ip eigrp topology to view the contents of the topology table for
EIGRP. Information for each known network includes:
show ip eigrp
topology
Show ip eigrp topology only shows feasible success routes (routes whose
AD is less than the network FD). To view all routes, including those that did
not qualify as feasible successor routes, use show ip eigrp topology all-links.
The following example shows some sample output from the show ip eigrp topology all-links
command.
Router# show ip eigrp topology all-links
IP-EIGRP Topology Table for process 77
Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,
r - Reply status
P 172.16.90.0 255.255.255.0, 2 successors, FD is 46251776
via 172.16.80.28 (46251776/46226176), Ethernet0
via 172.16.81.28 (46251776/46226176), Ethernet1
via 172.16.80.31 (46277376/46251000), Serial0
P 172.16.81.0 255.255.255.0, 1 successors, FD is 307200
via 172.16.82.28 (307200/281600), Ethernet1
via 172.16.80.28 (308500/281600), Ethernet0
via 172.16.80.31 (332800/307900), Serial0
Important items in the command output are explained in the following table:
Information
Description
Each destination network is indicated by a subsection in the command output. For
example, the route 172.16.90.0 has the following information:
Destination
network
P = The computational status of the route. A status of P means that the route
has been calculated and the router is not waiting for information or
calculating information for the route. A passive state indicates a converged
route.
Network address and mask
2 successors = the number of successor routes to that network. Successor
routes are the best feasible successor routes. Successor routes meet the
following conditions:
o Their advertised distance (AD) is less than the feasible distance for
the network.
o Their total cost is the lowest of the total cost for all feasible successor
routes.
FD is 46251776 = The feasible distance (FD) to the network. The FD for the
network is the lowest total cost of all routes to the destination network at the
time that routes were calculated.
Known routes to the destination are identified by the via entries. For example, the
first route for network 172.16.90.0 shows the following information:
Known routes
Successor
routes
Feasible
successor
routes
Ethernet0 = The local router interface used to reach the next hop router.
Successor routes are identified by taking the number of successors and counting
down the list of known routes. In this example for network 172.16.90.0, there are 2
successors, meaning that 172.16.80.28 and 172.16.81.28 are both successor routes.
Feasible successor routes are additional routes that match the following
requirement:
The AD for the route must be lower than the FD for the network.
Note: Any route that matches this condition is called a feasible route. This includes
those routes that are the successor routes (a successor route is a feasible route, but
not every feasible route is a successor route).
This requirement ensures that the route is loop free. For network 172.16.90.0, all
three routes listed are feasible routes because their AD cost is less than 46251776.
For network 172.16.81.0, the last route is not a feasible successor route because its
AD (307900) is greater than the FD for the route (307200). Note: This last route
would not have shown if the show ip eigrp topology command was used without
the all-links parameter.
Provide error detection but not error recovery. It is up to end devices to request a
retransmission of lost packets.
Can provide data transfer up to 1.54 Mbps.
Have a variable packet size (called a frame).
Can be used as a backbone connection to LANs.
Can be implemented over a variety of connection lines (56K, T-1, T-3).
Operate at the Physical and Data Link layers of the OSI model.
When you sign up for Frame Relay service, you are assigned a level of service called a Committed
Information Rate (CIR). The CIR is the maximum guaranteed data transmission rate you will
receive on the Frame Relay network. When network traffic is low, you will likely be able to send
data faster than the CIR. As network traffic increases, priority is given to data coming from
customers with a higher CIR, and the effective rate may drop. In any case, you are guaranteed to
have at least the amount of bandwidth specified by the CIR.
You should be familiar with the following concepts about how Frame Relay networks send data.
The Forward Explicit Congestion Notification (FECN) bit is set as packets are
forwarded to the destination. This lets the receiving device know that the packet has
experienced congestion along the path.
The action devices take in response to these messages depends on the upper-layer protocol
configuration. However, a common response to a BECN message is to slow the rate of data
transmissions. A common response to a FECN message might be to slow the rate of data
requests.
Frame Relay Addressing Facts
Most Frame Relay installations involve connecting to a Frame Relay network through a T-1 line.
The router connects to a CSU/DSU, which is connected to the Frame Relay network. The Frame
Relay network is made up of multiple switches for moving packets. You should be aware of the
following Frame Relay concepts:
Concept
Description
Like an Ethernet MAC address, a DLCI identifies each virtual circuit.
Data-Link
Connection
Identifier (DLCI)
Local Management
Interface (LMI)
Cisco routers support three LMI types: Cisco, ANSI, and Q933a.
Frame Relay Configuration Facts
When configuring a router for Frame Relay, the DLCI number acts like a Data Link or physical
device address. Because Frame Relay supports multiple upper-layer protocols (such as IP, IPX, and
DECnet), you will need to associate logical, Network layer destination addresses with the DLCI
number used to reach that address. For multipoint connections, you have the following
configuration options.
Configuration
Method
Description
Inverse ARP
The router uses the inverse ARP protocol to dynamically discover destination
addresses associated with a specific DLCI. To use inverse ARP, simply enable
Frame Relay encapsulation on the interface. Using inverse ARP is the default.
Manual
mappings
The administrator identifies the address of each destination device, and associates
each address with a DLCI. Although more work, results are less prone to errors
than when using inverse ARP.
A subinterface is a virtual interface that you configure on a Cisco router's physical
interface. Instead of adding physical interfaces, using subinterfaces lets you
subdivide a single physical interface into several separate virtual channels.
Subinterfaces make it possible to support multiple connections and/or networks
through a single physical port.
Subinterfaces
When you connect a router to the Frame Relay network, the router interface has a
direct line to the Frame Relay switch at the service provider. Although there is
only one physical path between the router and the switch, Frame Relay supports
multiple virtual circuits. When configuring a Frame Relay connection or circuit,
you have the following options:
To configure a subinterface for Frame Relay, you set the encapsulation type, then
assign a DLCI number to the subinterface or use manual mappings to identify IP
address and DCLI pairs.
To configure Frame Relay on an interface, complete the following tasks:
Note: You must set the encapsulation method on the interface before you can issue any other
Frame Relay commands.
Router(configif)#encapsulation
frame-relay
To . . .
Set the encapsulation method
Continue this command by adding various keywords to set a
specific frame relay encapsulation protocol.
Router(configif)#frame-relay
inverse-arp
Router(configif)#frame lmi-type
<LMI type>
Note: When you manually set the LMI type, you disable
automatic LMI discovery. You might also need to manually
configure the keepalive parameter for the interface so the router
uses a keepalive value equal to or less than what is used by the
Frame Relay provider's equipment.
Router#clear framerelay-inarp
Address Mapping
After finishing this section, you should be able to complete the following tasks:
Add the broadcast parameter to the command to configure the router to forward broadcast
traffic over the link.
You can also specify the Frame Relay encapsulation to use for the virtual circuit by adding
the cisco or the ietf keywords. If not used, the circuit uses the encapsulation method
specified for the interface. If used, you can use one type of encapsulation for one DLCI, and
another type for another DLCI.
The following commands enable Frame Relay on serial interface 0 using Cisco as the encapsulation
method, disable inverse ARP, and map IP address 10.1.1.55 to DLCI 25.
Router(config)#int s0
Router(config-if)#encap frame-relay
Router(config-if)#no frame inverse
Router(config-if)#frame-relay map ip 10.1.1.55 25
Subinterfaces
After finishing this section, you should be able to complete the following tasks:
Enable Frame Relay on the interface and set the encapsulation method.
Create the subinterface, specifying either point-to-point or multipoint.
For a point-to-point connection or a multipoint connection using inverse ARP, assign the
DLCI number to the subinterface.
For a multipoint connection using static assignments, map DLCIs to protocol addresses.
In addition, you will need to assign a Network layer address to the subinterface. Do not assign an IP
address to the main interface.
Use . . .
Router(config-if)#int sX.X <type>
To . . .
Create the subinterface
Router(config-subif)#frame-relay interfacedlci
Router(config-subif)#frame-relay map
Examples
The following commands create a point-to-point subinterface on the first serial interface and assign
it to DLCI 44. The subinterface is configured to use inverse ARP.
Router(config)#int s0
Router(config-if)#encap frame
Router(config-if)#int s0.55 point
Router(config-subif)#frame interface-dlci 44
The following commands create a multipoint subinterface on the second serial interface, and
configure it with a static IP mapping of device 199.12.16.155 to DLCI 111.
Router(config)#int s1
Router(config-if)#encap frame
Router(config-if)#int s1.103 mult
Router(config-subif)#frame map ip 199.12.16.155 111
Which command would you use to view the DLCI numbers for each interface?
Why wouldn't you use the DLCI number included in the show interfaces command to
identify assigned DLCIs?
Which commands can you use to view the LMI type used on your router?
Which Frame Relay encapsulation type should you use when connecting to routers from
different vendors?
After finishing this section, you should be able to complete the following tasks:
Use . . .
show run
show frame pvc
show int
show run
Note: Output for the show interfaces command shows an entry for DLCI followed by a number.
This information is not the DLCI number associated with the interface.
As you troubleshoot Frame Relay, keep in mind the following tips:
All routers at all locations must be configured to use the same frame relay encapsulation
method.
When using all Cisco routers, you can use the default Frame Relay encapsulation type
(cisco). When using routers of multiple vendors, use the ietf encapsulation type.
Frame Relay routers must know the DLCI number that is used to reach remote routers.
o Use inverse arp to dynamically discover DLCI numbers.
o Use static mappings to associate DLCI numbers with IP addresses manually.
When configuring subinterfaces, do not set an IP address on the main interface. Instead, set
IP addresses on each subinterface.
For a point-to-point subinterface, or a multipoint subinterface with dynamic addressing, you
must manually assign a DLCI to the subinterface.
By default, Cisco routers autosense the LMI type and configure themselves accordingly.
You only need to set the LMI type if autosensing does not work or if you want to manually
assign it.
Shown here is sample output from the show frame-relay pvc command.
PVC Statistics for interface Serial5/1 (Frame Relay DTE)
DLCI = 55, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial5/1.1
input pkts 64589
output pkts 3865
in bytes 15400
out bytes 33896
dropped pkts 66
in FECN pkts 12
in BECN pkts 15
out FECN pkts 0
out BECN pkts 0
in DE pkts 5
out DE pkts 1
out bcast pkts 15 out bcast bytes 128
pvc create time 00:35:11, last time pvc status changed 00:00:22
Description
DLCI = 55
DLCI
USAGE
Identifies the role of the router on the virtual circuit. For DTE frame relay devices,
the usage will be LOCAL. For DCE devices, the usage will be SWITCHED.
Reports the PVC status as reported from the DCE through the LMI protocol. When
you connect the DTE to the circuit, the LMI protocol communicates the PVC status
as sent from the DCE device. The status will be one of the following:
PVC
STATUS
Identifies the number of packets received (in) or sent (out) that had the FECN or
BECN bit set. Both flags identify that network congestion exists. Receiving devices
use these flags to decide what to do about the congestion, such as slowing down or
implementing a flow control mechanism. On a DTE device:
FECN/BECN
pkts
DE pkts
in FECN pkts are packets sent from the DCE to the destination DTE device
to indicate that congestion has occurred. A DTE that receives a FECN
packet might slow its rate of data request, or it might implement flow
control to detect and recover from lost packets.
in BECN pkts are packets sent from the DCE to the sending DTE device to
indicate that congestion has occurred. A DTE that receives a BECN packet
might slow down its transmission rate.
out FECN pkts and out BECN pkts are packets sent from the DTE. On a
DTE device, these values have little meaning as the DTE is typically the
terminating point in the circuit.
Identifies the number of packets sent or received that had the Discard Eligibility
(DE) bit set. The DE bit is used to identify packets with a lower priority that could
be dropped if necessary.
IPv6 Concepts
As you study this section, answer the following questions:
Description
The Internet Corporation for Assigned Names and Numbers
(ICANN) assigns IPv6 addresses based on the following strategy:
Geographic assignment of
addresses
Efficient route
summarization
Header improvements
IPv6 packet headers do not need to have their logical link address
changed as the packet hops from router to router. This leads to a
reduction in per-packet overhead.
(QoS)
Flow label
The flow label is a field in the IPv6 packet header. Packets belonging
to the same stream, session, or flow share a common flow label
value, making the session easily recognizable without having to open
the inner packet to identify the flow.
The 64-bit prefix can be divided into various parts, with each part having a specific meaning.
The prefix length identifies the number of bits in the relevant portion of the prefix. To
indicate the prefix length, add a slash (/) followed by the prefix length number.
Bits past the end of the prefix length are all binary 0s. For example, the full 64-bit prefix for
address 2001:0DB8:4898:DAFC:200C:FBBC:A007:8973 is
2001:0DB8:4898:DAFC:0000:0000:0000:0000/64.
Full quartets with trailing 0's in the prefix address can be omitted (for example
2001:0DB8:4898:DAFC::/64).
If the prefix is not on a quartet boundary (this applies to any prefix that is not a multiple of
16), any hex values listed after the boundary should written as 0's. For example, the prefix
2001:0DB8:4898:DAFC::/56 should be written as 35BC:FA77:4898:DA00::/56.
Remember, only leading 0's within a quartet can be omitted.
Be aware that the prefix length number is a binary value, while the prefix itself is a
hexadecimal value.
Global routing information is identified within the 64-bit prefix by subdividing the prefix using
varying prefix lengths. The following graphic is an example of how the IPv6 prefix could be
divided:
Regional
Internet
Registry
(RIR)
Description
The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible
for the assignment of IPv6 addresses. ICANN assigns a range of IP addresses to
Regional Internet Registry (RIR) organizations. Each current regional organization
corresponds roughly to a continent.
The exact size of the address range assigned to the RIR may vary, but current
guidelines assign a minimum prefix of 12-bits. In the above example, the RIR has
been assigned a 12-bit prefix, and is responsible for addresses in the following range:
2000::/12 to 200F:FFFF:FFFF:FFFF::/64
Internet
Service
Provider
(ISP)
A regional organization subdivides its block of IP addresses into smaller blocks and
assigns those blocks to National Internet Registries (NIR), Local Internet Registries
(LIR), or Internet Service Providers (ISP). Larger organizations can further subdivide
the address space to allocate to smaller ISPs.
The exact size of the address range assigned by the RIR may vary, but current
guidelines assign a minimum prefix of 32-bits. In the above example, the ISP has
been assigned a 32-bit prefix, and is therefore responsible for addresses in the
following range:
2001:0DB8::/32 to 2001:0DB8:FFFF:FFFF::/64
Site
Subnet ID
By default, all sites that represent a network, including home networks, get an
address with a 48-bit prefix.
Sites that require an address space larger than this might be assigned two
consecutive blocks, or might be allocated an address with a 47-bit prefix.
If the network is known to have only a single subnet, the ISP might assign a
64-bit prefix. This is typically used for mobile devices.
If the network is known to have only a single device, such as a dialup
connection, the ISP might assign a 128-bit prefix.
Most networks receive an address range identified with a 48-bit prefix. The
remaining 16-bits in the global routing prefix are then used by the local network
administrator for creating subnets. In the example above, the site has received the
prefix of 2001:0DB8:4898::/48. The following list shows some of the subnets that
could be created by the administrator using a 64-bit prefix:
2001:0DB8:4898:0001::/64
2001:0DB8:4898:0002::/64
2001:0DB8:4898:0003::/64
...
2001:0DB8:4898:FFFD::/64
2001:0DB8:4898:FFFE::/64
2001:0DB8:4898:FFFF::/64
In most cases, individual interface IDs are not assigned by ISPs, but are rather generated
automatically or managed by site administrators. Interface IDs must be unique within a subnet, but
can be the same if the interface is on different subnets. All addresses that identify a single interface,
except those that start with 000 binary, but use a 64-bit interface ID that follows the modified EUI64 format. On Ethernet networks, the modified EUI-64 format interface ID can be automatically
derived from the MAC address using the following process:
1. The MAC address is split into 24-bit halves.
2. The hex constant FFFE is inserted between the two halves to complete the 64-bit address.
For example, 20-0C-FB-BC-A0-07 becomes:
200C:FBFF:FEBC:A007.
3. The seventh bit of the MAC address (reading from left to right) is set to binary 1. This bit is
called the universal/local (U/L) bit.
o Modifying the seventh binary bit modifies the second hex value in the address.
o For a MAC address of 20-0C-FB-BC-A0-07, the first two hex values translate to the
following binary number:
0010 0000
o Setting the seventh bit to 1 yields 0010 0010, which translates into 22 hex.
In this example, the MAC address of 20-0C-FB-BC-A0-07 in modified EUI-64 format
becomes: 220C:FBFF:FEBC:A007 (portions in red indicate modified values).
IPv6 Address Types
In IPv6, addresses are assigned to interfaces (network connections). All interfaces are required to
have some addresses, and interfaces can have more than one address. IPv6 identifies the following
types of addresses:
Address
Type
Description
Unicast addresses are assigned to a single interface for the purpose of allowing that
one host to send and receive data. Packets sent to a unicast address are delivered to the
interface identified by that address.
Described below are three types of unicast addresses.
Link-local addresses (also known as local link addresses) are addresses that
are valid on only the current subnet.
Linklocal
Unique local addresses are private addresses used for communication within
a site or between a limited number of sites.
Unicast
Unique
local
Multicast
Global unicast addresses are any addresses that are not link-local, unique
local, or multicast addresses. Currently, ISPs assign global unicast addresses
with a 2000::/3 prefix (this includes any address beginning with a 2 or a 3).
In the future, however, global unicast addresses might not have this
restriction.
FF02::1 is for all nodes on the local link. This is the equivalent of the IPv4
subnet broadcast address. FF01::1 is for all interfaces on a node.
FF02::2 is for all routers on the local link. FF01::1 is for all routers on the
node.
FF02::1:2 is for all DHCP servers or DHCP relay agents on the local link.
DHCP relay agents forward these packets to other subnets.
The anycast address is a unicast address that is assigned to more than one interface,
typically belonging to different hosts. An anycast packet is routed to the nearest
interface having that address (based on routing protocol decisions).
Anycast
Loopback
The local loopback address for the local host is 0:0:0:0:0:0:0:1 (also identified as ::1
or ::1/128). The local loopback address is not assigned to an interface. It can be used
to verify that the TCP/IP protocol stack has been properly installed on the host.
IPv6 Implementation
As you study this section, answer the following questions:
How does a host get its IPv6 address when using stateless autoconfiguration?
What information does the DHCP server provide when using stateless DHCPv6?
What address does a host use to request an address from a DHCP server?
What limitations does ISATAP have for IPv6 implementation?
Which IPv6 tunneling methods work through NAT?
What is the only method possible to enable an IPv6-only host to communicate with an IPv4only host?
After finishing this section, you should be able to complete the following tasks:
307. Describe the technological requirements for running IPv6 in conjunction with IPv4
Description
Static full
assignment
Static full assignment is where the entire 128-bit IPv6 address and all other
configuration information is statically assigned to the host.
Static partial
assignment
Static partial assignment is where the prefix is statically assigned and the
interface ID uses the modified EUI-64 format derived from the MAC address.
Stateless autoconfiguration is where clients automatically generate the
interface ID, and learn the subnet prefix and default gateway through the
Neighbor Discovery Protocol (NDP). NDP uses the following messages for
autoconfiguration:
Stateless
autoconfiguration
NDP is also used by hosts to discover the address of other interfaces on the
network, replacing the need for Address Resolution Protocol (ARP).
Note: Even though NDP provides enough information for the addressing of the
client and for clients to learn the addresses of other clients on the network, it
does not provide the client with DNS server information or other IP
configuration information besides the IP address and the default gateway.
IPv6 uses an updated version of DHCP (called DHCPv6) that operates in one
of two different modes:
DHCPv6
Stateful DHCPv6 is when the DHCP server provides each client with
the IP address, default gateway, and other IP configuration information
(such as the DNS server IP address). The DHCP server tracks the status
When a host starts up, it uses the following process to configure the IPv6 address for each interface:
1. The host generates an IPv6 address using the link-local prefix (FE80::/10) and modifying
the MAC address to get the interface ID. For example, if the MAC address is 20-0C-FBBC-A0-07, the link-local address for the interface would be:
FE80::220C:FBFF:FEBC:A007.
2. The host then sends a neighbor solicitation (NS) message addressed to its own link-local
address to see if the address it has chosen is already in use.
o If the address is in use, the other network host responds with a neighbor
advertisement (NA) message. The process stops and manual configuration of the
host is required.
o If the address is not in use (no NA message), the process continues.
3. The host waits for a router advertisement (RA) message from a router to learn the prefix.
o If an RA message is not received, the host sends out a router solicitation (RS)
message addressed to all routers on the subnet using the multicast address FF02::2.
o The router sends out an RA message addressed to all interfaces on the subnet using
the multicast address FF02::1.
o If no routers respond, the host attempts to use stateful DHCPv6 to receive
configuration information.
4. The RA message contains information that identifies how the IPv6 address and other
information is to be configured. Possible combinations are:
Configuration Method Description
Use stateful
autoconfiguration
Obtain the interface ID, subnet prefix, default gateway, and other
configuration information from a DHCPv6 server.
The host sends out a REQUEST message addressed to the multicast
address FF02::1:2 to request this information from the DHCPv6
server.
Use stateless
autoconfiguration
Method
Description
Dual stack
With a dual stack configuration, both the IPv4 and IPv6 protocol stacks run
concurrently on a host. IPv4 is used to communicate with IPv4 hosts, and
IPv6 is used to communicate with IPv6 hosts. When implemented on hosts,
intermediate routers and switches must also run both protocol stacks.
Use a dual stack configuration to enable a host to communicate with both
IPv4 and IPv6 hosts.
Tunneling wraps an IPv6 packet within an IPv4 packet, allowing IPv6 hosts or
sites to communicate over the existing IPv4 infrastructure. With tunneling, a
device encapsulates IPv6 packets in IPv4 packets for transmission across an
IPv4 network, and then the packets are de-encapsulated to their original IPv6
packets by another device at the other end.
Several tunneling solutions are listed below.
With a manually configured tunnel, tunnel endpoints are
configured as point-to-point connections between devices.
Manual tunneling:
Manually
configured
tunnel
Tunneling
6-to-4 tunneling
Automatic
Tunnel
Addressing
Protocol
(ISATAP)
Teredo tunneling
Network Address
TranslationProtocol
Translation (NATPT)
NAT-PT is a protocol that converts the IPv6 packet header into an IPv4
packet header, and vice versa. With NAT-PT, a translation table is referenced
by the device, such as a Cisco router, as it converts the headers to ensure that
the packet is sent to the correct host. This method is different than tunneling
because the packet headers are converted between the IPv4 and IPv6, whereas
tunneling wraps the IPv6 packet into an IPv4 packet. NAT-PT:
How does the DHCP service determine on which interfaces to listen for DHCP requests?
How is an access list used in NAT configuration?
How do you link a NAT address pool to an access list and an interface?
What parameter must you use in your NAT configuration if you have more private hosts
than public IP addresses?
Which NAT configuration method do you use to associate a specific outside IP address with
an inside host?
After finishing this section, you should be able to complete the following tasks:
303. Configure, verify and troubleshoot DHCP and DNS operation on a router
707. Configure NAT for given network requirements
708. Troubleshoot NAT issues
Configuring DHCP through the command line involves the following steps:
1. Create a pool for the subnet. After creating the pool, define the following parameters for the
pool:
o The subnet address and mask.
o DHCP options to assign (such as the default gateway, DNS server addresses, or
domain name).
o Configure the lease time.
2. Create a pool for each binding. Within the pool, configure:
o The IP address and mask
o The MAC address of the host
3. Configure any exclusions (addresses you don't want assigned).
Note: When you define the pool for the subnet, the router automatically responds to DHCP requests
that come in on the interface whose IP address matches the pool you defined.
The following table lists various commands for completing the DHCP configuration:
Use . . .
To . . .
Router(dhcp-config)#network
A.B.C.D m.m.m.m
Identify the subnet address and mask for the address pool.
Router(dhcp-config)#defaultrouter A.B.C.D
Router(dhcp-config)#dns-server
A.B.C.D <A.B.C.D>
Router(dhcp-config)#domainname WORD
Router(dhcp-config)#lease 0365
Router(config)#ip dhcp
excluded-address A.B.C.D
<A.B.C.D>
Create a binding.
When you create a binding, you create a separate pool that is
different than the pool that identifies the subnet. This pool
must have a unique name.
As part of the pool, you configure the IP address and mask
that will be assigned to the host, as well as the MAC address
of the host.
Switch(config)#interface vlan
1
Switch(config-if)#ip address
dhcp
Example
In the following example, the router has an IP address of 172.19.1.129/25 assigned to its Fa0/1
interface. The following commands create a pool for the subnet, configures DNS and default
gateway addresses to assign to hosts, sets the lease time to 10 days, excludes the router's IP address
from the pool, and creates a binding for a host named Dns-Srv1 that assigns that host an address of
172.19.1.132 each time it requests an address.
Router#ip dhcp pool SubnetA
Router(dhcp-config)#network 172.19.1.128 255.255.255.128
Router(dhcp-config)#default-router 172.19.1.129
Router(dhcp-config)#dns-server 172.19.1.132
Router(dhcp-config)#lease 10
Router(dhcp-config)#exit
Description
Use static translation to translate a single outside address to a single inside address.
To configure static NAT, use the following general process:
Static
1. Define a static map that associates the inside address with the outside
address.
2. Identify which router interface is the inside interface, and which interface is
the outside interface.
Use overloaded NAT with Port Address Translation (PAT) to translate multiple
inside addresses to a single public address. To configure overloaded NAT, use the
following general process:
Overloaded
with PAT
Dynamic
1. Define the pool of outside addresses that can be used for translation.
2. Create an access list that allows the specified inside addresses to be
translated.
3. Link the pool with the access list.
4. Identify which router interface is the inside interface, and which interface is
the outside interface.
Note: If the number of outside addresses defined in the pool is less than the number
of inside addresses allowed by the access list, the number of inside hosts that can
gain outside access will be limited to the number of outside addresses in the pool. To
allow a greater number of inside hosts to use a smaller number of outside addresses,
add the overloaded parameter to step 3. This uses dynamic NAT with PAT.
The following table lists the configuration steps and commands for each method.
Method
Static NAT
Configuration Task
Configure static mappings
(mapping inside local
addresses to outside local
addresses)
Command Examples
Router(config)#ip nat inside source
static 192.168.1.1 203.44.55.1
Overloaded
with PAT
Dynamic
NAT
Router(config)#interface ethernet0
Router(config-if)#ip nat inside
Router(config-if)#interface serial0
Router(config-if)#ip nat outside
Router(config)#access-list 1 permit
192.168.1.0 0.0.0.255
Router(config)#access-list 1 permit
192.168.1.0 0.0.0.255
Example
In this example, you have been given six public addresses from your ISP (177.211.5.89 to
177.211.5.94) using a 29-bit mask. You will use one of those addresses for the router interface, and
want to use the remaining 5 addresses for dynamic NAT with PAT for inside hosts. You want to
configure Internet access for all inside hosts on the 10.0.1.0/24 network. The following commands
create the pool, define the allowed inside addresses, link the access list to the pool, and configure
the inside and outside interfaces.
Router(config)#ip nat pool public_addr 177.211.5.90 177.211.5.94 netmask
255.255.255.248
Router(config)#access-list 1 permit 10.0.1.0 0.0.0.255
Router(config)#ip nat inside source list 1 pool public_addr overloaded
Router(config)#int eth0/1
Router(config)#ip addr 10.0.1.1 255.255.255.0
Router(config-if)#ip nat inside
Router(config-if)#int ser0/1/0
Router(config-if)#ip addr 177.211.5.89 255.255.255.248
Router(config-if)#ip nat outside
Note: The ip nat pool command can use the prefix-length keyword instead of the netmask
keyword as in the following example:
ip nat pool public_addr 177.211.5.89 177.211.5.94 netmask 29
To . . .
Router#clear ip nat
translation
Router#show ip nat
statistics
View counters for packets and NAT table entries, as well as basic
configuration information.
Router#show ip nat
translations
Network Security
As you study this section, answer the following questions:
What is social engineering? What is the best defense against social engineering?
How does a worm differ from a boot sector virus? A Trojan horse?
How are Denial of Service (DoS) attacks a security threat?
In addition to implementing virus scanning software, what must you do to ensure that you
are protected from the latest virus variations?
Which types of attacks are directed against passwords?
How does a firewall protect a network?
What is an IPS and how does it differ from an IDS?
What are the benefits of using centralized authentication?
601. Describe today's increasing network security threats and explain the need to implement
a comprehensive security policy to mitigate the threats
602. Explain general methods to mitigate common security threats to network devices,
hosts, and applications
603. Describe the functions of common security appliances and applications
Description
A reconnaissance attack is exploring or probing a system to discover information
about the system. Most malicious attacks are preceded by a reconnaissance attack.
There are two types of reconnaissance attacks:
Reconnaissance
o
o
o
Social
engineering
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact
system availability by flooding the target system with traffic or requests or by
exploiting a system or software flaw. The main purpose of a DoS attack is to
overwhelm the system to make it unavailable for legitimate use. Examples
include:
Denial of
service
Malware
Access attacks
Description
A firewall is a network device installed on the border of secured
networks to protect a private network from a public network or to
separate one private network from another.
Firewall
Adaptive Security
Appliance (ASA)
Because the names of several of the tools start with anti-, Cisco uses the
term anti-x to refer to the whole of the class of security tools.
Note: Cisco's ASA hardware can act as a firewall. So when speaking
about security, the term firewall still refers to the firewall functions, but
today the Cisco product may be an older, still-installed PIX firewall or a
new ASA.
Network Admission
Control (NAC)
Intrusion Detection
System (IDS) and
Intrusion Prevention
Systems (IPS)
Centralized
Authentication
Network Hardening
As you study this section, answer the following questions:
After finishing this section, you should be able to complete the following tasks:
602. Explain general methods to mitigate common security threats to network devices,
hosts, and applications
604. Describe security recommended practices including initial steps to secure network
devices
Hardening Facts
Hardening is the process of securing devices and software by reducing the security exposure and
tightening security controls. Take the following general actions to secure your devices and network:
Security
Measure
Description
Physical
security
Secure
passwords
Set the enable secret password instead of the enable password. Make sure
the two passwords are different.
Use the service password-encryption command to encrypt other passwords
in the configuration file. This provides a low level of security, but passwords
can be easily broken.
Control
remote
access
Use access lists to control incoming or outgoing traffic with the following criteria:
Access lists
Use the banner command to provide a warning banner to users who try to log into
the router. Be aware of the following:
Banner
CDP
Use no cdp run on the device or no cdp enable on an interface to avoid sharing
information about the Cisco device with neighboring devices. This helps to reduce
exposure due to reconnaissance attacks.
To . . .
Generate a matched public and private key pair, as well
as a shared encryption key. To generate the key pair, the
device must have both a hostname (other than Router)
and an ip domain-name configured.
router_name(config)#aaa new-model
router_name(config)#username
<value> password <value>
Example
The following commands configure SSH to accept a username of admin with a password of cisco,
allowing only SSH on lines VTY 0-4:
RouterA#config t
RouterA(config)#ip domain-name westsim.com
RouterA(config)#crypto key generate rsa
RouterA(config)#aaa new-model
RouterA(config)#username admin password cisco
RouterA(config)#line vty 0 4
RouterA(config-line)#transport input ssh
How does switch port security increase the security of your network?
What does the sticky keyword do when used with the switchport port-security command?
What can you do to save sticky addresses?
How does switchport security differ from an access list?
How does using VoIP effect switchport security settings?
What is the difference between the protect and restrict violation actions?
How does a switch identify which MAC addresses to allow if you do not manually
configure the allowed addresses?
After finishing this section, you should be able to complete the following tasks:
Port security uses the MAC address to identify allowed and denied devices.
By default, port security allows only a single device to connect through a switch port. You
can, however, modify the maximum number of allowed devices.
MAC addresses are stored in RAM in a table, and are identified with the port and by a
MAC address type. Port security uses the following three MAC address types:
Type
Description
SecureDynamic
SecureSticky
identified.
4. If the maximum number of allowed devices has not been reached,
its MAC address is added to the table, and use of the port is
allowed.
5. The MAC address is automatically entered into the runningconfig file as a sticky address.
Be aware of the following:
o
o
o
A port violation occurs when the maximum number of MAC addresses has been seen on the
port, and an unknown MAC address is then seen.
You can configure the switch to take one of the following actions when a violation occurs:
o Shut down the port. This is the default setting.
o Drop all frames from unauthorized MAC addresses.
o Drop all frames and generate an SMNP trap.
Be aware of the following when using port security:
Command
Function
Identifies the port as an access port.
switch(configNote: You can only configure port security after explicitly
if)#switchport mode access
making the port an access port.
switch(configif)#switchport portsecurity
switch(config-if)#switchport
port-security
violation action
The following commands configures Fast Ethernet port 0/15 to accept the first MAC address it
receives as the allowed MAC address for the port:
switch(config)#interface fast 0/15
switch(config-if)#switchport mode access
switch(config-if)#switchport port-security
switch(config-if)#switchport port-security mac-address sticky
Description
Shows a summary of port security settings for enabled
interfaces. Information includes:
switch#show portsecurity
Listed below is a sample output from the show port-security interface command:
switch#show port-security interface fa0/3
Port Security
: Enabled
Port Status
: Secure-shutdown
Violation Mode
: Shutdown
Aging Time
: 0 mins
Aging Type
: Absolute
:
:
:
:
:
:
:
Disabled
2
2
1
0
0800.46f5.491c:1
1
Description
Shows the enabled or the disabled state of port security.
Port Security
The port status indicates the operational status of the port as viewed by port
security. A status of Secure-down could mean any of the following conditions:
Port Status
A status of Secure-up indicates that the line is operational and port security is
being enforced.
Violation Mode
Identifies the configured violation mode for the interface (shutdown, protect, or
restrict).
Maximum MAC
Identifies the configured maximum number of allowed devices.
Addresses
Total MAC
Addresses
Identifies the total number of known MAC addresses on this port. This includes
all addresses in the running-config file (including sticky addresses) and all
dynamic addresses that have been learned.
Configured
Identifies the number of addresses configured with the switchport port-security
MAC Addresses mac-address command (excluding sticky addresses).
Sticky MAC
Addresses
Identifies the number of addresses in the running-config file identified with the
switchport port-security mac-address sticky entries.
Security
Identifies the number of violations detected. If this value is anything other than 1,
Violation Count then the port has already taken the action specified by the Violation Mode line.
VPN Facts
A Virtual Private Network (VPN) is a network that uses encryption to allow IP traffic to travel
securely over the TCP/IP network.
A VPN uses encrypted and authenticated links that provide remote access and routed
connections between private networks or computers.
A VPN can be used over a local area network, across a WAN connection, over the Internet,
and even between a client and a server over a dial-up connection through the Internet.
VPNs work by using a tunneling protocol that encrypts packet contents and wraps them in
an unencrypted packet.
Tunnel endpoints are devices that can encrypt and decrypt packets. When you create a VPN,
you establish a security association between the two tunnel endpoints. These endpoints
create a secure, virtual communication channel. Only the destination tunnel endpoint can
unwrap packets and decrypt the packet contents.
Routers use the unencrypted packet headers to deliver the packet to the destination device.
Intermediate routers along the path cannot (and do not) read the encrypted packet contents.
Description
IPSec is a security mechanism that:
Internet Protocol
Security (IPSec)
Point-to-Point
Tunneling Protocol
(PPTP)
Description
Site-to-site VPNs connect entire networks to each other, for example, connecting a
branch office network to a company headquarters network.
Site-tosite
Remote access VPNs connect individual hosts to private networks, for example,
travelers and telecommuters who need to access their company's network securely over
the Internet.
Remote
access
Traffic between the host and target site is encrypted using IPSec or Secure
Sockets Layer (SSL) technology.
The host is responsible for encapsulating and encrypting outbound traffic,
sending it through a VPN tunnel over the Internet, to a peer VPN gateway at the
target site.
The target VPN gateway behaves the same as site-to-site VPNs.
Hosts using IPSec encryption need VPN client software.
Hosts using SSL need a modern Internet browser (that includes built-in SSL
support).
An Adaptive Security Appliance (ASA) is Cisco's security appliance that is configured for
many security functions, such as VPNs.
Routers can provide VPN functions aside from packet forwarding, such as VPN encryption.
PIX Firewalls are an older product line of Cisco. The firewall performs the VPN functions,
as well as firewall functions. New installations now use an ASA.
VPN accelerator cards are PCI cards that fit in Cisco devices, such as the PIX Firewall, to
provide encryption, tunneling, and firewall functions.
VPN concentrators are an older product line of Cisco, and provide a specific endpoint of a
VPN tunnel.
VPN client-side software is for access VPNs. It is software installed on the individual's
client to perform the VPN functions.
VPN client-side hardware is used to provide a VPN to multiple clients on the same device.
Description
Authentication Header (AH) provides integrity and authentication.
Authentication
Header (AH)
Data Encryption Standard (DES) uses a 56-bit key and is easily broken.
Triple DES (3DES) applies DES three times and uses a 168-bit key.
3DES is IPSec's strongest and slowest method of encryption.
Advanced Encryption Standard (AES) uses variable key length (128-,
192-, or 256-bit keys), and is resistant to all known attacks. It is
computationally more efficient than 3DES.
Note: If the VPN uses ESP, then the HMAC is not needed because the attacker
would have had to break the ESP encryption key before altering the message.
The Internet Key Exchange (IKE) negotiates the connection. As two end points
are securing an IPSec network, they have to negotiate what is called a Security
Association (SA). An inbound and outbound SA is necessary for each
connection with a remote endpoint. IKE uses the following functions:
Internet Key
Exchange (IKE)
After the parameters of the SA have been established, IPSec functions in a mode of operation based
on the relationship of the communicating devices to each other. The two IPSec modes of operation
are:
Mode
Tunnel
mode
Characteristics
Tunnel mode is used for site-to-site communications.
Transport
mode
Description
A clientless SSL VPN (browser-based) allows a user to use any common Web browser
to securely access the internal or corporate network. This mode is useful for accessing
most content that you would expect to access in a browser, such as Web content,
databases, and online tools that employ a Web interface.
Clientless
Because SSL is already built in to the client Internet browsers, there is no setup
required on the client side.
The client must run the Windows 2000, Windows XP, or Linux operating
system.
Applications that cannot be accessed through a browser are not available.
Use clientless SSL VPNs when the client is a public or private computer or when the
user only needs to access Web-enabled applications.
Cisco's thin-client SSL VPN (also referred to as port forwarding) downloads a small
Java-based applet (plug-in) to the remote client which is used to secure remote access
for Transmission Control Protocol (TCP) applications.
ThinClient
The remote client must allow the Java applet to download and install through the
Internet browser. This typically requires administrative privileges on the system.
SSL tunnels can also be established using a smart tunnel. A smart tunnel does
not require installation and therefore does not require administrative privileges.
Proxy services are an option with the thin-client mode. A proxy acts as an
intermediary between the client and the Internet, intercepting all requests to the
Internet to see if it can fulfill the request using its cache to improve performance.
If the proxy service is enabled, the Java applet acts as a TCP proxy server
through the Internet browser.
Applications such as FTP, where the ports are negotiated dynamically cannot be
used. You can use TCP port forwarding only with applications that use static
ports, such as:
o Telnet, port 23
o Secure Shell (SSH), port 22
o Post Office Protocol 3 (POP3), port 110
o Internet Message Access Protocol 4 (IMAP4), port 143
o
o
o
Use the Thin-Client SSL VPN to provide application access for applications that can be
forwarded on a specific port and to provide access to shared folders on network servers.
It typically cannot be used on a public computer because administrative privileges are
required to download the Java plug-ins.
Full tunnel mode downloads client-side VPN software to the remote workstation and
allows secure access to most IP-based applications on an internal or corporate network.
Full
Tunnel
The client software is called the AnyConnect VPN Client. Previous versions of
the client software were called the Cisco SSL VPN Client (SVC).
The client software can be loaded on the security appliance, where it will
download and install on the client automatically as needed. It can also be
manually installed on the client prior to making the connection.
The client software can be uninstalled automatically when the session is closed,
or it can be configured to remain on the system.
Local administrator privileges are required for the initial installation of the Cisco
AnyConnect VPN Client.
AnyConnect uses TLS in addition to SSL to improve performance.
The client software can run as a standalone application (not running in the
browser).
The client software supports IPv6, Windows Vista, running scripts, password
caching, logon using certificates only, and drive mapping.
Use the client software for VPN access to configure a permanent client, or to provide
access to resources not allowed by the clientless or thin-client solutions (such as
Microsoft Outlook using MAPI).
Client requirements for SSL VPNs include:
Description
Use a site-to-site VPN to connect multiple devices in a remote site to the local site.
Site-tosite
Use a remote access VPN to connect individual users to resources in your local site.
Remote
access
The tunnel endpoint is defined on the client on one end, and a router or security
appliance at the site.
Remote access VPNs can use either IPSec or SSL VPN.
Client configuration is as follows:
o When using IPSec, client software is required.
o SSL VPN in clientless mode requires only an SSL-enabled browser and
no client configuration. It provides access to Web-applications only.
o SSL VPN in thin-client mode requires the Java runtime and the ability to
download and install Java plug-ins. It provides access to TCP applications
through port forwarding and shared folder content.
o SSL VPN in full tunnel mode uses client software that can be
permanently or temporarily installed. It provides full remote access with
features that require access to the local operating system.