New Ccna - Ajith
New Ccna - Ajith
New Ccna - Ajith
(CCNA v3.0)
CCIE
C C 22-10-2016
N P
C C N A
Introduction to Cisco Certifications
CCIE
C C 22-10-2016
N P
C C N A
CERTIFICATIONS
22-10-2016
WWW.KEYGROUPS.IN
CCNAv3 Certification Track
22-10-2016
WWW.KEYGROUPS.IN
CCNAv3 Certification
• Cisco Certified Network Associate R&S exam is the associate level exam into
Wide Area Networking.
Exam Number : 200-125
Exam cost : 325$
Duration : 90 Minutes
Number of questions : 50-60 questions
Passing Mark : 810 / 1000
Available Languages : English
Exam Questions : Multiple-choice single answer
Multiple-choice multiple answer
Drag-and-drop
Simulations (Simlet)
Scenario Based (Testlet)
22-10-2016
WWW.KEYGROUPS.IN
Exam Question Demo
22-10-2016
WWW.KEYGROUPS.IN
Reference Books
22-10-2016
WWW.KEYGROUPS.IN
Day wise Schedule
DAY TOPIC
1 Basics of Networking
Basic of
2 IP Addressing - IPv4
Networking
3 IP Addressing - IPv6 and OSI layers
4 External & Internal Components of Router
Basic of Router
5 Initial configuration of Router for IPv4 & IPv6 Network
and
6 WAN Connectivity and Configuration Router Connectivity
7 Subnetting (FLSM, VLSM)
8 Introduction to Routing and Static Routing for IPv4 & IPv6 Network
9 Introduction to Dynamic Routing and RIP for IPv4 & IPv6 Network
10 OSPF - Single Area for IPv4 & IPv6 Network Routing
11 OSPF - Multiple Area for IPv4 Network and EIGRP for IPv4 Network
12 EIGRP for IPv6 Network
22-10-2016
WWW.KEYGROUPS.IN
Day wise Schedule
DAY TOPIC
13 Introduction to Switch, Initial configuration, Vlan &Trunking
14 DTP, VTP, Intervlan, CDP, Port Security Switching
15 STP, Portfast, BPDU,ETHERCHANNEL & SPAN
16 Access Control List - IPv4
17 Access Control List - IPv6 Security
18 Default Routing and NAT
19 HSRP, IP SLA & EBGP
20 LOCAL AUTHENTICATION, AAA, SSH and VPN
Network Services
21 Syslog, NTP, SNMP, DHCP, IPv6 and
22 Password Recovery and Backup of IOS with TFTP, SCP, FTP Advance Concepts
23 PPP Authentication and PPPoE
24 Live setup and Q&A
22-10-2016
WWW.KEYGROUPS.IN
Basics of Networking
CCIE
C C 22-10-2016
N P
C C N A
Network
22-10-2016
WWW.KEYGROUPS.IN
Types of Networks
22-10-2016
WWW.KEYGROUPS.IN
LAN
• Local Area Networks are used to connect Interconnection of PCs and other
Network devices that are very close together in a limited area such as a floor of
a building, a building itself or within a campus.
Ameerpet
Data
LAN
Data
22-10-2016
WWW.KEYGROUPS.IN
MAN
• Metropolitan Area Network are used to connect networking devices that may
span around the entire city.
Ameerpet
Madhapur
Data
LAN LAN
MAN
Data Data
22-10-2016
WWW.KEYGROUPS.IN
WAN
• Wide Area Networks which connects two or more LANs present at different
geographical locations.
Hyderabad
Washington DC
Data
LAN LAN
SWITCH SWITCH
WAN
Data Data
22-10-2016
WWW.KEYGROUPS.IN
Internet
twitter.com flipkart.com
Hyderabad
Godaddy
Data
LAN LAN
Data
• Systems
• Media
• Network Devices(Nic,Hub,Switch,Router,Access Points,Firewalls)
• Operating System
• Topology
• Protocols
22-10-2016
WWW.KEYGROUPS.IN
Media
• The purpose of the media is to transport bits from one machine to another.
Media
Guided Unguided
UTP STP
22-10-2016
WWW.KEYGROUPS.IN
Media
Co-axial cable
UTP Cable
22-10-2016
WWW.KEYGROUPS.IN
Straight Through Cable
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
EIA/TIA 568B
Electronic Industries Alliance / Telecommunications Industry Association
22-10-2016
WWW.KEYGROUPS.IN
Crossover Through Cable
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
EIA/TIA 568B
Electronic Industries Alliance / Telecommunications Industry Association
22-10-2016
WWW.KEYGROUPS.IN
Rollover Cable
• Generally used for connecting Router console port to Computer COM port.
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
22-10-2016
WWW.KEYGROUPS.IN
Types of Twisted Pair cables
22-10-2016
WWW.KEYGROUPS.IN
Network Interface Card (NIC)
22-10-2016
WWW.KEYGROUPS.IN
Networking Devices
• Switch
− It is a hardware device that centralizes communications between wired
devices connected within a LAN
• Wireless Access Point
− It is a hardware device that centralizes communications between wireless
and wired devices within a LAN
• Router
− It is a device which enables communication between two or more different
logical networks.
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Networking Devices
• Firewall
− It is a device which protects the network from unauthorized access
− It allows and denies the network traffic based upon policy configured.
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Network Topology
• Bus Topology
• Ring Topology
• Star Topology
• Mesh Topology
22-10-2016
WWW.KEYGROUPS.IN
Network Topology
Data
Data
22-10-2016
WWW.KEYGROUPS.IN
Crimping Video
22-10-2016
WWW.KEYGROUPS.IN
Network Diagram
Router Firewall
INTERNET
Printer Wireless
Switch Switch Access Point
Data
22-10-2016
WWW.KEYGROUPS.IN
IP Addressing
CCIE
C C 22-10-2016
N P
C C N A
IP Address
22-10-2016
WWW.KEYGROUPS.IN
IP version 4
22-10-2016
WWW.KEYGROUPS.IN
IPv4 address range
22-10-2016
WWW.KEYGROUPS.IN
Binary to Decimal
128 64 32 16 8 4 2 1 Answer
1 1 0 0 0 0 0 0
192
0 0 0 0 1 0 1 0
10
1 0 1 0 1 0 0 0
168
1 0 1 0 1 1 0 0 172
0 0 0 1 0 0 0 0 16
22-10-2016
WWW.KEYGROUPS.IN
Decimal to Binary
Decimal 128 64 32 16 8 4 2 1
18
0 0 0 1 0 0 1 0
152
1 0 0 1 1 0 0 0
200
1 1 0 0 1 0 0 0
15
0 0 0 0 1 1 1 1
240
1 1 1 1 0 0 0 0
22-10-2016
WWW.KEYGROUPS.IN
IP Address Classification
• CLASS A
• CLASS C
22-10-2016
WWW.KEYGROUPS.IN
Priority Bit
22-10-2016
WWW.KEYGROUPS.IN
Class A Range
• In Class A : First bit of the first octet is reserved as priority bit, bit value is zero.
0xxxxxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27 26 25 24 23 22 21 2 0
0 0 0 0 0 0 0 0 = 0
0 0 0 0 0 0 0 1 = 1
0 0 0 0 0 0 1 0 = 2 Class A Range
0 0 0 0 0 0 1 1 = 3
0 . 0 . 0 . 0 to
0 0 0 0 0 1 0 0 = 4
127 . 255 . 255 .255
0 1 1 1 1 1 1 1 = 127
22-10-2016
WWW.KEYGROUPS.IN
Class B Range
• In Class B : First two bits of the first octet are reserved as priority bits, bit value
as 10.
10xxxxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27 26 25 24 23 22 21 20
1 0 0 0 0 0 0 0 = 128
1 0 0 0 0 0 0 1 = 129
1 0 0 0 0 0 1 0 = 130
1 0 0 0 0 0 1 1 = 131 Class B Range
1 0 0 0 0 1 0 0 = 132 128 . 0 . 0 . 0 to
191 . 255 . 255 .255
1 0 1 1 1 1 1 1 = 191
22-10-2016
WWW.KEYGROUPS.IN
Class C Range
• In Class C : First three bits of the first octet are reserved as priority bits, bit value
as 110.
110xxxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27 26 2 5 24 23 2 2 21 20
1 1 0 0 0 0 0 0 = 192
1 1 0 0 0 0 0 1 = 193
1 1 0 0 0 0 1 0 = 194
1 1 0 0 0 0 1 1 = 195 Class C Range
1 1 0 0 0 1 0 0 = 196 192 . 0 . 0 . 0 to
223 . 255 . 255 .255
1 1 0 1 1 1 1 1 = 223
22-10-2016
WWW.KEYGROUPS.IN
Class D Range
• In Class D : First four bits of the first octet are reserved as priority bits, bit value
as 1110.
1110xxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27 26 2 5 24 23 2 2 21 20
1 1 1 0 0 0 0 0 = 224
1 1 1 0 0 0 0 1 = 225
1 1 1 0 0 0 1 0 = 226
1 1 1 0 0 0 1 1 = 227 Class D Range
1 1 1 0 0 1 0 0 = 228 224 . 0 . 0 . 0 to
239 . 255 . 255 .255
1 1 1 0 1 1 1 1 = 239
22-10-2016
WWW.KEYGROUPS.IN
Class E Range
• In Class E : First four bits of the first octet are reserved as priority bits, bit value
as 1111.
1111xxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27 26 25 24 23 22 21 20
1 1 1 1 0 0 0 0 = 240
1 1 1 1 0 0 0 1 = 241
1 1 1 1 0 0 1 0 = 242
1 1 1 1 0 0 1 1 = 243 Class E Range
1 1 1 1 0 1 0 0 = 244 240 . 0 . 0 . 0 to
255 . 255 . 255 .255
1 1 1 1 1 1 1 1 = 255
22-10-2016
WWW.KEYGROUPS.IN
Ranges
22-10-2016
WWW.KEYGROUPS.IN
Identifying Class
IP Address Class
10.1.100.1
A
192.1.1.1
C
224.0.0.10 D
120.200.1.1 A
150.17.2.200 B
22-10-2016
WWW.KEYGROUPS.IN
Octet Format
22-10-2016
WWW.KEYGROUPS.IN
CLASS A – No. Networks & Hosts
• No. of Host
= 2no of host bits -2
= 224 – 2 (-2 is for Network ID & Broadcast ID)
= 16777216 - 2
= 16777214 Hosts/Network
22-10-2016
WWW.KEYGROUPS.IN
CLASS B – No. Networks & Hosts
• No. of Host
= 2no of host bits -2
= 216 – 2 (-2 is for Network ID & Broadcast ID)
= 65536 - 2
= 65534 Hosts/Network
22-10-2016
WWW.KEYGROUPS.IN
CLASS C – No. Networks & Hosts
• No. of Host
= 2no of host bits -2
= 28 – 2 (-2 is for Network ID & Broadcast ID)
= 256 - 2
= 254 Hosts/Network
22-10-2016
WWW.KEYGROUPS.IN
Network & Broadcast Address
• Network address : IP address with all bits as ZERO in the host portion.
• Broadcast address : IP address with all bits as ONES in the host portion.
• Valid IP Addresses : IP address lie between the Network Address and the
Broadcast Address.
22-10-2016
WWW.KEYGROUPS.IN
Example - Class A
• Class A : N.H.H.H
Network Address : 0xxxxxxx.00000000.00000000.00000000
Broadcast Address : 0xxxxxxx.11111111.11111111.11111111
Class A
10.0.0.0 Network Address
10.0.0.1
10.0.0.2
10.0.0.3
Valid IP Addresses
10.255.255.254
10.255.255.255 Broadcast Address
22-10-2016
WWW.KEYGROUPS.IN
Example - Class B
• Class B : N.N.H.H
Network Address : 10xxxxxx.xxxxxxxx.00000000.00000000
Broadcast Address : 10xxxxxx.xxxxxxxx.11111111.11111111
Class B
172.16.0.0 Network Address
172.16.0.1
172.16.0.2
172.16.0.3 Valid IP Addresses
172.16.255.254
172.16.255.255 Broadcast Address
22-10-2016
WWW.KEYGROUPS.IN
Example - Class C
• Class C : N.N.N.H
Network Address : 110xxxxx.xxxxxxxx.xxxxxxxx.00000000
Broadcast Address : 110xxxxx.xxxxxxxx.xxxxxxxx.11111111
Class C
192.168.1.0 Network Address
192.168.1.1
192.168.1.2
192.168.1.3
Valid IP Addresses
192.168.1.254
192.168.1.255
Broadcast Address
22-10-2016
WWW.KEYGROUPS.IN
Identifying Network Address and Broadcast Address
120.1.1.1
120.0.0.0 and 120.255.255.255
172.16.1.1
172.16.0.0 and 172.16.255.255
10.100.1.10
10.0.0.0 and 10.255.255.255
192.168.1.10 192.168.1.0 and 192.168.1.255
150.10.1.1 150.10.0.0 and 150.10.255.255
22-10-2016
WWW.KEYGROUPS.IN
Identifying Valid IP Address
119.1.1.1
Yes
172.17.255.255
No
11.1.0.0 Yes
195.255.0.255 No
142.10.0.0 No
22-10-2016
WWW.KEYGROUPS.IN
Subnet Mask
• Represented with all 1’s in the network portion and with all 0’s in the host
portion.
22-10-2016
WWW.KEYGROUPS.IN
Subnet Mask - Examples
• Class A : N.H.H.H
11111111.00000000.00000000.00000000
Default Subnet Mask for Class A is 255.0.0.0
• Class B : N.N.H.H
11111111.11111111.00000000.00000000
Default Subnet Mask for Class B is 255.255.0.0
• Class C : N.N.N.H
11111111.11111111.11111111.00000000
Default Subnet Mask for Class C is 255.255.255.0
22-10-2016
WWW.KEYGROUPS.IN
Default subnet mask
17.1.1.1
255.0.0.0
202.1.0.18
255.255.255.0
190.10.1.1 255.255.0.0
102.10.1.10 255.0.0.0
192.0.0.1 255.255.255.0
22-10-2016
WWW.KEYGROUPS.IN
How Subnet Mask Works ?
IP Address : 192.168.1.1
Subnet Mask : 255.255.255.0
ANDING PROCESS :
192.168.1.1 = 11000000.10101000.00000001.00000001
255.255.255.0 = 11111111.11111111.11111111.00000000
==================================================
192.168.1.0 = 11000000.10101000.00000001.00000000
==================================================
22-10-2016
WWW.KEYGROUPS.IN
Private IP Address
• There are certain addresses in each class of IP address that are reserved for
Private Networks. These addresses are called private addresses.
• These addresses are not Routable (or) valid on Internet.
Class A
10.0.0.0 to 10.255.255.255
Class B
172.16.0.0 to 172.31.255.255
Class C
192.168.0.0 to 192.168.255.255
22-10-2016
WWW.KEYGROUPS.IN
Public IP Address v/s Private IP Address
22-10-2016
WWW.KEYGROUPS.IN
IPv6
CCIE
C C 22-10-2016
N P
C C N A
IPv6 Addresses
22-10-2016
WWW.KEYGROUPS.IN
Binary to Hexadecimal Table
22-10-2016
WWW.KEYGROUPS.IN
Binary to Hexadecimal
Binary Hexa-
decimal
1 1 1 1
F
1 1 0 1 1 0 1 1 DB
1 0 1 1 0 0 0 1 1 0 1 0 B1A
1 0 1 1 1 0 1 0 1 0 1 1 1 0 1 0 BABA
1 1 0 0 1 0 1 0 1 1 1 1 1 1 1 0 CAFE
1 1 1 1 1 0 1 0 1 1 0 0 1 1 1 0 FACE
1 1 0 0 0 0 1 1 1 1 0 1 0 1 0 1 C3D5
HEXADECIMAL CHART
22-10-2016
WWW.KEYGROUPS.IN
Hexadecimal to Binary
Hexa- Binary
decimal
E
1 1 1 0
9 1 0 0 1
2F 0 0 1 0 1 1 1 1
4FD 0 1 0 0 1 1 1 1 1 1 0 1
01E8 0 0 0 0 0 0 0 1 1 1 1 0 1 0 0 0
2001 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1
FE80 1 1 1 1 1 1 1 0 1 0 0 0 0 0 0 0
HEXADECIMAL CHART
22-10-2016
WWW.KEYGROUPS.IN
Rules for representing of IPv6 Address
• Omission of ZEROs
− Leading zero in any quartet can be omitted.
− Four successive zeros in a Quartet can be substituted by one zero.
• Replacing Successive Fields of Zeros with “::”
− Multiple quartet with zero can be represented as :: but only once in a
address
22-10-2016
WWW.KEYGROUPS.IN
Omission of ZERO’S
2001 : 2222 : 0000 : 0000 : 0000 : 0000 : 0000 : 0001 2001 : 2222 : 0 : 0 : 0 : 0 : 0 : 1
20DB : C0A8 : 0101 : 0000 : 0000 : 0000 : 0000 : 0420 20DB : C0A8 : 101 : 0 : 0 : 0 : 0 : 420
22-10-2016
WWW.KEYGROUPS.IN
Replacing Successive Fields of Zero’s with “::”
2001 : 0000 : 0000 : FACE : B00C : 0000 : 0000 : 0069 2001 : 0 : 0 : FACE : B00C : : 69
20DB : 0000 : 0000 : 6666 : 0000 : 0000 : 0000 : 5228 20DB : 0 : 0 : 6666 : : 5228
2001 : 1111 : : 1
2001 : 1111 : 0000 : 0000 : 0000 : 0000 : 0000 : 0001
22-10-2016
WWW.KEYGROUPS.IN
Special Addresses ( IPv4 - IPv6)
IPv6 IPv4
10.0.0.0/8
Private IP
Unique local FC00::/7 172.16.0.0 to 172.31.255.255
address
192.168.0.0 to 192.168.255.255
Public IP Other Than
Global unicast 2000::/3
address Private IP addresses
Link local FE80::/10 APIPA 169.254.x.x
22-10-2016
WWW.KEYGROUPS.IN
Understanding IPv4
Same Network Communication
CCIE
C C 22-10-2016
N P
C C N A
IPv4 Same Network Communication
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Assigning IPv4 Address on Windows Computer
On Windows 7 or Windows 8.x or Windows 10 Computer
• Open Network and Sharing Center
• Click on Change adapter settings and Click Open.
• Right-click on your local adapter and select Properties.
• In the Local Area Connection Properties window select
Internet Protocol Version 4 (TCP/IPv4) then click the
Properties button.
• Now select the radio button Use the following IP address
and enter in the IP address and Subnet mask and click OK.
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv4 Address on Windows Computer
C:\> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . . . . : 192.168.1.10
Subnet Mask . . . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . . :
C:\>
22-10-2016
WWW.KEYGROUPS.IN
Assigning IPv4 Address on Linux Computer
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv4 Address on Linux Computer
bt ~ # ifconfig
22-10-2016
WWW.KEYGROUPS.IN
Ping
• Windows • Windows
ping 192.168.201.10 ping 2001:1111::10
• Linux • Linux
ping 192.168.201.10 ping6 2001:1111::10
22-10-2016
WWW.KEYGROUPS.IN
PING
22-10-2016
WWW.KEYGROUPS.IN
Traceroute
• Windows • Windows
tracert 192.168.201.10 tracert 2001:1111::10
• Linux • Linux
traceroute 192.168.201.10 traceroute6 2001:1111::10
22-10-2016
WWW.KEYGROUPS.IN
Traceroute
22-10-2016
WWW.KEYGROUPS.IN
Understanding IPv6
Same Network Communication
CCIE
C C 22-10-2016
N P
C C N A
IPv6 Same Network Communication
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Assigning IPv6 Address on Windows Computer
On Windows 7 or Windows 8.x or Windows 10 Computer
• Open Network and Sharing Center
• Click on Change adapter settings and Click Open.
• Right-click on your local adapter and select Properties.
• In the Local Area Connection Properties window select
Internet Protocol Version 6 (TCP/IPv6) then click the
Properties button.
• Now select the radio button Use the following IP address
and enter in the IP address and Subnet mask and click OK.
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv6 Address on Windows Computer
C:\> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv6 Address. . . . . . . . . . . . . . . . . : 2001:1111::10
Link-local IPv6 Address . . . . . . . . : fe80::449d:6a9a:2c80:80dc%64
Default Gateway . . . . . . . . . . . . . :
C:\>
22-10-2016
WWW.KEYGROUPS.IN
Assigning IPv6 Address on Linux Computer
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv6 Address on Linux Computer
bt ~ # ifconfig
22-10-2016
WWW.KEYGROUPS.IN
Subnetting
CCIE
C C 22-10-2016
N P
C C N A
Subnetting
22-10-2016
WWW.KEYGROUPS.IN
Requirement of Networks
22-10-2016
WWW.KEYGROUPS.IN
Administrators Requirement
22-10-2016
WWW.KEYGROUPS.IN
Main Aim of Subnetting
22-10-2016
WWW.KEYGROUPS.IN
Power table
POWER TABLE
22-10-2016
WWW.KEYGROUPS.IN
Some Important Values
22-10-2016
WWW.KEYGROUPS.IN
Requirement of Subnets – 4 no's ?
• Class C : 192.168.1.0
• Octet Format is N.N.N.H
Network bits : 24 Host bits : 8
• Subnets required : 4 no's
= 2n ≥ Req. of Subnet
= 2n ≥ 4
= 22 ≥ 4
= 4 subnets
• No. of Hosts / Subnet
= 2no of host bits -2
= 26 – 2 (-2 is for Network ID & Broadcast ID)
= 64 - 2
= 62 Hosts / Subnet
22-10-2016
WWW.KEYGROUPS.IN
Continued…
• Subnet Range
Network ID Broadcast ID
192.168.1.0 - 192.168.1.63
192.168.1.64 - 192.168.1.127
192.168.1.128 - 192.168.1.191
192.168.1.192 - 192.168.1.255
22-10-2016
WWW.KEYGROUPS.IN
Requirement of Subnets – 30 no's ?
• Class C : 192.168.1.0
• Octet Format is N.N.N.H
Network bits : 24 Host bits : 8
• Subnets required : 30 no's
= 2n ≥ Req. of Subnet
= 2n ≥ 30
= 25 ≥ 30
= 32 subnets
• No. of Hosts / Subnet
= 2no of host bits -2
= 23 – 2 (-2 is for Network ID & Broadcast ID)
= 8-2
= 6 Hosts / Subnet
22-10-2016
WWW.KEYGROUPS.IN
Continued…
• Subnet Range
Network ID Broadcast ID
192.168.1.0 - 192.168.1.7
192.168.1.8 - 192.168.1.15
192.168.1.16 - 192.168.1.23
192.168.1.248 - 192.168.1.255
22-10-2016
WWW.KEYGROUPS.IN
Requirement of Host – 12 no's ?
• Class C : 192.168.1.0
• Octet Format is N . N . N . H
Network bits : 24 Host bits : 8
• Host required : 12 no’s
= 2n - 2 ≥ Req. of Host (-2 is for Network ID & Broadcast ID)
= 24 - 2 ≥ 12
= 16 - 2
= 14 Hosts
• No. of Subnets
= 2no of network bits
= 24
= 16 subnets
22-10-2016
WWW.KEYGROUPS.IN
Continued…
• Subnet Range
Network ID Broadcast ID
192.168.1.0 - 192.168.1.15
192.168.1.16 - 192.168.1.31
192.168.1.32 - 192.168.1.47
192.168.1.240 - 192.168.1.255
22-10-2016
WWW.KEYGROUPS.IN
Requirement of Host – 2 no's ?
• Class C : 192.168.1.0
• Octet Format is N . N . N . H
Network bits : 24 Host bits : 8
• Host required : 2 no’s
= 2n - 2 ≥ Req. of Host (-2 is for Network ID & Broadcast ID)
= 22 - 2 ≥ 2
= 4-2
= 2 Hosts
• No. of Subnets
= 2no of network bits
= 26
= 64 subnets
22-10-2016
WWW.KEYGROUPS.IN
Continued…
• Subnet Range
Network ID Broadcast ID
192.168.1.0 - 192.168.1.3
192.168.1.4 - 192.168.1.7
192.168.1.8 - 192.168.1.11
192.168.1.252 - 192.168.1.255
22-10-2016
WWW.KEYGROUPS.IN
Cisco Slash Notation – example-1
• Class C : 192.168.1.65/25
Network bits : 25 Host bits : 7
• No. of Subnets
= 2no of network bits
= 21
= 2 subnets
• No. of Hosts / Subnet
= 2no of host bits -2
= 27 – 2 (-2 is for Network ID & Broadcast ID)
= 128 - 2
= 126 Hosts / Subnet
22-10-2016
WWW.KEYGROUPS.IN
Continued…
• Subnet Range
Network ID Broadcast ID
192.168.1.0 - 192.168.1.127
192.168.1.128 - 192.168.1.255
22-10-2016
WWW.KEYGROUPS.IN
Cisco Slash Notation – example-2
• Class C : 192.168.1.65/27
Network bits : 27 Host bits : 5
• No. of Subnets
= 2no of network bits
= 23
= 8 subnets
• No. of Hosts / Subnet
= 2no of host bits -2
= 25 – 2 (-2 is for Network ID & Broadcast ID)
= 32 - 2
= 30 Hosts / Subnet
22-10-2016
WWW.KEYGROUPS.IN
Continued…
• Subnet Range
Network ID Broadcast ID
192.168.1.0 - 192.168.1.31
192.168.1.32 - 192.168.1.63
192.168.1.64 - 192.168.1.95
192.168.1.224 - 192.168.1.255
22-10-2016
WWW.KEYGROUPS.IN
Open System Interconnect
(OSI)
CCIE
C C 22-10-2016
N P
C C N A
Open System Interconnect (OSI)
22-10-2016
WWW.KEYGROUPS.IN
OSI Model Layers
Layer - 7 Application
User support Layers
Layer - 6 Presentation or
Software Layers
Layer - 5 Session
Layer - 3 Network
Network support Layers
Layer - 2 Data Link or
Physical Hardware Layers
Layer - 1
22-10-2016
WWW.KEYGROUPS.IN
Application Layer
Transport
Network
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Examples of Networking Services
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Application Layer
Application Data
80 21 25 53 67 69
Presentation
Session
Transport
Network
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Presentation Layer
Application
It is responsible for defining a standard format to
the data.
Presentation It deals with data presentation.
The major functions described at this layer are..
Session • Encoding – Decoding
Ex : ASCII, EBCDIC (Text)
Transport JPEG,GIF,TIFF (Graphics)
MIDI,WAV (Voice)
Network
MPEG,DAT,AVI (Video)
Data Link • Encryption – Decryption
• Compression – Decompression
Physical
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Presentation Layer
Application Data
Presentation Data
Session
Transport
Network
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Session Layer
Physical
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Session Layer
Application Data
Presentation Data
Session Data
Transport
Network
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Transport Layer
22-10-2016
WWW.KEYGROUPS.IN
Identifying a Service
netstat
22-10-2016
WWW.KEYGROUPS.IN
Multiplexing & De-multiplexing
Application
Presentation
Session
80 21 25 53 67 69
Transport
TCP - 6 UDP - 17
Network
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Transport Layer Protocols
• The protocols which takes care of Data Transportation at Transport layer are
TCP and UDP
TCP UDP
22-10-2016
WWW.KEYGROUPS.IN
Segmentation
HELLO!
HOW HELLO! HOW ARE YOU ?
ARE YOU?
Data
22-10-2016
WWW.KEYGROUPS.IN
Sequencing
22-10-2016
WWW.KEYGROUPS.IN
Sequencing
Data
22-10-2016
WWW.KEYGROUPS.IN
Reassembling
22-10-2016
WWW.KEYGROUPS.IN
Flow Control and Error Correction
Source Destination
Window size = 3
Send 1 Due to congestion of the
Send 2 receiver, Segment 3 is lost
Send 3
ACK 3
Window size = 2
Send 3
Send 4
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Transport Layer
Application Data
Presentation Data
Session Data
Transport TH Segment
Data
Network
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Network Layer
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Network Layer
Application Data
Presentation Data
Session Data
Device that works at Transport TH Segment
Data
Network Layer is Router
Network NH Packet
Segment
Data Link
Physical
22-10-2016
WWW.KEYGROUPS.IN
Datalink Layer
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Data link Layer
Application Data
Presentation Data
Session Data
Transport TH Segment
Data
Devices that work at
Data link layer is Switch Network NH Packet
Segment
Physical
22-10-2016
WWW.KEYGROUPS.IN
Physical Layer
22-10-2016
WWW.KEYGROUPS.IN
Data flow from Physical Layer
Application Data
Presentation Data
Session Data
Transport TH Segment
Data
Network NH Packet
Segment
Devices that work at
physical layer are Hub , Repeater Data Link Frame
DT Packet DH
etc.
Physical Bits
22-10-2016
WWW.KEYGROUPS.IN
Encapsulation & Decapsulation
A B
Transport TH Segment
Data TH Segment
Data Transport
Network NH Packet
Segment NH Packet
Segment Network
22-10-2016
WWW.KEYGROUPS.IN
Comparison between OSI & TCP/IP Model
Application
Presentation Application
Session
Network Internet
Data Link
Network Access
Physical
22-10-2016
WWW.KEYGROUPS.IN
Introduction to Routers
CCIE
C C 22-10-2016
N P
C C N A
Router
22-10-2016
WWW.KEYGROUPS.IN
Type of Routers
22-10-2016
WWW.KEYGROUPS.IN
Functions of a Router
• Inter-network Communication
• Best Path Selection S0/0/1
R2
S0/0/0
• Packet Switching
• Packet forwarding S0/0
S0/1
DATA R3
R1 S0/0
S0/1
F0/0
E0/0
22-10-2016
WWW.KEYGROUPS.IN
Types of Hardware Routers
• Fixed router
− Fixed routers are non upgradable, can not add or remove the Ethernet or
serial ports.
− Does not have any slot.
− In fixed routers the ports are integrated on the mother board.(Fixed on
mother board).
• Modular router
− Modular Routers are upgradable, can add or remove the interfaces as per
our requirement.
− Number of slots available depends on the series of the router.
− Can add LAN and WAN cards.
22-10-2016
WWW.KEYGROUPS.IN
Fixed router and Modular router
22-10-2016
WWW.KEYGROUPS.IN
Cisco Router Category
• Branch Routers
• Network Edge and Aggregation Routers
• Service Provider Routers
22-10-2016
WWW.KEYGROUPS.IN
Branch Routers
22-10-2016
WWW.KEYGROUPS.IN
Network Edge and Aggregation Routers
• Routers that are used at large organization / campus and Head Offices
• Router Series - Models
− 1000 series - 1001, 1002, 1004
− 5000 series - 5001, 5002
− 5500 series - 5508
22-10-2016
WWW.KEYGROUPS.IN
Service Provider Routers
22-10-2016
WWW.KEYGROUPS.IN
External Components of a Router
CCIE
C C 22-10-2016
N P
C C N A
2800 Series
22-10-2016
WWW.KEYGROUPS.IN
Interfaces on Router
22-10-2016
WWW.KEYGROUPS.IN
LAN Interfaces - RJ-45 ports
22-10-2016
WWW.KEYGROUPS.IN
LAN Connectivity
An IP address has to be assigned to this interface. It should be in the same network as that of the
LAN. This IP address is the default gateway address for all LAN systems.
Router
Fa 0/0
Straight Cable 192.168.1.1/24
Switch
Straight Cable
LAN - 192.168.1.0/24
22-10-2016
WWW.KEYGROUPS.IN
LAN Connectivity
Router
Fa 0/0
192.168.1.1/24
Cross Cable
To connect the router’s Ethernet interface
directly to a PC LAN card a cross cable is used.
LAN - 192.168.1.0/24
22-10-2016
WWW.KEYGROUPS.IN
Serial Port
22-10-2016
WWW.KEYGROUPS.IN
HWIC
22-10-2016
WWW.KEYGROUPS.IN
Console Port
22-10-2016
WWW.KEYGROUPS.IN
Console Connectivity
RJ-45
Connector
Console Port
22-10-2016
WWW.KEYGROUPS.IN
Auxiliary Connectivity
22-10-2016
WWW.KEYGROUPS.IN
Interfaces of a Router
• LAN Interface
− RJ 45 Ethernet / FastEthernet / GigabitEthernet
• WAN Interface
− Normal Serial Interface
− Smart Serial Interface
• Administrative Interface
− Console
− Auxiliary
22-10-2016
WWW.KEYGROUPS.IN
Understanding IPv4 Communication
Between Different Networks
CCIE
C C 22-10-2016
N P
C C N A
IPv4 Different Network Communication
Fa 0/0 Fa 0/1
192.168.1.1 192.168.2.1
Router
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Assigning Default Gateway IP Address on Windows Computer
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv4 Address on Windows Computer
C:\> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . . . . : 192.168.1.10
Subnet Mask . . . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . . : 192.168.1.1
C:\>
22-10-2016
WWW.KEYGROUPS.IN
Assigning Default Gateway IP Address on Linux Computer
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv4 Address on Linux Computer
bt ~ # route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.201.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 eth0
bt ~ #
22-10-2016
WWW.KEYGROUPS.IN
Understanding IPv6 Communication
Between Different Networks
CCIE
C C 22-10-2016
N P
C C N A
IPv6 Different Network Communication
Fa 0/0 Fa 0/1
2001:1111::1 2001:2222::1
Router
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Assigning Default Gateway IP Address on Windows Computer
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv6 Address on Windows Computer
C:\> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv6 Address. . . . . . . . . . . . . . . . . : 2001:1111::10
Link-local IPv6 Address . . . . . . . . : fe80::449d:6a9a:2c80:80dc%64
Default Gateway . . . . . . . . . . . . . : 2001:1111::1
C:\>
22-10-2016
WWW.KEYGROUPS.IN
Assigning IPv6 Address on Linux Computer
22-10-2016
WWW.KEYGROUPS.IN
Verify IPv6 Address on Linux Computer
bt ~ # route -6
Kernel IPv6 routing table
Destination Next Hop Flag Met Ref Use If
::1/128 :: Un 0 1 0 lo
2001:1111::/64 :: U 256 0 2 eth0
fe80::468a:5bff:fed4:3899/128 :: Un 0 1 0 lo
fe80::/64 :: U 256 0 0 eth0
ff00::/8 :: U 256 0 0 eth0
::/0 2001:1111::1 UG 1 0 0 eth0
bt ~ #
22-10-2016
WWW.KEYGROUPS.IN
Internal Components of a Router
CCIE
C C 22-10-2016
N P
C C N A
Internal Components of Router
• Flash memory
− The Internetwork Operating System (IOS) is stored here.
− IOS is a Cisco proprietary operating system.
22-10-2016
WWW.KEYGROUPS.IN
Internal Components of Router
22-10-2016
WWW.KEYGROUPS.IN
Internal Components of Router
22-10-2016
WWW.KEYGROUPS.IN
BOOT Sequence
ROM loads Bootstrap program and searches for the IOS ROM
CCIE
C C 22-10-2016
N P
C C N A
Console Connectivity
RJ-45
Connector
Console Port
• Cisco Routers and Switches do not have any default IP address or Configuration,
hence its required to use the Console port for Initial Configuration.
• Require physical connection between the Cisco Router/Switch and PC via
console cable.
22-10-2016
WWW.KEYGROUPS.IN
Emulation Software
• WINDOWS
Hyper-terminal / Putty / Teraterm
• LINUX
Minicom -s/Putty
22-10-2016
WWW.KEYGROUPS.IN
Initial Configuration
Console
HYD-1
Fa 0/0
192.168.1.1/24
Switch
Computer IP Address
192.168.1.10/24
22-10-2016
WWW.KEYGROUPS.IN
Access Router through Console
22-10-2016
WWW.KEYGROUPS.IN
Modes of the Router
• Setup Mode
• User Mode
• Privileged Mode
• Global Configuration Mode
Interface Mode
Line Mode
Router Mode
22-10-2016
WWW.KEYGROUPS.IN
Setup Mode
Router
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]:
22-10-2016
WWW.KEYGROUPS.IN
User Mode
• Only some basic monitoring and limited show commands works in this mode.
− Example of commands : enable, ping, traceroute, etc.
Router
Router >
22-10-2016
WWW.KEYGROUPS.IN
Privilege Mode
Router
Router #
22-10-2016
WWW.KEYGROUPS.IN
Global Configuration Mode
• Configuration changes made in this mode affects the operation of the device as
a whole.
− Example of commands : hostname, etc.
Router
Router (config) #
22-10-2016
WWW.KEYGROUPS.IN
Interface Mode
Router
Router (config-if) #
22-10-2016
WWW.KEYGROUPS.IN
Line mode
• Commands given in this mode will apply to a specific physical or virtual lines.
i.e. Console, Auxiliary or VTY.
− Example of commands : password, no shutdown etc.
Router
Router (config-line) #
22-10-2016
WWW.KEYGROUPS.IN
Accessing Router
Console
HYD-1
Fa 0/0
192.168.1.1/24
Switch
Computer IP Address
192.168.1.10/24
22-10-2016
WWW.KEYGROUPS.IN
WAN Technologies
CCIE
C C 22-10-2016
N P
C C N A
Types of Network Access
• Enterprise Access
• Internet Access
22-10-2016
WWW.KEYGROUPS.IN
Types of WAN Technologies
WAN
Enterprise Internet
Switch Switch
Data Data
Switch
HYDERABAD
Office
LAN – 192.168.2.0/24
22-10-2016
WWW.KEYGROUPS.IN
Circuit Switched
Chennai Bangalore
Office CHE BAN Office
Fa0/0 Fa0/0
Switch Switch
Data Data
HYD
LAN – 192.168.1.0/24 LAN – 192.168.3.0/24
Fa0/0
Switch
HYDERABAD
Office
LAN – 192.168.2.0/24
22-10-2016
WWW.KEYGROUPS.IN
Packet Switched
Chennai Bangalore
Office CHE BAN Office
Fa0/0
Service Fa0/0
Provider
Switch Switch
Data
Data Data
HYD
LAN – 192.168.1.0/24 LAN – 192.168.3.0/24
Fa0/0
Switch
HYDERABAD
Office
LAN – 192.168.2.0/24
22-10-2016
WWW.KEYGROUPS.IN
VPN
Chennai Bangalore
Office CHE BAN Office
Fa0/0
Internet Fa0/0
Switch Switch
Data Data
HYD
LAN – 192.168.1.0/24 LAN – 192.168.3.0/24
Fa0/0
Switch
HYDERABAD
Office
LAN – 192.168.2.0/24
22-10-2016
WWW.KEYGROUPS.IN
Internet Connectivity
Cable
Modem
VSAT
Telephone line
Fiber cable
ISDN ISDN Internet
Modem Optical
Convertor
Telephone line
Leased line
DSL Wireless
Modem router
CSU/DSU
22-10-2016
WWW.KEYGROUPS.IN
WAN Topologies
Hub & Spoke
• STAR or Hub and Spoke Topology
− Easy to deploy, Less number of connections
− No backup/redundancy
22-10-2016
WWW.KEYGROUPS.IN
WAN Connectivity
CCIE
C C 22-10-2016
N P
C C N A
Leased Line Connectivity
Chennai Hyderabad
Office Office
Chennai Hyderabad
MUX MUX
Fiber Optic
CHE HYD
Fa0/0 Pair of Fa0/0
192.168.1.1/24 Copper wire 192.168.2.1/24
22-10-2016
WWW.KEYGROUPS.IN
Wan Connectivity Representation
S 0/0
S 0/0/1
172.16.0.1
172.16.0.2
CHE HYD
Fa 0/0 Fa 0/0
192.168.1.1 192.168.2.1
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Device Classification
DCE DTE
22-10-2016
WWW.KEYGROUPS.IN
Serial - back to back cable
• When the distance between two Routers is short, a special V.35 Back to Back
Cable is used to replace the copper wire, CSU/DSU and MUX.
• For data communication using back to back Serial cable, one end has to be a
DCE and the other has to be a DTE.
ROUTER 1
DCE DTE
ROUTER 2
22-10-2016
WWW.KEYGROUPS.IN
Encapsulation
22-10-2016
WWW.KEYGROUPS.IN
Wan Encapsulation
PPP HDLC
22-10-2016
WWW.KEYGROUPS.IN
Wan - Serial Interface Configuration on IPv4 Network
S 0/1
S 0/0
172.18.0.2
172.18.0.1
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.1.1 172.16.0.1 172.17.0.2 192.168.3.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.2.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
Identify Serial Interface (DCE or DTE)
22-10-2016
WWW.KEYGROUPS.IN
Wan - Serial Interface Configuration on IPv4 Network
22-10-2016
WWW.KEYGROUPS.IN
Wan - Serial Interface Configuration on IPv4 Network
CHE BAN
CHE (config)# interface serial 0/0 BAN (config)# interface serial 0/0
CHE (config-if)# ip address 172.16.0.1 255.255.0.0 BAN (config-if)# ip address 172.18.0.1 255.255.0.0
CHE (config-if)# no shutdown BAN (config-if)# no shutdown
CHE (config-if)# clock rate 64000 BAN (config-if)# clock rate 64000
CHE (config-if)# encapsulation hdlc BAN (config-if)# encapsulation hdlc
CHE (config-if)# exit BAN (config-if)# exit
CHE (config)# interface serial 0/1 BAN (config)# interface serial 0/1
CHE (config-if)# ip address 172.18.0.2 255.255.0.0 BAN (config-if)# ip address 172.17.0.2 255.255.0.0
CHE (config-if)# no shutdown BAN (config-if)# no shutdown
CHE (config-if)# encapsulation hdlc BAN (config-if)# encapsulation hdlc
CHE (config-if)# exit CHE
BAN (config-if)# exit
HYD-1
HYD-1 (config)# interface serial 0/0/0
HYD-1 (config-if)# ip address 172.17.0.1 255.255.0.0
HYD-1 (config-if)# no shutdown
HYD-1 (config-if)# clock rate 64000
HYD-1 (config-if)# encapsulation hdlc
HYD-1 (config-if)# exit
HYD-1 (config)# interface serial 0/0/1
HYD-1 (config-if)# ip address 172.16.0.2 255.255.0.0
Network Diagram
HYD-1 (config-if)# no shutdown
22-10-2016
HYD-1 (config-if)# encapsulation hdlc
HYD-1 (config-if)# exitWWW.KEYGROUPS.IN
Wan - Serial Interface - Verification
22-10-2016
WWW.KEYGROUPS.IN
Troubleshooting Serial Interface
22-10-2016
WWW.KEYGROUPS.IN
Wan - Ethernet Interface Configuration on IPv6 Network
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Wan - Ethernet Interface Configuration on IPv6 Network
22-10-2016
WWW.KEYGROUPS.IN
Wan - Ethernet Interface Configuration on IPv6 Network
HYD-1 HYD-2
HYD-1 (config)# interface fastethernet 0/1 HYD-2 (config)# interface fastethernet 0/1
HYD-1 (config-if)# ipv6 address 2001:5555::1/64 HYD-2 (config-if)# ipv6 address 2001:5555::2/64
HYD-1 (config-if)# no shutdown HYD-2 (config-if)# no shutdown
HYD-1 (config-if)# exit HYD-2 (config-if)# exit
HYD-1 (config)# HYD-2 (config)#
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Wan - Ethernet Interface - Verification
22-10-2016
WWW.KEYGROUPS.IN
Troubleshooting Ethernet Interface
22-10-2016
WWW.KEYGROUPS.IN
IP Routing
CCIE
C C 22-10-2016
N P
C C N A
IP Routing
22-10-2016
WWW.KEYGROUPS.IN
IP Routing
S0/0/1 S0/0/0
HYD
S0/1
S0/0
CHE
DATA S0/0 BAN
S0/1
Fa 0/0
Fa 0/0
22-10-2016
WWW.KEYGROUPS.IN
IP Routing - Network Diagram
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Conditions for IP Routing
22-10-2016
WWW.KEYGROUPS.IN
Types of Routing
• Static Routing
• Dynamic Routing
• Default Routing
22-10-2016
WWW.KEYGROUPS.IN
Static Routing
CCIE
C C 22-10-2016
N P
C C N A
Static Routing
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv4 Network
S 0/1
S 0/0
172.18.0.2
172.18.0.1
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.1.1 172.16.0.1 172.17.0.2 192.168.3.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.2.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv4 Network - Configuration
Router(config) # ip routing
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv4 Network - Configuration
CHE BAN
CHE (config) # ip routing BAN (config) # ip routing
CHE
HYD-1
HYD-1 (config) # ip routing
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv4 Network - Configuration
(OR)
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv4 Network
S 0/1
S 0/0
172.18.0.2
172.18.0.1
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.1.1 172.16.0.1 172.17.0.2 192.168.3.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.2.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv4 Network - Configuration
CHE BAN
CHE (config) # ip route 192.168.2.0 255.255.255.0 172.16.0.2 BAN (config) # ip route 192.168.2.0 255.255.255.0 172.17.0.1
CHE (config) # ip route 192.168.3.0 255.255.255.0 172.18.0.1 BAN (config) # ip route 192.168.1.0 255.255.255.0 172.18.0.2
CHE
HYD-1
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
Static Routing for IPv6 Network
CCIE
C C 22-10-2016
N P
C C N A
Enabling Routing on IPv6 Network
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv6 Network - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv6 Network - Configuration
HYD-1 HYD-2
HYD-1 (config) # ipv6 unicast-routing HYD-2 (config) # ipv6 unicast-routing
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Enabling Routing on IPv6 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv6 Network - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv6 Network
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv6 Network - Configuration
HYD-1 HYD-2
HYD-1 (config) # ipv6 route 2001:2222::/64 2001:5555::2 HYD-2 (config) # ipv6 route 2001:1111::/64 2001:5555::1
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Static Routing on IPv6 Network - Verification
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Advantages and Disadvantages of Static routing
Advantages Disadvantages
22-10-2016
WWW.KEYGROUPS.IN
Dynamic Routing
CCIE
C C 22-10-2016
N P
C C N A
Overview of Dynamic Routing Protocol
22-10-2016
WWW.KEYGROUPS.IN
Advantages of Dynamic Routing
• Automatic updates.
• Changes in the network topology are updated dynamically
• Only the directly connected network information is required for the
configuration
• Less Administrative work
• Selecting the best path to destination networks
• Finding the second best path if best path is no longer available.
• More scalable
• Used for medium and large Networks
22-10-2016
WWW.KEYGROUPS.IN
Types of Dynamic Routing Protocols
Dynamic Routing
IGP EGP
RIP OSPF
EIGRP BGP
IGRP IS-IS
22-10-2016
WWW.KEYGROUPS.IN
Classfull v/s Classless Routing Protocol
• Do not send the subnet mask in • Carries the subnet mask in the
the update update
• Doesn’t support subnetting • Supports subnetting
• Ex: RIP v1, IGRP • Ex: RIP v2, EIGRP, OSPF
22-10-2016
WWW.KEYGROUPS.IN
Routing Information Protocol
(RIP)
CCIE
C C 22-10-2016
N P
C C N A
RIP Characteristics
22-10-2016
WWW.KEYGROUPS.IN
RIP Characteristics
22-10-2016
WWW.KEYGROUPS.IN
Loopback Interface
22-10-2016
WWW.KEYGROUPS.IN
Loopback Interface - Configuration
22-10-2016
WWW.KEYGROUPS.IN
RIP on IPv4 Network - Configuration
Router(config) # ip routing
Router(config) # router rip
Router(config-router) # version 2
Router(config-router) # network < Network ID >
22-10-2016
WWW.KEYGROUPS.IN
RIP on IPv4 Network
22-10-2016
WWW.KEYGROUPS.IN
RIP on IPv4 Network - Configuration
CHE BAN
CHE (config) # ip routing BAN (config) # ip routing
CHE (config) # router rip BAN (config) # router rip
CHE (config-router) # version 2 BAN (config-router) # version 2
CHE (config-router) # network 192.168.1.0 BAN (config-router) # network 192.168.3.0
CHE (config-router) # network 172.16.0.0 BAN (config-router) # network 172.17.0.0
CHE (config-router) # network 172.18.0.0 BAN (config-router) # network 172.18.0.0
CHE (config-router) # network 16.0.0.0 BAN (config-router) # network 18.0.0.0
CHE (config-router) # end BAN (config-router) # end
CHE # BAN #
CHE
HYD-1
HYD-1 (config) # ip routing
HYD-1 (config) # router rip
HYD-1 (config-router) # version 2
HYD-1 (config-router) # network 192.168.2.0
HYD-1 (config-router) # network 172.16.0.0
HYD-1 (config-router) # network 172.17.0.0
HYD-1 (config-router) # network 17.0.0.0
HYD-1 (config-router) # end
HYD-1 # Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
RIP on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
RIP Timers
22-10-2016
WWW.KEYGROUPS.IN
RIP Updates
22-10-2016
WWW.KEYGROUPS.IN
Change RIP Timers
HYD-1
HYD-1 (config) # router rip
HYD-1 (config-router) # timers basic 15 30 90 90
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Passive interface
• Passive interface is configured to stop the updates to exit out of the interface.
• If passive interface is configured between the routers no updates will be
exchanged.
22-10-2016
WWW.KEYGROUPS.IN
Configure Passive interface
HYD-1
HYD-1 (config) # router rip
HYD-1 (config-router) # passive-interface FastEthernet0/0
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Summarization
22-10-2016
WWW.KEYGROUPS.IN
Disable auto-summary
HYD-1
HYD-1 (config) # router rip
HYD-1 (config-router) # no auto-summary
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
RIPng
CCIE
C C 22-10-2016
N P
C C N A
RIPng Characteristics
22-10-2016
WWW.KEYGROUPS.IN
RIPng on IPv6 Network - Configuration
22-10-2016
WWW.KEYGROUPS.IN
RIPng on IPv6 Network
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
RIPng on IPv6 Network - Configuration
HYD-1 HYD-2
HYD-1 (config) # ipv6 unicast-routing HYD-2 (config) # ipv6 unicast-routing
HYD-1 (config) # ipv6 router rip cisco HYD-2 (config) # ipv6 router rip cisco
HYD-1 (config-rtr) # exit HYD-2 (config-rtr) # exit
HYD-1 (config) # interface fastethernet 0/0 HYD-2 (config) # interface fastethernet 0/0
HYD-1 (config-if) # ipv6 rip cisco enable HYD-2 (config-if) # ipv6 rip cisco enable
HYD-1 (config-if) # exit HYD-2 (config-if) # exit
HYD-1 (config) # interface fastethernet 0/1 HYD-2 (config) # interface fastethernet 0/1
HYD-1 (config-if) # ipv6 rip cisco enable HYD-2 (config-if) # ipv6 rip cisco enable
HYD-1 (config-if) # end HYD-2 (config-if) # end
HYD-1 # HYD-2 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
RIPng on IPv6 Network - Verification
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Disadvantages of RIP
22-10-2016
WWW.KEYGROUPS.IN
Link State Routing Protocol
22-10-2016
WWW.KEYGROUPS.IN
Open Shortest Path First
(OSPF)
CCIE
C C 22-10-2016
N P
C C N A
OSPF Characteristics
22-10-2016
WWW.KEYGROUPS.IN
OSPF Characteristics
22-10-2016
WWW.KEYGROUPS.IN
Router ID
S0/1 172.17.0.1/16
22-10-2016
WWW.KEYGROUPS.IN
OSPF Neighbor States
Neighbor State Neighbor State
down down
A to B Links (comes up..)
RID 1.1.1.1 Init Init RID 2.2.2.2
Hello, Seen (null), RID 1.1.1.1
A Hello, Seen (1.1.1.1), RID 2.2.2.2
B
2-way 2-way
DR Election, Hello, DR=z.z.z.z DR Election,
If needed If needed
ExStart (LSA Headers)
(Full LSAs)
Loading Loading
Full Full
22-10-2016
WWW.KEYGROUPS.IN
OSPF Terminology
• Neighbor
− Routers that share a common link become neighbors.
− Neighbors are discovered by Hello Packets.
− To become neighbors the following should match
• Area ID
• Network ID and Subnet Mask
• Hello and Dead Intervals
• Authentication (optional)
• Adjacencies
− Adjacencies are formed once neighbor relation is established.
− In Adjacencies the database details are exchanged.
22-10-2016
WWW.KEYGROUPS.IN
OSPF Tables
22-10-2016
WWW.KEYGROUPS.IN
OSPF - Neighbor Table
10
S0
Hello S1 Hello
S0
B 15 E
S2 S1 S2
20
10
S0 S1 S1
Hello
10 Hello
A S2 D
S0
22-10-2016
WWW.KEYGROUPS.IN
OSPF - Database Table
10
DATABASE TABLE (Router A)
C S0
S0 Update
LAN – 10.0.0.0/8 Update
Update S1 Router E
S0 Router B S0
Router B
S1 S0
B
Router C
15 E
Router C
B E S2 S1 S2
S2 S1 S2
20
S0 S1 S1
10
AA S2
S0 D S0 S1 S1
Update
Router D
10 Router E
A S2 D
Router B
S0 Router C
22-10-2016
WWW.KEYGROUPS.IN
OSPF - Database Table
10
DATABASE TABLE (Router A)
C S0
S0
LAN – 10.0.0.0/8 S1
S0
S0
S1 S0
B 15 E
B E S2 S1 S2
S2 S1 S2
20
S0 S1 S1
10
AA S2
S0 D S0 S1 S1
22-10-2016
WWW.KEYGROUPS.IN
Wild Card Mask
E.g.
255.255.255.255 255.255.255.255
– 255.255.255. 0 – 255.255.255.240
------------------------ ------------------------
0. 0. 0.255 0. 0. 0. 15
22-10-2016
WWW.KEYGROUPS.IN
OSPF Single Area on IPv4 Network - Configuration
Router(config) # ip routing
Router(config) # router ospf < Process ID >
Router(config-router) # router-id < Router ID >
Router(config-router) # network < Network ID > <Wildcard mask>
area <area ID >
22-10-2016
WWW.KEYGROUPS.IN
OSPF Single Area on IPv4 Network
S 0/1
S 0/0
172.18.0.2
172.18.0.1
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
AREA 0
192.168.1.1 172.16.0.1 172.17.0.2 192.168.3.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.2.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
OSPF Single Area on IPv4 Network - Configuration
CHE BAN
CHE (config) # ip routing BAN (config) # ip routing
CHE (config) # router ospf 1 BAN (config) # router ospf 3
CHE (config-router) # router-id 1.1.1.1 BAN (config-router) # router-id 3.3.3.3
CHE (config-router) # network 192.168.1.0 0.0.0.255 area 0 BAN (config-router) # network 192.168.3.0 0.0.0.255 area 0
CHE (config-router) # network 172.16.0.0 0.0.255.255 area 0 BAN (config-router) # network 172.17.0.0 0.0.255.255 area 0
CHE (config-router) # network 172.18.0.0 0.0.255.255 area 0 BAN (config-router) # network 172.18.0.0 0.0.255.255 area 0
CHE (config-router) # end BAN (config-router) # end
CHE # BAN #
CHE
HYD-1
HYD-1 (config) # ip routing
HYD-1 (config) # router ospf 2
HYD-1 (config-router) # router-id 2.2.2.2
HYD-1 (config-router) # network 192.168.2.0 0.255.255.255 area 0
HYD-1 (config-router) # network 172.16.0.0 0.0.255.255 area 0
HYD-1 (config-router) # network 172.17.0.0 0.0.255.255 area 0
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
OSPF Single Area on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
Link State Advertisement (LSA)
• Link
− Router interface
• State
− Description of interface and neighbor relation and sending to neighbor
routers.
• LSAs are additionally refreshed every 30 minutes.
22-10-2016
WWW.KEYGROUPS.IN
OSPF Packet types
• HELLO
− To Discover the neighbor
− To form neighbor relation
− Keep Alive mechanism
• DBD
− Database description the update are exchanged .
• LSR - Link state Request
− Used for requesting for a newer updated information.
• LSU – Link State Update
− Receiving the updated information from neighbors and link state update
• LSACK - Link State Acknowledgement
− Once receiving the update sends thanks for information called as link state
acknowledgement
22-10-2016
WWW.KEYGROUPS.IN
OSPF Hello Packets
22-10-2016
WWW.KEYGROUPS.IN
Passive interface
• Passive interface is configured to stop the hello packets from exiting out of the
interface.
• If passive interface is configured between the routers no neighbor relationship
will be formed and no updates will be exchanged.
22-10-2016
WWW.KEYGROUPS.IN
Configure Passive interface
HYD-1
HYD-1 (config) # router ospf 2
HYD-1 (config-router) # passive-interface FastEthernet0/0
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
OSPF Metric
Bandwidth
Interface OSPF Cost
(Kbps)
Serial 1544 64
Ethernet 10000 10
FastEthernet 100000 1
GigabitEthernet 1000000 1
22-10-2016
WWW.KEYGROUPS.IN
OSPF Cost metric for an interface
HYD-1
HYD-1 (config) # interface serial 0/0/0
HYD-1 (config-router) # ip ospf cost 100
HYD-1 (config-router) # end
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Issues with OSPF single area
Area 0
22-10-2016
WWW.KEYGROUPS.IN
OSPF Multiple Area
BR
Other AS
Area 0
ABR ABR
IR IR IR IR IR ASBR
Area 1 Area 2
22-10-2016
WWW.KEYGROUPS.IN
Types of Routers
22-10-2016
WWW.KEYGROUPS.IN
OSPF Multiple Area on IPv4 Network - Configuration
Router(config) # ip routing
Router(config) # router ospf < Process ID >
Router(config-router) # router-id < Router ID >
Router(config-router) # network < Network ID > <Wildcard mask>
area <Area ID >
22-10-2016
WWW.KEYGROUPS.IN
OSPF Multiple Area on IPv4 Network
S 0/1
S 0/0
172.18.0.2
172.18.0.1
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
AREA 0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
AREA 1 192.168.202.1 AREA 2
Switch
CHE BAN
CHE (config) # ip routing BAN (config) # ip routing
CHE (config) # router ospf 1 BAN (config) # router ospf 3
CHE (config-router) # router-id 1.1.1.1 BAN (config-router) # router-id 3.3.3.3
CHE (config-router) # network 192.168.1.0 0.0.0.255 area 1 BAN (config-router) # network 192.168.3.0 0.0.0.255 area 2
CHE (config-router) # network 172.16.0.0 0.0.255.255 area 0 BAN (config-router) # network 172.17.0.0 0.0.255.255 area 0
CHE (config-router) # network 172.18.0.0 0.0.255.255 area 0 BAN (config-router) # network 172.18.0.0 0.0.255.255 area 0
CHE (config-router) # end BAN (config-router) # end
CHE # BAN #
CHE
HYD-1
HYD-1 (config) # ip routing
HYD-1 (config) # router ospf 2
HYD-1 (config-router) # router-id 2.2.2.2
HYD-1 (config-router) # network 192.168.2.0 0.255.255.255 area 0
HYD-1 (config-router) # network 172.16.0.0 0.0.255.255 area 0
HYD-1 (config-router) # network 172.17.0.0 0.0.255.255 area 0
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
OSPF Multiple Area on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
OSPFv3
CCIE
C C 22-10-2016
N P
C C N A
OSPFv3 Characteristics
• RFC 2740
• Multicast address is FF02::5 and FF02::6
• Ospfv3 is configured on link basis.
• OSPFv3 supports multiple instances on a single link.
• OSPFv3 adjacencies are formed using link-local address.
• Still uses the router-id from IPv4
22-10-2016
WWW.KEYGROUPS.IN
OSPFv3 on IPv6 Network - Configuration
22-10-2016
WWW.KEYGROUPS.IN
OSPFv3 on IPv6 Network
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
OSPFv3 on IPv6 Network - Configuration
HYD-1 HYD-2
HYD-1 (config) # ipv6 unicast-routing HYD-2 (config) # ipv6 unicast-routing
HYD-1 (config) # ipv6 router ospf 2 HYD-2 (config) # ipv6 router ospf 2
HYD-1 (config-rtr) # router-id 11.11.11.11 HYD-2 (config-rtr) # router-id 22.22.22.22
HYD-1 (config-rtr) # exit HYD-2 (config-rtr) # exit
HYD-1 (config) # interface fastethernet 0/0 HYD-2 (config) # interface fastethernet 0/0
HYD-1 (config-if) # ipv6 ospf 2 area 0 HYD-2 (config-if) # ipv6 ospf 2 area 0
HYD-1 (config-if) # exit HYD-2 (config-if) # exit
HYD-1 (config) # interface fastethernet 0/1 HYD-2 (config) # interface fastethernet 0/1
HYD-1 (config-if) # ipv6 ospf 2 area 0 HYD-2 (config-if) # ipv6 ospf 2 area 0
HYD-1 (config-if) # end HYD-2 (config-if) # end
HYD-1 # HYD-2 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
OSPFv3 on IPv6 Network - Verification
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Disadvantages of OSPF
22-10-2016
WWW.KEYGROUPS.IN
Enhanced Interior Gateway Routing Protocol
(EIGRP)
CCIE
C C 22-10-2016
N P
C C N A
EIGRP Characteristics
22-10-2016
WWW.KEYGROUPS.IN
EIGRP Characteristics
• Administrative Distance is 90
• Maximum Hop Count is 255 (Default 100)
• Hello timer – 5 seconds, Hold on timer - 15seconds
• Supports multiple Routed Protocols - IP, IPX, Apple talk
• EIGRP protocol number 88.
22-10-2016
WWW.KEYGROUPS.IN
EIGRP Tables
• Neighbor Table
− Contains information about directly connected neighbors.
• Topology Table
− Contains entries for all destinations, along with the feasible distance and the
advertised distance.
− Contains the successors.
− Contains feasible successor if any.
• Routing Table
− Entries with the best path for each destination from the Topology table are
moved into the Routing Table
22-10-2016
WWW.KEYGROUPS.IN
EIGRP Terminology
• Feasible Distance FD :
− Feasible distance (FD) is the metric of the best route to a destination, including the
local link distance.
− Feasible distance = advertised distance + local link distance (of the best path)
• Advertised Distance AD:
− The distance of a route as advertised by the neighbor. It does not include the local
link distance.
• Successor :
− The neighbor with best distance to the destination.
• Feasible Successor :
− The neighbor with second best distance to the destination, which meets this
criteria: advertised distance should be less than the feasible distance (AD <FD)
22-10-2016
WWW.KEYGROUPS.IN
EIGRP - Neighbor Table
10
S0
Hello S1 Hello
S0
B 15 E
S2 S1 S2
20
10
S0 S1 S1
Hello
10 Hello
A S2 D
S0
22-10-2016
WWW.KEYGROUPS.IN
EIGRP - Topology Table
10
TOPOLOGY TABLE (Router A)
NetworkNeighbor TD AD FD S0
10.0.0.0/8 via B 30 10 30 S
via E 35 25 FS Update S1 Update
via D 45 35
S0
B 15 E
S2 S1 S2
20
10
S0 S1 S1
10 Update
A S2 D
S0
22-10-2016
WWW.KEYGROUPS.IN
EIGRP - Routing Table
10
TOPOLOGY TABLE (Router A)
NetworkNeighbor TD AD FD S0
10.0.0.0/8 via B 30 10 30 S
via E 35 25 FS S1
via D 45 35
S0
B 15 E
S2 S1 S2
ROUTING TABLE (Router A)
D 10.0.0.0/8 [90/30] via B, 01:36, Serial0
20
10
S0 S1 S1
10
A S2 D
S0
22-10-2016
WWW.KEYGROUPS.IN
Autonomous System
22-10-2016
WWW.KEYGROUPS.IN
Routing Protocol Classification
IGP EGP
22-10-2016
WWW.KEYGROUPS.IN
IGP and EGP
IGP IGP
RIP, OSPF, IGRP, EIGRP RIP, OSPF, IGRP, EIGRP
EGP Data
BGP
• IGPs operate
ABC - ASwithin
100 an autonomous system XYZ - AS 200
• EGPs connect different autonomous systems
22-10-2016
WWW.KEYGROUPS.IN
EIGRP on IPv4 Network - Configuration
Router(config) # ip routing
Router(config) # router eigrp < AS No >
Router(config-router) # network < Network ID >
22-10-2016
WWW.KEYGROUPS.IN
EIGRP on IPv4 Network
S 0/1
S 0/0
172.18.0.2
172.18.0.1
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
AS 100
192.168.1.1 172.16.0.1 172.17.0.2 192.168.3.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.2.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
EIGRP on IPv4 Network - Configuration
CHE BAN
CHE (config) # ip routing BAN (config) # ip routing
CHE (config) # router eigrp 100 BAN (config) # router eigrp 100
CHE (config-router) # network 192.168.1.0 0.0.0.255 BAN (config-router) # network 192.168.3.0 0.0.0.255
CHE (config-router) # network 172.16.0.0 0.0.255.255 BAN (config-router) # network 172.17.0.0 0.0.255.255
CHE (config-router) # network 172.18.0.0 0.0.255.255 BAN (config-router) # network 172.18.0.0 0.0.255.255
CHE (config-router) # end BAN (config-router) # end
CHE # BAN #
CHE
HYD-1
HYD-1 (config) # ip routing
HYD-1 (config) # router eigrp 100
HYD-1 (config-router) # network 192.168.2.0 0.0.0.255
HYD-1 (config-router) # network 172.16.0.0 0.0.255.255
HYD-1 (config-router) # network 172.17.0.0 0.0.255.255
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
EIGRP on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
EIGRP Metric
Bandwidth
Interface Delay (µs)
(Kbps)
Serial 1544 20000
Ethernet 10000 1000
FastEthernet 100000 100
GigabitEthernet 1000000 10
22-10-2016
WWW.KEYGROUPS.IN
EIGRP Metric Calculation
S 0/1
BW- 1544 kbps S 0/0
CHE Delay-20000 µs BAN
Fa 0/0 S 0/0 BW- 1544 kbps BW- 1544 kbps S 0/1 Fa 0/0
Delay-20000 µs Delay-20000 µs
BW- 100000 kbps S 0/0/1 S 0/0/0 BW- 100000 kbps
Delay-100
Switch µs HYD-1 Delay-100
Switch µs
Fa 0/0
22-10-2016
WWW.KEYGROUPS.IN
Passive interface
• Passive interface is configured to stop the hello packets from exiting out of the
interface.
• If passive interface is configured between the routers no neighbor relationship
will be formed and no updates will be exchanged.
22-10-2016
WWW.KEYGROUPS.IN
Configure Passive interface
HYD-1
HYD-1 (config) # router eigrp 100
HYD-1 (config-router) # passive-interface FastEthernet0/0
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Router ID
S0/1 172.17.0.1/16
22-10-2016
WWW.KEYGROUPS.IN
Configure Router ID
HYD-1
HYD-1 (config) # router eigrp 100
HYD-1 (config-router) # eigrp router-id 2.2.2.2
HYD-1 (config-router) # end
HYD-1 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
EIGRP - Load Balancing
22-10-2016
WWW.KEYGROUPS.IN
EIGRP - Equal Cost Load Balancing
Metric = 100
A Metric = 200 B
Data
Metric = 100
22-10-2016
WWW.KEYGROUPS.IN
EIGRP – Unequal Cost Load Balancing
Metric = 100
A Metric = 200 B
Data
Metric = 100
22-10-2016
WWW.KEYGROUPS.IN
EIGRPv6
CCIE
C C 22-10-2016
N P
C C N A
EIGRPv6 Characteristics
• RFC 7868
• Multicast Address for EIGRPv6 is FF02::A
• Still uses the router-id from IPv4
22-10-2016
WWW.KEYGROUPS.IN
EIGRPv6 on IPv6 Network - Configuration
22-10-2016
WWW.KEYGROUPS.IN
EIGRPv6 on IPv6 Network
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
EIGRPv6 on IPv6 Network - Configuration
HYD-1 HYD-2
HYD-1 (config) # ipv6 unicast-routing HYD-2 (config) # ipv6 unicast-routing
HYD-1 (config) # ipv6 router eigrp 100 HYD-2 (config) # ipv6 router eigrp 100
HYD-1 (config-rtr) # eigrp router-id 11.11.11.11 HYD-2 (config-rtr) # eigrp router-id 22.22.22.22
HYD-1 (config-rtr) # exit HYD-2 (config-rtr) # exit
HYD-1 (config) # interface fastethernet 0/0 HYD-2 (config) # interface fastethernet 0/0
HYD-1 (config-if) # ipv6 eigrp 100 HYD-2 (config-if) # ipv6 eigrp 100
HYD-1 (config-if) # exit HYD-2 (config-if) # exit
HYD-1 (config) # interface fastethernet 0/1 HYD-2 (config) # interface fastethernet 0/1
HYD-1 (config-if) # ipv6 eigrp 100 HYD-2 (config-if) # ipv6 eigrp 100
HYD-1 (config-if) # end HYD-2 (config-if) # end
HYD-1 # HYD-2 #
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
EIGRPv6 on IPv6 Network - Verification
Network Diagram
22-10-2016
WWW.KEYGROUPS.IN
Border Gateway Protocol
(BGP)
CCIE
C C 22-10-2016
N P
C C N A
BGP Features
22-10-2016
WWW.KEYGROUPS.IN
EBGP on IPv4 Network - Configuration
Router(config) # ip routing
Router(config) # router bgp <AS No>
Router(config-router) # network < Network ID > mask <Subnet mask>
Router(config-router) # neighbor < peer address > remote-as < peer-as-no >
Router(config-router) # end
22-10-2016
WWW.KEYGROUPS.IN
EBGP on IPv4 Network - Configuration
AS 100 AS 300
CHE BAN
Fa 0/0 S 0/0/0 S 0/0/1 Fa 0/0
AS 200
192.168.1.1 172.16.0.1 172.17.0.2 192.168.3.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.2.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
EBGP on IPv4 Network - Configuration
CHE BAN
BAN (config) # ip routing
CHE (config) # ip routing
BAN (config) # router bgp 300
CHE (config) # router bgp 100
BAN (config-router) # network 192.168.3.0 mask 255.255.255.0
CHE (config-router) # network 192.168.1.0 mask 255.255.255.0
BAN (config-router) # network 172.17.0.0 mask 255.255.0.0
CHE (config-router) # network 172.16.0.0 mask 255.255.0.0
BAN (config-router) # neighbor 172.17.0.1 remote-as 200
CHE (config-router) # neighbor 172.16.0.2 remote-as 200
BAN (config-router) # end
CHE (config-router) # end
BAN (config) #
CHE
HYD-1
HYD-1 (config) # ip routing
HYD-1 (config) # router bgp 200
HYD-1 (config-router) # network 192.168.2.0 mask 255.255.255.0
HYD-1 (config-router) # network 172.16.0.0 mask 255.255.0.0
HYD-1 (config-router) # network 172.17.0.0 mask 255.255.0.0
HYD-1 (config-router) # neighbor 172.16.0.1 remote-as 100
HYD-1 (config-router) # neighbor 172.17.0.2 remote-as 300
HYD-1 (config-router) # end
22-10-2016
WWW.KEYGROUPS.IN
EBGP on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
Administrative Distance
• When ever multiple routing protocols are configured on a router to reach the
same destination router makes use of Administrative Distance
• “Lesser the Administrative Distance more the Priority”
22-10-2016
WWW.KEYGROUPS.IN
Switching
CCIE
C C 22-10-2016
N P
C C N A
Ethernet
22-10-2016
WWW.KEYGROUPS.IN
FastEthernet
• The Fast Ethernet standard (IEEE 802.3u) has been established for Ethernet
networks that need higher transmission speeds.
• FastEthernet speed is 100 Mbps.
22-10-2016
WWW.KEYGROUPS.IN
Gigabit Ethernet
22-10-2016
WWW.KEYGROUPS.IN
10 Gigabit Ethernet
• 10 Gigabit Ethernet is the fastest and most recent of the Ethernet standards i.e.
IEEE 802.3ae.
• 10 Gigabit Ethernet is based entirely on the use of optical fiber connections.
• 10 Gigabit Ethernet speed is 10000 Mbps i.e. 10 Gbps
22-10-2016
WWW.KEYGROUPS.IN
Broadcast Domain
Banjara Hills
Data
LAN
Data
Data
22-10-2016
WWW.KEYGROUPS.IN
Collision Domain
• A collision domain is a set of network devices for which a frame sent by one
device could result in a collision with a frame sent by any other device in the
same LAN segment.
Banjara Hills
Data
LAN
Data
22-10-2016
WWW.KEYGROUPS.IN
How Switch works ?
Data
001C-C01A-0004
001C-C01A-0003
22-10-2016
WWW.KEYGROUPS.IN
How Switch works ?
22-10-2016
WWW.KEYGROUPS.IN
How Switch works ?
001C-C01A-0004
001C-C01A-0003
22-10-2016
WWW.KEYGROUPS.IN
Types of Switches
• Manageable switches
− On a Manageable switch an IP address can be assigned and configurations
can be made. It has a console port .
• Unmanageable switches
− On an Unmanageable switch configurations cannot be made, an IP address
cannot be assigned as there is no console port.
22-10-2016
WWW.KEYGROUPS.IN
Campus Network
22-10-2016
WWW.KEYGROUPS.IN
Hierarchical Design
CORE LAYER
LAYER 3
DISTRIBUTION
LAYER
22-10-2016
WWW.KEYGROUPS.IN
Cisco’s Hierarchical Design for switches
22-10-2016
WWW.KEYGROUPS.IN
Initial Configuration of Switch
CCIE
C C 22-10-2016
N P
C C N A
Initial Configuration
Console
Switch
Vlan 1
192.168.1.50/24
Computer IP Address
192.168.1.10
22-10-2016
WWW.KEYGROUPS.IN
Duplex and Speed
• Switch automatically adjusts duplex mode and speed depending upon remote
device.
• We can set duplex mode and speed to match any of the supported modes.
22-10-2016
WWW.KEYGROUPS.IN
Interface Speed & Duplex - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Methods of Switching
22-10-2016
WWW.KEYGROUPS.IN
Store and Forward
22-10-2016
WWW.KEYGROUPS.IN
Cut Through
• The switch reads only the first 6bytes of frame that is destination MAC address.
• As there is no CRC check the corrupted frames are also forwarded.
• This is the fastest method of switching.
• Invalid frames are processed.
22-10-2016
WWW.KEYGROUPS.IN
Fragment Free
22-10-2016
WWW.KEYGROUPS.IN
Virtual LAN (VLAN)
CCIE
C C 22-10-2016
N P
C C N A
Virtual LAN
22-10-2016
WWW.KEYGROUPS.IN
How LAN works ?
SWITCH
1 2 3 4 5 6
PC1
Data PC2
Data PC3 PC4 PC5
Data PC6
Data
192.168.1.0/24
22-10-2016
WWW.KEYGROUPS.IN
How VLAN works ?
SWITCH
1 2 3 4 5 6
Sales Mktg
VLAN VLAN
10 20
PC1
Data PC2
Data PC3 PC4 PC5
Data PC6
Data
192.168.1.0/24
22-10-2016
WWW.KEYGROUPS.IN
VLAN - Configuration
Creating VLAN
Implementation of Vlan
22-10-2016
WWW.KEYGROUPS.IN
VLAN - Configuration
24 24
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
VLAN - Configuration
SW1 SW2
22-10-2016
WWW.KEYGROUPS.IN
VLAN – Verification
22-10-2016
WWW.KEYGROUPS.IN
Trunk
CCIE
C C 22-10-2016
N P
C C N A
Trunk
• Trunk Port allows multiple VLAN traffic to pass through a single physical
connection by adding a header to Ethernet frame.
• Trunking protocols of two different types
22-10-2016
WWW.KEYGROUPS.IN
VLAN Tagging
• VLAN Tagging is used when a link needs to carry traffic for more than one
VLAN.
• Each frame has a tag that specifies the VLAN it belongs to.
• Tag is added to the frame when it goes on to the trunk and tag is removed
when it leaves the trunk.
• Switch forwards the frame to a particular VLAN based on tag information.
22-10-2016
WWW.KEYGROUPS.IN
How VLAN Tagging works ?
Data24 Vlan 10
20 24
Data
SWITCH - 1 SWITCH - 2
1 2 3 4 5 6 1 2 3 4 5 6
PC1
Data
Data PC2
Data PC3 PC4 PC5
Data PC6 PC11 PC12 PC13 PC14 PC15 PC16
Data
192.168.1.0/24 192.168.1.0/24
22-10-2016
WWW.KEYGROUPS.IN
Trunk - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Trunk - Configuration
24 24
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
Trunk - Configuration
SW1 SW2
SW1 (config)# interface fastethernet 0/24 SW2 (config)# interface fastethernet 0/24
SW1 (config-if)# switchport mode trunk SW2 (config-if)# switchport mode trunk
SW1 (config-if)# switchport trunk allowed vlan all SW2 (config-if)# switchport trunk allowed vlan all
SW1 (config-if)# ^Z SW2 (config-if)# ^Z
SW1 # SW2 #
CHE
22-10-2016
WWW.KEYGROUPS.IN
Trunk – Verification
22-10-2016
WWW.KEYGROUPS.IN
Native VLAN
• The native VLAN is the only VLAN whose frames are not tagged on a trunk, i.e.
native VLAN frames are transmitted unchanged.
• By default VLAN 1 is native VLAN, we can however configure another VLAN as
native VLAN.
22-10-2016
WWW.KEYGROUPS.IN
Native VLAN - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Native VLAN – Verification
22-10-2016
WWW.KEYGROUPS.IN
Dynamic Trunking Protocol (DTP)
CCIE
C C 22-10-2016
N P
C C N A
Dynamic Trunking Protocol (DTP)
22-10-2016
WWW.KEYGROUPS.IN
DTP Modes
22-10-2016
WWW.KEYGROUPS.IN
DTP Modes
Dynamic Auto TRUNK Mode Trunk
Switch Switch
Dynamic Desirable TRUNK Mode Trunk
Switch Switch
22-10-2016
WWW.KEYGROUPS.IN
DTP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
DTP - Configuration
24 24
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
DTP - Configuration
SW1 SW2
SW1 (config)# interface fastethernet 0/24 SW2 (config)# interface fastethernet 0/24
SW1 (config-if)# switchport mode dynamic desirable SW2 (config-if)# switchport mode dynamic auto
SW1 (config-if)# end SW2 (config-if)# end
SW1 # SW2 #
CHE
22-10-2016
WWW.KEYGROUPS.IN
DTP – Verification
22-10-2016
WWW.KEYGROUPS.IN
VLAN Trunking Protocol (VTP)
CCIE
C C 22-10-2016
N P
C C N A
VLAN Trunking Protocol (VTP)
Note: Switches should be configured with same Domain Name. Domain Names
are Case sensitive
22-10-2016
WWW.KEYGROUPS.IN
VTP Modes
• Server
− Default mode
− Create , Modify and Delete VLANs
− Forwards advertisements
− Synchronizes
• Client
− Cannot create, Modify or delete VLANs
− Does not store VLAN Information in the NVRAM
− Forwards advertisements
− Synchronizes
• Transparent
− Create ,Modify and Delete local VLANs only
− Forwards advertisements
− Does not synchronize
22-10-2016
WWW.KEYGROUPS.IN
How VTP works ?
Adding VLAN 10
22-10-2016
WWW.KEYGROUPS.IN
VTP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
VTP - Configuration
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
VTP - Configuration
SW1 SW2
SW1 (config) # vtp domain KEYGROUPS SW2 (config) # vtp domain KEYGROUPS
Changing VTP domain name from null to KEYGROUPS Changing VTP domain name from null to KEYGROUPS
SW1 (config) # vtp password CCNA SW2 (config) # vtp password CCNA
Setting device VLAN database password to CCNA Setting device VLAN database password to CCNA
SW1 (config) # end SW2 (config) # vtp mode client
SW1 # Setting device to VTP CLIENT mode.
CHE SW2 (config) # end
SW2 #
22-10-2016
WWW.KEYGROUPS.IN
VTP – Verification
22-10-2016
WWW.KEYGROUPS.IN
Inter-VLAN Routing
CCIE
C C 22-10-2016
N P
C C N A
Inter-VLAN Routing
• Inter-vlan routing is a process of forwarding the traffic from one vlan to other
vlan using a router.
• The port where the router is connected on switch should be configured as trunk
to allow multiple vlan traffic
• The physical interface on router is divided into multiple sub-interfaces
• Each sub-interface is associated with one VLAN and one IP subnet.
• This is also called as Router on a stick.
22-10-2016
WWW.KEYGROUPS.IN
Routing between VLANs
22-10-2016
WWW.KEYGROUPS.IN
Routing between VLANs using multiple physical links
HYD-1
Fa 0/0 Fa 0/1
192.168.1.1/24 192.168.2.1/24
SWITCH
1 2 3 4 5 6
Sales Mktg
VLAN VLAN
10 20
22-10-2016
WWW.KEYGROUPS.IN
Routing between VLANs using single physical link
HYD-1
Fa 0/0.10 Fa 0/0.20
192.168.1.1/24 192.168.2.1/24
SWITCH
1 2 3 4 5 6
Sales Mktg
VLAN VLAN
10 20
22-10-2016
WWW.KEYGROUPS.IN
Routing between VLANs using Multi-layer Switch
PC1
Data PC2 PC3 PC4 PC5
Data PC6
192.168.1.0/24 192.168.2.0/24
22-10-2016
WWW.KEYGROUPS.IN
Router on a Stick - Configuration
Enabling IP Routing
Router (config) # ip routing
22-10-2016
WWW.KEYGROUPS.IN
Router on a Stick - Configuration
ROUTER
Fa 0/0.1 Fa 0/0.2
192.168.1.1/24 192.168.2.1/24
SWITCH
1 2 3 4 5 6
Sales Mktg
VLAN VLAN
10 20
22-10-2016
WWW.KEYGROUPS.IN
Router on a Stick - Configuration
ROUTER
22-10-2016
WWW.KEYGROUPS.IN
Router on a Stick – Verification
22-10-2016
WWW.KEYGROUPS.IN
Cisco Discovery Protocol
(CDP)
CCIE
C C 22-10-2016
N P
C C N A
Cisco Discovery Protocol (CDP)
22-10-2016
WWW.KEYGROUPS.IN
Advantages of CDP
• Once Layer 1 is active CDP sends the information to its active neighbors.
• It can be used for Layer 1, Layer 2, Layer 3 troubleshooting.
• Information advertised by CDP
− Logical address (if defined)
− Hostname
− Hardware Platform
− IOS Version
− Interface Type and Interface Number of local and remote device connected.
22-10-2016
WWW.KEYGROUPS.IN
CDP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
CDP - Configuration
14 19 13
SW1 24 24 SW2
1 2 3 1 2 3
22-10-2016
WWW.KEYGROUPS.IN
CDP - Configuration
SW1 SW2
SW1 (config) # cdp run SW2 (config) # cdp run
CHE
22-10-2016
WWW.KEYGROUPS.IN
CDP - Verification
22-10-2016
WWW.KEYGROUPS.IN
Disadvantages Of CDP
22-10-2016
WWW.KEYGROUPS.IN
Link Layer Discovery Protocol
(LLDP)
CCIE
C C 22-10-2016
N P
C C N A
Link Layer Discovery Protocol (LLDP)
22-10-2016
WWW.KEYGROUPS.IN
LLDP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
LLDP - Verification
22-10-2016
WWW.KEYGROUPS.IN
Spanning-Tree Protocol (STP)
CCIE
C C 22-10-2016
N P
C C N A
Redundant Topology
Data
Data
22-10-2016
WWW.KEYGROUPS.IN
Problems in Redundant Topologies
22-10-2016
WWW.KEYGROUPS.IN
Problems in Redundant Topologies
Data
Data
Data Data
Source MAC
001C.C01A.0002
Data DATA
Destination MAC
FFFF.FFFF.FFFF
22-10-2016
WWW.KEYGROUPS.IN
Spanning-tree Protocol
22-10-2016
WWW.KEYGROUPS.IN
STP Terminology
• Root Switch
− The switch with the best (lowest) Switch ID.
− Out of all the switches in the network, one switch is elected as a Root switch.
This Root switch becomes the focal point of the network.
• Switch ID
− Each switch has a unique identifier called a Bridge ID or Switch ID
− Bridge ID = Priority + MAC address of the switch
− Default priority is 32768
• Non-Root Switch
− All switches other than the Root switch are called Non-root switches.
22-10-2016
WWW.KEYGROUPS.IN
STP Terminology
• BPDU
− Switches exchange information using Bridge Protocol Data Units (BPDUs)
− BPDUs contain information that helps the switch to determine the topology
− BPDUs are sent every 2 sec
22-10-2016
WWW.KEYGROUPS.IN
STP Port states
22-10-2016
WWW.KEYGROUPS.IN
Root Switch Election
Switch ID: 32768. 0001.0000.0001
Root ID: 32768. 0001.0000.0001
BPDU Root ID: 32768. 0001.0000.0001
I am Root BPDU
A
Fa 0/23 Fa 0/24
Fa 0/24 Fa 0/23
BPDU
C
I am INon-Root
am Root B Fa 0/23 C I am Non-Root
Root
Fa 0/24
Switch ID: 32768. 0001.0000.0002 Switch ID: 32768. 0001.0000.0003
Root ID: 32768. 0001.0000.0002
0001.0000.0001 0001.0000.0003
Root ID: 32768. 0001.0000.0002
0001.0000.0001
BPDU Root ID: 32768. 0001.0000.0002
22-10-2016
WWW.KEYGROUPS.IN
STP Terminology
• Root port
− Every Non-Root Switch must have a Root port
− Only one port per switch can be the Root port
− All Root ports will be in forward state
− A Switch’s Root port is the port closest to the Root Switch
• The port with the least cost
• The port with the lowest Neighbor switch ID
• Lowest Physical Port Number
22-10-2016
WWW.KEYGROUPS.IN
IEEE Cost Values
Ethernet 100
Fast Ethernet 19
Gigabit Ethernet 4
10 Gigabit Ethernet 2
22-10-2016
WWW.KEYGROUPS.IN
Root Port Election
Switch ID: 32768. 0001.0000.0001
Root ID: 32768. 0001.0000.0001
Root
A
Fa 0/23 Fa 0/24
Root 19 19 Root
Port Port
Fa 0/24 Fa 0/23
C
Non-Root B C Non-Root
Fa 0/23 19 Fa 0/24
Switch ID: 32768. 0001.0000.0002 Switch ID: 32768. 0001.0000.0003
Root ID: 32768. 0001.0000.0001 Root ID: 32768. 0001.0000.0001
22-10-2016
WWW.KEYGROUPS.IN
Designated Port Election
• Designated port
− For Every segment there will be a Designated port
− A designated port will always be in Forward state
• The port with the least cost
• The port with the lowest Neighbor switch ID
• Lowest Physical Port Number
− All ports(Trunk ports) on the Root bridge are Designated ports
22-10-2016
WWW.KEYGROUPS.IN
Designated Port Election
Switch ID: 32768. 0001.0000.0001
Root ID: 32768. 0001.0000.0001
Designated Designated
Port Root Port
A
Fa 0/23 Fa 0/24
Root 19 19 Root
Port Port
Fa 0/24 Fa 0/23
C
Non-Root B C Non-Root
Fa 0/23 19 Fa 0/24
Switch ID: 32768. 0001.0000.0002 Designated Switch ID: 32768. 0001.0000.0003
Port
Root ID: 32768. 0001.0000.0001 Root ID: 32768. 0001.0000.0001
22-10-2016
WWW.KEYGROUPS.IN
STP Terminology
• Non-Designated port
− The ports that are neither Root ports nor the Designated ports
− These ports are blocked by STP
22-10-2016
WWW.KEYGROUPS.IN
Root Port Election
Switch ID: 32768. 0001.0000.0001
Root ID: 32768. 0001.0000.0001
Designated Designated
Port Root Port
A
Fa 0/23 Fa 0/24
Root 19 19 Root
Port Port
Non Designated Fa 0/23
Fa 0/24
Port
C
Non-Root B C Non-Root
Fa 0/23 19 Fa 0/24
Switch ID: 32768. 0001.0000.0002 Designated Switch ID: 32768. 0001.0000.0003
Port
Root ID: 32768. 0001.0000.0001 Root ID: 32768. 0001.0000.0001
22-10-2016
WWW.KEYGROUPS.IN
STP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
STP - Configuration
24 24
23 23
SW1 - 192.168.20.50 SW2 - 192.168.20.51
1 2 3 4 5 6 1 2 3 4 5 6
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
STP - Configuration
SW1 SW2
SW1 (config) # spanning-tree vlan 1 root primary SW1 (config) # spanning-tree vlan 1 root secondary
CHE
22-10-2016
WWW.KEYGROUPS.IN
STP - Verification
22-10-2016
WWW.KEYGROUPS.IN
Types of Spanning Tree Protocols
22-10-2016
WWW.KEYGROUPS.IN
Types of spanning tree protocols
22-10-2016
WWW.KEYGROUPS.IN
Comparison of spanning tree protocols
22-10-2016
WWW.KEYGROUPS.IN
Disadvantage of STP – On Access Ports
22-10-2016
WWW.KEYGROUPS.IN
PortFast
CCIE
C C 22-10-2016
N P
C C N A
PortFast
• Portfast allows a port to switch from disabled to forwarding state bypassing the
listening and learning states.
• The portfast feature can be enabled on a port where there are no Bridges and
switches connected, otherwise it may create loops.
• Portfast is recommended to be enabled on a port where end user devices
(hosts) are connected.
22-10-2016
WWW.KEYGROUPS.IN
Portfast - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Portfast - Configuration
24 24
23 23
SW1 - 192.168.20.50 SW2 - 192.168.20.51
1 2 3 4 5 6 1 2 3 4 5 6
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
Portfast - Verification
22-10-2016
WWW.KEYGROUPS.IN
BPDU Guard
• The Cisco BPDU guard feature disables the port, if any BPDUs are received on
the port.
• This is recommended to be enabled on a port where Portfast is configured,
because if any switch connects to such a port, the local switch can block the
port preventing loops.
22-10-2016
WWW.KEYGROUPS.IN
BPDU Guard - Configuration
22-10-2016
WWW.KEYGROUPS.IN
BPDU Guard - Configuration
24 24
23 23
SW1 - 192.168.20.50 SW2 - 192.168.20.51
1 2 3 4 5 6 1 2 3 4 5 6
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
BPDU Guard - Verification
22-10-2016
WWW.KEYGROUPS.IN
EtherChannel
CCIE
C C 22-10-2016
N P
C C N A
Issue with Redundant Link
23 23
1 2 3 4 5 6 1 2 3 4 5 6
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel
• Etherchannel combines two or more physical links into one logical link.
• The purposes of aggregating link is achieve the full bandwidth, load balancing
and redundancy.
• Generally configured between switch to switch, switch to router, switch to
firewall.
• Etherchannels can consist of up to eight interfaces.
• To create etherchannel all the ports needs :
− Same Physical ports (Ethernet or Fiber)
− Speed
− Duplex
− Either ports should be access or trunk
− Native and allowed vlan on trunk ports
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel
Port Channel 1
24 24
23 23
1 2 3 4 5 6 1 2 3 4 5 6
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel Configuration
• Static
• Port Aggregation Protocol (PAGP)
• Link aggregation control protocol (LACP)
22-10-2016
WWW.KEYGROUPS.IN
Port Aggregation Protocol (PAGP)
• It is a cisco proprietary.
• It has two modes
− Desirable
• Interface will actively ask the other side to form Etherchannel.
− Auto
• Interface will wait passively for other side to ask to form Etherchannel.
22-10-2016
WWW.KEYGROUPS.IN
Link Aggregation Control Protocol (LACP)
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel - Configuration
Etherchannel – PAGP
Switch (config) # interface <interface type> <interface no.>
Switch (config-if) # channel-protocol pagp
Switch (config-if) # channel-group 1 mode { desirable | auto }
Switch (config-if) # end
Etherchannel – LACP
Switch (config) # interface <interface type> <interface no.>
Switch (config-if) # channel-protocol lacp
Switch (config-if) # channel-group 1 mode { active | passive }
Switch (config-if) # end
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel - Configuration
Port Channel 1
24 24
23 23
1 2 3 4 5 6 1 2 3 4 5 6
PC1 PC2 PC3 PC4 PC5 PC6 PC11 PC12 PC13 PC14 PC15 PC16
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel - Configuration
SW1 SW2
Switch (config) # interface range fastethernet 0/23 Switch (config) # interface range fastethernet 0/23
Switch (config-if) # channel-protocol pagp Switch (config-if) # channel-protocol pagp
Switch (config-if) # channel-group 1 mode desirable Switch (config-if) # channel-group 1 mode auto
Switch (config) # interface range fastethernet 0/24 Switch (config) # interface range fastethernet 0/24
Switch (config-if) # channel-protocol pagp Switch (config-if) # channel-protocol auto
Switch (config-if) # channel-group 1 mode desirable Switch (config-if) # channel-group 1 mode desirable
Switch (config-if) # end Switch (config-if) # end
CHE
SW1 SW2
Switch (config) # interface range fastethernet 0/23 Switch (config) # interface range fastethernet 0/23
Switch (config-if) # channel-protocol lacp Switch (config-if) # channel-protocol lacp
Switch (config-if) # channel-group 1 mode active Switch (config-if) # channel-group 1 mode passive
Switch (config) # interface range fastethernet 0/24 Switch (config) # interface range fastethernet 0/24
Switch (config-if) # channel-protocol lacp Switch (config-if) # channel-protocol lacp
Switch (config-if) # channel-group 1 mode active Switch (config-if) # channel-group 1 mode passive
Switch (config-if) # end Switch (config-if) # end
CHE
22-10-2016
WWW.KEYGROUPS.IN
Etherchannel - Verification
22-10-2016
WWW.KEYGROUPS.IN
Port Security
CCIE
C C 22-10-2016
N P
C C N A
Port Security
22-10-2016
WWW.KEYGROUPS.IN
Violation Modes
• Shutdown
− The port becomes error disabled and the port LED turns off.
• Protect
− Frames with unknown source MAC address are dropped. It does not notify
that a security violation has occurred.
• Restrict
− Frames with unknown source address are dropped. It gives a notification (log
message) that security violation has occurred.
22-10-2016
WWW.KEYGROUPS.IN
Port Security & Error Recovery - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Port Security & Error Recovery - Configuration
SW1 - 192.168.20.50
1 2 3 4 5 6
22-10-2016
WWW.KEYGROUPS.IN
Port Security & Error Recovery - Configuration
SW1
22-10-2016
WWW.KEYGROUPS.IN
Port Security & Error Recovery - Verification
22-10-2016
WWW.KEYGROUPS.IN
Switched Port Analyzer
(SPAN)
CCIE
C C 22-10-2016
N P
C C N A
Switched Port Analyzer (SPAN)
• A SPAN port mirrors traffic from a defined port to another port where a
Network Anazlyer / Monitoring Device is connected.
• Network engineers or administrators use SPAN to analyze and debug data or
diagnose errors on a network.
• Network analyzer software is used for analyzing the captured data.
i.e. Wireshark, Ethereal, etc.
22-10-2016
WWW.KEYGROUPS.IN
SPAN - Configuration
22-10-2016
WWW.KEYGROUPS.IN
SPAN - Configuration
22-10-2016
WWW.KEYGROUPS.IN
SPAN - Configuration
SW1
SW1 (config) # monitor session 1 source interface FastEthernet 0/11
SW1 (config) # monitor session 1 destination interface FastEthernet 0/2
CHE
22-10-2016
WWW.KEYGROUPS.IN
SPAN - Verification
22-10-2016
WWW.KEYGROUPS.IN
Access Control List
(ACL)
CCIE
C C 22-10-2016
N P
C C N A
Access Control List (ACL)
22-10-2016
WWW.KEYGROUPS.IN
Functions of ACL’s ?
22-10-2016
WWW.KEYGROUPS.IN
Access Control List (ACL)
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
Switch
10 20 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
192.168.201.0 network
192.168.203.10 shouldnot
host should notcommunicate
communicatewith
with192.168.202.0
192.168.202.0network
network
22-10-2016
WWW.KEYGROUPS.IN
Terminology
22-10-2016
WWW.KEYGROUPS.IN
Terminology
22-10-2016
WWW.KEYGROUPS.IN
Wildcard Mask
• It’s the inverse of the subnet mask, hence is also called as inverse mask.
• A bit value of 0 indicates MUST MATCH (Check Bits).
• A bit value of 1 indicates IGNORE (Ignore Bits).
• Wildcard Mask
− For a host is 0.0.0.0
− For Class A network is 0.255.255.255
− For Class B network is 0.0.255.255
− For Class C network is 0.0.0.255
22-10-2016
WWW.KEYGROUPS.IN
Wild Card Mask
E.g.
255.255.255.255 255.255.255.255
– 255.255.255. 0 – 255.255.255.240
------------------------ ------------------------
0. 0. 0.255 0. 0. 0. 15
22-10-2016
WWW.KEYGROUPS.IN
Working of Access Control List
22-10-2016
WWW.KEYGROUPS.IN
Types of Access-List
ACL
IPv4 IPv6
22-10-2016
WWW.KEYGROUPS.IN
Standard Access Control List
(IPv4)
CCIE
C C 22-10-2016
N P
C C N A
Standard Access List
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Numbered - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Numbered - Configuration
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
Switch
10 20 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Numbered - Configuration
HYD-1
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Numbered - Verification
22-10-2016
WWW.KEYGROUPS.IN
How does a Standard ACL work ?
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
10 Switch
DATA 20 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
How does a Standard ACL work ?
22-10-2016
WWW.KEYGROUPS.IN
How does a Standard ACL work ?
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
10 20 Switch
DATA 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
How does a Standard ACL work ?
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Named- Configuration
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Named- Configuration
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
Switch
10 20 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Named- Configuration
HYD-1
CHE 0/0
HYD-1 (config) # interface fastethernet
HYD-1 (config-if) # ip access-group zoom out
HYD-1 (config-if) # end
HYD-1 #
22-10-2016
WWW.KEYGROUPS.IN
Standard ACL - Named - Verification
22-10-2016
WWW.KEYGROUPS.IN
Extended Access Control List
(IPv4)
CCIE
C C 22-10-2016
N P
C C N A
Extended Access List
22-10-2016
WWW.KEYGROUPS.IN
Extended ACL - Numbered - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Extended ACL - Numbered - Configuration
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
Switch
10 20 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
HYD-1
22-10-2016
WWW.KEYGROUPS.IN
Extended ACL - Numbered - Verification
22-10-2016
WWW.KEYGROUPS.IN
How does an Extended ACL work ?
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
10 Switch
20 30 10 20 30
10 20
DATA 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
How does an Extended ACL work ?
20
DATA Source IP and Port 10
192.168.202.20DATA
- 5000
HYD-1
Destination IP and Port
DATA BAN
192.168.203.10 - 80
Network ID / Mask Network ID / Mask
192.168.202.0/24 192.168.203.0/24
22-10-2016
WWW.KEYGROUPS.IN
How does an Extended ACL work ?
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
10 Switch
20 30 10 20 30
10 20
DATA 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
How does an Extended ACL work ?
20
DATA Source IP and Port 10
192.168.202.20DATA
- 5000
HYD-1
Destination IP and Port
DATA BAN
192.168.203.10 - 23
Network ID / Mask Network ID / Mask
192.168.202.0/24 192.168.203.0/24
22-10-2016
WWW.KEYGROUPS.IN
Extended ACL - Named - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Extended ACL - Named - Configuration
CHE BAN
Fa 0/0 S 0/0 S 0/1 Fa 0/0
192.168.201.1 172.16.0.1 172.17.0.2 192.168.203.1
S 0/0/1 S 0/0/0
Switch 172.16.0.2 HYD-1 172.17.0.1 Switch
Fa 0/0
192.168.202.1
Switch
10 20 30 10 20 30
10 20 30
Network ID / Mask Network ID / Mask
192.168.201.0/24 192.168.203.0/24
Network ID / Mask
192.168.202.0/24
HYD-1
22-10-2016
WWW.KEYGROUPS.IN
Extended ACL - Named - Verification
22-10-2016
WWW.KEYGROUPS.IN
IPv6 Access Control List
CCIE
C C 22-10-2016
N P
C C N A
IPv6 ACL - Configuration
22-10-2016
WWW.KEYGROUPS.IN
IPv6 ACL - Configuration
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
10 20 30 10 20 30
2001:1111::/64 2001:2222::/64
22-10-2016
WWW.KEYGROUPS.IN
IPv6 ACL - Configuration
HYD-1
22-10-2016
WWW.KEYGROUPS.IN
IPv6 ACL - Named - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Default Routing
CCIE
C C 22-10-2016
N P
C C N A
Default Routing
22-10-2016
WWW.KEYGROUPS.IN
Default Routing on IPv4 Network - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Default Routing on IPv4 Network
INTERNET
ISP
S0/0
202.1.0.18
CHE
Fa 0/0
192.168.201.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
Default Routing on IPv4 Network - Configuration
CHE
22-10-2016
WWW.KEYGROUPS.IN
Default Routing on IPv4 Network - Verification
22-10-2016
WWW.KEYGROUPS.IN
Network Address Translation (NAT)
CCIE
C C 22-10-2016
N P
C C N A
NAT
22-10-2016
WWW.KEYGROUPS.IN
Private IP Address
• There are certain addresses in each class of IP address that are reserved for
Private Networks. These addresses are called private addresses.
• These addresses are not Routable (or) valid on Internet.
Class A
10.0.0.0 to 10.255.255.255
Class B
172.16.0.0 to 172.31.255.255
Class C
192.168.0.0 to 192.168.255.255
22-10-2016
WWW.KEYGROUPS.IN
Public IP Address v/s Private IP Address
22-10-2016
WWW.KEYGROUPS.IN
Static NAT
CCIE
C C 22-10-2016
N P
C C N A
Static NAT
22-10-2016
WWW.KEYGROUPS.IN
How does Static NAT works ?
DATA
CHE TRANSLATION TABLE
Fa 0/0 INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
192.168.201.1 202.1.0.19 192.168.201.10 --- ---
202.1.0.20 192.168.201.20 --- ---
Switch
DATA
CHE TRANSLATION TABLE
Fa 0/0 INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
192.168.201.1 202.1.0.19 192.168.201.10 --- ---
202.1.0.20 192.168.201.20 --- ---
Switch
Router (config) # ip nat inside source static <private ip> <public ip>
22-10-2016
WWW.KEYGROUPS.IN
Static NAT - Configuration
INTERNET
ISP
S0/0
202.1.0.18
CHE
Fa 0/0
192.168.201.1
Switch
10 20 30
22-10-2016
WWW.KEYGROUPS.IN
Static NAT - Configuration
CHE
22-10-2016
WWW.KEYGROUPS.IN
Static NAT - Verification
22-10-2016
WWW.KEYGROUPS.IN
PAT (Overloading)
CCIE
C C 22-10-2016
N P
C C N A
PAT (Overloading)
22-10-2016
WWW.KEYGROUPS.IN
How does PAT works ?
DATA
CHE TRANSLATION TABLE
Fa 0/0 INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
192.168.201.1 202.1.0.18 :5000 192.168.201.10:5000 61.0.0.10 - 80 61.0.0.10 - 80
Switch
DATA
CHE TRANSLATION TABLE
Fa 0/0 INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
192.168.201.1 202.1.0.18 :5000 192.168.201.10:5000 61.0.0.10 - 80 61.0.0.10 - 80
Switch
DATA
CHE TRANSLATION TABLE
Fa 0/0 INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
192.168.201.1 202.1.0.18 :5000 192.168.201.10:5000 61.0.0.10 - 80 61.0.0.10 - 80
202.1.0.18 :5001 192.168.201.20:5000 61.0.0.10 - 80 61.0.0.10 - 80
Switch
DATA
CHE TRANSLATION TABLE
Fa 0/0 INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
192.168.201.1 202.1.0.18 :5000 192.168.201.10:5000 61.0.0.10 - 80 61.0.0.10 - 80
202.1.0.18 :5001 192.168.201.20:5000 61.0.0.10 - 80 61.0.0.10 - 80
Switch
Configuring PAT
22-10-2016
WWW.KEYGROUPS.IN
PAT - Configuration
INTERNET
ISP
S0/0
202.1.0.18
CHE
Fa 0/0
192.168.201.1
Switch
10 20 30
22-10-2016
WWW.KEYGROUPS.IN
PAT - Configuration
CHE
22-10-2016
WWW.KEYGROUPS.IN
PAT - Verification
22-10-2016
WWW.KEYGROUPS.IN
Network Services
CCIE
C C 22-10-2016
N P
C C N A
Syslog
CCIE
C C 22-10-2016
N P
C C N A
Syslog
22-10-2016
WWW.KEYGROUPS.IN
Message Severity Levels
22-10-2016
WWW.KEYGROUPS.IN
How Syslog Works ?
Interface
Down
Switch
Syslog Server
22-10-2016
WWW.KEYGROUPS.IN
Syslog Message Format
Sep 22 2016 15:24:53.080 : %LINK-5-CHANGED: Interface Serial 0/0, changed state to administratively down
22-10-2016
WWW.KEYGROUPS.IN
Logging to Buffer - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Logging to Syslog Server - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Logging to Syslog Server - Configuration
HYD-1
F0/0
192.168.2.1/4
Switch
Computer IP Address
192.168.2.10/24
22-10-2016
WWW.KEYGROUPS.IN
Logging to Syslog Server - Configuration
HYD-1
HYD-1 (config) # logging on
HYD-1 (config) # logging host 192.168.2.10
HYD-1 (config) # logging trap 7
HYD-1 (config) # service timestamps log datetime msec
HYD-1
HYD-1 (config) # logging on CHE
HYD-1 (config) # logging buffered 7
22-10-2016
WWW.KEYGROUPS.IN
Logging to Syslog Server – Verification
22-10-2016
WWW.KEYGROUPS.IN
Network Time Protocol
(NTP)
CCIE
C C 22-10-2016
N P
C C N A
Manual Clock
• Manually setting the clocks of network device is neither accurate nor scalable.
• The best practice is to use Network Time Protocol (NTP)
22-10-2016
WWW.KEYGROUPS.IN
Date and Time - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Date and Time - Verification
22-10-2016
WWW.KEYGROUPS.IN
Network Time Protocol (NTP)
22-10-2016
WWW.KEYGROUPS.IN
NTP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
NTP - Configuration
INTERNET
ISP
NTP Server 8.8.8.8
S0/0
202.1.0.18
CHE
Fa 0/0
192.168.201.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
NTP - Configuration
CHE
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ntp server 8.8.8.8
CHE (config) # exit
CHE
22-10-2016
WWW.KEYGROUPS.IN
NTP – Verification
22-10-2016
WWW.KEYGROUPS.IN
Simple Network Management Protocol
(SNMP)
CCIE
C C 22-10-2016
N P
C C N A
SNMP
• SNMP is an application layer protocol, uses the UDP port number 161.
• It provides a message format for communication between Network Devices
(Agents) and Network Manager.
22-10-2016
WWW.KEYGROUPS.IN
SNMP Components
• SNMP Managers
− It is software that collects information from network devices (i.e. NMS)
• SNMP Agents
− SNMP enabled network devices i.e. Router, Switch, Server, etc.
• Management Information Base:
− Contains the database of objects (information variables)
22-10-2016
WWW.KEYGROUPS.IN
How SNMP Works ?
S0/1 SNMP
S0/0
HYD-1
Trap
F0/0
Switch
SNMP
Get
SNMP Server
22-10-2016
WWW.KEYGROUPS.IN
Management Information Base
22-10-2016
WWW.KEYGROUPS.IN
SNMP versions
22-10-2016
WWW.KEYGROUPS.IN
SNMP - Configuration
22-10-2016
WWW.KEYGROUPS.IN
SNMP - Configuration
HYD-1
F0/0
192.168.202.1/24
Switch
Computer IP Address
192.168.202.10/24
22-10-2016
WWW.KEYGROUPS.IN
SNMP - Configuration
HYD-1
HYD-1 (config) # snmp-server community public rw
HYD-1 (config) # snmp-server host 192.168.202.10 version 2c public
HYD-1 (config) # snmp-server enable traps
HYD-1 (config) # exit
CHE
22-10-2016
WWW.KEYGROUPS.IN
SNMP – Verification
22-10-2016
WWW.KEYGROUPS.IN
DHCP
CCIE
C C 22-10-2016
N P
C C N A
Dynamic Host Control Protocol (DHCP)
Dynamic Host Control Protocol is used for dynamic IP address assignment to
network devices / hosts.
DHCP server provides IP address, Subnet mask, Default gateway and DNS server
IP address to DHCP clients.
Router can be configured both as a DHCP Server and DHCP Client.
22-10-2016
WWW.KEYGROUPS.IN
DHCP Server - Configuration
22-10-2016
WWW.KEYGROUPS.IN
DHCP Server - Configuration
INTERNET
ISP
S0/0
CHE
Fa 0/0
192.168.201.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
DHCP Server - Configuration
CHE
22-10-2016
WWW.KEYGROUPS.IN
DHCP Server – Verification
22-10-2016
WWW.KEYGROUPS.IN
DHCP Client - Configuration
22-10-2016
WWW.KEYGROUPS.IN
DHCP Client - Configuration
INTERNET
ISP
S0/0
CHE
Fa 0/0
192.168.1.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
DHCP Client - Configuration
CHE
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config)# interface serial 0/0
CHE (config-if)# ip address dhcp KEYGROUPS
CHE (config-if)# no shutdown
CHE (config-if)# exit
CHE (config)#
CHE
22-10-2016
WWW.KEYGROUPS.IN
DHCP Client – Verification
22-10-2016
WWW.KEYGROUPS.IN
Advanced IPv6
CCIE
C C 22-10-2016
N P
C C N A
IPv6 Neighbor Discovery
CCIE
C C 22-10-2016
N P
C C N A
Neighbor Discovery
22-10-2016
WWW.KEYGROUPS.IN
Neighbor Discovery Message – NS & NA
22-10-2016
WWW.KEYGROUPS.IN
Neighbor Discovery Message – NS & NA
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
NA
NS
Switch Switch
10
NA
NS 20 30 10 20 30
2001:1111::/64 2001:2222::/64
22-10-2016
WWW.KEYGROUPS.IN
Neighbor Discovery Message – RS, RA & Redirect
22-10-2016
WWW.KEYGROUPS.IN
Neighbor Discovery Messages
Fa 0/1 Fa 0/1
2001:5555::1 2001:5555::2
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
10
RA
RS 20 30 10 20 30
2001:1111::/64 2001:2222::/64
22-10-2016
WWW.KEYGROUPS.IN
IPv6 Address Assignment
CCIE
C C 22-10-2016
N P
C C N A
IPv6 Address Assignment
IPv6
Manual Dynamic
22-10-2016
WWW.KEYGROUPS.IN
Host Configuration
MAC address of Local system
001CC01242EA
001CC0 1242EA
FFFE
001C:C0FF:FE12:42EA
7th Initial Bit of MAC will be always “1”
021C:C0FF:FE12:42EA
HOST portion of IPv6 address
22-10-2016
WWW.KEYGROUPS.IN
IPv6 EUI-64 & SLAAC - Configuration
Fa 0/1 Fa 0/1
HYD-1 HYD-2
Fa 0/0 Fa 0/0
2001:1111::1 2001:2222::1
Switch Switch
10 20 30 10 20 30
2001:1111::/64 2001:2222::/64
22-10-2016
WWW.KEYGROUPS.IN
IPv6 EUI-64 & SLAAC - Configuration
HYD-1 HYD-2
HYD-1 (config) # ipv6 unicast-routing HYD-2 (config) # ipv6 unicast-routing
HYD-1 (config) # interface FastEthernet 0/0 HYD-2 (config) # interface fastEthernet 0/0
HYD-1 (config-if) # ipv6 enable HYD-2 (config-if) # ipv6 enable
HYD-1 (config-if) # ipv6 address 2001:5555::/64 eui-64 HYD-2 (config-if) # ipv6 address autoconfig
22-10-2016
WWW.KEYGROUPS.IN
IPv6 EUI-64 & SLAAC - Verification
22-10-2016
WWW.KEYGROUPS.IN
First Hop Redundancy Protocol
(FHRP)
CCIE
C C 22-10-2016
N P
C C N A
Importance of Redundancy
INTERNET
ISP
S0/0
202.1.0.18
CHE
Fa 0/0
192.168.201.1
Switch
10
Data 20 30
22-10-2016
WWW.KEYGROUPS.IN
Single point of Failure
INTERNET
ISP
S0/0
202.1.0.18
CHE
Fa 0/0
192.168.201.1
Switch
10
Data 20 30
22-10-2016
WWW.KEYGROUPS.IN
First Hop Redundancy Protocol (FHRP)
• First Hop Redundancy Protocols (FHRP) are a group of protocols that provide
Default Gateway Redundancy if there is more than one path to the same
Destination.
• The following are FHRP:
− HSRP (Cisco Proprietary)
− VRRP (VIRTUAL ROUTER REDUNDANCY PROTOCOL)(IETF Standard)
− GLBP (GATEWAY LOAD BALANCING PROTOCOL)(Cisco Proprietary)
22-10-2016
WWW.KEYGROUPS.IN
Hot Standby Router Protocol (HSRP)
22-10-2016
WWW.KEYGROUPS.IN
How HSRP works ?
INTERNET
ISP1 ISP2
S0/0 S0/1
202.1.0.18 202.2.0.18
Switch
Interface Network ID / Mask Interface Network ID / Mask
Fa 0/0 192.168.1.0/24 Fa 0/0 192.168.1.0/24
S 0/0 202.1.0.16/29 S 0/0 202.2.0.16/29
Data
Data
Default Gateway
22-10-2016 192.168.1.254
WWW.KEYGROUPS.IN
HSRP Elections
22-10-2016
WWW.KEYGROUPS.IN
HSRP Terminology
• Active router:
− Actively forwards the user traffic.
− Sends the reply for ARP messages requested for virtual mac address.
− Knows the Virtual Router IP Address.
− Sends hello messages.
• Standby router:
− Backup for active router.
− Sends hello messages.
− Whenever hello is not received, it takes the role of active router and
forwards user traffic.
22-10-2016
WWW.KEYGROUPS.IN
HSRP Version
22-10-2016
WWW.KEYGROUPS.IN
HSRP - Configuration
Router (config) # interface < interface type > < no. >
Router (config-if) # standby < hsrp group no. > ip < virtual ip address>
Router (config-if) # standby < hsrp group no. > priority <priority>
Router (config-if) # standby < hsrp group no. > preempt
Router (config-if) # standby version { 1 | 2 }
22-10-2016
WWW.KEYGROUPS.IN
HSRP - Configuration
INTERNET
ISP1 ISP2
S0/0 S0/1
202.1.0.18 202.2.0.18
Switch
Interface Network ID / Mask Interface Network ID / Mask
Fa 0/0 192.168.1.0/24 Fa 0/0 192.168.1.0/24
S 0/0 202.1.0.16/29 S 0/0 202.2.0.16/29
Default Gateway
22-10-2016 192.168.1.254
WWW.KEYGROUPS.IN
HSRP - Configuration
R1 R2
R1 (config) # interface fastEthernet 0/0 R2 (config) # interface fastEthernet 0/0
R1 (config-if) # standby 10 ip 192.168.1.254 R2 (config-if) # standby 10 ip 192.168.1.254
R1 (config-if) # standby 10 priority 200 R2 (config-if) # standby 10 priority 150
R1 (config-if) # standby 10 preempt R2 (config-if) # standby version 2
R1 (config-if) # standby version 2
22-10-2016
WWW.KEYGROUPS.IN
HSRP – Verification
22-10-2016
WWW.KEYGROUPS.IN
Floating Static Route
CCIE
C C 22-10-2016
N P
C C N A
Importance of WAN Redundancy
Global DNS
8.8.8.8
INTERNET
ISP1 ISP2
S0/0 S0/1
202.1.0.18 202.1.0.17
S 0/0/1 S 0/0/0
202.1.0.17 R2
HYD-1 202.2.0.17
Fa 0/0
192.168.2.1
Switch
Switch
Data
• Floating static routes are static routes configured to provide a backup path in
event of a link failure of primary static or dynamic routes.
• The floating static route is only used when the primary route is not available.
• Floating static route is configured with a higher administrative distance than
the primary route.
22-10-2016
WWW.KEYGROUPS.IN
Floating Static Route - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Floating Static Route - Configuration
Global DNS
8.8.8.8
INTERNET
ISP1 ISP2
S0/0
202.1.0.18
S 0/0/1 S 0/0/0
202.1.0.17 R2
HYD-1 202.2.0.17
Fa 0/0
192.168.202.1
Switch
Switch
HYD-1
HYD-1 (config) # ip route 0.0.0.0 0.0.0.0 Serial 0/0/1
HYD-1 (config) # ip route 0.0.0.0 0.0.0.0 Serial 0/0/0 2
CHE
22-10-2016
WWW.KEYGROUPS.IN
Floating Static Route - Verification
22-10-2016
WWW.KEYGROUPS.IN
IP Service Level Agreement
(IP SLA)
CCIE
C C 22-10-2016
N P
C C N A
IP SLA
Global DNS
8.8.8.8
INTERNET
ISP1 ISP2
S0/0 S0/1
ISP1 DNS 202.1.0.18 202.2.0.18 ISP2 DNS
1.1.1.1 2.2.2.2
S 0/0/1 S 0/0/0
202.1.0.17 R2
HYD-1 202.2.0.17
Fa 0/0
192.168.202.1
Switch
Switch
Data
• IP SLAs is a feature included in the Cisco IOS Software that can allow
administrators the ability to Analyze IP Service Levels for IP applications and
services.
• IP SLA's uses active traffic-monitoring technology to monitor continuous
traffic on the network. This is a reliable method in measuring over head
network performance.
• The best and simplest way to achieve WAN redundancy on Cisco devices is to
use Reliable Static backup routes with IP SLA tracking.
22-10-2016
WWW.KEYGROUPS.IN
IP SLA - Configuration
22-10-2016
WWW.KEYGROUPS.IN
IP SLA - Configuration
Global DNS
8.8.8.8
INTERNET
ISP1 ISP2
S0/0 S0/1
ISP1 DNS 202.1.0.18 202.2.0.18 ISP2 DNS
1.1.1.1 2.2.2.2
S 0/0/1 S 0/0/0
202.1.0.17 R2
HYD-1 202.2.0.17
Fa 0/0
192.168.202.1
Switch
Switch
HYD-1
22-10-2016
WWW.KEYGROUPS.IN
IP SLA - Verification
22-10-2016
WWW.KEYGROUPS.IN
Local Database Authentication
CCIE
C C 22-10-2016
N P
C C N A
Local Database Authentication
22-10-2016
WWW.KEYGROUPS.IN
Local Database Authentication - Configuration
22-10-2016
WWW.KEYGROUPS.IN
Local Database Authentication - Configuration
HYD-1
F0/0
192.168.202.1/24
Switch
Computer IP Address
192.168.202.10/24
22-10-2016
WWW.KEYGROUPS.IN
Local Database Authentication - Configuration
HYD-1
HYD-1 (config) # username zoom password cisco
HYD-1 (config) # line vty 0 4
HYD-1 (config-line) # login local
HYD-1 (config-line) # end
CHE
22-10-2016
WWW.KEYGROUPS.IN
Disadvantage of Local Database Authentication
22-10-2016
WWW.KEYGROUPS.IN
AAA
CCIE
C C 22-10-2016
N P
C C N A
AAA
• Authentication
− Authentication provides the method of identifying users
• Authorization
− Authorization provides a method of controlling access to what a user can do.
• Accounting
− Accounting provides a method for collecting and sending security server
information used for billing, auditing and reporting.
22-10-2016
WWW.KEYGROUPS.IN
AAA Advantages
22-10-2016
WWW.KEYGROUPS.IN
AAA Protocols
22-10-2016
WWW.KEYGROUPS.IN
TACACS v/s RADIUS
TACACS RADIUS
22-10-2016
WWW.KEYGROUPS.IN
AAA Server Based Authentication - Configuration
22-10-2016
WWW.KEYGROUPS.IN
AAA Server Based Authentication - Configuration
HYD-1
F0/0
192.168.202.1/24
Switch
Computer IP Address
192.168.202.10/24
22-10-2016
WWW.KEYGROUPS.IN
AAA Server Based Authentication - Configuration
HYD-1
CHE
22-10-2016
WWW.KEYGROUPS.IN
Remote Login Protocols
CCIE
C C 22-10-2016
N P
C C N A
Secure Shell (SSH)
• SSH is used for securely remote login on the Network devices for configuration.
• It works on TCP Port 22.
• It provides data encryption between host and network device.
• Cisco IOS should support encryption for enabling SSH.
22-10-2016
WWW.KEYGROUPS.IN
SSH - Configuration
22-10-2016
WWW.KEYGROUPS.IN
SSH - Configuration
HYD-1
F0/0
192.168.202.1/24
Switch
Computer IP Address
192.168.202.10/24
22-10-2016
WWW.KEYGROUPS.IN
SSH - Configuration
HYD-1
HYD-1 (config) # ip domain-name keygroups.com
HYD-1 (config) # crypto key generate rsa
HYD-1 (config) # line vty 0 4
HYD-1 (config-line) # login local
HYD-1 (config-line) # transport input ssh
HYD-1 (config-line) # end
22-10-2016
WWW.KEYGROUPS.IN
Virtual Private Network
(VPN)
CCIE
C C 22-10-2016
N P
C C N A
Communication via Internet
Chennai Bangalore
Office CHE BAN Office
Fa0/0
Internet Fa0/0
Switch Switch
HYD
LAN – 192.168.201.0/24 LAN – 192.168.203.0/24
Fa0/0
Switch
HYDERABAD
Office
LAN – 192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
Virtual Private Network
22-10-2016
WWW.KEYGROUPS.IN
VPN
Chennai Bangalore
$%$&)*& &^(*%@#
Office CHE BAN Office
Fa0/0
Internet Fa0/0
Switch Switch
HYD
LAN – 192.168.201.0/24 LAN – 192.168.203.0/24
Fa0/0
Switch
HYDERABAD
Hello
What sup Office
LAN – 192.168.202.0/24
22-10-2016
WWW.KEYGROUPS.IN
Features of VPN
• Confidentiality (Privacy)
• Authentication
• Data integrity
• Anti-replay
22-10-2016
WWW.KEYGROUPS.IN
Types of VPN
• GRE
• IPSec VPN
• SSL VPN
• DMVPN (Dynamic Multipoint VPN)
22-10-2016
WWW.KEYGROUPS.IN
Generic Routing Encapsulation ( GRE )
22-10-2016
WWW.KEYGROUPS.IN
GRE - Configuration
22-10-2016
WWW.KEYGROUPS.IN
GRE - Configuration
INTERNET
VPN TUNNEL
ISP ISP
S0/0/0 S0/0/1
202.1.0.18 202.2.0.18
CHE BAN
Fa 0/0 Fa 0/0
192.168.1.1 192.168.3.1
Switch Switch
CHE BAN
CHE (config) # int tunnel 0 BAN (config) # int tunnel 0
CHE (config-if) # ip add 1.1.1.1 255.255.255.0 BAN (config-if)# ip add 1.1.1.2 255.255.255.0
CHE (config-if) # tunnel mode gre ip BAN (config-if) # tunnel mode gre ip
CHE (config-if) # tunnel source serial 0/0 BAN (config-if)# tunnel source serial 0/1
CHE (config-if) # tunnel destination 202.2.0.18 BAN (config-if)# tunnel destination 202.1.0.18
CHE (config-if) # end BAN (config-if)# end
22-10-2016
WWW.KEYGROUPS.IN
GRE – Verification
22-10-2016
WWW.KEYGROUPS.IN
Password Recovery
CCIE
C C 22-10-2016
N P
C C N A
Password Recovery - Steps
• Connect the console cable from Router console Port to PC COM port
• Open the Emulation Software (Putty)
• Restart the Router
• Press Ctrl + Break to Enter into Rommon mode
22-10-2016
WWW.KEYGROUPS.IN
Console Connectivity
RJ-45
Connector
Console Port
Con 0
Router
E0
Switch
22-10-2016
WWW.KEYGROUPS.IN
Password Recovery - BOOT Sequence
ROM loads Bootstrap program and searches for the IOS ROM
22-10-2016
WWW.KEYGROUPS.IN
Password Recovery - Steps
22-10-2016
WWW.KEYGROUPS.IN
Password Recovery - Steps
22-10-2016
WWW.KEYGROUPS.IN
PPP over Ethernet
(PPPoE)
CCIE
C C 22-10-2016
N P
C C N A
PPP over Ethernet (PPPoE)
22-10-2016
WWW.KEYGROUPS.IN
PPPoE Client - Configuration
Router (config) # interface < ethernet interface > < no. >
Router (config-if) # no ip address
Router (config-if) # pppoe enable
Router (config-if) # pppoe-client dial-pool-number <no.>
Router (config-if) # exit
Router (config) # interface dialer < no. >
Router (config-if) # mtu 1492
Router (config-if) # ip address negotiated
Router (config-if) # encapsulation ppp
Router (config-if) # ppp authentication pap callin
Router (config-if) # ppp pap sent-username < username > password < password >
Router (config-if) # dialer pool < no. >
Router (config-if) # ppp ipcp route default
Router (config-if) # end
22-10-2016
WWW.KEYGROUPS.IN
PPPoE Client - Configuration
INTERNET
ISP
Fa 0/1
HYD-1
Fa 0/0
192.168.202.1
Switch
22-10-2016
WWW.KEYGROUPS.IN
PPPoE Client - Configuration
HYD-1
22-10-2016
WWW.KEYGROUPS.IN
PPPoE Client – Verification
22-10-2016
WWW.KEYGROUPS.IN