Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Ccna (Cisco Certified Network Associate) Certification and Training Program

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 469

CCNA

(Cisco Certified Network Associate)


Certification and Training Program

© 2020 The Knowledge Academy Ltd 1


About The Knowledge Academy
• World Class Training Solutions
• Subject Matter Experts
• Highest Quality Training Material
• Accelerated Learning Techniques
• Project, Programme, and Change
Management, ITIL® Consultancy
• Bespoke Tailor Made Training Solutions
• PRINCE2®, MSP®, ITIL®, Soft Skills, and More

© 2020 The Knowledge Academy Ltd 2


Administration
• Trainer
• Fire Procedures
• Facilities
• Days/Times
• Breaks
• Special Needs
• Delegate ID check
• Phones and Mobile devices

© 2020 The Knowledge Academy Ltd 3


The 6 Domains of CCNA
• Domain 1: Network Fundamentals

• Domain 2: Network Access

• Domain 3: IP Connectivity

• Domain 4: IP Services

• Domain 5: Security Fundamentals

• Domain 6: Automation and Programmability

© 2020 The Knowledge Academy Ltd 4


Examination Weights
10%
20%
Domain 1: Network Fundamentals

15% Domain 2: Network Access

Domain 3: IP Connectivity

Domain 4: IP Services

10% 20% Domain 5: Security Fundamentals

Domain 6: Automation and


Programmability

25%

© 2020 The Knowledge Academy Ltd 5


Domain 1

Network Fundamentals

© 2020 The Knowledge Academy Ltd 6


Outlines of Domain 1
• Module 1: Explain the role and function of network components

• Module 2: Describe characteristics of network topology architectures

• Module 3: Compare physical interface and cabling types

• Module 4: Identify interface and cable issues

• Module 5: Compare TCP to UDP

© 2020 The Knowledge Academy Ltd 7


Outlines of Domain 1
• Module 6: Configure and verify IPv4 addressing and subnetting

• Module 7: Describe the need for private IPv4 addressing

• Module 8: Configure and verify IPv6 addressing and prefix

• Module 9: Compare IPv6 address types

© 2020 The Knowledge Academy Ltd 8


Outlines of Domain 1
• Module 10: Verify IP parameters for Client OS (Windows, Mac OS,
Linux)

• Module 11: Describe wireless principles

• Module 12: Explain virtualisation fundamentals (virtual machines)

• Module 13: Describe switching concepts

© 2020 The Knowledge Academy Ltd 9


Introduction to Networking
Network

• It consists of two or more computers that are linked


in order to share resources (such as printers and
CDs), exchange files, or allow electronic
communications

• The computers on a network may be linked through


cables, telephone lines, radio waves, satellites, or
infrared light beams

© 2020 The Knowledge Academy Ltd 10


Introduction to Networking
Types of Network

Local Area network Metropolitan Area Network Wide Area Network


• It consists of a computer • It consists of a computer • It occupies a very large
network at a single site, network across an entire area, such as an entire
typically an individual city, college campus or country or the entire
office building small region world
• It is very useful for sharing • A MAN is often used to • A WAN can contain
resources, such as data connect several LANs multiple smaller networks,
storage and printers together to form a bigger such as LANs or MANs
network

© 2020 The Knowledge Academy Ltd 11


Introduction to Networking
Networking

• A method which is used to transfer data between different devices

The following are examples of networking:

i. Posting something on Facebook

ii. Searching on Google

iii. Watching a YouTube video

© 2020 The Knowledge Academy Ltd 12


Introduction to Networking
o Network Data: The information that is to be sent across a network. For eg. Web
browsing, instant messaging, email etc.

o Endpoint Devices: These are the equipments that require network data access. For eg.
Computers, tablets, phones, printers etc.

o Network Devices: These are the equipments that transfers the data between endpoints.
For eg. Firewalls, switches, routers, wireless access points

o Network Protocols: These are a set of rules that are to be followed when there is a
communication between endpoints in a network

© 2020 The Knowledge Academy Ltd 13


Module 1: Explain the Role and Function
of Network Components

© 2020 The Knowledge Academy Ltd 14


1.1.a Routers
• Routers implement functions of Network Layer or Layer 3. The primary function of a
router is to forward the packets according to the routing table

• Routers also provide multiple broadcast domains, traffic segmentation, and determine
the networks and network layer addressing subnets

• Those networks are defined by router network adapters or ports to which IP addresses
are assigned

• Those IP addresses are the default gateway to PCs and other networking devices

© 2020 The Knowledge Academy Ltd 15


1.1.a Routers
(Continued)

• The two major types of routers are:

o Static: Static routers require an administrator to set up and configure the routing
table manually and to define each route

o Dynamic: Dynamic routers are intended to discover routes automatically. So, it


requires a minimal amount of setting up and configuration

• Routers communicate with each other to share information about accessible paths and
directly connected routes

© 2020 The Knowledge Academy Ltd 16


1.1.b L2 and L3 Switches
Introduction to L2 Switch

• A L2 (Layer 2) switch is a type of device or network switch that operates on the second
layer of OSI Layer (data link layer) and uses MAC Address to determine the path through
which the frames are to be transmitted

• This uses techniques of hardware-based switching to connect and transmit data in a LAN
(local area network)

• A Layer 2 switch can also be known as a multiport bridge

© 2020 The Knowledge Academy Ltd 17


1.1.b L2 and L3 Switches
(Continued)

• The primary responsibility of a layer 2 switch is to transport data on a physical layer and
to perform error checks on every transmitted and received frame

• A layer 2 switch needs NIC's MAC address for the transmission of data on each network
node

• They automatically learn MAC addresses by copying the MAC address of each frame
received or by listening to devices on the network and maintaining the MAC address of
the devices in a forwarding table

© 2020 The Knowledge Academy Ltd 18


1.1.b L2 and L3 Switches
Introduction to L3 Switch

• A layer 3 switch combines the functionality of a switch and a router

• It serves as a switch for connecting devices on the same subnet or virtual LAN at
lightning speeds and has IP (Internet Protocol) routing intelligence built in to double up
as a router

• It can maintain routing protocols, inspect incoming packets and even make routing
decisions based on the addresses of the source and destination

© 2020 The Knowledge Academy Ltd 19


1.1.b L2 and L3 Switches
Features of a Layer 3 Switch

Switching Algorithm is simple


Comes with 24 Ethernet Ports,
and is the same for most
but no WAN Interface
Routed Protocols

It acts as a Switch to Connect


Performs on two OSI Layers:
Devices within the same
Layer 2 and Layer 3
Subnet

© 2020 The Knowledge Academy Ltd 20


1.1.c Next-Generation Firewalls and IPS
Introduction to Next-Generation Firewalls

• A Next-Generation Firewall is a network security


device which provides more capabilities than a
conventional, stateful firewall

• The next-generation firewall involves additional


features such as cloud-delivered threat intelligence,
application awareness and control, and integrated
intrusion prevention, while a conventional firewall
only provides stateful inspection of incoming and
outgoing network traffic

© 2020 The Knowledge Academy Ltd 21


1.1.c Next-Generation Firewalls and IPS
(Continued)

• The following are some advantages of Next-Generation Firewalls:

Application Streamlined
Multi-functional
Awareness Infrastructure

Network Speed Threat Protection

© 2020 The Knowledge Academy Ltd 22


1.1.c Next-Generation Firewalls and IPS
Introduction to IPS

• An IPS (Intrusion Prevention System) is a type of network


security which works to detect and prevent identified
threats

• Intrusion prevention systems monitor the network


continuously, looking for possible malicious incidents and
gather data about them

• The IPS reports these activities to system administrators


and takes preventive action to prevent future attacks, such
as closing access points and configuring firewalls

© 2020 The Knowledge Academy Ltd 23


1.1.c Next-Generation Firewalls and IPS
How Do Intrusion Prevention Systems Work?

• Intrusion Prevention Systems (IPS) work by scanning every network traffic

• There are several different threats that an IPS is designed to prevent, and it includes:

Distributed
Denial of Service Various types of
Denial of Service Worms Viruses
(DoS) attack exploits
(DDoS) attack

© 2020 The Knowledge Academy Ltd 24


1.1.c Next-Generation Firewalls and IPS
Types of Prevention

• An IPS is typically configured to use many different procedures to secure the network
from an unauthorised user

• It includes:

Signature-Based 

Anomaly-Based

Policy-Based

© 2020 The Knowledge Academy Ltd 25


1.1.d Access Points
Introduction

• A wireless AP (Access Point) is a device which allows


the wireless devices to connect to a wired network
through Wi-Fi

• The Access Point connects to a router as a separate


device via a wired network, but it can also be an
integral part of the router itself

• Usually, a wireless access point connects directly to a


wired Ethernet connection, and then the access
point provides wireless connections to other devices
via radio frequency links

© 2020 The Knowledge Academy Ltd 26


1.1.d Access Points
(Continued)

• An access point is a device which permits communication between various wireless


devices

• Just like a switch or HUB connects multiple devices in single or multiple wired LAN
networks, an access point connects multiple wireless devices in single or multiple
wireless networks

• You can also use an access point to extend the wired network to the wireless devices

© 2020 The Knowledge Academy Ltd 27


1.1.d Access Points
(Continued)

• The access point is categorised into three types based on the functionalities:

1. Standalone access point

2. Multifunction access point

3. Controlled access point

© 2020 The Knowledge Academy Ltd 28


1.1.e Controllers (Cisco DNA Center and WLC)
Introduction to Cisco DNA Center

• Cisco DNA Center is the foundational controller and analytics framework at the core of
intent-based network of Cisco

• Cisco DNA Center provides intuitive, centralised management which makes it fast and easy
to design, provision and implementation of policies across your network environment

• The Cisco DNA Center UI provides end-to-end visibility of the network and makes use of
network insights to optimise performance of the network and deliver the best user and
application experience

© 2020 The Knowledge Academy Ltd 29


1.1.e Controllers (Cisco DNA Center and WLC)
Introduction to WLC

• A WLC (Wireless LAN Controller) is a wireless architecture that aims to meet changing
network requirements

• Wireless network access points are controlled by a WLAN controller which allows wireless
devices to connect to the network

• What an amplifier does for your home stereo is similar to what a wireless access point
does for your network

• The bandwidth, which is coming from a router, is taken and stretched by WLC so that
several devices can go on the network from farther distances away

© 2020 The Knowledge Academy Ltd 30


1.1.f Endpoints
• An endpoint device is a hardware device that communicates across a network, connected
to a LAN or WAN

• It can refer to any network-connected device such as laptops, desktop computers,


smartphones, printers, tablets, or other specialised hardware like retail kiosks or POS
terminal, which act as endpoints for users in a distributed network

• One of the biggest problems with endpoint devices is that they involve robust security for
a system of enterprise or a network

• Security managers should determine whether several endpoint devices could be security
gaps for a network i.e. if the unauthorised users can access that endpoint device and use
the same to pull off sensitive or imperative data

© 2020 The Knowledge Academy Ltd 31


1.1.g Servers
Introduction

• A server is a machine designed to process requests


and deliver data to another computer over the local
network or internet

• A server act as the central repository of data and


several programs that are shared by different users
in a network

• There are different types of servers, including local


ones like file servers that store data within an
intranet network

© 2020 The Knowledge Academy Ltd 32


Module 2: Describe Characteristics of
Network Topology Architectures

© 2020 The Knowledge Academy Ltd 33


1.2 2 –Tier/Collapsed Core
A general campus network consists of 3 tiers:

1) Core (includes default gateways and Layer 3 routing)

2) Distribution (generally all fiber connections, Layer 2 switching, uplink aggregation where
switch to switch links interconnect)

3) Access (generally all copper connections, where endpoints connect to the network)

© 2020 The Knowledge Academy Ltd 34


1.2.a 2 -Tier
• In 2-tier design, the core and the distribution functionality is combined into 1 tier and
hence the access layer makes it a 2-tier architecture

• This architecture is generally used with smaller networks

Core/Distribution

Access

© 2020 The Knowledge Academy Ltd 35


1.2.b 3 -Tier
• A 3-tier design separate the core and the distribution functionality onto dedicated devices

• This architecture is generally used on larger networks

Core

Distribution

Access

© 2020 The Knowledge Academy Ltd 36


1.2.c Spine-Leaf
Introduction

• For Data center solutions such as Fabric path and Cisco ACI, Spine and Leaf architectures
were introduced

• Usually, nexus switches are used in this architecture

• The main focus of this architecture is that there are no layer 2 loops and each destination
is reachable within a maximum of two routed hops

© 2020 The Knowledge Academy Ltd 37


1.2.c Spine-Leaf

Spines

Leafs

© 2020 The Knowledge Academy Ltd 38


1.2.d WAN
Introduction

• WAN (Wide area network) can be defined as a data communication network which work
beyond the geographic scope of LAN

• Wide area network utilises transmission facilities that are provided by the common
carriers like telephone companies

• The WAN technologies usually function at the OSI reference model’s lower three layers:
the network layer, the physical layer and the data link layer

© 2020 The Knowledge Academy Ltd 39


Understanding WAN Technologies
WAN technologies includes following:

1. Circuit switching

• A circuit-switched network builds a dedicated channel between terminals and nodes


before the users communicate

• It dynamically builds a virtual connection for data or voice between the sender and the
receiver

• It is important to establish the connection through the service provider network before
the communication begins

© 2020 The Knowledge Academy Ltd 40


Understanding WAN Technologies
(Continued)

1. Circuit switching

Circuit
Switching

© 2020 The Knowledge Academy Ltd 41


Understanding WAN Technologies
(Continued)

2. Packet switching

• A packet-switched network (PSN) divides the traffic data into packets that are routed
over a shared network

• These networks do not need a circuit to be established, and they permit several nodes
pairs to interact over the same channel

• The switches in a packet-switched network ascertain the links that packets must be sent
over based on the addressing information in every packet

© 2020 The Knowledge Academy Ltd 42


Understanding WAN Technologies
(Continued)

2. Packet switching
175

87

219

Labeled data is passed from switch to switch.


It may have to wait its turn on a link

© 2020 The Knowledge Academy Ltd 43


1.2.e Small Office/Home Office (SOHO)
• The Small Office/Home Office (SOHO) LAN is usually used at home for internet
connectivity and possibly to share some files between computers

• In its most simple form, it is only a switch and two computers:

Gi0/1 Gi0/2
H1 SW1 H2
• It allows the two systems (computers) to communicate with each other. Perhaps to
share few files or play a multiplayer game

© 2020 The Knowledge Academy Ltd 44


1.2.e Small Office/Home Office (SOHO)
(Continued)

• Wireless networking is also based on Gi0/1 Gi0/2

standards that are published by the IEEE H1 H2


Gi0/3
(Institute of Electrical and Electronics
Engineers)
Gi0/0

• Wireless things generally start with


802.11

H3

© 2020 The Knowledge Academy Ltd 45


1.2.e Small Office/Home Office (SOHO)
R1
(Continued)
Internet

• For wireless connectivity, we add an Gio0/0


access point to the network
GiO/4

• It enables the wired and wireless


GiO/1 GiO/2
devices to communicate with each
other H1 GiO/3
H2
GiO/0

• But to leave the LAN and communicate


with the outside world, we will need a
router

H3

© 2020 The Knowledge Academy Ltd 46


1.2.f On-Premises and Cloud
Introduction to On-Premises

• On-premises software is installed on the servers of a company and behind its firewall,
and it is only provided to organisations for a long time and may continue to serve your
business requirements adequately

• It is required to buy a license for an enterprise to use an on-premises software

• This is because the software itself is licensed and the whole instance of the software is
located within the premises of an organisation, there is usually greater protection than
with a cloud computing infrastructure

© 2020 The Knowledge Academy Ltd 47


1.2.f On-Premises and Cloud
Introduction to Cloud

• Cloud computing differs from on-premises


software. In an on-premise environment , a
company hosts everything in-house, while in a
cloud environment, a third-party provider hosts all
that for you

• It allows companies to pay on an as-needed basis


and quickly scale up or down depending on entire
usage, user requirements as well as the growth of
the company

© 2020 The Knowledge Academy Ltd 48


Module 3: Compare Physical Interface
and Cabling Types

© 2020 The Knowledge Academy Ltd 49


1.3.a Single-mode fiber, Multimode fiber,
Copper
Single-mode fiber

• Single-mode fiber is the type of fiber-Optic cable that allows


only one mode (or wavelength) of light for propagating through
the fiber

• It is capable of higher bandwidth and greater distances than


multimode cable

• This type of cable uses lasers as the method of light-generating


and is more costly than multimode cable

• 37+ miles (60+ km) is the maximum length of single-mode cable

© 2020 The Knowledge Academy Ltd 50


1.3.a Single-mode fiber, Multimode fiber,
Copper
Multimode fiber

• Multimode fiber cable allows various modes


of light propagation through the fiber

• By using light-emitting diodes (LEDs) as light-


generating devices, the multimode cable is
often used for workgroup applications

• 1.2 miles (2 km) is the maximum cable length


of multimode cable

© 2020 The Knowledge Academy Ltd 51


1.3.a Single-mode fiber, Multimode fiber,
Copper
Copper Cable

• Copper cable pass data between networks by using electrical signals

• Coaxial cable, shielded twisted pair, and unshielded twisted pair are the three types of
copper cable

Coaxial Cable It degenerates over long distances

It uses copper shielding around the


Shielded Twisted Pair twisted wires to reduce susceptible to
interference

It is made by twisting the copper cables


Unshielded Twisted Pair around each other, which reduces
degeneration

© 2020 The Knowledge Academy Ltd 52


1.3.a Single-mode fiber, Multimode fiber,
Copper
Comparison

Single Mode Fiber Multi-mode fiber Copper cabling

Is used for long distances Is use for shorter distances Is used for shorter distances

Use Cases Use Cases Use Cases


• 1Gig – 100Gig • 1Gig – 100Gig • 10Meg – 1Gig
• Switch to switch • Switch to switch • Endpoint to switch
• Building to building • Closet to closet • Server to switch
• City to city • Floor to floor

© 2020 The Knowledge Academy Ltd 53


1.3.b Connections (Ethernet Shared Media)
• In earlier days, Ethernet used shared media connections which means that all
endpoints connected to the network would share the same collision domain and it is
not a good thing

• In such a situation, network data can collide and cut down performance

• Hence, usage of more collision domains is better

• Now-a-days, endpoints are generally connected to switch interfaces that connect per-
port collision domains

© 2020 The Knowledge Academy Ltd 54


1.3.b Connections (Ethernet Shared Media)

Collison Collison Domain Collison Domain


Domain

Collison Domain Collison Domain

Shared Ethernet Switched Ethernet

© 2020 The Knowledge Academy Ltd 55


1.3.b Connections (Point-to-Point)
• Point-to-Point connections are when only two devices are connected logically or
physically

Point-to-Point Point-to-Multipoint

© 2020 The Knowledge Academy Ltd 56


1.3.c Concepts of PoE
PoE (Power Over Ethernet) Basics

• Some devices with PoE, usually a LAN switch, act as the PSE (Power Sourcing Equipment)
and the device that supplies DC (Direct Current) power over the Ethernet UTP
(Unshielded Twisted Pair) cable (as shown in Figure)

Power Supply

Ethernet Cables AC Power


(DC Power) Cable

Power Sourcing AC Power Outlet


Powered Devices (PDs) Equipment (PSE)

© 2020 The Knowledge Academy Ltd 57


1.3.c Concepts of PoE
PoE Operation

• PoE, standardised by the IEEE (Institute of Electrical and Electronics Engineers), extends
the same IEEE auto-negotiation mechanisms. These mechanisms are required to work
before the initialisation of PD(Powered Device), because the PD needs power before it
can boot

• PoE can determine whether the device on the end of the cable needs power (i.e., it is a
PD) and how much power to supply, by using IEEE auto-negotiation messages and
watching for the return signal levels

© 2020 The Knowledge Academy Ltd 58


Module 4: Identify Interface and Cable
Issues

© 2020 The Knowledge Academy Ltd 59


1.4 Identify Interface and Cable Issues
Collisions

• A collision is a mechanism used by Ethernet for controlling access and allocating shared
bandwidth among stations that want to transmit on a shared medium simultaneously

• Because the medium is shared, there has to be a mechanism where two stations will
detect that they want to transmit simultaneously. This mechanism is collision detection

• Ethernet uses CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as its collision


detection method

© 2020 The Knowledge Academy Ltd 60


1.4 Identify Interface and Cable Issues
Errors

• Packets input gives the total number of error-free packets that the system receives

• The total number of bytes in the error-free packets is given by the bytes input that
received by the system, including data and MAC encapsulation

• Input error involves giants, runts, CRC (cyclic redundancy check), frame, overrun, no
buffer and ignored counts

© 2020 The Knowledge Academy Ltd 61


1.4 Identify Interface and Cable Issues
Duplex and Speed

• On both ends, duplex and speed should match or else you will have problems

• Traffic can still transmit with inconsistent duplex and speed, but you will experience
retransmissions and decreased throughput

• Duplex is subservient to speed in the way that the duplex can not be changed manually if
speed is set to auto

• When both the duplex and speed settings on the two devices are hardcoded, you might
see Cyclic Redundancy Check (CRC) error messages

© 2020 The Knowledge Academy Ltd 62


Module 5: Compare TCP to UDP

© 2020 The Knowledge Academy Ltd 63


Transmission Control Protocol
• Based on the requirements of an application, every TCP/IP application choose to use
either TCP or UDP

• As an example, TCP offers error recovery but it consumes more bandwidth as well as
processing cycles in order to do so

• The fields in the TCP header are

• The message created by TCP beginning


with a TCP header and followed by
application data is known as a TCP segment

© 2020 The Knowledge Academy Ltd 64


User Datagram Protocol
• UDP offers applications with a service to exchange messages

• UDP is connection less protocol and it does not provide reliability, windowing, reordering
of the received data segmentation of large chunks of data into the right size for
transmission

• UDP offers some functions of TCP like multiplexing using port numbers, data transfer and
do it with fewer bytes of overhead and less processing needed as compared to TCP

• UDP Header

© 2020 The Knowledge Academy Ltd 65


1.5 TCP Vs. UDP
• The basic difference between TCP and UDP is that TCP offer an extensive variety of
services to applications, however UDP does not provide these type of services

• As an example, routers discard packets for a variety of reasons such as congestion, bit
errors and those instances in which correct routes are not known

• Most of the data link protocols notice errors with the help of error detection process and
then discard those frames which have errors.

• TCP offers error recovery i.e. retransmission and help in avoiding congestion i.e. flow
control, however UDP does not

• As a result, many applications prefer to use TCP

© 2020 The Knowledge Academy Ltd 66


TCP Vs. UDP
• However, lack of services do not make UDP worse than TCP

• As compared to TCP, UDP requires less bytes in its header which results into fewer bytes
of overhead in the network

• UDP software does not slow down the transfer of data in cases where TCP slow down
purposefully

• Some applications like Voice over IP or Video over IP do not require error recovery and
hence they use UDP

• Hence UDP is also having a vital place in today’s TCP/IP model

© 2020 The Knowledge Academy Ltd 67


Module 6: Configure and Verify IPv4
Addressing and Subnetting

© 2020 The Knowledge Academy Ltd 68


1.6 IPv4 Addressing
Classful Addressing

• The combination of a subnet mask and an IP address can be used to define a host ID and
a network ID

• These parameters permit an internetwork to be segmented into logically separate IP


networks and for every network to be split into subnets

• "Addressing schemes" explains various methods of configuring IP addressing to suit


different sizes and types of networks

© 2020 The Knowledge Academy Ltd 69


IPv4 Addressing
(Continued)

• Based on the first octet of the IP address, classful addressing allocates a network ID

• The classful addressing scheme was used before subnet masks are used to recognise the
network ID portion of an address

o Class A, Class B, and Class C Addresses

• Under classful addressing, the network IDs are classified into three classes describing
different sizes of IP network

© 2020 The Knowledge Academy Ltd 70


IPv4 Addressing
Cont.
Number of First Octet of
Number of hosts per Address
Class A networks networks Range

0??????? ???????? ???????? ????????


126 16,777,214 1-126

Network ID Host ID

Class B
10?????? ???????? ???????? ????????
16,384 65,354 128-191
Network ID Host ID

Class C
110????? ???????? ???????? ????????
2,097,152 254 192-223
Network ID Host ID

Choosing an address class


© 2020 The Knowledge Academy Ltd 71
IPv4 Addressing
o Class A, Class B, and Class C Addresses (Cont.)

• Class A network addresses support vast numbers of hosts—over 16 million. However,


there are only 126 of them

• There are almost 16 thousand Class B networks, each comprising up to 65,000 hosts

• Class C networks support only 254 hosts each, but there are over 2 million of them

• When examining classful addressing, it is essential to be able to recognise the address


class from the first octet of the IP address

© 2020 The Knowledge Academy Ltd 72


IPv4 Addressing
(Continued)

• The following table shows the way to identify an address class from the first octet of the


IP address in decimal:

First Octet Class


1-126 Class A
128-191 Class B
192-223 Class C

© 2020 The Knowledge Academy Ltd 73


IPv4 Addressing
o Class D and Class E Addresses

There are two additional classes of IP address (D and E) that use the remaining numbers:

• Class D addresses (224.0.0.0 through 239.255.255.255) are used for multicasting

• Class E addresses (240.0.0.0 through 255.255.255.255) are used for experimental use
and testing

© 2020 The Knowledge Academy Ltd 74


IPv4 Addressing
Public versus Private Addressing

• A public IP network refers to one that can establish a connection with other public IP
networks and hosts over the Internet

• IANA governs the allocation of public IP addresses and regional registries and Internet
Service Providers (ISP) administer it

• Hosts interacting with one another over a LAN use a public addressing scheme but will
more typically use private addressing

© 2020 The Knowledge Academy Ltd 75


1.7 Describe the Need for Private IPv4
Addressing
• Private IP addresses can be drawn from one of the pool of addresses as nonroutable over
the Internet:

 10.0.0.0 to 10.255.255.255 (Class A private address range)

 172.16.0.0 to 172.31.255.255 (Class B private address range)

 192.168.0.0 to 192.168.255.255 (Class C private address range)

© 2020 The Knowledge Academy Ltd 76


1.7 Describe the Need for Private IPv4
Addressing
(Continued)

• Any organisation can use private addresses on their networks without applying to ISP,
and multiple organisations can use these ranges simultaneously

Internet access can be facilitated for hosts utilising a private addressing scheme in two
methods:

• Through a router configured with a single or block of valid public IP addresses

• Through a proxy server that accomplishes requests for Internet resources on behalf of
clients

© 2020 The Knowledge Academy Ltd 77


IPv4 Addressing
Subnetting and Classless Addressing

• A public IP network address can represent an organisation on the Internet, but most
companies need to subdivide their private networks into different logical groups

• These groups are known as subnets or subnetworks

o Subnet Design

Large networks are divided by organisations into logically distinct subnets for these reasons:

 It is incapable to have extensive numbers of computers on the same IP network

© 2020 The Knowledge Academy Ltd 78


IPv4 Addressing
(Continued)

 A single IP network is a single broadcast domain; excessive broadcast traffic is


generated when there are several hosts on the same network

 VLANs are used by large networks to isolate broadcast domains and formulate
subnets to map to each VLAN

• Networks that use different data links and physical technologies, such as Ethernet and
Token Ring, should be separated logically as different subnets

© 2020 The Knowledge Academy Ltd 79


IPv4 Addressing
o Subnet Design (Cont.)

• Several organisations have more than one site and WAN links between them. The WAN
link forms a separate subnet

• It is beneficial to divide a network into logically distinct zones for administrative and
security control

o Subnet Mask Format

• While IPv4 was initially based on a classful address scheme, subnetting substituted the
idea of recognising the network portion of an IP address based on its class with the idea
of using a subnet mask

© 2020 The Knowledge Academy Ltd 80


IPv4 Addressing
(Continued)

• The subnet mask length defines the length of the network portion of the IP address

• As the "1"s in a mask are always contiguous, every octet in decimal in a subnet mask will
always be one of the below mentioned:

Number of mask bits Decimal equivalent


1 (10000000) 128
2 (11000000) 192
3 (11100000) 224

© 2020 The Knowledge Academy Ltd 81


IPv4 Addressing
(Continued)

Number of mask bits Decimal equivalent


4 (11110000) 240
5 (11111000) 248
6 (11111100) 252
7 (11111110) 254
8 (11111111) 255

© 2020 The Knowledge Academy Ltd 82


IPv4 Addressing
o Default Subnet Masks and Subnet IDs

The default subnet masks correspond to the three classes of unicast IP address (A, B, and C).
The default masks include whole octets:

• Class A: 255.0.0.0

• Class B: 255.255.0.0

• Class C: 255.255.255.0

© 2020 The Knowledge Academy Ltd 83


IPv4 Addressing
(Continued)

• These default masks can be changed to permit a single network to be divided into
several subnets

• For this, additional bits of the IP address has to be allocated to the network address
rather than the host ID

Network ID Host ID

16-bit 16-bit
Internetwork addressing (Class B address)

© 2020 The Knowledge Academy Ltd 84


IPv4 Addressing
(Continued)

Network ID Subnet ID Host ID

16-bit 4-bit 16-bit


Subnet addressing

• The whole network is still referred to by the network ID and the default mask:
172.1.0.0 / 255.255.0.0

• However, routers within the network add bits to the mask for differentiating the subnets

© 2020 The Knowledge Academy Ltd 85


IPv4 Addressing
o Classless Addressing

• With a classless addressing scheme, the concept of default masks and address classes is
abandoned in favour of representing the address with an adequately sized network
prefix

• The idea of aligning netmask along a particular octet boundary is wholly discarded

• For example, when expressed in binary, the subnet mask 255.255.240.0 includes 20 ones
followed by 12 zeroes. Therefore, the network prefix, displayed in slash notation, is
172.1.0.0/20

© 2020 The Knowledge Academy Ltd 86


IPv4 Addressing
(Continued)

• Therefore, the network prefix, shown in slash notation, is 172.1.0.0/20

• The routers have performed classless routing for a very long time, and the class
terminology is still used widely

• Under classless addressing, the old classes are usually used as names for the netmasks
that align to whole octet boundaries; a Class A network is /8, a Class B network is /16,
and a Class C network is /24

© 2020 The Knowledge Academy Ltd 87


IPv4 Addressing
Planning an IPv4 Addressing Scheme

A network designer requires to plan the IP network addressing scheme carefully. Before
selecting a scheme, examine the given below factors:

• Whether you require a public or private addressing scheme

• How many IP networks and subnetworks are required

• How many hosts per subnet

© 2020 The Knowledge Academy Ltd 88


IPv4 Addressing
(Continued)

The following are some additional constraints to consider while planning an addressing
scheme:

• The network ID must be from a valid public or a private range

• The network and host IDs cannot be all 1s in binary – this is reserved for broadcasts

• The network and host ID cannot be all zeroes in binary; 0 means "This Network"

© 2020 The Knowledge Academy Ltd 89


IPv4 Addressing
(Continued)

• The host ID must be unique on the IP network or subnet

• The network ID must be unique on the Internet

While performing subnet calculations, it helps to identify that each power of two is double
the previous one:

22 23 24 25 26 27 28
4 8 16 32 64 128 256

© 2020 The Knowledge Academy Ltd 90


IPv4 Addressing
Public Internet Addressing

When an organisation needs to connect to the Internet, it must apply for a range of public IP
addresses through its ISP

o Classful Addressing

• In the classful addressing system, an organisation will be allocated a network address


from a suitable class (A, B, or C)

• With the subnetting introduction, depending on the class of IP address, some octets
were fixed, but the left portion could use any valid addressing scheme

© 2020 The Knowledge Academy Ltd 91


IPv4 Addressing
(Continued)

• For example, an organisation may allocate the network address 128.248.0.0 where it can
allocate the third and fourth octets as required

• Under this classful system, almost all the Class B addresses became allocated

• This deficiency of network addresses prompted the development of IPv6, which utilises a
much larger address space

© 2020 The Knowledge Academy Ltd 92


IPv4 Addressing
(Continued)

• However, the deployment of IPv6 has been protracted enormously, so a series of stopgap
measures have been introduced over the years

• The subnetting and private address ranges are used to hide the private local networks
complexity from the wider Internet

• Another important measure was the introduction of Classless Interdomain Routing


(CIDR) or supernetting

© 2020 The Knowledge Academy Ltd 93


IPv4 Addressing
o Classless Interdomain Routing (CIDR)

• Classless addressing was created to solve two main difficulties of the classful addressing
scheme as more and more networks are joining the Internet

• The first difficulty was that network addresses (especially, Class B addresses) were
becoming very scarce and the second difficulty was near exponential growth in Internet
routing tables

• Mostly, it utilises bits usually assigned to the network ID to mask them as subnet bits or
host

© 2020 The Knowledge Academy Ltd 94


IPv4 Addressing
(Continued)

/24 Network ID Host ID


/24 Network ID Host ID
/24 Network ID Host ID

/21 External Network address Internal Network Addresses and Host IDs

21-bit 11-bit

© 2020 The Knowledge Academy Ltd 95


IPv4 Addressing
(Continued)

• For example, instead of allocating a class B (or /16) network address to a company,
various contiguous class C (or /24) addresses could be assigned

• Eight /24 network addresses give 2032 hosts. This means complex routing with several
entries in the routing tables to represent eight IP networks at the same location

• CIDR is utilised to collapse these routing entries into a single entry

© 2020 The Knowledge Academy Ltd 96


IPv4 Addressing
(Continued)

• If the network addresses assigned to a company were 192.32.168.0 through to


192.32.175.0 and to view this as one network, consider only the first 21 bits of the
address

192.32.168.0 11000000.00100000.10101 000.00000000


192.32.169.0 11000000.00100000.10101 001.00000000
192.32.170.0 11000000.00100000.10101 010.00000000
192.32.171.0 11000000.00100000.10101 011.00000000
192.32.172.0 11000000.00100000.10101 100.00000000
192.32.173.0 11000000.00100000.10101 101.00000000
192.32.174.0 11000000.00100000.10101 110.00000000
192.32.175.0 11000000.00100000.10101 111.00000000

© 2020 The Knowledge Academy Ltd 97


IPv4 Addressing
(Continued)

• The network address could also be shown in classless notation as 192.32.168.0/21,


which means that the network prefix includes 21 bits

• As with subnetting, an ANDing process is utilised to decide whether to route

• If the ANDed result exhibits the same network ID as the destination address, then it is
the same network

© 2020 The Knowledge Academy Ltd 98


IPv4 Addressing
(Continued)

• In the following table, the first two IP addresses belong to the same network (the second
is the broadcast address for the network) but the third is in a different one:

Mask 255.255.248. 0 11111111.11111111.11111000.00000000


IP 192. 32.168. 1 11000000.00100000.10101000.00000001
IP 192. 32.175.255 11000000.00100000.10101111.11111111
IP 192. 32.176. 1 11000000.00100000.10110000.00000001

© 2020 The Knowledge Academy Ltd 99


IPv4 Addressing
Variable Length Subnet Masks (VLSM)

• As the IPv4 address space becomes steadily more utilised, there is a need to use more
efficient methods of allocating IP addresses

• VLSM enables a network designer to allocate IP addresses ranges to subnets that match
the predicted requirement for numbers of subnets and hosts per subnet more closely

• Without VLSM, the user has to allocate subnetted ranges of addresses that are of the
same size and utilise the same subnet mask within a single class-based network

© 2020 The Knowledge Academy Ltd 100


IPv4 Addressing
(Continued)

• This means that there is a need to install additional routing interfaces to connect various
smaller subnets within a department

• VLSM enables different length subnet masks to be used within the same IP network,
permitting more flexibility in the design process

• VLSM has some similarities to CIDR

© 2020 The Knowledge Academy Ltd 101


IPv4 Addressing
o Planning a VLSM Addressing Scheme

• Assume a company which is part of a multinational organisation with several hundreds


of subnetworks worldwide

• This scenario has six main offices each with differing network sizes and IP address
requirements

• There are also two subnets connecting the regional routers with the headquarters
router, which renders access to the Internet

© 2020 The Knowledge Academy Ltd 102


IPv4 Addressing
(Continued)

© 2020 The Knowledge Academy Ltd 103


IPv4 Addressing
(Continued)

• VLSM design continues by recognising the largest subnets and organising the scheme in
descending order

• Even though VLSM enables more precise allocation of address space, but there is a need
to design for growth and allow space in every subnet for additional hosts

• The need for the subnetted network are listed in the table given on the next slide, along
with the actual number of IP addresses that would be rendered by the VLSM design

© 2020 The Knowledge Academy Ltd 104


IPv4 Addressing
(Continued)

Office / Subnet Required Number of IP Addresses Actual Number of IPAddresses

Regional Office South 2060 4094

Regional Office North 1200 2046

Branch Office A 420 510

Branch Office D 300 510

© 2020 The Knowledge Academy Ltd 105


IPv4 Addressing
(Continued)

Office / Subnet Required Number of IPAddresses Actual Number of IPAddresses

Branch Office B 180 254

Branch Office C 70 126

Router Subnet North 2 2

Router Subnet South 2 2

© 2020 The Knowledge Academy Ltd 106


IPv4 Addressing
(Continued)

• The actual IP address ranges generated by the VLSM design are:

Office Subnet Useable Subnet Address Range

Regional Office South 172.16.0.0/20 172.16.16.1 - 172.16.23.254

Regional Office North 172.16.16.0/21 172.16.0.1 - 172.16.15.254

Branch Office A 172.16.24.0/23 172.16.24.1 - 172.16.25.254

Branch Office D 172.16.26.0/23 172.16.26.1 - 172.16.27.254

© 2020 The Knowledge Academy Ltd 107


IPv4 Addressing
(Continued)

Office Subnet Useable Subnet Address Range

Branch Office B 172.16.28.0/24 172.16.28.1 - 172.16.28.254

Branch Office C 172.16.29.0/25 172.16.29.1 - 172.16.29.126

Router Subnet North 172.16.29.128/30 172.16.29.129 - 172.16.29.130

Router Subnet South 172.16.29.132/30 172.16.29.133 - 172.16.29.134

© 2020 The Knowledge Academy Ltd 108


Module 8: Configure and Verify IPv6
Addressing and Prefix

© 2020 The Knowledge Academy Ltd 109


1.8 IPv6 Addressing
IPv6 Address Format

• The addressing scheme in IPv4 is based on a 32-bit binary number

• 32 bits can express 232 unique addresses

• However, the method in which addresses have been allocated is inefficient that leads to
wastage of available addresses

• Addressing scheme inefficiencies and increasing demand for addresses indicates that the
available IPv4 address supply is close to exhaustion

© 2020 The Knowledge Academy Ltd 110


IPv6 Addressing
(Continued)

• Private addressing and network address translation (NAT) have rendered a 'stopgap'
solution to the problem

• IPv6 renders a long-term solution to the address space exhaustion problem

• Its 128-bit addressing scheme has space for 340 undecillion unique addresses

• Only a small part of the scheme can be allocated currently to hosts, but there is still
enough address space within that allocation

© 2020 The Knowledge Academy Ltd 111


IPv6 Addressing
(Continued)

• IPv6 is designed to fulfil the demands of personal and handheld devices with internal
connectivity

• Currently, that means phones, but the IPv6 designers visualise a world of wireless
Internet connectivity for a huge variety of appliances

• For example, an advertising hoarding could be made "active" so that it can be linked to
the product through the phone

© 2020 The Knowledge Academy Ltd 112


IPv6 Addressing
(Continued)

• Now, IPv6 has begun to be deployed in particular sections of corporate and public
networks

• While IPv6 has been a standard installed feature in the last few versions of both desktop
and Server of common OSes; it is only in the core network that IPv6 has been
implemented typically

• However, with the increasing problems with existing IPv4, the IPv6 will become more
mainstream for corporate networks down to the desktop and the web in general

© 2020 The Knowledge Academy Ltd 113


IPv6 Addressing
(Continued)

o Hexadecimal Numbering

• For interpreting IPv6 addresses, the user needs to understand the hexadecimal notation
and the base numbering system

• Decimal numbering can also be known as base 10

• Base 10 defines that each digit can have one of ten possible values (0…9)

• A digit placed to the left of another is ten times the value of the digit to the right

© 2020 The Knowledge Academy Ltd 114


IPv6 Addressing
(Continued)

For example, the number 255 can be written as below:

(2x10x10)+(5x10)+5

• Binary is base 2 so a digit in any given position can only have one of two values (0 or 1)
and each place position is the next power of 2

© 2020 The Knowledge Academy Ltd 115


IPv6 Addressing
(Continued)

• The binary value 11111111 can be changed to the decimal value 255 with the help of
below-mentioned sum:

(1x2x2x2x2x2x2x2)+(1x2x2x2x2x2x2)+(1x2x2x2x2x2)+(1x2x2x2x2)+(1x2x2x2)+(1x2x2)+(1x2)+1

• Several values in computing, such as IPv4 addresses, are depicted in octets (or bytes)

• 1 octet (or byte) is 8 bits

© 2020 The Knowledge Academy Ltd 116


IPv6 Addressing
(Continued)

• As the addresses of IPv6 are long (128 bits), the dotted decimal conversion becomes
difficult

• Hex is considered to be a more convenient method of referring to the long sequences of


bytes that are used in IPv6

• Hex is base 16 with the possible values of each digit signified by the numerals 0…9 and
the characters A, B, C, D, E, F

© 2020 The Knowledge Academy Ltd 117


IPv6 Addressing
(Continued)

The following table is used to convert between binary, decimal, and hexadecimal values

© 2020 The Knowledge Academy Ltd 118


IPv6 Addressing
(Continued)

Decimal Hexadecimal Binary Decimal Hexadecimal Binary


3 3 0011 11 B 1011
4 4 0100 12 C 1100
5 5 0101 13 D 1101
6 6 0110 14 E 1110
7 7 0111 15 F 1111

© 2020 The Knowledge Academy Ltd 119


IPv6 Addressing
o IPv6 Address Compression

• IPv6 addresses include eight 16-bit numbers with each double-byte number expressed as
4 hex digits. For example, the binary address:

0010 0000 0000 0001 : 0000 1101 1011 1000 : 0000 0000 0000 0000 :
0000 0000 0000 0000 : 0000 1010 1011 1100 : 0000 0000 0000 0000 :
1101 1110 1111 0000 : 0001 0010 0011 0100

• Can be expressed in hex notation as:

2001:0db8:0000:0000:0abc:0000:def0:1234

© 2020 The Knowledge Academy Ltd 120


IPv6 Addressing
(Continued)

• If a double-byte includes leading zeroes, then they can be ignored

• In addition, one contiguous series of zeroes can be substituted by a double colon place
marker

• Thus the address will become:

2001:db8::abc:0:def0:1234

© 2020 The Knowledge Academy Ltd 121


IPv6 Addressing
(Continued)

• Double-colon compression can be used only single time in a given address. For example:

2001:db8::abc::def0:1234

• The above mentioned is not valid as it is ambiguous between the below two addresses:

2001:db8:0000:0abc:0000:0000:def0:1234
2001:db8:0000:0000:0abc:0000:def0:1234

© 2020 The Knowledge Academy Ltd 122


IPv6 Addressing
(Continued)

• If IPv6 addresses are used as part of a URL, then the IPv6 address must be enclosed
within square brackets

• For example:

http://[2001:db8::abc:0:def0:1234]/index.htm

© 2020 The Knowledge Academy Ltd 123


IPv6 Addressing
o IPv6 Packets

• An IPv6 packet comprises two or three elements: the main header, one or more optional
extension headers, and the payload

• The IPv6 packet key features are as follows:

Field Size Explanation


Version 4 bits Used to indicate which version of IP is being used (0110 or 0x06 for IPv6)

Traffic Class 8 bits Describes the packet’s priority

© 2020 The Knowledge Academy Ltd 124


IPv6 Addressing
(Continued)

Field Size Explanation

Flow Label 20 bits Used for QoS management, such as for real-time streams. This is set to 0
for packets not part of any delivery sequence or structure

Payload Length 16 bits Indicates the length of the packet pay load, up to a maximum of 64 KB; if
the payload is bigger than that, this field is 0 and a special Jumbo Payload
(4 GB) option is established

Next Header 8 bits Used to describe what the next extension header (if any) is, or where the
actual payload begins

© 2020 The Knowledge Academy Ltd 125


IPv6 Addressing
(Continued)

Field Size Explanation


Hop Limit 8 bits Replaces the TTL field in IPv4 but performs the same function

Source Address 128 bits The originating address

Destination Address 128 bits The target address

© 2020 The Knowledge Academy Ltd 126


IPv6 Addressing
IPv6 Addressing Schemes

• An IPv6 address is divided into two parts: the first 64 bits are utilised as a network ID and
the second 64 bits designate a specific interface

Network ID Interface ID

64-bit 64-bit
• Network addresses are written by utilising CIDR notation, where /nn is the routing prefix
length in bits

• Within the 64-bit network ID, as with CIDR, the network prefix length is utilised to decide
whether two addresses refer to the same IP network

© 2020 The Knowledge Academy Ltd 127


IPv6 Addressing
(Continued)

• For example, if the prefix is /48, then if the IPv6 address' first 48 bits were the same as
another address, the two would belong to the same IP network

• This indicates that a given network of an organisation can be described by a network


prefix 48 bits long and then to subnet their network they have 16 bits left in the network
ID. For example,

2001:db8:3c4d::/48 2001:db8:3c4d:01::/64

represent a network address represent a subnet within that network address

© 2020 The Knowledge Academy Ltd 128


IPv6 Addressing
(Continued)

• IPv6 describes several addressing schemes. These are unicast, multicast, and anycast

o IPv6 Unicast Addressing

• As with IPv4, a unicast address recognises a single network interface

• IPv6 unicast addressing is scoped; a scope is defined as a region of the network

• Global scopes render the equivalent of public addressing schemes in IPv4 while link-local
schemes render private addressing

© 2020 The Knowledge Academy Ltd 129


IPv6 Addressing
o IPv6 Global Addressing

• Globally scoped unicast addresses are routable over the Internet and are the equivalent
of public IPv4 addresses

• The parts of a global address are given below:

 The first 3 bits (001) denote that the address is within the global scope. Maximum
IPv6 address space is unused. The scope for globally unique unicast addressing holds
1/8th of the total address space. In hex, globally scoped unicast addresses will begin
with a 2 (0010) or 3 (0011)

© 2020 The Knowledge Academy Ltd 130


IPv6 Addressing
(Continued)

 The next 45 bits are allotted hierarchically to regional registries and from them to
ISPs and end users

 The next 16 bits recognise site-specific subnet addresses

 The final 64 bits are the interface ID

Global routing prefix


001 Network ID Subnet Interface ID

3-bit 45-bit 16-bit 64-bit

IPv6 global unicast address format

© 2020 The Knowledge Academy Ltd 131


IPv6 Addressing
o Interface ID / EUI-64

By using below two techniques, the interface ID can be determined:

• One is by utilising the interface's MAC address. This is referred to as an interface


identifier or MAC-derived address

• As MAC address is currently 48 bits (6 bytes), a simple translation mechanism permits


driver software to generate a 64-bit interface ID (an EUI-64) from these 48 bits

© 2020 The Knowledge Academy Ltd 132


IPv6 Addressing
(Continued)

• The digits fffe are added in the middle of the address, and the U/L bit is flipped

• For example, the MAC address 00608c123abc would become the EUI-64 address
02608cfffe123abc, which when expressed in doublebytes becomes 0260:8cff:fe12:3abc,
or 260:8cff:fe12:3abc

• In the second technique, the client device uses a pseudorandom number for the
interface ID. This is referred to as a temporary interface ID or token

© 2020 The Knowledge Academy Ltd 133


IPv6 Addressing
(Continued)

• Using interface identifiers would permit a specific host to be recognised and monitored
closely when connecting to the Internet and utilising a token mitigates this to some
degree

o IPv6 Link-local addressing

• IPv6 uses Link-local addresses for network housekeeping traffic

• Link-local addresses span a single subnet (routers do not forward them)

• Nodes on the same link are known as neighbors

© 2020 The Knowledge Academy Ltd 134


IPv6 Addressing
(Continued)

• Link-local addresses begin with a leading fe80 while the next 54 bits are set to zero and
the last 64 bits are the interface ID

1111 110 10 0000…0000 Interface ID

10-bit 54-bit 64-bit

IPv6 link-local unicast address format


• The equivalent in IPv4 is Automatic Private IP Addressing (APIPA) and its 169.254.0.0
addresses

© 2020 The Knowledge Academy Ltd 135


IPv6 Addressing
(Continued)

• However, an IPv6 host is always configured with link-local addresses, even if it also has a
globally unique address

• A link-local address is also appended with a zone index of the form %1 (Windows) or
%eth0 (Linux)

• This is used to determine the address source and make it unique to a specific link

• For example, a host may have links to Ethernet, loopback address, and a VPN

© 2020 The Knowledge Academy Ltd 136


IPv6 Addressing
(Continued)

• All these links use the same link-local address, so to make it unique each is assigned a
zone ID

• The host system generates zone indices, so where two hosts communicate, they may be
indicating to the link using different zone IDs

© 2020 The Knowledge Academy Ltd 137


IPv6 Addressing
o IPv6 Unique Local Addressing

• Unique Local Addressing assigns addresses that are only routable within a site

• Unique Local Addressing (ULA) addresses are not routable over the Internet

• ULA is designed for hosts that will never access the Internet

© 2020 The Knowledge Academy Ltd 138


IPv6 Addressing
(Continued)

• The prefix for unique local addressing is fc00;:/7 but it is more common to see addresses
of form fd00::/8 as to indicate the local addressing, the 8th bit should be fixed to 1

• A pseudo-random algorithm should generate the next 40 bits and used for a single site
only

• While designed for site-local addressing, ULA is global in scope, which indicates that no
organisation should assign the same ULA prefix. The remaining 16 bits can be utilised for
subnetting

© 2020 The Knowledge Academy Ltd 139


IPv6 Addressing
o IPv6 Multicast Addressing

• A multicast address recognises multiple network interfaces, and unlike IPv4, IPv6 routers
must support multicast

• The multicast address parts are subdivided as below:

 The first 8 bits show that the address is within the multicast scope (1111 1111 or ff)

 The next 4 bits are utilised to flag types of multicast if required (they are set to 0
otherwise)

© 2020 The Knowledge Academy Ltd 140


IPv6 Addressing
(Continued)

 The next 4 bits define the scope; for example, 1 is node-local while 2 is link-local

 The final 112 bits define multicast groups within that scope

• Broadcast addresses are not executed in IPv6. Instead, hosts use a suitable multicast
address for a given situation

• The multicast addresses are reserved for these types of "broadcast" functionality. They
enable an interface to "broadcast" to all routers or interfaces on the same node or local
link

© 2020 The Knowledge Academy Ltd 141


IPv6 Addressing
(Continued)

• Below are some of the well-known multicast addresses:

Address Target

ff02::1 All link-local nodes

ff02::2 All link-local routers

ff02::1:2 All link-local DHCP servers and relay agents

© 2020 The Knowledge Academy Ltd 142


IPv6 Addressing
(Continued)

• In IPv4, IP address resolution to a specific hardware interface is performed by using ARP

• ARP is "chatty" and needs every node to process its messages, whether they are relevant
to the node or not. IPv6 substitutes ARP with the Neighbor Discovery (ND) protocol

• Every unicast address for an interface is configured with a corresponding solicited-node


multicast address

© 2020 The Knowledge Academy Ltd 143


IPv6 Addressing
(Continued)

• It includes the prefix ff02::1:ff and also the last 24 bits of the unicast address

• neighbor discovery (ND) uses solicited-node address to execute address resolution

• It decreases the hosts' number that is likely to receive ND messages and is therefore
more useful than the old ARP broadcast mechanism

© 2020 The Knowledge Academy Ltd 144


IPv6 Addressing
o IPv6 Anycast Addressing

• An anycast address also identifies multiple addresses

• Anycast is used when the message is required to be sent to any members of a group but
not certainly to all of them

• The packet is sent to the group member physically closest to the transmitting host

• Anycast is used for routing protocol traffic

© 2020 The Knowledge Academy Ltd 145


IPv6 Addressing
o IPv6 Reserved Addresses

• The 0000::/8 block is reserved for special functions

There are two special addresses within this block:

 Unspecified address (0:0:0:0:0:0:0:0)

 Loopback address (0:0:0:0:0:0:0:1)

© 2020 The Knowledge Academy Ltd 146


IPv6 Addressing
o IPv6 Address Prefixes

• Following table is used to identify some commonly used classes of IPv6 address by prefix
notation or leading hex digits:

Type Prefix Leading Hex Characters

Global unicast 2000::/3 2, 3

Link-local unicast fe80::/64 fe80

ULA fd00::/8 fd00

© 2020 The Knowledge Academy Ltd 147


IPv6 Addressing
(Continued)

Type Prefix Leading Hex Characters

Multicast ff00::/8 ff

Multicast (local- link) ff02::/16 ff02::1 (all nodes),


ff02::2 (all routers),
ff:02::1:2 (DHCP)
Solicited-node ff02::1:ff00:0/104 ff02::1:ff

Unspecified ::/128 ::, 0::0

© 2020 The Knowledge Academy Ltd 148


IPv6 Addressing
(Continued)

Type Prefix Leading Hex Characters

Loopback ::1/128 ::1

Teredo 2001::/32 2001

6to4 2002::/16 2002

Documentation / Examples 2001:db8::/32 2001:db8

© 2020 The Knowledge Academy Ltd 149


1.9 Compare IPv6 Address Types
There are numerous different types of IPv6 addresses:

1.9.a Global Unicast

o Similar to IPv4 public addresses

o Range - 2000::/3

1.9.b Unique Local

o Similar to IPv4 private addresses

o Range – FD00::/8

© 2020 The Knowledge Academy Ltd 150


1.9 Compare IPv6 Address Types
1.9.c Link Local

o Self-generated

o Not routable and meant for local VLAN only

o Range – FE80::/10

1.9.d AnyCast

o An IPv6 address which is assigned to multiple nodes

o Used to provide redundancy and optimised traffic flow

© 2020 The Knowledge Academy Ltd 151


1.9 Compare IPv6 Address Types
1.9.e Multicast

o Similar to IPv4 multicast addresses

o Range – FF00:/8

1.9.f Modified EUI 64

o A method used to generate an IPv6 host addresses automatically

© 2020 The Knowledge Academy Ltd 152


Module 10: Verify IP Parameters for
Client OS

© 2020 The Knowledge Academy Ltd 153


1.10 Verify IP parameters for Client OS
• Every operating system has various commands which you can use to verify network
settings

a. Windows

The following are the steps to verify interface IP parameters in Windows OS:

1. Open the command prompt application by searching for “command prompt” with a
Windows search

2. Then run the command “ipconfig/all”

© 2020 The Knowledge Academy Ltd 154


Verify IP parameters for Client OS

© 2020 The Knowledge Academy Ltd 155


Verify IP parameters for Client OS
b. MAC OS

The following are the steps to verify interface IP parameters in MAC OS:

1. Open the terminal located in /Applications/Utilities/

2. Then run the command “ifconfig”

© 2020 The Knowledge Academy Ltd 156


Verify IP parameters for Client OS
c. Linux

The following are the steps to verify interface IP parameters in Linux OS:

1. Open the terminal application by searching for “terminal” with an application search

2. Then run the command “ifconfig”

© 2020 The Knowledge Academy Ltd 157


Module 11: Describe Wireless Principles

© 2020 The Knowledge Academy Ltd 158


1.11.a Nonoverlapping Wi-Fi channels
• The wireless frequencies are used to transmit data over the air. They are split up into
smaller bands called channels

2.4 GHz channels (U.S.)

1 2 3 4 5 67 8 9 10 11
5 GHz channels (U.S.)

36 40 44 48

© 2020 The Knowledge Academy Ltd 159


1.11.a Nonoverlapping Wi-Fi channels
(Continued)

• In an RF environment, wireless channels should not overlap

Channel 1 Channel 6 Channel 11

© 2020 The Knowledge Academy Ltd 160


1.11.a Nonoverlapping Wi-Fi channels
(Continued)

• Due to overlapping channels, interference, and degradation can be caused in wireless


performance

Channel 1 Channel 1 Channel 1

© 2020 The Knowledge Academy Ltd 161


1.11.b SSID and 1.11.c RF
SSID

• SSID (Service Set Identifier) is also called WLAN (Wireless


Local Area Network), and it is connected with wireless
devices

• A wireless computer is an example of SSID

RF

• Radio frequency (RF) signals are used for transmitting


data between wireless devices

© 2020 The Knowledge Academy Ltd 162


1.11.d Encryption
• For secure wireless transmissions, encryption methods are used

• The following are the types of wireless encryption:

WPA2 + AES WPA + TKIP/AES


*Most secure WPA + AES (TKIP is there as a WPA + TKIP
option fallback method)

Open Network (no


WEP
security at all)

© 2020 The Knowledge Academy Ltd 163


Module 12: Explain Virtualisation
Fundamentals (Virtual Machines)

© 2020 The Knowledge Academy Ltd 164


1.12 Server Virtualisation Basics
• Before virtualisation, physical server model was used in which each physical server runs
one Operating System that uses all the hardware in that one server

• Most companies, now a days, create a virtualised data centre i.e. the company purchases
server hardware, installs it in racks, and then treats all the CPU, RAM, and so on as
capacity in the data centre

• After that, each OS instance is decoupled from the hardware and is therefore virtual

• Every piece of hardware that we would previously have thought of as a server runs
multiple instances of an OS at the same time, with each virtual OS instance called a
virtual machine, or VM

© 2020 The Knowledge Academy Ltd 165


Server Virtualisation Basics
(Continued)
Virtual Machine Virtual Machine Virtual Machine Virtual Machine
App App App App App App App App App App App App

OS OS OS OS
Hypervisor

Storage CPU RAM Network

Four VMs Running on One Host; Hypervisor Manages the Hardware

© 2020 The Knowledge Academy Ltd 166


Server Virtualisation Basics
• Every physical server uses a hypervisor to make server virtualisation work

• The management and allocation of the host hardware i.e. CPU, RAM, etc. to each VM
based on the settings for the VM is done by the hypervisor

• Every Virtual Machine runs as if it is running on a self-contained physical server, with a


particular number of virtual CPUs and NICs and a set amount of RAM and storage

© 2020 The Knowledge Academy Ltd 167


Server Virtualisation Basics
• Server virtualisation tools provide a wide-ranging variety of options for how to connect
VMs to networks

• Generally, a physical server has one or more NICs, maybe as slow as 1 Gbps, often 10
Gbps today, and maybe as fast as 40 Gbps

• Also, an OS has one NIC or maybe more

• To make the OS work normally, every VM has at least one NIC, but for a VM, it is a virtual
NIC

© 2020 The Knowledge Academy Ltd 168


Server Virtualisation Basics
• Lastly, the server must combine the ideas of the physical NICs with the vNICs used by the
VMs into some kind of a network

• Mostly, every server uses some kind of an internal Ethernet switch concept, known as a
virtual switch, or vSwitch

• The vSwitch can be supplied by the hypervisor vendor or by Cisco

© 2020 The Knowledge Academy Ltd 169


Module 13: Describe Switching Concepts

© 2020 The Knowledge Academy Ltd 170


1.13.a MAC Learning and Aging
• MAC address learning occurs when the switch is started, and connected hosts start
sending frames

• Also, MAC learning is activated after the aging time expires

• By default, the switch removes MAC address table entries after every five minutes

• The layer 2 broadcast is transmitted to all devices on a single broadcast (segment) domain

• The switch generates the broadcast packet ffff.ffff.ffff as the MAC address of the
destination and transmits it to all ports except where the frame was learned

© 2020 The Knowledge Academy Ltd 171


1.13.b Frame Switching
• The host sends packets encapsulated with an IP header in the frame

• The IP address of source and destination in the header are needed for end-to-end
connectivity

• The switches in layer 2 do not examine or understand the IP addresses

• Wireless access points and Switches are network devices which make forwarding
decisions on the basis of the destination MAC address in the frame

© 2020 The Knowledge Academy Ltd 172


1.13.b Frame Switching
(Continued)

• In the frame, Wireless access points and Switches do not change MAC addressing

• The switch does not rewrite the MAC addressing in the header of frames

• It examines the MAC address of source and MAC address of the destination

• When not listed, the incoming frame's source MAC address is added to the MAC
address table

© 2020 The Knowledge Academy Ltd 173


1.13.b Frame Switching
(Continued)

• The switch examines the frame header for the MAC address of the destination and
looks up the MAC address table for a forwarding decision

• Then, the frame is forwarded out the switch port related with the MAC address of the
destination where the host is connected

• Any MAC address of the destination which is not local is forwarded to the router

• The IP addressing between source and destination does not alter

© 2020 The Knowledge Academy Ltd 174


1.13.c Frame Flooding
• LAN switches use forwarding tables, i.e. Content Addressable Memory (CAM) tables,
Layer 2 (L2) tables for directing traffic to particular ports on the basis of the VLAN
number and the frame's MAC address destination

• Initially, the L2 table does not have a MAC address of the destination port. Therefore,
LAN switch broadcast the messages of all the connected ports to get the MAC address
of each of the connected ports. This causes the Frame Flooding

• Then, the second time LAN switch broadcast the messages to the specific port based on
MAC address of frame destination(MAC address of the destination port)

© 2020 The Knowledge Academy Ltd 175


1.13.c Frame Flooding
(Continued)
Frame arrived at LAN switch

Read Mac address of the Destination


port

Find that address in CAM table

Is address of that
destination port is
No Yes
available in the CAM
table

Forward frame to all the connected ports Forward frame only to the port which is
except the port on which it arrived connected with the destination address

© 2020 The Knowledge Academy Ltd 176


1.13.d MAC Address Table
• The unique hardware address from the manufacturer is assigned to each network
device, which is known as MAC address

• A MAC address has the purpose of providing a unique identifier for layer 2

• That enables the communication between devices of the different segment of the
network (VLAN) or the same segments

• The decisions regarding switch forwarding are based on the assigned port and the MAC
address

© 2020 The Knowledge Academy Ltd 177


1.13.d MAC Address Table
(Continued)

• The MAC address is a hexadecimal numbering of 48 bits, which is also known as


physical address

• The last 24 bits (bold) is a unique serial number (SN), and the first 24 bits is a
manufacturer OUI (Organisational Unique Identifier)

OUI | SN
0000.000a.aaaa

© 2020 The Knowledge Academy Ltd 178


Domain 2

Network Access

© 2020 The Knowledge Academy Ltd 179


Outlines of Domain 2
• Module 1: Configure and verify VLANs (normal range) spanning
multiple switches

• Module 2: Configure and verify interswitch connectivity

• Module 3: Configure and verify Layer 2 discovery protocols (Cisco


Discovery Protocol and LLDP)

• Module 4: Configure and verify (Layer 2/Layer 3) EtherChannel


(LACP)

© 2020 The Knowledge Academy Ltd 180


Outlines of Domain 2
• Module 5: Describe the need for and basic operations of Rapid PVST+
Spanning Tree Protocol and identify basic operations

• Module 6: Compare Cisco Wireless Architectures and AP modes

• Module 7: Describe physical infrastructure connections of WLAN


components (AP, WLC, access/trunk ports, and LAG)

• Module 8: Describe AP and WLC management access connections

• Module 9: Configure the components of a wireless LAN access for


client connectivity using GUI

© 2020 The Knowledge Academy Ltd 181


Cisco Router Modes
Modes of Router

• The following are the main 5 modes in a router:

3. Global
1. User 2. Privileged
Configuration
Execution Mode Mode
Mode

4. Interface
5. ROMMON
Configuration
Mode
Mode

© 2020 The Knowledge Academy Ltd 182


2.1 Configure and Verify VLANs (Normal
Range) Spanning Multiple Switches
2.1.a Access Ports (Data and Voice)

• Access ports are also called edge ports, and they act as endpoints for establishing a
connection to the network

Access port

© 2020 The Knowledge Academy Ltd 183


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

• Data access ports are not intended for VLAN tagging. Therefore, connected devices
should send untagged frames

• When an access port receives untagged data traffic, the "access VLAN" provisioned on
the interface will determine on which VLAN the traffic will be forward

© 2020 The Knowledge Academy Ltd 184


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

• Enable access mode on an interface

© 2020 The Knowledge Academy Ltd 185


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

• Assigning VLAN membership to an interface in access mode

© 2020 The Knowledge Academy Ltd 186


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

• Verify access interface status

© 2020 The Knowledge Academy Ltd 187


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
2.1.b Default VLAN

• Cisco switch ports are assigned to VLAN 1 by default

• The best practice is not to use VLAN 1 when possible

© 2020 The Knowledge Academy Ltd 188


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
2.1.c Connectivity

Connectivity is considered as a key factor in any business. The following are some types of
network connectivity:

i. Broadband: Permits companies to access the Internet from a fixed location

• A successor of the old dial-up method of connecting networks

• Generally, ISDN, DSL, mobile broadband and cable modem are usually classified as
broadband

© 2020 The Knowledge Academy Ltd 189


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

ii. Mobile Internet: is used to access networks from anywhere through wireless
connections

• For mobile internet, the higher the protocol, the higher the speed and connectivity

iii. Virtual Private Network (VPN): is used to create a private network to exchange data
securely over a public network

• The transferring of data is typically secured by a method called ‘tunneling’

© 2020 The Knowledge Academy Ltd 190


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

iv. Dial-up Networks: These networks enable TCP/IP communication over ordinary
telephone lines

• They make use of analog modems that call specific telephone numbers to make
connections

v. Local Area Networks (LAN): These are used to connect multiple local devices and
computers to share information and access resources

• Routers and network switches are used to connect a LAN with outside networks

© 2020 The Knowledge Academy Ltd 191


Configure and Verify VLANs (Normal Range)
Spanning Multiple Switches
(Continued)

vi. Direct Networks: This is the simplest form of connectivity in which the connection is
established between two devices directly

• In these networks, only close range connections can be made easily

© 2020 The Knowledge Academy Ltd 192


2. 2 Configure and Verify Interswitch
Connectivity
2.2.a Trunk Ports

• Trunk ports are used for connections when several VLANs need to send data

• Trunk ports are mainly used for interswitch connections

• VLAN IDs are added as a tag to the Ethernet frames

• That's why trunk ports are often called tagged

© 2020 The Knowledge Academy Ltd 193


Configure and Verify Interswitch Connectivity

Trunk Port
(Tagged)

Access Port
(Untagged)

© 2020 The Knowledge Academy Ltd 194


Configure and Verify Interswitch Connectivity
Enable trunk mode on an interface

1. Configuration of Switch 1

© 2020 The Knowledge Academy Ltd 195


Configure and Verify Interswitch Connectivity
(Continued)

2. Showing status of VLANs

© 2020 The Knowledge Academy Ltd 196


Configure and Verify Interswitch Connectivity
(Continued)

3. Enable Trunk Port

© 2020 The Knowledge Academy Ltd 197


Configure and Verify Interswitch Connectivity
(Continued)

4. Configuration of Switch 2

© 2020 The Knowledge Academy Ltd 198


Configure and Verify Interswitch Connectivity
(Continued)

5. Showing status of VLANs

© 2020 The Knowledge Academy Ltd 199


2.2.b 802.1Q
• The standard defining VLAN tagging within an Ethernet frame is 802.1Q

4 Bytes

Destination Source 802.1Q Frame


Type/Len Data
Address Address VLAN Tag Check

2 Bytes 2 Bytes (Tag Control Information)


User Canonical
Tag Protocol VLAN ID (12
Priority (3 Format Bits)
ID Ox8100 Indicator(1 Bit)
Bits)

© 2020 The Knowledge Academy Ltd 200


2.2.c Native VLAN
Introduction

• Cisco trunk ports can have one untagged VLAN, and it is also known as Native VLAN

• Traffic that is transmitted out of a trunk port that resides in the Native VLAN will be
forwarded without a VLAN tag

© 2020 The Knowledge Academy Ltd 201


2.2.c Native VLAN
Example of Native VLAN configuration

© 2020 The Knowledge Academy Ltd 202


2.2.c Native VLAN
(Continued)

1. Verification of Native VLAN

• Configuration of switch 1

© 2020 The Knowledge Academy Ltd 203


2.2.c Native VLAN
2. Enable trunk port at switch 1

© 2020 The Knowledge Academy Ltd 204


2.2.c Native VLAN
3. Verify Native VLAN

© 2020 The Knowledge Academy Ltd 205


2.2.c Native VLAN
4. Configuration of switch 2

© 2020 The Knowledge Academy Ltd 206


2.3 Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
CDP (Cisco Discovery Protocol)

• Cisco proprietary protocol which can be used to discover directly connected device's
information and it is enabled on most Cisco devices by default

• The command "show cdp neighbor" can be used to display CDP learned information

© 2020 The Knowledge Academy Ltd 207


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
Example of CDP Configuration

© 2020 The Knowledge Academy Ltd 208


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
1. Configuration of Router 1

© 2020 The Knowledge Academy Ltd 209


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
2. Configuration of Router 2

© 2020 The Knowledge Academy Ltd 210


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
3. Enable CDP

© 2020 The Knowledge Academy Ltd 211


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
4. Command: “show cdp neighbors”

© 2020 The Knowledge Academy Ltd 212


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
LLDP

• Similar to CDP except that it's an open standard protocol and it can be used by anyone
including Cisco

• It is not enabled on Cisco devices by default

© 2020 The Knowledge Academy Ltd 213


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
Example of LLDP Configuration

© 2020 The Knowledge Academy Ltd 214


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
1. Enabling LLDP on Router 1

© 2020 The Knowledge Academy Ltd 215


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
2. Enabling LLDP on Router 2

© 2020 The Knowledge Academy Ltd 216


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
3. Enabling LLDP on Switch 1, and then assign the interface port

© 2020 The Knowledge Academy Ltd 217


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
(Continued)

© 2020 The Knowledge Academy Ltd 218


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
4. Now, we can check the number of neighbors on the Router 1

© 2020 The Knowledge Academy Ltd 219


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
5. Enable LLDP on Switch 2, and assign the interface port. Now, you can check the number
of neighbors through “show lldp neighbors” command

© 2020 The Knowledge Academy Ltd 220


Configure and Verify Layer 2 Discovery
Protocols (Cisco Discovery Protocol and LLDP)
5. You can also check the details of all connected devices using “show lldp neighbors
detail” command on Router 1

© 2020 The Knowledge Academy Ltd 221


2.4 Configure and Verify (Layer 2/Layer 3)
EtherChannel (LACP)
• EtherChannel (AKA port channels) are a configuration option which allows you to logically
bundle multiple physical interfaces to provide additional redundancy and throughput of
links

• LACP is a standard protocol which can be used by network devices to negotiate an


EtherChannel link

© 2020 The Knowledge Academy Ltd 222


Configure and Verify (Layer 2/Layer 3)
EtherChannel (LACP)
(Continued)

• Example of Layer 2 EtherChannel trunk port configuration with LACP

© 2020 The Knowledge Academy Ltd 223


Configure and Verify (Layer 2/Layer 3)
EtherChannel (LACP)
1. Configure LACP on Switch 1

© 2020 The Knowledge Academy Ltd 224


Configure and Verify (Layer 2/Layer 3)
EtherChannel (LACP)
2. Configure LACP on Switch 2

© 2020 The Knowledge Academy Ltd 225


Configure and Verify (Layer 2/Layer 3)
EtherChannel (LACP)
(Continued)

• You can also verify the status of


EtherChannel using “show etherchannel
summary” command

© 2020 The Knowledge Academy Ltd 226


2.5 Rapid PVST+ Spanning Tree Protocol
Need for and Basic Operations and
Identify Basic Operations
Switch 1

• In redundant switching topologies, the Traffic Loop


forwarding of MAC addresses is
susceptible to layer 2 traffic loops and it
can cause storms and takedown networks Switch 2 Switch
Switch33

• Spanning-tree (STP) is a protocol used to


prevent these layer 2 traffic loops HOST A HOST A

© 2020 The Knowledge Academy Ltd 227


Rapid PVST+ Spanning Tree Protocol

Switch 1

With STP

Switch 2 Switch 2

HOST A HOST A

© 2020 The Knowledge Academy Ltd 228


2.5.a Root Port, Root Bridge, and other Port
Names
Root Port

• Every switch elects the port closest to the root bridge as its root port in an STP topology

• This port is always in the forwarding state

Designated Port

Alternate Port

© 2020 The Knowledge Academy Ltd 229


2.5.a Root Port, Root Bridge, and other Port
Names
Root Bridge

• In each STP (Spanning Tree Protocol) topology, one switch is selected as the primary root
bridge. It acts as the central reference point for topology

• All root bridge ports will always be in forwarding state

o Root bridges are chosen based on the lowest priority of bridge

o By default, the switch including the lowest MAC address will gain the root bridge
election

© 2020 The Knowledge Academy Ltd 230


2.5.b Port States (Forwarding/Blocking)
Switchports running Rapid PVST+ operate in the following three different port states:

1. Discarding
2. Learning
The state of a
switchport when it 3. Forwarding
In this state, the
appears in blocking switchport starts to In this final state the
mode first learn MAC switchport finally
addresses starts forward traffic

© 2020 The Knowledge Academy Ltd 231


2.5.c PortFast Benefits
The following are the benefits of PortFast:

• Many network devices cannot work properly while waiting for Rapid PVST+ to reach the
forwarding state

• An example would be an endpoint giving up on DHCP (Dynamic Host Configuration


Protocol) responses while sitting in the discarding or learning port states

• Switchports can go directly into the forwarding state with the PortFast feature and
bypass the first two states (discarding & learning)

• PortFast should only be used on edge ports which do not have other switches
connected, as it bypasses the Rapid PVST+ loop prevention checks

© 2020 The Knowledge Academy Ltd 232


2.6 Compare Cisco Wireless Architectures and
AP modes
• When access points are in the lightweight
mode, there are various options for
forwarding wireless endpoint traffic onto Endpoints wirelessly connects to AP
the network

o Local Mode: Access-points tunnel all AP Tunnels Endpoints Traffic to WLC with
wireless endpoint traffic to a WLC that CAPWAP

then forwards to the wired network. It is


typically used for campus sites WLC forwards Endpoints Traffic onto the
Wired Network

© 2020 The Knowledge Academy Ltd 233


Compare Cisco Wireless Architectures and AP
modes
(Continued)
Endpoints wirelessly connects to AP
o FlexConnect Local Switching Mode: Access
points forward all endpoint wireless traffic
right onto the wire. It is used for remote
WAN sites

AP forwards Endpoints Traffic onto the


Wired Network

© 2020 The Knowledge Academy Ltd 234


2.7 Describe Physical Infrastructure
Connections of WLAN Components
• APs and WLCs need some type of physical connection, to forward wireless traffic onto a
wired network

• WLC Connections

o WLCs would typically have a trunk port, and it is connected to the core switching
devices

o This is because usually several VLANs are used for different SSIDs (Service Set


Identifier)

o A WLC trunk port can be a single link, but best practice is to use a Link Aggregation
(EtherChannel)

© 2020 The Knowledge Academy Ltd 235


Describe Physical Infrastructure Connections
of WLAN Components
The following are the steps of configuring WLC:

Step 1: Create the given topology in the cisco packet tracer, and click on laptop

© 2020 The Knowledge Academy Ltd 236


Describe Physical Infrastructure Connections
of WLAN Components
Step 2: Click on Desktop button form the menu bar, and then click Web Browser

© 2020 The Knowledge Academy Ltd 237


Describe Physical Infrastructure Connections
of WLAN Components
Step 3: Give the following IP address of WLC in the URL bar and click on Go button

© 2020 The Knowledge Academy Ltd 238


Describe Physical Infrastructure Connections
of WLAN Components
Step 4: Create username and password, and then click on Start button

© 2020 The Knowledge Academy Ltd 239


Describe Physical Infrastructure Connections
of WLAN Components
Step 5: Give any System Name according to your requirement, and give the WLC IP address
in the Management IP Address box, Subnet Mask and Default Gateway as given in the
figure. After that click on Next button

© 2020 The Knowledge Academy Ltd 240


Describe Physical Infrastructure Connections
of WLAN Components
Step 6: Give any name to Network Name and create any password according to your need,
and click on Next button

© 2020 The Knowledge Academy Ltd 241


Describe Physical Infrastructure Connections
of WLAN Components
Step 7: Click on Next

© 2020 The Knowledge Academy Ltd 242


Describe Physical Infrastructure Connections
of WLAN Components
Step 8: The previous filled information will appear. Now click on Apply button. After clicking
on Apply button, it will take some time to process but we have to close the web browser by
clicking on the cross button on the upper right corner

© 2020 The Knowledge Academy Ltd 243


Describe Physical Infrastructure Connections
of WLAN Components
Step 9: Now, again open the web browser and type the IP address of WLC as given in the
figure and click on Go button. Note that, in the previous slide we gave the “http://10.10.10.5“
but here we have to give “https://10.10.10.5”

© 2020 The Knowledge Academy Ltd 244


Describe Physical Infrastructure Connections
of WLAN Components
Step 10: Enter the previously created Username and password and click on login button

© 2020 The Knowledge Academy Ltd 245


Describe Physical Infrastructure Connections
of WLAN Components
Step 11: After logging in, the following window will appear

LAG Trunk
Mode(Tagged)

© 2020 The Knowledge Academy Ltd 246


Describe Physical Infrastructure Connections
of WLAN Components
• AP Connections

o Local Mode APs: As local mode APs Local Mode AP


tunnel endpoint data to the WLC access
mode ports should be used in a
dedicated AP management network
Access Mode
(Untagged)

© 2020 The Knowledge Academy Ltd 247


Describe Physical Infrastructure Connections
of WLAN Components
(Continued)

o FlexConnect Mode APs: As flexconnect FlexConnect


mode APs forward endpoint data onto the Mode AP
local wired connection trunk ports should be
used to let multiple wireless data VLANs
Trunk Mode
(Tagged)

© 2020 The Knowledge Academy Ltd 248


Describe Physical Infrastructure Connections
of WLAN Components
Example of Access Points

© 2020 The Knowledge Academy Ltd 249


Describe Physical Infrastructure Connections
of WLAN Components
Configuration of Access Points

© 2020 The Knowledge Academy Ltd 250


Describe Physical Infrastructure Connections
of WLAN Components
(Continued)

© 2020 The Knowledge Academy Ltd 251


2.8 Describe AP and WLC Management
Access Connections
AP Management

• Once Lightweight APs get registered, they are managed by the WLC, and you really
should not need to have direct access to them

WLC Management

• WLCs are primarily managed through HTTPS (Hypertext Transfer Protocol Secure) & SSH
(Secure Shell)

• Local or Tacacs+/Radius AAA (Authentication, Authorisation and Accounting) is supported

© 2020 The Knowledge Academy Ltd 252


Describe AP and WLC Management Access
Connections
(Continued)

TACACS+ or RADIUS Server


Admin manages the WLC with
HTTPS/SSH

WLC manages the AP with CAPWAP

© 2020 The Knowledge Academy Ltd 253


Describe AP and WLC Management Access
Connections
Example of TELNET in Cisco Packet Tracer

© 2020 The Knowledge Academy Ltd 254


Describe AP and WLC Management Access
Connections
Configuration of TELENT

© 2020 The Knowledge Academy Ltd 255


Describe AP and WLC Management Access
Connections
Configuration of SSH

© 2020 The Knowledge Academy Ltd 256


Describe AP and WLC Management Access
Connections
Example of SSH in Cisco Packet Tracer

© 2020 The Knowledge Academy Ltd 257


2.9 Configure the Components of a Wireless
LAN Access for Client Connectivity
WLAN Creation

The following are the steps of creating WLAN:

Step 1: Go to WLANs option and click on Go button to create a WLAN

© 2020 The Knowledge Academy Ltd 258


Configure the Components of a Wireless LAN
Access for Client Connectivity
Step 2: Give an appropriate Profile Name and SSID according to your requirement and then
click on Apply button

© 2020 The Knowledge Academy Ltd 259


Outlines of Domain 3
• Module 1: Interpret the components of routing table

• Module 2: Determine how a router makes a forwarding decision by


default

• Module 3: Configure and verify IPv4 and IPv6 static routing

• Module 4: Configure and verify single area OSPFv2

• Module 5: Describe the purpose of first hop redundancy protocol

© 2020 The Knowledge Academy Ltd 260


3.1 Interpret the Components of Routing
Table
3.1.a Routing Protocol Code

• There are various codes displayed in routing tables that identify how routes are added to
the routing table

© 2020 The Knowledge Academy Ltd 261


Interpret the Components of Routing Table
Example of Static Routing Protocol

“S” is showing the network


of router 2 in the routing
table of the router 1
Here we
provide the
network of
router 2,
manually

© 2020 The Knowledge Academy Ltd 262


Interpret the Components of Routing Table
(Continued)

“S” is showing the network


of router 1 in the routing
Here we table of the router 2
provide the
network of
router 1,
manually

© 2020 The Knowledge Academy Ltd 263


Interpret the Components of Routing Table
Configuration of Gateway of Lost Resort

© 2020 The Knowledge Academy Ltd 264


Interpret the Components of Routing Table
(Continued)

© 2020 The Knowledge Academy Ltd 265


Interpret the Components of Routing Table
3.1.b Prefix

• In the routing table, a prefix is simply a network route

• In the below output 10.0.0.0/8 is a prefix

© 2020 The Knowledge Academy Ltd 266


Interpret the Components of Routing Table
3.1.c Network mask

• A network mask (also known as subnet mask) describes the component of the network
prefix of an IP address used for routing

• The blue highlighted values identify the network mask for the prefix 10.0.0.0/24

o 10.0.0.0/24 or 255.255.255.0
o Network mask 255.255.255.0 in binary
11111111.11111111.11111111.00000000
o 1 in a binary network mask= Part of network portion
o 0 in a binary network mask= Part of host portion

© 2020 The Knowledge Academy Ltd 267


Interpret the Components of Routing Table
3.1.d Next Hop

• When network devices need to route to a destination, a next hop IP address is required to
forward packets in the right direction

• In the output below this layer 3 switch is sending default routed destinations to the next
hop IP address 10.0.0.2

© 2020 The Knowledge Academy Ltd 268


Interpret the Components of Routing Table
3.1.e Administrative Distance

• Network devices rely on the administrative distance (AD) to know which route types are
better than others

• The lower the Administrative Distance, the better the route is

• The pre-assigned default AD values for Each route type are shown in below table
Route Source Default Distance Values
Connected interface 0
Static route 1
Enhanced interior Gateway Routing 5
Protocol (EIGRP) summary route

© 2020 The Knowledge Academy Ltd 269


Interpret the Components of Routing Table
(Continued)

Route Source Default Distance Values


External Border Gateway Protocol 20
Internal EIGRP 90
IGRP 100

OSPF 110

Intermediate System-to- 115


Intermediate System (IS-IS)
Routing Information Protocol 120

Exterior Gateway Protocol 140

© 2020 The Knowledge Academy Ltd 270


Interpret the Components of Routing Table
(Continued)

Route Source Default Distance Values


On Demand Routing (ODR) 160
External EIGRP 170
Internal BGP 200

Unknown 225

© 2020 The Knowledge Academy Ltd 271


Interpret the Components of Routing Table
(Continued)

• You can see the AD value in the routing table. It is the value on the left in the bracket
after the prefix

• In the figure below you can see the AD is “1” for the static route

© 2020 The Knowledge Academy Ltd 272


Interpret the Components of Routing Table
3.1.f Metric

• You can use the metric value as a tie-breaker if the administrative distance value is the
same for two learned routes

• The lower the metric, the better the route is considered

• Routing protocols change advertised route metrics dynamically, based on things like
interface bandwidth

© 2020 The Knowledge Academy Ltd 273


Interpret the Components of Routing Table
3.1.g Gateway of Last Resort

• If there are no specific routes for a particular destination in the routing table the last
resort gateway (Default route) is used

© 2020 The Knowledge Academy Ltd 274


3.2 Determine how a Router makes a
Forwarding Decision by Default
Routing Lookup Order

1. Check for the Longest Prefix Match

2. Lowest Administrative Distance (AD)

3. Lowest Routing Metric

© 2020 The Knowledge Academy Ltd 275


Determine how a Router makes a Forwarding
Decision by Default
3.2.a Longest Match

• When a router looks at the routing table to decide a destination's best path, the first
thing to look for is the most specific match

• It means the route with the most network bit matches for the destination

© 2020 The Knowledge Academy Ltd 276


Determine how a Router makes a Forwarding
Decision by Default
3.2.b Administrative Distance

• If a router has more than one route in the routing table that is the same network mask bit
match, then the AD can be used as a tie-breaker to decide which route should be more
preferred

• In the example two static routes are added to routers configuration with the same network
bit length but the one with the lower AD is installed in the routing table

© 2020 The Knowledge Academy Ltd 277


Determine how a Router makes a Forwarding
Decision by Default

Administrative Distance

© 2020 The Knowledge Academy Ltd 278


Determine how a Router makes a Forwarding
Decision by Default
3.2.c Routing Protocol Metric

• If the length of the prefix matches with the AD then the final tie-breaker is the routing
metric

• In the example the same route is learned from multiple sources via the routing protocol
OSPF (Default AD of 110) with the same prefix length and AD

• In this case the router will rely on the learned OSPF route metric to determine the best path

© 2020 The Knowledge Academy Ltd 279


Determine how a Router makes a Forwarding
Decision by Default

Routing Protocol Metric

© 2020 The Knowledge Academy Ltd 280


3.3 Configure and Verify IPv4 and IPv6 Static
Routing
3.3.a Default Route

• This kind of route is used as a catch all route to send unknown destinations to a particular
device

• You would mostly direct your default route to an internet firewall

© 2020 The Knowledge Academy Ltd 281


Configure and Verify IPv4 and IPv6 Static
Routing
(Continued)

• IPv4 static default route configuration example with next-hop 10.0.255.2

© 2020 The Knowledge Academy Ltd 282


Configure and Verify IPv4 and IPv6 Static
Routing
(Continued)

© 2020 The Knowledge Academy Ltd 283


Configure and Verify IPv4 and IPv6 Static
3.3.b Network Route
Routing
• This kind of route is used to send known network destinations to a specific device

• IPv4 static network route configuration example for network destination 10.0.0.0/24 with
next-hop 10.0.255.2

• IPv6 static network route configuration example for network destination 2001::/64 with
next-hop 2001:255::2

© 2020 The Knowledge Academy Ltd 284


Configure and Verify IPv4 and IPv6 Static
Routing
3.3.c Host Route

• This kind of route is used send


known host destinations to a
specific device

• An example of IPv4 floating static


configuration

Step 1: Draw the following topology in


the Cisco Packet Tracer

© 2020 The Knowledge Academy Ltd 285


Configure and Verify IPv4 and IPv6 Static
Routing
• Command to show configuration of Router 1

© 2020 The Knowledge Academy Ltd 286


Configure and Verify IPv4 and IPv6 Static
Routing
• Command to show configuration of Router 2

© 2020 The Knowledge Academy Ltd 287


Configure and Verify IPv4 and IPv6 Static
Routing
3.3.d Floating Static

• This kind of route is used as a backup route if a primary next-hop device is not available

• After it is configured, it is not installed in the routing table until it is required

• You set the AD to be higher than the primary route and set a different next-hop to make a
route “floating”

© 2020 The Knowledge Academy Ltd 288


Configure and Verify IPv4 and IPv6 Static
Routing
• An example of IPv4 floating static configuration

Step 1: Draw the following topology in the Cisco Packet Tracer

© 2020 The Knowledge Academy Ltd 289


Configure and Verify IPv4 and IPv6 Static
Routing
Step 2: IP configuration of UK Router

Primary Route

Administrative Distance

Secondary Route

© 2020 The Knowledge Academy Ltd 290


Configure and Verify IPv4 and IPv6 Static
Routing
Step 3: IP configuration of USA Router

© 2020 The Knowledge Academy Ltd 291


Configure and Verify IPv4 and IPv6 Static
Routing
Step 4: IP configuration of India Router

© 2020 The Knowledge Academy Ltd 292


3.4 Configure and Verify Single Area OSPFv2
OSPFv2 Overview

• OSPF (Open Shortest Path First) is a link-state protocol that can be used to advertise
routes between routers

• Default Administrative Distance – 110

• Link Local Multicast Address - 224.0.0.5 & 224.0.0.6 (DR/BDR)



• Algorithm - Dijkstra SPF(Shortest Path First)

© 2020 The Knowledge Academy Ltd 293


3.4 Configure and Verify Single Area OSPFv2
(Continued)

• Uses process IDs instead of autonomous system numbers



• Uses AREAs which are routing domains within OSPF

• Default timers - Hello=10 and Dead=40

• Metric value - Cost

© 2020 The Knowledge Academy Ltd 294


3.4 Configure and Verify Single Area OSPFv2
3.4.a Neighbor Adjacencies

• For routers to exchange routes with each other with they must first form a neighbor
adjacency

• The following are the requirements of OSPF Neighbor Adjacency:

4. Same HELLO
1. Common 2. Unique 3. Same AREA 5. Same MTU
and DEAD
Subnet Router-ID ID Value
Timers

© 2020 The Knowledge Academy Ltd 295


3.4 Configure and Verify Single Area OSPFv2

Example of OSPFv2 Configuration for Area 0 between two routers:

Router 2
Router 1

© 2020 The Knowledge Academy Ltd 296


3.4 Configure and Verify Single Area OSPFv2
(Continued)

• Configuration of Router 2

© 2020 The Knowledge Academy Ltd 297


3.4 Configure and Verify Single Area OSPFv2
(Continued)

© 2020 The Knowledge Academy Ltd 298


3.4 Configure and Verify Single Area OSPFv2
(Continued)

Check to see if any OSPF routes are learned from adjacent neighbors

© 2020 The Knowledge Academy Ltd 299


3.4 Configure and Verify Single Area OSPFv2
• Configuration of Router 1

© 2020 The Knowledge Academy Ltd 300


3.4 Configure and Verify Single Area OSPFv2
(Continued)

© 2020 The Knowledge Academy Ltd 301


3.4 Configure and Verify Single Area OSPFv2
3.4.b Point-to-point

• If OSPF uses L2 WAN protocols such as HDLC (High-Level Data Link Control) & PPP (Point-
to-Point Protocol) over point-to-point serial links it runs as a point-to-point network type

• In this mode, DR/BDR (Backup Designated Router) roles are not needed since it is not a
multi-access connection

© 2020 The Knowledge Academy Ltd 302


3.4 Configure and Verify Single Area OSPFv2
Example of OSPFv2 point-to-point interface configuration:

© 2020 The Knowledge Academy Ltd 303


3.4 Configure and Verify Single Area OSPFv2
3.4.c Broadcast (DR/BDR Selection)

• Designated Routers (DR) and Backup Designated Routers (BDR) are used in a multi-access
(Broadcast) OSPF topology to relay routing updates

• DR routers help to scale OSPF topologies so that less information is available for each
router to process

© 2020 The Knowledge Academy Ltd 304


3.4 Configure and Verify Single Area OSPFv2
(Continued)

• In each multi-access OSPF topology 1 DR and 1 BDR are selected OSPF DR/BDR Selection
Process:

1. Highest OSPF interface priority (1 by default)

2. Highest router ID if the interface priority is the same

© 2020 The Knowledge Academy Ltd 305


3.4 Configure and Verify Single Area OSPFv2
Configuration of OSPF

© 2020 The Knowledge Academy Ltd 306


3.4 Configure and Verify Single Area OSPFv2
Configuration of Router A

© 2020 The Knowledge Academy Ltd 307


3.4 Configure and Verify Single Area OSPFv2
Configuration of Router B

© 2020 The Knowledge Academy Ltd 308


3.4 Configure and Verify Single Area OSPFv2
Configuration of Router C

© 2020 The Knowledge Academy Ltd 309


3.4 Configure and Verify Single Area OSPFv2
(Continued)

© 2020 The Knowledge Academy Ltd 310


3.4 Configure and Verify Single Area OSPFv2
Configuration of Router 1

© 2020 The Knowledge Academy Ltd 311


3.4 Configure and Verify Single Area OSPFv2
Configuration of Router 2

© 2020 The Knowledge Academy Ltd 312


3.4 Configure and Verify Single Area OSPFv2
Configuration of Router 3

© 2020 The Knowledge Academy Ltd 313


3.4 Configure and Verify Single Area OSPFv2
3.4.d Router ID

• It should be unique for each and every OSPF router

• It can be any decimal value in the following format – X.X.X.X

• The process of election of Router ID:

o Manually configured router-id

o Highest Loopback IP address

o Highest Interface IP address

© 2020 The Knowledge Academy Ltd 314


3.5 Describe the Purpose of First Hop
Redundancy Protocol
• FHRP (First Hop Redundancy Protocol) protocols such as HSRP (Hot Standby Routing
Protocol) can be used to provide default redundancy to gateways

• With FHRP if multiple core devices are on a network and one goes down, another can
take control, so that clients do not lose access to the network

• As the default gateway, routers participating in an FHRP share a virtual IP address (VIP)

© 2020 The Knowledge Academy Ltd 315


Describe the Purpose of First Hop
Redundancy Protocol
(Continued) HSRP

VIP
1
.2 10.0.0.0/24 .3

10.0.0.100 255.255.255.0
default gateway 10.0.0.1

© 2020 The Knowledge Academy Ltd 316


Describe the Purpose of First Hop
Redundancy Protocol
(Continued) HSRP

VIP
1
.2 10.0.0.0/24 .3 Standby
G
a
t
e
w
a
y

10.0.0.100 255.255.255.0
default gateway 10.0.0.1

© 2020 The Knowledge Academy Ltd 317


Describe the Purpose of First Hop
Redundancy Protocol
(Continued) HSRP

VIP
1
.2 10.0.0.0/24 .3 Active

G
a
t
e
w
a
y
10.0.0.100 255.255.255.0
default gateway 10.0.0.1

© 2020 The Knowledge Academy Ltd 318


Domain 4

IP Services

© 2020 The Knowledge Academy Ltd 319


Outlines of Domain 4
• Module 1: Configure and verify inside source NAT using static and pools

• Module 2: Configure and verify NTP operating in a client and server mode

• Module 3: Explain the role of DHCP and DNS within the network

• Module 4: Explain the function of SNMP in network operations

• Module 5: Describe the use of syslog features including facilities and


levels

© 2020 The Knowledge Academy Ltd 320


Outlines of Domain 4
• Module 6: Configure and verify DHCP client and relay

• Module 7: Explain the forwarding per-hop behaviour (PHB) for QoS such
as classification, marking, queuing, congestion, policing, shaping

• Module 8: Configure network devices for remote access using SSH

• Module 9: Describe the capabilities and function of TFTP/FTP in the


network

© 2020 The Knowledge Academy Ltd 321


4.1 Configure and Verify inside Source NAT
using Static and Pools
• Static NAT (Network Address Translation) is usually used for one-to-one IP mappings for
public-facing services such as web servers

• Configuration example for translating traffic destined to public IP 202.56.215.1 to private


IP 192.168.0.2

© 2020 The Knowledge Academy Ltd 322


Configure and Verify inside Source NAT using
Static and Pools
Configuration of Router 1

© 2020 The Knowledge Academy Ltd 323


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 324


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 325


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 326


Configure and Verify inside Source NAT using
Static and Pools
• Dynamic NAT Pool is usually used for one-to-many IP mappings for outbound internet
access

• Configuration example for translating traffic from the private IP network 10.1.0.0/24 to
public IP NAT pool 97.8.22.21 - 97.8.22.31

© 2020 The Knowledge Academy Ltd 327


Configure and Verify inside Source NAT using
Static and Pools
• Configuration of Router 1

© 2020 The Knowledge Academy Ltd 328


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 329


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 330


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 331


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 332


Configure and Verify inside Source NAT using
Static and Pools
• Configuration of Router 2

© 2020 The Knowledge Academy Ltd 333


Configure and Verify inside Source NAT using
Static and Pools
(Continued)

© 2020 The Knowledge Academy Ltd 334


4.2 Configure and Verify NTP Operating in a
Client and Server Mode
• NTP Client Mode: Network devices can maintain accurate time through using the
network time protocol (NTP)

• NTP Server Mode: A network device can work as an NTP server without any
configurations as long as their time is synced to another NTP server

• NTP Master: A network device can act as a NTP server using its local time information if it
is configured as an NTP master. An NTP master can sync to its local clock and still provide
time to NTP clients

© 2020 The Knowledge Academy Ltd 335


Configure and Verify NTP Operating in a
Client and Server Mode
• Example of NTP master configuration:

© 2020 The Knowledge Academy Ltd 336


Configure and Verify NTP Operating in a
Client and Server Mode
Configuration of Router 1

© 2020 The Knowledge Academy Ltd 337


Configure and Verify NTP Operating in a
Client and Server Mode
Configuration of Router 2

© 2020 The Knowledge Academy Ltd 338


Configure and Verify NTP Operating in a
Client and Server Mode
(Continued)

© 2020 The Knowledge Academy Ltd 339


4.3 Explain the Role of DHCP and DNS within
the Network
• Dynamic Host Control Protocol (DHCP) is used to assign IP addresses to network clients
dynamically

• The following are the components of DHCP

o DHCP Client: It is an endpoint asking for an IP Address

o DHCP Server: It is a host running a DHCP server application with IP address pools for
client assignments

© 2020 The Knowledge Academy Ltd 340


Explain the Role of DHCP and DNS within the
Network
• DHCP Operation
DHCP IP Address Pool
• IP Address-10.0.10.21-10.0.10.254
• Subnet Mask-255.255.255.0
• Default Gateway-10.0.10.1
• DNS Server-8.8.8.8

DHCP assigned IP Address


Discovery
Information DHCP Client
• IP Address-10.0.00.2 Offer
• Subnet Mask-255.255.255.0 Request
• Default Gateway-10.0.10.1 Acknowledgement
DHCP Server
• DNS Server-8.8.8.8

© 2020 The Knowledge Academy Ltd 341


Explain the Role of DHCP and DNS within the
Network
• Domain Name System (DNS) is used to resolve hostnames to IP addresses

• The following are the components of DNS

o DNS Server: It is a host running a DNS server application that manages a database of
hot name to IP address mappings

© 2020 The Knowledge Academy Ltd 342


Explain the Role of DHCP and DNS within the
Network
• DNS Operation

1. Client attempts to go to website www.google.com

2. Client needs an IP Address of the website to connect

3. Client asks a DNS Server that IP address is mapped to www.google.com

4. DNS Server checks locally or asks other servers for mapping

5. DNS Server responds with the IP address of www.google.com

© 2020 The Knowledge Academy Ltd 343


Explain the Role of DHCP and DNS within the
Network
(Continued)

6. Client connects to the website using the IP Address it learned from DNS

What is IP Address of www.google.com

www.ipversity.com = 172.217.3.110
DNS Server

We
b re
que
st to
172
.217
.3.1
10

Web Server

www.google.com
© 2020 The Knowledge Academy Ltd 344
Explain the Role of DHCP and DNS within the
Network
Example of DHCP configuration on Router

© 2020 The Knowledge Academy Ltd 345


Explain the Role of DHCP and DNS within the
Network
Configuration on Router

© 2020 The Knowledge Academy Ltd 346


Explain the Role of DHCP and DNS within the
Network
DHCP Server Configuration

© 2020 The Knowledge Academy Ltd 347


Explain the Role of DHCP and DNS within the
Network
DNS Server Configuration

© 2020 The Knowledge Academy Ltd 348


Explain the Role of DHCP and DNS within the
Network
• For DNS configuration, Go to Server>Services option. After that click on DNS option

© 2020 The Knowledge Academy Ltd 349


4.4 Explain the Function of SNMP in Network
Operations
• Simple Network Management Protocol (SNMP) reads and writes information which is
available on network devices

ntp server pool.ntp.org


SNMP Write

Cisco Prime SNMP Read


Running-config
Hostname r1
!
Interface f0/0
!
Interface f0/1

© 2020 The Knowledge Academy Ltd 350


Explain the Function of SNMP in Network
Operations
• The following are the components of SNMP:

o SNMP Collector: Server running an SNMP collector application with a database for store
information. Examples of SNMP are Cisco Prime and SolarWinds

o Community Strings: Passwords for SNMP communication

© 2020 The Knowledge Academy Ltd 351


Explain the Function of SNMP in Network
Operations
(Continued)

o MIB (Management Information Base): Collection of information on network devices.


Examples of MIB are interfaces, routing tables, and hardware resources

o Traps are sent by network devices to SNMP collectors when certain events take place like
high CPU or interface alarms

© 2020 The Knowledge Academy Ltd 352


4.5 Describe the Use of Syslog features
including Facilities and Levels
• Syslog is a logging service used to view network device events for troubleshooting and
monitoring

access-list block
url-filtering
malware block Database
Ids/ips logs Configuration change
Debug message
Hardware failure
error message Access-list block
configuration change url-filtering
Debug message Syslog Server Malware block
hardware failure Ids/ips logs

error message
configuration change error message
Debug message configuration change
hardware failure Debug message
hardware failure

© 2020 The Knowledge Academy Ltd 353


Describe the Use of Syslog features including
Facilities and Levels
The following are the components of Syslog:

o Syslog Server: It is a server running a Syslog application with a database to store log
information

• Examples of syslog are Cisco Prime, SolarWinds & Splunk

o Facilities: Categories for different Syslog messages

© 2020 The Knowledge Academy Ltd 354


4.6 Configure and Verify DHCP Client and
Relay
• DHCP Relay (AKA DHCP Helper) is a method used by a Layer 3 device to forward DHCP
messages to DHCP servers on behalf of the DHCP client

• An example of DHCP Relay configuration:

© 2020 The Knowledge Academy Ltd 355


Configure and Verify DHCP Client and Relay
• Configuration of Router 1

© 2020 The Knowledge Academy Ltd 356


Configure and Verify DHCP Client and Relay
(Continued)

© 2020 The Knowledge Academy Ltd 357


Configure and Verify DHCP Client and Relay
(Continued)

© 2020 The Knowledge Academy Ltd 358


Configure and Verify DHCP Client and Relay
• Configuration of Router 2

© 2020 The Knowledge Academy Ltd 359


Configure and Verify DHCP Client and Relay
(Continued)

© 2020 The Knowledge Academy Ltd 360


Configure and Verify DHCP Client and Relay
(Continued)

© 2020 The Knowledge Academy Ltd 361


Configure and Verify DHCP Client and Relay
• Configuration of Router 3

© 2020 The Knowledge Academy Ltd 362


Configure and Verify DHCP Client and Relay
(Continued)

© 2020 The Knowledge Academy Ltd 363


Configure and Verify DHCP Client and Relay
(Continued)

© 2020 The Knowledge Academy Ltd 364


4.7 Explain the Forwarding Per-Hop
Behaviour (PHB)
• Quality of Service (QoS) is used to apply controls to network traffic like preferential
forwarding treatment, bandwidth consumption, and rate-limiting

• Classification is a method used to identify traffic types so that the network devices can
apply proper QoS

o NBAR (Network Based Application Recognition)


o ACL (Access-Control List)

• Marking is a method used to set QoS values that can be used to apply proper QoS

© 2020 The Knowledge Academy Ltd 365


Explain the Forwarding Per-Hop Behaviour
(PHB)
The following are the types of markings:

• DSCP
o Decimal values 0-63
o CS 0-7
o Assured Forwarding

AF11 AF12 AF13

AF21 AF22 AF23


Layer 3
AF31 AF32 AF33 IP Packet
AF41 AF42 AF43

Best EF Voice

Worst Default

© 2020 The Knowledge Academy Ltd 366


Explain the Forwarding Per-Hop Behaviour
(PHB)
• COS

Best
Layer 2
COS0 COS1 COS2 COS3 COS4 COS5 COS6 DOT1Q Tag
Worst

© 2020 The Knowledge Academy Ltd 367


Explain the Forwarding Per-Hop Behaviour
(PHB)
• Queuing is a method used to prioritise when different traffic types are forwarded out of
an interface

o When traffic requires to forward out of a router or switch port is added to a traffic
queue

o Such queues can be thought of as a way to buffer packets until they are transmitted
out of an interface

Queue 1
Interface Queue 2
Queue 3

© 2020 The Knowledge Academy Ltd 368


Explain the Forwarding Per-Hop Behaviour
(PHB)
• Congestion: It occurs when a network device interface runs out of queue depth (buffer)
because of high bandwidth utilisation

o If an interface is overloaded with congestion, network devices will tail drop traffic

o QoS policies can be used to prioritise which traffic is dropped first to improve
performance for critical applications like voice and video

© 2020 The Knowledge Academy Ltd 369


Explain the Forwarding Per-Hop Behaviour
(PHB)
• Policing: It is a method used to limit how much bandwidth can be used on an interface by
dropping traffic which exceeds QoS policy

o Usually used to prevent low-priority traffic from using all the bandwidth

Police guest internet speeds to 20Mbps

100Mbps > 20Mbps Internet

© 2020 The Knowledge Academy Ltd 370


Explain the Forwarding Per-Hop Behaviour
(PHB)
• Shaping: It is a technique used to limit how much bandwidth can be used on an interface
through buffering traffic that exceeds QoS policy

o Usually used to smooth traffic speeds to match provider circuit speeds so traffic like a
voice is buffered rather than dropped

Shape voice speeds to 20Mbps

100Mbps > 20Mbps MPLS

© 2020 The Knowledge Academy Ltd 371


4.8 Configure Network Devices for Remote
Access using SSH
• Unlike Telnet, SSH is a secure way to connect and manage network devices remotely

• Example of configuration

© 2020 The Knowledge Academy Ltd 372


4.8 Configure Network Devices for Remote
Access using SSH
Example of SSH in Cisco Packet Tracer

© 2020 The Knowledge Academy Ltd 373


4.9 Describe the Capabilities and Function of
TFTP/FTP in the Network
• TFTP (Trivial File Transfer Protocol) & FTP (File Transfer Protocol) are both protocols which
can be used to transfer data over a network using a client/server model

• Software upgrades and configuration backups are common uses for using TFTP/FTP in
networking

FTP
Server FTP TRANSFER
FTP Client

© 2020 The Knowledge Academy Ltd 374


Describe the Capabilities and Function of
TFTP/FTP in the Network
• TFTP – UDP port 69
o No authentication
o Unreliable
o Only supports small file transfers

• FTP – TCP ports 20 & 21


o Authentication supported
o Reliable
o Supports large file transfers

© 2020 The Knowledge Academy Ltd 375


Domain 5

Security Fundamentals

© 2020 The Knowledge Academy Ltd 376


Outlines of Domain 5
• Module 1: Define key security concepts

• Module 2: Describe security program elements

• Module 3: Configure device access control using local passwords

• Module 4: Describe security password policies elements, such as


management, complexity, and password alternatives

• Module 5: Describe remote access and site-to-site VPNs

© 2020 The Knowledge Academy Ltd 377


Outlines of Domain 5
• Module 6: Configure and verify access control lists

• Module 7: Configure Layer 2 security features

• Module 8: Differentiate authentication, authorisation, and


accounting concepts

• Module 9: Describe wireless security protocols

• Module 10: Configure WLAN using WPA2 PSK using the GUI

© 2020 The Knowledge Academy Ltd 378


5.1 Key Security Concepts
Threats

• We define threat as something which has a negative effect or an undesired event

• Threat means a new or a newly discovered happening that has the ability to harm a
particular system or even to the whole organisation

• A threat is demonstrated as an intention to harm an asset or make it to become


unavailable

© 2020 The Knowledge Academy Ltd 379


Key Security Concepts
Vulnerability

• A vulnerability can be a flaw in a system, or in some software in a system, which can


provide a way to an attacker to bypass the security infrastructure of the host OS or of
the software itself

• It is not an open door instead a weakness which if attacked could provide a way in

• Exploiting is the action of trying to turn a vulnerability (a weakness) into an actual way
to breach a system

© 2020 The Knowledge Academy Ltd 380


Key Security Concepts
Exploit

• It refers to the unintended application performing interface that can be documented as


well as non-documented

• Exploits are not easy to spot as they can take place behind firewalls

• If they are not detected they can even cause irretrievable damage

• It is another name for vulnerability which is a flaw in a software code

© 2020 The Knowledge Academy Ltd 381


Key Security Concepts
Mitigation Techniques

• A mitigation technique is a method to counteract or prevent malicious activity or


threats

Some examples of mitigation techniques are:

o Antimalware

o Firewall

o Software Patches

© 2020 The Knowledge Academy Ltd 382


5.2 Security Program Elements
User Awareness

• Awareness regarding requirement for data confidentiality in order to protect corporate info and
also their own credentials and personal information should be spread among all users

• Users should also be made aware about potential threats, schemes to mislead and appropriate
procedures to report security incidents

• They should also be instructed to follow strict guidelines related to data loss

• As an example, users should not include sensitive information in emails or attachments should
not keep or transmit such information from a smartphone, or store it on cloud services or
removable storage drives

© 2020 The Knowledge Academy Ltd 383


Security Program Elements
User Training

• All users should take part in periodic formal training so that they become aware with all
corporate security policies

• The organisation should develop as well as publish formal security policies for its users,
employees and business partners to follow

© 2020 The Knowledge Academy Ltd 384


Security Program Elements
Physical Access Control

• Infrastructure locations such as data centres and network closets should be locked
securely

• A scalable solution to sensitive locations is badge access that offers an audit trail of
identities and timestamps when access is granted

• Access can be controlled by administrators on a granular basis and when an employee


is dismissed, access is quickly removed

© 2020 The Knowledge Academy Ltd 385


5.3 Configure Device Access Control using
Local Passwords
Example of configuration Local user account

© 2020 The Knowledge Academy Ltd 386


5.4 Security Password Policies Elements
To secure network resources user passwords should follow best practices standards:

Complexity

• Use special characters such as #$!@%&*

• Length should be minimum of 6 characters

• Change passwords regularly

Management

• To store passwords securely, password managers can be used

© 2020 The Knowledge Academy Ltd 387


Security Password Policies Elements
Password Alternatives

• A single factor that a user must enter to be authenticated is a simple password string

• As a password should not be written anywhere and remembered, it can be thought of


as “something you know” and nobody else knows it; otherwise they can use it to
imitate you while authenticating

• Enterprises should consider using alternative techniques to bring more complexity as


well as security

© 2020 The Knowledge Academy Ltd 388


Security Password Policies Elements
i. Multifactor Authentication

• Multifactor credentials need that users provide values/factors coming from different
sources, thereby reducing the chance that an attacker might possess all of the factors

• Two- factor credentials are described as “something you have” i.e. a text message with
a time-limited code or a dynamic changing cryptographic key and “something you
know” i.e. a password

© 2020 The Knowledge Academy Ltd 389


Security Password Policies Elements
ii. Digital Certificate

• A digital certificate is a trusted form of identification, follows a standardised format and


contains encrypted information

• If an organisation supports use of digital certificate, then a user must request and be
granted a unique certificate to use for a particular purpose

• Digital certificates are time sensitive i.e. each one is approved for a specific time range

• After the certificate expiration, any attempts to authenticate with it will be rejected
and the user who has the certificate can request a new one prior to the expiration date
or at any time afterward

© 2020 The Knowledge Academy Ltd 390


Security Password Policies Elements
iii. Biometrics

• Biometric credentials provides a factor that represents “something you are”

• Generally, physical attributes are unique to a body structure of an individual and cannot
be easily duplicated or stolen

• As an example, fingerprints of a user can be scanned and used as an authentication


factor

• Other examples can be voice recognition, face recognition, iris recognition etc.

© 2020 The Knowledge Academy Ltd 391


5.5 Remote Access and Site-to-Site VPNs
• VPN (Virtual Private Network) allows users to send and receive data across shared or
public networks as if their computing devices were connected to the network directly

Trusted Trusted
Encrypted Data VPN Tunnel Encrypted Data

Untrusted

© 2020 The Knowledge Academy Ltd 392


5.5 Remote Access and Site-to-Site VPNs
• Site-to-Site VPN – A tunnel between multiple VPN gateways such as firewalls and
routers

Gateway Gateway
LAN LAN
VPN Tunnel

© 2020 The Knowledge Academy Ltd 393


5.5 Remote Access and Site-to-Site VPNs
• Remote VPN – A tunnel between mobile user device (Laptop, phone, etc.) and remote
VPN gateway such as a firewall

LAN Gateway
LAN
VPN Tunnel

© 2020 The Knowledge Academy Ltd 394


5.6 Configure and Verify Access Control Lists
• Access Control Lists (ACLs): It a method to use security filtering on network devices

• It can be implemented in the inbound or outbound directions on switch/router


interfaces

• There are two types of ACLs:

1. Standard: Standard ACLs match source IP information only

2. Extended: Extended ACLs can match source/destination IP and port information plus
much more

© 2020 The Knowledge Academy Ltd 395


5.6 Configure and Verify Access Control Lists
(Continued)

• There are two ways to configure ACLs:

1. Numbered: Standard numbered ACLs can be configured in the range 1–99 and 1300–
1999

2. Named: Extended numbered ACLs can be configured in the range 100–199 and 2000–
2699

© 2020 The Knowledge Academy Ltd 396


5.6 Configure and Verify Access Control Lists
• Example of Extended named ACL configuration:

© 2020 The Knowledge Academy Ltd 397


5.6 Configure and Verify Access Control Lists
Configuration of Ports on Router 1

© 2020 The Knowledge Academy Ltd 398


5.6 Configure and Verify Access Control Lists
Configuration of Ports on Router 2

© 2020 The Knowledge Academy Ltd 399


5.6 Configure and Verify Access Control Lists
Configuration of Router 2 for block whole network

© 2020 The Knowledge Academy Ltd 400


5.7 Configure Layer 2 Security Features
DHCP Snooping

• A switch feature that will only allow DHCP server response packets on interfaces that
are defined as “trusted”

• By default, interfaces are untrusted

© 2020 The Knowledge Academy Ltd 401


5.7 Configure Layer 2 Security Features
• Example of DHCP snooping configuration:

© 2020 The Knowledge Academy Ltd 402


5.7 Configure Layer 2 Security Features
• Configuration of trusted Router:

© 2020 The Knowledge Academy Ltd 403


5.7 Configure Layer 2 Security Features
• Configuration of Switch

© 2020 The Knowledge Academy Ltd 404


5.7 Configure Layer 2 Security Features
• Configuration of Switch

© 2020 The Knowledge Academy Ltd 405


5.7 Configure Layer 2 Security Features
• Configuration of untrusted Router

© 2020 The Knowledge Academy Ltd 406


5.7 Configure Layer 2 Security Features
Dynamic ARP Inspection

• Trusted ARP replies that will only be permitted by switch features are learned from
DHCP responses either “trusted” interfaces. By default,  interfaces are untrusted.

Port Security

• Switch feature that can (1) Limit how many MAC addresses are learned on a single
interface and (2) Limit which MAC addresses are learned

© 2020 The Knowledge Academy Ltd 407


5.7 Configure Layer 2 Security Features
Example of Port Security

Switch 1

© 2020 The Knowledge Academy Ltd 408


5.7 Configure Layer 2 Security Features
Configuration of Switch 1

© 2020 The Knowledge Academy Ltd 409


5.7 Configure Layer 2 Security Features
Configuration of Switch 1

© 2020 The Knowledge Academy Ltd 410


5.7 Configure Layer 2 Security Features
Configuration of Switch 1

© 2020 The Knowledge Academy Ltd 411


5.8 Differentiate Authentication,
Authorisation, and Accounting Concepts
• User activity can be managed with AAA (authentication, authorisation, and accounting)
mechanisms

• Before authorising or allowing access to any user, AAA uses standardised methods to
challenge them for their credentials

• AAA is generally used to control and monitor access to various network devices such as
switches, routers, firewalls etc.

© 2020 The Knowledge Academy Ltd 412


Differentiate Authentication, Authorisation,
and Accounting Concepts
1. Authentication

• Credentials for users that request network access are validated (Who is the user?)

Username: Jack
Password: *****

Authentication
Switch 1

Authentication
Jack is a valid user Username: Jack
and has been Password: *****
authenticated

User
Accounts

© 2020 The Knowledge Academy Ltd 413


Differentiate Authentication, Authorisation,
and Accounting Concepts
2. Authorisation

• Access restrictions for authenticated users (What is the user allowed to do?)

SSH Terminal Access


Switch 1

Authorised
Jack is
authorised for
privilege level
15

User
Accounts
© 2020 The Knowledge Academy Ltd 414
Differentiate Authentication, Authorisation,
and Accounting Concepts
3. Accounting

• Event history containing activity for authenticated/authorised users (What did the user
do?)

Log Off
Switch 1

Accounting
User Accounts

© 2020 The Knowledge Academy Ltd 415


5.9 Wireless Security Protocols
• WPA (Wireless Protected Access) methods are used to secure wireless networking

The following are three different types of WPA security protocols:

WPA

i. Make use of Temporal Key Integrity Protocol (TKIP)

ii. Significant enhancement of WEP (Wired Equivalent Privacy)

WPA2

• Make use of Advanced Encryption Standards (AES)

© 2020 The Knowledge Academy Ltd 416


Wireless Security Protocols
(Continued)

• More secure as compared to WPA but still has several vulnerabilities

WPA3

• Next generation of Wi-Fi security

• More secure

• Supports an easy way to onboard devices securely with QR code scanning

© 2020 The Knowledge Academy Ltd 417


5.10 Configure WLAN using WPA2 PSK using
the GUI
• WPA2 PSK SSIDs also called as WPA2 personal is an easy way to secure a wireless
network

• Example of WPA2 PSK configuration:

© 2020 The Knowledge Academy Ltd 418


5.10 Configure WLAN using WPA2 PSK using
the GUI
1. We have already created two WLANs as shown in the figure. So if you want to create a
new WLAN then click on Go Button

© 2020 The Knowledge Academy Ltd 419


5.10 Configure WLAN using WPA2 PSK using
the GUI
2. In this example, we are creating WLAN named as “Campus”. Give the profile name and
SSID and then click on Apply Button

© 2020 The Knowledge Academy Ltd 420


5.10 Configure WLAN using WPA2 PSK using
the GUI
3. Click on Enabled check box of status

© 2020 The Knowledge Academy Ltd 421


5.10 Configure WLAN using WPA2 PSK using
the GUI
4. Give WPA+WPA2 security in Layer 2 Security and enable the WPA2 and WPA2
Encryption and PSK and give the password according to your requirement

© 2020 The Knowledge Academy Ltd 422


5.10 Configure WLAN using WPA2 PSK using
the GUI
5. Go to AP Groups

© 2020 The Knowledge Academy Ltd 423


5.10 Configure WLAN using WPA2 PSK using
the GUI
6. After giving the AP Group Name and Description click on Add button. Then click on
WLANs option for check WLAN creation

© 2020 The Knowledge Academy Ltd 424


5.10 Configure WLAN using WPA2 PSK using
the GUI
7. Now assign a access point to a created WLAN and click on Student

© 2020 The Knowledge Academy Ltd 425


5.10 Configure WLAN using WPA2 PSK using
the GUI
8. After clicking on Student WLAN the following figure will be appeared

© 2020 The Knowledge Academy Ltd 426


5.10 Configure WLAN using WPA2 PSK using
the GUI
9. Here we have assigned an Access Points to Student WLAN

© 2020 The Knowledge Academy Ltd 427


5.10 Configure WLAN using WPA2 PSK using
the GUI
10. Go to topology and click on SMARTPHONE0 and go to config>wireless0. Give Access
point name “Student” in the SSID Tab and enable the WPA2-PSK PSK Pass Phrase,
and give password. After that enable DHCP

© 2020 The Knowledge Academy Ltd 428


5.10 Configure WLAN using WPA2 PSK using
the GUI
11. Go to topology and click on SMARTPHONE1 and go to config>wireless0. Give Access
point name “Professor” in the SSID Tab and enable the WPA2-PSK PSK Pass Phrase,
and give password. After that enable DHCP. Now you can see in the topology that
both smartphones are connected with different WLAN

© 2020 The Knowledge Academy Ltd 429


Domain 6

Automation and Programmability

© 2020 The Knowledge Academy Ltd 430


Outlines of Domain 6
• Module 1: Explain how automation impacts network management

• Module 2: Compare traditional networks with controller-based


networking

• Module 3: Describe controller-based and software defined


architectures

• Module 4: Compare traditional campus device management with


Cisco DNA Center enabled device management

© 2020 The Knowledge Academy Ltd 431


Outlines of Domain 6
• Module 5: Describe characteristics of REST-based APIs

• Module 6: Recognise the capabilities of configuration management


mechanisms Puppet, Chef, and Ansible

• Module 7: Interpret JSON encoded data

© 2020 The Knowledge Academy Ltd 432


6.1 How Automation Impacts Network
Management
• Networks are growing constantly and becoming more complex in order to keep pace
with the business needs

• Because of this, networks are harder to manage and there is more room for human
error

• Those problems can be fixed with automation as it introduces efficiency and


consistency

• If done manually, the tasks that would take hours can be completed in seconds with
programming

© 2020 The Knowledge Academy Ltd 433


6.2 Compare Traditional Networks with
Controller-based Networking
• Controller based networks provide a single pane of glass for network administrators

• Instead of individually managing network devices they can simply login to the
controller for provisioning and troubleshooting

IT Admin IT Admin

Controller DNAC

Traditional Network
Controller Based Network

© 2020 The Knowledge Academy Ltd 434


6.3 Controller-based and Software Defined

Architectures
All Cisco software defined solutions share the same three concepts: underlay, overlay,
and fabric

Underlay

• A network transport that provides IP connectivity required for overlay networking

Examples are:

i. MPLS

ii. Internet

© 2020 The Knowledge Academy Ltd 435


Controller-based and Software Defined
Architectures
(Continued)

Overlay

• These are advanced protocols that run over top of an underlay

Examples are:

i. GRE

ii. IPSec

iii. CAPWAP

© 2020 The Knowledge Academy Ltd 436


Controller-based and Software Defined
Architectures

VPN Tunnel
(Overlay)

Home

Internet
(Underlay)

© 2020 The Knowledge Academy Ltd 437


Controller-based and Software Defined
Architectures
(Continued)

Fabric

• Software-defined networks are sometimes referred to as fabrics

Examples are:

i. SDA

ii. ACI

© 2020 The Knowledge Academy Ltd 438


6.3 a Separation of Control Plane and Data
Plane
• One of the major differentiators of legacy networking and SDN is the separation of the
control plane and data place

• It signifies to offload the processing of information from network device like routing
computations

• The notion behind is that if control plane processing can be centralised, then network
devices can use more resources for data place forwarding

CPU { Control Plane EIGRP


ARP
Data Plane
CAM { PACKETS

© 2020 The Knowledge Academy Ltd 439


6.3 b North-bound and South-bound APIs
Application Programmable Interface (API)

• It is a method that is used to exchange information between two software programs i.e.
machine to machine

Data Request via API

Information via API

• North-bound APIs – Used between SDN controllers and applications

• South-bound APIs – Used between SDN controllers and network devices

© 2020 The Knowledge Academy Ltd 440


North-bound and South-bound APIs
APP APP APP

Northbound API

SDN Controller

Southbound API

Network Devices Network Devices

© 2020 The Knowledge Academy Ltd 441


6.4 Traditional Device Management Vs. Cisco
DNA Center Enabled Device Management
Traditional Device Management

• In traditional campus device management, each device is managed independently

IT Admin

Traditional Network Management

© 2020 The Knowledge Academy Ltd 442


Traditional Device Management Vs. Cisco DNA
Center Enabled Device Management
DNAC Device Management

• Devices are centrally monitored and managed from a single pane of glass (DNAC)

IT Admin

Controller DNAC

DNAC Management

© 2020 The Knowledge Academy Ltd 443


6.5 Characteristics of REST-based APIs
• REST stands for Representational State Transfer

• REST-based APIs follow a set of basic rules regarding what makes a REST API and what
does not

• REST APIs include six attributes:

a) Client/ server architecture

b) Stateless operation

c) Clear statement of cacheable/ uncacheable

© 2020 The Knowledge Academy Ltd 444


Characteristics of REST-based APIs
(Continued)

d) Uniform interface

e) Layered

f) Code-on-demand

• The working of REST API depends upon first three attributes mainly

© 2020 The Knowledge Academy Ltd 445


Characteristics of REST-based APIs
REST APIs and HTTP

• APIs allow two programs to exchange data between them

• A few APIs are designed as an interface between programs running on the same
computer, because of this the communication between programs happens within a
single OS

• Several APIs must be available to programs that run on other computers, hence the API must
define the type of networking protocols supported by the API

• Numerous REST-based APIs use the HTTP protocol

© 2020 The Knowledge Academy Ltd 446


Characteristics of REST-based APIs
(Continued)

• The creators of REST-based APIs choose HTTP for the reason that the logic of HTTP
matches with some concepts defined more generally for REST APIs

• HTTP uses the same principles as REST. For example, it operates with a client/ server
model; it uses a stateless operational model; and it includes headers that clearly mark
objects as cacheable or not cacheable

• HTTP also includes verbs; the words that dictate the anticipated action for a pair HTTP
Request and Reply that matches how applications like to work.

© 2020 The Knowledge Academy Ltd 447


Characteristics of REST-based APIs
Software CRUD Actions and HTTP Verbs

• The acronym CRUD is used by software industry for the four primary actions performed
by any application:

1) Create

• Permits the client to create a few new instances of variables and data structures at the
server and initialisation of their values as kept at the server

© 2020 The Knowledge Academy Ltd 448


Characteristics of REST-based APIs
(Continued)

2) Read

• Permits the client to read (retrieve) the current values of variables that exist at the
server and store a copy of the variables, values, and structures at the client

3) Update

• Permits the client to update (change) the value of variables that exist at the server

4) Delete

Permits the client to delete from the server different instances of data variables

© 2020 The Knowledge Academy Ltd 449


Characteristics of REST-based APIs
• An example of CRUD actions include: checking a status of new configuration i.e. a read
action, an update to modify some particular setting in new configuration i.e. an update
action or an action to remove the security policy definition completely i.e. a delete
action

• HTTP make use of verbs that mirror CRUD actions

• It defines an HTTP request and reply concept, with the client sending a request and
with the server answering back with a reply

• Every request or reply lists an action verb in the HTTP request header that defines the
HTTP action

© 2020 The Knowledge Academy Ltd 450


Characteristics of REST-based APIs
• The HTTP messages also include a URI that identifies the resource being manipulated
for this request

• The HTTP message is carried in IP and TCP, with headers and data, as represented

HTTP

IP TCP Request Header Other Headers Data

Verb URI Some API


Parameters

HTTP Verb and URI in an HTTP Request Header

© 2020 The Knowledge Academy Ltd 451


Characteristics of REST-based APIs
(Continued)

• When we open a web browser and click a link, the browser generates an HTTP GET
request message

• This message includes an HTTP header with the GET verb and the URI

• The resources that are returned in the reply are the components of a web page, such as
text files, image files, and video files

• HTTP works well with REST as HTTP has verbs that match the common program actions
in the CRUD paradigm

© 2020 The Knowledge Academy Ltd 452


Characteristics of REST-based APIs
Action CRUD Term REST (HTTP) Verb
Create new data structures and Create POST
variables
Read (Retrieve) variable Read GET
names, values and structures
Update or replace the values of Update PUT
some variables
Delete Some variables and Delete DELETE
data structures

Comparison of CRUD Actions to REST Verbs

© 2020 The Knowledge Academy Ltd 453


Characteristics of REST-based APIs
HTTP Request
GET/Networks
Send me a list of networks

List of Networks

HTTP Response
HTTP 200 OK
{ JSON Data}

• Postman is a great App that can be used for sending API calls

© 2020 The Knowledge Academy Ltd 454


6.6 Recognise the Capabilities of Configuration
Management Mechanisms
• Puppet, Chef, and Ansible are software packages

• Most people use these names to the companies as well as their primary configuration
management products

• All of these emerged as part of the transition from hardware-based servers to


virtualised servers that greatly increased the number of servers and created the need
for software automation to create, configure, and remove VMs

© 2020 The Knowledge Academy Ltd 455


Recognise the Capabilities of Configuration
Management Mechanisms
Puppet

• To use Puppet, begin by installing it on a Linux host

• It can be installed on own Linux Host, but for production purposes, it will be normally
installed on a Linux server known as Puppet master

• Puppet uses various important text files with different components such as

o Manifest - A human readable text file on the puppet master

© 2020 The Knowledge Academy Ltd 456


Recognise the Capabilities of Configuration
Management Mechanisms
(Continued)

o Resource, Class, Module – Components of the manifest, with the largest modules
being composed of smaller classes

o Templates – These files permit Puppet use a puppet domain-specific language to


generate manifests by substituting variables into the template

• Puppet usually uses an agent-based architecture for network device support

© 2020 The Knowledge Academy Ltd 457


Recognise the Capabilities of Configuration
Management Mechanisms
Chef

• Chef also exists as software package that is installed and run

• Chef offers various products such as Chef Automate which is generally referred to as
Chef by most people

• With Puppet, in production Chef is probably run as a server with multiple Chef
workstations used by the engineering staff to build Chef files that are stored on the
Chef server

© 2020 The Knowledge Academy Ltd 458


Recognise the Capabilities of Configuration
Management Mechanisms
(Continued)

• Once Chef is installed, various text files can be created with different components such as

o Resource - These are configuration objects whose state is managed by Chef

o Recipe - The Chef logic that is applied to resources to find out when, how, and whether to
act against the resources that are analogous to a recipe in a cookbook

o Cookbooks - A set of recipes related to same types of work, grouped collectively for
easier management and sharing

© 2020 The Knowledge Academy Ltd 459


Recognise the Capabilities of Configuration
Management Mechanisms
(Continued)

o Runlist - An ordered list of recipes that should be run against a given device

• Chef make use of an architecture that is similar to Puppet

• Every managed device known as a Chef node or Chef client runs an agent for network
devices

© 2020 The Knowledge Academy Ltd 460


Recognise the Capabilities of Configuration
Management Mechanisms
Ansible

• Ansible needs to be installed on some computer such as Linux, Mac, a Linux VM or a


Windows host to use it

• Once installed, several text files are created such as

o Playbooks

• These files provide logic and actions about what Ansible should perform

© 2020 The Knowledge Academy Ltd 461


Recognise the Capabilities of Configuration
Management Mechanisms
(Continued)

o Inventory – These files provide device with info about every device such as device roles
that is why Ansible can perform functions for subsets of the inventory

o Templates - They represent a device’s configuration but with variables using Jinja2
language

o Variables - A file can list variables that Ansible will substitute into templates using YAML

© 2020 The Knowledge Academy Ltd 462


Recognise the Capabilities of Configuration
Management Mechanisms
Comparing Puppet, Chef, and Ansible

Action Ansible Puppet Chef


Term for the file that Playbook Manifest Recipe
lists actions Runlist
Protocol to network SSH, NETCONF HTTP (REST) HTTP (REST)
device
Uses agent or agentless Agentless Agent_* Agent
model
Push or pull model Push Pull Pull

© 2020 The Knowledge Academy Ltd 463


6.7 Interpret JSON Encoded data
• JavaScript Object Notation tries to strike a balance between human and machine
readability

• Along with a few JSON rules, most humans can read JSON data, move past just guessing
at what it means, and confidently interpreting the data structures defined by the JSON
data

• At the same time, JSON data makes it easy for programs to convert JSON text into
variables, making it very useful for data exchange between applications using APIs

© 2020 The Knowledge Academy Ltd 464


Interpret JSON Encoded data
Interpreting JSON Key: Value Pairs

The following are key rules about key:value pairs in JSON, which can be thought of as
individual variable names and their values:

o Key: Value Pair: Every colon recognises one key:value pair, with the key before the
colon and the value after the colon

o Key: Text, inside double quotes, before the colon is used as the name that references a
value

© 2020 The Knowledge Academy Ltd 465


Interpret JSON Encoded data
(Continued)

o Value: The item after the colon that represents the value of the key that can be

– Text: Listed in double quotes

– Numeric: Listed without quotes

– Array: A special Value

– Object: A special Value

o Multiple Pairs: When listing multiple key:value pairs, separate the pairs with a comma
at the end of each pair (except the last pair)

© 2020 The Knowledge Academy Ltd 466


Interpret JSON Encoded data
Interpreting JSON Objects and Arrays

• JSON uses JSON objects and JSON arrays to communicate data structures beyond a
key:value pair with a simple value

• Objects can be flexible to some extent, but in most uses, they act like a dictionary

• Arrays list a series of values

• There are a set of rules about interpreting the syntax of JSON objects and arrays

© 2020 The Knowledge Academy Ltd 467


Interpret JSON Encoded data
The rules are:

o { } - Object: A series of key:value pairs enclosed in a matched pair of curly brackets,


with an opening left curly bracket and its matching right curly bracket

o [ ] - Array: A series of values that are not key:value pairs enclosed in a matched pair of
square brackets, with an opening left square bracket and its matching right square
bracket

o Key:value pairs inside objects: All key:value pairs inside an object conform to the
earlier rules for key:value pairs

o Values inside arrays: All values conform to the previous rules for formatting values

© 2020 The Knowledge Academy Ltd 468


Congratulations

Congratulations on completing this course!


Keep in touch
info@theknowledgeacademy.com
Thank you

© 2020 The Knowledge Academy Ltd 469

You might also like