Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

Prévia do material em texto

CCNA
Cisco Certified Network Associate
Exam (200-301)
Technology Workbook
www.ipspecialist.net
Document Control
Proposal Name : CCNA (200-301)
Document Version : Version 1
Document Release Date : 10th-March-2020
Reference : 200-301
http://www.ipspecialist.net
Copyright © 2018 IPSpecialist LTD.
Registered in England and Wales
Company Registration No: 10883539
Registration Office at: Office 32, 19-21 Crawford Street, London W1H 1PJ,
United Kingdom
www.ipspecialist.net
All rights reserved. No part of this book may be reproduced or transmitted in
any form or by any means, electronic or mechanical, including photocopying,
recording, or by any information storage and retrieval system, without the
written permission from IPSpecialist LTD, except for the inclusion of brief
quotations in a review.
Feedback:
If you have any comments regarding the quality of this book, or otherwise
alter it to better suit your needs, you can contact us through email at
info@ipspecialist.net
Please make sure to include the book’s title and ISBN in your message.
http://www.ipspecialist.net
mailto:info@ipspecialist.net
About IPSpecialist
IPSPECIALIST LTD. IS COMMITTED TO EXCELLENCE AND
DEDICATED TO YOUR SUCCESS.
Our philosophy is to treat our customers like family. We want you to
succeed, and we are willing to do everything possible to help you make it
happen. We have the proof to back up our claims. We strive to accelerate
billions of careers with great courses, accessibility, and affordability. We
believe that continuous learning and knowledge evolution are the most
important things to keep re-skilling and up-skilling the world.
Planning and creating a specific goal is where IPSpecialist helps. We can
create a career track that suits your visions as well as develop the
competencies you need to become a professional Network Engineer. We can
also assist you with the execution and evaluation of your proficiency level,
based on the career track you choose, as they are customized to fit your
specific goals.
We help you STAND OUT from the crowd through our detailed IP training
content packages.
Course Features:
❖ Self-Paced Learning
Learn at your own pace and in your own time
❖ Covers Complete Exam Blueprint
Prep-up for the exam with confidence
❖ Case Study Based Learning
Relate the content with real-life scenarios 
❖ Subscriptions that Suits You
Get more and pay less with IPS subscriptions
❖ Career Advisory Services
https://ipspecialist.net/
Let the industry experts plan your career journey
❖ Virtual Labs to Test Your Skills
With IPS vRacks, you can evaluate your exam preparations
❖ Practice Questions
Practice questions to measure your preparation standards
❖ On Request Digital Certification
On request digital certification from IPSpecialist LTD.
About the Authors:
This book has been compiled with the help of multiple professional
engineers. These engineers specialize in different fields e.g., Networking,
Security, Cloud, Big Data, IoT, etc. Each engineer develops content in his/her
own specialized field that is compiled to form a comprehensive certification
guide.
About the Technical Reviewers:
Nouman Ahmed Khan
AWS-Architect, CCDE, CCIEX5 (R&S, SP, Security, DC, Wireless), CISSP,
CISA, CISM, Nouman Ahmed Khan is a Solution Architect working with a
major telecommunication provider in Qatar. He works with enterprises,
mega-projects, and service providers to help them select the best-fit
technology solutions. He also works as a consultant to understand customer
business processes and helps select an appropriate technology strategy to
support business goals. He has more than fourteen years of experience
working in Pakistan/Middle-East & UK. He holds a Bachelor of Engineering
Degree from NED University, Pakistan, and M.Sc. in Computer Networks
from the UK.
Abubakar Saeed
Abubakar Saeed has more than twenty-five years of experience, managing,
consulting, designing, and implementing large-scale technology projects. He
also has extensive experience heading ISP operations, solutions integration,
heading Product Development, Pre-sales, and Solution Design. Emphasizing
on adhering to Project timelines and delivering as per customer expectations,
he always leads the project in the right direction with his innovative ideas and
excellent management skills.
Uzair Ahmed
Uzair Ahmed is a professional technical content writer holding a Bachelor’s
Degree in Computer Science from PAF-KIET University. He has sound
knowledge and industry experience in SIEM implementation, .NET
development, machine learning, Artificial intelligence, Python and other
programming and development platforms like React.JS Angular JS Laravel.
Muhammad Yousuf
Muhammad Yousuf is a professional technical content writer. He is a
Certified Ethical Hacker (CEHv10) and Cisco Certified Network Associate
(CCNA) in Routing and Switching, holding bachelor’s degree in
Telecommunication Engineering from Sir Syed University of Engineering
and Technology. He has both technical knowledge and sound industry
information, which he uses perfectly in his career
Afreen Moin
Afreen Moin is a professional Technical Content Developer. She holds a
degree in Bachelor of Engineering in Telecommunications from Dawood
University of Engineering and Technology. She has a great knowledge of
computer networking and attends several training programs. She possesses a
keen interest in research and design related to computers, which reflects in
her career.
Free Resources:
With each workbook purchased, IPSpecialist offers free resources to our
valuable customers.
Once you buy this book you will have to contact us at
support@ipspecialist.net or tweet @ipspecialistnet to get this limited time
offer without any extra charges.
mailto:support@ipspecialist.net
Free Resources Include:
Exam Practice Questions in Quiz Simulation: With 250+ Q/A,
IPSpecialist's Practice Questions is a concise collection of important topics to
keep in mind. The questions are especially prepared following the exam
blueprint to give you a clear understanding of what to expect from the
certification exam. It goes further on to give answers with thorough
explanations. In short, it is a perfect resource that helps you evaluate your
preparation for the exam.
Career Report: This report is a step-by-step guide for a novice who wants to
develop his/her career in the field of computer networks. It answers the
following queries:
What are the current scenarios and future prospects?
Is this industry moving towards saturation or are new opportunities
knocking at the door?
What will the monetary benefits be?
Why get certified?
How to plan and when will I complete the certifications if I start
today?
Is there any career track that I can follow to accomplish
specialization level?
Furthermore, this guide provides a comprehensive career path towards being
a specialist in the field of networking and also highlights the tracks needed to
obtain certification.
 
IPS Personalized Technical Support for Customers: Good customer
service means helping customers efficiently, in a friendly manner. It is
essential to be able to handle issues for customers and do your best to ensure
they are satisfied. Providing good service is one of the most important things
that can set our business apart from the others of its kind.
Great customer service will result in attracting more customers and attaining
maximum customer retention.
IPS is offering personalized TECH support to its customers to provide better
value for money. If you have any queries related to technology and labs you
can simply ask our technical team for assistance via Live Chat or Email.
Our Products
Technology Workbooks
IPSpecialist Technology workbooks are the ideal guides to developing the
hands-on skills necessary to pass the exam. Our workbook covers official
exam blueprint and explains the technology with real life case study based
labs. The content covered in each workbook consists of individually focusedtechnology topics presented in an easy-to-follow, goal-oriented, step-by-step
approach. Every scenario features detailed breakdowns and thorough
verifications to help you completely understand the task and associated
technology.
We extensively used mind maps in our workbooks to visually explain the
technology. Our workbooks have become a widely used tool to learn and
remember the information effectively.
vRacks
Our highly scalable and innovative virtualized lab platforms let you practice
the IP Specialist Technology Workbook at your own time and your own
place as per your convenience.
Quick Reference Sheets
Our quick reference sheets are a concise bundling of condensed notes of the
complete exam blueprint. It is an ideal and handy document to help you
remember the most important technology concepts related to the certification
exam.
Practice Questions
IP Specialists’ Practice Questions are dedicatedly designed from a
certification exam perspective. The collection of these questions from our
technology workbooks are prepared keeping the exam blueprint in mind
covering not only important but necessary topics as well. It’s an ideal
document to practice and revise your certification.
Content at a glance
Chapter 01: Network Fundamentals
Chapter 02: Network Access
Chapter 03: IP Connectivity
Chapter 04: IP Services
Chapter 05: Security Fundamentals
Chapter 06: Automation and Programmability
Answers:
Acronyms:
References:
About Our Products
Table of Contents
Chapter 01: Network Fundamentals
Technology Brief
Role and Function of Network Components
Routers
L2 and L3 Switches
Next-Generation Firewalls and IPS
Access Points
Controllers (Cisco DNA Center and WLC)
Endpoints
Servers
Characteristics of Network Topology Architectures
2 Tier
3 Tier
Spine-Leaf
WAN
Small Office/Home Office (SOHO)
On-Premises and Cloud
Physical Interface and Cabling Types
Cabling Type and Implementation Requirements
Ethernet Connectivity Recommendations
Single Mode Fiber, Multimode Fiber, Copper
Connections
Concepts of PoE
Identifying Interface and Cable Issues
Collisions
Errors
Duplex
Speed
TCP vs. UDP
TCP and UDP Working
IPv4 Addressing and Subnetting
Advantages of Subnetting
The Need for Private IPv4 Addressing
Case Study
IPv6 Addressing and Prefix
Restrictions for Implementing IPv6 Addressing and Basic Connectivity
IPv6 Address Formats
IPv6 Subnetting
IPv6 Packet Header
IPv6 Addressing and Subnetting
Mind Map
IPv6 Address Types
Global Unicast
Unique Local
Link Local
Anycast
Multicast
Modified EUI 64
IP Parameters for Client OS (Windows, Mac OS, Linux)
Windows
Linux
Mac OS
Wireless Principles
SSID
RF
Encryption
Virtualization Fundamentals
Benefits of Virtualization
Types of Virtualization
Switching Concepts
MAC Learning and Aging
Frame Switching
Frame Flooding
MAC Address Table
Mind Map
Summary
Role and Function of Network Components
Characteristics of Network Topology Architectures
Physical Interface and Cabling Types
Identify Interface and Cable Issues
TCP vs. UDP
IPv4 Addressing and Subnetting
The Need for Private IPv4 Addressing
IPv6 Addressing and Prefix
IPv6 Address Types
Wireless Principles
Virtualization Fundamentals
Switching Concepts
Practice Questions
Chapter 02: Network Access
Technology Brief
VLANs (Normal Range) Spanning Multiple Switches
Access Ports (Data and Voice)
Default VLAN
Connectivity
Interswitch Connectivity
Trunk Ports
802.1Q
Native VLAN
Layer 2 Discovery Protocols (Cisco Discovery Protocol and LLDP)
Cisco Discovery Protocol (CDP)
LLDP (Link Layer Discovery Protocol)
(Layer 2/Layer 3) EtherChannel (LACP)
EtherChannel
Lab 2-01: VLAN, Inter-VLAN, Trunk Port, EtherChannel
Case Study
Topology
Configuration
Verification
Basic Operations of Rapid PVST+ Spanning Tree Protocol
Configuring Rapid PVST+
Root Port, Root Bridge (Primary/Secondary), and other Port Names
Rapid PVST+ Port State
PortFast
Cisco Wireless Architectures vs. AP Modes
Cisco Unified Wireless Network Architecture
AP Modes
Physical Infrastructure Connections of WLAN Components (AP,
WLC, Access/Trunk Ports, and LAG)
Access Points
Wireless LAN Controllers
Access Ports/Trunk Ports
LAG
AP and WLC Management Access Connections (Telnet, SSH, HTTP,
HTTPS, Console, and TACACS+/RADIUS)
Access Point
Wireless Controllers Management Access Connections
Components of a Wireless LAN Access for Client Connectivity using
GUI
Step 1. Configure a RADIUS Server
Step 2. Create a Dynamic Interface
Step 3. Create a New WLAN
Mind Map of Network Access
Summary
VLANs (Normal Range) Spanning Multiple Switches
Interswitch Connectivity
Layer 2 Discovery Protocols (Cisco Discovery Protocol and LLDP)
(Layer 2/Layer 3) EtherChannel (LACP)
Basic Operations of Rapid PVST+ Spanning Tree Protocol
Cisco Wireless Architectures vs. AP Modes
Physical Infrastructure Connections of WLAN Components (AP,
WLC, Access/Trunk Ports, and LAG)
AP and WLC Management Access Connections (Telnet, SSH, HTTP,
HTTPS, Console, and TACACS+/RADIUS)
Components of a Wireless LAN Access for Client Connectivity using
GUI
Practice Questions
Chapter 03: IP Connectivity
Technology Brief
Components of the Routing Table
Routing Protocol Code
Prefix
Network Mask
Next Hop
Administrative Distance
Metric
Gateway of Last Resort
How a Router Makes Forwarding Decision by Default?
Longest Match
Administrative Distance
Routing Protocol Metric
IPv4 and IPv6 Static Routing
IP Addresses
IPv4 Address
IPv6 Address
Difference between IPv4 and IPv6 Addresses
Default Route
Network Route
Host Route
Floating Static
Case Study <IPV4 Static Routing>
Topology Diagram:
Configuration
Verification
Case Study <IPv6 Static Routing>
Topology Diagram
Configuration
Verification
Single Area OSPFv2
Neighbor Adjacency
Point-to-Point
Broadcast (DR/BDR Selection)
Router ID
Purpose of First Hop Redundancy Protocol
Types of Redundancy Protocols
Case Study <OSPF>
Topology Diagram
Configuration
Verification
Mind Map
Summary
Components of the Routing Table
A Router Makes Forwarding Decision by Default
Configure and Verify IPv4 and IPv6 Static Routing
Configure and Verify Single Area OSPFv2
Purpose of First Hop Redundancy Protocol
Practice Question
Chapter 04: IP Services
Technology Brief
Configure and Verify Inside Source NAT using Static and Pools
NAT Inside and Outside Addresses
Types of Network Address Translation (NAT)
Advantages of NAT
Disadvantages of NAT
NTP Operating in a Client and Server Mode
NTP Authentication
Role of DHCP and DNS within the Network
Configuring DHCP
TFTP, DNS, and Gateway Options
The Function of SNMP in Network Operations
SNMPv2:
SNMPv3:
Management Information Base (MIB):
Use of Syslog Features Including Facilities and Levels
Syslog
Syslog Facilities and Features
DHCP Client and Relay
Router/Switch as a DHCP Server
Forwarding Per-Hop Behavior for QoS such as Classification,
Marking, Queuing, Congestion, Policing, Shaping
Classification:
Congestion
Queuing
Shaping
Policing
Differentiated Services
Network Devices for Remote Access using SSH
Capabilities and Functions of TFTP/FTP in the Network
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Differences between TFTP & FTP
Mind Map
Summary
Configure and Verify Inside Source NAT using Static and Pools
Configure and Verify NTP Operating in a Client and Server Mode
The Role of DHCP and DNS within the Network
The Function of SNMP in Network Operations
Use of Syslog Features
Configure and Verify DHCP Client and Relay
Forwarding Per-hop Behavior for QoS such as Classification,
Marking, Queuing, Congestion, Policing, Shaping
Network Devices for Remote Access using SSH
Capabilities and Functions of TFTP/FTP in the Network
Practice Question
Chapter 05: Security Fundamentals
Technology Brief
Security Concepts
Threats
Vulnerabilities
Exploits
Mitigation Techniques
Security Program Elements
User Awareness
Training
Physical Access Controls
Configure Device Access Control using Local Passwords
Configure Local User-Specific Passwords
Configure AUX Line Password
Security Password PoliciesElements
Password Management
Password Complexity
Password Alternatives
Remote Access and Site-to-Site VPNs
VPN
Remote Access VPN
Site-to-Site VPN
Mind Map
Configure and Verify Access Control Lists
Inbound and Outbound ACL
Lab: NAT, DHCP, NTP, Syslog, and SSH
Case Study
Topology Diagram
Configuration
Verification
Layer 2 Security Features
DHCP Snooping
Dynamic ARP Inspection
Port Security
Authentication, Authorization, and Accounting Concepts
AAA Components
Wireless Security Protocols
WPA
WPA2
WPA3
Configure WLAN using WPA2 PSK using GUI
WPA2-PSK Configuration with GUI
Verifying WPA2 PSK
Mind Map
Summary
Security Concepts
Security Program Elements
Configure Device Access Control Using Local Passwords
Security Password Policies Elements
Remote-Access and Site-to-Site VPNs
Configure and Verify Access Control Lists
Layer 2 Security Features
Authentication, Authorization, and Accounting Concepts
Wireless Security Protocols
Configure WLAN using WPA2 PSK using GUI
Practice Question
Chapter 06: Automation and Programmability
Automation Impacts on Network Management
Why do we need to automate our network?
How automation of network can be beneficial?
Why Choose Cisco for Networking
Compare Traditional Networks with Controller-based Networking
Controller-based and Software Defined Architectures
SD- Access Architecture
Underlay
Overlay
Fabric
Separation of Control Plane and Data Plane
Northbound and Southbound APIs
Traditional Campus Device Management vs. Cisco DNA Center
Enabled Device Management
Characteristics of REST-based APIs
CRUD
HTTP Verbs
Capabilities of Configuration Management Mechanisms
Puppet
Chef
Ansible
Interpret JSON Encoded Data
PHP JSON Encode and Decode
Encoding and Decoding
PHP JSON Encode
Mind Map
Summary
Automation Impacts on Network Management
Compare Traditional Networks with Controller-based Networking
Controller-based and Software Defined Architectures
Traditional Campus Device Management vs. Cisco DNA Center
Enabled Device Management
Characteristics of REST-based APIs
Capabilities of Configuration Management Mechanisms
Interpret JSON Encoded Data
Practice Question
Answers:
Chapter 01: Network Fundamentals
Chapter 02: Network Access
Chapter 03: IP Connectivity
Chapter 04: IP Services
Chapter 05: Security Fundamentals
Chapter 06: Automation and Programmability
Acronyms:
References:
About Our Products
About this Workbook
This workbook covers all the information you need to pass the Cisco CCNA
200-301 exam (Latest Exam). The workbook is designed to take a practical
approach of learning with real life examples and case studies.
➢ Covers complete CCNA updated blueprint
➢ Summarized content
➢ Case Study based approach
➢ Ready to practice labs on Virtualized Environment
➢ 100% pass guarantee
➢ Mind maps
Cisco Certifications
Cisco Systems, Inc. specializes in networking and communications products
and services. A leader in global technology, the company is best known for
its business routing and switching products that direct data, voice, and video
traffic across networks worldwide.
Cisco also offers one of the most comprehensive vendor-specific certification
programs in the world, the Cisco Career Certification Program. The program
has six (6) levels, which begins at the Entry level and then advances to
Associate, Professional, and Expert levels. For some certifications, the
program closes at the Architect level.
Figure 1. Cisco Certifications Skill Matrix
How does Cisco certifications help?
Cisco certifications are a de facto standard in networking industry, which
help you boost your career in the following ways:
1. Gets your foot in the door by launching your IT career
2. Boosts your confidence level
3. Proves knowledge that helps improve employment opportunities
As for companies, Cisco certifications are a way to:
1. Screen job applicants
2. Validate the technical skills of the candidate
3. Ensure quality, competency, and relevancy
4. Improve organization credibility and customers’ loyalty
5. Meet the requirement in maintaining organization partnership level
with OEMs
6. Helps in Job retention and promotion
Cisco Certification Tracks
Figure 2. Cisco Certifications Track
About the CCNA Exam
➢ Exam Number: 200-301 CCNA
➢ Associated Certifications: CCNA
➢ Duration: 120 minutes
➢ Exam Registration: Pearson VUE
The Cisco Certified Network Associate (CCNA) composite exam (200-301)
is a 120-minute, assessment that is associated with the CCNA certification.
This exam tests a candidate's knowledge and skills related to secure network
infrastructure, understanding core security concepts, managing secure access,
VPN encryption, firewalls, intrusion prevention, web and email content
security, and endpoint security.
The following topics are general guidelines for the content likely to be
included on the exam:
➢ Network Fundamentals 20%
➢ Network Access 20%
➢ IP Connectivity 25%
➢ IP Services 10%
➢ Security Fundamentals 15%
➢ Automation and Programmability 10%
Complete list of topics covered in the CCNA 200-301 exam can be
downloaded from here.
https://learningcontent.cisco.com/cln_storage/text/cln/marketing/exam-topics/210-260-iins.pdf
Chapter 01: Network Fundamentals
Technology Brief
In computer networks, the term network refers to the interconnection of
devices such as computers, laptops, IoTs, servers, routers and much more.
This network of devices is capable of sharing the information among each
other and offers different services over the network. Evolution of computer
networks has raised the demand of network engineers to install, configure,
operate and troubleshoot the small personal area network to large scale
enterprise networks. Typical Networking Fundamentals topics include WAN
technologies, basic security and wireless concepts, routing and switching
fundamentals, and configuring simple networks.
In this chapter, we will discuss role and function of network component,
network characteristics of network topology architectures, TCP and UDP
network protocols, wireless principles, virtualization fundamentals (virtual
machines), switching concepts and their categories. This chapter also
examines the limitations of IPv4 and describes how IPv6 resolves these
issues while offering other advantages as well. The rationale of IPv6 and
concerns regarding IPv4 address depletion. This chapter presents a brief
history of both IPv4 and IPv6 addressing and address types. It also includes
the representation of IPv6 addresses, along with the IPv6 header.
Role and Function of Network Components
A network is the set of interconnected devices sharing the resources. A
computer network allows different computers/devices to connect to one
another and share resources. The integrant of network architecture consists of
numerous devices that perform a definite function or set of functions in a
network. It is essential to understand the purpose of each device so that an
individual would be familiar with the functionalities of the devices that are
used in the network. In this section, we will cover these requirements. 
Network Topology
Network topology demonstrate the relationship between, various elements of
networks. Network topology can be categorized as physical or logical
topology. Physical topology shows the physical network infrastructure
whereas logical topology shows the logical overview of the network.
Network topology boils down to two basic elements: nodes and links. Nodes
represent any number of possible network devices, such as routers, switches,
servers, phones, cameras, or laptops. The topological structure of a network
consists of nodes and links that are connected physically or logically.
Bus Topology
In the case of bus topology, all devices share single communication line or
cable. Bus topologies may have issues when multiple hosts send data at the
same time. Therefore, bus topology either uses CSMA/CD technology or
recognizes one host as the Bus Master to solve this issue. It isone of the
simplest forms of networking where a failure of a device does not affect the
other devices. But then again, failure of the shared communication line can
make all other devices stop functioning.
Figure 1-01: Bus Topology
Ring Topology
In ring topology, each host machine connects to exactly two other machines,
creating a circular network structure. When one host tries to communicate or
send a message to a host which is not adjacent to it, the data travels through
all intermediate hosts. To connect one more host in the existing structure, the
administrator may need only one more extra cable.
Figure 1-02: Ring Topology
Star Topology
The advantage of the star topology is that there is a central device that serves
as the mediator for every station and the station seems to be indirectly
connected to each other. The disadvantage is that it is too costly and is hub or
central device dependent.
The following figure illustrates the topology used in star topology:
Figure 1-03: Star Topology
Mesh Topology
If you observe, you will see that each computer is interconnected to every
other computer. That is the simplest way to explain Mesh though there are
some theoretical background that we can dig deeper with Mesh like Reed’s
law, flooding and routing, it is important for us to know the disadvantages of
Mesh are difficult installation and expensive cabling. On the other hand, it is
good when it comes to providing security. Privacy and troubleshooting would
be easy.
The following figure shows mesh topology structure:
Figure 1-04: Mesh Topology
Hybrid Topology
Hybrid topology is a mixture of more than one topology, which may include
mesh topology, start topology ring topology, etc. The disadvantage of one
topology may offset by the advantage of the other one. Thus, the reason of
making hybrid topology is to eliminate the shortcoming of the network.
Figure 1-05: Hybrid Topology
Routers
Routers are used to connect networks. A router receives a packet and
observes the destination IP address information to determine which network
the packet needs to reach, then sends the packet out of the corresponding
interface.
Routers are network devices that accurately route information about the
network by inspecting information as it reaches, the router can decide the
destination address for the information; then, by using tables of defined
routes, the router determines the best way for the data to continue its journey.
Unlike bridges and switches that use the hardware-configured MAC address
to determine the destination of the data, routers use the software-configured
network address to make decisions. This approach makes routers more
functional than bridges or switches, and it also makes them more complex
because they have to work harder to determine the information.
Figure 1-06: Router
Functions
Routers work on Internet Protocol (IP) specifically on the logical
address also known as IP address
Routers perform actions on the layer 3, i.e., Network Layer of the
OSI model
They route traffic from one network to the desired destination
network
As described, a router is an intelligent device that either first finds
out the network or the traffic that relates to their network
After deciding, the router forwards the traffic to the required
destination
Applications
Routers provide interfaces for different physical network
connections such as copper cables, optic fiber, or wireless
transmission 
The Network Administrator can configure the routing table
manually as well as dynamically
Routers learn its routing table by using static and dynamic routing
protocols
Multiple routers are used in interconnected networks
Dynamic exchange of information about the destination is made
possible by the dynamic routing protocol; the administrator will
have to advertise routing path manually for static networks
L2 and L3 Switches
Open System Interconnect (OSI) model is a reference model for describing
and explaining network communications, the terms Layers 2 & 3 are adopted
from it. The OSI model has seven layers that include: application layer,
presentation layer, session layer, transport layer, network layer, data link
layer and physical layer, amid which network layer is on Layer 3 and data
link layer is on Layer 2.
Figure 1-07: OSI Model
Layer 2 switches provides direct data transmission between two devices
within a LAN. A Layer 2 switch purpose is to keep a table of Media Access
Control (MAC) addresses. The data frames are switched through MAC
addresses individually inside the LAN and will not be identified outside it. A
Layer 2 switch can allocate VLANs to specific switch ports, which in turn are
in dissimilar layer 3 subnets. So the communication with other VLANs or
LANs desires the purpose or function of Layer 3.
Figure 1-08: Layer 2 & Layer 3 Switches
Difference between Layer 2 and Layer 3 Switches
The basic difference between Layer 2 and Layer 3 is the routing function.
A Layer 2 switch mechanism works only on MAC addresses and does not
concern IP addresses or any items of higher layers. A Layer 3 switch can
perform all the task that a Layer 2 switch can. Furthermore, it can do dynamic
routing and static routing. This means, a Layer 3 switch has both MAC
address table and IP routing table, and handles intra-VLAN communication
and packets routing between distinct VLANs as well. A switch that adds
merely static routing is known as a Layer 2+ or Layer 3 Lite. Other than
routing packets, Layer 3 switches similarly include some functions that need
https://www.fs.com/c/10g-switches-3256
the capability to understand the IP address information of data that is coming
to the switch, such as tagging VLAN traffic depending on IP addresses
instead of manually configuring a port. Layer 3 switches are more reliable
from security and power perspective.
Which Device Do You Need?
With the emergence of Layer 3 switches, deciding when to use a Layer 2
switch and when to use a Layer 3 switch, choosing a Layer 3 switch for
routing or choosing a router, and similar predicaments are troubling many
people. Which device is the better one according your needs?
Figure 1-09: Layer 2 Switch, Layer 3 Switch and Router
When lingering between Layer 2 and Layer 3 switches, you should think
about where it will be used. If you have a pure Layer 2 domain, you can
simply go for Layer 2 switch; if you need to do inter-VLAN routing, then you
need a Layer 3 switch. A pure Layer 2 domain is where the hosts are
connected, so it will work fine there. This is usually called access layer in a
network topology. If it is required for the switch to aggregate multiple access
switches and do inter-VLAN routing, then a Layer 3 switch will be needed.
This is known as distribution layer in network topology.
Since both the Layer 3 switch and the router have routing functions, which
one is better? Actually, it is less a question of which is better for routing, as
both are useful in particular applications. If you want to do multiple
switching and inter-VLAN routing, and need no further routing to the
Internet Service Provider (ISP)/WAN, then you can go well with a Layer 3
switch. Otherwise, you should go for a router with more Layer 3 features.
Layer 2 Switch Layer 3 Switch
Functions
Switches filter the
MAC addresses of
all the connected
devices
Switches perform
functioning on
Data link layer
(Layer 2) of OSI
model.8
It learns the
physical address of
all the devices that
are connected to it
and then uses the
MAC address to
control traffic flow
Switches forward
the data frames
only to the
destination address
rather than forward
the data to all the
connected ports
Switches reduce
the traffic by
Multilayer switches
have an advance
functioning, a switch
with some router
characteristics
Multilayer switches
can be connected to
other multilayer
switches to provide
scalability to the
network
It can be logically
segmented into
multiple broadcast
domains
Layer 3 switch must
be capable enough to
make a forwarding
decision
Switches must store
networkflows so that
forwarding can occur
in hardware
spontaneous
segmentation of
network
Applications
It connects the
departments of one
company to the
other without
involving in their
communication
Switches can
transfer large files
within the local
area network
without affecting
the upper layer
traffic flow of the
network
Switches can be
used to create
virtual local area
networks (VLANs)
to improve the
flexibility of the
network
It is very efficient
as it does not
forward the data
that have errors
It avoids collision
domains
Multilayer switches
are efficiently used in
VLANs networks
Multilayer switches
can create VLANs
and decide VLANs
route
Multilayer switches
can connect to other
multilayer switches
and basic switch to
extend the VLANs
throughout the
organization
Table 1-01: Layer 2 & Layer 3 Switches
Next-Generation Firewalls and IPS
Firewalls have evolved beyond simple packet filtering and stateful
inspection. Most companies are deploying next-generation firewalls to block
modern threats such as advanced malware and application-layer attacks.
According to Gartner, Inc.’s definition, a next-generation firewall must
include:
● Standard firewall capabilities like stateful inspection
● Integrated intrusion prevention
● Application awareness and control to see and block risky apps
● Upgraded paths to include future information feeds
● Techniques to address evolving security threats
Figure 1-10: Firewall
Traditional Firewall Vs. Next Generation Firewalls
As their names suggest, next generation firewalls are a more advanced
version of the traditional firewall, and they offer the same benefits. Like
regular firewalls, NGFWs use both static and dynamic packet filtering and
VPN support to ensure that all connections between the network, internet,
and firewall are valid and secure. Both firewall types should also be able to
translate network and port addresses in order to map IPs.
There are also fundamental differences between the traditional firewall and
next generation firewalls. The most obvious difference between the two is an
https://digitalguardian.com/about/security-change-agents/trusted-information-systems
NGFW’s ability to filter packets based on applications. These firewalls have
extensive control and visibility of applications that it is able to identify using
analysis and signature matching. They can use whitelists or a signature-based
IPS to distinguish between safe applications and unwanted ones, which are
then identified using SSL decryption. Unlike most traditional firewalls,
NGFWs also include a path through which future updates will be received.
Importance of Next Generation Firewalls
Installing a firewall is necessary requirement for any business. In today’s
environment, having a next generation firewall is a mandatory part of
network. Threats to personal devices and larger networks are changing every
day. With the flexibility of a NGFW, it protects devices and companies from
a much broader spectrum of intrusions. Although these firewalls are not the
right solution for every business, security professionals should carefully
consider the benefits that NGFWs can provide, as it has a very large upside .
Firepower announced its Next-Generation Firewall (NGFW) that combines
IPS threat prevention, integrated application control and firewall capabilities
in a high-performance security appliance.
Functions
NGFWs are able to block malware from entering a network
They are better equipped to address Advanced Persistent Threats
(APTs)
NGFWs can be a low-cost option for companies looking to
improve their basic security because they can incorporate the
work of antiviruses, firewalls, and other security applications into
one solution
Applications
NGFWs being more intelligent and with deeper traffic inspection,
they may also be able to perform intrusion detection and
prevention. Some next-gen firewalls might include enough IPS
functionality that a stand-alone IPS might not be needed
NGFWs can also provide reputation-based filtering to block
applications that have a bad reputation. This can possibly check
phishing, virus, and other malware sites and applications
https://digitalguardian.com/blog/101-data-protection-tips-how-keep-your-passwords-financial-personal-information-safe
https://digitalguardian.com/blog/what-malware-definition-tips-malware-prevention
They can identify and filter traffic based upon the specific
applications, rather than just opening ports for any and all traffic.
This prevents malicious applications and activity from using non-
standard ports to evade the firewall
Access Points
An access point is a device that offers network connectivity to the large
number of endpoints. Wireless access point typically connects to a wired
router, switch, or WLC to provide wireless connectivity. For example, if you
want to enable Wi-Fi access in your company's reception area but do not have
a router within range, you can install an access point near the front desk and
run an Ethernet cable through the ceiling back to the server room.
Figure 1-11: Access Point
Advantages of Using Wireless Access Points
When you have both employees and guests connecting with their laptops,
mobile phones, and tablets, several devices will be connecting and
disconnecting from the network. To support these simultaneous connections,
an access points gives scalability to connect the number of devices on your
network. But that’s only one of the advantages of using these network
enhancers—consider these points:
● Business-grade access points can be installed anywhere you can run an
Ethernet cable. Newer models are also compatible with Power over
Ethernet Plus, or PoE+ (a combination Ethernet and power cord), so
there is no need to run a separate power line or install an outlet near the
access point
● Additional standard features include Captive Portal and Access Control
List (ACL) support, so you can limit guest access without
compromising network security, as well as easily manage users within
your Wi-Fi network
● Selected access points include a Clustering feature—a single point
from which the IT administrator can view, deploy, configure, and
secure a Wi-Fi network as a single entity rather than a series of
separate access point configurations
Controllers (Cisco DNA Center and WLC)
Cisco DNA Center is the foundational controller and analytics platform.
DNA Center is the heart of Cisco’s intent-based network architecture. Cisco
DNA Center offers centralized, intuitive management that makes it fast and
easy to design, provision, and apply policies across your network
environment. The Cisco DNA Center UI provides end-to-end network
visibility and uses network insights to optimize network performance and
deliver the best user and application experience.
The Cisco Wireless Controller (WLC) series devices provide a single
solution to configure, manage and support corporate wireless networks,
regardless of their size and locations. Cisco WLCs have become very popular
during the last decade as companies move from standalone Access
Point (AP) deployment designs to a centralized controller-based design,
reaping the enhanced functionality and redundancy benefits that come with
controller-based designs.
Cisco currently offers a number of different WLC models, each targeted for
different sized networks. As expected, the larger models (WLC 8500, 7500,
5760, etc.) offer more high-speed gigabit network interfaces, high availability
and some advanced features required in large & complex networks, for
example supporting more VLANs and WiFi networks, thousands of AP &
Clients per WLC device, and much more.
Recently, Cisco has begun offering WLC services in higher-end Catalyst
switches by embedding the WLC inside Catalyst switches e.g., Catalyst 3850,
but also as a virtual image 'Virtual WLC' that runs under VMware ESX/ESXi
4.x/5.x. Finally, Cisco ISR G2 routers 2900 & 3900 series can accept Cisco
UCS–E server modules, adding WLC functionality and supporting up to 200
accesspoints and 3000 clients.
Exam Tip: WLC interfaces, their physical and logical ports, how they
connect to the network and how Wireless SSIDs are mapped to VLAN
interfaces, these topics are very important for exam.
Endpoints
An endpoint is a remote computing device that communicates back and forth
with a network to which is it connected. Examples of endpoints include:
Desktops
Laptops
Smartphones
Tablets
Servers
Workstations
Endpoints represent key vulnerable points of entry for cybercriminals.
Endpoints are where attackers execute code and exploit vulnerabilities, and
where there are assets to be encrypted, exfiltrated or leveraged. With
organizational workforces becoming more mobile and users connecting to
internal resources from off-premise endpoints all over the world, endpoints
are increasingly susceptible to cyberattacks. Objectives for targeting
endpoints include, but are not limited to:
➢ Take control of the device and use in a botnet to execute a DoS
https://www.paloaltonetworks.com/products/secure-the-endpoint/traps
https://www.paloaltonetworks.com/cyberpedia/what-is-botnet
https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos
attack
➢ Use the endpoint as an entry point into an organization to access
high-value assets and information
For several decades, organizations have heavily relied on the antivirus as a
means to secure endpoints. However, traditional antiviruses can no longer
protect against today’s modern threats. An advanced endpoint security
solution should prevent known and unknown malware and exploits;
incorporate automation to alleviate security team workloads; and protect and
enable users without impacting system performance.
Servers
A server is a computer program or a device that provides functionality for
other programs or devices. A server is a software or hardware device that
accepts and responds to requests made over a network. The device that makes
the request, and receives a response from the server, is called a client. On the
internet, the term "server" commonly refers to the computer system that
receives a request for a web document, and sends the requested information
to the client.
Servers are used to manage network resources. For example, a user may set
up a server to control access to a network, send/receive emails, manage print
jobs, or host a website. They are also proficient at performing intense
calculations. Some servers are committed to a specific task, often referred to
as dedicated. However, many servers today are shared servers that can take
on the responsibility of emails, DNS, FTP, and even multiple websites in the
case of a web server.
Types of Servers
Servers are frequently categorized in terms of their purpose. A few instances
of the types of servers available are:
A web server is a computer program that serves
requested HTML pages or files. In this circumstance, a
web browser acts as the client or user
An application server is a program in a computer in
a distributed network that offers the business rationality for an
application program
A proxy server is software that acts as an intermediary between
an endpoint device, such as a computer, and another server from
which a user or client is requesting a service
A mail server is an application that receives incoming emails
from local users (people within the same domain) and remote
senders and forwards outgoing emails for delivery
A virtual server is a program running on a mutual server that is
configured in such a way that it appears to individual users that
they have complete control of a server
A blade server is a server framework for housing multiple shrill,
modular electronic circuit boards, known as server blades. Each
blade is a server in its own right, often dedicated to a solitary
application
A file server is a computer responsible for the central storage and
management of information documents so that different
computers on the same network can access them
https://whatis.techtarget.com/definition/Web-server
https://www.theserverside.com/definition/HTML-Hypertext-Markup-Language
https://searchwindevelopment.techtarget.com/definition/browser
https://searchsqlserver.techtarget.com/definition/application-server
https://whatis.techtarget.com/definition/distributed
https://searchnetworking.techtarget.com/definition/network
https://whatis.techtarget.com/definition/proxy-server
https://whatis.techtarget.com/definition/endpoint-device
https://searchmicroservices.techtarget.com/definition/mail-server-mail-transfer-transport-agent-MTA-mail-router-Internet-mailer
https://whatis.techtarget.com/definition/domain
https://searchnetworking.techtarget.com/definition/virtual-server
https://searchdatacenter.techtarget.com/definition/blade-server
https://searchdatacenter.techtarget.com/definition/server-blade
https://searchnetworking.techtarget.com/definition/file-server
A policy server is a security element of a policy-based network
that provides authorization services and facilitates tracking and
control of files 
Characteristics of Network Topology Architectures
Network topology is defined as the graphical arrangement of computer
systems, or nodes to form a computer network.
There are two types of network topology: physical topology and logical
topology. Physical topology of a network refers to the physical arrangement
of computer nodes based on configuration of computers, cables, and other
peripherals. Whereas, logical topology is the method used to permit
the information between workstations.
Both topologies exist in a Local Area Network (LAN). All the nodes in LAN
are connected with each other through a valid media that shows its physical
arrangement based on hardware used while data flow through this
arrangement shows logical topology.
The characteristics of network topology architecture are as follows:
2 Tier
The word "tier" usually refers to splitting the two software layers onto two
distinctive physical pieces of hardware. Multi-layer programs can be based
on one tier or level, but because of operational partialities, many two-tier
architectures utilize a computer for the first tier and a server for the second
tier.
A two-tier or level architecture is a software architecture in which a
presentation layer or interface keeps running on a client, and a data layer or
data structure gets stored on a server. Separating these two components into
different locations represents a two-tier architecture.
https://searchmobilecomputing.techtarget.com/definition/policy
https://searchsoftwarequality.techtarget.com/definition/authorization
Figure 1-12: Two-Tier Network Design Model
3 Tier
A three-tier or level architecture is a client-server architecture design in
which the functional procedure logic, information access, computer
information storage and UI (user interface) are created and maintained as
independent modules on discrete platforms. Three-tier architecture is a
software configuration design pattern and a well-established software
architecture structure.
Three-tier or level architecture permits any one of the three tiers to be
promoted or substituted autonomously. The UI (User Interface) is
implemented on a desktop PC and it utilizes a standard GUI (Graphical User
Interface) by different modules running on the application server.
The following three layers included in a typical three-tier architecture
network design are:
Core Layer: Provides ideal channel between high-performance
routing and sites. Due to the criticality of the core layer, the design
principles of the core should provide a suitable level of flexibility
that offers the capability to recoup rapidly and easily after any
network or system failure experience with the core block
Distribution Layer: Provides policy-based connectivity and
boundary control between the access and core layers
Access Layer: Provides user/workgroup access to the system or
network. The two essential and common hierarchical design
architectures of enterprise campus networksare the three-level
and two-level layer models
Figure 1-13: Three-Tier Network Design Model
The design model, illustrated in the above figure is usually used in large
enterprise campus systems or networks that are constructed by multiple
functional distribution layer blocks.
The hierarchical network design model breaks the complex level system into
multiple smaller and more manageable networks. Each tier or level in the
hierarchy is focused on a specific set of roles. This design approach offers
network designers a high degree of flexibility to optimize and select the right
network hardware, software, and features to perform specific roles for the
different network layers .
Spine-Leaf
With the increased emphasis on massive information transmissions and
instantaneous information travel in the network, the aging three-tier
architecture within a data center is interchanged with the Leaf-Spine
architecture. A Leaf-Spine architecture is adaptable to the continuously
changing requirements of companies in big data industries with evolving data
centers.
Leaf-Spine Network Topology
With Leaf-Spine configurations, all devices are exactly the same number of
segments that contain an expected and consistent amount of latency or delay
for voyaging data. It can be only possible because of the new topology design
that has two layers, the Leaf layer and Spine layer. The Leaf layer consists of
access switches that connect to devices like servers, load balancers, firewalls,
and edge routers. The Spine layer (made up of switches that perform routing)
is the backbone of the network, where every Leaf switch is interconnected
with each and every Spine switch.
Figure 1-14: Leaf-Spine Architecture Design
WAN
Wide Area Network helps organizations to expand geographically around the
globe. By using WAN services from service providers usually called “off-
sourcing” or “outsourcing”, organizations just have to focus on their local
connectivity while rest of the network is taken care of by the internet service
providers. The following figure shows the basic network topology seen under
Wide Area Network in use today:
Figure 1-15: WAN Network
WAN Topology Options
There are four types of basic topologies for a WAN design.
Point-to-Point
The connection between two endpoints or nodes is known as Point-to-Point
connection. Typically, point-to-point connection is used when a dedicated
link is required from customer premises to the provider’s network. Point-to-
point communication links usually offer high service quality, if they have
adequate bandwidth. The dedicated capacity removes latency or jitter
between the endpoints.
Figure 1-16: Point-to-Point Topology
Hub and Spoke
In this topology, there is a single hub (central router) that provides access
from remote networks to a core router. You can see below the diagram for
Hub and Spoke.
Figure 1-17: Hub & Spoke Topology
Communication among the networks travels through the core router. The
advantages of a star physical topology are less cost and easier administration,
but the disadvantages can be significant:
● (HUB) The central router represents a single point of failure
● (HUB) The central router limits the overall performance for access to
centralized resources. It is a single pipe that manages all traffic
intended either for the centralized resources or for the other regional
routers
Full Mesh
In Full Mesh, each routing node on the edge of a given packet-switching
network has a direct path to every other node on the cloud. You can see its
working flow in the following diagram.
Figure 1-18: Full Mesh Topology
Configuration of this topology provides a high level of redundancy, but the
costs are the highest. In conclusion, a fully meshed topology really is not
viable in large packet-switched networks. Here are some issues you will
contend by using a fully meshed topology:
● Many virtual circuits are required-one for every connection between
routers, which brings up the cost
● Configuration of this topology is more complex for routers without
multicast support in non-broadcast environments
Figure 1-19: Partially Meshed Topology
Single vs Dual-Homed
On one end of a WAN link, when a single connection is implemented using a
single network interface, it is called a single-homed connection. When an
additional network interface is dedicated to the same WAN link, it is called a
dual-homed connection. This is typically done for purposes of
redundancy. 
This concept is applied to the organization's connection to its ISP in many
cases. Taking this concept a step further, both single-homed and dual-homed
connections can be duplicated, with one set of connections to one ISP and
another set of connections to a different ISP, providing both link redundancy
and ISP redundancy. When this is done with a dual-homed connection to
each ISP, they are called dual-multi-homed connections. If a single-homed
connection is provided for each ISP, it is called dual-single-homed
connection.
WAN Access Connectivity Options
WAN can use a number of different connection types available on the market
today. The figure below shows the different WAN connection types that can
be used to connect your LANs (made up of data terminal equipment, or DTE)
together over the Data Communication Equipment (DCE) network.
Figure 1-20: WAN Access Connect Options
Let’s apprehend the different WAN connectivity options:
Dedicated (Leased Lines): These are usually called point-to-point or
dedicated connections. A leased line is a pre-established WAN
communications' path that goes from the CPE through the DCE switch, and
then over to the CPE of the remote site. The CPE enables DTE networks to
communicate at any time with no cumbersome setup procedures to muddle
through before transmitting data.
Circuit Switched: Whenever you see term circuit switching, think phone
call. The big advantage is cost; Plainest Old Telephone Service (POTS) and
ISDN dial-up connections are not flat rate, which is their advantage over
dedicated lines because you pay only for what you use, and you pay only
when the call is established. No data can be transferred before an end-to-end
connection is established. Circuit switching uses dial-up modems or ISDN
and is used for low-bandwidth data transfers.
Packet Switched: A WAN switching method that allows you to share
bandwidth with other companies to save money, just like a super old party
line, where homes shared the same phone number and line to save
money. Packet switching can be thought of as a network that is designed to
look like a leased line, yet it charges you less, like circuit switching does. As
usual, you get what you pay for, and there is definitely a serious downside to
this technology.
Small Office/Home Office (SOHO)
SOHO is generally a remote office or enterprise environment with small to
medium infrastructure. SOHO users are connected to corporate headquarter
by using WAN MPLS or some other technology based services provided by
service providers. Normally, access switches are used to provide connectivity
with SOHO environment.
Figure 1-21: SOHO Network Topology
On-Premises and Cloud
On-premises system monitoring software has been the standard for quite a
long time. Presently, a few associations are moving to cloud-based network
monitoring and management. A few applications make a lot of sense in the
cloud, like CRM software and marketing automation solutions. Deploying in
the cloud can spare your organization expenses and give you more
noteworthy adaptability.
Physical Interface and Cabling Types
Physical interfaces consist of a software driver and a connector into which
you connect network media, such as an Ethernet cable. Whereas, cabling
is the channel through which data usually transfers from one network device
to another. There are numerous types of cable that are generally used with
LANs. In some cases, a network will utilize only one type of cable, other
networks will use a multiple types of cable.
The typeof cable selected for a network is related to the protocol, network’s
topology, and size. Understanding the features of different types of cables
and how they relate to further aspects of a network is essential for the
evolution of a successful network.
The following sections discuss the categories of cables used in networks
and other related topics.
Cabling Type and Implementation Requirements
Selecting The Appropriate Cabling Type Based On Implementation
Requirements. Several types of cables and connectors can be used in a
network, depending on the requirements for the network and the type of
Ethernet to be implemented. These connectors also vary depending on the
type of media that you have installed.
Nowadays, Ethernet is considered the king when it comes to cabling. The
table below shows some forms of Ethernet cabling of which you should be
aware:
Common
Name
Speed Alternative
Name
Name of
IEEE
Standard
Cable Type,
Maximum
Length
Ethernet 10 Mbps 10BASE-T IEEE 802.3 Copper, 100
m
Fast Ethernet 100 Mbps 100BASE-
TX
IEEE
802.3u
Copper, 100
m
Gigabit
Ethernet
1000 Mbps 1000BASE-
LX,
1000BASE-
SX
IEEE
802.3z
Fiber, 550 m
(SX) 5 km
(LX)
Gigabit 1000 Mbps 1000BASE-T IEEE Copper, 100
Ethernet 802.3ab m
10GigE
(Gigabit
Ethernet)
10 Gbps 10GBASE-
SR,
10GBASE-
LR
IEEE
802.3ae
Fiber, up to
300 m (SR),
up to 25 km
(LR)
10GigE
(Gigabit
Ethernet)
10 Gbps 10GBASE-T IEEE
802.3an
Copper, 100
m
Table 1-02: Various Cabling Options
Ethernet Connectivity Recommendations
Network
Hierarchy
Layer
Ethernet 10
Mbps
Fast Ethernet
100 Mbps
Gigabit
Ethernet
1000 Mbps
10 Gigabit
Ethernet
10000 Mbps
Access
Layer
Connects
users with low
to moderate
bandwidth
requirements
Connects
users with
high-speed
requirements
or servers
with low to
moderate
usage
Connects
servers with
high usage
Not currently
recommended
at this layer
Distribution
Layer
Not
recommended
at this layer
Connects
routers and
switches with
moderate
usage
Interconnects
access
switches with
Fast Ethernet
users and is
used to
connect
distribution
switches to
core layer
Not currently
recommended
at this layer
Core Layer Not
recommended
at this layer
Not
recommended
at this layer
Interconnects
core switches
in networks
with
Interconnects
core switches
with high
usage
moderate use
Table 1-03: Cabling Requirements over Different Layers
Straight and Crossover Cables: Making the right choice of cable can be tricky
for troubleshooting. Just imagine, you already checked the running
configurations, all of which you thought you programmed accurately and
then all of a sudden, one of the power indicator for the switch is not lighting
up because you used the wrong cable.
Figure 1-22: Ethernet Cable
Straight cable wiring scheme is similar at both ends but in case of crossover,
is different that’s why crossover cables are called crossover cables because
the strands crossover. Just notice 1 and 2 crossovers with 3 and 6 and
vice versa or keep in mind, orange pair wires are replaced with green pairs.
Let’s figure out what type of cables we have to use based on the device
implementation:
● Crossover cable is used for same devices
● Straight through cable is used for dissimilar devices
All of the devices attached to the switch must use straight through cable
- Except: switch to switch and switch to hub
Crossover cable is used for devices given
below:
● Similar Devices
● Switch to Switch
● Router to Router
● Hub to Hub
● Switch to Hub
● Pc to Pc
● Router to Pc
Straight through cable is used for devices given
below:
● Switch and Hub
● Switch to Router
● Switch to PC
● Switch to Server
● Hub to PC
● Hub to Server
● Router and Hub
Single Mode Fiber, Multimode Fiber, Copper
Single Mode Cable
Single Mode Cable is a single stand (most applications use 2 fibers) of glass
fiber with a diameter of 8.3 to 10 microns that has one mode of
communication. Single Mode Fiber with a relatively narrow diameter,
through which only one mode will propagate is usually 1310 or 1550nm. This
mode requires higher bandwidth than multimode fiber, but requires a light
source with a narrow spectral width.
Single Modem Fiber is used in many applications where data is sent at multi-
frequency (WDM Wave-Division-Multiplexing) so only one cable is needed -
(single-mode on one single fiber)
Single-mode fiber gives you a higher transmission rate and up to 50 times
more distance than multimode, but it also costs more. Single-mode fiber has a
much smaller core than multimode. The small core and single light-wave
virtually eliminate any distortion that could result from overlapping light
pulses, providing the least signal attenuation and the highest transmission
speeds of any fiber cable type. 
Single-mode optical fiber is an optical fiber in which only the lowest order
bound mode can propagate at the wavelength of interest typically 1300 to
1320nm.
Multimode Cable
Multimode Cable has a little bit bigger diameter, with mutual diameters in the
50-to-100 micron range for the light carry component (in the US, the most
common size is 62.5um). Most applications in which multimode fiber is used,
2 fibers are used (WDM is not usually used on multi-mode fiber).
Multimode fiber gives you high bandwidth at high speeds (10 to 100MBS -
Gigabit to 275m to 2km) over medium distances. Light waves are dispersed
into numerous paths, or modes, as they travel through the cable's core, which
is typically 850 or 1300nm. Typical multimode fiber core diameters are 50,
62.5, and 100 micrometers. However, in long cable runs (greater than 3000
feet [914.4 meters]), multiple paths of light can cause signal distortion at the
receiving end, resulting in an unclear and incomplete data transmission. So,
designers now call for single mode fiber in new applications using Gigabit
and beyond. 
Copper Cable
Networks use copper media because it is inexpensive, easy to install, and has
low resistance to electrical current. However, copper media is limited by
distance and signal interference .
Data is transmitted on copper cables as electrical pulses between networks. A
detector in the network interface of a destination device must receive a signal
that can be successfully decoded to match the signal sent. However, the
longer the signal travels, the more it deteriorates in a phenomenon referred to
as signal attenuation. For this reason, all copper media must follow strict
distance limitations as specified by the guiding standards.
Copper Media
In networking, there are three main types of copper media used:
Unshielded Twisted-Pair (UTP)
Shielded Twisted-Pair (STP)
Coaxial
Fiber Optic Cable
Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties: shielded and unshielded.
Unshielded Twisted Pair (UTP) is the most popular and is generally the best
option for school networks.
Figure 1-23: Unshielded Twisted Pair
The quality of UTP may vary from telephone-grade wire to extremely high-
speed cable. A cable has four pairs of wires inside a jacket. Each pair is
twisted with a different number of twists per inch to help eliminate
interference from adjacent pairs
and other electrical devices. The EIA/TIA (Electronic
Industry Association/Telecommunication Industry Association) has
established standards of UTP and rated five categories of wire.
Type Use
Category 1 Voice Only (Telephone Wire)
Category 2 Data to 4 Mbps (Local Talk)
Category 3 Data to 10 Mbps (Ethernet)
Category 4 Data to 20 Mbps (16 Mbps Token Ring)
Category 5 Data to 100 Mbps (Fast Ethernet)
Category
5e
Data to 10 Gbps (Giga Ethernet)
Category 6 Data to 100 Gbps
Table 1-04: Categories of Unshielded Twisted Pair
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is a RJ-45
connector. This is a plastic connector that looks like a large telephone-style
connector. A slot allows the RJ-45 to be inserted only one way.RJ stands for
Registered Jack, implying that the connector follows a standard borrowed
from the telephone industry.
This standard designates which wire goes with each pin inside the connector.
Figure 1-24: RJ-45 Connector
Shielded Twisted Pair (STP) Cable
A disadvantage of UTP is that it may be susceptible to radio and electrical
frequency interference. Shielded Twisted Pair (STP) is suitable for
environments with electrical interference; however, the extra shielding can
make the cables quite bulky. Shielded twisted pair is often used on networks
using Token Ring technology.
Figure 1-25: Shielded Twisted Pair (STP)
Coaxial Cable
Coaxial Cabling has a single copper conductor at its center. A plastic layer
provides
insulation between the center conductor and a braided metal shield. The metal
shield helps to block any outside interference from fluorescent lights, motors,
and other computers.
Figure 1-26: Coaxial Cable
Coaxial Cable Connectors
The most common type of connector used with coaxial cables is the Bayone-
Neill-Concelman (BNC) connector. Different types of adapters are available
for BNC connectors, including a T-connector, barrel connector, and
terminator. Connectors on the cable are the weakest points in any network.
To help avoid problems with your network, always use the BNC connectors
that crimp, rather than screw, onto the cable.
Figure 1-27: BNC Connector
Fiber Optic Cable
Fiber Optic Cabling consists of a center glass core surrounded by several
layers of protective materials. It transmits light rather than electronic signals,
eliminating the problem of electrical interference. This makes it ideal for
certain environments that contain a large amount of electrical interference.
Due to its immunity to the effects of moisture and lighting, it has become the
standard for connecting networks between buildings.
Fiber optic cable has the ability to transmit signals over much longer
distances than coaxial and twisted pair. It also has the capability to carry
information at vastly greater speeds. This capacity broadens communication
possibilities to include services such as video conferencing and interactive
services. The cost of fiber optic cabling is comparable to copper cabling;
however, it is more difficult to install and modify.
Figure 1-28: Fiber Optic Cable
Fiber Optic Cable Connector
The most common connector used with fiber optic cable is a ST (Straight
Tip) connector. It is barrel shaped, similar to a BNC connector. A newer
connector, the SC (Subscriber Connector), is becoming more popular. It has a
squared face and is easier to connect in a confined space.
Specification Cable Type Maximum Length
10BaseT Unshielded Twisted
Pair
100 meters
10Base2 Thin Coaxial 185 meters
10Base5 Thick Coaxial 500 meters
10BaseF Fiber Optic 2000 meters
Table 1-05: Ethernet Cable Summary
Connections
Point-to-Point:
Computers are connected by communication channels that each
connect exactly two computers with access to full channel
bandwidth
Forms a mesh or point-to-point network
Allows flexibility in communication hardware, packet formats,
etc.
Provides security and privacy because communication channel is
not shared
Number of channels grows as square of number of computers for
n computers: (n2 -n)/2
Shared or Broadcast Channel:
All computers are connected to a shared broadcast-based
communication channel and share the channel bandwidth
Security issues as a result of broadcasting to all computers
Cost effective due to reduced number of channels and interface
hardware components
Concepts of PoE
Power over Ethernet (PoE) is a technology for wired Ethernet Local Area
Networks (LANs) that allows the electrical current necessary for the
operation of each device to be carried by the data cables rather than by power
cords. Doing so minimizes the number of wires that must be strung in order
to install the network. PoE was originally developed in 2003 to support
devices like Wi-Fi Access Points (APs). PoE made AP installations easier
and more flexible, especially on ceilings.
For PoE to work, the electrical current must go into the data cable at the
power-supply end, and come out at the device end, in such a way that the
current is kept separate from the data signal so that neither interferes with the
other. The current enters the cable by means of a component called an
injector. If the device at the other end of the cable is PoE compatible, then
that device will function properly without modification. If the device is not
PoE compatible, then a component called a picker (or tap) must be installed
to remove the current from the cable. This "picked-off" current is routed to
the power jack.
Identifying Interface and Cable Issues
Interface and cable issues can be due to collisions, errors, duplex mismatch or
speed mismatch. To show interface command on a switch displays a ton of
potential errors and problems that might happen due to interface and cable
issues.
Example 1-1: The “show interface” Output on a Cisco Switch
Switch#show interface gi 0/1
GigabitEthernet0/1 is up, line protocol is up (connected)
Hardware is iGbE, address is fa16.3eb4.b62b (bia fa16.3eb4.b62b)
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
https://searchnetworking.techtarget.com/definition/Ethernet
https://searchnetworking.techtarget.com/definition/local-area-network-LAN
https://whatis.techtarget.com/definition/current
https://searchmobilecomputing.techtarget.com/definition/access-point
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Unknown, Unknown, link type is auto, media type is unknown media type
output flow-control is unsupported, input flow-control is unsupported
Auto-duplex, Auto-speed, link type is auto, media type is unknown
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 32562
Queueing strategy: fifo
Output queue: 0/0 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
6783 packets input, 0 bytes, 0 no buffer
Received 14 broadcasts (0 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
108456 packets output, 7107939 bytes, 0 underruns
0 output errors, 0 collisions, 2 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
Switch#
Collisions
A collision is the mechanism used by Ethernet to control access and allocate
shared bandwidth among stations that want to transmit at the same time on
a shared medium. The mechanism where the medium is shared is known as
collision detection. It must exist where two stations can detect that they want
to transmit data at the same time. Collision detection is disabled in full-
duplex Ethernet. Ethernet uses CSMA/CD (Carrier Sense Multiple
Access/Collision Detect) as its collision detection method. Here is a
simplified example of Ethernet operation:
Figure 1-29: Collision Architecture
1. Station A wishes to send a frame. First, it checks if the medium is
available (Carrier Sense). If it is not, it waits until the current
sender on the medium has finished.
2. Suppose Station A believes the medium is available and attempts
to send a frame. Because the medium is shared (Multiple Access),
other senders might also attempt to send at the same time. At this
point, Station B tries to send a frame at the same time as Station A.
3. Shortly after, Station A and Station B realize that there is another
device attempting to send a frame (Collision Detect). Each station
waits for a random amount of time before sending again. The time
after the collision is divided into time slots; Station A and Station
B,each pick a random slot for attempting a retransmission.
4. Should Station A and Station B attempt to retransmit in the same
slot, they extend the number of slots. Each station then picks a
new slot, thereby decreasing the probability of retransmitting in
the same slot.
Errors
Errors may occur in your network for a wide variety of reasons. For example,
there could be electrical interference somewhere, or there is a bad Network
Interface Card that is not able to frame things correctly for the network.
Remember, the Frame Check Sequence often is the source for catching these
errors. Each time a router forwards a packet on an Ethernet network, it
replaces and rewrites the Layer 2 Ethernet header information, along with a
new FCS.
Duplex
This used to be a big concern in Ethernet LANs. Because you might be using
half-duplex due to having hubs in your network, you need to ensure
that duplex mismatches did not occur between full-duplex (switched) areas
and half-duplex areas. Today, auto negotiation to full-duplex between devices
is common. If an older device is hard coded to half-duplex and you code the
LAN device connected to full duplex, a duplex mismatch can still result.
These can be difficult to track down since some packets typically make it
through the connection fine, while others are dropped. In networks that
operate in half duplex, the technology of Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) is used to allow devices to operate on a
half-duplex network.
Speed
Speed is another area where conflict can occur, but is also becoming a less
common problem as technologies advance. For example, 1 Gigabit per
second interfaces is quite common now and operate with each other
seamlessly at 1 Gbps. The issue again is older equipment that might default
to a slower speed causing a speed mismatch.
There are some terms used in the above example, so we need to explore these
terms briefly:
Runts Giants Baby Giant
Frames
Runts are Ethernet
frames that are less
than 64 bytes and may
be caused by excessive
collisions. Of course,
Today many
technologies are
enhancing networks by
adding information to
Ethernet frames. This
What if your Ethernet
frame is just a little
larger than the standard
MTU of 1500 bytes?
Specifically, what if
these frames have
become more rare as
networks have become
nearly collision free
results in Jumbo
Frames (Giants). This
often indicates frames
of 9216 bytes for
Gigabit Ethernet, but
technically can refer to
anything over the
standard IP MTU
(Maximum
Transmission Unit) of
1500 bytes
your frame is 1600
bytes in size? You have
what networkers term
a Baby Giant
Table 1-06: Cable Terminologies
TCP vs. UDP
There are two types of Internet Protocol (IP) traffic. They
are TCP or Transmission Control Protocol and UDP or User Datagram
Protocol. TCP is connection oriented. Once a connection is established, data
can be sent bidirectional. UDP is a simpler, connectionless internet protocol.
Multiple messages are sent as packets in chunks using UDP. Unlike the TCP,
UDP adds no reliability, flow-control, or error-recovery functions to IP
packets. Because of UDP’s simplicity, UDP headers contain fewer bytes and
consume less network overhead than TCP.
The following table demonstrates the comparison of TCP and UDP protocol:
Parameters Transmission Control
Protocol (TCP)
User Datagram Protocol
or Universal Datagram
Protocol (UDP)
Connection TCP is a connection-
oriented protocol
UDP is a connectionless
protocol
Function As a message makes its
way across the internet
from one computer to
another, this is
connection based
UDP is also a protocol
used in message transport
or transfer. This is not
connection based, which
means that one program
can send a load of packets
to another and that would
be the end of the
relationship
Usage TCP is suited for
applications that
require high reliability,
and the transmission
time is relatively less
critical
UDP is suitable for
applications that need fast,
efficient transmission,
such as games. UDP's
stateless nature is also
useful for servers that
answer small queries from
huge numbers of clients
Used by Other
Protocols
HTTP, HTTPs, FTP,
SMTP, Telnet
DNS, DHCP, TFTP,
SNMP, RIP, VOIP
Ordering of Data
Packets
TCP rearranges data
packets in the order
specified
UDP has no inherent
order, as all packets are
independent of each other.
If ordering is required, it
has to be managed by the
application layer
Speed of Transfer The speed for TCP is
slower than UDP
UDP is faster because
error recovery is not
attempted. It is a "best
effort" protocol
Reliability There is an absolute
guarantee that the data
transferred remains
intact and arrives in the
same order in which it
was sent
There is no guarantee that
the messages or packets
sent would reach at all
Header Size TCP header size is 20
bytes
UDP Header size is 8
bytes
Common Header
Fields
Source port,
Destination port,
Check Sum
Source port, Destination
port, Check Sum
Streaming of Data Data is read as a byte
stream, no
distinguishing
Packets are sent
individually and are
checked for integrity only
indications are
transmitted to signal
message (segment)
boundaries
if they arrive. Packets
have definite boundaries,
which are honored upon
receipt, meaning a read
operation at the receiver
socket will yield an entire
message as it was
originally sent
Weight TCP is heavyweight.
TCP requires three
packets to set up a
socket connection,
before any user data
can be sent. TCP
handles reliability and
congestion control
UDP is lightweight. There
is no ordering of
messages, any tracking
connections, etc. It is a
small transport layer
designed on top of IP
Data Flow Control TCP does Flow
Control. TCP requires
three packets to set up
a socket connection,
before any user data
can be sent. TCP
handles reliability and
congestion control
UDP does not have an
option for flow control
Error Checking TCP does error
checking and error
recovery. Erroneous
packets are
retransmitted from the
source to the
destination
UDP does error checking
but simply discards
erroneous packets. Error
recovery is not attempted
Fields 1. Sequence Number 2.
AcK Number 3. Data
Offset 4. Reserved 5.
Control Bit 6. Window
7. Urgent Pointer 8.
1. Length 2. Source Port 3.
Destination Port 4. Check
Sum
Options 9. Padding 10.
Check Sum 11. Source
Port, 12. Destination
Port
Acknowledgement Acknowledgement
segments
No Acknowledgment
Handshake SYN, SYN-ACK,
ACK
No handshake
(connectionless protocol)
Table 1-07: Comparison of TCP and UDP Protocol
TCP and UDP Working
Figure 1-30: TCP and UDP Working
IPv4 Addressing and Subnetting
In this topic, we are going to explore IPV4 addressing and subnetting. So first
of all, you should know what an IP address is.
IP Address: IP address is the way to present a host in a network or, in simple
words, a unique string of numbers separated by full stops that identifies each
computer using the Internet Protocol to communicate over a network. An
example is given below:
192 . 168 . 1 . 4
11000000 10101000 00000001 00000100
One byte = Eight bits
Thirty-Two bits (4*8), or 4 bytes
An IPv4 address is a 32-bit number that we like to represent in dotted
decimal notation. Consider using a conversion chart for the 8 bits that exist in
an octet to help you with the various subnetting exercises you might
encounter in the exam.
A Conversion Chart for IPv4 Addressing and Subnetting
Questions
128 64 32 16 8 4 2 1
Table 1-08: Comparison Chart for IPV4 Addressing and Subnetting
Example: We have to calculate 186 then we will ON these bits: 10111010.
So from above table, you can easily calculate these values.
CIDR (Classless Inter-Domain Routing) is a slash notation of subnet mask.
CIDR tells us the number of on bits in a network address.
IPv4 address is a 32 bit, 4-octet number in a format of 192.168.1.1/24
/24 is CIDR notation, it defines the number of host and networks.
Earlier on, in the development of TCP/IP, the designers created address
classes to attempt towardaccommodate networks of various sizes. Notice that
they did this by setting the initial bit values
IP addresses are broken into the two components:
Network Component: Defines network segment of device.
Host Component: Defines the specific device on a particular network
segment
Address Class High-Order Bit Setting 1st Octet Range in Decimal
A 0 0.0.0.0 –
127.255.255.255
(1 – 127)
B 10 128.0.0.0 –
191.255.255.255
(128 – 191)
C 110 192.0.0.0 –
223.255.255.255
(192 – 223)
D (Multicast) 1110 224.0.0.0 –
239.255.255.255
(224 – 239)
E (Experimental) 240.0.0.0 –
254.255.255.255
(240 – 254)
Table 1-09: Ipv4 Address Range
0 [Zero] is reserved and represents all IP addresses
127 is a reserved address and is used for testing, like a loop back
on an interface. For example: 127.0.0.1
255 is a reserved address and is used for broadcasting purposes
IPV4 Subnetting: Subnetting is a process of dividing a large network into
the smaller networks based on layer 3 IP address. Every computer on network
has an IP address that represent its location on the network. Two versions of
IP addresses are available, which are IPv4 and IPv6. In this workbook, we
will perform subnetting on IPv4.
Another critical memorization point here is the default subnet masks for these
address classes. Remember, it is the job of the subnet mask to define what
portion of the 32-bit address represents the network portion versus the host
portion. The table below defines the default masks.
Address Class Default Mask Prefix Notation Mask Bits
A 255.0.0.0 /8
B 255.255.0.0 /16
C 255.255.255.0 /24
Table 1-10: IPV4 Subnetting
Note that subnet masks must use continuous on bits (1). This results in the
only possible values in a subnet mask octet as shown in the table below:
ON Bits Value
11111111 255
11111110 254
11111100 252
11111000 248
11110000 240
11100000 224
11000000 192
10000000 128
0 0
Table 1-11: Subnet Mask Values
Subnet Mask: Subnet Mask is a 32-bit long address used to distinguish
between network address and host address in IP address. Subnet mask is
always used with IP address. Subnet mask has only one purpose, to identify
which part of an IP address is network address and which part is host address.
For example, how will we figure out network partition and host partition
from IP address 192.168.1.4? Here, we need subnet mask to get details about
network address and host address.
In decimal notation subnet mask value 1 to 255 represent network address
and value 0 [Zero] represent host address.
In binary notation subnet mask, ON bit [1] represents network address
while OFF bit [0] represents host address.
In Decimal Notation
IP address 192.168.1.4
Subnet mask 255.255.255.0
Network address is 192.168.1.0 and host address is 192.168.1.4. The binary
notation for the host address will be:
In Binary Notation
IP address 11000000.10101000.00000001.00000100
Subnet mask 11111111.11111111.11111111.00000000
Network address is 11000000.10101000.00000001 and host address is
00001010.
Advantages of Subnetting
Subnetting breaks a large network in smaller networks and smaller
networks are easier to manage
Subnetting reduces network traffic by removing collision and
broadcast traffic, that overall improves performance
Subnetting allows you to apply network security polices at the
interconnection between subnets
Subnetting allows you to save money by reducing the requirement
for IP range
Example Class C Subnetting
192.168.1.4/27
CIDR /27 has subnet mask 255.255.255.224 and 224 is 11100000 in
binary. We used three host bits in network address.
Default Subnet Mask _ Host_
11111111. 11111111. 11111111. 111 00000
N (We have used three host bits as network bit to extend the default subnet
mask ----- N=3 H=5)
Subnet Mask: 255.255.255.224
N = 3
H = 5
Total subnets (2N): 2^3 = 8
Block size (256 - subnet mask): 256 - 224 = 32
Valid_subnets(Count_blocks_from_0):0,32,64,96,128,160,192,224
(0+32=32, 32+32=64, 32+64=96, 96+32=128 and so on…….)
Total hosts (2H): 2^5 = 32
Valid hosts per subnet (Total host - 2): 32 - 2 = 30
Subnets Sub
1
Sub
2
Sub
3
Sub
4
Sub
5
Sub
6
Sub
7
Sub
8
Network ID 0 32 64 96 128 160 192 224
First host 1 33 65 97 129 161 193 225
Last host 30 62 94 126 158 190 222 254
Broadcast
ID
31 63 95 127 159 191 223 255
Table 1-12: Subnet Mask Status
You can see clearly that 192.168.1.4 belongs to Subnet 1, so by using this
simple method, you can calculate things easily.
Network Id: 192.168.1.0
Valid First Host IP Address: 192.168.1.1
Next: 192.168.1.2
.
Our Host: 192.168.1.4
.
.
Last Host in this Subnet: 192.168.1.30
Broadcast: 192.168.1.31
Example 2: Given- 172.18.27.0 123 Hosts
172 . 18 . 27 . 0
101011000 000100100 00011011 00000000
Find: Network ID, Broadcast ID, Subnet Mask, 1st usable, last usable, # of
subnets:
Now, how we can find 300 hosts? For this, we have to use 2^. If we do 2^7,
then we can get 123 hosts in the range of 128 hosts (2^7 = 128).
Default Subnet Mask _ Host_
11111111 . 11111111 . 11111111 . 1 0000000
N (We have used one host bits as network bit to extend the default
subnet mask ----- N=1 H=7)
Subnet Mask: 255.255.255.128
N = 1
H = 7
Total Subnets ( 2^N ): 2^1 = 2
Block Size (256 - subnet mask): 256 - 128 = 128
Valid Subnets(Count_blocks_from_0): 0,128 (0+128 = 128)
Total Hosts (2^H): 2^7 = 128
Valid Hosts Per Subnet (Total host - 2): 128 - 2 = 126
Subnets Sub 1 Sub 2
Network ID 172.18.27.0 172.18.27.128
First Host 172.18.27.1 172.18.27.129
Next Host 172.18.27.2 172.18.27.130
. . .
. . .
Last Host 172.18.27.126 172.18.27.255
Broadcast ID 172.18.27.127 172.18.27.256
Table 1-13: Subnet Mask Table
The Need for Private IPv4 Addressing
The designers of IPv4 created private address space to help alleviate the
depletion of IPv4 addresses. This address space is not routable on the public
internet. The address space can be used as needed inside corporations and
would then be translated using Network Address Translation (NAT) to allow
access to and through the public internet.
The use of private addresses and NAT is tending to see the same addresses
ranges used in homes today (typically in the 192.168.1.X range). Table
below shows you the private address space:
Address Class Range of Private Addresses
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255.255
Table 1-14: The IPv4 Private Address Ranges
Case Study
A local bank in your city has recently revamped their WAN and LAN
network. The bank has 14 branches in the city connected to Head Office over
frame relay network. All links are point to point (unique subnet). The Head
office has around 400 hosts and each of the branches has 15 to 20 hosts. You
are assigned the task of designing the private network schema for the bank.
Solution
You have decided to use the Class A “10.0.0.0” network segment for the
bank network.
Figure 1-31: IPV4 Addressing and Subnetting
Head Office LAN
Let’s start with HO (Head Office) LAN, which has 400 hosts. You discussed
with your senior and he advised that 400 hosts in a single segment could
create a lot of broadcast traffic. You decided to break the LAN segment into
two subnets.
1. Network: 10.0.0.0 Mask: 255.0.0.0
You only need 200 hosts in your LAN segment.
Use the formula 2^n – 2 to calculate the number of hosts per subnet, where n
is the number of bits for the host portion.
2. No of Hosts:(2^8)-2=254
Default Class A
Subnet Mask
Decimal255 0 0 0
Binary 11111111 00000000 00000000 00000000
As n=8, starting from the far left will keep the last 7 values as "0" and rest of
all as "1"
New Subnet
Mask
Binary 11111111 11111111 11111111 00000000
Decimal255 255 255 0
LAN Subnet 1
Network Address 10 1 1 0
Subnet Mask 255 255 255 0
Broadcast
Address 10 1 1 255
First Host 10 1 1 1
Last Host 10 1 1 254
LAN Subnet 2
Network Address 10 1 2 0
Subnet Mask 255 255 255 0
Broadcast
Address 10 1 2 255
First Host 10 1 2 1
Last Host 10 1 2 254
Branches LAN
No of branches:14
No of hosts in each branch: 15-20
No of Hosts: (2^5)-2=30
No of Subnets: (2^5)-2=30
Note: We could have taken (2^4)-2=14 for the number of networks but it will
just be enough for the current scenario. We should always leave some buffer
for future expansion.
We will start from subnet 10.1.3.0/27, which will give us 30 hosts in each
subnet.
Branch
Network
Address Subnet Mask
Broadcast
Address
First
Host Last Host
1 10.1.3.0 255.255.255.224 10.1.3.31 10.1.3.1 10.1.3.30
2 10.1.3.32 255.255.255.224 10.1.3.65 10.1.3.33 10.1.3.64
3 10.1.3.66 255.255.255.224 10.1.3.95 10.1.3.67 10.1.3.94
4 10.1.3.96 255.255.255.224 10.1.3.127 10.1.3.97 10.1.3.126
5 10.1.3.128 255.255.255.224 10.1.3.159 10.1.3.12910.1.3.158
6 10.1.3.160 255.255.255.224 10.1.3.191 10.1.3.16110.1.3.190
7 10.1.3.192 255.255.255.224 10.1.3.223 10.1.3.19310.1.3.222
8 10.1.3.224 255.255.255.224 10.1.3.255 10.1.3.22510.1.3.254
9 10.1.4.0 255.255.255.224 10.1.4.31 10.1.4.1 10.1.4.30
10 10.1.4.32 255.255.255.224 10.1.4.65 10.4.1.33 10.1.4.64
11 10.1.4.66 255.255.255.224 10.1.4.95 10.1.4.67 10.1.4.94
12 10.1.4.96 255.255.255.224 10.1.4.127 10.1.4.97 10.1.4.126
13 10.1.4.128 255.255.255.224 10.1.4.159 10.1.4.12910.1.4.158
14 10.1.4.160 255.255.255.224 10.1.4.191 10.1.4.16110.1.4.190
Table 1-15: LAN Branch Status
WAN
As all the links are point to point; there will be 14 subnets in total with each
subnet having 2 hosts.
No of hosts (routers) in each subnet: 2
No of point-to-point segments: 14
No of Hosts: (2^1)-2=2
No of Subnets (2^5)-2=30
We will start from subnet 10.1.3.0/30, which will give us 2 hosts in each
subnet.
WAN
Network
Address Subnet Mask
Broadcast
Address First Host
Last
Host
1 10.1.5.0 255.255.255.252 10.1.5.3 10.1.5.1 10.1.5.2
2 10.1.5.4 255.255.255.252 10.1.5.7 10.1.5.5 10.1.5.6
3 10.1.5.8 255.255.255.252 10.1.5.11 10.1.5.9 10.1.5.10
4 10.1.5.12 255.255.255.252 10.1..5.15 10.1.5.13 10.1.5.14
5 10.1.5.16 255.255.255.252 10.1.5.19 10.1.5.17 10.1.5.18
6 10.1.5.20 255.255.255.252 10.1.5.23 10.1.5.21 10.1.5.22
7 10.1.5.24 255.255.255.252 10.1.5.27 10.1.5.25 10.1.5.26
8 10.1.5.28 255.255.255.252 10.1.5.31 10.1.5.29 10.1.5.30
9 10.1.5.32 255.255.255.252 10.1.5.35 10.1.5.33 10.1.5.34
10 10.1.5.36 255.255.255.252 10.1.5.39 10.1.5.37 10.1.5.38
11 10.1.5.40 255.255.255.252 10.1.5.43 10.1.5.41 10.1.5.42
12 10.1.5.44 255.255.255.252 10.1.5.47 10.1.5.45 10.1.5.46
13 10.1.5.48 255.255.255.252 10.1.5.51 10.1.5.49 10.1.5.50
14 10.1.5.52 255.255.255.252 10.1.5.55 10.1.5.53 10.1.5.54
Table 1-16: WAN Branch Status
IPv6 Addressing and Prefix
IPv6, formerly named IPng (next generation), is the latest version of the
Internet Protocol (IP). IP is a packet-based protocol used to exchange data,
voice, and video traffic over digital networks. IPv6 was proposed when it
became clear that the 32-bit addressing scheme of IP version 4 (IPv4) was
inadequate to meet the demands of internet growth. After extensive
discussion, it was decided to base IPng on IP but add a much larger address
space and improvements such as a simplified main header and extension
headers. IPv6 is described initially in RFC 2460, Internet Protocol, Version 6
(IPv6). Specification, issued by the Internet Engineering Task Force (IETF).
Further RFCs describe the architecture and services supported by IPv6.
Internet Protocol version 6 (IPv6) expands the number of network address
bits from 32 bits (in IPv4) to 128 bits, which provides more than enough
globally unique IP addresses for every networked device on the planet. The
unlimited address space provided by IPv6 allows Cisco to deliver more and
newer applications and services with reliability, improved user experience,
and increased security.
Implementing basic IPv6 connectivity in the Cisco software consists of
assigning IPv6 addresses to individual device interfaces. IPv6 traffic
forwarding can be enabled globally, and Cisco Express Forwarding switching
for IPv6 can also be enabled. The user can enhance basic connectivity
functionality by configuring support for AAAA (Authentication,
Authorization, Accounting, and Auditing) record types in the Domain Name
System (DNS) name-to-address and address-to-name lookup processes, and
by managing IPv6 neighbor discovery.
Restrictions for Implementing IPv6 Addressing and Basic Connectivity
IPv6 packets are transparent to Layer 2 LAN switches because the switches
do not examine Layer 3 packet information before forwarding IPv6 frames.
Therefore, IPv6 hosts can be directly attached to Layer 2 LAN switches.
Multiple IPv6 global addresses within the same prefix can be configured on
an interface.
IPv6 Address Formats
IPv6 addresses are represented as a series of 16-bit hexadecimal fields
separated by colons (:) in the format: x:x:x:x:x:x:x:x. Following are two
examples of IPv6 addresses:
2001:DB8:7654:3210:FEDC:BA98:7654:3210
2001:DB8:0:0:8:800:200C:417A
IPv6 addresses commonly contain successive hexadecimal fields of zeros.
Two colons (::) may be used to compress successive hexadecimal fields of
zeros at the beginning, middle, or end of an IPv6 address (the colons
represent successive hexadecimal fields of zeros). The table below lists
compressed IPv6 address formats.
A double colon may be used as part of the ipv6-address argument when
consecutive 16-bit values are denoted as zero. You can configure multiple
IPv6 addresses per interfaces, but only one link-local address.
Exam Tip
Two colons (::) can be used only once in an IPv6 address to represent the
longest successive hexadecimal fields of zeros. The hexadecimal letters in
IPv6 addresses are not case-sensitive.
IPv6
Address
Type
Preferred Format Compressed Format
Unicast 2001:0:0:0:DB8:800:200C:417A 2001::DB8:800:200C:417A
Multicast FF01:0:0:0:0:0:0:101 FF01::101
Loopback 0:0:0:0:0:0:0:1 ::1
Unspecified 0:0:0:0:0:0:0:0 ::
Table 1-17: Compressed IPv6 Address Formats
The loopback address listed in the table above may be used by a node to send
an IPv6 packet to itself. The loopback address in IPv6 functions the same as
the loopback address in IPv4 (127.0.0.1).
Exam Tip
The IPv6 unspecified address cannot be assigned to an interface. The
unspecified IPv6 addresses must not be used as destination addresses in
IPv6 packets or the IPv6 routing header.
An IPv6 address prefix, in the format ipv6-prefix/prefix-length, can be used
to represent bit-wise contiguous blocks of the entire address space. The ipv6-
prefix must be in the form documented in RFC 2373 where the address is
specified in hexadecimal using 16-bit values between colons. The prefix
length is a decimal value that indicates how many of the high-order
contiguous bits of the address comprise the prefix (the network portion of the
address). For example, 2001:DB8:8086:6502::/32 is a valid IPv6 prefix.
IPv6 Subnetting
Figure 1-32: IPv6 Subnetting
As shown in the figure, IPv6 address can be subnetted in three ways. You can
either divide Site bits, Sub Site bits and Host bits or Only in Site and Host
bits for large host support.
IPv6 Packet Header
The basic IPv4 packet header has 12 fields with a total size of 20 octets (160
bits) (see the figure below). The 12 fields may be followed by an Options
field, which is followed by a data portion that is usually the transport-layer
packet. The variable length of the Options field adds to the total size of the
IPv4 packet header. The shaded fields of the IPv4 packet header shown in the
figure below are not included in the IPv6 packet header.
Figure 1-33: IPv4 Packet Header Format
The basic IPv6 packet header has 8 fields with a total size of 40 octets (320
bits). Fields were removed from the IPv6 header because, in IPv6,
fragmentation is not handled by devices and checksums at the network layer
are not used. Instead, fragmentation in IPv6 is handled by the source of a
packet and checksums at the data link layer and transport layer are used. In
IPv4, the UDP transport layer uses an optional checksum. In IPv6, use of the
UDP checksum is required to check the integrity of the inner packet.
Additionally, the basic IPv6packet header and Options field are aligned to 64
bits, which can facilitate the processing of IPv6 packets.
Field Description
Version Similar to the Version field in the IPv4 packet header,
except that the field lists number 6 for IPv6 instead of
number 4 for IPv4
Traffic Class Similar to the Type of Service field in the IPv4 packet
header, the Traffic Class field tags packets with a traffic
class that is used in differentiated services
Flow Label A new field in the IPv6 packet header, the Flow Label
field tags packets with a specific flow that differentiates
the packets at the network layer
Payload
Length
Similar to the Total Length field in the IPv4 packet header,
the Payload Length field indicates the total length of the
data portion of the packet
Next Header Similar to the Protocol field in the IPv4 packet header, the
https://www.cisco.com/c/dam/en/us/td/i/000001-100000/50001-55000/51001-51500/51457.ps/_jcr_content/renditions/51457.jpg
value of the Next Header field determines the type of
information following the basic IPv6 header. The type of
information following the basic IPv6 header can be a
transport-layer packet, for example, a TCP or UDP packet,
or an Extension Header, as shown in the figure
immediately above
Hop Limit Similar to the Time to Live field in the IPv4 packet header,
the value of the Hop Limit field specifies the maximum
number of devices that an IPv6 packet can pass through
before the packet is considered invalid. Each device
decrements the value by one. Because no checksum is in
the IPv6 header, the device can decrement the value
without needing to recalculate the checksum, which saves
processing resources
Source
Address
Similar to the Source Address field in the IPv4 packet
header, except that the field contains a 128-bit source
address for IPv6 instead of a 32-bit source address for IPv4
Destination
Address
Similar to the Destination Address field in the IPv4 packet
header, except that the field contains a 128-bit destination
address for IPv6 instead of a 32-bit destination for IPv4
Table 1-18: IPv6 Header Field
Following the eight fields of the basic IPv6 packet header, which are optional
extension headers and the data portion of the packet. If present, each
extension header is aligned to 64 bits. There is no fixed number of extension
headers in an IPv6 packet. The extension headers form a chain of headers.
Each extension header is identified by the Next Header field of the previous
header. Typically, the final extension header has a Next Header field of a
transport-layer protocol, such as TCP or UDP.
IPv6 Addressing and Subnetting
The IPv6 address format is eight sets of four hex digits. A colon separates
each set of four digits. For example:
2001:1111: A231:0001:2341:9AB3:1001:19C3
Remember, there are two rules for shortening these IPv6 address:
Once in the address, you can represent consecutive sections of
0000s with a double colon (::)
As many times as you can in the address, you can eliminate
leading 0s; you can even take a section of all zeros (0000) and
represent it as simply 0
Here is an example of the application of these rules to make the address the
most convenient to read and type:
2001:0000:0011: 0001:0000:0000: 0001:1AB1
2001:0:11:1::1:1AB1
You present the subnet mask in prefix notation only. For example, an IPv6
address, that uses the first 64 bits to represent the network could be shown as:
2001:0:11:1::1:1AB1 /64
This section of your exam blueprint focuses on the global unicast address
space for IPv6. These function like the public IPv4 addresses that we are
accustomed to. Other types of IPv6 addresses are elaborated upon later in this
chapter.
The Internet Assigned Numbers Authority (IANA) does the management of
the IPv6 address space. IANA assigns blocks of address spaces to regional
registries, who then allocate address spaces to network service providers.
Your organization may request address spaces from a service provider. For
example, a company may be assigned the address space similar to
2001:DB8:6783: :/48 and from that network address space, they can create
and use subnets.
To simplify subnetting in IPv6, companies often use a /64 mask. Remember,
this means a 64-bit network portion and a 64-bit host portion.
IPv6 Stateless Address Auto Configuration
If you think the ability to have the IPv6 network device configure its own
host address (modified EUI) is pretty awesome, what is even more exciting is
having one network device assist another in the assignment of the entire
address. This is Stateless Address Auto Configuration (SLAAC). Stateless
simply means that a device is not keeping track of the address
information. For example, in IPv4 and IPv6, you can use a DHCP server in a
“stateful” manner. A DHCP device provides the address information that
devices need, and tracks this information in a database. Obviously, there is a
fair amount of overhead involved in this process for the DHCP server.
Fortunately, in IPv6, you can use SLAAC and stateless DHCP to provide a
host with all of the information it might need. This of course includes things
like the IPv6 address, the prefix length, the default gateway address, and the
DNS server(s) address.
With SLAAC, the IPv6 device learns its prefix information automatically
over the local link from another device (such as the router), and then can
randomly assign its own host portion of the address. Remember, since
SLAAC cannot provide additional information such as DNS server addresses,
we often combine SLAAC with the use of stateless DHCP in IPv6.
Note
Remember, Cisco routers that support IPv6 are ready for any of the IPv6
interface addressing methods with no special configuration. However, if the
router needs to run IPv6 routing protocols (such as OSPF or EIGRP), you
must use the ipv6 unicast-routing command as was discussed earlier in this
chapter.
What’s wrong with IPv4?
Addressing
Not enough addresses-
Current addressing scheme allows for over 2 million networks, but
most are Class “C”, which are too small to be useful
Most of the Class “B” networks have already been assigned
Quality of Service
Flow control and QoS options are not available in IPv4 header that
allows better connections of high bandwidth and high reliability
applications
Security
IP packets can be easily snooped from the network
No standard for authentication of the user to a server
No standard for encryption of data in packets
Packet Size
Maximum packet size is 216 – 1 (65,535)
May be too small considering newer, faster networks
IPv6 Enhancements
• Expanded address space up to 128 bits
• Improved option mechanism by separating optional headers between
IPv6 header and transport layer header
• Improved speed and simplified router processing
• Dynamic assignment of addresses and auto configuration
• Increased addressing flexibility by anycast (delivered to one of a set of
nodes) and improved scalability of multicast addresses
• Support for resource allocation
– Replaces type of service
– Labeling of packets to particular traffic flow
– Allows special handling, e.g., real time video
Mind Map
Figure 1-34: Mind Map of Network Fundamentals
IPv6 Address Types
IPv6 address types are defined in RFC 4291, IP Version 6 Addressing
Architecture. In this section, we examine a brief look at the different types of
IPv6 addresses that are as follows:
Figure 1-35: IPv6 Address Types
Note
IPv6 does not have a broadcast address. Other options exist in IPv6, such as
a solicited-node multicast address and an all-IPv6 devices multicast
address.
Global Unicast
Global Unicast Addresses (GUAs) are globally routable and reachable in the
IPv6 Internet; they are equivalent to public IPv4 addresses. GUA addresses
are also known as aggregatable global unicast addresses. It contains global
routing prefix, subnet ID and interface ID. They have global unicast prefix.
These addresses are used on those links that are aggregated upward
eventually to ISPs (InternetService Provider). The initial 3 bits are set from
001 to 111 hence ranges from 2000::/3 to E000::/3 having 64 bit EUI.
Figure 1-36: Aggregatable Global Address
Unique Local
Unique Local is similar to the concept of private use only addresses (RFC
1918) in IPv4 and not intended to be routable in the IPv6 Internet. However,
unlike RFC 1918 addresses, these addresses are not intended to be state-fully
translated to a global unicast address.
Figure 1-37: Unique Local Address
Link Local
As the name makes it clear, these addresses only function on the local link.
IPv6 devices automatically generate them in order to perform many
automated functions between devices. The Link Local address uses the prefix
FE80: :/10. These addresses are used for Stateless Auto-Configuration and
Neighbor Discovery Protocol.
Figure 1-38: Link Local Address
Anycast
An IPv6 anycast address is an address that can be assigned to more than one
interface (typically different devices). In other words, multiple devices can
have the same anycast address. A packet sent to an anycast address is routed
to the “nearest” interface having that address, according to the router’s
routing table.
There is no special prefix for an IPv6 anycast address. An IPv6 anycast
address uses the same address range as global unicast addresses. Each
participating device is configured to have the same anycast address. For
example, servers A, B, and C in the below figure could be DHCPv6 servers
with a direct Layer 3 connection into the network. These servers could
advertise the same /128 address using OSPFv3. The router nearest the client
request would then forward packets to the nearest server identified in the
routing table.
Figure 1-39: Anycast Address
Multicast
Just like in an IPv4 environment, multicast traffic is beneficial in IPv6.
Remember, multicasting means a packet is sent to a group of devices
interested in receiving the information. In IPv6, multicasting actually replaces
completely the IPv4 approach of broadcasting. In IPv6, if your device wants
to reach all devices, it sends traffic to the IPv6 multicast address of FF02::1.
Modified EUI 64
Modified Extended Unique Identifier (EUI) is an IPv6 feature that allows the
host to assign IPv6 EUI-64 to itself. EUI is of 64 bits. It eliminates the need
of manual configuration and DHCP as a key benefit over IPv4. EUI-64 is
formed by 48-bit MAC address including 16-bit FFFE in the middle of the
OUI and NIC.
Figure 1-40: Modified EUI-64
IP Parameters for Client OS (Windows, Mac OS, Linux)
An operating system is considered to be the backbone of any system. Without
an operating system, users and systems cannot interact. We mainly have three
kinds of operating systems namely, Linux, MAC, and Windows. To begin
with, MAC is an OS which focuses on graphical user interface and was
developed by Apple Inc. for their Macintosh systems. Microsoft developed
the Windows operating system. It was developed so as to overcome the
limitation of the MS-DOS operating system. Linux is UNIX like a source
software and can use an operating system that provides full memory
protection and multi-tasking operations.
Windows
In order to verify OS Parameters for windows operating system, following
steps are used:
1. Open the Command Prompt and enter the ipconfig command. It
will display the list of all the connections.
https://www.educba.com/windows-interview-questions/
Figure 1-41: The “ipconfig” Command
Here, you can see the IP address is 192.168.100.108; we will change this
address by providing the system static IP address.
2. Click on Adaptor setting, you will see this window that shows the
connected media to the operating system.
 
Figure 1-42: Network Connections
3. Right click on “Wi-Fi”. Select “Properties”, you will see this
window:
Figure 1-43: Wi-Fi Properties
4. After selecting properties, select the “Internet Protocol Version 4
(TCP/IPv4)” option. Then assign the new IP address, DNS server
and alterate DNS server to the system.
Figure 1-44: Internet Protocol Version 4 Properties
5. After providing the Static IP address, verify the IP address
parameters by executing the ipconfig command on command
prompt.
Figure 1-45: Command Prompt
Linux
In order to verify OS Parameters for Linux Operating system, follow the
steps which are given below:
1. Open the Terminal and enter the ifconfig command. It will display
the list of all the connections.
Figure 1-46: Kali Linux
Figure 1-47: The “ifconfig” Command
Here, you can see the IP address is 192.168.100.125 netmask 255.255.255.0
and broadcast 192.168.100.255, we will change this address by providing the
system static IP address.
2. Click on “Settings, then select “network”. You will see the
window that shows the connected media to the operating system.
Figure 1-48: Kali Linux Setting
In wired, go to “Setting”, the next window will appear.
3. Select “IPv4” and provide the new static IP address, netmask,
gateway and DNS server.
Figure 1-49: Wired Connections
4. Select “Manual” and provide the fields.
Figure 1-50: Wired Settings
Mac OS
1. To set up a network connection on MAC OS, select “Setting”, go
to “System Preferences” and click on “Network”.
Figure 1-51: System Preferences
2. A new network window will open, change the location from
automatic to “Manual”.
Figure 1-52: Network Settings
3. Provide the appropriate IP address and subnet mask and then click
the “Advanced” button.
Figure 1-53: Ethernet Status
4. Select the DNS tab and then click the “+” button.
Figure 1-54: Ethernet DNS Settings
5. Enter the DNS server address and then click “Ok”.
Figure 1-55: Ethernet DNS Server
6. Now, click the “Apply” button to save the changes.
Figure 1-56: Providing Static IP Address
Wireless Principles
Wireless is a popular networking technology. By using this technology, we
can exchange the information between two or more devices. To establish a
reliable system, there are some challenges that are discussed below:
Non-overlapping Wi-Fi channels
There are channel settings in your router's settings. Most routers have channel
settings that are set to "Auto", but if you look through the channels, there are
at least a dozen of WLAN channels. So how do you know which Wi-Fi
channels are faster than the others in that list? Choosing the suitable Wi-Fi
channel can vastly improve your Wi-Fi coverage and performance. But even
if you discover the fastest channel there, it does not always mean you should
select it right away.
Various frequency bands (2.4GHz, 3.6 GHz, 4.9 GHz, 5 GHz, and 5.9 GHz)
have their own range of channels. Usually, routers will use the 2.4GHz band
with a total of 14 channels, however in reality, it may be 13 or even less that
are used around the world.
There are five combinations of available non-overlapping channels, which are
given below:
Figure 1-57: Wi-Fi Channels
From the diagram above, it can be seen that Wi-Fi channels 1, 6, 11, or 2, 7,
12, or 3, 8, 13 or 4, 9, 14 (if allowed) or 5, 10 (and possibly 14 if allowed)
can be used together as sets.
All Wi-Fi versions through 802.11n (a, b, g, n) work between the channel
frequencies of 2400 and 2500 MHz. These 100 MHz in between are split in
14 channels, 20 MHz each. As a result, each 2.4GHz channel overlaps with
two to four other channels (see diagram above). Overlapping makes wireless
network throughput quite poor. Most common channels for 2.4 GHz Wi-Fi
are 1, 6, and 11, because they do not overlap with one another.
The whole spectrum is 100 MHz wide and the channel centers are separated
by 5 MHz only. This leaves no choice to eleven channels but to overlap.
SSID
The Service Set Identifier (SSID) is an ASCII string that is used to establish
wireless networking devices and maintain wireless connectivity. Same SSIDs
can be used by multiple access points on a network or sub-network. They are
case sensitive and can contain up to 32 alphanumeric characters.
You may configure up to 16 SSIDs on your access point and assign different
configuration settingsto each SSID. All the SSIDs may be active at the same
time; that is, client devices can associate to the access point using any of
the SSIDs. Following are some settings you can assign to each SSID:
VLAN
Client authentication settings
Client authenticated key management settings
Insert AP or Authentication Parameter (while using AP to AP
links, such as bridges)
Insert Management frame protection settings (Cisco
MFP/802.11w)
Maximum number of client associations by using the SSID
RADIUS accounting for traffic using the SSID
Guest mode (it defines if the SSID string should be broadcasted in
the beacons)
Define legacy AP to AP authentication method, once using PSK or
LEAP security in AP to AP links
Redirection of packets received from client devices
If you want the access point SSID to be visible to all wireless clients,
including clients not having a profile to that particular SSID, you can setup a
guest SSID. The access point mentions the guest SSID in its beacon. If the
guest mode is disabled, the AP will still send beacons for this SSID, but
the SSID string will not be mentioned.
If your access point is projected to be a repeater or a non-root bridge, you can
setup credentials, on the repeater or on the non-root bridge side, so that the
root or primary AP can authenticate the repeater or the non-root bridge. You
can assign an authentication username and password to the repeater-
mode SSID to allow the repeater to authenticate to your network like a client
device.
If your network uses VLANs, you can allocate to individual SSID a VLAN,
and client devices using the SSIDs that are grouped in VLANs.
RF
RF stands for radio frequency. It is a wireless communication that initiated at
the turn of the 20th century, more than 100 years ago, when Marconi
established the first successful and practical radio system. A Radio
Frequency (RF) signal refers to a wireless electromagnetic signal used as a
form of communication. It is an alternating current that inputs to an antenna,
to generate an electromagnetic field that can be used
for wireless broadcasting and/or communications. The field is referred to as
an RF field or a radio wave. Radio waves are a form of electromagnetic
radiation with identified radio frequencies that range from 3 kHz to 300 GHz.
Encryption
As encryption is defined at the interface (VLAN or radio) level of the access
point, and can be common to several SSIDs, encryption is usually configured
before the SSID and its authentication mechanism. Just as someone within
range of a radio station can tune to the station's frequency and listen to the
signal, any wireless networking device within range of an access point can
receive the access point's radio transmissions. Because encrypted
communication is the initial line of defense against attackers, Cisco
recommends that you use full encryption on your wireless network.
The original encryption mechanism described in the 802.11 standard is WEP
(Wired Equivalent Privacy). The encryption of WEP scrambles the
communication between the access point and client devices to keep the
communication private. In this mode, WEP keys are statically defined by the
client and the AP. The access point and client devices both uses the same
WEP key to encrypt and unencrypt radio signals. WEP keys encrypt mutually
unicast and multicast messages. Unicast messages are addressed to just a
single device on the network. Multicast messages are addressed to multiple
devices on the network.
Virtualization Fundamentals
A virtual machine is a computer software program that runs an operating
system and applications. Each virtual machine contains its own virtual, or
software-based, hardware, including a virtual CPU, memory, hard disk, and
network interface card.
Virtualization is the process of creating a software-based, or virtual,
representation of something, such as virtual applications, servers, storage and
networks. It is the single most effective way to reduce IT expenses while
boosting efficiency and agility for all size businesses.
Benefits of Virtualization
Virtualization can increase IT agility, adaptability and versatility while
making critical cost deductions. Greater workload mobility, increased
performance and availability of resources, automated operations, these
benefits of virtualization make IT simpler to manage and less costly to
possess and work. Additional benefits include:
Reduced capital and operating or working expenses
Downtime is minimized or eliminated
Increased IT profitability, proficiency agility and responsiveness
Provide faster provisioning of applications and resources
Greater business coherence and disaster recovery
Simplified data center management
Availability of a genuine Software-Defined Data Center
Types of Virtualization
There are three main types of virtualization that are as follows:
Server Virtualization
Server virtualization allows multiple operating systems to run on a single
physical server as highly proficient virtual machines. Key advantages of
server virtualization includes:
Greater IT efficiencies
Reduced operating or working expenses
Quicker workload deployment
Improved application performance
Higher server accessibility
Eliminated server sprawl and difficulty
Network Virtualization
Network virtualization presents logical networking devices and services such
as logical ports, switches, routers, firewalls, load balancers, VPNs and more
https://www.vmware.com/topics/glossary/content/server-virtualization
https://www.vmware.com/topics/glossary/content/network-virtualization
to connected workloads. Network virtualization enables applications to run
on a virtual network as if they were running on a physical network yet with
more prominent operational advantages and all the hardware equipment
independencies of virtualization. 
Desktop Virtualization
Deploying desktops as a managed service administration empowers IT
associations to respond faster to changing work environment needs and
emerging opportunities. Virtualized desktops and applications can also be
quickly and easily delivered to branch offices, outsourced and offshore
employees, and mobile workers using iPad and Android tablets.
Switching Concepts
Layer 2 switches and bridges are faster than routers because they do not take
up time looking at the Network layer header information. Instead, they look
at the frame's hardware addresses before deciding to either forward, flood, or
drop the frame. The next sections are related to functions a switch preforms
and the components it uses to do so.
MAC Learning and Aging
To learn the MAC address of devices is the fundamental responsibility of
switches. The switch transparently observes incoming frames. It records the
source MAC address of these frames in its MAC address table. It also records
the specific port for the source MAC address. Based on this information, it
can make intelligent frame forwarding (switching) decisions. Notice that a
network machine could be turned off or moved at any point. As a result, the
switch must also age MAC addresses and remove them from the table after
they have not been seen for some duration.
Frame Switching
Along with building a MAC address table (learning MAC address to port
mappings), the switch also forwards (switches) frames intelligently from port
to port. Think about this as the opposite of how a Layer 1 Hub works. Device
hub takes in a frame and always forwards this frame out all other ports. In a
hub-based network, every port is part of the same collision domain. The
switch is too smart for that. If its MAC address table is fully populated for all
ports, then it “filters” the frame from being forward out ports unnecessarily. It
forwards the frame to the correct port based on the destination MAC address.
https://www.vmware.com/products/nsx.html
Frame Flooding
What happens when a frame has a destination address that is not in the MAC
address table? The frame is flooded out to all ports (other than the port on
which the frame was received). The flooding happens when theswitch in its
MAC address table has no entry for the frame’s destination. With flooding,
the frame is sent out to every port except the frame it came in on. This also
happens when the destination MAC address in the frame is the broadcast
address.
MAC Address Table
The MAC address table is a critical component in the modern switch and acts
as a brain of the switch operation. It contains the MAC address to port
mappings so the switch can work its network magic.
The below example shows how easy it is to examine the MAC address table
of a Cisco switch.
Example: Examining a Real MAC Address Table
Switch#show mac address-table
 Mac Address Table
---------------------------------------------------------------------
Vlan Mac Address Type Ports
---- ----------------- -------- -----
1 e213.5864.ab8f DYNAMIC Gi0/0
1 fa16.3ee3.7d71 DYNAMIC Gi1/0
Mind Map
Figure 1-58: Mind Map of Network Fundamentals
Summary
Role and Function of Network Components
Network Fundamentals teaches the building blocks of modern
network design. In this session, we have briefly discussed about
the network components related to their functions and
performance
A Router receives a packet and observes the destination IP
address information to determine what network the packet needs
to reach, then sends the packet out of the corresponding interface
A Layer 2 switch mechanism works only on MAC addresses and
does not worry about IP address or any items of higher layers. A
Layer 3 switch can perform all the task that a Layer 2 switch can
Firewalls have evolved beyond simple packet filtering and stateful
inspection. Most companies are deploying next-generation
firewalls to block modern threats such as advanced malware and
https://www.fs.com/c/10g-switches-3256
application-layer attacks
An access point is a device that creates a Wireless Local Area
Network, or WLAN, usually in an office or large building
The Cisco Wireless Controller (WLC) series devices provide a
single solution to configure, manage and support corporate
wireless networks, regardless of their size and locations
An endpoint is a remote computing device that communicates
back and forth with a network to which is it connected such as
desktop, laptop etc.
A server is a computer program or device that provides a facility
to another computer program and its client
Characteristics of Network Topology Architectures
Network topology is defined as the physical arrangement of nodes
to form a computer network. There are two types of network
topology: physical topology and logical topology
A two-tier or level architecture is a software architecture in which
a presentation layer or interface keeps running on a client, and a
data layer or data structure gets stored on a server
A three-tier or level architecture is a client-server architecture
design in which the functional procedure logic, information
access, computer information storage and UI (User Interface) are
created and maintained as independent modules on discrete
platforms
A Leaf-Spine architecture is adaptable to the continuously
changing requirements of companies in big data industries with
evolving data centers
Wide-Area Network helps organizations to expand geographically
around the globe. Using WAN services from service providers
usually called “off-sourcing” or “outsourcing”
SOHO is generally a remote office or enterprise environment with
small to medium infrastructure. SOHO users are connected to
corporate headquarter by using WAN MPLS or some other
technology based services provided by service providers
On-premises system monitoring software has been the standard
for quite a long time. Presently, a few associations are moving to
http://www.linksys.com/us/c/business-wireless-access-points/
https://www.paloaltonetworks.com/products/secure-the-endpoint/traps
https://searchsoftwarequality.techtarget.com/definition/program
cloud-based network monitoring and management
Physical Interface and Cabling Types
Physical interfaces consist of a software driver and a connector
into which you connect network media
The type of cable selected for a network is related to the protocol,
network’s topology, and size
Single Modem fiber is used in many applications where data is
sent at multi-frequency (WDM Wave-Division-Multiplexing) so
only one cable is needed
Multimode fiber gives you high bandwidth at high speeds (10 to
100MBS - Gigabit to 275m to 2km) over medium distances
Networks use copper media because it is inexpensive, easy to
install, and has low resistance to electrical current. However,
copper media is limited by distance and signal interference
Computers connected by communication channels that each
connect exactly two computers with access to full channel
bandwidth is known as point-to-point connection whereas, all
computers connected to a shared broadcast-based communication
channel and share the channel bandwidth is known as shared or
broadcast connection
Power over Ethernet (PoE) is a technology for
wired Ethernet local area networks (LANs) that allows the
electrical current necessary for the operation of each device to be
carried by the data cables rather than by power cords. It made AP
installations easier and more flexible, especially on ceilings
Identify Interface and Cable Issues
A collision is the mechanism used by Ethernet to control access
and allocate shared bandwidth among stations that want to
transmit at the same time on a shared medium
Errors may occur in your network for a wide variety of reasons.
For example, there could be electrical interference somewhere, or
there is a bad Network Interface Card that is not able to frame
things correctly for the network
Duplex used to be a big concern in Ethernet LANs. Because you
https://searchnetworking.techtarget.com/definition/Ethernet
https://searchnetworking.techtarget.com/definition/local-area-network-LAN
https://whatis.techtarget.com/definition/current
might be using half-duplex due to having hubs in your network,
you need to ensure that duplex mismatches do not occur between
full-duplex (switched) areas and half-duplex areas
TCP vs. UDP
There are two types of Internet Protocol (IP) traffic. They are TCP
or Transmission Control Protocol and UDP or User Datagram
Protocol
TCP is connection oriented. Once a connection is established, data
can be sent bidirectional
UDP is a simpler, connectionless Internet protocol. Multiple
messages are sent as packets in chunks using UDP
Unlike the TCP, UDP adds no reliability, flow-control, or error-
recovery functions to IP packets. Because of UDP’s simplicity,
UDP headers contain fewer bytes and consume less network
overhead than TCP
IPv4 Addressing and Subnetting
In this section, we have explored IPV4 addressing and subnetting.
We also configured and verified the classes and subnet mask of
IPv4 by performing lab
The Need for Private IPv4 Addressing
The designers of IPv4 created private address space to help
alleviate the depletion of IPv4 addresses
This address space is not routable on the public internet
The address space can be used as needed inside corporations and
would then be translated using Network Address Translation
(NAT) to allow access to and through the public internet
IPv6 Addressing and Prefix
Internet Protocol version 6 (IPv6) expands the number of network
address bits from 32 bits (in IPv4) to 128 bits, which provides
more than enough globally unique IP addresses for every
networked device on the planet
The unlimited address space provided by IPv6 allows Cisco to
deliver more and newer applications and services with reliability,
improved user experience, and increased security
Implementing basic IPv6 connectivity in the Cisco software
consists of assigning IPv6 addresses to individual device
interfaces. IPv6 traffic forwarding can be enabled globally, and
Cisco Express Forwarding switching for IPv6 can also be enabled
The user can enhance basic connectivity functionality by
configuring support for AAAA (Authentication, Authorization,
Accounting, and Auditing)record types in the Domain Name
System (DNS) name-to-address and address-to-name lookup
processes, and by managing IPv6 neighbor discovery
IPv6 Address Types
Global Unicast Addresses (GUAs) are globally routable and
reachable in the IPv6 Internet, they are equivalent to public IPv4
addresses
Unique local is similar to the concept of private use only
addresses (RFC 1918) in IPv4 and not intended to be routable in
the IPv6 Internet
Local link addresses only function on the local link. IPv6 devices
automatically generate them in order to perform many automated
functions between devices
An IPv6 anycast address is an address that can be assigned to
more than one interface
Multicasting means a packet is sent to a group of devices
interested in receiving the information. In IPv6, multicasting
actually replaces completely the IPv4 approach of broadcasting
Modified Extended Unique Identifier (EUI) is an IPv6 feature that
allows the host to assign IPv6 EUI-64 to itself. EUI is of 64 bits. It
eliminates the need of manual configuration and DHCP as a key
benefit over IPv4
Wireless Principles
There are channel settings in your router's settings. Most routers
have channel settings that are set to "Auto", but if you look
through the channels, there are at least a dozen of WLAN
channels
The SSID is an ASCII string that is used to establish wireless
networking devices and maintain wireless connectivity. Same
SSIDs can be used by multiple access points on a network. They
are case sensitive and can contain up to 32 alphanumeric
characters
RF stands for Radio Frequency. It refers to
a wireless electromagnetic signal used as a form
of communication
As encryption is defined at the interface (VLAN or radio) level of
the access point, and can be common to several SSIDs, encryption
is usually configured before the SSID and its authentication
mechanism
Virtualization Fundamentals
A virtual machine is a computer software program that runs an
operating system and applications. Each virtual machine contains
its own virtual, or software-based, hardware, including a virtual
CPU, memory, hard disk, and network interface card
Virtualization is the process of creating a software-based, or
virtual, representation of something, such as virtual applications,
servers, storage and networks. It is the single most effective way
to reduce IT expenses while boosting efficiency and agility for all
size businesses
Virtualization can increase IT agility, adaptability and versatility
while making critical cost deductions. Greater workload mobility,
increased performance and availability of resources, automated
operations, these benefits of virtualization makes IT simpler to
manage and less costly to possess and work
Switching Concepts
To learn the MAC address of devices is the fundamental
responsibility of switches. The switch transparently observes
incoming frames. It records the source MAC address of frames in
its MAC address table
Along with building a MAC address table (learning MAC address
to port mappings), the switch also forwards (switches) frames
intelligently from port to port
The frame is flooded out to all ports (other than the port on which
the frame was received). The flooding happens when the switch in
its MAC address table has no entry for the frame’s destination
The MAC address table is a critical component in the modern
switch and acts as a brain of the switch operation. It contains the
MAC address to port mappings so the switch can work its network
magic
Practice Questions
1. Your system is sending email to the local SMTP server. What type
of IPv4 traffic is the most likely given that shows these two
systems have communicated seconds ago?
A. Broadcast
B. Multicast
C. Unicast
D. Any cast
2. What does it mean when you see FF: FF: FF: FF: FF: FF as the
destination address in an Ethernet frame?
A. It means the frame is a multicast
B. It means the frame is a unicast
C. It means the frame should be dropped
D. It means the frame is a broadcast
3. Examine the following diagram. What is the most likely reason
Host A being unable to ping Host B?
A. The subnet masks are incorrect for the link between R1 and R2
B. Host A has an invalid IP address
C. Host B is attempting to use the subnet ID as an IP address
D. The R2 interface to R1 is attempting to use a subnet broadcast IP
address
4. What is the typical network portion of an IPv6 global unicast
address?
A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits
5. What command do you need in order to enable IPv6 routing
capabilities on a Cisco router?
A. ipv6 unicast-routing
B. ipv6 routing
C. ipv6 routing enable
D. ipv6 unicast-enable
6. What is the default aging time for MAC address entries on a typical
Cisco switch?
A. 60 seconds
B. 120 seconds
C. 300 seconds
D. 1200 seconds
7. Which of the following is defined as physical or logical
arrangement of network?
A. Topology
B. Routing
C. Networking
D. None of the above
8. TCP groups a number of bytes together into a packet called?
A. Packet
B. Buffer
C. Segment
D. Stack
9. Which of the following is false with respect to UDP?
A. Connection-oriented
B. Unreliable
C. Transport layer protocol
D. All of the above
10. A ______ is a device that forwards packets between
networks by processing the routing information included in the
packet.
A. Bridge
B. Firewall
C. Router
D. All of the above
11. Which of the following communication channel is shared by
all the machines on the network?
A. Broadcast
B. Unicast
C. Multicast
D. None of the above
12. The header length of an IPv6 datagram is ___________.
A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
 
13. IPv6 does not use ______type of address.
A. Broadcast
B. Multicast
C. Anycast
D. None of the above
14. The size of IP address in IPv6 is ____________.
A. 4bytes
B. 12bytes
C. 8bytes
D. 100bits
15. If the value in protocol field is 17, the transport layer
protocol used is ________.
A. TCP
B. UDP
C. Either TCP and UDP
D. None of the above
16. Which of the following is not applicable for IP?
A. Error Reporting
B. Handle Addressing Conventions
C. Datagram Format
D. Packet Handling
17. Select one of the following Encryption technique that is used
to improve a network.
A. Performance
B. Reliability
C. Security
D. Longevity
18. Select one of the main advantage of UDP.
A. More Overload
B. Reliable
C. Less Overload
D. Fast
19. A computer network that spans a large physical area,
connecting several sites of an organization across cities, countries
and continents is known as __________.
A. LAN
B. MAN
C. WAN
D. PAN
20. Which device reduces the traffic by spontaneous
segmentation of a network?
A. Modem
B. Switch
C. Router
D. Hub
21. On which two layers of the OSI model does the multilayer
switch operate?
A. Layer 1 and Layer 2
B. Layer 1 and Layer 3
C. Layer 2 and Layer 3
D. Layer 1 and Layer 4
22. Which physical device or software defends an internal
network or system from unauthorized access by performing as a
filter?
A. HIDS
B. IPS/IDS
C. Content Filter
D. Firewall
23. Which type of server performs mapping of private IP
address into public IP address?
A. IPS/IDS Server
B. NAT Translation Server
C. DNS Server
D. Proxy Server
24. Which connector provides communication and controlling
factor in network devices?
A. RJ-11
B. RJ-48C
C. RJ-45
D. DB-9
25. Select two right statements about IPv4 and IPv6 addresses.
A. An IPv6 address is 128 bits long, represented in decimal
B. An IPv4 address is 32 bits long, represented in decimal
C. An IPv6 address is 32 bits long, represented in hexadecimal
D. An IPv6 address is 128 bits long, represented in hexadecimal
Chapter 02: Network Access
Technology Brief
This chapter defines the network access in general; both from physical and
logical perspective. Gaining access to network resources is based on
identification through authentication, proving the identity, requesting access,
and being granted the requested access. This chapter first describes the
different type of LAN technologies and other related technologiesand
protocols. We will briefly discuss the WLAN architecture introduced by the
Cisco, where we will describe the accessing mechanism of WLAN
architecture. 
VLANs (Normal Range) Spanning Multiple Switches
A Virtual LAN is a switched network that is logically divided by function,
project team or application without regarding physical locations of the users
or host. VLANs have similar attributes as physical LANs, but you can group
end stations/hosts even if they are not physically situated on the same LAN
segment. Any switch port can belong to a VLAN; and unicast, multicast, and
broadcast packets are forwarded and flooded only to end points in the VLAN.
Every VLAN is considered a logical network, and packets destined for
stations that do not belong to the VLAN must be forwarded via router or a
switch supporting fallback bridging. VLANs can be created with ports across
the stack; because a VLAN is considered a separate logical network that
contains its own bridge Management Information Base (MIB) information
and can support its own implementation of spanning tree.
VLANs are often linked with IP subnetwork. For example, all the end
stations/host in a particular IP subnet belongs to the same VLAN. Traffic
between VLANs must be routed. LAN port VLAN membership is assigned
manually on port-by-port basis.
The switch supports VLANs in VTP client mode, server mode, and
transparent mode.
Cisco IOS Release 12.2SY supports 4096 VLANs in accordance with the
IEEE 802.1Q standard. These VLANs are organized into several ranges; you
use each range slightly differently. Some of these VLANs are propagated to
other switches in the network when you use the VLAN Trunking Protocol
(VTP). The extended-range VLANs are not propagated, so you must
configure extended-range VLANs manually on each network device. VLANs
0 & 4095 are reserved for system use only, we cannot access these VLANs.
 The port-channel range is 1 to 6. VLAN identification, which is a number
from 1 to 4094 . VLAN IDs 1002-1005 are reserved for Token Ring & FDDI
VLANs.
Figure 2-01: VLAN IDs
The following example demonstrates how to create Ethernet VLAN 2, name
it test2, and add it to the VLAN database:
Switch# configure terminal
Switch(config)# vlan 2
Switch(config-vlan)# name test2
Switch(config-vlan)# end
The following example shows how to configure a port as an access port in
VLAN 2:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 2
Switch(config-if)# end
Configuring Normal-Range VLANs
Normal-range VLANs are VLANs with VLAN IDs 1-1005. If the switch is in
VTP server or VTP transparent mode, you can add, modify or remove
configurations for VLANs 2 to 1001 in the VLAN database.
You can configure VLANs in vlan global configuration command by typing a
VLAN ID. Type a new VLAN ID to create a VLAN, or enter an existing
VLAN ID to modify the VLAN. You can use the default VLAN
configuration or use multiple commands in order to create the VLAN. When
you have completed the configuration, you must exit VLAN configuration
mode for the configuration to show the effect. To show the VLAN
configuration, enter the show vlan within privileged EXEC command.
The configurations of VLAN IDs 1 to 1005 are always saved in the VLAN
database (vlan.dat file). If the VTP mode is transparent, they are also saved in
the running configuration file of switch. You can enter the copy running-
config start-upconfig privileged EXEC command to save the configuration in
the start-up configuration file. In a switch stack, the entire stack uses the
same vlan.dat file and running configuration. To display the VLAN
configuration, enter the show vlan privileged EXEC command.
When you save VLAN and VTP information (including extended-range
VLAN configuration information) in the start-up configuration file and
reboot the switch, the switch configuration is selected as follows:
If the VTP mode is transparent in the start-up configuration, and the
VLAN database and the VTP domain name from the VLAN database
matches that in the start-up configuration file, the VLAN database is
ignored (cleared), and the VTP and VLAN configurations in the start-
up configuration file are used. The VLAN database revision number
remains unchanged in the VLAN database
In VTP versions 1 and 2, if VTP mode is server, the domain name
and VLAN configuration for only the first 1005 VLANs use the
VLAN database information. VTP version 3 also supports VLANs
1006 to 4094
If the VTP mode or domain name in the start-up configuration does
not match the VLAN database, the VTP mode and domain name and
configuration for the first 1005 VLANs use the VLAN database
information
Access Ports (Data and Voice)
Traffic is both received and sent in native formats without VLAN
information (tagging) whatsoever. Any information arriving on access port,
simply belongs to the VLAN assigned to that port.
Data: A data VLAN is a VLAN that is configured to carry user-generated
traffic. A VLAN carrying voice or management traffic would not be part of
a data VLAN. It is common practice to separate voice and management
traffic from data traffic.
Voice: Most switches allow you to add a second VLAN on a switch port for
your voice traffic, called the voice VLAN. The voice VLAN used to be called
the auxiliary VLAN, which allowed it to be overlapped on top of the data
VLAN for enabling both types of traffic to travel through the same port.
Although it is technically considered to be a different type of link, it just
happens because of the access port that can be configured for both data and
voice VLANs. It allows you to connect both phone and PC to one switch port
but in a separate VLAN.
 
Default VLAN
Cisco switches always have VLAN 1 as the default VLAN, which is needed
for many protocol communications between switches like spanning-tree
protocol. All control traffic is set on VLAN 1. It cannot be disabled and poses
a security risk as a lot of Cisco services run on the default VLAN. It is
recommended to set all ports to a different VLAN other than default VLAN.
Connectivity
End-to-end Connectivity is a successful connection between to endpoints,
ports, nodes. Communications between two endpoints include a number of
intermediary devices that process or forward the packet toward the
destination. End-to-end connectivity means that these intermediary devices
do not alter the essential data in the packets during communication. Issues
related to end-to-end connectivity are the unavailability of remote endpoint,
closed ports of application server, incorrect access control list, and others.
Interswitch Connectivity
Cisco originally created their own way of marking traffic with a VLAN ID
for transport over an interswitch link. It was named Inter Switch Link (ISL)
and it acquired an interesting approach. It fully re-encapsulated the frame in
order to add a VLAN marking. 802.1Q takes a different approach. It injects
in a tag value in the existing frame.
Trunk Ports
A trunk port is a port that is allocated to carry traffic for all the VLANs that
are accessible by a specific switch, a process known as trunking. Trunk
ports mark frames with unique identifying tags, either 802.1Q tags or
Interswitch Link (ISL) tags as they move between switches.
Add and Remove VLANs on a Trunk
For Adding and Removing VLANs on a trunk, we have to perform few steps,
which are given below:
To restrict the traffic that trunk carries, issue the switchport
trunk vlan-list interface configuration command. This removes
specific VLANs from the allowed list
To add a VLAN to the trunk, issue the switchport trunk allowed
vlan add vlan-list command
Note
VLANs 1 and 1002 through 1005 are reserved VLANs and cannot be
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do?Application_ID=CLT&IndexId=IOS&IndexOptionId=123&SearchPhrase=%22switchport%20trunk%22&Paging=25&ActionType=getCommandList&Bookmark=Trueremoved from any trunk link.
To configure VLANs on a Cisco switch, use the global
config vlan command. In the following example, we are going to demonstrate
how to configure VLANs on the Switch by creating three VLANs.
Remember that VLAN 1 is the native and management VLAN by default.
Switch(config)#int eth0/0
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk allowed vlan 1,10,20
Switch(config-if)#exit
802.1Q
802.1Q is an IEEE standard trunking protocol that supports Virtual LANs
(VLANs) on an Ethernet network. Cisco switches supports both Inter Switch
Link (ISL) and 802.1Q. The IEEE 802.1Q standard states the operation of
VLAN Bridges that allows the definition, operation and administration of
Virtual LAN topologies within a Bridged LAN infrastructure.
The concept for the IEEE 802.1Q to perform the above functions is in its
tags. 802.1Q-compliant switch ports can be configured to transmit tagged or
untagged frames. A tag field containing VLAN information can be inserted
into an Ethernet frame.
802.1Q adds a 4-Byte header to the frame indicating the VLAN (Virtual
LAN) membership as compared to ISL, which encapsulates (adds header and
trailer) to the frame.
Exam Tip
Dot1Q is actually the IEEE standard 802.1Q that is used for trunking
encapsulation. In a switched network, Dot1Q encapsulation on a trunk port
allows the tagged frames of multiple VLANs to be transported.
Following figure illustrate the original and tagged Ethernet frames format:
Figure 2-02: Ethernet Original and Tagged Frame Format
Following figure represents sub-fields of Tag Field:
Figure 2-03: Sub-field of Tag Filed
Field Descriptions:
Tag Protocol Identifier (TPID): A 16-bit field reserve to a value of 0x8100 in
order to categorize the frame as an IEEE 802.1Q-tagged frame.
Priority Field: 3-bit priority describe the priority of the packet (8 priority
levels)
Canonical Format Indicator (CFI): 1 bit CFI indicates the drop of frames in
case of network blocking
VLAN Identifier (VID): A 12-bit field specifying the VLAN to which the
frame belongs.
Native VLAN
By default, VLAN 1 is referred to as native VLAN. Usually, in Cisco’s LAN
connection, the switch leaves the native VLAN untagged on 802.1Q trunk
ports. VLAN1 is the only untagged VLAN in the architecture. Cisco
introduces this special feature of VLAN for management traffic and this
crucial traffic can still flow between devices even if a link fails its trunking
status.
Layer 2 Discovery Protocols (Cisco Discovery Protocol and
LLDP)
Cisco Discovery Protocol (CDP)
Cisco Discovery Protocol (CDP) is a Device Discovery protocol, which
operates at data-link layer (Layer 2) on all Cisco-manufactured devices and
permits network management applications for discovering Cisco devices that
are neighboring devices. By means of CDP, network management
applications can learn the device type and the Simple Network Management
Protocol (SNMP) agent address of neighboring devices running lower-layer,
transparent protocols. This feature enables applications to send SNMP
queries to neighboring devices.
CDP runs on each media that support Subnetwork Access Protocol (SNAP).
As CDP runs over the data-link layer only, two systems that support various
network-layer protocols can learn the network
Every CDP-configured device sends periodic messages to a multicast
address, advertising at least one address at which it can receive SNMP
messages. The advertisements also contain Time to Live (TTL) or hold-time
information, which is the length of time for receiving device that holds CDP
information before discarding it. Every device listens to the messages
forwarded by other devices to learn about neighboring devices.
Figure 2-04: CDP Features
To enable:
Switch(config)# cdp run
Switch(config)# end
To disable:
Switch(config)#no cdp run
Switch(config)# end
LLDP (Link Layer Discovery Protocol)
Cisco Discovery Protocol is a device discovery protocol that runs over Layer
2 (the data link layer) on all devices manufactured by Cisco-like routers,
bridges, access servers, and switches. CDP permits network management
applications to automatically discover and learn about other Cisco devices
that are connected to the network.
To support non-Cisco devices and allow for interoperability between other
devices, the switch supports the IEEE 802.1AB LLDP. LLDP is a neighbor
discovery protocol that is used for network devices to advertise information
about themselves to other devices on the network. This protocol runs over the
data-link layer (Layer 2), which permits two systems running different
network layer protocols in order to learn each other network. LLDP supports
a set of aspects that it uses to discover neighbor devices. These attributes
contain length, type and value descriptions and are referred to as Type-
Length-Values (TLVs). LLDP supported devices may use TLVs to receive
and send information to their neighbors. Details like configuration
information, device identity, and device capabilities can be advertised by
using this protocol.
The switch supports the following simple management TLVs, which are
optional:
Port Description TLV
System Capabilities TLV
Management Address TLV
System Name TLV
System Description TLV
Following example shows how to configure a hold-time of 120 second, a
delay time of 2 seconds and an update frequency of 20:
Switch# configure terminal
Switch(config)# lldp holdtime 120
Switch(config)# lldpreinit 2
Switch(config)# lldp timer 20
Switch(config)# end
Following example shows how to transmit only LLDP packets:
switch# configure terminal
switch(config)# no lldp receive
switch(config)# end
If you want to receive LLDP packets again, do the following:
switch# configure terminal
switch(config)# lldp receive
switch(config)# end
Following example shows how to globally disable LLDP.
Switch# configure terminal
Switch(config)# no lldp run
Switch(config)# end
Following example shows how to globally enable LLDP.
Switch# configure terminal
Switch(config)# lldp run
Switch(config)# end
Following example shows how to enable LLDP on an interface.
Switch# configure terminal
Switch(config)# interface GigabitEthernet 1/1
Switch(config-if)# lldp transmit
Switch(config-if)# lldp receive
Switch(config-if)# end
To monitor and maintain LLDP and LLDP-MED on your device, execute one
or more of the following tasks, beginning in privileged EXEC mode:
show lldp
show lldp entry entry-name
show lldp errors
show lldp interface [interface-id]
show lldp traffic
show lldpneighbors [interface-id] [detail]
(Layer 2/Layer 3) EtherChannel (LACP)
EtherChannel
An EtherChannel consists of Fast Ethernet or Gigabit Ethernet links bundled
into a single logical link as shown in figure below.
Figure 2-05: EtherChannel
The EtherChannel offers full-duplex bandwidth up to 800 Mb/s (Fast
EtherChannel) or 8Gb/s (Gigabit EtherChannel) between one switch to
another switch. An EtherChannel can consist of up to eight compatibly
configured Ethernet ports.
All ports in every EtherChannel must be configured as either Layer 2 or
Layer 3 ports. The number of EtherChannel is limited to 48. The
EtherChannel Layer 3 ports are designed with routed ports. Routed ports are
physical ports that are configured to be in Layer 3 mode by entering no
switchport interface configuration command.
Link Aggregation Control Protocol
The Link Aggregation Control Protocol (LACP) is specified in IEEE as
802.3ad. It allows Cisco switches to handle Ethernet channels among
switches. LACP allows the automatic creation of EtherChannels by
exchanging the LACP packets between Ethernet ports. The switch learns the
status of partners capable of supporting LACP and the capabilities of each
port by using LACP. After that, it dynamically groups similarly configured
ports into a single logical link (channel or aggregate port). Ports that are
configured similarly are grouped based on hardware, administrative and port
parameter controls. For example, LACPgroups the ports with the same
speed, duplex mode, native VLAN, VLAN range, and trunking status and
type. While grouping the links into an EtherChannel, LACP adds the group to
the spanning tree as a single switch port.
Mode Description
Active Sets a port into an active negotiating state in which the port
initiates negotiations with other ports by sending LACP packets
Passive Sets a port into a passive negotiating state in which the port
responds to LACP packets that it receives, but does not send
LACP packet negotiation. This setting reduces the transmission
of LACP packets
Table 2-01: LACP Mode
Both active mode and passive LACP mode allows ports for negotiation with
partner ports to an EtherChannel based on defined criteria such as port speed
and, for Layer 2 EtherChannels, trunking state and VLAN numbers.
Ports can form an EtherChannel while they are in different LACP modes as
long as the modes are compatible.
For example:
A port in the active mode can form an EtherChannel with another
port that is in active or passive mode
A port in the passive mode cannot form an EtherChannel with
another port that is also in passive mode because neither port starts
LACP negotiation
Configuring Layer 2 EtherChannels
This example demonstrates how to configure an EtherChannel on a switch. It
assigns two ports as static-access ports in VLAN 11 to channel 4 with the
LACP mode active:
Switch# configure terminal
Switch(config)# interface range gigabitethernet 2/0/1 -2
Switch(config-if-range)# switchport mode access
Switch(config-if-range)# switchport access vlan 11
Switch(config-if-range)# channel-group 4 mode active
Switch(config-if-range)# end
Configuring Layer 3 EtherChannels
Following example shows how to create the logical port channel 4 and assign
172.10.10.10 as its IP address:
Switch# configure terminal
Switch(config)# interface port-channel 4
Switch(config-if)# no switchport
Switch(config-if)# ip address 172.10.10.10 255.255.255.0
Switch(config-if)# end
Following example demonstrates how to configure an EtherChannel. It
assigns two ports to channel 4 with the LACP mode active:
Switch# configure terminal
Switch(config)# interface range gigabitethernet2/0/1 -2
Switch(config-if-range)# no ip address
Switch(config-if-range)# no switchport
Switch(config-if-range)# channel-group 4 mode active
Switch(config-if-range)# end
Lab 2-01: VLAN, Inter-VLAN, Trunk Port, EtherChannel
Case Study
Consider a company in which different departments namely management,
production, and marketing have to be connected all the time. Therefore, the
company hired a network engineer to deploy a network that provides
seamless connection among the department.
Topology
Figure 2-06: Topology Diagram
Configuration
The network engineer deployed a network to provide connectivity among the
various departments by configuring VLANs, Inter-vlans, Trunk port, and
EtherChannel. 
To provide a seamless connectivity, configure a Hot Standby Routing
Protocol (HSRP). 
S2
S2>enable
S2#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
//Configuring Etherchannel
S2(config)#interface Port-channel2
S2(config-if)#no shutdown
//Configuring Trunk Port
S2(config-if)#switchport trunk allowed vlan 10,20,30
S2(config-if)#switchport trunk encapsulation dot1q
S2(config-if)#switchport mode trunk
S2(config-if)#exit
//Configuring Etherchannel
S2(config)#interface Port-channel3
S2(config-if)#no shutdown
//Configuring Trunk Port
S2(config-if)#switchport trunk allowed vlan 10,20,30
S2(config-if)#switchport trunk encapsulation dot1q
S2(config-if)#switchport mode trunk
S2(config-if)#exit
//Configuring Vlan 30
S2(config)#interface Ethernet0/0
S2(config-if)#no shutdown
S2(config-if)#switchport access vlan 30
S2(config-if)#switchport mode access
S2(config-if)#exit
S2(config)#interface Ethernet0/1
S2(config-if)#no shutdown
S2(config-if)#switchport access vlan 10
S2(config-if)#switchport mode access
S2(config-if)#exit
S2(config)#interface Ethernet0/2
S2(config-if)#no shutdown
S2(config-if)#switchport access vlan 20
S2(config-if)#switchport mode access
S2(config-if)#exit
//Configuring Trunk Port
S2(config)#inertface Ethernet0/3
S2(config-if)#no shutdown
S2(config-if)#switchport trunk allowed vlan 10,20,30
S2(config-if)#switchport trunk encapsulation dot1q
S2(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S2(config-if)#channel-group 2 mode passive
S2(config-if)#exit
//Configuring Trunk Port
S2(config)#interface Ethernet1/0
S2(config-if)#no shutdown
S2(config-if)#switchport trunk allowed vlan 10,20,30
S2(config-if)#switchport trunk encapsulation dot1q
S2(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S2(config-if)#channel-group 3 mode active
S2(config-if)#exit
//Configuring Trunk Port
S2(config)#interface Ethernet1/1
S2(config-if)#no shutdown
S2(config-if)#exit
S2(config)#interface Ethernet1/2
S2(config-if)#no shutdown
S2(config-if)#switchport trunk allowed vlan 10,20,30
S2(config-if)#switchport trunk encapsulation dot1q
S2(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S2(config-if)#channel-group 2 mode passive
//Configuring Trunk Port
S2(config-if)#interface Ethernet1/3
S2(config-if)#no shutdown
S2(config-if)#switchport trunk allowed vlan 10,20,30
S2(config-if)#switchport trunk encapsulation dot1q
S2(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S2(config-if)#channel-group 3 mode active
S2(config-if)#exit
S3
S3>en
S3#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
//Configuring Etherchannel
S3(config)#interface Port-channel1
S3(config-if)#no shutdown
//Configuring Trunk Port
S3(config-if)#switchport trunk allowed
S3(config-if)#switchport trunk allowed vlan 10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
S3(config-if)#switchport mode trunk
S3(config-if)#exit
//Configuring Etherchannel
S3(config)#interface Port-channel3
S3(config-if)#no shutdown
//Configuring Trunk Port
S3(config-if)#switchport trunk allowed vlan 10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
S3(config-if)#switchport mode trunk
S3(config-if)#exit
//Configuring Vlan
S3(config)#interface Ethernet0/0
S3(config-if)#no shutdown
S3(config-if)#switchport access vlan 30
S3(config-if)#switchport mode access
S3(config-if)#exit
//Configuring Trunk Port
S3(config)#interface Ethernet0/1
S3(config-if)#no shutdown
S3(config-if)#switchport trunk allowed vlan 10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
S3(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S3(config-if)#channel-group 1 mode active
S3(config-if)#exit
//Configuring Vlan
S3(config)#interface Ethernet0/2
S3(config-if)#no shutdown
S3(config-if)#switchport access vlan 20
//Configuring Etherchannel mode
S3(config-if)#switchport mode access
S3(config-if)#exit
//Configuring Vlan
S3(config)#interface Ethernet0/3
S3(config-if)#no shutdown
S3(config-if)#switchport access vlan 10
S3(config-if)#switchport mode access
S3(config-if)#exit
//Configuring Trunk Port
S3(config)#interface Ethernet1/0
S3(config-if)#no shutdown
S3(config-if)#switchport trunk allowed vlan 10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
S3(config-if)#switchport mode trunk
S3(config-if)#exit
S3(config)#interface Ethernet1/1
S3(config-if)#no shutdown
S3(config-if)#switchport trunk allowed vlan 10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
S3(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S3(config-if)#channel-group 1 mode active
S3(config-if)#exit
//Configuring Trunk Port
S3(config)#interface Ethernet1/2
S3(config-if)#no shutdown
S3(config-if)#switchport trunk allowed vlan 10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
S3(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S3(config-if)#channel-group 3 mode passive
S3(config-if)#exit
//Configuring Trunk Port
S3(config)#interface Ethernet1/3
S3(config-if)#no shutdown
S3(config-if)#switchport trunk allowed vlan10,20,30
S3(config-if)#switchport trunk encapsulation dot1q
//Configuring Etherchannel mode
S3(config-if)#channel-group 3 mode passive
S3(config-if)#exit
S4
S4>en
S4#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
//Configuring Etherchannel
S4(config)#interface port-channel2
S4(config-if)#no shutdown
//Configuring Trunk Port
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
S4(config-if)#exit
//Configuring Etherchannel
S4(config)#interface port-channel1
S4(config-if)#no shutdown
//Configuring Trunk Port
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
S4(config-if)#exit
//Configuring Vlan
S4(config)#interface Ethernet0/0
S4(config-if)#no shutdown
S4(config-if)#switchport access vlan 30
S4(config-if)#switchport mode access
S4(config-if)#exit
S4(config)#interface Ethernet0/1
S4(config-if)#no shutdown
S4(config-if)#switchport access vlan 10
S4(config-if)#switchport mode access
S4(config-if)#exit
S4(config)#interface Ethernet0/2
S4(config-if)#no shutdown
S4(config-if)#switchport access vlan 20
S4(config-if)#switchport mode access
S4(config-if)#exit
//Configuring Trunk Port
S4(config)#interface Ethernet0/3
S4(config-if)#no shutdown
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S4(config-if)#channel-group 2 mode active
S4(config-if)#exit
//Configuring Trunk Port
S4(config)#interface Ethernet1/0
S4(config-if)#no shutdown
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S4(config-if)#channel-group 1 mode passive
S4(config-if)#exit
//Configuring Trunk Port
S4(config)#interface Ethernet1/1
S4(config-if)#no shutdown
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
//Configuring Etherchannel mode
S4(config-if)#channel-group 1 mode passive
S4(config-if)#exit
//Configuring Trunk Port
S4(config)#interface Ethernet1/2
S4(config-if)#no shutdown
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
//Configuring Etherchannel mde
S4(config-if)#channel-group 2 mode active
S4(config-if)#exit
//Configuring Trunk Port
S4(config)#interface Ethernet1/3
S4(config-if)#no shutdown
S4(config-if)#switchport trunk allowed vlan 10,20,30
S4(config-if)#switchport trunk encapsulation dot1q
S4(config-if)#switchport mode trunk
S4(config-if)#exit
HSRP1
HSRP1>en
HSRP1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HSRP1(config)#interface FastEthernet0/0
HSRP1(config-if)#ip address 100.10.1.2 255.255.255.252
HSRP1(config-if)#duplex half
HSRP1(config-if)#exit
HSRP1(config)#interface Ethernet1/0
HSRP1(config-if)#no ip address
HSRP1(config-if)#shutdown
HSRP1(config-if)#duplex full
HSRP1(config-if)#exit
HSRP1(config)#interface Ethernet1/1
HSRP1(config-if)#no ip address
HSRP1(config-if)#shutdown
HSRP1(config-if)#duplex full
HSRP1(config-if)#exit
HSRP1(config)#interface Ethernet1/2
HSRP1(config-if)#no ip address
HSRP1(config-if)#shutdown
HSRP1(config-if)#duplex full
HSRP1(config-if)#exit
HSRP1(config)#interface Ethernet1/3
HSRP1(config-if)#no ip address
HSRP1(config-if)#duplex full
HSRP1(config-if)#exit
//Configuring HSRP
HSRP1(config)#interface Ethernet1/3.1
HSRP1(config-subif)#encapsulation dot1Q 10
HSRP1(config-subif)#ip address 172.16.1.2 2
HSRP1(config-subif)#standby 0 ip 172.16.1.1
HSRP1(config-subif)#exit
HSRP1(config)#interface Ethernet1/3.2
HSRP1(config-subif)#encapsulation dot1Q 20
HSRP1(config-subif)#ip address 172.16.2.2 255.255.255.0
HSRP1(config-subif)#standby ip 172.16.1.1
HSRP1(config-subif)#exit
HSRP1(config)#interface Ethernet1/3.3
HSRP1(config-subif)#encapsulation dot1Q 30
HSRP1(config-subif)#ip address 172.16.3.2 255.255.255.0
HSRP1(config-subif)#exit
HSRP1(config-subif)#ip address 172.16.3.2 255.255.255.0
HSRP1(config-subif)#standby 2 ip 172.16.3.1
HSRP1(config-subif)#exit
HSRP1(config)#interface fastEthernet2/0
HSRP1(config-if)#no ip address
HSRP1(config-if)#duplex half
HSRP1(config-if)#exit
HSRP1(config)#router ospf 1
HSRP1(config-router)#network 100.10.1.0 0.0
HSRP1(config-router)#exit
HSRP1(config)#interface Ethernet1/3
HSRP1(config-if)#no ip address
HSRP1(config-if)#duplex half
HSRP1(config-if)#exit
HSRP1(config)#interface Ethernet1/3.1
HSRP1(config-subif)# encapsulation dot1Q 10
HSRP1(config-subif)# ip address 172.16.1.2 255.255.255.0
HSRP1(config-subif)# standby 0 ip 172.16.1.1
HSRP1(config-subif)#exit
//Configuring HSRP
HSRP1(config)#interface Ethernet1/3.2
HSRP1(config-subif)# encapsulation dot1Q 20
HSRP1(config-subif)# ip address 172.16.2.2 255.255.255.0
HSRP1(config-subif)# standby 1 ip 172.16.2.1
HSRP1(config-subif)#exit
HSRP1(config)#interface Ethernet1/3.3
HSRP1(config-subif)# encapsulation dot1Q 30
HSRP1(config-subif)# ip address 172.16.3.2 255.255.255.0
HSRP1(config-subif)# standby 2 ip 172.16.3.1
HSRP1(config-subif)#exit
//Configuring OSPF
HSRP1(config)#router ospf 1
HSRP1(config-router)#network 100.10.1.0 0.0.0.3 area 0
HSRP1(config-router)# network 172.16.1.0 0.0.0.255 area 1
HSRP1(config-router)# network 172.16.2.0 0.0.0.255 area 1
HSRP1(config-router)# network 172.16.3.0 0.0.0.255 area 1
HSRP1(config-router)#exit
HSRP2
HSRP2>en
HSRP2#config t
Enter configuration commands, one per line. End with CNTL/Z.
HSRP2(config)#interface fastEthernet0/0
HSRP2(config-if)#ip address 200.10.1.2 255.255.255.252
HSRP2(config-if)#duplex half
HSRP2(config-if)#exit
HSRP2(config)#interface
HSRP2(config)#interface Ethernet1/0
HSRP2(config-if)#no ip address
HSRP2(config-if)#duplex half
HSRP2(config-if)#exit
//Configuring HSRP
HSRP2(config)#interface Ethernet1/0.1
HSRP2(config-subif)#encapsulation dot1Q 10
HSRP2(config-subif)#ip address 172.16.1.3 255.255.255.0
HSRP2(config-subif)#standby 0 ip 172.16.1.1
HSRP2(config-subif)#exit
HSRP2(config)#interface Ethernet1/0.2
HSRP2(config-subif)#encapsulation dot1Q 20
HSRP2(config-subif)#ip address 172.16.2.3 255.255.255.0
HSRP2(config-subif)#standby 1 ip 172.16.2.1
HSRP2(config-subif)#exit
HSRP2(config)#interface Ethernet1/0.3
HSRP2(config-subif)#encapsulation dot1Q 30
HSRP2(config-subif)#ip address 172.16.3.3 255.255.255.0
HSRP2(config-subif)#standby 2 ip 172.16.3.1
HSRP2(config-subif)#exit
HSRP2(config)#interface Ethernet1/1
HSRP2(config-if)#no ip address
HSRP2(config-if)#shutdown
HSRP2(config-if)#duplex full
HSRP2(config-if)#exit
HSRP2(config)#interface Ethernet1/2
HSRP2(config-if)#no ip address
HSRP2(config-if)#shutdown
HSRP2(config-if)#duplex full
HSRP2(config-if)#interface Ethernet1/3
HSRP2(config-if)#no ip address
HSRP2(config-if)#shutdown
HSRP2(config-if)#duplex full
HSRP2(config-if)#exit
HSRP2(config)#interface fastEthernet2/0
HSRP2(config-if)#no ip address
HSRP2(config-if)#duplex full
HSRP2(config-if)#exit
//Configuring OSPF
HSRP2(config)#router ospf 1
HSRP2(config-router)# network 172.16.1.0 0.0.0.255 area 1
HSRP2(config-router)# network 172.16.2.0 0.0.0.255 area 1
HSRP2(config-router)# network 172.16.3.0 0.0.0.255 area 1
HSRP2(config-router)# network 200.10.1.0 0.0.0.3 area 0
HSRP2(config-router)#exit
GatewayRouter
Router>en
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname GatewayRouter
GatewayRouter(config)#interface fastEthernet0/0
GatewayRouter(config-if)#ip address 100.10.1.1 255.255.255.252
GatewayRouter(config-if)#duplex auto
GatewayRouter(config-if)#speed auto
GatewayRouter(config-if)#exit
GatewayRouter(config)#interface fastEthernet0/1
GatewayRouter(config-if)#ip address 200.10.1.1 255.255.255.252
GatewayRouter(config-if)#duplex auto
GatewayRouter(config-if)#no duplexauto
GatewayRouter(config-if)#speed auto
GatewayRouter(config-if)#full-duplex
GatewayRouter(config-if)#exit
GatewayRouter(config)#interface fastEthernet1/0
GatewayRouter(config-if)#no ip address
GatewayRouter(config-if)#shutdown
GatewayRouter(config-if)#duplex auto
GatewayRouter(config-if)#speed
GatewayRouter(config-if)#speed auto
GatewayRouter(config-if)#exit
GatewayRouter(config)#interface fastEthernet2/0
GatewayRouter(config-if)#no ip address
GatewayRouter(config-if)#shutdown
GatewayRouter(config-if)#duplex auto
GatewayRouter(config-if)#speed auto
GatewayRouter(config-if)#exit
//Configuring OSPF
GatewayRouter(config)#router ospf 1
GatewayRouter(config-router)# router-id 1.1.1.1
GatewayRouter(config-router)# network 100.10.1.0 0.0.0.3 area 0
GatewayRouter(config-router)# network 200.10.1.0 0.0.0.3 area 0
GatewayRouter(config-router)#exit
Verification
1. Verify the VLANs
S2#show vlan
From the output, we can see that VLAN 10, 20, and 30 are assigned to
department Management, Production, Marketing with respect to their
interfaces.
2. Verify Trunk Ports
S2#show interface Trunk
From the output, we can see that Trunk mode is active on Port 2 & 3 and
VLANs are allowed on Po3 & 2, and encapsulation is enabled by 802.1q.
3. Verify EtherChannel
S2#show etherchannel
From the output, it is clear that the EtherChannel is enabled among the
switches as Group 2 and Group 3.
4. Verify the EtherChannel Port-channel
S2# show etherchannel port-channel
From the output, describe the status of Group 2 and Group 3. Group 2 is
passive mode and Group 3 is in active mode according to the network
topology. 
5. Verify the Connectivity
Ping from the PC1 to PCs of different VLANs
From the ping result, it has been cleared that the switches of different
VLANs are connected to each other.
Ping from the VPC to Virtual Interfaces of HSRP
The above ping result shows the connection between the switches and
virtual interfaces of HSRP is established.
Ping from the GatewayRouter to HSRP
The above ping result shows the connectivity between the virtual interfaces
of HSRP and GatewayRouter established.
Ping from VPC to GatewayRouter
Basic Operations of Rapid PVST+ Spanning Tree Protocol
Rapid PVST+ is the IEEE 802.1w (RSTP) standard configured on per
VLAN. A single instance of STP runs on each configured VLAN (if you do
not manually disable STP). Each Rapid PVST+ instance on a VLAN has a
single root switch. You may enable and disable STP on a per-VLAN basis
when you are running Rapid PVST+.
Exam Tip
Rapid PVST+ is the default STP mode for the switch.
Rapid PVST+ uses point-to-point link to provide rapid convergence of the
spanning tree. The spanning tree reconfiguration can occur in less than 1
second with Rapid PVST+ (in contrast to 50 seconds with the default settings
in the 802.1D STP).
Exam Tip
Rapid PVST+ supports one STP instance for each VLAN.
STP convergence occurs rapidly by using Rapid PVST+. Each assigned or
root port in the STP sends out a Bridge Protocol Data Unit (BPDU) every 2
seconds by default. On an assigned or root port in the topology, if hello
messages are missed three consecutive times, or if the maximum time
expires, the port immediately clears all protocol information in the table. A
port deliberates that it loses connectivity to its direct neighbor root or
assigned port if it misses three BPDUs or if the maximum time expires. This
rapid aging of the protocol information allows quick failure detection. The
switch automatically checks the Port VLAN ID (PVID).
Rapid PVST+ provides for rapid recovery of connectivity resulting the failure
of a network device, a switch port, or a LAN. It provides rapid convergence
for edge ports, new root ports, and ports connected through point-to-point
links.
Configuring Rapid PVST+
Rapid PVST+ has the 802.1w standard applied to the Rapid PVST+ protocol,
it is the default STP configuration in the software.
You enable Rapid PVST+ on a per-VLAN basis. The software maintains a
separate instance of STP for each VLAN (except on those VLANS on which
you disable STP). Rapid PVST+ is enabled on the default VLAN and on each
VLAN that you create by default.
Enabling Rapid PVST+
Once you enable Rapid PVST+ on the switch, you must enable Rapid PVST+
on the assigned VLANs.
Rapid PVST+ is the default STP mode. You cannot run MST and Rapid
PVST+ simultaneously.
To enable Rapid PVST+ on the switch, perform this task:
switch# configure terminal
switch(config)# spanning-tree mode rapid-pvst
Following example shows how to enable Rapid PVST+ on the switch:
switch# configure terminal
switch(config)# spanning-tree mode rapid-pvst
Root Port, Root Bridge (Primary/Secondary), and other Port Names
Port Roles
Rapid PVST+ provides rapid convergence of the spanning tree by assigning
port roles and learning the active topology. Rapid PVST+ builds upon the
802.1D STP to select the switch with the highest priority (lowest numerical
priority value).
Rapid PVST+ then assigns one of these port roles to individual ports:
Root Port: Provides the best path (lowest cost) when the switch forwards
packets to the root bridge.
Designated Port: The port through which the designated switch is attached
to the LAN is called the designated port.
Alternate Port: Provides an alternate path toward the root bridge to the path
provided by the existing root port. An alternate port provides an alternative
path to another switch port in the topology.
Backup Port: Acts as a backup for the path provided by a designated port
toward the ports of the spanning tree. A backup port exists only when two
ports are connected in a loopback with a point-to-point link. A backup port
provides another path in the topology to the switch.
Disabled Port: No role within the operation of the spanning tree.
In a stable topology with persistent port roles throughout the network, Rapid
PVST+ ensures that every root port and designated port rapidly transition to
the forwarding state because all alternate and backup ports are always in the
blocking state. Designated ports start in the blocking state. The port state
controls the operation of the forwarding and learning processes.
Root Bridge (Primary/Secondary)
The software keeps a separate instance of STP for each active VLAN in
Rapid PVST+. For each VLAN, the switch with the lowest bridge ID
becomes the root bridge for that VLAN.
Configuring the Primary Root Bridge
To configure a VLAN instance to become the root bridge, modify the bridge
priority from the default value (32768) to a considerably lower value.
When you type the spanning-tree vlan vlan_ID root command, the switch
checks the bridge priority of the current root bridges for each VLAN. The
switch sets the bridge priority for the specified VLANs to 24576 if this value
will cause the switch to become the root for the specified VLANs. If any root
bridge for the specified VLANs has a bridge priority lower than 24576, the
switch sets the bridge priority for the specified VLANs to 4096 less than the
lowest bridge priority.
Exam Tip
The spanning-tree vlan vlan_ID root command fails if the value required to
be the root bridge is less than 1.
To configure a switch to become the primary root bridge for a VLAN in
Rapid PVST+, perform this steps:
switch# configure terminal
switch(config)# spanning-tree vlan vlan-range root primary [ diameter dia [
hello-time hello-time ]]
Configures a software switch as the primary root bridge. The vlan-range
value can be 2 through 4094 (except reserved VLAN values.) The diameter
default is 7. The hello-time can be from 1 to 10 seconds, and the default value
is 2 seconds.
Following example shows to configure the switch as the root bridge for
VLAN 5 with a network diameter of 4:
switch# configure terminal
switch(config)# spanning-tree vlan 5 root primary diameter 4
Configuring a Secondary Root Bridge
When you configure a software switch as the secondary root, the STP bridge
priority is modified from the default value (32768) so that the switch is
expected to become theroot bridge for the specified VLANs if the primary
root bridge fails (assuming the other switches in the network use the default
bridge priority of 32768). STP sets the bridge priority to 28672.
Enter the diameter keyword to specify the network diameter (that is, the
maximum number of bridge hops between any two end stations in the
network). When you specify the network diameter, the software
automatically selects an optimal hello time, forward delay time, and
maximum age time for a network of that diameter, which can significantly
reduce the STP convergence time. You can enter the hello-time keyword to
override the automatically calculated hello time.
You configure more than one switch in this manner to have multiple backup
root bridges. Enter the same network diameter and hello time values that you
used when configuring the primary root bridge.
To configure a switch to become the secondary root bridge for a VLAN in
Rapid PVST+, perform this steps:
switch# configure terminal
switch(config)# spanning-tree vlan vlan-range root secondary [ diameter
dia [ hello-time hello-time ]]
Configures a software switch as the secondary root bridge. The vlan-range
value can be 2 through 4094 (except reserved VLAN values.) The diameter
default is 7. The hello-time can be from 1 to 10 seconds, and the default value
is 2 seconds.
Following example shows how to configure the switch as the secondary root
bridge for VLAN 5 with a network diameter of 4:
switch# configure terminal
switch(config)# spanning-tree vlan 5 root secondary diameter 4
Rapid PVST+ Port State
Transmission delays occur when protocol information passes through a
switched LAN. As a result, topology changes can take place at different times
and at different places in a switched network. When a LAN port transitions
directly from non-contributing in the spanning tree topology to the
forwarding state, it can create temporary data loops. Ports must wait for new
topology information to transmit through the switched LAN before beginning
to forward frames.
Each LAN port on a software using Rapid PVST+ or MST exists in one of
the following four states:
Blocking: The LAN port does not contribute in frame forwarding.
Learning: The LAN port prepares to contribute in frame forwarding.
Forwarding: The LAN port forwards frames.
Disabled: The LAN port does not contribute in STP and is not forwarding
frames.
When you enable Rapid PVST+, every port in the software, VLAN, and
network goes through the blocking state and the transitory states of learning
at power up. If properly configured, each LAN port stabilizes to the
forwarding or blocking state.
Blocking State
A LAN port in the blocking state does not contribute in frame forwarding.
A LAN port in the blocking state performs as follows:
Discards frames received from the attached segment
Discards frames switched from another port for forwarding
Does not incorporate the end station location into its address
database
Receives BPDUs and directs them to the system module
Receives, processes, and transmits BPDUs received from the
system module
Receives and responds to network management messages
Forwarding State
A LAN port in the forwarding state forwards frames. The LAN port enters
the forwarding state from the learning state.
A LAN port in the forwarding state performs as follows:
Forwards frames received from the attached segment
Forwards frames switched from another port for forwarding
Incorporates the end station location information into its address
database
Receives BPDUs and directs them to the system module
Processes BPDUs received from the system module
Receives and responds to network management messages
PortFast
PortFast is a feature of spanning tree that changes a port immediately to a
forwarding state as soon as it is operates. This is beneficial in connecting
hosts so that they can start communicating on the VLAN instantaneously,
rather than waiting on spanning tree. To prevent ports that are configured
with PortFast from forwarding BPDUs, which could change the spanning tree
topology, BPDU guard can be enabled. At the acceptance of a BPDU, BPDU
guard disables a port configured with PortFast.
PortFast Benefits
We know the great advantage of configuring Portfast, a port configured with
Portfast will immediately start transmitting data in the ‘forwarding’ state
bypassing the other spanning-tree states. This is definitely a great feature to
have configured on your downstream ports connecting to your end-user
systems or your servers. There is also another great reason to configure
Portfast on your client edge ports, that is not such commonly known.
Whenever a switchport goes up or down the switch generates a Topology
Change Notification (TCN) packet and sends this TCN packet to the root
bridge, the root bridge then responds back with a Topology Change
Acknowledge (TCA) packet simply to acknowledge the TCN packet. The
root bridge then transmits another BPDU with the Topology Change (TC) bit
set to every switch within the Spanning-Tree domain. When the other
switches receive this TC marked packet, it resets the aging time of every
entry in the CAM table (also known as the MAC address table) down to 15
seconds, which can cause the switch to rebuilt it’s CAM table if the entries
start aging out. Now depending on the size of your layer 2 network, this can
waste a lot of resources on your switches. It will cause a lot of unnecessary
traffic overhead, since we have a set of BPDUs transmitted with the TCN,
TCA, and TC flags set individually. Also remember that if CAM table entries
start expiring, this can cause unnecessary ARP traffic for additional
information the switch already had.
Cisco Wireless Architectures vs. AP Modes
Cisco Unified Wireless Network Architecture
The Cisco unified wireless network architecture offers secure, scalable, cost-
effective wireless LANs solution for business critical mobility. The Cisco
Unified Wireless Network is the enterprise’s only unified wired and wireless
solution that cost-effectively addresses the Wireless LAN (WLAN) security,
deployment, management, and control issues. This powerful indoor and
outdoor solution combines the best elements of wired and wireless
networking to deliver high performance, manageable, and secure WLANs
with low ownership cost.
Figure 2-07: Cisco Unified Wireless Network Architecture in the Enterprise
The inter-linked elements that work together to deliver a unified enterprise-
class wireless solution include:
Client Devices
Access Points (APs)
Network unification through controllers
World-class network management
Mobility Services
Core Components
The Cisco Unified Wireless Network (CUWN) is designed to provide a high
performance and scalable 802.11ac wireless services for service providers
and as well as for enterprises. A Cisco wireless solution simplifies the
deployment and management of large-scale wireless LANs in centralized or
distributed deployments while providing the best security, user experience
and services.
The Cisco Unified Wireless Network consists of:
Cisco Wireless LAN Controllers (WLCs)
Cisco Aironet Access Points (APs)
Cisco Prime Infrastructure (PI)
Cisco Mobility Services Engine (MSE)
Cisco Wireless LAN Controllers
Cisco Wireless LAN Controllers are enterprise-standard, high-performance,
wireless switching platforms that support 802.11a/n/ac and 802.11b/g/n
protocols. WLC operates under control of the operating system, which
contains Radio Resource Management (RRM) by creating a CUWN solution
that can automatically adjust to real-time variations in the 802.11 RF
environment. Controllers are built-in high-performance network and security
hardware, resulting in highly reliable 802.11 enterprise networks with
exceptional security.
Cisco 2504 Wireless Controllers
The Cisco 2504 Wireless Controllers enable large-scale wireless functions for
small to medium-sized enterprises and branch offices. It is designed for
802.11n and 802.11ac performance. Cisco 2504 Wireless Controllers are
basic level controllersthat provide real-time communications between Cisco
Aironet access points to simplify the deployment and operation of wireless
networks.
Cisco 5508 Wireless Controllers
Cisco 5508 Wireless Controllers deliver reliable performance, enhanced
flexibility, and minimum service-loss for mission-critical wireless. Interactive
multimedia applications, such as voice and video, can now perform
flawlessly over the wireless network, and clients can conveniently roam
without service interruption. Flexible licensing allows users to easily enable
access point support or premium software features.
Cisco 5520 Wireless Controllers
The Cisco 5520 Series Wireless LAN Controller is a highly scalable, service
full, robust, and flexible platform that is ideal for medium to large enterprise
and campus deployments. As part of the Cisco Unified Access Solution, the
5520 is optimized for the next generation of wireless networks like 802.11ac
Wave 2.
Cisco Flex 7500 Wireless Controllers
The Cisco Flex 7500 Wireless Controller is available in a model designed to
fulfil the scaling requirements to deploy the FlexConnect solution in branch
networks. FlexConnect is designed to support wireless branch networks by
allowing the data to be swapped locally within the branch site, while the
access points are being controlled and managed by a centralized controller.
The Cisco Flex 7500 Series Cloud Controller purposes to deliver a cost
effective FlexConnect solution on a large scale.
Cisco 8510 Wireless Controllers
The Cisco 8510 Wireless Controller is a highly scalable and flexible platform
that enables crucial wireless networking deployments for enterprise and
service provider.
Cisco 8540 Wireless Controller
Cisco 8540 Wireless Controller is optimized for 802.11ac Wave2
performance, the Cisco 8540 Wireless Controller is a highly scalable, service-
full, robust, and flexible platform that enables next-generation wireless
networks deployment for medium to large enterprises and campuses.
Cisco Wireless Services Module 2
The Cisco Wireless Services Module 2 (WiSM2) for the Catalyst 6500 Series
switches ideal for crucial wireless networking for medium to large single-site
WLAN environments where an integrated solution is preferred. The WiSM2
provide lower hardware costs and flexible configuration options.
Virtual Wireless LAN Controller
The controller allows IT professionals to configure, manage, and troubleshoot
up to 200 access points and 6000 clients. The Cisco Virtual Wireless
Controller supports secure guest access, rogue detection for Payment Card
Industry (PCI) compliance, and in-branch (locally switched) Wi-Fi voice and
video.
Cisco Aironet Access Points
Cisco Aironet Series wireless access points can be deployed in a distributed
or centralized network for a branch office, campus, or large enterprise. To
achieve an exceptional end-user experience on the wireless network, these
wireless access points provide a variety of capabilities, including:
Cisco CleanAir Technology: For a self-healing, self-optimizing
network that avoids RF interference
Cisco ClientLink 2.0 or 3.0: To improve reliability and coverage for
clients
Cisco BandSelect: To improve 5 GHz client connections in mixed
client environments
Cisco VideoStream: Leverages multicast to improve multimedia
applications
Indoor 802.11n Access Points
The following outlines the various models of Cisco indoor 802.11n APs and
their capabilities.
Cisco
Aironet 600
Series
Cisco
Aironet
700W Series
Cisco
Aironet 1600
Series
Cisco
Aironet 2600
Series
Cisco Aironet
3600 Series
Wi-Fi
Standard
802.11a/b/g/n 802.11a/b/g/n 802.11a/b/g/n 802.11a/b/g/n 802.11a/b/g/n/ac
Number of
Radios
Dual (2.4Ghz
and 5 Ghz)
Dual (2.4Ghz
and 5 Ghz)
Dual (2.4Ghz
and 5 Ghz)
Dual (2.4Ghz
and 5 Ghz)
Tri (2.4Ghz and
5 Ghz)
Max Data
Rate
300 Mbps 300 Mbps 300 Mbps 450 Mbps 450 Mbps
(802.11n)
1.3Gbps
(802.11ac
Module)
MIMO
Radio
Design
2x3 2x2 3x3 3x4 802.11n: 4x4
802.11ac: 3x3
Spatial
Streams
2 Spatial
Streams
2 Spatial
Streams
2 Spatial
Streams
3 Spatial
Streams
3 Spatial
Streams
Antennas Internal Internal 1600i
Internal
1600e
External
2600i:
Internal
2600e:
External
3600i: Internal
3600e: External
3600p: External
CleanAIR — — CleanAir Yes Yes
2.0 Express
ClientLink
2.0
— — Yes Yes Yes
Cisco
Innovations
— BandSelect
Videostream
BandSelect
Videostream
BandSelect
Videostream
BandSelect
Videostream
Modularity USB* — — — 802.11ac Wave
1 Module
USC Small Cell
Module
Wireless
Security Module
(WSM)
Power AC DC,
802.3afPoE,
802.3at PoE+
DC,
802.3afPoE
DC,
802.3afPoE
DC,
802.3afPoE,
802.3at PoE+,
Enhanced PoE,
Universal PoE
Interfaces 5x1G
Ethernet
Ports (RJ-)45
1x1G
Ethernet
WAN Ports
(RJ-45)
1x1G
Ethernet
Uplink Port
(RJ-45)
4x1G
Ethernet User
Ports (RJ-45)
1x1G
Ethernet
Uplink Port
(RJ-45)
1x1G
Ethernet
Uplink Port
(RJ-45)
1x1G Ethernet
Uplink Port (RJ-
45)
Table 2-02: Indoor 802.11n Access Points
Indoor 802.11ac Access Points
The following table outlines the various models of Cisco indoor 802.11ac
APs and their capabilities.
Cisco Aironet
1700 Series
Cisco Aironet
1850 Series
Cisco Aironet
2700 Series
Cisco Aironet
3700 Series
Wi-Fi
Standard
802.11a/b/g/n/ac
(Wave 1)
802.11a/b/g/n/ac
(Wave 2)
802.11a/b/g/n/ac
(Wave 1)
802.11a/b/g/n/ac
(Wave 1)
Number of Dual (2.4Ghz Dual (2.4Ghz Dual (2.4Ghz Dual (2.4Ghz and 5
Radios and 5 Ghz) and 5 Ghz) and 5 Ghz) Ghz)
Max Data
Rate
867 Mbps 1.7 Gbps 1.3 Gbps 1.3 Gbps
MIMO
Radio
Design
3x3 4x4 3x4 4x4
Spatial
Streams
2 Spatial
Streams
4 Spatial
Streams (SU
MIMO)
3 Spatial
Streams (MU
MIMO)
3 Spatial
Streams
3 Spatial Streams
Antennas 1700i:internal 1850i Internal
1850e: External
2700i Internal
2700e External
3700i: Internal
3700e: External
3700p: External
CleanAIR
2.0
CleanAir
Express
CleanAir
Express
Yes Yes
ClientLink
3.0
Tx Beam
Forming
Tx Beam
Forming
Yes Yes
Cisco
Innovations
BandSelect
Videostream
BandSelect
Videostream
BandSelect
High Density
Experience
Videostream
BandSelect
StadiumVision
High Density
Experience
Videostream
Modularity — USB 2.0* — 802.11ac Wave 2
Module
USC Small Cell
Module
Hyperlocation
Module
Wireless Security
Module (WSM)
Power DC,
802.3afPoE,+,
DC,
802.3afPoE,+,
DC,
802.3afPoE,+,
DC,
802.3afPoE,802.3at
Enhanced PoE Enhanced PoE Enhanced PoE PoE+, Enhanced
PoE, Universal
PoE
Interfaces 1x1G Ethernet
Uplink Port (RJ-
45)
1x1G Ethernet
Aux Port (RJ-
45)
1x1G Ethernet
Uplink Port (RJ-
)45w/AutoLAG
1x1G Ethernet
AUX Port (RJ-
45)w/AutoLAG
1x1G Ethernet
Uplink Port (RJ-
45)
1x1G Ethernet
Aux Port (RJ-
45)
1x1G Ethernet
Uplink Port (RJ-
45)
Table 2-03: Indoor 802.11ac Access Points
Cisco Prime Infrastructure
Wireless communication has introduced a new phenomenon. Mobile device
expansion, extensive voice and video collaboration, and cloud and data center
virtualization are transforming the network like never before. However, it is
confirmed that new technologies always come up with the new challenges.
There is the need for higher service levels, guaranteed application delivery,
and simplified end-user experiences, while maintaining business continuity
and controlling operating costs.
To address these challenges, IT professionals introduced a Cisco Prime
Infrastructure that provides a comprehensive solution, which enables
managing the network from a single graphical interface. It provides lifecycle
management and service assurance network range, from the wireless user in
the branch office, across the WAN, through the access layer, and now to the
data center. We call it One Management.
Figure 2-08: Cisco Prime Infrastructure - One Management
Cisco Prime Infrastructure is a network management that connects the
network to the device to the user to the application, end-to-end and all in one.
Its features allow:
Single Pane View Management: Delivers a single, unified platform
for day-0 and day-1 provisioning and day-n assurance. It accelerates
device and services deployment, helping you to quickly resolve
problems that can affect the end-user experience
SimplifiedDeployment of Cisco Value-Added Features: Makes the
design according to theCisco distinguished features and services fast
and effective. With support for technologies such as Intelligent WAN
(IWAN), Distributed Wireless with Converged Access, Application
Visibility and Control (AVC), Zone-Based Firewall, and Cisco
TrustSec 2.0 Identity-Based Networking Services
Application Visibility: Configured and used as a source of
performance data embedded Cisco instrumentation and industry-
standard technology to deliver networkwide, application-aware
visibility. These technologies include NetFlow, Network-Based
Application Recognition 2 (NBAR2), Cisco Medianet technologies,
Simple Network Management Protocol (SNMP), and more. The
innovative co-ordination of application visibility and lifecycle
management of Cisco Prime Infrastructure makes it easier to find and
resolve problems by providing awareness into the health of
applications and services in the circumstance of the health of the
underlying infrastructure
Management for Mobile Collaboration: Solution to the who, what,
when, where, and how of wireless access. It includes 802.11ac
support, correlated wired-wireless client visibility, unified access
infrastructure visibility, spatial maps, converged security and policy
monitoring and troubleshooting with Cisco Identity Services Engine
(ISE) integration, location-based tracking of interferers, rogues, and
Wi-Fi clients with Cisco Mobility Services Engine (MSE) and Cisco
CleanAir integration, lifecycle management, RF prediction tools, and
more
Management Across Network and Compute: Provides powerful
lifecycle management and service assurance to help you manage and
maintain the many devices and services running on your branch-
office, campus, and data center networks. It provides significant
capabilities such as discovery, inventory, configuration, monitoring,
troubleshooting, reporting, and administration
Centralized Visibility of Distributed Networks: Large or global
organizations often distribute network management by domain,
region, or country. Cisco Prime Infrastructure Operations Center
visualizes up to 10 Cisco Prime Infrastructure instances, scaling your
network-management infrastructure during maintaining central
visibility and control
Licensing Options
Cisco Prime Infrastructure is a single installable software package with
licensing options to expand and grow functions and coverage as needed.
Lifecycle: Simplifies the day-to-day operational tasks related with managing
the network infrastructure across all lifecycle phases (design, deploy,
operation, and report) for Cisco devices including routers, switches, access
points, and more.
Assurance: Provides application performance visibility using device support
as a source of rich performance data to help assure consistent application
delivery and an optimal end-user experience.
Cisco UCS Server Management: Offers lifecycle and assurance management
for Cisco UCS B- and C-Series Servers.
Operations Center: Enables visualization of up to 10 Cisco Prime
Infrastructure instances from one central management console. One license is
required for each Cisco Prime Infrastructure supported instance.
High-Availability Right to Use (RTU): Allows high-availability configuration
with one primary and one secondary instance in a high-availability pair.
Collector: Increases the NetFlow processing limit on the Cisco Prime
Infrastructure management node. This license is used in combination with the
Assurance license.
Ready-to-Use Gateway RTU: Enables you to configure a separate gateway
for use with the ready-to-use feature, where new devices can call in to the
gateway to receive their configuration and software image.
Cisco Mobility Services Engine
The Cisco Mobility Services Engine is an open platform that provides a new
approach to the delivery of mobility services in a centralized & scalable
manner. A combination of hardware and software, the Cisco 3300 Series
Mobility Services Engine (MSE) is an appliance-based solution that supports
a set of software services. The Mobility Services Engine transforms the
wireless LAN into a mobility network by extracting the application layer
from the network layer, which effectively delivers mobile applications across
wired and wireless networks.
The Cisco MSE provides the capability to track the physical location of
Network Devices, both wired and wireless, using Wireless LAN Controllers
(WLCs) and Cisco Aironet CAPWAP APs. This solution allows you to track
any Wi-Fi device, including clients, active RFID tags, and rogue clients and
APs. It was designed according to the following requirements:
Manageability: Cisco Prime Infrastructure is used to administer and monitor
the MSE. Furthermore, the MSE integrates directly into the wireless LAN
architecture, which provides one unified network to manage instead of
multiple separated wireless networks.
Scalability: The Cisco MSE series can simultaneously track 25,000 elements
in CAS and 5,000 APs in wIPS. The CPI can manage multiple Mobility
Services Engines for greater scalability. The Wireless LAN Controller
(WLC), CPI, and MSE are implemented through separate devices to deliver
greater scalability and optimum performance.
Security: The WLC, CPI, and MSE provide robust secure interfaces and
secure protocols to access data. The MSE records past location information
that can be used for audit trails and regulatory compliance.
Open and Standards Based: The MSE has a SOAP/XML API that can be
accessed by external systems and applications that can influence location
information from the MSE.
Easy Deployment of Business Applications: The MSE can be integrated with
new business applications such as asset tracking, inventory management,
location-based security, or automated workflow management.
AP Modes
Many Cisco APs can operate in both modes either autonomous or
lightweight, depending on the code image, which is loaded and run. From the
Wireless LAN Controller (WLC), you can also configure a lightweight AP to
operate in one of the following special-purpose modes:
Local: The default lightweight mode that offers one or more operating Basic
Service Sets (BSSs) on a specific channel. During the times that it is not
transmitting, the AP will scan the other channels to measure the level of
noise, measure interference, discover rogue devices, and match against
Intrusion Detection System (IDS) events.
Monitor: The AP does not transmit at all, but its receiver is enabled to act as
a dedicated sensor. The AP checks for IDS events, detects rogue access
points, and determines the position of stations through location-based
services.
FlexConnect: An AP at a remote site can locally switch traffic between an
SSID and a VLAN if its Control and Provisioning of Wireless Access Points
(CAPWAPs) tunnel to the WLC is down and if it is configured to do so.
Sniffer: An AP dedicates its radios to receiving 802.11 traffic from other
sources, much like a sniffer or packet capture device. The captured traffic is
then forwarded to a PC running network analyzer software such as
Wildpackets OmniPeek or WireShark, where it can be analyzed further.
Rogue Detector: An AP dedicates itself to detecting rogue devices by
correlating MAC addresses heard on the wired network with those heard over
the air. Rogue devices are those that appear on both networks.
Bridge: An AP becomes a dedicated bridge (point-to-point or point-to-
multipoint) between two networks. Two APs in bridge mode can be used to
link two locations separated by a distance. Multiple APs in bridge mode can
form an indoor or outdoor mesh network.
Flex+Bridge: FlexConnect operation is enabled on a mesh AP.
SE-Connect: The AP dedicates its radios to spectrum analysis on all wireless
channels. You can remotely connect a PC running software such as
MetaGeek Chanalyzer or Cisco Spectrum Expert to the AP to collect and
analyze the spectrum analysis data to discover sources of interference.
Physical Infrastructure Connections of WLAN Components
(AP, WLC, Access/TrunkPorts, and LAG)
The mobile user wants the same accessibility, security, quality-of-service,
and high availability enjoyed by wired users. Whether you are on-site, at
home, on the road, locally or internationally, there is a need to connect. The
technological challenges are obvious, but to this end, mobility plays a role to
facilitate everyone. Companies are obtaining business value from mobile and
wireless solutions.
Wireless LANs contains a list of components similar to traditional Ethernet-
wired LANs. In fact, wireless LAN protocols are similar to Ethernet and
comply with the same form factors. The major difference, however, is that
wireless LANs do not require wires.
Access Points
An access point has a radio card that communicates with individual user
devices on the wireless LAN, as well as a wired NIC that interfaces to a
distributed system, such as Ethernet. System software within the access point
links together the wireless LAN and distribution sides of the access point.
The system software distinguishes access points by providing changing
degrees of management, installation, and security functions.
In many cases, the access point provides an http interface that enables
configuration changes to the access point through an end-user device that is
equipped with a network interface and a web browser. Some access points
also have a serial RS-232 port for configuring the access point through a
serial cable as well as a user device running terminal emulation and Telnet
software, such as hyper terminal.
Wireless LAN Controllers
A WLAN is a wireless design that aims to meet changing network
requirements. A WLAN controller manages wireless network access points
that allow wireless devices to connect to the network. A wireless LAN
controller is used in combination with the Lightweight Access Point Protocol
(LWAPP) to manage light-weight access points in large quantities by the
network administrator or network operations center. The wireless LAN
controller is an important part of the Cisco Unified Wireless Model. The
WLAN controller automatically handles the configuration of wireless access-
points.
Access Ports/Trunk Ports
An access port is related to and carries out the traffic of only one VLAN.
Traffic is both received and sent in native formats without VLAN
information (tagging) whatsoever. Any information arriving to the access
port, simply belongs to the VLAN assigned to that port.
A trunk port is a port that is assigned to carry traffic for all the VLANs that
are accessible by a specific switch, a process known as trunking. Trunk ports
mark frames with unique identifying tags, either 802.1Q tags or Interswitch
Link (ISL) tags as they move between switches.
A WLAN corresponds a Service Set Identifier (SSID) to an interface or an
interface group. It is configured with security, Quality of Service (QoS), radio
policies, and other wireless network parameters. Up to 512 WLANs can be
configured per controller. Each controller port connection is an 802.1Q trunk
and should be configured as such on the neighbor switch. On Cisco switches,
the native VLAN of an 802.1Q trunk is an untagged VLAN. If you configure
an interface to use the native VLAN on a neighboring Cisco switch, ensure
that you configure the interface on the controller to be untagged. The default
(untagged) native VLAN on Cisco switches is VLAN 1. When controller
interfaces are configured as tagged, the VLAN must be allowed on the
802.1Q trunk configuration on the neighbor switch and not be the native
untagged VLAN.
We mentioned that tagged VLANs should be used on the controller. You
should also allow only relevant VLANs on the neighbor switch’s 802.1Q
trunk connections to controller ports. All other VLANs should be disabled or
pruned in the switch port trunk configuration. This method is extremely
important for optimal performance of the controller.
LAG
Link Aggregation (LAG) is a fractional implementation of the 802.3ad port
aggregation standard. It ties all of the controller’s distribution system ports
into a single LAG port channel. LAG reduces the number of IP addresses
required to configure the ports on the controller. When LAG is enabled, the
system dynamically manages port redundancy and load balances access
points clearly to the user.
LAG simplifies controller configuration because there is no longer the need
to configure primary and secondary ports for each interface. If any of the
controller ports fail, traffic is automatically moved to one of the other ports.
Though at least one controller port is functioning, the system continues to
operate, access points remain connected to the network, and wireless clients
continue to send and receive data.
AP and WLC Management Access Connections (Telnet, SSH,
HTTP, HTTPS, Console, and TACACS+/RADIUS)
Access Point
An access point has a radio card that communicates with individual user
devices on the wireless LAN, as well as a wired NIC that interfaces to a
distributed system, such as Ethernet. System software within the access point
links together the wireless LAN and distribution sides of the access point.
The system software distinguishes access points by providing changing
degrees of management, installation, and security functions.
Dependency on networks is higher than ever. Cisco Catalyst® and Cisco
Aironet® Access Points are the next generation of Cisco® wireless Access
Points.
Wireless Controllers Management Access
Connections 
A WLAN is a wireless design that aims to meet changing network
requirements. A WLAN controller manages wireless network access points
that allow wireless devices to connect to the network. A wireless LAN
controller is used in combination with the Lightweight Access Point Protocol
(LWAPP) to manage light-weight access points in large numbers by the
network administrator or network operations center. A browser-based GUI is
built into the controller. It allows up to five users to concurrently browse into
the controller HTTP or HTTPS (HTTP + SSL) management pages to
configure parameters and monitor the operational status of the controller and
its related access points.
Telnet and SSH
Telnet is a network protocol used to provide access to the controller’s
browser. Secure Shell (SSH) is a more secure version of Telnet for data
transfer that uses data encryption and a secure channel. You can use the
controller GUI or CLI to configure Telnet and SSH sessions.
Configuring Telnet and SSH Sessions (GUI)
Procedure
Step 1: Select Management > Telnet-SSH to open the Telnet-SSH
Configuration page.
1
Figure 2-09: Configuring Telnet and SSH Sessions
Step 2: In the Telnet Login Timeout option, enter the number of minutes
that a Telnet session is allowed to remain inactive before being terminated.
The valid range is 0 to 160 minutes (inclusive), and the default value is 5
minutes. A value of 0 indicates no timeout.
Step 3: From the Maximum Number of Sessions drop-down list, choose
the number of simultaneous Telnet or SSH sessions allowed. The valid
range is 0 to 5 sessions (inclusive), and the default value is 5 sessions. A
value of zero indicates that Telnet/SSH sessions are disallowed.
Step 4: To forcefully close current login sessions, choose Management >
User Sessions > close from the CLI session drop-down list.
Step 5: From the Allow New Telnet Sessions drop-down list, choose Yes
or No to allow or disallow new Telnet sessions on the controller. The
default value is No.
Step 6: From the Allow New SSH sessions, choose Yes or No to allow or
disallow new SSH sessions on the controller from the drop-down list. The
default value is Yes.
Step 7: Click Apply.
Step 8: Click Save Configuration.
Step 9: To see a summary of the Telnet configuration settings, choose
Management > Summary. The summary page will appear.
Figure 2-10: Summary of Configuring Telnet and SSH Sessions
HTTP and HTTPS
This session provides guidelinesto enable the distribution system port as a
web port (using HTTP) or as a secure web port (using HTTPS). You can
protect communication by enabling HTTPS with the GUI. HTTPS protects
HTTP browser sessions by using the Secure Sockets Layer (SSL) protocol.
When you enable HTTPS, the controller generates its own local web
administration SSL certificate and automatically applies it to the GUI. You
also have an option of downloading an externally generated certificate.
Configuring HTTP and HTTPS (GUI)
Procedure
Step 1: Select Management > HTTP-HTTPS.
The HTTP-HTTPS Configuration page is displayed.
Step 2: To enable web mode, which allows users to access the controller
GUI using http://ip-address, choose Enabled from the HTTP Access
drop-down list. Otherwise, choose Disabled. The default value is disabled.
Web mode is not a secure connection.
Step 3: To enable secure web mode, which allows users to access the
controller GUI using https://ip-address, choose Enabled from the HTTPS
Access drop-down list. Otherwise, select Disabled. The default value is
enabled. Secure web mode is a secure connection.
Step 4: In the Web Session Timeout field, enter the amount of time, in
minutes, before the web session times out due to inactivity. You can enter a
value between 10 and 160 minutes (inclusive). The default value is 30
minutes.
Step 5: Click Apply.
Step 6: If you enabled secure web mode in Step 3, the controller generates
a local web administration SSL certificate and automatically applies it to
the GUI. The details of the current certificate appear in the middle of the
HTTP-HTTPS Configuration page.
Step 7: Choose Controller > General to open the General page.
http://ip-address
https://ip-address
Select one of the following options from the drop-down list of Web Color
Theme:
Default—Configures the default web color theme for the controller GUI.
Red—Configures the web color theme as red for the controller GUI.
Step 8: Click Apply and Click Save Configuration
Figure 2-11: Configuring HTTP and HTTPS
Step 9: To see a summary of the Telnet configuration settings, choose
Management > Summary. The summary page will appear.
Figure 2-12: Summary of Configuring HTTP and HTTPS
Console (CLI)
The Cisco wireless solution, Command Line Interface (CLI) is a built-in
feature in every controller. CLI allows you to use a VT-100 terminal
emulation program to locally or remotely configure, monitor, and control
individual controllers and its related lightweight access points. CLI is a text-
based, tree-structured interface that allows up to five users with Telnet-
capable terminal emulation programs to access the controller.
Configuring CLI
Procedure
Step 1: Connect console cable; connect one end of a standard Cisco
console serial cable with an RJ45 connector to the controller’s console port
and the other end to your PC’s serial port.
Step 2: Configure terminal emulator program with default settings:
9600 baud
8 data bits
1 stop bit
No parity
No hardware flow control
Step 3: Log on to the CLI; when prompted, enter a valid username and
password to log on to the controller. The administrative username and
password that you created in the configuration wizard are case sensitive.
Note
The default username is admin, and the default password is admin.
The CLI displays the root level system prompt:
(Cisco Controller) >
TACACS+/RADIUS
There are two common security protocols of AAA used to control access in a
network, which are RADIUS and TACACS+. These protocols are generally
used as a language of communication between a networking device and AAA
server.
RADIUS:
Remote Authentication Dial-In User Service (RADIUS) is an access server
that uses AAA protocol, it secures remote access of network and network
services from unauthorized users. Data transaction between RADIUS and
client are authenticated by the use of shared secret key and all the passwords
are sent encrypted, so it reduces the chances of password detection by an
unauthorized user even in an unsecured network. RADIUS does
authentication and authorization simultaneously. RADIUS is an open
standard, which means that all vendors can use it in their AAA
implementation.
Authentication: It is the process of verifying users when they attempt to log
into the controller. Users must enter a valid username and password in order
for the controller to authenticate users to the RADIUS server.
Accounting: It is the process of recording user actions and changes.
Whenever a user successfully executes an action, the RADIUS accounting
server logs the changed attributes, the user ID of the person who made the
change, the remote host where the user is logged in, the date and time when
the command was executed, the authorization level of the user, and a
description of the action performed and the values provided.
Configuring RADIUS (GUI)
Procedure
Step 1: Select Security > AAA > RADIUS.
Step 2: Configure one of the following:
If you want to configure a RADIUS server for authentication,
select Authentication
If you want to configure a RADIUS server for accounting, select
Accounting
Step 3: From the Acct Call Station ID Type drop-down list, select the
option that is sent to the RADIUS server in the Access-Request message.
The following options are available:
IP Address
System MAC Address
AP MAC Address
AP MAC Address:SSID
AP Name:SSID
AP Name
AP Group
Flex Group
AP Location
VLAN ID
AP Ethernet MAC Address
AP Ethernet MAC Address:SSID
Step 4: Enable RADIUS-to-controller key transport using AES key wrap
protection by checking the Use AES Key Wrap check box. The default
value is unchecked. This feature is required for FIPS customers.
Step 5: From the MAC Delimiter drop-down list, select the option that is
sent to the RADIUS server in the Access-Request message.
The following options are available:
Colon
Hyphen
Single-hyphen
None
Step 6: Click Apply.
Figure 2-13: Configuring RADIUS
Perform one of the following:
➢ To edit an existing RADIUS server, select the server index
number for that server. The RADIUS Authentication (or
Accounting) Servers > Edit page appears
➢ To add a RADIUS server, click New. The RADIUS
Authentication (or Accounting) Servers > New page appears
Figure 2-14: Configuring RADIUS
Step 7: If you are adding a new server, choose a number from the Server
Index (Priority) drop-down list to specify the priority order of this server in
relation to any other configured RADIUS servers providing the same
service.
Step 8: If you are adding a new server, enter the IP address of the RADIUS
server in the Server IP Address text box.
Step 9: From the Shared Secret Format drop-down list, select ASCII or
Hex to specify the format of the shared secret key to be used between the
controller and the RADIUS server. The default value is ASCII.
Step 10: In the Shared Secret and Confirm Shared Secret text boxes, enter
the shared secret key to be used for authentication between the controller
and the server.
Note
The shared secret key must be same for both server and the controller.
Step 11: Check the Apply Cisco ISE Default settings check box (optional).
Enabling Cisco ISE Default settings changes the following parameters:
CoA is enabled by default
The Authentication server details (IP and shared-secret) are also
applied to the Accounting server
The Layer 2 security of the WLAN is set to WPA+WPA2
802.1X is the default AKM
MAC filtering is enabled if the Layer 2 security is set to None
The Layer 2 security is either WPA+WPA2 with 802.1X or
None with MAC filtering
You can change these default settings if required.
Step 12: If you are configuring a new RADIUS authentication server and
want to enable AES key wrap, which makes the shared secret between the
controller and the RADIUS server more secure, follow these steps:
Step 13: If you are configuring a new server, enter the RADIUS server’s
UDP port number for the interface protocols in the Port Number text box.
The valid range is 1 to 65535, and the default value is 1812 for
authentication and 1813for accounting.
Step 14: From the Server Status text box, select Enabled to enable this
RADIUS server or select Disabled to disable it. The default value is
enabled.
Step 15: If you are configuring a new RADIUS authentication server, by
the Support for CoA drop-down list, select Enabled to enable change of
authorization, which is an extension to the RADIUS protocol that allows
dynamic changes to a user session, or select Disabled to disable this
feature. By default, this is set to disabled state.
Step 16: In the Server Timeout text box, enter the number of seconds
between retransmissions. The valid range is 2 to 30 seconds, and the
default value is 2 seconds.
Ensure the Key Wrap check box.
Step 17: Ensure the Network User check box to enable network user
authentication (or accounting), or uncheck it to disable this feature. The
default value is unchecked.
Step 18: If you are configuring a RADIUS authentication server, ensure
the Management check box to allow management authentication, or
uncheck the check box to disallow this feature. The default value is
checked.
Step 19: Enter the Management Retransmit Timeout value, represents the
network login retransmission timeout for the server.
Step 20: If you want to enable a tunnel gateway as AAA proxy, ensure the
Tunnel Proxy check box. The gateway can operate as a proxy RADIUS
server as well as a tunnel gateway.
Step 21: Ensure the PAC Provisioning check box to allow PAC for
RADIUS authentication (or accounting), or uncheck it to disallow this
feature. The default value is unchecked.
Step 22: Ensure the IPSec box check to enable the IP security mechanism,
or uncheck the check box to disable this feature. The default value is
unchecked.
Figure 2-15: Configuring RADIUS
Step 23: If you used IPsec, follow these steps to configure additional IPsec
parameters:
From the IPSec drop-down list, select one of the following options as the
authentication protocol to be used for IP security: HMAC MD5 or HMAC
SHA1. The default value is HMAC SHA1
From the IPSec Encryption drop-down list, select one of the following
options to specify the IP security encryption mechanism:
➢ DES—Data Encryption Standard that is a process of data
encryption using a private (secret) key. DES applies a 56-bit key to
each 64-bit block of data
➢ 3DES—Data Encryption Standard that applies three keys in
succession. This is the default value
➢ AES CBC—Advanced Encryption Standard that uses keys with
a length of 128, 192, or 256 bits to encrypt data blocks with a length
of 128, 192, or 256 bits. AES 128 CBC uses a 128-bit data path in
Cipher Block Chaining (CBC) mode
➢ 256-AES—Advanced Encryption Standard that uses keys with a
length of 256 bits
From the IKE Phase 1 drop-down list, select one of the following options
to specify the Internet Key Exchange (IKE) protocol: Aggressive or Main.
The default value is Aggressive
In the Lifetime text box, type a value (in seconds) to specify the timeout
interval for the session. The valid range is 1800 to 57600 seconds, and the
default value is 1800 seconds
From the IKE Diffie Hellman Group drop-down list, select one of the
following options to specify the IKE Diffie Hellman group: Group 1 (768
bits), Group 2 (1024 bits), or Group 5 (1536 bits). The default value is
Group 1 (768 bits).
Figure 2-16: Configuring RADIUS
Step 24: Click Apply.
Step 25: Click Save Configuration.
Figure 2-17: Configuring RADIUS
TACACS+
TACACS+ stands for Terminal Access Control Access Control Server and it
is Cisco proprietary. As RADIUS, TACACS+ is also used as a
communication between networking device and AAA server. Unlike
RADIUS, TACACS+ encrypts the entire packet body, and attaches
TACACS+ header to the message body. TACACAS+ ensures reliable
delivery between clients and servers as it uses TCP connection, since it is a
Cisco proprietary, it has a granular control over Cisco’s router and switches.
TACACS+ does authentication, authorization and accounting separately, so
different methods of controlling AAA functions can be achieved separately.
One of the main differences between RADIUS and TACACS+ is that
RADIUS only encrypts password and transacts other RADIUS packets as
clear text over the network.
Authentication: It is the procedure of verifying users when they attempt to
log in to the controller. Users must enter a valid username and password in
order for the controller to authenticate users to the TACACS+ server. The
authentication and authorization services are bind to one another.
Authorization: It is the procedure of determining the actions that users are
allowed to take on the controller based on their level of access. For
TACACS+, authorization is based on privilege rather than specific actions.
The available roles correspond to the seven menu options on the controller
GUI: MONITOR, WLAN, CONTROLLER, WIRELESS, SECURITY,
MANAGEMENT, and COMMANDS. An additional role, LOBBY, is
available for users who require only lobby ambassador privileges. The roles
to which users are assigned are configured on the TACACS+ server. Users
can be authorized for one or more roles.
Accounting: It is the procedure of recording user actions and changes. Any
time a user successfully executes an action, the TACACS+ accounting server
logs the changed action, the user ID of the person who made the change, the
remote host where the user is logged in, the date and time when the command
was executed, the authorization level of the user, and the explanation of the
action performed and the values provided.
Configuring TACACS+ (GUI)
Procedure
Step 1: Choose Security > AAA > TACACS+.
Step 2: Perform one of the following:
If you want to configure a TACACS+ server for authentication,
select Authentication
If you want to configure a TACACS+ server for authorization,
select Authorization
If you want to configure a TACACS+ server for accounting,
select Accounting
Note
The pages used to configure authentication, authorization, and accounting
are all placed in the same text boxes. Therefore, these instructions go
through the configuration only once, using the Authentication pages as
examples. You would follow the same steps to configure multiple services
and/or multiple servers.
For basic management authentication by TACACS+ to succeed, it is
required to configure authentication and authorization servers on the WLC.
Accounting configuration is optional.
The TACACS+ (Authentication, Authorization, or Accounting) Servers
page will appear. This page lists any TACACS+ servers that have already
been configured.
If you want to delete an existing server, float your cursor over the blue
drop-down arrow for that server and choose Remove.
If you want to make sure that the controller can reach a particular server,
float your cursor over the blue drop-down arrow for that server and choose
Ping.
Step 3: Configure one of the following:
➢ To edit an existing TACACS+ server, click the server index
number for that server. The TACACS+ (Authentication,
Authorization, or Accounting) Servers > Edit page appears
➢ To add a TACACS+ server, click New. The TACACS+
(Authentication, Authorization, or Accounting) Servers > New
page appears
Step 4: If you are adding a new server, choose a number from the Server
Index (Priority) drop-down list to specify the priority order of this server in
relation to any other configured TACACS+ servers providing the same
service. You can configure up to three servers. If the controller cannot
reach the first server, it tries the second one in the list and then the third if
need.
Step 5: If you are adding a new server, enter the IP address of the
TACACS+ server in the Server IP Address text box.
Step 6: From the Shared Secret Format drop-down list, choose ASCII or
Hex to specify the format of the shared secret key to be used between the
controller and the TACACS+ server. The default format is ASCII.
Step 7: In the Shared Secret and Confirm Shared Secret text boxes, enter
the shared secret key to be used for authentication betweenthe controller
and the server.
Note
The shared secret key must be the same on both the server and the
controller.
Step 8: If you are adding a new server, enter the TACACS+ server’s TCP
port number for the interface protocols in the Port Number text box. The
valid range is 1 - 65535, and the default value is 49.
Step 9: In the Server Status text box, choose Enabled to enable this
TACACS+ server or choose Disabled to disable it. The default value is
enabled.
Step 10: In the Server Timeout text box, enter the number of seconds
between retransmissions. The valid range is 5 to 30 seconds, and the
default value is 5 seconds.
Step 11: Click Apply.
Figure 2-18: Configuring TACACS+
Components of a Wireless LAN Access for Client Connectivity
using GUI
A wireless LAN controller and an access point work in parallel provide
network connectivity to wireless clients. From a wireless standpoint, the AP
advertises a Service Set Identifier (SSID) for clients to join. From a wired
standpoint, the controller connects to a Virtual LAN (VLAN) through one of
its dynamic interfaces. To complete the path between the SSID and the
VLAN, you must first define a WLAN on the controller.
Figure 2-19: Connecting Wired and Wireless Networks with a WLAN
The above figure shows a Wireless LAN Controller (WLC) and an Access
Point (AP) that are connected to a network cloud on the right and left
respectively. The AP has a wireless connection with a subnet
192.168.199.0/24 that represents an SSID Engineering. The AP and WLC are
connected by a Control and Provisioning of Wireless Access Points
(CAPWAP). This connection presents a complete WLAN. The WLC has a
wired connection on the right with a subnet 192.168.199.199/24. VLAN 100
exists in the connection that presents VLAN (Interface Engineering). The
controller will connect the WLAN to one of its interfaces and then by default
push the WLAN configuration out to all of its APs. From the point forward,
wireless clients will be able to learn about the new WLAN by receiving its
beacons and will be able to search and join the new Basic Service Set (BSS).
Like VLANs, you can use WLANs to separate wireless users and their traffic
into logical networks. Users connected with one WLAN cannot cross over
into another one unless their traffic is bridged or routed from one VLAN to
another through the wired network infrastructure.
Before you create new WLANs, it is usually smart to plan your wireless
network first. In a large enterprise, you might have to support an extensive
variety of wireless devices, user communities, security policies, and etc. You
might be tempted to create a new WLAN for every event, just to keep groups
of users separated from each other or to support different types of devices.
Although it is an attractive strategy, you should be aware of two restrictions:
Cisco controllers support a maximum of 512 WLANs, but only 16
of them can be actively configured on an AP
Advertising each WLAN to potential wireless clients uses up
valuable airtime
Every AP must broadcast beacon management frames at a particular time to
advertise the existence of a BSS. Because each WLAN is bound to a BSS,
each WLAN must be advertised with its own beacons. Beacons are usually
sent 10 times per second, or once every 100 minutes, at the lowest mandatory
data rate.
According to the rule of thumb, always limit the number of WLANs to five
or fewer; a maximum of three WLANs is best. By default, a controller has a
limited initial configuration, so no WLANs are defined.
Before you create a new WLAN, think about the following parameters that
will be required:
SSID string
Controller interface and VLAN number
Type of wireless security needed
As we work through this section, we will create the appropriate dynamic
controller interface to support the new WLAN; then we will enter the
necessary WLAN parameters. Each configuration step is performed using a
Graphical User Interface (GUI) that is connected to the WLC’s management
IP address.
Step 1. Configure a RADIUS Server
If your new WLAN uses a security scheme that requires a RADIUS server,
such as WPA2-Enterprise or WPA3-Enterprise, you will need to define the
server first.
Select Security > AAA > RADIUS > Authentication
Click New to create a new server.
Enter the server’s IP address, shared secret key, and port number, as shown in
Figure 2-20. Because the controller already has two other RADIUS servers
configured, the server at 192.168.200.30 will be indexed as number 3. Be
sure to set the server status to Enabled so that the controller can start using it.
At the bottom of the page, you can select the type of user that will be
authenticated with the server.
Check Network User to authenticate wireless clients or Management to
authenticate wireless administrators that will access the controller’s
management functions.
Click Apply to complete the server configuration.
Figure 2-20: Configuring a New RADIUS Server
Step 2. Create a Dynamic Interface
A dynamic interface is used to connect the controller to a VLAN on the wired
network. When you create a WLAN, you will connect the dynamic interface
and VLAN to a wireless network.
To create a new dynamic interface, navigate to Controller > Interfaces. You
would see a list of all the controller interfaces that are currently configured.
In Figure 2-21, two interfaces named “management” and “virtual” already
exist.
Click the New button to define a new interface.
Figure 2-21: Displaying a List of Dynamic Interfaces
Enter a name for the interface and the VLAN number it will be bound to.
Figure 2-22, shows the interface named Engineering is mapped to wired
VLAN 100.
Click the Apply button.
Figure 2-22: Defining a Dynamic Interface Name and VLAN ID
Next, enter the IP address, subnet mask, and gateway address for the
interface. You should also define primary and secondary DHCP server
addresses that the controller will use when it relays DHCP requests from
clients that are bound to the interface.
Figure 2-23: shows the interface named Engineering has been configured
with IP address 192.168.100.10, subnet mask 255.255.255.0, gateway
192.168.100.1, and DHCP servers 192.168.1.17 and 192.168.1.18.
Click the Apply button to complete the interface configuration and return to
the list of interfaces.
Figure 2-23: Editing the Dynamic Interface Parameters
Step 3. Create a New WLAN
You can show a list of the currently defined WLANs by selecting WLANs
from the top menu bar.
In Figure 2-24, the controller does not have any WLANs already defined.
You can create a new WLAN by selecting Create New from the drop-down
menu and then clicking the Go button.
Figure 2-24: Displaying a List of WLANs
Next, enter a descriptive name as the profile name and the SSID text string.
In Figure 2-25, the profile name and SSID are identical, just to keep things
clear. The ID number is used as an index into the list of WLANs that are
defined on the controller. The ID number becomes useful when you use
templates in Prime Infrastructure (PI) to configure WLANs on multiple
controllers at the same time.
Figure 2-25: Creating a New WLAN
Go to the next page that will allow you to edit four categories of parameters,
corresponding to the tabs across the top as shown in Figure 2-26.
Figure 2-26: Configuring the General WLAN Parameters
You can control whether the WLAN is enabled or disabled with the Status
check box. Under Radio Policy, select the type of radio that will offer the
WLAN. By default, the WLAN will be offered on all radios that are joined
with the controller.
Next, select which of the controller’s dynamic interfaces will be bound to the
WLAN. By default, the management interface is selected. The drop-down list
contains all the interface names that are available. In Figure 2-26, the new
IPSpecialist WLAN will be bound to the Engineering interface.
Finally, enable the Broadcast SSID by selecting the check box. APs should
broadcast the SSID name in the beacons they transmit. Broadcasting SSIDs is
usually more convenient forusers for connecting to the WLAN because their
devices can learn and display the SSID names automatically.
Configuring WLAN Security
Select the Security tab to configure the security settings. By default, the
Layer 2 Security tab is selected. From the Layer 2 Security drop-down menu,
select the appropriate security scheme to use.
WPA+WPA2 has been selected from the pull-down menu; then only WPA2
and AES encryption have been selected. WPA and TKIP have been avoided
because they are outdated methods.
Under the Authentication Key Management section, you can select the
authentication methods the WLAN will use. PSK will be selected, so the
WLAN will allow only WPA2-Personal with pre-shared key authentication
as shown in Figure 2-27.
Figure 2-27: Configuring Layer 2 WLAN Security
Configuring WLAN QoS
Select the QoS tab to configure quality of service settings for the WLAN, as
shown in Figure 2-28.
By default, the controller will consider all frames in the WLAN to be normal
data and handled in a “best effort” manner.
You can set the Quality of Service (QoS) drop-down menu to classify all
frames in one of the following ways:
Platinum (voice)
Gold (video)
Silver (best effort)
Bronze (background)
Figure 2-28: Configuring QoS Settings
Configuring Advanced WLAN Settings
Finally, you can select the Advanced tab to configure a variety of advanced
WLAN settings.
You can enable functions such as coverage hole detection, peer-to-peer
blocking, client exclusion, client load limits, and so on as shown in the Figure
2-29.
Figure 2-29: Configuring Advanced WLAN Settings
Finalizing WLAN Configuration
When you are satisfied with the settings in each of the WLAN configuration
tabs, click the Apply button in the upper-right corner of the WLAN Edit
page.
Figure 2-30: Finalizing WLAN Configuration
Finally, the WLAN will be created and added to the controller configuration.
The WLAN ‘Engineering’ has been added as WLAN ID 1 as shown in Figure
2-31 and is enabled for use.
Figure 2-31: Displaying WLANs Configured on a Controller
Mind Map of Network Access
Figure 2-32: Mind Map of Network Access
Summary
VLANs (Normal Range) Spanning Multiple Switches
A Virtual LAN (LAN) is a switched network that is logically
divided by function, project team or application without regarding
physical locations of the users or host
VLANs have similar attributes as physical LANs, but you can
group end stations/hosts even if they are not physically situated on
the same LAN segment
Normal-range VLANs are VLANs with VLAN IDs 1-1005
A data VLAN is a VLAN that is configured to carry user-
generated traffic
Most switches allow you to add a second VLAN on a switch port
for your voice traffic, called the voice VLAN
Interswitch Connectivity
Cisco originally created their own way of marking traffic with a
VLAN ID for transport over an interswitch link. It was named
Inter Switch Link (ISL)
Trunk ports mark frames with unique identifying tags, either
802.1Q tags or Interswitch Link (ISL) tags as they move between
switches
802.1Q adds a 4-Byte header to the frame indicating the VLAN
(Virtual LAN) membership as compared to ISL, which
encapsulates (adds header and trailer) to the frame
Layer 2 Discovery Protocols (Cisco Discovery Protocol and LLDP)
Cisco Discovery Protocol (CDP) is a Device Discovery protocol,
which operates at data link layer (Layer 2) on all Cisco-
manufactured devices and permits network management
applications for discovering Cisco devices that are neighboring
devices
To support non-Cisco devices and allow for interoperability
between other devices, the switch supports the IEEE 802.1AB
LLDP
(Layer 2/Layer 3) EtherChannel (LACP)
An EtherChannel consists of Fast Ethernet or Gigabit Ethernet
links bundled into a single logical link
The EtherChannel offers full-duplex bandwidth up to 800 Mb/s
(Fast EtherChannel) or 8Gb/s (Gigabit EtherChannel) between one
switch to another switch
LACP allows the automatic creation of EtherChannels by
exchanging the LACP packets between Ethernet ports
Basic Operations of Rapid PVST+ Spanning Tree Protocol
Rapid PVST+ provides rapid convergence of the spanning tree by
assigning port roles and learning the active topology
To configure a VLAN instance to become the root bridge, modify
the bridge priority from the default value (32768) to a considerably
lower value
The great advantage of configuring Portfast, a port configured with
Portfast will immediately start transmitting data in the
‘forwarding’ state bypassing the other spanning-tree states
Cisco Wireless Architectures vs. AP Modes
The Cisco unified wireless network architecture offers secure,
scalable, cost-effective wireless LANs solution for business
critical mobility
The Cisco Unified Wireless Network is the enterprise’s only
unified wired and wireless solution that cost-effectively addresses
the Wireless LAN (WLAN) security, deployment, management,
and control issues
The core components of Cisco Unified Wireless Network are
Cisco Wireless LAN Controllers (WLCs), Cisco Aironet Access
Points (APs), Cisco Prime Infrastructure (PI), Cisco Mobility
Services Engine (MSE)
Physical Infrastructure Connections of WLAN Components (AP, WLC,
Access/Trunk Ports, and LAG)
An access point has a radio card that communicates with
individual user devices on the wireless LAN, as well as a wired
NIC that interfaces to a distributed system, such as Ethernet
A WLAN controller manages wireless network access points that
allow wireless devices to connect to the network
LAG simplifies controller configuration because there is no longer
the need to configure primary and secondary ports for each
interface
AP and WLC Management Access Connections (Telnet, SSH, HTTP,
HTTPS, Console, and TACACS+/RADIUS)
A wireless LAN controller is used in combination with the
Lightweight Access Point Protocol (LWAPP) to manage light-
weight access points in large numbers by the network
administrator or network operations center
Telnet is a network protocol used to provide access to the
controller’s browser
Secure Shell (SSH) is a more secure version of Telnet for data
transfer that uses data encryption and a secure channel
HTTP/HTTPs session provides guidelines to enable the
distribution system port as a web port (using HTTP) or as a secure
web port (using HTTPS)
There are two common security protocols of AAA used to control
access in a network, which are RADIUS and TACACS+
Components of a Wireless LAN Access for Client Connectivity using
GUI
Before you create a new WLAN, think about the following
parameters that will be required:
• SSID string
• Controller interface and VLAN number
• Type of wireless security needed
A wireless LAN controller and an access point work in parallel to
provide network connectivity to wireless clients
From a wireless standpoint, the AP advertises a Service Set
Identifier (SSID) for the client to join
From a wired standpoint, the controller connects to a virtual LAN
(VLAN) through one of its dynamic interfaces
To complete the path between the SSID and the VLAN, you must
first define a WLAN on the controller
Practice Questions
1. Switch SW1 sends a frame to switch SW2 using 802.1Q trunking.
Which of the answers describes how SW1 changes or adds to the
Ethernet frame before forwarding the frame to SW2?
A. It inserts a 4-byte header and does change the MAC addresses
B. It inserts a 4-byte header and does not change the MAC
addresses
C. It encapsulates the original frame behind an entirely new
Ethernet header
D. None of the other answers are correct
2. Which of the following commands identify switch interfaces as
being trunking interfaces: interfaces that operate as VLAN trunks?
(Choose 2)
A. show interfaces
B. show interfaces switchport
C. show interfaces trunk
D. show trunks
3. What STP feature causes an interface to be placed in the
forwarding state as soon as the interface is physically active?
A. STP
B. EtherChannel
C. Root Guard
D. PortFast
4. Which type value on the spanning-tree mode type global commandenables the use of RSTP?
A. rapid-pvst
B. pvst
C. rstp
D. rpvst
5. A lab engineer configures a switch to put interfaces G0/1 and G0/2
into the same Layer 2 EtherChannel. Which of the following terms
is used in the configuration commands?
A. EtherChannel
B. PortChannel
C. Ethernet-Channel
D. Channel-group
6. An access point is set up to offer wireless coverage in an office.
Which one of the following is the correct 802.11 term for the
resulting standalone network?
A. BSA
B. BSD
C. BSS
D. IBSS
7. What command allows you to view the VLANs and interface
assignments on your switch?
A. show vlan brief
B. show vlan status
C. show vlan information
D. show vlan database
8. What command assigns an access port to VLAN 20?
A. switchport vlan 20sexi
B. switchport mode vlan 20
C. switchport assign vlan 20
D. switchport access vlan 20
9. What command assigns an access port to Voice VLAN 10?
A. switchport voice vlan 10
B. switchport access vlan 10 voice
C. switchport vlan 10 voice
D. switchport access vlan 10
10. What command configures an interface to trunk?
A. switchport trunk
B. switchport trunk dot1q
C. switchport mode trunk
D. switchport trunk enable
11. What command allows you to quickly view all of the trunks
on your switch?
A. show vlans trunk
B. show interface trunk
C. show trunk interface
D. show trunk all
12. When you would like to connect to a WLC to configure a
new WLAN on it, which one of the following is a valid method to
use?
A. SSH
B. HTTPS
C. HTTP
D. All of the above
13. Which one of the following correctly describes the single
logical link formed by bundling all of a controller’s distribution
system ports together?
A. EtherChannel
B. Trunk ports
C. LAG
D. VLAN
14. Which two of the following elements are bound together
when a new WLAN is created? (Choose 2)
A. VLAN
B. AP
C. Controller Interface
D. SSID
15. What is the maximum number of WLANs you can configure
on a Cisco’s wireless controller?
A. 8
B. 16
C. 1024
D. 512
16. Which of the following parameters are necessary when
creating a new WLAN with the controller GUI? (Choose all that
apply)
A. SSID
B. VLAN number
C. Interface
D. BSSID
17. Which of the following is a fractional implementation of the
802.3ad port aggregation standard?
A. LAG
B. CAPWAP
C. LACP
D. Rapid PVST+
18. When you need to connect a lightweight AP to a network,
which one of the following link types would be required?
A. Access Mode
B. Trunk Mode
C. LAG Mode
D. EtherChannel
19. Switch Dept1 sends a frame to switch Dept2 using 802.1Q
trunking. Which of the answers describes how Dept1 changes or
adds to the Ethernet frame before forwarding the frame to Dept2?
A. It inserts a 4-byte header and does change the MAC addresses
B. It inserts a 4-byte header and does not change the MAC
addresses
C. It encapsulates the original frame behind an entirely new
Ethernet header
D. None of the other answers are correct
20. What STP feature causes an interface to be placed in the
forwarding state as soon as the interface is physically active?
A. STP
B. EtherChannel
C. Root Guard
D. PortFast
Chapter 03: IP Connectivity
Technology Brief
In the previous chapter, we have discussed the roles and functions of different
components that include routers, L1 & L2 switches, firewalls, and servers.
We discussed characteristics of network topology architecture, physical
interfaces and cabling types, how the issues with these cable types could be
identified, and subnetting. We also looked at the configuration of VLAN
spanning multiple switches and the verification of their connectivity. In this
chapter, we will discuss the routing concept with the support of static routing
for both IPV4 & IPV6 and the OSPFv2 routing protocol.
Components of the Routing Table
Entries to networks are part of a routing table. It shows that the networks are
either directly connected, statically configured or dynamically learned. The
“show ip route” command is used to view a routing table. Using this
command will present you with something like the following:
The IP Routing Table on a Cisco Router
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, + - replicated route
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.10.10.0/24 is directly connected, FastEthernet0/0
L 10.10.10.1/32 is directly connected, FastEthernet0/0
172.16.0.0/24 is subnetted, 3 subnets
R 172.16.1.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
R 172.16.2.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
R 172.16.3.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
192.168.1.0/32 is subnetted, 1 subnets
O 192.168.1.2 [110/2] via 10.10.10.2, 00:00:37, FastEthernet0/0
192.168.2.0/32 is subnetted, 1 subnets
O 192.168.2.2 [110/2] via 10.10.10.2, 00:00:37, FastEthernet0/0
Routing Protocol Code
The term routing refers to taking a packet from one device and sending it
through the network to another device on a different network.
Following are the basic operation of routing:
Routing is a process to discover far end networks
Routing is a process use to discover multiple paths to far end
networks
Routing is used to select the best path
Once you create an internetwork by connecting your WANs and LANs to a
router, you will need to configure logical network addresses, like IP
addresses, to all hosts on that internetwork for them to communicate
successfully throughout it.
The information necessary to forward a packet along the best path towards its
destination resides in the routing table. It contains the information about the
packet’s origin and destination. Upon receiving a packet, a network device
examines the packet and matches it to the routing table entry and provides the
best match for its destination. The packet is then provided with the
instructions for sending them to the next hop on their route across the
network.
The following information is included in a basic routing table:
Destination: The IP address of the packet's final destination
Next Hop: The IP address to which the packet is forwarded
Interface: The outgoing network interface the device should use
when forwarding the packet to the next hop or final destination
Metric: Assigns a cost to each available route so that the most
cost-effective path can be chosen
Routes: Includes directly-attached subnets, indirect subnets that
are not attached to the device but can be accessed through one or
more hops, and default routes to use for certain types of traffic or
when information is lacking
The routing protocol code identifies which route was learned by which
routing protocol.
Routing protocol code are located at the very beginning of a routing table
entry. Cisco is kind to us and even provides a legend at the beginning of the
show output to explain what each value means. Here are those values for
your ease of reference:
• L—local
• C—connected
• S—static
• R—RIP
• M—mobile
• B—BGP
• D—EIGRP
• EX—EIGRP external
• O—OSPF
• IA—OSPF inter area
• N1—OSPF NSSA external type 1
• N2—OSPF NSSA external type 2
• E1—OSPF external type 1
• E2—OSPF external type 2
• i—IS-IS
• su—IS-IS summary
• L1—IS-IS level-1
• L2—IS-IS level-2
• ia—IS-IS inter area
• *—candidate default
• U—per-user static route
• o—ODR
• P—periodic downloaded static route
• +—replicated route
Prefix
The network address is simply termed as a prefix. The prefix is the
destination network address in the routing table. The shorthand way toexpress a subnet mask using CIDR notation is a prefix-length e.g., for the
subnet mask 255.255.255.0, the prefix-length is /24.
Notice that the routing table lists the parent and children prefixes reachable in
the table. For example, in the table above, the entry 172.16.0.0/24 is
subnetted, three subnets are listing the parent prefix, then the specific child
prefixes below are of 172.16.1.0, 172.16.2.0, and 172.16.3.0.
Network Mask
As we mentioned earlier, the prefix-length is simply a shorthand way to
express a network mask using CIDR notation. A network mask is also called
a subnet mask or net mask for short.
Notice, in the routing table list given, the parent prefix lists the network mask
in prefix notation. So for the 172.16.0.0 example above, the network mask
is /24. Remember, in non-prefix notation, this is 255.255.255.0.
Network address Prefix-length Type of route Subnet mask
0.0.0.0/0 Zero Default route 0.0.0.0.
172.16.0.0/16 /16 A summary route for
the four 172.16.x.x
networks
255.255.0.0
172.16.1.0/24 /24 A summary route 255.255.255.0
172.16.1.1/32 /32 A preferred route for
this specific IP
address
255.255.255.255
Table 3-01: Types of Route and Subnet Mask
Next Hop
The IP address of the next router inline is identified by next hop to forward
the packet. The next hop IP address follows the “via” word for a child prefix
entry. The next hop refers to the IP address of the next router in the path
when forwarding packets to a remote destination.
Administrative Distance
Administrative distance is used to select the best path when a router has two
different paths to the same destination via two different routing protocols.
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.10.10.0/24 is directly connected, FastEthernet0/0
L 10.10.10.1/32 is directly connected, FastEthernet0/0
172.16.0.0/24 is subnetted, 3 subnets
R 172.16.1.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
R 172.16.2.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
 RIP AD 
R 172.16.3.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
192.168.1.0/32 is subnetted, 1 subnet
O 192.168.1.2 [110/2] via 10.10.10.2, 00:00:37, FastEthernet0/0
192.168.2.0/32 is subnetted, 1 subnet OSPF AD
O 192.168.2.2 [110/2] via 10.10.10.2, 00:00:37, FastEthernet0/0
As shown in the above outputs. The administrative distance for RIP is 120 for
172.16.1.0 connected through 10.10.10.3 while AD for OSPF is 110 for
192.168.2.2 connected through 10.10.10.2.
The Administrative Distance for the Prefix
Note that the Administrative Distance (AD) associated with the 172.16.0.0/24
prefixes is 120. This is because these routes were learned via RIP, and 120 is
the default administrative distance for RIP. Most of the routing protocols are
not compatible with other protocols. It is a critical task to select the best path
between multiple protocols in a network with multiple routing protocols. The
reliability of a routing protocol is defined by an administrative distance. An
administrative distance value prioritizes each routing protocol in order of
most to least reliable. IPv6 also uses the same distances as IPv4.
The AD is used to rate the trustworthiness of routing information received on
a router from a neighbour router. An administrative distance is an integer
from 0 to 255, where 0 is the most trusted and 255 means no traffic will be
passed via this route.
If a router receives two updates listing the same remote network, the first
thing the router checks is the AD. If one of the advertised routes has a lower
AD than the other route with the lowest AD will be chosen and placed in the
routing table.
Default Administrative Distances
The default administrative distances are shown in the table given below:
Routing Protocol Administrative Distance
Connected 0
Static 1
Eigrp Summary Route 5
BGP (external) 20
EIGRP 90
IGRP 100
OSPF 110
IS-IS 115
RIP 120
External EIGRP 170
BGP(internal) 200
Unknown 255 (This route will never be used)
Table 3-02: Values for the Administrative Distances
Metric
The metric is a value that is produced by the routing protocol's algorithm.
The best path to a destination network within a routing protocol is determined
by the metric value.
The metric varies for the dynamic routing protocol involved. It is a measure
of the “distance” to reach the prefix. In our 172 prefixes, it is a hop count.
This is the simple metric used by RIP. It indicates how many routers you
must cross to reach the destination prefix in question. Different protocols
have different matrices as described in the table given below:
Protocol Matric
RIP Hop Count
EIGRP K values
OSPF Reference Bandwidth
Table 3-03: Matrices for Different Protocols
Routes to a destination are compared using metric value by the same routing
protocol. The preferred routes to be followed by the lower matric values.
Routing Information Protocol (RIP) Metric Value
Hop count is used by the RIP (Routing Information Protocol) as
the metric
Data must pass from source network to reach the destination by
passing through the number of routers termed as hop count
Hop Count is the Number of Routers data must pass from source
network to reach the destination
Figure 3-01: Hop Count
In the topology given above, the Source Network router is R1 and the
Destination Network router is R4. An IP datagram must hop three routers to
reach the Destination Network. The middle route consists of R2, and R3 to
reach the destination R4.
Gateway of Last Resort
The default route configured on the router is termed as the gateway of last
resort. Packets that are addressed to networks not explicitly listed in the
routing table are directed using default routes. When learning all the more
specific networks topologies that are not desirable, default routes become
invaluable.
Any of the following commands can be used to configure the gateway of last
resort:
ip default-gateway a.b.c.d
http://www.omnisecu.com/cisco-certified-network-associate-ccna/introduction-to-routing-information-protocol-rip.php
ip default-network a.b.c.d
ip route 0.0.0.0 0.0.0.0 a.b.c.d
Notice again in our routing table example, it is indicated that there is no
Gateway of Last Resort set. This means that there is no default route 0.0.0.0/0
setup that allows the router to send traffic somewhere if it does not have a
specific prefix entry for the destination IP address. The Gateway of Last
Resort can be dynamically learned, or can be set using three different
commands: ip default-gateway, ip default-network, and ip route 0.0.0.0
0.0.0.0.
The IP Routing Table on a Cisco Router
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, + - replicated route
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.10.10.0/24 is directly connected, FastEthernet0/0
L 10.10.10.1/32 is directly connected, FastEthernet0/0
172.16.0.0/24 is subnetted, 3 subnets
R 172.16.1.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
R 172.16.2.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
R 172.16.3.0 [120/1] via 10.10.10.3, 00:00:19, FastEthernet0/0
192.168.1.0/32 is subnetted, 1 subnet
O 192.168.1.2 [110/2] via 10.10.10.2, 00:00:37, FastEthernet0/0
192.168.2.0/32 is subnetted, 1 subnet
O 192.168.2.2 [110/2] via 10.10.10.2, 00:00:37, FastEthernet0/0
How a Router Makes Forwarding Decision by Default?
Longest Match
The longest prefix match is an algorithm used in Internet Protocol (IP)
networking for selecting an entry from a forwardingtable. Each entry in a
forwarding table specifies a sub-network. More than one forwarding table
entry may be matched with one destination address. In the matching table
entries, the one with the longest subnet mask is called the longest prefix
match. It is the entry where the largest number of leading address bits of the
destination address match those in the table entry.
Example
Let’s look at a scenario; a router with varying prefix lengths has four routing
processes running on it, and each process has received these routes:
EIGRP (internal): 192.168.32.0/26
RIP: 192.168.32.0/24
OSPF: 192.168.32.0/19
In the routing table, the installed routes will be with the one having best
administrative distance. In this example EIGRP internal routes have the best
administrative distance, it is tempting to assume the first one will be installed.
Making Forwarding Decisions
The three routes installed in the routing table can be shown by the command:
router# show ip route
....
D 192.168.32.0/26 [90/25789217] via 10.1.1.1
R 192.168.32.0/24 [120/4] via 10.1.1.2
O 192.168.32.0/19 [110/229840] via 10.1.1.3
....
If a packet destined for 192.168.32.1 arrives on a router interface, the route to
be chosen depends on the prefix length, or the number of bits set in the
subnet mask. Longer prefixes are always preferred over shorter ones when
forwarding a packet.
A packet destined to 192.168.32.1 is directed toward 10.1.1.1 as 192.168.32.1
falls within the 192.168.32.0/26 network. It also falls within the other two
routes available, but the 192.168.32.0/26 has the longest prefix within the
routing table (26 bits verses 24 or 19 bits).
Administrative Distance
By using the administrative distance, one routing protocol is preferably
chosen over another when both accounts have the same destination network.
The routing information received from different protocols of a Cisco router
for the same destination network, the Routing Protocol having a lower
administrative distance will be used.
Static routes have a lower AD than any of the dynamic routing protocols. The
routes for same destination network learned from dynamic routing protocols
will preferably be followed.
The multiple static routes can be specified via different interfaces with higher
administrative distance for the purpose of failover. If the router’s interface
goes down, it will remove the route through it and install the other static route
with a higher AD. These routes are called floating static routes.
Routing Protocol Metric
The routers use the Metrics cost value. Metric determines the best path to a
destination network. The preferred or shortest path to a particular destination
is determined by the dynamic routing protocols. The main factors for the
decision include metrics and algorithms. The preferred path to be followed by
the packets is decided by Metrics. These are static and may not be changed
for some routing protocols. A network administrator may assign these values
for other routing protocols. The hop, bandwidth, delay, reliability, load, and
cost are the most common metric values.
Hop
This metric value is used to measure distance based on the number
of networks a datagram crosses
A single hop count is considered each time a router forwards a
datagram onto a segment
Routing protocols observing hops as their primary metric value
consider the best or preferred path to a destination to be the one
with the least number of network hops
Routing protocols that only reference hops as their metric do not
always select the best path through a network
Just because a path to a destination contains fewer network hops
than another does not make it the best
The upper path may contain a slower link, such as 56Kb dial-up
link along the second hop, whereas the lower path may consist of
more hops but faster links, such as gigabit Ethernet
If this were the case, the lower path would undoubtedly be faster
than the upper. However, routing protocols that use hops do not
consider other metric values in their routing decisions
Bandwidth
This metric is used by protocols that consider the capacity of a link
Bits per second is used to measure the Bandwidth
Links supporting the higher transfer rates like gigabit are preferred
over lower capacity links like 56Kb
The bandwidth capacity of each link along the end-to-end path is
determined and considered by these protocols
The path chosen as the best route is with the overall higher
bandwidth
Delay
Delay is measured in tens of microseconds
The symbol μ is used to indicate a delay
Delay represents the amount of time it takes for a router to
process, queue, and transmit a datagram out an interface
Protocols that use this metric must determine the delay values for
all links along the end-to-end path, considering the path with the
lowest (cumulative) delay to be a better route
Reliability
An administrator may configure this matric as a fixed value. It is measured
dynamically over a specific time frame. The attached links, reporting
problems, such as link failures, interface errors, lost datagrams are observed
by the routers. Links having more problems would be considered less
reliable. The higher the reliability is, the better is the path. The link reliability
will change with a constant changing network conditions. This value is
generally measured as a percentage of 255, with 255 being the most reliable
and 1 being the least reliable.
Load
Load is a variable value that indicates the traffic load over a
specific link
Load is a variable value, generally measured over a five-second
window indicating the traffic load over a specific link
The amount of traffic occupying the link over this time frame as a
percentage of the link's total capacity is measured by the load
The value 255 is equivalent to 100% utilization or load
The higher the value, the higher will be the traffic load (bandwidth
utilization) across this link
Increasing this value results in the increase of the traffic
Congestion is indicated by the values approaching 255, while
lower values indicate moderate traffic loads
The less congested path is mostly preferred Cost
The way routers make path decisions can be affected by network
administrators
It is by setting arbitrary metric values on links along the end-to-
end path
These arbitrary values are typically single integers with lower
values indicating better paths
IPv4 and IPv6 Static Routing
IP Addresses
An Internet Protocol address is also called IP address. This is a numerical
label assigned to each device connected to a computer network that uses the
IP for communication. For a specific machine on a particular network, the IP
address act as an identifier. It is also called IP number and internet address.
The technical format of the addressing and packets scheme is specified in the
IP address. IP is combined with a TCP in most of the networks. A virtual
connection development between a destination and a source is allowed in IP
addresses.
IPv4 Address
The first version of IP was IPv4. It was deployed in the ARPANET for
production, in 1983. It is the most widely used IP version nowadays. Devices
on a network are identified by using an addressing system. A 32-bit address
scheme is used in IPv4 that allows to store 2^32 addresses, which is more
than 4 billion addresses.
IPv6 is a successor of IPv4. With IPv4, a system will be able to simplify
address assignments and additional network security features and will also
offer far more numerical addresses. The IPv4 to IPv6 transition is likely to be
rough, though.
This underlying technology allows us to connect our devices to the web. A
device accessing the internet is assigned a unique, numerical IP address such
as 99.48.227.227. A data packet must be transferred across the network
containing the IP addresses of both devices in order to send data from one
computer to another through the web. Computers would not be able to
communicate and send data to each other without IP addresses.
Features of IPv4
It is a connectionless Protocol
It allows creating a simplevirtual communication layer over
expanded devices
Less memory and ease of remembering addresses are required in
this addressing scheme 
Millions of devices support this protocol
Video libraries and conferences are offered in IPV4
The Reason Why We Are Running out of IPv4 Addresses
32-bits internet addresses are used in IPv4. Around 4.29 billion, i.e., 2^32 IP
addresses in total can be supported in this scheme. All these 4.29 billion IP
addresses have now been assigned to various institutions, leading to the crisis
we face today. Many of them are unused and in the hands of institutions like
MIT and companies like Ford and IBM. More IPv4 addresses will be traded
or sold and many are available to be assigned but they will become a rarer
product over the next two years until it produces problem for the web.
Commands used to add a static route to a routing table from global config are
given below:
ip route [destination_network] [mask] [nexthop_address orexitinterface]
[administrative_distance] [permanent]
This list describes each command in the string:
ip route: The command used to create the static route.
destination network: The network you are placing in the routing table.
mask: The subnet mask used on the network.
next-hop address: This is the IP address of the next-hop router that will
receive packets and forward them to the remote network, which must signify
a router interface that is on a directly connected network. You must be able to
successfully ping the router interface before you can add the route. Important
note to self is that if you type in the wrong next-hop address or the interface
to the correct router is down, the static route will show up in the router's
configuration but not in the routing table.
Exitinterface: Can be used in place of the next-hop address if you want, and
it shows up as a directly connected route.
administrative distance: By default, static routes have an administrative
distance of 1 or 0 if you use an exit interface instead of a next-hop address.
You can change the default value by adding an administrative weight at the
end of the command.
Permanent: If the interface is shut down or the router cannot communicate to
the next-hop router, the route will automatically be discarded from the
routing table by default. Choosing the permanent option keeps the entry in
the vector.
IPv6 Address
The most recent version of the Internet Protocol is IPv6. It was initiated in
early 1994 by the Internet Engineer Taskforce. The design and development
of that suite is now called IPv6. It is the sixth revision to the Internet Protocol
and the successor to IPv4. The need for more internet addresses is fulfilled by
deploying this new IP address version. The issues associated with IPv4 has
been resolved with this addressing scheme. Three hundred and forty (340)
undecillion unique address spaces are allowed with 128-bit address space. It
is also called IPng (Internet Protocol next generation). It functions likewise to
IPv4 and provides the unique, numerical IP addresses essential for internet-
enabled devices to communicate. The one major difference of this addressing
scheme is that it utilizes 128-bit addresses.
Features of IPv6
It offers hierarchical addressing and routing infrastructure
It allows stateful and stateless configurations
It supports Quality of Service (QoS)
For neighboring node interaction, it is an ideal protocol
Problem Solved with IPv6
As IPv6 utilizes 128-bit internet addresses, 2128 internet addresses can be
supported in this scheme. Hence, it contains
340,282,366,920,938,000,000,000,000,000,000,000,000 addresses. They are
a lot of addresses and it requires a hexadecimal system to display the
addresses. There are more than enough IPv6 addresses to keep the internet
operational for a very, very long time.
Difference between IPv4 and IPv6 Addresses
Both IPv4 & IPv6 are IP addresses representing binary numbers
IPv4 is 32bit binary number while IPv6 is 128-bit binary number
address
IPv4 address are separated by full stops (.) while IPv6 address are
separated by colons (;)
Both are used to identify machines connected to a network
In principle, they are the same, but they are different in how they
work
IPv4 and IPv6 can exist together on the same network but cannot
communicate with other. This is also known as Dual Stack.
Default Route
Default route is used by IP to forward any packet with a destination not found
in the routing table, which is why it is also called a gateway of last resort.
Here is the configuration:
Router(config)#ip route 0.0.0.0 0.0.0.0 172.16.10.2
Router(config)#do show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is 172.16.10.2 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 172.16.10.2 Default Route
Network Route
When a route is created to a network (as most route entries do), it is called a
network route. This simply means that the route points to a group of hosts, as
does the following entry:
Router(config)#ip route 200.100.50.0 255.255.255.0 172.16.10.2
 Network Route
Router(config)#do show ip route
S 200.100.50.0/24 [1/0] via 172.16.10.2
Host Route
In most cases, we create routes to networks, but you can create a route
leading to a single host. An example of a host route is shown below. Note
that the mask that goes with the route is 32 bits in length, meaning it is a
route to a single IP address.
There are dynamically created host routes called local host routes as well.
One of these will be placed in the routing table for each router interface. An
example is shown below. Note that it has an L next to it and is preceded by
the network route for the directly connected network in which the interface
resides.
Router(config)#do show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is 172.16.10.2 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 172.16.10.2
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
C 172.16.10.0/24 is directly connected, Ethernet1/0
L 172.16.10.1/32 is directly connected, Ethernet1/0 Host
Route
S 172.16.20.0/24 is directly connected, Ethernet1/0
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, FastEthernet0/0
L 192.168.1.1/32 is directly connected, FastEthernet0/0 Host Route
S 192.168.2.0/24 is directly connected, Ethernet1/0
S 200.100.50.0/24 [1/0] via 172.16.10.2
Floating Static
A floating static route is simply one that has been created as a backup to a
route learned though a routing protocol. By creating the static route with an
administrative distance larger than that of the routing protocol, we can
prevent the use of the static route unless the dynamic route is unavailable.
The following example configures a static route with a distance of 125, which
would prevent it from being placed in the routing table as long as a route to
the same network with a lower distance value is present.
Router(config)#ip route 192.168.4.0 255.255.255.0 125
A static route that the router uses to back up a dynamic routeis known as a
floating static route. A floating static route must be configured with a higher
administrative distance than the dynamic route that it backs up. A dynamic
route is preferred to a floating static route at this instance. A floating static
route could be used as a replacement on losing a dynamic route.
Note
A RIP route has a distance of 120. A static route is preferred to a dynamic
route by default as a static route has a smaller administrative distance than
a dynamic route.
Case Study <IPV4 Static Routing>
An organization has interconnected three networks. All the networks need to
be connected statically to route traffic. The networks are able to access the
ISP. if any route to ISP gets disconnected, it should be able to access the ISP
through the floating static route with a greater administrative distance. The
configuration has been implemented using IPV4.
Topology Diagram:
Figure 3-02: IPV4 Static Routing
Configuration
R1
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#ip routing
R1(config)#interface eth 0/0
R1(config-if)#ip add 192.168.100.1 255.255.255.0
R1(config-if)#duplex full
R1(config-if)#no shutdown
R1(config-if)#ex
R1(config)#
*Nov 28 05:49:42.907: %LINK-3-UPDOWN: Interface Ethernet0/0,
changed state to up
*Nov 28 05:49:43.911: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Ethernet0/0, changed state to up
R1(config)#
R1(config)#interface serial 1/0
R1(config-if)#ip add 172.16.1.1 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#ex
R1(config)#
R1(config)#
*Nov 28 05:50:09.320: %LINK-3-UPDOWN: Interface Serial1/0, changed
state to up
*Nov 28 05:50:10.320: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/0, changed state to up
R1(config)#
R1(config)#interface serial 1/2
R1(config-if)#ip add 172.16.
R1(config-if)#ip add 172.16.3.1 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#ex
R1(config)#
*Nov 28 05:50:28.633: %LINK-3-UPDOWN: Interface Serial1/2, changed
state to up
*Nov 28 05:50:29.640: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/2, changed state to up
R1(config)#
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
//Default route
R1(config)#ip route 0.0.0.0 0.0.0.0 172.16.1.2
//Floating static route
R1(config)#ip route 0.0.0.0 0.0.0.0 172.16.3.2 5
//Host route
R1(config)#ip route 8.8.8.8 255.255.255.255 172.16.1.2
//Network route
R1(config)#ip route 192.168.200.0 255.255.255.0 172.16.3.2
R1(config)#
R2
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#ip routing
R2(config)#interface eth 0/0
R2(config-if)#ip add 192.168.200.1 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#ex
R2(config)#
*Nov 28 05:56:01.551: %LINK-3-UPDOWN: Interface Ethernet0/0,
changed state to up
*Nov 28 05:56:02.555: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Ethernet0/0, changed state to up
R2(config)#
R2(config)#interface serial 1/2
R2(config-if)#ip add 172.16.3.2 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#ex
R2(config)#
R2(config)#interface serial 1/1
R2(config-if)#ip add 172.16.2.1 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#ex
R2(config)#
*Nov 28 05:57:04.314: %LINK-3-UPDOWN: Interface Serial1/1, changed
state to up
*Nov 28 05:57:05.314: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/1, changed state to up
R2(config)#
//Default route
R2(config)#ip route 0.0.0.0 0.0.0.0 172.16.2.2
//Floating static route
R2(config)#ip route 0.0.0.0 0.0.0.0 172.16.3.1 5
//Host route
R2(config)#ip route 8.8.8.8 255.255.255.255 172.16.2.2
//Network route
R2(config)#ip route 192.168.100.0 255.255.255.0 172.16.3.1
R2(config)#
ISP
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip routing
Router(config)#interface serial 1/0
Router(config-if)#ip add 172.16.1.2 255.255.255.252
Router(config-if)#no shutdown
Router(config-if)#ex
Router(config)#interface serial 1/1
Router(config-if)#ip add 172.16.2.2 255.255.255.252
Router(config-if)#no shutdown
Router(config-if)#ex
Router(config)#hostname ISP
ISP(config)#interface loopback 0
ISP(config-if)#
*Nov 28 05:59:55.412: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Loopback0, changed state to up
ISP(config-if)#ip add 8.8.8.8 255.255.255.255
ISP(config-if)#no shutdown
ISP(config-if)#ex
ISP(config)#
//Network route
ISP(config)#ip route 192.168.200.0 255.255.255.0 172.16.2.1
ISP(config)#ip route 192.168.100.0 255.255.255.0 172.16.1.1
ISP(config)#
//Floating static route
ISP(config)#ip route 192.168.100.0 255.255.255.0 172.16.2.1 5
ISP(config)#ip route 192.168.200.0 255.255.255.0 172.16.1.1 5
ISP(config)#
Verification
As shown, default route is passing the traffic from R1’s serial interface
(172.16.1.2) directly connected to ISP.
Network route is working properly. User11 can successfully ping the
192.168.200.1 node.
Now, turn down the serial link between R1 and ISP for testing Floating
Static route.
R1(config)#interface serial 1/0
R1(config-if)#shutdown
R1(config-if)#ex
R1(config)#
*Nov 28 06:22:15.373: %LINK-5-CHANGED: Interface Serial1/0,
changed state to administratively down
*Nov 28 06:22:16.380: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/0, changed state to down
R1(config)#
ISP(config)#interface serial 1/0
ISP(config-if)#sh
ISP(config-if)#ex
ISP(config)#
*Nov 28 06:22:45.066: %LINK-5-CHANGED: Interface Serial1/0,
changed state to administratively down
*Nov 28 06:22:46.066: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/0, changed state to down
ISP(config)#
Now, floating static route is added in the routing table.
As shown, Backup route is added in the routing table with configured
administrative distance value 5.
Now, test the packet trace if backup route is successfully delivering the
packets
As shown, backup route is functional and R1 is passing the traffic via R2
(172.16.3.2) to ISP.
Case Study <IPv6 Static Routing>
An organization has interconnected three networks. All the networks need to
be connected statically to route traffic. The networks are able to access the
ISP. If any of the route to ISP, let’s say the link between R1 and ISP, gets
disconnected, it should be able to access the ISP through the floating static
route with a greater administrative distance. The configuration has now been
implemented using IPv6.
Topology Diagram
Figure 3-03: IPV6 Static Routing
Configuration
R1
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#ipv6 unicast-routing
R1(config)#interface eth 0/0
R1(config-if)#ipv6 add 2001:AAAA:BBBB:0001::1/64
R1(config-if)#no sh
R1(config-if)#ex
R1(config)#
*Nov 28 05:49:42.907: %LINK-3-UPDOWN: Interface Ethernet0/0, changed state to up
*Nov 28 05:49:43.911: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0,
changed state to up
R1(config)#
R1(config)#interface serial 1/0
R1(config-if)# ipv6 add 2001:AAAA:BBBB:0004::1/64
R1(config-if)#no sh
R1(config-if)#ex
R1(config)#
*Nov 28 05:50:09.320: %LINK-3-UPDOWN: Interface Serial1/0, changed state to up
*Nov 28 05:50:10.320: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1/0, changed
state to up
R1(config)#
R1(config)#interface serial 1/2
R1(config-if)# ipv6 add 2001:AAAA:BBBB:0003::1/64
R1(config-if)#no sh
R1(config-if)#ex
R1(config)#
*Nov 28 05:50:28.633: %LINK-3-UPDOWN: Interface Serial1/2, changed state to up
*Nov 28 05:50:29.640: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1/2, changed
state to up
R1(config)#
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
//Default route
R1(config)#ipv6 route ::/0 2001:AAAA:BBBB:4::2
//Floating static route
R1(config)#ipv6 route ::/0 2001:AAAA:BBBB:3::2 100
//Network route
R1(config)#ipv6 route 2001:AAAA:BBBB:0002::1/64 2001:AAAA:BBBB:0003::2
R1(config)#
R2
Router>
Router>en
Router#config t
Enter configuration commands, one per line. Endwith CNTL/Z.
Router(config)#hostname R2
R2(config)# ipv6 unicast-routing
R2(config)#interface e0/0
R2(config-if)#ipv6 add 2001:AAAA:BBBB:0002::1/64
R2(config-if)#no sh
R2(config-if)#ex
R2(config)#
*Nov 28 05:56:01.551: %LINK-3-UPDOWN: Interface Ethernet0/0, changed state to up
*Nov 28 05:56:02.555: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0,
changed state to up
R2(config)#
R2(config)#interface serial 1/2
R2(config-if)#ipv6 add 2001:AAAA:BBBB:0003::2/64
R2(config-if)#no sh
R2(config-if)#ex
R2(config)#
R2(config)#interface s1/1
R2(config-if)#ipv6 add 2001:AAAA:BBBB:0005::1/64
R2(config-if)#no sh
R2(config-if)#ex
R2(config)#
*Nov 28 05:57:04.314: %LINK-3-UPDOWN: Interface Serial1/1, changed state to up
*Nov 28 05:57:05.314: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1/1, changed
state to up
R2(config)#
//Default route
R2(config)# ipv6 route ::/0 2001:AAAA:BBBB:0005::2
//Floating static route
R2(config)#ipv6 route ::/0 2001:AAAA:BBBB:0003::1 100
//Network route
R2(config)#ipv6 route 2001:AAAA:BBBB:0001::2/64 2001:AAAA:BBBB:0003::1
R2(config)#
ISP
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ipv6 unicast-routing
Router(config)#hostname ISP
ISP (config)#interface serial 1/1
ISP (config-if)#ipv6 add 2001:AAAA:BBBB:0005::2/64
ISP (config-if)#no sh
ISP (config-if)#ex
ISP (config)#interface serial 1/0
ISP (config-if)#ipv6 add 2001:AAAA:BBBB:0004::2/64
ISP (config-if)#no sh
ISP (config-if)#ex
ISP (config)#hostname ISP
ISP(config)#interface loopback 0
ISP(config-if)#
*Nov 28 05:59:55.412: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0,
changed state to up
ISP(config-if)#ipv6 add 2001:AAAA:BBBB:0000::1/128
ISP(config-if)#no sh
ISP(config-if)#ex
ISP(config)#
//Default route
ISP(config)#ipv6 route ::/0 2001:AAAA:BBBB:0004::1
ISP(config)#ipv6 route ::/0 2001:AAAA:BBBB:0005::1
//Network route
ISP(config)#ipv6 route 2001:AAAA:BBBB:0001::0/64 2001:AAAA:BBBB:0004::1
ISP(config)#ipv6 route 2001:AAAA:BBBB:0002::0/64 2001:AAAA:BBBB:0005::1
ISP(config)#ipv6 route 2001:AAAA:BBBB:003::0/64 2001:AAAA:BBBB:0005::1
//Floating static route
ISP(config)#ipv6 route ::/64 2001:AAAA:BBBB:0005::0 100
ISP(config)#ipv6 route ::/64 2001:AAAA:BBBB:0004::0 100
ISP(config)#
Verification
R1#show ip route
Now turn down the serial link between R1 and ISP for testing Floating
Static route.
R1(config)#interface serial 1/0
R1(config-if)#sh
R1(config-if)#ex
R1(config)#
*Nov 28 06:22:15.373: %LINK-5-CHANGED: Interface Serial1/0,
changed state to administratively down
*Nov 28 06:22:16.380: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/0, changed state to down
R1(config)#
ISP(config)#interface serial 1/0
ISP(config-if)#sh
ISP(config-if)#ex
ISP(config)#
*Nov 28 06:22:45.066: %LINK-5-CHANGED: Interface Serial1/0,
changed state to administratively down
*Nov 28 06:22:46.066: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Serial1/0, changed state to down
ISP(config)#
Now, floating static route is added in the routing table
As shown, backup route is added in the routing table with configured
administrative distance value 100.
As shown, backup route is functional and R1 is passing the traffic via R2
(2001:AAAA:BBBB:0003::2) to ISP with interface
2001:AAAA:BBBB:0005::2.
Traceroute Loopback Output
In the output above the route to loopback address has been traced. As it is
shown clearly in the figure above, the traffic from virtual user is first sent
to the next hop that is 2001:AAAA:BBBB:1::1 then it takes the route of
network 3 at the interface 2001:AAAA:BBBB:3::2 and finally reaches the
destination 2001:AAAA:BBBB::1.
Single Area OSPFv2
Configuring basic OSPF is not as simple as configuring RIP and EIGRP, and
it can get really complex once the many options that are allowed within
OSPF are factored in. But that's okay because you really only need to focus
on the basic, single-area OSPF configuration at this point.
Next, we will show you how to configure single-area OSPF. The two factors
that are foundational to OSPF configuration are enabling OSPF and
configuring OSPF areas.
Common terminologies for OSPF are:
Router Types:
Internal Router: All interfaces reside within the same area
Backbone Router: A router with an interface in area 0 (the
backbone)
Area Border Router (ABR): Connects two or more areas
Autonomous System Boundary Router (ASBR): Connects to
additional routing domains, typically located at the backbone
Area Types:
Standard Area: Default OSPF area type
Stub Area: External link (type 5) LSAs are replaced with a default
route
Totally Stubby Area: Type 3, 4, and 5 LSAs are replaced with a
default route
Not So Stubby Area (NSSA): A stub area containing an ASBR;
type 5 LSAs are converted to type 7 within the area
Enabling Single: The easiest and also least scalable way to configure OSPF
is to use a single area. Doing this requires a minimum of two commands.
The first command used to activate the OSPF routing process is as follows:
Router(config)#router ospf?
The following commands are used to create neighbor
Router(router-config)#network 10.0.1.0 0.0.0.255 area 0
Router(router-config)#router-id 1.1.1.1
Process ID <1-65535>
The OSPF process ID values range from 1 to 65535.
Purpose: the process ID is used to enable one or more OSPF processes on a
router. An OSPF process can be removed by using the no form of the
command.
A value in the range from 1 to 65,535 identifies the OSPF process ID. It is a
unique number on this router that groups a series of OSPF configuration
commands under a specific running process. Different OSPF routers do not
have to use the same process ID to communicate.
The Show IP OSPF Interface Command
The show ip ospf interface command reveals all interface-related OSPF
information. Data is displayed about OSPF information for all OSPF-enabled
interfaces or for specified interfaces. Here are some of the more important
factors highlighted for you:
Area0-R1#show ip ospf interface gigabitethernet 0/0
Router#show ip ospf interface gigabitethernet 0/0
GigabitEthernet0/0 is up, line protocol is up
Internet address is 10.0.0.2/8, Area 1
Process ID 2, Router ID 192.168.3.1, Network Type BROADCAST,
Cost: 1
Transmit Delay is 1 sec, State BDR, Priority 1
Designated Router (ID) 192.168.1.1, Interface address 10.0.0.1
Backup Designated Router (ID) 192.168.3.1, Interface address 10.0.0.2
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:02
Index 2/2, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with neighbor 192.168.1.1 (Designated Router)
Suppress hello for 0 neighbor(s)
So this command has given us the following information:
Interface IP Address
Area Assignment
Process ID
Router ID
Network Type
Cost
Priority
DR/BDR Election Information (if applicable)
Hello and Dead Timer Intervals
Adjacent Neighbor Information
The reason the show ip ospf interface g0/0 command is used is because there
would be a designated router elected on the GigabitEthernet broadcast multi-
access network.
The show ip ospf neighbor command is super-useful because it summarizes
the pertinent OSPF information regarding neighbors and the adjacency state.
If a DR or BDR exists, that information will also be displayed. Here is a
sample:
Area0-R1#show ip ospf neighbor
Router#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
192.168.1.1 1 FULL/DR 00:00:38 10.0.0.1 GigabitEthernet0/0
192.168.2.1 1 FULL/BDR 00:00:38 11.0.0.1 GigabitEthernet0/1
The Show IP Protocols Command
The show ip protocols command is also highly useful, whether you are
running OSPF, EIGRP, RIP, BGP, IS-IS, or any other routing protocol that
can be configured on your router. It provides an excellent overview of the
actual operation of all running protocols.
Area0-R1#show ip protocols
Router#show ip protocol
Routing Protocol is "ospf 2"
Outgoingupdate filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Router ID 192.168.3.1
Number of areas in this router is 3. 3 normal 0 stub 0 nssa
Maximum path: 4
Routing for Networks:
192.168.3.0 0.0.0.255 area 0
10.0.0.0 0.255.255.255 area 1
11.0.0.0 0.255.255.255 area 2
Routing Information Sources:
Gateway Distance Last Update
192.168.1.1 110 00:23:43
192.168.2.1 110 00:21:40
192.168.3.1 110 00:21:41
Distance: (default is 110)
Figure 3-07: Showing the IP Protocols
The table below defines OSPF verification commands:
Command Description
Provides the
following
Verifies your OSPF-enabled interfaces
show ip ospf
neighbor
Displays OSPF-related information on an OSPF-
enabled interface
Show ip protocols Verifies the OSPF process ID and that OSPF is
enabled on the router
show ip ospf
interface
Verifies the routing table, and displays any OSPF
injected routes
Displays OSPF-
related information
on an OSPF-
enabled interface
Lists a summary of the LSAs in the database, with
one line of output per LSA, organized by type
Table 3-04: OSPF Verification Commands
Loopback Interfaces are logical interfaces, which means that they are
virtual, software-only interfaces, not actual, physical router interfaces. A big
reason we use loopback interfaces with OSPF configurations is because they
ensure that an interface is always active and available for OSPF processes.
Loopback interfaces also come in very handy for diagnostic purposes as well
as for OSPF configuration. Understand that if you do not configure a
loopback interface on a router, the highest active IP address on a router will
become that router's RID during boot-up:
City_X(config)#interf loopback 0
City_X(config-if)#ip address 172.31.1.2 255.255.255.0
City_X(config-if)#no sh
Neighbor Adjacency
There should be a compatible configuration with a remote interface for
OSPFv2 interface before the two can be considered neighbors. The following
criteria must be matched by the two OSPFv2 interfaces:
Hello Interval
Dead Interval
Area ID 
Authentication
Optional Capabilities
If a match is found, the information entered into the neighbor table will be as
follows:
Neighbor ID: The router ID of the neighbor
Priority: Priority of the neighbor
State: It indicates whether the neighbor has just been heard from, the
bidirectional communications are setup, the link-state information is shared,
or the full adjacency has been achieved
Dead Time: It indicates the time since the last Hello packet was received
from this neighbor
IP Address: The neighbor’s IP address
Designated Router: It Indicates whether the neighbor is declared as the
designated router or as the backup designated router
Local Interface: The local interface that received the Hello packet for this
neighbor
Adjacency
Adjacency is not established by all the neighbors. Some of the neighbors
become fully adjacent and share LSAs with all their neighbors depending on
the network type and designated router establishment. (For more information
see the “Designated Routers” section.)
Database Description packets, Link State Request packets, and Link State
Update packets in OSPF are used to establish the adjacency. Only the LSA
headers from the link-state database of the neighbor are included in the
Database Description packet.
The local router makes a comparison of these headers with its own link-state
database and defines which LSAs are new or updated. A Link State Request
packet for each LSA is being sent by the local router. The request shows that
it needs new or updated information. The neighbor starts responding with a
Link State Update packet. This process of exchange continues until both
routers have the same link-state information.
Point-to-Point
Open Shortest Path First (OSPF) runs as a point-to-point network type on
point-to-point links such as High-Level Data Link Control (HDLC) and
Point-to-Point Protocol (PPP). The OSPF network type is enabled by default.
The OSPF supports other network types that include Point-to-Multipoint,
Broadcast, and Non-Broadcast. The show ip ospf interface command is
issued for checking the network type of an interface that runs OSPF.
Broadcast (DR/BDR Selection)
The role of the Designated Router (DR) and a Backup Designated Router
(BDR) is to act as a central point to exchange the OSPF information between
multiple routers on the same, multi-access broadcast network segment. The
routing information should only be exchanged with the DR and BDR by the
Non-DR and Non-BDR routers instead of exchanging updates with every
other router upon the segment. The amount of OSPF routing updates are then
significantly reduced.
Note
OSPF does not elect DR/BDR roles upon point-to-point links, i.e., two
directly connected routers.
Election
Each router will go through an election process upon the segment to elect a
DR and BDR. The elected one is determined by using the two rules as:
Priority: Router with the highest priority wins the election. 1 is the default
priority. It is configured on a per-interface level.
Router ID: The highest router ID wins the election if there is a tie.
2-way
A full relationship is to be formed with the Designated and Backup
Designated Routers. The 2-way neighbor state is formed with Non-DR and
Non-BDR. They both send/receive each other's HELLOs but they do not
exchange any routing updates.
Router ID
The selection of OSPF Router-ID takes place in the order given below:
A 32-bit Router-ID is configured manually
If 1 is not configured, the highest IP of the loop back interface
must be selected
If 1 & 2 has not been configured, the highest IP of any active
interface must be selected
Purpose of First Hop Redundancy Protocol
First Hop Redundancy Protocol (FHRP) is used to allow gateway
redundancy. A class of redundancy protocols known as FHRPs includes
VRRP (Virtual Router Redundancy Protocol), HSRP (Hot Standby Router
Protocol), and GLBP (Gateway Load Balancing Protocol). A single point of
failure for the default gateway is protected by these protocol. It may also
provide a load balancing if multiple uplinks are available at first-hop routers.
Scenario
There are three redundancy routers presented in the figure above. In this
case the routing protocols are not present between the gateway and the end
users. The redundancy is provided between the gateway routers that are
multi layered switches. By sharing all these gateways, a virtual gateway is
created that allows using any of the gateway without even using the
dynamic protocols. In this virtual redundancy, the virtual gateways are
allowed to send traffic to the physical devices. If any of the GETs fails, the
other redundant router takes a charge and starts sending the packets to the
outside world.
The two or more routers on a LAN that are working together in a group are
enabled by both HSRP and VRRP. The routers being served share a single
group IP address. In each of the host, the group IP address is configured as
the default gateway. One router is elected to handle all requests sent to the
group IP address in an HSRP or VRRP group. It is called the active router
with HSRP and the master router with VRRP. There must be at least one
standby router with HSRP and at least one backup router with VRRP.
Gateway Load Balancing Protocol (GLPB) is something that goes a step
beyond VRRP and HSRP. It provides load balancing in addition to
redundancy.
The first hop for packets from a particular LAN, or VAN to be said more
accurately, is a default gateway to reach a remote network. The packets can
be forwarded by the routers as long as its routing table keeps a route to the
intended remote network or a default route is present. The particular network
will become incapable of communicating with the outside world if that first
hop ever goes down. It allows only the local communication across the
switched domain.
As the First Hop Redundancy Protocols allow default gateway redundancy, it
is suggested to have more than one default gateway enabled. There exists a
backupdevice that kicks in and almost transparently to users in the event of a
router failure. The traffic to remote networks is forwarded continually so as
to avoid the situation of isolation.
Types of Redundancy Protocols
The first hop redundancy protocols that could be used for this purpose falls
into the following three categories as:
HSRP (Hot Standby Router Protocol)
VRRP (Virtual Router Redundancy Protocol)
GLBP (Gateway Load Balancing Protocol)
HSRP:
It is a Cisco proprietary that was the first ever created first hope
redundancy protocol
HSRP is enabled in a particular interface and this interface is part
of a “standby” group
Besides the physical IP address of the defined interface, there is a
virtual IP address in the same subnet
The idea behind this is to perform a similar configuration in an
interface belonging to another router
The redundancy will be generated in this way
The different interface from different devices would be sharing the
same virtual IP address
The hosts in a network are assigned a virtual IP address as a
default gateway
https://en.wikipedia.org/wiki/Category:First-hop_redundancy_protocols
There will always be a consistent gateway that you can reach
regardless of which host is active
HSRP has an active/standby relationship, which means that one device
forwards packets while the other device stands by or just listens.
VRRP:
The IETF (Internet Engineering Task Force) started working on a
standards-based FHRP and the result was VRRP
VRRP is not significantly different from HSRP, it is really just the
“open” version of it
The differences that exist between the two protocols are very
minimal
HSRP versus VRRP Comparison Table
HSRP VRRP
Proprietary Standards based
RFC 2281 RFC 3768
Separate IP address needed for the
Virtual
Can use the physical IP address of
the Virtual, if needed, saving IP
space
One Master, One Standby, all others
are listening
One Master, all other routers are
backup
More familiar to most network
engineers
Less familiar – yet very similar
Can track an interface for failover Can track an interface for failover
(depending on operating system and
version, it can also track the
reachability of an IP address)
All HSRP routers use multicast
Hello packets to 224.0.0.2 (all
routers) for version 1 or 224.0.0.102
for version 2
All VRRP routers use IP protocol
number 112 (VRRP) to
communicate via multicast IP
address 224.0.0.18
All virtual router must use MAC
address 0000.0c07.acXX where XX
All virtual routers must use 00-00-
5E-00-01-XX as its Media Access
is the group ID Control (MAC) address
Table 3-05: HSRP versus VRRP Comparison
GLBP
The more advanced of the three possible FHRP protocols is GLBP. The one
main goal of GLBP is to improve the resource utilization by achieving built-
in load balancing between participating routers.
While using HSRP or VRRP of gateway redundancy, the load-balancing
between different VLANs could be achieved by configuring different standby
groups with different priorities in each router to achieve this “active-active”
type of design. It will not waste the capabilities of a full router while waiting
for the others to fail.
Although it is still a common practice, it can still be administratively
burdensome. It might not scale as according to one’s wish. For the purpose
the protocol, GLBP was created so that would natively provide both
redundancy and load balancing.
GLBP tool is a Cisco proprietary. It has taken the HSRP and VRRP to the
next level. A load balancing mechanism must be provided for the clients in
order to provide the first hop redundancy. Routers that are to participate in
GLBP must be a member of the same group as with HSRP and VRRP. One
router is elected to be the AVG (Active Virtual Gateway) after all the routers
are in the same group. The AVG is elected based on highest priority, which
then falls back to highest IP if the priorities match. One is the AVG, and up
to three others can be AVFs (Active Virtual Forwarders) while there are up to
four routers in total that can be in the same GLBP group. The routers that are
able to forward traffic actively will apply the 4 router limit. The joining fifth
or higher router will become a SVF (Standby Virtual Forwarder) and will
take the place of a AVF in case of failure. SVG (Standby Virtual Gateway)
also plays a role in this as well.
The traffic is balanced with GLBP by having the AVG assign each AVF
virtual MAC addresses. The AVG responds to the clients ARP request with
one of the AVF’s virtual MACs while an ARP request come in for the virtual
IP.
Note
Some of the documentations uses the SVF term to describe a router that is
above and beyond the four router AVF limit. SVF is also used in other
documentations to describe an active AVF that is ready to take over another
AVFs role in case of failure. The router 1 is a SVF for routers 2, 3, 4 and 5.
Figure 3-04: GLBP Routers
Five GLBP routers are there in this example. The bare minimum GLBP
configuration must be put on each router and the configuration is used to
examine what has occurred.
Case Study <OSPF>
An organization needs to extend its business and spread its branches in
multiple countries. In order to fulfil the need, it spreads its business by
opening a new branch in a city. The organization needs to configure network
for that branch and connect that internal network with the backbone network
of the company. The network admin of the organization decided to
implement OSPF routing protocol to fulfil the network requirements. Below
is the network topology diagram suggested by the network admin to be
implemented.
Topology Diagram
Figure 3-05: OSPF Routing
Configuration
R1
R1>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#router ospf 1
R1(config-router)#
*Nov 27 03:00:23.591: %OSPF-4-NORTRID: OSPF process 1 failed to
allocate unique router-id and cannot start
R2(config-router)#router-id ?
A.B.C.D OSPF router-id in IP address format
R1(config-router)#router-id 1.1.1.2
R1(config-router)#network 10.0.0.0 0.0.0.3 area 0
R1(config-router)#network 172.16.1.0 0.0.0.255 area 0
R1(config-router)#ex
R1(config)#interface fa 1/0
R1(config-if)#ip add 10.0.0.2 255.255.255.252
R1(config-if)#ip ospf network point-to-point
R1(config-if)#no sh
R1(config-if)#ex
R1(config)#
*Nov 27 03:01:23.067: %LINK-3-UPDOWN: Interface FastEthernet1/0,
changed state to up
*Nov 27 03:01:24.067: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet1/0, changed state to up
*Nov 27 03:01:26.859: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.1 on
FastEthernet1/0 from LOADING to FULL, Loading Done
R1(config)#interface fa 0/0
R1(config-if)#ip add 172.16.1.1 255.255.255.0
R1(config-if)#ip ospf network broadcast
R1(config-if)#no shutdown
R1(config-if)#ex
R1(config)#
*Nov 27 03:02:21.483: %LINK-3-UPDOWN: Interface FastEthernet0/0,
changed state to up
*Nov 27 03:02:22.483: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet0/0, changed state to up
R2
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
//Configuring ospf
R2(config)#interface fa 0/0
R2(config)#router ospf 1
R2(config-router)#network 10.0.0.0 0.0.0.3 area 0
R2(config-router)#router-id 1.1.1.1
R2(config-router)#ex
R2(config)#interface fa 0/0
R2(config-if)#ip add 10.0.0.1 255.255.255.252
R2(config-if)#ip ospf network ?
broadcast Specify OSPF broadcast multi-access network
non-broadcast Specify OSPF NBMA network
point-to-multipoint Specify OSPF point-to-multipoint network
point-to-point Specify OSPF point-to-point network
R2(config-if)#ip ospf network point-to-point
R2(config-if)#no shutdown
R2(config-if)#ex
R2(config)#
*Nov 27 02:57:32.947: %LINK-3-UPDOWN: Interface FastEthernet0/0,
changed state to up
*Nov 27 02:57:33.947: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet0/0, changed state to up
R3
Router>
Router>en
Router#config t
Enter configuration commands, one per line. Endwith CNTL/Z.
Router(config)#hostname R3
//Configuring ospf
R3(config)#router ospf 1
*Nov 27 03:23:33.283: %OSPF-4-NORTRID: OSPF process 1 failed to
allocate unique router-id and cannot start
R3(config-router)#router-id 1.1.1.5
R3(config-router)#network 172.16.1.0 0.0.0.255 area 0
R3(config-router)#network 192.168.3.0 0.0.0.255 area 0
R5(config-router)#passive-interface fastEthernet 1/0
R3(config-router)#ex
R3(config)#interface fa 0/0
R3(config-if)#ip add 172.16.1.4 255.255.255.0
R3(config-if)#ip ospf network broadcast
R3(config-if)#no shutdown
R3(config-if)#ex
R3(config)#interface fa 1/0
R3(config-if)#ip add 192.168.3.1 255.255.255.0
R3(config-if)#no sh
R3(config-if)#ex
R3(config)#
*Nov 27 03:23:36.171: %LINK-3-UPDOWN: Interface FastEthernet0/0,
changed state to up
*Nov 27 03:23:36.483: %LINK-3-UPDOWN: Interface FastEthernet1/0,
changed state to up
*Nov 27 03:23:37.171: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet0/0, changed state to up
*Nov 27 03:23:37.483: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet1/0, changed state to up
*Nov 27 03:23:43.091: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.2 on
FastEthernet0/0 from LOADING to FULL, Loading Done
*Nov 27 03:23:43.095: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.3 on
FastEthernet0/0 from LOADING to FULL, Loading Done
R4
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R4
//Configuring ospf
R4(config)#router ospf 1
*Nov 27 03:21:19.795: %OSPF-4-NORTRID: OSPF process 1 failed to
allocate unique router-id and cannot start
R4(config-router)#router-id 1.1.1.4
R4(config-router)#network 172.16.1.0 0.0.0.255 area 0
R4(config-router)#network 192.168.2.0 0.0.0.255 area 0
R5(config-router)#passive-interface fastEthernet 1/0
R4(config-router)#ex
R4(config)#interface fa 0/0
R4(config-if)#ip add 172.16.1.3 255.255.255.0
R4(config-if)#ip ospf network broadcast
R4(config-if)#no shutdown
R4(config-if)#ex
R4(config)#interface fa 1/0
R4(config-if)#ip add 192.1
68.2.1 255.255.255.0
R4(config-if)#no shutdown
R4(config-if)#ex
*Nov 27 03:21:22.667: %LINK-3-UPDOWN: Interface FastEthernet0/0,
changed state to up
*Nov 27 03:21:22.999: %LINK-3-UPDOWN: Interface FastEthernet1/0,
changed state to up
*Nov 27 03:21:23.667: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet0/0, changed state to up
*Nov 27 03:21:23.999: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet1/0, changed state to up
*Nov 27 03:21:33.127: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.2 on
FastEthernet0/0 from LOADING to FULL, Loading Done
*Nov 27 03:21:33.127: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.3 on
FastEthernet0/0 from LOADING to FULL, Loading Done
R5
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R5
//Configuring ospf
R5(config)#router ospf 1
R5(config-router)#
*Nov 27 03:18:14.287: %OSPF-4-NORTRID: OSPF process 1 failed to
allocate unique router-id and cannot start
R5(config-router)#router-id 1.1.1.3
R5(config-router)#network 172.16.1.0 0.0.0.255 area 0
R5(config-router)#network 192.168.1.0 0.0.0.255 area 0
R5(config-router)#passive-interface fastEthernet 1/0
R5(config-router)#ex
R5(config)#interface fa 0/0
R5(config-if)#ip add 172.16.1.2 255.255.255.0
R5(config-if)#ip ospf network broadcast
R5(config-if)#no shutdown
R5(config-if)#ex
R5(config)#
*Nov 27 03:19:15.483: %LINK-3-UPDOWN: Interface FastEthernet0/0,
changed state to up
*Nov 27 03:19:16.483: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet0/0, changed state to up
*Nov 27 03:19:24.695: %OSPF-5-ADJCHG: Process 1, Nbr 1.1.1.2 on
FastEthernet0/0 from LOADING to FULL, Loading Done
R5(config)#interface fa 1/0
R5(config-if)#ip add 192.168.1.1 255.255.255.0
R5(config-if)#no shutdown
R5(config-if)#ex
R5(config)#
*Nov 27 03:19:42.995: %LINK-3-UPDOWN: Interface FastEthernet1/0,
changed state to up
*Nov 27 03:19:43.995: %LINEPROTO-5-UPDOWN: Line protocol on
Interface FastEthernet1/0, changed state to up
Verification
1. Verify the Connectivity
Ping from any user PC to R2 interface using “Ping 10.0.0.1” command:
Successful ping shows end-to-end connectivity.
Now, run the command “show ip route” on R2 for routing table verification.
2. Verify the configuration on R2
R2#show ip route
From the output above, it is clear that the traffic will be routed from R2 to
the networks that are not directly connected via interface 10.0.0.2 using
OSPF with administrative distance 110. R2 has learned the remote
networks 192.168.1.0, 192.168.2.0 and 192.168.3.0 via OSPF. These
networks are accessible through fast Ethernet 0/0 interface.
R2#show ip ospf 1
R2#show ip ospf neighbor
Showing the neighbors for router R2
R2#show ip ospf interface fastethernet 0/0
The given output shows that the process ID was assigned to be 1, showing
the point-to-point network type having cost value 1 with Router ID 1.1.1.1
3. Verify the configuration on R1
R1#show ip ospf neighbor
The command show ip ospf neighbor giving the Neighbor ID of the
adjacent routers for R1.
R1#show ip ospf interface fastethernet 1/0
The command show ip ospf interface shows the Router ID, Network type and
cost for the respective interface.
R1#show ip ospf interface fastethernet 0/0
4. Verify the configuration on R5
R5#show ip ospf neighbor
Showing the ospf neighbor for R5
R5#show ip ospf interface fastethernet 0/0
R5#show ip ospf interface fastethernet 1/0
5. Verify the configuration on R4
R4#show ip ospf interface fastethernet 1/0
R4#show ip ospf interface fastethernet 0/0
R4#show ip ospf neighbor
Showing the ospf neighbor for R4.
6. Verify the configuration on R3
R3#show ip ospf interface fastethernet 1/0
R3#show ip ospf interface fastethernet 1/0
R3#show ip ospf neighbor
Showing the ospf neighbor for R3.
Figure 3-21: Verification Outputs
Mind Map
Figure 3-06: Mind Map of IP Connectivity
Summary
Components of the Routing Table
In this section, we learned that the networks are either directly
connected, statically configured or dynamically learned. The
“show ip route” command is used to view a routing table
The routing protocol code identifies which route was learned by
which routing protocol
The network address is simply termed as a prefix and the
shorthand way to express a subnet mask using CIDR notation is a
prefix-length e.g., for the subnet mask 255.255.255.0, the prefix-
length is /24
The prefix-length is simply a shorthand way to express a network
mask using CIDR notation. A network mask is also called a subnet
mask or net mask for short
The next hop IP address follows the “via” word for a child prefix
entry. The next hop refers to the IP address of the next router in
the path to the destination network
Administrative distance is used to select the best path when a
router has two different paths
The best path to a destination network within a routing protocol is
determined by the metric value
Packets that are addressed to networks not explicitly listed in the
routing table are directed using default routes
A Router Makes Forwarding Decision by Default
The longest prefix match is an algorithm used in Internet
Protocol (IP) networking for selecting an entry from a forwarding
table. Each entry in a forwarding table specify a sub-network
One routing protocol is preferably chosen over another when both
account the same destination network in the case of administrative
distance
Metric determines the best path to a destination network. The
preferred or shortest path to a particular destination is determined
by the dynamic routing protocols
Configure and Verify IPv4 and IPv6 Static Routing
Static routes are manually assigned both in IPV4 and IPV6
Default route is used by IP to forward any packet with a
destination not found in the routing table
When a route is created to a network, it is called a network route
A route leading to a single host can be created
A floating static route is simply one that has been created as a
backup to a routelearned though a routing protocol
Configure and Verify Single Area OSPFv2
With a remote interface for OSPFv2 interface, there should be a
compatible configuration before the two can be considered
neighbors
The OSPF supports the other network types including Point-to-
Multipoint, Broadcast, and Non-Broadcast
The Designated Router (DR) and a Backup Designated Router
(BDR) acts as a central point to exchange the OSPF information
between multiple routers on the same, multi-access broadcast
network segment
Purpose of First Hop Redundancy Protocol
A gateway redundancy is allowed by the First Hop Redundancy
Protocol (FHRP)
A class of redundancy protocols known as FHRPs includes VRRP
(Virtual Router Redundancy Protocol), HSRP (Hot Standby
Router Protocol), and GLBP (Gateway Load Balancing Protocol)
Practice Question
1. In which of the following, the information necessary to forward a
packet along the best path towards its destination resides?
A. Election Process
B. Routing Table
C. CIDR Notation
D. LSAs
2. What is a shorthand way to express a network mask using CIDR
notation?
A. Prefix Length
B. Administrative Distance
C. Metric Value
D. CIDR Notation
3. What is the default administrative distance for RIP?
A. 200
B. 170
C. 120
D. 0
4. The best path to a destination network within a routing protocol is
determined by which of the following?
A. Administrative Distance
B. Matric Value
C. Routing Table
D. CIDR Notation
5. When both the protocols accounts have the same destination
network, one routing protocol is preferably chosen over another by
using which one of the following?
A. Prefix Length
B. Administrative Distance
C. Metric Value
D. CIDR Notation
6. While using an exit interface instead of a next-hop address, what
could be the administrative distance for static routes?
A. 20
B. 5
C. 1 or 0
D. 100
7. What is a route that has been created as a backup to a route learned
though a routing protocol called?
A. Dynamic Route
B. Static Route
C. Floating Static Route
D. Prefix Length
8. The OSPF process ID is determined by what range of the values that
is represented as a unique number on the router?
A. 1 to 75,535
B. 1 to 65,553
C. 1 to 85,535
D. 1 to 65,535
9. A gateway redundancy is allowed by using which one of the
following?
A. Administrative Distances
B. First Hop Redundancy Protocol
C. OSPF Protocol
D. Gateway of Last Resort
10. Which could be the process on the segment taken to choose a
DR and BDR?
A. 2-way
B. Election
C. Selection
D. Ping
11. What are advantages of using DHCP in a network?
A. Easier administration
B. Static IP addressing
C. More difficult administration of the network
D. Assigns IP address to hosts
12. Which version of SNMP provides plaintext authentication with
MD5 or SHA with no confidentiality?
A. SNMPv2
B. SNMPv1
C. SNMPv2c
D. SNMPv3
13. Which command is used to view a routing table?
A. Show ip interface brief
B. show ip route
C. show ip protocol
D. None of the above
14. What is the prefix-length for the subnet mask 255.255.255.0?
A. /25
B. /24
C. /26
D. /27
15. What is an administrative distance for a static route?
A. 1
B. 12
C. 120
D. 100
16. What could be the value corresponding to the 100% utilization
of a link?
A. 254
B. 255
C. 256
D. 124
17. Which one of the following is the correct command for
configuring a static route?
A. ip route [destination_network] [nexthop_address or exit
interface] [mask] [administrative_distance] [permanent]
B. ip route [destination_network] [mask] [nexthop_address or
exit interface] [administrative_distance] [permanent]
C. ip route [destination_network] [mask]
[administrative_distance] [permanent][nexthop_address or
exit_interface]
D. ip route [destination_network] [nexthop_address or
exit_interface] [mask] [administrative_distance]
18. What happens if the first hop redundancy goes down?
A. The related network is still able to communicate with the
outside world
B. The particular network will become incapable of
communicating with the outside world
C. The particular network will become incapable of
communicating with either the inside or the outside world
D. The particular network will become incapable of
communicating with the inside network
19. Which one of the following is not categorized as the first hop
redundancy protocol?
A. HSRP (Hot Standby Router Protocol)
B. BRRP (Broadway Router Redundancy Protocol)
C. VRRP (Virtual Router Redundancy Protocol)
D. GLBP (Gateway Load Balancing Protocol)
20. For secure communications using HTTPS, what port number is
used by default?
A. 80
B. 110
C. 25
D. 443
Chapter 04: IP Services
Technology Brief
IP Service is a professional combination of all management, operation and
maintenance services, facilities and territories. A long-term contract service
for corporate customers are considered as the main task. A reliable
partnership and comfortable conditions are guaranteed for effective business.
Features to be deployed individually or in combination with each other across
a wide range of Cisco hardware include Network Address Translation (NAT),
Dynamic Host Configuration Protocol (DHCP), and Hot Standby Router
Protocol (HSRP). Cisco’s IP Services comprise of many basic and advanced
building blocks. They allow customers to be able to deploy an IP network
with basic end-to-end IP connectivity, manage their IP addressing
requirements from a central location, control the IP addressing scheme used
throughout their network, provide redundancy at major network connection
points, and much more.
Configure and Verify Inside Source NAT using Static and
Pools
In the process of Network Address Translation (NAT), a network device,
typically a firewall, allocates an address that is public to a computer or group
of computers within a private network. The amount of public IP addresses an
organization or company needs to use is limited by using NAT. It is essential
for both economy and security purposes. A huge private network consuming
addresses in a private range (the ranges consisting of 10.0.0.0 to
10.255.255.255, 172.16.0.0 to 172.31.255.255, or 192.168.0 0 to
192.168.255.255) is involved in the most common form of network
translation. Computers having to access resources inside the network, like
workstations needing access to file servers and printers, utilizes the private
addressing scheme. The traffic between private addresses can be routed by
the routers inside the private network without having any trouble. These
computers need to have a public address to access resources outside the
network in order for replies to their requests to return to them. It is a very
quick process instead of being complex and the end user rarely knows it has
occurred. A call to a computer on the internet is made by a workstation inside
a network. The request is sent to the firewall after the router within the
network having recognized that the request is not for an inside resource of the
network. The firewall observes the request from the computer with the
internal IP. The same request to the internet is then made by using its own
public address, and the response is returned from the internet resource to the
computer inside the private network. From the resource’s perspective on the
internet, information is sent to the address of the firewall and the
communication appears to be happening directly with the site on the internet
from the workstation’s perspective. However, all users inside the private
network accessing the internet have the same public IP address while using
the internet. Hence, only one public address is needed for hundreds or even
thousands of users.
Most modern firewalls are able to set up the connection between the internal
workstation and the internet resource and are considered as stateful. The track
of details of the connection, like ports, packet order, and the IP addresses
involved is kept within the firewall.It is called “keeping track of the state of
the connection”. The session consists of communication between the
workstation and the firewall and the firewall with the internet is kept track in
this way. The firewall rejects all of the information about the connection
upon ending of the session.
Moreover, some servers may act as web servers in large networks and the
access from the Internet is required. The public IP addresses are assigned to
these servers on the firewall. These addresses allow the public to access the
servers only through that IP address. The firewall acts as the middle way
between the outside world and the protected internal network and appears to
be an additional layer of security. Additional rules can be added that includes
the ports can be accessed at that IP address. The internal network traffic is
routed more efficiently by using NAT and more ports are allowed access
while restricting access at the firewall. The detailed logging of
communications between the network and the outside world is also allowed
in NAT. It can also be used to allow selective access to the outside of the
network, too. Workstations or other computers that require special access
outside the network are assigned specific external IPs using NAT. This
allows the Workstations or computers to communicate with computers and
applications that require a unique public IP address. The firewall is able to
control the session in both directions and restricts the port access and
protocols as an intermediary object.
Figure 4-01: Network Address Translation (NAT)
It is a very important aspect of firewall security. The number of public
addresses used inside an organization are conserved in it. The stricter control
of access to resources on both sides of the firewall is allowed by NAT.
The private IP addresses are mapped by using Network Address Translation
(NAT) inside source. The mapping of the addresses is carried out on the
outside interface of the router on a LAN from private to a public IP
address(es).
Network Address Translation (NAT) is utilizes to map private IP
addresses on a LAN to public IP address(es) on the external
interface of the router
The router’s interface connecting to the LAN network is the inside
The router’s interface connecting to the WAN is the outside
Depending on the preferred outcome, different methods of NAT
are used: Static, Pool and PAT
NAT Inside and Outside Addresses
Inside refers to the addresses that must be translated. Outside refers to the
addresses that are not in control of an organization. The network addresses
allow the translation of the addresses to occur.
Inside Local Address
An IP address assigned to a host on the inside network is called the inside
local address. This address is probably not assigned by the service provider,
i.e., there are IP addresses that are private.
Inside Global Address
IP address that denotes one or more inside local IP addresses to the external
world is termed as inside global address. It is the inside host as seen from the
outside network.
Outside Local Address
In the local network after translation, this is the actual IP address of the
destination host.
Outside Global Address
The outside host as seen from the external network is termed as the outside
global address. It represents the IP address of the outside destination host
before translation.
Types of Network Address Translation (NAT)
There are three ways to configure NAT. These are:
Static NAT
Dynamic NAT
Port Address Translation (PAT)
Static NAT
A legally registered (Public) IP address maps a single unregistered (Private)
IP address, i.e., one-to-one mapping between local and global address.
Generally, web hosting uses the static NAT. Organizations with many
devices having to be facilitated and to provide internet access do not use the
static NAT and the public IP address is needed. An organization having 3000
devices needs to buy 3000 public addresses in order to access the internet,
which will be very costly.
Dynamic NAT
A registered (Public) IP address is a result of an unregistered IP address from
a pool of public IP address. The packet will be dropped as only a fixed
number of private IP address can be translated to public addresses if the IP
address of pool is not free.
A pool of 2 public IP addresses is able to translate only 2 private IP
addresses. The 3rd private IP address willing to access internet will result in
dropping the packet consequently as many private IP addresses are mapped to
a pool of public IP addresses. Network with fixed number of users usually
utilizes the NAT. An organization needs to buy many global IP addresses to
make a pool making it very costly.
Port Address Translation
NAT allows many local (Private) IP addresses to be translated to a single
registered IP address. It is also known as NAT overload. The traffic is being
distinguished as which traffic belongs to which IP address by port numbers.
Thousands of users can be linked to the internet by using only one real global
(Public) IP address. It is cost-effective hence used most frequently.
Advantages of NAT
The legally registered IP addresses are conserved in NAT
It offers privacy as the device’s IP address, sending and receiving
the traffic, will be hidden
When a network evolves, the address renumbering is eliminated
Disadvantages of NAT
Switching path delay appears as a result of this translation
Having NAT enabled, certain applications will not function
The tunneling protocols such as IPsec is complicated
Further, router should not tamper with port numbers being a network layer
device. It tampers with port number because of NAT.
Example:
Port Address Translation (PAT) or NAT (Network Address Translation)
Overloading is a modified form of dynamic NAT. The number of inside local
addresses are greater than the number of inside global addresses in PAT or
NAT overloading. Mostly, just a single inside global IP address provides the
internet access to all inside hosts. NAT Overloading is actually the only
flavor of NAT covering the IP addresses and also appears to be the most
popular form of NAT as well.
Figure 4-02: Port Address Translation (PAT)
Protocol Inside Local IP: Port Inside Global IP: Port
ICMP 192.168.1.2 : 18 67.210.97.1 : 18
ICMP 192.168.1.3 : 19 67.210.97.1 : 19
ICMP 192.168.1.4 : 20 67.210.97.1 : 20
Table 4-01: Protocol with Inside Local and Global IP
The overloading or the mapping of more than one inside local address to the
same inside global address is allowed with PAT. The arrival packets would
all have the same destination address as they arrive to the NAT router.
How would the router get to know which inside local address each return
packet belongs to?
The scenario suggests that the NAT entries in the translation table are
extended entries; the protocol types and ports are also tracked by the entries
beside the relevant IP addresses. Up to 65535 inside local addresses could be
mapped theoretically to a one inside global address by interpreting both the
IP address and the port number of a packet, based on the 16-bit port number.
Approximately 160 bytes of router memory is used by a single NAT entry so
more than 10 MB of memory and a large amounts of CPU power would be
taken by 65535 entries. This is a theoretical limit and in practical, PAT
configurations stands nowhere near this number of addresses.
Static:
Allows one-to-one mapping
A specific inside IP address is translated to a specific outside IP
address
In the translation table, translations are statically configured and
placed whether there is traffic or not 
The hosts providing application services like mail, web, FTP, etc.
mostly use this
Pool:
A Dynamic NAT form many-to-many mappings
The multiple inside IP addresses are translated to multiple outside
IP addresses
With the fewer available addresses, the pool is more useful than
actual hosts to be translated
In the translation table, the entries are created while connections
are initiated. It creates one-to-on mappings but is said to be many-
to-manybecause the mappings can vary and at the time of the
request, they are dependent on the available IPs in the pool
NAT entries are detached from the translation table and after a
specified & configurable amount of time, the IP address is reverted
to the NAT pool
Exam Tip
You must have a clear understanding of what NAT is and how it is
configured both statically and dynamically. The labs included must be
practiced to be able to have a hands-on experience.
NTP Operating in a Client and Server Mode
Network Time Protocol provides time to all our network devices. In simple
words, NTP synchronizes clocks of computer systems over packet-switched,
data networks of variable-latency.
Typically, there exists an NTP server that connects through the internet to an
atomic clock. This time can then be synchronized via the network to retain all
routers, switches, servers, etc. to receive the same time information.
Precise network time within the network is important because:
Tracking of events in the network is possible with correct time
Clock synchronization is critical for the right interpretation of
events within the syslog data
Clock synchronization is critical for digital certificates
Switches and Routers issue log messages when different events take place.
For example, when an interface goes down and then backs up. As you already
know, all messages produced by the IOS go only to the console port by
default. However, those console messages are directed to a syslog server.
A syslog server saves copies of console messages and can time-stamp them
so you can view them at a later time.
There are many things involved in the securing of a network such as security
logs along with an accurate date and timestamp. Secondly, when an attack is
encountered on a network, it is important to identify when the attack occurred
and the order in which a specified attack was encountered on a network. Log
messages can be accurately time stamped by the synchronization of clocks on
hosts and network devices manually as well as using Network Time Protocol.
Typically, the date and time settings on the router can be set using one of two
methods:
Manually set the date and time
Configure the Network Time Protocol (NTP)
The figure below shows an example of manually updating the clock. As a
network develops, it becomes difficult to ensure and verify that all
infrastructure devices within a network are functioning with synchronized
time. Even in a minor network environment, the manual method is not ideal.
For example, if a router reboots, how will it get an accurate date and
timestamp?
A better solution to prevent manual configuration of time and date in a
network is to configure the Network Time Protocol (NTP) on the network.
This protocol allows networking devices on the network to synchronize their
time and date with an NTP server device. This is a better way because a
group of NTP clients obtaining time and date information from a single
source has more consistent time settings. When NTP is configured in the
network, it can synchronize to a NTP server, which is publicly available, or it
can be synchronize to a private master clock.
NTP uses UDP port 123 and is documented in RFC 1305. Here is an example
to manually set Time and Date on a device.
R1#clock set 04:00:00 12 nov 2019
// To set time 04 hr 00 min 00 sec and date 12th nov 2019
R1#show clock
// To check the Time and date running on the device
NTP Authentication
NTP version 3 (NTPv3) and later versions support a cryptographic
authentication technique between NTP peers. This authentication can be used
to mitigate an attack.
Three commands are used on the NTP master and the NTP client:
ntp authenticate
ntp authentication-key key-number md5 key-value
ntp trusted-key key-number
Without NTP Authentication configuration, Network time information can
still be exchanged between server and clients but the difference is these NTP
clients do not authenticate the NTP server as a secure source as to what if the
legitimate NTP server goes down and Fake NTP server overtake the real NTP
server.
Use the show ntp associations detail command in order to confirm that the
server is an authenticated source.
Use the show ntp status command to confirm that the server and client are
synchronized.
Figure 4-04: Output of NTP Associations
Exam Tip
For clearing this exam, you must know how the NTP client is synchronized
with the server. Their use in a network should be clear along with the
NTP_master and NTP_Client concepts.
Role of DHCP and DNS within the Network
DHCP (Dynamic Host Configuration Protocol) provides quick, automatic,
and central management for the distribution of IP addresses within a network.
It is also used to configure the default gateway, subnet mask, and DNS server
information on the device.
A scope, or range, of IP addresses is defined by a DHCP server. These
dynamic addresses are used to serve devices with an address. A device
obtains a valid network connection from this pool of addresses. Several
devices are allowed to connect to a network over a period of time without
needing a pool of available addresses.
Example:
If 20 addresses are defined by the DHCP server, 30, 50, 200, or more devices
can be connected to the network. No more than 20 devices can be used out of
one of the available IP addresses simultaneously.
IP addresses for a specific period of time (called a lease period) is assigned
using DHCP. Different results are yielded over time by using commands like
ipconfig to find a computer's IP address. The dynamic IP addresses are
delivered to clients using DHCP. Devices with dynamic addresses and
devices having their IP addresses manually assigned can both exist on the
same network. Usually, IP addresses to ISPs are assigned by using DHCP.
Configuring DHCP
The following information are required in configuring a DHCP server for
hosts:
Network and Mask for Every LAN: Network ID that is also termed as
“scope”. All addresses in a subnet can be hosts by default.
Reserved/Excluded Addresses: Reserved addresses for servers, printers,
routers, etc. These addresses will not be handed over to hosts.
Default Router: Address of router for to every LAN.
DNS Address: A list of DNS server addresses provided to hosts so they can
resolve names.
DNS: Domain Names System (DNS) is used to translate IP Addresses. A list
of mail servers can be provided to accept emails for each domain name. A set
of name servers to be authoritative for its DNS records will be nominated by
the domain name in DNS. When looking for information about the domain
name, all other name servers will be pointed to DNS. A name-service
protocol is implemented with the name server. It stores the zone file and DNS
record. Domain names are pointed to IP addresses with a small set of
instructions called zone file.
Configuration Steps:
Eliminate the addresses you want to reserve. The purpose you do
this step first is that as soon as you set a network ID, the DHCP
service will start responding to client requests
Create your pool for every LAN using a distinctive name
Select the network ID and subnet mask for the DHCP pool that the
server will use to provide addresses to hosts
Add the address used for the defaulting gateway of the subnet
Provide the DNS server address(es)
If you do not want to practice the default lease time of 24 hours,
you need to set the lease time in days, hours, and minutes
TFTP, DNS, and Gateway Options
A few optional but recommended commands including TFTP,
DNS and Default Gateway IP address are used to configure the
Cisco IOS DHCP feature
An external server that will be used to store the DHCP bindings
database is identified by using the TFTP option 150
The DNS server’s IP address on the network is identified by using
the DNS setting
A default-gateway for the clients is defined by using the gateway
option
https://www.123-reg.co.uk/support/my-account/some-jargon-explained/#XYZ
Exam Tip
Make sure you can quickly tell the difference observed in a network after
configuring DHCP.The Function of SNMP in Network Operations
An Application layer protocol is Simple Network Management Protocol
(SNMP). It provides a message format for agents on a variety of devices to
communicate with Network Management Stations (NMSs). The NMS station
receives messages from these agents. The information in the database is then
either read or written. This information is called a Management Information
Base (MIB).
The SNMP agent on a device is periodically queried or polled by NMS to
gather and analyze statistics via GET messages. An SNMP trap would be sent
by the end devices running SNMP agents to the NMS if a problem occurs.
The basic operation of SNMP protocol can be depicted from the following
figure:
Figure 4-03: Working of SNMP
Admins use SNMP to provide some configurations to agents and is called
SET messages. SNMP is also used for analyzing information and compiling
the outcomes in a report or even a graph. An exceeded notification process is
triggered by using the thresholds. The CPU numbers of Cisco devices like a
core router are monitored by using the graphing tools. The CPU should be
watched continuously and the statistics can be graphed by the NMS. Upon
exceeding the threshold, notifications are sent. The SNMP has three versions
(v1, v2 and v3), which are given below:
SNMPv2:
SNMPv2 is similar to SNMPv1 with slight modifications. However,
SMNPv1 is no longer in use. SNMPv2 supports plain-text authentication with
community strings with no encryption but offers GET BULK, which is a way
to collect many kinds of information at once and reduce the number of GET
requests. It offers a more comprehensive error message reporting method
called INFORM, but it is not more secure than v1. It practices UDP even
though it can be configured to use TCP.
SNMPv3:
SNMPv3 supports strong authentication with SHA or MD5, providing
confidentiality (encryption) and data integrity of messages via Data
Encryption Standard (DES) or DES-256 encryption concerning agents and
managers. GET BULK is a sustained feature of SNMPv3, and this version
also uses TCP.
Management Information Base (MIB):
When you want to access data from so many kinds of devices, a standard way
to organize this plethora of data is required. This is implemented using MIB
in SNMP protocol. A Management Information Base (MIB) is a gathering of
information that is organized hierarchically and can be get by protocols like
SNMP. RFCs describe some common public variables, but most
organizations define their personal private branches beside basic SNMP
standards. Organizational IDs (OIDs) are set out as a tree with different levels
assigned by different organizations with top-level MIB OIDs that belongs to
numerous standards organizations.
To obtain some information from the MIB on the SNMP agent, you can use
several different operations:
GET: This operation is used to get information from the MIB to an SNMP
agent.
SET: This operation is used to get information to the MIB from an SNMP
manager.
WALK: This operation is used to list information from successive MIB
objects within a specified MIB.
TRAP: This operation is used by the SNMP agent to send a triggered piece
of information to the SNMP manager.
INFORM: This operation is the same as a trap, but it adds an
acknowledgment that a trap does not provide.
Exam Tip
To describe the function of SNMP, the concept of Management Server and
Agent needs a clear understanding.
Use of Syslog Features Including Facilities and Levels
Syslog
In a network where a certain event occurs, networking devices have a trusted
technique to inform or notify the network administrator by detailed system
messages. These messages may be either non-critical or significant. Network
administrators have many options for storing, interpreting, and viewing these
messages, and for being informed to those messages that could have the
greatest impact on the network infrastructure. One of the most common
methods to access system messages that devices provide is by using protocol
called syslog. Syslog is a system logging protocol, which keeps monitoring
the event running on the system, and store the message to the desired
location. It was developed for UNIX based systems in the 1980s, but was first
documented in 2001 as RFC 3164 by IETF. Syslog uses port 514 (UDP) to
send event notification messages over IP networks.
Figure 4-04: Syslog Messages
Many of the networking devices support syslog, routers, switches, servers,
firewalls, and other network appliances. Syslog allows the networking
devices to send their system logging messages through the network to syslog
servers. It is conceivable to build a special Out-of-Band (OOB) network for
this purpose.
There are several different types of syslog server software packages for
Windows and UNIX. Many of them are freeware.
The syslog logging service offers three primary functions:
The ability to collect logging messages for monitoring and
troubleshooting
The ability to select the specific type of logging information that is
captured
The ability to specify the destinations to store the captured syslog
messages
Figure 4-05: Syslog
You can read system messages from a switch's or router's internal buffer. It is
the most popular and effective method of watching what's going on with your
network at a specific time. But the finest way is to log messages to
a syslog server, which stocks messages from you and can even time-stamp
and arrange them in order, and it's easy to set up and configure.
By using syslog, you can show, sort, and even search messages, all of which
sorts it as a really great troubleshooting tool. The search feature is
particularly powerful because you can practice keywords and even severity
levels. Plus, the server can email admins centered on the message’s severity
level.
Network devices can be configured to produce a syslog message and forward
it to various destinations. These four examples are standard ways to gather
messages from Cisco devices:
● Logging Buffer (on by default)
● Console Line (on by default)
● Terminal Lines (using the terminal monitor command)
● Syslog Server
You should know, all system messages and debug output produced by the
IOS go out only by the console port by default and are logged in buffers in
RAM. And, you should also know that Cisco routers are not precisely
cautious about sending messages. To send message to the VTY lines,
the terminal monitor command is used.
Note
The Cisco router would send a broad version of the message to the syslog
server that would be configured into something like this:
Seq no: timestamp: %facility-severity-MNEMONIC: report
The system message format can be broken in this way:
Seq No: This stamp logs messages with a sequence number, but not by
default. If you want this output, you have got to configure it.
Timestamp: Data and time of the message or event, which again will show
up only if configured.
Facility: The facility to which the message refers.
Severity: A single-digit code from 0 to 7 that indicates the severity of the
message.
MNEMONIC: Text string that uniquely describes the message.
Description: Text string containing detailed information about the event
being reported.
The severity levels, from the most severe level to the least severe, are
mentioned in the table below:
Severity Level Explanation
Emergency (severity 0) System is unusable
Alert (severity 1) Immediate action is needed
Critical (severity 2) Critical condition
Error (severity 3) Error condition
Warning (severity 4) Warning condition
Notification (severity 5) Normal but significant condition
Informational (severity 6) Normal information message
Debugging (severity 7) Debugging message
Table 4-02: Severity Levels and their Explanation
Syslog Facilities and Features
Syslog is primarily used for system management. The proactive syslog
monitoring can significantly reduce downtime of servers and also the other
devices in an infrastructure. Moreover, the cost savings should be achieved
by preventingthe loss of productivity that usually accompanies reactive
troubleshooting. A variety of options and severity levels can be chosen in
setting up syslog alerts, including emergency, critical, warning, error, and so
on.
Network Alerting: Critical network issues are identified with Syslog. For
example, the fabric channel errors can be detected on a switch fabric module.
The other forms of monitoring metrics cannot be detected with these
warnings or errors.
Security Alerting: The detailed context of security events is provided with
Syslog messages. The communication relationships, timing, and in some
cases, an attacker’s motive and tools can be recognized by using syslog.
Server Alerting: Syslog is able to alert on server startups, abrupt server
shutdowns, clean server shutdowns, runtime configuration impact,
configuration reloads and failures, resource impact, and so on. The failed
connections can also be detected with Syslog. Server alerts are always
valuable, specifically when you supervise hundreds of servers.
Application Alerting: Logs are created in different ways by applications.
Some of the logs are created through syslog. Dozens of logs are written in the
log folder while running a web application. A syslog monitoring solution is
needed to get real-time monitoring. A syslog monitoring solution can observe
changes in the log folder. Another good use of syslog is Monitoring High-
Availability (HA) servers. Only the logs that are troublesome needs to be
monitored. All the logs from the server are needed in case of a HA server
failure. Having a dedicated syslog server for HA cluster is the solution in this
way.
The detailed analysis of error is needed to dig into the historical syslog
reports using any syslog analysis tool, like LogZilla®, Kiwi Syslog®, or
syslog-ng. The comprehensive details, like high momentary error rates,
configuration changes, or a sustained abnormal condition cannot be shown
using other forms of monitoring.
The basic features of any syslog monitoring tool include a synchronous web
dashboard, alerting system, and log storage. The trouble tickets can be
reduced with proactive syslog monitoring and troubleshooting. The syslog
monitoring feature is enhanced with integrating the syslog monitoring tool
with other infrastructure management tools.
DHCP Client and Relay
A framework for transferring configuration information
dynamically to hosts on a TCP/IP network is provided by DHCP
The parameters to be configured such as an IP address is obtained
by an internet host that is using DHCP called a DHCP client
Any host that forwards DHCP packets between clients and servers
is a DHCP relay agent. The requests and replies are forwarded
between clients and servers by using the rely agents when these
two are not on the same physical subnet
Relay agent forwarding is different from the normal forwarding of
an IP router. In the forwarding of an IP router, IP datagrams are
switched between networks
DHCP messages are being received by relay agents and a new
DHCP message is generated to send on another interface
Figure 4-06: DHCP Request for an IP Address from a DHCP Server
A DHCP Server is a network server. IP addresses, default gateways and
extra network parameters are provided automatically with the DHCP Server.
Dynamic Host Configuration Protocol or DHCP is responsible to respond to
broadcast queries by clients in a DHCP Server.
The required network parameters are sent automatically for clients to
properly communicate on the network. Instead the network administrator has
to manually set up each client joining the network that is not an easy task,
especially in larger networks. Each client is assigned with a unique dynamic
IP address by DHCP servers that changes when the lease of client for that IP
address has terminated.
Router/Switch as a DHCP Server
DHCP for IPv4 is used by many enterprise companies on their
routers/switches. The network administrator usually handles those who need
to get a DHCP capability up and run it quickly but do not have access to a
DHCP server.
The following DHCP server support is provided with most of the
routers/switches:
It supports a DHCP client and an interface IPv4 address is being
from an upstream DHCP service
It supports a DHCP relay and UDP DHCP messages are forwarded
from clients on a LAN to and from a DHCP server
It supports a DHCP server that allows the router/switch services
DHCP requests directly. There are still some limitations to using a
router/switch as a DHCP server
Resources on the network device are consumed by running a
DHCP server on a router/switch. Software, not hardware
accelerated forwarding, handles these DHCP packets. This
practice is not suitable for a network with a large number (> 150)
of DHCP clients. It does not support dynamic DNS
An access into DNS on behalf of the client built on the IPv4
address cannot be created by the router/switch DHCP server. The
entry is leased to the client
The scope is not managed easily and the current DHCP bindings
and leases across multiple routers are not observed. To get the
information about DHCP bindings, an administrator must log into
the switch/router individually
This would cause the current DHCP server and default gateway
fails. There is no high availability or redundancy of the DHCP
bindings
DHCP options are more difficult to be configured on router/switch
platform
A router/switch having DHCP service running is not integrated
with IP Address Management (IPAM) for tracking address and
scope utilization or security forensics
Benefits of a Dedicated DHCP Server
Using a centralized DHCP server is a better approach than using DHCP on
your router/switch. Network environments requiring support of both DHCP
for IPv4 and DHCP for IPv6 at the same time particularly utilize this. The
similar management interface for IPv4 and IPv6 can be used by all DHCP
server vendors that supports support both protocols.
Enterprises use DHCPv6 for several benefits that make it advantageous.
These include:
The IPv6-enabled client nodes are given visibility for IPv6 having
a DHCPv6 server that is integrated into an IP Address
Management (IPAM) system
The logging and management interfaces are provided with DHCP
servers that aid administrators manage their IP address scopes. An
organization usually wants an accounting of what is on a network
regardless of IP version being used
Redundancy and high availability can be provided with DHCP
servers. The clients will reserve their current IP addresses in case
of one DHCP server fails. It does not cause an interruption for
end-nodes
A DHCPv6 server that has been tested and tried will be preferred
by organizations. The USGv6 certification laboratory has certified
the Infoblox DHCPv6 server as “IPv6 Ready”
DHCP for IPv4 possibility off the routers/switches should be
mitigated in organizations beginning to implement IPv6 and the
organizations should be put on a robust DHCP server
infrastructure. The advantage of the centralized dual-protocol
DHCP server will be given to the enterprise organizations to
deliver IPv4 and IPv6 addresses to client devices
Forwarding Per-Hop Behavior for QoS such as Classification,
Marking, Queuing, Congestion, Policing, Shaping
In the Per-Hop Behavior (PHB), the forwarding behavior is assigned to a
Differentiated Services Code Point (DSCP). The forwarding priority that a
marked packet receives in relation to other traffic on the Diffserv-aware
system is defined by the PHB. The marked packets are forwarded and
dropped by the IPQoS-enabled system or Diffserv router. IPQoS-enabled
system or Diffserv router is determined by this precedence. The same PHB is
applied to each Diffserv router that the packet encounters en route to its
destination unless another Diffserv system has changed the DSCP.
A definite amount of network resources to a class of traffic on the contiguous
network is provided by a PHB. DSCPs indicate the precedence levels for
traffic classes when the traffic flow leaves the IPQoS-enabled system in the
QoS policy definedDSCPs. Precedencies are ranged from high-
precedence/low-drop probability to low-precedence/high-drop probability.
For example, a low-drop precedence PHB from any Diffserv-aware router is
guaranteed by the QoS policy assigned DSCP to one class of traffic. This
low-drop precedence PHB guarantees bandwidth to packets of this class. The
varying levels of precedence to other traffic classes are assigned by adding
other DSCPs to the QoS policy. Diffserv systems provides bandwidth to the
lower-precedence packets in agreement with the priorities that are indicated
in the packets' DSCPs. The two types of forwarding behaviors are supported
by IPQoS. The behaviors defined in the Diffserv architecture include the
Expedited Forwarding (EF) and Assured Forwarding (AF).
Classification:
Expedited Forwarding
Any traffic class with EFs associated to DSCP is assured to be given highest
priority in per-hop behavior. Traffic with an EF DSCP does not wait in line.
A low loss, latency, and jitter is provided with EFs. 101110 is the
recommended DSCP for EF. A guaranteed low-drop precedence is received
by a packet that is marked with 101110. A low-drop precedence is received
as the packet traverses Diffserv-aware networks en route to its destination.
The customers or applications with a premium SLA are assigned priority by
using the EF DSCP.
Expedited Forwarding PHB
A component of the integrated services model, Resource Reservation
Protocol (RSVP), provides a guaranteed bandwidth service. This kind of
robust service is essential for the applications such as Voice over IP (VoIP),
video, and online trading programs. This kind of robust service is supplied by
providing low loss, low latency, low jitter, and assured bandwidth service.
The most significant 3 bits of the DSCP field set to 101 in Expedited
Forwarding (EF) PHB. Hence, the whole DSCP field is set to 101110,
decimal value of 46. The low delay service is provided with EF PHB.
Figure 4-07: IP Header DS Field and DSCP PHBs
The low delay service is provided with EF PHB. It should also minimize
jitter and loss. The bandwidth dedicated to EF must be limited and the queue
dedicated to EF must be the highest priority queue so as to assign the traffic
to get through fast and not experience significant delay or loss. It can be
achieved when assigned traffic is kept within its bandwidth limit/cap. By
utilizing QoS, techniques such as admission control the successful
deployment of EF PHB is ensured. Three important facts about the EF PHB
include:
During congestion, EF polices bandwidth
It provides bandwidth guarantee
It imposes minimum delay
The non-DSCP compliant applications were being set the IP precedence bits
to 101, decimal 5 which is called Critical, for delay-sensitive traffic such as
voice. The most significant bits are 101 for the EF marking (101110) that
makes it backward compatible with the binary 101 IP precedence (Critical)
setting.
Assured Forwarding
The four different forwarding classes are provided by per-hop behavior.
These different forwarding classes can be assigned to a packet. The three
drop precedencies, low-drop, medium-drop, and high-drop are provided by
every forwarding class.
The Assured Forwarding (AF) PHB is equivalent to Controlled Load Service
available in the integrated services model. A method is defined by an AF
PHB to give different forwarding assurances.
Following are the classes for network traffic:
Gold: 50 percent of the available bandwidth is allocated for the traffic in this
category.
Silver: 30 percent of the available bandwidth is allocated for the traffic in
this category.
Bronze: 20 percent of the available bandwidth is allocated for the traffic in
this category.
The four AF classes of the AF PHB are AF1, AF2, AF3, and AF4. A specific
amount of buffer space and interface bandwidth is assigned to each class,
according to the SLA with the service provider or policy map. Three drop
precedence (dP) values: 1, 2, and 3 can be specified within each AF class.
With the Assured Forwarding (AF) PHB the most significant 3 bits of the
DSCP field are set to 001, 010, 011, or 100. These bits are also called AF1,
AF2, AF3, and AF4. AF PHB is used for guaranteed bandwidth service.
Default Per-Hop Behavior
The three most significant bits of the DiffServ/DSCP field are set to 000 in
Default PHB. It is used for Best Effort (BE) service. The DSCP value of a
packet is consequently assigned to the default PHB if it is not mapped to a
PHB.
Packet Forwarding in a Diffserv Environment
A network solution aimed at classifying the IP traffic flow into traffic classes
is called the Differentiated Service (DiffServ). DiffServ Code Point (DSCP)
uses six bits, part of the eight-bit field called Type of Service (TOS) inside
the IP header. The determination of PHB is its main goal that defines
the packet forwarding procedure of each node. The DiffServ Domain actually
identify the scope of this protocol.
Figure 4-08: Diffserv Environment
The part of an intranet at a company with a partially Diffserv-enabled
environment is shown in the figure given below. All hosts on the
networks 10.10.0.0 and 10.14.0.0 are IPQoS enabled and on both networks, the
local routers are Diffserv aware.
https://www.sciencedirect.com/topics/computer-science/packet-forwarding
Figure 4-09: Packet Forwarding Across Diffserv-Aware Network Hops
The flow of the packet begins with the progress of a packet that
originates at host ipqos1. The steps continue through several hops
to host ipqos2
The ftp command is run on ipqos1 to access host ipqos2 , which is
three hops away
The QoS policy is applied by ipqos1 to the resulting packet flow.
The ftp traffic is then successfully classified by ipqos1 
A class for all outgoing ftp traffic has been created by the system
administrator. The traffic initiates on the local network 10.10.0.0.
Traffic for the ftp class is assigned the AF22 per-hop behavior:
class two, medium-drop precedence. For the ftp class, a traffic
flow rate of 2Mb/sec is configured
The flow exceeding the committed rate of 2 Mbit/sec is
determined by ipqos-1 meters the ftp flow
The DS arenas in the outgoing ftp packets is marked with the
010100 DSCP, corresponding to the AF22 PHB by the marker
on ipqos1 marks
The ftp packets are received by router diffrouter1 and then the
DSCP is checked. Packets marked with AF22 gets dropped,
if diffrouter1 is found to be congested
In agreement with the per-hop behavior, ftp traffic is forwarded to
the next hop. This per-hop behavior is configured for AF22
in diffrouter1 's files
The network 10.12.0.0 is traversed to genrouter by the ftp traffic. The
network is not Diffserv aware. The “best-effort” forwarding
behavior is then received by the traffic as a result
The ftp traffic is passed to network 10.13.0.0 by genrouter
where diffrouter2 receives the traffic
diffrouter2 is Diffserv aware. The ftp packets are then forwarded to
the network in contract with the PHB that is defined in the router
policy for AF22 packets
The ftp traffic is received by ipqos2. The user is then prompted
on ipqos1 for a user name and password
The set of end-to-end Quality of Service (QoS) skills is called DiffServ. The
capability of the network to deliver service required by specific network
traffic from one end of the network to another is an end-to-end QoS. The
three types of service models supported by Cisco IOS QoS software include:
Integrated Services (IntServ), Best-Effort Services, and Differentiated
Services.
Congestion
To avoid tail drop, congestion avoidance techniques such as Weighted
Random Early Detection (WRED) are deployed on each queue. Packet drop
is performed based on the marking differences of the packets. Within each
AFxy class, y specifies the drop preference (or probability) of the packet.
Some packets are marked with minimum probability/preference of being
dropped, some with medium, and the rest with maximum
probability/preference of drop. The y part of AFxy is one of 2-bit binary
numbers 01, 10, and 11; thisis embedded in the DSCP field of these packets
and specifies high, medium, and low drop preference. Note that the bigger
numbers here are not better, because they imply higher drop preference.
Therefore, two features are embedded in the AF PHB:
Four traffic classes (BAs) are assigned to four queues, each of which has a
minimum reserved bandwidth.
Class Low Drop Medium Drop High Drop
Class 1 AF11 AF12 AF13
DSCP 10:
(001010
DSCP 12:
(001100)
DSCP 14:
(001110)
Class 2 AF21 AF22 AF23
DSCP 18:
(010010)
DSCP 20:
(010100)
DSCP 22:
(010110)
Class 3 AF31 AF32 AF33
DSCP 26:
(011010)
DSCP 28:
(011100)
DSCP 30:
(011110)
Class 4 AF41 AF42 AF43
DSCP 34:
(100010)
Table 4-03: The AF DSCP Values
Each queue that has congestion avoidance deployed to avoid tail drop and to
have preferential drops displays the four AF classes and the three drop
preferences (probabilities) within each class. Beside each AFxy within the
table, its corresponding decimal and binary DSCP values are also displayed
for your reference.
Queuing
Per-Hop Behavior Queue Design Principles
Voice, video, and data applications are converged in the network to be co-
existed seamlessly by allowing each with appropriate QoS service
expectations and guarantees.
The non-real–time applications’ performance can be significantly degraded
when real-time applications are the only ones that consume link bandwidth.
The significant performance impact on non-real–time applications is shown
by the extensive testing results when more than one-third of the connections
is used by real-time applications as part of a strict-priority queue. More than a
third of link bandwidth is not recommended to be used for strict-priority
queuing. The non-real–time applications are prevented from being dropped
out of their required QoS recommendations with this principle. Also, no more
than 33 percent of the bandwidth be used for the expedite forwarding queue.
This 33% design principle is not necessarily a mandatory rule but a best
practice design recommendation.
For an assured forwarding per-hop behavior, a minimum of one queue should
be provisioned but up to four subclasses can be well-defined within the AF
class: AF1x, AF2x, AF3x, and AF4x.
A bandwidth corresponding to the application requirements of that traffic
subclass must be there in the specified AF subclass that belongs to each
queue. All the traffic not explicitly defined in other queues lie in the Default
Forwarding (DF) class. It is important to have acceptable space for those
traffic types while many applications are used by an enterprise. For this
service class, typically 25 percent of link bandwidth can be used. As for each
of the queue, a pre-specified bandwidth is reserved if the amount of traffic on
a particular queue exceeds the reserved bandwidth for that queue, the queue
builds up and eventually incurs packet drops.
Queuing Schedulers
Priority Queueing (PRIQ)
The simplest form of traffic shaping is Priority Queuing. It is often the most
effective. Only the prioritization of traffic is performed without regard for
bandwidth.
Pros
Easy to understand and configure.
Cons
Lower precedence queues can be completely starved easily for bandwidth.
Class Based Queueing (CBQ)
The next step up from priority queuing is CBQ. A tree hierarchy of classes is
created with an allocated priority and bandwidth limit. Instead of
processing all packets from the class, the PRIQ will only process enough
packets until the bandwidth limit is reached.
Shaping
Traffic shaping is used to assign more predictive behavior to traffic. It uses
Token Bucket model. The Token Bucket characterizes traffic source.
The main parameters for Token Bucket includes:
Token Arrival Rate - v
Bucket Depth - Bc
Time Interval – tc
Link Capacity - C
Configuring Traffic Shaping
Traffic shaping and queuing can be accomplished in several ways. The
easiest way implemented is ALTQ-based shaping that is with the Traffic
Shaping Wizard.
Traffic Shaping configuration is based at Firewall > Traffic Shaping.
Limitations
An upper limit on traffic cannot be set by ALTQ shaping.
Wizards
A default set of rules are created by using The Traffic Shaping Wizard. The
rules shaped by the wizard cope well with VOIP traffic but may need
modification to accommodate other traffic not enclosed by the wizard. The
exact choices of wizards depend on the version in use.
The queue sizes and bandwidths are sized appropriately for most
configurations by the wizard. They may need to be manually adjusted in
some cases but for the majority of cases, it is unnecessary.
Multiple Lan/Wan
An arbitrary number of WANs and LANs can be accommodated with this
wizard.
Dedicated Links
When the specific LAN/WAN pairings do not mix traffic with others, this
wizard is meant for multiple WANs and LANs. Several ‘virtual’ links are
managed by a single firewall in this way.
Other Wizards
If the descriptions of the other wizards suit the respective environment, they
can be used. The Multiple Lan/Wan wizard can be used due to a large amount
of unnecessary redundancy between the various wizards.
Policing
QoS policy prevents manual policy changes in network devices. Its
Community attribute is usually used for color assignments.
Note
DiffServ or differentiated services is a computer networking architecture. A
mechanism that is simple and scalable for classifying and managing
network is specified in these services. It also provides Quality of Service
(QoS) on modern IP networks.
Differentiated Services
The differing QoS requirements are classified with a multiple service model
called Differentiated Services. A specific kind of service based on the QoS is
delivered by the network with Differentiated Services. This QoS is specified
by each packet. Many different ways support the occurrence of this
specification. The QoS specification is used in a network to classify, mark,
shape, and police traffic to perform intelligent queueing.
Several mission-critical applications use differentiated services. It is also used
for providing end-to-end QoS. Differentiated Services performs a relatively
coarse level of traffic classification and is appropriate for aggregate flows.
DS Field Definition
The DS field is well-defined by Differentiated Services. It is also termed as a
replacement header field. The current definitions of the IP version 4 (IPv4)
type of service (ToS) octet (RFC 791) and the IPv6 traffic class octet are
superseded by the DS field. To select the Per-Hop Behavior (PHB) on each
and every interface, six bits of the DS field are used as the DSCP. A 2-bit
(CU) unused field is kept for the obvious congestion notification (ECN). DS-
compliant interfaces usually ignore the value of the CU bits while
determining the PHB to apply to a received packet.
Per-Hop Behaviors
The PHB has been defined as the externally observable forwarding behavior
by RFC 2475. This behavior is applied at a DiffServ-compliant node to a
DiffServ Behavior Aggregate (BA) with the aptitude of the system to mark
packets according to DSCP setting. The collections of packets with the same
DSCP setting can be grouped into a BA that are sent in a particular direction.
Packets from several sources or applications can belong to the same BA.
A PHB is also referred as packet scheduling, queueing, policing, or shaping
behavior of a node on any particular packet belonging to a BA. This is as
configured by a Service Level Agreement (SLA) or a policy map.
Default PHB
The traditional best-effort package from a DS-compliant node is received by
a packet marked with a DSCP value of 000000 that is essentially specified in
the default PHB. The packet will be mapped to the default PHB upon arriving
of packets at a DS-compliant node. The DSCP value will not be mapped to
any other PHB.
Class-Selector PHB
A DSCP value in the form xxx000 has been defined by DiffServ to reserve
backward-compatibility with any IP precedence scheme currently in use on
the network, where x is either 0 or 1. Class-Selector Code Points is the name
given to these DSCP values.The DSCP worth for a packet with default PHB
000000 is also termed as the Class-Selector Code Point. A Class-Selector
PHB is the PHB associated with a Class-Selector Code Point. Most of the
forwarding behavior is retrained in these Class-Selector PHBs as nodes that
implement IP Precedence-based classification and forwarding.
For example, packets having a DSCP value of 11000 usually have
preferential forwarding treatment. Remember that the 11000 is the equivalent
of the IP Precedence-based value of 110 and the preferential forwarding
treatment is followed for scheduling, queueing, and so on. These Class-
Selector PHBs confirm that DS-compliant nodes can coexist with IP
Precedence-based nodes.
Figure 4-10: Per-Hop Treatment
Benefits of Implementing DiffeServe
For end-to-end quality of service, the DiffServ is set to implement the
Differentiated Services architecture. The benefits of implementing
Differentiated Services include:
Burden on network devices is reduced and can be scaled easily as
the network grows
Any existing Layer 3 ToS prioritization scheme can be kept by
customers 
DiffServ-compliant devices can be mixed with any existing ToS-
enabled equipment in use by the customers
The current corporate network resources can be alleviated through
efficient management
Network Devices for Remote Access using SSH
By applying access-lists to the line (as we explain in a section Local
Authentication) access to a device can be controlled at any line (console, aux,
or terminal). A method SSH is also used for securing access.
Source Address: Securing address is done through the configuration of
access-lists as described in the section “Local Authentication”.
Telnet/SSH: You should use Secure Shell (SSH) instead of telnet because it
creates a more secure session. Telnet applications practice an unencrypted
data stream, but SSH uses encryption keys to send data so that no one can see
your username and password.
Exam Tip
When we use telnet at the end of the ssh command, only then SSH will
work on the device. SSH is more secure than Telnet. Accessing a network
using SSH is a topic that you need to understand both for clearing the exam
and making your network secure.
Capabilities and Functions of TFTP/FTP in the Network
File Transfer Protocol (FTP)
Files are transferred between systems by using both the File Transfer
Protocol (FTP) and the Trivial File Transfer Protocol (TFTP). The remote
user is allowed to navigate the server's file structure and upload and
download files with FTP. A simplified alternative to FTP is TFTP that
provides no authentication and the configurations are transferred to and from
network devices by using it. Both FTP and TFTP are insecure protocols
inherently.
Encryption is not used by these protocols and both authentication and file
data to traverse the network in the clear are allowed. These protocols are
considered while sharing non-sensitive data with the general public or
operating in an inherently secure environment. A secure alternative to these
protocols is there. The Secure Shell (SSH) protocol is used by the secure FTP
protocol to encrypt standard FTP communications and provide confidentiality
in transit.
Note
The two TCP ports used by FTP are: port 20 for sending data and port 21
for sending control commands. The use of authentication is supported by
the protocol, but like Telnet, all data including the usernames and
passwords are sent in clear text.
Capabilities and functions of File Transfer Protocol
File Transfer Protocol, FTP, is a protocol for application layer that transfers
files between local and remote file systems. It functions on the top of TCP,
like HTTP. To move a file, two TCP connections are used by FTP in
parallel: control connection and data connection.
Figure 4-11: File Transfer Protocol Diagram
What is control connection?
The control information like user identification, commands to change the
remote directory, password, commands to retrieve and store files, etc., are
controlled by making the use of FTP connection. This control connection
initiates on port number 21.
What is data connection?
FTP makes use of data connection for sending the actual file. Port number 20
allows the initiation of data connection. The control information is sent out-
of-band as FTP uses a separate control connection. Hence, they are said to
send their control information in-band for this reason. HTTP and SMTP are
the like examples.
FTP Session:
The client starts a control TCP connection with the server side when the FTP
session is started between a client and a server. The control information is
sent over a TCP connection by the client. A data connection to the client side
is initiated when the server receives this information. One data connection
allows only one file to be sent over it. The control connection remains active
during the user session. As HTTP is stateless, it does not have to keep track
of any user state. But a state about FTP’s user needs to be maintained
throughout the session.
Data Structures: Three types of data structures are allowed with FTP:
File Structure: There is no internal structure present in a file-structure and
the file is deliberated to be a continuous sequence of data bytes.
Record Structure: The file is made up of sequential records in record-
structure.
Page Structure: The file is made up of independent indexed pages in page-
structure.
FTP Commands:
Some of the FTP commands are given below:
USER : The user identification is sent to the server by this command.
PASS : The user password to the server is sent by this command.
CWD: The user is allowed to work with a different directory or dataset for
file storage or retrieval by using this command. This is without altering login
or accounting information.
RMD: The directory specified in the path-name to be removed as a directory
is caused by this command.
MKD: The directory specified in the pathname to be created as a directory is
resulted by this command.
PWD: This command is used to return the name of the current working
directory in the reply results.
RETR: A data connection of the remote host is initiated and the requested
files are sent over the data connection by using this command.
STOR: The current directory of the remote host stores a file by using this
command.
LIST: The list of all the files present in the directory is displayed by sending
this request.
ABOR: The previous FTP service command and the transfer of data that is
associated by using this command are aborted by this request.
QUIT: A USER is terminated and the control connection of server gets
closed by using this command if the file transfer is not in progress.
FTP Replies:
The FTP replies include:
200 Command is okay.
530 Not logged in.
331 User name is okay; a password is needed.
225 Open a data connection; no transfer is in progress.
221 Control connection is being closed by the service.
551 Aborted the requested actions: unknown page type.
502 Command is not implemented.
503 Commands with bad sequence.
504 For the parameter, command was not implemented.
Trivial File Transfer Protocol (TFTP)
A network protocol used to handover files between remote machines is called
TFTP. It lacks in having some of the more innovative features that FTP
offers. It requires less resources than FTP. TFTP can be used merely to send
and receive files. TFTP was developed in the 1970’s . It still can be used to
save and bring back a router configuration or to backup an IOS image. It is a
very simple protocol. It has limited features as compared to File Transfer
Protocol (FTP). No authentication and security while transferring files are
provided in TFTP. The boot files or configuration files are usually transferred
between machines in a local setup by using this protocol. In a computer
network, users interactively utilize these protocols. However, it is very
dangerous to use it over the internet due to the lack of its security.
The boot computers and devices not having hard disk drivesor storage
devices significantly use this protocol because a small amount of memory is
enough to implement it. Due to this feature, TFTP appears to be one of the
core elements of network boot protocol or Pre-boot Execution Environment
(PXE). Initiation of data transfer takes place through port 69. When the
connection is initialized, the data transfer ports are selected by the sender and
receiver.
TFTP are used by the home network administrators to upgrade the router
firmware. TFTP are used by the professional administrators to distribute
software across corporate networks.
Key Features of TFTP
Good for simple file handovers, such as during boot time
UDP is used as transport layer protocols. The TFTP server must
handle the errors in the transmission (checksum errors, lost
packets)
Only one connection is used through well-known port 69
A simple lock-step protocol is used by TFTP. In the simple lock-
step protocol, each data packet needs to be acknowledged. Thus
the throughput is limited
Capabilities of TFTP
The client and server software are used by TFTP to make connections
between two devices. From a TFTP client, the individual files can be copied
(uploaded) to or downloaded from the server. The files and the client requests
are hosted by the server or files are sent.
Note
TFTP relies on UDP to transport data
A computer can be initiated remotely and the network or router configuration
files are backed up by using TFTP.
TFTP Client and Server Software
The current versions of Microsoft Windows, Linux, and MacOS include the
command-line TFTP clients. These TFTP clients with graphical interfaces are
also available as freeware. For example, TFTPD32 that includes a TFTP
server. Another example of a GUI client and server for TFTP is windows
TFTP Utility.
Several free Windows TFTP servers are available for download. The TFTP
servers are used by the Linux and MacOS systems in spite the fact that they
could be disabled by default.
Note
Networking experts recommend configuring TFTP servers carefully to
https://www.lifewire.com/user-datagram-protocol-817976
https://www.lifewire.com/freeware-definition-4154271
http://tftpd32.jounin.net/
https://sourceforge.net/projects/tftputil/
https://www.lifewire.com/windows-ftp-servers-free-817577
avoid potential security problems.
Differences between TFTP & FTP
The key aspects that differentiate the Trivial File Transfer Protocol from FTP
are:
Original versions of TFTP were able to transfer files up to 32 MB
in size, the latest TFTP servers removed this restriction or might
limit the file size to 4 GB
There are no login features available in TFTP, so a username and
password is not prompted
Sensitive files must not be shared by using TFTP; These files can
be protected or the access to the files must be audited
It is not allowed to listen, rename, and delete files over TFTP
UDP port 69 is used by TFTP to establish network connections
while ports 20 and 21 are used by FTP
UDP is used to implement TFTP. It generally works only on local
area networks
Exam Tip
To pass the exam, you should know the difference between the FTP and
TFTP with respect to the encryption, authentication and confidentiality.
Mind Map
https://www.lifewire.com/what-is-lan-4684071
Figure 4-12: Mind Map of IP Services
Summary
Configure and Verify Inside Source NAT using Static and
Pools
A firewall gives a public address to a computer or group of
computers within a private network in the process of Network
Address Translation (NAT)
The traffic between private addresses can be routed by the routers
inside the private network without having any trouble
The firewall acts as the intermediary between the external world
and the protected internal network and appears to be an additional
layer of security
The inside addresses must be translated while the outside
addresses are not in control of an organization
The 3 ways to configure NAT are Static NAT, Dynamic NAT, and
Port Address Translation (PAT)
NAT64 is the process of translating an IPv6 address to IPv4
address for communication and vice versa
Cisco IP SLA (Service Level Agreement) allows you to monitor
services in order to increase performance, productivity, lowering
the network outage frequency, etc.
PAT is an extension to NAT. On a LAN, the multiple IP addresses
are mapped to a single public IP address
Configure and Verify NTP Operating in a Client and Server
Mode
NTP synchronizes clocks of computer systems over packet-
switched, variable-latency data networks
An NTP server connects through the internet to an atomic clock
The date and time settings on the router can be set using one of
two methods: Manually Setting the date and time, and Configuring
the Network Time Protocol (NTP)
NTP allows networking devices on the network to synchronize
their time and date with an NTP server device
Syslog is one of the most common methods to access system
messages that devices provide
It keeps monitoring the event running on the system, and stores the
message to the desired location
The Role of DHCP and DNS within the Network
The information required to configure a DHCP server for hosts
includes: Network and Mask for every LAN, Reserved/Excluded
Addresses, Default Router, and DNS Address
The DNS server’s P address on a network be identified by using
the DNS settings
A default-gateway for the clients is defined by using the gateway
option
The Function of SNMP in Network Operations
Simple Network Management Protocol (SNMP) provides a
message format for agents on a variety of devices to communicate
with Network Management Stations (NMSs)
The information in the database is either read or written as a
Management Information Base (MIB)
SNMP is used to provide some configurations to agents and it is
called SET messages
SNMP is used for analyzing information and compiling the
outcomes in a report or even a graph
The SNMP has three versions (v1, v2 and v3)
SNMPv2 supports plain-text authentication with community
strings with no encryption but offers GET BULK that is a way to
collect many types of information at once and minimize the
number of GET requests
SNMPv3 supports strong authentication with SHA or MD5
It provides confidentiality (encryption) and data integrity of
messages via Data Encryption Standard (DES) or DES-256
encryption between agents and managers
Use of Syslog Features
An effective method of watching what's going on with a network
at a particular time is by using the syslog features
Network devices are being configured to produce a syslog
message and forward it to various destinations
The system message format can be broken as Seq no, Timestamp,
Facility, Severity, MNEMONIC, and Description
Configure and Verify DHCP Client and Relay
Dynamic Host Configuration Protocol (DHCP) is a network
protocol
It enables a server to assign an IP address automatically to a
computer from a defined range of numbers
A DHCP Server is a network server. It automatically provides and
assigns IP addresses, default gateways and other network
parameters to client devices
The network administrator has to set up every client manually that
joins the network without having a DHCP
DHCP servers offer logging and management interfaces that aid
administrators manage their IP address scopes
Forwarding Per-hop Behavior for QoS such as Classification,
Marking, Queuing, Congestion, Policing, Shaping
The forwarding behavior is assigned to a DSCP
The forwarding priority for a marked packet is defined by the PHB
When the traffic flows leave the IPQoS-enabled system in the QoS
policy defined DSC, the DSCPs indicates the precedence levels for
traffic classes Ps
The behaviors are defined in the Diffserv architecture, which
includes the Expedited Forwarding (EF) and Assured Forwarding
(AF)
Network Devices for Remote Access using SSH
A method SSH is used for securing access
Securing address is done through the configuration of access-lists
Telnet application practices an unencrypted data stream, but SSH
uses encryption keys to send data so no one is able to see theusername and password
Capabilities and Functions of TFTP/FTP in the Network
Both the File Transfer Protocol (FTP) and the Trivial File Transfer
Protocol (TFTP) are used to send files among the systems
TFTP is an easy alternative to FTP that offers no authentication
The configurations are transferred to and from network devices by
using TFTP
The Secure Shell (SSH) protocol is used by the secure FTP
protocol to encrypt standard FTP communications and provide
confidentiality in transit
FTP makes use of data connection for sending the actual file
where Port number 20 allows the initiation of data connection
TFTP lacks in having some of the more innovative features that
FTP offers
Boot computers and devices not having hard disk drives or storage
devices significantly use this protocol because a small amount of
memory is enough to implement it
TFTPs are used by the professional administrators to distribute
software across corporate networks
Practice Question
1. Which of the following message formats is provided for agents on a
variety of devices to communicate with Network Management Stations
(NMSs)?
A. OSPF
B. SNMP
C. DSCP
D. TFTP
2. A low loss, latency, and jitter is provided with which one of the
following?
A. SNMP
B. TFTP
C. EFs related DSCP
D. GET BULK
3. How many different types of forwarding classes are provided by the
per-hop behavior?
A. Three
B. Two
C. Four
D. Five
4. Which of the following protocol uses encryption keys to send data
so that no one can see your username and password?
A. TFTP
B. SSH
C. HTTP
D. TCP
5. Which protocol is used to transfer the boot files or configuration
files between machines in a local setup?
A. FTP
B. TFTP
C. TCP
D. HTTP
6. Which protocol is used to analyze information and compile the
outcomes in a report or even a graph?
A. SMTP
B. SNMP
C. SNMPV2
D. TFTP
7. Which if the protocol supports plain-text authentication with
community strings with no encryption but provides GET BULK?
A. SMTP
B. SNMP
C. SNMPV2
D. TFTP
8. What is the most popular and efficient method of seeing the running
configuration on your network at a particular time?
A. OSPF
B. SNMP
C. DSCP
D. TFTP
9. Which protocol is used by the boot computers and devices that does
not have hard disk drives or storage drives?
A. TFTP
B. FTP
C. SNMP
D. DHCP
10. Which UDP port is used by TFTP to establish network
connections?
A. 20
B. 69
C. 21
D. None of the above
11. Which protocol is used to upload and download the files and to
navigate the server's file?
A. UDP
B. FTP
C. TCP
D. HTTP
12. Which connection is stablished with the server side when the
FTP session starts?
A. UDP
B. SNMP
C. TCP
D. HTTP
13. Which of the protocol offers the limited throughput in TFTP?
A. Simple Network Management Protocol
B. Lock-Step Protocol
C. User Datagrame Protocol
D. File Transfer Protocol
14. Workstations requiring special access outside the network are
assigned specific external IPs by using which of the following
protocol?
A. PHB
B. SNMP
C. NAT
D. TCP
15. Which address is not in control of any organization?
A. Inside
B. Outside
C. Global
D. Inside Global
16. Which of the following method allows the user to conserve
addresses in the global address pool by allowing source ports in TCP
and UDP to be translated?
A. NAP
B. SLA
C. PHB
D. PAT
17. Which one of the following supports a cryptographic
authentication technique between NTP peers?
A. NTP
B. UDP
C. NTPV3
D. TCP
18. Which of the following can be used to send a triggered piece of
information to the SNMP manager?
A. WALK
B. SET
C. TRAP
D. GET
19. In which of the following techniques, traffic does not have to
wait in line?
A. Expedited Forwarding
B. Assured Forwarding
C. Per-Hop Behavior
D. Packet Forwarding
20. Which of the following provides and assigns IP addresses,
default gateways and other network parameters to client devices?
A. TCP Server
B. DHCP Server
C. UDP Server
D. HTTP Server
Chapter 05: Security Fundamentals
Technology Brief
As the computer network technology and the internet technology is
developing more rapidly, people are becoming more aware of the importance
of the network security. Network security is the main issue of computing
because many types of attacks are increasing day by day. Protecting
computer and network security are critical issues. Network security is a very
important consideration for accessing the internet and for transferring the
data. In this chapter, we are going to discuss the security threats, observed
vulnerabilities, exploits and the mitigation techniques.
Security Concepts
The most prominent topics nowadays is network and information system
security and their associated risks and attacks. One after another, networks
are compromised due to insufficient network security policies. But the
question is; why is network security so important? Network security is
important because of its direct impact to the continuity of any organization’s
business.
Network security attacks can cause the following impacts in an organization:
o Loss of business data
o Interruption and misuse of people’s privacy
o Threaten and compromise the integrity of organization’s data
o Loss of reputation
Nowadays, people are becoming more aware about securing their devices
connected to the public internet because of occurred events of data leakage,
it’s alteration and misuse in the past few years. Network vulnerability and
new methods of attack are growing day by day, hence the evolving
techniques of making network more secured is growing.
Threats
A threat indicates the possibility of an exploit or attack with potential risks. A
threat is any insecurity lying in a system that can be exploit. The presence of
vulnerability in a system results in a threat. The entity that uses the
vulnerability to attack a system is known as malicious actor and the path used
by this entity to launch attack is known as threat vector. Some of the major
threat classifications include:
User Identity Spoofing: This includes multiple techniques used to represent
legitimate user information like GPS spoofing, email-address spoofing and
caller-ID spoofing, which are used in Voice-over-IP.
Information Tampering: This includes threats that are related to the
changing of information rather than stealing it. Like changing the financial
records and transactions used in banks, criminal records, etc.
Data Leakage: This means revealing or sending the data either outside the
organization or to someone who is not authorized for. It also includes the
disclosure of information from different running services and operational
processes. Implementing DLP controls and strict information security
policies can help to overcome this leakage.
Denial of Service (DoS): This is a type of attack in which service offered by
a system or a network is denied. Services may either be denied, reduce the
functionality, or prevent the access to the resources even to the legitimate
users. There are several techniques to perform DoS attack such as generating
a large number of requests to the targeted system for service. These large
numbers of incoming requests overload the system capacity, which results in
denial of service. Botnets and Zombies are the compromised systems, which
are used for generating huge traffic for DDoS attack.
Figure 5-01: Denial-of-Service Attack 
Common Symptoms of DoS attack are:
Slow performance
High CPU and memory utilization
Unavailability of a resource
Loss of access to a service
Discontinuation of a wireless or wired internet connection
Denial of access to any internet service
Vulnerabilities
Vulnerability is defined as an inherent weakness in the design, configuration,
implementation, or management of a network or system that can be exploited
by an attacker. Vulnerability can be present at any level of system
architecture.
Classifying vulnerabilities on the basis of how threatening it is orhow it
would impact the system helps in identifying its impact on system. The
Common Vulnerabilities and Exposures (CVE) List was launched by MITRE
as a community effort in 1999, and the U.S. National Vulnerability Database
(NVD) was launched by the National Institute of Standards and Technology
(NIST) in 2005. CVE categorizes the known vulnerabilities over the internet.
It can be searched via any search engine available today. The following are
few of the important reasons through which vulnerability can exist in the
system:
Policy flaws
Design errors
Protocol weaknesses
Misconfiguration
Software vulnerabilities
Human factors
Malicious software
Hardware vulnerabilities
Physical access to network resources
Exploits
The term “exploits” refers to the action of an attacker where a vulnerability is
leveraged to intrude into the system. The attacker takes the advantage of the
vulnerability such as an unpatched system is easily exploitable. It may also
refer to a software code or program, which bypasses the security mechanism
to provide access to the system.
Some exploits are designed to specifically attack vulnerabilities on
applications or systems to take control over servers or computer systems.
Remember that in some cases, exploits do not need software to achieve their
goals. For example, scams that involve social engineering a person or
employee into revealing sensitive or critical information are perfect examples
of exploits that do not require software and hacking skills.
Mitigation Techniques
The word mitigation defines the act of reducing the severity or seriousness of
the impact of something on a situation. IT Threat Mitigation is then defined
as the addressing actions, prevention techniques, or remedies implemented to
reduce IT threats on a network, computer, or server. 'IT threat' is actual a
broad term that holds physical, software, and hardware threats that any IT
system may encounter.
Signature Management
A digital signature is a digital equivalent authentication mechanism, which
validates the integrity of a message or file. Digital signatures can also
provide non-repudiation. It is important to detect forgery or tampering in
digital information. Digital signatures are equivalent to traditional
handwritten signatures in many respects, but properly implemented digital
signatures are more difficult to forge than the handwritten type. Digital
signatures employ asymmetric cryptography.
Digital signatures are the digitalized equivalent of a sealed envelope and are
intended to ensure that a file has not been altered during transit. Any file with
a digital signature is allowed to verify not only the publishers of the content
or file, but also to verify the content integrity at the time of download. On the
network, PKI enables users to issue certificates to internal
developers/contractors and allows any member to verify the origin and
integrity of downloaded applications.
Device Hardening
Device hardening is a technique that applies not only in routers, switches and
servers but also applies on all network devices including laptops, desktops
and mobile devices. One of the current goals of operations security is to
ensure that all systems have been hardened to the extent that is possible and
still provide functionality. The hardening can be achieved both on a physical
and logical basis.
From a logical perspective:
Implementing least privilege rule
Changing default credentials and implementing strong password
policy
Patching OS and applications
Disabling unnecessary services and ports
Change Default Native VLAN
On switches, the native VLAN is the only VLAN that is not tagged in a
trunk. This means that native VLAN frames are transmitted unchanged. By
default, the native VLAN port is 1, and that default port represents a
weakness in a way that it is an information that an attacker can take
advantage of it. To provide security, you must take some steps and change
the native VLAN to another VLAN.
Switch Port Protection
The switch port protection feature is a key implementation of the network
switch security. It provides the ability to limit what addresses will be allowed
to send traffic on individual switch ports within the switched network. Switch
port security starts with understanding potential vulnerabilities and then
addressing them through correct configuration. This addresses may include
Spanning Tree, Flood Guard, BPDU Guard, Root Guard, and DHCP
Snooping. Unused switch ports must be administratively shutdown.
Network Segmentation
Network segmentation reduces the congestion in the network. Apart from
enhancing the network performance, network segmentation plays an
important role in strengthening the network security by isolating the
management network and critical servers from normal traffic.
DMZ
Generally, three zones are related with firewalls: Internal, External, and
Demilitarized (DMZ). The internal zone is the zone inside of all firewalls,
and it is considered to be the protected area where most critical servers, such
as domain controllers that control sensitive information, are placed. The
external zone is the area outside the firewall that represents the network
against inside protection such as the internet. The DMZ is placed where the
network has more than one firewall. It is a zone that is between two firewalls.
It is created using a device that has at least three network connections,
sometimes referred to as a three-pronged firewall. In DMZ, place the servers
that are used by hosts on both the internal network and the external network
that may include web, VPN, and FTP servers.
Figure 5-02: DMZ using One Firewall
VLAN
Switches and routers have physical interfaces, commonly known as a
physical port; these ports can be configured in a variety of ways, depending
upon the topology, design, type of encapsulation, duplex, and speed of the
link.
VLANs on switches allow users to create network segmentation by creating
multiple virtual subnets while maintaining a flexible network that is easy to
modify when required. Alternatively, an improper VLAN assignment on a
port will effectively place clients in a subnet that will not be controlled by the
administrator. It is not only a connectivity issue, but it could also create
security issues. While assigning a VLAN, it should be done with great care as
to which client computer is connected to which VLAN interface.
Privileged User Account
The Least Privilege Principle states that,
“A subject should be given only those privileges needed for it to complete its
task”
The least set of privileges is used to complete the job by every program and
every user of the system. The damage resulted from an accident or error is
limited by this principle. The number of potential interactions among
privileged programs are reduced to the minimum for correct operation, so that
unintentional, unwanted, or improper uses of privilege are less likely to
occur. The number of programs to be audited are minimized if a question
arises related to misuse of a privilege. An example of this principle is the
military security rule of "need-to-know".
Only the minimum access necessary to perform an operation should be
granted according to the principle of least privilege. The access should be
granted only for the minimum amount of necessary time.
File Integrity Monitoring
Integrity is the process to ensure that the received data is same as the
originally sent. Integrity is designed to eliminate the situations where
someone is tampering with your data. However, file integrity monitoring is
performed as the concept of file hashing that were discussed earlier but with a
software program. File integrity monitoring observes changed settings or
access controls, attributes and sizes, and, of course, the hashes of files.
Role Separation
Role separation also known as separation of duties, requires one user to
perform a specific task, and another one to perform a related task. This
reduces the possibility of scams or errors from occurring, by implementing an
equalized

Mais conteúdos dessa disciplina