Ccna RS
Ccna RS
Ccna RS
TCP/IP Model:...................................................................................................................................................... 15
Firewall: ............................................................................................................................................................... 17
Cloud Services:..................................................................................................................................................... 17
Software as a Service (SaaS): ...................................................................................................................................17
Platform as a Service (PaaS): ...................................................................................................................................18
Infrastructure as a Service (IaaS): ............................................................................................................................18
Documentation: ................................................................................................................................................... 22
Resolve: ............................................................................................................................................................... 22
Escalate: .............................................................................................................................................................. 23
Zero Address:....................................................................................................................................................... 24
APIPA:.................................................................................................................................................................. 26
Multicast: ............................................................................................................................................................ 27
Anycast: ............................................................................................................................................................... 28
LAN SWITCHING:............................................................................................................................ 34
PVST+: ................................................................................................................................................................. 41
RPVST+: ............................................................................................................................................................... 41
....................................................................................................................................................... 48
Administrative Distance:...................................................................................................................................... 49
Metric: ................................................................................................................................................................. 49
COMPARE & CONTRAST DISTANCE VECTOR & LINK STATE ROUTING PROTOCOLS: ....................... 54
CONFIGURE & VERIFY SINGLE AREA & MULTI-AREA OSPFV2 FOR IPV4: ......................................... 56
Single Homed:...................................................................................................................................................... 74
DMVPN: ............................................................................................................................................................... 75
Working of FHRP:................................................................................................................................................. 78
Static: .................................................................................................................................................................. 82
Dynamic:.............................................................................................................................................................. 82
Sticky: .................................................................................................................................................................. 83
802.1X: ................................................................................................................................................................ 85
CONFIGURE & VERIFY IPV4 & IPV6 ACCESS LIST FOR TRAFFIC FILTERING:...................................... 87
SNMPv1: .............................................................................................................................................................. 94
SNMPv2c: ............................................................................................................................................................ 94
SNMPv3: .............................................................................................................................................................. 95
Timezone: ............................................................................................................................................................ 99
7) Application Layer:
This layer provides services for end user applications Such as HTTP, FTP, TFTP, SMTP, Telnet,
SHH, DHCP, POP and DNS servers, all Operating Systems, Web Browsers, Firewalls,
Communication Software (Messengers, Skype etc.).
6) Presentation Layer:
Three activities are taking place at this layer:
1) Encryption: The process of converting the plain text in to cipher text for data confidentiality.
2) Translation: Coverts protocol from one form to other. Like IPX to IP.
3) Compression: It simply works with the compression of data like win zip.
Encoding, Decoding, Encryption, Decryption, Compression and Decompression
Access Points:
Access points provide wireless access to a wired Ethernet network. An access point plugs into a
hub, switch, or wired router and sends out wireless signals. This enables computers and devices
to connect to a wired network wirelessly.
Wireless Controllers:
A Wireless Controller is used for configuration of wireless policy, management or security
settings at any time through centralized provisioning and management.
Virtual Services:
The terms “Cloud Computing” and “Virtualization” are often used interchangeably; however,
they mean different things. Virtualization is the foundation of Cloud Computing. Without it,
Cloud Computing, as it is most-widely implemented, would not be possible. Cloud Computing
separates the application from the hardware. Virtualization separates the OS from the
hardware.
Cloud Services:
Cloud services are available in a variety of options to meet customer requirements.
Software as a Service (SaaS):
The Cloud provider is responsible for access to services, such as email, communication, and
Office 365 that are delivered over the Internet. The user is only needs to provide their data.
Gmail is one of the example of Software as a Service.
Star Topology:
A star topology is designed with each node like workstations, printers, laptops, servers etc.
connected directly to a central device called as a network switch. Each workstation has a cable
that goes from its network card to a network switch. Most popular and widely used LAN
technology Ethernet currently operates in Star Topology.
Advantages of Star Topology:
Easy to install and wire. No disruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.
Disadvantages of Star Topology:
Requires more cable length than a linear bus topology. If the switch fails, nodes attached are
cannot participate in network communication. More expensive than bus topology because of
the Switch cost.
Hybrid Topology:
Hybrid topology is a mixture of different topologies. Example is star-bus-ring topology.
Cable Combinations:
Cross Cable is use for same devices and Straight through Cable is use for different devices while
Roll Over Cable is use for Router and Switch to PC Console port.
Loopback Address:
Address beginning with 127 is unacceptable to assign them any network host. From 127.0.0.0
to 127.255.255.255 is fully reserved for loopback purpose. The loopback interface allows IT
professionals to test IP software without worrying about broken or corrupted drivers or
hardware.
Class E Address:
Class E network is reserved for "experimental use". It shouldn’t be assigned to host devices.
Zero Address:
As with the loopback range, the address range from 0.0.0.0 through 0.255.255.255 should not
be considered part of the normal Class A range. 0. x.x.x addresses serve no function in IP, but
nodes attempting to use them will be unable to communicate properly on the Internet.
Subnet Mask:
Class A's default mask is 255.0.0.0, or /8
Class B's default mask is 255.255.0.0, or /16
Class C's default mask is 255.255.255.0, or /24
255.0.0.0 in binary is 11111111 00000000 00000000 00000000.
255.255.0.0 in binary is 11111111 11111111 00000000 00000000.
255.255.255.0 in binary is 11111111 11111111 11111111 00000000.
Class A = /8 = 224 (16,600,000) Addresses for hosts
Class B = /16 = 216 (65,000) Addresses for hosts
Class C = /24 = 28 (256) Addresses for hosts
Class A is used by relatively large companies as it allows more than 16 million hosts. Class B
manages 16,384 hosts per network where Class C is used 254 hosts and is employed in small or
middle size organizations.
IPV4 VS IPV6
IPV4 IPV6
32 Bits Address 128 Bits Address
8 Bits Group 16 Bits Group
4 Groups 8 Groups
Dotted (.) Decimal Notation Use (:) to Separate Groups
Decimal Number System Hexadecimal Number System
Classes [A, B, C, D, E] No Classes
Subnetting Required No Subnetting Required
No Built-In Security Built-In Security
Unicast, Multicast, Broadcast Unicast, Multicast, Anycast, No Broadcast
No Short Form Available Short Form Available
Manual or DHCP Auto configuration or DHCPv6
ICMP ICMPv6
Broadcast Yes Broadcast No
Broadcast ARP Multicast Neighbor Finding
Anycast:
An Anycast address represents a service rather than a device, and the same address can reside
on one or more devices providing the same service. In this addressing mode, multiple interfaces
(hosts) are assigned same Anycast IP address.
To convert EUI-64 ID into IPv6 Interface Identifier, the most significant 7th bit of EUI-64 ID is
complemented.
IPV4 Subnetting:
Each IP class is equipped with its own default subnet mask which bounds that IP class to have
prefixed number of Networks and prefixed number of Hosts per network. Classful IP addressing
does not provide any flexibility of having less number of Hosts per Network or more Networks
per IP Class. Subnets short for Sub Network. Subnetting is the strategy used to partition a single
physical network into more than one smaller logical sub-networks (subnets). Subnetting
process allows the administrator to divide a single Class A, Class B, or Class C network number
into smaller portions. The subnets can be subnetted again into sub-subnets.
Benefit of Subnetting:
Reduce Broadcast. Reduce Network Complexity. Shortage of IP Address. Helps Easy Security
Subnets help you specify different networks. Improve Network Performance. Improve Network
Management.
Pre-Requisites for Subnetting:
o Binary Numbers System
o Decimal Numbers System
o Binary to Decimal Conversion
o Decimal to Binary Conversion
o IPV4 Addresses (Class A, B, and C)
o Basic Mathematics
Subnetting Math:
Subnetting process involves binary math calculation. Computers communicate with each other
in binary language. Subnetting needs two type of calculation, convert decimal to binary &
convert binary to decimal. Binary system works exactly same as decimal system, except the
base number. Base number is 2 in binary system & 10 in decimal system. To calculate decimal
equivalent value of a binary number, replace base value 10 with 2. Binary numbers are
displayed in columns & each position in binary system has double value than the position in
right.
Class A Subnets:
In Class A, only the first octet is used as Network identifier and rest of three octets are used to
be assigned to Hosts (i.e. 16777214 Hosts per Network). To make more subnet in Class A, bits
from Host part are borrowed and the subnet mask is changed accordingly.
In case of subnetting too, the very first and last IP address of every subnet is used for Subnet
Number and Subnet Broadcast IP address respectively. Because these two IP addresses cannot
be assigned to hosts, sub-netting cannot be implemented by using more than 30 bits as
Network Bits, which provides less than two hosts per subnet.
Class C Subnets:
Class C IP addresses are normally assigned to a very small size network because it can only have
254 hosts in a network.
Description Commands
Create a VLAN no 10 SW(config)#vlan 10
Give name to VLAN SW(config-vlan)#name HR
Delete VLAN SW(config)# no vlan 10
Verify VLAN creation SW# show vlan brief
Verify VLAN database SW# show flash OR dir flash
Configure a Voice VLAN SW(config)#vlan 5
Given name to VLAN VOICE SW(config-vlan) # name VOICE
Go to interface fast0/4 SW(config)#interface f0/4
Put interface in voice vlan 5 SW(config-if)#switchport voice vlan 5
Verify switchport configuration SW# show interface f0/4 switchport
Determine the physical status SW# show interface fa 1/24 status
Access Port:
Access port transports traffic to and from only the specified VLAN allotted to it. Access port will
only have a single VLAN set up on the interface and it carries traffic for just a single VLAN. If the
VLAN for an access port is not configured, the interface can carry traffic using only the default
VLAN, which is usually VLAN1.
Description Commands
Specifically addresses port 1 SW(config)# interface FastEthernet0/1
Places the port f0/1 in vlan 2 SW(config-if)# switchport access vlan 2
Defines the port as an access port SW(config-if)# switchport mode access
VLAN Database:
The VLAN database is used to store vlan data, such as the VLAN ID, name and MTU. The default
location of the VLAN database is in the local vlan.dat file, this is stored in non-volatile memory.
Extended VLANs:
Extended VLANs are VLANs that fall in the range 1006 to 4094. They are mainly used in service
provider networks to allow for the provisioning of large numbers of customers. Extended VLANs
differ from normal VLANs because they have higher numbers. Extended VLANs must be
configured in VTP transparent mode. Extended VLANs are saved to the running-config.
Voice VLAN:
A voice VLAN enables the access port to carry IP voice traffic from an IP phone. By default, the
voice VLAN is disabled. When enabled, all untagged traffic is sent according to the default CoS
priority of the port.
Description Commands
Verify VLAN database vlan.dat SW# show flash OR dir flash
Verify VLAN creation SW# show vlan brief OR show vlan
Check VTP mode and status SW# show vtp status
Configure a Voice VLAN SW(config)#vlan 5
SW(config-vlan) # name VOICE
SW(config)#interface f0/4
SW(config-if)#switchport voice vlan 5
Verify switchport Configuration SW# show interface f0/4 switchport
Manual Pruning:
By default, all VLANs are allowed on a trunk interface. VLANs can be manually added or
removed using the switchport trunk allowed command. Security best practices recommend
limiting the allowed VLANs to only those that need to traverse the trunk.
VTP Versions:
VTP is currently have three versions: VTPv1, VTPv2, and VTPv3. VTPv1 is often the default
version of VTP running on Cisco IOS switches. Even new platforms that have full VTPv3 support
usually default to VTPv1 unless configured otherwise. VTPv1 and VTPv2 provides basic VLAN
learning across normal-range VLANs only (1-1005).
VTP Pruning:
VTP pruning makes more efficient use of trunk bandwidth by reducing unnecessary flooded
traffic. Broadcast and unknown unicast frames on a VLAN are forwarded over a trunk link only if
the switch on the receiving end of the trunk has ports in that VLAN. By default, VTP pruning is
disabled. Uses bandwidth more efficiently by reducing unnecessary flooded traffic. 1002-4094
will not pruned eligible to prune it required manual pruning.
802.1Q Or Dot1Q:
Dot1Q is IEEE 802.1Q, the standard for trunking encapsulation. On Cisco switches, you
configure dot1q on trunk ports which allow tagged frames to be transported on a trunk link,
allowing multiple VLANs to traverse through one link. This extends the VLANs across the
network. dot1Q trunks use VLAN 1 as the default native VLAN. 802.1Q also adds a 4-byte tag
into the Ethernet frame for VLAN tagging.
Description Commands
Configure a VLAN trunk interface SW(config)# interface fa 1/5
Configure VLAN encapsulation SW(config-if)# switchport trunk encapsulation isl dot1q
Verify the trunk configuration SW# show interfaces fa1/5 switchport
Verify the trunk configuration SW# show interfaces fa1/5 trunk
Verify the trunk configuration SW# show interfaces trunk
Native VLAN:
A VLAN that travel Without tag it assigned to an 802.1Q trunk port. By default, the Native VLAN
is 1. Packet without tagged on a dot1q link belongs to Native VLAN. Best practice to change
Native VLAN on all switches. Native VLAN ID must match on both end of the trunk. The VLAN
dot1q tag native command will tag VLAN on all trunks.
SW(config-if) # switchport trunk native vlan vlan-id
PVST+:
Per-VLAN STP Plus (PVST+) is a Cisco implementation of STP that provides a separate spanning-
tree instance for each configured VLAN in the network. It means run a spanning-tree instance
per VLAN. PVSTP+ is usually the default STP on Cisco switches.
RPVST+:
Rapid PVST+ (IEEE 802.1w) is an enhanced version of PVST+ and allows for faster spanning-tree
calculations and convergence in response to Layer 2 topology changes. Rapid PVST+ defines
three port states: discarding, learning, and forwarding, and provides multiple enhancements to
optimize network performance. UplinkFast and BackboneFast are not required for rapid
spanning tree because it’s already implemented by default.
Port Priority:
Each port of a Switch has a Spanning Tree Port Priority value associated with it, 128 by default.
Gi0/1 128.25 P2P: Gi0/1 is the interface 128 is default value and 25 is port number. P2P
means Point-to-Point (Full Duplex) and Shr means Shared (Half Duplex).
Path Cost:
The Root Port is calculated by using the lowest accumulated Path Cost Value to reach the Root
Switch. The Spanning Tree Cost Value is inversely proportional to the associated bandwidth of
the path and therefore a path with a low cost value is more preferable than a path with high
cost value.
Port Costs
Bandwidth Cost
10 Mbps 100
100 Mbps 19
1 Gbps 4
10 Gbps 2
20 Gbps 1
STP RSTP
Disabled (Shutdown by Admin) Discarding (Blocking data frame)
Blocking (Blocked redundant link)
Listing (Listing the data frame) Learning (Building CAM table)
Learning (Creating CAM table)
Forwarding (Converged, Data flow allowed) Forwarding (Converged, Data flow allowed)
Description Commands
Enable Per-VLAN ST SW(config)# spanning-tree mode pvst
Enable Rapid-PVST SW(config)# spanning-tree mode rapid-pvst
Configure the switch as primary root SW(config)# spanning-tree vlan 1 root primary
Configure the switch as secondary root SW(config)# spanning-tree vlan 1 root secondary
Configure the switch priority the SW(config)# spanning-tree vlan 1 priority <0-
priority in increments of 4096 61440>
Verify Spanning Tree SW# show spanning-tree vlan 1
Verify spanning tree features SW# #show spanning-tree summary
Configure path cost on interface SW(config-if) #spanning-tree cost 10
Configure port priority on interface SW(config-if) #spanning-tree vlan 1 port-priority 64
Hello Time:
The Hello Time defines the interval the Root Bridge will send out Configuration BPDUs. This is
set to 2 seconds by default.
Forward Delay:
The Forward Delay is the length of the Listening and Learning states. This is 15 seconds by
default.
Maximum Age:
The Maximum Age timer, often referenced as MaxAge, is the length of time each switch will
save the superior BPDU’s information before discarding it. This is 20 seconds by default.
Description Commands
Display STP details SW# show spanning-tree vlan 1
Changing STP Hello time SW(config)#spanning-tree vlan 1 hello-time 5
Changing STP Forward Delay time SW(config)#spanning-tree vlan 1 forward-time 20
Changing STP Maximum Age time SW(config)#spanning-tree vlan 1 max-age 40
BPDU Guard:
Keeps portfast enable port error disable mode immediately if BPDU received. BPDU Guard can
be configured globally or in interface level.
Description Commands
Interface-level PortFast Configuration SW(config)#interface f0/1
SW(config-if)#spanning-tree portfast
Global PortFast Configuration SW(config)#spanning-tree portfast default
BPDU Guard Global Configuration SW(config)#spanning-tree portfast bpduguard
default
BPDU Guard Interface-level SW(config)# interface f0/1
Configuration SW(config-if)#spanning-tree bpduguard enable
Check root guard inconsistent port SW# show spanning-tree inconsistentports
BPDU Guard and BPDU Filter verification SW# show spanning-tree summary
BPDU Guard & BPDU Filter verification SW# show spanning-tree interface f0/0 detail
LLDP CDP
Link Layer Discovery Protocol Cisco Discovery Protocol
LLDP is a layer two discovery protocol CDP is a layer two discovery protocol
LLDP is a standard protocol CDP is Cisco Proprietary protocol
LLDP use TLVs (Type, Length, Value) to send CDP use TLVs (Type, Length, Value) to send
and receive information to their directly and receive information to their directly
connected neighbors. connected neighbors.
CDP message contains information about CDP message contains information about
port, system name, system capabilities, Device ID, IP address, port ID, VLAN and
management address. hardware platform.
LLDP allows switch ports configured with a CDPv2 allows switch ports configured with a
voice vlan. voice vlan.
LLDP announcements are send to the CDP announcements are send to the
multicast destination address multicast destination address
01-80-C2-00-00-0e on each interface 01-00-0c-cc-cc-cc on each interface
LLDP is disabled by default CDP is enable by default
LLDP advertisements are sent every 30 sec CDP advertisements are sent every 60 sec
LLDP hold time advertised is 120 seconds CDP hold time advertised is 180 seconds
Globally enable LLDP Globally enable CDP
SW(config)#lldp run SW(config)#cdp run
Globally disable LLDP Globally disable CDP
SW(config)#no lldp run SW(config)#no cdp run
Enable LLDP on an interface Enable CDP on an interface
SW(config-if) #lldp transmit SW(config-if)#cdp enable
SW(config-if)#lldp receive
N/A Enable CDP version 2
SW(config)# cdp advertise-v2
SW# show lldp neighbors SW# show cdp neighbors
SW# show lldp entry * SW# show cdp entry *
SW# show lldp traffic SW# show cdp traffic
SW# show lldp SW# show cdp
SW# show lldp interface SW# show cdp interface
SW(config)#lldp timer <time_ in_ second> SW(config)#cdp timer <time_ in_ second>
SW(config)#lldp holdtime <time_ in_ second> SW(config)#cdp holdtime <time_ in_ second>
Layer 3 EtherChannel:
Description Commands
Creating Port Channel Interface SW(config) # interface port-channel 1
Set port channel interface to layer 3 SW(config-if) #no switchport
Assign IP address to Port Channel SW(config-if)# ip address 10.10.10.1 255.255.255.0
Selecting range of interfaces SW(config-if-range) #interface range f0/1 -2
Shutdown the interfaces SW(config-if-range) # shutdown
Set interface range to Layer 3 SW(config-if-range) #no switchport
Set Static mode on SW(config-if-range) #channel-group 1 mode on
No shutdown the interfaces SW(config-if-range) # no shutdown
Verify EtherChannel summary SW# show etherchannel summary
Verify EtherChannel details SW# show etherchannel detail
Verify EtherChannel port channel SW# show etherchannel port-channel
Chassis Aggregation:
Chassis Aggregation refers to another Cisco technology used to make multiple switches operate
as a single switch. Virtual Switching System (VSS) is very platform-specific. Currently, it can only
be run on certain 6500, 6800 and 4500 series switch. There will be exactly two switches in a
VSS domain. VSS works by bundling links into a port-channel and dedicating this port-channel
to the purposes of communicating between the two switches in the VSS domain, and for
forwarding data traffic flowing between chasses. This port-channel is call the Virtual Switch
Link (VSL). These port-channel links are not physically separate ports dedicated to VSS
functions. Rather, they are used from the actual interfaces on the switch, and it is by
configuration that they are considered VsL links.
Frame Rewrite:
The frame rewrite procedure by the router is to encapsulates the IP packet with the same
source and destination IP address that was sent from the original sending device into a new
Layer 2 frame. It changes the source MAC address to the forwarding interface of the local
router. The router changes the destination MAC address to the receiving interface of the
nexthop device. An FCS as part of the trailer is also added. This process continues from hop
to hop on Ethernet networks until the packet reaches the destination host.
Administrative Distance:
Administrative distance is the feature that routers use to select the best path when there are
two or more different routes to the same destination from two different routing protocols.
Administrative distance defines the reliability of a routing protocol. The administrative number
is from 0 to 255. Lowes administrative distance is most preferred.
Route Source Default Administrative Distance
Connected Interfaces 0
Static Route 1
EBGP 20
IBGP 200
EIGRP 90
External EIGRP 170
OSPF 110
RIP 120
Metric:
Routers use various metrics and calculations to determine the best route for a packet to reach
its final network destination. Each routing protocol uses its own algorithm with varying weights
to determine the best possible path. Identifies the value assigned to reach the remote network.
Lower values indicate preferred routes. Example like 2 hops in above given table.
Gateway of Last Resort:
A Gateway of Last Resort or Default gateway is a route used by the router when no other
known route exists to transmit the IP packet. Known routes are present in the routing table.
Hence, any route not known by the routing table is forwarded to the default route. Use the ip
default-gateway command when ip routing is disabled on a Cisco router. Use the ip default-
network and ip route 0.0.0.0 0.0.0.0 commands to set the gateway of last resort on Cisco
routers that have ip routing enabled.
Dynamic Routing:
Dynamic routing protocols can dynamically respond to changes in the network. The routing
protocol is configured on each router and the routers learn about both each other and remote
networks. A dynamic routing table is created, maintained, and updates by routing protocol
running on the router. Examples of routing protocols includes RIP, EIGRP, and OSPF and BGP.
Dynamic routing protocols share routing updates with neighbors and they find best path to
destination networks depends on various factors.
Advantages of Dynamic Routing:
Dynamically choose a different route if a link goes.
Ability to load balance between multiple links.
Updates are shared between routers dynamically.
Disadvantages of Dynamic Routing:
Routing protocols put additional load on router CPU/RAM.
The choice of the best route is on the hands of the routing protocol.
Distance Vector:
Distance vector routing protocol uses distance (metric value) and direction (vector) to find the
best path to destination network. Router receives routing update from neighboring router and
these neighboring routers receive updates from their neighboring routers until the destination
network. Every router in the way of destination network called hop. Each time a packet goes
through a router, it adds one in hop count value. Route with the least hop count value will be
chosen as best path and will be placed in routing table. RIP is the example of distance vector
routing protocol. These protocol shares entire routing table to the directly connected
neighbors. Distance Vector Protocols are slow and have chances for loops. Distance Vector
Protocols maintain only routing table.
Link State:
Link State Routing Protocols operate differently. Routers send information about the state of
their links to the entire network or area that they are part of. In this way, each router
understands the entire network topology. They run an algorithm every time a network change
is announced to recalculate the best routes throughout the network. This makes Link State
Routing Protocols much more processor intensive. Link State Protocols only send triggered
updates not periodic updates. Link State Protocols maintain three separate tables. Neighbor
Table, Topology Table, and Routing Table.
Default Route:
A Default Route also known as the gateway of last resort is a special type of static route. Where
a static route specifies a path a router should use to reach a specific destination, a default route
specifies a path the router should use if it doesn’t know how to reach the destination.
Default Route is the Network Route used by a router when there is no other known route exists
for a given IP destination address. All the IP with unknown destination address are sent to the
default route.
Network Route:
Network Route used by a router when there is no other known route exists for a given IP
destination address. All the IP with unknown destination address are sent to the default route.
Host Route:
A host route is where the destination address is a specific device IP with a subnet mask of /32
for IPv4 or /128 for IPv6. Also, installed Automatically when an IP address is configured on the
router interface.
Configure & Verify Single Area & Multi-Area OSPFv2 for IPv4:
The Open Shortest Path First (OSPF) protocol is a link state protocol that handles routing for IP
traffic. OSPF is an open standard and it will run on most routers independent of make. OSPF
uses the Shortest Path First (SPF) algorithm, to provide a loop-free topology. OSPF provides fast
convergence with triggered, incremental updates via Link State Advertisements (LSAs). OSPF is
a classless protocol and allows for a hierarchical design with VLSM and route summarization.
The main disadvantages of OSPF are requires more memory and CPU processing to run.
The two important concepts in case of OSPF are Autonomous Systems and Areas. Areas are
used to provide hierarchical routing, within an Autonomous System. Areas are used to control
when and how much routing information is shared across your network. OSPF implements a
two-layer hierarchy: the backbone (Area 0) and areas off of the backbone (Areas 1–65,535).
Here the two different areas can summarize routing information between them. All areas
should connect to Area 0 and all routers in an Area will have the same topology table.
o OSPF External and Internal Administrative Distance is 110.
o OSPF default Hello time is 10 seconds and dead time is 40 seconds.
o OSPF metric is Cost.
o OSPF work on area. Area 0 is the backbone of OSPF technology.
o OSPF use multicast address 224.0.0.5 to send hello packet.
o OSPF supports VLSM and route summarization.
o OSPF have Neighbor table, Topology table & Routing table.
o OSPF use Wildcard Mask which is the reciprocal of Subnet Mask.
o OSPF packets are only sends to the neighbor of own Area.
o OSPF supports both IPv4 and IPv6 routed protocols.
Advertised Distance: How far the destination is away for your neighbor.
Feasible Distance: The total distance to the destination.
Successor: The best path to the destination is called the Successor. The successor will be copied
from the topology table to the routing table.
Feasible Successor: In EIGRP it’s possible to have a backup path which we call the feasible
successor.
EIGRP Metric:
EIGRP uses a complex equation to find the Route Metric value. EIGRP calculate metric value. 1)
Bandwidth 2) Delay 3) Reliability and 4) Load. By default, the values of K1 and K3 are set to 1,
and K2, K4 and K5 are set to 0. Hence simple formula:
EIGRP Metric = 256*((10^7 / min. Bw) + Delay)
=256*((10000000/Minimum BW) + Sum of Interface Delays/10)
Where Bandwidth = 10000000/bandwidth(i), where bandwidth(i) is the least bandwidth of all
outgoing interfaces on the route to the destination network represented in kilobits. Delay =
delay(i) where delay(i) is the sum of the delays configured on the interfaces, on the route to the
destination network, in tens of microseconds.
Bandwidth is a static value. Amount of data that can be transmitted in a fixed amount of time.
Delay reflects the time taken by a packet in crossing the interface.
In the topology above R1, R2 and R3 should run an IGP to communicate with each other
because they are in the same AS. But to connect with other routers in another AS (like a
different ISP), R1 and R3 must use an EGP. With BGP, the term autonomous system (AS) refers
to a network that operates separately from other networks and usually operates within a single
administrative domain. Each AS is represented by an AS number. BGP is used mainly by the
Internet Service Provider (ISP) all over the world. BGP AS numbers can be between 1 to 65,535.
The Internet that we are going “online” every day is a collection of interconnected autonomous
systems and BGP is running to provide routing between them.
Advantage of BGP:
The most important reason is BGP greatly supports path control. Another reason to use BGP is
BGP can handle very big routing tables. Currently the global Internet routing table contains over
500,000 routes.
BGP Speaker:
A router running BGP is called Border Gateway Protocols (BGP) Speakers.
BGP Peer or BGP Neighbor:
Any two routers that have formed a TCP connection to exchange BGP routing information.
Prefix:
Maybe you learned the word “Subnet”. In BGP world, it is usually called “Prefix” because BGP
usually does not advertise small subnets. It advertises blocks of large subnets so “Prefix” is
often used instead. If this value is a number (including “0”, which means BGP neighbor does
not advertise any route) then the BGP neighbor relationship is good. If this value is a word
(including “Idle”, “Connect”, “Active”, “OpenSent”, “OpenConfirm”) then the BGP neighbor
relationship is not good.
A big disadvantage of this design is when the link fails or either of the routers fails, the
connection to the Internet fails as well. But of course, this design saves money comparing to
multiple connections to the Internet designs and in fact it is the only reason for small company
to accept this design. With this design, we don’t need BGP in fact, all things we need are: A
default route from the company to the ISP. A static route from the ISP to the company’s public
address range.
Dual Homed:
The next design is called “Dual Homed”, in which the “Dual” word refers to the designs with
two links to the same router.
In this design, we can use BGP to share the traffic between two routers of the company with
our specific ratio (load balancing) or fail over. Of course, this design is better in redundancy
than the first one but it still has a “Single Point of Failure” at the ISP router.
This design is good if we want to separate important traffic to a specific ISP while still has the
other ISP as the fail over path.
Dual Multihomed:
And the last design is called “Dual Multihomed” refers to: Multiple links per ISP. Multiple links
to Company.
If your company has a strong budget, then Dual Multihomed design is ideal to make sure your
connection to outside is always up. And BGP is highly recommended in this case.
BGP Configuration:
R1 Configuration R2 Configuration
R1# configure terminal R2# configure terminal
R1(config)# interface multilink 1 R2(config)# interface multilink 1
R1(config-if)# ip address 192.168.42.1 R2(config-if)# ip address 192.168.42.2
255.255.255.252 255.255.255.252
R1(config-if)# ppp multilink R2(config-if)# ppp multilink
R1(config-if)# ppp multilink group 1 R2(config-if)# ppp multilink group 1
R1(config-if)# interface serial 0/0 R2(config-if)# interface serial 0/0
R1(config-if)# encapsulation ppp R2(config-if)# encapsulation ppp
R1(config-if)# ppp multilink R2(config-if)# ppp multilink
R1(config-if)# ppp multilink group 1 R2(config-if)# ppp multilink group 1
R1(config-if)# no shutdown R2(config-if)# no shutdown
R1(config-if)# interface serial 0/1 R2(config-if)# interface serial 0/1
R1(config-if)# encapsulation ppp R2(config-if)# encapsulation ppp
R1(config-if)# ppp multilink R2(config-if)# ppp multilink
R1(config-if)# ppp multilink group 1 R2(config-if)# ppp multilink group 1
R1(config-if)# no shutdown R2(config-if)# no shutdown
Description Commands
Display Layer 3 operation R1# show ip route
Display details of multilink R1# show interfaces multilink 1
Briefly display all interfaces R1# show ip interface brief
Verifying MLPPP group R1# show ppp multilink
Description Commands
Verify IPv4 Address Assigned to Customer Client# show ip interface brief
Verify the MTU and PPP Encapsulation Client# show interface dialer
Verifying Active PPPoE Sessions Client# show pppoe session
Verifying Default route and Dialer interface Client# show ip route
Verify PPP negotiation Client# debug ppp negotiation
Single Homed:
The single homed design means you have a single connection to a single ISP. The advantage of a
single-homed is that it’s cost effective, the disadvantage is that you don’t have any redundancy.
Your link is a single point of failure but so is using a single ISP.
Dual Homed:
The dual homed connection adds some redundancy. You are still only connected to a single ISP,
but you use two links instead of one. These networks have several advantages, such as network
redundancy and load balancing.
Metro Ethernet:
Initially Ethernet was only restricted to LAN due to distance limits but not anymore. A Metro
Ethernet network is a Metropolitan Area Network (MAN) that is based on Ethernet standards. It
is commonly used to connect subscribers to a larger service network or the Internet. Businesses
can also use Metro Ethernet to connect their own offices to each other. Metro Ethernet
Switches are ME 3400, ME3800X, ME 4900.
Broadband PPPoE:
Many Internet Service Providers (ISPs) from around the world offer their internet services to
residential users through Point-to-Point Protocol over Ethernet or PPPoE connections. To be
able to use such internet connections, the ISP usually gives you a unique username and
password that you must use to connect to their network.
Internet VPN:
A Virtual Private Network (VPN) is a Network Security Technology, which is used to secure
private network traffic over a public network such as the Internet. A VPN ensures Data
Confidentiality and Data Integrity for network data in its journey from the source device to
destination device using network security protocols like IPSec (Internet Protocol Security).
DMVPN:
Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy,
dynamic, and scalable manner. The goal is to simplify the configuration while easily and flexibly
connecting central office sites with branch sites. This is called hub-to-spoke.
With DMVPNs, branch sites can also communicate directly with other branch sites. DMVPN
relies on IPsec to provide secure transport of private information over public networks, such as
the Internet.
Description Commands
Excluded IP not to assign to client R(config)#ip dhcp excluded-address 1.1.1.1
Command to create a DHCP server pool R(config)#Ip dhcp pool mypool
Used to specify the range of addresses R(dhcp-config)# Network 1.0.0.0 255.0.0.0
Assign default router or gateway address R(dhcp-config)# default-router 1.1.1.1
Used to assign domain name. R(dhcp-config)# domain-name test.com
Used to assign DNS Server IP or address R(dhcp-config)# dns-server 8.8.8.8
Used to assign TFTP server IP R(dhcp-config)# next-server TFTP-server-IP
Used to assign NETBIOS name server R(dhcp-config)# NetBIOS-name-server 7.7.7.7
Specify the lease duration R(dhcp-config)#lease 7
Configure TFTP option R(config)# option 150 ip 10.10.1.1
Acquire a DHCP address on an interface R(config-if)#Ip address dhcp
Working of FHRP:
o Creating group of Physical gateway using Layer 3 device Router/Switches.
o Agree to assign one virtual IP address, which same to all first hop device.
o Virtual IP going to use as gateway address to all LAN device.
o Creating one or more virtual MAC address.
o One first hop is respond ARP request (A.K.A. Active/AVG/Master).
o Use keepalives message in order to get Virtual gateway status.
o LAN devices use Virtual IP & MAC address as default gateway.
Description Commands
To configures Static NAT R(config)# ip nat inside source static ip
Enter interface mode R(config-if)# interface (interface no)
Define inside Interface Sub configuration R(config-if)# ip nat inside
Enter interface mode R(config-if)# interface (interface no)
Define outside Interface Sub configuration R(config-if)# ip nat outside
Creating named Access List R(config)#ip access-list standard client-list
Define which network will be translated
Dot1x Configuration
Description Commands
Enable AAA serveries SW(config)# aaa new-model
Creating username and password SW(config)# username admin password 123
configure the switch with the address SW(config)# radius-server host 19 auth-port 1812
and shared key of RADIUS server acct-port 1813 key 123
configuring AAA for RADIUS server for SW(config)# aaa authentication dot1x default
802.1X authentication requests group radius
Globally on dot1x security SW(config)# dot1x system-auth-control
Selecting interface f1/1 SW(config)# interface f1/1
Make switchport mode access SW(config-if)# switchport mode access
Normal 802.1X authentication SW(config-if)# dot1x port-control auto
Show command to check dot1x SW# show dot1x interface f1/1
DHCP Snooping:
DHCP snooping is a security feature that acts like a firewall between untrusted hosts and
trusted DHCP servers.
o Use trusted source to reply DHCP offer message.
o Rate-limits DHCP traffic from trusted and untrusted sources.
o If untrusted port exceeds the limit interface sent to err-disable.
o Keep DHCP snooping binding database, which is untrusted hosts with leased IP addresses.
o DHCP snooping binding database to validate subsequent requests from untrusted hosts.
o Can be enable to disabled DHCP snooping per VLAN basis.
o By default, the feature is inactive on all VLANs.
o DHCP snooping device insert DHCP option no 82 (gateway & other information).
Descriptions Commands
Enable DHCP snooping SW(config)#ip dhcp snooping
Enable DHCP snooping for vlan1 SW(config)#ip dhcp snooping vlan 1
Go to interface mode SW(config)#interface f0/1
Make interface trusted port SW(config-if)#ip dhcp snooping trust
Set Rate limit configuration SW(config-if)#ip dhcp snooping limit rate <1-2048>
Display DHCP snooping details SW# show ip dhcp snooping
Display DHCP snooping bindings SW# show ip dhcp snooping binding
DHCP snooping database agent SW# show ip dhcp snooping database
Display DHCP snooping statistics SW# show ip dhcp snooping statistics
Advantages of ACL:
Limits network traffic to increase network performance. ACLs provide traffic flow control by
restricting the delivery of routing updates. It can be used as additional security. Controls which
type of traffic are forwarded or blocked by the router. Ability to control which areas a client
access.
Standard Access-List:
Standard Access Control Lists can filter the IP traffic only based on the source IP address.
Standard ACLs should be placed as close as possible to the destination, to outbound interface of
traffic to be denied. Standard Access List can allow or deny the request only based on source
address. The standard IP access-list will only filter or match only on the source IP address
contained in the packet. Standard IP access lists use the numbers 1–99.
Description Commands
Creating IPV6 named ACL to permit R(config)#ipv6 access-list test
telnet traffic R(config-ipv6-acl)# permit tcp host 1000::2 host
2000::2 eq telnet
Apply IPV6 named ACL on interface R(config)#interface fastEthernet 0/0
R(config-if)#ipv6 traffic-filter test in
Display all access lists R# show access-lists
Display only the parameters for given R# show access-list name
Shows only the IP access lists R# show ipv6 access-lists
SNMP V3 Configuration
Description Commands
Configure SNMP server group name G1 to R1(config)# snmp-server group G1 v3 priv
enable authentication write v1
Add user U1 to an SNMP group G1 with R1(config)# snmp-server user U1 G1 v3 auth
authentication & Privacy Password sha AUTH_PASS priv aes 256 PRIV_PASS
Configure the SNMP Engine ID for remote R1(config)# snmp-server engineID remote
User 192.168.1.100
446172742E506F776572534E4D50
Add user U1 to Group G1 for Remote server R1(config)# snmp-server user U1 G1 remote
with Authentication and Privacy Password 192.168.1.100 v3 auth sha AUTH_PASS priv
aes 256 PRIV_PASS
Configure SNMP host to send traps R1(config)# snmp-server host 192.168.1.100
informs version 3 priv U1
Description Command
Delete the contents of Flash memory R1# erase flash
Erase the contents of the startup-config file R1# erase start
Delete the contents of NVRAM R1# erase nvram
Delete the contents of NVRAM R1# write erase
Compare the MD5 Hash R1#verify /md5 filesystem:name[MD5-hash]
Description Commands
Display all the Unique Device Identifier R# show license udi
Display package license info R# show version
Display detailed info of license R# show license
Lists the available licenses R# show license feature
Activate technology package R(config)# license boot module c2900
technology-package datak9
Deactivate technology package R(config)# no license boot module c2900
technology-package datak9
Timezone:
If you are managing large number of network infrastructure devices (Routers, Switches, Servers,
Computers etc), it is very important to know that device time is an important factor in network
security. Many authentication protocols will fail to work if you are different system time
configured in different devices in your network.
Description Commands
Display software clock details R1# show clock
Configure Timezone R1(config)# clock timezone CST -6
Configure the clock time and date Router# clock set 10:50:00 Oct 26 2016
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 100 of 107
FTP and TFTP:
FTP and TFTP are used to save and restore a router/switch configuration or to backup an IOS
image. FTP (File Transfer Protocol) uses Transport control protocol, which provides reliability
and flow control that can guarantee that the file will reach its destination while the connection
is established. TFTP (Trivial File Transfer Protocol) uses User Datagram Protocol which doesn’t
establish a connection and therefore cannot guarantee that files to get to their destinations.
FTP (File Transfer Protocol) uses usernames and passwords for setup. Therefore, routers or
switches are required to have a username and password setup for FTP.
FTP is faster when compared to TFTP. FTP uses two TCP ports: port 20 for sending data and port
21 for sending control commands. TFTP use UDP port 69 for communication.
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 101 of 107
Password Recovery:
Recover a Cisco Passwords such as Console Password, Enable Password, Enable secret, or
Telnet Password etc. Follow these steps.
Step 1: Restart / Power on the Router “R1”
Step 2: Press Ctrl + Break, (Ctrl+Shift+F6+C in Packet Tracer) When the router is booting IOS.
This key will interrupt the router boot process and prompt you ROM Monitor (ROMMON)
Mode.
Step 3: Change the Configuration Register key to 0x2142 using confreg 0x2142 command. The
key 0x2142 used to avoid coping configuration from NVRAM to RAM during next boot process.
Then restart the router using reset command.
Step 4: After router restarted you will prompt for Initial Configuration. Type no to avoid Initial
Configuration.
Step 5: Now the router with basic default configuration will be loaded. You can verify your
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 102 of 107
passwords by show startup-config in Privilege EXEC mode.
Step 6: Copy the Startup Configuration to RAM by using command copy start run.
Step 7: Now remove the password using Global Configuration commands. And change the
configuration register key back to 0x2102 (Default).
R1(config)#config-register 0x2102
Step 8: Now save the current configuration to NVRAM by copy running-config startup-config
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 103 of 107
command. And restart the router by reload command.
Configuration Register:
Configuration Register is a 16-bit hexadecimal number, which used to change router behavior in
several ways to boot the router into ROMMON, NetBoot, ignore configuration etc. By default,
the configuration register on a router is set to a value of 0×2102. 0x2142 boots from flash
without using start-up contents good for password recovery.
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 104 of 107
Cisco IOS Tools to Troubleshoot and Resolve Problems:
Ping and Traceroute Extended Option:
The ping (Packet Internet Groper) command is a very common method for troubleshooting the
accessibility of devices. The extended ping is used to perform a more advanced check of host
reachability and network connectivity. The extended ping command works only at the
privileged EXEC command line. To use extended feature, enter ping at the command line and
press enter. Also, can be in one line ping ip 1.1.1.1 data 0000 repeat 500 size 18000 verbose
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 105 of 107
The traceroute command can be used to discover the routes packets take to a remote
destination, as well as where routing breaks down. The extended traceroute command is a
variation of the traceroute command. An extended traceroute command can be used to see
what path packets are taking to get to a destination, and the command can be used to check
routing at the same time. This is helpful for troubleshooting routing loops, or for determining
where packets are getting lost.
Terminal Monitor:
By default, Cisco IOS does not send log messages to a terminal session. Console connections on
a serial cable have logging enabled by default while telnet or SSH connections don’t get log
messages. To get logging messages from IOS to appear on terminal use the “terminal monitor”
command. To stop logging to terminal use “terminal no monitor” command.
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 106 of 107
Local SPAN:
You can analyze network traffic passing through ports or VLANs by using SPAN (Switch Port
analyzer) to send a copy of the traffic to another port on the local switch that has been
connected to a network analyzer or other monitoring or security device.
o Analyze or monitor traffic for security and other purpose.
o Can be analyze interface(s) or VLAN(s) as source.
o As destination interface(s) or VLAN(s) can used.
o Traffic can be analyzing one or both direction.
o On destination ports Analyzer device can connect (IDS, host with packet sniffer software).
o When Source and destination ports on same switch or switch stack called Local SPAN
o Tagging or encapsulation not require.
Created by Ahmad Ali E-Mail: [email protected] ,Mobile: 0580906422 Page 107 of 107