Instructor & Todd Lammle

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Securing the Router Chris Cunningham.
To Infinity & Beyond If you use HSRP Modified from the instructor bridge materials and covered in “Scaling Networks” chapter 2 curriculum - by Mark Anderson.
Virtual LANs.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Implementing Inter-VLAN Routing
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Instructor & Todd Lammle
Implementing Layer 3 High Availability
Implementing a Highly Available Network
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—6-1 Implementing Layer 3 High Availability Configuring Layer 3 Redundancy with HSRP.
Understanding Layer 3 Redundancy. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Upon completing this lesson, you will be able.
Chapter 5 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public Understanding First Hop Redundancy Protocols.
Instructor & Todd Lammle
SNMP Simple Network Management Protocol
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Netflow Overview PacNOG 6 Nadi, Fiji. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation –Cisco.
Sybex CCNA Chapter 9: VLAN’s Instructor & Todd Lammle.
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing.
Instructor & Todd Lammle
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 4: Managing LAN Traffic
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Instructor & Todd Lammle
HSRP Redundancy & Failover:
Instructor & Todd Lammle
Part VI: Implementing High Availability
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Switching Topic 2 VLANs.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
S7C8 Hot Standby Router Protocol
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
+ IP Services Chapter 17 (Todd Lammle) Chapter 2 (CCNA3 Scaling Networks)
Gateway redundancy protocols
Introduction to Networks v6.0
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Instructor Materials Chapter 4: EtherChannel and HSRP
Instructor Materials Chapter 5: Network Security and Monitoring
Chapter 11 VLANs and Inter-VLAN Routing
Instructor & Todd Lammle
Instructor Materials Chapter 6: VLANs
Instructor Materials Chapter 5: Ethernet
Instructor & Todd Lammle
Introduction to Networking
NAT , Device Discovery Chapter 9 , chapter 10.
Lecture#10: LAN Redundancy
Instructor: Mr. Malik Zaib
Chapter 5: Network Security and Monitoring
Instructor & Todd Lammle
Routing and Switching Essentials v6.0
Chapter 8: Monitoring the Network
Chapter 4: EtherChannel and HSRP
Cisco networking CNET-448
Instructor: Mr. Malik Zaib
Chapter 4: EtherChannel and HSRP
Presentation transcript:

Instructor & Todd Lammle Sybex ICND2/CCNA R/S Chapter 17: IP Services Instructor & Todd Lammle

Chapter 17 Objectives The ICND2 Topics Covered in this chapter include: IP Services Recognize high availability (FHRP) VRRP HSRP GLBP Configure and verify Syslog Utilize Syslog Output Describe SNMP v2 & v3 Troubleshooting Utilize netflow data Monitor NetFlow statistics 2

Default gateway If you’re wondering how you can possibly configure a client to send data off its local link when its default gateway router has gone down, you’ve targeted a key issue because the answer is that usually, you can’t!

Proxy ARP If a Proxy ARP–enabled router receives an ARP request for an IP address that it knows isn’t on the same subnet as the requesting host, it will respond with an ARP reply packet to the host

FHRPs use a virtual router with a virtual IP address and virtual MAC address. First hop redundancy protocols (FHRPs) work by giving you a way to configure more than one physical router to appear as if they were only a single logical one.

HSRP HSRP is a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s router and multilayer switch models. It defines a standby group, and each standby group that you define includes the following routers: Active router Standby router Virtual router Any other routers that maybe attached to the subnet

HSRP active and standby routers The problem with HSRP is that with it, only one router is active and two or more routers just sit there in standby mode and won’t be used unless a failure occurs—not very cost effective or efficient! The standby group will always have at least two routers participating in it. The primary players in the group are the one active router and one standby router that communicate to each other using multicast Hello messages.

HSRP Virtual MAC The HSRP MAC address has only one variable piece in it. The first 24 bits still identify the vendor who manufactured the device (the organizationally unique identifier, or OUI). The next 16 bits in the address tells us that the MAC address is a well-known HSRP MAC Here is an example of what an HSRP MAC address would look like: 0000.0c07.ac0a The first 24 bits (0000.0c) are the vendor ID of the address; in the case of HSRP being a Cisco protocol, the ID is assigned to Cisco. The next 16 bits (07.ac) are the well-known HSRP ID. This part of the address was assigned by Cisco in the protocol, so it’s always easy to recognize that this address is for use with HSRP. The last 8 bits (0a) are the only variable bits and represent the HSRP group number that you assign. In this case, the group number is 10 and converted to hexadecimal when placed in the MAC address, where it becomes the 0a that you see.

VRRP VRRP is an IEEE standard (RFC 2338) for router redundancy; HSRP is a Cisco proprietary protocol. The virtual router that represents a group of routers is known as a VRRP group. The active router is referred to as the master virtual router. The master virtual router may have the same IP address as the virtual router group. Multiple routers can function as backup routers. VRRP is supported on Ethernet, Fast Ethernet, and Gigabit Ethernet interfaces as well as on Multi-protocol Label Switching (MPLS) virtual private networks (VPNs) and VLANs.

GLBP Cisco designed a proprietary load-balancing protocol, Gateway Load Balancing Protocol (GLBP), to allow automatic selection and simultaneous use of multiple available gateways as well as permit automatic failover between those gateways. GLBP takes an active/active approach on a per-subnet basis to support first-hop (default router) traffic when implemented with two routers on the same LAN. Multiple routers share the load of frames that, from a client perspective, are sent to a single default gateway address, as shown in the figure

GLBP Functions GLBP essentially provides clients with the following: An active virtual gateway (AVG) An active virtual forwarder (AVF) It also allows members of the group to communicate with each other through Hello messages sent every 3 seconds to the multicast address 224.0.0.102, User Datagram Protocol (UDP) port 3222. GLBP AVG Members of a GLBP group elect one gateway to be the AVG for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a different virtual MAC address to each member of the GLBP group. GLBP AVF Each gateway assumes responsibility for forwarding packets that are sent to the virtual MAC address assigned to that gateway by the AVG. These gateways are known as AVFs for their virtual MAC address.

Syslog Reading system messages from a switch’s or router’s internal buffer is the most popular and efficient method of seeing what’s going on with your network at a particular time. But the best way is to log messages to a syslog server, which stores messages from you and can even time-stamp and sequence them for you, and it’s easy to set up and configure!

Severity Levels Severity Level Explanation Emergency (severity 0) System is unusable. Alert (severity 1) Immediate action is needed. Critical (severity 2) Critical condition. Error (severity 3) Error condition. Warning (severity 4) Warning condition. Notification (severity 5) Normal but significant condition. Information (severity 6) Normal information message. Debugging (severity 7) Debugging message. Understand that only emergency-level messages will be displayed if you’ve configured severity level 0. But if, for example, you opt for level 4 instead, level 0 through 4 will be displayed, giving you emergency, alert, critical, error, and warning messages too.

Show logging Notice that the default trap (message from device to NMS) level is informational (level6), but you can change this too. Router#sh logging Syslog logging: enabled (11 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging: level debugging, 29 messages logged, xml disabled, filtering disabled Monitor logging: level debugging, 0 messages logged, xml disabled, Buffer logging: level debugging, 1 messages logged, xml disabled, Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled No active filter modules.   Trap logging: level informational, 33 message lines logged Log Buffer (4096 bytes): *Jun 21 23:09:37.822: %SYS-5-CONFIG_I: Configured from console by console Router#

SNMP SNMP is an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations (NMSs) The NMS periodically queries or polls the SNMP agent on a device to gather and analyze statistics via GET messages. End devices running SNMP agents would send an SNMP trap to the NMS if a problem occurs.

SNMP versions SNMP has three versions, with version 1 being rarely, if ever implemented today. Here’s a summary of these three versions: SNMPv1 Supports plaintext authentication with community strings and uses only by UDP. SNMPv2c Supports plaintext authentication (using community strings) with MD5 or SHA with no encryption but provides GET BULK, which is a way to gather many types of information at once and minimize the number of GET requests. It offers a more detailed error message reporting method, but it’s not more secure than v1. It uses UDP even though it can be configured to use TCP. SNMPv3 Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers. GET BULK is a supported feature of SNMPv3, and this version also uses TCP.

NetFlow Cisco IOS NetFlow efficiently provides a key set of services for IP applications, including network traffic accounting for baselining, usage-based network billing for consumers of network services, network design and planning, general network security, and DoS and DDoS monitoring capabilities as well as general network monitoring.

Service providers use NetFlow to do the following: Efficiently measuring who is using network service and for which purpose Accounting and charging back according to the resource utilizing level Using the measure information for more effective network planning so that resource allocation and deployment are well aligned with customer requirements Using the information to better structure and customize the set of available applications and services to meet user needs and customer service requirements

NetFlow Uses Major users of the network, meaning top talkers, top listeners, top protocols, and so on Websites that are routinely visited, plus what’s been downloaded Who’s generating the most traffic and using excessive bandwidth Descriptions of bandwidth needs for an application as well as your available bandwidth

Configuring NetFlow SF(config)#int fa0/0 SF(config-if)#ip flow ingress SF(config-if)#ip flow egress SF(config-if)#exit SF(config)#ip flow-export destination 172.16.20.254 9996 SF(config)#ip flow-export version ? 1 5 9 SF(config)#ip flow-export version 9 SF(config)#ip flow-export source loopback 0

Show ip cache flow SF#sh ip cache flow IP packet size distribution (161 total packets): [output cut] IP Flow Switching Cache, 278544 bytes 1 active, 4095 inactive, 1 added 215 ager polls, 0 flow alloc failures Active flows timeout in 30 minutes Inactive flows timeout in 15 seconds IP Sub Flow Cache, 21640 bytes 1 active, 1023 inactive, 1 added, 1 added to flow 0 alloc failures, 0 force free 1 chunk, 1 chunk added last clearing of statistics never Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec) -------- Flows /Sec /Flow /Pkt /Sec /Flow /Flow TCP-Telnet 14 0.0 19 58 0.1 6.5 11.7 TCP-WWW 8 0.0 9 108 0.1 2.5 1.7 SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts Fa0/0 172.16.10.1 gig0/1 255.255.255.255 11 0044 0050 1161

Written Labs and Review Questions Read through the Exam Essentials section together in class Open your books and go through all the written labs and the review questions. Review the answers in class. 22