Presentation is loading. Please wait.

Presentation is loading. Please wait.

CISCO ROUTERS. CISCO 60% 40% D-Link 3 Com Nortel Cygnus Etc.. Cisco’s Market Share

Similar presentations


Presentation on theme: "CISCO ROUTERS. CISCO 60% 40% D-Link 3 Com Nortel Cygnus Etc.. Cisco’s Market Share"— Presentation transcript:

1 CISCO ROUTERS

2 CISCO 60% 40% D-Link 3 Com Nortel Cygnus Etc.. Cisco’s Market Share WWW.KAASHIVINFOTECH.COM

3 Router is an internetworking component, that connects networks which are at different geographical locations. WWW.KAASHIVINFOTECH.COM

4 Serial 1 Serial 0 AUI E 0 Console V.35 modem modem Telephone PC AUX Diagram of 2501 series Router WWW.KAASHIVINFOTECH.COM

5 Interfaces on a Router WWW.KAASHIVINFOTECH.COM

6 1. Ethernet It is a LAN interface. Some of the models have an RJ45 port for 10baseT or 10/100. And some other have a 15 pin female connector AUI (Attachment Unit Interface). 2. Serial It is a 60 pin female WAN interface for leased line 3. BRI/PRI It is a RJ45 WAN interface for ISDN 4. Async It is a 37 pin female connector for dial ups. 5. Console It is a RJ45 Connector used to configure the Router for the first time. 6. Auxiliary RJ45 Connector for remote access administration. WWW.KAASHIVINFOTECH.COM

7 Routers Modular Fixed Modular Routers These type of routers have up gradable slots, and the number of ports can be increased just by adding cards in the slots. Fixed Routers These types of routers have fixed number of ports. WWW.KAASHIVINFOTECH.COM

8 Cisco Router’s Series Cisco 700, 800, 1600, 1700, 2500, 2600, 3600, 4000, 5000, 7000,10000, 12000. FixedModular 700, 800,….25002600,….., 12000 1750 & 1751 exceptionally are Modular Routers. WWW.KAASHIVINFOTECH.COM

9 Cisco’s Hierarchical Model WWW.KAASHIVINFOTECH.COM

10 Access Layer 700, …, 2500 Distribution Layer 2600, …, 5000 Core Layer 7000, …, 12000 WWW.KAASHIVINFOTECH.COM

11 Transceiver WWW.KAASHIVINFOTECH.COM

12 Internal Components of a Router WWW.KAASHIVINFOTECH.COM

13

14 Boot ROM : It stores the mini IOS (Internet work Operating System) image (RX Boot) with extremely limited capabilities and POST routines and core level OS for maintenance. FLASH : It is an EPROM chip that holds most of the IOS Image. It maintains everything when router is turned off. RAM : RAM holds running IOS configurations and provides caching. RAM is a volatile memory and looses its information when router is turned off. The configuration present in RAM is called Running configuration. NVRAM : It is a re-write able memory area that holds router’s configuration file. NVRAM retains the information when ever router is rebooted. Once configuration is saved, it will be saved in NVRAM and this configuration is called Startup Configuration. WWW.KAASHIVINFOTECH.COM

15 Configuration of a Router Router for the first time is configured through the CONSOLE port.COM port of a PC is connected to the console port of router with a console cable by using a transceiver. Router is accessible by a tool. In windows, it is called HYPER TEMINAL. As soon as the router is powered on and accessed, the following things happen, POST BOOT STRAP FLASH NVRAM Setup Mode ROM (mini IOS) If IOS is Corrupted WWW.KAASHIVINFOTECH.COM

16 In Setup mode, there will be a message, “Would You Like To Enter The Initial Configuration [Y/N]” : If “Y” then, initial configuration starts. If “N” would you like to terminate the auto installation? Press “RETURN” to get started……You will land on the default prompt of the Router “ ROUTER >”. Router>_ WWW.KAASHIVINFOTECH.COM

17 Working Modes Of a Router 1.User Mode (Default mode) 2.Privilege or Administrative Mode 3.Global Configuration Mode 4.Interface Configuration Mode 5.Line Configuration Mode 6.Router Mode 7.Sub-Interface Mode WWW.KAASHIVINFOTECH.COM

18 USER MODE Router> is the user mode, I,e the default prompt. It means that when ever a router boots successfully it lands into the user mode. Router cannot be configured from this mode, but it is used for just monitoring purpose. Router> en Router # WWW.KAASHIVINFOTECH.COM

19 PREVILEGE MODE Router# it is the administrating mode, we can check whether the settings and configurations made have been implemented or not. Eg. “Router # Sh int e0”. If it is new router all the interfaces are by default shut down, so the message will be, “ Ethernet 0 is administratively down, line protocol is down.” WWW.KAASHIVINFOTECH.COM

20 Router# Config t Router (Config)# Global Configuration Mode As the name indicates, it is a global configuration mode I,e. we can configure any interface from this mode, just by entering into the interface mode. WWW.KAASHIVINFOTECH.COM

21 The “Clock” Command The clock command is used to set the clock of Router. Syntax. Router# clock set hh:mm:ss Day of week Month Year E.g. Router#clock set 16:35:00 1 April 2003 Note* This is the only configuration which can be done from privilege mode,every other configuration should be done at global configuration mode only. WWW.KAASHIVINFOTECH.COM

22 Some of the important show commands in privilege mode Router# sh clock sh int (interface name eg e0) Sh history Sh memory Sh running-config Sh startup-config To save configuration from RAM TO NVRAM Router#Copy Running-config Startup-config (or) Router#Write Memory WWW.KAASHIVINFOTECH.COM

23  To configure Hostname (or) Identification of Router over the network. Router#conf t Router(config)#Hostname R_2503 Router(config)#^Z  To configure Logging banner. Router#conf t Router(config)#Banner Motd # Enter text message………….# Router(config)#^Z WWW.KAASHIVINFOTECH.COM

24 Router Password Configuration 1.Previlege Password 2.Virtual Terminal Password 3.Console Password 4.Auxillary Password WWW.KAASHIVINFOTECH.COM

25 Previlege PASSWORDS Enable PasswordEnable Secret Enable Password:- It is global command restricts access to the previlege mode, the password is in clear text. Router(config)#Enable password 123 Enable Secret:-Here the password is in encrypted form. Router(config)#Enable secret cisco WWW.KAASHIVINFOTECH.COM

26 Virtual Terminal Password  It establishes a login password on incoming Telnet sessions. Router#conf t Router(config)#Line vty 0 4 Router(config-line)#Login Router(config-line)#password cisco Router(config-line)#^Z WWW.KAASHIVINFOTECH.COM

27 Console Password  It establishes a login password on the console terminal. Router#conf t Router(config)#Line Console 0 Router(config-line)#Login Router(config-line)#Password cisco Router(config-line)#^Z WWW.KAASHIVINFOTECH.COM

28 Auxillary Password  It establishes a login password to remote administration. Router#conf t Router(config)#Line Aux 0 Router(config-line)#Login Router(config-line)#Password cisco Router(config-line)#^Z WWW.KAASHIVINFOTECH.COM

29 CONFIGURING INTERFACES  LAN interface (ETHERNET Port)  WAN interface (SERIAL Port) WWW.KAASHIVINFOTECH.COM

30 ETHERNET Router(config)#Interface Ethernet 0 Router(config-if)#Ip Address 200.150.1.254 255.255.255.0 Router(config-if)#no shutdown Router(config-if)#^Z Router#Show Int E0 WWW.KAASHIVINFOTECH.COM

31 SERIAL Router(config)#Interface Serial 0 Router(config-if)#Ip Address 150.10.1.1 255.255.0.0 Router(config)#clock rate 56000 Router(Config-if)# bandwidth 64 Router(config-if)#No shutdown Router(config-if)#^Z WWW.KAASHIVINFOTECH.COM

32 Interpretring The Interface Status Router# show int s0 Serial0 is up, line protocol is up. Is the messege if the interface is operational. Serial0 is up, line protocol is down….. This is if there is any connection problem. Serial0 is down, line protocol is down….. This is if there is any interface problem. Serial0 is administratively down, line protocol is down….. This is if the interface is disabled. WWW.KAASHIVINFOTECH.COM

33 The “CDP” It’s a Cisco's proprietary protocol called the Cisco Discovery Protocol, that gives you a summary of all the directly connected Cisco devices. CDP is a L2 protocol, that discovers neighbor regardless of which protocol suite they are running. When a cisco device boots up, the CDP is loaded by default, but can be disabled at interface level. * The CDP is limited to the immediate neighbors only… The summary includes Device Identifier(eg. Switch configured name or domain name), Port Identifier (eg. Ethernet 0 and serial 0.), Capabilities list (eg. The device can act as a sourcr route bridge as well as a router), Platform (eg. Cisco 2600). WWW.KAASHIVINFOTECH.COM

34 CDP (Cisco’s Discovery Protocol) WWW.KAASHIVINFOTECH.COM

35

36 Using CDP Router# sh cdp neighbor (shows neighboring devices) To disable CDP…., Router(config)#no cdp run Router(config)#int s0 Router(config-if)#no cdp enable Router# sh cdp entry 192.168.10.1 (shows detailed information about this perticular neighbor.) Router# sh cdp interface(shows the details of the interface of the local decive.) Router# sh cdp traffic (shows the packet sent, received, lost etc.) WWW.KAASHIVINFOTECH.COM

37 Backup & Restoring Routers IOS Image Using TFTP (Trivial File Transfer Protocol) TFTP Server allows you to take backup, upload and save your IOS Image and current configuration on it. TFTP is a software program of 1.3Mb. This should be installed on that TFTP server i.e., (Personnel Computer). C:\Program files\cisco systems\cisco TFTP * Note: Always while taking Backup or Restoration TFTP software should execute on that particular computer. WWW.KAASHIVINFOTECH.COM

38 Backup Sources : 1.Through Telnet Session. 2.Through Console Session. 3.Through Auxillary Port (Remote Session) WWW.KAASHIVINFOTECH.COM

39 Backup of IOS Image Router#Copy Flash:(Press Tab key) Tftp Address or name of the remote host [ ]? (Ip address of tftp) Destination file name [ ] ? (Press enter key or a name) Backup of Configuration Router#Copy Startup-config Tftp Address or name of the remote host [ ]? (Ip address of tftp) Destination file name [ ] ? (Give a name) WWW.KAASHIVINFOTECH.COM

40 Upgrading IOS Image Note: This process can only be done by Console Session. Router#Copy tftp Flash: Address or name of remote host []? Source file name []? Destination file name []? Erase Flash: before copying [confirm]? Erasing the Flash file system will remove all files: continue? [confirm] Erasing device eeeeeeee……….eeeeeee.eee.eeee.ee Loading!!!!!!!!!!!!!!!!!!!!!!!!!!!!!…….!!!!…….!!!!!! WWW.KAASHIVINFOTECH.COM

41 Leased line WAN Setup Case 1: The distance between the locations is greater than 5 Km. Requirements A pair of Routers, Leased line, pair of leased line modems V.35, Pair of G.703 Modem. Case 2: The distance between the two locations is less than 5Km. Requirements A pair of Routers, Leased line and pair of leased line modem. WWW.KAASHIVINFOTECH.COM

42 Internal Network V.35 Cable Csu/ Dsu Switch/hub V.35 modem Csu – channel service unit Dsu – data service unit S0 – Serial port of router E0 – Ethernet port of a router G.703 Mux/ Dmux Mux/ Dmux S0 E0 S0 E0 Switch/hub Router V.35 modem Leased line Setup( > 5km) Leased line WWW.KAASHIVINFOTECH.COM

43 Leased line Setup (< 5 km) Internal Network V.35 CableCsu/ Dsu Switch/hub V.35 modem S0 E0 S0 E0 Switch/hub Router V.35 modem Leased line Telephone Exchange WWW.KAASHIVINFOTECH.COM

44 Routing Routing is of three types. Static Dynamic and Default When the destination is known, static and dynamic routing is done. For unknown destinations, default routing is employed. In dynamic routing, the path is fixed by the protocol. The paths will be changing depending on the length of the path. Always the shortest path is preferred. Static routing is done by the users. These paths are stored in the routing table. WWW.KAASHIVINFOTECH.COM

45 Example: Switch/hub E 0 S 0 192.168.1.0/24192.168.2.0/24 192.168.1.150/24 192.168.2.150/24 10.0.0.1/8 10.0.0.2/8 Location ALocation B WWW.KAASHIVINFOTECH.COM

46 Router(config)# ip routing Router# sh ip route (it shows all the directly connected networks). “ C 192.168.1.0/24 directly connected to E0” “ C 10.0.0.0/8“ ‘ ‘ ‘ S0” “ C “ indicates connected networks. Static Routing Syntax Router(config)# ip route (dest-network) (subnet mask) (next hop address) WWW.KAASHIVINFOTECH.COM

47 Location A Router(config)# ip routing Router(config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2 Note* if we don’t know the address of next hop, we can just write the name of the hop. Router(config)# ip route 192.168.2.0 255.255.255.0 S0 Location B Router(config)# ip routing Router(config)# ip route 192.168.1.0 255.255.255.0 10.0.0.1 WWW.KAASHIVINFOTECH.COM

48 Router# sh ip route C 192.168.1.0/24 directly connected to E0 C 10.0.0.0/8“‘““ S0 S 192.168.2.0/24 [1/0] via 10.0.0.2 “S” represents static. [a/b] ~ [1/0], here a=1 is the administrative distance value and b has no significance in static routing. For static and default routing b can be 0 or 1. lesser the administrative distance value, higher the preference. WWW.KAASHIVINFOTECH.COM

49 “Tracert”, “Trace Route” and “Route print”. C:\> tracert C:\> route print Router# trace route (gives the complete route) Router# sh arp (to check MAC addresses) Default Routing Router(config)# ip routing Router(config)#ip route DA (S/N mask next) (next hop address) Router(config)# ip route 0.0.0.0 0.0.0.0 s1 WWW.KAASHIVINFOTECH.COM

50 Router# sh ip route C 192.168.1.0/24 directly connected to E0 C 10.0.0.0/8 “ “ to S0 S* 0.0.0.0/0 “ “ to S0 Dynamic Routing It is a type of routing where routing protocols( eg. RIP and IGRP) are used between routers to determine the path and maintain routing table. Once the path is determined a router can route a routed protocol(IP). Dynamic routing uses broad casts and multicasts to communicate with other routers. The routing metric helps routers find the best path to each network. WWW.KAASHIVINFOTECH.COM

51 Classification Of Routing Protocols  Distance Vector  Hybrid Routing  Link State Distance Vector: the distance vector approach determines the direction and the distance to any link in the internetwork. When the topology in a distance vector routing protocol changes, routing table updates in the router must occur. This update process proceeds step-by-step router to router. Eg. RIP and IGRP. Link State : it recreates the exact topology of the entire network(atleast the partion of the network where the router is situated). Eg. OSPF. WWW.KAASHIVINFOTECH.COM

52 Functions of a distance vector routing protocol.  Identification of source of information  Discovering routes  Select the best route  Maintain Route information Hybrid Routing : it combines aspects of the link state and the distance vector algorithm. WWW.KAASHIVINFOTECH.COM

53 Note: Maximum 6 paths (Default 4). “Hop count metric” selects the path Route updates are broadcast for every 30 seconds. Router(config)# router rip Router(config-router)# network (network ip) Enabling RIP Configuration Router# sh ip protocol (shows the current routing protocol) Router# sh ip route WWW.KAASHIVINFOTECH.COM

54 172.16.1.0 E0S2 S3 E0 192.168.1.0 172.16.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 192.168.1.1 Router rip Network 172.16.0.0 Network 10.0.0.0 Router rip Network 10.0.0.0 Router rip Network 192.168.1.0 Network 10.0.0.0 WWW.KAASHIVINFOTECH.COM

55 Autonomous Systems An autonomous system is a collection of networks under a common administrative domain. IGPs operate within an autonomous system where as EGP connects different autonomous systems. Every autonomous system has a distinct number.The Internet Assigned Numbers Authority (IANA) is responsible for allocating this number. Eg. Autonomous system 100. We can use any number unless the organization plans for an EGP. WWW.KAASHIVINFOTECH.COM

56 Configuring IGRP Syntaxes. Router(config)#router igrp autonomous number This defines IGRP as the routing protocol. Router(config-router)#Network network-ip Selects directly connected networks. Router(config-router)#variance multiplier Configures unequal-cost load balancing by defining difference between the best metric and the worst acceptable metric. Router(config-router)#traffic-share (balanced/ min) WWW.KAASHIVINFOTECH.COM

57 Autonomous System 100 172.16.1.0 E0S2 S3 E0 192.168.1.0 172.16.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 192.168.1.1 Router igrp 100 Network 172.16.0.0 Network 10.0.0.0 Router igrp 100 Network 10.0.0.0 Router igrp 100 Network 192.168.1.0 Network 10.0.0.0 WWW.KAASHIVINFOTECH.COM

58 IP Classless Command Router(config)# ip classless A router by default assumes that all the subnets of a directly connected network should be present in the routing table. If a packet is received with a destination address, of an unknown subnet of directly attached network, the router assumes that the subnet does not exists and drops the packet. This happens even if routing table has a default route.For the above condition if IP Classless is configured, and if any packet is received, then the router will match it to the default route and forword it to the next hop specified by the default route. WWW.KAASHIVINFOTECH.COM

59 Calculation of Wildcard Mask WCM = BCM-SNM 1.192.168.1.0/24 255.255.255.255 - 255.255.255. 0 0. 0. 0.255 2. 192.168.1.0/27 255.255.255.255 - 255.255.255.224 0. 0. 0. 31 3. 192.160.1.10 0.0.0.0 WWW.KAASHIVINFOTECH.COM

60 OSPF OSPF(Open Short Path First) is of two types : 1) Single Area OSPF and 2) Multi Area OSPF. Internal Routers Area1 Area2 Area Border Router IR ABR Area0 S 0 WWW.KAASHIVINFOTECH.COM

61 Router A Router B S 0 192.168.1.194/252 192.168.1.193/252 S 0 E 0 1.65 192.168.1.32/ 255.255.255.224 192.168.1.64/ 255.255.255.224 E 0 1.33 OSPF under Single Area WWW.KAASHIVINFOTECH.COM

62 (Config)# ip routing (Config-Router)# router OSPF 6573 (Config-Router)# network 192.168.1.32 0.0.0.31 area 1 (Config-Router)# area 1 range 192.168.1.32 255.255.255.224 (Config-Router)# network 192.168.1.192 0.0.0.3 area 1 (Config-Router)# area 1 range 192.168.1.192 255.255.255.224 WWW.KAASHIVINFOTECH.COM

63 (Config)# ip routing (Config-Router)# router OSPF 6573 (Config-Router)# network 192.168.1.32 0.0.0.31 area 1 (Config-Router)# area 1 range 192.168.1.64 255.255.255.224 (Config-Router)# network 192.168.1.195 0.0.0.3 area 1 (Config-Router)# area 1 range 192.168.1.195 255.255.255.252 Configuration of Router B -------------------------------- WWW.KAASHIVINFOTECH.COM

64 OSPF under Different Areas Area 0 192.168.1.0 192.168.5.0 Area 1 Area 2 E0 5.50 Router ARouter B 1.50 WWW.KAASHIVINFOTECH.COM

65 (Config)# ip routing (Config-Router)# router OSPF 6573 (Config-Router)# network 192.168.1.0 0.0.0.255 area 1 (Config-Router)# area 1 range 192.168.1.0 255.255.255.0 (Config-Router)# network 172.16.0.0 0.0.255.255 area 0 (Config-Router)# area 0 range 172.16.0.0 255.255.0.0 Configuration of Router A -------------------------------- WWW.KAASHIVINFOTECH.COM

66 Configuration of Router B -------------------------------- (Config)# ip routing (Config-Router)# router OSPF 6573 (Config-Router)# network 192.168.5.0 0.0.0.255 area 2 (Config-Router)# area 2 range 192.168.5.0 255.255.255.0 (Config-Router)# network 172.16.0.0 0.0.255.255 area 0 (Config-Router)# area 0 range 172.16.0.0 255.255.0.0 WWW.KAASHIVINFOTECH.COM

67 Access Control List It is also called Network Traffic Control Management (NTCM). We can provide restrictions to individual users, subnets and services etc. ACL Standard ACL Extended ACL Any access list is identified by its number. S. A. L 1 – 99 Ex. A. L 100 - 199 WWW.KAASHIVINFOTECH.COM

68 Rules for creating and implementing Access List 1.Access list must begin with the Deny Statements (If exists) then Permit Statements must follow. 2.There must be at least one Permit Statement as an Implicit “Deny All” always exists. 3.While Implementation of Access list, There must be only one Access list per Interface, per direction and per protocol. WWW.KAASHIVINFOTECH.COM

69 Standard Access List Router A Router B S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Syntax Router(config)# Access-list ALNO P/D Src Src-WCM Router(config)# Int Router(Config-if)#Ip Access-Group WWW.KAASHIVINFOTECH.COM

70 Configuration Standard Access-list For Router A Restricting particular user (Config)# Access-list 1 deny 192.168.1.3 0.0.0.0 (Config)# Access-list 1 permit 0.0.0.0 255.255.255.255 or Access-list 1 permit any Restricting a Network (Config)# Access-list 1 deny 192.168.3.0 0.0.0.255 (Config)# Access-list 1 permit any WWW.KAASHIVINFOTECH.COM

71 Configuration Standard Access-list For Router A Restricting particular user (Config)# Access-list 1 deny 192.168.1.3 0.0.0.0 (Config)# Access-list 1 permit 0.0.0.0 255.255.255.255 or Access-list 1 permit any Restricting a Network (Config)# Access-list 1 deny 192.168.3.0 0.0.0.255 (Config)# Access-list 1 permit any WWW.KAASHIVINFOTECH.COM

72 Extended Access List Router A Router B S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 1.20 WWW.KAASHIVINFOTECH.COM

73 Configuration of Router A (Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP (Config)# Access-list 101 permit IP any any Implementation (Config)#int E0 (config-if)# IP Access-group 101 Out WWW.KAASHIVINFOTECH.COM

74 Configuration of Router A (Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP (Config)# Access-list 101 permit IP any any Implementation (Config)#int E0 (config-if)# IP Access-group 101 Out WWW.KAASHIVINFOTECH.COM

75 Configuration of Router A (Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP (Config)# Access-list 101 permit IP any any Implementation (Config)#int E0 (config-if)# IP Access-group 101 Out WWW.KAASHIVINFOTECH.COM

76 Configuration of Router A (Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP (Config)# Access-list 101 permit IP any any Implementation (Config)#int E0 (config-if)# IP Access-group 101 Out WWW.KAASHIVINFOTECH.COM

77 Configuration of Router A (Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP (Config)# Access-list 101 permit IP any any Implementation (Config)#int E0 (config-if)# IP Access-group 101 Out WWW.KAASHIVINFOTECH.COM

78 Configuration of Router A (Config)# Access-list 101 deny TCP 192.168.5.0 0.0.0.255 192.168.1.20 0.0.0.0 eq FTP (Config)# Access-list 101 permit IP any any Implementation (Config)#int E0 (config-if)# IP Access-group 101 Out WWW.KAASHIVINFOTECH.COM

79 NAT(Network Address Translation) Router A Router B S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 192.168.1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Note : 192.168.1.3 is denied from entering the network of 5.0.So it will enter with mask. WWW.KAASHIVINFOTECH.COM

80 Configuration of Router A -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.1.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config-if)# clock rate 56000 (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2 (Config)# int E 0 (Config-if)# ip nat inside WWW.KAASHIVINFOTECH.COM

81 (Config)# int S 0 (Config-if)# ip nat outside (Config)# access-list 1 permit 192.168.1.3 0.0.0.0 (Config)# ip nat inside source list 1 int S 0 overload # Config t (Config)# int E 0 (Config-if)# ip address 192.168.5.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.2 255.255.0.0 (Config-if)# clock rate 56000 (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit Configuration of Router B -------------------------------- WWW.KAASHIVINFOTECH.COM

82 (Config)# ip routing (Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1 (Config)# access-list 10 deny 192.168.1.3 0.0.0.0 (Config)# access-list 10 permit any (Config)# int E 0 (Config-if)# ip access-group 10 out Note : Only Public IP can go to the Internetworking world. WWW.KAASHIVINFOTECH.COM

83 A Scenario of providing Net access to the IP's of Router B Natting Router A Router B Switch Routing Leased line Routing 5.0 5.501.50 172.16.1.1172.16.1.2 192.168.1.99 WWW.KAASHIVINFOTECH.COM

84 Configuration of Router A -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.1.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config-if)# clock rate 56000(for DCE) (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 0.0.0.0 0.0.0.0 192.168.1.99 WWW.KAASHIVINFOTECH.COM

85 (Config)# int S 0 (Config-if)# ip nat inside ((Config-if)# exit (Config)# access-list 10 permit 172.16.0.0 0.0.255.255 (Config)# ip nat inside source list 10 int E 0 overload (Config)# int E 0 (Config-if)# ip nat outside (Config-if)# no shut (Config-if)# exit Configuration of Router B -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.5.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit WWW.KAASHIVINFOTECH.COM

86 (Config)# int S 0 (Config-if)# ip address 172.16.1.2 255.255.0.0 (Config-if)# clock rate 56000 (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# int E 0 (Config-if)# ip nat inside (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip nat outside (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 0.0.0.0 0.0.0.0 172.16.1.1 (Config)# access-list 10 permit 192.168.5.0 0.0.0.255 (Config)# ip nat inside source list 10 int E 0 overload WWW.KAASHIVINFOTECH.COM

87 PPP(Point-to-Point) using PAP protocol Router A (ISDN) Router B (Zoom) S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Internet based leased line NOTE : Passwords of both should be same. WWW.KAASHIVINFOTECH.COM

88 Configuration of Router A -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.1.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config-if)# clock rate 56000(for DCE) (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2 (Config)# int S 0 (Config-if)# encapsulation ppp (Config-if)# ppp authentication PAP (Config-if)# ppp PAP sent-username zoom password cisco WWW.KAASHIVINFOTECH.COM

89 Configuration of Router B -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.5.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.2 255.255.0.0 (Config-if)# clock rate 56000(for DCE) (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1 (Config)# int S 0 (Config-if)# encapsulation ppp (Config-if)# ppp authentication PAP (Config-if)# ppp PAP sent-username ISP password cisco WWW.KAASHIVINFOTECH.COM

90 PPP(Point-to-Point) using CHAP protocol Router A (ISDN) Router B (Zoom) S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Internet based leased line NOTE : Passwords of both should be same. WWW.KAASHIVINFOTECH.COM

91 Configuration of Router A -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.1.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config-if)# clock rate 56000(for DCE) (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 192.168.5.0 255.255.255.0 172.16.1.2 (Config)# int S 0 (Config-if)# encapsulation ppp (Config-if)# ppp authentication CHAP (Config-if)# ppp CHAP hostname zoom (Config-if)# ppp CHAP password cisco WWW.KAASHIVINFOTECH.COM

92 Configuration of Router B -------------------------------- # Config t (Config)# int E 0 (Config-if)# ip address 192.168.5.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.2 255.255.0.0 (Config-if)# clock rate 56000(for DCE) (Config-if)# bandwidth 64 (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config-Router)# ip route 192.168.1.0 255.255.255.0 172.16.1.1 (Config)# int S 0 (Config-if)# encapsulation ppp (Config-if)# ppp authentication CHAP (Config-if)# ppp CHAP hostname ISP (Config-if)# ppp CHAP password cisco WWW.KAASHIVINFOTECH.COM

93 DDR(Dial on Demand Routing) Router A Router B S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 ISP WWW.KAASHIVINFOTECH.COM

94 # Config t (Config)# isdn switch-type basic-net 3 (Config)# int E 0/1 (Config-if)# ip address 192.168.1.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int Bri 1/0 (Config-if)# no ip address (Config-if)# encapsulation ppp (Config-if)# no cdp enable (Config-if)# no shut (Config-if)# exit (Config)# int dialer 1 (Config-if)# ip address negotiated (Config-if)# encapsulation ppp (Config-if)# no cdp enable (Config-if)# ppp authentication CHAP PAP callin (Config-if)# ppp CHAP hostname unicomin@hd2 (Config-if)# ppp CHAP password password WWW.KAASHIVINFOTECH.COM

95 (Config-if)# ppp PAP sent-username unicomin@hd2 password password (Config-if)# dialer in-band (Config-if)# dialer string 3328400 (Config-if)# dialer idle-time out 180 (Config-if)# dialer hold-queue 10 (Config-if)# exit (Config)# access-list 1 permit 192.168.1.0 0.0.0.255 (Config)# dialer-list 1 protocol ip permit ((Config)# int bri 1/0 (Config-if)# dialer rotary-group 1 (Config-if)# no shut (Config-if)# exit (Config)# int dialer 1 (Config-if)# dialer-group 1 (Config-if)# exit (Config)# ip routing (Config-router)# ip route 0.0.0.0 0.0.0.0 dialer 1 2 WWW.KAASHIVINFOTECH.COM

96 (Config)# ip name-server 202.54.30.2 (Config)# ip name-server 202.54.2.30 (Config)# int E 0 (Config-if)# ip nat inside (Config-if)# no shut (Config-if)# exit (Config)# int Bri 1/0 (Config-if)# ip nat outside (Config-if)# no shut (Config-if)# exit (Config)# int dialer 1 (Config-if)# ip nat outside (Config-if)# exit (Config)# ip nat inside source list 1 int dialer 1 overload WWW.KAASHIVINFOTECH.COM

97 Backup Interface for a Leased Line S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 ISP CPE -Customer Premises Equipment DTE -Data Communications & Circutary end CPE/DTE Bri 0 WWW.KAASHIVINFOTECH.COM

98 # Config t (Config)# isdn switch-type basic-net 3 (Config)# int E 0/1 (Config-if)# ip address 192.168.1.50 255.255.255.0 (Config-if)# no shut (Config-if)# exit (Config)# int S 0 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config)# int Bri 1/ 0 (Config-if)# no ip address (Config-if)# encapsulation ppp (Config-if)# no cdp enable (Config-if)# no shut (Config-if)# exit WWW.KAASHIVINFOTECH.COM

99 (Config)# int dialer 1 (Config-if)# ip address negotiated (Config-if)# encapsulation ppp (Config-if)# no cdp enable (Config-if)# ppp authentication CHAP PAP callin (Config-if)# ppp CHAP hostname zoom (Config-if)# ppp CHAP password cisco (Config-if)# ppp PAP sent-username isp password cisco (Config-if)# dialer in-band (Config-if)# dialer string 3328400 (Config-if)# dialer ideal-time out 180 (Config-if)# dialer hold-queue 10 (Config-if)# exit (Config)# access-list 1 permit 192.168.1.0 0.0.0.255 (Config)# dialer-list 1 protocol ip permit ((Config)# int bri 1/ 0 (Config-if)# dialer rotary-group 1 (Config-if)# no shut (Config-if)# exit WWW.KAASHIVINFOTECH.COM

100 (Config)# int dialer 1 (Config-if)# dialer-group 1 (Config-if)# exit (Config)# ip routing (Config-router)# ip route 0.0.0.0 0.0.0.0 S 0 (Config-router)# ip route 0.0.0.0 0.0.0.0 dialer 1 2 (Config)# ip name-server 202.54.30.1 (Config)# ip name-server 202.54.1.30 (Config)# int E 0 (Config-if)# ip nat inside (Config-if)# no shut (Config-if)# exit (Config)# int Bri 1/ 0 (Config-if)# ip nat outside (Config-if)# no shut (Config-if)# exit WWW.KAASHIVINFOTECH.COM

101 (Config)# int dialer 1 (Config-if)# ip nat outside (Config-if)# exit (Config)# Access-list 2 permit 4 public 10 (Config)# ip nat inside source list 2 int dialer 1 overload (Config)# int S 0 (Config-if)# backup interface bri 1/0 (Config-if)# backup delay 30 60 WWW.KAASHIVINFOTECH.COM

102 Frame Relay Point - to - Point frame-relay Network Router A S 0 172.16.1.1 172.16.1.2 S 0 E 0 5.50 1.1 1.2 1.3 1.4 5.1 5.2 5.4 5.3 E 0 1.50 Dlci 101 Dlci 102 Router B Fr-Switch PVC WWW.KAASHIVINFOTECH.COM

103 Config t (Config)# int S 0 (Config-if)# no ip address (Config-if)# encapsulation frame-relay (Config-if)# no shut (Config-if)# exit (Config)# int S 0.1 point-to-point (Config-if)# bandwidth 64 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config-if)# frame-relay interface DLC1 102 (or) (Config-if)# frame-relay map ip 172.16.1.2 102 broadcast (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config)# ip route 192.168.5.0 255.255.255.0 172.16.1.2 WWW.KAASHIVINFOTECH.COM

104 Point - to - Multi Point 10.0.0.4 101 102 A B C D 103 104 10.0.0.3 10.0.0.2 10.0.0.1 4.0 2.0 3.01.0 WWW.KAASHIVINFOTECH.COM

105 Config t (Config)# int S 0 (Config-if)# no ip address (Config-if)# encapsulation frame-relay (Config-if)# no shut (Config-if)# exit (Config)# int S 0.1 multipoint (Config-if)# bandwidth 64 (Config-if)# ip address 10.0.0.4 255.0.0.0 (Config-if)# frame-relay map ip 10.0.0.1 103 broadcast (Config-if)# frame-relay map ip 10.0.0.2 102 broadcast (Config-if)# frame-relay map ip 10.0.0.3 101 broadcast (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config)# ip route 192.168.2.0 255.255.255.0 10.0.0.3 (Config)# ip route 192.168.4.0 255.255.255.0 10.0.0.1 (Config)# ip route 192.168.5.0 255.255.255.0 10.0.0.2 Configuration of Router A -------------------------------- WWW.KAASHIVINFOTECH.COM

106 Point-to-Point - Point-to-Point 4.0 2.0 3.01.0 10.0.0.1 10.0.0.3 10.0.0.2 172.16.1.2 172.16.1.1 161.16.1.1 101 102 103 104 WWW.KAASHIVINFOTECH.COM

107 Config t (Config)# int S 0 (Config-if)# no ip address (Config-if)# encapsulation frame-relay (Config-if)# no shut (Config-if)# exit (Config)# int S 0.1 point-to-point (Config-if)# bandwidth 64 (Config-if)# clockrate 56000 (Config-if)# ip address 172.16.1.1 255.255.0.0 (Config-if)# frame-relay map ip 172.16.1.2 103 broadcast (Config-if)# no shut (Config-if)# exit Configuration of Router A -------------------------------- WWW.KAASHIVINFOTECH.COM

108 (Config)# int S 0.2 point-to-point (Config-if)# ip address 161.16.1.1 255.255.0.0 (Config-if)# no shut (Config-if)# bandwidth 64 (Config-if)# clock rate 56000 (Config-if)# frame-relay map ip 161.16.1.2 102 broadcast (Config-if)# exit (Config)# int S 0.3 point-to-point (Config-if)# bandwidth 64 (Config-if)# clockrate 56000 (Config-if)# ip address 10.0.0.1 255.0.0.0 (Config-if)# frame-relay map ip 10.0.0.2 101 broadcast (Config-if)# no shut (Config-if)# exit (Config)# ip routing (Config)# ip route 172.16.0.0 255.255.0.0 WWW.KAASHIVINFOTECH.COM

109 Iso International organization for standardization Iso has designed a reference model called osi reference model (open system interconnection). It has 7 layers. It says that Any n/w for comunication needs 7 layers 1.Application layer The user uses application layer to send the data. The protocols @ this layer are ftp,http,smtp(e-mail) telenet etc. 2.Presentation layer Presentation layer takes the data from application layer and present In different formats for securing reason. The services offered @ This layer are Compression – decompression Coding – decoding Encryption - decryption WWW.KAASHIVINFOTECH.COM

110 3. Session layer Establishing the session or the conectivity n/w n/w 1 & n/w 2 is done By the session layer. It1. Establishes a session 2. maintains it & 3. Terminates it b/w the application 4. Transport layer End-end connectivity during a session b/w two application is done By the transport layer. It also decides the type of connection like tcp or udp i.e. connection oriented or connection less. Services: Sequencing Flow ctrl, error detection & correction Transport layer info + data is called segment. WWW.KAASHIVINFOTECH.COM

111 5. Netwrok layer Logical addressing is done at thenetwork layer i.e. source address & destination address are attached to the data. Protocols @network layer Routed protocols routing protocols Eg: ip,ipx eg: rip,igrp,ospf Routed protocols: they always carry the data along with them Routing protocol: they identify the path for routed protocol to carry the data At this layer routers & layer 3 switches forms packets. WWW.KAASHIVINFOTECH.COM

112 Data link layer MACLLC Media access control logical link control framing of data Ip address is lik the pincode & MAC address is like house number. Here layer2 switches are used. Wab protocols used at this layer are PPP,HDLC,FP,X.25 etc. Here error checking CRC bits are added to the packets DLL info+ packets --> frames WWW.KAASHIVINFOTECH.COM

113 7 physical layer Takes care of physical connectivity i.e connector,cable etc. here Frames are converted to bits (1’s & 0’s). The devices like hubs, repeaters,cables & connectors are used at this layer. I P Addressing Now a days ip ver4 is followed. It is a 32-bit addressing scheme. 32bits are divided into 4 octets of 8 bits each. i.e 8-8-8-8. i.e (1’s & 0’s)-(1’s & 0s)-(1’s & 0’s)-(1’s & 0’s). (binary format). The ip address is maximum of 255 & min of 0. In future ip ver 6 is expected. It is 128 bit scheme. Ip adresses are clsassified into different classes. WWW.KAASHIVINFOTECH.COM

114 Class A0-127 Class B128-191 Class C192-223 Class D224-239 Class E240-255 8-8-8-8 M.S.O Most Significant Ocate considering MSO WWW.KAASHIVINFOTECH.COM

115 Through out class A, the MSB ‘0’ is constant in class B the Msbs are ‘101’ constant through out. Class D & E are not used for internetworking class D is used for Multicast network. “ E “ “ “ research. class A 0-0-0-0 should not be assigned for any divice 127-0-0-0 is reserved for loopback 127-0-0-1 127-0-0-” 127-0-0-”usually reserved for loopback 127-0-0-” 127-255-255-254 WWW.KAASHIVINFOTECH.COM

116 Hence 0 & 127 cannot be used for adressing so actual range will be 1 to 126. All ip addresses are divided into two. 1.network I.d 2.host I.d in class a address there is 1n\w I.d postion & 3 host I.d postion I,e N-H-H-H.. Class A N-H-H-H Class B N-N-H-H Class CN-N-N-H Network Ids are represented by 1s & host ids are by 0s. WWW.KAASHIVINFOTECH.COM

117 Types of ip adresses IP address public ip address private ip address Public network: the public address is defined with routing over the Internet it is given by I.S.P & routing table is created on the internet. Private network: for internal network I,e intranet, all the ip addresses Are governed by a body called INTERNIC. If we are a part of asia Pacefic then it is governed by APNIC. We can run our private network with any ip addresses of our choice But it should not be connected to internet. WWW.KAASHIVINFOTECH.COM

118 Range of addresses for private network ClassA10.0.0.0to10.255.255.255 ClassB172.16.0.0to172.31.255.255 ClassC192.168.0.0to192.168.255.255 Private ip addresses donot have routing. To meet the demand of no.of networks, the network is broken Into smaller networks called subnets. Eg: find no.of subnets, hosts/s.n subnet mask & valid ip addresses For a class c address. 192.168.1.0/24 ‘24’ shows the network bits 24= 3 octate position bits are enough, therefore no need to borrow Any bits from host position. =24 network & no host Default subet mask is 255.255.255.0 & valid ip addresses are 192.168.1.0 network WWW.KAASHIVINFOTECH.COM

119 Switch An essential component of lan. Switches are of different types like Layer 2 layer 3, layer 4, layer 5….. Layer 2 switch : Switch hub Layer 2layer 1 b.w is equal @ all portsb.w is shared Identifies source with MACcannot identifiy the source Broad cast occur, till mac tablealwaysbroad cast Is built Collision occur when both A&B Many collisions Wants to reach D. 1 broad cast domain 4 collision1 broad cast domain 1 collision Domainsdomain WWW.KAASHIVINFOTECH.COM

120 Switches Access layerDistribution layerCore layer Access layer swithc: catalyst 1912 Catalyst – manufacturer, but it is now owned by cisco. 12 port switch WWW.KAASHIVINFOTECH.COM

121 Switch standard editionenterprise edition To configure VLANS,go for enterprose edition as standard edition Will not support VLAN. For uplinking or cascading 100mbps is minimum required. Functions of switch 1.Adress learning 2.Filter & forwarding 3.Loop avoidance 1.Address learning Booting1.blocking state (15 secs) 2.Listening state (15 secs) 3.Learning stage (20 secs) 4.Forwarding stage (20 secs) WWW.KAASHIVINFOTECH.COM

122 The switch will always learn the MAC address from the source itself The source should atleast communicate once to learn the MAC address. 2. Filter & forwarding : store & forward cut through fragment free On access layer the default is fragment free we can change to any Of the3 mentioned above. 1.store & forward: it stores the whole information (1500 bytes Ethernet) into buffer, then checks for errors, looks for destination In MAC table and then forward. 2. Cut through: no error checking.as soon as a packet arrives It looks into MAC table & forward. WWW.KAASHIVINFOTECH.COM

123 3.loop avridance: consider a seenario whr pci wants to communicate To pc2. Switch a makes entry of pc1 in its MAC table as it is a new Switch. This looping is before the mac table I s made. This is called Initial flood or broad cast storm. STP: spanning tree protocol. To avoid loops in case of a cascaded Switch stp is enabled by default. Parameters to select a switch 1.Bridge priority (32768) default.(1-655355) 2.MAC address Bridge id is calculated. Bridge id=bridge priority + mac address. Which ever the switch having least bridge ID will be elcted as root Bridge and others are non-root bridge. On root bridge the ports used For cascading are called designated ports. All the designated ports Will be at forwadingf state. In non root bridge from the two ports one will be selected as root port. This will be depending on the cost speed).least cost path (faster transmission) the other port will be blocked. WWW.KAASHIVINFOTECH.COM

124 The “hello” packets that are sent by root bridge for every 2 sec to inform that it is working properly are called BPDUS; (bridge protocol data limits). If non root bridge do no receive 10 BPDUs for next 20secs then it is clear that the root bridge has Failed. 20secs – max age time Then a new root bridge is selected. In the above eg:if switch A is selected as root bridge and ports A & B Of switch A are designated ports. Depending on the shortest paths For high speed & low cost one port of switch B is selected as root port & the other will be blocked. WWW.KAASHIVINFOTECH.COM

125 ISDN Integreted services digital network. It is a circuit switching technology approved by CCITT. ISDNPSTN Digitalanalog More bandwidthless Multiple services like, Voice,data,video etc. ISDN BRIPRI (Basic rate interface 2b channels & id chennel) european standard north american standard 30 bchannels 23 bchannels& id channel WWW.KAASHIVINFOTECH.COM

126 ‘B’channel – it is a bearer channel for data. ‘D’channel – it is a delta channel for synchronization In bri each B channel = 64 kbps d channel = 16kbps Max 128 kbps BW in isdn In PRI both B & D channels _= 64kbps. European – 2mbps North american – 1.54 mbps ISDN will have a voltage of 90-110v WWW.KAASHIVINFOTECH.COM

127 SPID number : (service profile identifier) to identify the link. Types of ISDN switches Euro-basic net3 U.S-basic 5 ess-at&t standard U.K-basic net3 & basic net5 France-vn3 & vn4 Ss7 (signalling system7) Will be configured at the back bone side. telco vn3/vn4 basic net3 France India WWW.KAASHIVINFOTECH.COM

128 THANK YOU

129 E-series, I-series & Q-series E-tells about telephone network & ISDN network I-tells about concepts & interfaces of ISDN Q-tells about signalling & switching of ISDN DDR Dail on Demand Routing The main feature of ISDN is it dials & connects on request & Discounects when no data transfer is taking place. nat (network address translation IP NAT inside IP NAT out side overload WWW.KAASHIVINFOTECH.COM

130 IPNAT inside: any request from th internal network will be NATED To public Ip address sending the request from internal network To Bri interface is overloading. When ever NAT is enable, the router will maintain a nat table. Nat table: When nat t able is enabled nau request will be allocated a port Number after 1024. Above 1024 port numbers are reserved for other Services. This allocation of port numbers is dynamic. WWW.KAASHIVINFOTECH.COM

131 Configuring a DDR for ISDN Config#int e0 Config#ip adress 192.168.5.150 255.255.255.0 Config#ip nat inside Config#exit Config-if#int bri 0 Config-if#ip address negotiated Config-if#encapsulation PPP Config-if#PPP authenticaiton PAP chap collin Config-if#PPP chap hostname (username) Config-if#PPP chap password (password) Config-if#dialer string (tel.no.) Config-if#dialer idle timeout (time in secs) Config-if#dialer group Config-if#ip nat outside Config-if#exit WWW.KAASHIVINFOTECH.COM

132 Ip address negotialted : this is when an ip adress is fetched kdynamically From ISP 7 donot have a permanent public I.P adress Dialer – list range 1-10 to configure router as a DHCP server Config#ip pool staring ip end ip. Some ISDN command Sh int bri0 Sh isdn status (layer 1 should be active. If not physical conectivity is lost) Sh isdn active Sh isdn history Sh ip network translaiton WWW.KAASHIVINFOTECH.COM


Download ppt "CISCO ROUTERS. CISCO 60% 40% D-Link 3 Com Nortel Cygnus Etc.. Cisco’s Market Share"

Similar presentations


Ads by Google