Presentation is loading. Please wait.

Presentation is loading. Please wait.

CCNA: Cisco Certified Network Associate Study Guide

Similar presentations


Presentation on theme: "CCNA: Cisco Certified Network Associate Study Guide"— Presentation transcript:

1 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 1: Internetworking

2 The CCNA exam topics covered in this chapter include the following:
Technology Describe network communications using layered models Compare and contrast key characteristics of LAN environments Describe the components of network devices Evaluate rules for packet control

3 The Basic Network The reason that networks were even created is so that we can easily share information and files. Before networks, we had to use floppy disks or other type of physical media to share files. Before Local Area Networks (LANs), we used mainframes from IBM, Honeywell, DEC, and others. The first LANs used coax connectivity but distance and amount of hosts that could be on a network were limited. On a basic network, hardware addresses (MAC addresses) are used to communicate between the hosts. Hosts communicate with a language referred to as binary code – which is 0’s and 1’s. The basic network allows devices to share information The term “Computer Language” refers to Binary code (0’s or 1’s)

4 The Basic Internetwork
In an internetwork, hosts still use hardware addresses to communicate between each host on the LAN. However, in an internetwork, hosts use logical addresses (IP addresses) to communicate with hosts on a different LAN (other side of the router). Each connection into a router is a different logical network (broadcast domain). A router creates an internetwork

5 Routing Protocols Routing protocols are used to tell neighbor routers about networks that they are not directly connected to. The routers place these networks in their routing table (map of the internetwork) Examples of routing protocols are RIP, RIPv2, IGRP, EIGRP and OSPF. EIGRP is a Cisco proprietary routing protocol and is the preferred routing protocol for most networks. You only have Cisco routers in your internetwork, right? Once all the routers have converged (all have the same routing table), then a routed protocol (typically and hopefully just IP) can send packets through the internetwork. In smaller networks, you can create static routes instead of using a routing protocol. However, EIGRP works well in small and large networks, so why go through the hassle of static routes? (except for maybe a default route to the Internet). When you have more then one router, a routing protocol is used to share network information between the routers.

6 Internetworking Basics
Possible causes of LAN traffic congestion: Too many hosts in the broadcast domain Broadcast storms Multicasting Low Bandwidth

7 Internetworking Basics
Advantages of using routers in your network: Routers don’t forward broadcasts by default. Routers can filter the network based on layer-3 (Network layer) information (i.e., IP address).

8 Internetworking Basics

9 Internetworking Models
The OSI Reference Model The Layered Approach Advantages of OSI layered model Allows multiple-vendor development through standardization of network components Allows various types of network hardware and software to communicate. Prevents changes in one layer from affecting other layers, so it does not hamper development.

10 The OSI Reference Model
OSI Reference Model’s Seven Layers Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Ling Layer Physical Layer

11 The OSI Reference Model
Network devises that operate at all seven layers: Network Management stations (NMS) Web and Application servers Gateways (not default gateways) Network hosts

12 The OSI Reference Model
The Lower Layers Provides reliable or unreliable delivery Performs error correction before retransmit Provides logical addressing, which routers use for path determination Combines packets into bytes and bytes into frames Provides access to media using MAC address Performs error detection not correction Moves bits between devices Specifies voltage, wire speed, and pin-out cables

13 The OSI Reference Model
The Transport Layer Flow Control Connection-Oriented Communication Acknowledgements

14 The OSI Reference Model

15 The OSI Reference Model
The Transport Layer (Windowing)

16 The OSI Reference Model
The Network Layer

17 The OSI Reference Model
The Network Layer Each router interface is broadcast domain. Routers break up broadcast domains by default and provide WAN services

18 The OSI Reference Model
The IEEE Data Link Layer has two sublayers: Media Access Control (MAC) 802.3 Logical Link Control (LLC) 802.2

19 Switching (LAN Segmentation)
Each segment has its own collision domain. All segments are in the same broadcast domain.

20 Hubs All devices in the same collision domain
All devices in the same broadcast domain Devices share the same bandwidth

21 The OSI Reference Model
The Physical Layer Sends and receives bits; 1’s & 0’s Specify electrical, mechanical, procedural, and functional requirements DTE/DCE interfaces identified Hubs (Multi-port repeaters)

22 Ethernet Networking A connection media access method that allows all hosts on a network to share the same bandwidth (Uses Data Link & Physical Layer specifications) CSMA/CD Half Duplex Full Duplex

23 Ethernet at the Data Link Layer
Ethernet Networking Ethernet at the Data Link Layer Ethernet addressing = Hardware or MAC Framing Types of Ethernet frames: Ethernet II IEEE 802.3 IEEE 802.2 SNAP

24 Ethernet Frames

25 Ethernet Networking Ethernet Frames

26 Ethernet at the Physical Layer
Ethernet Networking Ethernet at the Physical Layer The Expanded IEEE Ethernet Standards 100BaseTX 100BaseFX 1000BaseCX 1000BaseT 1000BaseSX 1000BaseLX

27 Duplex Overview 802.3 Half duplex (CSMA/CD) Full duplex
Unidirectional data flow Higher potential for collision Hubs connectivity One wire pair Shared collision domain Lower Effective Throughput Hub Full duplex Point-to-point only Attached to dedicated switched port Requires full-duplex support on both ends Collision free Collision detect circuit disabled Two wire pair Half-duplex Ethernet is defined in the original Ethernet and uses only one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet—typically 10BaseT—is only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps—at most. But full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. And full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device. This means that with full duplex data transfer, you get a faster data transfer compared to half-duplex. And because the transmitted data is sent on a different set of wires then the received data, no collisions will occur—sweet! Full-Duplex is collision free Half-Duplex is subject to collisions Full-Duplex provides higher throughput than Half-Duplex Ethernet of the same bandwidth Half-Duplex operates in a shared collision domain Full-Duplex operates in a private collision domain

28 Straight-Through Cable
Ethernet Cabling Straight-Through Cable

29 Ethernet Cabling Crossover Cable

30 Ethernet Cabling Rolled Cable

31 HyperTerminal

32 HyperTerminal

33 Console HyperTerminal Settings

34 Wireless Networking

35 Wireless Network Types
Wireless Networking Wireless Network Types Narrowband Wireless LANs Personal Communication Services (PCS) Narrowband PCS Broadband PCS Satellite Infrared Wireless LANs Spread Spectrum Wireless LANs

36 Data Encapsulation

37 Data Encapsulation

38 Port Numbers at the Transport Layer

39 The Cisco Three-Layer Hierarchical Model

40 How many collision domains are shown?
Hub Two collision domains, two broadcast domains. A router breaks up both collision domains and broadcast domains and a hub breaks up no collision domains. How many broadcast domains are shown?

41 How many broadcast domains are shown?
Switch Switch Hub Hub Hub Hub Hub Hub One broadcast domain, seven collision domains are shown. By default, switches break up collision domains with each port, but are one broadcast domain by default. How many collision domains are shown?

42 How many collision and broadcast domains are show?
Which of the hosts can transmit simultaneously without causing collisions? Switch Hub Only the hosts connected to the switch can transmit simultaneously without causing collisions. Four collision domains are shown, one broadcast domain. By default, switches break up collision domains with each port, but they are only one broadcast domain by default. A B C D E F How many collision and broadcast domains are show?

43 CHAPTER 2: Internet Protocols
CCNA: Cisco Certified Network Associate Study Guide CHAPTER 2: Internet Protocols

44 The CCNA exam topics covered in this chapter include the following:
Technology Evaluate TCP/IP communication processes and its associated protocols

45 TCP/IP and the DoD Model
The DoD model is basically a condensed version of the OSI model—it’s composed of four, instead of seven, layers: Process/Application layer Host-to-Host layer Internet layer Network Access layer

46 The TCP/IP Protocol Suite
TCP/IP and the DoD Model The TCP/IP Protocol Suite

47 Process/Application Layer Protocols
TCP/IP and the DoD Model Process/Application Layer Protocols Telnet File Transfer Protocol (FTP) Trivial File Transfer Protocol (TFTP) Network File System (NFS) Simple Mail Transfer Protocol (SMTP) Line Printer Daemon (LPD) X Window Simple Network Management Protocol (SNMP) Domain Name Service (DNS) Dynamic Host Configuration Protocol (DHCP)/BootP (Bootstrap Protocol)

48 Host-to-Host Layer Protocols
TCP/IP and the DoD Model Host-to-Host Layer Protocols Transmission Control Protocol (TCP) Header

49 Transport Layer Overview
Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Application Connection-Oriented Connectionless Transport Network News Transport Protocol uses TCP port 119 Transmission Control Protocol (TCP) takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment so that the destination’s TCP protocol can put the segments back into the order the application intended. After these segments are sent, TCP (on the transmitting host) waits for an acknowledgment of the receiving end’s TCP virtual circuit session, retransmitting those that aren’t acknowledged. Before a transmitting host starts to send segments down the model, the sender’s TCP protocol contacts the destination’s TCP protocol to establish a connection. What is created is known as a virtual circuit. This type of communication is called connection-oriented. During this initial handshake, the two TCP layers also agree on the amount of information that’s going to be sent before the recipient’s TCP sends back an acknowledgment. With everything agreed upon in advance, the path is paved for reliable communication to take place. TCP is a full-duplex, connection-oriented, reliable, and accurate protocol, but establishing all these terms and conditions, in addition to error checking, is no small task. TCP is very complicated and, not surprisingly, costly in terms of network overhead. And since today’s networks are much more reliable than those of yore, this added reliability is often unnecessary. TCP uses positive acknowledgement and retransmission to ensure reliable delivery. TCP and UDP must use port numbers to communicate with the upper layers, because they’re what keeps track of different conversations crossing the network simultaneously NNTP(119), HTTP (80), HTTPS (443), Telnet (23), FTP (21), SMTP (25): TCP TFTP (69), SNMP(161): UDP DNS (53): both TCP and UDP

50 Transmission Control Protocol (TCP)
Connection-oriented services Uses virtual circuits (three-way handshake) Enables devices to send large quantities of data using windowing in a connection-oriented manner Uses acknowledgements Considered reliable Since the upper layers just send a data stream to the protocols in the Transport layers, the Internet layer then routes the segments as packets through an internetwork. The packets are handed to the receiving host’s Host-to-Host layer protocol, which rebuilds the data stream to hand to the upper-layer applications or protocols. TCP creates a reliable sessions by setting up a virtual circuit, which includes acknowledgements, sequence numbers and windowing (flow control). Dest Port Source Port Ack. Number Window number Sequence number CRC Data Segment

51 Host-to-Host Layer Protocols
TCP/IP and the DoD Model Host-to-Host Layer Protocols User Datagram Protocol (UDP) Header

52 User Datagram Protocol (UDP)
Simple connectionless service No windowing No sequencing No acknowledgements, which reduces overhead traffic If you were to compare User Datagram Protocol (UDP) with TCP, the former is basically the scaled-down economy model that’s sometimes referred to as a thin protocol. UDP doesn’t offer all the bells and whistles of TCP either, but it does do a fabulous job of transporting information that doesn’t require reliable delivery—and it does so using far fewer network resources. Dest Port Source. Port Length CRC Data Segment Note: TCP and UDP both have source and destination port numbers and a CRC field

53 Key Concepts of Host-to-Host Protocols
TCP/IP and the DoD Model Key Concepts of Host-to-Host Protocols

54 TCP/IP and the DoD Model
Port Numbers < 1024: “Well-known port numbers” Defined in RFC 3232; linked to specific applications or protocols 1024: Dynamically assigned Used by upper layers to communicate between hosts

55 Internet Layer Protocols
TCP/IP and the DoD Model Internet Layer Protocols Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) Proxy ARP

56 Internet Layer Protocols
TCP/IP and the DoD Model Internet Layer Protocols

57 Internet Protocol (IP)
Provides network addressing and routing through an internetwork Connectionless service Dest Port Source Port Data Internet Protocol (IP) essentially is the Internet layer. The other protocols found here merely exist to support it. IP holds the big picture and could be said to “see all,” in that it’s aware of all the interconnected networks. It can do this because all the machines on the network have a software, or logical, address called an IP address, which we’ll cover more thoroughly later in this chapter. IP looks at each packet’s address. Then, using a routing table, it decides where a packet is to be sent next, choosing the best path. Segment Dest IP Source IP Protocol Segment Packet

58 Internet Layer Protocols
TCP/IP and the DoD Model Internet Layer Protocols

59 TCP/IP and the DoD Model
Local APR Broadcast

60 TCP/IP and the DoD Model
RARP Broadcast

61 Proxy ARP Allows a router to respond to an ARP request that is intended for a remote host Proxy ARP is the technique in which one host, usually a router, answers ARP requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination. Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway. Proxy ARP should be used on the network where IP hosts are not configured with default gateway or does not have any routing intelligence. How do we send packets out of the local network with multiple default gateways? But proxy Arp can cause network congestion…

62 IP Addressing Hierarchical Addressing Framework
Network.node addressing, 32 bits (4-bytes) The Hierarchical advantage is increased ability of addresses Before we get into the more complicated aspects of IP addressing, you need to understand some of the basics: Defining basic IP addressing terms: Bit = 1 digit (one or a zero) Byte = 7 or 8 bits (depends on parity) Octet = Always 8 bits

63 Binary to Decimal The following table shows the decimal values of each bit location in a nibble and a byte. Remember, a nibble is 4 bits and a byte is 8 bits. Nibble values Byte values What all this means is that if a one digit (1) is placed in a value spot, then the nibble or byte takes on that decimal value, and adds it to any other value spots that have a one. And if a zero (0) is placed in a bit spot, then you don’t count that value.

64 Binary to Decimal Review
Converting binary to decimal examples: : Bit values = 0 = 15 = 85 = 131 = 22 = 255 It’s pretty simple really. The digits used are limited to either a 1(one) or a 0 (zero), with each digit being called one bit. Typically, you count either four or eight bits together, with these being referred to as a nibble or a byte, respectively. What interests us in binary numbering is the value represented in a decimal format—t he typical decimal format being our base ten number scheme we’ve all used since kindergarten. The binary numbers are placed in a value spot; starting at the right and moving left, with each spot having double the value of the previous spot. What is the hex equivalent of each binary number?

65 Binary (Cont.) Bits Binary Decimal 0 00000000 0 1 10000000 128
Binary chart to memorize

66 The Hierarchical IP Addressing Scheme
Dotted-decimal, as in Binary, as in Hexadecimal, as in AC.10.1E.38

67 IP Addressing Reserved IP Addresses Address Function
Network address of all 0s Interpreted to mean “this network or segment.” Network address of all 1s Interpreted to mean “all networks.” Network Reserved for loopback tests. Designates the local node and allows that node to send a test packet to itself without generating network traffic. Node address of all 0s Interpreted to mean “network address” or any host on specified network. Node address of all 1s Interpreted to mean “all nodes” on the specified network; for example, means “all nodes” on network (Class B address). Entire IP address set to all 0s Used by Cisco routers to designate the default route. Could also mean “any network.” Entire IP address set to all 1s (same as ) Broadcast to all nodes on the current network; sometimes called an “all 1s broadcast” or limited broadcast.

68 Summary of the Three Classes of Networks
IP Addressing Summary of the Three Classes of Networks

69 IP Addressing Class A Addresses Structure Class A Valid Host IDs
Network.node.node.node Class A Valid Host IDs All host bits off All host bits on Valid hosts = 0’s & 255s can be valid hosts but all hosts bits cannot all be off or on at the same time! 224-2 = 222

70 IP Addressing Class B Addresses Structure Class B Valid Host IDs
Network.Network.node.node Class B Valid Host IDs All host bits off All host bits on Valid hosts = 0’s & 255s can be valid hosts but all hosts bits cannot all be off or on at the same time! 216-2 = 214

71 IP Addressing Class C Addresses Structure Class C Valid Host IDs
Network.Network.Network.node Class C Valid Host IDs All host bits off All host bits on Valid hosts = 0’s & 255s can be valid hosts but all hosts bits cannot all be off or on at the same time! 28-2 = 26

72 IP Addressing Private IP Addresses Address Class
Reserved address space Class A through Class B through Class C through

73 Broadcast Addresses

74 Broadcast Addresses Layer 2 Broadcasts—These are sent to all nodes on a Lan Broadcasts (layer 3)—These are sent to all notes on the network Unicast—These are sent to a single destination host Multicast—These are packets sent from a single source, and transmitted to many devices on different networks

75 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 4: Introduction to the Cisco IOS

76 The CCNA exam topics covered in this chapter include the following:
Implementation & Operation Configure IP addresses, subnet masks, and gateway addresses on routers and hosts  Configure a router for additional administrative functionality Implement a LAN Perform an initial configuration on a router  Perform an initial configuration on a switch

77 Cisco Router IOS Carries network protocols and functions
Connects high-speed traffic between devices Adds security to control access Provides scalability for growth Supplies reliability

78 Connecting To A Cisco Router

79 Bringing up a Router Boot-up process: 1: POST
2: Looks for the Cisco IOS from Flash memory 3: IOS loads & looks for a valid configuration; startup-config stored in nonvolatile RAM (NVRAM) 4: If a valid config is not found in NVRAM: setup mode

80 Setup Mode Basic Management Setup Extended Setup
Command-Line Interface

81 Command-Line Interface (CLI)
More flexible than setup mode. To use the CLI, just say No to entering the initial configuration dialog.

82 Logging into the Router
User mode: Router> Used mostly to view statistics Privileged mode: Router# Used to view & change router configuration

83 Overview of Router Modes
Global changes: config terminal or config t Changes made to running-config (DRAM) To change the startup-config (NVRAM) config memory or config mem Note: Any configuration changes need to be placed into RAM. Typing config mem or config net (from a TFTP host) will replace the current running-config

84 Configuration CLI Prompts Interfaces Sub-interfaces Line Commands
Routing Protocol Configurations

85 Editing & Help Features

86 Editing & Help Features
Commands starting with a certain letter Router#c? clear clock configure connect copy Enhanced Editing Commands Router-Command History Gathering Basic Routing Information show version

87 Enhanced Editing Commands

88 Enhanced Editing Commands (cont.)

89 Router Command History

90 Gathering Basic Routing Information

91 Administrative Functions
The administrative functions that you can configure on a router and switch are Hostnames Banners Password Interface descriptions

92 Hostnames & Descriptions
Router(config)#hostname todd todd(config)# Descriptions Atlanta(config)#int e0 Atlanta(config-if)#description Sales Lan

93 Banners Purpose Types exec incoming login motd Delimiting character

94 Setting the Passwords 5 passwords:
1st two used to set your enable password Used to secure privileged mode; Router>enable Other three are used to configure a password in user mode via: console port auxiliary port Telnet

95 Passwords Enable passwords Auxiliary Password Console Password
Router(config)#enable password cisco Router(config)#enable secret cisco Auxiliary Password Console Password Telnet Password Encrypting Your Password Router(config)#service password-encryption

96 Interface Descriptions
Setting descriptions on an interface is helpful to the administrator and, like the hostname, only locally significant. The description command is a helpful one because you can, for instance, use it to keep track of circuit numbers. Here’s an example: Atlanta(config)#int e0 Atlanta(config-if)#description Sales Lan Atlanta(config-if)#int s0 Atlanta(config-if)#desc Wan to Miami circuit:6fdda4321 You can view the description of an interface either with the show running-config command or the show interface command.

97 Router Interfaces Serial Interface Commands Purpose
Bringing up an Interface no shutdown shutdown show interface Configuring an IP Address on an Interface Router(config)#int e0 Router(config-if)#ip address Router(config-if)#no shut Serial Interface Commands clock rate & bandwidth (entered in kilobits)

98 Viewing, & Saving Configurations
running-config saved in DRAM startup-config saved in NVRAM copy run start sh run sh start erase startup-config

99 Verifying Your Configuration
Tools: show running-config show startup-config ping show cdp nei detail trace telnet

100 Other Verification Methods
Verifying with the show interface command Router#show interface ? Verifying with the show ip interface command Router#show ip interface Router#show ip interface brief Router#show controllers

101 CHAPTER 3: IP Subnetting and Variable Length Subnet Masks (VLSM)
CCNA: Cisco Certified Network Associate Study Guide CHAPTER 3: IP Subnetting and Variable Length Subnet Masks (VLSM)

102 The CCNA exam topics covered in this chapter include the following:
Planning & Designing • Design a simple LAN using Cisco Technology Design an IP addressing scheme to meet design requirements Design a simple internetwork using Cisco technology Technology Evaluate TCP/IP communication process and its associated protocols Troubleshooting Perform LAN and VLAN troubleshooting • Troubleshoot routing protocols • Troubleshoot IP addressing and host configuration • Troubleshoot a device as part of a working network

103 Subnetting Basics Benefits of subnetting include:
Reduced network traffic Optimized network performance Simplified management Facilitated spanning of large geographical distances.

104 How To Create Subnets Take bits from the host portion of the IP address and reserve the to divine the subnet address.

105 Understanding the Powers of 2

106 Subnet Masks Used to define which part of the host address will be used as the subnet address. A 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID portion.

107 Default Subnet Masks

108 Classless Inter-Domain Routing (CIDR)
Used to allocate an amount of IP address space to a given entity (company, home, customer, etc). Example: /28 The slash notation (/) means how many bits are turned on (1s) and tells you what your subnet mask is.

109 CIDR Values

110 Subnetting Class C Addresses
In a Class C address, only 8 bits are available for defining the hosts. Remember that subnet bits start at the left and go to the right, without skipping bits. This means that the only Class C subnet masks can be the following: Binary Decimal CIDR = /25 = /26 = /27 = /28 = /29 = /30

111 Class C 192 mask examples Subnet Host Meaning 00 000000 = 0
The network (do this first) = 1 The first valid host = 62 The last valid host = 63 The broadcast address (do this second) Subnet Host Meaning 01 = 64 The network = 65 The first valid host = 126 The last valid host = 127 The broadcast address

112 Class C 192 mask examples Subnet Host Meaning 10 000000 = 128
The subnet address = 129 The first valid host = 190 The last valid host = 191 The broadcast address Subnet Host Meaning 11 = 192 The subnet address = 193 The first valid host = 254 The last valid host = 255 The broadcast address

113 Subnetting Class C Addresses – Fast Method
Answer Five Simple Questions:

114 How Many Subnets? 2-2 = number of subnets.
X is the number of masked bits, or the 1s. For example, in , the number of ones gives us 2-2 subnets. In this example there are 4 subnets.

115 How Many Hosts Per Subnet?
2y-2 = number of hosts per subnet. Y is the number of unmasked bits, or the 0s. For example, in , the number of zeros gives us 26-2 hosts. In this example, there are 62 hosts per subnet.

116 What Are The Valid Subnets?
256-subnet mask = block size, or base number. For example = is the first subnet. The next subnet would be the base number plus itself or 64+64=128, (the second subnet).

117 What’s The Broadcast Address For Each Subnet?
The broadcast address is all host bits turned on, which is the number immediately preceding the next subnet.

118 What Are The Valid Hosts?
Valid hosts are the number between the subnets, omitting all 0s and all 1s.

119 Variable Length Subnet Masks (VLSM)

120 Subnets with no VLSM applied

121 Subnets with VLSM applied

122

123 VSLM, Example 1

124

125 VLSM, Example 2

126

127 Which IP address will be placed in each router’s FastEthernet 0/0 interface and serial 0/1 of RouterB?

128 Answer To which IP address will be placed in each router’s FastEthernet 0/0 interface and serial 0/1 of RouterB?

129 Summary Example

130 Why can’t the Sales LAN get to Server A?

131 Why can’t hosts in the Sales LAN get to Server B?

132 What can the host address be?

133 Which addresses can you assign to the hosts?

134 Which IP addresses can you assign?

135 Which class C mask should you use?

136 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 5: IP Routing

137 The CCNA exam topics covered in this chapter include the following:

138 What is Routing? To route a router need to know: Remote Networks
Neighbor Routers All Possible routes to remote network The absolute best route to all remote networks Maintain and verify the routing information Once you create an internetwork by connecting your WANs and LANs to a router, you then need to configure logical network addresses, such as IP addresses, to all hosts on the internetwork so that they can communicate across that internetwork. The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. Routers don’t care about hosts—they only care about networks and the best path to each network. The logical network address of the destination host is used to get packets to a network through a routed network, then the hardware address of the host is used to deliver the packet from a router to the correct destination host. D C B A

139 Basic Path Selection The router will packet switch the packet to the FastEthernet 0/0 interface and then frame it and send it out the LAN What interface will the router send out a packet if it has destination address of ?

140 Simple IP Routing >ping 172.16.1.2 172.16.2.0 172.16.1.0 172.16.3.1
e0 e0 s0 A B B The IP routing process is fairly simple and doesn’t change, regardless of the size of network you have. For an example, we’ll describe step by step what happens when Host A wants to communicate with Host B on a different network. In this example, a user on Host A pings Host B’s IP address. s0 Host A Host B

141 Routing/PDU Example: Host A Web browses to the HTTP Server….
1. The destination address of a frame will be the MAC address of the E0 interface of the Lab_A router 1. The destination address of a frame will be the _______________________ 2. The destination IP address of a packet will be the IP address of the network interface of the HTTP server 2. The destination IP address of a packet will be the IP address of the ________________________________ 3. The destination port number in a segment header will have a value of 80 This slide represents how segments, packets and frames are used to send data from HostA to the HTTP server. It’s important to remember that frames are “ALWAYS” on a local network and hardware addressees are used. Packets are used to route a segment from one network to another network Segments are used to rebuild a datastream on a remote host, in this case, the HTTP server. 3. The destination port number in a segment header will have a value of __

142 Static Routes Routes must be unidirectional Stub Network 172.16.2.0
SO SO A A B B Static routing occurs when you manually add routes in each router’s routing table. There are pros and cons to static routing, but that’s true for all routing processes. Things that are good about static routing: -No overhead on the router CPU -No bandwidth usage between routers -Security (because the administrator can only allow routing to certain networks) Things that aren’t so good about static routing: -The administrator must really understand the internetwork and how each router is connected super well in order to configure routes correctly. -If a network is added to the internetwork, the administrator has to add a route to it on all routers—by hand. -It just won’t work for you in large networks because maintaining it would be a full-time job in itself. Routes must be unidirectional

143 Static Route Configuration
ip route remote network [mask] {address|interface} [distance] [permanent] Here’s the command you use to add a static route to a routing table: ip route [destination_network] [mask] [next-hop_address or exitinterface] [administrative_distance] [permanent] This list describes each command in the string: Ip route: The command used to create the static route. Destination network: The network you’re placing in the routing table. Mask: The subnet mask being used on the network. Next-hop address: The address of the next-hop router that will receive the packet and forward it to the remote network. This is a router interface that’s on a directly connected network. You must be able to ping the router interface before you add the route. Exit interface: You can use it in place of the next-hop address if you want, but it’s got to be on a point-to-point link, like a WAN. This command won’t work on a LAN like Ethernet. Administrative distance: By default, static routes have an administrative distance of 1. You can change the default value by adding an administrative weight at the end of the command. Permanent: If the interface is shut down, or the router can’t communicate to the next-hop router, the route will automatically be discarded from the routing table. Choosing the permanent option keeps the entry in the routing table no matter what happens. Router(config)#ip route remote_network mask next_hop

144 Static Route Example ip route 172.16.1.0 255.255.255.0 172.16.3.2 or
Stub Network SO SO A B B This slide shows an example of a simple static route command. ip route or ip route s0

145 Default Routes ip route 0.0.0.0 0.0.0.0 172.16.3.1 ip classless
Stub Network SO SO A B B We use default routing to send packets with a remote destination network not in the routing table to the next-hop router. You can only use default routing on stub networks—those with only one exit port out of the network. ip route ip classless

146 Routing vs. Routed Routing protocols are used between routers to:
Determine the path of a packet through a network Maintain routing tables Examples? Routed protocols are: Assigned to an interface Once the path is determined by the Routing protocol, determines method of delivery A routing protocol is used by routers to dynamically find all the networks in the internetwork and to ensure that all routers have the same routing table. Basically, a routing protocol determines the path of a packet through an internetwork. Examples of routing protocols are RIP, IGRP, EIGRP and OSPF. Okay—once all routers know about all networks, a routed protocol can be used to send user data (packets) through the established enterprise. Routed protocols are assigned to an interface and determine the method of packet delivery. Examples of routed protocols are IP and IPX.

147 Routing Protocols IGPs: RIP, IGRP EGPs: BGP Autonomous System 1
There are two types of routing protocols used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). IGPs are used to exchange routing information with routers in the same autonomous system (AS). An AS is a collection of networks under a common administrative domain, which basically means that all routers sharing the same routing table information are in the same AS. EGPs are used to communicate between ASs. An example of an EGP is Border Gateway Protocol (BGP), which is discussed in the GlobalNet CCNP course. An autonomous system is a collection of networks under a common administrative domain. IGPs operate within an autonomous system. EGPs connect different autonomous systems.

148 Classful Routing Overview
Classful routing protocols do not include the subnet mask with the route advertisement. Within the same network, consistency of the subnet masks is assumed. Summary routes are exchanged between foreign networks. Examples of classful routing protocols: RIP Version 1 (RIPv1) IGRP Classful routing means that all devices in the network must use the same subnet mask.

149 Classless Routing Overview
Classless routing protocols include the subnet mask with the route advertisement. Classless routing protocols support variable-length subnet masking (VLSM). Summary routes can be manually controlled within the network. Examples of classless routing protocols: RIP Version 2 (RIPv2) EIGRP OSPF IS-IS Prefix routing does send subnet mask information with the route updates. This is called classless routing.

150 Administrative Distance
Router A Router B IGRP Administrative Distance=100 RIP Administrative Distance=120 Router C Router D The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router. An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route. If a router receives two updates listing the same remote network, the first thing the router checks is the AD. If one of the advertised routes has a lower AD than the other, then the route with the lowest AD will be placed in the routing table. If both advertised routes to the same network have the same AD, then routing protocol metrics (such as hop count or bandwidth of the lines) will be used to find the best path to the remote network. The advertised route with the lowest metric will be placed in the routing table. But if both advertised routes have the same AD as well as the same metrics, then the routing protocol will load-balance to the remote network. Default Administrative Distance Directly Connected: 0 Static Route: 1 RIP: 120 IGRP: 100 EIGRP: 90 OSPF: 110 5

151 Distance—How far Vector—In which direction
Distance Vector Distance—How far Vector—In which direction D C B A Routing Table Routing Table Routing Table Routing Table Distance vector algorithms do not allow a router to know the exact topology of an internetwork. All routers just broadcast their entire routing table out all active interfaces on periodic time intervals The distance-vector protocols find the best path to a remote network by judging distance. Each time a packet goes through a router, that’s called a hop. The route with the least number of hops to the network is determined to be the best route. The vector indicates the direction to the remote network. Both RIP and IGRP are distance-vector routing protocols.

152 Discovering Routes Routers, when powered up and the interfaces are enabled, have only their directly connected networks in the routing table

153 Discovering Routes

154 Routing Loops

155 Router Loops

156 RIP Overview 64kbps T1 T1 T1 Routing Information Protocol (RIP) is a true distance-vector routing protocol. It sends the complete routing table out to all active interfaces every 30 seconds. RIP only uses hop count to determine the best way to a remote network, but it has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it’s inefficient on large networks with slow WAN links or on networks with a large number of routers installed. RIP version 1 uses only classful routing, which means that all devices in the network must use the same subnet mask. Hop count metric selects the path, 16 is unreachable Full route table broadcast every 30 seconds Load balance maximum of 6 equal cost paths (default = 4) RIPv2 supports VLSM and Discontiguous networks 5

157 RIP Routing Configuration
Router(config)#router rip Router(config-router)#network network-number* network network router RIP network network router RIP To configure RIP routing, just turn on the protocol with the router rip command and tell the RIP routing protocol which networks to advertise. That’s it. Understand that RIP is configured with classful routing network addresses! *Network is a classful network address. Every device on network uses the same subnet mask

158 RIP Version 2 Allows the use of variable length subnet masks (VLSM) by sending subnet mask information with each route update Distance Vector – same AD, and timers. Easy configuration, just add the command “version 2” under the router rip configuration Easy configuration, just add the command “version 2” under the router rip configuration. RIPv2 is the preferred choice over RIPv1 because it supports VLSM and discontiguous networks. router rip network version 2

159 Discontiguous Addressing
Two networks of the same classful networks are separated by a different network address /24 /24 /24 If you create VLSM network, sometimes you may find that the backbone connecting buildings together is a different class of network. This is called discontiguous addressing. By default routing protocols will not work across discontiguous networks. By using the “no auto-summary” command on the network boundaries, routing protocols will be able do work across a discontiguous addressed network. RIPv1 and IGRP do not advertise subnet masks, and therefore cannot support discontiguous subnets. OSPF, EIGRP, and RIPv2 can advertise subnet masks, and therefore can support discontiguous subnets.

160 Passive Interface Maybe you don’t want to send RIP updates out your router interface connected to the Internet. Use the passive-interface command: Router(config)#router rip Router(config-router)#passive-interface serial0 You probably don’t want your RIP network advertised everywhere on your LAN and WAN—there’s not a whole lot to be gained by advertising your RIP network to the Internet, now is there? No worries—there are a few different ways to stop unwanted RIP updates from propagating across your LANs and WANs. The easiest one is through the passive-interface command. This command prevents RIP update broadcasts from being sent out a defined interface, but that same interface can still receive RIP updates. X Updates Internet S0 Gateway This allows a router to receive route updates on an interface, but not send updates via that interface

161 Verifying RIP Router#show ip protocols Router#show protocols
Router#show ip route Router#debug ip rip Router#undebug all (un all) Show ip protocols: show routing protocols information and timers Show protocols: show routed protocol information Show ip route: displays the routing table Debug ip rip: show rip updates being sent and received on your router Undebug all or no debug ip rip: turns off debugging

162 Requires Autonomous System number for activation
IGRP Interior Gateway Routing Protocol - Cisco Proprietary Uses bandwidth and delay of the line by default to select best path Router A Router B Autonomous System An autonomous system is a collection of networks under a common administrative domain. Interior Gateway Routing Protocol (IGRP) is a Cisco-proprietary distance-vector routing protocol. This means that all your routers must be Cisco routers to use IGRP in your network. Cisco created this routing protocol to overcome the problems associated with RIP. IGRP: Allows up to 6 unequal paths to a remote network (4 by default) Supports up to 255 hops Full route table broadcast every 90 seconds Hold down timer is 280 seconds Flush timer is 630 seconds Suitable for use in large Internetworks (compared to RIP) Router C Router D Requires Autonomous System number for activation

163 IGRP vs. RIP The important IGRP characteristics are as follows:
More scalability than RIP Fast response to network changes Sophisticated metric Multiple-path support IGRP uses bandwidth and delay of the line by default as a metric for determining the best route to an internetwork. This is called a composite metric. Reliability, load, and maximum transmission unit (MTU) can also be used, although they are not used by default. IGRP can load-balance up to six unequal links. RIP networks must have the same hop count to load-balance, whereas IGRP uses bandwidth to determine how to load-balance. To load-balance over unequal-cost links, the variance command controls the load balancing between the best metric and the worst acceptable metric.

164 Configuring IGRP Router(config)#router igrp autonomous-system
Router(config-router)#network network-number* network network router IGRP 10 network network router IGRP 10 The command used to configure IGRP is the same as the one used to configure RIP routing with one important difference: you use an autonomous system (AS) number. All routers within an autonomous system must use the same AS number, or they won’t communicate with routing information. You absolutely must remember that you type a classful network number in when configuring IGRP! *Network is a classful network address. Every device on network uses the same subnet mask

165 Verifying IGRP Router# show ip route Router# show ip protocols
Router# debug ip igrp transaction Router# debug ip igrp events Router# undebug all (un all) Show ip protocols: show routing protocols information and timers Show ip route: displays the routing table debug ip igrp transactions command shows message requests from neighbor routers asking for an update and the broadcasts sent from your router towards that neighbor router. debug ip igrp events command is a summary of the IGRP routing information that is running on the network. Undebug all: turns off debugging

166 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 6: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)

167 The CCNA exam topics covered in this chapter include the following:
Planning & Designing • Select an appropriate routing protocol based on user requirements • Design a simple internetwork using Cisco technology Implementation & Operation • Configure routing protocols given user requirements

168 What Is Enhanced IGRP (EIGRP)?
IP Routing Protocols IP Routing Protocols AppleTalk Routing Protocol Enhanced IGRP AppleTalk Routing Protocol IPX Routing Protocols IPX Routing Protocols Enhanced IGRP supports: Rapid convergence Reduced bandwidth usage Multiple network-layer support Uses Diffused Update Algorithm (DUAL) to select loop-free routes and enable fast convergence Up to six unequal paths to a remote network (4 by default) Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary Cisco protocol that runs on Cisco routers and internal route processors found in the Cisco Distribution and Core layer switches. In this section, you’ll see the many features of EIGRP and describe how it works, with particular focus on the unique way it discovers, selects, and advertises routes. There are a number of powerful features that make EIGRP a real stand out from IGRP and other protocols. The main ones are listed here: Support for IP, IPX, and AppleTalk via protocol-dependent modules Efficient neighbor discovery Communication via Reliable Transport Protocol (RTP) Best path selection via Diffusing update algorithm (DUAL)

169 Comparing EIGRP and IGRP
Similar metric Same load balancing Improved convergence time Reduced network overhead Maximum hop count of 255 (100 default) EIGRP can differentiate between internal and external routes Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol that gives us a real edge over another Cisco proprietary protocol, Interior Gateway Routing Protocol (IGRP). That’s basically why it’s called Enhanced IGRP. Like IGRP, EIGRP uses the concept of an autonomous system to describe the set of contiguous routers that run the same routing protocol and share routing information. But unlike IGRP, EIGRP includes the subnet mask in its route updates. And as you now know, the advertisement of subnet information allows us to use VLSM and summarization when designing our networks!

170 EIGRP for IP No updates. Route updates sent only when a change occurs – multicast on Hello messages sent to neighbors every 5 seconds (60 seconds in most WANs) Enhanced IGRP EIGRP EIGRP doesn’t send link-state packets as OSPF does; instead, it sends traditional distance-vector updates containing information about networks plus the cost of reaching them from the perspective of the advertising router. And EIGRP has link-state characteristics as well—it synchronizes routing tables between neighbors at startup, and then sends specific updates only when topology changes occur. hello

171 EIGRP Terminology Neighbor Table—IP Topology Table—IP
Next Hop Interface Router Topology Table—IP Destination Successor Destination Feasible Successor Routing Table—IP Destination 1 Successor The neighborship table (usually referred to as the neighbor table) records information about routers with whom neighborship relationships have been formed. The topology table stores the route advertisements about every route in the internetwork received from each neighbor. The route table stores the routes that are currently used to make routing decision. There would be separate copies of each of these tables for each protocol that is actively being supported by EIGRP, whether it’s IP, IPX, or AppleTalk. Note: A feasible successor is a backup route and stored in the Topology table

172 EIGRP Tables The neighbor table and topology table are held in ram and are maintained through the use of hello and update packets. Enhanced IGRP EIGRP The neighbor table and topology table are held in ram and are maintained through the use of hello and update packets. hello To see all feasible successor routes known to a router, use the show ip eigrp topology command

173 Successor routes Successor route is used by EIGRP to forward traffic to a destination A successor routes may be backed up by a feasible successor route Successor routes are stored in both the topology table and the routing table Topology Table—IP Destination Successor Destination Feasible Successor Successor route is used by EIGRP to forward traffic to a destination A successor routes may be backed up by a feasible successor route Successor routes are stored in both the topology table and the routing table Routing Table—IP Destination 1 Successor

174 Choosing Routes IP IP A B 19.2 AppleTalk T1 T1 AppleTalk IPX IPX T1 C D EIGRP uses a composite metric to pick the best path: bandwidth and delay of the line EIGRP (and IGRP) can load balance across six unequal cost paths to a remote network (4 by default) Like IGRP, EIGRP uses only bandwidth and delay of the line to determine the best path to a remote network by default. Cisco sometimes likes to call these path bandwidth value and cumulative line delay—go figure.

175 Configuring EIGRP for IP
AS=10 A C B Router(config)#router eigrp 10 Router(config-router)#network Router(config-router)#network Enable EIGRP Assign networks To start an EIGRP session on a router, use the router eigrp command followed by the autonomous system number of your network. You then enter the network numbers connected to the router using the network command followed by the network number. If you use the same AS number for EIGRP as IGRP, EIGRP will automatically redistribute IGRP into EIGRP

176 Redistribution Redistribution is translating one type of routing protocol into another. EIGRP IGRP Router B Router D Router A Redistribution is important, because if you want to use EIGRP and don’t have all Cisco router, you need to configure redistribution commands. If you are using IGRP and want to migrate to EIGRP (yes, you should do this), configure EIGRP with the same AS number and EIGRP automatically redistributed IGRP into EIGRP routes. These routes show up as external routes with an AS of 170. Router C IGRP and EIGRP translate automatically, as long as they are both using the same AS number

177 Route Path Assuming all default parameters, which route will RIP (v1 and v2) take, and which route will EIGRP take? T1 T1 56K RIPv1 and RIPv2 use the same metric (hop count) and would find the 56K link the best path to the remote network. EIGRP and IGRP use the same metric as well (bandwidth and delay of the line) and would use the path through the LAN interfaces, not the serial T1’s. 10BaseT 100BaseT 100BaseT

178 Verifying Enhanced IGRP Operation
Router# show ip eigrp neighbors Displays the neighbors discovered by IP Enhanced IGRP Displays the IP Enhanced IGRP topology table Displays current Enhanced IGRP entries in the routing table Displays the parameters and current state of the active routing protocol process Displays the number of IP Enhanced IGRP packets sent and received Router# show ip eigrp topology Router# show ip route eigrp Show ip route: Shows the entire routing table show ip route eigrp: Shows only EIGRP entries in the routing table show ip eigrp neighbors: Shows all EIGRP neighbors. show ip eigrp topology: Shows entries in the EIGRP topology table. Which EIGRP show command will provide you with the IP addresses of the devices with which the router has established an adjacency, as well as the transmit and queue counts for the adjacent routers? Which command will display all the EIGRP feasible successor routes known to a router? Router# show ip protocols Router# show ip eigrp traffic

179 Show IP Route -D is for “Dual”
P1R1#sh ip route [output cut] Gateway of last resort is not set D /24 [90/2172] via ,00:04:36, Serial0/0 C /24 is directly connected, FastEthernet0/0 D /24 [90/2681] via ,00:04:36, Serial0/0 C /24 is directly connected, Serial0/0 D /24 [90/2707] via ,00:04:35, Serial0/0 P1R1# The show ip route command, or the show ip route eigrp command, will show you the routing table the routes found by DUAL. -D is for “Dual” -[90/2172] is the administrative distance and cost of the route. The cost of the route is a composite metric comprised from the bandwidth and delay of the line -D is for “Dual” -[90/2172] is the administrative distance and cost of the route. The cost of the route is a composite metric comprised from the bandwidth and delay of the line

180 Introducing OSPF Open standard Shortest path first (SPF) algorithm
Open Shortest Path First (OSPF) is an open standards routing protocol that’s been implemented by a wide variety of network vendors, including Cisco. If you have multiple routers, and not all of them are Cisco (what!) then you can’t use EIGRP now can you? So your remaining options are basically RIP, RIPv2 or OSPF. If it’s a large network, then really, your only options are OSPF, or something called route redistribution—a translation service between routing protocols. OSPF converges quickly, although perhaps not as quickly as EIGRP, and it supports multiple, equal-cost routes to the same destination. But unlike EIGRP, it only supports IP routing. Open standard Shortest path first (SPF) algorithm Link-state routing protocol (vs. distance vector) Can be used to route between AS’s

181 OSPF Hierarchical Routing
OSPF is supposed to be designed in a hierarchical fashion, which basically means that you can separate the larger internetwork into smaller Internetworks called areas. Consists of areas and autonomous systems Minimizes routing update traffic Supports VLSM Unlimited hop count

182 Link State Vs. Distance Vector
Provides common view of entire topology Calculates shortest path Utilizes event-triggered updates Can be used to route between AS’s This slides represents some important Link State characteristics, compared to distance vector. Distance Vector: Exchanges routing tables with neighbors Utilizes frequent periodic updates

183 Types of OSPF Routers Area 1 Backbone Area 0 Area 2
ABR and Backbone Router Backbone/ Internal Routers Internal Routers Internal Routers Notice how each router connects to the backbone—called area 0, or the backbone area. OSPF must have an area 0, and all routers should connect to this area if at all possible, but routers that connect other areas within an AS together are called Area Boundary Routers (ABRs). Still, at least one interface must be in area 0. OSPF runs inside an autonomous system, but can also connect multiple autonomous systems together. The router that connects these AS’s together is called an Autonomous System Boundary Router (ASBR). Area 0 is called the backbone area Hierarchical OSPF networks do not require multiple areas You must have an area 0 Multiple OSPF areas must connect to area 0 ASBR and Backbone Router ABR and Backbone Router External AS

184 Configuring Single Area OSPF
Router(config)#router ospf process-id Defines OSPF as the IP routing protocol Note: The process ID is locally significant and is needed to identify a unique instance of an OSPF database Configuring basic OSPF isn’t as simple as RIP, IGRP and EIGRP, and it can get can really complex once the many options that are allowed within OSPF are factored in. These two elements are the basic elements of OSPF configuration: -Enabling OSPF -Configuring OSPF areas The easiest, and also least scalable way to configure OSPF is to just use a single area. Doing this requires a minimum of two commands as shown in the next slide. The command you use to activate the OSPF routing process is: Lab_A(config)#router ospf ? < > A value in the range 1– identifies the OSPF Process ID. Process ID’s can be assigned any number from 0 to 65535 Area’s can be any number up to 2.4 billion Router(config-router)#network address mask area area-id Assigns networks to a specific OSPF area

185 OSPF Example R3 R2 R1 Area 0 hostname R3 router ospf 10 network area 0 network area 0 hostname R2 router ospf 20 network area 0 hostname R1 router ospf 30 network area 0 network area 0 There are various ways to configure OSPF. The configuration of R3 shows how the wildcard is used to place each interface individually into area 0 R2 show how two interface can be configured into area 0 with one wildcard network statement of R3 shows the wildcards of and It doesn’t matter how you configure the network statements, the results are the same. Remember, the process ID is irrelevant and can be the same on each router, or different on each router, as they are in this example.

186 Verifying the OSPF Configuration
Router#show ip protocols Verifies that OSPF is configured Router#show ip route Displays all the routes learned by the router Router#show ip ospf interface There are several ways to verify proper OSPF configuration and operation, and this slides shows some basic verification commands that you will use in the next hands-on labs. Displays area-ID and adjacency information Router#show ip ospf neighbor Displays OSPF-neighbor information on a per-interface basis

187 OSFP Neighbors OSPF uses hello packets to create adjacencies and maintain connectivity with neighbor routers OSPF uses the multicast address Hello? Neighbors Neighbors are two or more routers that have an interface on a common network, such as two routers connected on a point-to-point serial link. Adjacency An adjacency is a relationship between two OSPF routers that permits the direct exchange of route updates. OSPF is really picky about sharing routing information, unlike EIGRP that directly shares routes with all of its neighbors. Instead, OSPF directly shares routes only with neighbors that have also established adjacencies. Link State Advertisement A Link State Advertisement (LSA) is an OSPF data packet containing link-state and routing information that’s shared among OSPF routers. Hello packets provides dynamic neighbor discovery Hello Packets maintains neighbor relationships Hello packets and LSA’s from other routers help build and maintain the topological database

188 OSPF Terminology Neighbors Adjacencies Neighbor Adjacency Cost=6 ABR
Two routers that have an interface on a common network Usually discovered by hello’s but can also be configured administratively Adjacency Relationship formed between selected neighbors in which routing information is exchanged. Not all neighbors are adjacent Only Broadcast and Non-Broadcast network types have Designated and Backup Designated Routers!!! DR Adjacencies Non-DR Cost=6 BDR

189 Router ID (RID) Each router that is participating in OSPF needs to be uniquely identified. The method of identification that OSPF uses is Router IDs (RID). 32 bits that uniquely identifies an OSPF router Highest IP address in router is RouterID Overridden by Loopback interface if present Even if Loopback address has lower value Recommended to use loopback interface Easier to manipulate this number Always up Interface loopback 0 Ip address You can also Statically assign the Router ID in the OSPF router configuration mode: (config)# router ospf 1 (config-router)# router-id Do NOT use same loopback address on different routers Each router in OSPF needs to be uniquely identified to properly arrange them in the Neighbor tables.

190 Electing the DR and BDR OSPF sends Hellos which elect DRs and BDRs
Multicast Hellos are sent and compared Router with Highest Priority is Elected as DR Router with 2nd Highest Priority is Elected as BDR The following outlines the process OSPF takes and rules that are followed when electing a Designated Router: Routers elect a DR and BDR per network All routers set by default to priority 1 (0-255) Priority of zero (0) means router can not be elected as a DR Router with highest priority wins BDR (1 – 255), if no other router has a higher priority the BDR will then become the DR RouterID breaks tie, Router ID is either the Highest Loopback or Highest Configured IP address on any given active interface If DR fails, BDR promoted to DR and a new BDR is elected Existing DR will not be overthrown if “better” router is turned on after initial election DRs and BDRs listen to multicast traffic on both multicast address and is exclusively listed to by DRs OSPF sends Hellos which elect DRs and BDRs Router form adjacencies with DRs and BDRs in a multi-access environment

191 Configuring Loopback Interfaces
Configuring loopback interfaces when using the OSPF routing protocol is important and Cisco suggests using them whenever you configure OSPF on a router. Loopback interfaces are logical interfaces, which means they are not real router interfaces. They can be used for diagnostic purposes as well as OSPF configuration. The reason you want to configure a loopback interface on a router is because if you don’t, the highest IP address on a router will become that routers Router ID (RID). The RID is used to advertise the routes as well as elect the designated router (DR) and backup designated router (BDR). Router ID (RID): Number by which the router is known to OSPF Default: The highest IP address on an active interface at the moment of OSPF process startup Can be overridden by a loopback interface: Highest IP address of any active loopback interface – also called a logical interface

192 What is the default OSPF interface priority?
Interface Priorities What is the default OSPF interface priority? Router# show ip ospf interface ethernet0/0 Ethernet0 is up, line protocol is up Internet Address /29, Area 4 Process ID 19, Router ID , Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1 Designated Router (ID) , Interface address No backup designated router on this network Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:06 Index 2/2, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 0, maximum is 0 Last flood scan time is 0 msec, maximum is 0 msec Neighbor Count is 0, Adjacent neighbor count is 0 Suppress hello for 0 neighbor(s) Sometimes it is desirable for a router to be configured so that it is not eligible to become the DR or BDR. You can do this by setting the OSPF priority to zero with the ip ospf priority priority# interface subcommand. Router(config-if)# ip ospf priority {0 – 255} Change the priority of a router on an interface 0 means to not participate in election 1 is default, 255 is highest priority

193 Ensuring your DR First, what is the RID of each router? Which router is the default DR for the LAN? There are three options that will ensure that R2 will be the DR for the LAN segment /24: Configure the priority value of the Fa0/0 interface of the R2 router to a higher value than any other interface on the Ethernet network Configure a loopback interface on the R2 with an IP address higher than any IP address on the other routers Change the priority value of the Fa0/0 interface of R1 and R3 to zero What options can you configure that will ensure that R2 will be the DR of the LAN segment?

194 Configuring Wildcards
If you want to advertise a partial octet (subnet), you need to use wildcards. means all octets match exactly means that the first three match exactly, but the last octet can be any value After that, you must remember your block sizes…. This slides introduces the wildcards used in OSPF. These wildcards will also be used in access-list configurations. A 0 octet in the wildcard mask indicates that the corresponding octet in the network must match exactly. On the other hand, a 255 indicates that you don’t care what the corresponding octet is in the network number. A network and wildcard mask combination of would match only, and nothing else. This is really useful if you want to activate OSPF on a specific interface in a very clear and simple way. If you insist on matching a range of networks, the network and wildcard mask combination of would match anything in the range – Because of this, it’s simpler and safer to stick to using wildcard masks of and identify each OSPF interface individually.

195 Wildcard The wildcard address is always one less than the block size….
/30 = /28 = /27 = /26 = This slides shows how to find a wildcard that can be used to configure a subnet in an octet.

196 Wildcard Configuration of the Lab_B Router
You need to understand wildcard configuration. Configure the Lab_B router using wildcards: Router ospf 1 Network area 0 Network area 0 Network area 0 NOTE: to remove a bad entry, use the following example: Router(config)#router ospf 1 Router(config-router)#no network area 0 Router(config-router)#network area 0 Lab_B E0: /24 S0: /30 S1: /30 Lab_C E0: /24 S1: /30 Lab_A E0: /24 S0: /30

197 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 7: Layer 2 Switching

198 The CCNA exam topics covered in this chapter include the following:
Technology Describe the Spanning Tree process

199 Layer 2 Switching Purposes for using switching
Breaks up collision domains Cost-effective, resilient internetwork Purpose for Spanning-Tree Protocol (STP) Stops loops in layer 2 switched networks

200 Before Layer 2 Switching

201 Switched LANs

202 Typical Switched Designs

203 One link to the server!

204 Switching Services Layer 2 switching provides:
Hardware-based bridging (ASIC) Wire speed Low latency Low cost

205 Limitations of Layer 2 Switching
Must break up the collision domains correctly. Make sure that users spend 80 percent of their time on the local segment. Switches do not break up broadcast domains by default.

206 Bridging vs. LAN switching

207 Three Switch Functions at Layer-2

208 Empty MAC table

209 How Switches Learn Hosts’ Locations

210 Switching Loops

211 Switching Loop Problems

212 Spanning-Tree Protocol (STP) Solves Switching loops at layer 2
Root port Designated port Port cost Nondesignated port Forwarding port Block port STP Root Bridge BPDU Bridge ID Nonroot Bridge

213 Spanning-Tree Operations
Selecting the root bridge Selecting the designated port

214 Switching Loops

215 Spanning-Tree Port States
Blocking Listening Forwarding Disabled

216 Spanning-Tree Example

217 LAN Switch Types Cut-through (FastForward)
FragmentFree (modified cut-through) Store-and-forward

218 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 8: Virtual LANs (VLANs)

219 The CCNA exam topics covered in this chapter include the following:
Implementation & Operation • Configure a switch with VLANS and inter-switch communication • Implement a LAN • Customize a switch configuration to meet specified network requirements Troubleshooting • Perform LAN and VLAN troubleshooting

220 Virtual LANs (VLANs) Definition: A logical grouping of network users and resources connected to administratively defined ports on a switch. Smaller broadcast domains Organized by: Location Function Department Application or protocol

221 Switches

222 Features of VLANs Simplify network management
Provides a level of security over a flat network Flexibility and Scalability

223 Broadcast Control Broadcasts occur in every protocol
Bandwidth & Broadcasts Flat network VLANs & Broadcasts

224 Flat Network Structure

225 Security Flat network problems VLANs

226 Flexibility & Scalability
Layer-2 switches only read frames Can cause a switch to forward all broadcasts VLANs Essentially create broadcast domains Greatly reduces broadcast traffic Ability to add wanted users to a VLAN regardless of their physical location Additional VLANs can be created when network growth consumes more bandwidth

227 Switched Network

228 Physical LANs Connected To A Router

229 VLANs Remove The Physical Boundary

230 VLAN Memberships Static VLANs Dynamic VLANs
Typical method of creating VLANs Most secure A switch port assigned to a VLAN always maintains that assignment until changed Dynamic VLANs Node assignment to a VLAN is automatic MAC addresses, protocols, network addresses, etc VLAN Management Policy Server (VMPS) MAC address database for dynamic assignments MAC-address to VLAN mapping

231 Identifying VLANs Access links Trunk links
A link that is part of only one VLAN Trunk links Carries multiple VLANs

232 Identifying VLANs (cont.)

233 Frame Tagging Definition: A means of keeping track of users & frames as they travel the switch fabric & VLANs User-defined ID assigned to each frame VLAN ID is removed before exiting trunked links & access links

234 VLAN ID Methods Inter-Switch Link (ISL) Cisco proprietary
FastEthernet & Gibabit Ethernet only IEEE 802.1q Must use if trunking between Cisco & non-Cisco switch

235 Inter-Switch Link (ISL) Protocol
Definition: A means of explicitly tagging VLAN information onto an Ethernet frame Allows VLANs to be multiplexed over a trunk line Cisco proprietary External tagging process

236 VLAN Trunk Protocol (VTP)
Purpose: to manage all configured VLANs across a switch internetwork & maintain consistency Allows an administrator to add, delete, & rename VLANs

237 VTP Benefits Benefits A VTP server must be created to manage VLANs
Consistent configuration Permits trunking over mixed networks Accurate tracking Dynamic reporting Plug-and-Play A VTP server must be created to manage VLANs

238 VTP Modes

239 VTP Modes of Operation Server Default for all Catalyst switches
Minimum one server for a VTP domain Client Receives information + sends/receives updates Cannot make any changes Transparent Does not participate in a VTP domain but forwards VTP advertisements Can add/delete VLANs Locally significant

240 Router with Individual VLAN associations

241 Routing Between VLANs

242 Configuring VLANs Creating VLANs Assigning Switch Ports to VLANs
Configuring Trunk Ports Configuring Inter-VLAN routing

243 Configuring VTP Switches are configured to be VTP servers by default.

244 InterVLAN Configuration Example

245 Example 2

246 Example 3

247 Example 4

248 Configuring Switching In Our Sample Internetwork

249 2950c

250 2950b

251 Setting Up Trunking

252 Inter-VLAN communication

253 CCNA: Cisco Certified Network Associate Study Guide
CHAPTER 9: Managing a Cisco Internetwork

254 The CCNA exam topics covered in this chapter include the following:
Implementation & Operation Manage system image and device configuration files Troubleshooting Utilize the OSI model as a guide for systematic network troubleshooting Perform LAN and VLAN troubleshooting Troubleshoot a device as part of a working network Troubleshoot IP addressing and host configuration

255 Cisco Router Components
Bootstrap Brings up the router during initialization POST Checks basic functionality; hardware & interfaces ROM monitor Manufacturing testing & troubleshooting Mini-IOS Loads Cisco IOS into flash memory RAM Holds packet buffers, routing tables, & s/w Stores running-config

256 Cisco Router Components
ROM Starts & maintains the router Flash Memory Holds Cisco IOS Not erased when the router is reloaded NVRAM Holds router (& switch) configurations Configuration Register Controls how the router boots up

257 Boot Sequence 1: Router performs a POST
2: Bootstrap looks for & loads the Cisco IOS 3: IOS software looks for a valid configuration file 4: Startup-config file (from NVRAM) is loaded If startup-config file is not found, the router will start the setup mode

258 Configuration Registers
16-bit software written into NVRAM Loads from flash memory & looks for the startup-config file Configuration Register Bits 16 bits read 15-0, from left to right default setting: 0x2102 Register Bit number Binary NOTE: 0x means the digits that follow are in hexadecimal

259 Configuration Meanings

260 Boot Field Meanings

261 Checking the Register Value
Router#sh version Cisco Internetwork Operating System Software IOS ™ C2600 Software (C2600-I-M), Version 12.0(3)T3 RELEASE SOFTWARE (fc1) [output cut] Configuration register is 0x2102

262 Changing the Configuration Register
Force the system into the ROM monitor mode Select a boot source & default boot filename Enable or disable the Break function Set the console terminal baud rate Load operating software from ROM Enable booting from a TFTP server

263 Changing the Configuration Register
Router(config)#config-register 0x0101 Router(config)#^Z Router#sh ver Configuration register is 0x2102 (will be 0x0101 at next reload)

264 Recovering Passwords 1: Boot the router & interrupt the boot sequence by performing a break 2: Change the configuration register to turn on bit 6 (0x2142) 3: Reload the router 4: Enter the privileged mode 5: Copy the startup-config to running-config 6: Change the password 7: Reset the configuration register to the default value 8: Reload the router

265 Recovering Passwords 1: Boot the router & interrupt the boot sequence by performing a break using the Ctrl+Break key combination. You may need to upgrade your version of hyper-terminal in order for this to work successfully.

266 Recovering Passwords 2: Change the configuration register to turn on bit 6 (0x2142) rommon>confreg 0x2142 You must reset or power cycle for new config to take effect 3: Reload the router Type reset The router will reload & ask if you want to enter setup mode Answer NO 4: Enter the privileged mode Router>enable Router#

267 Recovering Passwords 5: Copy the startup-config to running-config
Router#copy startup-config running-config 6: Change the password Router#config t Router(config)#enable secret cisco 7: Reset the configuration register to the default value Router(config)#config-register 0x2102 8: Reload the router

268 Backing up & Restoring the Cisco IOS
Before you upgrade….. Copy the existing IOS to a TFTP host! Verify Flash Memory Router#sh flash System flash directory: File Length Name/status c2500-js bin [ bytes used, available, total] 16384K bytes of processor board System flash (Read ONLY) Router#

269 Backing up the Cisco IOS
#1: Ensure you have good connectivity to the TFPT host Router#ping #2: Copy the IOS from flash to the TFTP host Router#copy flash tftp The TFTP host must have a default directory specified

270 Restoring or Upgrading the Cisco IOS
#1: Ensure you have good connectivity to the TFTP host Router#ping #2: Copy the IOS from the TFTP host to flash Router#copy tftp flash The TFTP host must have a default directory specified Copying the IOS from a TFTP host to flash requires a router reboot

271 Backing up the Configuration
1: Verify the Current Configuration Router#sh run 2: Verify the Stored Configuration Router#sh start Verify available memory 3: Copy running-config to NVRAM Router#copy run start 4: Copy running-config to a TFTP host Router#copy run tftp A second backup

272 Restoring the Configuration
Used when… You need to copy the startup-config to the running-config Errors made in editing the running-config Changes made at the TFTP host need to be copied to the running-config or startup-config Router#copy tftp run or Router#copy tftp start NOTE: The configuration file is ASCII. Any text editor will enable changes Erasing the Configuration Router#erase startup-config Note: When the router reboots it will be in setup mode

273 Using Cisco Discovery Protocol (CDP)
A Cisco proprietary protocol Designed to collect information about directly attached & remote devices Hardware information Protocol information Useful in troubleshooting & documenting the network

274 Getting CDP Timers & Holdtime Information
Configuration CDP Timer: How often CDP packets are transmitted to all active interfaces CDP Holdtime: The amount of time that the device will hold packets received from neighbor devices Router#sh cdp Global CDP information Sending CDP packets every 60 seconds Sending a holdtime value of 180 seconds Router#config t Router(config)#cdp timer 90 Router(config)#cdp holdtime 240

275 Getting Neighbor Information
Shows information about directly connected devices CDP packets are not passed through a Cisco switch Can only see what is directly attached Router#sh cdp nei or Router#sh cdp neighbor detail Detailed information; hostname, IP address, etc

276 Getting Interface Traffic & Port Information
Interface Traffic Information: CDP packets sent & received Errors with CDP Router#sh cdp traffic Port & Interface Information: Encapsulation on the line Timer & Holdtime for each interface Router#sh cdp interface

277 Using Telnet A virtual terminal protocol Part of the TCP/IP suite
Allows connections to remote devices Gather information Run programs Note: The VTY passwords must be set on the routers

278 Using Telnet Setting VTY passwords: Router#config t
Router(config)#line vty 0 4 Router(config)#login Router(config)#password cisco Router(config)#^Z Router# Trying … Open User Access Verification Password: RouterB>

279 Using Telnet Remember…. Setting VTY password:
VTY password is the user mode (>) password - not the enable mode (#) password With no enable/enable secret password set, the following happens: RouterB>en % No password set RouterB> This equates to good security! Setting VTY password: Router#config t Router(config)#line vty 0 4 Router(config)#login Router(config)#password cisco Router(config)#^Z Router# Trying … Open User Access Verification Password: RouterB>

280 Telnet Commands Telnetting into Multiple Devices
Ctrl+Shift+6 (release) X Checking Telnet Connections Router#sh sessions Checking Telnet Users Router#sh users Closing Telnet Sessions RouterB>exit RouterB>disconnect

281 Resolving Hostnames To use a hostname rather than an IP address to connect to a remote host a device must be able to translate the hostname to an IP address Build a host table on each router Build a Domain Name System (DNS) server

282 Building a Host Table Provides name resolution only on the router on which it is built [ip host name tcp_port_number ip_address] Router(config)#ip host RouterB Router(config)#ip host switch Router#sh hosts Default TCP port number: 23 Router#RouterB RouterB#(Ctrl+Shift+6) (X) Router#switch

283 Using DNS to Resolve Names
Used when you have many devices on your network Making DNS work… ip domain-lookup Turned on by default ip name-server Sets the IP address of the DNS server (up to 6 each) ip domain-name Appends the domain name to the hostname Ex: RouterA.neversail.navy.mil

284 Checking Network Connectivity
Ping Displays the minimum, average, & maximum times it takes for aping packet to find a specified system + return Router#ping RouterB Trace Shows the path a packet takes to get to a remote device Router#trace RouterB


Download ppt "CCNA: Cisco Certified Network Associate Study Guide"

Similar presentations


Ads by Google