Advanced Networking notes 2024-2025
Advanced Networking notes 2024-2025
Interfaces
The Processor (CPU)
Internetwork Operating System (IOS)
RXBoot Image
RAM
NVRAM
ROM
Flash memory
Configuration Register
Cisco Router's Interfaces
Interfaces allow us to use the router. They are the various serial
ports or Ethernet ports, which we use to connect the router to our LAN.
Let's consider a device Cisco 891F
Earth ground
⑤ USB port ⑫
connection
Kensington security
⑥ V.92 backup ⑬
slot
Fast Ethernet WAN Port serves to make backups and load balancing.
Gigabit Ethernet (GE) is the evolution beyond Fast Ethernet. It is a lot faster.
The "Gigabit" stands for 1 gigabit of data per second, or Gbps. This
translates to 1000 Mbps, which you may recognize as being fast.
Having two WAN ports, a router can be configured to operate with Dual WAN.
This means we can select two ISP connections to our router, a primary WAN
connected through the GE (Gigabit Ethernet) Port and a secondary WAN
connected through FE (Fast Ethernet) port.
There are two modes we can choose to enable when using Dual WAN.
Failover and Failback Mode
When the primary WAN (at GE Port) has been detected and is connected to
the internet by using a physical cable, our connection will revert to the
Primary WAN as long as failback has been enabled.
When the Load Balance Mode is enabled, we can distribute the load between
the Primary WAN (at GE Port) and Backup WAN (at FE). By enabling routing
rules and adding rules appropriately, we can route requests from a particular
device through the Primary WAN or Secondary (Backup) WAN.
An SFP port connection enables the transfer of data between two faraway
network devices via an SFP transceiver and appropriate cabling. In other
words, the port and its corresponding SFP transceiver allow the two network
devices to communicate with each other over an extended distance.
SFP socket enables interfacing two faraway network devices using a fiber
optic or copper networking cable. SFP is hot-plugged. A hot-plugged (also
known as hot-swappable) device is a device that is added or removed to the
system without having to shut down the operating system or to power off the
system.
Two new features are available to take advantage of these USB ports: USB
eToken device support and USB flash support.
V.92 provides dial backup and remote management functions if the main
WAN link fails.
The AUX port is used for dial-in access to the router. The AUX port is connected
to a modem, which in turn is connected to the phone line. A user with a PC, connected to
a modem and phone line, can then dial the phone number of the modem
connected with the router and get access to the router console remotely.
A factory reset button can be used to completely wipe the device. Factory
resetting our Cisco router will remove all of our current settings, including
our network name and WiFi password.
2. The IOS
The IOS is the main operating system on which the router runs. The IOS is
loaded upon the router's bootup. It usually is around 2 to 5MB in size, but
can be a lot larger depending on the router series.
The RXBoot image (also known as Bootloader) is nothing more than a "cut-
down" version of the IOS located in the router's ROM (Read Only Memory). If
you have no Flash card to load the IOS from, you can configure the router to
load the RXBoot image, which would give you the ability to perform minor
maintenance operations and bring various interfaces up or down.
4. The RAM
The RAM, or Random Access Memory, is where the router loads the IOS and
the configuration file. It works exactly the same way as your computer's
memory, where the operating system loads along with all the various
programs.
The NVRAM is a special memory place where the router holds its
configuration. When you configure a router and then save the configuration,
it is stored in the NVRAM.
The ROM is used to start and maintain the router. It contains some code, like
Bootstrap and POST, which helps the router do some basic tests and bootup
when it's powered on or reloaded. You cannot alter any of the code in this
memory as it has been set from the factory and is Read Only.
7. Flash Memory
The Configuration Register determines if the router is going to boot the IOS
image from its Flash, TFTP server or just load the RXBoot image. This register
is a 16-bit register, in other words has 16 zeros or ones. A sample of it in Hex
would be the following: 0x2102 and in binary is: 0010 0001 0000 0010.
Assuming a traffic flow consisting of five packets all going to the same
destination, with process switching, each packet must be processed by the
CPU individually.
Assuming a traffic flow consisting of five packets all going to the same
destination, with fast switching, notice how only the first packet of a flow is
process-switched and added to the fast-switching cache. The next four
packets are quickly processed based on the information in the fast-switching
cache.
It's also possible to find the default gateway by the command netstat -r
either on Windows or Linux.
Default gateways are actually routing systems tasked with ensuring the
request is sent to the correct destination, even if the sender and receiver
practice different network protocols.
A computer that has an IP address and a Subnet Mask can talk directly with
other computers that share the same Subnet Mask and have IP addresses
within the same IP network. In fact, when a node sends a packet to another
node on the same network the gateway address is not used.
But what about a computer that wants to talk with a node that has an IP
address on another IP network?
To find its local router the computer needs a so-called Default Gateway,
sometimes simply called a Gateway. A Default Gateway is always a router
that can connect to more than one IP network and can route traffic between
those IP networks. The router will have its own IP address on each IP network
that it connects to.
A computer can only talk with other IP addresses within its own IP network.
So for the computer to be able to communicate via a router, at least one of
the router’s IP addresses must belong to the same IP network as the
computer.
When the router hands out an IP address and a Subnet Mask to the computer
it also sends out its own IP address to the computer and tells the computer
to use that address as its Default Gateway.
With the help of the Default Gateway address, the computers can then find
their way to all other IP networks in the whole world. The router takes over
responsibility for routing the traffic towards the destination on the Internet.
If you are forwarding traffic in the same network, you don’t use the default
gateway. The host device uses ARP to find the MAC address corresponding
to the local IP address for which it is trying to communicate.
v. Console access
Every Cisco router or switch has a console port (also known as the
management port) on its backside. The console port is used to connect a
computer directly to a router or switch and manage the router or switch
since there is no display device for a router or switch.
The console port is the only way to initially configure routers before setting
up virtual teletypes (VTY) i.e. SSH and Telnet.
SSH or telnet allows us to connect to the router from anywhere on the
network without any need for a console cable.
A special type of cable, known as rollover cable is used to connect the
Serial/COM port of the computer to the router or switch console port. One
end of the cable is RJ49 type while the other end is DB9.
DB9 Connector to RJ45 Cat5 Ethernet Adapter Cable
Fig: DB9 Connector to RJ45 Cat5 Ethernet Adapter Cable for Routers
Network
Rollover wire cable
https://www.youtube.com/watch?
v=jIRRsIgfHU8&t=121s&ab_channel=DavidBombal
Step 1: Connect the computer to the router or switch using a standard 9-pin
serial cable.
On Windows PC:
Let's look for a COM port to input to PuTTY. In fact, when connecting a
console cable between a router/switch into a computer it assigns a COM port
number to a computer. That COM port is different from COM1.
Fig1: choosing a Serial port in Device Manager
On the picture above COM4 is to be used for the Serial line to make the
connection.
Another way to find a COM port for the console cable is to open the CMD
terminal and type the command mode. Then go looking for the COM# other
than COM1.
On the Linux PC
When we use Linux we do not necessarily need to use puTTY for console
access.
Then...
sudo screen /dev/ttyUSB0
https://www.youtube.com/watch?
v=vUp9TergyhQ&ab_channel=MichaelSt.John
Start By Setting it up
sudo minicom -s
Press Enter
Press the down arrow 3 times to get to Save setup as dfl (“Save as default”)
Press Enter
Press Enter
2.Type ls -l /dev/ttyUSB0
Then...
Step 1: Create the loopback interface using the interface loopback number
in global configuration mode.
Step 2: Add a description. Although optional, it is a necessary component
for documenting a network.
R1(config-if)# exit
R1(config)#
A loopback interface is always enabled and therefore does not require a no-
shutdown command. Multiple loopback interfaces can be enabled on a
router. The IPv4 address for each loopback interface must be unique and
unused by any other interface.
The IPv4 loopback address is 127.0.0.0/8 and the most commonly used
loopback address is 127.0.0.1
The IPv6 loopback address is::1
1. Routing Decisions
A primary function of a router is to determine the best path to use to send
packets. To determine the best path, the router searches its routing table for
a network address that matches the destination IP address of the packet.
The logic flowchart in the figure below illustrates the router packet-
forwarding decision process.
2. Best Path
Determining the best path involves the evaluation of multiple paths to the
same destination network and selecting the optimum or shortest path to
reach that network. Whenever multiple paths to the same network exist,
each path uses a different exit interface on the router to reach that network.
Dynamic routing protocols typically use their own rules and metrics to build
and update routing tables. The routing algorithm generates a value, or a
metric, for each path through the network. Metrics can be based on either a
single characteristic or several characteristics of a path.
The following lists some dynamic protocols and the metrics they use:
- Open Shortest Path First (OSPF): Cisco routers use a cost based on
cumulative bandwidth from source to destination
- Enhanced Interior Gateway Routing Protocol (EIGRP): Bandwidth,
delay, load, reliability
3. Load Balancing
What happens if a routing table has two or more paths with identical
metrics to the same destination network?
When a router has two or more paths to a destination with equal cost
metrics, then the router forwards the packets using both paths equally. This
is called equal cost load balancing. The routing table contains the single
destination network, but has multiple exit interfaces, one for each equal cost
path. The router forwards packets using the multiple exit interfaces listed in
the routing table.
By default, Cisco routers can load balance up to four equal cost paths.
The maximum number of equal cost paths depends on the routing protocol
and IOS version.
EIGRP supports equal cost load balancing and is also the only routing
protocol to support unequal cost load balancing. Unequal cost load
balancing is when a router distributes traffic over network interfaces, even
those that are different distances from the destination address.
NOTE: EIGRP supports unequal cost load balancing by using the variance
command.
https://www.youtube.com/watch?v=qA8_JxBy5-
Q&ab_channel=Learnet
4. Administrative Distance
RIP chooses a path based on hop count, whereas EIGRP chooses a path
based on its composite metric.
The AD represents the "trustworthiness" of the route; the lower the AD,
the more trustworthy the route source. For example, a static route has an AD
of 1, whereas an EIGRP-discovered route has an AD of 90. Given two
separate routes to the same destination, the router chooses the route with
the lowest AD. When a router has the choice of a static route and an EIGRP
route, the static route takes precedence. Similarly, a directly connected
route with an AD of 0 takes precedence over a static route with an AD of 1.
The table below lists various routing protocols and their associated ADs.
Connected 0
Static 1
External BGP 20
Internal EIGRP 90
IGRP 100
OSPF 110
RIP 120
Unknown 255
Note that the routing tables are not specific to Cisco devices. Even your
Windows operating system has a routing table that can be displayed using
the route print command.
This section describes how to use the setup command facility to configure a
hostname for the router, set passwords, and configure an interface for
communication with the management network.
If the following messages appear at the end of the startup sequence, the
setup command facility has been invoked automatically:
The setup command facility prompts you for basic information about your
router and network, and it creates an initial configuration file. After the
configuration file is created, you can use the CLI or Security Device Manager
to perform additional configuration.
The prompts in the setup command facility vary, depending on your router
model, the installed interface modules, and the software image. The
following example and the user entries (in bold) are shown as examples only.
Note: If you make a mistake while using the setup command facility, you
can exit and run the setup command facility again. Press Ctrl-C, and enter
the setup command at the privileged EXEC mode prompt (Router#).
Step 2: When the following messages appear, enter yes to enter basic
management setup:
At any point you may enter a question mark '?' for help.
Step 3: Enter a hostname for the router (this example uses Router):
Step 5: Enter an enable password that is different from the enable secret
password. This password is not encrypted (less secure) and can be seen
when viewing the configuration:
Step 8: Choose one of the available interfaces for connecting the router to
the management network:
Step 10: The configuration is displayed. You have nothing to do here. The
following information ensues from hitting enter after entering the subnet
mask on precedent step.
Step 11: Respond to the following prompts. Enter 2 to save the initial
configuration.
Building configuration...
Router>
Step 12: Verify the initial configuration
•To verify that the interfaces are operating correctly and that the interfaces
and line protocol are in the correct state i.e. up or down, enter the command
show interfaces
•To display a summary status of the interfaces configured for IP, enter the
command
•To verify that you configured the correct hostname and password, enter
the command.
Make sure you're at the privileged EXEC mode prompt (Router# and
not Router>). To go to EXEC mode just enter either the command en or the
command enable
show configuration
show inventory: this command will display the information regarding the
module of the router
Show version
To exit the EXEC mode you can simply enter the command:
Exit
Now that we have completed and verified the initial configuration, we can
configure the static route.
DHCP configuration
Sequence of Commands
Go up to configure terminal
Router>en
Router# conf t
Configure the interface on the student-block
Router(config)# int Gi0/0
Router(config-if)# ip add 192.168.8.1 255.255.255.0
Router(config-if)# no sh
Router(config-if)#exit
R6(config-if)#exit
R6(config)#ip route 192.168.1.0 255.255.255.0 Fa0/0 or
R6(config)#ip route 192.168.1.0 255.255.255.0 192.168.3.1 or
R6(config)#ip route 192.168.1.0 255.255.255.0 192.168.3.1
R6(config)#
Static routing is when the administrator manually configures a router to
send traffic for particular destinations in preconfigured directions.
R1# conf t
R1(config)# ip route 203.0.113.0 255.255.255.0 10.0.0.6
R1(config)# ip route 203.0.113.100 255.255.255.255 10.0.0.2 // here we specify the server
//R1(config)# ip route 203.0.113.100 255.255.255.255 10.0.0.2 permanent (This can be
configured permanently by adding the keyword “permanent”)
R1(config)#end
Floating static route configuration
A router has two static route entries but prefers one (primary) and the
second acts as a backup
If the primary static route can’t be used, it will be deleted from the routing
table and the second static route will be installed.
R1# conf t
R1(config)#end
Q: What is the difference between the default route and the default
gateway?
Reference: https://www.ciscopress.com/articles/article.asp?
p=2180209&seqNum=7
3. Apply class full and classless routing protocol
3.1. Class full IP addressing
IP Header Classes:
Class Address Subnet Exampl Leadin Max Application
Range masking e IP g bits number of
networks
IP Class 128 to 191 255.255.0.0 128.1.1.1 16 16384 Used for medium size
B network.
IP Class 192 to 223 255.255.255 192.1.11. 24 2097157 Used for local area network.
C .0 1
Note:
1. Class A addresses 127.0.0.0 to 127.255.255.255 cannot be
used and is reserved for loopback and diagnostic functions or is
used for internal testing on the local machine.
2. Class B addresses 169.254.1.0 to 169.254.254.255.
Automatic Private IP Addressing (APIPA), DHCP clients
automatically configure an IP address and subnet mask when a
DHCP server is not available. The device chooses its own IP
address in the range 169.254.1.0 through to 169.254. 254.255.
3. 0.0.0.0 address indicates the client isn't connected to a TCP/IP
network, and a device may give itself 0.0.0.0 address when it is
offline.
Loopback address:
Written as ::1 also known as localhost (127 zeros)
IPv6 addressing in Packet tracer
Considering the below network:
-Enable the communication between PC0 and PC2 or PC0 and PC3
Assigning the IPV6 on the router’s interfaces:
Router# configure terminal
Router(config)# ipv6 unicast-routing //First enable unicast routing on the
router
Router(config)#interface g0/0
Router(config-if)#ipv6 enable //Automatically the link local address is assigned to the router
Router(config-if)# ipv6 address 2003:DB0:AAAA:A::1/64
Router(config)#interface g0/1
Router(config-if)#ipv6 enable //Automatically the link local address is assigned to the router
Router(config-if)# ipv6 address 2003:DB0:AAAA:B::1/64
Note: For PC0, PC1, PC2, and PC3 enable autoconfiguration
Verification: Ping PC2 in PC0
Router#show ipv6 interface G0/0
Router#show ipv6 interface brief
3.2. Review of Sub-netting
Subnetting is a method of dividing a single physical network into logical
sub-networks (subnets). Its purpose is to divide a huge network into a
collection of smaller, interconnected networks to reduce traffic.
Subnetting is aimed at achieving the following targets in the network:
o Reallocating IP Addresses
o Improving Network Security
o Improves Network Speed
o Efficiency
Disadvantages of Subnetting
Subnetting increases the network's complexity.
More subnets mean more IP addresses are wasted because each
subnet has its own network address and broadcast address.
As we increase more subnets in the network, the maintenance process
becomes challenging.
The easy way of solving subnetting questions is to use a table that contains
subnet, host, and subnet mask (in shortened format) or you can use some
mathematical calculations as usual
For example:
1. With /24 network
Subne 1 2 4 8 16 32 64 128 256
t
IPs 256 128 64 32 16 8 4 2 1
Subne /24 /25 /26 /27 /28 /29 /30 /31 /32
t Mask
Questions:
1. What is the Network ID, Broadcast Address, First Usable IP, or Last
Usable IP on the subnetwork that the node 192.168.1.15/26 belongs
to?
Note that for getting a Network ID you use AND operation between
given IP and subnet Mask.
Answer:
Network ID (First IP in the subnet): 192.168.1.0
Broadcast address (last IP in the subnet): 192.168.1.63
First Usable IP (the address after the network ID): 192.168.1.1
Last Usable IP (the address before the broadcast address):
192.168.1.62
2. How many subnets and hosts per subnet can you get from the network
192.168.1.0 255.255.255.224?
Answer:
Subnet Bits = 2^3 = 8
Host Bits = 2^5-2 = 30
3. Given the following IP address 192.168.64.0/24, create three equal
separate networks of RCA. One for the Administration office, the other
for students, and the last for Teachers. List each network ID, subnet
mask, Host ID range, number of usable host addresses, and broadcast
ID for each created network.
Answer:
4. Suppose you have a class B ID: 172.16.0.0/16, and you are requested
to create 4 new subnets.
a. What is the new subnet?
b. How many usable host IPs for each subnet?
c. List each network I D, the usable IP range, and Broadcast IP
for each subnet.
Answer:
New subnet mask: CIDR=/18=255.255.192.0
Block size=256-192=64 on the second Octet
Host per subnet= 2^14
Usable host Per subnet= 2^14-2
Question:
Suppose there is an administrator that has four departments to manage.
These are the sales and purchase department with 120 computers, the
development department with 50 computers, the accounts department
with 26 computers and the management department with 5 computers.
If the administrator has IP 192.168.1.0/24, department-wise IPs can be
allocated by following these steps:
1. For each segment select the block size that is greater than or equal to
the actual requirement which is the sum of host addresses, broadcast
addresses, and network addresses. Make a list of subnets possible:
Table of possible subnets list
1 The size is variable and it can have a All subnets are of equal size
variable number of hosts thus making the IP and have an equal number of
addressing more efficient by allowing a hosts
routed system of different mask lengths to
suit requirements.
HR: 57 devices
Sales: 100 devices
IT: 12 devices
Finance: 25 devices
Question 3: The network consists of three local area networks: LAN 1, LAN
2, and LAN3. These three LANs are connected with three serial links: Link A,
link B, and link C. With an ID range - 192.168.4.0/24, please design an IP
plan for the network using VLSM. LAN1 has 25 hosts, LAN2 has 55 hosts,
LAN 3 has 12 hosts and Links A,B, and C have 2 hosts each.
Final answer:
3.4. SUMMARIZATION/SUPERNETTING
Summarization is a reverse process of subnetting. In subnetting, you
divide one large network into subnets but in summarization, you will
combine small subnets to make large network
Purpose of using summarization:
Reduce the size of a routing table. So that router can analyze the
routing table faster.
It will be easy for the router to send a summary route rather than
individual subnets.
Example:
Consider an ISP providing services to homes. It might create a /30
network for every home, each having only one assignable host identifier.
It might create a /16 super-net of all the addresses, broken out further
into regional /24 super-nets. Routers outside the ISP infrastructure use /16
to send packets in; the ISP uses the /24s to push packets toward the
appropriate regional routers, which use the /30s to reach the home
networks.
Route Summarization
A summarized route can increase the performance of a router by limiting
the routing table and reducing routing traffic.
Consider the following question:
Question1: You have a router with four different LANs attached:
Network 1 = 192.168.0.0/24
Network 2 = 192.168.1.0/24
Network 3 = 192.168.2.0/24
Network 4 = 192.168.3.0/24
How would you summarize these networks with a single statement?
Answer:
Step 1: Convert all four IP addresses to binary and align them in a list:
Decimal Binary
192.168.0 11000000.10101000.00000000.000
.0 00000
192.168.1 11000000.10101000.00000001.000
.0 00000
192.168.2 11000000.10101000.00000010.000
.0 00000
192.168.3 11000000.10101000.00000011.000
.0 00000
Step 2: In the binary section of the grid, count the common bits from left to
right. In this example, the first two octets are identical, so we know the first
16 bits are common across all four networks. In addition, the first six bits of
the third octet are also common. It may be easier to draw a line through all
four binary numbers at the point where the bit pattern changes.
Step 3: Count the number of common bits in the mask. In this example,
the first 22 bits are common across all four networks. The answer is
192.168.0.0/22.
Question2: Consider the following router which has six different network:
1. Network 1 = 10.10.0.0/16
2. Network 2 = 10.11.0.0/16
3. Network 3 = 10.12.0.0/16
4. Network 4 = 10.13.0.0/16
5. Network 5 = 10.14.0.0/16
6. Network 6 = 10.15.0.0/16
How would you summarize these networks with a single statement?
Answer:
Decim Binary
al
10.10.0. 00001010.00001010.00000000.000
0 00000
10.11.0. 00001010.00001011.00000000.000
0 00000
10.12.0. 00001010.00001100.00000000.000
0 00000
10.13.0. 00001010.00001101.00000000.000
0 00000
10.14.0. 00001010.00001110.00000000.000
0 00000
10.15.0. 00001010.00001111.00000000.000
0 00000
The first octet is identical and so are the first five bits of the second octet.
The answer is 10.8.0.0/13
Step 2. Count the number of far-left matching bits to determine the mask for the summary route.
Step 3. Copy the matching bits and then add zero bits to determine the summarized network address.
- RIPv1 and IGRP, are Classful (legacy protocols) and are only used in
older networks
- RIPv2, EIGRP, OSPF, IS-IS, and BGP are classless routing protocol
RIPv1 routing protocol
i. RIPv1 Operation
RIPv1 stands for Routing Information Protocol version 1. It uses Classful
routing. The regula678ir routing updates do not carry subnet details and do
not support Variable Length subnet masks (VLSM). This is the drawback of
RIPv1, due to which it is not possible to have various-sized subnets in the
same network class.
Its main functions are:
To find out the most effective way to route data on a network
To avoid routing loops
The main advantage of RIP is that its bandwidth utilization is very high and it
updates every 30 seconds. However, a maximum of 16 routers can be
composed, as it supports only 15 hop counts.
RIPv2 routing protocol
RIPv2 stands for hybrid routing protocol version 2. It is a distance-vector
routing protocol defined in RFC 1723 and has the characteristics of link-state
routing protocols. It is a classless routing protocol which means it involves
the subnet mask having the network addresses in the routing updates.
ii. RIPv1 Configuration
Network diagram below has 3 different network LAN 1: 192.168.1.0/24, LAN
2: 192.168.2.0/24 and LINK between routers: 10.10.0.0/30
b. Router1
Router>en
Router#config t
Router(config)#hostname Router1
Router1(config)#interf g0/1
Router1(config-if)#ip address 10.10.0.1 255.255.255.252 // First
interface
Router1(config-if)#no shutdown
Router1(config-if)#exit
Distance-vector protocol.
Uses UDP port 520.
Classful protocol (no support for VLSM or CIDR).
Metric is router hop count.
Maximum hop count is 15; unreachable routes have a metric of 16.
Periodic route updates broadcast every 30 seconds.
25 routes per RIP message.
Implements split horizon with poison reverse.
Implements triggered updates.
No support for authentication.
Administrative distance for RIP is 120.
Used in small, flat networks or at the edge of larger networks.
v. RIPv1 Troubleshooting
Most of the RIP troubleshooting issues are about missing routing information.
Cisco routers support two types of RIP authentication: plain text and MD5.
MD5 is the preferred method as it provides a higher level of security by
hashing the authentication key.
Configuring MD5 Authentication
1. Configure the key chain:
Router(config)# key chain RIP_KEY
Router(config-keychain)# key 1
Router(config-keychain-key)# key-string MySecretKey
Router(config-keychain-key)# exit
Router(config-keychain)# exit
2. Enable RIP authentication on the interface:
Router(config)# interface GigabitEthernet0/0
Router(config-if)# ip rip authentication mode md5
Router(config-if)# ip rip authentication key-chain RIP_KEY
Router(config-if)# exit
Note: The above authentication method is not supported by packet tracer
EIGRP routing protocol
Enhanced Interior Gateway Routing Protocol (EIGRP) is referred to as a
hybrid routing protocol because it has the characteristics of both distance-
vector and link-state protocols but now Cisco refers it as an advanced
distance vector protocol.
EIGRP is a classless routing protocol, meaning that it sends the subnet mask
of its interfaces in routing updates, which use a complex metric based on
bandwidth, load, reliability, MTU, and delay. By default, EIGRP uses
only bandwidth and delay.
The main features of EIGRP:
Support VLSM and dis-contiguous networks
Use Reliable Transport Protocol (RTP) for the delivery and
reception of EIGRP packets
Use the best path selection Diffusing Update Algorithm (DUAL),
guaranteeing loop-free paths and backup paths throughout the routing
domain
Discover neighboring devices using periodic Hello messages to
discover and monitor connection status with its neighbors
Exchange the full routing table at startup and send partial* triggered
updates thereafter (not full updates like distance-vector protocols)
and the triggered updates are only sent to routers that need the
information. This behavior is different from the link-state protocol in
which an update will be sent to all the link-state routers within that
area. For example, EIGRP will send updates when a new link comes up
or a link becomes unavailable
Supports multiple protocols: EIGRP can exchange routes for IPv4,
IPv6, AppleTalk and IPX/SPX networks
Load balancing: EIGRP supports unequal metric load balancing, which
allows administrators to better distribute traffic flow in their networks.
EIGRP use five types of packets to communicate:
Hello: used to identify neighbors. They are sent as periodic multicasts
Update: used to advertise routes, only sent as multicasts when
something is changed
Ack: acknowledges receipt of an update. In fact, Ack is Hello packet
without data. It is always unicast and uses UDP.
Query: used to find alternate paths when all paths to a destination
have failed
Reply: is sent in response to query packets to instruct the originator
not to recompute the route because feasible successors exist. Reply
packets are always unicast to the originator of the query
These packets are sent over TCP.
After hearing “Hello” from R1, R2 will respond with another “Hello” packet.
R2 will also send its routing table to R1 by “Update” packets. Remember that
R2 will send its complete routing table for the first time.
R1 will also send to R2 all of its routing table for the first time
Passive interface
Passive EIGRP interfaces do not send out or process EIGRP hellos, which
prevents EIGRP from forming adjacencies on that interface.
To configure an EIGRP interface as passive, you use the command passive-
interface interface-id under the EIGRP process for classic configuration.
For example:
Router# config t
Router(config)#router OSPF 1
Router(config-router)#passive-interface G0/0
Router(config-router)#end
The EIGRP term "active" refers to a route for which a router is currently
using the Query process to find a loop-free alternative route
EXAMPLE:
The following diagram has 5 different networks: LAN1-192.168.0.0/24,
LAN2-198.168.1.0/24, LAN3-192.168.7.0/24, LINK1 which interconnect R1
and R2-10.10.10.0/30 and LINK2 which interconnect R2 and R3:
172.31.10.0/30
c. Configuring interface on R2
Router>enable
Router#configure terminal
Router(config)#hostname R2
R2(config)#interface g0/1
R2(config-if)#ip address 10.10.10.2 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface g0/0
R2(config-if)#ip address 192.168.1.1 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface G0/2
R2(config-if)#ip address 172.31.10.2 255.255.255.252
R2(config-if)#no shutdown
d. Configuring interface on R3
Router>en
Router#configure terminal
Router(config)#hostname R3
R3(config)#interface g0/1
R3(config-if)#ip address 172.31.10.1 255.255.255.252
R3(config-if)#no shutdown
R3(config-if)#exit
R3(config)#interface g0/0
R3(config-if)#ip address 192.168.7.1 255.255.255.0
R3(config-if)#no shutdown
R2(config)#router eigrp 1
R2(config-router)#network 10.10.10.0 0.0.0.3
R2(config-router)#network 172.31.10.0 0.0.0.3
R2(config-router)#network 192.168.1.0 0.0.0.255
R2(config-router)#exit
Verifying EIGRP
show ip eigrp
show ip eigrp neighbors
show ip eigrp neighbors details
show ip eigrp interfaces
show ip route
Troubleshooting EIGRP issues
The autonomous system number should be the same, and make sure the
wild mask is well configured.
#show ip route
OSPF areas
A router that has interfaces in more than one area (for example area 0 and
area 1) is known as an Area Border Router (ABR). A router that connects an
OSPF network to other routing networks (for example, to an EIGRP network)
is called an Autonomous System Border Router (ASBR).
R1(config-if)#interface g0/0/1
R1(config-if)#ip address 10.10.10.1 255.255.255.252
R1(config-if)#no sh
ROUTER2:
Router>en
Router#config t
Router(config)#hostname R2
R2(config)#interface g0/0/0
R2(config-if)#ip address 10.10.10.2 255.255.255.252
R2(config-if)#no sh
R2(config-if)#
R2(config-if)#interface g0/0/1
R2(config-if)#ip address 10.10.10.5 255.255.255.252
R2(config-if)#no sh
ROUTER3:
Router>en
Router# config t
Router(config)# hostname R3
R3(config)#interface g0/0/0
R3(config-if)#ip address 10.10.10.6 255.255.255.252
R3(config-if)#no sh
R3(config-if)#
R3(config-if)#interface g0/0/1
R3(config-if)#ip address 192.168.100.1 255.255.255.0
R3(config-if)#no sh
STEP2: Configure OSPF on the routers
Router 1:
R1#config t
R1(config)#router OSPF 20
R1(config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(config-router)#network 192.168.200.0 0.0.0.255 area 0
R1(config-router)#
Router2:
R2>en
R2#config t
R2(config)#router OSPF 20
R2(config-router)#network 10.10.10.0 0.0.0.3 area 0
R2(config-router)#network 10.10.10.4 0.0.0.3 area 0
R2(config-router)#
Router3:
R3#config t
R3(config)#router OSPF 20
R3(config-router)#network 10.10.10.4 0.0.0.3 area 0
R3(config-router)#network 192.168.100.0 0.0.0.255 area 0
R3(config-router)#no sh
Verifying OSPF
- show ip ospf neighbor
R1(config)#interface s0/2/1
R1(config-if)#ip address 10.10.10.1 255.255.255.252
R1(config-if)#clock rate 64000
R1(config-if)#no sh
R1(config-if)#interface s0/2/0
R1(config-if)#ip address 10.10.10.5 255.255.255.252
R1(config-if)#clock rate 64000
R1(config-if)#no sh
R2(config-if)#interface s0/2/0
R2(config-if)#ip address 10.10.10.6 255.255.255.252
R2(config-if)#no sh
R2(config-if)#interface g0/0/0
R2(config-if)#ip address 192.168.230.1 255.255.255.0
R2(config-if)#no sh
R2(config)#interface loopback 0 //configure the Loopback address on Router 1
R2(config-if)#ip address 2.2.2.2 255.255.255.255
R2(config-if)#
ROUTER3:
Router>en
Router#config t
Router(config)#hostname R3
R3(config)#interface s0/2/1
R3(config-if)#ip address 10.10.10.9 255.255.255.252
R3(config-if)#no sh
R3(config-if)#interface s0/2/0
R3(config-if)#ip address 10.10.10.2 255.255.255.252
R3(config-if)#no sh
R3(config-if)#interface g0/0/0
R3(config-if)#ip address 192.168.200.1 255.255.255.0
R3(config-if)#no sh
STEP2: CONFIGURE THE OSPF on routers
ROUTER1:
R1#conf t
R1(config)#router OSPF 10
R1(config-router)#router-id 1.1.1.1
R1(config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(config-router)#network 10.10.10.4 0.0.0.3 area 0
R1(config-router)#network 192.168.100.0 0.0.0.255 area 0
R1(config-router)#end
ROUTER2:
R2(config)#
R2(config)#router OSPF 10
R2(config-router)#router-id 2.2.2.2
R2(config-router)#network 192.168.203.0 0.0.0.255 area 0
R2(config-router)#network 10.10.10.4 0.0.0.3 area 0
R2(config-router)#network 10.10.10.8 0.0.0.3 area 0
R2(config-router)#
ROUTER3:
R3(config)#
R3(config)#router OSPF 10
R3(config-router)#router-id 3.3.3.3
R3(config-router)#network 10.10.10.8 0.0.0.3 area 0
R3(config-router)#network 10.10.10.0 0.0.0.3 area 0
R3(config-router)#network 192.168.200.0 0.0.0.255 area 0
R3(config-router)# end
R3#write
Factor to choosing Dynamic routing protocol
- Scalability
- Vendor interoperability
- Familiarity
- Convergence
Convergence time: Amount of time a dynamic routing protocol takes
to reroute around a network failure
- Summarization: A routing protocol feature that allows multiple
routes to be represented by a single summary route
10.0.0.0/24
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24 => summary 10.0.0.0/22
4. Apply HSRP (Hot standby router protocol)
The Hot Standby Router Protocol (HSRP) is an IP routing redundancy protocol
designed to allow for transparent failover at the first-hop IP router. HSRP
provides high network availability because it routes IP traffic from hosts on
networks without relying on the availability of any single router.
HSRP (Hot Standby Router Protocol) is a member of the FHRP (First Host
Redundant protocol) family. It works only on Cisco routers.
FHRP family are HSRP (Hot Standby Router Protocol), VRRP (Virtual Router
Redundancy Protocol), and GLBP (Gateway Load Balancing Protocol).
HSRP States
HSRP consists of 6 states:
State Description
Learn The router has not determined the virtual IP address and has not
yet seen an authenticated hello message from the active router.
In this state, the router still waits to hear from the active router.
Listen The router knows both IP and MAC address of the virtual router
but it is not the active or standby router. For example, if there
are 3 routers in HSRP group, the router which is not in active or
standby state will remain in listen state.
Speak The router sends periodic HSRP hellos and participates in the
election of the active or standby router.
Stand In this state, the router monitors hellos from the active router and
by it will take the active state when the current active router fails
(no packets heard from active router)
Active The router forwards packets that are sent to the HSRP group. The
router also sends periodic hello messages
Hot Standby Router Protocol (HSRP) has 2-versions:
version 1: The messages are multicast at 224.0.0.2 and use the UDP port
1985. This version allows group numbers ranging from 0 to 255.
version 2 The messages are multicast at 224.0.0.102 and use the UDP port
1985. This version allows group numbers ranging from 0 to 4095.
ROUTER 1 Configuration:
Interface configuration:
Router>en
Router#conf t
Router(config)#hostname R1
R1(config)#interface s0/2/0
R1(config-if)#ip address 20.0.0.1 255.255.255.252
R1(config-if)#clock rate 64000
R1(config-if)#no sh
R1(config-if)#interface g0/0
R1(config-if)#ip address 10.0.0.1 255.255.255.0
R1(config-if)#no sh
RIP CONFIGURATION
R1#config t
R1(config)#router RIP
R1(config-router)#version 2
R1(config-router)#network 10.0.0.0
R1(config-router)#network 20.0.0.0
R1(config-router)#exit
R1(config)#do write
ROUTER 2 CONFIGURATION:
Router>en
Router#config t
Router(config)#hostname R2
R2(config)#interface g0/0
R2(config-if)#ip address 10.0.0.2 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#interface s0/2/0
R2(config-if)#ip address 30.0.0.1 255.255.255.252
R2(config-if)#no sh
R2(config-if)#clock rate 64000
R2(config-if)#exit
RIP configuration:
R2>en
R2#config t
R2(config)#router RIP
R2(config-router)#version 2
R2(config-router)#network 30.0.0.0
R2(config-router)#network 10.0.0.0
R2(config-router)#exit
R2(config)#
ROUTER 3 CONFIGURATION:
Router>en
Router#config t
Router(config)#hostname R3 //renaming the router
R3(config)#interface s0/2/0
R3(config-if)#ip address 20.0.0.2 255.255.255.252
R3(config-if)#no sh
R3(config-if)#interface s0/2/1
R3(config-if)#ip address 30.0.0.2 255.255.255.252
R3(config-if)#no sh
R3(config-if)#interface g0/0
R3(config-if)#ip address 40.0.0.1 255.255.255.0
R3(config-if)#no sh
R3(config-if)#
RIP Configuration:
R3#config t
R3(config)#router RIP
R3(config-router)#version 2
R3(config-router)#network 40.0.0.0
R3(config-router)#network 20.0.0.0
R3(config-router)#network 30.0.0.0
R3(config-router)#exit
R3(config)#
R3# copy running-config startup-config // For saving the provided configuration
PCs CONFIGURATION:
On the Gateway address, we put a virtual address which is not on either R1 or R2.
HSRP configuration
Router(config-if)#standby group-id ip ip-address
The group-id is the group number of HSRP. The IP address is a virtual IP address that you want
to use as the default gateway IP address.
HSRP Verification:
R1# show standby
Each VLAN acts as a separate network segment, with its own set of
network addresses, traffic flow and security policies. Devices on
different VLANs cannot communicate with each other unless a routing
device, such as a router or layer 3 switch, is used to connect them.
Benefits of VLANs include:
1. Improved network security: By separating devices into
different VLANs, network administrators can apply different
security policies and controls to each VLAN based on their
individual security requirements.
2. Improved network performance: By reducing the size of
broadcast domains, VLANs can help improve network performance
by reducing network traffic and congestion.
3. Improved network management: By grouping devices based
on common requirements, VLANs make it easier for network
administrators to manage the network and troubleshoot network
issues.
4. Scalability: VLANs can be used to scale networks by creating
multiple smaller broadcast domains, which can be managed more
efficiently than a single large network.
CREATION OF VLANS
DETAILED STEPS for Creating a VLAN
Command or Action Purpose
switch# config t
switch(config)#
Step vlan {vlan-id | vlan-range} Places you into the VLAN configuration sub-
2 Example: mode. If the VLAN does not exist, the system
switch(config)# vlan 5 creates the specified VLAN and then enters
the VLAN configuration sub-mode.
switch(config-vlan)#
Step name vlan-name Names the VLAN. You can enter up to 32
3 Example: alphanumeric characters to name the VLAN.
switch(config-vlan)# name You cannot change the name of VLAN1 or
accounting the internally allocated VLANs.
Step state {active | suspend} Sets the state of the VLAN to active or
4 suspend. While the VLAN state is suspended,
Example: the ports associated with this VLAN become
switch(config-vlan)# state inactive, and that VLAN does not pass any
active traffic. The default state is active. You cannot
suspend the state for the default VLAN or
VLANs 1006 to 4094.
switch(config-vlan)# exit
switch(config)#
Step show vlan (Optional) (Verification of configured VLAN
7 Example: information)
switch# show vlan Displays information and status of VLANs.
2. Trunk Port:
Trunk port is a connection on a switch that transmits data to
and from multiple VLANs.
It is used to connect switches to other switches, routers and
servers available in trunk link.
Frames are marked with unique identifying tags when they
move between switches so that they can be directed to their
designated VLANs.
It can manage traffic for numerous VLANs at the same time.
VLAN 10
Switch(config)#interface range fa0/1-3 //You can use interface range or single interface
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#exit
VLAN 20
Switch(config)#interface range fa0/4-6
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#exit
Step4: Verification of VLAN configuration
Switch#show VLAN or
Switch#show interfaces switchport
CONFIGURATION OF TRUNKS
A trunk port is a port that carries data from multiple local area networks or
virtual local area networks (VLANs) across a single interconnect between
network switches or routers.
Step1: Configure trunk port on the switch
Switch(config)#int fa0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk allow VLAN 1-99 //allow all VLANs
Step2: Configure the sub-interface on the router
Sub-interfaces divide the parent interface into two or more virtual interfaces
on which you can assign unique Layer 3 parameters such as IP addresses
and dynamic routing protocols.
Router#conf t
Router(config)#interface g0/0
Router(config-if)#no sh
Configure Sub-interface for VLAN 10
Router#conf t
Router(config)#interface g0/0.10
Router(config-if)#encapsulation dot1Q 10 // dot1Q : IEEE 802.1Q Virtual LAN, 10 is VLAN ID
Router(config-if)#ip address 192.168.10.1 255.255.255.0
Router(config-if)#
Configure Sub-interface for VLAN 20
Router(config)#interface g0/0.20
Router(config-if)#encapsulation dot1Q 20 //
Router(config-if)#ip address 192.168.20.1 255.255.255.0
Router(config-if)#
Types of VLANs
There are 5 main types of VLANs depending on the type of network they
carry:
1. Default VLAN – When the switch initially starts up, all switch ports
become a member of the default VLAN (generally all switches have a
default VLAN named VLAN 1), which makes them all part of the same
broadcast domain. Using default VLAN allows any network device
connected to any of the switch ports to connect with other devices on
other switch ports. One unique feature of Default VLAN is that it can’t
be renamed or deleted.
2. Data VLAN – Data VLAN is used to divide the whole network into 2
groups. One group of users and other groups of devices. This VLAN
also known as a user VLAN, the data VLAN is used only for user-
generated data. This VLAN carries data only. It is not used for carrying
management traffic or voice.
3. Voice VLAN – Voice VLAN is configured to carry voice traffic. Voice
VLANs are mostly given high transmission priority over other types of
network traffic. To ensure voice-over IP (VoIP) quality (delay of less
than 150 milliseconds (ms) across the network), we must have
separate voice VLAN as this will preserve bandwidth for other
applications.
4. Management VLAN – A management VLAN is configured to access
the management capabilities of a switch (traffic-like system logging,
and monitoring). VLAN 1 is the management VLAN by default (VLAN 1
would be a bad choice for the management VLAN). Any switch VLAN
could be defined as the management VLAN if the admin has not
configured a unique VLAN to serve as the management VLAN. This
VLAN ensures that bandwidth for management will be available even
when user traffic is high. You must configure the IP address and
gateway for the management VLAN
5. Native VLAN – This VLAN identifies traffic coming from each end of a
trunk link. A native VLAN is allocated only to an 802.1Q trunk port. The
802.1Q trunk port places untagged traffic (traffic that does not come
from any VLAN) on the native VLAN. It is best to configure the native
VLAN as an unused VLAN.
Note:
- It is common practice to separate voice and management
traffic from data traffic.
- The computer will be in data VLAN, and the IP phone will
be in the voice VLAN.
VLAN Ranges
VLANs Range Usage Propagat
ed
by VTP
0, 4095 Reserve For system use only. You cannot see or —
d use these VLANs.
1 Normal Cisco default. You can use this VLAN but Yes
you cannot delete it.
2-1001 Normal For Ethernet VLANs; you can create, use, Yes
and delete these VLANs.
1002- Normal Cisco defaults for FDDI and Token Ring. Yes
1005 You cannot delete VLANs 1002-1005.
1006- Extende For Ethernet VLANs only. No
4094 d
References: https://www.educba.com/vlan-tagged-vs-untagged/
Learning Outcome 2: Configure STP
1. INTRODUCTION TO STP
STP (Spanning Tree Protocol) is a networking protocol that prevents
loops in a layer 2 network by selectively blocking redundant paths.
By properly configuring STP, you can help ensure that your network is
free from loops and can provide reliable and efficient communication
between devices.
2. REDUNDANCY
Examine a redundant design
A redundant link is an additional link between two switches. A
redundant link is usually created for backup purposes.
The biggest disadvantage of a redundant link is that it creates a loop
between switches. If a loop exists between two switches, they do not work
properly.
3. STP operation
All switches of the STP domain, first elect a root bridge. The root bridge
acts as a point of reference for all other switches in the network. All
ports of the root bridge remain in the forwarding mode.
Once the root bridge is elected, all remaining switches select a single
port that has the shortest path cost to reach the root bridge and
marked it as the root port.
After selecting the root port, switches determine a single designated
port for each connection.
If multiple ports are connected with the same switch or LAN segment,
the switch selects only one port that has the lowest path cost and
marks it as the designated port.
Once the root port and designated ports are selected, the switch
blocks all remaining ports to remove any possible or existing loop from
the network.
4. Spanning Tree Algorithm
The STA(Spanning Tree Algorithm) algorithm first creates a topology
database then it finds and disables the redundant links. Once redundant
links are disabled, only the STP-chosen links remain active. If a new link
is added or an existing link is removed, the STP re-runs the STA algorithm
and re-adjusts all links to reflect the change.
5. STP BPDU
BPDUs (Bridge Protocol Data Units) are multicast frames that switches
used to share information about themselves and their connections.
Types of BPDU
- Configuration BPDU (Hello BPDU)
- Topology change BPDU (TCN BPDU): learn which switch is
connected with which switches
- Topology change Acknowledgement (TCA BPDU): to learn whether
any layer 2 switching loop exists in the learned topology or not.
Reasons for Topology Change:
Spanning Tree Protocol activated network can encounter topology change
due to the following reasons:
- Link failure
- Switch failure
- Port transitioning to the forwarding state
6. Bride ID
Bridge ID or BID is the identity of every switch that they are part of a
network.
It is an 8 bytes field that is divided into two parts. The first part is a 2-
byte Bridge Priority field (which can be configured) while the second part
is the 6-byte MAC address of the switch.
7. Port roles
Root Port
The Root port is the port that directly connects to the Root Bridge, or has the
shortest path to the Root Bridge. The shortest path is the path that has the
lowest path cost value. Remember that, a switch can go through many other
switches to get to the root bridge. So it’s not always the shortest path but it
is the fastest path.
Designated Ports
A designated port is the port that has the lowest port cost value to get on a
given network, compared to other ports on that segment. STP marks the
designated ports as the forwarding ports. Forwarding ports are used to
forward the frames.
Non-Designated Ports
A non-designated port is a port that has a higher port cost than the
designated port. STP marks the non-designated port as the blocking port.
Blocking ports are used to remove loops.
9. STP Modes
There are different modes of STP that are used depending on the
requirements and topology of the network.
7. Flag bits used in STP are Bit 0 for TCN Flag bits used in RSTP are Bit 0 for
(Topology Change Notification) and TCN, Bit 1 for Proposal, Bit 2 and 3
Bit 7 for TCA (Topology Change for Port role, Bit 4 for Learning, Bit 5
Acknowledgement). for forwarding, Bit 6 for Agreement,
and Bit 7 for TCN.
Advantages of VTP:
It allows you to track and monitor VLANs accurately.
Plug-and-play configuration when adding new VLANs.
VLAN configuration consistency across the network.
Accurate tracking and monitoring of VLANs.
Provide dynamic reporting of added VLANs across a network.
Offers simplify the management of the VLAN database across multiple
switches.
VLAN management on switches like adding, deleting, and renaming
VLANs.
Configurations are consistent and have fewer errors
Reduce VLAN management.
3. VTP Versions
Three types of VTP versions are V1, V2, and V3.
The first two versions are similar except that V2 adds support for token ring
VLANs.
Question: How to check VTP version?
Cisco-Switch#show vtp status
4. VTP traps generation
VTP traps are a mechanism used by Cisco devices to notify network
administrators of changes to the VLAN configuration.
When a change occurs to the VLAN configuration, such as the creation,
deletion, or modification of a VLAN, the VTP server sends a VTP update
message to all of its VTP clients. In turn, the clients update their VLAN
databases accordingly. However, sometimes it is necessary to notify
administrators immediately of these changes, rather than waiting for the
next VTP update message.
VTP Domain name propagation
The VTP domain name is a unique name that identifies the VTP domain to
which a switch belongs. All interconnected switches (same LAN) must have
the same VTP domain name. A switch can only belong to one VTP domain.
If switches have different VTP domain names, they will not be able to
communicate with each other using VTP.
VTP frame structure and VTP revision number
Description Commands
1. Enter global configuration mode switch# config t
2. Changing switch name switch(config)#hostname switch1
3. Enter Console configuration mode switch1(config)# line console 0
4. Setting the password switch1(config-line)# password
strongconsolepass
5. Enabling the provided password to be switch1(config-line)# login
used for login
6. Exiting line configuration mode switch1(config-line)# exit
Violation Modes: Port security allows you to define actions when a violation
occurs (i.e., when an unauthorized MAC address tries to access the port):
Protect: Frames from untrusted MAC addresses are dropped, but no
notification is sent.
Restrict: Frames from untrusted MAC addresses are dropped, and a
notification is sent.
Shutdown: The port is shut down and put into the error-disabled
state. This is the default mode.
10.
11. Some Useful “Show” Commands
v. Spoofing attacks
A spoofing attack is a type of cyber-attack where an attacker
disguises their identity or masquerades as a trusted entity or
system in order to deceive victims, gain unauthorized access, or
manipulate information.
- IP Spoofing
- Email spoofing
- DNS spoofing
- ARP spoofing
vi. Preventing switch security attacks
Now at this stage, when you try to ping between Host A and Host B, the ping
fails because the two PCs are on separate networks, and the router is not yet
configured for inter-VLAN routing, so they cannot communicate with one
another. Our next step is to configure inter-VLAN routing to enable
communication between the VLANs.
Now at this juncture (stage), if you try to ping between Host A and Host B, it
will be successful because the two VLANs are now interconnected through
the router.
If Host A in VLAN 10, wants to send a message to Host B in VLAN 20, the
steps it would take are as follows:
1. Host A sends its unicast traffic to the directly connected L2 switch.
2. L2 switch tags the unicast traffic as originating on VLAN 10 and
forwards it to the L3 switch via the trunk link.
3. The L3 switch removes the VLAN tag and forwards the unicast traffic
internally to the VLAN 10 virtual interface.
4. The L3 switch internally routes the unicast traffic to its VLAN 20 virtual
interface and then retags the traffic, which it then forwards back to the
L2 switch via the trunk link.
5. L2 switch removes the VLAN tag of the unicast frame and forwards the
frame directly to Host B on port fa0/3.
To configure multi-layer switch inter-VLAN routing on a Cisco device, in
accordance with the diagram shown in the Figure above, use the IP
addresses shown in a Table and follow the steps below:
Device Interfa VLAN ID IP Address Subnet Default
ce Mask Gateway
L3 Fa0/0 N/A 192.0.0.1 255.255.255 192.0.0.2
Switch .0
SVI 10 VLAN 10 192.168.10. 255.255.255 N/A
1 .0
SVI 20 VLAN 20 192.168.20. 255.255.255 N/A
1 .0
Host A NIC VLAN 10 192.168.10. 255.255.255 192.168.10.1
10 .0
Host B NIC VLAN 20 192.168.20. 255.255.255 192.168.20.1
20 .0
Table: IP address detail for above Figure
https://study-ccna.com/layer-3-switch-
intervlan-routing/
LEARNING OUTCOME 4: CONFIGURE ACCESS
CONTROL LIST (ACL)
An access control list (ACL) is a set of rules or filters that define how
traffic is allowed or denied through a network device such as a router,
switch, or firewall.
Question: Create the standard access control list which will deny PC:
192.168.10.10 to access the server and Permit PC: 192.168.10.5 to access
the server.
R1#conf t
R1(config)#access-list 10 deny 192.168.10.10 0.0.0.0 //ACL 10 for deny 192.168.10.10
R1(config)#access-list 10 permit any // ACL 10 for allowing another remaining host
R1(config)#interface g0/0
R1(config-if)#ip access-group 10 in //Applying the ACL 10 to the interface
The above ACL can be written also as:
R1(config)#access-list 10 deny host 192.168.10.10 //use ‘HOST’ keyword instead of
‘WILDMASK’
R1(config)#access-list 10 permit any
Note:
Once there is a match, the access list is exited
More specific statements should be at the top
More general statements should be at the bottom
At the end of every ACL there is “Implicit deny” ‘deny any’
Example:
R1(config)#access-list 10 permit any
R1(config)# access-list 10 deny 192.168.10.10 0.0.0.0 // This will never be executed
2.Extended ACL
These ACLs permit or deny packets based on the source IPv4 address and
destination IPv4 address, protocol type, source and destination TCP or
UDP ports, and more.
It uses a ranging number from 100-199. Its expanded ranging number is
from 2000-2699
Note: Extended ACLs are applied closest to the source
Example: Create an Extended ACL (100) that denies TCP traffic from any
host in the 192.168.10.0/24 network to access the FTP resources from the
192.168.20.50 server.
Example 2: Create an Extended ACL (100) the permit TCP traffics from
any host in 192.168.10.0/24 network to access the HTTP resources from
192.168.20.50 server.
R1(config)#access-list 100 permit tcp 192.168.10.0 0.0.0.255
192.168.20.50 0.0.0.0 eq 80 (www)
R1(config)#interface fa 0/0
R1(config-if)#ip access-group 100 in
R1(config-if)#interface g0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no sh
R(config-if)#interface g0/2
R(config-if)#ip address 200.10.10.1 255.255.255.0
R(config-if)#no sh
Step 2: Configure the routing protocol
Configure static route on R1 Configure static route on R2
R#config t R2#config t
R(config)#ip route 192.168.3.0 255.255.255.0 R2(config)#ip route 192.168.2.0 255.255.255.0 200.10.10.1
200.10.10.2 R2(config)#ip route 192.168.1.0 255.255.255.0 200.10.10.1
R(config)# R2(config)#
Example: Create a named ACL that filters (permits) all FTP traffic and denies
other traffic.
R1(config)# ip access-list extended FTP-FILTER
R1(config-ext-nacl)# permit tcp 192.168.10.0 0.0.0.255 any eq ftp
R1(config-ext-nacl)# permit tcp 192.168.10.0 0.0.0.255 any eq ftp-data
R1(config-ext-nacl)#exit
R1(config)#interface g0/0
R1(config-if)#ip access-group FTP-FILTER in //apply ACL to the interface
Note: Sequence number is followed during the execution of configured ACLS. It is possible to
add new entry with in-between sequence number
Troubleshooting ACLS
1. ACL troubleshooting exercise (Implicitly deny)
3. ACL troubleshooting exercise (Improper type of protocol => TFTP is UDP not TCP)
4. ACL troubleshooting exercise (ISSUE ON THE INTERFACE) (we can change the
interface or set it as outbound)
References: https://www.certificationkits.com/cisco-access-list-ccna/
References:
https://www.networkworld.com/article/2283765/chapter-9--eigrp.html?
page=2
https://www.computernetworkingnotes.com/ccna-study-guide/hot-standby-
router-protocol-explained.html
https://www.ciscopress.com/articles/article.asp?
p=3089353&seqNum=7#:~:text=There%20are%20two%20types%20of,or
%20UDP%20ports%2C%20and%20more.
Learning Unit 4: CONFIGURE WIRELESS
NETWORK
LO4.1 Systematic Implementation of SOHO and Enterprise wireless
network
(Group discussion on the use of wireless and its applications, Wireless
infrastructure components and WLAN deployment solutions, Practical
configuration of Wireless network devices)
2. WLANs Standards
WLAN (Wireless Local Area Network) standards are a set of specifications
developed by the IEEE (Institute of Electrical and Electronics Engineers)
for wireless communication between devices. These standards specify
the frequency bands, data rates, modulation techniques, security
protocols, and other parameters that govern wireless communication.
The most widely used WLAN standards (802.11 WLAN technologies) are:
a. IEEE 802.11a: This standard operates in the 5 GHz frequency band
and supports data rates up to 54 Mbps.
b. IEEE 802.11b: This standard operates in the 2.4 GHz frequency band
and supports data rates up to 11 Mbps.
c. IEEE 802.11g: This standard operates in the 2.4 GHz frequency band
and supports data rates up to 54 Mbps.
d. IEEE 802.11n: This standard operates in both the 2.4 GHz and 5 GHz
frequency bands and supports data rates up to 600 Mbps.
e. IEEE 802.11ac: This standard operates in the 5 GHz frequency band
and supports data rates up to 7 Gbps.
f. IEEE 802.11ax (also known as Wi-Fi 6): This standard operates in both
the 2.4 GHz and 5 GHz frequency bands and supports data rates up to
9.6 Gbps.
Benefits of Wireless
Mobility: Wireless technology allows devices to be used without
the need for cables or fixed connections, enabling people to work
and communicate on the go, which increases productivity and
convenience.
Flexibility: Wireless networks can be easily configured and
reconfigured to meet changing business needs or adapt to new
technologies, making wireless technology more adaptable and
scalable than wired networks.
Cost-effectiveness: Wireless technology eliminates the need for
expensive cabling and infrastructure, making it more cost-effective
than wired networks. Wireless networks are also easier and less
expensive to maintain and upgrade.
Improved collaboration: Wireless technology allows people to
work together and share information more easily, regardless of their
location, which enhances collaboration and teamwork, leading to
better business outcomes.
Increased efficiency: Wireless technology can increase
operational efficiency by enabling real-time data collection and
analysis, as well as remote monitoring and control of equipment
and systems.
Access to information: Wireless technology provides access to
information and resources from anywhere, making it easier to stay
informed and make informed decisions.
Convenience: Wireless technology eliminates the need for physical
connections, which reduces clutter and simplifies the setup process.
Improved user experience: Wireless technology provides a more
seamless and convenient user experience, making it easier to
connect devices and access data.
3. Wireless technologies
Wireless technologies refer to any communication system that uses
wireless signals to transmit and receive data over the airwaves. These
technologies are widely used in various applications, including mobile
communications, internet connectivity, and sensor networks
Some of the most common wireless technologies are:
1. Wi-Fi: This technology uses radio waves to connect devices to the
internet or to each other without the need for cables. Wi-Fi is widely
used in homes, offices, and public places such as coffee shops and
airports.
2. Bluetooth: This technology is used for short-range wireless
communication between devices, such as smartphones, tablets, and
headphones. Bluetooth operates in the 2.4 GHz frequency band and
supports data rates up to 24 Mbps.
3. Zigbee: This technology is designed for low-power, low-data-rate
wireless communication between sensors, smart meters, and other
devices in the Internet of Things (IoT) ecosystem. Zigbee operates in
the 2.4 GHz frequency band and supports data rates up to 250 kbps.
4. NFC (Near Field Communication): This technology is used for short-
range wireless communication between devices, such as smartphones
and contactless payment terminals. NFC operates in the 13.56 MHz
frequency band and supports data rates up to 424 kbps.
5. Cellular: This technology uses radio waves to provide wireless voice
and data communication over long distances. Cellular networks are
used by mobile phone operators to provide mobile services to users.
6. Satellite: This technology uses orbiting satellites to provide wireless
communication services over large geographic areas. Satellite
communication is commonly used for broadcasting, remote sensing,
and military applications
8. Application of wireless
Wireless technology has become an essential part of modern society, and
it is used in a wide range of applications across many industries.
Some of the most common applications of wireless technology:
- Mobile communication: Wireless technology enables mobile
communication through mobile phones, tablets, laptops, and other
mobile devices.
- Internet connectivity: Wireless technology allows users to access
the internet wirelessly through Wi-Fi, cellular data, and other
wireless networks.
- Smart homes: Wireless technology is used in smart homes to
connect devices such as security systems, smart thermostats, and
other home automation devices.
- Healthcare: Wireless technology is used in healthcare for patient
monitoring, telemedicine, and remote diagnosis.
- Transportation: Wireless technology is used in transportation for
vehicle-to-vehicle communication, navigation, and tracking.
- Industrial automation: Wireless technology is used in industrial
automation for remote control, monitoring, and data acquisition.
- Entertainment: Wireless technology is used in entertainment for
streaming audio and video content to wireless speakers,
headphones, and other devices.
- Retail: Wireless technology is used in retail for inventory
management, point-of-sale systems, and customer analytics.
Active mode - Wireless clients must know the name of the SSID. The
wireless client initiates the process by broadcasting a probe request
frame on multiple channels. The probe request includes the SSID name
and standards supported. Active mode may be required if an AP or
wireless router is configured to not broadcast beacon frames.