Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document provides an overview of the Border Gateway Protocol (BGP). It discusses BGP concepts such as autonomous systems, path attributes, and the BGP protocol operation. Key points include that BGP establishes peering sessions to exchange routing information, uses route attributes like AS path, next hop, and communities to determine the best path, and supports techniques like route reflection and confederation to improve scalability in large networks.
Traffic Engineering Using Segment Routing Cisco Canada
1) The document discusses using segment routing for traffic engineering. It provides an overview of segment routing technology, use cases, control and data plane operations, and how segment routing can be used for traffic engineering.
2) Key aspects covered include how segment routing works by encoding a path as an ordered list of segments, different types of segments (IGP prefixes, adjacencies, BGP), and how this allows for application-engineered end-to-end paths.
3) Traffic engineering with segment routing provides explicit routing, supports constraint-based routing without needing RSVP-TE, and uses existing IGP extensions to advertise link attributes.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
MPLS is a technology that allows traffic to be forwarded through networks based on short fixed length labels rather than long network addresses, enabling traffic engineering and quality of service. It works by classifying packets into forwarding equivalency classes, assigning labels when packets enter the MPLS domain, and using label switching to forward packets along label switched paths. MPLS provides advantages like simplified packet forwarding, efficient traffic engineering capabilities, and virtual private networks.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
1) OSPF is a link-state routing protocol where each router maintains an identical database describing the network topology by flooding link-state advertisements (LSAs) throughout the network.
2) The routers run the Dijkstra shortest path first algorithm on their link-state database to determine the optimal route to all reachable networks.
3) OSPF routers establish neighbor relationships by multicasting hello packets to discover one another, then exchange and synchronize their full link-state databases.
VXLAN is a protocol that allows large numbers of virtual LANs to be overlaid on a physical network by encapsulating Ethernet frames within UDP packets and transporting them over an IP network. It addresses the scalability limitations of VLANs in large multi-tenant cloud environments by using a 24-bit segment ID rather than a 12-bit VLAN ID. The document provides an overview of VXLAN, why it is used, key concepts like VTEPs and VNIs, and demonstrations of VXLAN configuration on Cisco and Arista switches.
IS-IS uses three types of adjacencies - L1, L2, and L1/2. Adjacencies are established through a three-way handshake and can be in one of three states: down, initializing, or up. Key IS-IS operations include routers discovering neighbors through hello messages, establishing adjacencies, building LSPs, flooding LSPs to neighbors, running SPF to build routing tables. DIS is elected to reduce the mesh in broadcast networks and is chosen based on priority and MAC address.
This document provides an overview and agenda for a presentation on VXLAN BGP EVPN technology. It begins with an introduction to VXLAN and EVPN concepts. It then outlines the agenda which includes explaining VXLAN configuration, EVPN configuration, underlay configuration, overlay configuration, and EVPN VXLAN service configuration. It also provides a sample migration from a legacy device configuration to a VXLAN BGP EVPN configuration. Various networking acronyms related to VXLAN and EVPN are defined. Sample vendor supported data center technologies and a VXLAN test topology are shown.
The document discusses the IS-IS (Intermediate System to Intermediate System) routing protocol. It was developed by DECnet as an interior gateway protocol to efficiently route data within networks. IS-IS determines the best routes between intermediate systems using a link-state algorithm. It exchanges routing information and builds a topology database to select optimal paths between nodes based on metrics like bandwidth and delay. The protocol supports different network types and uses levels, system IDs, and NSAP addresses in its operation.
This document provides a CCNA command cheat sheet covering Cisco IOS commands for the CCNA exam. It includes sections summarizing commands for Cisco device configuration, interface configuration, routing protocols, privilege mode commands, and more. The cheat sheet covers both ICND exam parts 1 and 2 and is intended to help review the majority of commands found on the CCNA exam.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk
Cisco Unified Communications Manager (CUCM) training will cover CUCM basics and advanced configurations over three days. The instructor will use a demo environment including two CUCM servers and a Cisco Unity Connection voicemail server. Topics will include CUCM architecture, installation, upgrades, backups/restores, protocols, phones, gateways, and more. The goal is to explain how CUCM works from the perspective of a customer.
OSPF uses cost as the metric value, which is calculated by dividing the reference bandwidth of 100 Mbps by the interface bandwidth. This means interfaces with higher bandwidth have lower costs by default. The default cost does not differentiate between interfaces faster than 100 Mbps. The OSPF router ID is a unique 32-bit identifier for each router and is usually the highest IP address of a loopback or active interface; it should not be changed without reloading the router.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
DHCP Snooping allows switches to prevent man-in-the-middle attacks by DHCP spoofing. It trusts only the port connected to the DHCP server, monitors traffic for IP and MAC bindings, and uses this information for other security features. When enabled, DHCP Snooping will only forward DHCP requests to trusted ports and maintain a table of client bindings.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
Segment routing allows a node to steer a packet through an ordered list of segments encoded in the packet header. Segments represent instructions like forwarding through specific nodes or along certain paths. By encoding the path in packets, segment routing can compute paths centrally and reduce network state.
The document discusses various methods of configuring MPLS in a network, including:
1. Configuring LDP to automatically establish label-switched paths between routers.
2. Configuring RSVP signaling to establish an explicit LSP from Batam to Ambon with a bandwidth reservation of 500Mb.
3. Integrating LSP routes into the unicast routing table and verifying LSP establishment through traceroute.
The document discusses MPLS VPN configurations. It covers VPN concepts like overlay and peer models, benefits of MPLS VPNs, and how routing information is propagated between provider edge (PE) routers using MP-BGP. Key aspects include using virtual routing and forwarding (VRF) instances to isolate customer routes, extending prefixes with route distinguishers (RDs) to handle overlapping addresses, and exchanging VPN routes between PE routers in the provider network.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
The document discusses the IS-IS routing protocol. It provides an overview of IS-IS, including that it is an interior gateway protocol used within an autonomous system. It also describes IS-IS levels, areas, and backbone routers. Finally, it discusses CLNS addressing, IS-IS PDUs like Hello packets, and other IS-IS concepts.
This document provides an overview of BGP path selection attributes and techniques for manipulating them, including BGP weight and AS path prepending. It begins by explaining that BGP selects the best path based on attributes rather than lowest metric like IGPs. It then details the priority of each attribute and provides a quick overview of each. The remainder focuses on BGP weight, explaining how it influences local path selection and can be set per neighbor or using route maps. It also covers AS path prepending and how it can be used to prepend an AS path inbound or outbound to influence path selection.
This document provides an overview of initial Big-IP configuration including hardware, licensing, file system, and basic network and management configuration. It also covers traffic processing concepts like pools, nodes, virtual servers and load balancing methods. Monitoring functionality and types of monitors like address, service, content and interactive are described. The document shows how to configure and assign different monitors to nodes, pool members and pools. It explains the status icons for monitor states like available, offline, unknown and unavailable.
Juniper Training/Exam Tips that are helpful for your Certification Exam!
To be Juniper Certified please Check out:
http://asmed.com/juniper
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
1) OSPF is a link-state routing protocol where each router maintains an identical database describing the network topology by flooding link-state advertisements (LSAs) throughout the network.
2) The routers run the Dijkstra shortest path first algorithm on their link-state database to determine the optimal route to all reachable networks.
3) OSPF routers establish neighbor relationships by multicasting hello packets to discover one another, then exchange and synchronize their full link-state databases.
VXLAN is a protocol that allows large numbers of virtual LANs to be overlaid on a physical network by encapsulating Ethernet frames within UDP packets and transporting them over an IP network. It addresses the scalability limitations of VLANs in large multi-tenant cloud environments by using a 24-bit segment ID rather than a 12-bit VLAN ID. The document provides an overview of VXLAN, why it is used, key concepts like VTEPs and VNIs, and demonstrations of VXLAN configuration on Cisco and Arista switches.
IS-IS uses three types of adjacencies - L1, L2, and L1/2. Adjacencies are established through a three-way handshake and can be in one of three states: down, initializing, or up. Key IS-IS operations include routers discovering neighbors through hello messages, establishing adjacencies, building LSPs, flooding LSPs to neighbors, running SPF to build routing tables. DIS is elected to reduce the mesh in broadcast networks and is chosen based on priority and MAC address.
This document provides an overview and agenda for a presentation on VXLAN BGP EVPN technology. It begins with an introduction to VXLAN and EVPN concepts. It then outlines the agenda which includes explaining VXLAN configuration, EVPN configuration, underlay configuration, overlay configuration, and EVPN VXLAN service configuration. It also provides a sample migration from a legacy device configuration to a VXLAN BGP EVPN configuration. Various networking acronyms related to VXLAN and EVPN are defined. Sample vendor supported data center technologies and a VXLAN test topology are shown.
The document discusses the IS-IS (Intermediate System to Intermediate System) routing protocol. It was developed by DECnet as an interior gateway protocol to efficiently route data within networks. IS-IS determines the best routes between intermediate systems using a link-state algorithm. It exchanges routing information and builds a topology database to select optimal paths between nodes based on metrics like bandwidth and delay. The protocol supports different network types and uses levels, system IDs, and NSAP addresses in its operation.
This document provides a CCNA command cheat sheet covering Cisco IOS commands for the CCNA exam. It includes sections summarizing commands for Cisco device configuration, interface configuration, routing protocols, privilege mode commands, and more. The cheat sheet covers both ICND exam parts 1 and 2 and is intended to help review the majority of commands found on the CCNA exam.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk
Cisco Unified Communications Manager (CUCM) training will cover CUCM basics and advanced configurations over three days. The instructor will use a demo environment including two CUCM servers and a Cisco Unity Connection voicemail server. Topics will include CUCM architecture, installation, upgrades, backups/restores, protocols, phones, gateways, and more. The goal is to explain how CUCM works from the perspective of a customer.
OSPF uses cost as the metric value, which is calculated by dividing the reference bandwidth of 100 Mbps by the interface bandwidth. This means interfaces with higher bandwidth have lower costs by default. The default cost does not differentiate between interfaces faster than 100 Mbps. The OSPF router ID is a unique 32-bit identifier for each router and is usually the highest IP address of a loopback or active interface; it should not be changed without reloading the router.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
DHCP Snooping allows switches to prevent man-in-the-middle attacks by DHCP spoofing. It trusts only the port connected to the DHCP server, monitors traffic for IP and MAC bindings, and uses this information for other security features. When enabled, DHCP Snooping will only forward DHCP requests to trusted ports and maintain a table of client bindings.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
Segment routing allows a node to steer a packet through an ordered list of segments encoded in the packet header. Segments represent instructions like forwarding through specific nodes or along certain paths. By encoding the path in packets, segment routing can compute paths centrally and reduce network state.
The document discusses various methods of configuring MPLS in a network, including:
1. Configuring LDP to automatically establish label-switched paths between routers.
2. Configuring RSVP signaling to establish an explicit LSP from Batam to Ambon with a bandwidth reservation of 500Mb.
3. Integrating LSP routes into the unicast routing table and verifying LSP establishment through traceroute.
The document discusses MPLS VPN configurations. It covers VPN concepts like overlay and peer models, benefits of MPLS VPNs, and how routing information is propagated between provider edge (PE) routers using MP-BGP. Key aspects include using virtual routing and forwarding (VRF) instances to isolate customer routes, extending prefixes with route distinguishers (RDs) to handle overlapping addresses, and exchanging VPN routes between PE routers in the provider network.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
The document discusses the IS-IS routing protocol. It provides an overview of IS-IS, including that it is an interior gateway protocol used within an autonomous system. It also describes IS-IS levels, areas, and backbone routers. Finally, it discusses CLNS addressing, IS-IS PDUs like Hello packets, and other IS-IS concepts.
This document provides an overview of BGP path selection attributes and techniques for manipulating them, including BGP weight and AS path prepending. It begins by explaining that BGP selects the best path based on attributes rather than lowest metric like IGPs. It then details the priority of each attribute and provides a quick overview of each. The remainder focuses on BGP weight, explaining how it influences local path selection and can be set per neighbor or using route maps. It also covers AS path prepending and how it can be used to prepend an AS path inbound or outbound to influence path selection.
This document provides an overview of initial Big-IP configuration including hardware, licensing, file system, and basic network and management configuration. It also covers traffic processing concepts like pools, nodes, virtual servers and load balancing methods. Monitoring functionality and types of monitors like address, service, content and interactive are described. The document shows how to configure and assign different monitors to nodes, pool members and pools. It explains the status icons for monitor states like available, offline, unknown and unavailable.
Juniper Training/Exam Tips that are helpful for your Certification Exam!
To be Juniper Certified please Check out:
http://asmed.com/juniper
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Juniper Training/Exam Tips that are helpful for your Certification Exam!
To be Juniper Certified please Check out:
http://asmed.com/juniper
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Juniper Training/Exam Tips that are helpful for your Certification Exam!
To be Juniper Certified please Check out:
http://asmed.com/juniper
Juniper JNCIA – Juniper RIP and OSPF Route ConfigurationHamed Moghaddam
The document describes configuring OSPF routing between routers R1, R2, and R3, and exporting OSPF routes into RIP to advertise them to router R4. R2 is configured with OSPF to neighbors R1 and R3, and with RIP to neighbor R4. The routing policy on R2 is updated to export OSPF routes into RIP. This allows R4 to now see the loopback routes of R1 and R3 in its routing table via RIP.
Microsoft MCSA - Install active directory domain services (adds) roleHamed Moghaddam
This document provides instructions for installing the Active Directory Domain Services (ADDS) role on a Windows Server to promote it to an Active Directory domain controller. It describes launching Server Manager, selecting the Add Roles and Features option, choosing the ADDS role, and completing the installation process by pressing Install and Close. The role is added through the Server Manager to enable centralized management of users, resources, and group policies through Active Directory.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
- The document describes how to configure a site-to-site IPsec VPN tunnel between Router R1 and Router R3 using pre-shared keys for authentication.
- The key steps are to configure ISAKMP policies for phase 1 negotiation, IPsec transform sets for phase 2 encryption and authentication, and crypto maps on each router to establish the VPN tunnel.
- Connectivity tests are then run to verify end-to-end connectivity between networks over the encrypted IPsec tunnel.
How to Configure Routing Information Protocol (RIP)IT Tech
The document describes how to configure Routing Information Protocol (RIP) version 2 on three routers to enable routing between connected networks. It provides the configuration steps for setting hostnames, IP addresses and RIP on each router. It also shows how to verify the routing tables and connectivity between hosts on different networks using the ping command.
The document provides instructions for a lab activity to configure and verify EIGRP routing between two routers, R1 and R2. The key steps are:
1. Configure IP addresses on the interfaces of R1 and R2.
2. Check the routing tables on each router which initially only show directly connected networks.
3. Enable the EIGRP routing protocol on each router to exchange routing information.
4. Verify the EIGRP neighbor relationship forms and each router learns routes to networks attached to the other router.
The document describes the configuration of OSPFv3 in a single area network across four routers. Key steps include:
1. Configuring IPv6 unicast routing and interface addresses on each router;
2. Enabling OSPFv3 on each router and assigning a router ID, then configuring interfaces to advertise connected networks;
3. Verification shows each router has established full adjacencies and is exchanging routes, including successful ping from R3 to R4.
Here are the key steps to reset the router configuration to factory defaults:
1. Access privileged EXEC mode by entering "enable"
2. Erase the startup configuration file by entering "erase startup-config", then confirm by pressing enter. This removes any saved configuration.
3. Reload the router by entering "reload". This will perform a soft reboot and reload the factory default configuration stored in ROM.
The router is now reset to its original factory settings. The IP addresses, passwords, and all other configuration changes made are erased.
Eigrp on a cisco asa firewall configuration3Anetwork com
The document discusses configuring EIGRP routing on a Cisco ASA firewall. It describes setting up interfaces, IP addressing, and EIGRP routing on the ASA and two routers. The ASA separates an internal, DMZ, and external network, and redistributes a default static route into EIGRP. Configuration is verified by showing EIGRP neighbors, routes, and that the routers have learned routes from all connected networks.
The document discusses configuring OSPF routing on Ethernet and Frame Relay networks. For the Ethernet network, OSPF is configured to elect R1 as the DR and R2 as the BDR by setting their interface priorities. For the Frame Relay network, OSPF is configured with static mappings between routers since Frame Relay is non-broadcast by default. Neighbor statements are used to define neighbors since hellos are unicast. Verification commands show the elected DR and neighbors.
Networking Tutorial Goes to Basic PPP Configuration3Anetwork com
Leading Cisco networking products distributor-3network.com
Here we will be going over Basic Configuration of PPP (Point-to-Point Protocol). It includes Basic Configuration tasks on a router, configuring OSPF routing protocol, and configuring PPP PAP and CHAP authentication
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The serial interface is up but the line protocol is down. This indicates that while the physical layer connection is up, the data link layer is not establishing properly. Common reasons for this include:
- Mismatched encapsulation types on either end (e.g. one side PPP other side HDLC)
- Authentication failure if using PPP (e.g. wrong username/password)
- Layer 1 issues like clock rate mismatch if using HDLC
So in summary, the interface is physically up but the data link layer is failing to establish due to a configuration mismatch between the two directly connected routers.
This document discusses configuring next-hop-self on routers to change the next hop attribute for BGP routes advertised between autonomous systems. It shows the configuration of ISP1, ISP2 and Branch routers without changing the next hop. ISP1 is then configured with next-hop-self so that routes learned from ISP2 and advertised to Branch will have ISP1 as the next hop rather than ISP2. This allows Branch to successfully ping the network learned via BGP.
The document describes a set of exercises to configure basic routing and OSPF routing on routers. It includes instructions on configuring interfaces, static routing, and OSPF routing. Participants will work in groups to configure three routers and four switches with a common IP addressing scheme and network topology. The exercises progress from basic router configuration to static routing and finally dynamic routing using OSPF.
This document provides instructions for configuring Cisco routers and switches. It includes details on:
- Memory types on Cisco devices like RAM, NVRAM, FLASH, and ROM
- Show commands to view configurations, interfaces, versions, and more
- Configuring IP addresses, descriptions, saving configurations
- Common configuration mode commands
- Configuring IP addresses, default gateways on switches on VLAN 1 interfaces
The document then provides tasks for configuring hostnames, IP addresses on all devices, assigning IP settings to PCs, and testing connectivity using ping commands to verify reachability between devices on the same and different networks.
This document describes the configuration of a 6to4 topology between routers R1, R2, R3, and R4. Interface addresses and tunnel interfaces are configured on each router. Static routes are configured to establish connectivity over the 6to4 tunnels. OSPFv3 routing is then configured and enabled on the interfaces to automate routing. Connectivity is verified by pinging between routers to confirm end-to-end IPv6 reachability over the 6to4 topology.
The document discusses routing concepts including routing tables, directly connected routes, statically configured routes, and dynamic routing protocols. It provides examples of configuring RIP routing between two routers to automatically exchange routing information and populate each router's routing table with routes to networks connected to other interfaces. Key steps include configuring RIP, enabling RIP on connected interfaces, and verifying routes are learned through RIP.
The document discusses securing Cisco routers by hardening configurations based on the NSA Router Security Configuration Guide. It covers topics such as physical security of routers, defining loopback interfaces, banner configuration, blocking SYN flooding attacks using TCP intercept, tuning IP stack parameters like limiting embryonic connections and enabling TCP selective acknowledgment. It also discusses access control measures like basic authentication, AAA authentication using RADIUS/TACACS+, privilege levels, and disabling unused ports and protocols like CDP.
The document provides instructions for configuring basic settings on Cisco switches and routers, including enabling privileged modes, setting passwords, configuring interfaces, VLANs, routing protocols, ACLs, SNMP, and more. Example commands are given for tasks like configuring device hostnames, IP addresses, routing protocols, trunking, VLANs, DHCP, ACLs, and other common switch and router configurations.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
This document provides instructions on configuring a router on a stick topology. It describes configuring a switch port as a trunk, and then creating subinterfaces on the router's physical interface that correspond to each VLAN. It shows assigning IP addresses to the subinterfaces to act as the default gateway for each VLAN subnet. Finally, it describes configuring PCs with IP addresses in the correct subnets and default gateways, and confirms connectivity between the VLANs via ping tests through the router.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
This document discusses configuring a Cisco router to act as a DHCP server. It describes the steps to create DHCP pools for two networks, 10.10.10.0/24 and 20.20.20.0/24, and configure the router's interfaces. It also explains the DHCP process and provides configuration snippets from the router to illustrate excluding addresses and verifying the configuration. The goal is to prepare readers for the Cisco CCNA certification exam.
Microsoft MCSA- Joining Client Machines To The Domain!Hamed Moghaddam
The document describes the steps to join a Windows 8 client computer to an Active Directory domain. It involves logging into the client computer with the local administrator account, accessing the system properties, selecting the domain to join and providing the domain administrator credentials, then restarting the computer. Once restarted, the user can sign in to the domain using the format domainname\username and password.
The document discusses asset security and data management. It outlines the objectives of classifying information and assets, determining and maintaining ownership, protecting privacy, and establishing handling requirements. It then provides details on determining and maintaining data ownership, including developing sound data policies, defining roles and responsibilities, and ensuring data quality. It also discusses data security controls and standards for protecting data at rest, in transit, and in various states.
*Metamorphosis* is a biological process where an animal undergoes a dramatic transformation from a juvenile or larval stage to a adult stage, often involving significant changes in form and structure. This process is commonly seen in insects, amphibians, and some other animals.
This chapter provides an in-depth overview of the viscosity of macromolecules, an essential concept in biophysics and medical sciences, especially in understanding fluid behavior like blood flow in the human body.
Key concepts covered include:
✅ Definition and Types of Viscosity: Dynamic vs. Kinematic viscosity, cohesion, and adhesion.
⚙️ Methods of Measuring Viscosity:
Rotary Viscometer
Vibrational Viscometer
Falling Object Method
Capillary Viscometer
🌡️ Factors Affecting Viscosity: Temperature, composition, flow rate.
🩺 Clinical Relevance: Impact of blood viscosity in cardiovascular health.
🌊 Fluid Dynamics: Laminar vs. turbulent flow, Reynolds number.
🔬 Extension Techniques:
Chromatography (adsorption, partition, TLC, etc.)
Electrophoresis (protein/DNA separation)
Sedimentation and Centrifugation methods.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 795 from Texas, New Mexico, Oklahoma, and Kansas. 95 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
As of Mid to April Ending, I am building a new Reiki-Yoga Series. No worries, they are free workshops. So far, I have 3 presentations so its a gradual process. If interested visit: https://www.slideshare.net/YogaPrincess
https://ldmchapels.weebly.com
Blessings and Happy Spring. We are hitting Mid Season.
The *nervous system of insects* is a complex network of nerve cells (neurons) and supporting cells that process and transmit information. Here's an overview:
Structure
1. *Brain*: The insect brain is a complex structure that processes sensory information, controls behavior, and integrates information.
2. *Ventral nerve cord*: A chain of ganglia (nerve clusters) that runs along the insect's body, controlling movement and sensory processing.
3. *Peripheral nervous system*: Nerves that connect the central nervous system to sensory organs and muscles.
Functions
1. *Sensory processing*: Insects can detect and respond to various stimuli, such as light, sound, touch, taste, and smell.
2. *Motor control*: The nervous system controls movement, including walking, flying, and feeding.
3. *Behavioral responThe *nervous system of insects* is a complex network of nerve cells (neurons) and supporting cells that process and transmit information. Here's an overview:
Structure
1. *Brain*: The insect brain is a complex structure that processes sensory information, controls behavior, and integrates information.
2. *Ventral nerve cord*: A chain of ganglia (nerve clusters) that runs along the insect's body, controlling movement and sensory processing.
3. *Peripheral nervous system*: Nerves that connect the central nervous system to sensory organs and muscles.
Functions
1. *Sensory processing*: Insects can detect and respond to various stimuli, such as light, sound, touch, taste, and smell.
2. *Motor control*: The nervous system controls movement, including walking, flying, and feeding.
3. *Behavioral responses*: Insects can exhibit complex behaviors, such as mating, foraging, and social interactions.
Characteristics
1. *Decentralized*: Insect nervous systems have some autonomy in different body parts.
2. *Specialized*: Different parts of the nervous system are specialized for specific functions.
3. *Efficient*: Insect nervous systems are highly efficient, allowing for rapid processing and response to stimuli.
The insect nervous system is a remarkable example of evolutionary adaptation, enabling insects to thrive in diverse environments.
The insect nervous system is a remarkable example of evolutionary adaptation, enabling insects to thrive
INTRO TO STATISTICS
INTRO TO SPSS INTERFACE
CLEANING MULTIPLE CHOICE RESPONSE DATA WITH EXCEL
ANALYZING MULTIPLE CHOICE RESPONSE DATA
INTERPRETATION
Q & A SESSION
PRACTICAL HANDS-ON ACTIVITY
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsDrNidhiAgarwal
Unemployment is a major social problem, by which not only rural population have suffered but also urban population are suffered while they are literate having good qualification.The evil consequences like poverty, frustration, revolution
result in crimes and social disorganization. Therefore, it is
necessary that all efforts be made to have maximum.
employment facilities. The Government of India has already
announced that the question of payment of unemployment
allowance cannot be considered in India
How to manage Multiple Warehouses for multiple floors in odoo point of saleCeline George
The need for multiple warehouses and effective inventory management is crucial for companies aiming to optimize their operations, enhance customer satisfaction, and maintain a competitive edge.
Odoo Inventory Rules and Routes v17 - Odoo SlidesCeline George
Odoo's inventory management system is highly flexible and powerful, allowing businesses to efficiently manage their stock operations through the use of Rules and Routes.
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessMark Soia
Boost your chances of passing the 2V0-11.25 exam with CertsExpert reliable exam dumps. Prepare effectively and ace the VMware certification on your first try
Quality dumps. Trusted results. — Visit CertsExpert Now: https://www.certsexpert.com/2V0-11.25-pdf-questions.html
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetSritoma Majumder
Introduction
All the materials around us are made up of elements. These elements can be broadly divided into two major groups:
Metals
Non-Metals
Each group has its own unique physical and chemical properties. Let's understand them one by one.
Physical Properties
1. Appearance
Metals: Shiny (lustrous). Example: gold, silver, copper.
Non-metals: Dull appearance (except iodine, which is shiny).
2. Hardness
Metals: Generally hard. Example: iron.
Non-metals: Usually soft (except diamond, a form of carbon, which is very hard).
3. State
Metals: Mostly solids at room temperature (except mercury, which is a liquid).
Non-metals: Can be solids, liquids, or gases. Example: oxygen (gas), bromine (liquid), sulphur (solid).
4. Malleability
Metals: Can be hammered into thin sheets (malleable).
Non-metals: Not malleable. They break when hammered (brittle).
5. Ductility
Metals: Can be drawn into wires (ductile).
Non-metals: Not ductile.
6. Conductivity
Metals: Good conductors of heat and electricity.
Non-metals: Poor conductors (except graphite, which is a good conductor).
7. Sonorous Nature
Metals: Produce a ringing sound when struck.
Non-metals: Do not produce sound.
Chemical Properties
1. Reaction with Oxygen
Metals react with oxygen to form metal oxides.
These metal oxides are usually basic.
Non-metals react with oxygen to form non-metallic oxides.
These oxides are usually acidic.
2. Reaction with Water
Metals:
Some react vigorously (e.g., sodium).
Some react slowly (e.g., iron).
Some do not react at all (e.g., gold, silver).
Non-metals: Generally do not react with water.
3. Reaction with Acids
Metals react with acids to produce salt and hydrogen gas.
Non-metals: Do not react with acids.
4. Reaction with Bases
Some non-metals react with bases to form salts, but this is rare.
Metals generally do not react with bases directly (except amphoteric metals like aluminum and zinc).
Displacement Reaction
More reactive metals can displace less reactive metals from their salt solutions.
Uses of Metals
Iron: Making machines, tools, and buildings.
Aluminum: Used in aircraft, utensils.
Copper: Electrical wires.
Gold and Silver: Jewelry.
Zinc: Coating iron to prevent rusting (galvanization).
Uses of Non-Metals
Oxygen: Breathing.
Nitrogen: Fertilizers.
Chlorine: Water purification.
Carbon: Fuel (coal), steel-making (coke).
Iodine: Medicines.
Alloys
An alloy is a mixture of metals or a metal with a non-metal.
Alloys have improved properties like strength, resistance to rusting.
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...larencebapu132
This is short and accurate description of World war-1 (1914-18)
It can give you the perfect factual conceptual clarity on the great war
Regards Simanchala Sarab
Student of BABed(ITEP, Secondary stage)in History at Guru Nanak Dev University Amritsar Punjab 🙏🙏
How to Set warnings for invoicing specific customers in odooCeline George
Odoo 16 offers a powerful platform for managing sales documents and invoicing efficiently. One of its standout features is the ability to set warnings and block messages for specific customers during the invoicing process.
How to Set warnings for invoicing specific customers in odooCeline George
Cisco CCNA IP SLA with tracking configuration
1. CISCO CCNA
IP SLA withTracking Configuration
To watch our Cisco CCNA Video Trainings Please Check out the link below:
www.asmed.com/c1
ASM Educational Center Inc. (ASM)
Where Training, Technology & Service Converge
Phone: (301) 984-7400
Rockville,MD
3. IP SLA withTracking Configuration
Now we will do Lab for Tracking
In here we have as follow
Above we have a router (R1) that is connected to two ISPs. We want to use ISP1 as the primary and
ISP2 as the backup link. All traffic will be sent towards ISP1 but when it’s unreachable we’ll switch
over to ISP2. You can achieve this by using two default routes:
R1=f0/0 192.168.12.1 /24 connected to ISP1=192.168.12.2
R1=F0/1 192.168.13.1 /24 connected to ISP2= 192.168.13.3
R1#show ip int brief
4. IP SLA withTracking Configuration
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.1 YES manual up up
FastEthernet1/0 192.168.13.1 YES manual up up
Serial0/1/0 unassigned YES Unset administratively down down
5. IP SLA withTracking Configuration
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.13.3 50
As we see in above we are using the floating Static route that is top one has
AD=1 for static route and 2nd one the AD=50 , so when I go to
R1#show ip route
6. IP SLA withTracking Configuration
I will see the top commands on the routing tables
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.12.2 to network 0.0.0.0
C 192.168.12.0/24 is directly connected, FastEthernet0/0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.12.2
R1#
7. IP SLA withTracking Configuration
Here R1 can ping both ISP and from above we see it prefer top ISP1
R1#ping 192.168.12.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.12.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
R1#
R1#ping 192.168.13.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.13.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
R1#
8. IP SLA withTracking Configuration
R1#show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
D - Remote, C - CVTA, M - Two-port Mac Relay
Device ID Local Intrfce Holdtme Capability Platform Port ID
ISP2 Fas 1/0 136 R 7206VXR Fas 1/0
ISP1 Fas 0/0 143 R 7206VXR Fas 0/0
9. IP SLA withTracking Configuration
Now If I go to R1 and shut down the f0/0 (which is connected to ISP1) then since I have the
Floating point the R1 #show ip route will be pointed to ISP2
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#int f0/0
R1(config-if)#shut
10. IP SLA withTracking Configuration
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
11. IP SLA withTracking Configuration
As we see in above now R1 goes to internet via ISP2 , which is called the floating point----
But what happen if the link on ISP1 goes than ; then R1 in his table still will have original route to ISP1=192.168.12.2
so in here we will use the concept of Ip SLA with adding the track on the static route of R1
12. IP SLA withTracking Configuration
Lets bring up the int f0/0 on r1;
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#int f0/0
R1(config-if)#no shut
13. IP SLA withTracking Configuration
R1#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.1 YES manual up up
FastEthernet1/0 192.168.13.1 YES manual up up
Serial0/1/0 unassigned YES Unset administratively down down
14. IP SLA withTracking Configuration
R1#
R1#
R1#show ip rou
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.12.2 to network 0.0.0.0
C 192.168.12.0/24 is directly connected, FastEthernet0/0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.12.2
R1#
15. IP SLA withTracking Configuration
Now life is back to normal, that is using ISP1=192.168.12.2
Now we will do tracking with Ip SLA
Step 1) I will create an IP SLA instance that pings the IP address of the ISP1
router:
R1(config)#ip sla 1
R1(config-ip-sla)#
18. IP SLA withTracking Configuration
Now we will use the same concept as before that is icmp-echo
R1(config-ip-sla)#icmp-echo 192.168.12.2 ( Point to ISP1=192.168.12.2)
R1(config-ip-sla-echo)#
R1(config-ip-sla-echo)#?
IP SLAs echo Configuration Commands:
default Set a command to its defaults
exit Exit operation configuration
frequency Frequency of an operation
history History and Distribution Data
no Negate a command or set its defaults
owner Owner of Entry
request-data-size Request data size
19. IP SLA withTracking Configuration
tag User defined tag
threshold Operation threshold in milliseconds
timeout Timeout of an operation
tos Type Of Service
verify-data Verify data
vrf Configure IP SLAs for a VPN Routing/Forwarding instance
R1(config-ip-sla-echo)#frequency ?
<1-604800> Frequency in seconds (default 60)
R1(config-ip-sla-echo)#frequency 20 ?
<cr>
R1(config-ip-sla-echo)#frequency 20
20. IP SLA withTracking Configuration
Here is show run so far
R1#show run
ip sla 1
icmp-echo 192.168.12.2
frequency 20
21. IP SLA withTracking Configuration
Step 2) Go back to global configuration to schedule now for forever
R1#
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip sla
R1(config)#ip sla ?
<1-2147483647> Entry Number
22. IP SLA withTracking Configuration
enable Enable Event Notifications
ethernet-monitor IP SLAs Auto Ethernet configuration
group Group Configuration or Group Scheduling
key-chain Use MD5 authentication for IP SLAs Control Messages
logging Enable Syslog
low-memory Configure Low Water Memory Mark
reaction-configuration IP SLAs Reaction-Configuration
reaction-trigger IP SLAs Trigger Assignment
reset IP SLAs Reset
responder Enable IP SLAs Responder
restart Restart An Active Entry
schedule IP SLAs Entry Scheduling
23. IP SLA withTracking Configuration
R1(config)#ip sla schedule ?
<1-2147483647> Entry number
R1(config)#ip sla schedule 1 ?
ageout How long to keep this Entry when inactive
life Length of time to execute in seconds
recurring Probe to be scheduled automatically every day
start-time When to start this entry
<cr>
24. IP SLA withTracking Configuration
R1(config)#ip sla schedule 1 sta
R1(config)#ip sla schedule 1 start-time ?
after Start after a certain amount of time from now
hh:mm Start time (hh:mm)
hh:mm:ss Start time (hh:mm:ss)
now Start now
pending Start pending
25. IP SLA withTracking Configuration
R1(config)#ip sla schedule 1 start-time now ?
ageout How long to keep this Entry when inactive
life Length of time to execute in seconds
recurring Probe to be scheduled automatically every day
<cr>
R1(config)#ip sla schedule 1 start-time now li
R1(config)#ip sla schedule 1 start-time now life ?
<0-2147483647> Life seconds (default 3600)
forever continue running forever
26. IP SLA withTracking Configuration
R1(config)#ip sla schedule 1 start-time now life for
R1(config)#ip sla schedule 1 start-time now life forever ?
ageout How long to keep this Entry when inactive
recurring Probe to be scheduled automatically every day
<cr>
R1(config)#ip sla schedule 1 start-time now life forever
R1(config)#
27. IP SLA withTracking Configuration
Here is show run so far
R1#show run
ip sla 1
icmp-echo 192.168.12.2
frequency 20
ip sla schedule 1 life forever start-time now
28. IP SLA withTracking Configuration
let’s check with show commands
life is good now
R1#show ip sla sta
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:40:17.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 6
Number of failures: 1
Operation time to live: Forever
29. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:40:57.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 8
Number of failures: 1
Operation time to live: Forever
30. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:41:37.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 10
Number of failures: 1
Operation time to live: Forever
31. IP SLA withTracking Configuration
Step 3) now I will define the track number; and then later on I will append it to default route
pointed to ISP1=192.168.12.2
R1#
R1#
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#trac
R1(config)#track 1 ?
interface Select an interface to track
ip IP protocol
list Group objects in a list
stub-object Stub tracking object
32. IP SLA withTracking Configuration
R1(config)#track 1 ip ?
route IP route
sla IP Service Level Agreement
R1(config)#track 1 ip sla ?
<1-2147483647> Entry number
R1(config)#track 1 ip sla 1 ?
reachability Reachability
state Return code state
<cr>
33. IP SLA withTracking Configuration
R1(config)#track 1 ip sla 1 re
R1(config)#track 1 ip sla 1 reachability ?
<cr>
R1(config)#track 1 ip sla 1 reachability
R1(config-track)#
34. IP SLA withTracking Configuration
Here is show run so far
track 1 ip sla 1 reachability
ip route 0.0.0.0 0.0.0.0 192.168.12.2
ip route 0.0.0.0 0.0.0.0 192.168.13.3 50
!
!
!
ip sla 1
icmp-echo 192.168.12.2
frequency 20
ip sla schedule 1 life forever start-time now
35. IP SLA withTracking Configuration
Step 4) now I go to default router that I had; remove it and add it with new track number 1
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#no ip route 0.0.0.0 0.0.0.0 192.168.12.2
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 ?
<1-255> Distance metric for this route
name Specify name of the next hop
permanent permanent route
tag Set tag for this route
track Install route depending on tracked item
<cr>
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 tr
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 track ?
<1-500> tracked object number
36. IP SLA withTracking Configuration
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1 ?
<1-255> Distance metric for this route
name Specify name of the next hop
tag Set tag for this route
<cr>
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1
37. IP SLA withTracking Configuration
So here is show run so far:
r1#show run
!track 1 ip sla 1 reachability
!
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.13.1 255.255.255.0
duplex auto
speed auto
!
38. IP SLA withTracking Configuration
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1 ( here I have added the Track)
ip route 0.0.0.0 0.0.0.0 192.168.13.3 50
!
!
!
ip sla 1
icmp-echo 192.168.12.2 ( this is IP address of Main ISP1 that I am looking )
frequency 20
ip sla schedule 1 life forever start-time now
!
39. IP SLA withTracking Configuration
Now we will test it
That is if ISP1=f0/0=192.168.12.2 goes down ; then when I go to R1#show ip route I will see the routing table
has been changed to the new one
ISP1#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.2 YES manual up up
FastEthernet1/0 unassigned YES NVRAM administratively down down
FastEthernet1/1 unassigned YES NVRAM administratively down down
40. IP SLA withTracking Configuration
ISP1#config t
Enter configuration commands, one per line. End with CNTL/Z.
ISP1(config)#int f0/0
ISP1(config-if)#shut
ISP1(config-if)#
41. IP SLA withTracking Configuration
Now I will go to R1#show ip route and see the routing table should point to ISP2=192.168.13.3
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
42. IP SLA withTracking Configuration
Which it did with AD=50
Now let’s look at some show commands it shows it changed
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: NoConnection/Busy/Timeout
Latest operation start time: *05:50:57.723 UTC Thu Dec 15 2016
Latest operation return code: No connection (here says no connection)
Number of successes: 34
Number of failures: 5 ( here is number changing)
Operation time to live: Forever
43. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: NoConnection/Busy/Timeout
Latest operation start time: *05:51:37.723 UTC Thu Dec 15 2016
Latest operation return code: No connection
Number of successes: 34
Number of failures: 7 ( here is the number changes)
Operation time to live: Forever
44. IP SLA withTracking Configuration
R1#
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: NoConnection/Busy/Timeout
Latest operation start time: *05:52:17.723 UTC Thu Dec 15 2016
Latest operation return code: No connection
Number of successes: 34
Number of failures: 9
Operation time to live: Forever
45. IP SLA withTracking Configuration
R1#
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
46. IP SLA withTracking Configuration
R1#
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
47. IP SLA withTracking Configuration
Now I go back to ISP1 and bring back online
ISP1#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.2 YES manual up up
FastEthernet1/0 unassigned YES NVRAM administratively down down
FastEthernet1/1 unassigned YES NVRAM administratively down down
48. IP SLA withTracking Configuration
ISP1#config t
Enter configuration commands, one per line. End with CNTL/Z.
ISP1(config)#int f0/0
ISP1(config-if)#no shut
ISP1(config-if)#
49. IP SLA withTracking Configuration
Now I go back to R1#show ip route and check the work
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.12.2 to network 0.0.0.0
C 192.168.12.0/24 is directly connected, FastEthernet0/0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.12.2
50. IP SLA withTracking Configuration
Life is back to normal
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:54:37.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 36
Number of failures: 14
Operation time to live: Forever
51. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:54:57.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 37
Number of failures: 14
Operation time to live: Forever
52. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:55:17.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 38
Number of failures: 14
Operation time to live: Forever
53. IP SLA withTracking Configuration
So summary on R1 show run
R1#show run
!
track 1 ip sla 1 reachability ( track 1 is pointed to default route)
!
!
!
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
duplex auto
speed auto
54. IP SLA withTracking Configuration
!
interface FastEthernet0/1
ip address 192.168.13.1 255.255.255.0
duplex auto
speed auto
!
55. IP SLA withTracking Configuration
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1 ( here we are tracking 1)
ip route 0.0.0.0 0.0.0.0 192.168.13.3 50 ( this is 2ndary static route since it has AD=50)
!
!
!
ip sla 1
icmp-echo 192.168.12.2 ( this is pointed to Main ISP1 =primary)
frequency 20
ip sla schedule 1 life forever start-time now
56. ASM Educational Center Inc. (ASM)
Where Training, Technology & Service Converge
To watch our CiscoCCNAVideoTrainings PleaseCheck out the link below:
www.asmed.com/c1
Phone: (301) 984-7400
Rockville,MD