This document provides an overview of Spanning Tree Protocol (STP) and its various implementations. It defines key STP concepts like root bridge, BPDUs, port states, path cost, and port types. STP builds a loop-free Layer 2 topology by selecting a root bridge and placing redundant ports in blocking state. The document also covers STP variants like 802.1D, PVST+, RSTP, and MSTP.
This document provides an overview of IP routing essentials including routing protocols, path selection, static routing, and virtual routing and forwarding. It describes common routing protocols such as RIP, EIGRP, OSPF, IS-IS, and BGP. It discusses the algorithms and mechanisms used for path selection in distance vector protocols, link-state protocols, and BGP. It also covers topics such as administrative distance, metrics, equal-cost multipathing, and different types of static routes.
The document covers several first hop redundancy protocols including HSRP, VRRP, and GLBP. It provides details on:
- HSRP works by electing an active router that controls a virtual IP and MAC address. If the active router fails, the standby router with the next highest priority takes over.
- VRRP operates similarly to HSRP but uses different terminology where the active router is called the master and backups are called backup routers.
- These protocols allow hosts to be configured with virtual default gateways providing redundancy in case the gateway device fails. Traffic will be directed to the virtual IP and seamlessly fail over to the backup router.
The document discusses first hop redundancy protocols (FHRPs) including Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP). HSRP uses a virtual IP address shared between devices to provide redundancy. It elects an active router while others act as standbys. HSRP version 2 supports more groups and milliseconds timers. Link tracking prioritizes routers based on monitored links. FHRPs ensure network availability if a device or path fails.
Ccnp enterprise workbook v1.0 bgp zero to heroSagarR24
The document contains instructions for configuring a basic BGP lab on routers ATTR26, VODAFONER27, and VODAFONER28. It provides the configuration commands to enable interfaces, BGP neighbor relationships, and network advertisements on each router. It also includes output from show commands to verify the basic BGP neighbor status and routing tables. Debug commands are included to capture BGP packet details during the session establishment between VODAFONER28 and its neighbor.
The document discusses Virtual Private Routed Network (VPRN) services. VPRNs use BGP and MPLS to provide Layer 3 VPN connectivity between customer sites. Each VPRN has its own routing table maintained by provider edge (PE) routers. PE routers exchange routes for each VPRN using MP-BGP. Routes include a Route Distinguisher to identify the VPRN. Tunnels using MPLS or GRE carry customer traffic across the provider network to the correct PE router based on the route label. The document outlines requirements, protocols, and features used to implement VPRNs such as route reflectors, route redistribution, and CE connectivity checks.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
For enterprise network engineers, implementing BGP can be an intimidating task. This presentation was given to address common architectures for internet and MPLS BGP usage, along with best practices.
This document contains information about routing protocols like EIGRP, OSPF, BGP and IPv6 routing. It discusses various topics such as configuring and tuning EIGRP parameters like timers, authentication and metrics. It also covers topics related to OSPF like network types, route filtering, summarization etc. Redistribution between protocols and IPv6 routing concepts are also mentioned. The document contains practical exercises for configuring various routing features on sample networks.
- The document describes a lab scenario demonstrating basic BGP configuration and operation between autonomous systems.
- In the initial configuration, the boundary routers can exchange routes learned from their respective ISPs via EBGP, but cannot exchange routes learned from the opposite ISP due to the lack of IBGP configuration.
- Configuring IBGP between the boundary routers allows them to exchange all external BGP routes, without needing to redistribute via the IGP. However, the "BGP synchronization rule" prevents advertisement of routes before the next hop address is learned via the IGP.
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
1. The document discusses network and computing bandwidth demands increasing exponentially over the next decade, requiring network designs to double bandwidth every 18 months for networks and 24 months for computing.
2. It addresses challenges in network design from these increasing demands, such as needing larger routers, more routers to avoid overloading domains, and seamless services across different network segments.
3. The role of segment routing and traffic engineering is discussed for optimizing network capacity and meeting policies around high bandwidth paths, low latency paths, and avoiding congested network resources.
The document discusses various BGP concepts including:
1. IBGP and EBGP peering, route reflection, redistribution, and aggregation are covered to help connect routers across autonomous systems and optimize routing.
2. BGP's best path selection process is examined, outlining criteria like weight, local preference, AS path length, origin, and MED that influence route selection.
3. Techniques like route reflection, confederations, redistribution, peer groups, and route aggregation are presented to help simplify IBGP configurations and optimize routing across multiple autonomous systems.
The document discusses Network Time Protocol (NTP) and syslog logging. It provides an in-depth overview of NTP including key concepts like stratum levels, NTP modes, configuration, authentication, and troubleshooting. It also covers syslog logging, describing how Cisco devices use syslog to send system messages to monitoring locations for fault detection and security auditing. An example NTP lab is shown using GNS3 with configurations for an NTP server, clients, and authentication.
Presentation about interior gateway routing protocol EIGRP which covers most of the concepts and features of the protocol.
Delivered by Dmitry Figol, CCIE R&S #53592.
The document provides an overview of PGW/GGSN configuration on a Juniper router, including configuring routing instances, APNs, CDRs, QoS, and other optional configurations like SACC, PISC, and credit control. It describes configuring connectivity and routing, GTP properties, L2TP, DHCP, RADIUS, PDP context properties, and quality of service. The document also lists additional resources for further study of 3GPP specifications and vendor documentation.
The document discusses changes in data center and network architecture over time from mainframes to personal computers to modern cloud platforms. Traditional spanning tree protocol (STP) architectures are no longer suitable due to shifting traffic patterns and new applications. New options like layer 2 fabrics, encapsulated overlays, and software-defined networking can provide more flexibility, scalability, and agility needed to adapt to changing demands.
This document discusses Cisco OTV (Overlay Transport Virtualization) and how it separates STP domains between sites, allows different STP technologies per site, handles multi-homing between sites using an Authoritative Edge Device (AED) to prevent loops, and optimizes the forwarding of different traffic types including unicast, multicast, broadcast, and ARP packets between sites while supporting MAC mobility. It also discusses how OTV isolates FHRP protocols between sites.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
This document provides an overview and agenda for a presentation on VXLAN BGP EVPN technology. It begins with an introduction to VXLAN and EVPN concepts. It then outlines the agenda which includes explaining VXLAN configuration, EVPN configuration, underlay configuration, overlay configuration, and EVPN VXLAN service configuration. It also provides a sample migration from a legacy device configuration to a VXLAN BGP EVPN configuration. Various networking acronyms related to VXLAN and EVPN are defined. Sample vendor supported data center technologies and a VXLAN test topology are shown.
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
This presentations contains introductory to Intermediate topics on Ericsson MKVI SGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in SGSN.
The document provides an overview of the Border Gateway Protocol (BGP). It begins with general information about BGP, including that it is used for routing between autonomous systems and is classified as a path vector routing protocol. It then covers BGP theory in detail over several sections, explaining concepts like neighbors, messages, states, attributes and more. The document aims to provide thorough theoretical understanding needed to implement BGP in a lab.
BMP (BGP Monitoring Protocol) allows routers to send BGP peer route updates and statistics to external monitoring stations. It provides access to the pre-policy routing table (Adj-RIB-In) of peers on an ongoing basis. Cisco supports BMP in IOS-XE and IOS-XR routers. OpenBMP is an open-source BMP collector that stores updates in a MySQL database for analysis.
The document provides an overview of Internet Enhanced Service (IES) on Alcatel-Lucent platforms. IES allows customer IP interfaces to participate in the same routing instance as the service network core. Key points include:
- IES provides Internet connectivity through logical IP interfaces with SAP access points.
- Multiple IES services can be created to separate customer IP interfaces.
- Features like QoS policy propagation using BGP (QPPB) and VRRP are supported on IES interfaces.
A presentation to help new network operators plan a project to improve their network traffic management. Useful for inbound and outbound heavy networks. Lists the things you need to do to reach routing and peering nirvana.
Segment routing allows a node to steer a packet through an ordered list of segments encoded in the packet header. Segments represent instructions like forwarding through specific nodes or along certain paths. By encoding the path in packets, segment routing can compute paths centrally and reduce network state.
BGP graceful maintenance allows a router to be taken offline without dropping traffic by advertising routes with a lower preference first. This gives alternate routes time to take over before removing the router. The router's routes are sent with a GSHUT community and lowered attributes, and incoming routes are marked with a GSHUT attribute. Activating graceful maintenance globally or per neighbor lowers preferences. A router should be shut down only after neighboring routers stop sending traffic to allow full network convergence.
The document discusses techniques for improving BGP convergence including next hop tracking (NHT), which allows BGP to react quickly to IGP changes without waiting 60 seconds for the full BGP table scan; minimum route advertisement interval (MRAI) timers which batch route updates to peers but can also slow convergence across multiple autonomous systems; and event driven route origination which reduces CPU usage compared to the previous polling model. Faster session deactivation (FSD) also allows BGP sessions to be quickly torn down if the route to a peer is lost.
- The document describes a lab scenario demonstrating basic BGP configuration and operation between autonomous systems.
- In the initial configuration, the boundary routers can exchange routes learned from their respective ISPs via EBGP, but cannot exchange routes learned from the opposite ISP due to the lack of IBGP configuration.
- Configuring IBGP between the boundary routers allows them to exchange all external BGP routes, without needing to redistribute via the IGP. However, the "BGP synchronization rule" prevents advertisement of routes before the next hop address is learned via the IGP.
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
1. The document discusses network and computing bandwidth demands increasing exponentially over the next decade, requiring network designs to double bandwidth every 18 months for networks and 24 months for computing.
2. It addresses challenges in network design from these increasing demands, such as needing larger routers, more routers to avoid overloading domains, and seamless services across different network segments.
3. The role of segment routing and traffic engineering is discussed for optimizing network capacity and meeting policies around high bandwidth paths, low latency paths, and avoiding congested network resources.
The document discusses various BGP concepts including:
1. IBGP and EBGP peering, route reflection, redistribution, and aggregation are covered to help connect routers across autonomous systems and optimize routing.
2. BGP's best path selection process is examined, outlining criteria like weight, local preference, AS path length, origin, and MED that influence route selection.
3. Techniques like route reflection, confederations, redistribution, peer groups, and route aggregation are presented to help simplify IBGP configurations and optimize routing across multiple autonomous systems.
The document discusses Network Time Protocol (NTP) and syslog logging. It provides an in-depth overview of NTP including key concepts like stratum levels, NTP modes, configuration, authentication, and troubleshooting. It also covers syslog logging, describing how Cisco devices use syslog to send system messages to monitoring locations for fault detection and security auditing. An example NTP lab is shown using GNS3 with configurations for an NTP server, clients, and authentication.
Presentation about interior gateway routing protocol EIGRP which covers most of the concepts and features of the protocol.
Delivered by Dmitry Figol, CCIE R&S #53592.
The document provides an overview of PGW/GGSN configuration on a Juniper router, including configuring routing instances, APNs, CDRs, QoS, and other optional configurations like SACC, PISC, and credit control. It describes configuring connectivity and routing, GTP properties, L2TP, DHCP, RADIUS, PDP context properties, and quality of service. The document also lists additional resources for further study of 3GPP specifications and vendor documentation.
The document discusses changes in data center and network architecture over time from mainframes to personal computers to modern cloud platforms. Traditional spanning tree protocol (STP) architectures are no longer suitable due to shifting traffic patterns and new applications. New options like layer 2 fabrics, encapsulated overlays, and software-defined networking can provide more flexibility, scalability, and agility needed to adapt to changing demands.
This document discusses Cisco OTV (Overlay Transport Virtualization) and how it separates STP domains between sites, allows different STP technologies per site, handles multi-homing between sites using an Authoritative Edge Device (AED) to prevent loops, and optimizes the forwarding of different traffic types including unicast, multicast, broadcast, and ARP packets between sites while supporting MAC mobility. It also discusses how OTV isolates FHRP protocols between sites.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
This document provides an overview and agenda for a presentation on VXLAN BGP EVPN technology. It begins with an introduction to VXLAN and EVPN concepts. It then outlines the agenda which includes explaining VXLAN configuration, EVPN configuration, underlay configuration, overlay configuration, and EVPN VXLAN service configuration. It also provides a sample migration from a legacy device configuration to a VXLAN BGP EVPN configuration. Various networking acronyms related to VXLAN and EVPN are defined. Sample vendor supported data center technologies and a VXLAN test topology are shown.
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
This presentations contains introductory to Intermediate topics on Ericsson MKVI SGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in SGSN.
The document provides an overview of the Border Gateway Protocol (BGP). It begins with general information about BGP, including that it is used for routing between autonomous systems and is classified as a path vector routing protocol. It then covers BGP theory in detail over several sections, explaining concepts like neighbors, messages, states, attributes and more. The document aims to provide thorough theoretical understanding needed to implement BGP in a lab.
BMP (BGP Monitoring Protocol) allows routers to send BGP peer route updates and statistics to external monitoring stations. It provides access to the pre-policy routing table (Adj-RIB-In) of peers on an ongoing basis. Cisco supports BMP in IOS-XE and IOS-XR routers. OpenBMP is an open-source BMP collector that stores updates in a MySQL database for analysis.
The document provides an overview of Internet Enhanced Service (IES) on Alcatel-Lucent platforms. IES allows customer IP interfaces to participate in the same routing instance as the service network core. Key points include:
- IES provides Internet connectivity through logical IP interfaces with SAP access points.
- Multiple IES services can be created to separate customer IP interfaces.
- Features like QoS policy propagation using BGP (QPPB) and VRRP are supported on IES interfaces.
A presentation to help new network operators plan a project to improve their network traffic management. Useful for inbound and outbound heavy networks. Lists the things you need to do to reach routing and peering nirvana.
Segment routing allows a node to steer a packet through an ordered list of segments encoded in the packet header. Segments represent instructions like forwarding through specific nodes or along certain paths. By encoding the path in packets, segment routing can compute paths centrally and reduce network state.
BGP graceful maintenance allows a router to be taken offline without dropping traffic by advertising routes with a lower preference first. This gives alternate routes time to take over before removing the router. The router's routes are sent with a GSHUT community and lowered attributes, and incoming routes are marked with a GSHUT attribute. Activating graceful maintenance globally or per neighbor lowers preferences. A router should be shut down only after neighboring routers stop sending traffic to allow full network convergence.
The document discusses techniques for improving BGP convergence including next hop tracking (NHT), which allows BGP to react quickly to IGP changes without waiting 60 seconds for the full BGP table scan; minimum route advertisement interval (MRAI) timers which batch route updates to peers but can also slow convergence across multiple autonomous systems; and event driven route origination which reduces CPU usage compared to the previous polling model. Faster session deactivation (FSD) also allows BGP sessions to be quickly torn down if the route to a peer is lost.
This chapter covers Spanning Tree Protocol (STP) fundamentals, including how STP elects a root bridge, identifies root, designated and blocking ports, and prevents forwarding loops. It also examines STP port states and types, as well as how STP converges when links fail through the use of topology change notifications.
Here are the key tasks for initial configuration of a Cisco switch:
- Set the enable and console passwords to secure access to privileged modes. The passwords must be between 4-8 characters.
- Configure the hostname to identify the switch.
- Configure the IP address and subnet mask on VLAN 1 for management access.
- Verify port status and configure basic settings like speed and duplex.
- Configure SNMP, syslog servers for remote monitoring if needed.
- Configure spanning tree protocol for redundancy.
- Save the running configuration to startup for automation on reboot.
- Test connectivity to verify the base configuration is functioning properly.
Here are the key tasks for initial configuration of a Cisco switch:
- Setting the enable and console passwords to secure access to privileged modes (Password must be between 4 and 8 characters)
- Setting the hostname to identify the switch
- Configuring the IP address and subnet mask on VLAN 1 to allow remote management via SSH/Telnet
- Configuring basic security settings like disabling unused ports, protocols, and services
- Configuring spanning tree protocol (STP) for redundancy and loop prevention in switched networks
- Verifying port status and connectivity using show commands
This document discusses layer 2 switching and VLANs. It begins by explaining how switching breaks up large collision domains into smaller ones by creating individual collision domains per switch port. It then discusses how VLANs allow further segmentation of the network by logically grouping ports regardless of their physical location. VLANs create separate broadcast domains to limit broadcast traffic to specific groups of users. The document provides examples of creating, assigning ports to, and deleting VLANs on a switch to segmented the network.
This document discusses layer 2 switching and VLANs. It provides information on:
- How layer 2 switches break up large collision domains into smaller ones by creating separate collision domains for each switch port. This improves network performance over hub-based networks.
- The two main types of VLAN membership - static VLANs where ports are manually assigned to VLANs, and dynamic VLANs where VLAN assignments are determined automatically based on device MAC addresses.
- How VLANs simplify network management by allowing logical segmentation of broadcast domains independent of physical port locations, and improve network security by restricting communication between VLANs.
This document discusses layer 2 switching and VLANs. It begins by explaining how switching breaks up large collision domains into smaller ones by creating individual collision domains per switch port. It then discusses how VLANs allow further segmentation of the network by logically grouping ports regardless of their physical location. VLANs create separate broadcast domains to limit broadcast traffic to specific groups of users. The document provides examples of creating, assigning ports to, and deleting VLANs on a switch to segmented the network.
The document provides answers to questions about CCNA 3 Chapter 5 on spanning tree protocol. It includes 20 multiple choice questions about concepts like the criteria switches use to select the root bridge, how STP prevents loops in a switched network, and how port roles are assigned in RSTP. It also includes exhibits showing STP output from switches to help illustrate concepts.
This document discusses advanced spanning tree protocol (STP) tuning and protection mechanisms. It covers modifying the root bridge location, adjusting port costs and priorities to influence the STP topology, and protection mechanisms like root guard, BPDU guard, and loop guard that help prevent forwarding loops. Configuration examples are provided for setting the root and backup root bridges, enabling portfast, BPDU guard, and BPDU filter.
Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops. It is standardized as IEEE 802.D protocol. STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure loop-free topology. With STP in place, you can have redundant links between switches in order to provide redundancy.
Ethernet networks can operate in either half-duplex or full-duplex mode. Half-duplex uses CSMA/CD to resolve collisions but only allows data transmission in one direction at a time, while full-duplex allows simultaneous two-way transmission by using point-to-point connections between devices to eliminate collisions. Spanning Tree Protocol (STP) is used to prevent loops in redundant switched networks by providing a single active path and blocking backup paths, while Rapid Spanning Tree Protocol (RSTP) provides much faster convergence times than STP. Virtual LANs (VLANs) allow logical segmentation of networks to isolate broadcast domains while maintaining physical connectivity, with VLAN IDs associating ports on switches to specific
A bridge connects two or more local area networks (LANs) or network segments. It operates at the data link layer and uses MAC addresses to forward packets. Bridges filter traffic so that network traffic intended for one segment does not congest other segments. There are two types of bridges: local bridges for physically close segments, and remote bridges used in pairs for remotely segmented networks. Transparent bridging allows bridges to learn network locations without configuration by maintaining a forwarding database of MAC addresses and interfaces. The spanning tree protocol prevents network loops by negotiating a loop-free path and forcing redundant paths to blocked states.
STP, VTP, and wireless networking were summarized as follows:
STP ensures there is only one logical path between destinations by intentionally blocking redundant paths that could cause loops. A root bridge is selected which serves as a reference point to determine which paths to block. VTP allows VLAN configurations to be propagated between switches in the same VTP domain. QoS provides prioritization of selected network traffic. Wireless networks can operate in ad hoc mode without access points.
This document discusses layer 2 switching and VLANs. It provides information on how switches learn MAC addresses, create VLANs, configure trunk links between switches to carry multiple VLANs, and how frame tagging allows VLAN traffic to cross switches while keeping VLANs separate. It also discusses spanning tree protocol which prevents network loops in redundant switched topologies.
The document provides instructions for commissioning a network element including:
1. Configuring the board manager, radio parameters like frequency and power, and bridge mode.
2. Creating VLANs and assigning ports as members to forward traffic for different VLAN IDs.
3. Configuring the management port and IP address for network management and SNMP.
4. Adding the IP of remote network elements to manage them remotely.
Ccnp enterprise workbook v1.0 completed till weigthSagarR24
The document provides configuration instructions for Lab 1 tasks on switches SCOTSW01 through SCOTSW08. The tasks include defining hostnames, creating VLANs 99-120 and 666-999, suspending VLAN 999, creating a management interface on VLAN 99, and enabling Telnet and SSH access for the "admin" user. Users are instructed to configure these items on each switch as per the topology, using the provided configuration examples.
The document provides a lab workbook for CCNP Enterprise certification topics. It includes configurations and verification tasks for various labs covering VLANs, trunking, VTP, STP, RSTP, MSTP, DTP, etherchannel, HSRP, OSPF and more. The initial lab covers creating VLANs 99, 100, 110, 120 and 999 on switches, setting up a management interface on VLAN 99, and enabling Telnet and SSH access for the admin user.
This document provides an overview of cloud computing concepts including cloud deployment models, virtualization technologies, and compute virtualization. It discusses the four cloud deployment models (public, private, community, hybrid), hypervisor types, virtual machines versus containers, and topics that will be covered in a CCNP Enterprise 2020 lab workbook training. Key topics covered include virtualization, cloud computing, Cisco virtualization technologies, and containerization versus virtual machines.
The document discusses routing protocols and concepts. It provides an overview of dynamic routing protocols including distance vector protocols like RIP, EIGRP, and path vector protocols like BGP. It also discusses link-state protocols like OSPF. The document then covers routing protocol concepts like path selection, metrics, multipathing, and static routing. It includes configuration examples and explanations of routing protocol algorithms and behaviors.
This document provides an overview of routing protocols and path selection algorithms. It discusses the main types of routing protocols including distance vector protocols like RIP, link-state protocols like OSPF, path vector protocols like BGP, and hybrid protocols like EIGRP. It describes how each protocol uses different algorithms and metrics to determine the best path, avoid loops, and populate the routing table. Key topics covered include distance vector algorithms, link-state algorithms, path vector algorithms, and the role of the routing and forwarding tables in path selection.
The document discusses Cisco wireless LAN technologies and configurations. It covers topics such as wired vs wireless networks, wireless bands and channels, encryption methods, Cisco wireless LAN controller deployment models, and wireless service sets. Cisco offers different wireless LAN controller deployment models including centralized, cloud-based, embedded, and mobility express, suitable for different network sizes. Wireless networks use radio frequencies to transmit data without wires, dividing frequency bands into non-overlapping channels to allow multiple access points to operate simultaneously without interference.
This document provides an overview of key topics in wireless networking, including the differences between wired and wireless networks, wireless technologies, basic service sets (BSS), radio frequency (RF), wireless bands and channels, and wireless encryption. It discusses how wireless networks remove the need for wires but introduce challenges with transmitting data through open space without physical protection. Access points and BSSIDs are described as creating closed wireless groups with a common standard and coverage area.
This document provides information about network redundancy protocols. It discusses several first hop redundancy protocols (FHRPs) including Hot Standby Router Protocol (HSRP). HSRP provides default gateway redundancy. With HSRP, routers share a virtual IP address and virtual MAC address. One router is elected as the active router to forward traffic while the others act as standby routers ready to take over if the active router fails. The document provides detailed configuration steps for implementing HSRP including defining the HSRP group, priority, preemption, and authentication.
The document contains instructions for configuring CCNP Enterprise lab switches. It includes steps to:
1. Define hostnames and create VLANs for management, servers, guest, office and parking on all switches.
2. Configure a management interface on VLAN 99 for each switch.
3. Enable Telnet and SSH access for the "admin" user to allow remote connections to the switches.
The document provides information about AAA (authentication, authorization, and accounting), access control lists (ACLs), and configuration examples for implementing TACACS+ and RADIUS on Cisco switches for authentication, authorization, and accounting. It discusses topics like standard vs extended ACLs, ACL rules, and provides examples of configuring numbered and named standard and extended ACLs to filter traffic between routers in an OSPF network.
The document discusses network programmability topics covered in a CCNP Enterprise 2020 lab workbook, including application programming interfaces (APIs), data formats like XML and JSON, network automation scripts using Python and Ansible, and the network configuration protocol NETCONF. It provides details on northbound and southbound APIs, representational state transfer (REST) APIs, and using the Postman application to test and interact with APIs. It gives examples of XML, JSON, and YAML data formats and discusses using APIs to configure and monitor network devices.
This document discusses network programmability topics covered in a CCNP Enterprise 2020 lab workbook, including application programming interfaces (APIs), data formats like XML and JSON, and network protocols like NETCONF and RESTCONF. It focuses on common APIs like Cisco DNA API and Cisco vManage API. It provides an overview of API tools like Postman and describes how to use Postman to test API calls through features like tabs, URL bar, and collections.
This document discusses using APIs to programmatically configure and monitor networks. It covers topics like northbound and southbound APIs, REST APIs, common data formats like JSON and XML, and examples using the Cisco DNA Center and Cisco vManage APIs. Specific APIs demonstrated include the DNA Center token, network device, and vManage authentication APIs. The Postman API testing tool is also introduced for sending API requests.
This document provides an overview of Network Time Protocol (NTP) including key concepts, configuration, and verification. It discusses NTP modes, stratum levels, architecture, security, and authentication. Configuration examples are given for an NTP server, client, and peer with authentication and access control lists. Verification commands show synchronized time on clients matching the NTP server.
This document provides details on configuring and verifying Network Time Protocol (NTP) on Cisco routers and switches. It discusses NTP concepts like modes, stratums, versions and authentication. Configuration steps shown include adjusting the router clock, configuring an NTP server, clients and peers. Authentication is configured between the NTP server and clients using MD5 encryption. Access control lists are applied to allow only authorized NTP traffic. The results of NTP configurations are verified using show commands to display synchronized time and NTP associations.
This document discusses authentication, authorization and accounting (AAA) protocols, access control lists (ACLs), and network security topics covered in a CCNP Enterprise 2020 lab workbook. It provides information on AAA protocols including RADIUS and TACACS+, describes the functions of authentication, authorization and accounting. It also covers the basics of standard and extended ACLs including the different types, how they are defined and identified, and rules for applying ACLs. Configuration examples are given for implementing AAA and ACLs on Cisco switches and routers.
This document provides information about AAA (authentication, authorization, accounting), ACLs (access control lists), RADIUS and TACACS+ protocols. It defines AAA as a system for tracking user activities on an IP network and controlling access to resources. It describes the different types of ACLs (standard and extended) and how they work. It also highlights the key differences between RADIUS and TACACS+ protocols, such as RADIUS encrypting only passwords while TACACS+ encrypts the entire communication. The document provides configuration examples for implementing AAA, ACLs, RADIUS and TACACS+ on Cisco switches and routers.
VLAN Trunking Protocol (VTP) reduces administration by automatically distributing VLAN configurations throughout a domain of switches. VTP operates in server, client, transparent, or off modes. VTP servers can create and modify VLANs, while clients and transparent switches can only forward VTP advertisements. VTP pruning helps reduce unnecessary broadcast traffic by pruning VLANs from trunks where no end stations exist. VTP version 3 supports extended VLAN ranges and private VLANs, while offering more secure authentication and compatibility with version 2.
This document provides information about AAA (authentication, authorization, and accounting), RADIUS, TACACS+, and access control lists (ACLs). It defines these topics, compares RADIUS and TACACS+, and provides CLI examples for configuring AAA with both RADIUS and TACACS+. It also describes the types of ACLs, how they are identified, and basic rules for configuring and applying ACLs.
This document provides information about authentication, authorization and accounting (AAA) protocols, access control lists (ACLs), and Cisco ASA configuration. It discusses the key differences between RADIUS and TACACS+ protocols, defines standard and extended ACLs, and provides CLI examples for configuring AAA and ACLs on Cisco switches and routers. Topics covered include AAA concepts, RADIUS and TACACS+ protocols, ACL identification and rules, and CLI commands for configuring AAA using RADIUS or TACACS+ and applying ACLs on interfaces.
Understanding-the-Weather.pdf/7th class/social/ 2nd chapter/Samyans Academy n...Sandeep Swamy
Weather shapes our world and daily lives. This presentation explores how we measure weather conditions and use predictions to prepare for various weather events. "A change in the weather is sufficient to create the world and oneself anew." - Marcel Proust, French novelist by sandeep swamy
Protest - Student Revision Booklet For VCE Englishjpinnuck
The 'Protest Student Revision Booklet' is a comprehensive resource to scaffold students to prepare for writing about this idea framework on a SAC or for the exam. This resource helps students breakdown the big idea of protest, practise writing in different styles, brainstorm ideas in response to different stimuli and develop a bank of creative ideas.
How to Configure Subcontracting in Odoo 18 ManufacturingCeline George
Subcontracting in manufacturing involves outsourcing specific production tasks to external vendors or subcontractors. These tasks may include manufacturing certain components, handling assembly processes, or even producing entire product lines.
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...TechSoup
Thousands of nonprofits rely on donated Microsoft 365 Business Premium and Office 365 E1 subscriptions. In this webinar, TechSoup discuss Microsoft's May 14 announcement that the donated versions of these licenses would no longer be available to nonprofits after July 1, 2025, and which options are best for nonprofits moving forward as they transition off these licenses.
How to Add a Custom Menu, List view and FIlters in the Customer Portal Odoo 18Celine George
To create a new menu in the "My Accounts" portal and set up a list/form view in Odoo 18, follow these steps. For Example- The custom menu has now been added to the "Fleet" customer portal.
This article explores the miraculous event of the Splitting of the Moon (Shaqq al-Qamar) as recorded in Islamic scripture and tradition. Drawing from the Qur'an, authentic hadith collections, and classical tafsir, the article affirms the event as a literal miracle performed by Prophet Muhammad ﷺ in response to the Quraysh’s demand for a sign. It also investigates external historical accounts, particularly the legend of Cheraman Perumal, a South Indian king who allegedly witnessed the miracle and embraced Islam. The article critically examines the authenticity and impact of such regional traditions, while also discussing the lack of parallel astronomical records and how scholars have interpreted this event across centuries. Concluding with the theological significance of the miracle, the article offers a well-rounded view of one of Islam’s most discussed supernatural events.
Basic principles involved in the traditional systems of medicine, Chapter 7,...ARUN KUMAR
Basic principles involved in the traditional systems of medicine include:
Ayurveda, Siddha, Unani, and Homeopathy
Method of preparation of Ayurvedic formulations like:
Arista, Asava, Gutika, Taila, Churna, Lehya and Bhasma
2. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
SPANNING TREE PROTOCOL (STP)
- Spanning Tree Protocol (STP) enables switches to become aware of other switches through the
advertisement and receipt of bridge protocol data units (BPDUs).
- STP builds a Layer 2 loop-free topology in an environment by temporarily blocking traffic on
redundant ports.
- STP operates by selecting a specific switch as the master switch and running a tree-based
algorithm to identify which redundant ports should not forward traffic.
STP has multiple flavours:
• 802.1D, which is the original specification
• Per-VLAN Spanning Tree (PVST) {Cisco Proprietary}
• Per-VLAN Spanning Tree Plus (PVST+) {Cisco Proprietary}
• 802.1W Rapid Spanning Tree Protocol (RSTP) {IEEE standard}
• 802.1S Multiple Spanning Tree Protocol (MST) {IEEE standard}
Catalyst switches now operate in PVST+, RSTP, and MST modes. All three of these modes are
backward compatible with 802.1D.
IEEE 802.1D STP
The original version of STP comes from the IEEE 802.1D standards and provides support for ensuring
a loop-free topology for one VLAN.
802.1D Port States
In the 802.1D STP protocol, every port transitions through the following states:
• Disabled: The port is in an administratively off position (that is, shut down).
• Blocking: The switch port is enabled, but the port is not forwarding any traffic to ensure that
a loop is not created. The switch does not modify the MAC address table. It can only receive BPDUs
from other switches. After 20 seconds, the switch port changes from the blocking state to the
listening state.
• Listening: The switch port has transitioned from a blocking state and can now send or
receive BPDUs. It cannot forward any other network traffic. The duration of the state correlates to
the STP forwarding time. The next port state is learning. After 15 seconds, the switch port moves
from the listening state to the learning state.
• Learning: The switch port can now modify the MAC address table with any network traffic
that it receives. The switch still does not forward any other network traffic besides BPDUs. The
duration of the state correlates to the STP forwarding time. The next port state is forwarding. After
15 seconds, the switch port moves from the learning state to the forwarding state.
3. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
• Forwarding: The switch port can forward all network traffic and can update the MAC
address table as expected. This is the final state for a switch port to forward network traffic.
STP Key Terminology
Several key terms are related to STP:
• Root bridge: The root bridge is the most important switch in the Layer 2 topology. All ports
are in a forwarding state. This switch is considered the top of the spanning tree for all path
calculations by other switches. All ports on the root bridge are categorized as designated ports.
• Bridge protocol data unit (BPDU): This network packet is used for network switches to
identify a hierarchy and notify of changes in the topology. A BPDU uses the destination MAC address
01:80:c2:00:00:00. There are two types of BPDUs:
4. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
• Configuration BPDU: This type of BPDU is used to identify the root bridge, root
ports, designated ports, and blocking ports. The configuration BPDU consists of the following fields:
STP type, root path cost, root bridge identifier, local bridge identifier, max age, hello time, and
forward delay.
• Topology change notification (TCN) BPDU: This type of BPDU is used to
communicate changes in the Layer 2 topology to other switches.
• Root path cost: This is the combined cost for a specific path toward the root switch.
• System priority: This 4-bit value indicates the preference for a switch to be root bridge. The
default value is 32,768.
• System ID extension: This 12-bit value indicates the VLAN that the BPDU correlates to. The
system priority and system ID extension are combined as part of the switch’s identification of the
root bridge.
• Root bridge identifier: This is a combination of the root bridge system MAC address, system
ID extension, and system priority of the root bridge.
• Local bridge identifier: This is a combination of the local switch’s bridge system MAC
address, system ID extension, and system priority of the root bridge.
• Max age: This is the maximum length of time that passes before a bridge port saves its BPDU
information. The default value is 20 seconds, but the value can be configured with the
command spanning-tree vlan vlan-id max-age maxage. If a switch loses contact with the BPDU’s
source, it assumes that the BPDU information is still valid for the duration of the Max Age timer.
• Hello time: This is the time that a BPDU is advertised out of a port. The default value is 2
seconds, but the value can be configured to 1 to 10 seconds with the command spanning-tree vlan
vlan-id hello-time hello-time.
• Forward delay: This is the amount of time that a port stays in a listening and learning state.
The default value is 15 seconds, but the value can be changed to a value of 15 to 30 seconds with
the command spanning-tree vlan vlan-id forward-time forward-time.
5. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
BPDU
STP uses two types of BPDUs, configuration BPDUs and topology change notification (TCN) BPDUs.
Configuration BPDUs:
• Protocol ID—Fixed at 0x0000, which represents IEEE 802.1d.
• Protocol version ID—Spanning tree protocol version ID. The protocol version ID for STP is 0x00.
• BPDU type—Type of the BPDU. The value is 0x00 for a configuration BPDU.
• Flags—An 8-bit field indicates the purpose of the BPDU. The lowest bit is the Topology Change
(TC) flag. The highest bit is the Topology Change Acknowledge (TCA) flag. All other bits are
reserved.
• Root ID—Root bridge ID formed by the priority and MAC address of the root bridge.
• Root path cost—Cost of the path to the root bridge.
• Bridge ID—Designated bridge ID formed by the priority and MAC address of the designated
bridge.
• Port ID—Designated port ID formed by the priority and global port number of the designated
port.
• Message age—Age of the configuration BPDU while it propagates in the network.
• Max age—Maximum age of the configuration BPDU stored on the switch.
• Hello time—Configuration BPDU transmission interval.
• Forward delay—Delay for STP bridges to transit port state.
6. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
BRIDGE ID = PRIORITY + MAC ADDRESS (Lowest Wins Always)
802.1D Port Types
The 802.1D STP standard defines the following three port types:
1. Root port (RP): A network port that connects to the root bridge or an upstream switch in
the spanning-tree topology. There should be only one root port per VLAN on a switch.
2. Designated port (DP): A network port that receives and forwards BPDU frames to other
switches. Designated ports provide connectivity to downstream devices and switches.
There should be only one active designated port on a link.
3. Blocking port: A network that is not forwarding traffic because of STP calculations.
7. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
802.1D STP Port Election
STP PORT ELECTION
1. Selecting the Root Bridge
2. Selecting the Root Port
3. Selecting Designated port & Non Designated Port
1. Selecting the Root Bridge
• The bridge with the Best (lowest) Bridge ID
• Bridge = Priority + MAC address of Switch
• Out of all Switches in Network, one is elected as a Root bridge
2. Selecting the Root Port
• Shortest part to reach to the Root bridge
• Every Non-root bridge looks the best way to go Root-bridge
o Least Cost (Speed)
o The Lowest forwarding Bridge ID (priority + mac addr.)
o Lowest Forwarding Physical Port number
3. Remaining Port are BLOCKING!!!
8. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
Spanning Tree Path Cost
The interface STP cost is an essential component for root path calculation because the root path is
found based on the cumulative interface STP cost to reach the root bridge
1. The interface STP cost was originally stored as a 16-bit value with a reference value of 20
Gbps.
2. As switches have developed with higher-speed interfaces, 20 Gbps might not be enough.
Another method, called long mode, uses a 32-bit value and uses a reference speed of 20
Tbps.
Link Speed Short-Mode STP Cost Long-Mode STP Cost
10 Mbps 100 2,000,000
100 Mbps 19 200,000
1 Gbps 4 20,000
10 Gbps 2 2,000
20 Gbps 1 1,000
100 Gbps 1 200
1 Tbps 1 20
10 Tbps 1 2
• Devices can be configured with the long-mode interface cost with the command spanning-tree
pathcost method long
• The entire Layer 2 topology should use the same setting for every device in the environment to
ensure a consistent topology.
9. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
COMMAND REFERENCE
Task Command Syntax
Set the STP max age spanning-tree vlan vlan-id max-age
Set the STP hello interval spanning-tree vlan vlan-id hello-time hello-
time
Set the STP forwarding delay spanning-tree vlan vlan-id forward-
time forward-time
Display the STP root bridge and cost show spanning-tree root
Display the STP information (root bridge, local bridge, and interfaces) for
one or more VLANs
show spanning-tree [vlan vlan-id]
Identify when the last TCN occurred and which port was the reason for it. show spanning-tree [vlan vlan-id] detail
DEBUG Commands for STP Debug spanning-tree events
Debug spanning-tree bpdu
Debug spanning-tree config
QUIZ 1:
1. How many different BPDU types are there?
1. One
2. Two
3. Three
4. Four
2. What attributes are used to elect a root bridge?
1. Switch port priority
2. Bridge priority
3. Switch serial number
4. Path cost
3. The original 802.1D specification assigns what value to a 1 Gbps interface?
1. 1
2. 2
3. 4
4. 19
4. All of the ports on a root bridge are assigned what role?
10. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
1. Root port
2. Designated port
3. Superior port
4. Master port
5. Using default settings, how long does a port stay in the listening state?
1. 2 seconds
2. 5 seconds
3. 10 seconds
4. 15 seconds
6. Upon receipt of a configuration BPDU with the topology change flag set, how do the downstream
switches react?
1. By moving all ports to a blocking state on all switches
2. By flushing out all MAC addresses from the MAC address table
3. By temporarily moving all non-root ports to a listening state
4. By flushing out all old MAC addresses from the MAC address table
5. By updating the Topology Change version flag on the local switch database
7. Which of the following is not an RSTP port state?
1. Blocking
2. Listening
3. Learning
4. Forwarding
8. True or false: In a large Layer 2 switch topology, the infrastructure must fully converge before any
packets can be forwarded.
1. True
2. False
9. True or false: In a large Layer 2 switch topology that is running RSTP, the infrastructure must fully
converge before any packets can be forwarded.
1. True
2. False
Answers to the “Do I Know This Already?” quiz:
1 B
2 B
3 C
4 B
5 D
6 D
7 A, B
8 B
9 B
11. CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY SAGAR (CISCO TRAINER)
CCNP ENTERPRISE | WWW.NETWORKJOURNEY.COM || WWW.YOUTUBE.COM/C/NETWORKJOURNEY
QUIZ 2:
1. A switch’s STP priority can be configured in increments of ______.
1. 1
2. 256
3. 2048
4. 4096
2. True or false: The advertised path cost includes the advertising link’s port cost as part of the
configuration BPDU advertisement.
1. True
2. False
3. True or false: The switch port with the lower STP port priority is more preferred.
1. True
2. False
4. What happens to a switch port when a BPDU is received on it when BPDU guard is enabled on
that port?
1. A message syslog is generated, and the BPDU is filtered.
2. A syslog message is not generated, and the BPDU is filtered.
3. A syslog message is generated, and the port is sent back to a listening state.
4. A syslog message is generated, and the port is shut down.
5. Enabling root guard on a switch port does what?
1. Upon receipt of an inferior BPDU, the port is shut down.
2. Upon receipt of a superior BPDU, the port is shut down.
3. Upon receipt of an inferior BPDU, the BPDU is filtered.
4. When the root port is shut down, only authorized designated ports can become root ports.
6. UDLD solves the problem of ______.
1. time for Layer 2 convergence
2. a cable sending traffic in only one direction
3. corrupt BPDU packets
4. flapping network links
Answers to the “Do I Know This Already?” quiz:
1 D
2 B
3 A
4 D
5 B
6 B