CCNA Basics

71
Intranet Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization. Intranets are basically an internet which is usually only accessible from within the organization. Extranet An organization may use an extranet to provide secure and safe access to individuals who work for a different organizations, but require company data. Examples of extranets include: A company providing access to outside suppliers/contractors. A hospital providing a booking system to doctors so they can make appointments for their patients. A local office of education providing budget and personnel information to the schools in its district. IPv6 Network Addresses IPv4 issues There is not a single date to move to IPv6. For the foreseeable future, both IPv4 and IPv6 will coexist. The transition is expected to take years. The IETF has created various protocols and tools to help network administrators migrate their networks to IPv6. The migration techniques can be divided into three categories: Dual Stack – As shown in Figure 1, dual stack allows IPv4 and IPv6 to coexist on the same network. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously.

description

CCNA basics for ccna course

Transcript of CCNA Basics

Page 1: CCNA Basics

Intranet

Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization. Intranets are basically an internet which is usually only accessible from within the organization.

Extranet

An organization may use an extranet to provide secure and safe access to individuals who work fora different organizations, but require company data. Examples of extranets include:

A company providing access to outside suppliers/contractors.

A hospital providing a booking system to doctors so they can make appointments for their patients.

A local office of education providing budget and personnel information to the schools in its district.

IPv6 Network Addresses

IPv4 issues

There is not a single date to move to IPv6. For the foreseeable future, both IPv4 and IPv6 will coexist. The transition is expected to take years. The IETF has created various protocols and tools to help network administrators migrate their networks to IPv6. The migration techniques can be divided into three categories:

Dual Stack – As shown in Figure 1, dual stack allows IPv4 and IPv6 to coexist on the same network. Dual stack devices run both IPv4 and IPv6 protocol stacks simultaneously.

Page 2: CCNA Basics

Tunneling – As shown in Figure 2, tunneling is a method of transporting an IPv6 packet over anIPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet, similar to other types of data.

Translation – As shown in Figure 3, Network Address Translation 64 (NAT64) allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar toNAT for IPv4. An IPv6 packet is translated to an IPv4 packet, and vice versa.

SSH

(config)# hostname myswitch

(config)# ip domain-name thegeekstuff.com

myswitch(config)# crypto key generate rsa

The name for the keys will be: myswitch.thegeekstuff.com

Choose the size of the key modulus in the range of 360 to 2048 for your

General Purpose Keys. Choosing a key modulus greater than 512 may take

a few minutes.

How many bits in the modulus [512]: 1024

% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

# line vty 0 4

(config-line)# transport input ssh

(config-line)# login local

Page 3: CCNA Basics

(config-line)# password 7

(config-line)# exit

# line console 0

(config-line)# logging synchronous

(config-line)# login local

myswitch# config t

Enter configuration commands, one per line. End with CNTL/Z.

myswitch(config)# username ramesh password mypassword

myswitch# enable secret myenablepassword

myswitch# service password-encryption

Basic SSH

1.Enter config mode on the router

router(config)#configure terminal

2.Assign a domain name to the router:

router(config)#ip domain name somedomain.com

3.Generate the RSA keys with the following command. Note that the modulus setting in this example is 1024.

You can actually choose any value between 360-4096.

router(config)#crypto key generate rsa modulus 1024

Press enter and you should see a message similar to this:

% The key modulus size is 1024 bits

Page 4: CCNA Basics

% Generating 1024 bit RSA keys, keys will be non-exportable...

[OK] (elapsed time was 1 seconds)

4.Set the SSH version to 2:

router(config)#ip ssh version 2

5.Verify that your vty settings allow SSH connections. Note we are leaving telnet as a possible connection method in this step until we test SSH.

line vty 0 4

transport input telnet ssh

6.Test the connection with SSH then remove the telnet option from your vty lines.

line vty 0 4

transport input ssh

This is all you need in order to enable basic SSH on your Cisco IOS router or switch.

SSH quick

S1#conf tS1(config)#ip domain-name cisco.comS1(config)#crypto key generate rsaS1(config)#1024S1(config)#username admin secret ciscoS1(config-line)#line vty 0 15S1(config-line)#transport input sshS1(config-line)#login localS1(config-line)#exitS1(config)#ip ssh version 2

Page 5: CCNA Basics

there are many key structures and performance-related characteristics referred to when discussing networks:

Topology - There are physical and logical topologies. The physical topology is the

arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables. The logical topology is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.

Speed - Speed is a measure of the data rate in bits per second (b/s) of a given link in the

network.

Cost - Cost indicates the general expense for purchasing of network components, and

installation and maintenance of the network.

Security - Security indicates how protected the network is, including the information that is

transmitted over the network. The subject of security is important, and techniques and practices are constantly evolving. Consider security whenever actions are taken that affect the network.

Availability - Availability is a measure of the probability that the network is available for

use when it is required.

Scalability - Scalability indicates how easily the network can accommodate more users and

data transmission requirements. If a network design is optimized to only meet current requirements, it can be very difficult and expensive to meet new needs when the network grows.

Reliability - Reliability indicates the dependability of the components that make up the

network, such as the routers, switches, PCs, and servers. Reliability is often measured as a probability of failure or as the mean time between failures (MTBF).

These characteristics and attributes provide a means to compare different networking solutions.

Note: While the term “speed” is commonly used when referring to the network bandwidth, it is nottechnically accurate. The actual speed that the bits are transmitted does not vary over the same medium. The difference in bandwidth is due to the number of bits transmitted per second, not how

Page 6: CCNA Basics

fast they travel over wire or wireless medium.

Inter Vlan Routing

1. Legacy

Page 7: CCNA Basics

The floating static route is only used when the primary route is not available.Floating static route is route with hihger AD distance than routing protocol.

Routing protocols can be compared based on the following characteristics:

Speed of Convergence - Speed of convergence defines how quickly the routers in the

network topology share routing information and reach a state of consistent knowledge. The faster the convergence, the more preferable the protocol. Routing loops can occur when inconsistent routing tables are not updated due to slow convergence in a changing network.

Scalability - Scalability defines how large a network can become, based on the routing

protocol that is deployed. The larger the network is, the more scalable the routing protocol needs to be.

Classful or Classless (Use of VLSM) - Classful routing protocols do not include the

subnet mask and cannot support VLSM. Classless routing protocols include the subnet mask in the updates. Classless routing protocols support VLSM and better route summarization.

Resource Usage - Resource usage includes the requirements of a routing protocol such as

memory space (RAM), CPU utilization, and link bandwidth utilization. Higher resource requirements necessitate more powerful hardware to support the routing protocol operation,in addition to the packet forwarding processes.

Implementation and Maintenance - Implementation and maintenance describes the level

of knowledge that is required for a network administrator to implement and maintain the network based on the routing protocol deployed.

RIPNG

R1(config)#ipv6 unicast-routing

Page 8: CCNA Basics

Enter RIPng protocol configuration mode.

R1(config)#ipv6 router rip CISCO

Enable RIPng for the networks that connect to R1.

R1(config-rtr)#int g0/0

R1(config-if)#ipv6 rip CISCO enable

OSPF V3

Page 9: CCNA Basics

example

As an alternative to setting the default interface bandwidth, the cost can be manually configured on an interface using the ip ospf cost value interface configuration command.

An advantage of configuring a cost over setting the interface bandwidth is that the router does not have to calculate the metric when the cost is manually configured. In contrast, when the interface bandwidth is configured, the router must calculate the OSPF cost based on the bandwidth. The ip ospf cost command is useful in multi-vendor environments where non-Cisco routers may use a metric other than bandwidth to calculate the OSPF costs.

Cost=100000000/bw

Two routers may not form an OSPF adjacency if:

The subnet masks do not match, causing the routers to be on separate networks.

OSPF Hello or Dead Timers do not match.

OSPF Network Types do not match.

There is a missing or incorrect OSPF network command.

ACL

Standard ACLs

Standard ACLs can be used to permit or deny traffic only from source IPv4 addresses. The destination of the packet and the ports involved are not evaluated. The example in Figure 1 allows all traffic from the 192.168.30.0/24 network. Because of the implied "deny any" at the end, all other traffic is blocked with this ACL. Standard ACLs are created in global configuration mode.

Extended ACLs

Extended ACLs filter IPv4 packets based on several attributes:

Protocol type

Source IPv4 address

Page 10: CCNA Basics

Destination IPv4 address

Source TCP or UDP ports

Destination TCP or UDP ports

Optional protocol type information for finer control

Page 11: CCNA Basics

The any and host Keywords

Example 1 in the figure shows how to use the any keyword to substitute for the IPv4 address 0.0.0.0 with a wildcard mask of 255.255.255.255.

Example 2 shows how to use the host keyword to substitute for the wildcard mask when identifying a single host.

Here are some guidelines for using ACLs:

Use ACLs in firewall routers positioned between your internal network and an external

network such as the Internet.

Use ACLs on a router positioned between two parts of your network to control traffic

entering or exiting a specific part of your internal network.

Page 12: CCNA Basics

Configure ACLs on border routers, that is, routers situated at the edges of your networks.

This provides a very basic buffer from the outside network, or between a less controlled area of your own network and a more sensitive area of your network.

Configure ACLs for each network protocol configured on the border router interfaces.

The Three Ps

A general rule for applying ACLs on a router can be recalled by remembering the three Ps. You canconfigure one ACL per protocol, per direction, per interface:

One ACL per protocol - To control traffic flow on an interface, an ACL must be defined

for each protocol enabled on the interface.

One ACL per direction - ACLs control traffic in one direction at a time on an interface.

Two separate ACLs must be created to control inbound and outbound traffic.

One ACL per interface - ACLs control traffic for an interface, for example,

GigabitEthernet 0/0.

Every ACL should be placed where it has the greatest impact on efficiency. As shown in the figure, the basic rules are:

Extended ACLs - Locate extended ACLs as close as possible to the source of the traffic to

be filtered. This way, undesirable traffic is denied close to the source network without crossing the network infrastructure.

Standard ACLs - Because standard ACLs do not specify destination addresses, place them

as close to the destination as possible. Placing a standard ACL at the source of the traffic will effectively prevent that traffic from reaching any other networks through the interface where the ACL is applied.

Placement of the ACL and therefore the type of ACL used may also depend on:

The extent of the network administrator’s control - Placement of the ACL can depend

on whether or not the network administrator has control of both the source and destination networks.

Bandwidth of the networks involved - Filtering unwanted traffic at the source prevents

transmission of the traffic before it consumes bandwidth on the path to a destination. This is especially important in low bandwidth networks.

Ease of configuration - If a network administrator wants to deny traffic coming from

several networks, one option is to use a single standard ACL on the router closest to the destination. The disadvantage is that traffic from these networks will use bandwidth unnecessarily. An extended ACL could be used on each router where the traffic originated. This will save bandwidth by filtering the traffic at the source but requires creating extended

Page 13: CCNA Basics

ACLs on multiple routers.

When traffic enters the router, the traffic is compared to all ACEs in the order that the entries occur in the ACL. The router continues to process the ACEs until it finds a match. The router will process the packet based on the first match found and no other ACEs will be examined.

If no matches are found when the router reaches the end of the list, the traffic is denied. This is because, by default, there is an implied deny at the end of all ACLs for traffic that was not matchedto a configured entry. A single-entry ACL with only one deny entry has the effect of denying all traffic. At least one permit ACE must be configured in an ACL or all traffic is blocked.

For the network in the figure, applying either ACL 1 or ACL 2 to the S0/0/0 interface of R1 in the outbound direction will have the same effect. Network 192.168.10.0 will be permitted to access thenetworks reachable through S0/0/0 while 192.168.11.0 will not be allowed to access those networks.

Edit ACL

It should bementioned that when using the no access-list command, different IOS software releases act

differently. If the ACL that has been deleted is still applied to an interface, some IOS versions act as if no ACL is protecting your network while others deny all traffic. For this reason it is good practice to remove the reference to the access list from the interface before modifying the access list. Also, be aware that if there is an error in the new list, disable it and troubleshoot the problem. In that instance, again, the network has no ACL during the

Page 14: CCNA Basics

correction process.

Method 2: Using the Sequence Number

As shown in the figure the initial configuration of ACL 1 included a host statement for host 192.168.10.99. This was in error. The host should have been configured as 192.168.10.10. To edit the ACL using sequence numbers follow these steps:

Step 1. Display the current ACL using the show access-lists 1 command. The output from this command will be discussed in more detail later in this section. The sequence number is displayed at the beginning of each statement. The sequence number was automatically assigned when the access list statement was entered. Notice that the misconfigured statement has the sequence number 10.

Step 2. Enter the ip access-lists standard command that is used to configure named ACLs. The ACL number, 1, is used as the name. First the misconfigured statement needs to be deleted using the no 10 command with 10 referring to the sequence number. Next, a new sequence number 10 statement is added using the command, 10 deny host 192.168.10.10.

Note: Statements cannot be overwritten using the same sequence number as an existing statement. The current statement must be deleted first, and then the new one can be added.

Step 3. Verify the changes using the show access-lists command.

As discussed previously, Cisco IOS implements an internal logic to standard access lists. The orderin which standard ACEs are entered may not be the order in which they are stored, displayed or processed by the router. The show access-lists command displays the ACEs with their sequence numbers.

Securing VTY ports with a Standard IPv4 ACL

Page 15: CCNA Basics

Extended ACL

The established parameter allows only responses to traffic that originates from the 192.168.10.0/24 network to return to that network. A match occurs if the returning TCP segment has the ACK or reset (RST) bits set, which indicates that the packet belongs to an existing connection. Without the established parameter in the ACL statement, clients could send traffic to a web server, but not receive traffic returning from the web server.

Page 16: CCNA Basics

DHCP

DHCP Relay

What is DHCP Relay?

In a complex hierarchical network, enterprise servers are usually located in a server farm. These servers may provide DHCP, DNS, TFTP, and FTP services for the network. Network clients are not typically on the same subnet as those servers. In order to locate the servers and receive services, clients often use broadcast messages.

In Figure 1, PC1 is attempting to acquire an IPv4 address from a DHCP server using a broadcast message. In this scenario, router R1 is not configured as a DHCPv4 server and does not forward the broadcast. Because the DHCPv4 server is located on a different network, PC1 cannot receive an IP address using DHCP.

In Figure 2, PC1 is attempting to renew its IPv4 address. To do so, the ipconfig /release command is issued. Notice that the IPv4 address is released and the address is shown to be 0.0.0.0. Next, the ipconfig /renew command is issued. This command causes PC1 to broadcast a DHCPDISCOVER message. The output shows that PC1 is unable to locate the DHCPv4 server. Because routers do not forward broadcasts, the request is not successful.

As a solution to this problem, an administrator can add DHCPv4 servers on all the subnets. However, running these services on several computers creates additional cost and administrative overhead.

Page 17: CCNA Basics

A better solution is to configure a Cisco IOS helper address. This solution enables a router to forward DHCPv4 broadcasts to the DHCPv4 server. When a router forwards address assignment/parameter requests, it is acting as a DHCPv4 relay agent. In the example topology, PC1 would broadcast a request to locate a DHCPv4 server. If R1 was configured as a DHCPv4 relay agent, it would forward the request to the DHCPv4 server located on subnet 192.168.11.0.

As shown in Figure 3, the interface on R1 receiving the broadcast is configured with the ip helper-address interface configuration mode command. The address of the DHCPv4 server is configured as the only parameter.

When R1 has been configured as a DHCPv4 relay agent, it accepts broadcast requests for the DHCPv4 service and then forwards those requests as a unicast to the IPv4 address 192.168.11.6. The show ip interface command is used to verify the configuration.

As shown in Figure 4, PC1 is now able to acquire an IPv4 address from the DHCPv4 server.

DHCPv4 is not the only service that the router can be configured to relay. By default, the ip helper-address command forwards the following eight UDP services:

Port 37: Time

Port 49: TACACS

Port 53: DNS

Port 67: DHCP/BOOTP client

Port 68: DHCP/BOOTP server

Port 69: TFTP

Port 137: NetBIOS name service

Port 138: NetBIOS datagram service

Using the Syntax Checker in Figure 5, configure the DHCPv4 relay commands on the correct router so that PC3 can receive IPv4 addressing information from the DHCPv4 server. Refer back to Figure 1 to view the network topology.

Page 18: CCNA Basics

NAT

The terms, inside and outside, are combined with the terms local and global to refer to specific addresses. In the figure, router R2 has been configured toprovide NAT. It has a pool of public addresses to assign to inside hosts.

Inside local address - The address of the source as seen from inside the network. In the

figure, the IPv4 address 192.168.10.10 is assigned to PC1. This is the inside local address of PC1.

Inside global address - The address of source as seen from the outside network. In the

figure, when traffic from PC1 is sent to the web server at 209.165.201.1, R2 translates the inside local address to an inside global address. In this case, R2 changes the IPv4 source address from 192.168.10.10 to 209.165.200.226. In NAT terminology, the inside local address of 192.168.10.10 is translated to the inside global address of 209.165.200.226.

Outside global address - The address of the destination as seen from the outside network.

It is a globally routable IPv4 address assigned to a host on the Internet. For example, the

Page 19: CCNA Basics

web server is reachable at IPv4 address 209.165.201.1. Most often the outside local and outside global addresses are the same.

Outside local address - The address of the destination as seen from the inside network. In

this example, PC1 sends traffic to the web server at the IPv4 address 209.165.201.1. While uncommon, this address could be different than the globally routable address of the destination.

The figure shows how traffic is addressed that is sent from an internal PC to an external web server, across the NAT-enabled router. It also shows how return traffic is initially addressed and translated.

Note: The use of the outside local address is outside the scope of this course.

There are three types of NAT translation:

Static address translation (static NAT) - One-to-one address mapping between local and

global addresses.

Dynamic address translation (dynamic NAT) - Many-to-many address mapping between

local and global addresses.

Port Address Translation (PAT) - Many-to-one address mapping between local and global

addresses. This method is also known as overloading (NAT overloading).

STATIC NAT

Page 20: CCNA Basics
Page 21: CCNA Basics
Page 22: CCNA Basics
Page 23: CCNA Basics

Dynamic NAT

R2(config)#ip nat pool POOL 209.165.76.196 209.165.76.199 netmask 255.255.255.252

R2(config)#access-list 1 permit 172.16.0.0 0.0.255.255

R2(config-if)#interface serial 0/0/0R2(config-if)#ip nat outsideR2(config-if)#interface serial 0/0/1R2(config-if)#ip nat inside

Port Address Translation (PAT)

Page 24: CCNA Basics

PORT FORWARDING

Page 25: CCNA Basics

Scaling network

To optimize bandwidth on an enterprise network, the network must be organized so that traffic stays local and is not propagated unnecessarily ontoother portions of the network. Using the three-layer hierarchical design model helps organize the network.

This model divides the network functionality into three distinct layers, as shown in Figure 1:

Access layer

Distribution layer

Core layer

Each layer is designed to meet specific functions.

The access layer provides connectivity for the users. The distribution layer is used to forward traffic from one local network to another. Finally, the core layer represents a high-speed backbone layer between dispersed networks. User traffic is initiated at the access layer and passes through the other layers if the functionality of those layers is required.

Even though the hierarchical model has three layers, some smaller enterprise networks may implement a two-tier hierarchical design. In a two-tier hierarchical design, the core and distribution layers are collapsed into one layer, reducing cost and complexity.

Page 26: CCNA Basics

Show commands

Here are some of the most commonly used IOS commands to display and verify the operational status of the router and related network functionality. These commands are divided into several categories.

Routing Related:

show ip protocols - Displays information about the routing protocols configured. If OSPF

is configured, this includes the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance, which is 110 for OSPF. (Figure 1)

show ip route - Displays routing table information, including: routing codes, known

networks, administrative distance and metrics, how routes were learned, next hop, static routes, and default routes. (Figure 2)

show ip ospf neighbor - Displays information about OSPF neighbors that have been

learned, including the Router ID of the neighbor, priority, the state (Full = adjacency has been formed), the IP address, and the local interface that learned of the neighbor. (Figure 3)

Interface Related:

show interfaces - Displays interfaces with line (protocol) status, bandwidth, delay,

reliability, encapsulation, duplex, and I/O statistics. If specified without a specific interface designation, all interfaces will be displayed. If a specific interface is specified after the command, information about that interface only will be displayed. (Figure 4)

show ip interfaces - Displays interface information, including: protocol status, the IP

address, if a helper address is configured, and whether an ACL is enabled on the interface. If specified without a specific interface designation, all interfaces will be displayed. If a specific interface is specified after the command, information about that interface only will be displayed. (Figure 5)

show ip interface brief - Displays all interfaces with IP addressing information and

interface and line protocols status. (Figure 6)

show protocols - Displays information about the routed protocol that is enabled, and the

protocol status of interfaces. (Figure 7)

Other connectivity related commands include the show cdp neighbors command (Figure 8). This command displays information on directly connected devices including Device ID, the local interface the device is connected to, capability (R = router, S = switch), the platform, and Port ID of the remote device. The details option includes IP addressing information and the IOS version.

Page 27: CCNA Basics

Broadcast Storm

A broadcast storm occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed. Consequently, no bandwidth is available for legitimate trafficand the network becomes unavailable for data communication. This is an effective denial of service.

A broadcast storm is inevitable on a looped network. As more devices send broadcasts over the network, more traffic is caught within the loop, consuming resources. This eventually creates a broadcast storm that causes the network to fail.

There are other consequences of broadcast storms. Because broadcast traffic is forwarded out every port on a switch, all connected devices have to process all broadcast traffic that is being flooded endlessly around the looped network. This can cause the end device to malfunction because of the high processing requirements for sustaining such a high traffic load on the NIC.

When the STA has determined which paths are most desirable relative to each switch, it assigns port roles to the participating switch ports. The port roles describe their relation in the network to the root bridge and whether they are allowed to forward traffic:

Root ports - Switch ports closest to the root bridge. In the figure, the root port on S2 is

F0/1 configured for the trunk link between S2 and S1. The root port on S3 is F0/1, configured for the trunk link between S3 and S1. Root ports are selected on a per-switch basis.

Designated ports - All non-root ports that are still permitted to forward traffic on the

network. In the figure, switch ports (F0/1 and F0/2) on S1 are designated ports. S2 also has its port F0/2 configured as a designated port. Designated ports are selected on a per-trunk basis. If one end of a trunk is a root port, then the other end is a designated port. All ports on the root bridge are designated ports.

Alternate and backup ports - Alternate ports and backup ports are configured to be in a

blocking state to prevent loops. In the figure, the STA configured port F0/2 on S3 in the alternate role. Port F0/2 on S3 is in the blocking state. Alternate ports are selected only on trunk links where neither end is a root port. Notice in the figure that only one end of the trunk is blocked. This allows for faster transition to a forwarding state, when necessary. (Blocking ports only come into play when two ports on the same switch provide redundant links through the network.)

Disabled ports - A disabled port is a switch port that is shut down.

Page 28: CCNA Basics

Priority is the initial deciding factor when electing a root bridge. If the priorities of all the switches are the same, the device with the lowest MAC address becomes the root bridge.

1. Initially, each switch identifies itself as the root bridge. S2 forwards BPDU frames out all switchports. (Figure 1)

2. When S3 receives a BPDU from switch S2, S3 compares its root ID with the BPDU frame it received. The priorities are equal, so the switch is forced to examine the MAC address portion to determine which MAC address has a lower value. Because S2 has a lower MAC address value, S3 updates its root ID with the S2 root ID. At that point, S3 considers S2 as the root bridge. (Figure 2)

Page 29: CCNA Basics

3. When S1 compares its root ID with the one in the received BPDU frame, it identifies its local root ID as the lower value and discards the BPDU from S2. (Figure 3)

4. When S3 sends out its BPDU frames, the root ID contained in the BPDU frame is that of S2. (Figure 4)

5. When S2 receives the BPDU frame, it discards it after verifying that the root ID in the BPDU matched its local root ID. (Figure 5)

6. Because S1 has a lower priority value in its root ID, it discards the BPDU frame received from S3. (Figure 6)

7. S1 sends out its BPDU frames. (Figure 7)

8. S3 identifies the root ID in the BPDU frame as having a lower value and, therefore, updates its root ID values to indicate that S1 is now the root bridge. (Figure 8)

9. S2 identifies the root ID in the BPDU frame as having a lower value and, therefore, updates its root ID values to indicate that S1 is now the root bridge. (Figure 9)

The varieties of spanning tree protocols include:

STP - This is the original IEEE 802.1D version (802.1D-1998 and earlier) that provides a

loop-free topology in a network with redundant links. Common Spanning Tree (CST) assumes one spanning tree instance for the entire bridged network, regardless of the number of VLANs.

PVST+ - This is a Cisco enhancement of STP that provides a separate 802.1D spanning

tree instance for each VLAN configured in the network. The separate instance supports PortFast, UplinkFast, BackboneFast, BPDU guard, BPDU filter, root guard, and loop guard.

802.1D-2004 - This is an updated version of the STP standard, incorporating IEEE 802.1w.

Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w - This is an evolution of STP

that provides faster convergence than STP.

Rapid PVST+ - This is a Cisco enhancement of RSTP that uses PVST+. Rapid PVST+

provides a separate instance of 802.1w per VLAN. The separate instance supports PortFast,BPDU guard, BPDU filter, root guard, and loop guard.

Multiple Spanning Tree Protocol (MSTP) - This is an IEEE standard inspired by the

earlier Cisco proprietary Multiple Instance STP (MISTP) implementation. MSTP maps multiple VLANs into the same spanning tree instance. The Cisco implementation of MSTP

Page 30: CCNA Basics

is MST, which provides up to 16 instances of RSTP and combines many VLANs with the same physical and logical topology into a common RSTP instance. Each instance supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard.

A network professional, whose duties include switch administration, may be required to decide which type of spanning tree protocol to implement.

Note: The legacy Cisco-proprietary features UplinkFast and BackboneFast are not described in this course. These features are superseded by the implementation of Rapid PVST+, which incorporates these features as part of the implementation of the RSTP standard.

Networks running PVST+ have these characteristics:

Optimum load balancing can result.

One spanning tree instance for each VLAN maintained can mean a considerable waste of

CPU cycles for all the switches in the network (in addition to the bandwidth that is used foreach instance to send its own BPDU). This would only be problematic if a large number of VLANs are configured.

STP port states

Blocking - The port is an alternate port and does not participate in frame forwarding. The port receives BPDU frames to determine the location and root ID of the root bridge switch and what port roles each switch port shouldassume in the final active STP topology.

Page 31: CCNA Basics

Listening - Listens for the path to the root. STP has determined that the port can participate

in frame forwarding according to the BPDU frames that the switch has received thus far. Atthis point, the switch port not only receives BPDU frames, it also transmits its own BPDU frames and inform adjacent switches that the switch port is preparing to participate in the active topology.

Learning - Learns the MAC addresses. The port prepares to participate in frame

forwarding and begins to populate the MAC address table.

Forwarding - The port is considered part of the active topology. It forwards data frames

and sends and receives BPDU frames.

Disabled - The Layer 2 port does not participate in spanning tree and does not forward

frames. The disabled state is set when the switch port is administratively disabled.

Note that the number of ports in each of the various states (blocking, listening, learning, or forwarding) can be displayed with the show spanning-tree summary command.

For each VLAN in a switched network, PVST+ performs four steps to provide a loop-free logical network topology:

1. Elects one root bridge - Only one switch can act as the root bridge (for a given VLAN). The root bridge is the switch with the lowest bridge ID. On the root bridge, all ports are designated ports (in particular, no root ports).

2. Selects the root port on each non-root bridge - STP establishes one root port on each non-rootbridge. The root port is the lowest-cost path from the non-root bridge to the root bridge, indicating the direction of the best path to the root bridge. Root ports are normally in the forwarding state.

3. Selects the designated port on each segment - On each link, STP establishes one designated port. The designated port is selected on the switch that has the lowest-cost path to the root bridge. Designated ports are normally in the forwarding state, forwarding traffic for the segment.

4. The remaining ports in the switched network are alternate ports - Alternate ports normally remain in the blocking state, to logically break the loop topology. When a port is in the blocking state, it does not forward traffic, but can still process received BPDU messages.

The following briefly describes RSTP characteristics:

RSTP is the preferred protocol for preventing Layer 2 loops in a switched network

environment. Many of the differences were established by Cisco-proprietary enhancements to the original 802.1D. These enhancements, such as BPDUs carrying and sending information about port roles only to neighboring switches, require no additional configuration and generally perform better than the earlier Cisco-proprietary versions. Theyare now transparent and integrated in the protocol’s operation.

Page 32: CCNA Basics

Cisco-proprietary enhancements to the original 802.1D, such as UplinkFast and

BackboneFast, are not compatible with RSTP.

RSTP (802.1w) supersedes the original 802.1D while retaining backward compatibility.

Much of the original 802.1D terminology remains and most parameters are unchanged. In addition, 802.1w is capable of reverting back to legacy 802.1D to interoperate with legacy switches on a per-port basis. For example, the RSTP spanning tree algorithm elects a root bridge in exactly the same way as the original 802.1D.

RSTP keeps the same BPDU format as the original IEEE 802.1D, except that the version

field is set to 2 to indicate RSTP, and the flags field uses all 8 bits.

RSTP is able to actively confirm that a port can safely transition to the forwarding state

without having to rely on any timer configuration.

Depending on what is attached to each port, two different link types can be identified:

Point-to-Point - A port operating in full-duplex mode typically connects a switch to a

switch and is a candidate for rapid transition to forwarding state.

Shared - A port operating in half-duplex mode connects a switch to a hub that attaches

multiple devices.

When an administrator wants a specific switch to become a root bridge, the bridge priority value must be adjusted to ensure it is lower than the bridge priority values of all the other switches on the network. There are two different methods to configure the bridge priority value on a Cisco Catalyst switch.

Method 1

To ensure that the switch has the lowest bridge priority value, use the spanning-tree vlan vlan-id root primary command in global configuration mode. The priority for the switch is set to the predefined value of 24,576 or to the highest multiple of 4,096, less than the lowest bridge priority detected on the network.

If an alternate root bridge is desired, use the spanning-tree vlan vlan-id root secondary global configuration mode command. This command sets the priority for the switch to the predefined value of 28,672. This ensures that the alternate switch becomes the root bridge if the primary root bridge fails. This assumes that the rest of the switches in the network have the default 32,768 priority value defined.

Page 33: CCNA Basics

In Figure 1, S1 has been assigned as the primary root bridge using the spanning-tree vlan 1 root primary command, and S2 has been configured as the secondary root bridge using the spanning-tree vlan 1 root secondary command.

Method 2

Another method for configuring the bridge priority value is using the spanning-tree vlan vlan-id priority value global configuration mode command. This command gives more granular control over the bridge priority value. The priority value is configured in increments of 4,096 between 0 and 61,440.

In the example, S3 has been assigned a bridge priority value of 24,576 using the spanning-tree vlan 1 priority 24576 command.

To verify the bridge priority of a switch, use the show spanning-tree command. In Figure 2, the priority of the switch has been set to 24,576. Also notice that the switch is designated as the root bridge for the spanning tree instance.

PortFast is a Cisco feature for PVST+ environments. When a switch port is configured with PortFast that port transitions from blocking to forwarding state immediately, bypassing the usual 802.1D STP transition states (the listening and learning states). You can use PortFast on access ports to allow these devices to connect to the network immediately, rather than waiting for IEEE 802.1D STP to converge on each VLAN. Access ports are ports which are connected to a single workstation or to a server.

In a valid PortFast configuration, BPDUs should never be received, because that would indicate that another bridge or switch is connected to the port, potentially causing a spanning tree loop. Cisco switches support a feature called BPDU guard. When it is enabled, BPDU guard puts the port in an error-disabled state on receipt of a BPDU. This will effectively shut down the port. The BPDU guard feature provides a secure response to invalid configurations because you must manually put the interface back into service.

Cisco PortFast technology is useful for DHCP. Without PortFast, a PC can send a DHCP request before the port is in forwarding state, denying the host from getting a usable IP address and other information. Because PortFast immediately changes the state to forwarding, the PC always gets a usable IP address.

Note: Because the purpose of PortFast is to minimize the time that access ports must wait for spanning tree to converge, it should only be used on access ports. If you enable PortFast on a port connecting to another switch, you risk creating a spanning tree loop.

To configure PortFast on a switch port, enter the spanning-tree portfast interface configuration mode command on each interface that PortFast is to be enabled, as shown in Figure 2. The

Page 34: CCNA Basics

spanning-tree portfast default global configuration mode command enables PortFast on all nontrunking interfaces.

To configure BPDU guard on a Layer 2 access port, use the spanning-tree bpduguard enable interface configuration mode command. The spanning-tree portfast bpduguard default global configuration command enables BPDU guard on all PortFast-enabled ports.

To verify that PortFast and BPDU guard has been enabled for a switch port, use the show running-config command, as shown in Figure 3. PortFast and BPDU guard are disabled, by default, on all interfaces.

The following list defines the options available for First Hop Redundancy Protocols (FHRPs), as shown in the figure.

Hot Standby Router Protocol (HSRP) - A Cisco-proprietary FHRP designed to allow for

transparent failover of a first-hop IPv4 device. HSRP provides high network availability by providing first-hop routing redundancy for IPv4 hosts on networks configured with an IPv4default gateway address. HSRP is used in a group of routers for selecting an active device and a standby device. In a group of device interfaces, the active device is the device that is used for routing packets; the standby device is the device that takes over when the active device fails, or when pre-set conditions are met. The function of the HSRP standby router isto monitor the operational status of the HSRP group and to quickly assume packet-forwarding responsibility if the active router fails.

HSRP for IPv6 - Cisco-proprietary FHRP providing the same functionality of HSRP, but in

Page 35: CCNA Basics

an IPv6 environment. An HSRP IPv6 group has a virtual MAC address derived from the HSRP group number and a virtual IPv6 link-local address derived from the HSRP virtual MAC address. Periodic router advertisements (RAs) are sent for the HSRP virtual IPv6 link-local address when the HSRP group is active. When the group becomes inactive these RAs stop after a final RA is sent.

Virtual Router Redundancy Protocol version 2 (VRRPv2) - A non-proprietary election

protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on an IPv4 LAN. This allows several routers on a multiaccess link to use the same virtual IPv4 address. A VRRP router is configured to run the VRRP protocol in conjunction with one or more other routers attached to a LAN. In a VRRP configuration, one router is elected as the virtual router master, with the other routers acting as backups, incase the virtual router master fails.

VRRPv3 - Provides the capability to support IPv4 and IPv6 addresses. VRRPv3 works in

multi-vendor environments and is more scalable than VRRPv2.

Gateway Load Balancing Protocol (GLBP) - Cisco-proprietary FHRP that protects data

traffic from a failed router or circuit, like HSRP and VRRP, while also allowing load balancing (also called load sharing) between a group of redundant routers.

GLBP for IPv6 - Cisco-proprietary FHRP providing the same functionality of GLBP, but

in an IPv6 environment. GLBP for IPv6 provides automatic router backup for IPv6 hosts configured with a single default gateway on a LAN. Multiple first-hop routers on the LAN combine to offer a single virtual first-hop IPv6 router while sharing the IPv6 packet forwarding load.

ICMP Router Discovery Protocol (IRDP) - Specified in RFC 1256, is a legacy FHRP

solution. IRDP allows IPv4 hosts to locate routers that provide IPv4 connectivity to other (nonlocal) IP networks.

Ether Channel

EtherChannel can be implemented by grouping multiple physical ports into one or more logical EtherChannel links.

Note: Interface types cannot be mixed; for example, Fast Ethernet and Gigabit Ethernet cannot be mixed within a single EtherChannel.

The EtherChannel provides full-duplex bandwidth up to 800 Mb/s (Fast EtherChannel) or 8 Gb/s

Page 36: CCNA Basics

(Gigabit EtherChannel) between one switch and another switch or host. Currently each EtherChannel can consist of up to eight compatibly-configured Ethernet ports. The Cisco IOS switch can currently support six EtherChannels. However, as new IOSs are developed and platforms change, some cards and platforms may support increased numbers of ports within an EtherChannel link, as well as support an increased number of Gigabit EtherChannels. The concept is the same no matter the speeds or number of links that are involved. When configuring EtherChannel on switches, be aware of the hardware platform boundaries and specifications.

The original purpose of EtherChannel is to increase speed capability on aggregated links between switches. However, this concept was extended as EtherChannel technology became more popular, and now many servers also support link aggregation with EtherChannel. EtherChannel creates a one-to-one relationship; that is, one EtherChannel link connects only two devices. An EtherChannel link can be created between two switches or an EtherChannel link can be created between an EtherChannel-enabled server and a switch. However, traffic cannot be sent to two different switches through the same EtherChannel link.

The individual EtherChannel group member port configuration must be consistent on both devices.If the physical ports of one side are configured as trunks, the physical ports of the other side must also be configured as trunks within the same native VLAN. Additionally, all ports in each EtherChannel link must be configured as Layer 2 ports.

Note: Layer 3 EtherChannels can be configured on Cisco Catalyst multilayer switches, such as the Catalyst 3560, but these are not explored in this course. A Layer 3 EtherChannel has a single IP address associated with the logical aggregation of switch ports in the EtherChannel.

Each EtherChannel has a logical port channel interface, illustrated in the figure. A configuration applied to the port channel interface affects all physical interfaces that are assigned to that interface.

EtherChannels can be formed through negotiation using one of two protocols, PAgP or LACP. These protocols allow ports with similar characteristics to form a channel through dynamic negotiation with adjoining switches.

Note: It is also possible to configure a static or unconditional EtherChannel without PAgP or LACP.

PAgP

PAgP is a Cisco-proprietary protocol that aids in the automatic creation of EtherChannel links. When an EtherChannel link is configured using PAgP, PAgP packets are sent between EtherChannel-capable ports to negotiate the forming of a channel. When PAgP identifies matched Ethernet links, it groups the links into an EtherChannel. The EtherChannel is then added to the spanning tree as a single port.

Page 37: CCNA Basics

When enabled, PAgP also manages the EtherChannel. PAgP packets are sent every 30 seconds. PAgP checks for configuration consistency and manages link additions and failures between two switches. It ensures that when an EtherChannel is created, all ports have the same type of configuration.

Note: In EtherChannel, it is mandatory that all ports have the same speed, duplex setting, and VLAN information. Any port modification after the creation of the channel also changes all other channel ports.

PAgP helps create the EtherChannel link by detecting the configuration of each side and ensuring that links are compatible so that the EtherChannel link can be enabled when needed. The figure shows the modes for PAgP.

On - This mode forces the interface to channel without PAgP. Interfaces configured in the

on mode do not exchange PAgP packets.

PAgP desirable - This PAgP mode places an interface in an active negotiating state in

which the interface initiates negotiations with other interfaces by sending PAgP packets.

PAgP auto - This PAgP mode places an interface in a passive negotiating state in which the

interface responds to the PAgP packets that it receives, but does not initiate PAgP negotiation.

The modes must be compatible on each side. If one side is configure to be in auto mode, it is placed in a passive state, waiting for the other side to initiate the EtherChannel negotiation. If the other side is also set to auto, the negotiation never starts and the EtherChannel does not form. If allmodes are disabled by using the no command, or if no mode is configured, then the EtherChannel is disabled.

The on mode manually places the interface in an EtherChannel, without any negotiation. It works only if the other side is also set to on. If the other side is set to negotiate parameters through PAgP, no EtherChannel forms, because the side that is set to on mode does not negotiate.

Page 38: CCNA Basics
Page 39: CCNA Basics

LACP is part of an IEEE specification (802.3ad) that allows several physical ports to be bundled toform a single logical channel. LACP allows a switch to negotiate an automatic bundle by sending LACP packets to the peer. It performs a function similar to PAgP with Cisco EtherChannel. Because LACP is an IEEE standard, it can be used to facilitate EtherChannels in multivendor environments. On Cisco devices, both protocols are supported.

Note: LACP was originally defined as IEEE 802.3ad. However, LACP is now defined in the newerIEEE 802.1AX standard for local and metropolitan area networks.

LACP provides the same negotiation benefits as PAgP. LACP helps create the EtherChannel link by detecting the configuration of each side and making sure that they are compatible so that the EtherChannel link can be enabled when needed. The figure shows the modes for LACP.

On - This mode forces the interface to channel without LACP. Interfaces configured in the

on mode do not exchange LACP packets.

LACP active - This LACP mode places a port in an active negotiating state. In this state,

the port initiates negotiations with other ports by sending LACP packets.

LACP passive - This LACP mode places a port in a passive negotiating state. In this state,

the port responds to the LACP packets that it receives, but does not initiate LACP packet negotiation.

Just as with PAgP, modes must be compatible on both sides for the EtherChannel link to form. The on mode is repeated, because it creates the EtherChannel configuration unconditionally, without PAgP or LACP dynamic negotiation.

Page 40: CCNA Basics

The following guidelines and restrictions are useful for configuring EtherChannel:

EtherChannel support - All Ethernet interfaces on all modules must support

EtherChannel with no requirement that interfaces be physically contiguous, or on the same module.

Speed and duplex - Configure all interfaces in an EtherChannel to operate at the same

speed and in the same duplex mode, as shown in the figure.

VLAN match - All interfaces in the EtherChannel bundle must be assigned to the same

VLAN, or be configured as a trunk (also shown in the figure).

Range of VLAN - An EtherChannel supports the same allowed range of VLANs on all the

interfaces in a trunking EtherChannel. If the allowed range of VLANs is not the same, the interfaces do not form an EtherChannel, even when set to auto or desirable mode.

If these settings must be changed, configure them in port channel interface configuration mode. After the port channel interface is configured, any configuration that is applied to the port channel interface also affects individual interfaces. However, configurations that are applied to the individual interfaces do not affect the port channel interface. Therefore, making configuration changes to an interface that is part of an EtherChannel link may cause interface compatibility issues.

Page 41: CCNA Basics

Wireless

The IEEE 802.11 WLAN standard defines how RF in the unlicensed ISM frequency bands is used for the physical layer and the MAC sublayer of wireless links.

Various implementation of the IEEE 802.11 standard have been developed over the years. The following highlights these standards:

802.11 - Released in 1997 and now obsolete, this is the original WLAN specification that

operated in the 2.4 GHz band and offered speeds of up to 2 Mb/s. When it was released, wired LANs were operating at 10 Mb/s so the new wireless technology was not enthusiastically adopted. Wireless devices have one antenna to transmit and receive wireless signals.

IEEE 802.11a - Released in 1999, it operates in the less crowded 5 GHz frequency band

and offers speeds of up to 54 Mb/s. Because this standard operates at higher frequencies, it has a smaller coverage area and is less effective at penetrating building structures. Wireless devices have one antenna to transmit and receive wireless signals. Devices operating under this standard are not interoperable with the 802.11b and 802.11g standards.

IEEE 802.11b - Released in 1999, it operates in the 2.4 GHz frequency band and offers

speeds of up to 11 Mb/s. Devices implementing this standard have a longer range and are better able to penetrate building structures than devices based on 802.11a. Wireless devices have one antenna to transmit and receive wireless signals.

IEEE 802.11g - Released in 2003, it operates in the 2.4 GHz frequency band and offers

speeds of up to 54 Mb/s. Devices implementing this standard; therefore, operate at the sameradio frequency and range as 802.11b, but with the bandwidth of 802.11a. Wireless devices have one antenna to transmit and receive wireless signals. It is backward compatible with 802.11b. However, when supporting an 802.11b client, the overall bandwidth is reduced.

Page 42: CCNA Basics

IEEE 802.11n - Released in 2009, it operates in the 2.4 GHz and 5 GHz frequency bands

and is referred to as a dual-band device. Typical data rates range from 150 Mb/s to 600 Mb/s with a distance range of up to 70 m (.5 mile). However, to achieve the higher speeds, APs and wireless clients require multiple antennas using the multiple-input and multiple-output (MIMO) technology. MIMO use multiple antennas as both the transmitter and receiver to improve communication performance. Up to four antennas can be supported. The 802.11n standard is backward compatible with 802.11a/b/g devices. However supporting a mixed environment limits the expected data rates.

IEEE 802.11ac - Released in 2013, operates in the 5 GHz frequency band and provides

data rates ranging from 450 Mb/s to 1.3 Gb/s (1300 Mb/s). It uses MIMO technology to improve communication performance. Up to eight antennas can be supported. The 802.11acstandard is backward compatible with 802.11a/n devices; however, supporting a mixed environment limits the expected data rates.

IEEE 802.11ad - Scheduled for release in 2014 and also known as “WiGig”, it uses a tri-

band Wi-Fi solution using 2.4 GHz, 5 GHz, and 60 GHz, and offers theoretical speeds of upto 7 Gb/s. However, the 60 GHz band is a line-of-site technology and; therefore, cannot penetrate through walls. When a user is roaming, the device switches to the lower 2.4 GHz and 5 GHz bands. It is backward compatible with existing Wi-Fi devices. However supporting a mixed environment limits the expected data rates.

OSPF

Page 43: CCNA Basics

Useful commands to verify OSPF include the following:

show ip ospf neighbor - Command to verify that the router has formed an adjacency with

its neighboring routers. If the router ID of the neighboring router is not displayed, or if it does not show as being in a state of FULL, the two routers have not formed an OSPF adjacency.

show ip protocols - Command provides a quick way to verify vital OSPF configuration

information. This includes the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance, which is 110 for OSPF.

show ip ospf - Command is used to display the OSPF process ID and router ID as well as

the OSPF SPF and OSPF area information.

show ip ospf interface - Command provides a detailed list for every OSPF-enabled

interface and is very useful to determine whether the network statements were correctly composed.

show ip ospf interface brief - Command is useful to display a summary and status of

OSPF-enabled interfaces.

Useful commands to verify OSPFv3 include the following:

show ipv6 ospf neighbor - Command to verify that the router has formed an adjacency

with its neighboring routers. If the router ID of the neighboring router is not displayed, or ifit does not show as being in a state of FULL, the two routers have not formed an OSPF adjacency.

show ipv6 protocols - Command provides a quick way to verify vital OSPFv3

configuration information, including the OSPF process ID, the router ID, and the interfaces enabled for OSPFv3.

show ipv6 route ospf - Command provides specifics about OSPFv3 routes in the routing

table.

show ipv6 ospf interface brief - Command is useful to display a summary and status of

OSPFv3 enabled interfaces.

To configure OSPF adjustments, start with a basic implementation of the OSPF routing protocol.

Page 44: CCNA Basics

OSPF defines five network types, as shown in Figures 1 to 5:

Point-to-point - Two routers interconnected over a common link. No other routers are on

the link. This is often the configuration in WAN links. (Figure 1)

Broadcast multiaccess - Multiple routers interconnected over an Ethernet network. (Figure

2)

Nonbroadcast multiaccess (NBMA) - Multiple routers interconnected in a network that

does not allow broadcasts, such as Frame Relay. (Figure 3)

Point-to-multipoint - Multiple routers interconnected in a hub-and-spoke topology over an

NBMA network. Often used to connect branch sites (spokes) to a central site (hub). (Figure4)

Virtual links - Special OSPF network used to interconnect distant OSPF areas to the

backbone area. (Figure 5)

A multiaccess network is a network with multiple devices on the same shared media, which are sharing communications. Ethernet LANs are the most common example of broadcast multiaccess networks. In broadcast networks, all devices on the network see all broadcast and multicast frames.They are multiaccess networks because there may be numerous hosts, printers, routers, and other devices that are all members of the same network.

To verify the OSPF adjacencies, use the show ip ospf neighbor command as shown in Figure 1.

Unlike serial links that only display a state of FULL/-, the state of neighbors in multiaccess networks can be:

FULL/DROTHER - This is a DR or BDR router that is fully adjacent with a non-DR or

BDR router. These two neighbors can exchange Hello packets, updates, queries, replies, and acknowledgments.

FULL/DR - The router is fully adjacent with the indicated DR neighbor. These two

neighbors can exchange Hello packets, updates, queries, replies, and acknowledgments.

FULL/BDR - The router is fully adjacent with the indicated BDR neighbor. These two

neighbors can exchange Hello packets, updates, queries, replies, and acknowledgments.

2-WAY/DROTHER - The non-DR or BDR router has a neighbor relationship with another

non-DR or BDR router. These two neighbors exchange Hello packets.

The normal state for an OSPF router is usually FULL. If a router is stuck in another state, it is an indication that there are problems in forming adjacencies. The only exception to this is the 2-WAY state, which is normal in a multiaccess broadcast network.

Page 45: CCNA Basics

In multiaccess networks, DROTHERs only form FULL adjacencies with the DR and BDR. However, DROTHERs will still form a 2-WAY neighbor adjacency with any DROTHERs that jointhe network. This means that all DROTHER routers in the multiaccess network still receive Hello packets from all other DROTHER routers. In this way, they are aware of all routers in the network.When two DROTHER routers form a neighbor adjacency, the neighbor state displays as 2-WAY/DROTHER.

Recall that the router ID is determined in one of three ways:

The router ID can be manually configured.

If no router IDs are configured, the router ID is determined by the highest loopback IP

address.

If no loopback interfaces are configured, the router ID is determined by the highest active

IPv4 address.

Ospf authentication

Page 46: CCNA Basics

OSPF Multiarea

Multiarea OSPF is implemented in a two-layer area hierarchy:

Backbone (Transit) area - An OSPF area whose primary function is the fast and efficient

movement of IP packets. Backbone areas interconnect with other OSPF area types. Generally, end users are not found within a backbone area. The backbone area is also calledOSPF area 0. Hierarchical networking defines area 0 as the core to which all other areas directly connect. (Figure 1)

Regular (Non-backbone) area - Connects users and resources. Regular areas are usually

set up along functional or geographical groupings. By default, a regular area does not allowtraffic from another area to use its links to reach other areas. All traffic from other areas must cross a transit area. (Figure 2)

The optimal number of routers per area varies based on factors such as network stability, but Ciscorecommends the following guidelines:

Page 47: CCNA Basics

An area should have no more than 50 routers.

A router should not be in more than three areas.

Any single router should not have more than 60 neighbors.

There are four different types of OSPF routers:

Internal router – This is a router that has all of its interfaces in the same area. All internal

routers in an area have identical LSDBs. (Figure 1)

Backbone router – This is a router in the backbone area. Generally, the backbone area is

set to area 0. (Figure 2)

Area Border Router (ABR) – This is a router that has interfaces attached to multiple

areas. It must maintain separate LSDBs for each area it is connected to, and can route between areas. ABRs are exit points for the area, which means that routing information destined for another area can get there only via the ABR of the local area. ABRs can be configured to summarize the routing information from the LSDBs of their attached areas. ABRs distribute the routing information into the backbone. The backbone routers then forward the information to the other ABRs. In a multiarea network, an area can have one ormore ABRs. (Figure 3)

Autonomous System Boundary Router (ASBR) – This is a router that has at least one

interface attached to an external internetwork (another autonomous system), such as a non-OSPF network. An ASBR can import non-OSPF network information to the OSPF network, and vice versa, using a process called route redistribution. (Figure 4)

Page 48: CCNA Basics

Type 1 LSAs are also referred to as router link entries.

Type 1 LSAs are flooded only within the area in which they originated. ABRs subsequently advertise the networks learned from the type 1 LSAs to other areas as type 3 LSAs.

The type 1 LSA link ID is identified by the router ID of the originating router.

A type 2 LSA only exists for multiaccess and non-broadcast multiaccess (NBMA) networks where there is a DR elected and at least two routers on the multiaccess segment. The type 2 LSA contains the router ID and IP address of the DR, along with the router ID of all other routers on the multiaccess segment. A type 2 LSA is created for every multiaccess network in the area.

The purpose of a type 2 LSA is to give other routers information about multiaccess networks within the same area.

The DR floods type 2 LSAs only within the area in which they originated. Type 2 LSAs are not forwarded outside of an area.

Type 2 LSAs are also referred to as network link entries.

Type 3 LSAs are used by ABRs to advertise networks from other areas. ABRscollect type 1 LSAs in the LSDB. After an OSPF area has converged, the ABR creates a type 3 LSA for each of its learned OSPF networks. Therefore,an ABR with many OSPF routes must create type 3 LSAs for each network.

Type 4 and type 5 LSAs are used collectively to identify an ASBR and advertise external networks into an OSPF routing domain.

A type 4 summary LSA is generated by an ABR only when an ASBR exists within an area. A type 4 LSA identifies the ASBR and provides a route to it. All traffic destined to an external autonomous system requires routing table knowledge of the ASBR that originated the external routes.

Page 49: CCNA Basics

Type 5 external LSAs describe routes to networks outside the OSPF autonomous system. Type 5 LSAs are originated by the ASBR and are flooded to the entire autonomous system.

Type 5 LSAs are also referred to as autonomous system external LSA entries.

OSPF routes in an IPv4 routing table are identified using the following descriptors:

O - Router (type 1) and network (type 2) LSAs describe the details within an area. The

routing table reflects this link-state information with a designation of O, meaning that the route is intra-area.

O IA - When an ABR receives summary LSAs, it adds them to its LSDB and regenerates

them into the local area. When an ABR receives external LSAs, it adds them to its LSDB and floods them into the area. The internal routers then assimilate the information into theirdatabases. Summary LSAs appear in the routing table as IA (interarea routes).

O E1 or O E2 - External LSAs appear in the routing table marked as external type 1 (E1)

or external type 2 (E2) routes.

In OSPF, summarization can only be configured on ABRs or ASBRs. Instead of advertising many specific networks, the ABR routers and ASBR routers advertise a summary route. ABR routers summarize type 3 LSAs and ASBR routers summarize type 5 LSAs.

Interarea route summarization - Interarea route summarization occurs on ABRs and applies to routes from within each area. It does not apply to external routes injected into OSPF via redistribution. To perform effective interarea route summarization, network addresses within areas should be assigned contiguously so that these addresses can be summarized into a minimal number of summary addresses.

External route summarization - External route summarization is specific to external

routes that are injected into OSPF via route redistribution. Again, it is important to ensure the contiguity of the external address ranges that are being summarized. Generally, only

Page 50: CCNA Basics

ASBRs summarize external routes. As shown in Figure 2, EIGRP external routes are summarized by ASBR R2 in a single LSA and sent to R1 and R3.

EIGRP

Page 51: CCNA Basics

DUAL uses several terms, which are discussed in more detail throughout this section:

Successor

Feasible Distance (FD)

Feasible Successor (FS)

Reported Distance (RD) or Advertised Distance (AD)

Feasible Condition or Feasibility Condition (FC)

P - Route in the passive state. When DUAL is not performing its diffusing computations to determine a path for a network, the route is in a stable mode, known as the passive state. If DUAL recalculates or searches for a

Page 52: CCNA Basics

new path, the route is in an active state and displays an A. All routes in the topology table should be in the passive state for a stable routing domain.

192.168.1.0/24 - Destination network that is also found in the routing table.

1 successors - Displays the number of successors for this network. If there are multiple

equal cost paths to this network, there are multiple successors.

FD is 3012096 - FD, the EIGRP metric to reach the destination network. This is the metric

displayed in the IP routing table.

As shown in Figure 2, the first subentry in the output shows the successor:

via 192.168.10.10 - Next-hop address of the successor, R3. This address is shown in the

routing table.

3012096 - FD to 192.168.1.0/24. It is the metric shown in the IP routing table.

2816 - RD of the successor and is R3’s cost to reach this network.

Serial 0/0/1 - Outbound interface used to reach this network, also shown in the routing

table.

As shown in Figure 3, the second subentry shows the FS, R1 (if there is not a second entry, then there are no FSs):

via 172.16.3.1 - Next-hop address of the FS, R1.

41024256 - R2’s new FD to 192.168.1.0/24, if R1 became the new successor and would be

the new metric displayed in the IP routing table.

2170112 - RD of the FS, or R1’s metric to reach this network. RD must be less than the

current FD of 3,012,096 to meet the FC.

Serial 0/0/0 - This is the outbound interface used to reach FS, if this router becomes the

successor.

Page 53: CCNA Basics

EIGRP uses the Null0 interface to prevent these types of routing loops. The figure illustrates a scenario where a Null0 route prevents the routing loop illustrated in the previous example:

1. R1 has a default route, 0.0.0.0/0 via the ISP router.

2. R1 sends a routing update to R2 containing the default route.

3. R2 installs the default route from R1 in its IPv4 routing table.

4. R2’s routing table contains the 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24 subnets in its routing table.

5. R2 installs the 172.16.0.0/16 summary route to Null0 in its routing table.

6. R2 sends a summarized update to R1 for the 172.16.0.0/16 network.

7. R1 installs the summarized route for 172.16.0.0/16 via R2.

8. R1 receives a packet for 172.16.4.10. Because R1 has a route for 172.16.0.0/16 via R2, it forwards the packet to R2.

9. R2 receives the packet with the destination address 172.16.4.10 from R1. The packet does not match any specific subnet of 172.16.0.0 but does match the 172.16.0.0/16 summary route to Null0.Using the Null0 route, the packet is discarded.

A summary route on R2 for 172.16.0.0/16 to the Null0 interface, discards any packets that begin with 172.16.x.x, but do not have a longer match with any of the subnets: 172.16.1.0/24, 172.16.2.0/24, or 172.16.3.0/24.

Even if R2 has a default route of 0.0.0.0/0 in its routing table, the Null0 route is a longer match.

Page 54: CCNA Basics

Note: The Null0 summary route is removed when autosummary is disabled using the no auto-summary router configuration mode command.

Eigrp summary

Page 55: CCNA Basics

An example of an IOS 12.4 software image name is shown in Figure 2.

Image Name (c2800nm) - Identifies the platform on which the image runs. In this

example, the platform is a Cisco 2800 router with a network module.

advipservicesk9 - Specifies the feature set. In this example, advipservicesk9 refers to the

advanced IP services feature set which includes both the advanced security and service provider packages, along with IPv6.

mz - Indicates where the image runs and if the file is compressed. In this example, mz

indicates that the file runs from RAM and is compressed.

124-6.T - The filename format for image 12.4(6)T. This is the train number, maintenance

release number, and the train identifier.

bin - The file extension. This extension indicates that this file is a binary executable file.

Figure 3 illustrates the different parts of an IOS 15 system image file on an ISR G2 device:

Image Name (c1900) - Identifies the platform on which the image runs. In this example,

the platform is a Cisco 1900 router.

universalk9 - Specifies the image designation. The two designations for an ISR G2 are

universalk9 and universalk9_npe. Universalk9_npe does not contain strong encryption and

Page 56: CCNA Basics

is meant for countries with encryption restrictions. Features are controlled by licensing and can be divided into four technology packages. These are IP Base, Security, Unified Communications, and Data.

mz - Indicates where the image runs and if the file is compressed. In this example, mz

indicates that the file runs from RAM and is compressed.

SPA - Designates that file is digitally signed by Cisco.

152-4.M3 - Specifies the filename format for the image 15.2(4)M3. This is the version of

IOS, which includes the major release, minor release, maintenance release, and maintenance rebuild numbers. The M indicates this is an extended maintenance release.

bin - The file extension. This extension indicates that this file is a binary executable file.

The most common designation for memory location and compression format is mz. The first letter indicates the location where the image is executed on the router. The locations can include:

f - flash

m - RAM

r - ROM

l - relocatable

The compression format can be either z for zip or x for mzip. Zipping is a method Cisco uses to compress some run-from-RAM images that is effective in reducing the size of the image. It is self-unzipping, so when the image is loaded into RAM for execution, the first action is to unzip.

Note: The Cisco IOS Software naming conventions, field meaning, image content, and other details are subject to change.

Memory Requirements

On most Cisco routers including the integrated services routers, the IOS is stored in compact flash as a compressed image and loaded into DRAM during boot-up. The Cisco IOS Software Release 15.0 images available for the Cisco 1900 and 2900 ISR require 256MB of flash and 512MB of RAM. The 3900 ISR requires 256MB of flash and 1GB of RAM. This does not include additional management tools such as Cisco Configuration Professional (Cisco CP). For complete details, refer to the product data sheet for the specific router.

WAN STANDARDS

Page 57: CCNA Basics

The figure shows a simple representation of a serial communication across a WAN. Data is encapsulated by the communications protocol used by the sending router. The encapsulated frame is sent on a physical medium to the WAN. There are various ways to traverse the WAN, but the receiving router uses the same communications protocol to de-encapsulate the frame when it arrives.

There are many different serial communication standards, each one using a different signaling method. There are three important serial communication standards affecting LAN-to-WAN connections:

RS-232 - Most serial ports on personal computers conform to the RS-232C or newer RS-

422 and RS-423 standards. Both 9-pin and 25-pin connectors are used. A serial port is a general-purpose interface that can be used for almost any type of device, including modems, mice, and printers. These types of peripheral devices for computers have been replaced by new and faster standards such as USB but many network devices use RJ-45 connectors that conform to the original RS-232 standard.

V.35 - Typically used for modem-to-multiplexer communication, this ITU standard for

high-speed, synchronous data exchange combines the bandwidth of several telephone circuits. In the U.S., V.35 is the interface standard used by most routers and DSUs that connect to T1 carriers. V.35 cables are high-speed serial assemblies designed to support higher data rates and connectivity between DTEs and DCEs over digital lines. There is more on DTEs and DCEs later in this section.

HSSI - A High-Speed Serial Interface (HSSI) supports transmission rates up to 52 Mb/s.

Engineers use HSSI to connect routers on LANs with WANs over high-speed lines, such as T3 lines. Engineers also use HSSI to provide high-speed connectivity between LANs, usingToken Ring or Ethernet. HSSI is a DTE/DCE interface developed by Cisco Systems and T3plus Networking to address the need for high-speed communication over WAN links.

Page 58: CCNA Basics
Page 59: CCNA Basics

Router(config)#host R1

R1(config)#int se0/0/0

R1(config-if)#ip add 1.0.0.1 255.0.0.0

R1(config-if)#clock rate 64000

R1(config-if)#encapsulation ppp

R1(config-if)#ppp authentication chap

R1(config-if)#exit

R1(config)#username R2 password redhat

R1(config)#int se0/0/0

R1(config-if)#no shut

CONFIGURATION ON ROUTER R2:

Router>enable

Router#config t

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#host R2

R2(config)#username R1 password redhat

R2(config)#int se0/0/0

Page 60: CCNA Basics

R2(config-if)#ip add 1.0.0.2 255.0.0.0

R2(config-if)#no shut

R2(config-if)#encapsulation ppp

R2(config-if)#

%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up

R2(config-if)#ppp authentication chap

FRAME RELAY

There are two ways to establish VCs:

Switched Virtual Circuits (SVC) - Established dynamically by sending signaling

messages to the network (CALL SETUP, DATA TRANSFER, IDLE, CALL TERMINATION).

Permanent Virtual Circuits (PVCs) - preconfigured by the carrier, and after they are set

up, only operate in DATA TRANSFER and IDLE modes. Note that some publications referto PVCs as private VCs.

Before a Cisco router is able to transmit data over Frame Relay, it needs to know which local DLCI maps to the Layer 3 address of the remote destination. Cisco routers support all network layer protocols over Frame Relay, such as IPv4, IPv6, IPX, and AppleTalk. This address-to-DLCI mapping can be accomplished either by static or dynamic mapping. Figure 1shows an example topology with DLCI mapping.

Inverse ARP

A primary tool of Frame Relay is Inverse Address Resolution Protocol (ARP). Whereas ARP translates Layer 3 IPv4 addresses to Layer 2 MAC addresses, Inverse ARP does the opposite. The

Page 61: CCNA Basics

corresponding Layer 3 IPv4 addresses must be available before VCs can be used.

Note: Frame Relay for IPv6 uses Inverse Neighbor Discovery (IND) to obtain a Layer 3 IPv6 address from a Layer 2 DLCI. A Frame Relay router sends an IND Solicitation message to request a Layer 3 IPv6 address corresponding to a Layer 2 DLCI address of the remote Frame Relay router. At the same time the IND Solicitation message provides the sender’s Layer 2 DLCI address to the remote Frame Relay router.

Dynamic Mapping

Dynamic address mapping relies on Inverse ARP to resolve a next-hop network layer IPv4 address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its PVC to discover the protocol address of the remote device connected to the Frame Relay network. The router uses the responses to populate an address-to-DLCI mapping table on the Frame Relay routeror access server. The router builds and maintains this mapping table, which contains all resolved Inverse ARP requests, including both dynamic and static mapping entries.

On Cisco routers, Inverse ARP is enabled, by default, for all protocols enabled on the physical interface. Inverse ARP packets are not sent out for protocols that are not enabled on the interface.

Static Frame Relay Mapping

The user can choose to override dynamic Inverse ARP mapping by supplying a manual static map for the next-hop protocol address to a local DLCI. A static map works similarly to dynamic InverseARP by associating a specified next-hop protocol address to a local Frame Relay DLCI. You cannot use Inverse ARP and a map statement for the same DLCI and protocol.

An example of using static address mapping is a situation in which the router at the other side of the Frame Relay network does not support dynamic Inverse ARP for a specific network protocol. To provide connectivity, a static mapping is required to complete the remote network layer addressto local DLCI resolution.

Another example is on a hub-and-spoke Frame Relay network. Use static address mapping on the spoke routers to provide spoke-to-spoke reachability. Because the spoke routers do not have direct connectivity with each other, dynamic Inverse ARP would not work between them. Dynamic Inverse ARP relies on the presence of a direct point-to-point connection between two ends. In this case, dynamic Inverse ARP only works between hub and spoke, and the spokes require static mapping to provide reachability to each other.

Configuring Static Mapping

Establishing static mapping depends on your network needs. To map between a next hop protocol address and DLCI destination address, use this command: frame-relay map protocol protocol-addressdlci [broadcast] [ietf] [cisco].

Use the keyword ietf when connecting to a non-Cisco router.

The configuration of Open Shortest Path First (OSPF) protocol can be greatly simplified by addingthe optional broadcast keyword when doing this task. The broadcast keyword specifies that

Page 62: CCNA Basics

broadcast and multicast traffic is allowed over the VC. This configuration permits the use of dynamic routing protocols over the VC.

Three types of LMIs are supported by Cisco routers:

CISCO - Original LMI extension

ANSI - Corresponding to the ANSI standard T1.617 Annex D

Q933A - Corresponding to the ITU standard Q933 Annex A

Page 63: CCNA Basics

There are several ways to solve the routing reachability issue:

Disable split horizon - One method for solving the reachability issues that are produced by

split horizon may be to turn off split horizon. However, disabling split horizon increases thechances of routing loops in your network. Additionally, only IP allows the ability to disable split horizon; IPX and AppleTalk do not.

Full meshed topology - Another method is to use a fully meshed topology; however, this

topology increases costs.

Subinterfaces - In a hub-and-spoke Frame Relay topology, the hub router can be

configured with logically assigned interfaces called subinterfaces.

Frame Relay Subinterfaces

Frame Relay can partition a physical interface into multiple virtual interfaces called subinterfaces, as shown in Figure 1. A subinterface is simply a logical interface that is directly associated with a physical interface. Therefore, a Frame Relay subinterface can be configured for each of the PVCs coming into a physical serial interface.

To enable the forwarding of broadcast routing updates in a Frame Relay network, you can configure the router with logically assigned subinterfaces. Using a subinterface configuration, eachVC can be configured as a point-to-point connection. A partially meshed network can be divided into a number of smaller, fully meshed, point-to-point networks. Each point-to-point subnetwork can be assigned a unique network address. This allows each subinterface to act similarly to a leased line. Using a Frame Relay point-to-point subinterface, each pair of the point-to-point routersis on its own subnet. This allows packets received on one subinterface to be sent out another subinterface, even though the packets are being forwarded out the same physical interface.

Page 64: CCNA Basics

Frame Relay subinterfaces can be configured in either point-to-point or multipoint mode:

Point-to-point (Figure 2) - A single point-to-point subinterface establishes one PVC

connection to another physical interface or subinterface on a remote router. In this case, each pair of the point-to-point routers is on its own subnet, and each point-to-point subinterface has a single DLCI. In a point-to-point environment, each subinterface is actinglike a point-to-point interface. For each point-to-point VC, there is a separate subnet. Therefore, routing update traffic is not subject to the split horizon rule.

Multipoint (Figure 3) - A single multipoint subinterface establishes multiple PVC

connections to multiple physical interfaces or subinterfaces on remote routers. All the participating interfaces are in the same subnet. The subinterface acts like an NBMA Frame Relay interface, so routing update traffic is subject to the split horizon rule. All multipoint VCs belong to the same subnet.

When configuring subinterfaces, the encapsulation frame-relay command is assigned to the physical interface. All other configuration items, such as the network layer address and DLCIs, are assigned to the subinterface.

The possible values of the status field are as follows:

0x0 - The switch has this DLCI programmed, but for some reason it is not usable. The

reason could possibly be the other end of the PVC is down.

Page 65: CCNA Basics

0x2 - The Frame Relay switch has the DLCI and everything is operational.

0x4 - The Frame Relay switch does not have this DLCI programmed for the router, but that

it was programmed at some point in the past. This could also be caused by the DLCIs beingreversed on the router, or by the PVC being deleted by the service provider in the Frame Relay cloud.

NAT

When Bob Kahn and Vint Cerf first developed the suite of TCP/IP protocols including IPv4 in 1981, they never envisioned what the Internet would become.

There are two types of VPN networks:

• Site-to-site

• Remote access

Site-to-Site VPN

A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance, as shown in the figure. The VPN remains static, and internal hosts have no knowledge that a VPN exists. In a site-to-site VPN, end hosts send and receive normal TCP/IP traffic through a VPN “gateway”. The VPN gateway is responsible for encapsulating and encrypting outbound traffic for all traffic from a particular site. The VPN gateway then sends it through a VPN tunnel over the Internet to a peer VPN gateway at the target site. Upon receipt, the peer VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network.

A site-to-site VPN is an extension of a classic WAN network. Site-to-site VPNs connect entire networks to each other, for example, they can connect a branch office network to a company headquarters network. In the past, a leased line or Frame Relay connection was required to connectsites, but because most corporations now have Internet access, these connections can be replaced with site-to-site VPNs.

Page 66: CCNA Basics

VPN

Part 1: Enable Security Features

Step 1: Activate securityk9 module.

The Security Technology Package license must be enabled to complete this activity.

Note: Both the user EXEC and privileged EXEX pass word is cisco.

a. Issue the show version command in the user EXEC or privileged EXEC mode to verify that the Security Technology Package license is activated.

----------------------------------------------------------------

Technology Technology-package Technology-package

Current Type Next reboot

-----------------------------------------------------------------

ipbase ipbasek9 Permanent ipbasek9

security None None None

uc None None None

data None None None

Configuration register is 0x2102

b. If not, activate the securityk9 module for the next boot of the router, accept the license, save the configuration, and reboot.

R1(config)# license boot module c2900 technology-package securityk9

R1(config)# end

R1# copy running-config startup-config

R1# reload

c. After the reloading is completed, issue the show version again to verify the Security Technology Package license activation.

Technology Package License Information for Module:'c2900'

----------------------------------------------------------------

Technology Technology-package Technology-package

Current Type Next reboot

-----------------------------------------------------------------

Page 67: CCNA Basics

ipbase ipbasek9 Permanent ipbasek9

security securityk9 Evaluation securityk9

uc None None None

data None None None

d. Repeat Steps 1a to 1c with R3.

Part 2: Configure IPsec Parameters on R1

Step 1: Test connectivity.

Ping from PC-A to PC-C.

Step 2: Identify interesting traffic on R1.

Configure ACL 110 to identify the traffic from the LAN on R1 to the LAN on R3 as interesting. This interesting traffic will trigger the IPsec VPN to be implemented whenever there is traffic between R1 to R3 LANs. All other traffic sourced from the LANs will not be encrypted. Remember that due to the implicit deny any, there is no need to add the statement to the list.

R1(config)# access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255

Step 3: Configure the ISAKMP Phase 1 properties on R1.

Configure the crypto ISAKMP policy 10 properties on R1 along with the shared crypto key cisco. Refer to the ISAKMP Phase 1 table for the specific parameters to configure. Default values do not have to be configured therefore only the encryption, key exchange method, and DH method must be configured.

R1(config)# crypto isakmp policy 10

R1(config-isakmp)# encryption aes

R1(config-isakmp)# authentication pre-share

R1(config-isakmp)# group 2

R1(config-isakmp)# exit

R1(config)# crypto isakmp key cisco address 10.2.2.2

Step 4: Configure the ISAKMP Phase 2 properties on R1.

Create the transform-set VPN-SET to use esp-3des and esp-sha-hmac. Then create the crypto map VPN-MAP that binds all of the Phase 2 parameters together. Use sequence number 10 and identify it as an ipsec-isakmp map.

R1(config)# crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac

R1(config)# crypto map VPN-MAP 10 ipsec-isakmp

R1(config-crypto-map)# description VPN connection to R3

R1(config-crypto-map)# set peer 10.2.2.2

R1(config-crypto-map)# set transform-set VPN-SET

Page 68: CCNA Basics

R1(config-crypto-map)# match address 110

R1(config-crypto-map)# exit

Step 5: Configure the crypto map on the outgoing interface.

Finally, bind the VPN-MAP crypto map to the outgoing Serial 0/0/0 interface. Note:This is not graded.

R1(config)# interface S0/0/0

R1(config-if)# crypto map VPN-MAP

Part 3: Configure IPsec Parameters on R3

Step 1: Configure router R3 to support a site-to-site VPN with R1.

Now configure reciprocating parameters on R3. Configure ACL 110 identifying the traffic from the LAN on R3 to the LAN on R1 as interesting.

R3(config)# access-list 110 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255

Step 2: Configure the ISAKMP Phase 1 properties on R3.

Configure the crypto ISAKMP policy 10 properties on R3 along with the shared crypto key cisco.

R3(config)# crypto isakmp policy 10

R3(config-isakmp)# encryption aes

R3(config-isakmp)# authentication pre-share

R3(config-isakmp)# group 2

R3(config-isakmp)# exit

R3(config)# crypto isakmp key cisco address 10.1.1.2

Step 3: Configure the ISAKMP Phase 2 properties on R1.

Like you did on R1, create the transform-set VPN-SET to use esp-3des and esp-sha-hmac. Then create the crypto map VPN-MAP that binds all of the Phase 2 parameters together. Use sequence number 10 and identify it as an ipsec-isakmp map.

R3(config)# crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac

R3(config)# crypto map VPN-MAP 10 ipsec-isakmp

R3(config-crypto-map)# description VPN connection to R1

R3(config-crypto-map)# set peer 10.1.1.2

R3(config-crypto-map)# set transform-set VPN-SET

R3(config-crypto-map)# match address 110

R3(config-crypto-map)# exit

Page 69: CCNA Basics

Step 4: Configure the crypto map on the outgoing interface.

Finally, bind the VPN-MAP crypto map to the outgoing Serial 0/0/1 interface. Note: This is not graded.

R3(config)# interface S0/0/1

R3(config-if)# crypto map VPN-MAP

Part 4: Verify the IPsec VPN

Step 1: Verify the tunnel prior to interesting traffic.

Issue the show crypto ipsec sa command on R1. Notice that the number of packets encapsulated, encrypted, decapsulated and decrypted are all set to 0.

R1# show crypto ipsec sa

interface: Serial0/0/0

Crypto map tag: VPN-MAP, local addr 10.1.1.2

protected vrf: (none)

local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)

current_peer 10.2.2.2 port 500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0

#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0

#pkts not decompressed: 0, #pkts decompress failed: 0

#send errors 0, #recv errors 0

local crypto endpt.: 10.1.1.2, remote crypto endpt.:10.2.2.2

path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/0

current outbound spi: 0x0(0)

<output omitted>

Step 2: Create interesting traffic.

Ping PC-C from PC-A.

Page 70: CCNA Basics

Step 3: Verify the tunnel after interesting traffic.

On R1, re-issue the show crypto ipsec sa command. Now notice that the number of packets is more than 0 indicating that the IPsec VPN tunnel is working.

R1# show crypto ipsec sa

interface: Serial0/0/0

Crypto map tag: VPN-MAP, local addr 10.1.1.2

protected vrf: (none)

local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)

current_peer 10.2.2.2 port 500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 3, #pkts encrypt: 3, #pkts digest: 0

#pkts decaps: 3, #pkts decrypt: 3, #pkts verify: 0

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0

#pkts not decompressed: 0, #pkts decompress failed: 0

#send errors 1, #recv errors 0

local crypto endpt.: 10.1.1.2, remote crypto endpt.:10.2.2.2

path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/0

current outbound spi: 0x0A496941(172583233)

<output omitted>

EIGRP METRIC

EIGRP uses different K values to determine the best path to each

Page 71: CCNA Basics

destination. If you studied CCNA you might have seen and/or learned the following list:

• Bandwidth (K1)

• Load (K2)

• Delay (K3)

• Reliability (K4)

• MTU (K5)

COMMAND metric weights 0 0 0 1 0 0