Professional Documents
Culture Documents
1
Networking Devices
Network devices include all the devices that connect the end-
user devices together to allow them to communicate.
2
Network Interface Card
A network interface card (NIC) is a printed circuit board
that provides network communication capabilities to and
from a personal computer. Also called a LAN adapter.
3
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation. A repeater does not
perform intelligent routing.
4
Hub
Hubs concentrate
connections. In other words,
they take a group of hosts
and allow the network to see
them as a single unit.
6
Workgroup Switch
7
Router
Routers have all capabilities of the previous devices. Routers
can regenerate signals, concentrate multiple connections,
convert data transmission formats, and manage data
transfers.They can also connect to a WAN, which allows them
to connect LANs that are separated by great distances.
8
LANs, MANs, & WANs
9
Examples of Data Networks
10
LANs
11
Wireless LAN Organizations
and Standards
In cabled networks, IEEE is the prime issuer of standards for
wireless networks. The standards have been created within the
framework of the regulations created by the Federal
Communications Commission (FCC).
12
WANs
13
Virtual Private Network
A VPN is a private network that is constructed within a public network
infrastructure such as the global Internet. Using VPN, a telecommuter
can access the network of the company headquarters through the
Internet by building a secure tunnel between the telecommuter’s PC
and a VPN router in the headquarters.
14
15
Why do we need the OSI Model?
16
Don’t Get Confused.
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
18
Layer 7 - The Application Layer
7 Application This layer deal with
networking applications.
6 Presentation
5 Session Examples:
4 Transport • Email
• Web browsers
3 Network
2 Data Link PDU - User Data
1 Physical
19
Layer 6 - The Presentation Layer
7 Application This layer is responsible
for presenting the data in
6 Presentation
the required format which
5 Session may include:
4 Transport • Encryption
• Compression
3 Network
2 Data Link PDU - Formatted Data
1 Physical
20
Layer 5 - The Session Layer
7 Application This layer establishes,
manages, and terminates
6 Presentation
sessions between two
5 Session communicating hosts.
4 Transport
Example:
3 Network • Client Software
2 Data Link ( Used for logging in)
21
Layer 4 - The Transport Layer
7 Application This layer breaks up the data
from the sending host and
6 Presentation
then reassembles it in the
5 Session receiver.
4 Transport
It also is used to insure
3 Network reliable data transport
2 Data Link across the network.
1 Physical
PDU - Segments
22
Layer 3 - The Network Layer
7 Application Sometimes referred to as the
“Cisco Layer”.
6 Presentation
5 Session Makes “Best Path
4 Transport Determination” decisions
based on logical addresses
3 Network (usually IP addresses).
2 Data Link
PDU - Packets
1 Physical
23
Layer 2 - The Data Link Layer
7 Application This layer provides reliable
transit of data across a
6 Presentation
physical link.
5 Session
4 Transport Makes decisions based on
physical addresses (usually
3 Network MAC addresses).
2 Data Link
PDU - Frames
1 Physical
24
Layer 1 - The Physical Layer
This is the physical media
7 Application through which the data,
6 Presentation represented as electronic
signals, is sent from the
5 Session
source host to the
4 Transport destination host.
3 Network
Examples:
2 Data Link • CAT5 (what we have)
1 Physical • Coaxial (like cable TV)
• Fiber optic
PDU - Bits 25
26
Why Another Model?
Although the OSI reference model is universally
recognized, the historical and technical open standard
of the Internet is Transmission Control Protocol /
Internet Protocol (TCP/IP).
7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network
1 Physical Access
28
2 Models
Side-By-Side
7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network
1 Physical Access
29
The Application Layer
The application
layer of the
TCP/IP model
handles high-
level protocols,
issues of
representation,
encoding, and
dialog control.
30
The Transport Layer
32
The Network Access Layer
The network access layer is also called the host-to-
network layer. It the layer that is concerned with all of the
issues that an IP packet requires to actually make a
physical link to the network media. It includes LAN and
WAN details, and all the details contained in the OSI
physical and data-link layers. NOTE: ARP & RARP work
at both the Internet and Network Access Layers.
33
Comparing TCP/IP & OSI Models
NOTE: TCP/IP transport layer using UDP does not always guarantee
reliable delivery of packets as the transport layer in the OSI model does.
34
Introduction to the Transport Layer
35
More on The Transport Layer
Flow control avoids the problem of a transmitting host overflowing the buffers in
the receiving host.
37
TCP
Transmission Control Protocol (TCP) is a connection-oriented Layer 4
protocol that provides reliable full-duplex data transmission.
39
UDP
User Datagram Protocol (UDP) is the connectionless transport protocol
in the TCP/IP protocol stack.
41
Well Known Port Numbers
The following port numbers should be memorized:
NOTE:
The curriculum forgot to mention one of the most important port numbers.
Port 80 is used for HTTP or WWW protocols. (Essentially access to the internet.)
42
43
Network and Host Addressing
Using the IP address of the
destination network, a router can
deliver a packet to the correct
network.
45
Address Class Prefixes
To accommodate different size networks and aid in classifying these networks, IP
addresses are divided into groups called classes.This is classful addressing.
46
Network and Host Division
Each complete 32-bit IP address is broken down into a network part
and a host part. A bit or bit sequence at the start of each address
determines the class of the address. There are 5 IP address classes.
47
Class A Addresses
The Class A address was designed to support extremely large
networks, with more than 16 million host addresses available.
Class A IP addresses use only the first octet to indicate the
network address. The remaining three octets provide for host
addresses.
48
Class B Addresses
The Class B address was designed to support the needs of
moderate to large-sized networks.A Class B IP address uses
the first two of the four octets to indicate the network address.
The other two octets specify host addresses.
49
Class C Addresses
50
Class D Addresses
51
Class E Addresses
A Class E address has been defined. However, the Internet
Engineering Task Force (IETF) reserves these addresses for
its own research. Therefore, no Class E addresses have been
released for use in the Internet.
52
IP Address Ranges
The graphic below shows the IP address range of the first octet
both in decimal and binary for each IP address class.
53
IPv4
As early as 1992, the Internet Engineering
Task Force (IETF) identified two specific
concerns: Exhaustion of the remaining,
unassigned IPv4 network addresses and the
increase in the size of Internet routing tables.
54
Network Address
55
Broadcast Address
56
Network/Broadcast Addresses
at the Binary Level
An IP address that has binary 0s in all host bit positions is
reserved for the network address, which identifies the network.
An IP address that has binary 1s in all host bit positions is
reserved for the broadcast address, which is used to send data
to all hosts on the network. Here are some examples:
A 100.0.0.0 100.255.255.255
B 150.75.0.0 150.75.255.255
C 200.100.50.0 200.100.50.255 57
Public IP Addresses
Unique addresses are required for each device on a network.
InterNIC no longer exists and has been succeeded by the Internet Assigned
Numbers Authority (IANA).
No two machines that connect to a public network can have the same IP
address because public IP addresses are global and standardized.
However, private networks that are not connected to the Internet may
use any host addresses, as long as each host within the private
network is unique.
59
Introduction to Subnetting
Subnetting a network means to use the subnet mask to divide the
network and break a large network up into smaller, more efficient and
manageable segments, or subnets.
Subnet addresses include the network portion, plus a subnet field and
a host field.The ability to decide how to divide the original host portion
into the new subnet and host fields provides addressing flexibility for
the network administrator.
60
The 32-Bit
Binary IP Address
61
Numbers That Show Up In
Subnet Masks (Memorize Them!)
62
Addressing with Subnetworks
63
Static Assignment of an IP Address
Static assignment
works best on small
networks.
The administrator
manually assigns and
tracks IP addresses
for each computer,
printer, or server on
the intranet.
Network printers,
application servers,
and routers should be
assigned static IP
addresses. 64
ARP
(Address Resolution Protocol)
Host A
ARP Request - Broadcast to all hosts
SIEMENS
NIXDORF
„What is the hardware address for IP address 128.0.10.4?“
ARP Reply
SIEMENS
NIXDORF
SIEMENS
NIXDORF
Host B
IP Address: 128.0.10.4
HW Address: 080020021545
65
Fig. 32 How does ARP work? (TI1332EU02TI_0004 The Network Layer, 47)
66
Fig. 33 The ARP command (TI1332EU02TI_0004 The Network Layer, 47)
RARP
A network device, such as a diskless workstation, might know its MAC address but not
its IP address. RARP allows the device to make a request to learn its IP address.
Devices using RARP require that a RARP server be present on the network to answer
RARP requests.
67
68
Introduction to Routers
A router is a special type of computer. It has the same basic components as a
standard desktop PC. However, routers are designed to perform some very specific
functions. Just as computers need operating systems to run software applications,
routers need the Internetwork Operating System software (IOS) to run configuration
files. These configuration files contain the instructions and parameters that control the
flow of traffic in and out of the routers. The many parts of a router are shown below:
69
RAM
Random Access Memory, also called dynamic RAM (DRAM)
70
NVRAM
Non-Volatile RAM
71
Flash
Flash memory has the following characteristics and
functions:
73
Interfaces
Interfaces have the following characteristics and functions:
Types of interfaces:
• Ethernet
• Fast Ethernet
• Serial
• Token ring
• ISDN BRI
• Loopback
• Console
• Aux 74
Internal Components of a 2600 Router
75
Cisco IOS
Cisco technology is built around the Cisco
Internetwork Operating System (IOS), which is the
software that controls the routing and switching
functions of internetworking devices.
76
The Purpose of Cisco IOS
As with a computer, a router or switch cannot function without
an operating system. Cisco calls its operating system the
Cisco Internetwork Operating System or Cisco IOS.
78
Setup Mode
Setup is not intended as the mode for entering complex protocol features in the
router. The purpose of the setup mode is to permit the administrator to install a
minimal configuration for a router, unable to locate a configuration from another
source.
In the setup mode, default answers appear in square brackets [ ] following the
question. Press the Enter key to use these defaults.
During the setup process, Ctrl-C can be pressed at any time to terminate the
process. When setup is terminated using Ctrl-C, all interfaces will be
administratively shutdown.
When the configuration process is completed in setup mode, the following options
will be displayed:
The startup process of the router normally loads into RAM and executes
one of these operating environments. The configuration register setting can
be used by the system administrator to control the default start up mode for
the router.
To see the IOS image and version that is running, use the show version
command, which also indicates the configuration register setting.
80
Step in Router Initialization
81
82
Router User Interface Modes
The Cisco command-line interface (CLI) uses a hierarchical structure. This
structure requires entry into different modes to accomplish particular tasks.
As a security feature the Cisco IOS software separates sessions into two
access levels, user EXEC mode and privileged EXEC mode. The privileged
EXEC mode is also known as enable mode.
83
Overview of Router Modes
84
Router Modes
85
User Mode Commands
86
Privileged Mode Commands
NOTE:
There are
many more
commands
available in
privileged
mode.
87
CLI Command Modes
All command-line interface (CLI) configuration changes to a Cisco router
are made from the global configuration mode. Other more specific modes
are entered depending upon the configuration change that is required.
The following command moves the router into global configuration mode
When specific configuration modes are entered, the router prompt changes
to indicate the current configuration mode.
Typing exit from one of these specific configuration modes will return the
router to global configuration mode. Pressing Ctrl-Z returns the router to all
the way back privileged EXEC mode. 88
Configuring a Router’s Name
A router should be given a unique name as one of the
first configuration tasks.
Router(config)#hostname Aman
Tokyo(config)#
90
Message Of The Day (MOTD)
A message-of-the-day (MOTD) banner can be displayed on all
connected terminals.
91
Configuring a Console Password
Passwords restrict access to routers.
Passwords should always be configured for virtual terminal
lines and the console line.
Router(config)#line console 0
Router(config-line)#password <password>
Router(config-line)#login
92
Configuring a Modem Password
If configuring a router via a modem you are most likely
connected to the aux port.
Router(config)#line aux 0
Router(config-line)#password <password>
Router(config-line)#login
93
Configuring Interfaces
An interface needs an IP Address and a Subnet Mask to be configured.
All interfaces are “shutdown” by default.
The DCE end of a serial interface needs a clock rate.
Router#config t
Router(config)#interface serial 0/1
Router(config-if)#ip address 200.100.50.75 255.255.255.240
Router(config-if)#clock rate 56000 (required for serial DCE only)
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int f0/0
Router(config-if)#ip address 150.100.50.25 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#exit
Router#
On older routers, Serial 0/1 would be just Serial 1 and f0/0 would
94 be e0.
s = serial e = Ethernet f = fast Ethernet
Configuring a Telnet Password
Router(config)#line vty 0 4
Router(config-line)#password <password>
Router(config-line)#login
95
Examining the show Commands
There are many show commands that can be used to examine the contents of files
in the router and for troubleshooting. In both privileged EXEC and user EXEC
modes, the command show ? provides a list of available show commands. The list
is considerably longer in privileged EXEC mode than it is in user EXEC mode.
show interfaces – Displays all the statistics for all the interfaces on the router.
show int s0/1 – Displays statistics for interface Serial 0/1
show controllers serial – Displays information-specific to the interface hardware
show clock – Shows the time set in the router
show hosts – Displays a cached list of host names and addresses
show users – Displays all users who are connected to the router
show history – Displays a history of commands that have been entered
show flash – Displays info about flash memory and what IOS files are stored there
show version – Displays info about the router and the IOS that is running in RAM
show ARP – Displays the ARP table of the router
show start – Displays the saved configuration located in NVRAM
show run – Displays the configuration currently running in RAM
show protocol – Displays the global and interface specific status 96 of any configured
Layer 3 protocols
The copy run tftp Command
97
The copy tftp run Command
98
99
Anatomy of an IP Packet
IP packets consist of the data from upper layers plus an IP
header. The IP header consists of the following:
100
Introducing Routing
Routing is the process that a router uses to forward packets
toward the destination network. A router makes decisions
based upon the destination IP address of a packet. All devices
along the way use the destination IP address to point the
packet in the correct direction so that the packet eventually
arrives at its destination. In order to make the correct
decisions, routers must learn the direction to remote networks.
101
Configuring Static Routes by
Specifying Outgoing Interfaces
102
Configuring Static Routes by
Specifying Next-Hop Addresses
103
Administrative Distance
The administrative distance is an optional parameter that gives a measure of
the reliability of the route. The range of an AD is 0-255 where smaller
numbers are more desireable.
Sometimes static routes are used for backup purposes. A static route can be
configured on a router that will only be used when the dynamically learned
route has failed. To use a static route in this manner, simply set the
administrative distance higher than that of the dynamic routing protocol being
used. 104
Configuring Default Routes
Default routes are used to route packets with destinations that do not
match any of the other routes in the routing table.
A default route is actually a special static route that uses this format:
107
Routing Protocols
108
Routed Protocols
109
Categories of Routing
Protocols
Most routing algorithms can be classified into one of two
categories:
• distance vector
• link-state
110
Distance Vector
Routing Concepts
111
RIPv1
Distance Vector Routing Protocol,
classful
113
Router Configuration
The router command starts a routing process.
GAD(config)#router rip
GAD(config-router)#network 172.16.0.0
115
Verifying RIP Configuration
116
The debug ip rip Command
Most of the RIP
configuration
errors involve an
incorrect network
statement,
discontiguous
subnets, or split
horizons. One
highly effective
command for
finding RIP update
issues is the
debug ip rip
command. The
debug ip rip
command
displays RIP
routing updates as
they are sent and
received. 117
Routing loops
can occur Problem: Routing Loops
when
inconsistent
routing tables
are not
updated due
to slow
convergence
in a changing
network.
118
Problem: Counting to Infinity
119
Solution: Define a Maximum
120
Solution: Split Horizon
121
Route Poisoning
Route poisoning is used by various distance vector protocols in order to
overcome large routing loops and offer explicit information when a subnet
or network is not accessible. This is usually accomplished by setting the
hop count to one more than the maximum.
122
OSPF (Open Shortest Path First)
Protocol
124
Link-State Data Structures
– Neighbor table:
• Also known as the adjacency database
(list of recognized neighbors)
– Topology table:
• Typically referred to as LSDB
(routers and links in the area or network)
• All routers within an area have an identical LSDB
– Routing table:
• Commonly named a forwarding database
(list of best paths to destinations)
125
OSPF vs. RIP
RIP is limited to 15 hops, it converges slowly, and it sometimes chooses
slow routes because it ignores critical factors such as bandwidth in route
determination. OSPF overcomes these limitations and proves to be a
robust and scalable routing protocol suitable for the networks of today.
126
OSPF Areas
127
Area Terminology
128
LS Data Structures: Adjacency
Database
129
OSPF Adjacencies
131
show ip protocol
show ip route
132
show ip ospf neighbor detail
133
134
Overview
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-
proprietary routing protocol based on Interior Gateway Routing Protocol
(IGRP).
When the hold time expires, the Diffusing Update Algorithm (DUAL),
which is the EIGRP distance vector algorithm, is informed
137 of the
topology change and must recalculate the new topology.
Topology Table
The topology table is made up of all the EIGRP routing tables in the
autonomous system.
DUAL takes the information supplied in the neighbor table and the topology
table and calculates the lowest cost routes to each destination. By
tracking this information, EIGRP routers can identify and switch to alternate
routes quickly.
The information that the router learns from the DUAL is used to determine
the successor route, which is the term used to identify the primary or best
route.
A copy is also placed in the topology table.
Every EIGRP router maintains a topology table for each configured network
protocol. All learned routes to a destination are maintained in the topology
table.
138
Routing Table
The EIGRP routing table holds the best routes to a destination. This
information is retrieved from the topology table. Each EIGRP router
maintains a routing table for each network protocol.
There can be up to four successor routes for any particular route. These
can be of equal or unequal cost and are identified as the best loop-free
paths to a given destination.
EIGRP relies on hello packets to discover, verify, and rediscover neighbor routers.
Rediscovery occurs if EIGRP routers do not receive hellos from each other for a
hold time interval but then re-establish communication.
EIGRP routers send hellos at a fixed but configurable interval, called the hello
interval. The default hello interval depends on the bandwidth of the interface.
141
Configuring EIGRP Summarization
EIGRP automatically summarizes routes at the classful boundary.
This is the boundary where the network address ends, as defined by class-
based addressing.
This means that even though RTC is connected only to the subnet 2.1.1.0,
it will advertise that it is connected to the entire Class A network, 2.0.0.0.
142
Configuring EIGRP no-summary
However, automatic summarization may not be the preferred option in
certain instances. To turn off auto-summarization, use the following
command: router(config-router)#no auto-summary
143
show ip eigrp neighbors
144
show ip eigrp topology
145
show ip eigrp topology
all-links
146
147
What are ACLs?
ACLs are lists of conditions that are applied to traffic traveling
across a router's interface. These lists tell the router what types
of packets to accept or deny. Acceptance and denial can be
based on specified conditions.
151
The ip access-group command
{ in | out }
152
ACL Example
153
Basic Rules for ACLs
These basic rules should be followed when creating and applying access lists:
154
Wildcard Mask Examples
5 Examples follow that demonstrate how a wildcard mask can be
used to permit or deny certain IP addresses, or IP address ranges.
While subnet masks start with binary 1s and end with binary 0s,
wildcard masks are the reverse meaning they typically start with
binary 0s and end with binary 1s.
In the examples that follow Cisco has chosen to represent the binary
1s in the wilcard masks with Xs to focus on the specific bits being
shown in each example.
You will see that while subnet masks were ANDed with ip
addresses, wildcard masks are ORed with IP addresses.
155
The any and host Keywords
156
Verifying ACLs
There are many show commands that will verify the content
and placement of ACLs on the router.
The comparison will result in either permit or deny access for an entire protocol
suite, based on the network, subnet, and host addresses.
Router(config)#access-list access-list-number
{deny | permit} source [source-wildcard ] [log]
The no form of this command is used to remove a standard ACL. This is the syntax:
Router(config)#no access-list access-list-number 158
Extended ACLs
Extended ACLs are used more often than standard ACLs because they provide a
greater range of control. Extended ACLs check the source and destination packet
addresses as well as being able to check for protocols and port numbers.
The syntax for the extended ACL statement can get very long and often will wrap in
the terminal window.
The wildcards also have the option of using the host or any keywords in the
command.
At the end of the extended ACL statement, additional precision is gained from a field
that specifies the optional Transmission Control Protocol (TCP) or User Datagram
Protocol (UDP) port number.
Logical operations may be specified such as, equal (eq), not equal (neq), greater
than (gt), and less than (lt), that the extended ACL will perform on specific protocols.
Extended ACLs use an access-list-number in the range 100 to 199 (also from 2000
to 2699 in recent IOS).
159
Well Known Port Numbers
161
ip access-group
Remember that only one ACL per interface, per direction, per
protocol is allowed.
Router(config-if)#ip access-group
access-list-number {in | out}
162
Permitting a Single Host
Router(config)# access-list 1 permit 200.100.50.23 0.0.0.0
or
Router(config)# access-list 1 permit host 200.100.50.23
or
Router(config)# access-list 1 permit 200.100.50.23
Router(config)# int e0
Router(config-if)# ip access-group 1 in
or
Router(config-if)# ip access-group 1 out
163
Denying a Single Host
Router(config)# access-list 1 deny 200.100.50.23 0.0.0.0
Router(config)# access-list 1 permit 0.0.0.0 255.255.255.255
or
Router(config)# access-list 1 deny host 200.100.50.23
Router(config)# access-list 1 permit any
Router(config)# int e0
Router(config-if)# ip access-group 1 in
or
Router(config-if)# ip access-group 1 out
164
Permitting a Single Network
Class C
Router(config)# access-list 1 permit 200.100.50.0 0.0.0.255
or
Class B
Router(config)# access-list 1 permit 150.75.0.0 0.0.255.255
or
Class A
Router(config)# access-list 1 permit 13.0.0.0 0.255.255.255
Router(config)# int e0
Router(config-if)# ip access-group 1 in
or
Router(config-if)# ip access-group 1 out 165
Denying a Single Network
Class C
Router(config)# access-list 1 deny 200.100.50.0 0.0.0.255
Router(config)# access-list 1 permit any
or
Class B
Router(config)# access-list 1 deny 150.75.0.0 0.0.255.255
Router(config)# access-list 1 permit any
or
Class A
Router(config)# access-list 1 deny 13.0.0.0 0.255.255.255
Router(config)# access-list 1 permit any
Process:
32-28=4 2^4 = 16
1st Usable Subnet address range it 200.100.50.16-31
2nd Usable Subnet address range it 200.100.50.32-47
3rd Usable Subnet address range it 200.100.50.48-63
Process:
32-27=5 2^5=32
1st Usable Subnet address range it 192.68.72.32-63
2nd Usable Subnet address range it 192.68.72.64-95
Process:
Since exactly 8 bits are borrowed the 3rd octet will denote the
subnet number.
129th Usable Subnet address range it 150.75.129.0-255
Process:
32-22=10 (more than 1 octet) 10-8=2 2^2=4
1st Usable Subnet address range it 160.88.4.0-160.88.7.255
2nd Usable Subnet address range it 160.88.8.0-160.88.11.255
Process:
32-12=20 20-16=4 2^4=16
1st Usable Subnet address range is 111.16.0.0-111.31.255.255
13*16=208
13th Usable Subnet address range is 111.208.0.0-111.223.255.255
171
(The implicit “deny any” ensures that everyone else is denied.)
Denying a Class A Subnet
Network Address/Subnet Mask: 40.0.0.0/24
Undesired Subnet: 500th
Process:
Since exactly 16 bits were borrowed the 2nd and 3rd octet will
denote the subnet.
173
Deny Source Network
access-list 101 deny ip 200.100.50.0 0.0.0.255
0.0.0.0 255.255.255.255
access-list 101 permit ip 0.0.0.0 255.255.255.255
0.0.0.0 255.255.255.255
or
175
Deny Destination Network
access-list 101 deny ip 0.0.0.0 255.255.255.255
200.100.50.0 0.0.0.255
access-list 101 permit ip 0.0.0.0 255.255.255.255
0.0.0.0 255.255.255.255
or
or
or
or
182
access-list 101 permit ip any any
Complicated Example #2
Suppose you are the admin of network 200.100.50.0. You want to permit
Email only between your network and network 150.75.0.0. You wish to place
no restriction on other protocols like web surfing, ftp, telnet, etc.
• Email server send/receive Protocol: SMTP, port 25
• User Check Email Protocol: POP3, port 110
This example assumes the your Email server is at addresses 200.100.50.25
184
Fig. 3 NAT (TI1332EU02TI_0003 New Address Concepts, 7)
New addressing concepts
185
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
NAT: Network Address Translator
NAT
Translates between local addresses and public ones
Many private hosts share few global addresses
186
Fig. 4 How does NAT work? (TI1332EU02TI_0003 New Address Concepts, 9)
realm with realm with
private addresses public addresses
translate reserve
To be pool
translated
map
NAT
exclude exclude
NAT Router
187
Fig. 5 Translation mechanism (TI1332EU02TI_0003 New Address Concepts, 9)
free
NAT
Pool
188
Fig. 8 How does NAT know when to return the public IP address to the pool? (TI1332EU02TI_0003 New Address Concepts, 15)
NAT Addressing Terms
• Inside Local
– The term “inside” refers to an address used for a host
inside an enterprise. It is the actual IP address assigned
to a host in the private enterprise network.
• Inside Global
– NAT uses an inside global address to represent the
inside host as the packet is sent through the outside
network, typically the Internet.
– A NAT router changes the source IP address of a packet
sent by an inside host from an inside local address to an
inside global address as the packet goes from the inside
to the outside network.
189
NAT Addressing Terms
• Outside Global
– The term “outside” refers to an address used for a
host outside an enterprise, the Internet.
– An outside global is the actual IP address assigned to
a host that resides in the outside network, typically the
Internet.
• Outside Local
– NAT uses an outside local address to represent the
outside host as the packet is sent through the private
enterprise network.
– A NAT router changes a packet’s destination IP
address, sent from an outside global address to an
inside host, as the packet goes from the outside to the
inside network.
190
WAN
Router
10.47.10.10 192.50.20.5
191
Fig. 7 An example for NAT (TI1332EU02TI_0003 New Address Concepts, 13)
WAN
NAT with Router
WAN interface:
138.76.28.4
138.76.29.7
Router
SA = 138.76.28.4 SA = 138.76.29.7
DA =138.76.29.7 DA = 138.76.28.4
Router
SA = 10.0.0.10 SA = 138.76.29.7
DA = 138.76.29.7 DA = 10.0.0.10
Net A
10.0.0.0/8
10.0.0.10
192
Fig. 11 An example for NAPT (TI1332EU02TI_0003 New Address Concepts, 21)
Types Of NAT
• There are different types of NAT that can
be used, which are
– Static NAT
– Dynamic NAT
– Overloading NAT with PAT (NAPT)
193
Static NAT
• With static NAT, the NAT router simply
configures a one-to-one mapping between
the private address and the registered
address that is used on its behalf.
194
Static NAT
195
Dynamic NAT
• Like static NAT, the NAT router creates a
one-to-one mapping between an inside local
and inside global address and changes the
IP addresses in packets as they exit and
enter the inside network.
196
Dynamic NAT
198
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Static NAT Configuration
• See Example
199
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Dynamic NAT
• Like static NAT, the NAT router creates a
one-to-one mapping between an inside local
and inside global address and changes the
IP addresses in packets as they exit and
enter the inside network.
200
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
Dynamic NAT
• See Example
202
Fig. 2 Address shortage and possible solutions (TI1332EU02TI_0003 New Address Concepts, 5)
203
Ethernet Access with Hubs
204
Ethernet Access with Bridges
205
Ethernet Access with Switches
206
Today's LAN
207
Full Duplex Transmitting
Full-duplex Ethernet allows the transmission of a packet and the reception of a
different packet at the same time.
This simultaneous transmission and reception requires the use of two pairs of wires
in the cable and a switched connection between each node. This connection is
considered point-to-point and is collision free.
The full-duplex Ethernet switch takes advantage of the two pairs of wires in the
cable by creating a direct connection between the transmit (TX) at one end of the
circuit and the receive (RX) at the other end.
Ethernet usually can only use 50%-60% of the available 10 Mbps of bandwidth
because of collisions and latency. Full-duplex Ethernet offers 100% of the
bandwidth in both directions. This produces a potential 20 Mbps throughput.
208
Why Segment LANs?
209
Collision Domains
210
Segmentation with Bridges
211
Segmentation with Routers
212
Segmentation with Switches
213
Basic Operations of a Switch
Switching is a technology that decreases congestion in Ethernet, Token
Ring, and FDDI LANs. Switching accomplishes this by reducing traffic and
increasing bandwidth. LAN switches are often used to replace shared hubs
and are designed to work with existing cable infrastructures.
Switching equipment performs the following two basic operations:
• Switching data frames
• Maintaining switching operations
214
Switching Methods
1. Store-and-Forward
The entire frame is received before any forwarding takes place. Filters are
applied before the frame is forwarded. Most reliable and also most latency
especially when frames are large.
2. Cut-Through
The frame is forwarded through the switch before the entire frame is
received. At a minimum the frame destination address must be read before
the frame can be forwarded. This mode decreases the latency of the
transmission, but also reduces error detection.
3. Fragment-Free
Fragment-free switching filters out collision fragments before forwarding
begins. Collision fragments are the majority of packet errors. In a properly
functioning network, collision fragments must be smaller than 64 bytes.
Anything > 64 bytes is a valid packet and is usually received without error.
215
Frame Transmission Modes
216
Benefits of Switching
217
How Switches and Bridges
Learn Addresses
Bridges and switches learn in the following ways:
218
CAM
Content Addressable Memory
CAM is used in switch applications:
220
Microsegmentation of a Network
221
Microsegmentation
222
3 Methods of Communication
223
Switches & Broadcast Domains
When two switches are connected, the broadcast domain is increased.
The overall result is a reduction in available bandwidth. This happens because all
devices in the broadcast domain must receive and process the broadcast frame.
Routers are Layer 3 devices. Routers do not propagate broadcasts. Routers are
used to segment both collision and broadcast domains.
224
Broadcast Domain
225
226
Overview
To design reliable, manageable, and scalable networks, a network
designer must realize that each of the major components of a
network has distinct design requirements.
Good network design will improve performance and also reduce the
difficulties associated with network growth and evolution.
Each of these LAN design layers requires switches that are best
suited for specific tasks. 227
The Access Layer
The access layer is the entry point for user workstations and servers to
the network. In a campus LAN the device used at the access layer can
be a switch or a hub.
228
Access Layer Switches
Access layer switches operate at Layer 2 of the OSI model
The distribution layer isolates network problems to the workgroups in which they
occur. The distribution layer also prevents these problems from affecting the core
layer. Switches in this layer operate at Layer 2 and Layer 3.
230
Distribution Layer Switches
The distribution layer switch must have high performance.
The following Cisco switches are suitable for the distribution layer:
• Catalyst 2926G
• Catalyst 5000 family
• Catalyst 6000 family 231
The Core Layer
The core layer is a high-speed switching backbone.
This layer of the network design should not perform any packet manipulation.
Packet manipulation, such as access list filtering, would slow down the process.
Providing a core infrastructure with redundant alternate paths gives stability to the
network in the event of a single device failure.
232
Core Layer Switches
The switches in this layer can make use of a number of Layer 2
technologies. Provided that the distance between the core layer
switches is not too great, the switches can use Ethernet technology.
The following Cisco switches are suitable for the core layer:
• Catalyst 6500 series
• Catalyst 8500 series
• IGX 8400 series
• Lightstream 1010 233
234
Physical Startup of the Catalyst Switch
Switches are dedicated, specialized
computers, which contain a CPU, RAM, and
an operating system.
• System LED
• Remote Power Supply (RPS) LED
• Port Mode LED
• Port Status LEDs
The System LED shows whether the system is receiving power and
functioning correctly.
The RPS LED indicates whether or not the remote power supply is in use.
The Mode LEDs indicate the current state of the Mode button.
The Port Status LEDs have different meanings, depending on the current
value of the Mode LED. 236
Verifying Port LEDs During Switch POST
Once the power cable is connected, the switch initiates a
series of tests called the power-on self test (POST).
237
Connecting a Switch to a Computer
238
Examining Help in the Switch CLI
The command-line interface (CLI) for Cisco switches is very
similar to the CLI for Cisco routers.
241
Setting Switch Hostname
Setting Passwords on Lines
242
243
Overview
Redundancy in a network is extremely important because
redundancy allows networks to be fault tolerant.
245
Broadcast Storms
Broadcasts and multicasts can cause problems in a switched network.
Multicasts are treated as broadcasts by the switches.
Broadcasts and multicasts frames are flooded out all ports, except the one on
which the frame was received.
The switches continue to propagate broadcast traffic over and over. This is
called a broadcast storm. This will continue until one of the switches is
disconnected. The network will appear to be down or extremely slow.
246
Multiple Frame Transmissions
In a redundant switched network it is possible for an end device to receive
multiple frames. Assume that the MAC address of Router Y has been timed
out by both switches. Also assume that Host X still has the MAC address of
Router Y in its ARP cache and sends a unicast frame to Router Y. The router
receives the frame because it is on the same segment as Host X. Switch A
does not have the MAC address of the Router Y and will therefore flood the
frame out its ports. Switch B also does not know which port Router Y is on.
Switch B then floods the frame it received causing Router Y to receive
multiple copies of the same frame. This is a cause of unnecessary processing
in all devices.
247
MAC Database Instability
A switch can incorrectly learn that a MAC address is on one port, when it is
actually on a different port. In this example the MAC address of Router Y is
not in the MAC address table of either switch. Host X sends a frame directed
to Router Y. Switches A & B learn the MAC address of Host X on port 0. The
frame to Router Y is flooded on port 1 of both switches. Switches A and B see
this information on port 1 and incorrectly learn the MAC address of Host X on
port 1. When Router Y sends a frame to Host X, Switch A and Switch B will
also receive the frame and will send it out port 1. This is unnecessary, but the
switches have incorrectly learned that Host X is on port 1.
248
Using Bridging Loops
for Redundancy
249
Logical Loop Free Topology
Created with STP
250
Spanning Tree Protocol - 1
Ethernet bridges
and switches can
implement the
IEEE 802.1D
Spanning-Tree
Protocol and use
the spanning-tree
algorithm to
construct a loop
free shortest path
network.
Shortest path is
based on
cumulative link
costs.
Link costs are
based on the
speed of the link.
251
Spanning Tree Protocol - 2
The Spanning-Tree Protocol
establishes a root node, called the
root bridge/switch.
The BID consists of a bridge priority that defaults to 32768 and the
switch base MAC address.
When a switch first starts up, it assumes it is the root switch and
sends BPDUs. These BPDUs contain the switch MAC address in both
the root and sender BID. As a switch receives a BPDU with a lower
root BID it replaces that in the BPDUs that are sent out. All bridges
see these and decide that the bridge with the smallest BID value will
be the root bridge.
root switch.
• Select ports that are part of the spanning tree, the
designated ports. Non-designated ports are blocked.
254
Spanning Tree Operation
When the network has stabilized, it has converged and there is one spanning
tree per network. As a result, for every switched network the following
elements exist:
• One root bridge per network
• One root port per non root bridge
• One designated port per segment
• Unused, non-designated ports
Root ports and designated ports are used for forwarding (F) data traffic.
Non-designated ports discard data traffic.
Non-designated ports are called blocking (B) or discarding ports.
255
Spanning Tree Port States
256
Spanning Tree Recalculation
A switched internetwork has converged when all the switch and
bridge ports are in either the forwarding or blocked state.
258
259
VLANs
VLAN implementation combines Layer 2 switching and Layer 3 routing
technologies to limit both collision domains and broadcast domains.
This limits the size of the broadcast domains and uses the router to
determine whether one VLAN can talk to another VLAN.
NOTE: This is the only way a switch can break up a broadcast domain!
260
Setting up VLAN Implementation
261
VLAN Communication
262
VLAN Membership Modes
• All users attached to same switch port must be in the same VLAN.
264
Configuring VLANs in Global
Mode
Switch#configure terminal
Switch(config)#vlan 3
Switch(config-vlan)#name Vlan3
Switch(config-vlan)#exit
Switch(config)#end
265
Configuring VLANs
in VLAN Database Mode
Switch#vlan database
Switch(vlan)#vlan 3
VLAN 3 added:
Name: VLAN0003
Switch(vlan)#exit
APPLY completed.
Exiting....
266
Deleting VLANs in Global Mode
Switch#configure terminal
Switch(config)#no vlan 3
Switch(config)#end
267
Deleting VLANs
in VLAN Database Mode
Switch#vlan database
Switch(vlan)#no vlan 3
VLAN 3 deleted:
Name: VLAN0003
Switch(vlan)#exit
APPLY completed.
Exiting....
268
Assigning Access Ports to a
VLAN
Switch(config)#interface gigabitethernet 1/1
269
Verifying the VLAN
Configuration
Switch#show vlan [id | name] [vlan_num | vlan_name]
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 1002 1003
2 enet 100002 1500 - - - - - 0 0
51 enet 100051 1500 - - - - - 0 0
52 enet 100052 1500 - - - - - 0 0
…
272
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-272
VLAN Trunking
273
Importance of Native VLANs
274
ISL Encapsulation
275
ISL and Layer 2 Encapsulation
276
Configuring ISL Trunking
Switch(config)#interface fastethernet 2/1
277
Verifying ISL Trunking
Switch#show running-config interface {fastethernet |
gigabitethernet} slot/port
278
802.1Q Trunking
279
Configuring 802.1Q Trunking
280
Verifying 802.1Q Trunking
Switch#show running-config interface {fastethernet |
gigabitethernet} slot/port
. . .
281
Implementing VLAN Trunk Protocol
282
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN 2.0—2-282
VTP Protocol Features
– Advertises VLAN configuration information
– Maintains VLAN configuration consistency throughout a
common administrative domain
– Sends advertisements on trunk ports only
283
VTP Modes
• Creates, modifies, and deletes
VLANs
• Sends and forwards
advertisements
• Synchronizes VLAN
configurations
• Saves configuration in NVRAM
• Cannot create,
change, or delete • Creates, modifies, and
VLANs deletes VLANs locally
• Forwards only
advertisements • Forwards
• Synchronizes advertisements
VLAN • Does not
configurations synchronize VLAN
• Does not save in configurations
NVRAM • Saves configuration in
NVRAM
284
VTP Operation
• VTP advertisements are sent as multicast frames.
• VTP servers and clients are synchronized to the latest update identified
revision number.
• VTP advertisements are sent every 5 minutes or when there is a change.
285
VTP Pruning
286
VTP Configuration Guidelines
– Configure the following:
• VTP domain name
• VTP mode (server mode is the default)
• VTP pruning
• VTP password
287
Configuring a VTP Server
Switch(config)#vtp server
Switch(config)#vtp pruning
Switch#configure terminal
Switch(config)#vtp server
289
Verifying the VTP Configuration
Switch#show vtp status
VTP Version : 2
Configuration Revision : 247
Maximum VLANs supported locally : 1005
Number of existing VLANs : 33
VTP Operating Mode : Client
VTP Domain Name : Lab_Network
VTP Pruning Mode : Enabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x45 0x52 0xB6 0xFD 0x63 0xC8 0x49 0x80
Configuration last modified by 0.0.0.0 at 8-12-99 15:04:49
Switch#
290
Verifying the VTP Configuration
(Cont.)
Switch#show vtp counters
VTP statistics:
Summary advertisements received : 7
Subset advertisements received : 5
Request advertisements received : 0
Summary advertisements transmitted : 997
Subset advertisements transmitted : 13
Request advertisements transmitted : 3
Number of config revision errors : 0
Number of config digest errors : 0
Number of V1 summary errors : 0
295
WAN Connection Types
• Leased lines
– It is a pre-established WAN communications path
from the CPE, through the DCE switch, to the CPE
of the remote site, allowing DTE networks to
communicate at any time with no setup procedures
before transmitting data.
• Circuit switching
– Sets up line like a phone call. No data can transfer
before the end-to-end connection is established.
296
WAN Connection Types
• Packet switching
– WAN switching method that allows you to share
bandwidth with other companies to save money. As
long as you are not constantly transmitting data and
are instead using bursty data transfers, packet
switching can save you a lot of money.
298
Defining WAN Encapsulation
Protocols
• Typical WAN encapsulation types include the
following:
299
Determining the WAN Type to
Use
• Availability
– Each type of service may be available in certain
geographical areas.
• Bandwidth
– Determining usage over the WAN is important to
evaluate the most cost-effective WAN service.
• Cost
– Making a compromise between the traffic you need to
transfer and the type of service with the available cost
that will suit you.
300
Determining the WAN Type to
Use
• Ease of Management
– Connection management includes both the initial
start-up configuration and the outgoing configuration
of the normal operation.
• Application Traffic
– Traffic may be as small as during a terminal session ,
or very large packets as during file transfer.
301
Max. WAN Speeds for WAN
Connections
WAN Type Maximum
Speed
Asynchronous Dial-Up 56-64 Kbps
ISDN – PRI E1 / T1
303
HDLC
• HDLC performs OSI Layer-2 functions.
• It determines when it is appropriate to use
the physical medium.
• Ensures that the correct recipient receives
and processes the data that is sent.
• Determines whether the sent data was
received correctly or not (error detection).
304
HDLC
• HDLC Frame Format
306
Point-to-Point Protocol (PPP)
• PPP discards frames that do not pass the
error check.
• PPP is a standard protocol, and so it can
be used with all types of routers (not Cisco
Proprietary).
307
PPP LCP Features
• Authentication
• Compression
• Multilink PPP
• Error Detection
• Looped Link Detection
308
PAP Authentication
309
CHAP Authentication
310
Compression
• Compression enables higher data throughput
across the link.
• Different compression schemes are available:
– Predictor : checks if the data was already
compressed.
– Stacker : it looks at the data stream and only sends
each type of data once with information about where
the type occurs and then the receiving side uses this
information to reassemble the data stream.
– MPPC (Microsoft Point-to-Point Compression) :
allows Cisco routers to compress data with Microsoft
clients.
311
PPP Multilink
• PPP Multilink provides load balancing over
dialer interfaces-including ISDN,
synchronous, and asynchronous
interfaces.
313
Looped Link Detection
• PPP can detect looped links (that are
sometimes done by Teleco companies)
using what is called Magic Number.
314
PPP Configuration Commands
• To enable PPP
– Router(config-if)#encapsulation ppp
• To configure Compression
– Router(Config-if)#compress [predictor|stack|mppc]
315
Frame Relay
316
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-316
Frame Relay Components
317
Frame Relay
• The switch examines the frame sent by the
router that has a header containing an address
called DLCI (Data Link Control Identifier) and
then switches the frame based on the DLCI till it
reaches the router on the other side of the
network.
318
Frame Relay
• Frame Relay networks use permanent virtual circuits
(PVCs) or switched virtual circuits (SVCs) but most
nowadays Frame Relay networks use permanent virtual
circuits (PVCs).
• The logical path between each pair of routers is called a
Virtual Circuit (VC).
• VCs share the access link and the frame relay network.
• Each VC is committed to a CIR (Committed Information
Rate) which is a guarantee by the provider that a
particular VC gets at least this much of BW.
319
PVC
PC PVC
Port PVC
CPE
SVC
UNI
SVC
Controller
Router ISDN dial-up connection
or Switch
direct connection
(V.35, E1, RS232)
PBX
Video
320
LMI and Encapsulation Types
• The LMI is a definition of the messages used between
the DTE and the DCE.
321
LMI
• The most important LMI message is the LMI
status inquiry message. Status messages perform
two key functions:
322
LMI
• Three LMI protocol options are available in
Cisco IOS software: Cisco, ITU, and ANSI.
• Each LMI option is slightly different and
therefore is incompatible with the other two.
323
LAPF
• A Frame Relay-connected router encapsulates
each Layer 3 packet inside a Frame Relay header
and trailer before it is sent out an access link.
325
DLCI Addressing Details
• The logical path between a pair of DTEs is called a virtual
circuit (VC).
• The data-link connection identifier (DLCI) identifies each
individual PVC.
• When multiple VCs use the same access link, the Frame
Relay switches know how to forward the frames to the
correct remote sites.
326
DLCI=17 B
DLCI=32
DLCI=32
DLCI=16
FR-network
R
DLCI=17
DLCI=16 DLCI=16
DLCI=21 R
Virtual circuit
R Router
B Bridge
327
DLCI Addressing Details
• The difference between layer-2
addressing and DLCI addressing is mainly
because the fact that the header has a
single DLCI field, not both Source and
Destination DLCI fields.
328
Global DLCI Addressing
• Frame Relay DLCIs are locally significant; this
means that the addresses need to be unique
only on the local access link.
• Global addressing is simply a way of choosing
DLCI numbers when planning a Frame Relay
network so that working with DLCIs is much
easier.
• Because local addressing is a fact, global
addressing does not change these rules. Global
addressing just makes DLCI assignment more
obvious.
329
Global DLCI Addressing
330
Global DLCI Addressing
• The final key to global addressing is that the
Frame Relay switches actually change the DLCI
value before delivering the frame.
• The sender treats the DLCI field as a destination
address, using the destination’s global DLCI in the
header.
• The receiver thinks of the DLCI field as the
source address, because it contains the global
DLCI of the frame’s sender.
331
Layer 3 Addressing
• Cisco’s Frame Relay implementation
defines three different options for
assigning subnets and IP addresses on
Frame Relay interfaces:
– One subnet containing all Frame Relay DTEs
– One subnet per VC
– A hybrid of the first two options
332
One Subnet Containing All Frame
Relay DTEs
• The single-subnet option is typically used
when a full mesh of VCs exists.
333
One Subnet Containing All Frame
Relay DTEs
334
One Subnet Containing All Frame
Relay DTEs
335
One Subnet Per VC
• The single-subnet-per-VC alternative, works better with a
partially meshed Frame Relay network.
336
One Subnet Per VC
337
Hybrid Terminology
• Point-to-point subinterfaces are used when a
single VC is considered to be all that is in the
group—for instance, between Routers A and D
and between Routers A and E.
338
Hybrid Terminology
339
Hybrid Terminology
340
Frame Relay Address Mapping
• Mapping creates a correlation between a Layer-
3 address (IP Address) and its corresponding
Layer-2 address (DLCI in Frame Relay).
341
Mapping Methods
• Mapping can be done either two ways:
• Dynamic Mapping
– Using the Inverse ARP that is enabled by default
on Cisco routers.
• Static Mapping
– Using the frame-relay map command but you
should first disable the inverse arp using the
command no frame-relay inverse-arp
342
Inverse ARP Process
343
Frame Relay Configuration
344
Frame Relay Verification
345
Integrated Services Digital
Network (ISDN)
346
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-346
ISDN Protocols
347
BRI & PRI B and D Channels
348
LAPD & PPP on D and B
Channels
349
LAPD & PPP on D and B
Channels
• LAPD is used as a data-link protocol across an
ISDN D channel.
351
LAPD & PPP on D and B
Channels
• An ISDN switch often requires some form of
authentication with the device connecting to it.
352
PRI Encoding and Framing
• ISDN PRI in North America is based on a digital
T1 circuit. T1 circuits use two different encoding
schemes—Alternate Mark Inversion (AMI) and
Binary 8 with Zero Substitution (B8ZS).
353
DDR (Dial On Demand Routing)
• You can configure DDR in several ways,
including Legacy DDR and DDR dialer profiles.
354
Legacy DDR Operation
• Route packets out the interface to be dialed.
• Determine the subset of the packets that
trigger the dialing process.
• Dial (signal).
• Determine when the connection is
terminated.
355
Legacy DDR Operation
356
DDR Step 1: Routing Packets Out the
Interface to Be Dialed
• DDR does not dial until some traffic is directed (routed) out
the dial interface.
• The router needs to route packets so that they are queued
to go out the dial interface. Cisco’s design for DDR defines
that the router receives some user-generated traffic and,
through normal routing processes, decides to route the
traffic out the interface to be dialed.
• The router (SanFrancisco) can receive a packet that must
be routed out BRI0; routing the packet out BRI0 triggers
the Cisco IOS software, causing the dial to occur.
357
DDR Step 2:
Determining the Interesting Traffic
• Packets that are worthy of causing the device to
dial are called interesting packets.
358
DDR Step 3:
Dialing (Signaling)
• Defining the phone number to be dialed.
360
ISDN PRI Configuration
• Configure the type of ISDN switch to which this
router is connected.
• Configure the T1 or E1 encoding and framing
options (controller configuration mode).
• Configure the T1 or E1 channel range for the
DS0 channels used on this PRI (controller
configuration mode).
• Configure any interface settings (for example,
PPP encapsulation and IP address) on the
interface representing the D channel.
361
PRI Configuration Commands
362
ISDN Switch Types
363
Configuring a T1 or E1 Controller
• Your service provider will tell you what
encoding and framing to configure on the
router. Also, in almost every case, you will
use all 24 DS0 channels in the PRI—23 B
channels and the D channel.
364
DDR With Dialer Profiles
• Dialer profiles pool the physical interfaces
so that the router uses any available B
channel on any of the BRIs or PRIs in the
pool.
365
Dialer Profiles Configuration
366
Dialer Profiles Configuration
367
With all my best wishes for you
to succeed and distinguish in the
CCNA International Exam,
Keep In touch