You are on page 1of 10

CISCO 2 Routing Tables – used by routers to

determine the best path to send packets.


CHAPTER 1: Basic Device Configuration
Routers encapsulate the packet and forward it
Network Characteristics to the interface indicated in the routing table.
1. Topology
2. Reliability
3. Scalability
4. Availability PACKET FORWARDING METHODS
5. Security
1. Process Switching – older packet
6. Cost
forwarding mechanism still available for
7. Speed CISCO routers.
2. Fast Switching – common packet
forwarding mechanism which uses a
Router – responsible for the routing of traffic
fast-switching cache to store next hop
between networks. Specialized computers.
information.
3. CISCO Express Forwarding (CEF) –
most recent, and preferred Cisco IOS
COMPONENTS
packet-forwarding mechanism.
1. Central Processing Unit
2. Operating System – Cisco IOS
3. Memory and Storage IP ADDRESS INFORMATION

A. IP ADDRESS – Identifies a unique host


on a local Network
Routers use specialized ports and network
B. SUBNET MASK – identifies the host’s
interface cards to interconnect to other
network subnet.
networks.
C. DEFAULT GATEWAY – identifies the
router to a packet is sent to when the
destination is not on the same local
network subnet.

Statically Assigned IP address – host is


manually assigned.
Dynamically Assigned IP Address – IP
address information is dynamically assigned
by a server using Dynamic Host Configuration
Protocol.

ROUTER MEMORY
CONFIGURING ROUTER’S BASIC
1. RAM – volatile memory; temporary
SETTINGS
storage
2. ROM – permanent storage for bootup 1. Name the device
instructions, basic diagnostic software 2. Secure Management Access
3. NVRAM – non-volatile memory that 3. Configure a banner 4. Save the
provides permanent storage for configuration.
startup configuration file.
4. FLASH – non-volatile memory that
provides permanent storage for IOS IPV6 Interface – can support more than one
and other system-related files. address.
Loopback Interface – logical interface that is
internal to the router. Not assigned to a
physical port; software interface. Useful for Reach Remote Networks
testing.
A router can learn about remote networks in
one of two ways:
Best path is selected by a routing protocol Manually - manually entered into the route
based on the value or metric it uses to table using static routes.
determine the distance to reach a network:
Dynamically -automatically learned using a
• A metric is the value used to dynamic routing protocol.
measure the distance to a given
network.
• Best path to a network is the path with Static Routing - Static routing provides some
the lowest metric. advantages over dynamic routing, including:
• Dynamic routing protocols use their - Static routes are not advertised over
own rules and metrics to build and the network, resulting in better security.
update routing tables:
- Static routes use less bandwidth than
• Routing Information Protocol (RIP) - dynamic routing protocols, no CPU cycles are
Hop count used to calculate and communicate routes.
• Open Shortest Path First (OSPF) -
- The path a static route uses to send
Cost based on cumulative bandwidth
data is known.
from source to destination
• Enhanced Interior Gateway Routing Dynamic- laging nagaupdate, more bandwith,
Protocol (EIGRP) - Bandwidth, delay, mas magastos, kaya ang sampong LAN
load, reliability Scaling- manually ginagamit
LOAD BALANCING – When a router has Security- to secure
two or more paths to destination with equal
cost metrics, then the router forwards the Uses of static Routes:
packets using both paths equally.
-ease of routing table maintenance in smaller
Routing Table – is a file stored in RAM that networks.
contains info about directly connected routes
-router has no other neighbors using single
and remote routes.
Show ip route – display contents of the default route to represent a path. Static
routing ttable. Route Application

-connect to a specific network default static


route

-0.0.0.0/0
Static Routes -Provide a Gateway of Last Resort for a stub
network.
• Manually configured, manually updated
w hen there is a topology change, - Reduce the number of routes advertised by
security and control of resources. summarizing several contiguous networks as
one static route.
Dynamic Routing – used by routers to
share information about the reachability and -Create a backup route in case a primary
status of remote networks.
Types of Static Routes:

Standard Static Route:

Default Static Route:


CHAPTER 2 -A default static route is a route that matches
Chapter 2: Static Routing Implementation all packets.
-A default route identifies the gateway IP Static Routing
address to which the sends all IP packets
Networks - typically use a combination of both
that it does not have a learned or static
static and dynamic routing.
router
Static routing has several primary uses:
-A default static route is simply a static route
with 0.0.0.0/0 as the destination IPv4 - Providing ease of routing table
address. maintenance in smaller networks -
Routing to and from a stub
Next Hop Options:
network. - Accessing a single
Next-Hop Route- only the next-hop IP default router.
address is specified.
Disable Auto Summarization
Directly Connected Static Route- only the
router exit interface is specified. - Similarly to RIPv1, RIPv2 automatically
summarizes networks at major network
Fully Specified Static Route- the next hop boundaries by default.
Ip address and exit interface is specified.
- To modify the default RIPv2 behavior of
automatic summarization, use the no
auto-summary router configuration
mode command.
CHAPTER 3:CISCO 2 DYNAMIC ROUTING
- This command has no effect when
PROTOCOOL
using RIPv1.
Dynamic Routing Protocol Evolution - When automatic summarization has
been disabled, RIPv2 no longer
- Dynamic routing protocols have been
summarizes networks to their classful
used in networks since the late
address at boundary routers. RIPv2
1980s.
now includes all subnets and their
- Newer versions support the appropriate masks in its routing
communication based on IPv6. updates.
Routing Protocols - are used to facilitate - show ip protocols now states that
the exchange of routing information between automatic network summarization is not
routers. in effect.
Purpose of dynamic routing protocols Sending out unneeded updates on a LAN
includes: impacts the network in three ways:

- Discovery of remote networks - Wasted Bandwidth


- Maintaining up-to-date routing - Wasted Resources
information - Security Risk
- Choosing the best path to destination
networks Remote Network Entries
- Ability to find a new best path if the
Routing Table Terms
current path is no
- longer available Routes are discussed in terms of:
Main components of dynamic routing - Ultimate route
protocols include:
- Level 1 route
Data structures - Routing protocols typically - Level 1 parent route
use tables or databases for its operations. - Level 2 child routes
Routing protocol messages -Routing Ultimate Route - is a routing table entry that
protocols use various types of messages to contains either a next-hop IP address or an
discover neighboring routers exit interface.
Algorithm - protocols use algorithms for
facilitating routing information for best path
determination.
Route Lookup Process - Used by routers to automatically learn
about remote networks from other
1. If the best match is a level 1 ultimate
routers.
route, then this route is used to
- Purpose includes: discovery of remote
forward the packet.
networks, maintaining up-to-date
2. If the best match is a level 1 parent
routing information, choosing the best
route, proceed to the next step.
path to destination networks, and ability
3. The router examines child routes (the to find a new best path if the current
subnet routes) of the parent route for path is no longer available.
a best match.
4. If there is a match with a level 2 child - Best choice for large networks but static
route, that subnet is used to forward routing is better for stub networks.
the packet. - Function to inform other routers about
5. If there is not a match with any of the changes.
level 2 child routes, proceed to the - Responsible for discovering remote
next step. networks, as well as maintaining
6. The router continues searching level accurate network information.
1 supernet routes in the routing table - Upon a change in the topology routing
for a match, including the default protocols propagate that information
route, if there is one. throughout the routing domain.
7. If there is now a lesser match with a - Convergence: The process of bringing
level 1 supernet or default routes, the all routing tables to a state of
router uses that route to forward the consistency
packet. - Cisco routers use the administrative
8. If there is not a match with any route distance value to determine which
routing source to use.
- Each dynamic routing protocol has a
unique administrative value
- Directly connected networks are
preferred source
- The lower the administrative value,
the more preferred the route source.

CHAPTER 4:

in the routing table, the router drops Chapter 4: introduction to the Switched
Networks
the packet.

IPv6 Routing Table Entries


Elements of a Converged Network ▪ To
- Components of the IPv6 routing table
are very similar to the IPv4 routing support collaboration, networks employ
table (directly connected interfaces, converged solutions.
static routes, and dynamically learned ▪ Data services include voice systems, IP
routes). phones, voice gateways, video support, and
- IPv6 is classless by design, all routes video conferencing.
are effectively level 1 ultimate routes.
There is no level 1 parent of level 2 ▪ Call control, voice messaging, mobility, and
child routes. automated attendant are also common
features.
Summary
▪ Multiple types of traffic; only one network to
Dynamic routing protocols: manage.
▪ Substantial savings over installation and ▪ A LAN switch keeps a table that it uses to
management of separate voice, video, and determine how to forward traffic through the
data networks. switch.
▪ Integrates IT management. ▪ Cisco LAN switches forward Ethernet frames
based on the destination MAC address of the
frames.
Cisco Borderless Networks
▪ A network architecture that allows
organizations to connect anyone, anywhere, Dynamically Populating a Switch MAC
anytime, and on any device securely, Address Table
reliably, and seamlessly. ▪ A switch must first learn which devices exist
on each port before it can transmit a frame.

Hierarchy in the Borderless Switched ▪ As a switch learns the relationship of ports to


Network devices, it builds a table called a MAC address
or content addressable memory (CAM) table.
▪ Borderless switched network design
guidelines are built upon the following ▪ CAM is a special type of memory used in
principles: high-speed searching applications.

▪ Hierarchical ▪ The information in the MAC address table is


used to send frames.
▪ Modularity
▪ When a switch receives an incoming frame
▪ Resiliency with a MAC address that is not found in the
CAM table, it floods it to all ports, except the
▪ Flexibility
one that received the frame.
Role of Switched Networks
▪ Switching technologies are crucial to
Switch Forwarding Methods
network design.
Store-and-Forward Switching
▪ Switching allows traffic to be sent only
where it is needed in most cases, using fast ▪ Check for errors (via FCS check)
methods.
▪ Perform automatic buffering

▪ Slower forwarding process


Form Factors
Cut-Through Switching
Fixed Configuration Switches – Features
and options are limited to those that ▪ Allows the switch to start forwarding in about
originally come with the switch. 10 microseconds
Modular Platform – The chassis accepts ▪ No FCS check
line cards that contain the port.
▪ No automatic buffering
Stackable Configuration Switches –
Stackable switches, connected by a special
cable, effectively operates as one larger Collision domain - Segment where devices
switch. compete to communicate.
▪ Operating in half duplex, each segment is in
Switching as a General Concept in its own collision domain.
Networking and Telecommunications
▪ Operating in full duplex eliminates collisions.
▪ A switch makes a decision based on
▪ By default, will auto-negotiate full duplex
ingress and a destination port.
when the adjacent device can also operate in
full duplex.
A broadcast domain is the extent of the information about the switch through the
network where a broadcast frame can be Mode button.
heard.
The following modes are available on Cisco
▪ Switches forward broadcast frames to all
Catalyst 2960 switches:
ports; therefore, switches do not break
• System LED
broadcast domains.
• Redundant Power System (RPS) LED
▪ All ports of a switch, with its default • Port Status LED
configuration, belong to the same broadcast • Port Duplex LED
domain. • Port Speed LED
• Power over Ethernet (PoE) Mode LED
▪ If two or more switches are connected,
broadcasts are forwarded to all ports of all
switches, except for the port that originally Preparing For Basic Switch Management
received the broadcast. To remotely manage a Cisco switch, it must
be configured to access the network.
• A console cable is used to connect a PC
CHAPTER 5 CHAPTER 5 : SWITCH to the console port of a switch for
CONFIGURATION configuration.
• The IP information (address, subnet
Switch Boot Sequence mask, gateway) is to be assigned to a
• The boot system command can be
switch virtual interface (SVI).
used to set the BOOT environment
• If managing the switch from a remote
variable. Use the show boot
network, a default gateway must also be
command to see what the current IOS
configured.
boot file is set to.
• Although these IP settings allow remote
management and remote access to the
Recovering From A System Crash switch, they do not allow the switch to
• The boot loader can also be used to route Layer 3 packets.
manage the switch if the IOS cannot
be loaded.
Configuring Switch Management Access
• The boot loader can be accessed
through a console connection by:

1. Connecting a PC by console cable to


the switch console port. Unplug the
switch power cord.
2. Reconnecting the power cord to the
switch and press and hold the Mode
button.
3. The System LED turns briefly amber
Configuring Switch Management Access
and then solid green. Release the
(cont.)
Mode button.

• The boot loader switch: prompt


appears in the terminal emulation
software on the PC.

Switch Led Indicators


• Each port on Cisco Catalyst switches
has status LED indicator lights.
• By default, these LED lights reflect port
activity, but they can also provide other
• Static secure MAC addresses –
manually configured and added to
Duplex Communication running configuration - switchport
portsecurity macaddress mac-address
• Dynamic secure MAC addresses –
removed when switch restarts
• Sticky secure MAC addresses – added
to running configuration and learned
dynamically - switchport port-security
mac-address sticky interface
configuration mode command.

Auto-MDIX Port Security: Violation Modes IOS


• Certain cable types (straight-through considers a security violation when:
or crossover) were historically • The maximum number of secure MAC
required when connecting devices. addresses for that interface have been
• The automatic medium-dependent added to the CAM, and a station whose
interface crossover (auto-MDIX) MAC address is not in the address table
feature eliminates this problem. attempts to access the interface.
• When auto-MDIX is enabled, the
interface automatically detects and There are three possible actions to take when
appropriately configures the a violation is detected:
connection. • Protect – no notification received
• Restrict – notification received of
• When using auto-MDIX on an security violation
interface, the interface speed and • Shutdown
duplex must be set to auto. • Switchport port-security violation
{protect | restrict |shutdown}
interface configuration mode command
SSH Operation
• Secure Shell (SSH) is a protocol that
provides a secure (encrypted), Ports in Error Disabled State
command-line based connection to a • A port security violation can put a switch
remote device. in an error disabled state.
• Because of strong encryption • A port in error disabled is effectively
features, SSH should replace Telnet shutdown.
for management connections. • The switch communicates these events
• SSH uses TCP port 22, by default. through console messages.
• Telnet uses TCP port 23.
• A version of the IOS software, The show interface command also reveals a
including cryptographic (encrypted) switch port on error disabled state.
features and capabilities, is required
to enable SSH on Catalyst 2960 A shutdown or no shutdown interface
switches configuration mode command must be issued
to re-enable the port.

Port Security: Operation


▪ The MAC addresses of legitimate devices
are allowed access, while other MAC
addresses are denied.
▪ Any additional attempts to connect by
unknown MAC addresses generate a
CHAPTER 6
security violation.
▪ Secure MAC addresses can be configured CHAPTER 6 CISCO 2
in a number of ways:
EtherChannel Operation
Link Aggregation AutoNegotiation Protocols
- needed that allows redundant
links between devices that will not
be blocked by STP EtherChannel

- is a link aggregation technology


that groups multiple physical
Ethernet links together into one
single logical link
- It is used to provide
faulttolerance, load sharing,
increased bandwidth, and
redundancy between switches,
routers, and
servers - EtherChannels can be formed through
Advantages of EtherChannel negotiation using one of two protocols,
Port Aggregation Protocol (PAgP) or -
Most configuration tasks can be done on the Link Aggregation Control Protocol EtherChannel
interface instead of on each (LACP). These protocols allow ports
individual port with similar characteristics to form a
channel through dynamic negotiation -
EtherChannel relies on existing switch ports with adjoining switches.

-Load balancing takes place between links that PAgP Operation


are part of the same EtherChannel
- is a Cisco-proprietary protocol that aids
- EtherChannel creates an aggregation that is in the automatic creation of
seen as one logical link
EtherChannel links. When an -
EtherChannel provides redundancy because EtherChannel link is configured using
the overall link is seen as one logical PAgP, PAgP packets are sent between
connection EtherChannel-capable ports to negotiate
the forming of a channel.
Implementation Restrictions - ON - This mode forces the interface to
- Interface types cannot be mixed. For channel without PAgP. Interfaces example, Fast
Ethernet and Gigabit configured in the on mode do not Ethernet cannot be mixed
within a single exchange PAgP packets.
EtherChannel. - PAgP desirable - This PAgP mode
- Currently each EtherChannel can places an interface in an active consist of up to
eight compatibly- negotiating state in which the interface configured Ethernet ports
initiates negotiations with other
- The Cisco Catalyst 2960 Layer 2 switch interfaces by sending PAgP packets. currently
supports up to six - PAgP auto - This PAgP mode places an EtherChannel
interface in a passive negotiating state
- The individual EtherChannel group in which the interface responds to the member port
configuration must be PAgP packets that it receives but does consistent on both
devices not initiate PAgP negotiation.
- Each EtherChannel has a logical port channel interface
Configuration Guidelines
LACP Operation
EtherChannel Support - All Ethernet
- LACP is part of an IEEE specification interfaces must support EtherChannel with no
(802.3ad) that allows several physical requirement that interfaces be physically
ports to be bundled to form a single contiguous.
logical channel.
Speed and Duplex - Configure all interfaces in
- provides the same negotiation benefits
an EtherChannel to operate at the same
as PAgP. LACP helps create the
speed and in the same duplex mode
EtherChannel link by detecting the
configuration of each side and making VLAN match - All interfaces in the
sure that they are compatible so that EtherChannel bundle must be assigned to the
the EtherChannel link can be enabled same VLAN or be configured as a trunk
when needed. (shown in the figure).
- ON - This mode forces the interface to Range of VLANs - An EtherChannel supports
channel without LACP. Interfaces the same allowed range of VLANs on all the
configured in the on mode do not interfaces in a trunking EtherChannel. If the
exchange LACP packets. allowed range of VLANs is not the same, the
- LACP Active - This LACP mode places interfaces do not form an EtherChannel, even
a port in an active negotiating state. In when they are set to auto or desirable mode.
this state, the port initiates negotiations
with other ports by sending LACP
packets. Common EtherChannel issues:
- LACP passive - This LACP mode
places a port in a passive negotiating - Assigned ports in the EtherChannel are
state. In this state, the port responds to not part of the same VLAN, or not
the LACP packets that it receives but configured as trunks. Ports with
does not initiate LACP packet different native VLANs cannot form an
negotiation. EtherChannel.
- Trunking was configured on some of the
ports that make up the EtherChannel,
but not all of them. It is not
recommended that you configure
trunking mode on individual ports that
make up the EtherChannel. When
configuring a trunk on an EtherChannel,
verify the trunking mode on the
EtherChannel.
- If the allowed range of VLANs is not the
same, the ports do not form an
EtherChannel even when PAgP is set to
the auto or desirable mode.
- The dynamic negotiation options for
PAgP and LACP are not compatibly
configured on both ends of the
EtherChannel.

You might also like