Network Cheatsheet
Network Cheatsheet
هذا الكتيب الذي يجمع ملخصات مهمة حول عالم الشبكات .في هذا العصر الرقمي ،أصبحت
الشبكات جزًءا ال يتجزأ من حياتنا اليومية ومن عمليات االتصال بين األشياء واألفراد.
يهدف هذا الكتاب إلى توفير مصدر موجز ومركزي لفهم أساسيات الشبكات ومفاهيمها المهمة.
سواء كنت مبتدًئا يبحث عن معرفة أساسية أو محترًفا يتطلع الستعراض مفاهيم معينة ،فإن هذا
الكتاب يمكن أن يكون لك دلياًل مفيًدا.
سيتيح لك هذا الكتاب الوصول إلى معلومات مفيدة حول مواضيع مثل انواع الشبكات ،وأمان
الشبكات ،وإدارة الشبكات.
نأمل أن يكون هذا الكتاب مصدًرا قيًما لكم وأن يساعدكم في فهم عالم الشبكات بشكل أفضل وفي
تطوير مهاراتكم في هذا المجال .دائًما ما تكون معرفة الشبكات ذات أهمية كبيرة ،سواء لالستخدام
الشخصي أو المهني.
Physical Network
Topology Types
© www.aurumme.com/Atech
IPv4 & Subnetting – Cheatsheet – Part q Version 2.1
Key Attributes
Current Standard: RFC791 (Sep 1981)
Address space: 32-bit
Total no. of addresses: 232 = 4294967296 = 4.3 Billion
Notation: Dotted Decimal Types of IPv4 Addresses by
Official/full name: Internet Protocol version 4 Assignment Method
q Static IP w Dynamic IP
addresses addresses
TYPES OF IPV4 BY OPERATION METHOD
www.networkwalks.com
Broadcast A single sender sends data to all devices on the local network
Multicast The sender sends data from its unicast address to a group of addresses
Anycast The sender sends data to the logically closest device in the network
www.networkwalks.com
www.networkwalks.com
Class E 240.0.0.0 – 254.255.255.254 www.networkwalks.com Reserved for future use & R&D
www.networkwalks.com
Encapsulation: “Preparing & passing the data by any Upper layer
to the layer below it, is called Encapsulation”
(Means, going from the application layer all the way down to the physical layer)
TCP 3-way Handshake Process Decapsulation: “Decoding data while going Upwards from the
physical layer till application layer is called decapsulation”
www.networkwalks.com
Your Feedback, Comments are always Welcomed: info@networkwalks.com Network Walks Training Academy (www.networkwalks.com)
© www.aurumme.com/Atech
IPv4 & Subnetting – Cheatsheet – Part w Version 2.1
SWITCH
✓ Switches work on Layer-2 of OSI Model
✓ Switches usually have many Ports
✓ Switches are usually Low Cost
✓ Switches create a single Network of devices
✓ Switches provide High Data Rates
✓ Data Frame Forwarding decisions are made using L2 Frames & MAC
✓ Most of switches don’t need to be configured before use
✓ Operations like best path selection in Routers are carried by ASIC (special hardware)
✓ If a Layer-2 Frame is received by a Switch with unknown destination MAC address, then Data frame is broadcasted
www.networkwalks.com
ROUTER
✓ Routers work on Layer-3 of OSI Model
✓ Routers usually have few Ports
✓ Routers are usually High Cost
✓ Routers connect different Networks together
✓ Routers provide Low Data Rates
✓ Packet Forwarding decisions are made using L3 Packets & IP Address
✓ Most of Routers must be configured before use
✓ Operations like best path selection & Packet forwarding decisions in Routers are carried by Software
✓ If a Layer-3 IP Packet is received by Router with unknown destination IP address, then the IP Packet is dropped
www.networkwalks.com
Key Attributes
Current Standard: RFC791 (Sep 1981)
Address space: 32-bit
Total no. of addresses: 232 = 4294967296 = 4.3 Billion
Notation: Dotted Decimal Types of IPv4 Addresses by
Official/full name: Internet Protocol version 4 Assignment Method
q Static IP w Dynamic IP
addresses addresses
TYPES OF IPV4 BY OPERATION METHOD
www.networkwalks.com
Broadcast A single sender sends data to all devices on the local network
Multicast The sender sends data from its unicast address to a group of addresses
Anycast The sender sends data to the logically closest device in the network
www.networkwalks.com
www.networkwalks.com
Class E 240.0.0.0 – 254.255.255.254 www.networkwalks.com Reserved for future use & R&D
WLAN Topologies
2. Infrastructure
1. Ad-hoc Mode 3. Others
Mode
www.networkwalks.com
Max Data Rate 2 Mb/s 11 Mb/s 54 Mb/s 54 Mb/s 600 Mb/s 6.76 Gb/s 6.93 Gb/s 26.7 Mb/s 40 Mb/s
2.4GHz,
Freq Band 2.4 GHz 2.4 GHz 5 GHz 2.4 GHz
5 GHz
60 GHz 5 GHz 54-790 MHz 900 MHz
Max Tx Power 100mW 100mW 100mW 100mW 100mW 10mW 160mW 100mW 100mW
© www.aurumme.com/Atech
DHCP – Cheat Sheet – Part-1 Version21
Version
Key Attributes
Protocol Type: Layer7 Protocol (Application Layer)
Purpose: IP Address Management
Standard: RFC2131
Founder: Ralph Droms
Carrier Protocol: UDP
Protocol Model Type: Client-Server Model
Port: UDP67 (servers listening), UDP68 (clients listening)
UDP57 (Zone Transfer), UDP58 (DNS Queries)
w DHCP Offer
Source MAC: BBBB, Source IP: 2.2.2.2 , Source Port: UDP67
Dest MAC: Bcast(FF:FF:FF:FF:FF:FF), Dest IP: Bcast(255.255.255.255) , Dest Port: UDP68
NW
e DHCP Request
Source MAC: AAAA, Source IP: 0.0.0.0 , Source Port: UDP68
DHCP Client Dest MAC: Bcast(FF:FF:FF:FF:FF:FF), Dest IP: Bcast(255.255.255.255) , Dest Port: UDP67 www.networkwalks.com
DHCP Server
(UDP68 - listening) (UDP67 - listening)
MAC: AAAA, IP: 1.1.1.1 MAC: BBBB, IP: 2.2.2.2
r DHCP Ack
Source MAC: BBBB, Source IP: 2.2.2.2 , Source Port: UDP67
Dest MAC: Bcast(FF:FF:FF:FF:FF:FF), Dest IP: Bcast(255.255.255.255) , Dest Port: UDP68
The client broadcasts to the server, requesting offered parameters from one server
DHCPREQUEST 0x03 specifically, as defined in the packet
q Unicast w Broadcast
The client-to-server communication, indicating that the network address is already in
DHCPDECLINE 0x04 use Mode Mode
The server-to-client communication with configuration parameters, including BC Flag = 0 BC Flag = 1
DHCPACK 0x05 committed network address
DHCPNAK 0x06 The server-to-client communication, refusing the request for configuration parameter There are two modes of DORA (based on Broadcast Flag in DHCP
The client-to-server communication, relinquishing network address and cancelling Packet):
DHCPRELEASE 0x07 remaining lease Unicast Mode Server sends the DHCP_OFFER & DHCP_ACK on unicast MAC
The client-to-server communication, asking for only local configuration parameters that of client when DHCP BC Flag is set to 0
DHCPINFORM 0x08 the client already has externally configured as an address Broadcast Mode Server sends the DHCP_OFFER & DHCP_ACK on Broadcast
MAC of client when DHCP BC Flag is set to 1
Unicast mode is not recommended when DHCP relay is in use. But if the
client and server are on the same segment, then it is perfectly fine.
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
0
DHCP Relay Agent (82) 82 1 Subnet Mask Option (1)
DHCP
Lease Time (51)
51 3 Router Option (3)
Options
12
Host Name Option (12)
networkwalks.com
w Selecting Dynamic defined by the admin till the lease time defined by admin.
Same client gets different IP after disconnect/connect
www.networkwalks.com
DHCPREQUEST
e Requesting
DHCPACK DHCP Frame Format
1 8 16 24 32
DHCPREQUEST DHCPRELEASE
r Bound OpCode HW Type HW Add Length Hops
DHCPNACK
Transaction ID
Seconds Flags
CIAddr (Client IP Address)
YIAddr (Your IP Address) ≈
www.networkwalks.com
DHCPACK DHCPACK
SIAddr (Server IP Address)
t Renewing yRe-binding ≈
GIAddr (GW IP Address)
CHAddr (Client HW Address) - 16B
DHCPREQUEST
SName (Server Name) - 64B ≈
Boot Filename- 128B
www.networkwalks.com
Options – 214B max ≈
Variable
Length
L2 IP TCP/UDP L7
Header Header Header Header L7 Data
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
www.networkwalks.com
Recon Attacks: Expose important data for next level attacks planning ✓ Configure DHCP Snooping on L2 Switches to stop Corrupt DHCP Server to offering
DHCPOFFER
DHCP MiTM Attacks: Corrupt DHCP Server makes the DHCP Clients set
their Default GW as Attacker device ✓ Use the DHCP Relay (Option82) for extra security in distributed DHCP server/relay
environments
✓ Implement strict Network Admission Control Policies for users
✓ Always place DHCP Server inside Firewall
DHCP DoS Attacks: Attacker floods the ✓ Always keep a secured back-up copy of the DHCP Database &
cache file to restore in case of failure attacks
DHCP Server with DHCP Queries from Bots
& make it un-available for legitimate users ✓ Filter Layer3 IP Traffic to restrict illegitimate requests from specific
visitor devices and certain IP addresses (use IP whitelists and
DHCP starvation Attacks: DHCP requests blacklists) to avoid DHCP DoS Attacks
are broadcasted with Spoofed MAC
✓ Implement strict Firewall rules at Layer7 (e.g. Protocol violations,
addresses causing the DHCP Pool to
Request Limit violations,…) to avoid DHCP DoS Attacks
exhaust
✓ Continuously monitor, log & audit security events and pay
attention to attack alerts to avoid DHCP DoS Attacks
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Key Attributes
Protocol Type: Layer7 Protocol (Application Layer)
Purpose: Name to IP conversion
Standard: Current: RFC1034/1035 (1987), First: RFC882/883 (1983)
Structure: Hierarchical
Founder: Paul V. Mockapetris
Carrier Protocol: TCP, UDP
Port: TCP53 (for Zone Transfer), UDP53 (for DNS Queries)
Protocol Model Type: Client/Server Model
w
Local Cache d t DNS Resolver
Local Cache
Client a Query
√ IP of google.com is sAnswer
8.8.8.8 I know, IP is 8.8.8.8
Authoritative Name
www.networkwalks.com Server (e.g. google.com.)
Recursive Iterative
Query Queries
*Recursive Query means: I will definitely *Iterative Query means: I will try.
answer you; no matter wherever I have to go. Either I will give you answer OR I will refer
OR I will tell you clearly that I do not know you to someone who can answer
www.networkwalks.com
A DNS Server that does NOT have the original source files of a domain zone files & either depends on its cache or need to go any other
Non-Authoritative Database for final/auth answer. Also called Cache-Only DNS Server
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Primary Primary
Root .
Secondary Secondary
www.networkwalks.com
TLD
(Top Level Domain)
net org com mil edu gov
ADI ADI
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Exploit Threat
Exploit is the mechanism to take advantage of a Threat is an event or circumstance which causes
vulnerability, to compromise the functionality of a damage to systems by exploiting a vulnerability.
system. For example Poor encryption For example virus, trojan, malware & Phishing
EXPLOIT THREAT
Vulnerability Risk
Vulnerability is a weakness which can be Risk is the probability of a threat or event
exploited by an attacker in its benefit. For to happen. For example mis-configuration,
example SW bugs & weak passwords VULNER Virus, Worm & Ransomware
ABILITY RISK
ASSET ATTACK
Asset Attack
Asset is anything which is valuable to the Attack is the action taken by an attacker to
organization. For example Computers & Data of harm an asset. For example Phishing attack,
a company called Network Walks DoS attack, Malware attack
C
C
CONFIDENTIALITY
I
INTEGRITY
A
AVAILABILITY
networkwalks.com
R1 R2
q Extendible w Monolithic
Agents Agents
www.networkwalks.com
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Your Feedback, Comments are always Welcomed: info@networkwalks.com Network Walks Training Academy www.networkwalks.com
© www.aurumme.com/Atech
Network Security – Cheat Sheet – Part w Version 1
www.networkwalks.com
RADIUS Model
networkwalks.com
RADIUS Server at
networkwalks.com
ASA or other
Arman Arman
TACACS+ Server at
networkwalks.com
networkwalks networkwalks
Asymmetric Encryption
John
at Network Arman
Walks
Symmetric Encryption
Encryption Decryption
networkwalks.com
$139 nEtworkwaLksCcna69f0….. $139
Key Attributes
Protocol Type: Layer3 (Network Layer)
Purpose: Troubleshooting & Error Reporting
Standard: RFC792 (1981)
Founder: Jon Postel
ICMP Utilities
www.networkwalks.com
Utility Detail
PING An ICMP based Network utility used to test the reachability of devices
TRACEROUTE An ICMP based Network utility used to test & discover the pathway of packets
PMTUD An ICMP based Network utility used to determine the MTU size of Network path
Play video
www.networkwalks.com
Play video
www.networkwalks.com
ICMP is insecure and hard to secure because ICMP messages can originate from any Always disable the ICMP requests to your network
system on the Internet. from OUTSIDE
Reconnaissance & Scanning Attacks: Attacker uses ICMP Always disable the ICMP Protocol on network
Sweeps & traceroute for thorough scan of the network
devices where not necessary
DoS Attacks: Attacker floods the target network/system with
ICMP messages resulting in degraded or no availability
Other Attacks (Smurf Attacks, Ping of Death Attacks
ICMP based Attacks to other protocols like TCP, HTTP,…)
OSPF Neighbors
To become OSPF neighbors, OSPF routers must be agree on:
1. Area ID
2. Same subnet
3. Hello Interval and Dead Interval
OSPF Packet Format
4. Area Type (Stub, NSSA) 8 16 32
5. Authentication (Optional)
6. Router IDs must be unique Version Type Length
Router ID
Area ID
Neighbor Vs Adjacency: Checksum Auth Type
*Neighbor & Adjacency are two different terms in OSPF. Authentication
www.networkwalks.com
Two routers in OSPF are called NEIGHBORS if they are exchanging Hello Authentication
Packets.
Two Routers in OSPF are called an ADJACENCY if they are exchanging
Hello Packets as well as Database. DATA
www.networkwalks.com
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
OSPFv3 (IPv6)
<R1> system-view
[R1] router id 1.1.1.1 #config t
Basic OSPF R1#config t [edit] [R1] ospf 1 A:R1# configure router router-id 1.1.1.1 R1(config)#router ospf 1
[R1-ospf-1] area 0 A:R1# configure router ospf R1(config-router)##ospf router-id 1.1.1.1
Configuration R1(config)#router ospf 1 user@host# set protocols ospf area 0.0.0.0
[R1-ospf-1-area-0.0.0.0] network 1.1.1.1 A:R1>config>router>ospf# area 0 R1(config-router)#network 1.1.1.1/32 area
R1(config-router)#router-id 1.1.1.1 interface ge-0/0/0 255.255.255.255 A:R1>config>router>ospf>area# interface "system" 0.0.0.0
R1(config-router)#network 1.1.1.1 255.255.255.255 area 0 user@host# set protocols ospf area 0.0.0.0 [R1-ospf-1-area-0.0.0.0] network 12.12.12.0 A:R1>config>router>ospf>area>if# back R1(config-router)#network 12.12.12.0/24 area
R1(config-router)#network 12.12.12.0 0.0.0.255 area 0 interface lo0.0 0.0.0.255 A:R1>config>router>ospf>area# interface "PORT12" 0.0.0.0
www.networkwalks.com
www.networkwalks.com
R1#show ip ospf neighbor user@host# show ospf neighbor A:R1# show router ospf neighbor
Basic OSPF R1#show ip ospf interface user@host# show ospf interface A:R1# show router ospf interface R1#show ip ospf neighbor
<R1> display ip routing-table A:R1# show router ospf routes R1#show ip ospf interface
Show R1#show ip route ospf user@host# show ospf route
<R1> display ospf peer A:R1# show router ospf database R1#show ip route ospf
Commands R1#show ip ospf database user@host# show route protocol ospf <R1> display ospf interface Fa0/0/0 A:R1# show router ospf status R1#show ip ospf database
R1#show ip protocols, R1#show ip ospf user@host# show ospf database <R1> display ospf routing 1.1.1.1 A:R1# clear router ospf neighbor R1#show ip ospf
R1#show ip ospf neighbor detail user@host# show ospf neighbor extensive <R1> display ospf brief *info at any context R1#show ip route
.1 12.12.12.0/24 .2
R1 Fa0/0 Fa0/1 R2
Lo: 1.1.1.1/32 Lo: 2.2.2.2/32
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Point-to-Point
R1 R2
Broadcast
R2
R1 R3
R4
OSPF Network/Interface types that can Inter-operate
Side A Side B Can Inter-Operate? Comments Non-Broadcast
Broadcast Broadcast www.networkwalks.com
R2
Non-broadcast Non-broadcast
Point-to-Point Point-to-Point
www.networkwalks.com
R1 R3
Can work after Hello/Dead
Broadcast Non-broadcast Timers Adjustments
www.networkwalks.com
LSA Type1 Router LSA [by ALL RT] Totally
LSA Type2 Network LSA [by ALL DR] Stub Stub
BB / NSSA
LSA Type3 Network Summary LSA [by ABR]
Normal
LSA Type4 ASBR Summary LSA [by ABR]
LSA Type5 External LSA by ASBR [by ASBR]
LSA Type6 Multicast (Group membership) LSA
LSA Type7 NSSA External LSA [by ASBR] NSSA
LSA Type8 External attributes LSA (for BGP)
LSA Type9/10/11 Future use - AS Opaque
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Key Attributes
Protocol Type/Class: IP / Link State
Algorithm: SPF (Dijkstra’s)
Type: IGP (Interior Gateway Protocol)
Metric: Cost (Bandwidth)
Eq Cost Routes handling:
No. of packet types:
CEF Load Balancing
5
DR/BDR in OSPF
Admin Distance: 110
Reference BW: 108 1. High No. of Adjacencies
Problems
Standard: RFC2328 (OSPFv2), RFC2740 (OSPFv3/IPv6) 2. Excessive LSA flooding
Multicast Address: 224.0.0.5, 224.0.0.6
Protocols: IP Solution DR/BDR Model
Transport: IP (Port89)
V-Link Support: YES
DR/BDR Election Criteria:
DR i. Highest OSPF Interface Priority
ii. Highest Router ID (if OSPF interface priorities are equal)
OSPF Router ID Selection Criteria BDR Router with the Second Highest OSPF Interface Priority
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Key Attributes
Protocol Type/Class:
Standards:
Network Protocol (Layer2)
IEEE 802.1D/W/S/Q, Cisco STP Example Topology
(Def on Cisco=PVST)
Function: L2 Loops Prevention, Root Bridge
Adapt to network changes & failures
Algorithm: STP by Radia Perlman DP
SW1 DP
Multicast Address: 01:80:C2:00:00:00 Fa0/2 Fa0/1
Fa0/1 Fa0/1
RP RP
Fa0/2 Fa0/2
DP X BP
STP Operations SW2
Br ID: 32769.0002.4AB3.3923
STP Cost =19
www.networkwalks.com
SW3
Br ID: 32769.0003.E499.257C
1. Elect Root Bridge (RB) Download the Packet Tracer Lab file of this STP Topology for practice: Link
▪ First, one Switch is elected as Root Bridge which has lowest bridge ID
Priority > Lowest sender physical Port Number Pri Ext Sys ID MAC Address
4. Block all remaining Ports
▪ All remaining non-Root and non-Designated Ports are blocked Br ID = Priority.MAC
e.g. Br ID = 32768.AAAA.AAAA.AAAA
*Ext SysID is usually the VLAN no. in case of PVST
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
STP Versions
STP
Version / Feature PVST PVST+ RSTP RPVST+ MST
(Legacy STP / CST)
Algorithm Legacy ST Legacy ST Legacy ST Rapid ST Rapid ST Rapid ST
802.1s, 802.1Q (2003 /
Standard 802.1D (1998) Cisco Cisco 802.1w (2004) Cisco
2005)
No. of STP One instance per
1x Instance One instance per vlan 1x Instance One instance per vlan Configurable
Instances vlan
Trunking types
N/A ISL 802.1Q, ISL N/A 802.1Q, ISL 802.1Q, ISL
supported
30–50 seconds 6 seconds (3 Hello 6 seconds (3 Hello 6 seconds (3 Hello
Failover Timer www.networkwalks.com
intervals) intervals) intervals)
2 Gbps 3 10,000
10 Gbps 2 2,000 Range: 1-10s Range: 4-30s Range: 4-60s
100 Gbps N/A 200 (Def=2 sec) (Def=15 sec) (Def=20 sec)
1 Tbps N/A 20 www.networkwalks.com
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
NW Reference Topology 1
.1 12.12.12.0/24 .2
R1 Fa0/0 Fa0/1 R2
Lo: 1.1.1.1/32 Lo: 2.2.2.2/32
CONFIG / Tellabs
Cisco Juniper Huawei Nokia/ALU
VENDOR (Coriant)
<R1> system-view
#config t
R1#config t [edit] [R1] router id 1.1.1.1 A:R1# configure router router-id 1.1.1.1
R1(config)#router ospf 1
[R1] ospf 1 A:R1# configure router ospf
R1(config)#router ospf 1 user@host# set protocols ospf area 0.0.0.0 R1(config-router)##ospf router-id 1.1.1.1
Basic OSPF [R1-ospf-1] area 0 A:R1>config>router>ospf# area 0
R1(config-router)#router-id 1.1.1.1 interface ge-0/0/0 R1(config-router)#network 1.1.1.1/32 area
Configuration R1(config-router)#network 1.1.1.1 255.255.255.255 area 0 user@host# set protocols ospf area 0.0.0.0
[R1-ospf-1-area-0.0.0.0] network 1.1.1.1 A:R1>config>router>ospf>area# interface "system"
0.0.0.0
255.255.255.255 A:R1>config>router>ospf>area>if# back
R1(config-router)#network 12.12.12.0/24 area
R1(config-router)#network 12.12.12.0 0.0.0.255 area 0 interface lo0.0 [R1-ospf-1-area-0.0.0.0] network 12.12.12.0 A:R1>config>router>ospf>area# interface "PORT12"
0.0.0.0
0.0.0.255
www.networkwalks.com
<R1> display ospf peer A:R1# show router ospf routes
OSPF Show R1#show ip route ospf user@host# show ospf route R1#show ip route ospf
<R1> display ospf interface Fa0/0/0 A:R1# show router ospf database
Commands R1#show ip ospf database user@host# show route protocol ospf
<R1> display ospf routing 1.1.1.1 A:R1# show router ospf status
R1#show ip ospf database
R1#show ip protocols, R1#show ip ospf user@host# show ospf database R1#show ip ospf
<R1> display ospf brief A:R1# clear router ospf neighbor
R1#show ip ospf neighbor detail user@host# show ospf neighbor extensive R1#show ip route
*info at any context
www.networkwalks.com
NW Reference Topology 1
.1 12.12.12.0/24 .2
R1 Fa0/0 Fa0/1 R2
Lo: 1.1.1.1/32 Lo: 2.2.2.2/32
CONFIG / Tellabs
Cisco Juniper Huawei Nokia/ALU
VENDOR (Coriant)
<R1> system-view
#config t
R1#config t [edit] [R1] router id 1.1.1.1 A:R1# configure router router-id 1.1.1.1
R1(config)#router ospf 1
[R1] ospf 1 A:R1# configure router ospf
R1(config)#router ospf 1 user@host# set protocols ospf area 0.0.0.0 R1(config-router)##ospf router-id 1.1.1.1
Basic OSPF [R1-ospf-1] area 0 A:R1>config>router>ospf# area 0
R1(config-router)#router-id 1.1.1.1 interface ge-0/0/0 R1(config-router)#network 1.1.1.1/32 area
Configuration R1(config-router)#network 1.1.1.1 255.255.255.255 area 0 user@host# set protocols ospf area 0.0.0.0
[R1-ospf-1-area-0.0.0.0] network 1.1.1.1 A:R1>config>router>ospf>area# interface "system"
0.0.0.0
255.255.255.255 A:R1>config>router>ospf>area>if# back
R1(config-router)#network 12.12.12.0/24 area
R1(config-router)#network 12.12.12.0 0.0.0.255 area 0 interface lo0.0 [R1-ospf-1-area-0.0.0.0] network 12.12.12.0 A:R1>config>router>ospf>area# interface "PORT12"
0.0.0.0
0.0.0.255
www.networkwalks.com
<R1> display ospf peer A:R1# show router ospf routes
OSPF Show R1#show ip route ospf user@host# show ospf route R1#show ip route ospf
<R1> display ospf interface Fa0/0/0 A:R1# show router ospf database
Commands R1#show ip ospf database user@host# show route protocol ospf
<R1> display ospf routing 1.1.1.1 A:R1# show router ospf status
R1#show ip ospf database
R1#show ip protocols, R1#show ip ospf user@host# show ospf database R1#show ip ospf
<R1> display ospf brief A:R1# clear router ospf neighbor
R1#show ip ospf neighbor detail user@host# show ospf neighbor extensive R1#show ip route
*info at any context
www.networkwalks.com
WLAN Topologies
2. Infrastructure
1. Ad-hoc Mode 3. Others
Mode
www.networkwalks.com
Max Data Rate 2 Mb/s 11 Mb/s 54 Mb/s 54 Mb/s 600 Mb/s 6.76 Gb/s 6.93 Gb/s 26.7 Mb/s 40 Mb/s
2.4GHz,
Freq Band 2.4 GHz 2.4 GHz 5 GHz 2.4 GHz
5 GHz
60 GHz 5 GHz 54-790 MHz 900 MHz
Max Tx Power 100mW 100mW 100mW 100mW 100mW 10mW 160mW 100mW 100mW
© www.aurumme.com/Atech
LLDP Protocol – Summary Cheat Sheet – Part-1 Version 2
Key Attributes
“LLDP is a vendor-neutral Layer2 Protocol used by network devices for advertising their
identity, capabilities and neighbors for discovery at Layer2”
Hello Time Fixed interval at which the device sends LLDP updates to
(LLDP Packet Freq) neighbors. Default LLDP Hello Time = 30s
Re-initialization The delay time for LLDP to re-initialize on any interface. Default
Time LLDP Re-initialize Time =2s
www.networkwalks.com
q Normal w Shutdown
LLDPDUs advisory LLDPDU
Mandatory
Mandatory TLV's TLV's
S
T/L Chassis Port ID Optional End of LLDP MED
Preamble F DA SA TTL LLDPDU FCS
D (0x88cc) ID TLV's TLV “An enhancement to LLDP that operates between endpoint
devices such as IP phones and network devices such as switches”
7Byte 1B 6Byte 6Byte 2Byte Variable Length 2B 4Byte LLDP-MED supports below TLVs:
✓ LLDP-MED capabilities TLV
Ethernet Frame www.networkwalks.com
✓ Network policy TLV, Power management TLV
✓ Inventory management TLV, Location TLV
© www.aurumme.com/Atech
n VTP (Virtual Trunking Protocol) – Summary Cheat Sheet – Part w Version 2
VTP Pruning
“A VTP feature used to eliminate or prune this unnecessary traffic
to save Network BW”
VTP Message Types
✓ By default, VTP pruning is disabled
Advertisement VTP message generated by VTP clients to
✓ In VTP v1 & v2, when we Enable or Disable VTP pruning, it is propagated to Requests request VLAN information from VTP Server
the entire domain and accepted by all the devices in that domain. In VTP
version 3, the domain administrator must manually Enable or Disable VTP VTP message containing Summarised VLAN
Summary
pruning explicitly on each device information. This is sent out every 300sec by
Advertisements default or when a configuration change occurs
✓ Enabling VTP pruning on a VTP server enables pruning for the entire
management domain. Subset VTP message sent when a configuration change
www.networkwalks.com
✓ VLAN 1 is always pruning ineligible (means traffic from VLAN 1 cannot be Advertisements occurs on the server switch
pruned) A message sent when the VTP Client first joins a
VTP Join
✓ By default, VLANs 2 through 1000 are pruning eligible VTP domain, informing the VTP Server(s) about
Message the new client www.networkwalks.com
VTP Modes
VTP Server VTP Client VTP Transparent OFF
Create/Modify/Delete VLANs Yes No Yes (but local only) Yes
Solution:
On SW1/SW2/SW4:
SW(config)# vtp version 2 ....Configure VTP version 2
SW(config)# vtp mode server
SW(config)# vtp domain NETWORKWALKS ....VTP Domain Name
SW(config)# vtp password nw123
nw_SW1 nw_SW2
On SW3: VTP Client VTP Client
SW3(config)# vtp version 2
SW3(config)# vtp mode server
SW3(config)# vtp domain NETWORKWALKS
SW3(config)# vtp password nw123
www.networkwalks.com
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Key Attributes
Protocol Type: Layer2 Protocol
Standard: Cisco Proprietary
(similar to IEEE 802.1AB –2005, Nortel’s NDP, Microsoft’s LLTD)
Purpose: Node Discovery
Multicast Address: 01:00:0C:CC:CC:CC
Supported over GRE Tunnels: YES
TTL: 180s
Carrier/Transport Protocol: Ethernet Frames IEEE802.3
All media types that support SNAP (LAN, Frame Relay, ATM)
CDP Versions
www.atechacademy.com
CDP Hold The duration that a receiving device should maintain CDP
Timer neighbor information before aging it (Default 180s)
www.atechacademy.com
S TLV’s
T/L Organization
Preamble F DA SA (0x88cc)
DSAP 1B SSAP 1B Control 1B Code 3B PID 2B Version 1B TTL 1B Checksum 2B (Device ID, SW Ver,
Platform, …)
FCS
D
7Byte 1B 6Byte 6Byte 2Byte 2B 4Byte
Ethernet Frame
www.atechacademy.com
CDP Security
CDP Spoofing Attacks: Attackers use forged CDP Packets to collect L2 topology info & cause DoS attacks. Therefore, it is recommended to disable
CDP on interfaces that connects non-Cisco devices to avoid CDP Spoofing Attacks. The steps involved in this attack are as in below:
1. An attacker sends packet with multicast MAC (01:00:0c:cc:cc:cc) as destination and various spoofed or fake MAC Addresses as source
2. When a Cisco Device receives these frames it starts to add the information in CDP table
www.atechacademy.com
3. The table starts to get larger because the attacker may send thousands of CDP frames to the device
4. Finally, the device is unable to handle this much of frames & crashes (DoS Attack)
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
.1 12.12.12.0/24 .2
R1 R1 to R2 link comes UP R2
1.1.1.1 www.networkwalks.com 2.2.2.2
DOWN DOWN
INIT
www.networkwalks.com
2-WAY
(Unicast to R2 on 12.12.12.2 with neighbors list) HELLO
2-WAY
Neighbors formed & neighbor table has been built
…
…
…
w LSR
LOADING
LSR
LOADING
LSU
LSAck
LSU
LSAck
… www.networkwalks.com
…
…
FULL FULL
Full Adjacency formed & Synchronised
*There is also an extra state called ATTEMPT which applies only to NBMA interfaces
OSPF Tables
Neighbour Table All Adjacent Routers List
Topology Table LSA’s Table (complete info about the networks in same area)
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
www.networkwalks.com
nw_SW3 nw_SW4
VTP Server VTP Client
VTP Topology
VTP Domain
“A set of interconnected switches under the same administrative
responsibility sharing the same VTP Domain Name”
VTP Config Revision Number
✓ A switch can belong to only one VTP Domain
✓ VLAN configuration changes for a domain are always at Global level “A 32-bit number that indicates the level of
✓ By default, a switch is in the VTP no-management-domain state until it receives an revision for a VTP Frame”
advertisement for a domain over a trunk link or until we configure a Domain Name
✓ We cannot create or modify VLANs on a VTP Server until a management domain ✓ Length: 32-bit Number
www.networkwalks.com
www.networkwalks.com
revision number
the other switches in the VTP domain
✓ A switch always ignores advertisements that have a
different VTP domain name or an earlier
configuration revision number
VTP Versions
VTP v1 VTP v2 VTP v3
Server, Client,
Supported Modes Server, Client, Transparent Server, Client, Transparent, OFF
Transparent
Authentication Types Supported Clear Text Password Clear Text Password Encrypted Password
1-1001 for Server/Client 1-1001 for Server/Client
Supported VLAN ID Range 1-4094 for Transparent
1-4094 for Transparent 1-4094 for Transparent
Private VLANs Not Supported Not Supported Supported
Extended VLANs (1006-4094) Not Supported Not Supported Supported
VLAN update mechanism Revision Number Primary Server Primary Server
/NetworkWalks /company/networkwalks
/Network Walks Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
What is DTP?
“DTP is a Cisco Proprietary Layer-2 Protocol for Trunk Negotiations”
DTP is enabled by default on Trunk Ports in Cisco equipment & both ends of a
Trunk Links should support DTP for it to work.
Dynamic Auto Static access Trunk Trunk Static access Static access Unexpected Results
Dynamic Desirable Trunk Trunk Trunk Static access Static access Unexpected Results
Trunk (ON) Trunk Trunk Trunk Unexpected Results Unexpected Results Trunk
Access (OFF) Static access Static access Unexpected Results Static access Static access Unexpected Results
Nonegotiate (Access) Static access Static access Unexpected Results Static access Static access Unexpected Results
Nonegotiate (Trunk) Unexpected Results Unexpected Results Trunk Unexpected Results Unexpected Results Trunk
*Admin Mode = Input
Operational Mode = Output
*By default, Ethernet interfaces on most Cisco switches are set to desirable mode
© www.aurumme.com/Atech
للتواصل معي واالطالع على المزيد من المحتوى التقني اللذي اقدمة
او لطلب الخدمات واالستشارات التقنية
@buhaimedi
/https://www.linkedin.com/in/ibrahim-buhaimed
https://www.buhaimed.com