Appendix . Fast Facts

OSI Model in Review

Table FF.1 lists the seven layers of the OSI model and significant aspects of each layer.

Table FF.1. The OSI Model

OSI Layer

Important Functions

Application

Provides an interface between a host’s communication software and any necessary external applications.

Evaluates what resources are necessary and available resources for communication between two devices.

Synchronizes client/server applications.

Provides error control and data integrity between applications.

Provides system-independent processes to a host.

Presentation

Presents data to the application layer.

Acts as a data format translator.

Handles the structuring of data and negotiating data transfer syntax to Layer 7.

Processes involved include data encryption, decryption, compression, and decompression.

Session

Handles dialog control among devices.

Determines the beginning, middle, and end of a session or conversation that occurs between applications (intermediary).

Transport

Manages end-to-end connections and data delivery between two hosts.

Segments and reassembles data.

Provides transparent data transfer by hiding details of the transmission from the upper layers.

Network

Determines best path for packet delivery across the network.

Determines logical addressing, which can identify the destination of a packet or datagram.

Uses data packets (IP, IPX) and route update packets (RIP, EIGRP, and so on).

Uses routed protocols IP, IPX, and AppleTalk DDP.

Devices include routers and Layer 3 switches.

Data Link

Ensures reliable data transfer from the Network layer to the Physical layer.

Oversees physical or hardware addressing.

Formats packets into a frame.

Provides error notification.

Devices include bridges and Layer 2 switches.

Physical

Moves bits between nodes.

Assists with the activation, maintenance, and deactivation of physical connectivity between devices.

Devices include hubs and repeaters.

Application Protocols Supported by the Application Layer

Table FF.2. Application Layer Protocols

Application Protocols

Function

Telnet

A TCP/IP protocol that provides terminal emulation to a remote host by creating a virtual terminal. TeraTerm is one program that can be installed on a user computer to create Telnet sessions. This protocol requires authentication via a username and password.

Hypertext Transfer Protocol (HTTP)

Enables web browsing with the transmission of Hypertext Markup Language (HTML) documents on the Internet.

Secure Hypertext Transfer Protocol (HTTPS)

Enables secure web browsing. A secure connection is indicated when the URL begins with https:// or when there is a lock symbol at the lower-right corner of the web page that is being viewed.

File Transfer Protocol (FTP)

Allows a user to transfer files. Provides access to files and directories.

Trivial File Transfer Protocol (TFTP)

A bare-bones version of FTP that does not provide access to directories. With TFTP, you can simply send and receive files. Unlike FTP, TFTP is not secure and sends smaller blocks of data.

Domain Name System (DNS)

Resolves hostnames such as cisco.com into IP addresses.

Simple Mail Transfer Protocol (SMTP)

Sends electronic mail across the network.

Post Office Protocol 3 (POP3)

Receives electronic mail by accessing a network server.

Network File System (NFS)

Allows users with different operating systems (that is, NT and Unix workstations) to share files through a network. Remote files appear as though they reside on a local machine even though the local machine might be “diskless.”

Network News Transfer Protocol (NNTP)

Offers access to Usenet newsgroup postings.

Simple Network Management Protocol (SNMP)

Monitors the network and manages configurations. Collects statistics to analyze network performance and ensure network security.

Network Time Protocol (NTP)

Synchronizes clocks on the Internet to provide accurate local time on the user system.

Dynamic Host Configuration Protocol (DHCP)

Works dynamically to provide an IP address, subnet mask, domain name, and a default gateway for routers. Works with DNS and WINS (used for NetBIOS addressing).

Table FF.3. Control Information for Each Layer

OSI Layer

Control Information Name

Application

Data

Presentation

 

Session

 

Transport

Segment

Network

Packet

Data Link

Frame

Physical

Bit

Table FF.4. OSI Layers and Related TCP/IP Layers

OSI Layer

TCP/IP Layer

Application

Application

Presentation

 

Session

 

Transport

Transport

Network

Internet

Data Link

Network Access

Physical

 

TCP uses Positive Acknowledgment and Retransmission (PAR):

  1. The source device begins a timer when a segment is sent and retransmits if the timer runs out before an acknowledgment is received.

  2. The source device keeps track of segments that are sent and requires an acknowledgment for each segment.

  3. The destination device acknowledges when a segment is received by sending a packet to the source that iterates the next sequence number it is looking for from the source.

Table FF.5. The TCP Segment Header Format

Source Port

Destination Port

Sequence Number

Acknowledgment Number

Miscellaneous Flags Checksum

Window (Flow Control) Urgent

Options

Table FF.6. Applications Using TCP and Related Ports

Application

Port #(s)

FTP

20, 21

Telnet

23

SMTP

25

DNS (zone transfers)

53

HTTP

80

POP3

110

NNTP

119

HTTPS

443

Table FF.7. The UDP Header

Source Port

Destination Port

Length

Checksum

Table FF.8. Applications Using UDP and Related Ports

Application

Port #(s)

DHCP

67, 68

DNS (name resolution)

53

TFTP

69

NTP

123

SNMP

161

Network Domains

Two domains determine data transport reliability:

  • Broadcast domain: A group of nodes that can receive each other’s broadcast messages and are segmented by routers.

  • Collision domain: A group of nodes that share the same media and are segmented by switches. A collision occurs if two nodes attempt a simultaneous transmission. Carrier Sense Multiple Access Collision Detection (CSMA/CD) sends a jam signal to notify the devices that there has been a collision. The devices then halt transmission for a random backoff time.

Cabling, Lines, and Services

  • Bandwidth: The total amount of information that can traverse a communications medium measured in millions of bits per second. Bandwidth is helpful for network performance analysis. Also, availability is increasing but limited.

  • Crosstalk: An electrical or magnetic field that is a result of one communications signal that can affect the signal in a nearby circuit.

Unshielded twisted-pair (UTP) cables are vulnerable to Electromagnetic Interference (EMI) and use an RJ-45 connector. Fiber-optic cables are not susceptible to EMI.

Use a straight-through cable to connect the following devices:

  • Terminated directly into a dedicated hub or switch port

  • From a PC to a switch or a hub

  • From a router to a switch or a hub

Use a cross-over cable to connect the following devices:

  • From switch to switch

  • From router to router

  • From PC to PC

  • From a PC to a router

  • From a hub to a hub

  • From a hub to a switch

Spread Spectrum Wireless LANs allow for high-speed transmissions over short distances.

Wireless Fidelity (Wi-Fi) is defined by IEEE 802.11.

Table FF.9. Summary of Ethernet 802.3 Characteristics

Standard

Speed

Media Type

Connector Used

10BASE-2

10Mbps

RG-58 coaxial

BNC

10BASE-5

10Mbps

RG-58 coaxial

BNC

10BASE-T

10Mbps

Category 3, 4, or 5 UTP or STP

RJ-45

10BASE-FL

10Mbps

Fiber-optic

SC or ST

Table FF.10. Comparison of Fast Ethernet 802.3u Characteristics

Standard

Speed

Media Type

Connector Used

100BASE-T4

100Mbps

Category 3, 4, or 5 UTP or STP

RJ-45

100BASE-TX

100Mbps

Category 5 UTP or STP

RJ-45

100BASE-FX

100Mbps

Fiber-optic

SC or ST

Table FF.11. Summary of Gigabit Ethernet 802.3ab Characteristics

Standard

Speed

Media Type

Connector Used

1000BASE-T or 1000BASE-TX

1000Mbps or 1Gbps

Category 5 UTP or higher

RJ-45

Table FF.12. Comparison of Gigabit Ethernet 802.3z Characteristics

Standard

Speed

Media Type

Connector Used

1000BASE-CX

1000Mbps or 1Gbps

Shielded copper wire

Nine-pin shielded connector

1000BASE-SX

1000Mbps or 1Gbps

MM fiber-optic

SC or ST

1000BASE-LX

1000Mbps or 1Gbps

MM or SM fiber-optic

SC or ST

MAC Addressing

A MAC address is hard-coded (burnt-in) on the network interface controller (NIC) of the Physical layer device attached to the network. Each MAC address must be unique and use the following format:

  1. Consists of 48 bits (or 6 bytes).

  2. Displayed by 12 hexadecimal digits (0 through 9, A through F).

  3. First six hexadecimal digits in the address are a vendor code or organizationally unique identifier (OUI) assigned to that NIC manufacturer.

  4. Last six hexadecimal digits are assigned by the NIC manufacturer and must be different from any other number assigned by that manufacturer.

Example of a MAC address: 00:00:07:A9:B2:EB

The OUI in this example is 00:00:07.

The broadcast address value is FFFF.FFFF.FFFF.

Framing and Duplex Types

802.3 frame information and parameters are as follows:

  1. The data-link header portion of the frame contains the Destination MAC address (6B), Source MAC address (6B), and Length (2B).

  2. The Logical Link Control portion of the frame contains Destination Service Access Point (DSAP), Source Service Access Point (SSAP), and Control information. All three are 1B long. The Service Access Point (SAP) identifies an upper-layer protocol such as IP (06) or IPX (E0).

  3. The Data and cyclical redundancy check (CRC) portion of the frame is also called the data-link trailer. The Data field can be anywhere from 43 to 1497B long. The frame check sequence (FCS) field is 4B long. FCS or CRC provides error detection.

Bridges and switches examine the source MAC address of each inbound frame to learn MAC addresses.

Switches are multiport bridges that use ASIC hardware chips for frame forwarding. Dedicated bandwidth enables the switch port to guarantee the speed assigned to that port. For example, 100Mbps port connections get 100Mbps transmission rates.

Hubs use half-duplex technology. Switches can be set up for full-duplex.

WAN Interfaces

WAN interfaces are used to provide a point of interconnection between Cisco routers and other network devices. Types of WAN interfaces include the following:

  • Basic Rate Interface (BRI)

  • Synchronous Serial

  • Asynchronous Serial

  • High-Speed Serial Interface (HSSI)

  • T1 Controller Card

BRI is an Integrated Services Digital Network (ISDN) line that consists of two 64Kbps bearer (B) channels and one 16Kbps data (D) channel.

DCE equipment might consist of a:

  • Modem

  • Channel Service Unit/Data Service Unit (CSU/DSU)

  • BRI NT-1

DTE equipment might consist of a:

  • Router

  • PC

  • Server

Memory Types

Four memory components are used by Cisco devices. Those components include ROM, Flash, RAM, and NVRAM.

RAM contains the running IOS, with the exception of Run-From-Flash (RFF) routers. RAM also contains the running configuration or the active configuration that is used after a machine is booted.

IOS File Naming Conventions

Given the example filename c2600-ipbase-1.122-1.T.bin, from left to right, each portion of the filename represents the following:

  • c2600: Hardware platform (Cisco 2600 router)

  • ipbase: Feature set

  • 1: File format (compressed relocatable)

  • 122: IOS version number

  • l: Maintenance release number

  • T: Train identifier

Utilities Using ICMP

Internet Control Messaging Protocol (ICMP) is used by ping and traceroute utilities. Packet Internet Groper (ping) allows you to validate that an IP address exists and can accept requests.

  • ping is an echo, and the response is an echo response.

  • Routers send Destination Unreachable messages when they can’t reach the destination network and they are forced to drop the packet. The router that drops the packet sends the ICMP DU message.

A traceroute traces the route or path taken from a client to a remote host. Traceroute also reports the IP addresses of the routers at each next hop on the way to the destination. This is especially useful when you suspect that a router on the route to an unreachable network is responsible for dropping the packet.

Network Security

Three classes of attack are commonly found in today’s network environment:

  • Access attacks

  • Reconnaissance attacks

  • Denial of service (DoS) attacks

Access Attacks

An access attack is just what it sounds like. It is an attempt to access another user account or network device through improper means. The four main types of access attacks are:

  • Password attacks

  • Trust exploitation

  • Port redirection

  • Man-in-the-middle

Reconnaissance Attacks

The four main subcategories or methods of gathering network data for a reconnaissance attack are:

  • Packet sniffers

  • Port scans

  • Ping sweeps

  • Information queries

Denial of Service (DoS) Attacks

DoS attacks are often implemented by a hacker as a means of denying a service that is normally available to a user or organization. The three main types of DoS attacks are:

  • Distributed DoS

  • TCP SYN

  • Smurf

Mitigating Network Threats

The following actions can be taken to lessen the impact of an attack on a network:

  • Authentication, Authorization, and Accounting (AAA)

  • Cisco access lists (ACLs)

  • Cisco IOS secure management features: SSH, SNMP, syslog, and NTP

  • Encryption protocols: SSH, IPsec, and SSL

  • Security appliances and applications: firewall, IPS, and IDS

IP Addressing

IPv4 addresses

  • Consist of 32 bits.

  • Are broken into four octets (8 bits each).

  • Use dotted-decimal format; an example is 172.16.122.204.

  • Minimum value (per octet) is 0, and the maximum value is 255.

  • 0.0.0.0 is a network ID.

  • 255.255.255.255 is a broadcast IP.

Table FF.13. IPv4 Address Classes

 

First Octet

Second Octet

Third Octet

Fourth Octet

Class A

Network

Host

Host

Host

Class B

Network

Network

Host

Host

Class C

Network

Network

Network

Host

TCP/IP defines two additional address classes:

  • Class D: Used for multicast addresses

  • Class E: Used for research purposes

Table FF.14. Address Class Ranges

Class

First Octet Decimal Range

A

1 to 126

B

128 to 191

C

192 to 223

D

224 to 239

E

240 to 255

The 127.x.x.x address range is reserved for loopback addresses.

Default subnet masks:

  • Class A: 255.0.0.0

  • Class B: 255.255.0.0

  • Class C: 255.255.255.0

Classless Addressing

Classless Interdomain Routing (CIDR) notation might also be used to identify the subnet mask. The CIDR notation for each network class can be determined by counting the 1s in binary or the number of bits that make up the network portion of the address.

The mask is written in slash notation as follows:

  • Class A: /8

  • Class B: /16

  • Class C: /24

Private Ranges

IANA Private Address Space Allocations:

  • Class A: 10.0.0.0 to 10.255.255.255

  • Class B: 172.16.0.0 to 172.31.255.255

  • Class C: 192.168.0.0 to 192.168.255.255

Subnetting

Table FF.15. Decimal to Binary Conversions

Class

First Octet Decimal Range

0

00000000

128

10000000

192

11000000

224

11100000

240

11110000

248

11111000

252

11111100

254

11111110

255

11111111

To calculate the hosts in a subnet, we can use the formula 2H – 2. The exponent H represents the number of host bits in a network.

To calculate the networks in a subnet, we can use the formula 2N – 2. The exponent N represents the number of subnet bits in a network.

The range of valid IP addresses in a subnet is the first IP address after the Network ID and the last IP address before the broadcast IP address.

The following represents IP subnetting:

IP address = 100.15.209.0

Subnet mask = 255.255.254.0

Network ID = 100.15.208.0

Broadcast IP = 100.15.209.255

Valid IP range = 100.15.208.1 to 100.15.209.254

IPv6

IPv6 is a workable IP version that was created in the event that the IP space from IPv4 is exhausted.

IPv6 address format summary:

  1. Defined by RFC 2373 and RFC 237.

  2. Consists of 128 bits with a 64-bit network prefix and a 64-bit local identifier.

  3. Represented by 32 hexadecimal digits broken into eight smaller groups of four.

  4. Uses CIDR notation (slash notation) to discern a subnet range, so you might see the same IP address subnetted and written out as 2001:0BD2:0200:08F1:0000:0000:0000:16AB/16.

The same IPv6 IP address can be written in all of the following ways:

2001:0BD2:0200:08F1:0000:0000:0000:16AB

2001:BD2:200:8F1:0:0:0:16AB

2001:BD2:200:8F1::16AB

Types of IPv6 Addresses

  • Link-local addresses: Addresses that have the shortest reach of the IP address types. They can go only as far as the Layer 2 domain. These addresses are autogenerated with or without the use of a DHCP server. So, when an IPv6 node goes online, this address is assigned automatically.

  • Unique/site-local addresses: Addresses that have a broader scope than link-local addresses. They can expand to the size of an organization and are used to describe the boundary of the organizational network. These are the private addresses for IPv6.

  • Global addresses: Addresses that have the broadest scope of all. As the name indicates, these addresses are for global use—that is, for Internet communications.

  • Multicast: Addresses that are extremely important because of their use for group communications and broadcast messaging.

Integrating IPv4 and IPv6

There are several ways to integrate IPv4 and IPv6 addressing. You can implement dual-stack, tunneling, or translation techniques to help IPv4 and IPv6 addresses exist on the network simultaneously.

Layer 3 Functions

Routers and Layer 3 switches perform the following functions:

  1. Do not forward broadcasts or multicasts by default.

  2. Make best-path decisions.

  3. Filter packets with access lists.

  4. Remove and add Layer 2 frames.

  5. Quality of service (QoS) rules for traffic types.

Routers decide which interface to forward a packet through by examining the network portion of each IP address.

IOS Terminal Access Methodologies

To gain access to an EXEC session to an IOS for configuration and administration, you can use the following methods:

  • Console: Out-of-band CLI access via a rollover cable connected to the COM port of your terminal PC.

  • Auxiliary: Out-of-band CLI access via rollover cable connected to external modem for remote access.

  • Telnet: In-band CLI access to an active IP address on the device’s vty lines using the Telnet protocol. Requires configuration.

  • SSH: Secure encrypted in-band CLI access to an active IP address using the SSH protocol. Requires configuration.

  • HTTP/HTTPS: In-band GUI access to an active IP address using the HTTP or HTTPS protocol. Requires configuration.

IOS Boot Processes

To solidify the startup process, the following is a recap of the stages of the bootup, any fallback procedures, and the memory locations involved:

  1. POST located in ROM tests the hardware.

  2. Bootstrap located in ROM looks at boot field in configuration register to locate IOS. 0×2100 boots to ROMmon located in ROM.

  3. 0×2101-0×210F prompts the bootstrap to parse startup-config in NVRAM for any boot system commands. If there are any commands, do what they say.

  4. If no boot system commands, load first file in Flash. If no file is in Flash, TFTP boot. If no IOS file found from TFTP, go to ROMmon mode.

  5. After IOS is loaded, check configuration register. If 0x2142, ignore startup-config in NVRAM. If 0x2102, load startup-config in NVRAM. If no startup-config, TFTP autoinstall. If no TFTP autoinstall configuration found, enter Setup Mode.

IOS Navigation

Table FF.16. IOS Navigation Modes

Mode

Prompt

Description

User EXEC

Router>

Basic troubleshooting and verification

Privileged EXEC

Router#

All available commands including delete, clear, erase, configure, copy, and reload

Global Configuration

Router(config)#

Configurations that apply to the entire device

Line Configuration

Router(config-line)#

Configurations that apply to the terminal lines into a device

Interface Configuration

Router(config-if)#

Configurations that apply to interfaces

Subinterface Configuration

Router(config-subif)#

Configurations that apply to logical extensions of the physical interface

Router Configuration

Router(config-router)#

Configurations that apply to routing protocols

Context-Sensitive Help

The question mark shows all the available commands at that particular prompt. To see all the available commands that start with a letter or letter(s), type the letter(s) immediately followed by the question mark. To see the list of commands that follows a keyword, type the keyword followed by the question mark separated by a space. Commands can be abbreviated as long as there are enough characters to recognize what command you are entering.

Terminal Editing Keys

Table FF.17. Cisco IOS Terminal Editing Keystrokes

Keystroke

Function

Ctrl+A

Moves the cursor to the beginning of the command line.

Ctrl+E

Moves the cursor to the end of the command line.

Ctrl+B

Moves the cursor back one character.

Ctrl+F

Moves the cursor forward one character.

Esc+B

Moves cursor back one word.

Esc+F

Moves cursor forward one word.

Syntax Errors

  • Ambiguous command: This error is displayed when you have not typed enough characters for the IOS to distinguish which command you want to use. In other words, several commands start with those same characters, so you must type more letters of the command for the IOS to recognize your particular command.

  • Incomplete command: The IOS has recognized your keyword syntax with this error message; however, you need to add more keywords to tell the IOS what you want to do with this command.

  • Invalid input: Also known as the “fat finger” error, this console error message is displayed when you mistype a command. The IOS displays a caret (^) up to the point where the IOS could understand your command.

Global Configuration Commands

Table FF.18. Global Configuration Commands

Command

Description

config-register register

Alters the configuration register.

boot system location

Specifies location to load IOS.

hostname hostname

Changes the name of the Cisco router or switch.

banner motd char banner char

Creates a message of the day login banner.

ip host name ipaddress

Configures a static mapping of a hostname to an IP address.

ip name-server ip

Specifies a DNS server IP address for dynamic name resolution.

ip domain-lookup

Enables automatic name resolution.

ip domain-name

Assigns a domain name to a Cisco device.

Securing the IOS

First and foremost, ensure that you physically secure access to your Cisco devices to ensure that there are no intentional or unintentional disruptions or access to the device itself.

To secure User EXEC to your console port:

Router(config)#line console 0
Router(config-line)#login
Router(config-line)#password password

To secure User EXEC to your aux port:

Router(config)#line aux 0
Router(config-line)#login
Router(config-line)#password password

To secure User EXEC to all five Telnet lines:

Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password password

To secure access to Privileged EXEC mode:

Router(config)#enable secret password
Router(config)#enable password password

The enable secret global configuration command encrypts the password using a MD5 hash. If the enable secret and the enable password commands are used at the same time, the enable secret password is used.

To encrypt the enable password and the line passwords, use the service password-encryption command.

SSH

To secure terminal access to the Cisco device, use SSH over Telnet. The steps to configure SSH are as follows:

  1. Configure a hostname on the device other than the default hostname.

  2. Configure a domain name for the Cisco device.

  3. Generate an RSA key (at least a 1024-bit key is recommended) with the crypto key generate command.

  4. Create a username/password combination with the username username password password command.

  5. (Optional) Limit the vty lines to allow only SSH with the transport input SSH command.

Interface Configuration Commands

Table FF.19. Interface Configuration Commands

Command

Description

ip address ip subnetmask

Assigns an IP address to an interface.

no shutdown

Administratively enables an interface.

full-duplex

Changes the duplex setting to full duplex.

clock rate speed

Sets the timing speed of the network on a DCE interface in bps.

bandwidth speed

Sets the logical bandwidth setting for routing protocols in Kbps.

ip address dhcp

Dynamically assigns an IP address to an interface from a DHCP server.

Switch Commands

Table FF.20. Switch Configuration Commands

Command

Description

interface range media range

Configures several interfaces with the same parameters.

ip address ipaddress

Assigns an IP address to a VLAN interface.

ip default-gateway ip

Sets the gateway of last resort for a Layer 2 switch.

speed speed

Changes the speed of an autosensing link in Mbps.

duplex duplex

Sets the duplex of a switchport.

The Copy Command

The copy command is used to copy files from one location to another. For example, to save the current configuration, we copy the running-config in RAM to the startup-config in NVRAM using the copy running-config startup-config command.

The copy command is used to copy files between our device and a TFTP server. For instance, copy flash tftp backs up the IOS in flash to a TFTP server. copy flash tftp can be used to upgrade, downgrade, or restore an IOS back onto our device. Before copying to a TFTP server, the following preparation steps are in order:

  1. The TFTP server must have the TFTP service running.

  2. Your device must be cabled correctly. If a switch, plug the TFTP server into the switch with a straight-through Ethernet cable. If going directly between a router and the TFTP server, use a cross-over cable.

  3. You must have IP connectivity to the server.

  4. There must be enough room on the TFTP server and your device’s memory to store these files.

The Show Command

Table F.21. General show Commands

Command

Mode

Output

show running-config

Privileged

Current active configuration in RAM.

show startup-config

Privileged

Configuration stored in NVRAM that will be loaded on reboot.

show interfaces

User and Privileged

Status of the interfaces as well as physical and logical address, encapsulation, bandwidth, reliability, load, MTU, duplex, broadcasts, collisions, and frame errors.

show ip interface brief

User and Privileged

Status of the interfaces and their logical addresses.

show controller

User and Privileged

Microcode of the interface including DCE/DTE cable connection.

show flash

User and Privileged

Filenames and sizes of IOS files stored in Flash memory.

show version

User and Privileged

IOS version, system uptime, amount of RAM, NVRAM, Flash memory, and configuration register.

Interface Status

Table FF.22. Interface Status Values

Layer 1

Layer 2 (Line Protocol)

Possible Symptoms

Up

Up

None. Interface is functional.

Up

Down

Encapsulation mismatch, lack of clocking on serial interfaces.

Down

Down

Cable is disconnected or attached to a shutdown interface on the far-end device.

Administratively Down

Down

Local interface was not enabled with the no shutdown command.

Cisco Discovery Protocol

Proprietary Cisco Layer 2 protocol that uses multicast to gather hardware and protocol information about directly connected devices.

Network layer protocol- and media-independent.

Enabled by default on all Cisco devices, but can be disabled globally:

Router(config)#no cdp run

or can be disabled on interface-by-interface basis:

Router(config-if)#no cdp enable

To learn the remote device’s Layer 3 address and IOS version:

Router>show cdp neighbor detail

or

Router>show cdp entry *

Telnet

Telnet enables a virtual terminal connection to a remote device’s IP address using the Application layer protocol, Telnet (TCP port 23 at Transport layer).

To Telnet from IOS, enter the keyword telnet followed by the IP address or hostname. If you only type an IP address or hostname in User EXEC or Privileged EXEC mode, IOS automatically assumes that you are Telnetting. To Telnet to a Cisco device, the vty passwords must be set, or you receive the “Password required, but none set” error. To access Privileged EXEC mode in a Telnet session, you must have enable password set, or you receive the “% No password set” error.

  1. To suspend the Telnet session, press Ctrl+Shift+6, x.

  2. To see a list of the active sessions in the originating router, use the show sessions command.

  3. To resume a suspended session, press the Enter key from User EXEC or Privileged EXEC mode, or enter resume followed by the session number.

  4. To close a Telnet session from the device we are Telnetted into, enter exit or logout from User EXEC or Privileged EXEC mode.

  5. To close a Telnet session from the originating device, enter disconnect followed by the session number.

  6. To see log messages in your Telnet session, use the Privileged EXEC command terminal monitor in the device that you are Telnetted into.

DHCP

Your Cisco device can act as a DHCP server and respond to DHCP requests on a segment. To configure the Cisco device as a DHCP server, you must first enable the interface that will receive the DHCP requests and assign an IP address to it. After the interface is enabled, you define the DHCP address pool with the ip dhcp pool poolname global configuration command. After you are in dhcp-config mode, you can define the DHCP address scope with network command followed by the IP subnet to be assigned. You can also define additional parameters such as the default gateway, DNS server, domain name, and length of the IP lease. To exclude IP addresses from being assigned (such as if you have statically assigned them to specific devices), use the ip dhcp excluded-address ip-address command to remove the IP(s) from the scope.

To verify the devices that have been assigned IP addresses from the DHCP address scope, use the show dhcp bindings command.

Switches

Switches have the following functions:

  1. Segment LANs into multiple collision domains.

  2. Learn MAC addresses by examining the source MAC address of each frame received and store them in a CAM table.

  3. Base their forwarding decisions based on the destination MAC address of an Ethernet frame.

  4. Flood broadcast, multicast, and unknown unicast frames out all ports except the one it was received.

A switch has three methods of forwarding frames:

  • Store-and-forward: Latency varying transmission method that buffers the entire frame and calculates the CRC before forwarding the frame.

  • Cut-through: Looks only at the destination MAC address in an Ethernet frame and forwards it.

  • Fragment-free: Checks the first 64 bytes for frame fragments (due to collisions) before forwarding the fame.

Duplex Connections

  • Half-duplex interfaces have one-way communications with suboptimal throughput because they operate in a collision domain in which CSMA/CD must be enabled. When connected to a hub, they must run half duplex.

  • Full-duplex interfaces simultaneously send and receive, allowing higher throughput because CSMA/CD is disabled. Connections to other switches or devices can be full-duplex.

Port Security

This configuration limits the number of MAC addresses that can be dynamically learned on a switch port:

Switch(config-if)#switchport mode access
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security violation {protect | restrict | shutdown}

If a violation occurs, the default response of a Catalyst switch is to shut down the port. To have the port increase a violation counter and alert an administrator using SNMP, use the restrict keyword. The protect keyword only allows traffic from the secure port. It also drops packets from other MAC addresses until the number of MAC addresses drops below the maximum.

To secure an interface by statically assigning the permitted MAC address(es) attached to the port, use the switchport port-security mac-address MAC_address command on the interface. Alternatively, you can have the switch learn these addresses up to the maximum by using sticky-learned addresses with the command switchport port-security mac-address sticky.

Routing Characteristics

Packets originating from a nonrouting device destined for another network are sent to their default gateway (Layer 3 device on segment). The router consults its routing table to determine if the destination network can be reached. If not, the ICMP Destination Unreachable message is sent to the source. If so, packet is forwarded out interface associated with the destination network in routing table.

Routing Sources

  • Connected interfaces: As soon as we assign an IP address to a working (up/line protocol up) interface, the router associates the entire subnet of the interface’s IP address in the routing table.

  • Static routes: These are manual entries that an administrator enters into the configuration that describes the destination network and the next hop (router along the destination path).

  • Routing protocols: Protocols exchanged between routing devices to dynamically advertise networks.

When multiple routing sources are advertising the same IP subnet, the router uses the source with the lowest administrative distance.

Table FF.23. Default Administrative Distances

Routed Source

Default Distance

Connected

0

Static route

1

EIGRP (internal)

90

IGRP

100

OSPF

110

ISIS

115

RIPv1 and v2

120

EIGRP (external)

170

Static and Default Routes

Static routes are useful in stub networks in which we want to control the routing behavior by manually configuring destination networks into the routing table.

Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.2.5

A floating static route can be configured when redundant connections exist and you want to use the redundant link if the primary fails. This is configured by adding a higher administrative distance at the end of a static route.

Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.2.9 2

A default route is a gateway of last resort for a router when there isn’t a specific match for an IP destination network in the routing table (such as packets destined for the Internet).

Router(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0

With routing protocols, you can specify a default network, which is a network in the routing table that routing devices consider the gateway of last resort. Using their routing protocols, they determine the best path to the default network.

Router(config)#ip default-network 192.168.1.0

Dynamic Routing Protocols

In complex networks with multiple pathways to destinations, dynamic routing protocols enable routers to advertise their networks to each other and dynamically react to topology changes.

Routing protocols determine the best path based on the lowest metric.

Routing Metrics

Because one of the core responsibilities of routing protocols is to build routing tables to determine optimal routing paths, we need to have some means of measuring which routes are preferred when there are multiple pathways to a destination. Routing protocols use some measure of metrics to identify which routes are optimal to reach a destination network. The lowest cumulative metric to a destination is the preferred path and the one that ultimately enters the routing table. Different routing protocols use one or several of the following metrics to calculate the best path.

Table FF.24. Routing Metrics

Metric

Description

Hop count

The number of routing devices that the packet must travel to reach a destination network

Bandwidth

The cumulative bandwidth of the links to the destination in kilobits per second

Delay

The length of time (measured in microseconds) a packet takes from source to destination

Reliability

The consistency of the links and paths toward the destination based on error rates of the interfaces

Load

The cumulative amount of congestion or saturation of the links toward the destination

MTU

The maximum frame size that is allowed to traverse the links to the destination

Cost

An arbitrary number typically based on the bandwidth of the link

Interior and Exterior Gateway Routing Protocols

  • Interior gateway routing protocols: IG routing protocols advertise networks and metrics within an autonomous system.

  • Exterior gateway routing protocols: EG routing protocols advertise networks in between autonomous systems.

Classful and Classless Routing Updates

  • Classful routing: The routing updates only contain the classful networks without any subnet mask. Summarization is automatically done when a router advertises a network out an interface that is not within the same major subnet. Classful routing protocols must have a FLSM design and do not operate correctly with discontiguous networks.

  • Classless routing: The routing updates can contain subnetted networks since the subnet mask is advertised in the updates. Route summarization can be manually configured at any bit boundary. Classless routing protocols support VLSM designs and discontiguous networks.

Routing Protocol Classes

  • Distance vector: The entire routing table is periodically sent to directly connected neighbors regardless of a topology change. These routing protocols manipulate the routing table updates before sending that information to their neighbors and are slow to converge when a topology change occurs.

  • Link state: All possible link states are stored in an independent topology table in which the best routes are calculated and put into the routing table. The topology table is initially synchronized with discovered neighbors followed by frequent hello messages. These routing protocols are faster to converge than distance vector routing protocols.

  • Hybrid: By using the best characteristics from link-state and routing protocols, these advanced routing protocols efficiently and quickly build their routing information and converge when topology changes occur.

Redistribution

Redistribution is the method of configuring routing protocols to advertise networks from other routing protocols:

  • One-way redistribution: Networks from an edge protocol are injected into a more robust core routing protocol, but not the other way around. This method is the safest way to perform redistribution.

  • Two-way redistribution: Networks from each routing protocol are injected into the other. This is the least preferred method because it is possible that suboptimal routing or routing loops might occur because of the network design or the difference in convergence times when a topology change occurs.

Distance Vector Routing Loop Mitigation

Distance vector routing protocols contain several measures to prevent routing loops:

  • Maximum hop counts: To ensure that routing metrics do not increment until infinity in a routing loop, distance vector routing protocols have a maximum hop count.

Table FF.25. Maximum Hop Counts

Protocol

Distance Vector/Link State/Hybrid

Maximum Hop Count

RIPv1

Distance Vector

15

RIPv2

Distance Vector

15

EIGRP

Hybrid

224

OSPF

Link State

Infinite

  • Split horizon: Subnets learned from neighbor routers should not be sent back out the same interface from which the original update came.

  • Route poisoning with poison reverse: When a route to a subnet fails, the subnet is advertised with an infinite metric. Routers receiving the poisoned route override the split-horizon rule and send a poison reverse back to source.

  • Hold-down timers: The amount of time a router ignores any information about an alternative route with a higher metric to a poisoned subnet.

  • Flash updates/triggered updates: When a route fails, the router immediately shoots out an update as opposed to waiting for a normal update interval.

RIP and RIPv2

Table FF.26. RIP and RIPv2 Comparison

 

RIPv1

RIPv2

Classful/classless

Classful

Both

Algorithm

Bellman-Ford

Bellman-Ford

Metric

Hops

Hops

Maximum hop count

15

15

Infinite metric

16

16

Hello/dead time

30/180

30/180

Updates

Broadcast

Multicast (224.0.0.9)

Update authentication

No

Yes

Load balancing

Equal paths

Equal paths

RIP Configuration

The configuration for RIP is seamless as long as you remember these two simple rules:

  1. Only advertise your directly connected networks.

  2. Only advertise the classful network.

Router(config)#router rip
Router(config-router)#network 192.168.7.0
Router(config-router)#network 172.17.0.0

RIPv2 Configuration

Router(config)#router rip
Router(config-router)#network 192.168.7.0
Router(config-router)#network 172.17.0.0
Router(config-router)#version 2
Router(config-router)#no auto-summary

Verifying and Troubleshooting RIP

Table FF.27. Verifying and Troubleshooting RIP Commands

Command

Output

show ip route

The routing table with RIP entries represented as “R”

show ip protocols

RIP timers, advertised networks

debug ip rip

Real-time display of RIP routing updates being sent and received

Before using any debug commands, verify the processor utilization using the show processes command.

Wireless Networking

Wireless networks have impacted our existing network environments profoundly over the last few years. Because this is the newest topic on the CCENT and CCNA exams, much of what you need to know is the foundations of wireless:

  1. Wireless networks exist by using FCC unmanaged/unregulated radio frequency (RF) signals. This allows corporations to implement wireless technology without FCC approval.

  2. The primary technologies that exist today are 802.11b, 802.11g, and 802.11a. 802.11b/g uses the 2.4GHz frequency range. 802.11a uses the 5GHz frequency range. The 2.4GHz band is much more saturated with consumer electronics (such as cordless phones and microwaves) than the 5GHz band. 802.11n is still in draft status at the time of this writing.

  3. Higher radio frequencies can handle more bandwidth but have less range than the lower radio frequencies.

  4. When implementing wireless technology in a larger building, adjacent wireless access points should use different channels to avoid interfering with each other.

  5. The primary channels used in the U.S. for 802.11b/g are channels 1, 6, and 11. These three channels do not have any overlapping frequencies with each other.

  6. The Wi-Fi Alliance is an organization whose aim is to create a cross-vendor certification of wireless equipment. Purchasing equipment certified by the Wi-Fi Alliance ensures that all the wireless networking gear you use will be compatible with each other.

Wireless Security and Implementation

Because wireless networking has become so prevalent in businesses, it is imperative that every network technician knows the foundations of wireless security. Table FF.28 describes the wireless encryption standards currently available.

Table FF.28. Wireless Encryption Standards

Security Standard

Encryption Strength

Key Distribution

Encryption Cipher

WEP

40-bit

Preshared keys

RC4

WEP2

104-bit

Preshared keys

RC4

WPA

128-bit

Preshared keys or 802.1x; TKIP allows dynamic key rotation

RC4

WPA2 (802.11i)

Varied strength; currently up to 256-bit

Preshared keys or 802.1x

AES

Wireless authentication adds an entirely new layer of security to your wireless network. Rather than simply requiring a preshared key (PSK) to gain access to the WLAN, users must authenticate using one of many EAP methods. Encryption keys are dynamically generated after a successful authentication.

Network authentication for LAN environments is called 802.1x (also known as EAP over LAN [EAPOL]).

When implementing wireless access points, you can use a Basic Service Set (BSS), which is a single access point. Or you can use an Extended Service Set (ESS), which is two or more BSSs that tie users to the same LAN. These typically have overlapping coverage areas.

The farther you move from a wireless access point, the more your speed decreases. 802.11a/b/g have the following steps:

802.11a and 802.11g:

  1. 1: 54Mbps

  2. 2: 48Mbps

  3. 3: 36Mbps

  4. 4: 24Mbps

  5. 5: 18Mbps

  6. 6: 12Mbps

  7. 7: 9Mbps

  8. 8: 6Mbps

802.11b:

  1. 1: 11Mbps

  2. 2: 5.5Mbps

  3. 3: 2Mbps

  4. 4: 1Mbps

Implementing a wireless network should typically be done in four steps:

  1. Ensure hardwired operation.

  2. Install the wireless access point in your tested switchport.

  3. Configure a basic wireless network, and test.

  4. Add wireless security, and test.

Network Address Translation (NAT)

NAT is in use on virtually every Internet-connected router in the world today. This technology acts as a security boundary and Internet address sharing system. The following facts are relevant to NAT.

NAT operates by typically translating private IP addresses to public Internet addresses. The following are the private address ranges as defined by RFC 1918:

  • Class A: 10.X.X.X

  • Class B: 172.16.X.X to 172.31.X.X

  • Class C: 192.168.X.X

The three primary forms of NAT are as follows:

  • Static NAT allows you to manually map one IP address to another in a one-to-one relationship.

  • Dynamic NAT allows you to define a pool of addresses to be translated along with a pool of addresses they will be translated to.

  • NAT overload/PAT allows a single Internet IP address to support many internal clients.

The standards bodies have developed many terms to describe the location of an IP address in the world of NAT:

  • Inside local addresses: Refers to everything inside your network.

  • Inside global addresses: The Internet valid IP address assigned to your router that is directly connected to the Internet.

  • Outside global addresses: A standard Internet IP address accessible from any host connected to the Internet.

  • Outside local addresses: How an Internet host is seen by the internal network as it is translated through the NAT router into your local network.

Wide-Area Networks

Wide-area network (WAN) connections tie together geographically distant locations, enabling them to communicate as if directly connected. The following facts are relevant to WANs.

WAN technologies only encompass the Physical and Data Link layers of the OSI model. The three major categories of WAN technology used to connect networks today are as follows:

  • Leased lines: Provides a dedicated, point-to-point link between two locations.

  • Circuit-switched networks: Establishes a dedicated channel (or circuit) for the duration of the transmission, and then tears down the channel when the transmission is complete.

  • Packet-switched networks: Enables the service provider to create a large pool of bandwidth for its clients who establish connections through the shared bandwidth using virtual circuits.

Cisco routers connect to most WAN connections through their serial ports. The Cisco side of the connection uses either a DB-60 or Smart Serial port. The CSU/DSU that the Cisco router connects to will have one of five standard connectors: V.35, X.21, EIA/TIA-232, EIA/TIA-449, or EIA/TIA-530.

At the Data Link layer, Cisco routers primarily use one of two WAN encapsulations for leased line and circuit switched networks:

  • Point-to-Point Protocol (PPP): The most popular, industry-standard, feature-packed protocol for connecting routers

  • Cisco High-level Data Link Control (HDLC): A Cisco-proprietary, low-overhead protocol that makes your WAN connections very efficient between Cisco devices

HDLC is the default encapsulation on all Cisco serial interfaces. However, PPP is used to gain more features and industry standard capabilities when connecting over the WAN. It is made up of three sublayers:

  • ISO HDLC: Responsible for enabling PPP to be supported by multiple devices.

  • Link Control Protocol (LCP): Feature negotiation layer that performs the following functions:

    • Authentication: Requires a username and password for the connecting device.

    • Callback: Enables a dialup server (or router) running PPP to call back the person who initially dialed into the location using a predefined number.

    • Compression: Makes WAN connections more efficient by minimizing the amount of data sent.

    • Multilink: Bundles multiple WAN connections (or WAN channels in the case of ISDN) into a single, logical connection.

  • Network Control Protocol (NCP): Gives PPP the functionality to enable multiple Network layer protocols to run across a single WAN link at any given time.

When configuring PPP authentication, you can choose between two authentication protocols:

  • Password Authentication Protocol (PAP): Sends username and password once in clear-text format when authenticating.

  • Challenge Handshake Authentication Protocol (CHAP): Sends a username and hashed password when demanded by the CHAP server.

When configuring PPP compression, you can choose between three compression types:

  • Stacker: A flat compression algorithm that is notoriously heavy on CPU resources and has less effect on the router’s memory resources. Useful for WAN links with many traffic patterns.

  • Predictor: A dictionary-based compression algorithm that is notoriously heavy on memory resources and has less effect on the router’s CPU resources. Useful for WAN links with similar traffic patterns.

  • Microsoft Point-to-Point Compression (MPPC): Used for Microsoft Windows dial-up clients wanting to use compression.

To activate PPP encapsulation on an interface, use the following syntax:

Router(config)#interface serial 0
Router(config-if)#encapsulation ppp

When adding CHAP authentication to your configuration, you need to ensure that you create a user account that matches the hostname of the other side of the connection. In addition, the passwords must be the same on both sides. Here is a PPP CHAP authentication configuration between the Kirk and Spock routers:

Kirk(config)#username Spock password cisco
Kirk(config)#interface serial 0
Kirk(config-if)#encapsulation ppp
Kirk(config-if)#ppp authentication chap

Spock(config)#username Kirk password cisco
Spock(config)#interface serial 0
Spock(config-if)#encapsulation ppp
Spock(config-if)#ppp authentication chap

The show interface command is one of the most useful when verifying the PPP configuration. The connection is active when the LCP Open tag is seen, as shown here:

Router#show interface serial 0
Serial0 is up, line protocol is up
  Hardware is PowerQUICC Serial
  Internet address is 10.2.2.2/24
  MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation PPP, loopback not set
  Keepalive set (10 sec)
  LCP Open
  Open: IPCP, CCP, CDPCP

When troubleshooting PPP authentication issues, use the debug ppp authentication command to observe the authentication process as it occurs.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.151.126