Report For Networking...
Report For Networking...
Report For Networking...
Submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Technology
In
Information Technology
Submitted by
RAJAT MIGLANI(0661153107) VIKAS RAVISH (0711153107) PIYUSH AGNIHOTRY(0771153107)
BHARTIYA VIDHYAPEETHS COLLEGE OF ENGINEERING A-4, PASCHIM VIHAR, ROHTAK ROAD, NEW DELHI- 110063 GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY
(2007-2011)
TABLE OF CONTENTS
1. Project Description6 2. Network Diagram..7 3. Hierarchical Network.8 4. Vlan based Approach 14 5. Port Security. 19 6. Redundancy with spanning tree protocol. 20 7. Remote login using Telnet..32 8. Address Allocation using DHCP35 9. Frame relay.41 10. VPN. 51 11. Dynamic routing.....56 12. Tools Description65 13. Verification of the Technologies Used71 14. Conclusion. 90
CERTIFICATE
This is to certify that this Major Project Report entitled Implementation of Distributed Enterprise Branch Network completed by Mr. Rajat Miglani Roll No.07/BV/IT/066, Mr. Vikas Ravish Roll No.07/BV/IT/071, Mr. Piyush Agnihotry Roll No.07/BV/IT/077, Mr .Thakur Amit Chauhan Roll No.07/BV/IT/080, Mr. Udit Chauhan Roll No.07/BV/IT/079 is an authentic work carried out by them at Bharati Vidyapeeths College Of Engineering, New Delhi under our guidance.
The matter embodied in this project work has not been used earlier for the award of any degree or diploma to the best of my knowledge and belief.
DATE:
ACKNOWLEDGEMENT
We wish our deepest gratitude to Prof. Anubhuti Roda our Project Guide for their guidance and support to us throughout the project. We would like to thank their profusely for giving access to all the details required during the course of project formulation and completion. Finally we are grateful to all the staff of the IT Department for their willful cooperation and assistance. Date: Piyush Agnihotry(0771153107)
ABSTRACT
This project on Implementation of Distributed Enterprise Branch Network is a logical network design that aims to have a redundant, robust, reliable, manageable, maintainable, secure, scalable network of an enterprise that is spread globally throughout the world keeping in mind the cost factor that a medium enterprise can spend on the network. This system is based on the simulation of the switched Inter-Branch and WAN between the branches network on the Packet tracer.The network is to be implemented using technologies such as STP(Spanning Tree Protocol), Vlan based approach, Management Vlan, Dynamic Route Sharing using EIGRP,Port security, Hierarchical Network within a branch and for inter-branch communication we have used the technologies such Frame Relay. Frame relay is a cost effective Wan protocol that is implemented on the private infrastructure and VPN is configured on the public infrastructure thats internet.
PROJECT DESCRIPTION
Computer Networks these days is a basic necessity of each of the enterprise network required for a number of purposes such as information exchange, voice communication, video calling and conferencing and also to provide internet access to the clients. As the dependency of the enterprise on the networks increases so is the need for a robust, scalable, manageable, redundant network increases. This is the main focus of the project .The project is logical topology of the distributed Enterprise Branch Network that is implemented on the simulator GNS3 (Graphical Network Simulator) . The network is the hierarchical network that consists of layer 2 switches, layer 3 switches, routers, Frame Relay Switches and ACS (Access Control Server). The nodes are configured for the technologies within a Branch : 1. Hierarchical Network 2. Vlan based approach
3. Inter Vlan communication using trunks 4. Port Security 5. Redundancy with spanning tree protocol 6. Dynamic route sharing by EIGRP. 7. Address allocation using DHCP
8. FRAME - RELAY.
NETWORK DIAGRAM
Hierarchical network design involves dividing the network into discrete layers. Each layer provides specific functions that define its role within the overall network. By separating the various functions that exist on a network, the network design becomes modular, which facilitates scalability and performance. The typical hierarchical design model is broken up in to three layers: access, distribution, and core. An example of a three-layer hierarchical network design is displayed in the figure.
FIG 1
Access Layer
The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points. The main purpose of the access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to communicate on the network.
Distribution Layer
The distribution layer aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. VLANs allow you to segment the traffic on a switch into separate subnetworks. For example, in a university you might separate traffic according to faculty, students, and guests. Distribution layer switches are typically high-performance devices that have high availability and redundancy to ensure reliability.
Core Layer
The core layer of the hierarchical design is the high-speed backbone of the internetwork. The core layer is critical for interconnectivity between distribution layer devices, so it is important for the core to be highly available
10
and redundant. The core area can also connect to Internet resources. The core aggregates the traffic from all the distribution layer devices, so it must be capable of forwarding large amounts of data quickly.
11
core switch fails. The only layer where redundancy is limited is at the access layer. Typically, end node devices, such as PCs, printers, and IP phones, do not have the ability to connect to multiple access layer switches for redundancy. If an access layer switch fails, just the devices connected to that one switch would be affected by the outage. The rest of the network would continue to function unaffected. 3. Performance Communication performance is enhanced by avoiding the transmission of data through low-performing, intermediary switches. Data is sent through aggregated switch port links from the access layer to the distribution layer at near wire speed in most cases. The distribution layer then uses its high performance switching capabilities to forward the traffic up to the core, where it is routed to its final destination. Because the core and distribution layers perform their operations at very high speeds, there is no contention for network bandwidth. As a result, properly designed hierarchical networks can achieve near wire speed between all devices. 4. Security Security is improved and easier to manage. Access layer switches can be configured with various port security options that provide control over which devices are allowed to connect to the network. You also have the flexibility to use more advanced security policies at the distribution layer. You may apply access control policies that define which communication protocols are deployed on your network and where they are permitted to go. For example, if you want to limit the use of HTTP to a specific user community connected at
12
the access layer, you could apply a policy that blocks HTTP traffic at the distribution layer. Restricting traffic based on higher layer protocols, such as IP and HTTP, requires that your switches are able to process policies at that layer. Some access layer switches support Layer 3 functionality, but it is usually the job of the distribution layer switches to process Layer 3 data, because they can process it much more efficiently. 5. Manageability Manageability is relatively simple on a hierarchical network. Each layer of the hierarchical design performs specific functions that are consistent throughout that layer. Therefore, if you need to change the functionality of an access layer switch, you could repeat that change across all access layer switches in the network because they presumably perform the same functions at their layer. Deployment of new switches is also simplified because switch configurations can be copied between devices with very few modifications. Consistency between the switches at each layer allows for rapid recovery and simplified troubleshooting. In some special situations, there could be configuration inconsistencies between devices, so you should ensure that configurations are well documented so that you can compare them before deployment. 6. Maintainability Because hierarchical networks are modular in nature and scale very easily, they are easy to maintain. With other network topology designs, manageability becomes increasingly complicated as the network grows. Also, in some network design models, there is a finite limit to how large the network can grow before it becomes too complicated and expensive to maintain. In the
13
hierarchical design model, switch functions are defined at each layer, making the selection of the correct switch easier. Adding switches to one layer does not necessarily mean there will not be a bottleneck or other limitation at another layer. For a full mesh network topology to achieve maximum performance, all switches need to be high-performance switches, because each switch needs to be capable of performing all the functions on the network. In the hierarchical model, switch functions are different at each layer. You can save money by using less expensive access layer switches at the lowest layer, and spend more on the distribution and core layer switches to achieve high performance on the network.
14
Fig 2.1
15
16
learning development platform for faculty. It is also easier to determine the scope of the effects of upgrading network services.
17
Fig 2.2
Fig 2.3
18
Fig 2.4
19
Fig 2.5
Fig 2.6
20
could collect traffic that contains usernames, passwords, or configuration information about the systems on the network.
All switch ports or interfaces should be secured before the switch is deployed. Port security limits the number of valid MAC addresses allowed on a port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses.
21
traverse the network allows for a single path to be disrupted without impacting the connectivity of devices on the network. In our network the redundancy is implemented at the distribution layer and at the core layer the redundancy is provided by providing redundant links or paths between access and distribution and core layer .
Our network can provide availability in case of 1. Path failure from access to distribution layer as each access layer switch is connected to two distribution layer switches. 2. Distribution layer switches Failure 3. Path failure from distribution to access layer
Redundancy is an important part of the hierarchical design. Although it is important for availability, there are some considerations that need to be addressed before redundancy is even possible on a network
22
When multiple paths exist between two devices on the network and STP has been disabled on those switches, a Layer 2 loop can occur. If STP is enabled on these switches, which is the default, a Layer 2 loop would not occur. Broadcast frames are forwarded out all switch ports, except the originating port. This ensures that all devices in the broadcast domain are able to receive the frame. If there is more than one path for the frame to be forwarded out, it can result in an endless loop. Broadcast Storms
A broadcast storm occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed. Consequently, no bandwidth is available bandwidth for legitimate traffic, and the network becomes unavailable for data communication. A broadcast storm is inevitable on a looped network. As more devices send broadcasts out on the network, more and more traffic gets caught in the loop, eventually creating a broadcast storm that causes the network to fail. There are other consequences for broadcast storms. Because broadcast traffic is forwarded out every port on a switch, all connected devices have to process all broadcast traffic that is being flooded endlessly around the looped network. This can cause the end device to malfunction because of the high processing requirements for sustaining such a high traffic load on the network interface card. Duplicate Unicast Frames
23
Broadcast frames are not the only type of frames that are affected by loops. Unicast frames sent onto a looped network can result in duplicate frames arriving at the destination device.
4.2 STP
1. STP Topology Redundancy increases the availability of the network topology by protecting the network from a single point of failure, such as a failed network cable or switch. When redundancy is introduced into a Layer 2 design, loops and duplicate frames can occur. Loops and duplicate frames can have severe consequences on a network. The Spanning Tree Protocol (STP) was developed to address these issues.
STP ensures that there is only one logical path between all destinations on the network by intentionally blocking redundant paths that could cause a loop. A port is considered blocked when network traffic is prevented from entering or leaving that port. This does not include bridge protocol data unit (BPDU) frames that are used by STP to prevent loops. You will learn more about STP BPDU frames later in the chapter. Blocking the redundant paths is critical to preventing loops on the network. The physical paths still exist to provide redundancy, but these paths are disabled to prevent the loops from occurring. If the path is ever needed to compensate for a network cable or switch failure,
24
STP recalculates the paths and unblocks the necessary ports to allow the redundant path to become active.
2. STP Algorithm STP uses the Spanning Tree Algorithm (STA) to determine which switch ports on a network need to be configured for blocking to prevent loops from occurring. The STA designates a single switch as the root bridge and uses it as the reference point for all path calculations. In the figure the root bridge, switch S1, is chosen through an election process. All switches participating in STP exchange BPDU frames to determine which switch has the lowest bridge ID (BID) on the network. The switch with the lowest BID automatically becomes the root bridge for the STA calculations. The root bridge election process will be discussed in detail later in this chapter. The BPDU is the message frame exchanged by switches for STP. Each BPDU contains a BID that identifies the switch that sent the BPDU. The BID contains a priority value, the MAC address of the sending switch, and an optional extended system ID. The lowest BID value is determined by the combination of these three fields. You will learn more about the root bridge, BPDU, and BID in later topics. After the root bridge has been determined, the STA calculates the shortest path to the root bridge. Each switch uses the STA to determine which ports to block. While the STA determines the best paths to the root bridge for all destinations in the broadcast domain, all traffic is prevented from forwarding
25
through the network. The STA considers both path and port costs when determining which path to leave unblocked. The path costs are calculated using port cost values associated with port speeds for each switch port along a given path. The sum of the port cost values determines the overall path cost to the root bridge. If there is more than one path to choose from, STA chooses the path with the lowest path cost. You will learn more about path and port costs in later topics.
When the STA has determined which paths are to be left available, it configures the switch ports into distinct port roles. The port roles describe their relation in the network to the root bridge and whether they are allowed to forward traffic. Root ports - Switch ports closest to the root bridge. In the example, the root port on switch S2 is F0/1 configured for the trunk link between switch S2 and switch S1. The root port on switch S3 is F0/1, configured for the trunk link between switch S3 and switch S1. Designated ports - All non-root ports that are still permitted to forward traffic on the network. In the example, switch ports F0/1 and F0/2 on switch S1 are designated ports. Switch S2 also has its port F0/2 configured as a designated port. Non-designated ports - All ports configured to be in a blocking state to prevent loops. In the example, the STA configured port F0/2 on
26
switch S3 in the non-designated role. Port F0/2 on switch S3 is in the blocking state. 3. Port Roles The root bridge is elected for the spanning-tree instance. The location of the root bridge in the network topology determines how port roles are calculated. This topic describes how the switch ports are configured for specific roles to prevent the possibility of loops on the network. There are four distinct port roles that switch ports are automatically configured for during the spanning-tree process. Root Port
The root port exists on non-root bridges and is the switch port with the best path to the root bridge. Root ports forward traffic toward the root bridge. The source MAC address of frames received on the root port are capable of populating the MAC table. Only one root port is allowed per bridge. Designated Port
The designated port exists on root and non-root bridges. For root bridges, all switch ports are designated ports. For non-root bridges, a designated port is the switch port that receives and forwards frames toward the root bridge as needed. Only one designated port is allowed per segment. If multiple switches exist on the same segment, an election process determines the designated switch, and the corresponding switch port begins forwarding frames for the segment. Designated ports are capable of populating the MAC table.
27
Non-designated Port
The non-designated port is a switch port that is blocked, so it is not forwarding data frames and not populating the MAC address table with source addresses. A non-designated port is not a root port or a designated port. For some variants of STP, the non-designated port is called an alternate port. Disabled Port
The disabled port is a switch port that is administratively shut down. A disabled port does not function in the spanning-tree process. There are no disabled ports in the example.
4.3
Convergence is an important aspect of the spanning-tree process. Convergence is the time it takes for the network to determine which switch is going to assume the role of the root bridge, go through all the different port states, and set all switch ports to their final spanning-tree port roles where all potential loops are eliminated. The convergence process takes time to complete because of the different timers used to coordinate the process. Step 1. Electing a Root Bridge
The first step of the spanning-tree convergence process is to elect a root bridge. The root bridge is the basis for all spanning-tree path cost calculations and ultimately leads to the assignment of the different port roles used to prevent loops from occurring.
28
A root bridge election is triggered after a switch has finished booting up, or when a path failure has been detected on a network. Initially, all switch ports are configured for the blocking state, which by default lasts 20 seconds. This is done to prevent a loop from occurring before STP has had time to calculate the best root paths and configure all switch ports to their specific roles. While the switch ports are in a blocking state, they are still able to send and receive BPDU frames so that the spanning-tree root election can proceed. Spanning tree supports a maximum network diameter of seven switch hops from end to end. This allows the entire root bridge election process to occur within 14 seconds, which is less than the time the switch ports spend in the blocking state. Immediately after the switches have finished booting up, they start sending BPDU frames advertising their BID in an attempt to become the root bridge. Initially, all switches in the network assume that they are the root bridge for the broadcast domain. The flood of BPDU frames on the network have the root ID field matching the BID field, indicating that each switch considers itself the root bridge. These BPDU frames are sent every 2 seconds based on the default hello timer value.
As each switch receives the BPDU frames from its neighboring switches, they compare the root ID from the received BPDU frame with the root ID configured locally. If the root ID from the received BPDU frame is lower than
29
the root ID it currently has, the root ID field is updated indicating the new best candidate for the root bridge role. After the root ID field is updated on a switch, the switch then incorporates the new root ID in all future BPDU frame transmissions. This ensures that the lowest root ID is always conveyed to all other adjacent switches in the network. The root bridge election ends once the lowest bridge ID populates the root ID field of all switches in the broadcast domain. Step 2. Elect Root Ports
Now that the root bridge has been determined, the switches start configuring the port roles for each of their switch ports. The first port role that needs to be determined is the root port role. Every switch in a spanning-tree topology, except for the root bridge, has a single root port defined. The root port is the switch port with the lowest path cost to the root bridge. Normally path cost alone determines which switch port becomes the root port. However, additional port characteristics determine the root port when two or more ports on the same switch have the same path cost to the root. This can happen when redundant links are used to uplink one switch to another switch when an EtherChannel configuration is not used. Recall that Cisco EtherChannel technology allows you to configure multiple physical Ethernet type links as one logical link.
Switch ports with equivalent path costs to the root use the configurable port priority value. They use the port ID to break a tie. When a switch chooses one
30
equal path cost port as a root port over another, the losing port is configured as the non-designated to avoid a loop. The process of determining which port becomes a root port happens during the root bridge election BPDU exchange. Path costs are updated immediately when BPDU frames arrive indicating a new root ID or redundant path. At the time the path cost is updated, the switch enters decision mode to determine if port configurations need to be updated. The port role decisions do not wait until all switches settle on which switch is going to be the final root bridge. As a result, the port role for a given switch port may change multiple times during convergence, until it finally settles on its final port role after the root ID changes for the last time. Step 3. Electing Designated Ports and Non-Designated Ports
After a switch determines which of its ports is the root port, the remaining ports must be configured as either a designated port (DP) or a non-designated port (non-DP) to finish creating the logical loop-free spanning tree. Each segment in a switched network can have only one designated port. When two non-root port switch ports are connected on the same LAN segment, a competition for port roles occurs. The two switches exchange BPDU frames to sort out which switch port is designated and which one is non-designated.
Generally, when a switch port is configured as a designated port, it is based on the BID. However, keep in mind that the first priority is the lowest path cost to
31
the root bridge and that only if the port costs are equal, is the BID of the sender. When two switches exchange their BPDU frames, they examine the sending BID of the received BPDU frame to see if it is lower than its own. The switch with the lower BID wins the competition and its port is configured in the designated role. The losing switch configures its switch port to be nondesignated and, therefore, in the blocking state to prevent the loop from occurring. The process of determining the port roles happens concurrently with the root bridge election and root port designation. As a result, the designated and nondesignated roles may change multiple times during the convergence process until the final root bridge has been determined. The entire process of electing the root bridge, determining the root ports, and determining the designated and non-designated ports happens within the 20-second blocking port state. This convergence time is based on the 2-second hello timer for BPDU frame transmission and the seven-switch diameter supported by STP. The max age delay of 20 seconds provides enough time for the seven-switch diameter with the 2-second hello timer between BPDU frame transmissions.
32
A switch considers it has detected a topology change either when a port that was forwarding is going down (blocking for instance) or when a port transitions to forwarding and the switch has a designated port. When a change is detected, the switch notifies the root bridge of the spanning tree. The root bridge then broadcasts the information into the whole network. In normal STP operation, a switch keeps receiving configuration BPDU frames from the root bridge on its root port. However, it never sends out a BPDU toward the root bridge. To achieve that, a special BPDU called the topology change notification (TCN) BPDU was introduced. When a switch needs to signal a topology change, it starts to send TCNs on its root port. The TCN is a very simple BPDU that contains no information and is sent out at the hello time interval. The receiving switch is called the designated bridge and it acknowledges the TCN by immediately sending back a normal BPDU with the topology change acknowledgement (TCA) bit set. This exchange continues until the root bridge responds. Broadcast Notification
Once the root bridge is aware that there has been a topology change event in the network, it starts to send out its configuration BPDUs with the topology change (TC) bit set. These BPDUs are relayed by every switch in the network with this bit set. As a result, all switches become aware of the topology change and can reduce their aging time to forward delay. Switches receive topology change BPDUs on both forwarding and blocking ports.
33
The TC bit is set by the root for a period of max age + forward delay seconds, which is 20+15=35 seconds by default.
Fig 4.1
Fig 4.2
34
Each switch in the broadcast domain initially assumes that it is the root bridge for the spanning-tree instance, so the BPDU frames sent contain the BID of the local switch as the root ID. By default, BPDU frames are sent every 2 seconds after a switch is booted; that is, the default value of the hello timer specified in the BPDU frame is 2 seconds. Each switch maintains local information about its own BID, the root ID, and the path cost to the root. When adjacent switches receive a BPDU frame, they compare the root ID from the BPDU frame with the local root ID. If the root ID in the BPDU is lower than the local root ID, the switch updates the local root ID and the ID in its BPDU messages. These messages serve to indicate the new root bridge on the network. Also, the path cost is updated to indicate how far away the root
35
bridge is. For example, if the BPDU was received on a Fast Ethernet switch port, the path cost would be set to 19. If the local root ID is lower than the root ID received in the BPDU frame, the BPDU frame is discarded. After a root ID has been updated to identify a new root bridge, all subsequent BPDU frames sent from that switch contain the new root ID and updated path cost. That way, all other adjacent switches are able to see the lowest root ID identified at all times. As the BPDU frames pass between other adjacent switches, the path cost is continually updated to indicate the total path cost to the root bridge. Each switch in the spanning tree uses its path costs to identify the best possible path to the root bridge. BID Fields
The bridge ID (BID) is used to determine the root bridge on a network. This topic describes what makes up a BID and how to configure the BID on a switch to influence the election process to ensure that specific switches are assigned the role of root bridge on the network.
Fig 4.4
36
Fig 4.5
Fig 4.6
37
38
run from the command prompt. Other common terminal applications that run as Telnet clients are HyperTerminal, Minicom, and TeraTerm. Once a Telnet connection is established, users can perform any authorized function on the server, just as if they were using a command line session on the server itself. If authorized, they can start and stop processes, configure the device, and even shut down the system. Telnet is a client/server protocol and it specifies how a VTY session is established and terminated. It also provides the syntax and order of the commands used to initiate the Telnet session, as well as control commands that can be issued during a session. Each Telnet command consists of at least two bytes. The first byte is a special character called the Interpret as Command (IAC) character. As its name implies, the IAC defines the next byte as a command rather than text. Some sample Telnet protocol commands include: 1. Are You There (AYT) - Lets the user request that something appear on the terminal screen to indicate that the VTY session is active. 2. Erase Line (EL) - Deletes all text from the current line. 3. Interrupt Process (IP) - Suspends, interrupts, aborts, or terminates the process to which the Virtual Terminal is connected. For example, if a user started a program on the Telnet server via the VTY, he or she could send an IP command to stop the program.
39
40
TELNET REQUIREMENTS: 1. Line configuration using: Router(config)#line vty 0 10 Router(config-line)#password cisco Router(config-line)#login 2. Password at the privileged mode: Router(config)#enable password cisco
The telnet is not a very secure protocol used in the project and does not support authentication thus we plan too implement the secure shell protocol in the major project work.
41
42
Recall from CCNA Exploration: Network Fundamentals that DHCP makes the process of assigning new IP addresses almost transparent. DHCP assiPacket tracerIP addresses and other important network configuration information dynamically. Because desktop clients typically make up the bulk of network nodes, DHCP is an extremely useful and timesaving tool for network administrators. RFC 2131 describes DHCP. Administrators typically prefer a network server to offer DHCP services, because these solutions are scalable and relatively easy to manage. However, in a small branch or SOHO location, a Cisco router can be configured to provide DHCP services without the need for an expensive dedicated server. A Cisco IOS feature set called Easy IP offers an optional, full-featured DHCP server.
Fig 6.1
43
Fig 6.2
44
Hardware Type - Identifies the type of hardware used in the network. For example, 1 is Ethernet, 15' is Frame Relay, and 20 is a serial line. These are the same codes used in ARP messages. Hardware Address length - 8 bits to specify the length of the address. Hops - Set to 0 by a client before transmitting a request and used by relay agents to control the forwarding of DHCP messages. Transaction Identifier - 32-bit identification generated by the client to allow it to match up the request with replies received from DHCP servers. Seconds - Number of seconds elapsed since a client began attempting to acquire or renew a lease. Busy DHCP servers use this number to prioritize replies when multiple client requests are outstanding. Flags - Only one of the 16 bits is used, which is the broadcast flag. A client that does not know its IP address when it sends a request, sets the flag to 1. This value tells the DHCP server or relay agent receiving the request that it should send the reply back as a broadcast. Client IP Address - The client puts its own IP address in this field if and only if it has a valid IP address while in the bound state; otherwise, it sets the field to 0. The client can only use this field when its address is actually valid and usable, not during the process of acquiring an address. Your IP Address - IP address that the server assiPacket tracerto the client. Server IP Address - Address of the server that the client should use for the next step in the bootstrap process, which may or may not be the server sending
45
this reply. The sending server always includes its own IP address in a special field called the Server Identifier DHCP option. Gateway IP Address - Routes DHCP messages when DHCP relay agents are involved. The gateway address facilitates communications of DHCP requests and replies between the client and a server that are on different subnets or networks. Client Hardware Address - Specifies the Physical layer of the client. Server Name - The server sending a DHCPOFFER or DHCPACK message may optionally put its name in this field. This can be a simple text nickname or a DNS domain name, such as dhcpserver.netacad.net. Boot Filename - Optionally used by a client to request a particular type of boot file in a DHCPDISCOVER message. Used by a server in a DHCPOFFER to fully specify a boot file directory and filename. Options - Holds DHCP options, including several parameters required for basic DHCP operation. This field is variable in length. Both client and server may use this field.
Fig 6.3
46
Fig 6.4
Fig 6.5
47
48
49
increasing globalization and the growth of one-to-many branch office topologies, Frame Relay offers simpler network architecture and lower cost of ownership.
Frame Relay is a more cost-effective option for two reasons. First, with dedicated lines, customers pay for an end-to-end connection. That includes the local loop and the network link. With Frame Relay, customers only pay for the local loop, and for the bandwidth they purchase from the network provider. Distance between nodes is not important. While in a dedicated-line model, customers use dedicated lines provided in increments of 64 kb/s, Frame Relay customers can define their virtual circuit needs in far greater granularity, often in increments as small as 4 kb/s.
The second reason for Frame Relay's cost effectiveness is that it shares bandwidth across a larger base of customers. Typically, a network provider can service 40 or more 56 kb/s customers over one T1 circuit. Using dedicated lines would require more DSU/CSUs (one for each line) and more
50
complicated routing and switching. Network providers save because there is less equipment to purchase and maintain.
Fig 7.1
A virtual circuit provides considerable flexibility in network design. Looking at the figure, you can see that Span's offices all connect to the Frame Relay cloud over their respective local loops. What happens in the cloud is really of no concern at this time. All that matters is that when any Span office wants to communicate with any other Span office, all it needs to do is connect to a
51
virtual circuit leading to the other office. In Frame Relay, the end of each connection has a number to identify it called a Data Link Connection Identifier (DLCI). Any station can connect with any other simply by stating the address of that station and DLCI number of the line it needs to use. In a later section, you will learn that when Frame Relay is configured, all the data from all the configured DLCIs flows through the same port of the router. Try to picture the same flexibility using dedicated lines. Not only is it complicated, but it also requires considerably more equipment.
In the late 1970s and into the early 1990s, the WAN technology joining the end sites was typically using the X.25 protocol. Now considered a legacy protocol, X.25 was a very popular packet switching technology because it provided a very reliable connection over unreliable cabling infrastructures. It did so by including additional error control and flow control. However, these additional features added overhead to the protocol. Its major application was for processing credit card authorization and for automatic teller machines. This course mentions X.25 only for historical purposes.
When you build a WAN, regardless of the transport you choose, there is always a minimum of three basic components, or groups of components, connecting any two sites. Each site needs its own equipment (DTE) to access
52
the telephone company's CO serving the area (DCE). The third component sits in the middle, joining the two access points. In the figure, this is the portion supplied by the Frame Relay backbone.
Frame Relay has lower overhead than X.25 because it has fewer capabilities. For example, Frame Relay does not provide error correction, modern WAN facilities offer more reliable connection services and a higher degree of reliability than older facilities. The Frame Relay node simply drops packets without notification when it detects errors. Any necessary error correction, such as retransmission of data, is left to the endpoints.
Fig 7.2
53
Frame Relay handles volume and speed efficiently by combining the necessary functions of the data link and network layers into one simple protocol. As a data link protocol, Frame Relay provides access to a network, delimits and delivers frames in proper order, and recognizes transmission errors through a standard Cyclic Redundancy Check. As a network protocol, Frame Relay provides multiple logical connections over a single physical circuit and allows the network to route data over those connections to its intended destinations.
Frame Relay operates between an end-user device, such as a LAN bridge or router, and a network. The network itself can use any transmission method that is compatible with the speed and efficiency that Frame Relay applications require. Some networks use Frame Relay itself, but others use digital circuit switching or ATM cell relay systems. The figure shows a circuit-switching backbone as indicated by the Class 4/5 switches.
Frame Relay takes data packets from a network layer protocol, such as IP or IPX, encapsulates them as the data portion of a Frame Relay frame, and then passes the frame to the physical layer for delivery on the wire. To understand how this works, it is helpful to understand how it relates to the lower levels of the OSI model.
54
The figure shows how Frame Relay encapsulates data for transport and moves it down to the physical layer for delivery.
Fig 7.3
55
Fig 7.4
This first figure, displays how Frame Relay has been configured on the serial interfaces. This involves assigning an IP address, setting the encapsulation type, and allocating bandwidth. The figure shows routers at each end of the Frame Relay link with the configuration scripts for routers R1 and R2.
On a Cisco router, Frame Relay is most commonly supported on synchronous serial interfaces. Use the ip address command to set the IP address of the interface. You can see that R1 has been assigned 10.1.1.1/24, and R2 has been assigned IP address 10.1.1.2/24.
The encapsulation frame-relay interface configuration command enables Frame Relay encapsulation and allows Frame Relay processing on the
56
supported interface. There are two encapsulation options to choose from, and these are described below.
Fig 7.5
Use the bandwidth command to set the bandwidth of the serial interface. Specify bandwidth in kb/s. This command notifies the routing protocol that
57
bandwidth is statically configured on the link. The EIGRP and OSPF routing protocols use the bandwidth value to calculate and determine the metric of the link.
This is an optional step as Cisco routers autosense the LMI type. Recall that Cisco supports three LMI types: Cisco, ANSI Annex D, and Q933-A Annex A and that the default LMI type for Cisco routers is cisco.
2. Encapsulation Options
Recall that the default encapsulation type on a serial interface on a Cisco router is the Cisco proprietary version of HDLC. To change the encapsulation from HDLC to Frame Relay, use the encapsulation frame-relay [cisco | ietf] command. The no form of the encapsulation frame-relay command removes the Frame Relay encapsulation on the interface and returns the interface to the default HDLC encapsulation.
The default Frame Relay encapsulation enabled on supported interfaces is the Cisco encapsulation. Use this option if connecting to another Cisco router. Many non-Cisco devices also support this encapsulation type. It uses a 4-byte
58
header, with 2 bytes to identify the DLCI and 2 bytes to identify the packet type. 3. Frame Relay Sub interfaces
Frame Relay can partition a physical interface into multiple virtual interfaces called sub interfaces. A sub interface is simply a logical interface that is directly associated with a physical interface. Therefore, a Frame Relay sub interface can be configured for each of the PVCs coming into a physical serial interface.
To enable the forwarding of broadcast routing updates in a Frame Relay network, you can configure the router with logically assigned sub interfaces. A partially meshed network can be divided into a number of smaller, fully meshed, point-to-point networks. Each point-to-point sub network can be assigned a unique network address, which allows packets received on a physical interface to be sent out the same physical interface because the packets are forwarded on VCs in different sub interfaces.
Frame Relay sub interfaces can be configured in either point-to-point or multipoint mode:
59
Point-to-point - A single point-to-point sub interface establishes one PVC connection to another physical interface or sub interface on a remote router. In this case, each pair of the point-to-point routers is on its own subnet, and each point-to-point sub interface has a single DLCI. In a point-to-point environment, each sub interface is acting like a point-to-point interface. Typically, there is a separate subnet for each point-to-point VC. Therefore, routing update traffic is not subject to the split horizon rule.
Multipoint - A single multipoint sub interface establishes multiple PVC connections to multiple physical interfaces or sub interfaces on remote routers. All the participating interfaces are in the same subnet. The sub interface acts like an NBMA Frame Relay interface, so routing update traffic is subject to the split horizon rule. Typically, all multipoint VCs belong to the same subnet.7
60
After configuring a Frame Relay PVC and when troubleshooting an issue, verify that Frame Relay is operating correctly on that interface using the show interfaces command. Recall that with Frame Relay, the router is normally considered a DTE device. However, a Cisco router can be configured as a Frame Relay switch. In such cases, the router becomes a DCE device when it is configured as a Frame Relay switch. The show interfaces command displays how the encapsulation is set up, along with useful Layer 1 and Layer 2 status information, including:
LMI type LMI DLCI Frame Relay DTE/DCE type The first step is always to confirm that the interfaces are properly configured. The figure shows a sample output for the show interfaces command. Among other things, you can see details about the encapsulation, the DLCI on the Frame Relay-configured serial interface, and the DLCI used for the LMI. You should confirm that these values are the expected values. If not, you may need to make changes.
61
The next step is to look at some LMI statistics using the show frame-relay lmi command. In the output, look for any non-zero "Invalid" items. This helps isolate the problem to a Frame Relay communications issue between the carrier's switch and your router.
Use the show frame-relay pvc [interface interface] [dlci] command to view PVC and traffic statistics. This command is also useful for viewing the number of BECN and FECN packets received by the router. The PVC status can be active, inactive, or deleted. A final task is to confirm whether the frame-relay inverse-arp command resolved a remote IP address to a local DLCI. Use the show frame-relay map command to display the current map entries and information about the connections.
IN our project the frame relay is implemented on the private infrastructure. For simplicity we have used a single frame relay switch that connects 3 branches of the enterprise. 3 branches routers that are DTEs are connected via
62
frame relay switch. The frame relay is implemented in point to point form with dlci values configured for each of the sub-interface. For DTE router internet:192.168.1.3/29 is used point to point interface with dlci value 203 For DTE router R5:192.168.1.2/29 is used point to point interface with dlci value 202 For DTE router R4:192.1681.1/29 is used as two point to point interfaces with the dlci values 101 and 102.
Organizations use VPNs to provide a virtual WAN infrastructure that connects branch offices, home offices, business partner sites, and remote telecommuters to all or portions of their corporate network. To remain private, the traffic is encrypted. Instead of using a dedicated Layer 2 connection, such as a leased line, a VPN uses virtual connections that are routed through the Internet.
Earlier in this course, an analogy involving getting priority tickets for a stadium show was introduced. An extension to that analogy will help explain how a VPN works. Picture the stadium as a public place in the same way as the Internet is a public place. When the show is over, the public leaves through public aisles and doorways, jostling and bumping into each other along the way. Petty thefts are threats to be endured.
Consider how the performers leave. Their entourage all link arms and form cordons through the mobs and protect the celebrities from all the jostling and pushing. In effect, these cordons form tunnels. The celebrities are whisked through tunnels into limousines that carry them cocooned to their destinations. This section describes how VPNs work in much the same way, bundling data and safely moving it across the Internet through protective tunnels. An understanding of VPN technology is essential to be able to destinations. This section describes how VPNs work in much the same way, bundling data and safely moving it across the Internet through protective tunnels. An
64
understanding of VPN technology is essential to be able to implement secure teleworker services on enterprise networks.
Fig 8.1
Organizations using VPNs benefit from increased flexibility and productivity. Remote sites and teleworkers can connect securely to the corporate network from almost any place. Data on a VPN is encrypted and undecipherable to anyone not entitled to have it. VPNs bring remote hosts inside the firewall, giving them close to the same levels of access to network devices as if they were in a corporate office.
65
The figure shows leased lines in red. The blue lines represent VPN-based connections. Consider these benefits when using VPNs:
Cost savings - Organizations can use cost-effective, third-party Internet transport to connect remote offices and users to the main corporate site. This eliminates expensive dedicated WAN links and modem banks. By using broadband, VPNs reduce connectivity costs while increasing remote connection bandwidth.
Security - Advanced encryption and authentication protocols protect data from unauthorized access.
Scalability - VPNs use the Internet infrastructure within ISPs and carriers, making it easy for organizations to add new users. Organizations, big and small, are able to add large amounts of capacity without adding significant infrastructure.
66
Fig 8.2
Fig 8.3
67
Fig 8.4
68
Fig 8.5
We have used the site-to-site vpn configuration in our project over the public infrastructure that is three routers internet,R4 and R5 are configured for the vpns as described above in the configuration. Note that there are two options for Wan connection in our network that are 1. VPN: Vpn is wan connection over the public infrastructure for that purpose the routers R4,R5 and internet are configured as the Vpn concentrator rather than using a dedicated VPN concentrator thereby realizing cost efficiency.
69
2. FRAME RELAY: Frame Relay Wan Connection is used on the private infrastructure here we have used the two wan connections to provide redundancy on the wan connection
70
topology change. This exchange allows routers to automatically learn about new networks and also to find alternate paths when there is a link failure to a current network. The Purpose of Dynamic Routing Protocols A routing protocol is a set of processes, algorithms, and messages that are used to exchange routing information and populate the routing table with the routing protocol's choice of best paths. The purpose of a routing protocol includes: Discovery of remote networks Maintaining up-to-date routing information Choosing the best path to destination networks Ability to find a new best path if the current path is no longer available
OSPF that is implemented in our project is a link state routing protocol with the following advantages over other protocols: 1. Non-Proprietary : The protocol ospf is not vendor specific and thus can be implemented on any of the router or switch irrespective of the company which manufactured it. 2. Faster Convergence: The performance of this link state routing protocol is much faster than the other protocols thus it can fastly adapt to the changing topology.
71
3. Scalability: The protocol can easily account for the scalability of the network being developed. 4. Event Driven Updates: After the initial flooding of LSPs, link-state routing protocols only send out an LSP when there is a change in the topology. The LSP contains only the information regarding the affected link. Unlike some distance vector routing protocols, link-state routing protocols do not send periodic updates. 5. Hierarchical Design: Link-state routing protocols such as OSPF and IS-IS use the concept of areas. Multiple areas create a hierarchical design to networks, allowing for better route aggregation (summarization) and the isolation of routing issues within an area
Fig 9.1
72
Fig 9.2
73
1. Hello - Hello packets are used to establish and maintain adjacency with other OSPF routers. The hello protocol is discussed in detail in the next topic. 2. DBD - The Database Description (DBD) packet contains an abbreviated list of the sending router's link-state database and is used by receiving routers to check against the local link-state database. 3. LSR - Receiving routers can then request more information about any entry in the DBD by sending a Link-State Request (LSR). 4. LSU - Link-State Update (LSU) packets are used to reply to LSRs as well as to announce new information. LSUs contain seven different types of LinkState Advertisements (LSAs). LSUs and LSAs are briefly discussed in a later topic.
LSAck - When an LSU is received, the router sends a Link-State Acknowledgement (LSAck) to confirm receipt of the LSU.
74
Elect the Designated Router (DR) and Backup Designated Router (BDR) on multiaccess networks like Ethernet and Frame Relay.
Important fields shown in the figure include: Type: OSPF Packet Type: Hello (1), DD (2), LS Request (3), LS Update (4), LS ACK (5) Router ID: ID of the originating router Area ID: area from which the packet originated Network Mask: Subnet mask associated with the sending interface Hello Interval: number of seconds between the sending router's hellos Router Priority: Used in DR/BDR election (discussed later) Designated Router (DR): Router ID of the DR, if any Backup Designated Router (BDR): Router ID of the BDR, if any
75
Fig 9.3
Before two routers can form an OSPF neighbor adjacency, they must agree on three values: Hello interval, Dead interval, and network type. The OSPF Hello
76
interval indicates how often an OSPF router transmits its Hello packets. By default, OSPF Hello packets are sent every 10 seconds on multi-access and point-to-point segments and every 30 seconds on non-broadcast multi-access NBMA) segments (Frame Relay, X.25, ATM). In most cases, OSPF Hello packets are sent as multicast to an address reserved for ALLSPFRouters at 224.0.0.5. Using a multicast address allows a device to ignore the packet if its interface is not enabled to accept OSPF packets. This saves CPU processing time on non-OSPF devices. The Dead interval is the period, expressed in seconds that the router will wait to receive a Hello packet before declaring the neighbor "down." Cisco uses a default of four times the Hello interval. For multi-access and point-to-point segments, this period is 40 seconds. For NBMA networks, the Dead interval is 120 seconds. If the Dead interval expires before the routers receive a Hello packet, OSPF will remove that neighbor from its link-state database. The router floods the link-state information about the "down" neighbor out all OSPF enabled interfaces.
77
adjacencies with those neighbors. This differs from EIGRP. The EIGRP process ID or autonomous system number does need to match for two EIGRP neighbors to become adjacent. R1(config)#router ospf 1 R1(config-router)# ADDING NETWORKS TO OSPF
The network command used with OSPF has the same function as when used with other IGP routing protocols: Any interfaces on a router that match the network address in the network command will be enabled to send and receive OSPF packets. This network (or subnet) will be included in OSPF routing updates. The network command is used in router configuration mode. Router(config-router)#network network-address wildcard-mask area area-id The OSPF network command uses a combination of network-address and wildcard-mask similar to that which can be used by EIGRP. Unlike EIGRP, however, OSPF requires the wildcard mask. The network address along with the wildcard mask is used to specify the interface or range of interfaces that will be enabled for OSPF using this network command. As with EIGRP, the wildcard mask can be configured as the inverse of a subnet mask. For example, R1's FastEthernet 0/0 interface is on the
78
172.16.1.16/28 network. The subnet mask for this interface is /28 or 255.255.255.240. The inverse of the subnet mask results in the wildcard mask.
Note: Like EIGRP, some IOS versions allow you to simply enter the subnet mask instead of the wildcard mask. The IOS then converts the subnet mask to the wildcard mask format. 255.255.255.255 - 255.255.255.240 Subtract the subnet mask -------------------0. 0. 0. 15 Wildcard mask The area area-id refers to the OSPF area. An OSPF area is a group of routers that share link-state information. All OSPF routers in the same area must have the same link-state information in their link-state databases. This is accomplished by routers flooding their individual link-states to all other routers in the area. In this chapter, we will configure all of the OSPF routers within a single area. This is known as single-area OSPF.
An OSPF network can also be configured as multiple areas. There are several advantages to configuring large OSPF networks as multiple areas, including smaller link-state databases and the ability to isolate unstable network problems within an area. Multi-area OSPF is covered in CCNP.
79
When all of the routers are within the same OSPF area, the network commands must be configured with the same area-id on all routers. Although any area-id can be used, it is good practice to use an area-id of 0 with singlearea OSPF. This convention makes it easier if the network is later configured as multiple OSPF areas where area 0 becomes the backbone area.
The OSPF router ID is used to uniquely identify each router in the OSPF routing domain. A router ID is simply an IP address. Cisco routers derive the router ID based on three criteria and with the following precedence: 1. Use the IP address configured with the OSPF router-id command. 2. If the router-id is not configured, the router chooses highest IP address of any of its loopback interfaces. 3. If no loopback interfaces are configured, the router chooses highest active IP address of any of its physical interfaces.
80
The show ip ospf neighbor command can be used to verify and troubleshoot OSPF neighbor relationships. For each neighbor, this command displays the following Output: Neighbor ID - The router ID of the neighboring router. Pri - The OSPF priority of the interface. This is discussed in a later section. State - The OSPF state of the interface. FULL state means that the router and its neighbor have identical OSPF link-state databases. OSPF states are discussed in CCNP. Dead Time - The amount of time remaining that the router will wait to receive an OSPF Hello packet from the neighbor before declaring the neighbor down. This value is reset when the interface receives a Hello packet. Address - The IP address of the neighbor's interface to which this router is directly connected. Interface - The interface on which this router has formed adjacency with the neighbor.
81
Fig 9.4
Fig 9.5
82
Fig 9.6
83
Chapter 10
TOOLS DESCRIPTION
10.1 GNS3 GNS3 is a graphical network simulator that allows simulation of complex networks. To allow complete simulations, GNS3 is strongly linked with :
Dynamips, the core program that allows Cisco IOS emulation. Dynagen, a text-based front-end for Dynamips. Qemu, a generic and open source machine emulator and virtualizer.
GNS3 is an excellent complementary tool to real labs for network engineers, administrators and people wanting to pass certifications such as CCNA, CCNP, CCIP, CCIE, JNCIA, JNCIS, JNCIE. It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check configurations that need to be deployed later on real routers. This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X. Features overview
84
Design of high quality and complex network topologies. Emulation of many Cisco IOS router platforms, IPS, PIX and ASA firewalls, JunOS.
10.2 WIRESHARK PROTOCOL ANALYZER Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues. Wireshark is cross-platform, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets; it runs on various Unix-like operating systems including Linux, Mac OS X, BSD, and Solaris, and on Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License. Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture the packets on the types of networks that pcap supports.
Data can be captured "from the wire" from a live network connection or read from a file that recorded already-captured packets.
85
Live data can be read from a number of types of network, including Ethernet, IEEE 802.11, PPP, and loopback.
Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, TShark.
Captured files can be programmatically edited or converted via command-line switches to the "editcap" program.
Data display can be refined using a display filter. Plug-ins can be created for dissecting new protocols. VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding, the media flow can even be played.
Raw USB traffic can be captured with Wireshark. This feature is currently available only under Linux.
Wireshark's native network trace file format is the libpcap format supported by libpcap and WinPcap, so it can read capture files from applications such as tcpdump and CA NetMaster that use that format, and its captures can be read by applications that use libpcap or WinPcap to read capture files. It can also read captures from other network analyzers, such as snoop, Network General's Sniffer, and Microsoft Network Monitor. 10.3 KIWI SYSLOG SERVER Kiwi Syslog Server is a free syslog server for Windows. It receives logs, displays and forwards syslog messages from hosts such as routers, switches,
86
Unix hosts and other syslog-enabled devices. There are many customizable options available.
PIX firewall logging Linksys home firewall logging SNMP trap and TCP support SNMP MIB parsing Ability to filter - parse - modify messages and take actions via VBScript/JScript engine
GUI-based syslog manager Messages are displayed in real-time as they are received 10 virtual displays for organizing your messages Message logging or forwarding of all messages, or based on priority or time of day
Auto-split the log file by priority or time of day Receives messages via UDP, TCP or SNMP Forwards messages via UDP or TCP Automatic log file archiving based on a custom schedule
87
Messages per hour alarm notification with audible sound or e-mail Log file size alarm notification with audible sound or e-mail Daily e-mailing of syslog traffic statistics Minimizes to the system tray Maintains source address when forwarding messages to other syslog hosts
Syslog statistics with graph of syslog trends (Last 24 hrs/Last 60 mins.) Syslog message buffering ensuring messages are not missed under heavy load
DNS caching of up to 100 entries to ensure fast lookups and minimize DNS lookups
Pre-emptive DNS lookup using up to 10 threads Comes with 5 cool skins to change the look of the program Selectable display font, display color, and background wallpaper Also available as an NT Service RFC3164 send and receive options Context based help Free for use for as long as you want
88
Additional features in the licensed version: In addition to the features available in the freeware version, the registered version offers more flexibility: Additional Auto-split log file options:
Host name Host IP address Domain name WELF format tags in message text
Filter on IP address, hostname, or message text Filter out unwanted host messages or take a different logging action depending on the host name
Additional actions:
Powerful scripting engine for filtering, parsing, custom statistics and performing actions
Log to an ODBC database. (Access/SQL/Oracle/MySQL/Informix etc) Write logs to the Windows NT application Event Log Play the sound file of your choice when the filter conditions are met. Forward the received syslog messages via e-mail.
89
Send a syslog message to another host when the filter conditions are met.
Send an SNMP trap (Version 1 or Version 2) Run an external program of your choice when the filter conditions are met.
Multi-user web access--create up to 5 admin or user accounts Securely transport syslog messages using Transport Layer Security (TLS)
Export web console database files in .csv format Pass values from the received syslog message to an external program, e-mail message or syslog message, such as:
Message text Time of message Date of message Hostname Facility Level Alarm threshold values Current Syslog statistics
90
Additional buffering:
A buffer for 20,000 syslog messages to ensure you don't miss messages under heavy load
A buffer for 1,000 e-mail messages to ensure all e-mail gets through under heavy load or if the mail server is unavailable temporarily
The DNS cache will hold up to 20,000 entries The DNS pre-emptive lookup can spawn up to 200 threads
Play the sound file of your choice when an alarm condition is reached Run an external program when an alarm condition is reached (this could be a pager or SMS program)
Greater flexibility in managing and inspecting log files produced by Kiwi Syslog Server. Particularly in larger networks, the ability to provide timely and relevant status and event information is of great value to the network manager.
10.4 PUTTY
91
PuTTY is a free and open source terminal emulator application which can act as a client for the SSH, Telnet, rlogin, and raw TCP computing protocols and as a serial console client. The name "PuTTY" has no definitive meaning,[1] though 'tty' is the name for a terminal in the Unix tradition, usually held to be short for teletype. PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unixlike platforms, with work-in-progress ports to Classic Mac OS and Mac OS X, and unofficial ports have been contributed to platforms such as Symbian[2][3] and Windows Mobile.. Some features of PuTTY are:
The storing of hosts and preferences for later use. Control over the SSH encryption key and protocol version. Command-line SCP and SFTP clients, called "pscp" and "psftp" respectively.
Control over port forwarding with SSH (local, remote or dynamic port forwarding), including built-in handling of X11 forwarding.
Emulates most xterm, VT102 control sequences, as well as much of ECMA-48 terminal emulation.
92
Fig 10.1
93
from the figure it is clear that the network used is the hierarchical in nature as each of the access layer is connected to the two of distribution layer switches and further up two of the distribution layer switch is connected with the two core layer switches above.
The approach used in this project are vlan based .The vlans are defined vlan10, vlan20, vlan30 ,vlan99. The vlans are defined at the access layer switches asw1,asw2,asw3 and at distribution layer switches dsw1,dsw2. The links between the access layer and distribution layer are configured as the trunks to facilitate intervlan routing. The link between the distribution layer switches is also configured as the trunk . The vlan 10, 20, 30 are defined for the clients and the vlan 99 defined only for the administrator. OUTPUT FOR asw1:
94
Fig 10.2
Fig 10.4
96
Fig 10.5
97
Fig 10.6 We see here in the above demo client one belongs to the vlan 10 pings vlan20 client and is able to do so thus it shows inter vlan routing.
11.2
REDUNDANCY DEMO: In the demo we show that ping to the internet fails if the dsw1 fails. But after 50 seconds the stp converges topology and ping again starts going taking a new path from the dsw2.
98
Fig 10.8
99
Fig 10.9
100
Fig 10.10
101
Fig 10.11
102
Fig 10.12
Fig 10.13
103
Fig 10.14
104
CLIENT
Fig 10.15
Fig 10.16
105
Here in this output of putty client we have logged on to the router R6 named internet in the network sitting on the host administrator with username and password asshown in the figure.
Fig 10.17
106
Fig 10.18
Fig 10.19
107
Fig 10.20 Here we note that following the tcp stream in the case of telnet we can easily identify the username and password.
CAPTURE USING SSH Here we notice that using ssh as the protocol for remote login the messages are encrypted using rsa algorithm therefore the password cannot be broken.
108
Fig 10.21
Fig 10.22
109
Fig 10.23
110
Fig 10.25
111
Fig 10.26
112
CONCLUSION
From the verification of the technologies described above it is clear that all the above said technologies have been implemented in the network logical design and are functional which has helped us to each our objective of making a
113
FUTURE SCOPE
The project so far is a logical implementation of distributed enterprise branch network which includes the technologies and features as described above therefore we look forward to the implementation of the project on the live scenario physical topology and we also look forward to develop a network base lining tool and integrate it to the network. In live scenario the project aims to provide all the features as described keeping in mind all the parameters that affect the network.
114
REFERENCES
Todd lammle book a wiley publication . Cisco press (icnd1 & icnd2). A Systematic Approach for Evolving VLAN DesiPacket tracerby Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao.
CCNA exploration v4 and CCNA discovery v4 Cisco ios commands guide. Route official certification guide Switch official certification guide Route and Switch CCNP self study guide CBTNuggets by jermy for CCNA Implementing Cisco Switched Networks, Volume 2 www.cisco.com/.../networking_solutions_products (21/3/2011) Security Features in Ethernet Switches for Access
115
REASEARCH PAPER: Applying frame relay interface in private networks by James P.Cavanagh
APPENDIX
asw1#sh run Building configuration... Current configuration : 1440 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname asw1 !
116
boot-start-marker boot-end-marker ! enable password 7 01100F175804 ! no aaa new-model memory-size iomem 5 ip cef ! ! ! ! ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! interface FastEthernet0/0 no ip address
117
shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface FastEthernet1/0 ! interface FastEthernet1/1 switchport mode trunk ! interface FastEthernet1/2 switchport mode trunk ! interface FastEthernet1/3
118
switchport access vlan 10 ! interface FastEthernet1/4 ! interface FastEthernet1/5 ! interface FastEthernet1/6 ! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 ! interface FastEthernet1/11 ! interface FastEthernet1/12
119
! interface FastEthernet1/13 ! interface FastEthernet1/14 ! interface FastEthernet1/15 ! interface Vlan1 no ip address ! interface Vlan99 ip address 192.168.99.6 255.255.255.0 ! ip forward-protocol nd ! ! ip http server ! !
120
mgcp behavior g729-variants static-pt ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4 password 7 13061E010803 login line vty 5 10 password 7 045802150C2E
ASW2
! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname asw2 ! boot-start-marker boot-end-marker ! enable password 7 045802150C2E ! no aaa new-model memory-size iomem 5 ip cef ! ! !
122
! ip auth-proxy max-nodata-conns 3 --More-*Mar 1 00:43:28.455: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet1/2 (not half duplex), with Router FastEthernet0/0 (halip admission max-nodata-conns 3 ! ! ! ! ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address
123
shutdown duplex auto speed auto ! interface FastEthernet1/0 ! interface FastEthernet1/1 ! interface FastEthernet1/2 switchport access vlan 20 ! interface FastEthernet1/3 switchport mode trunk ! interface FastEthernet1/4 switchport mode trunk ! interface FastEthernet1/5 !
124
interface FastEthernet1/6 ! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 ! interface FastEthernet1/11 ! interface FastEthernet1/12 ! interface FastEthernet1/13 ! interface FastEthernet1/14 ! interface FastEthernet1/15
125
! interface Vlan1 no ip address ! interface Vlan99 ip address 192.168.99.7 255.255.255.0 ! ip forward-protocol nd ! ! ip http server ! ! mgcp behavior g729-variants static-pt ! ! ! gatekeeper shutdown
126
! ! line con 0 line aux 0 line vty 0 4 password 7 060506324F41 login line vty 5 10 password 7 070C285F4D06 login ! ! End ASW3
version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname asw3 ! boot-start-marker boot-end-marker ! enable password 7 045802150C2E ! no aaa new-model memory-size iomem 5 ip cef ! ! ! !
128
ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface FastEthernet1/0
129
! interface FastEthernet1/1 switchport access vlan 99 ! interface FastEthernet1/2 switchport access vlan 30 ! interface FastEthernet1/3 ! interface FastEthernet1/4 ! interface FastEthernet1/5 switchport mode trunk ! interface FastEthernet1/6 switchport mode trunk ! interface FastEthernet1/7 !
130
interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 ! interface FastEthernet1/11 ! interface FastEthernet1/12 ! interface FastEthernet1/13 ! interface FastEthernet1/14 ! interface FastEthernet1/15 ! interface Vlan1 no ip address !
131
interface Vlan99 ip address 192.168.99.8 255.255.255.0 ! ip forward-protocol nd ! ! ip http server ! ! mgcp behavior g729-variants static-pt ! ! ! gatekeeper shutdown ! ! line con 0 line aux 0
132
line vty 0 4 password 7 13061E010803 login line vty 5 10 password 7 045802150C2E login
DHCP SERVER
Current configuration : 1649 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption !
133
hostname Router ! boot-start-marker boot-end-marker ! ! no aaa new-model memory-size iomem 5 ip cef ! ! no ip dhcp use vrf connected ip dhcp excluded-address 192.168.10.0 192.168.10.20 ip dhcp excluded-address 192.168.20.0 192.168.20.20 ip dhcp excluded-address 192.168.30.0 192.168.30.30 ! ip dhcp pool vlan_10 network 192.168.10.0 255.255.255.0 !
134
ip dhcp pool vlan_20 network 192.168.20.0 255.255.255.0 ! ip dhcp pool vlan_30 network 192.168.30.0 255.255.255.0 ! ! ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto !
135
interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface FastEthernet1/0 ! interface FastEthernet1/1 ! interface FastEthernet1/2 ! interface FastEthernet1/3 ! interface FastEthernet1/4 ! interface FastEthernet1/5 ! interface FastEthernet1/6
136
! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 ! interface FastEthernet1/11 ! interface FastEthernet1/12 ! interface FastEthernet1/13 switchport mode trunk ! interface FastEthernet1/14 switchport mode trunk !
137
interface FastEthernet1/15 switchport mode trunk ! interface Vlan1 no ip address ! ip forward-protocol nd ! ! ip http server ! ! ! mgcp behavior g729-variants static-pt ! ! ! ! gatekeeper
138
DSW1
Connected to Dynamips VM "dsw1" (ID 12, type c3725) - Console port DSW1>en Password: DSW1#sh run Building configuration...
! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname DSW1 ! boot-start-marker boot-end-marker ! enable password cisco ! no aaa new-model memory-size iomem 5 ip cef ! ! !
140
! ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface FastEthernet1/0
141
! interface FastEthernet1/1 switchport mode trunk ! interface FastEthernet1/2 no switchport ip address 172.16.2.1 255.255.255.252 ! interface FastEthernet1/3 switchport mode trunk ! interface FastEthernet1/4 no switchport ip address 172.16.3.1 255.255.255.252 ! interface FastEthernet1/5 switchport mode trunk ! interface FastEthernet1/6
142
! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 no switchport ip address 172.16.10.1 255.255.255.252 ! interface FastEthernet1/11 ! interface FastEthernet1/12 ! interface FastEthernet1/13 ! interface FastEthernet1/14 !
143
interface FastEthernet1/15 ! interface Vlan1 no ip address ! interface Vlan10 ip address 192.168.10.2 255.255.255.0 standby 10 ip 192.168.10.1 standby 10 priority 110 ! interface Vlan20 ip address 192.168.20.2 255.255.255.0 standby 20 ip 192.168.20.1 standby 20 priority 110 standby 20 preempt ! interface Vlan30 ip address 192.168.30.2 255.255.255.0 standby 30 ip 192.168.30.1
144
! interface Vlan99 ip address 192.168.99.2 255.255.255.0 standby 99 ip 192.168.99.1 ! router ospf 1 log-adjacency-changes network 172.16.0.0 0.0.255.255 area 0 network 192.168.0.0 0.0.255.255 area 0 ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 172.16.2.2 ! ! ip http server no ip http secure-server ! mac-address-table static 0000.0c07.ac0a interface FastEthernet1/1 vlan 10 mgcp behavior g729-variants static-pt
145
! ! ! ! ! ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4 password cisco login line vty 5 10 password cisco login !
146
! End
DSW2
Current configuration : 2089 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname DSW2 ! boot-start-marker boot-end-marker !
147
enable password 7 0822455D0A16 ! no aaa new-model memory-size iomem 5 ip cef ! ! ! ! ip auth-proxy max-nodata-conns 3 --More-*Mar 1 00:53:48.815: %HSRP-5-STATECHANGE: Vlan10 Grp 10 state Activip admission max-nodata-conns 3 ! ! ! ! interface FastEthernet0/0 no ip address
148
shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface FastEthernet1/0 ! interface FastEthernet1/1 ! interface FastEthernet1/2 switchport mode trunk ! interface FastEthernet1/3 no switchport
149
ip address 172.16.4.1 255.255.255.252 ! interface FastEthernet1/4 switchport mode trunk ! interface FastEthernet1/5 no switchport ip address 172.16.5.1 255.255.255.252 ! interface FastEthernet1/6 switchport mode trunk ! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10
150
no switchport ip address 172.16.10.2 255.255.255.252 ! interface FastEthernet1/11 ! interface FastEthernet1/12 ! interface FastEthernet1/13 ! interface FastEthernet1/14 ! interface FastEthernet1/15 ! interface Vlan1 no ip address ! interface Vlan10 ip address 192.168.10.3 255.255.255.0 standby 10 ip 192.168.10.1
151
! interface Vlan20 ip address 192.168.20.3 255.255.255.0 standby 20 ip 192.168.20.1 ! interface Vlan30 ip address 192.168.30.3 255.255.255.0 standby 30 ip 192.168.30.1 standby 30 priority 110 ! interface Vlan99 ip address 192.168.99.3 255.255.255.0 standby 99 ip 192.168.99.1 standby 99 priority 110 ! router ospf 1 log-adjacency-changes network 172.16.0.0 0.0.255.255 area 0 network 192.168.0.0 0.0.255.255 area 0
152
! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 172.16.5.2 ! ! ip http server ! ! mgcp behavior g729-variants static-pt ! ! ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4
153
CSW1
version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname CSW1 ! boot-start-marker boot-end-marker ! enable password 7 060506324F41 ! no aaa new-model memory-size iomem 5 ip cef ! ! ! !
155
ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! ! ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto !
156
interface FastEthernet1/0 ! interface FastEthernet1/1 no switchport ip address 172.16.12.2 255.255.255.252 ! interface FastEthernet1/2 no switchport ip address 172.16.2.2 255.255.255.252 ! interface FastEthernet1/3 no switchport ip address 172.16.4.2 255.255.255.252 ! interface FastEthernet1/4 ! interface FastEthernet1/5 ! interface FastEthernet1/6
157
! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 no switchport ip address 172.16.1.1 255.255.255.252 ! interface FastEthernet1/11 ! interface FastEthernet1/12 ! interface FastEthernet1/13 ! interface FastEthernet1/14 !
158
interface FastEthernet1/15 ! interface Vlan1 no ip address ! interface Vlan99 ip address 192.168.99.9 255.255.255.0 standby ip 192.168.99.11 standby priority 110 standby preempt ! interface Vlan100 ip address 192.168.100.2 255.255.255.0 standby 100 ip 192.168.100.1 standby 100 priority 110 ! router ospf 1 log-adjacency-changes network 172.16.1.1 0.0.0.0 area 0
159
network 172.16.2.2 0.0.0.0 area 0 network 172.16.4.2 0.0.0.0 area 0 network 172.16.0.0 0.0.255.255 area 0 network 192.168.0.0 0.0.255.255 area 0 ! ip forward-protocol nd ! ! ip http server
160
! ! line con 0 line aux 0 line vty 0 4 password 7 110A1016141D login line vty 5 10
CSW2
161
Current configuration : 1836 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname CSW2 ! boot-start-marker boot-end-marker ! enable password 7 01100F175804 ! no aaa new-model memory-size iomem 5
162
ip cef ! ! ! ! ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address
163
shutdown duplex auto speed auto ! interface FastEthernet1/0 ! interface FastEthernet1/1 no switchport ip address 172.16.13.2 255.255.255.252 ! interface FastEthernet1/2 ! interface FastEthernet1/3 ! interface FastEthernet1/4 no switchport ip address 172.16.3.2 255.255.255.252 ! interface FastEthernet1/5
164
no switchport ip address 172.16.5.2 255.255.255.252 ! interface FastEthernet1/6 ! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet1/9 ! interface FastEthernet1/10 no switchport ip address 172.16.1.2 255.255.255.252 ! interface FastEthernet1/11 ! interface FastEthernet1/12 !
165
interface FastEthernet1/13 ! interface FastEthernet1/14 ! interface FastEthernet1/15 ! interface Vlan1 no ip address ! interface Vlan99 ip address 192.168.99.10 255.255.255.0 standby ip 192.168.99.11 standby preempt ! interface Vlan100 ip address 192.168.100.3 255.255.255.0 standby 100 ip 192.168.100.1 ! router ospf 1
166
log-adjacency-changes network 172.16.0.0 0.0.255.255 area 0 network 192.168.0.0 0.0.255.255 area 0 ! ip forward-protocol nd ! ! ip http server ! ! mgcp behavior g729-variants static-pt ! ! ! gatekeeper shutdown ! ! line con 0
167
line aux 0 line vty 0 4 password 7 030752180500 login line vty 5 10 password 7 00071A150754 login ! ! End Routers: R1
Current configuration : 1156 bytes ! version 12.4 service timestamps debug datetime msec
168
service timestamps log datetime msec service password-encryption ! hostname R2 ! boot-start-marker boot-end-marker ! enable password 7 0822455D0A16 ! no aaa new-model memory-size iomem 5 ip cef ! ! ! ! ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3
169
! ! ! ! interface FastEthernet0/0 ip address 172.16.12.1 255.255.255.252 duplex auto speed auto ! interface Serial0/0 ip address 200.0.0.1 255.255.255.0 clock rate 64000 ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto !
170
interface Serial0/1 no ip address shutdown clock rate 2000000 ! router ospf 1 log-adjacency-changes redistribute static subnets network 172.16.0.0 0.0.255.255 area 0 network 200.0.0.0 0.0.0.255 area 0 ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 200.0.0.2 ! ! ip http server ! ! mgcp behavior g729-variants static-pt
171
! ! ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4 password 7 110A1016141D login line vty 5 10 password 7 104D000A0618 login ! ! End
172
R2
Current configuration : 1156 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname R2 ! boot-start-marker boot-end-marker ! enable password 7 0822455D0A16 !
173
no aaa new-model memory-size iomem 5 ip cef ! ! ! ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! ! interface FastEthernet0/0 ip address 172.16.12.1 255.255.255.252 duplex auto speed auto ! interface Serial0/0 ip address 200.0.0.1 255.255.255.0
174
clock rate 64000 ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface Serial0/1 no ip address shutdown clock rate 2000000 ! router ospf 1 log-adjacency-changes redistribute static subnets network 172.16.0.0 0.0.255.255 area 0 network 200.0.0.0 0.0.0.255 area 0 !
175
ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 200.0.0.2 ! ! ip http server ! ! ! mgcp behavior g729-variants static-pt ! ! ! ! ! gatekeeper shutdown ! ! line con 0
176
line aux 0 line vty 0 4 password 7 110A1016141D login line vty 5 10 password 7 104D000A0618 login ! ! End
R6:
R6#sh run Building configuration...
177
service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R6 ! boot-start-marker boot-end-marker ! enable secret 5 $1$K0ps$oLt5ERDTCOAurri7X6zPi0 ! no aaa new-model memory-size iomem 5 ip cef ! ! ! ip domain name majorproject.com ip auth-proxy max-nodata-conns 3
178
ip admission max-nodata-conns 3 ! ! ! ! ! ! ! ! username rajat password 0 cisco ! ! ip ssh version 1 ! ! ! interface FastEthernet0/0 no ip address shutdown
179
duplex auto speed auto ! interface Serial0/0 ip address 200.0.0.2 255.255.255.0 clock rate 2000000 ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface Serial0/1 ip address 200.0.1.2 255.255.255.0 clock rate 2000000 ! interface Serial0/2 ip address 192.168.1.3 255.255.255.0
180
encapsulation frame-relay ip ospf priority 0 clock rate 2000000 frame-relay map ip 192.168.1.1 203 broadcast frame-relay map ip 192.168.1.2 203 broadcast frame-relay lmi-type ansi ! interface Serial0/3 no ip address shutdown clock rate 2000000 ! interface Serial0/4 no ip address shutdown clock rate 2000000 ! interface Serial0/5 no ip address
181
shutdown clock rate 2000000 ! router ospf 1 router-id 3.3.3.3 log-adjacency-changes network 192.168.1.2 0.0.0.0 area 0 network 192.168.1.3 0.0.0.0 area 0 network 200.0.0.2 0.0.0.0 area 0 network 200.0.1.2 0.0.0.0 area 0 ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 200.0.0.1 ! ! ip http server ! ! !
182
mgcp behavior g729-variants static-pt ! ! ! ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4 login local transport input telnet ssh ! ! end
R5
183
Current configuration : 1327 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R5 ! boot-start-marker boot-end-marker ! enable secret 5 $1$8Q0Z$jK2Cs8VwNVU3W1D9D0vRG1 ! no aaa new-model memory-size iomem 5
184
ip cef ! ! ! ! ip domain name majorproject.com ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! ! ! ! username rajat password 0 cisco ! ! ip ssh version 1 !
185
! ! interface Loopback0 no ip address ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface Serial0/0 ip address 192.168.1.2 255.255.255.0 encapsulation frame-relay ip ospf priority 0 clock rate 2000000 frame-relay map ip 192.168.1.1 202 broadcast frame-relay map ip 192.168.1.3 202 broadcast frame-relay lmi-type ansi
186
! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface Serial0/1 no ip address shutdown clock rate 2000000 ! router ospf 1 router-id 2.2.2.2 log-adjacency-changes network 192.168.1.2 0.0.0.0 area 0 ! ip forward-protocol nd !
187
! ip http server ! ! ! mgcp behavior g729-variants static-pt ! ! ! ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4 login local transport input telnet ssh
188
! ! End R4
Current configuration : 1336 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R4 ! boot-start-marker boot-end-marker
189
! enable secret 5 $1$vQ.s$DotkF0w7kI1ox49g4L.GH. ! no aaa new-model memory-size iomem 5 ip cef ! ! ! ip domain name majorproject.com ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! ! ! username rajat password 0 cisco ! ! ip ssh version 1
190
! ! ! ! interface FastEthernet0/0 ip address 10.10.10.2 255.255.255.0 shutdown duplex auto speed auto ! interface Serial0/0 ip address 192.168.1.1 255.255.255.0 encapsulation frame-relay clock rate 2000000 frame-relay map ip 192.168.1.2 101 broadcast frame-relay map ip 192.168.1.3 102 broadcast frame-relay lmi-type ansi ! interface FastEthernet0/1
191
no ip address shutdown duplex auto speed auto ! interface Serial0/1 no ip address shutdown clock rate 2000000 ! router ospf 1 router-id 1.1.1.1 log-adjacency-changes network 192.168.1.1 0.0.0.0 area 0 neighbor 192.168.1.2 neighbor 192.168.1.3 ! ip forward-protocol nd !
192
! ip http server ! ! mgcp behavior g729-variants static-pt ! ! ! ! ! gatekeeper shutdown ! ! line con 0 line aux 0 line vty 0 4 login local transport input telnet ssh
193
! ! end
194