1.1 Cisco CCNA 200-301 Training Book
1.1 Cisco CCNA 200-301 Training Book
Network Training
Yavuz BULUT
Network Consultant and Instructor
I Introduction
Introduction
I Educational content
I Cisco Certifications
I Welcome to CCNA Training
In this training, I will tell you about the basics of wired and wireless
networks, how Cisco Routers and Switches are configured, how to design a
wired and wireless network, and how to secure the networks we set up.
Cisco is one of the leading companies in the world in the field of networking.
There are not only network products, but all end-to-end IT products. By
obtaining this certificate, you can easily find a job in the IT sector. When
you look at job postings, Cisco Certificates are required even if there are no
Because in this training, you will learn not only Cisco products but also
Cisco.
I About the Instructor
By establishing Ses Telekom company in Malatya in 2001, I Between 2013 and 2016, I worked as a project manager in a company that
continued sales and installation activities of telephone exchanges in is a Cisco Gold Partner in Istanbul. After 2016, I started to give
Malatya until 2009 and in Istanbul from 2009 to 2011. networking lessons and share free training videos on Youtube. In 2017, I
Chapter-12 IP Services
Device Management Protocols, NAT, QoS and Various IP Services
Network Communication
This first Chapter will help you understand how networks are There have been rapid developments in our networks in order to meet
interconnected and how networks are connected to each other using Cisco many more demands such as video sharing and movie watching
routers and switches. When we connect two or more LANs or WANs platforms. Considering that nowadays people who need to share network
together through a router and create a logical network addressing plan resources are not in the same office environment (an increasing
with a protocol such as IP, we create a network community. situation), what needs to be done is to connect many networks together
Fundamentals of Network Communication so that all users can use these network resources.
In some cases we may have to split a large network into several smaller
Networking operations have been growing very rapidly for the last 30-35
ones to reduce user response time. Because as the network grows, it will
years. Although these started with basic indispensable user needs such as
data and printer sharing, they are now also used as video conferencing. get heavier. With all this growth, congestion on the LAN will rise to very
high levels. The solution to this is to divide really large networks into
smaller networks, called network segmentation. We can do this using
devices such as routers and switches.
The main causes of traffic congestion in the LAN are; The four router functions in your network are as follows:
• Adding a hub to connect to the network Layer 2 switches perform packet switching using frame packets.
• Heavy ARP traffic Routers, unlike Layer 2 switches, provide packet switching using
logical addressing in Layer 3. Routers can also provide packet
Today, routers are used to interconnect networks and forward data
filtering using access lists. Routers use logical addressing (IPv4 or
packets from one network to another.
IPv6) when they connect two or more networks. We call this formation
There are two advantages to using a router in our network:
a community of networks. Finally, routers use a routing table (a map
• By default, they cannot forward broadcasts. of the ensemble of networks) for route selection and routing packets to
• They can filter packets with Layer 3 information such as IP remote networks.
address.
I Network Communication
I History to TCP/IP
I TCP/IP Layers
I Data Encapsulation
History to TCP/IP The OSI model is a primary architectural model for networks. OSI
Today, TCP/IP Networking model is used in networks. But there weren't describes how to transfer data and network information from an
many network protocols before, including TCP/IP. Manufacturers application on one computer to an application on another computer,
created their own network protocols, and these protocols only supported across the network environment.
computers they produced.
For example, IBM, the computer company that had the largest market
share in the 1970s and 1980s, released its System Network Architecture
(SNA) network model in 1974. Other vendors have also created their own
custom network models. If your company purchased computers from
three suppliers, communication was achieved by creating three different
networks and then connecting those networks together.
I Introduction to TCP/IP
these protocols. (You can find these RFCs using any online search engine.) three layers (Application, Presentation, and Session) describe.
Another institution is the IEEE, the Institute of Electrical and Electronic Process/ Application Layer: defines node-to-node application
communication and also controls user-interface arrangements.
Engineers (IEEE), which also sets the Ethernet standards. RFC specifies
Host-to-host Layer: Parallels the functions of OSI's Transport layer, it
protocols. IEEE, on the other hand, sets the ethernet standards.
deals with issues such as establishing secure end-to-end communication
and error-free transmission of data.
TCP/IP and DoD Model Internet Layer: It corresponds to the Network layer of OSI. It defines
The DoD model is basically a condensed version protocols for the logical transmission of packets across the entire network,
deals with IP addressing of user machines, and functions such as routing
of the OSI model.
packets across multiple networks.
It consists of four layers instead of seven:
Network Access Layer: monitors the information circulating between the
• Process/Application layer
user machine and the network. It corresponds to the Data Link layer and
• Host-to-Host layer
the Physical layer in the OSI model. The Network Access layer controls
• Internet layer
hardware addressing and defines protocols for physical transmission of
• Network Access layer
DoD model and OSI reference model
data.
shows a comparison.
I Introduction to TCP/IP
can remove all network card components from the system, but you can Applications use Hypertext Transfer Protocol (HTTP) to request a web
still use a web browser to browse the local HTML pages. But if you try to page and retrieve the web page's content.
To help you understand how TCP works, we can provide an example of a Using UDP is similar to sending a postcard. You don't need to first
telephone conversation. We know that before we can talk to someone on contact the other party to do this. You simply write your message,
the phone, we must first establish a connection with the person in front of specify the address for the postcard, and mail it. This is similar to the
us. This is similar to a virtual circuit set up with the TCP protocol. If connectionless orientation of UDP. Since the message on the postcard is
you're giving someone important information during your interview, not a matter of life and death, you do not need confirmation from the
say, "You know what? he might say, or “You got that, right?” we may sender. Therefore, UDP does not require acknowledgment.
In the Data Link layer, users use Mac addresses to send packets to other
devices on the local network and transfer packets between routers. Example of sending an Ethernet frame to the IP packet by adding an Ethernet frame in Layer 2
TCP/IP Physical Layer (1) Step 2: Larry physically transmits these Ethernet frame bits using
Finally, when we come to the bottom layer, the Physical layer has two
electricity flowing over Ethernet cables.
tasks: It sends and receives bits. Bits come and go in values of 1 and 0,
Step 3: R1 physically receives the electrical signal over a wire and
with just a numeric Morse code.
interprets the meaning of the electrical signals, recreating the same
Step 1: Larry creates an Ethernet frame by encapsulating the IP packet
bits.
between an Ethernet header and an Ethernet trailer.
Step 4: R1 extracts the Ethernet header and trailer and separates the IP
packet from the Ethernet frame.
I Introduction to TCP/IP
Data Encapsulation
As you can understand from what we have explained about how all Step 3 Encapsulate the data provided by the transport layer within a
Layers do their jobs, when sending data, we can refer to the process of network layer (IP) header. IP defines IP addresses that uniquely
adding its own header information to the data provided by each Layer as identify each computer.
the Data Encapsulation process.
Step 4 Encapsulate the data provided by the network layer within the
In TCP/IP, hosts send data as a five-step process. The first four steps relate data layer header and fragment. This layer uses both the title and
to encapsulation by the TCP/IP layer, the final step is the physical fragment.
transmission of data by the host. Step 5 Transmit the bits. The physical layer encodes a signal to the
Step 1 Create and encapsulate application data with required application medium to transmit the frame.
I Ethernet Cabling
I Ethernet Addressing
The figure on the left shows a single switch, and its connected devices: three support wireless LANs in the same area, allowing people to move around and
PCs, a printer, and a router. (The router connects the LAN to the WAN, in this still work, and support an increasing number of devices without Ethernet
The IEEE Ethernet 802.3 standards that we use frequently today are:
cabling.
1000BaseSX (IEEE 802.3z): MMF using 62.5 and 50-micron cores; It uses an
850 nanometer laser and can reach up to 220 meters with 62.5 microns and
10 Mbps ve 100 Mbps düz kablo pinout örneği.
550 meters with 50-microns.
Straight-Through Cable
Straight cable is used to connect:
Example of 10 Mbps and 100 Mbps Cross cable pinout.
- Host to switch or hub
- Router to switch or hub Note: Normally, the switches are connected with a cross cable when connecting to each other,
but generally flat cables are used when applying in the field, thanks to the auto-mdix feature
in the switches, we can connect them with a flat cable without any problems.
I Ethernet Fundamentals
For structured cabling systems, standard Cat 5e, 6 and 6A (100 MHz, 250
MHz and 500 MHz, respectively) require the use of twisted symmetrical 4-pair
cables with 100 Ω impedance.
✓Unshielded U/UTP (Unshielded Twisted Pairs) Data transmission cables consist of four pairs arranged in a sheath
✓Shielded F/UTP (Foiled Twisted Pairs) according to a certain arrangement necessary to reduce power loss and
crosstalk problems. This arrangement consists of separately twisting
✓Dual screen SF/UTP or S/FTP.
pairs of conductors. These pairs are identified by standard colors. Each
NOTE: Category 7 has not been widely used to date, despite being standardized
of the pairs has a different area and is alternately twisted differently
and offering high levels of performance. The form factor is used where there are
inside the outer sheath. The conductor size allowed by the standards is
installation difficulties for cost reasons.
between 22 and 26 AWG: 23 AWG is most commonly used in any
case.
I Ethernet Fundamentals
Cable Examples
UTP Cable 1000 BaseT (IEEE 802.3ab) Pinouts Multi Mode Fiber Cable
Category 5-6-7, up to 100 meters, quad-pair UTP cabling. Multi-mode fiber (MM) is a type of fiber optic cable used over short
1000BASE-T (Gigabit Ethernet) differs from 10BASE-T and 100BASE- distances, for example inside a building or campus. Multi mode fiber
T according to cable and pinouts. Four wire pairs are required for optic cable has a 50 or 62.5 micron core that allows multiple light modes
1000BASE-T. and the pins must match. to be emitted. Therefore, more data can pass through the Multi mode fiber
core at any given time. The maximum transmission distance for MM
cable is around 550m at 10Git/s, it goes to 2km at 100Mb/s, it can go
more distance at lower data rates. Multi mode fiber optic cables defined
by the ISO 11801 standard can be classified as OM1 fiber, OM2 fiber,
OM3 fiber, OM4 fiber and OM5 fiber.
MM OM5 Fiber
OM5 fiber, also known as WBMMF (wideband multimode fiber), is the newest
type of multimode fiber and is backward compatible with OM4. OM2 has the
same core size as OM3 and OM4. The color of the OM5 fiber sheath was chosen
window.
into bytes. Frames are used at the Data Link layer to encapsulate packets from an incoming packet is addressed at a particular switch. The destination
the Network layer for transfer in a media medium access type. address can be an individual address or a broadcast or multicast MAC
The function of Ethernet ports is to pass data frames among others, using a set address.
of bits known as the MAC frame format. This provides error detection with CRC Source Address (SA): SA is a 48-bit MAC address used to identify
(cyclic redundancy check). But remember that this is bug fixing, not bug transmitting devices. Broadcast and multicast address formats are invalid in
fixing. the SA field.
Lenght or Type: 802.3 uses a Lenght field, but the Ethernet frame uses a Type
field to detect the Network layer protocol. 802.3 cannot recognize top-layer
Ethernet Frame Format protocols and must be used with a proprietary LAN (such as IPX).
Preamble: The choppy 1.0 form provides a 5MHz speed at the start of each
Data: This is a packet sent from the Network layer to the Data Link layer. Its
packet. This allows the receiving devices to stop the incoming bit stream.
size can vary from 46 to 1,500 bytes.
Start Frame Delimiter (SFD)/Synch: SFD is 10101011, where a final pair
allows the receiver to change the 1.0 form somewhere in the middle, still Frame Check Sequence (FCS): FCS is a field at the end of the frame used to
maintain the sync state and determine the start of the data. store CRCs.
I Ethernet Fundamentals
Ethernet Addressing
Ethernet addressing uses the Media Access Control (MAC) address
printed on Network interface cards (NIC). A MAC or hardware address is a
48-bit (6-byte) address written in hexadecimal format.
Below is the 48-bit MAC address and how the bits are split.
1. PC1 creates and sends the original Ethernet frame using its MAC address
as the source address and PC2's MAC address as the destination address.
Unicast Ethernet Address Format 2. SW1 receives Ethernet frame and transmits it from G0/1 interface to
SW2.
Organizationally unique identifier (OUI) is assigned to an
3. Switch SW2 receives Ethernet frame and transmits it from F0/2 interface
organization by the IEEE. It consists of 24 bits or 3 bytes. The to PC2.
organization, in turn, assigns a (24-bit or 3-byte) address that is 4. PC2 realizes that it is the destination MAC address and receives the frame
unique (by default and not guaranteed) on each NIC generation. and processes it.
I Ethernet Fundamentals
signal at the same time, the electrical signal will collide and become
corrupted. The hub repeats all received electrical signals, even if it receives
multiple signals at the same time. For example, in the Figure PC shows
Archie and Bob sending an electrical signal simultaneously (in Steps
1A and 1B) and the hub repeating both electrical signals to Larry on the
left (Step 2). Example of Half and Full Duplex Ethernet working together in a simple LAN.
I Wide Area Network (WAN)
I Leased-Line WANs
I IP Routing
help you extend your local networks with other remote networks. Doing using WAN, it uses a router with WAN connection for each local
your own structured cabling between different regions and trying to network. First, you get the WAN connection suitable for your business
connect to all remote locations of your company using your own from the ISPs (Internet Service Provider) and start using it.
infrastructure may not be cost effective or possible. A much better Routers connect to both WAN and LAN as shown in the figure below.
solution is to lease existing infrastructure that service providers already Note that a curved line between routers is a common way to represent a
have. Leased-Line line when the drawing need not show any physical details
In this section, we will continue by talking about the different connection of the line.
The Leased-Line service receives and sends bits in both directions at a Since Leased-Lines define only Layer 1 transmission service, many
predetermined rate using Full duplex logic. In fact, it logically behaves as companies and standards organizations have created data link
if you have a bidirectional crossover Full duplex Ethernet connection protocols to control and use Leased-Lines. Today, the two most popular
between the two Routers, as shown in Figure. Leased-Line uses two pairs of data-link layer protocols used for leased lines between two routers are
cables to send data, allowing bidirectional operation. High-Level Data Link Control (HDLC) and Point-to-Point Protocol
(PPP).
Logical View of Leased-Line Service in the ethernet frame to check that the receiving device is receiving the
data correctly. HDLC provides similar functionality.
HDLC Data-Link Details of Leased-Lines
Leased-Lines provide layer 1 service. In other words, it receives and sends
bits between devices connected to the leased-line. However, the lease-line
itself does not define a data link layer protocol to be used on the leased-
line.
First, the TCP/IP network layer focuses on forwarding IP packets from the
source device to the destination device. Basically, LANs and WANs act as LAN'lar ve WAN'lar üzerinden IP Yönlendirme Mantığı
a way to carry packets to the next router or end-user device. The figure
shows the point of view of the Network Layer.
As time went on, the IEEE improved its Ethernet standards making it a
good WAN technology. For example, the 1000BASE-LX standard uses
single-mode fiber cable that supports a cable length of 5 km; The
Example of Fiber Ethernet Connection for Connecting to CPE Router Service Provider's WAN.
1000BASE-ZX standard also supports 70 km cable length. As time went
on and IEEE improved the cabling distances for fiber Ethernet
connections, Ethernet became a good WAN technology.
Many WAN service providers (SPs) today offer WAN services that
leverage Ethernet. SPs offer various Ethernet WAN services to their
customers.
I IP Routing Fundamentals
IP Routing
Internet Protocol (IP)
Internet Protocol (IP) is actually the Network layer. Other protocols
available here are just to support it. The IP has an overview, it can be said
to see them all, and is aware of all interconnected networks. IP looks at
the address of each packet. It then chooses the best route using a routing
table and decides where to send a packet.
transmission details, the bits still need to be transmitted. To do this, routing table and find the most suitable route to the destination
address. This route shows the next router's IP address on the router's
Network layer logic in a host or router must deliver the packet to the Data
output interface.
Link layer protocols, which in turn ask the physical layer to actually
Step 4: It encloses the IP packet in a new data-link header and trailer
send data. Before sending the frames over each physical network, the
suitable for the outgoing interface and transmits the frame.
Data Link layer creates a frame and adds the appropriate header and
trailer to the packet.
Step 1: To ensure that there is no error in the frame, the data connection
uses the Frame Check Sequence (FCS-Frame Check Sequence) field and
discards the frame if an error occurs.
Step 2: Assuming the frame was not fired in Step 1, it discards the old
data link header and trailer when leaving the IP packet.
CPE PC-1 to PC-2 Routing Logic
I IP Routing Fundamentals
In the figure, we will look at what stages the packet sent from PC-1 to PC-2 goes Next, R1 compares the destination address of the packet (150.150.4.10) with
through in Network Layer and Data Link Layer. the routing table and finds the outbound route to subnet 150.150.4.0. R1
forwards the packet from the interface (Serial0) to R2 (150.150.2.7) on this
matching route. R1 first encapsulates and sends the IP packet to an HDLC
frame.
Step C: When R2 receives HDLC frame, it repeats the same process as R1. R2
checks the FCS field and detects no errors, and then discards HDLC header
and trailer information. Then R2 compares the destination address of the
packet (150.150.4.10) with the routing table and finds the route to subnet
150.150.4.0 and sends the packet from Fast Ethernet 0/0 to 150.150.3.1. R2
sends the HDLC packet from R1 back to the Ethernet Frame by encapsulation.
Network Layer and Data-Link Layer Encapsulation
Step A: Network layer of PC1 adds PC2's IP address(150.150.4.10). To check if Step D: Like R1 and R2, R3 checks FCS, discards old data-link header and
trailer information, and looks at its own route table for 150.150.4.0 subnet,
this IP address is local, it should send it to the default router. PC1 adds an
but because R3 is directly connected to 150.150.4.0 subnet, there is no next
Ethernet data link frame with the IP address of PC2 and R1 to the IP packet
router. All R3 has to do is encapsulate it by adding PC2's mac address and
and sends the frame to Ethernet.
destination ethernet address to the incoming Ethernet frame information.
Step B: R1 checks if there is an error in the FCS of the incoming ethernet frame
Note: At the bottom of the Figure, R3 will use ARP once to learn PC2's MAC address before
and if there is no error, it discards the header and trailer information.
sending any packets to PC2.
I IP Routing Fundamentals
IP Header
The routing process uses the IPv4 Header as shown in the figure below. The
32-bit source IP address and 32-bit destination IP address are listed in
the header.
Ethernet Frame Format
Of course, it has more information fields in the header. But we will cover
as much as the CCNA training covers. For now we will focus on the source
and destination ip fields. Note that in the examples in this section, the IP
Header information remains unchanged by the IP Routing process, while
routers remove and add data-link headers each time they forward a
packet.
TCP/IP defines many functions in Network Layer beyond IP. Of course, IP Consider: What if you wanted to move your web page to another service
plays a huge role in networking today by defining IP addressing and IP provider? Your IP address would change and no one would know your new IP.
routing. However, it is very important at the network layer in other standards DNS lets you use a domain name to specify an IP address. You can change
and protocols defined by the RFC. In the last part of this section, I will talk your IP address as often as you want so no one will know about the change.
about 3 network layer features that will help you a lot in the future.
DNS; It is used to resolve an FQDN (fully qualified domain name) such as
✓ Domain Name System (DNS) www.yavuzbulut.com or ccna.yavuzbulut.com. FQDN is a hierarchy that can
✓ Address Resolution Protocol (ARP) logically place a domain identifier-based system.
✓ Internet Control Message Protocol (ICMP)
names such as www.routersim.com. You don't have to use DNS, you can just
type the IP address of a device you want to connect to. An IP address identifies
user machines on both the network and the internet. However, DNS is designed
ICMP packages have the following features: Ping: Packet Internet Groper (Ping) uses ICMP echo request and replay
- Provides user machines with information about network problems. messages to check the physical and logical connectivity of machines in a
network community.
- They are encapsulated in IP datagrams.
Traceroute: Using ICMP time-outs, Traceroute is used to find the path a packet
The following are some common ICMP-related events and messages:
travels through the network community.
Destination Unreachable: If a router can no longer send an IP packet, it uses
ICMP to send a message to the sender stating its status. For example, let's take
a look at Figure 3-12, which shows that the Lab_B router's E0 interface is
down. When HostA sends a packet destined for HostB, the Lab_B router will
send an ICMP destination unreachable message to the sending device (HostA
in this example).
Buffer Full: If the router's buffer is full to receive incoming packets, it will use
ICMP to send this message until the congestion is cleared.
A Simple ICMP Example
Note: Both the Ping and Troceroute command (also used as Trace, Microsoft Windows uses tracert)
allow you to verify your address settings in your network community.
Chapter-3 04 - Using Command-Line Interface
05 - Switches Overview
Switch Applications in 06 - Basic Switch Configuration
The Cisco Internetwork Operating System (IOS) is the core of Cisco routers and many
switches. In case you didn't know, a kernel is an essential core part of an operating system,
providing administrative capabilities and resources such as low-level hardware interfaces
and security.
The second way to connect to a Cisco switch is with the Telnet program from the
network. Telnet is a terminal emulation program that acts as a dumb terminal.
Another way of connection is to connect via SSH, which is the most secure way to Figure 4-2 USB or Serial Console Cable Connection Options
Figure 4-3 shows the Cisco 2960-XR Switch Console Port Inputs.
The switch console port settings must be configured to match the computer's
serial port settings. The default console port settings on a switch are as
follows. Figure 4-4 Terminal settings for console access.
✓ 9600 bits/second As a terminal program, you can use programs such as Putty or SecureCRT
✓ No hardware flow control in the simplest way. With these programs, you can make serial, telnet and
✓ 8-bit ASCII
ssh connections.
✓ No parity bits
✓ 1 stop bit
I Using the Command-Line Interface
Telnet, part of the TCP/IP protocol stack, is a virtual terminal that allows you Instead of Telnet, you can use Secure Shell. SSH creates a more secure
to connect remote devices to gather information and run programs. session than Telnet applications that use unencrypted data streams. Secure
After your routers and switches are configured, you can use the Telnet Shell (SSH) uses encrypted keys to send data so your username and
program to reconfigure and/or control your switches and routers without password are not sent publicly.
using a console cable. For Telnet to work, you need to have VTY passwords on
Reviewing Switch Modes
switches and routers.
For configuration from the CLI, you can make general changes to the switch
line vty 0 ?
line vty 0 4 by typing configure terminal (or config t for short). This will take you to
password telnet
the global configuration mode and change the settings known as running-
login
config. A global command (running from the global config) is set only
once and affects the entire switch.
You can type config from the command line in privileged-mode and then
just press Enter to get to the terminal's default. As it looks below:
Bulut-R1#config
Figure 4-5 User ve Privileged Mode. Configuring from terminal, memory, or network [terminal]? [press
enter]
Enter configuration commands, one per line. End with CNTL/Z.
Bulut-R1(config)#
I Using the Command-Line Interface
I Loop Avoidance
Figure 5-1 Example of Campus LAN and Data Center LAN. Figure 5-2 Example of Switch Forwarding and Filtering Decision.
I Switches Overview
Figure 5-3 Example of Two Switch Forwarding and Filtering Decisions. First Switch.
✓Address learning
Forward/filter Decisions: When a frame is received from the interface, the switch
looks at the target hardware address and finds the output interface in the MAC
database. The frame is sent from the specific destination port.
Figure 5-4 Example of Two Switch Forwarding and Filtering Decisions. Second Switch.
I Switches Overview
Figure 5-5 Switch Learning: Adding an Empty Table and Two Entries.
Figure 5-6 Formation of vicious circle and its transformation into a broadcast storm.
I Switches Overview
Analyzing and Verifying the Switch Some Commands We Can Use For Analysis and Verification:
Cisco Catalyst switches come from the factory ready to replace frames from show mac address-table dynamic
Ethernet. All you have to do is connect the power cable, plug in the Ethernet We can see the mac addresses that the Switch learns dynamically.
cables and the switch starts changing incoming frames. When you show interfaces status
connect multiple switches together, the frames are ready to be transmitted We can see if the switch interface (port) is down or up.
between the switches as well. Let's take a look at the default settings. show interfaces f0/1 counters
✓Interfaces are enabled by default, ready to work once the cable is We can see outgoing packets from FastEthernet 0/1.
✓All interfaces are assigned Vlan1. We can see which interface this mac address is on.
We can see how many records are in the Switch mac table and how
much more we can record.
I CLI Security on Switch
I AAA Server
I Giving IP to Switch
I Basic Switch Configuration
In this option, our username and passwords are stored on a remote AAA server, SW1# configure terminal
!
SW1(config)# hostname SW1
and when we try to connect to the switch, the switch goes and verifies the
SW1(config)# ip domain-name example.com
SW1(config)# crypto key generate rsa
username and password we entered from the AAA server, if the information is The name for the keys will be: SW1.example.com
Choose the size of the key modulus in the range of 360 to 2048
correct, it allows us to log in. for your
General Purpose Keys. Choosing a key modulus greater than 512 may
take a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 4 seconds)
SW1(config)#
!
! Optionally, set the SSH version to version 2 (only) - preferred
!
SW1(config)# ip ssh version 2
Figure 6-4 Basic Authentication Process with External AAA Server. !
! Next, configure the vty lines for local username support, just
like ! with Telnet
Maintaining a Remote Connection with SSH !
SW1(config)# line vty 0 15
SW1(config-line)# login local
Instead of Telnet, you can use Secure Shell. SSH creates a more secure session SW1(config-line)# exit
!
than Telnet applications that use unencrypted data streams. Secure Shell ! Define the local usernames, just like with Telnet
!
(SSH) uses encrypted keys to send data so your username and password are SW1(config)# username yavuz password cisco
SW1(config)# username bulut password cisco
not sent publicly. SW1(config)# ^Z
SW1#
I Basic Switch Configuration
We need to give an ip to the switch so that we can access it remotely and make Bulut-Sw1# configure terminal
Bulut-Sw1(config)# interface vlan 1
our settings via telnet or ssh. Let's not forget to give the default gateway ip to
Bulut-Sw1(config-if)# ip address 192.168.1.200 255.255.255.0
be able to access from different subnets and vlans. Bulut-Sw1config-if)# no shutdown
00:25:07: %LINK-3-UPDOWN: Interface Vlan1, changed state to up
00:25:08: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1,
changed
state to up
Bulut-Sw1(config-if)# exit
Bulut-Sw1(config)# ip default-gateway 192.168.1.1
Configuring Speed, Duplex, and Description Interface Shutdown and Administratively Check Its Status
Here, we will configure the process of manually adjusting our speed under the Bulut-Sw1(config)# interface range FastEthernet 0/11 - 20
interface, manually selecting whether our connection will be half duplex or FastEthernet We can enter the same settings with multiple commands
from 11 to 20.
full duplex, and adding annotations to inform and help us later about that
interface. Bulut-Sw1(config)# interface fastEthernet 0/1
Bulut-Sw1(config-if)# shutdown
Bulut-Sw1# configure terminal
Bulut-Sw1(config-if)#
Bulut-Sw1(config)# interface FastEthernet 0/1 *Mar 2 03:02:19.701: %LINK-5-CHANGED: Interface FastEthernet0/1,
Bulut-Sw1(config-if)# duplex full changed state to administratively down
Bulut-Sw1(config-if)# speed 100 We can close an interface that we do not use, or we can close and
open the port remotely.
Bulut-Sw1config-if)# description “3.Kat yazıcı bagli-full 100 mb
ayarli”
Bulut-Sw1# show interfaces f0/1 status
Bulut-Sw1(config-if)# exit We can get information about the interface status.
Bulut-Sw1config)# interface range FastEthernet 0/11 - 20
SW1(config)# interface fastethernet 0/2
Bulut-Sw1(config-if-range)# description “Bu portlarda son SW1(config-if)# no speed
SW1(config-if)# no duplex
kullanıcılar var” SW1(config-if)# no description
SW1(config-if)# no shutdown
Bulut-Sw1(config-if-range)# ^Z
We can remove a configuration that we entered before by putting
Bulut-Sw1# the no command at the beginning.
Auto-negotiation
By default, interfaces are in Autonegotiation mode. That is, when a device is
I VLAN Trunking
Virtual LANs
Concepts
In a network of switches, we can create a Virtual local area network (VLAN) to
separate broadcast domains. A VLAN is a logical grouping of resources and
network users connected to administratively defined ports on a switch. When
you create VLANs, you have the ability to create smaller broadcast domains in Figure 8-1 Using different subnets with two physical switches without VLAN.
domain. In other words, frames broadcast to the network are only switched subnets with VLANs on the switch using a single physical switch.
Does this mean we won't need routers anymore? Maybe yes, maybe no. It all
depends on what you want and what your needs are. By default, hosts in a
particular VLAN cannot communicate with hosts that are members of another
VLAN. If you want inter-VLAN communication, the answer is that you still Figure 8-2 Using two subnets in one switch using VLAN.
need a router.
In figure 8-1 on the side, we can see that we have divided our network into two
subnets and two broadcast domains using 2 switches without VLAN.
I Virtual LANs ( VLANs )
Frame Tagging
Every switch that the frame reaches must first detect its VLAN ID from the By running ISL, you can interconnect many switches, and on trunk links,
frame tag. It then determines what to do with the frame by looking at the you can still provide VLAN information while traffic flows between switches.
information in the filter table. If the frame reaches a switch with another ISL operates at Layer 2 by encapsulating a data frame with a new header and
trunk link, the frame will be forwarded to the trunk link port. cyclic redundancy check (CRC).
When the frame reaches an output determined by the forward/filter table to be ISL is specific to Cisco switches and is used only for FastEthernet and Gigabit
an Access link matching the frame's VLAN ID, the switch removes the VLAN Ethernet links. ISL routing is versatile and can be used on a switch port,
identifier. Thus, the target device will be able to receive the frames without router interfaces, and server interface cards that are trunked to a server.
having to understand the VLAN IDs.
IEEE 802.1Q
Created by IEEE as a standard frame tagging method, IEEE 802.1Q adds a
field to the frame to identify the VLAN. If you are trunking between Cisco
switch link and a different brand switch, you should use 802.1Q for
Inter-Switch Link (ISL) It works like this: First, define each port to be trunked with 802.1Q
encapsulation. Ports must be assigned a specific VLAN ID for their
Inter-Switch Link (ISL) is a way to explicitly label VLAN information in an
communication, which makes them native VLANs. Ports placed on the same
Ethernet frame. This tagging information allows VLANs to be multiplexed
trunk form a group with this native VLAN and each port is tagged with an ID
across a trunk link with an external encapsulation method (ISL). ISL allows
number with default VLAN 1. Native VLAN allows trunks to carry received
the switch to detect the VLAN membership of a frame along the trunk link.
information without any VLAN IDs or frame tags.
I Virtual LANs ( VLANs )
Figure 8-7 There is no route between Layer 2 switch Vlans. SW1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)# vlan 10
SW1(config-vlan)# name Muhasebe-Vlan
SW1(config-vlan)# exit
SW1(config)# interface range fastethernet 0/11 - 12
SW1(config-if)# switchport access vlan 10
SW1(config-if)# switchport mode access
SW1(config-if)# end
Let's make two switch and three vlan examples and vlan trunk between two SW1# show interfaces gigabit 0/1 switchport
SW1# show interfaces trunk
switches. SW1(config)# interface gigabit 0/1
SW1(config-if)# switchport mode dynamic desirable
SW1# show interfaces gigabit 0/1 switchport
SW1# show interfaces trunk
SW1# show vlan id 2
Figure 8-11 Example of vlan trunk between three vlans and two switches.
Figure 8-10 Example of vlan trunk between three vlans and two switches.
I Virtual LANs ( VLANs )
Voice VLAN feature enables on access ports to carry IP voice traffic from an IP SW1# con gure terminal
Enter con guration commands, one per line. End with CNTL/Z.
phone.
SW1(con g)# vlan 10
You can also configure another VLAN for data traffic from a device such as a SW1(con g-vlan)# vlan 11
SW1(con g-vlan)# interface range FastEthernet0/1 - 4
Cisco IP phone connected access port, a VLAN for voice traffic, and a PC SW1(con g-if)# switchport mode access
attached to the phone. SW1(con g-if)# switchport access vlan 10
SW1(con g-if)# switchport voice vlan 11
I EtherChannel
I Spanning Tree Protocol STP
Sounds good, but redundant links, while very useful, cause more problems
than they solve. Due to the simultaneous sending of frames from all backup
links, it causes loops in the network, the Spanning Tree Protocol has been
developed to prevent this problem.
Root port: The root port is always the direct link to the bridge or the shortest path
Root bridge: Root bridge is the bridge with the best bridge ID. Choosing a root
to the root bridge. If more than one link is connected to the root bridge, the port
bridge that is the central point in the network with STP is important for all
cost is determined by checking the bandwidth of each link. The lowest cost port
switches in the network. All decisions in the network, such as which port to
becomes the root port. If multiple links have the same cost, the bridge with the
block and which to put in forwarding mode, are made from the perspective of
lower bridge ID will be used. Since multiple links can be from the same device,
this root bridge.
the lowest port number will be used.
Bridge ID: Bridge ID is the record that STP keeps for all switches in the network.
Designated port: A designated port is one that has the best (lowest) cost. A
This is determined by a combination of bridge priority (32,768 by default on
designated port will be marked as a forwarding port. Nondesignated port: A
Cisco switches) and MAC address. The bridge with the lowest bridge ID becomes
nondesignated port is a higher-cost port than a designated port. Nondesignated
the root bridge in the network.
ports are put in blocking mode. They are not forwarding ports.
BPDU: All switches change their information for use both in root switch
Forwarding port: A forwarding port forwards frames.
selection and in subsequent network configuration. Each switch compares the
parameters in the Bridge Protocol Data Unit (BPDU) that it receives from one Blocked port: A blocked port will not forward frames to avoid vicious cycles.
neighbor and sends to the other. However, a blocked port will always listen for frames.
I Spanning Tree Protocol STP
Switch ID is used to select the root switch in the STP domain and to determine
the root port for each of the other devices in the STP domain. This ID is 8 bytes
in size and contains the priority and the MAC address of the device. The
You use each switch's priority, along with its MAC address, to determine the
root switch. If two switches have the same priority value, the MAC address will
be decisive to determine which one has the lowest (good) ID. Here's how: If two
switches named A and B use the 32768 priority by default, their MAC
Switch B's MAC address is 0000.0c00.2222, SwitchA will be the root switch. Figure 9-3 Root Switch Selection Process
By default, BPDUs will be sent every two seconds from all active ports on the
switch. (The switch with the lowest (good) switch ID is the root switch.) You can
become the root switch. Being able to do this is important in large networks.
I Spanning Tree Protocol STP
Convergence is really important as it ensures that all devices have the same
database. But as I specifically mentioned, it will cost you money. Usually, it
Figure 9-4 Using Cost on non-root ports
takes 50 seconds to go from blocking to forwarding, and I do not recommend
changing the STP timers (but you can change these timers if necessary). By
creating your physical switch design in a hierarchical fashion, as shown in
Figure 9-3, you can make your core switch the STP root. This will speed up the
STP converge time.
Note: Cost determines the best path when none of the links have a root port. The cost of a link is
determined by the bandwidth of a link.
Figure 9-3 An optimal hierarchical switch design.
I Spanning Tree Protocol STP
✓RSTP and STP use the same rules when choosing root switches.
✓RSTP and STP use the same rules when choosing root ports.
✓RSTP and STP use the same rules when choosing designated ports.
Figure 9-6 Comparison of STP and RSTP Port Status
✓RSTP and STP make each connection port forwarding or blocking, but RSTP
uses discarding instead of blocking.
I Spanning Tree Protocol STP
PortFast EtherChannel
If we use the portfast command on our switches, we avoid the problem of our In STP, a port is blocked and we actually use a single connection even though
hosts not getting a DHCP address. Because STP takes a lot of time to converge we have two connections, but with etherchannel you can combine the links and
and exceeds the hosts DHCP request time. create a logical aggregation. Thus, many of our links will appear as one. If
doing this will provide the same redundancy as STP, why not merge our backup
BPDU Guard
links? It provides both redundancy like STP and allows us to use the ports
If you open PortFast, it's a really good idea to open BPDUGuard. If a switch port
actively, plus we can connect up to eight mutual ports between two switches. (It
with PortFast enabled receives a BPDU from that port, it will make the port error
may vary according to the switch brand and model)
disabled. This prevents an administrator from accidentally connecting another
As usual, EtherChannel has Cisco version and IEEE version. The Cisco version is
switch or hub port to a PortFast configured switch port. In fact, you are
defined as Port Aggregation Protocol (PAgP) and the IEEE 802.3ad standard is
preventing this from happening and causing your network to crash or at least
called Link Aggregation Control Protocol (LACP). Both standards work
be seriously damaged. You can only configure this command on your Access
equally, the configuration of the two is different.
layer switches to which users are directly connected. Therefore, we will not
configure this on our Core switch.
I EtherChannel Configuration
I MST and EtherChannel
VLANs posed a challenge for STP, which was the only type of STP available at Spanning Tree standard in the 1990s, Cisco developed the PVST+ protocol for a
the time, because STP defined a single Common Spanning Tree (CST) topology Spannin Tree to Every Vlan.
for the entire LAN. IEEE needed to create a Multiple Spanning Tree to balance RPVST+ Rapid Peer VLAN Spanning Tree: When IEEE created RSTP in 2001,
traffic between existing links as shown in Figure 10-1. In two different STP Cisco created RPVST+. This Standard provides Spanning Tree per Vlan but
more features than RSTP.
instances, SW3 can block on a different Interface in each VLAN as shown in
the figure. MSTP: IEEE did not fully adopt Cisco's PVST+ and RPVST+ and created a
different protocol as MSTP, initially defined as 802.1Q but later changed to
802.1S.
sh int trunk
I Subnet Design
Subnetting Basics
How to Create Subnets?
If you want to take a single network address and create six networks from it, we To create subnets, you take bits from the host portion of the IP address and
will need to use the subnetting method. Because this will allow you to take a reserve them to define subnet addresses. This means fewer bits for the host, so
large network and divide them into smaller network segments. the more subnets there are, the fewer bits there will be to identify the host.
There are tons of reasons to use subnetting, including the following benefits: But before you actually subnetting, you have to define your plans based on
Low network traffic: We welcome any type of low traffic. Networks are no both your current needs and your future situation.
different. Without reliable routers, packet traffic on the switches brings the
entire network to a standstill. With routers, most traffic will remain in the local
1. Which hosts do we need to group with a subnet?
network, only packets destined for other networks will be passed through the
2. How many subnets are needed for this network?
router. Routers create broadcast domains. The more broadcast domains you
3. How many host IP addresses are required for each subnet?
create, the less network traffic and smaller broadcast domains occur in each
network segment. 4. For simplicity, will we use a single subnet size or not?
will make the system more efficient if we have a large network spread over a
wide area.
I Introduction to IPv4 Subnetting
Figure 11- 4 Two companies Public IP Usage Figure 11- 5 Two Companies Using Private IP
Private IP Networks
Private IP list reserved for use in our local network.
Class A: 224 – 2 = 16,777,214 Figure 11- Class A, B and C Networks Using 8 Subnets
Figure 11-12 Subnets we can use for our example. Figure 11-14 Applying subnets to different locations.
we will use for the devices and locations we will use. We can use the subnets in
the table above for our locations. If there are devices that will use Statip IP, we
can identify them and reserve those IPs on the DHCP server or adjust the DHCP
I Practicing IPv4
I IPv4 Addressing
Octet: An 8-bit octet is an ordinary 8-bit binary number. The terms byte and
octet are completely interchangeable in this module.
For example,
Byte Values
128 64 32 16 8 4 2 1
Since they are all used, we sum all the bit fields. The maximum value of a byte
is seen as: Figure 13-1 Powers of two memorization chart
Figure 13-4 Example of Conversion from Prefix to Binary and from Binary to Decimal
I Analyzing Subnet Masks
Figure 13-6 Classful Network Example Figure 13-7 Example of Classless Network
I Analyzing Subnet Masks
I Practicing
I Analyzing Existing Subnets
Subnet Determination
We use blocks such as 4-8-16-32-64-128-256 when specifying subnets.
We can determine the size of the subnet according to the number of hosts that will
be in that subnet.
Figure 14-3 Resident Subnet for 172.16.150.41, 255.255.192.0
Two private IPs cannot be used in a Subnet Subnet ID and Broadcast Address
Analyzing Current Subnet:
172.16.0.0 Network and Four Subnet Examples
Easy Mask Calculation
For example, let's IP 172.16.150.41 and Subnet Mask 255.255.192.0 and find
Subnet ID:
these subnets.
Step 1: If the mask octet is 255, write the decimal IP address in that octet as it is.
Step 2: If mask octet is 0, write 0.
Broadcast Address:
Figure 14-1 Class B Network and /18 Mask Step 1: If the mask octet is 255, write the decimal IP address in that octet as it is.
Step 2: If mask octet is 0, write 255.
Step 3: If the mask is not 255 or 0, we will use our magic number, subtract the
mask from 256 and find how many blocks the subnet has.
Subnet ID Practice
Figure 14-5 Calculating octets block by block
many blocks the subnet has. Let the example be 16. 16-1= 15 When we add 15 to Figure 14-11 Kısa yoldan
Figure 14-4 Subnet ID and Broadcast Address Responses Figure 14-11 Shortcut Broadcast Address Answers
Running a Router
The first time you turn on a Cisco router, it runs a power-on self-test (POST). This is the first part of the router boot process output. It is the information
If it passes, it searches for Cisco IOS from the flash drive and loads it (if an about the bootstrap program when the POST runs first. Then it tells the router
IOS file exists). (By the way, if you don't know, flash memory is an how to load (default is to find IOS in flash memory). It also lists the RAM
that, IOS loads and looks for a valid configuration (startup-config). It is The next Chapter shows us how to decompress IOS into RAM:
stored in non-volatile RAM (NVRAM).
program load complete, entry point: 0x8000f000, size: 0x14b45f8
The following messages are the ones that appear when you first boot or reload a Self decompressing the image :
##############################################################
router.
######
Technical Support: http://www.cisco.com/techsupport Pound signs tell us that IOS is being loaded into RAM. After unzipped IOS to
Copyright (c) 2006 by cisco Systems, Inc. RAM, IOS is loaded and the router starts working as seen below. Note that the
Initializing memory for ECC
iOS version is enhanced security version 12.4.(12):
c2811 platform with 262144 Kbytes of main memory
Main memory is configured to 64 bit mode with ECC enabled Cisco IOS Software, 2800 Software (C2800NM-ADVSECURITYK9-M),
Upgrade ROMMON initialized Version
program load complete, entry point: 0x8000f000, size: 0xcb80 12.4(12), RELEASE SOFTWARE (fc1)
program load complete, entry point: 0x8000f000, size: 0xcb80 Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2006 by Cisco Systems, Inc.
Compiled Fri 17-Nov-06 12:02 by prod_rel_team
Image text-base: 0x40093160, data-base: 0x41AA0000
I Cisco Router Management
One of the nice new features of ISR routers is that the IOS name is not
encrypted. The filename actually tells you what IOS can do, as in Advanced
Security. When IOS is loaded, the information learned from POST will be
displayed.
4 Serial(sync/async) interfaces
1 Virtual Private Network (VPN) Module Cisco Integrated Services Routers (ISR)
DRAM configuration is 64 bits wide with parity enabled.
239K bytes of non-volatile configuration memory. Other brands, including Cisco, often have several different types of router
62720K bytes of ATA CompactFlash (Read/Write) models. Routers today often do a lot more than just forward packets; they
from NVRAM to RAM. A copy of this file is placed in RAM and designated as running-config.
I Cisco Router Management
Figure 15-3 Cisco 4321 Integrated Services Router (ISR) Model Router Photograph
Figure 15-3 shows a photo of the Cisco 4321 ISR and shows some of its more
important features. The figure shows a complete view of the back of the router.
This model comes with two internal Gigabit Ethernet Interface and two modular
slots that allow you to add small cards called Network Interface Modules
(NIMs). An example NIM (a NIM providing two serial interfaces) is shown on
the right of the figure. It has other inputs as well, including a router RJ-45 and
a USB console port.
Figure 15-2 A more detailed Enterprise Network Diagram
Note : Cisco has covered Serial connection issues ( Bandwidth and Clock Rate on Serial
Interfaces ) in CCNA curves since 1998, but since this technology is not used much anymore,
CCNA 200-301 has removed it from the training content.
I Cisco Router Management
I Configuration
I IPv4 Static Routes
IP Routing
Before you start explaining this section, you have to know the difference
between a routing protocol and a routed protocol. A routing protocol is used by Figure 16-1 Host Routing Logic Summary
ensure that all routers are in the same routing table. Essentially, a routing
protocol determines the path a packet will follow through the network
community. Examples of routing protocols are RIP, RIPv2, EIGRP and OSPF.
When the routers learn all the networks, the routed protocol can be used to send
user data (packets) on the installed structure. Examples of routed protocols are
IP Routing Process
We've seen the basics of IP Routing in Chapter 1, chapter 3, and in this chapter,
Figure 16-2 Routing Logic Summary of Router
we'll use the IP addressing terms we covered in chapters 2, 3, and 4.
I IPv4 Static Routes
IP Routing Example
Destination IP 172.16.2.9 / 24
Our Default Gateway Address is 172.16.1.1 Figure 16-4 Host A sends the packet to Host B.
We add our Mac address to the Ethernet Frame and send the packet to our
Step :1 Router 1 checks the Target Mac and FCS in the incoming packet, if there is no error, it goes to step 2.
default gateway.
Step :3 Router 1 looks at the route table for the destination ip in the incoming packet If the packet were to go to 172.16.3.9, it would send it from the G0/1/0 LAN
and selects the interface to send if there is a route in the table. interface, then it would send the packet by encapsulating by adding an ethernet
Configuring IP Addresses I am writing the Router 1 Ip configuration as an example, let's configure the other
routers together.
R1#
interface GigabitEthernet0/0
ip address 172.16.1.1 255.255.255.0
interface Serial0/0/0
ip address 172.16.4.1 255.255.255.0
interface GigabitEthernet0/1/0
ip address 172.16.5.1 255.255.255.0
R1# If you pay attention to the command line below, you will see the number 130
ip route 172.16.2.0 255.255.255.0 S0/0/0 at the end of the line, now you will say what is this, this is administrative
ip route 172.16.3.0 255.255.255.0 172.16.5.3
R1# show ip route static distance. administrative distance; The priority order in the route table is 110
in OSPF AD default, it is static route 1 but here it is changed to 130 so OSPF
has first priority.
second line sends the incoming route requests to the 10.1.1.9 host on the same
Static Default Routes
subnet to 10.9.9.9.
R2# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
ip route 10.1.1.0 255.255.255.0 10.2.2.2
R2(config)# ip route 0.0.0.0 0.0.0.0 s0/0/1
ip route 10.1.1.9 255.255.255.255 10.9.9.9 R2(config)# ^Z
R2# show ip route
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
S* 0.0.0.0/0 is directly connected, Serial0/0/1
I VLAN Routing with I Router 802.1Q Trunk
I Layer 3 EtherChannel
I IPv4 Routing (LAN)
VLAN Routing with Router 802.1Q Trunk ROAS ( Router On A Stick ) Configuration
Routing by connecting a cable to the router for each vlan on the switch will not In the example below, there are two vlans on the switch and it is connected to the
be very useful. There are more functional ways of doing this, I'll teach you router with a single cable, in this case, we will make Sub-interfaces and allow
about them. What are our options, let's take a look at them; different vlans to pass through with a single connection.
Router-On-A-Stick (ROAS)
Configuring Vlan Routing with Layer 3 SVI Configuring Vlan Routing with Route Port on Layer 3 Switch
Using a router with ROAS to route packets makes sense in some situations, When we use SVI in Layer 3 switches, the physical interfaces work as Layer 2
especially in small networks. In networks with larger LANs, we prefer to use as usual, that is, the ethernet receives the frame souce the mac learns and the
Layer 3 switches for Inter VLAN Routing. switch transmits the frame by adding the target mac address of the frame.
Instead, we can routing the Layer 3 switch physical port with the Layer 3 mode
as the route mode.
ip routing
! Figure 17-4 Example of Routing Using Route Port on Layer 3 Switch
interface vlan 10
ip address 10.1.10.1 255.255.255.0 ip routing
! !
interface vlan 20 interface vlan 10
ip address 10.1.20.1 255.255.255.0 ip address 10.1.10.1 255.255.255.0 !
! interface vlan 20
interface vlan 30 ip address 10.1.20.1 255.255.255.0
ip address 10.1.30.1 255.255.255.0
!
interface gigabitethernet 0/1
SW1# show ip route no switchport
ip address 10.1.30.1 255.255.255.0
interface GigabitEthernet1/0/13
no switchport
no ip address
channel-group 12 mode desirable
!
interface GigabitEthernet1/0/14
no switchport
no ip address
channel-group 12 mode desirable
!
interface Port-channel12
no switchport
ip address 10.1.12.1 255.255.255.0
I Troubleshooting Using the Ping Command
Troubleshooting
I Using the TraceRoute Command
Troubleshooting Using the Ping Command Step 1: Open a command (cmd) window and ping 127.0.0.1. This is the
Debugging IP addressing is clearly a very important skill. That's why this is system diagnostic or loopback address, and your TCP/IP stack is considered to
where I'm going to show you the Cisco method of debugging IP addressing. Let's be working if you can ping it. If you can't, then you have an IP stack problem
look at Figure 18-1 for an example of your simple IP problem. Poor Sally cannot and need to reinstall TCP/IP on the host.
connect to the Windows server. Can you handle this by calling the Microsoft C:\Users\Yavuz>ping 127.0.0.1
team and mentioning that their server is a pile of garbage and is causing all Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
your problems? Probably not such a good idea. Let's revisit our network instead. Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Let's get started by following Cisco's troubleshooting steps. They are quite Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
simple, but equally important. Imagine you are at the client's machine and
Ping statistics for 127.0.0.1:
cannot communicate with the server that is on a remote network. Below are four Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Cisco recommended troubleshooting steps: Minimum = 0ms, Maximum = 0ms, Average = 0ms
Step 2: Ping the IP address of the local host from the command window. If this
is successful, your network interface card (NIC) is working. If you can't, then
there is a problem with the NIC. Success here does not mean that the cable is
plugged into the NIC. Only the IP protocol stack on the host can communicate
with the NIC (with the help of the LAN driver).
C:\>ping 172.16.10.2
Pinging 172.16.10.2 with 32 bytes of data:
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Figure 18-1 Example of Simple Troubleshooting Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Ping statistics for 172.16.10.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
I IPv4 Routing Troubleshooting
Step 3: From the command window, ping the default gateway. If ping is If the user is still not able to communicate with the server after steps 1 to 4 are
working, it means that the NIC is connected to the network and can successful, you probably have some name resolution problems and you should
check your Domain Name System (DNS) settings. But if there is a problem
communicate with the local network. If it doesn't, you have a physical network
pinging the remote server, you know you have some physical network problems, you
problem somewhere between the NIC and the router.
need to go to the server machine and do steps 1 to 3 until you find the problem.
C:\>ping 172.16.10.1
Pinging 172.16.10.1 with 32 bytes of data: Before we discuss IP address problems and how to fix them, I want to describe some
Reply from 172.16.10.1: bytes=32 time<1ms TTL=128 basic DOS commands you can use to help troubleshoot your network from both a PC
Reply from 172.16.10.1: bytes=32 time<1ms TTL=128
Reply from 172.16.10.1: bytes=32 time<1ms TTL=128 and a Cisco router (the commands may do the same thing, but they work
Reply from 172.16.10.1: bytes=32 time<1ms TTL=128
differently):
Ping statistics for 172.16.10.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Packet InterNet Groper (ping): On a network, Ping uses ICMP echo request and
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms reply to test if the IP stack has started and is active.
Step 4: If steps 1 to 3 are successful, try to ping the remote server. If this works, traceroute: Displays a list of routers in the path to a destination network, using TTL
time-outs and ICMP error messages. This command will not work from a DOS
there is IP communication between the local host and the remote server. Also, you
command system.
know it's running on its remote physical network.
tracert: Same command as traceroute, but a Microsoft Window command and will
C:\>ping 172.16.20.2
Pinging 172.16.20.2 with 32 bytes of data: not work on a Cisco router.
Reply from 172.16.20.2: bytes=32 time<1ms TTL=128
arp -a: Used for IP-to-MAC address mapping on a Windows PC.
Reply from 172.16.20.2: bytes=32 time<1ms TTL=128
Reply from 172.16.20.2: bytes=32 time<1ms TTL=128 show ip arp: Same command as arp -a, but displays the ARP table on a Cisco router.
Reply from 172.16.20.2: bytes=32 time<1ms TTL=128
Ping statistics for 172.16.20.2:
Like the traceroute and tracert commands, they are not interchangeable in DOS
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), and Cisco.
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms ipconfig /all: Only available from the DOS command line, it will show you the PC
network configuration.
I IPv4 Routing Troubleshooting
Using Extended Ping Test the Reverse Route Troubleshooting Using the TraceRoute Command
Like ping, the traceroute command helps network engineers isolate problems. Here
is a comparison of the two:
R1# traceroute
Protocol [ip]:
Target IP address: 172.16.2.101 Figure 18-4 Telnet and SSH Error Example.
Source address: 172.16.1.1
Numeric display [n]:
Timeout in seconds [3]:
Probe count [3]:
Minimum Time to Live [1]: Telnet and ssh from PC1 to R1, R1 to R2 and R2 to R3 are working, but if
Maximum Time to Live [30]:
Port Number [33434]: PC1 still cannot reach other devices other than R1, there is probably a route
Loose, Strict, Record, Timestamp, Verbose[none]: Type escape
sequence to abort.
problem.
Tracing the route to 172.16.2.101
VRF info: (vrf in name/id, vrf out name/id)
1 172.16.4.2 0 msec 0 msec 0 msec 2 172.16.2.101 0 msec 0 msec *
I Neighbors
OSPF works using the Dijkstra algorithm. First, a shortest path tree (SPF) is Routed Protocol and Routable Protocol: Both terms refer to a protocol that
configured and the resulting best paths are placed in the routing table. Although defines packet structure and logical addressing, allowing routers to route or
not as fast as EIGRP, OSPF converges quickly and supports multiple, equal- forward packets. Routers forward packets defined by routed and routable
cost routes to the same destination. It supports both IPv4 and IPv6 routed protocols. Examples are IP Version 4 (IPv4) and IP Version 6 (IPv6).
protocols such as EIGRP.
OSPF provides the following features: Interior and Exterior Routing Protocols
It consists of Areas and autonomous systems.
IGP: A routing protocol designed for use within a single autonomous system
It minimizes routing update traffic. (AS). For example RipV2, EIGRP and OSPF
It provides scalability.
EGP: It is a routing protocol designed to be used between different
Supports Subnet / Prefixes.
autonomous systems. For example BGP (Border Gateway Protocols)
It has unlimited number of hops.
link state
Companies have several IGP options for their corporate networks, but most
If a router receives two updates listing the same remote network, the first
thing the router checks is AD. If one of the advertised routes has a lower AD
than the other, the route with the lowest AD will be put in the routing table.
If two advertised routes for the same network have the same AD, routing
protocol metrics (hop count or line bandwidth) will be used to find the best
route to the remote network. The advertised route with the lowest metric will
Figure 19 -3 Comparison of RIP and OSPF Metrics be put in the routing table. If two advertised routes have both the same AD
and the same metrics, then the routing protocol will load-balance the
remote network. (packages will be sent from both links).
Administrative Distance
It is used to rate the reliability of a routing information from a neighboring
router. An administrative distance is a number between 0 and 255. 0 is
most reliable, 255 is untrusted, if AD 255 means no traffic will be passed
through this route.
Table 19 -5 Default Administrative Distances
I OSPF Concepts
OSPF Terminology
Link: A link is the network or router interface assigned to a particular network. Neighbor: Neighbors are two or more routers with one interface in the public
When an interface is added to the OSPF process, it is considered a link on the network, such as two routers connected by a point-to-point serial link.
OSPF side. This link or interface will have status information about both up/
Adjacency: An adjacency is a relationship between two OSPF routers that
down and one or more IP addresses.
allows to exchange route updates directly. OSPF is very selective in sharing
routing information, unlike EIGRP, which shares routes directly with all its
Router ID: While OSPF has many optional features, most enterprise companies
neighbors. OSPF only shares routes with neighbors where it has established
using OSPF choose to configure an OSPF Router ID on each router. OSPF
adjacency. All neighbors will not be adjacent, this depends on both the network
speaking routers must have a Router ID (RID) to function properly. By default,
type and the configuration of the routers.
routers will choose an interface IP address to use as the RID. However, many
network engineers prefer to specify the router ID of each router, so the output from Hello protocol: OSPF Hello protocol provides dynamic neighbor detection and
commands like show ip ospf neigbors lists more recognizable Router IDs. maintain neighbor relations. Hello packets and Link State Advertisements
(LSA) create and maintain a topological database. Hello packets are sent to
The router uses the following methods to select the Router ID.
224.0.0.5.
If the Router ID is entered while configuring Ospf, it uses this ID.
If it is not available in the above two options, Router ID is the one with the highest
IP among the Up Interfaces.
Designated Router: A desiganted router (DR) is selected when OSPF routers are Calculating the Best Route
connected to the same multi-access networks. But in reality they are networks
OSPF LSAs contain useful information, but not specific information that
with a large number of receivers. Try not to confuse multi-access with
must be added to the router's IPv4 routing table. So to know which routes to
multipoint. Sometimes it can be easily confused.
add to the routing table, each router needs to do some SPF math to choose the
The prime example is an Ethernet LAN. To minimize the number of installed best routes. Then it selects the next-hop-router and adds which interface it will
neighborhoods, a DR is selected (eliminated) to spread/receive routing go from to the table.
information to or from other routers on the broadcast network or link. This
ensures that the topology tables are synchronized. All routers in shared
networks will be adjacent to DR and backup designated router (BDR). The
selection will be won by the router with the highest priority, and if the priority
is the same across multiple routers, Router ID is used for DR selection.
Note: We will look at the cost values in detail while making the application.
I OSPF Concepts
OSPF Areas and LSAs We can list the problems related to a single-area design as follows.
It can be used in some networks that are not very wide, which were not A larger topology also requires more memory for the router database.
considered too much while designing. You just turn on OSPF on all routers, The larger the database, the longer it will take to process the SPF algorithm in
put all interfaces in the same area (usually area 0) and it works! Figure 19-9 the router. It will require more CPU power.
shows 11 routers configured with Area 0.
A single interface status change (up or down) anywhere on the network causes
the SPF (Shortest Path First) algorithm to work again in every router.
OSPF Areas
OSPF area design can take into account a few basic rules. To apply the rules,
after you have properly drawn the networks and determined the router
interfaces, select the areas for each router and interface as follows:
Place all interfaces connected to the same subnet in the same area.
RAM. connecting at least one ABR in both the backbone area and the non-backbone
area.
I OSPF Concepts
Figure 19-10 Three OSPFv2 LSA Types Seen by Multi-Area OSPF Design
I Wildcard Mask
I Verify OSPF
Single-Area OSPF Applications The way to understand the OSPFv2 configuration shown in this example is to
understand the OSPF network command. The OSPF network command
compares the first parameter in the command with the IP address of each
interface in the local router, trying to find a match. However, instead of
comparing the entire number in the network command with the entire IP
address on the interface, the router can compare wildcard masks as follows:
The router uses the following methods to select the Router ID.
If it is not available in the above two options, Router ID is the one with the
highest IP among the interfaces with Up.
Figure 20 -2 OSPFv2 authentication commands..
I OSPF Applications
OSPF Metrics (Cost): In Topic 19 OSPF Concepts, we talked about finding Interface Default Cost Values
the best route in SPF, now let's manually change the cost values here.
Let's look at the following example to better understand the OSPF Broadcast
Network Type.
✓When there are 3 other routers in the G0/0 subnet, it will be DR, BDR or
DROther.
By nature, this OSPF network type works well for data links between two These connections generally do not support datalink broadcasts. Also, having
routers. For example, let's take a look at the topology in Figure 21-4, which only two devices in the connection adds a bit more convergence time. Since we
shows two Ethernet WAN links with three WAN links and one serial link, R1. are using the Point-to-Point Network type, it tells the router not to use DR /
BDR.
R1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
I Practicing IPv6
I IPv6 Fundamentals
Figure 22-2 IPv6 Header Figure 22-4 IPv6 Router Performing Routine Encapsulation Tasks When Routing IPv6
Figure 22-3 IPv6 Host Building and Sending an IPv6 Packet Figure 22-5 Comparing an IPv6 Packet to R1’s IPv6 Routing Table
I IPv6 Fundamentals
There are some subtleties that will help us when we write this long address. One is 2001::12::1234:56ab
that you can skip parts of the address to summarize. But to do this, you have to Instead, the best you can do is:
follow some rules. First, you can discard leading zeros in each of the reserved
2001::12:0:0:1234:56ab
blocks. After doing that, the address in the previous example looks like this:
The reason why the above example is the best; in the other example, if we
2001:db8:3c4d:12:0:0:1234:56ab
discard the two zero blocks, the device looking at the address has no chance of
This is a good development. At least we don't have to write those extra zeros. But knowing where to put the zeros back. In fact, the router will look at the wrong
what about the entire block with nothing but zeros in it? We can destroy at least address and say, "Shall I place two blocks in the first pair of colons, or
some of them. If we look at our example again, we can omit two blocks of zeros by should I place three blocks in the first set and one block in the second set?"
replacing them with two colons. The address will now be: will say. And since the information the router needs is not there, it will keep
2001:db8:3c4d:12::1234:56ab going.
Very nice! We wrote two colons in place of all zero blocks. The rule you have to
follow for this is that you can only place a contiguous block of zeros at an
address. So if your address has four zero blocks and they're all reserved, I can't
place all of them. Remember the rule that you can put a colon instead of just an
2001:0000:0000:0012:0000:0000:1234:56ab
Figure 22-8 IPv6 Shortening and Extension Practical
I IPv6 Fundamentals
2000:1234:5678:9ABC:1234:5678:9ABC:1111/64
2000:1234:5678:9ABC:0000:0000:0000:0000/64
Finding IPv6 Prefix
2000:1234:5678:9ABC::/64
Copy the first bits
To find the hex length of the Prefix, we divide the Prefix bits by 4 to find how
many hex-digits to write.
2000:1234:5678:9ABC:1234:5678:9ABC:1111/56
2000:1234:5678:9A00:0000:0000:0000:0000/56
2000:1234:5678:9A00::/56
2000:1234:5678:9A::/56
Ansvers
Figure 22-8 IPv6 Shortening and Extending Practical Answers Figure 22-10 Finding Different Prefixes Answers
There is a similar structure in IPv6 dada, so we can use it as Private and Public.
Global Unicast: Addresses that work like IPv4 public addresses. Companies that
need IPv6 addresses either allocate IPv6 address blocks to end users from Global
Prefixes assigned to them in ISPs. From now on, these companies only use IPv6 Figure 23-1 Three Global Routing Prefixes, with One Route per Prefix
Unique Local: Addresses used like IPv4 private addresses. Multiple companies
can use the same IPs, they don't need to get an IP from anywhere.
I IPv6 Addressing and Subnetting
Where and how much do we need IPv6 Subnets, actually we need 4 subnets in
the same IPv4 in the example below.
Unique Local Unicast Addresses Using Unique Local Address IPv6 Subnetting
Unique Local Unicast addresses act as private IPv6 addresses. The division of It's the same as Global Unicast address, except that we don't choose the first two
these addresses into subnets has similar aspects to Global Unicast addresses. digits (8 bits) for prefix, we choose the next 40 bits.
The biggest difference is related to Unique Local addresses (starting with hex FD00:0001:0001::/48, or FD00:1:1::/48
FD) and the management process: Unique Local Prefixes are not registered with
any authority or company and can be used by multiple companies.
• For the /48 Bit Prefix, we must add FD to the Global ID.
Figure 23-9 Using Unique Local Address Subnetting
• Use the next 16 bits as the subnet field.
I Link-Local Addresses
I IPv6 Address Applications
3- The seventh bit of the resulting Interface ID inverts. So if the seventh bit is 0 it
makes 1, if it is 1 it makes 0.
• Gives the Interface an IPv6 Unicast IP. gateway) concept, but in IPv4, hosts use an ip from the same subnet, but IPv6
hosts use the router's Link-Local Ip. In the show ipv6 route command, the
• Allows inbound and outbound IPv6 Routing in the Interface.
neighboring router lists the link-local address of the neighboring router
• Defines the Prefix found in this Interface.
instead of the global unicast or unique local unicast address.
• Interface up/up adds it to the route table.
Link-Local Addresses
IPv6 Link-Local Addresses use as private IPv6 Unicast address. These addresses
are not used to stream data in IPv6 packets. Instead, these addresses are used by
some common protocols and for routing.
Figure 24-6 IPv6 Using Link-Local Addresses as the Next-Hop Address
Link-Local Address Concepts
IPv6 Link-Local Addresses define the rules so that sent packets are not
forwarded by any router to another subnet. As a result, protocol messages that
must remain within the Local LAN use IPv6 Link-Local addresses. For example,
Neighbor Discovery Protocol (NDP), which replaces the ARP functions of IPv4,
uses Link-Local addresses.
I IPv6 Address Applications
Link-Local Address Configuration: If you use EUI-64 format in the interface, Anycast: Like multicast addresses, an anycast address defines multiple
the Link-Local address will be created with the same method, but if you specify interfaces. But there is one big difference: An anycast packet is delivered to a
the IPv6 address as static in the interface, you can configure the Link-Local single address (actually, to the first address it finds, defined by its routing
Address as well. distance). This address is special because you can assign a single address to
more than one interface. You can specify them as one-to-one-of-many addresses,
but just specify them as anycast for convenience.
IPv6 Routes
R1# show ipv6 route static
Cisco Routers follow a similar path to IPv4 when adding IPv6 routes to the route ! Legend omitted for brevity
table. S 2001:DB8:1111:2::/64 [1/0] via Serial0/0/0, directly connected
R1# show ipv6 route 2001:db8:1111:2::22
It adds the IPv6 addresses in the up interface to the route table as local and
Routing entry for 2001:DB8:1111:2::/64
connected. Known via "static", distance 1, metric 0
Route count is 1/1, share count 0
Adds statically entered routes to the routing table.
Routing paths: directly connected via Serial0/0/0
If OSPFv3 is configured, it adds the routes learned from OSPFv3.
Static Routes Using Next-Hop Address:
Static IPv6 Routes
R2's IPv6 address for our Next-Hop address R1, R1's IPv6 address in R2.
Static Routes Using Outgoing Interface:
R1(config)# ipv6 route 2001:db8:1111:2::/64 2001:DB8:1111:4::2
R1(config)# ipv6 route 2001:db8:1111:2::/64 S0/0/0 R2(config)# ipv6 route 2001:db8:1111:1::/64 2001:db8:1111:4::1
FE80::FF:FE00:2, Serial0/0/0
Static IPv6 Host Routes
Last updated 00:08:10 ago
R1(config)#
! The next command also lists host B's address, prefix length /128,
! but with R2's global unicast address as next-hop, and no outgoing
interface.
R1(config)# ipv6 route 2001:db8:1111:2::22/128 2001:DB8:1111:4::2
I IPv6 Routing Applications
Neighbor Discovery Protocol is a protocol that works like ARP in IPv4. NDP plays
an important role on routers. Let's look at some important functions of the NDP
protocol.
Neighbor MAC Discovery: Replaces ARP in IPv4. It can learn a Mac address from
a known IP address. Router Discovery: Allows Hosts in the same subnet to learn
IPv6 Router information.
Figure 25-6 Finding Default Router
SLAAC: When using Stateless Address Auto Configuration (SLAAC), the host
uses NDP messages to learn the prefix information used in the subnet.
DAD: Before the host uses an IPv6 address, it uses Duplicate Address Detection
(DAD) to check if another host is using that IPv6 address.
I RF Overview
Wireless LANs (WLAN) use radio frequencies (RF) radiated into the air from
an antenna that creates radio waves. These waves can be absorbed, refracted or
reflected by water, walls and metal surfaces, reducing the signal strength.
Because of the inherent sensitivity surrounded by these environmental factors, Table 26-1 Wireless Standard Organizations
it is clear that wireless will never be able to deliver the same service that wired
networks can. But this still does not mean that we will not use wireless. Believe
me, we will definitely use it!
Various organizations have long struggled to help manage the use of wireless
devices, frequencies, standards, and frequency spectrum. Table 26-1 shows the
existing institutions around the world that have helped create, provide, and even
implement wireless standards.
I Wireless Networks Fundamentals
more detail in the following sections. Assume for now that the transmitter of communication. If more than one signal is received at the same time with
one device is sending RF signals to the receiver of another device. As shown in wireless communication, they can interfere with each other. The greater the
Figure 26-2, the transmitter can always reach the receiver as long as both number of wireless devices, the greater the likelihood of interference. For
example, Figure 26-4 shows four devices tuned to the same channel and what
devices are tuned to the same frequency and use the same frequency to carry
can happen if some or all data are transmitted simultaneously.
data between them. Everything seems simple, though not very practical.
Basic Service Set Since the operation of a BSS is dependent on the AP, the BSS is limited to the
As a solution, things can be settled with an AP (Accees Point) that every area where the AP's signal is available. This is known as the Basic Set Area
wireless device can connect to. In order for the devices to connect to the AP, the (BSA) or cell. In Figure 26-5 the cell is shown as a simply shaded circular area
AP broadcasts a BSS and the devices use the 802.11 standards to register. The centered around the AP. Depending on the antenna attached to the AP and the
AP BSS broadcasts on a single channel and uses a single channel so that physical environment that may affect the AP's signals, cells may have other
devices can communicate correctly. shapes.
In addition, the AP identifies the wireless network with the Service Set Identifier
(SSID), which is a text string containing a logical name. It broadcasts a name
to the devices to be connected to the network with the AP SSID, and broadcasts
the mac address in the background with a BSSID broadcast for this SSID.
Distribution System
We gathered the BSS and wireless devices in an AP in one place, but for now
they can only communicate with each other, but the task of the beep AP does not
end with BSS only, it needs to communicate the devices connected to the network
with the devices on the wired network. Fortunately, the AP has a wired Ethernet
connection and this It can move the hosts on it to other networks over the
connection. The figure below has an example of how this happens.
example, you may need wireless coverage on all floors of a hotel, hospital, or
other large building. Simply add and configure more APs to cover more areas.
You must configure your network so that the APs communicate with each other
When you leave the coverage area of one AP and enter the coverage area of the
other AP, the host will automatically switch to the other AP without you needing
the signal of the Repeater AP is weak. Normally, the problem should be solved by not have a wireless connection. For example, some mobile medical devices can
pulling a network cable to the area where the signal is weak and putting a new only be designed with a wired connection. While it is possible to plug the device
AP. But if you do not have the possibility to pull a cable and you need an into an Ethernet connection if needed, a wireless connection would be much
urgent solution, you can use this method. more practical. You can use the York group bridge (WGB) to connect the
device's wired network adapter to a wireless network.
connection from one network to another over a long distance. Outdoor Bridged coverage over a very large area. Instead, you can use APs by configuring them
connections are often used to connect buildings or cities. in mesh mode. In a mesh topology, wireless traffic is bridged from AP to AP
RF Overview
To send data over a wired connection, an electrical signal is applied at one end Electromagnetic waves do not travel in a straight line. Instead, they are
and carried to the other. The wire of the cable is continuous and conductive, so transmitted away from the antenna, expanding in all directions. The
the signal is transmitted quite easily. But a wireless connection does not have resulting waves start small and expand outward, only to be replaced by new
any physical path to carry the signal. waves. In empty space, electromagnetic waves expand outward in all three
In RF, the sender (a transmitter) can send an alternating current to a section dimensions.
of wire (antenna), which tunes moving electric and magnetic fields that
Figure 26-16 shows a Simple antenna. The waves produced expand outward
propagate out and away as moving waves. Electric and magnetic fields move
together and are always at right angles to each other, as shown in Figure 26-15. circularly. The waves will eventually reach the receiver in addition to many
The signal must be constantly switched or flipped up and down to allow the other locations in other directions.
At the receiving end of the wireless connection, the process is reversed. As the
electromagnetic waves reach the antenna of the receiver, they create an electrical
signal. If all goes well, the received signal will be a reasonable copy of the
original sent signal.
The electromagnetic waves involved in a wireless connection can be measured Figure 26-18 Frequency Unit Names
and described in several ways. One of the key features is the frequency of the
wave, or the number of times the signal cycles fully up and down in 1 second.
Figure 26-17 shows how a wave cycle can be defined. A cycle begins when the
signal rises and falls from the centerline and rises again. The interval from the
apex of one center to the apex of the other center can be measured as a cycle.
Wherever you start measuring a loop, the signal should make a full row back to
its starting position, ready to repeat the same cyclic pattern.
As the IEEE 802.11 Wi-Fi standard develops and innovations, it specifies these
standards with new names under the 802.11 standard.
I Split-Mac AP Architecture
Autonomous AP Architecture
The primary task of an Access Point is to transmit data from wireless devices to An Autonomous AP must also be configured with a management IP address
a regular wired network. It acts as a bridge between the wired network and the before you can manage remotely (10.10.10.10 in Figure 27-1). Ultimately,
client to allow wireless clients to access the wired network. you will want to configure SSIDs, VLANs, and many RF parameters such as
An Autonomous AP works independently. It offers one or more BSS, we can the channel to use and transmit power. The Management address is not
normally part of data VLANs, so a special Management VLAN (i.e. VLAN 10)
make it work with different Vlans by creating different SSIDs. Figure 27-1
must be created to reach the AP. Unless you are leveraging a management
shows the basic architecture.
platform such as Cisco Prime Infrastructure or Cisco DNA Center, each AP
must be configured individually.
Figure 27-1 Wireless Network Architecture with Autonomous AP Figure 27-2 Data VLANs Coverage with Autonomous AP
I Cisco Wireless Architecture
Split-Mac AP Architecture
Because Autonomous APs work alone, managing RF operations can be quite
challenging. As a network administrator, you are responsible for selecting and
configuring the channel used by each AP, and identifying and dealing with
any Rogue APs that may interfere.
Cloud-Based AP Architecture
Autonomous APs work as standalone and we need to configure and maintain
them one by one or we need to use Cisco Prime Infrastructure. But as our
Cloud-Based Cisco Meraki APs, on the other hand, can be easily managed from
a single center via a Management Portal on the Cloud. It can become very easy
activity.
Figure 27-7 Unified WLC Figure 27-8 Cloud WLC Figure 27-9 Mobility Express WLC Figure 27-10 Embedded WLC
I Cisco Wireless Architecture
Cisco AP Modes
Local: It is the default mode in Lightweight AP. When not transmitting, the AP Bridge : An AP becomes a private bridge (point-to-point or point-to-multipoint)
scans other channels to measure noise level, measure interference, find rogue between two networks. Two APs in bridge mode can be used to connect two
devices, and match intrusion detection system (IDS) events. locations separated by distance.
Monitor: The AP does not transmit at all, but its receiver is made to act as a Flex+Bridge : FlexConnect operation is enabled on a mesh AP.
special sensor. The AP checks for IDS events, detects rogue APs, and locates
SE-Connect : The AP is dedicated to performing spectrum analysis of its radios
stations via location-based services.
on all wireless channels. It sends spectrum analysis data to a PC running
FlexConnect: An AP at a remote location can carry the traffic between the SSID
software such as MetaGeek Chanalyzer or Cisco Spectrum Expert to collect and
and the VLAN locally over the switch, if WLC is turned off or cannot access, if
analyze to discover sources of interference.
WLC and CAPWAP tunneling cannot be established and configured to do so.
Sniffer: An AP is set to receive traffic from other sources such as other 802.11
wireless devices. The captured traffic is then forwarded to network analysis
software installed on a PC, such as Wildpackets OmniPeek or WireShark, where
it can be further analyzed.
Rogue Detector : An AP is set to detect rogue/rogue devices by comparing MAC
addresses advertised on wired and wireless network. Fake devices are devices
that appear on both networks.
Wireless I Secure Connection Anatomy
send goes directly, but in a wireless connection, the clients are not directly with some authentication methods.
connected. Assume that your company's confidential information and documents can
Consider the scenario in Figure 28-1. The wireless user logs on to remote servers be accessed through your wireless network. In this case, only trusted and
and shares a secret password. Since both untrusted users are in range of the known devices should be given access to people. If guest users are allowed, they
client's signal, they can also learn the password by capturing the frames sent should be allowed to join a different guest WLAN where they can access non-
in the channel. It also makes it easier for malicious users to listen and use private or public resources.
only requires that all trusted users know a common preset password on the
APs. The password is stored on the user device and presented directly to the AP
when needed. What can happen if the device is stolen or lost? Most likely, any
user who owns the device can still authenticate to the network. One of the other
cases, the end user must enter a valid username and password, something
Figure 28-2 Encrypting Wireless Data to Protect Data Privacy Figure 28-3 Checking Message Integrity over Wireless Network
I Wireless Network Security
network. These methods became obsolete over time and authentication methods encrypt data sent between a user and an AP. Alternatively, the 802.11
evolved as security vulnerabilities emerged and wireless hardware developed. In standard has traditionally defined Wired Equivalent Privacy (WEP)
this Chapter, I will describe the most common authentication methods you may standards as a method of making a wireless connection more similar or
equivalent to a wired connection.
encounter.
WEP uses the RC4 cipher algorithm to hide each wireless data frame. The same
Open Authentication
algorithm encrypts the data at the sender and decrypts it at the receiver. The
The original 802.11 standard offered only two options for authenticating a
algorithm uses a string of bits, often called a WEP key, as a key to derive other
user: Open Authentication and WEP. Open Authentication offers open access to encryption keys, one per wireless frame. As long as the sender and receiver have
a wireless network, just checking whether users support the wireless standard the same key, one can decrypt the other encryption.
802.11.
WEP keys can be 40 or 104 bits long, represented by a string of 10 or 26 hex
This method is often used in cafes, shopping malls and common places, where
digits. As a general rule, longer keys provide more unique bits for the
authentication is done through a web page. Most operating systems will give
algorithm, resulting in stronger encryption. WEP was defined in the 802.11
you a warning when joining such networks, informing you that your wireless standard in 1999, but in 2001, a number of weaknesses were discovered and
data will not be secure at all if you join such networks. exposed, so work began on finding better wireless security methods. WEP was
officially discontinued in 2004. WEP encryption is considered a weak method
to secure wireless LAN.
I Wireless Network Security
802.1x EAP
A more secure authentication method was needed than Open Authentication
EAP can integrate with the IEEE 802.1x port-based access control standard.
When 802.1x is enabled, access to the network environment is restricted until a Figure 28-4 802.1x Client Authentication Roles
client authenticates. This means that the wireless user cannot transmit data to WLC becomes the agent in the client authentication process and controls user
any other part of the network until successful authentication. access with 802.1x and communicates with the authentication server using the
Authentication is done without Open or WEP authentication. With 802.1x, it EAP framework.
uses open authentication to associate with the client AP and then forwards it to LEAP
a custom authentication server for the actual client authentication process. To close the weaknesses in WEP, Cisco developed a proprietary wireless
Figure 28-4 shows the three-sided 802.1x arrangement: authentication method called Lightweight EAP (LEAP). For authentication, the
client must provide username and password credentials. It asks for passwords
for messages received and sent for both the authentication server and the client.
This ensures mutual authentication as long as the messages can be
successfully decrypted, the client and AS have authenticated each other.
I Wireless Network Security
EAP-FAST PEAP
Cisco has developed a more secure method called EAP Flexible Authentication Like EAP-FAST, the Protected EAP (PEAP) method uses internal and external
with Flexible Authentication by Secure Tunneling (EAP-FAST). authentication, while the AS provides a digital certificate to authenticate with
Authentication information is protected by passing a protected access credential the requester in external authentication.
(PAC) between the AS and the recipient. PAC is a shared password format AS's digital certificate consists of data in a standard format "signed" or
created by AS and used for mutual authentication. EAP-FAST is a sequence of
certified by the Certificate Authority. The third party is known as Certificate
three phases:
Authority (CA) and is known and trusted by both AS and recipients. The
Phase 1: The PAC is created or provisioned and installed on the client.
requestor must also have the CA certificate to be able to verify the certificate
Phase 2: After the requestor and AS authenticate each other, they agree on a
obtained from the AS. The certificate is also used to pass a public key in plain
Transport Layer Security (TLS) tunnel.
view, which can be used to help decrypt messages from the AS.
Phase 3: The end user is authenticated over the TLS tunnel for added security.
Note that only AS is PEAP certified. This means that the requester can easily
verify the AS. The client does not have or uses its own certificate, so it must be
Note that there are two separate authentication processes in EAP-FAST, one with
AS to the requestor and one with the end user. These happen as internal authenticated within the TLS tunnel using one of the following two methods:
Like other EAP-based methods, a RADIUS server is required. However, in order GTC: A hardware device user that generates one-time passwords for the Generic
for the RADIUS server to generate one PAC per user, it must also function as an Token Card, or a manually generated password.
EAP-FAST server.
I Wireless Network Security
EAP-TLS
PEAP uses the digital certificate in AS as a powerful method to authenticate the Note: EAP-TLS is only useful if wireless clients can accept and use digital certificates. Many wireless
devices, such as communicators, medical devices, and RFID tags, have a base operating system that cannot
RADIUS server. Getting and installing certificates on a single server is easy,
interface with a CA or use certificates.
but EAP Transport Layer Security (EAP-TLS) requires installing certificates
With EAP-TLS, AS and client exchange certificates and can authenticate each
other. A TLS tunnel is then built so that encryption keys can be exchanged
securely.
implement a Public Key Infrastructure (PKI) that can securely and efficiently
issue certificates and revoke them when a client or user no longer needs access to
customers.
I Wireless Network Security
MIC: This efficient algorithm adds a hash value every frame as a message The Advanced Encryption Standard (AES) is the current encryption algorithm
integrity check to prevent tampering; often referred to as “Michael” in adopted by the US National Institute of Standards and Technology (NIST) and the
US government and widely used all over the world. In other words, AES is public
unofficial reference to the MIC.
and offers the most secure encryption method available today.
Time Stamp: A timestamp is added to the MIC to prevent attacks that
attempt to reuse or reconstruct previously sent frames. For CCMP to be used to secure wireless networks, client devices and APs must
support AES Counter mode and CBC-MAC in hardware. CCMP is not available on
TKIP sequence counter: This feature provides a record of frames sent by a
devices that only support WEP or TKIP. CCMP is used with WPA and WPA2.
unique MAC address to prevent frame tampering.
Key mixing algorithm: This algorithm calculates a unique 128-bit WEP GCMP
key for each frame. Galois/Counter Mode Protocol (GCMP) is a robust authentication encryption suite
that is more secure and more efficient than CCMP. GCMP consists of two
algorithms:
AES counter mode encryption
Galois Message Authentication Code (GMAC) used as a message integrity check
(MIC) GCMP is used with WPA3.
I Wireless Network Security
I WLAN Configuration
I Creating a Wireless LAN
working with one or more Wireless LAN Controllers. You must know how to Service Port: Used for system recovery and first boot functions, always
connect each AP type to the switch side so that the APs can forward traffic connected to a switch port in access mode.
between the appropriate VLANs and WLANs. Distribution System Port : Used for all normal AP and AP management traffic,
usually connected to an 802.1Q trunked switch port.
Console Port : Used for system recovery and first boot functions; with a terminal
program (9600 baud by default, 8 data bits, 1 stop bit)
Redundancy Port: It allows us to backup the system by connecting a second
WLC.
When you open the web browser by typing management IP, you will see the first login
screen. Click the Login button as shown in Figure 29-2; then enter your user credentials
when prompted.
Figure 29-3 Switching to the Advanced Configuration Interface
WLAN Configuration
It works with a Wireless LAN Controller and APs to provide network
connectivity to wireless clients. The AP broadcasts an SSID so that the client
can join. It connects to the switch via one of the WLC dynamic Interfaces. To
complete the path between SSID and VLAN as shown in Figure 29-7, we first
need to create a WLAN in WLC.
Figure 29-11 Defining a Dynamic Interface Name and VLAN ID Figure 29-12 Editing the Dynamic Interface Parameters
I Creating a Wireless LAN
Figure 29-14 Creating a New WLAN Figure 29-15 Configuring the General WLAN Parameters
I Creating a Wireless LAN
Figure 29-16 Configuring Layer 2 WLAN Security Figure 29-17 Selecting RADIUS Servers for WLAN Authentication
I Creating a Wireless LAN
QoS Configuration
I Using DNS
TCP/IP Layer 4 Transport Protocols: TCP and UDP TCP - Transmission Control Protocol
The main difference between TCP and UDP is that TCP provides a wide variety Figure 30-1 shows TCP header fields. You do not need to memorize the names
of services to applications but UDP does not. For example, routers drop packets or locations of the fields. We'll cover more in the remainder of this section.
for many reasons, including bit errors, congestion, and when the correct route
is not known. Many data link protocols detect errors but discard frames with
errors, but TCP provides retransmission (error recovery) and helps prevent
congestion (flow control), but UDP does not retransmit. As a result, many
But do not think that UDP is worse than TCP because of its shortcomings. By
providing fewer services, UDP headers require fewer bytes than TCP, which
means less byte overhead on the network. UDP software does not slow down data
transfer when TCP is slow. Also, some applications, especially Voice over IP
(VoIP) and Video over IP today, don't need error recovery, so they use UDP.
Known (System) Ports: These are the ports used by the system, ports 0 to 1023 Figure 30-3 shows an example using three temporary port numbers on the left
are designated by IANA to be used by the system. user device; The server on the right uses two system ports and one user register
User Register Ports: Fewer rules apply by IANA to assign these ports compared port. Computers use three applications at the same time; therefore, the three port
to system ports, ports 1024 to 49151. connection is open. Because a port on a single computer must be unique, the
Temporary (Dynamic, Dedicated) Ports: Numbers 49152 through 65535 that connection between two ports must identify a unique port between the two
are unassigned and intended to be temporarily assigned and used for a client computers. This uniqueness means you can use multiple applications at the
application dynamically while the application is running. same time by talking to applications running on the same or different
applications.
using port numbers, and requires less byte overhead and less processing than the Internet is to use applications such as web browsing, text messaging,
TCP. email, file downloads, audio and video. In this Chapter we will examine a
Applications using UDP are tolerant of lost data or have some application specific application for web browsing using Hypertext Transfer Protocol
mechanism to recover lost data. For example, VoIP uses the UDP protocol because (HTTP).
if a voice packet is lost, there is too much delay until the lost packet is detected
The World Wide Web (WWW) consists of all Internet-connected web servers in
and retransmitted, and the voice is unintelligible so it uses UDP because the
the world and all Internet-connected users with web browsers. Web servers store
UDP protocol works faster than TCP. . Also, DNS requests use UDP because the
information (in the form of web pages) that can be useful to different people. A
user will retry an operation if DNS requests fail. As another example, Network
web browser installed on the end user's computer wants to connect to a web
File System(NFS), a remote file system implementation, performs recovery
with application layer code, so UDP features are used by NFS. server and view the web pages stored on the web server.
Several specific application processes must occur for this process to work. The
user must somehow define the server, the particular web page, and the protocol
used to retrieve data from the server. The client usually finds the web server's IP
Figure 30-5 UDP Header address using DNS. The client must request the web page consisting of
multiple individual files and the server must send the files to the web browser.
I TCP/IP Transport and Applications
address to which we will connect to the browser, for example www.cisco.com. usually list the name of the server. The web browser cannot send an IP packet
The browser user can identify a web page when you click something on a web on behalf of the target web server, but the target web server can send a packet to
page or enter Uniform Resource Identifiers (URI) in the browser's address field. the IP address. So, before the browser sends a packet to the web server, the browser
Both options (clicking a link and typing a URI) point to a URI because when usually needs to resolve the name in the URI and the corresponding IP address
you click a link on a web page that link actually points to a URI. of that name. When we examine the example below, we can see how the process
takes place.
URIs used to connect to a web server include three basic components as outlined
in Figure 30-6. The figure shows the official names of the URI fields. More
importantly, remember that the text before // identifies the protocol used to
connect to the server, the text between // and / identifies the server with its
http://www.yavuzbulut.com/blog
Figure 30-6 Web page URI example Figure 30-7 DNS Resolution and Web Page Request
I TCP/IP Transport and Applications
server listing the filename. If the server decides to send the file, the server sends
an HTTP GET response with a return code of 200 (meaning OK) with its
contents.
Web pages often consist of multiple files. Most web pages contain text as well as
Each of these components is stored as a different file on the web server. To get
them all, the web browser takes the first file. This file may (and often does)
contain references to other URIs, so the browser requests other files as well. Figure Figure 30-8 Multiple HTTP GET Requests/Responses
30-8 shows the scanner receiving the first file and then the other two files.
I Basic Access Control List
However, ACLs can also be used for many other IOS features. As an example, server S1. Each arrowed line represents a location and direction in which a
ACLs can be used to match packages to implement Quality of Service (QoS) router can filter sent packets.
priority we want. For example, voice packets need to have very low latency so
that ACLs can match voice packets and QoS logic transmits voice packets
faster than data packets.
exit an Interface. In other words, the ACL is associated with an Interface and Figure 31-1 Packet traffic from user A and B to S1 server
packet flow direction (In or Out). In other words, the router checks the applied
ACLs in the In or Out direction of the Interfaces without making the routing
When you think about the location and direction of an ACL, you should ✓ Standard numbered ACLs (1–99)
already be thinking about which packets you want to allow or block. You must
✓ Extended numbered ACLs (100–199)
configure the router with an IP ACL that matches the packets. They are lists of
✓ Additional ACL numbers (1300–1999 standard, 2000–2699 extended)
how to configure ACL commands to look at each packet, and which packets
For example, imagine that you allow the traffic from Host A to the S1 server ✓ Improved editing with sequence numbers
and limit the outgoing traffic from the Host B user as in Figure 31-2, there are
already Host A and B IPs, we know where they want to go, accordingly, by
writing an ACL in R2, this is the ACL that we have decreased. We must
configure ' as In or Out in the right direction under S0/0/1 Interface. The
When you type the access list line as above, the access list allows all IPs
in the range from 172.16.8.0 to 172.16.11.255.
172.16.8.0
0. 0.3.255
+
———————————————
172.16.11.255
Figure 31-4 Using Wildcard
Note: When we add Subnet and Wildcard, we nd the IP range that ACL will control in an easy way.
fi
I Basic ACL - Access Control List
Enter configuration commands, one per line. End with CNTL/Z. R1(config)# access-list 1 permit 10.2.2.1
R1(config)# access-list 2 remark Bu ACL S2 Sunucusunun Host C Subnetine Erisimine Izin Verir
R2(config)# access-list 1 permit 10.1.1.1
R1(config)# access-list 2 permit 10.2.2.2
R2(config)# access-list 1 deny 10.1.1.0 0.0.0.255 R1(config)# interface Fa0/0
R2(config)# access-list 1 permit 10.0.0.0 0.255.255.255 R1(config-if)# ip access-group 1 out
R2(config)# interface S0/0/1 R1(config)# interface Fa0/1
R1(config-if)# ip access-group 2 out
R2(config-if)# ip access-group 1 in
I ACL with Extended Number
I Named ACL
the source and destination port number fields. Port numbers identify the and in the second example, it is done with the source port.
Figure 32-4 TCP Header and Port Number Fields After IP Header
Or
interface Ethernet0
ip address 172.16.3.1 255.255.255.0
Figure 32-8 Extended ACL Lab - 1 ip access-group 103 in
access-list 103 remark deny Bob to FTP servers in subnet 172.16.1.0/24
access-list 103 deny tcp host 172.16.3.10 172.16.1.0 0.0.0.255 eq ftp
access-list 103 permit ip any any
fi
I Extended ACL
Lab-2
1- Sam cannot access the subnet where Bugs and Daffy are located. We are making our configuration on the Yosemite Router.
interface ethernet 0
2- Users on the Yosemite subnet cannot access the Seville subnet
ip access-group 110 in
3- Do not block the remaining traffic. !
access-list 110 deny ip host 10.1.2.1 10.1.1.0 0.0.0.255
access-list 110 deny ip 10.1.2.0 0.0.0.255 10.1.3.0 0.0.0.255
access-list 110 permit ip any any
Although they do the same things as Standard and Extended ACLs, they have Router# show running-config
some differences; ip access-list extended barney
permit tcp host 10.1.1.2 eq www any
Using names instead of numbers to describe the ACL makes it easy to
deny udp host 10.1.1.1 10.1.2.0 0.0.0.255
remember what we wrote the ACL for. deny ip 10.1.3.0 0.0.0.255 10.1.2.0 0.0.0.255
deny ip 10.1.2.0 0.0.0.255 10.2.3.0 0.0.0.255
Using ACL subcommands instead of global commands to define parameters. permit ip any any
Using ACL editing features that allow the CLI user to delete individual lines
To delete a line where we wrote an edit.
from the ACL and add new lines. Router(config)# ip access-list extended barney
Router(config-ext-nacl)# no deny ip 10.1.2.0 0.0.0.255 10.2.3.0 0.0.0.255
Security Architecture
I Security Threats
I Types of Attacks
Security Terminology
Assuming that in a perfect world every user has access to everything on the The organization may want Guest users to connect to the wireless network. If
network and every user makes full use of the available resources, you can create the business offers a wireless connection to its employees (and guests), these
a network open to every user in a company. The network shown in Figure 33-1 signals can be accessed by unauthorized malicious people. And the list goes on.
may represent such a scenario. Even this ideal closed system is not completely As the network and its connectivity expands, the business will have more
secure, as a user may want to annoy a co-worker or view information on a
difficulty maintaining the secure, closed boundary around itself, as seen in
company server that should be restricted or confidential.
Figure 33-2.
Security Threats
Because modern enterprise networks often consist of many parts working For example, an attacker could send packets from a fake IP address instead of
together, securing them can become a very complex task. You can't attempt to his own IP address as shown in Figure 4-4. When the target receives the packets,
secure it until you identify and assess most vulnerabilities and understand it sends return traffic to the fake address that came to it instead of the
where the threats might come from. Appropriate measures and mitigation attacker's real address. If there is a fake address, this device will receive the
measures can be taken after making the determinations. packet. If there is no address, it will be forwarded first and then dropped.
Spoofing attacks focus on this vulnerability. Attacks usually occur by An attacker can also send fake MAC addresses to add false information to
replacing the required information with fake information. Address Spoofing mac tables or ARP tables used by the switch. Fake MAC addresses can also be
attacks can be simple and straightforward; where one address value is replaced sent to the DHCP server and fill the address distribution pool, leaving no
by another. empty IP addresses for normal use.
I Security Architecture
server. The TCP connection starts with the malicious user sending the SYN
flag, but the sourec IP address is replaced with a fake one. The server adds the
TCP connection to the client connections table and responds to the bogus
address with a SYN-ACK. Because the spoof address is not included in the TCP
The incomplete connection remains in the server's table until it times out and is
removed. During this time, the attacker could try to open so many connections
that the server's connection table is populated. At this point, the server is no
longer able to respond to TCP connections with real users, so the server is
Man-in-the-Middle Attack
The man-in-the-middle attack uses the ARP table. Normally, if one host needs Step 1: Client sends arp request to ask which mac address 198.51.100.10 is
to send data to another, it looks for the host to which it will send data in the using.
ARP table. If found in the arp table, the Ethernet frame can be sent directly to Step 2: The arp request goes to everyone on the network. The attacker listens to
the destination MAC address; if it cannot find it in the arp table, it issues an the network and prepares.
ARP request containing the IP address of the target and should wait for the Step 3: The attacker sends his own mac address.
target to respond with an ARP response and its own MAC address.
Now the attacker has come between the server and the client, the traffic now
passes through the attacker.
However, some systems and applications have vulnerabilities that could allow spy on users as they enter their credentials.
Accounting : What did the user do? Developing a Security Program to Educate Users
AAA servers typically support the following two protocols to communicate with An effective approach a business can take to improve information security is to
corporate resources: educate users through a corporate security program. Many users may not have
TACACS+: A Cisco proprietary protocol that separates each of the AAA IT knowledge, so they may not recognize vulnerabilities or realize the
functions. Communication is secure and encrypted over TCP port 49. consequences of their own actions. For example, if a corporate user receives an
RADIUS: A standards-based protocol that combines Authentication and email message threatening to expose some illegal behavior, they may be tempted
Authorization into a single source. Communication uses UDP ports 1812 and to click a link to a malicious site. Such an action could introduce malware or
1813, but Accounting is not fully encrypted. worms to a user's computer that could affect business operations.
Network
I Securing IOS Passwords
I Firewall
command.
Hiding IOS Passwords
When we look at the passwords on Cisco IOS devices with show running-config,
you will see that these passwords are not hidden, we can protect these passwords
line vty 0 4
login local
access-class 3 in
!
! Next command is a global command that matches IPv4 packets with ! a
source address that begins with 10.1.1.
access-list 3 permit 10.1.1.0 0.0.0.255
I Securing Network Devices
(ASA) Firewall Internet connected to a Cisco router. All corporate traffic to and
from the Internet is sent through the firewall. Firewall considers its own rules
Figure 34-2 Traditional Firewall Usage Figure 34-3 Firewall Zone Usage Example
I Securing Network Devices
packets travel through the network and filter packets, but make their decisions
with different logic. IPS first downloads a database of exploit signatures. Each
used by different vulnerabilities. The IPS can then examine the packets,
compare them with known exploit signatures, and recognize when packets
might be malicious. Once defined, IPS can log the event, discard packets, and
A traditional IPS differs from firewalls in that we create the rules on the Figure 34-4 IPS and Signature Database
firewall, based on the port numbers of the applications when creating these rules,
• Dos
• DDos
• Worms
• Viruses
I Securing Network Devices
on the switch, the engineer can use switch port security so that only those devices
In the figure below, when PC1 will be connected to port F0/1 in SW1, if switch
port security is enabled on that port, the mac address of the connected device will Figure 35-2 Switch Port Security Methods
be checked.
There are four different methods of implementing switch port security, shown
Shutdown Mode
The default violation mode is shutdown, the port becomes errdisable in case of
violation, we can see the status by using the show interfaces Fa0/13
I DHCP Relay
I DHCP Configuration
I DHCP
DHCP Concepts
The host acts as a DHCP client. As a DHCP client, the host starts without IP
settings No IPv4 address, no subnet mask, no default gateway and no DNS
server IP address. However, a DHCP client knows about the DHCP protocol, so the Figure 36-1 DHCP Discover and Offer
client can use this protocol to find a DHCP server or request to lease an IPv4
address.
I DHCP
DHCP Relay
DHCP packets are sent on the same subnet and within the vlan. Setting up a
DHCP server in every vlan and subnet will not be very functional. For this, you
need to forward your requests from the subnet you are on to the subnet where
DHCP is located, for this we use a DHCP relay IP helper address, as in the example
below.
DHCP Snooping
I DHCP Snooping Logic
I DAI Configuration
I DHCP Snooping ve Arp Inspection
DHCP Snooping
DHCP Snooping is to observe and block unwanted DHCP packets on our
network. For example, a malicious user connected to the switch can install a
DHCP server program on his computer and try to distribute IP by responding
to DHCP requests from the network, we can use DHCP snooping to prevent
this.
Figure 37-2 DHCP Attack Distributes correct IP but shows itself as GW.
As in Figure 37-2, the attacker listens to DHCP requests coming from the
Figure 37-3 DHCP Attack Man in the Middle
network with the DHCP server software she installed on her own computer and
tries to attack by giving false information.
I DHCP Snooping ve Arp Inspection
ip dhcp snooping
Figure 37-4 DHCP Snooping Operating Rules
ip dhcp snooping vlan 10,20,30
no ip dhcp snooping information option
Step 1: Examines all incoming DHCP messages. ip dhcp snopping database flash:/snoopy.db
!
Step 2: Blocks DHCP server messages. interface GigabitEthernet1/0/2
Step 3: Filters if user requests. ip dhcp snooping trust
For DISCOVER and REQUEST messages, it checks for MAC address Limiting DHCP Messages
consistency between Ethernet frames and DHCP message. We can limit the dhcp messages that users can send.
Checks the IP address in the DHCP Snooping binding table for RELEASE or
errdisable recovery cause dhcp-rate-limit
DECLINE messages from the port. errdisable recovery interval 30
!
Step 4: Create a new entry in the DHCP Snooping binding table for unfiltered interface GigabitEthernet1/0/2
ip dhcp snooping limit rate 10
messages whose DHCP process is successful. !
interface GigabitEthernet1/0/3
ip dhcp snooping limit rate 2
I DHCP Snooping ve Arp Inspection
messages from untrusted ports to filter out who it believes to be part of an wants to know the MAC address of that host. However, for certain reasons, a host
attack. The key feature of DAI compares incoming ARP messages with two may want to obtain information about all host MAC addresses in the subnet. It
data sources: the DHCP Snooping Binding table and any configured ARP can be useful, for example, when a host changes its MAC address.
ACLs. If the incoming ARP message does not match the tables in the switch,
For example PC A ; Instead of PC1, it sends an Arp Reply because my mac
the switch discards the ARP message.
address has changed and updates the mac table in R2. At this point, when R2
mac address in the Ethernet frame instead of PC1's MAC address. Let's take a
Figure 37-7 Incorrect Use of ARP Response Causes Incorrect ARP Data on R2.
I DHCP Snooping ve Arp Inspection
1- PC1 sends message to some server on left side of R2. Dynamic ARP Inspection Logic
2- Server returns to PC1 IP address, but R2 sends PC 1's chest to PC A's mac If a host does not yet have an IP address, that is, the DHCP process has not been
address. completed, it does not need to use ARP. After the host learns an IP address and
3- PC A copies the package for later viewing. subnet mask, it needs ARP to learn other host MAC addresses or the default
4- PC A forwards the packet in the new frame to PC1, so PC1 continues to work. router in the subnet, so it sends some ARP messages. In short, it becomes DHCP
DAI compares the starting IP and starting MAC address fields of the ARP
message with the DHCP Snooping Binding table for all untrusted ports. Allows
DAI ARP if found in the table, but discards DAI ARP if not.
Figure 37-9 DAI Filtering ARP Based on DHCP Snooping Binding Table
I DHCP Snooping ve Arp Inspection
Note that although DAI can use DHCP Snooping Binding data as shown here, it
can also use similar statically structured data that lists the correct IP and MAC
address pairs through a tool called ARP ACL. Using ARP ACLs with DAI is
useful for ports connected to devices using static IP addresses rather than
DHCP. Note that DAI looks for both DCHP Snooping Binding data and ARP
ACLs.
Figure 37-10 DAI Configuration
I Various IP Services
Device I System Message Logging (Syslog)
System Message Logging (Syslog) Saving Log Messages for Later Review
Cisco devices can send detailed system messages or notification messages. It is When the console is logged on via telnet and ssh, IOS sends messages to the
important to record these messages in order to keep these messages and to be able console and terminal sessions, and then IOS deletes the message. It's helpful
to be warned beforehand of problems that may occur on the network, there are to keep a copy of the log messages for later review, so IOS provides two basic
When you want to log on to Cisco IOS devices and look at them instantly, we can If we enter the logging buffered command while in global mode, IOS
give you real-time status information or save it for future viewing. will store these messages in ram, we can see them later with the show logging
command.
Real-Time Message to Existing Users
Our other option is to send messages to a syslog server and store them there.
By default IOS shows log messages to all users. In fact, if you're using a console logging host {address | hostname}
port, you've probably noticed a lot of syslog messages like Interfaces up or down. We can send it to the server by entering the command.
The logging monitor command must be active in global configuration mode
in order for users connecting via Telnet and SSH to see these messages
instantly, and if the user wants to see these messages when connected, he or she
must also use the terminal monitor command in exec (enable) mode.
show logging
Figure 38-4 Logging command options
I Device Management Protocols
Network Time Protocol (NTP) Setting the Clock and Time Zone
It is very important that the time information is correct when recording system R1# configure terminal
log messages, let's take another example, there are problems in the serial Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# clock timezone UTC 3 0
connection between R1 and R2, and the OSPF connections are constantly
R1(config)# clock summer-time utc recurring last Sun Mar 1:00 last
having problems, and you look at the system messages and see the results as Sun Oct 1:00
below. R1(config)# ^Z
R1#
R1# clock set 20:52:49 21 October 2015
R1# show clock
20:52:55.051 EDT Wed Oct 21 2015
Since the time information of the two routers is not correct, it will be very
difficult to solve the problem by looking at the logs, so time information is very
important in systems. We use NTP so that the clocks on the devices are
as an NTP server, not as an NTP client. The device gets the time information ntp server 172.16.3.3
! Configuration on R3:
from the internal clock in the device.
ntp master 2
ntp server {address | hostname}: NTP client / server mode — device
R1# show ntp status
acts as both client and server. First, it acts as an NTP client to synchronize
Clock is synchronized, stratum 4, reference is 172.16.2.2
time with a server. Once synchronized, the device can act as an NTP server to nominal freq is 250.0000 Hz, actual freq is 250.0000 Hz, precision is
provide time to other NTP clients. 2**21 ntp uptime is 1553800 (1/100 of seconds), resolution is 4000
reference time is DA5E7147.56CADEA7 (19:54:31.339 EST Thu Feb 4 2016)
enter ntp.ulakbim.gov.tr , tr.pool.ntp.org and directly nep server IP information. ntp master 7
178.79.155.116 193.140.100.40
In other Routers, we can enter R1 and R2 ip as ntp servers.
R1 and R2 also do not reach the ntp servers when the internet connection is
gone, so we used the ntp master command to continue the ntp server task to
other devices.
By making stratum 7 for R1 and R2, we have taken it to a worse level than
interface gigabitEthernet1/0/19
lldp transmit
lldp receive
!
interface gigabitEthernet1/0/20
lldp receive
show lldp
show lldp interface g1/0/2
show lldp traffic
SW2# show lldp entry R1
I NAT Concepts
I Dynamic NAT
Network Address Translation I Overload NAT (PAT)
I NAT Configuration
I Network Address Translation
were provided with access to the internet environment, but in the 1990s, with the
slow spread of the internet, it was understood that IPv4 addresses would not be
Many short-term solutions to the addressing problem have been proposed, but
three standards have been focused on to solve the problem. Two of the standards Figure 39-1 Example of CIDR Usage
each organization. The Internet Assigned Numbers Authority (IANA) does this
IP allocation.
Figure 39-2 Private IP Range
I Network Address Translation
used.
Figure 39-3 Exchange of Public IP with Private IP address NAT Figure 39-4 Static NAT Example
I Network Address Translation
Dynamic NAT
Overloading NAT with Port Address Translation (PAT)
In Dynamic NAT, imagine we have five public IPs available as in the example,
We use Nat Overload or Port Address Translation (PAT) when we have only
and we have five users on the Inside side. We create a Pool for these five public
one public IP. It is the most commonly used method. In this example, we have
IPs and when an insider accesses the internet, we dynamically give the IPs in
three users and all of them want to connect to a web server using port 80,
this Pool to these users.
where the NAT device takes the IP addresses and port numbers, converting
Figure 39-5 Example of Dynamic NAT Figure 39-6 NAT Overload (PAT) Example
I Network Address Translation
QoS
I Bandwidth, Delay, Jitter, and Loss Management
I Traffic Types
I Queuing
interfaces operate at higher speeds, WAN interfaces operate at slower speeds. help us manage the traffic on our network. These features are;
While the router is busy sending packets waiting on this WAN interface, • Bandwidth
hundreds or even thousands of IP packets may come from the LAN
• Delay
interface and it has to transmit all of them from the same WAN interface.
• Jitter
What should the router do? Send them all in the order they came in?
• Loss
Prioritize packets to send earlier than others, preferring one type of traffic
over another? Delete some packets when the number of packets waiting to Bandwidth ; Expresses the speed of a connection in bits per second (bps). The QoS
exit the router is too large? feature determines which packet is sent over the next connection; and controls how
much bandwidth each traffic type can use over time.
In the paragraph above, we talked about some of the many classic Quality Delay ; It can be defined as the round-trip delay in outgoing and incoming packets.
of Service (QoS) questions on the network. For example, WAN router jitter ; It refers to the variation in one-way delay between consecutive packets sent by
interfaces queue pending packets. The router may use a queue scheduling the same application.
algorithm to determine which packets will be sent first or later, and may Lost ; usually refers to the number of lost messages as a percentage of packets sent.
prioritize some packets and hold other packets. The comparison is simple: for some application, if the sender sent 100 packets and
only 98 reached the destination, that application stream lost 2 percent.
I Quality of Service
Traffic Types
Data Applications Voice and Video Applications
First, consider a basic web application that is on a user PC or tablet. The user A phone call between two IP phones will create a flow for both directions. For
enters an address to open a web page. This request may require a single packet to video it can be security camera or Video conference call traffic.
be sent to the web server, but may result in hundreds or thousands of packets
VoIP takes the sound of a conversation made on one phone and puts it in IP
being returned to the web client, as shown in Figure 40-1.
packets so that it can be heard on the other phone. Figure 40-2 illustrates the
general idea.
A chip called a 2-codec processes (digitizes) the audio to generate binary code
Figure 40-1 HTTP Traffic
for a given time (usually 20 ms). Usually the G.711 codec is used 160 bytes.
So what is the impact of bandwidth, delay, jitter and loss on an interactive web-
3-The phone encapsulates the data in an IP packet.
based application? First, packages require a certain amount of bandwidth
4-The phone sends the packet to the target IP phone.
capacity. As for delay, each of these packets takes some one-way delay from
With the G.711 codec, this single call also requires approximately 80 Kbps of Classification and Marking
bandwidth (data-lik added on header and trailer). If we include the headers QoS tools, such as ACLs, stop on the path that packets take as they are
and VoIP payload as in the figures, each of the IP packets has 200 bytes. Each transmitted over a router or switch and check the passing traffic. Like ACLs,
holds 20 ms of digital audio, so the phone sends 50 packets per second. Each QoS tools are enabled for one direction on interfaces.
of these 50 packets of 200 bytes is equivalent to 10,000 bytes per second, or
80,000 bits per second, or 80 Kbps. Other audio codecs require less bandwidth, The term classification refers to the process of matching fields in a message to
the widely used G.729 takes about 24 Kbps (data-ness added on header and select a QoS traffic. So, if we compare QoS tools again with ACLs, they classify
trailer). and filter like ACLs; i.e. ACLs match (classify) package headers. ACLs help us
You can get quality voice traffic over an IP network, but you must implement decide which packages to discard or which packages to choose.
QoS to do so. QoS tools are tuned to respond to the behavior required by
different types of traffic. Cisco recommends the following guidelines for For example, if we enable QoS on the output interface of the router as in Figure
quality voice traffic: Video call For video; 40-3, it will classify the outgoing traffic according to the rules we set and put it
in a queue (Queue).
• Delay (one-way): 150 ms or less. • Bandwidth: 384 Kbps to 20+ Mbps
• Loss: 0.1%–1%
I Quality of Service
hosts (not shown) on the right of the figure. The first switch SW1 to forward
the packet does some mixed comparisons and marks the Differentiated
Services Code Point (DSCP) field of the packet as a 6-bit field, which means
the QoS flag in the IP herader. The next three devices that process this
Figure 40-3 Classifying and Queuing Traffic on a Router
message—SW2, R1, and R2—use simpler mapping to classify the packet,
Step 3: The output interface of the router keeps the waiting packets in the
output queue.
Step 4: The scheduling logic of the Quene agent selects which packet to
Sometimes we can apply QoS to both the input and output interfaces of the
devices, which may cause the performance of the devices to decrease. It Figure 40-4 Systematically marking and classifying
recommends matching on packet headers recommended by both Cisco and
This Chapter delves a little deeper into the Classification on routers, and we'll NBAR2 looks at more in a message than the ACL can review. Many
take a closer look at the marking function. applications cannot be identified by well-known port numbers alone. NBAR
classification. For example, the Cisco WebEx application provides audio and video conferencing
on the web. In a QoS plan, you may want to categorize WebEx differently from
other video traffic and categorize it differently from voice calls between IP
phones. That is, you can classify WebEx traffic and give it a unique DSCP
mark. NBAR provides easy built-in matching capability for WebEx and more
Figure 40-5 Five classification areas used by the Extended ACL
than 1000 different app subcategories.
For example, if all IP phones use a subnet in the address range of 10.3.0.0/16,
Pairing apps with NBAR2;
we can configure an extended ACL to map all its packets in the 10.3.0.0/16
subnet and use this ACL for QoS operations suitable for voice traffic.
IP Header Marking
Marking a QoS field in the IP header works well because the IP header goes from The IPP only gave us eight (0-7) different values to mark, so later RFCs
the source host to the destination host. When a host sends data, it sends the redefined the ToS byte with the DSCP field. DSCP increased the number of
data-link frame that contains the IP packet. Each router that forwards the IP mark bits to 6 bits and allowed 64 unique values that could be marked. DSCP;
packet assigns the old data-link header and adds a new header. Because routers It was considered the most common method to use when doing QoS in the late
do not discard and re-place IP headers, the flagging fields in the IP header 1990s, and it has become quite common to use the DSCP field for marking.
remain unchanged until they reach the destination host.
It defines a Type of Service (ToS) byte in the IP header as shown in Figure 40-6.
The original RFC defined a 3-bit IP Precedence (IPP) field for the QoS flag. This
field gives us eight separate binary values, for example 000, 001, 010, etc. - 111 -
Another useful Marking field is in the 802.1Q header. In the third byte of the
802.1Q header, it is marked as a 3-bit field and provides eight possible values
to mark (see Figure 40-7). It goes by two different names: Class of Service or
The 802.1Q header is not included in all Ethernet frames. The 802.1Q header
tools can only use CoS space for QoS features enabled on interfaces using
The end-user device can flag the DSCP domain or even the CoS domain if
trunk is used for the connection. Would you trust these devices and allow
Most of us wouldn't, because anything the end user controls can be used
inappropriately at times. For example, a PC user might know that for Voice Figure 40-9 Confidence Boundary SW
traffic it is marked with a DSCP called Expedited Forwarding (EF) 46. Since
46.
QoS plan creators must choose where to place the trust boundary of the network.
The trust boundary refers to the point in a packet path flowing over the network
at which network devices can trust valid QoS signals. This limit is typically
Figure 40-10 Confidence Limit IP Phone
located on a device under the control of IT personnel.
I Quality of Service
recommending specific Markings for certain types of traffic. Thus, values that are intended to be used in concert with each other.
manufacturers can use these default settings for QoS features, so that QoS Assured Forwarding defines specific AF DSCP text names and equivalent
can work better between different brands and devices. decimal values as listed in Figure 11-11. Text names follow an AFXY format;
There are three DSCP values used in marking in DiffServ. EF-AF and CS X corresponds to Queue (1 to 4) and Y corresponds to drop priority (1 to 3).
(a single value) for packets that require low latency (delay), low jitter, and low
loss. Defines DSCP 46 and an equivalent text name (EF). QoS configuration
commands allow the use of a decimal value or text name, but one purpose of
using the text abbreviation is to make the value more memorable, so many
Figure 40-11 Differentiated Services Assured Forwarding Values and Meaning
QoS configurations refer to text names.
For example, if you marked the packet value 12, AF11, AF12, and AF13 all
Many times QoS plans use EF to flag voice payload packets. By default, Cisco
enter a single Queue; Those with AF21, AF22 and AF23 enter another queue;
IP Phones mark voice packets with EF and send signaling (sip, scp) packets
and such that. For the same Queue, AF21 takes priority and AF23 stays last.
with CS3.
I Quality of Service
different devices in the same enterprise will complicate the deployment of QoS.
Without going into the depth of any QoS plans, the plans all set some
packets while they wait for their turn to exit an interface. In Figure 40-13, the to provide the least bandwidth for each class. That is, each class receives at least
output interface sends the first comer in a single queue, according to the the amount of bandwidth configured, but perhaps more based on availability
queued traffic. Since QoS tools are not used here, Interface sends the first later on. CBWFQ allows us to define weights as a percentage of link bandwidth
incoming traffic respectively. while using a weighted sequential turn timing algorithm. Figure 40-15 shows
an example where three queues in the system are given 20, 30 and 50 percent of
In Figure 40-14, there is more than one queue and it exits Interface in order
of priority. Figure 40-15 CBWFQ Round-Robin Scheduling
With the queuing system shown in the figure, if the outbound link is
congested, the scheduler guarantees the percent bandwidth shown in the
figure for each queue. That is, queue 1 takes 20 percent of the connection
even at peak times. In this method, the bandwidth is guaranteed, but the
Figure 40-14 Queue traffic with QoS applied
output is determined by the sequential return algorithm.
I Quality of Service
Unfortunately, a round-robin timer does not provide enough low latency, jitter or
The solution, LLQ, tells the scheduler to treat one or more queues as special priority
queues. The LLQ scheduler always receives the message after one of these special
priority queues. Problem solved: very little delay for packets in this queue causes
very little flickering. Figure 11-17 shows adding LLQ logic for the audio queue.
In LLQ, we guarantee bandwidth with priority, and if voice traffic comes in the
horizontal dashed line on the left represents the rate configured for policing.
Therefore, policing has information about the measured bitrate over time, which
Figure 40-18 Ethernet WAN: Link Speed Versus CIR
can be compared to the preset rate. The right side of the figure cuts off excess
traffic at the rate set for policing. Now imagine you have a 200 Mbps metro ethernet connection as shown in the
figure. But keep in mind that the connection speed between the router and the
switch is 1 Gbps. Since the traffic leaving us is 1 Gb, but our main connection
speed is 200 Mbps, the packets leaving us will be held by the ISP, but we can
Shaping
You have a 1 Gbps connection between an ISP's metro ethernet switch and your
router, but the speed you get from the ISP is 200 Mbps, the ISP will not always
allow traffic exceeding 200Mbps. Solution ; We can set our speed to 200 Mbps by
Following the left-to-right flow in Figure 40-19, the packet is forwarded to an Figure 40-20 One Second (1000 ms) Shaping Time Interval, Shaping at 20 percent of Line speed
interface for a router, so that the sending rate through shaping does not exceed.
The solution to this problem: configure a short time interval. Consider the
following time intervals (abbreviated Tc) and their effects with shorter time
Tc = 1 second (1000 ms): Send at 1 Gbps for 200 ms, rest for 800 ms
Figure 40-19 Shaping Queues: Scheduling with LLQ and CBWFQ
Tc = .1 second (100 ms) : Send at 1 Gbps for 20 ms, rest for 80 msTc = .01
Setting Good Shaping Interval for Audio and Video second (10 ms) : Send at 1 Gbps for 2 ms, rest for 8 ms
We tried to solve a QoS (quality of service) problem with a QoS (quality of
service) tool but the side effect of shaping is that it slows packets down, which Use a short time frame when shaping. As a recommendation, use a 10ms
creates more latency and possibly more jitter. Fortunately, you can (and timeframe to support audio and video.
should) configure some setting of Shaping that changes its internal
operation, reducing the latency and jitter that causes audio and video traffic.
I First Hop Redundancy Protocol (FHRP)
I HSRP Concepts
I FTP / TFTP
connections, and WAN connections in networks, in some cases other protocols are Side, whichever route has priority when going to the remote site, it goes from
required to avoid the problems this causes. there if one of the lines breaks, it uses the other one, there is only one router
has two WAN links connecting it to the rest of the network, these routers can use
the IP routing protocol to choose the best routes. The routing protocol learns routes
over both WAN links, adding the best route to the routing table. When the better
WAN link fails, the routing protocol takes advantage of the redundant link and
Of the designs shown so far, only the design in Figure 41-3 has two routers in the
network on the left side of the figure. Having redundant routers on the same
To see the necessity and benefit of using FHRP, first consider how these backup
single default router IP. Therefore, we have some design options for the default There are three types of FHRP solutions, but we will only cover HSRP in the
router settings; CCNA training curriculum.
All hosts in the subnet use R1 (10.1.1.9) as the default router and if R1 has a
of R2.
Half the hosts use R1, half R2 as default routers, and if one of the routers fails,
we can statically reconfigure the default router settings of half the users. Figure 41–5 FHRP Solutions
I Various IP Services
HSRP Concepts
It works with the HSRP active / standby model. HSRP allows two (or more) routers to
work together, all acting as default routers. However, only one router actively supports
Packets sent to the default gateway (router) by the hosts are transferred to this active
router. Then, other routers that are in an HSRP standby state will be on standby in case
The HSRP active router implements a virtual IP address and a virtual MAC address.
Figure 41–6 Traffic exiting R1, R2 in Standby
This virtual IP address exists as part of an additional configuration, the HSRP
configuration.
Under the interface command, this virtual IP address is given in the same subnet as the
interface IP address, but with a different IP address. The router then automatically
generates a virtual MAC address. All cooperating HSRP routers know these virtual
In Figure 41-6, R1 is active and traffic is flowing through R1, R2 is in standby state.
In case of a problem occurring in R1, R2 will be activated as we will see in the figure Figure 41–7 R1 cannot be accessed and R2 has tripped.
below.
I Various IP Services
It works with the HSRP active / standby model, so the hosts in the same subnet exit R1# show running-config ! Lines omitted for brevity
interface GigabitEthernet0/0
through the active router. As in Figure 41-6, all traffic leaves R1 and R2 remains ip address 10.1.1.9 255.255.255.0
standby version 2
on hold. But when configuring HSRP, we can actively select different routers for standby 1 ip 10.1.1.1
standby 1 priority 110
different subnets, which allows us to actively use both devices by distributing
standby 1 preempt
traffic. Let's examine the example in Figure 41-8. standby 1 name HSRP-Group
sh standby brief
Default priority is 100. When R1 is made priority 110, R1 becomes an active router.
simultaneous monitoring and management of the information of all devices in with the NMS. These messages, often referred to as notifications, use two
the network. NMS typically polls the SNMP agent on each device. NMS can special SNMP messages: Trap and Inform, which tracks changes to devices via
report the status of devices on the network by sending e-mails or messages to a SNMP and sends a Trap or Inform SNMP message to the NMS to list their
user. You can configure devices via SNMP if you have allowed SNMP in status.
the network support personnel, open a window on the NMS screen, change the
color of the correct router icon to red in the graphical interface, etc.
Figure 41–9 SNMP Get Request and Get Response Message Flow
time using NMS. It can analyze various statistical data with stored data. To
be proactive, administrators can set limits for certain switch variables and tell
it to send a notification when a limit value is passed. Figure 41–10 SNMP Trap Notification Process
I Various IP Services
in the network. NMS typically polls the SNMP agent on each device. NMS
messages to a user. You can configure devices via SNMP if you have allowed
information from a device. NMS sends an SNMP Set message to change the
device's configuration. Figure 41-9 shows this SNMP get and set traffic.
I Various IP Services
user and server model where a user connects to a server and then the user can Step 2: Place the downloaded file on FTP/TFTP and a USB stick.
copy files to or from the server. Step 3: Send it to Router Compact Flash Memory using the copy command.
IOS exists as a file (single file) that routers load into RAM to use as the
operating system.
Figure 41–11 IOS Image Update
Cisco routers often use flash memory without a hard disk drive. Flash memory is
rewritable permanent storage. It is ideal for storing files that need to be kept when
the power of the router goes out. Flash memory has no moving parts, so it is less
likely to fail. Some routers have flash memory on the motherboard. Others have
flash memory slots that allow easy removal and replacement of the flash card,
but the card remains in the device most of the time. Also, many devices have
The IOS operating system is stored compressed in this flash memory. It stores
other files that are used not only for IOS, but also for startup-config and
system.
I Various IP Services
supported for the longest time, but newer types of protocols such as SFTP and
Accessing ftp://192.168.1.10/c2960-lanbase-mz.122-25.SEE1.bin...
[OK - 4670455 bytes]
I WAN Architecture
all the requirements of a campus Lan and then to talk about it. You should know Access, Distribution and Core.
some important campus design terminology. Access: We define Switches as Access Layer.
The Two-Tier Campus Design Distribution: We define it as the layer where Access Switches are connected.
Core: We define the layer where the distribution switches are connected.
As shown in Figure 42-1, it shows a typical design of a large campus Lan. This
LAN has about 1000 pc, each connected to 40 Switch, each supporting about 25
Figure shows a two-layer design in 42-1; The layers are the Access Tier (or
ports.
Layer) and the Distribution Tier (or Layer). A two-layer Two-tier design solves
when you take the connections in any direction, the design looks like a light
Full Mesh: All existing switches are the type of design in which they are
Figure 42-3 Using a Full Mesh at the Distribution Layer, 6 Switches, 15 Links
Figure 42-4 Three Buildings Non-Core Two-Tier Design Figure 42-5 Three Buildings Three-Tier Design
I LAN Architecture
the design of Campus LAN, a small number of switch, a few APs, a few router Savings on switch ports and cables. And in the connections between the
and WAN connection designs and applications. The term Soho refers to a small buildings, remember that the cables are withdrawn from the outside
office where a user or a small number of people work from home. underground and that the installation is usually more expensive. Therefore,
it can help reduce costs without increasing the number of cables used between
At home, you probably use a single device called a mini router. One side of the
buildings.
device is connected to the internet and the other side is connected to the devices in
the house. At home, the devices can be connected with either Wi-Fi or a cable Figure 42-7 shows how the only device used in the home or in the small office
ethernet cable. For example, as in Figure 42-6. does the work of a few devices.
Figure 42-6 Typical Soho Network Usage Figure 42-7 Distribution of tasks of a single device
I LAN Architecture
switch, it must provide this power to the device connected by cable. Companies
Poe usually provides a great advantage for devices that are used to positions
without a pre -electrical cable or socket. For example, you need to attach an
device, you can provide power to the device by pulling a single Ethernet cable
I Internet
Metro Ethernet
Metro Ethernet (Metroe) includes various WAN services with some common From the SP perspective, the SP must establish a network to create the Metro
features. Ethernet uses physical connections to connect the customer device to Ethernet service. To keep the costs lower, the SP places a device physically as
the device of the service provider. This service is the layer of the WAN provider close to many customers as possible. These SP switches need to be close to
transmitted to the Ethernet frames from the customer device to another. In many customer positions, so that Ethernet standards support the distance
Figure 43-1, the Metro Ethernet shows the use of four branches. from the POP ’point of the SP to each customer. Figure 43-2 brings together
In order to use Metro Ethernet service, each branch must be connected to the
the package flowing from left to right. Each router manifests a separate locations. It distributes corporate routers and switches as usual. The SP then
guidance to transmit the package as shown in Step 1, 2 and 3. Each router forms its own IP network covering a wide geographical region. The customer
makes a comparison between the target IP address of the package and the router's then connects to the MPLS network with a connection from each location, the
IP routing table; The matching IP routing table input informs the Router where customer sends IP packages from one location to another with SP orientation.
to send the next package. To learn these ways, routers typically run some For example, Figure represents the MPLS network of the Figure 43-5 and the
routing protocols. four router SPs in the middle, and the routers on the edges are routers of a
company.
connections to other ISPs and their customers on other ISPs. It connects ISPs by using
various high -speed technologies in the internet infrastructure. They connect their
customer networks connected to ISP networks and ISPs creates the Internet worldwide.
Some WAN technologies work well especially in internet access technologies. For Figure 43-6 Internet Access Examples
example, many telephone companies use the phone line at home, so that the ISPs do not DSL - Digital Subscriber Line
have to establish additional cables. Some use TV cables while some use wirelessly.
DSL technology is widely used in Turkey. The ISPs use their internet connection to
Consumers can usually use the Internet as a WAN service while connecting to the homes or companies using existing telephone cables. There are varieties of DSL
Internet to achieve goals on the Internet. First, the company receives internet connection connection, there are varieties such as ADSL, VDSL and G.SHDSL, these connection
to each location. Then, using the virtual private network (VPN) technology, the models can be up to 100 MB/PS.
company can create VPN over the Internet. When sending VPN data over the internet, it
access technologies that are used more frequently by consumers, including DSL, cable,
4G / 5G and fiber ethernet. In this section, we will talk about Internet access
Even for larger companies, cable (or DSL) can be very good as a backup link. mail, navigate on the web, download app, and watch videos. Today, most of us
They use Dochis technology. rely on our mobile phones and our internet access to these phones. In this
DOCSIS (Data Over Cable Service Interface Specification): All cable modems section, we will examine mobile internet access technology.
and similar devices must comply with this standard. Mobile phones use radio waves to communicate through a nearby base station.
The phone has a small radio antenna, but the base station has a much larger
antenna. Telephones, tablet computers, laptops and even routers (Wireless Wan
cards) can communicate over the Internet using this technology, as shown in
Figure 43-9.
Figure 43-8 Cable tv Internet Access Sample Figure 43-9 Mobile Internet Access Example
I WAN Architecture
comparing different types of physical environment, fiber optic cable usually as the following when sending data through an open network like the Internet:
supports higher speeds for longer distances. That is, by comparing physical • Confidentiality (Privacy)
network technologies over the width of the network, fiber optic wiring supports • Authentication
longer connections and these connections usually operate at equivalent or • Data Integrity
Some ISPs now offer fiber Internet or Internet access, which is only called fiber. Let's examine the traffic in Figure 43-10.
To do this job, some local companies with the right to wiring underground
(usually a telephone company) set up new fiber optic cables. After the cable
ISP, fiber optic cable using the customers to the Internet connects to the
Internet. Usually fiber uses ethernet protocols on fiber. Conclusion: High -speed
43-11.
Server Virtualization
Traditionally, when you think of a server, that server runs an operating Today, most companies are instead of a virtual data centers. Each OS is
system. Inside, hardware contains a CPU, some RAM, some kind of separated from the hardware and is therefore virtual (unlike physical). Any piece
permanent storage (such as disk drives) and one or more NIC. And an of hardware that we will consider as a physical server before can operate more than
operating system can use all the hardware on the server and then run one or one operating system at the same time with each virtual OS called virtual
more applications. Figure 44-1 shows these main ideas. machine.
VCPUs, minimum RAM and similar. The virtualization system then starts the
all virtual machines running on that physical server. Therefore, virtual servers
use a subset of CPU, RAM, storage and NICs on the physical server. In Figure
Figure 44-1 is an OS on a classic physical server and working applications
44-2, it shows a graph of this concept with four different VMs working on a
With the physical server model shown in Figure 44-1, each physical server physical server.
operates an operating system and the operating system uses all the hardware
on that server. This was valid for the servers in the days before the server
virtualization.
be increased, these cards have 1 GBPS, 10 GBPS or even 40 GBPS speeds that
system has a NIC (at least) NIC to ensure normal operation, but it is a virtual
NIC for a VM. (For example, in VMware's virtualization systems, VM's virtual
NIC is called VNIC.) Figure 44-3 Basic Networking in a Virtualized Host with a Virtual Switch
The server must combine the physical nic in a switch with VNICs used by VMs. Ports Connected to VMS: VSWitch can configure a port in its own VLAN or
Often, each server usually usually uses a kind of internal ethernet switch share the same VLAN with other VMs or even use the VLAN channel to itself.
concept called a virtual switch or vswitch. In Figure 44-3, an example with four Ports Connected to Physical NICS: VSWitch uses physical NICs in server
VM, each of which is a VNIC, is shown. The physical server has two physical NICs. hardware, so that Switch works with external physical switch. VSWitch can
VNICs and physical NICs are built in a virtual key. use Vlan trunk (and uses it greatly).
virtualization software to carry VMs VMs between servers and re -program the
works.
I Cloud Architecture
connection with the network. Figure shows traditional cables for a data center Beyond the hypervisor on each server, many other useful tools help manage
LAN in 44-4. Each long rectangle represents a shelf in the data center; It and control a virtualized data center. For example, with data central
represents small squares and cables representing nic ports. management programs, the whole physical server can manage all
produced for cloud computing. Cloud computing is not only a product group to be
Public Cloud
In Private Cloud, cloud provider and cloud user are part of the same company. In
Public Cloud, the opposite applies to this: The Public Cloud provider sells all services to
all users and all companies. The following figure shows the public cloud workflow.
In cloud computing, three most common models are used in the market today.
✓Infrastructure as a Service
✓Software as a Service
Software Defined Networking (SDN) The term Data Plane refers to the tasks that a network device performs to
traditional network devices, then I will talk about how we can easily manage a As an example, consider how routers forward IP packets, as shown in the figure
network using central management software called Controller. below. When you think of Layer 3 logic;
Step 1: The host sends the packet to its default router, R1.
Data, Control, and Management Planes
Step 2: R1 does some processing on the received packet, makes a forwarding
First, let's talk about some functions in network devices. Routers and switches, decision and forwards the packet.
for example, are physically wired and wirelessly connected to each other to form Steps 3 and 4: Routers R2 and R3 also receive, process and forward the packet.
a network. Switches transmit Ethernet frames, routers transmit IP packets.
This example takes place in the Data Plane phase of the router.
They use many different protocols, such as routing protocols, to learn network
layer routes.
Network devices can be categorized with a particular Plane, each function that it
does. These Categories are divided into three as Data Plane, Control Plane and
Figure 45-1 Data Plane Operations on a Router in Simple
Management Plane.
I Controller Based Networks
Let's take a look at the details of some of the functions that are commonly performed in Traditional networks use both a distributed Data Plane and a distributed
the Data Plane phase in network devices from the list below. Control Plane. In other words, every device has a Data Plane and a Control
■ Un-encapsulating and re-encapsulating an ethernet frame packet (Router and Layer Plane. The example below shows the Data Plane and Control Plane stages in
3 Switches) routers.
■ Matching the destination MAC address on an Ethernet Framin with the MAC address
■ Matching the destination IP address of an IP packet with the IP routing table (Routers
Management Plane
Control Plane directly affects the behavior of the Data Plane. However,
Management Plane does not directly affect Data Plane. Instead, the
Figure 45-3 Working Logic of Control and Data Plane Stages in Router
I Controller Based Networks
Southbound Interface
In a Controller-based network architecture, the Controller must communicate with
network devices are typically located below the Controller as shown in Figure 45-4.
There is an Interface between the Controller and these devices, and given its location
at the bottom of the network devices in the drawings, these Interfaces came to be
An SBI usually contains a protocol so that the Controller and devices can
Figure 45-4 Centralized Control Plane and a Distributed Data Plane
communicate, but usually includes an application programming interface (API).
application. Programs process data so an API allows two programs to exchange data.
exists as generally usable codes (functions, variables, and data structures) that can
network.
It is an interface between SBI Controller and network devices and allows two
Northbound Interface
In a central control model, the Controller does most of the work required for the To see where the NBI is, first consider the Controller itself. A controller is
Control Plane and gathers all sorts of useful information about the Network. software that runs on a VM or physical servers. An application can run on the
The controller can create a central repository for all this useful information same server as the Controller and use an API, an NBI, so that the two programs
about the network. The following list lists the information that the Controller can communicate.
collects on the network; The Figure below shows just such an example. The big box in the figure
■ List of all devices on the network represents the system where the Controller software is located. This Controller is
■ Capabilities of each device Java based software and has a Java based native API. Controller manufacturer,
■ Interfaces / ports on each device another company, or anyone can write an application that runs on the same
operating system that uses the Controller's Java API. Using this API to
■ Current status of each Port
exchange data with the controller, the application can learn the information
■ Topology - which devices are connected to which interface
about the network.
Device configuration - IP addresses, VLANs, etc.
a Controller; It opens the Northbound Interface (NBI) so that its data and
APIs. NBIs also enable programs to use the Controller's capabilities to program
streams entering devices using the Controller's SBIs.
Figure 45-5 Java API: Java Applications Communicates with Controller
I Controller Based Networks
programmability solutions Cisco offers. control by the Controller and all applications using the Controller's NBIs. The
Figure below, which actually shows network devices without Control Plane
• OpenDaylight Controller
functions, represents this centralized OpenFlow model of SDN.
• Cisco Application Centric Infrastructure (ACI)
vendors to help establish SDN in the marketplace. The purpose of this study is
to try to help people implement their SDN vision using SBI and NBIs.
Figure 45-6 Architecture of NBI, Controller Internals, and SBI to Network Devices
I Controller Based Networks
As Cisco redesigned networking for the data center, SCI designers focused on
the applications running in a data center and what they needed. As a result,
Cisco ACI uses a special physical switch topology called Spine and Leaf. With
ACI, the physical network contains a set of Spine Switches and a set of Leaf
APIC-EM Basics
Cisco announced the end of sales for its current APIC-EM product in 2019. Controller.
Many of the functions of the APIC-EM product have become key features of the ■ Easy QoS: With a few simple steps in the Controller, you can configure
Cisco DNA Center (DNAC). complex QoS features on each device.
SDA I SDA Fabric, Underlay, and Overlay
Fabric: It uses a combination of overlay and underlay, which offers all the
SDA uses a Software Based Architecture model with a Controller and various
features to transmit data over the network.
APIs. In this architecture, a physical network is still used, which includes
Switches, Routers, cables and various endpoints. As shown in the figure on the
Overlay.
Overlay: VXLAN tunnel mechanisms are created between SDA Switches, then
the SDA structure is used to move traffic from one device to another.
VXLAN details and forwards the original frames to the target endpoint.
Using Existing Devices for SDA Underlay
Companies have two basic options for building an SDA underlay network.
Switches and set up the SDA network without worrying about damaging
existing traffic and migrate endpoints to the new SDA network over time.
Figure 46-3 Basics of VXLAN Encapsulation in SDA
Using New Devices for SDA Underlay For this to work, Underlay will first configure all switches with these IP
numbers, using the 172.16.0.0/16 IPv4 address space. The figure below
Buying new devices for the SDA structure eliminates many of the difficulties
shows a small SDA design with four switches, each with the underlay IP
that can be encountered when using existing devices. You can easily order
address shown (from 172.16.0.0/16 address space).
compatible hardware and software and automatically configure all underlay
Cisco Prime Infrastructure (PI) (www.cisco.com/go/primeinfrastructure) The PI itself runs as an application on a server platform with GUI access via a
product is used to manage traditional corporate networks. Cisco Prime web browser. The PI server can be purchased from Cisco as a software package to
Infrastructure has been used for network management in companies for many install and run on your servers or as a physical device.
years. It includes the following features:
■ Discovers network devices, creates an inventory, and creates a topology map All features of DNA Center are similar to traditional management software.
of them.
For example, both can discover network devices and create a network topology
■ Provides support for traditional enterprise LAN, WAN, and data center
map.
management functions.
■ Uses SNMP, SSH, and Telnet, as well as CDP and LLDP, to view and learn
information about devices on the network. As an example, the next page shows a network topology map in the DNA Center
in Figure 46-5. Both PI and DNA Center can perform a discovery process to
■ Simplifies QoS configuration to each device
find all devices on the network and then create topology maps to show the
It allows you to manage both wired and wireless networks from the same
management platform. devices. (Interestingly, DNA Center can work with PI using data discovered
■ Manages software on network devices and automates updates. by PI instead of performing the discovery work again.)
■ Performs initial setups for new network devices after physically installing
the new device, connecting a network cable and powering up the device.
I Software-Defined Access
Figure 46-5 DNA Center Topology Map Figure 46-6 Details About a Cisco 9300 Switch from DNA Center and Click
The GUI mechanisms are relatively intuitive with the ability to click on more or I recommend you take some time to use and watch some videos about Cisco
less details. Figure 45-6 shows a little more detail after pointing and clicking DNA Center. You can find Cisco DNA Center virtual labs to practice with Cisco
one of the switches in the topology in Figure 45-5. DNA Center at https://developer.cisco.com.
I Software-Defined Access
Broadly speaking, there are a few key differences between Cisco DNA Center ■ EasyQoS: You can perform QoS, which is complicated to configure
and traditional network management platforms such as Cisco PI. The biggest manually, with just a few simple options from Cisco DNA Center.
difference: Cisco DNA Center supports SDA while other management Encrypted traffic analysis: Cisco DNA Center enables the use of different
applications do not. Cisco PI still has some traditional management features algorithms to recognize security threats even with encrypted traffic.
not found in Cisco DNA Center. So while focusing on future features such as ■ Provides comprehensive information about the health status of devices.
SDA support that Cisco DNA Center has many of these features, consider PI
■ Network time travel: Shows historical client performance on a timeline to
extensively for traditional device management.
compare current behavior
By improving Cisco DNA Center features, it aims to simplify the work done by
businesses and to make changes much faster with lower costs. Cisco DNA
Center helps make initial setups easier and simplify the job to implement
features with demanding configurations and help you spot problems faster.
Note: Cisco hopes to continue updating the DNA Center traditional network management features compared
to the Cisco PI to the point where DNA Center can replace the PI.
I REST Based APIs
Understanding I REST APIs and HTTP
I Interpreting JSON
I Understanding REST and JSON
In the API software world, some applications form an API along with many ■ Stateless Operation
other applications that use the API. Software developers add APIs to their ■ Clear statement of cacheable/uncacheable
software so that other applications can take advantage of the first application's
■ Uniform Interface
features.
■Layered
A developer writes some code when writing an application, but by using some Code-on-Demand
APIs that can provide data and functions, the developer can do more by writing
less code, reducing the amount of new code that needs to be written. The first three of these features form the basis of how a REST API works. You
can see these first three features more easily when working with networking
that communication between programs takes place within a single operating server
Delete: Allows the client to delete different instances of data variables from the
system. Many APIs must be available for programs running on other
server
computers, so the API must define the type of network protocols supported by the
For example, if you're using a DNA Controller's Nourthbound REST API, you
API, and many REST-based APIs use the HTTP protocol.
might want to create something new, like a new security policy. From a
Developers of REST-based APIs often choose HTTP because the logic of HTTP programming perspective, the security policy is available as a set of
matches some of the concepts that define it more generally for REST APIs. configuration settings in the DNA Controller, represented internally by
variables. To do this, a REST client application uses a render action using the
HTTP uses the same principles as REST, works with a client/server model; It
DNA Center RESTful API, which creates variables on the DNA Controller via the
uses the stateless operation model and includes headers that mark objects as
DNA Center REST API. Creating new configuration in Controller is done via
cacheable or non-cacheable.
API using CRUD actions.
Software CRUD Actions and HTTP Verbs HTTP works well with REST in part because HTTP has Verbs that match
The software industry uses CRUD, a catchy acronym for the four main actions common program actions in the CRUD paradigm. Table 47-1 lists the terms
HTTP Verb and CRUD.
performed by an application. These actions
Create: Allows the client to create some new variables and data structures on the
Every Data modeling language enables API servers to return data, so the API
Compared to XML vs JSON, both try to be human readable, but XML is a bit
client can replicate the same variable names as well as the data structures
harder to read. For example, like HTML, XML uses start and end tags for each
available on the API server. To describe data structures, data modeling
variable, as shown in the figure below. Specifies a variable name with the value
languages contain special characters and rules that convey ideas about list
located between the <macAddress> and </macAddress> tags in the
variables, dictionary variables, and other more complex data structures.
highlighted line in the example.
machine readability. At the same time, JSON data makes it easy for programs
to convert JSON text into variables, making it very useful for exchanging data
searches including www.json.org. Example 47-1 JSON Output from a REST API Call
I Understanding REST and JSON
details. Instead, YAML focuses on the data model (structure) details. YAML
also tries to be clean and simple. YAML Data is the easiest to read of the
modeling languages.
Interpreting JSON
Even without knowing anything about the JSON command line, you can ■ Value: The element that represents the key value, after the colon.
probably understand it from your previous knowledge of Cisco Routers and ■ Text: Listed in double quotes.
Switches. You can probably understand that the example below shows a list of ■ Numeric: Listed without quotation marks.
Interfaces on both devices in the JSON command line. ■ Array: A special value [ ]
■ Object(Object): A special value { }
■ Multiple Pairs: When listing the Multiple Key Value pair, separate the pairs with a
comma
the end of each pair (except the last pair).
To work with some of these rules, consider the JSON data of Example 47-4 and focus
Example 47-3 Simple JSON Listing Router Interfaces
on three Key: Value Pairs. The text after the example will analyze the example.
Key: Value Pairs: Defines a Key: Value Pairs with the value before and after the Example 47-4 One JSON Object (Dictionary) with Three Key:Value Pairs
colon.
As for other special characters, watch out for commas and curly braces. The first two
Key: Text used as a name that refers to a value, in double quotes, before a colon.
Key: Value Pairs: ends with a comma, so it must be followed by another Key: Value
Pairs:. The curly braces that start and end JSON data indicate a single JSON Object.
I Understanding REST and JSON
Value Pairs: with a simple value. Object can be somewhat flexible, but in most
uses they act like a dictionary. Arrays list an array of values. Let's look at how
to interpret the command line for JSON Object and Array. Example 47-5 A JSON Snippet Showing a Single JSON Array (List)
Value Pairs.
Value Inside Arrays : For example, double quotes around text, no quotes around
numbers).
Example 47-5 shows a single array (Array) in JSON format. Notice that the
JSON data begins with square brackets [ followed by a list of three text values.
Figure 47-4 Accurate/Complete JSON Data with One Object, Two Keys, Two JSON List Values
I Understanding REST and JSON
can be much easier to read with space-organized and aligned text. For example,
having matching opening and closing braces on the same line makes it much
Inventory: These files provide device names along with information about each
Puppet
To use Puppet (www.puppet.com), you can start by installing it on a Linux Puppet typically uses an agent-based architecture for network devices support.
operating system. You can install it on your own Linux server for testing, but Some network devices enable Puppet support via an on-device tool. However,
for normal use you need to install it on a Linux server called Puppet master. As not every Cisco operating system supports Puppet agents, so Puppet solves this
with Ansible, you can use the paid or free versions. You can start learning problem by using a proxy agent running on some external computer (called
Puppet without a separate server to learn and test. Agent-less process). The external agent then uses SSH to communicate with
Resource, Class, Module: These terms refer to the components of the manifest.
Puppet agent (Agent) must be enabled earlier on the device, it uses a Pull model Chef
to make this configuration appear on the device as shown in the figure below. Chef (www.chef.io) is a software package that you install and run, like Ansible
Once installed these steps happen and Puppet. The Chef company has many products, while the Chef Automate
Step 1: You create and edit all the files on the Puppet server. software is what most people simply refer to as Chef. As in Puppet, in Chef you
Step 2: You need to configure and enable the agent or a proxy agent on each run its software by installing it on a server.
device. After installing the Chef software, you create several text files with different
Step 3: The Agent pulls the notification details from the server, which tells the components such as:
Agent what its configuration should be.
Resource: Chef-managed configurations are managed objects.
Step 4: If the Agent device configuration needs to be updated, the Puppet tool
Recipe: Chef logic applied to determine when and how to act on resources.
performs additional shots with the agent updating the device configuration to
Cookbooks: Provides a set of conveniences for the same type of work, grouped for
get all the necessary details.
easier management and sharing.
It uses a similar architecture to Chef Puppet. Runs an agent for network devices.
Ansible and Puppet are more used because the Cisco device does not support a
Chef client.
base and different strengths. Ansible is most commonly used to manage the
many Cisco devices with Ansible's Agent-less Architecture and use of SSH
Puppet's Agent-less model also provides broad support for Cisco devices.
I Final
I
Final
https://home.pearsonvue.com/cisco.aspx
You can take the test at Pearson VUE Test Centers or at home.
www.udemy.com
www.yavuzbulut.com