2. IPv4 Addressing
The IPv4 addresses are unique and universal.
●
An IPv4 address is 32 bits long.
●
The address space of IPv4 is 232 (4,294,967,296)
●
2 Types of IPv4 Notations.
Binary notation
Dotted-decimal notation
3. SUBNETTING AND VLSM
Subnetting
Divide a large address block into smaller subgroups.
●
Use of flexible net mask.
●
VLSM-Variable Length Subnet Mask
Technique that allows network administrators to
divide an IP address space into subnets of different
sizes, unlike simple same-size Subnetting.
●
Subnetting a subnet.
●
4.
5. ROUTING PROTOCOLS
Routing Protocol
●
Protocols used by routers to make path determination choices
and to share those choices with other routers
Autonomous system (AS)
●
Uses Interior Gateway Protocols as routing protocols
A group of routers under the control of a single administration
Interior Gateway Protocols (IGPs)
●
Routing protocols used within an AS
Exterior Gateway Protocols (EGPs)
●
Routing protocols used to route information between multiple
autonomous systems
6. ROUTING PROTOCOLS(continued)
Examples of IGPs
Routing Information Protocol (RIP)
●
Enhanced Interior Gateway Routing Protocol
(EIGRP)
●
Open Shortest Path First (OSPF)
●
Example of EGP
Border Gateway Protocol (BGP)
●
7. ROUTING INFORMATION PROTOCOL(RIP)
Routing Information Protocol (RIP)
●
The easiest Interior Gateway Protocol to configure is RIPv1
●
A distance-vector routing protocol that broadcasts entire routing
tables to neighbors every 30 seconds
●
RIP has a maximum hop count of 15
●
As a result, RIP does not work in large internetworks
●
Enabling RIP Routing, the following commands are used,
●
Router(config)#router rip
Router(config-router)#network 192.168.1.0
To troubleshoot RIP Routing,
●
Router#show ip rip
8. ENHANCED INTERIOR GATEWAY PROTOCOL(EIGRP)
EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating
features of both Distance-Vector and Link-State routing protocols.
●
It sends routing updates only when network topology changes instead
of its entire routing table at regular intervals.
●
Its convergence is very fast
●
It supports classless inter-domain routing (CIDR) and variable-length
subnet masks
●
(VLSM)
EIGRP Major Drawback
●
It is Cisco proprietary - it does not inter-operate with other vendors'
devices. This, of course, is the big one. If you are working in a mixed
environment, EIGRP doesn't make as much sense
9. EIGRP(Continued)
EIGRP uses Diffusing Update Algorithm (DUAL)to determine
the best path among all “feasible” paths. DUAL also helps ensure
a loop-free routing environment.
●
EIGRP will form neighbor relationships with adjacent routers in
the same Autonomous System (AS)
●
EIGRP traffic is either sent as unicasts, or as multicasts on
address 224.0.0.10, depending on the EIGRP packet type.
●
Reliable Transport Protocol (RTP) is used to ensure delivery of
most EIGRP packets.
●
EIGRP packets are Hello,Update,Query,Reply and Ack
●
10. EIGRP(Continued)
EIGRP, much like OSPF, builds three separate tables,
Neighbor table– list of all neighboring routers. neighbors must belong
to the same Autonomous System
●
Topology table– list of all routes in the Autonomous System
●
Routing table– contains the best route for each known network
●
Enabling EIGRP Routing, the following commands are used,
●
Router(config)#router eigrp 100
Router(config-router)#network 10.10.1.0
To troubleshoot EIGRP Routing,following commands are used,
●
Router#show ip route eigrp
Router#show ip eigrp neighbor
Router#show ip eigrp traffic
11. OPEN SHORTEST PATH FIRST(OSPF) PROTOCOL
OSPF is a standardized Link-State routing protocol,designed to
scale efficiently to support larger networks
●
Special routers (autonomous system boundary routers) or
backbone routers responsible to dissipate information about other
AS into the current system.
●
It minimizes routing table entries by dividing AS into areas
●
Fast convergence Protocol
●
Low bandwidth requirements
●
Supports different types of areas
●
Route summarization and authentication
●
Cisco's implementation is fully compliant with the specification
OSPF v2.
●
13. OSPF(Continued)
Enabling OSPF Routing, the following commands are used,
●
Router(config)#router ospf 1(process id)
Router(config-router)#network 192.168.1.1 0.255.255.255 area 1
To troubleshoot OSPF Routing,following commands are used,
●
Router# show ip route
Router# show ip ospf
Router# show ip ospf interface
Router# show ip ospf neighbor
Router# show ip ospf database
14. BORDERED GATEWAY PROTOCOL(BGP)
Routing Protocol used to exchange routing information between
Autonomous System
●
Exterior gateway protocol and path vector protocol
●
A Path vector protocol defines a route as a pairing between a
destination and the attributes of the path to that destination
●
Types of BGP Messages are Open,update, Keep-alive and
Notification
●
Two types of BGP
External BGP Peering (eBGP)
Internal BGP Peering (iBGP)
15. BGP(Continued)
Internal BGP (iBGP)
BGP peer within the same AS
●
Not required to be directly connected
●
iBGP speakers need to be fully meshed
●
They originate connected networks
●
They do not pass on prefixes learned from other iBGP
speaker
●
External BGP Peering (eBGP)
Between BGP speakers in different AS
●
Should be directly connected
●
Do not run an IGP between eBGP peers
●
17. SWITCHING IN VLAN'S
Switches also have enabled the creation of Virtual LANs (VLANs).
●
VLANs provide greater opportunities to manage the flow of traffic on the
LAN and reduce broadcast traffic between segments.
●
VLANs are groups of computers in an intelligent switched network.
●
Allow us to split switches into separate (virtual) switches
●
Only members of a VLAN can see that VLAN’s traffic
●
VLAN'S Types,
Port-based VLANs
●
MAC address based
●
Protocol based VLANs
●
Application based VLANs
●
18. VIRTUAL TRUNKING PROTOCOL(VTP)
VTP reduces the complexity of managing and monitoring VLAN networks
●
VTP maintains VLAN configuration consistency across a common network
administration domain
●
VTP allows VLANs to be trunked over mixed media
●
VTP provides for accurate tracking and monitoring of VLANs
●
VTP provides “Plug-and-Play” configuration when adding new VLANs
●
VTP switches operate in one of three modes:
Server – default mode. Sends VLAN information to other switches.
●
Client – receives VLAN information and forwards it to other switches.
●
Transparent – forward VTP traffic but do not originate or use it. They can have their
own VLANs, not shared with other switches.
●
19. VTP(Continued)
Command to set the VTP mode:
Switch(vlan)#vtp {client | server | transparent}
VTP Pruning-VTP pruning increases network available
bandwidth by restricting flooded traffic to those trunk
links that the traffic must use to reach the destination
devices
VLAN3
VLAN1
VLAN4
VLAN2
20. SPANNING TREE PROTOCOL(STP)
STP is a link management protocol that provides path
redundancy while preventing undesirable loops in the
network
●
Spanning Tree Algorithm
The switches use this algorithm to decide which ports
should be shut down.
Choose one switch to be “root bridge”
●
Choose a “root port” on each other switch
●
Choose a “designated port” on each segment.
●
Close down all other ports.
●
21.
22. STP TYPES
1.CSTP-Comman STP
2.RSTP(Rapid STP)-RSTP(Rapid Spanning Tree Protocol-802.1w
Standard): it is the enhanced protocol of STP,the main caracteristic
of this one is Faster than STP (it converge in less than 6 seconds).
3.MST(Multiple STP)-allows multiple spanning tree domains to be
configured in a network and on a switch.It is based on RSTP, and is
backwards-compatible with RSTP and STP.
4.PVST(Per VLAN STP)- Maintains a spanning-tree instance for
each VLAN configured in the network.
5.PVST+ -Per-VLAN Spanning Tree Plus is a Cisco
proprietary spanning tree protocol based on STP.
23. VIRTUAL PRIVATE NETWORK(VPN)
Creates a secure tunnel over a public network
●
Uses the Internet as the public backbone to access a
●
secure private network
Remote employees can access their office network
●
VPN Protocols
PPTP (Point-to-Point tunneling Protocol)
●
L2F (Layer 2 Forwarding Protocol)
●
L2TP (Layer 2 Tunneling Protocol)
●
IPSec (Internet Protocol Security)
●
24. IPsec(IP security)
Provides Layer 3 security (RFC 2401)
●
Transparent to applications (no need for integrated IPSec
support)
●
A set of protocols and algorithms used to secure IP data at the
network layer
●
Combines different components:
Security associations (SA)
●
Authentication headers (AH)
●
Encapsulating security payload (ESP)
●
Internet Key Exchange (IKE)
●
25. Ipsec Modes
Tunnel Mode
Entire IP packet is encrypted and becomes the data component
of a new (and larger) IP packet.
●
Frequently used in an IPsec site-to-site VPN
●
Transport Mode
Ipsec header is inserted into the IP packet
●
No new packet is created
●
Works well in networks where increasing a packet’s size could
cause an issue
●
Frequently used for remote-access VPNs
●