6- en_ROUTE_v7_Ch06.pdf

December 4, 2016 | Author: mariana | Category: N/A
Share Embed Donate


Short Description

Download 6- en_ROUTE_v7_Ch06.pdf...

Description

Implementing Cisco IP Routing (ROUTE)

Chapter 6: Enterprise Internet Connectivity

Elaborated by: Ing. Ariel Germán For: ITLA Based on: Foundation Learning Guide CCNP ROUTE 300-101 Diane Teare, Bob Vachon, Rick Graziani 2015 ROUTE v6 Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

1

Chapter 6 Topics  Planning Enterprise Internet Connectivity  Establishing Single-Homed IPv4 Internet Connectivity

 Establishing Single-Homed IPv6 Internet Connectivity  Improving Internet Connectivity Resilience  Summary

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

2

Planning Enterprise Internet Connectivity

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

3

 Upon completion of this section, you will be able to do the following: • Identify the Internet connectivity needs of organizations • Identify the different types of ISP connectivity • Describe public IP address assignments and the need for providerindependent IP addressing. • Describe autonomous system numbers

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

4

Connecting Enterprise Networks to an ISP  Modern corporate IP networks connect to the global Internet.  They use the Internet for some of their data transport needs, and provide services via the Internet to customers and business partners.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

5

Enterprise Connectivity Requirements 1/2  Enterprise connectivity requirements can be categorized as: • Outbound: • Only one-way connectivity outbound from clients to the Internet is required. • Private IPv4 with NAT . • This situation is found in most homes.

• Inbound: • Two-way connectivity is needed • Clients external to the enterprise network can access resources in the enterprise network. • In this case, both public and private IPv4 address space is needed. • Routing and security consideration as well.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

6

Enterprise Connectivity Requirements 2/2  The type of redundancy required includes: • Edge device redundancy • Link redundancy • ISP redundancy

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

7

ISP Redundancy

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

8

Public IP Address Assignment  The Internet Assigned Numbers Authority (IANA) and the regional Internet registries (RIRs) are involved with public IP address assignment.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

9

The Internet Assigned Numbers Authority  The IANA is the umbrella organization responsible for allocating the numbering systems that are used in the technical standards.  IANA responsibilities include the following: • Coordinate the global pool of IPv4 and IPv6 addresses, and provide them to RIRs. • Coordinate the global pool of autonomous system numbers and provide them to RIRs. • Manage the Domain Name Service (DNS) root zone. • Manage the IP numbering systems (in conjunction with standards bodies).

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

10

Regional Internet Registries  RIRs are nonprofit corporations established for the purpose of administration and registration of IP address space and autonomous system numbers.  There are five RIRs, as follows: • African Network Information Centre (AfriNIC) • Asia Pacific Network Information Centre (APNIC) • American Registry for Internet Numbers (ARIN) • Latin American and Caribbean IP Address Regional Registry (LACNIC) • Reséaux IP Européens Network Coordination Centre (RIPE NCC) Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

11

Public IP Address Space  SPs distribute addresses from their assigned address space.  End users typically request a public address space from their ISP.  In the IPv6 world, ISPs may assign /64 blocks of addresses to home users.  ISPs usually assign /48 blocks to enterprise users.  Blocks of IP addresses can be provider independent (PI) or provider aggregatable (PA). Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

12

Provider Aggregatable Address Space  A PA block of IP addresses is used in simple topologies, where no redundancy is needed.  PA address space is assigned by the ISP to its customer.

 If the customer changes its ISP, the new ISP will give the customer a new PA address space.  All devices with public IP addresses will have to be renumbered.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

13

Provider-Independent Address Space  For a multihomed connection, a PI address space is required.  The PI address space must be acquired from an RIR.  After successfully processing an address space request, the RIR assigns the PI address space and a public autonomous system number (ASN).  The enterprise then configures their Internet gateway routers to advertise the newly assigned IP address space to neighboring ISPs; the Border Gateway Protocol (BGP) is typically used for this task. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

14

Autonomous System Numbers  “a set of routers under a single technical administration, using an IGP and common metrics to determine how to route packets within the autonomous system, and using an inter-autonomous system routing protocol to determine how to route packets to other autonomous systems.” –RFC 4271  The ASNs 0, 65,535, and 4,294,967,295 are reserved by the IANA.  4,200,000,000 through 4,294,967,294 are private.  64,496 through 64,511 and 65,536 through 65,551 should be used in samples and documentations Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

15

Establishing SingleHomed IPv4 Internet Connectivity

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

16

 Upon completion of this section, you will be able to do the following: • Describe how to configure your router with both a provider-assigned static IPv4 address and a provider-assigned DHCP address. • Understand DHCP operation and describe how to use a router as a DHCP server and relay agent. • Identify the various types of NAT. • Describe the NAT virtual interface (NVI) feature, configuration, and verification

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

17

Configuring a Provider-Assigned IPv4 Address

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

18

DHCP Operation

 Other possible messages are: • DHCPDECLINE: A message sent from a client to a server indicating that the address is already in use.

• DHCPNAK: A message sent from a server indicating that it is refusing a client’s request for configuration. • DHCPRELEASE: A message sent from a client indicating to a server that it is giving up a lease.

• DHCPINFORM: A message sent from a client indicating that it already has an IPv4 address, but is requesting other configuration parameters Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

19

Obtaining a Provider-Assigned IPv4 Address with DHCP

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

20

Configuring a Router as a DHCP Server and DHCP Relay Agent

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

21

NAT 1/3  NAT includes the following four types of addresses: • Inside local address: The IPv4 address assigned to a device on the internal network. • Inside global address: The IPv4 address of an internal device as it appears to the external network. This is the address to which the inside local address is translated. • Outside local address: The IPv4 address of an external device as it appears to the internal network.

• Outside global address: The IPv4 address assigned to a device on the external network. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

22

NAT 2/3  When a packet travels from an inside domain to an outside domain, it is routed first and then translated and forwarded out the exit interface.  When a packet travels from an outside domain to an inside domain, the process is reversed.  The three types of NAT are as follows: • Static NAT (one-to-one) • Dynamic NAT (many-to-many) Static NAT • Port Address Translation (PAT) (many-to-one)

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

23

NAT 3/3  The show ip nat translations command is used to verify which addresses are currently being translated

255

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

24

Configuring Static NAT

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

25

Configuring Dynamic NAT

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

26

Configuring PAT  Also known as NAT overloading, is the most widely used form of NAT.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

27

Limitations of NAT  End-to-end visibility issues  Tunneling becomes more complex

 In certain topologies, standard NAT may not work correctly

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

28

NAT Virtual Interface  As of Cisco IOS Software Release 12.3(14)T Cisco introduced a new feature, NAT virtual interface (NVI).  It removes the requirement to configure an interface as inside or outside.  The NVI order of operations is also slightly different than NAT.  NVI performs routing, translation, and routing again, no matter which way the traffic is flowing.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

29

Configuring NAT Virtual Interface 1/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

30

Configuring NAT Virtual Interface 2/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

31

Configuring NAT Virtual Interface 3/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

32

Verifying NAT Virtual Interface 1/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

33

Verifying NAT Virtual Interface 2/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

34

Verifying NAT Virtual Interface 3/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

35

Establishing Single-Homed IPv6 Internet Connectivity

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

36

 Upon completion of this section, you will be able to do the following: • Describe the various ways that your router can obtain an IPv6 address. • Understand DHCP for IPv6 (DHCPv6) operation and describe the use of a router as a DHCPv6 server and relay agent. • Describe the use of NAT for IPv6 • Identify how to configure IPv6 ACLs • Describe the need to secure IPv6 Internet connectivity Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

37

Obtaining a Provider-Assigned IPv6 Address  The IPv6 address assignment methods are as follows: • Manual assignment • Stateless address autoconfiguration (SLAAC) • Stateless DHCPv6

• Stateful DHCPv6 • DHCPv6 prefix delegation (DHCPv6-PD)

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

38

Manual Assignment  As with IPv4, an IPv6 address can be statically assigned by a network administrator.  This assignment method can be error-prone and introduces significant administrative overhead.  However, it is necessary in some cases.  For security, some recommendations include choosing addresses that are not easily guessed and avoiding any embedded existing IPv4 addresses.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

39

Configuring Basic IPv6 Internet Connectivity 1/2

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

40

Configuring Basic IPv6 Internet Connectivity 2/2

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

41

Stateless Address Autoconfiguration  SLAAC provides the capability for a device to obtain IPv6 addressing information without any intervention from the network administrator.  This is achieved with the help of RAs, which are sent by routers on the local link.  IPv6 hosts listen for these RAs and use the advertised prefix, which must be 64 bits long.

 The host generates the remaining 64 host bits either by using the IEEE EUI-64 format or by creating a random sequence of bits. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

42

IEEE EUI-64  IEEE EUI-64 format interface IDs are derived from an interface’s 48-bit IEEE 802 MAC address using the following process: 1. The MAC address is split into two 24-bit parts. 2. 0xFFFE is inserted between the two parts, resulting in a 64-bit value. 3. The seventh bit of the first octet is inverted.

 For example, MAC address of 00AA.BBBB.CCCC would result in an IPv6 EUI-64 format interface ID of 02AA:BBFF:FEBB:CCCC.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

43

Enabling SLAAC  Use the ipv6 address autoconfig [default] interface configuration command.  If a default router is selected on this interface, the optional default keyword causes a default route to be installed using that default router.  You can specify the default keyword on only one interface.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

44

DHCPv6 Operation  In the IPv6 world, there are two types of DHCPv6:  Stateless: Used to supply additional parameters to clients that already have an IPv6 address.  Stateful: Similar to DHCP for IPv4 (DHCPv4).

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

45

Stateless DCHPv6 1/2  Stateless DHCPv6 works in combination with SLAAC.

 An IPv6 host gets its addressing and default router information using SLAAC.  However, the IPv6 host also queries a DHCPv6 server for other information it needs, such as the DNS or NTP server addresses.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

46

Stateless DCHPv6 2/2

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

47

Stateful DHCPv6 1/2  RAs use the managed address configuration flag bit to tell IPv6 hosts to get their addressing and additional information only from the DHCPv6 server.  The DHCPv6 server then allocates addresses to the host and tracks the allocated address.  To allow a router to acquire an IPv6 address on an interface from a DHCPv6 server, use the ipv6 address dhcp interface configuration command.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

48

Stateful DHCPv6 2/2

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

49

NAT for IPv6  In IPv4, NAT is typically used to translate private addresses to public addresses when communicating on the Internet.  In IPv6, we do not have to worry about private-to-public address translation, but some forms of NAT are still used.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

50

NAT64  NAT Protocol Translation (NAT-PT) was the initial translation scheme for facilitating communication between IPv6 and IPv4.  NAT-PT has been deprecated and replaced by NAT64.  With NAT64, one or multiple public IPv4 addresses are shared by many IPv6-only devices, using overloading.  NAT64 performs both address and IP header translation.

 An example use of NAT64 is to provide IPv4 Internet connectivity to IPv6 devices, during the transition to a full IPv6 Internet. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

51

NPTv6  NPTv6 is described in RFC 6296, IPv6-to-IPv6 Network Prefix Translation.  NPTv6 is a one-to-one stateless translation.  The idea for NPTv6 is that an organization’s internal IPv6 addressing can be independent of its ISP’s address space, making it easier to change ISPs.  One use of NPTv6 is when an organization has connections to two ISPs.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

52

IPv6 ACLs  ACLs are often used for security purposes.  For IPv6 ACLs, some configuration commands and details differ somewhat from IPv4 ACLs, but the concepts remain the same.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

53

IPv6 ACL Characteristics  One change from IPv4 is that IPv6 ACLs are always named and extended.  For IPv6, there are three implicit rules at the end of each ACL, as follows: • permit icmp any any nd-na • permit icmp any any nd-ns • deny ipv6 any any

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

54

Configuring IPv6 ACLs 1/3

-The ACL should block all ICMP echo requests and Telnet requests to the TFTP server. -TFTP traffic from the Internet should only be allowed to the TFTP server, not to other internal hosts. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

55

Configuring IPv6 ACLs 2/3

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

56

Configuring IPv6 ACLs 3/3

-To apply an ACL to a vty line, use the ipv6 access-class ACL-name line configuration command.

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

57

Securing IPv6 Internet Connectivity  Enabling IPv6 Internet connectivity results in several new attack vulnerabilities in your infrastructure.  End hosts connected to the Internet are usually no longer hidden behind the NAT as they typically are with IPv4.  To secure end hosts that are connected to the IPv6 Internet, the use of a stateful firewall is recommended.  You should also harden the IPv6 protocols being used by disabling unnecessary functions and optimizing default settings. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

58

Improving Internet Connectivity Resilience

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

59

 Upon completion of this section, you will be able to do the following: • Describe the disadvantages of single-homed Internet connectivity • Describe dual-homed Internet connectivity • Describe multihomed Internet connectivity

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

60

Drawbacks of a Single-Homed Internet Connectivity

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

61

Dual-Homed Internet Connectivity

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

62

Configuring Best Path for Dual-Homed Internet Connectivity 1/2  Either static routing toward the ISP or BGP with the ISP are commonly used to route outbound traffic.  In simple networks, static routes with different ADs (called floating static routes) can be used.  Alternatively, you can redistribute a default route or a subset of Internet routes into your internal routing protocol.  First-hop redundancy protocols (FHRPs) can also be used to properly route packets to the appropriate Internet gateway. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

63

Configuring Best Path for Dual-Homed Internet Connectivity 2/2

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

64

Multihomed Internet Connectivity 1/2  Establishing a multihomed environment involves meeting some requirements: • You must have PI address space and your own ASN. • You must establish connectivity with two independent ISPs.

 The Internet gateways use BGP to advertise your PI address space to both ISPs and to learn routes from both ISPs. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

65

Multihomed Internet Connectivity 2/2  The ISPs can send the following to your network: • The ISPs can send only a default route. • The ISPs can send a partial routing table • The ISPs could also send you a full routing table

 When configuring your border Internet gateways, be careful. Route filtering is usually required both inbound and outbound. • Your network might become a transit path.

 BGP configuration can be complex, and full routing tables consume a lot of router resources. • Estimated 2GB of RAM to store the full IPv4 routing table. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

66

Summary

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

67

Read it in the book!

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

68

Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

Cisco Public

69

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF