CCNA Routing and Switching: Scaling Networks Practice and Study Guide ICND2 200-101 (Instructor's Version)

August 23, 2017 | Author: Katherine | Category: Cisco Certifications, Virtual Private Network, Computer Network, Network Switch, I Pv6
Share Embed Donate


Short Description

This is the instructor version of the study guide for Scaling Networks...

Description

CCNA Routing and Switching Practice and Study Guide: Exercises, Activities, and Scenarios to Prepare for the ICND2 (200-101) Certification Exam Instructor’s Answer Key Allan Johnson

Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA

instructor.indb i

3/12/14 7:51 AM

ii

CCNA Routing and Switching Practice and Study Guide

CCNA Routing and Switching Practice and Study Guide: Exercises, Activities, and Scenarios to Prepare for the ICND2 (200-101) Certification Exam Instructor’s Answer Key

Publisher Paul Boger

Allan Johnson

Executive Editor Mary Beth Ray

Associate Publisher Dave Dusthimer Business Operation Manager, Cisco Press Jan Cornelssen

Copyright© 2014 Cisco Systems, Inc. Cisco Press logo is a trademark of Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing April 2014 ISBN-13: 978-0-13-381341-8 ISBN-10: 0-13-381341-X

Warning and Disclaimer This book is designed to provide information about networking. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied.

Managing Editor Sandra Schroeder Senior Development Editor Christopher Cleveland Project Editor Mandie Frank Copy Editor Keith Cline Technical Editor Steve Stiles Editorial Assistant Vanessa Evans Designer Mark Shirar Composition Tricia Bronkella Proofreader Sarah Kearns

The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

instructor.indb ii

3/12/14 7:51 AM

iii

Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Special Sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419. For government sales inquiries, please contact [email protected]. For questions about sales outside the U.S., please contact [email protected].

Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at [email protected]. Please make sure to include the book title and ISBN in your message. We greatly appreciate your assistance.

8

instructor.indb iii

3/12/14 7:51 AM

iv

CCNA Routing and Switching Practice and Study Guide

About the Author Allan Johnson entered the academic world in 1999 after 10 years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed in Occupational Training and Development. He is an information technology instructor at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full time for Cisco Networking Academy as a Learning Systems Developer.

instructor.indb iv

3/12/14 7:51 AM

v

About the Technical Reviewer Steve Stiles is a Cisco Network Academy Instructor for Rhodes State College and a Cisco Certified Instructor Trainer, having earned CCNA Security and CCNP level certifications. He was the recipient of the 2012 Outstanding Teacher of the Year by the Ohio Association of Two-Year Colleges and co-recipient for the Outstanding Faculty of the Year at Rhodes State College.

instructor.indb v

3/12/14 7:51 AM

vi

CCNA Routing and Switching Practice and Study Guide

Dedication For my wife, Becky. Without the sacrifices you made during the project, this work would not have come to fruition. Thank you providing me the comfort and resting place only you can give. —Allan Johnson

instructor.indb vi

3/12/14 7:51 AM

vii

Acknowledgments When I began to think of whom I would like to have as a technical editor for this work, Steve Stiles immediately came to mind. With his instructor and industry background, and his excellent work building activities for the new Cisco Networking Academy curriculum, he was an obvious choice. Thankfully, when Mary Beth Ray contacted him, he was willing and able to do the arduous review work necessary to make sure that you get a book that is both technically accurate and unambiguous. The Cisco Network Academy authors for the online curriculum and series of Companion Guides take the reader deeper, past the CCENT exam topics, with the ultimate goal of not only preparing the student for CCENT certification, but for more advanced college-level technology courses and degrees, as well. Thank you especially to Amy Gerrie and her team of authors— Rick Graziani, Wayne Lewis, and Bob Vachon—for their excellent treatment of the material; it is reflected throughout this book. Mary Beth Rey, Executive Editor, you amaze me with your ability to juggle multiple projects at once, steering each from beginning to end. I can always count on you to make the tough decisions. This is my seventh project with Christopher Cleveland as development editor. His dedication to perfection pays dividends in countless, unseen ways. Thank you again, Chris, for providing me with much-needed guidance and support. This book could not be a reality without your persistence.

instructor.indb vii

3/12/14 7:51 AM

viii

CCNA Routing and Switching Practice and Study Guide

Contents at a Glance Introduction

xvi

Part I: Scaling Networks Chapter 1

Introduction to Scaling Networks

1

Chapter 2

LAN Redundancy

13

Chapter 3

Link Aggregation

31

Chapter 4

Wireless LANs

Chapter 5

Adjust and Troubleshoot Single-Area OSPF

Chapter 6

Multiarea OSPF

Chapter 7

EIGRP 87

Chapter 8

EIGRP Advanced Configurations and Troubleshooting

Chapter 9

IOS Images and Licensing

41 57

77

109

127

Part II: Connecting Networks

instructor.indb viii

Chapter 10

Hierarchical Network Design

137

Chapter 11

Connecting to the WAN

Chapter 12

Point-to-Point Connections

Chapter 13

Frame Relay

Chapter 14

Network Address Translation for IPv4

Chapter 15

Broadband Solutions

Chapter 16

Securing Site-to-Site Connectivity

Chapter 17

Monitoring the Network

Chapter 18

Troubleshooting the Network

147 155

171 181

193 203

213 223

3/12/14 7:51 AM

ix

Contents Introduction

xvi

Part I: Scaling Networks Chapter 1

Introduction to Scaling Networks Implementing a Network Design

2

Hierarchical Network Design

2

Identify Scalability Terminology Selecting Network Devices

6

7

Selecting Switch Hardware

7

Selecting Router Hardware

8

Managing Devices

1

8

Basic Router Configuration Review Basic Router Verification Review

10

Basic Switch Configuration Review Basic Switch Verification Review Chapter 2

LAN Redundancy

10

11

13

Spanning-Tree Concepts

14

Draw a Redundant Topology Purpose of Spanning Tree

14

15

Spanning-Tree Operation

15

Identify the 802.1D Port Roles

17

Varieties of Spanning Tree Protocols

Comparing the STP Varieties PVST+ Operation

9

20

20

21

Rapid PVST+ Operation

22

Spanning-Tree Configuration

23

PVST+ and Rapid PVST+ Configuration First Hop Redundancy Protocols

Identify FHRP Terminology Identify the Type of FHRP

23

26

27 28

HSRP and GLBP Configuration and Verification Chapter 3

Link Aggregation

31

Link Aggregation Concepts

EtherChannel Advantages EtherChannel Operation

instructor.indb ix

28

32

32 32

3/12/14 7:51 AM

x

CCNA Routing and Switching Practice and Study Guide

Link Aggregation Configuration

Configuring EtherChannel

33

34

EtherChannel Configuration Scenario 1

34

EtherChannel Configuration Scenario 1

34

EtherChannel Configuration Scenario 1

35

Verifying and Troubleshooting EtherChannel Chapter 4

Wireless LANs

41

Wireless LAN Concepts

42

Identify Wireless Technologies

42

WLANs Components and Topologies Wireless LAN Operations

45

Wireless Media Contention Associating with an AP

48

50

Channel Management Concepts Wireless LAN Security

44

45

Label the 802.11 Frame

52

53

WLAN Security Terminology

53

Identify the WLAN Security Characteristics Wireless LAN Configuration

Troubleshooting WLAN Issues

54

55

Adjust and Troubleshoot Single-Area OSPF Advanced Single-Area OSPF Configurations

58

Single-Area OSPF Configuration Review

58

Configuring Single-Area OSPFv2 Verifying Single-Area OSPFv2 Verifying Single-Area OSPFv3

57

58

59

Configuring Single-Area OSPFv3 Identify Network Types

54

54

Configuring WLAN Routers and Clients

Chapter 5

35

59

61

62

OSPF and Multi-Access Networks

63

OSPF and Multi-Access Networks Completion Exercise DR/BDR Election Exercise

65

Redistributing an OSPF Default Route Exercise OSPFv2 Default Route Redistribution

67

OSPFv3 Default Route Redistribution

68

Fine-Tuning OSPF Interfaces

67

69

Securing OSPFv2 with MD5 Authentication

69

Troubleshooting Single-Area OSPF Implementations

OSPF Adjacency Issues

instructor.indb x

63

71

71

Identify OSPFv2 Troubleshooting Commands

71

Identify OSPFv3 Troubleshooting Commands

74

3/12/14 7:51 AM

xi

Chapter 6

Multiarea OSPF

77

Multiarea OSPF Operation

78

Multiarea OSPF Terminology and Concepts Multiarea OSPF LSA Operation

79

OSPF Routing Table and Types of Routes Configuring Multiarea OSPF

78 79

80

Configuring Multiarea OSPF

80

Configuring Route Summarization for Multiarea OSPFv2 Verifying Multiarea OSPF Chapter 7

EIGRP 87 Characteristics of EIGRP

88

Describe Basic EIGRP Features

88

Identify and Describe EIGRP Packet Types

88

Identify Elements of the EIGRP Message Formats Configuring EIGRP for IPv4

Verifying EIGRP with IPv4 Operation of EIGRP

94

97

99

EIGRP Metric Concepts

99

DUAL Concepts Exercise

100

DUAL FSM Completion Exercise Configuring EIGRP for IPv6

102

104

Comparing EIGRP for IPv4 and EIGRP for IPv6 Configuring and Verifying EIGRP for IPv6

104

105

EIGRP Advanced Configurations and Troubleshooting Advanced EIGRP Configurations

Automatic Summarization Manual Summarization

110

110

IPv4 Manual Summarization

113

IPv6 Manual Summarization

115

116

Fine-Tuning EIGRP Interfaces

118

Securing EIGRP Routing Updates Troubleshoot EIGRP

109

112

Default Route Propagation

120

121

Commands for Troubleshooting EIGRP Troubleshoot EIGRP Connectivity Issues

instructor.indb xi

89

94

Configuring EIGRP with IPv4

Chapter 8

83

85

Connectivity Issue #1

122

Connectivity Issue #2

123

Connectivity Issue #3

123

121 122

3/12/14 7:51 AM

xii

CCNA Routing and Switching Practice and Study Guide

Chapter 9

IOS Images and Licensing Managing IOS System Files

127 128

IOS Families, Trains, and Naming Conventions Backing Up Cisco IOS Images IOS Licensing

128

131

132

Software Licensing

132

License Verification and Management

133

Part II: Connecting Networks Chapter 10

Hierarchical Network Design

137

Hierarchical Network Design Overview

138

Enterprise Network Campus Design

138

Hierarchical Network Design

138

Cisco Enterprise Architecture

139

Modular Network Design

139

Cisco Enterprise Architecture Model Evolving Network Architectures

144

Cisco Enterprise Architectures

144

Emerging Network Architectures Chapter 11

Connecting to the WAN

140

144

147

WAN Technologies Overview

148

Network Types and Their Evolving WAN Needs WAN Operations and Terminology Selecting a WAN Technology

149

151

Varieties of WAN Link Connections

151

Private and Public WAN Access Options Chapter 12

Point-to-Point Connections

155

Serial Point-to-Point Overview

156

Serial Communications WAN Protocols

156 158

HDLC Configuration and Troubleshooting Troubleshooting Serial Interfaces

instructor.indb xii

159

159

160

PPP Components PPP Sessions

152

158

HDLC Encapsulation

PPP Operation

148

160

162

3/12/14 7:51 AM

xiii

Configure PPP

165

Basic PPP Configuration with Options PPP Authentication

167

PAP Configuration

168

CHAP Configuration

168

Troubleshoot WAN Connectivity

Chapter 13

Frame Relay

165

168

171

Introduction to Frame Relay

172

Frame Relay Concepts and Terminology Frame Relay Operation Configure Frame Relay

173

176

Configure Basic Frame Relay Configure Subinterfaces Troubleshoot Connectivity

Chapter 14

176

177 178

Network Address Translation for IPv4 NAT Operation

Configuring NAT

181

183

Configuring Static NAT

183

Configuring Dynamic NAT

184

Configuring Port Address Translation A Word About Port Forwarding Configuring NAT and IPv6 Troubleshooting NAT Broadband Solutions Teleworking

181

181

NAT Characteristics

Chapter 15

172

185

189

189

190 193

194

Benefits of Teleworking Costs of Teleworking

194

194

Business Requirements for Teleworker Services Comparing Broadband Solutions

Cable DSL

195

195 197

Broadband Wireless

199

Selecting Broadband Solutions Configuring xDSL Connectivity

PPPoE Overview

200

200

200

Configuring PPPoE

instructor.indb xiii

194

201

3/12/14 7:51 AM

xiv

CCNA Routing and Switching Practice and Study Guide

Chapter 16

Securing Site-to-Site Connectivity VPNs

203

204

Fundamentals of VPNs Types of VPNs

204

204

Site-to-Site GRE Tunnels

205

Fundamentals of Generic Routing Encapsulation Configuring GRE Tunnels Introducing IPsec

206

208

Internet Protocol Security IPsec Framework Remote Access

208

208

210

Remote-Access VPN Solutions IPsec Remote-Access VPNs Chapter 17

Monitoring the Network Syslog

210

211

213

214

Syslog Operation

214

Configuring Syslog SNMP

205

215

215

SNMP Operation

215

Configuring SNMP

218

NetFlow 219

NetFlow Operation

220

Configuring NetFlow Chapter 18

220

Troubleshooting the Network

223

Troubleshooting with a Systematic Approach

Network Documentation

224

224

Troubleshooting Process and Methodologies Network Troubleshooting

230

Troubleshooting Tools

231

Network Troubleshooting and IP Connectivity

instructor.indb xiv

227

232

3/12/14 7:51 AM

xv

Icons Used in This Book DSU/CSU

Router

Bridge

Hub

DSU/CSU

Catalyst Switch

Multilayer Switch

ATM Switch

ISDN/Frame Relay Switch

Communication Server

Gateway

Access Server

Command Syntax Conventions The conventions used to present command syntax in this book are the same conventions used in the IOS Command Reference. The Command Reference describes these conventions as follows:

instructor.indb xv



Boldface indicates commands and keywords that are entered literally as shown. In actual configuration examples and output (not general command syntax), boldface indicates commands that are manually input by the user (such as a show command).



Italics indicate arguments for which you supply actual values.



Vertical bars (|) separate alternative, mutually exclusive elements.



Square brackets [ ] indicate optional elements.



Braces { } indicate a required choice.



Braces within brackets [{ }] indicate a required choice within an optional element.

3/12/14 7:51 AM

xvi

CCNA Routing and Switching Practice and Study Guide

Introduction The purpose of this book is to provide you with an extra resource for studying the exam topics of the Interconnecting Cisco Networking Devices Part 2 (ICND2) exam that leads to Cisco Certified Networking Associate (CCNA) certification. This book maps to the third and fourth Cisco Networking Academy courses in the CCNA Routing and Switching curricula: Scaling Networks (SN) and Connecting Networks (CN). Ideally, the reader will have completed the first two courses: Introduction to Networks (ITN) and Routing and Switching Essentials (RSE). SN continues where RSE left off, taking the student deeper into the architecture, components, and operations of routers and switches in a large and complex network. Successfully completing this course means that you should be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. CN pulls everything from the first three courses together as the student learns the WAN technologies and network services required by converged applications in a complex network. Successfully completing this course means that you should be able to configure and troubleshoot network devices and resolve common WAN issues and implement IPsec and virtual private network (VPN) operations in a complex network. To learn more about CCNA Routing and Switching courses and to find an Academy near you, visit http://www.netacad.com. However, if you are not an Academy student but would like to benefit from the extensive authoring done for these courses, you can buy any or all of CCNA Routing and Switching Companion Guides (CG) and Lab Manuals (LM) of the Academy’s popular online curriculum. Although you will not have access to the Packet Tracer network simulator software, you will have access to the tireless work of an outstanding team of Cisco Academy instructors dedicated to providing students with comprehensive and engaging CCNA Routing and Switching preparation course material. The titles and ISBNs for the first two courses of the CCNA Routing and Switching CGs and LMs are as follows: ■

Scaling Networks Companion Guide (ISBN: 9781587133282)



Scaling Networks Lab Manual (ISBN: 9781587133251)



Connecting Networks Companion Guide (ISBN: 9781587133329)



Connecting Networks Lab Manual (ISBN: 9781587133312)

Goals and Methods The most important goal of this book is to help you pass the 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2) exam, which is associated with the Cisco Certified Network Associate (CCNA) certification. Passing the CCNA exam means that you have the knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. You can view the detailed exam topics any time at http://learningnetwork.cisco.com. They are divided into five broad categories:

instructor.indb xvi



LAN Switching Technologies



IP Routing Technologies



IP Services



Troubleshooting



WAN Technologies

3/12/14 7:51 AM

xvii

This book offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCNA exam candidate. Each chapter differs slightly and includes some or all of the following types of practice: ■

Vocabulary-matching exercises



Concept question exercises



Skill-building activities and scenarios



Configuration scenarios



Troubleshooting scenarios

Audience for This Book This book’s main audience is anyone taking the CCNA Routing and Switching courses of the Cisco Networking Academy curriculum. Many Academies use this Practice Study Guide as a required tool in the course, whereas other Academies recommend the Practice Study Guide as an additional resource to prepare for class exams and the CCNA certification. The secondary audiences for this book include people taking CCNA-related classes from professional training organizations. This book can also be used for college- and university-level networking courses, and by anyone wanting to gain a detailed understanding of INCD2 routing and switching concepts.

How This Book Is Organized Because the content of the Scaling Networks Companion Guide, the Connecting Networks Companion Guide, and the online curriculum is sequential, you should work through this Practice and Study Guide in order beginning with Chapter 1. The book covers the major topic headings in the same sequence as the online curriculum. This book has 18 chapters, their names the same as the online course chapters. However, the numbering is sequential in this book, progressing from Chapter 1 to Chapter 18. The online curriculum starts over at Chapter 1 in the Connecting Networks course. Most of the configuration chapters use a single topology where appropriate. This allows for better continuity and easier understanding of routing and switching commands, operations, and outputs. However, the topology differs from the one used in the online curriculum and the Companion Guide. A different topology affords you the opportunity to practice your knowledge and skills without just simply recording the information you find in the text. Packet Tracer Activity

Note: Throughout the book, you will find references to Packet Tracer and Lab activities. These references are provided so that you can, at that point, complete those activities. The Packet Tracer activities are accessible only if you have access to the online curriculum. However, the Labs are available in the Lab Manuals previously cited.

Video Demonstration

instructor.indb xvii

3/12/14 7:51 AM

xviii

CCNA Routing and Switching Practice and Study Guide

Part I: Scaling Networks ■

Chapter 1, “Introduction to Scaling Networks”: This chapter provides vocabulary and concept exercises to reinforce your understanding of hierarchical network design and selecting hardware. You will also practice basic router and switch configuration and verification.



Chapter 2, “LAN Redundancy”: The exercises in this chapter cover the concepts, operations, configuration, and verification of all the current varieties of STP.



Chapter 3, “Link Aggregation”: This chapter’s exercises are devoted to the concepts, configuration, verification, and troubleshooting of EtherChannel.



Chapter 4, “Wireless LANs”: This chapter is all about wireless connectivity technologies. You will complete exercises that focus on various types of wireless and the standards for 802.11. In addition, you will complete activities focused on WLAN components, topologies, and security.



Chapter 5, “Adjust and Troubleshoot Single-Area OSPF”: This chapter focuses on advanced OSPF concepts, configuration, verification, and troubleshooting.



Chapter 6, “Multiarea OSPF”: The CCNA exam now includes multiarea OSPF. So, this chapter includes exercises covering multiarea OSPF concepts and configuration, verification, and troubleshooting.



Chapter 7, “EIGRP”: The exercises in this chapter are devoted to the basic concepts and configuration of Cisco’s routing protocol, EIGRP for IPv4 and IPv6.



Chapter 8, “EIGRP Advanced Configurations and Troubleshooting”: This chapter focuses on advanced EIGRP concepts, configuration, verification, and troubleshooting.



Chapter 9, “IOS Images and Licensing”: This chapter is devoted to the crucial knowledge and skills you need to manage IOS images. Exercises focus on basic IOS image concepts and management tasks.

Part II: Connecting Networks

instructor.indb xviii



Chapter 10, “Hierarchical Network Design”: Part II, much like Part I, starts off network design. Exercises focus on the various types of network design models and architectures.



Chapter 11, “Connecting to the WAN”: This chapter is a survey of all the various WAN access options and technologies that are available for connecting today’s networks. The exercises focus on differentiating between all these WAN options.



Chapter 12, “Point-to-Point Connections”: One of the older, and still viable, WAN options is PPP. Exercises in this chapter focus on the serial interface and then the concepts, configuration, verification, and troubleshooting of PPP with PAP and CHAP authentication.



Chapter 13, “Frame Relay”: Although some may consider Frame Relay obsolete, it is still a viable option in depending on your location. This chapter includes exercises covering the concepts, configuration, verification, and troubleshooting of Frame Relay.

3/12/14 7:51 AM

xix



Chapter 14, “Network Address Translation for IPv4”: NAT was created to provide a temporary solution to the limited address space in IPv4. Just about every router connected to the network uses NAT or forwards traffic to a NAT-enabled device for address translation. This chapter focuses on exercises to reinforce your understanding of NAT operation and characteristics. Practice activities include configuring, verifying, and troubleshooting static NAT, dynamic NAT, and PAT.



Chapter 15, “Broadband Solutions”: Working from home or away from a central office has largely been made possible by the advent of broadband technologies and VPNs. This exercises in this chapter help you distinguish between the various broadband offerings on the market.



Chapter 16, “Securing Site-to-Site Connectivity”: VPNs allow teleworkers and branch sites connect to the corporate network regardless of the underlying WAN access option. The exercises in this chapter are devoted to the concepts of the various VPN solutions, including IPsec and GRE configuration.



Chapter 17, “Monitoring the Network”: As a network administrator, you are more likely to be managing a network using a variety of tools rather than designing and building them. The exercises in this chapter cover three popular network monitoring tools: syslog, SNMP, and NetFlow.



Chapter 18, “Troubleshooting the Network”: Throughout your CCNA studies, you have practice troubleshooting skills in relation to specific technologies. This chapter reviews troubleshooting methodologies and the tools and commands you use to troubleshoot a network. Troubleshooting is a key skill to fine-tune now that you are close to taking your CCNA exam.

About the Cisco Press Website for This Book Cisco Press provides additional content that can be accessed by registering your individual book at the ciscopress.com website. Becoming a member and registering is free, and you then gain access to exclusive deals on other resources from Cisco Press. To register this book, go to http://www.ciscopress.com/bookstore/register.asp and enter the book’s ISBN located on the back cover of this book. You’ll then be prompted to log in or join ciscopress.com to continue registration. After you register the book, a link to the supplemental content will be listed on your My Registered Books page.

instructor.indb xix

3/12/14 7:51 AM

instructor.indb xx

3/12/14 7:51 AM

CHAPTER 1

Introduction to Scaling Networks

As a business grows, so does its networking requirements. To keep pace with a business’s expansion and new emerging technologies, a network must be designed to scale. A network that scales well is not only one that can handle growing traffic demands, but also one designed with the inevitable need to expand. This short chapter sets the stage for the rest of the course. This chapter covers the hierarchical network design model, the Cisco Enterprise Architecture modules, and appropriate device selections that you can use to systematically design a highly functional network.

instructor.indb 1

3/12/14 7:51 AM

2

CCNA Routing and Switching Practice and Study Guide

Implementing a Network Design An enterprise network must be designed to support the exchange of various types of network traffic, including data files, email, IP telephony, and video applications for multiple business units.

Hierarchical Network Design Users expect enterprise networks to be up 99.999 percent of the time. To provide this kind of reliability, enterprise class equipment uses redundant power supplies and has failover capabilities. Describe what failover capability means for enterprise class equipment. Failover capability refers to the ability of a device to switch from a nonfunctioning module, service, or device to a functioning one with little or no break in service. Why should a network be organized so that traffic stays local and is not propagated unnecessarily on to other portions of the network? Keeping traffic local optimizes bandwidth. Designing a network using the three-layer hierarchical design model helps optimize the network. In Figure 1-1, label the three layers of the hierarchical design model. Figure 1-1

Hierarchical Design Model Hierarchical Design Model

Internet

instructor.indb 2

Internet

3/12/14 7:51 AM

Chapter 1: Introduction to Scaling Networks

Figure 1-1a

3

Hierarchical Design Model (answer) Hierarchical Design Model

Internet

Internet

Core Layer

Distribution Layer

Access Layer

Briefly describe each layer of the hierarchical design model. The access layer provides connectivity for the users. The distribution layer is used to forward traffic from one local network to another. Finally, the core layer represents a high-speed backbone layer between dispersed networks. The Cisco Enterprise Architecture divides the network into functional components while still maintaining the core, distribution, and access layers. The primary Cisco Enterprise Architecture modules include Enterprise Campus, Enterprise Edge, Service Provider Edge, and Remote. A well-designed network not only controls traffic but also limits the size of failure domains. Briefly describe a failure domain. A failure domain is the area of a network that is impacted when a critical device or network service experiences problems.

instructor.indb 3

3/12/14 7:51 AM

4

CCNA Routing and Switching Practice and Study Guide

Use the list of modules to label the parts of the Cisco Enterprise Architecture in Figure 1-2. Modules 1 Campus Core 2 Remote Access & VPN 3 Building Distribution 4 Internet Connectivity 5 Building Access 6 Server Farm & Data Center 7 WAN Site-to-Site VPN 8 E-Commerce Figure 1-2

Cisco Enterprise Architecture

Enterprise Campus

Enterprise Edge

Service Provider Edge

Remote

Campus Infrastructure Module

Enterprise Branch ISP A

ISP B

Enterprise Teleworker

PSTN Enterprise Data Center

Network Management

instructor.indb 4

Frame Relay, ATM, MAN, ...

3/12/14 7:51 AM

Chapter 1: Introduction to Scaling Networks

Figure 1-2a

5

Cisco Enterprise Architecture (answer)

Enterprise Campus 5

Enterprise Edge

Service Provider Edge

Enterprise Branch

Campus Infrastructure Module

8

3

1

Remote

ISP A

4 ISP B

Enterprise Teleworker

2 PSTN Enterprise Data Center

6 7 Network Management

instructor.indb 5

Frame Relay, ATM, MAN, ...

3/12/14 7:51 AM

6

CCNA Routing and Switching Practice and Study Guide

Identify Scalability Terminology Match the definition on the left with the term on the right. This is a one-to-one matching exercise. Definition g. Isolates routing updates and minimizes the size of routing tables c. Cisco proprietary distance vector routing protocol f. Allows for redundant paths by eliminating switching loops h. Technique for aggregating multiple links between equipment to increase bandwidth e. Minimizes the possibility of a single point of failure

Terms a. Modular equipment b. OSPF c. EIGRP d. Wireless LANs e. Redundancy f. Spanning Tree Protocol g. Scalable Routing Protocol h. EtherChannel

a. Supports new features and devices without requiring major equipment upgrades b. Link-state routing protocol with a two-layer hierarchical design d. Increases flexibility, reduces costs, and provides mobility to users

instructor.indb 6

3/12/14 7:51 AM

Chapter 1: Introduction to Scaling Networks

7

Selecting Network Devices When designing a network, it is important to select the proper hardware to meet current network requirements and to allow for network growth. Within an enterprise network, both switches and routers play a critical role in network communication.

Selecting Switch Hardware Match the business consideration on the left with the switch feature on the right. This is a one-to-one matching exercise. Business Consideration a. Should provide continuous access to the network d. Daisy-chain switches with high-bandwidth throughput j. Refers to a switch’s ability to support the appropriate number of devices on the network h. Ability to adjust to growth of network users i. How fast the interfaces will process network data e. Important consideration in a network where there may be congested ports to servers or other areas of the network

Switch Feature a. Reliability b. Modular c. Power d. Stackable e. Frame buffers f. Cost g. Fixed configuration h. Scalability i. Port speed j. Port density

c. Provides electrical current to other device and support redundant power supplies g. Switches with preset features or options f. Depends on the number and speed of the interfaces, supported features, and expansion capability b. Switches with insertable switching line/port cards

instructor.indb 7

3/12/14 7:51 AM

8

CCNA Routing and Switching Practice and Study Guide

Packet Tracer Activity

Packet Tracer - Comparing 2960 and 3560 Switches (SN 1.2.1.7/SwN 1.1.2.5)

Selecting Router Hardware In Table 1-1, select the router category that applies to each description. Table 1-1

Identify Router Category Features

Router Description

Branch Routers

Fast performance with high security for data centers, campus, and branch networks

Network Edge Routers

Service Provider Routers

X

Simple network configuration and management for LANs and WANs

X

Optimizes services on a single platform

X

End-to-end delivery of subscriber services

X

Deliver next-generation Internet experiences across all devices and locations

X

High capacity and scalability with hierarchical quality of service Maximizes local services and ensures 24/7/365 uptime

X X

Unites campus, data center, and branch networks

X

Managing Devices A basic router or switch configuration includes the hostname for identification, passwords for security, and assignment of IP addresses to interfaces for connectivity. A router configuration also includes basic routing. In addition to configuration commands, router and switch verification commands are used to verify the operational status of the router or switch and related network functionality. Use the address scheme in Table 1-2 in the following exercises that review the most common router and switch configuration and verification commands. Table 1-2 Device

Interface

IPv4 Address

Subnet Mask

Default Gateway

R1

G0/0

172.16.1.1

255.255.255.0

N/A

S1

instructor.indb 8

Router and Switch Addressing Table

S0/0/0

172.16.3.1

255.255.255.252

N/A

S0/0/1

192.168.10.5

255.255.255.252

N/A

VLAN 1

192.168.1.5

255.255.255.0

192.168.1.1

3/12/14 7:51 AM

Chapter 1: Introduction to Scaling Networks

9

Basic Router Configuration Review Using Table 1-2 and the following requirements, record the commands, including the router prompt, to implement a basic router configuration: ■

Hostname is R1.



Console and Telnet line’s password is cisco.



Privileged EXEC password is class.



Banner message-of-the-day.



Interface addressing.



OSPF routing, including an appropriate router ID.



Save the configuration.

Router(config)# hostname R1 R1(config)# enable secret class R1(config)# line con 0 R1(config-line)# password cisco R1(config-line)# login R1(config-line)# line vty 0 15 R1(config-line)# password cisco R1(config-line)# login R1(config-line)# service password-encryption R1(config)# banner motd $ Authorized Access Only! $ R1(config)# interface GigabitEthernet0/0 R1(config-if)# ip address 172.16.1.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface Serial0/0/0 R1(config-if)# ip address 172.16.3.1 255.255.255.252 R1(config-if)# no shutdown R1(config-if)# interface Serial0/0/1 R1(config-if)# ip address 192.168.10.5 255.255.255.252 R1(config-if)# no shutdown R1(config-if)# router ospf 10 R1(config-router)# router-id 1.1.1.1 R1(config-router)# network 172.16.1.0 0.0.0.255 area 0 R1(config-router)# network 172.16.3.0 0.0.0.3 area 0 R1(config-router)# network 192.168.10.4 0.0.0.3 area 0 R1(config-router)# do copy run start

instructor.indb 9

3/12/14 7:51 AM

10

CCNA Routing and Switching Practice and Study Guide

Basic Router Verification Review In Table 1-3, record the verification command that will generate the described output. Table 1-3

Router Verification Commands

Command

Command Output

show ip route

Displays the routing table for known networks, including administrative distance, metric, and outbound interface

show ip protocols

Displays information about routing protocols, including process ID, router ID, and neighbors

show cdp neighbors

Displays information about directly connected Cisco devices

show ip interface brief

Displays all interfaces in an abbreviated format, including IP address and status

show ip ospf neighbor

Displays information about neighbors, including router ID, state, IP address, and local interface that learned of neighbor

show interfaces

Displays one or all interfaces, including status, bandwidth, and duplex type

Basic Switch Configuration Review Using Table 1-2 and the following requirements, record the commands, including the switch prompt, to implement a basic switch configuration: ■

Hostname is S1.



Console and Telnet line’s password is cisco.



Privileged EXEC password is class.



Banner message-of-the-day.



VLAN 1 interface addressing.



Save the configuration.

Switch(config)# hostname S1 S1(config)# enable secret class S1(config)# line con 0 S1(config-line)# password cisco S1(config-line)# login S1(config-line)# line vty 0 15 S1(config-line)# password cisco S1(config-line)# login S1(config-line)# service password-encryption S1(config)# banner motd $ Authorized Access Only! $ S1(config)# interface vlan 1 S1(config-if)# ip address 192.168.1.5 255.255.255.0 S1(config-if)# no shutdown S1(config-if)# ip default-gateway 192.168.1.1 S1(config-if)# do copy run start

instructor.indb 10

3/12/14 7:51 AM

Chapter 1: Introduction to Scaling Networks

11

Basic Switch Verification Review In Table 1-4, record the verification command that will generate the described output. Table 1-4

Packet Tracer Challenge

instructor.indb 11

Router Verification Commands

Command

Command Output

show cdp neighbors

Displays information about directly connected Cisco devices

show port-security address

Displays all secure MAC addresses

show mac-address-table

Displays a table of learned MAC addresses, including the port number and VLAN assigned to the port

show interfaces

Displays one or all interfaces, including status, bandwidth, and duplex type

show port-security

Displays information about maximum MAC addresses allowed, current counts, security violation count, and action to be taken

Packet Tracer - Skills Integration Challenge (SN 1.3.1.2)

3/12/14 7:51 AM

instructor.indb 12

3/12/14 7:51 AM

CHAPTER 2

LAN Redundancy

Computer networks are inextricably linked to productivity in today’s small and medium-sized businesses. Consequently, IT administrators have to implement redundancy in their hierarchical networks. When a switch connection is lost, another link needs to quickly take its place without introducing any traffic loops. This chapter investigates how Spanning Tree Protocol (STP) logically blocks physical loops in the network and how STP has evolved into a robust protocol that rapidly calculates which ports should be blocked in a VLAN-based network. In addition, the chapter briefly explores how Layer 3 redundancy is implemented through First Hop Redundancy Protocols (FHRPs).

instructor.indb 13

3/12/14 7:51 AM

14

CCNA Routing and Switching Practice and Study Guide

Spanning-Tree Concepts Redundancy increases the availability of a network topology by protecting the network from a single point of failure, such as a failed network cable or switch. STP was developed to address the issue of loops in a redundant Layer 2 design.

Draw a Redundant Topology In Figure 2-1, draw redundant links between the access, distribution, and core switches. Each access switch should have two links to the distribution layer with each link connecting to a different distribution layer switch. Each distribution layer switch should have two links to the core layer with each link connecting to a different core layer switch. Figure 2-1

Redundant Topology C1

D1

C2

D2

D3

Distribution

D4

S1

S2

S3

S4

S5

S6

PC1

PC2

PC3

PC4

PC5

PC6

Figure 2-1a

Access

Redundant Topology (answer) C1

D1

instructor.indb 14

Core

C2

D2

D3

Core

Distribution

D4

S1

S2

S3

S4

S5

S6

PC1

PC2

PC3

PC4

PC5

PC6

Access

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

15

Purpose of Spanning Tree STP prevents specific types of issues in a redundant topology like the one in Figure 2-1. Specifically, three potential issues would occur if STP was not implemented. Describe each of the following issues: ■

MAC database instability: Instability in the content of the MAC address table results from copies of the same frame being received on different ports of the switch. Data forwarding can be impaired when the switch consumes the resources that are coping with instability in the MAC address table.



Broadcast storms: Without some loop-avoidance process, each switch may flood broadcasts endlessly. This situation is commonly called a broadcast storm.



Multiple frame transmission: Multiple copies of unicast frames may be delivered to destination stations. Many protocols expect to receive only a single copy of each transmission. Multiple copies of the same frame can cause unrecoverable errors.

You should be prepared to use a topology like Figure 2-1 to explain exactly how these three issues would occur if STP was not implemented. Packet Tracer Activity

Packet Tracer - Examining a Redundant Design (SN 2.1.1.5/SwN 4.1.1.5)

Spanning-Tree Operation Because Rapid Spanning Tree Protocol (RSTP), which is documented in IEEE 802.1D-2004, supersedes the original STP documented in IEEE 802.1D-1998, all references to STP assume RSTP unless otherwise indicated. STP ensures that there is only one logical path between all destinations on the network by intentionally blocking redundant paths that could cause a loop. A switch port is considered blocked when network traffic is prevented from entering or leaving that port. STP uses the spanning-tree algorithm (STA) to determine which switch ports on a network need to be blocking to prevent loops from occurring. The STA designates a single switch as the root bridge and uses it as the reference point for all subsequent calculations. Switches participating in STP determine which switch has the lowest bridge ID (BID) on the network. This switch automatically becomes the root bridge. A bridge protocol data unit (BPDU) is a frame containing STP information exchanged by switches running STP. Each BPDU contains a BID that identifies the switch that sent the BPDU. The lowest BID value determines which switch is root. After the root bridge has been determined, the STA calculates the shortest path to the root bridge. If there is more than one path to choose from, STA chooses the path with the lowest path cost.

instructor.indb 15

3/12/14 7:51 AM

16

CCNA Routing and Switching Practice and Study Guide

When the STA has determined the “best” paths emanating from the root bridge, it configures the switch ports into distinct port roles. The port roles describe their relation in the network to the root bridge and whether they are allowed to forward traffic: ■

Root ports: Switch ports closest to the root bridge



Designated ports: Nonroot ports that are still permitted to forward traffic on the network



Alternate and backup ports: Ports in a blocking state to prevent loops



Disabled port: Ports that are administratively shut down

After a switch boots, it sends BPDU frames containing the switch BID and the root ID every 2 seconds. Initially, each switch identifies itself as the root bridge after boot. How would a switch determine that another switch is now the root bridge? If the root ID in the BPDU received from another switch is lower than the root ID on the receiving switch, the receiving switch updates its cached root ID information to that of the sending switch. How does the STA determine path cost? The path information is determined by summing up the individual egress port costs along the path from the respective switch to the root bridge. Record the default port costs for various link speeds in Table 2-1. Table 2-1

Port Costs

Link Speed

Cost (Revised IEEE Specification)

Cost (Previous IEEE Specification)

10 Gbps

2

1

1 Gbps

4

1

100 Mbps

19

10

10 Mbps

100

100

Although switch ports have a default port cost associated with them, the port cost is configurable. To configure the port cost of an interface, enter the spanning-tree cost value command in interface configuration mode. The range value can be between 1 and 200,000,000. Record the commands, including the switch prompt, to configure the port cost for F0/1 as 15: S2(config)# interface f0/1 S2(config-if)# spanning-tree cost 15

To verify the port and path cost to the root bridge, enter the show spanning-tree privileged EXEC mode command, as shown here: S2# show spanning-tree

VLAN0001 Spanning tree enabled protocol ieee

instructor.indb 16

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

Root ID

Priority

32769

Address

c025.5cd7.ef00

Cost

15

Port

1 (FastEthernet0/1)

Hello Time

Bridge ID

2 sec

Max Age 20 sec

Priority

32769

Address

c07b.bcc4.a980

Hello Time Aging Time

Interface

Forward Delay 15 sec

(priority 32768 sys-id-ext 1)

2 sec 15

17

Max Age 20 sec

Forward Delay 15 sec

sec

Role Sts Cost

Prio.Nbr Type

------------------- ---- --- --------- -------- -------------------------------Fa0/1

Root FWD 15

128.1

P2p

Fa0/2

Altn BLK 19

128.2

P2p

Fa0/3

Desg LIS 19

128.3

P2p

Fa0/4

Desg LIS 19

128.4

P2p

Fa0/6

Desg FWD 19

128.6

P2p

The BID field of a BPDU frame contains three separate fields: bridge priority, extended system ID, and MAC address. Of these three fields, the bridge priority is a customizable value that you can use to influence which switch becomes the root bridge. The default value for this field is 32768. Cisco enhanced its implementation of STP to include support for the extended system ID field, which contains the ID of the VLAN with which the BPDU is associated. Because using the extended system ID changes the number of bits available for the bridge priority, the customizable values can only be multiples of 4096. When two switches are configured with the same priority and have the same extended system ID, the switch with the lowest MAC address has the lower BID.

Identify the 802.1D Port Roles The topologies in the next three figures do not necessarily represent an appropriate network design. However, they provide good exercise topologies for you to practice determining the STP port roles. In Figures 2-2 through 2-4, use the priority values and MAC addresses to determine the root bridge. Then label the ports with one of the following:

instructor.indb 17



RP: Root Port



DP: Designated Port



AP: Alternate Port

3/12/14 7:51 AM

18

CCNA Routing and Switching Practice and Study Guide

Figure 2-2

802.1D Port Roles - Scenario 1 G1/1

G1/1 S2

S1 F0/1

F0/1

G1/2

F0/1

G1/2

F0/1 S4

S3 Device S1 S2 S3 S4

Figure 2-2a

Priority 32769 24577 32769 32769

MAC Address 000a:0001:1111 000a:0002:2222 000a:0003:3333 000a:0004:4444

802.1D Port Roles - Scenario 1 (answer) G1/1

G1/1 RP

S1 F0/1

DP DP

DP

S2 DP

RP G1/2

RP F0/1 S4

S3 Device S1 S2 S3 S4

Figure 2-3

F0/1

G1/2

AP F0/1

Root

Priority 32769 24577 32769 32769

MAC Address 000a:0001:1111 000a:0002:2222 000a:0003:3333 000a:0004:4444

802.1D Port Roles - Scenario 2 G1/1

G1/1 S2

S1 F0/1

F0/1

G1/2

F0/1

G1/2

F0/1 S4

S3 Device S1 S2 S3 S4

instructor.indb 18

Priority 24577 32769 32769 32769

MAC Address 000a:0001:1111 000a:0002:2222 000a:0003:3333 000a:0004:4444

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

Figure 2-3a

802.1D Port Roles - Scenario 2 (answer) Root

G1/1

G1/1 DP

S1 F0/1

RP DP

DP

S2

F0/1

F0/1

G1/2

DP

RP

RP G1/2

AP F0/1 S4

S3 Device S1 S2 S3 S4

Figure 2-4

Priority 24577 32769 32769 32769

MAC Address 000a:0001:1111 000a:0002:2222 000a:0003:3333 000a:0004:4444

802.1D Port Roles - Scenario 3 G1/1

G1/1 S2

S1 F0/1

F0/1

G1/2

F0/1

G1/2

F0/1 S4

S3 Device S1 S2 S3 S4

Figure 2-4a

Priority 32769 32769 24577 32769

MAC Address 000a:0001:1111 000a:0002:2222 000a:0003:3333 000a:0004:4444

802.1D Port Roles - Scenario 3 (answer) G1/1

G1/1 DP

S1 F0/1

AP RP

RP

DP F0/1

S2 F0/1

G1/2

DP

RP G1/2

DP F0/1 S4

S3 Root Device S1 S2 S3 S4

instructor.indb 19

19

Priority 32769 32769 24577 32769

MAC Address 000a:0001:1111 000a:0002:2222 000a:0003:3333 000a:0004:4444

3/12/14 7:51 AM

20

CCNA Routing and Switching Practice and Study Guide

Lab – Building a Switched Network with Redundant Links (SN 2.1.2.10/SwN 4.1.2.10)

Varieties of Spanning Tree Protocols STP has been improved multiple times since its introduction in the original IEEE 802.1D specification. A network administrator should know which type to implement based on the equipment and topology needs.

Comparing the STP Varieties Identify each of the STP varieties described in the following list: ■

Multiple Spanning Tree Protocol (MSTP): This is an IEEE that maps multiple VLANs into the same spanning tree instance.



Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w: This is an evolution of STP that provides faster convergence than STP.



802.1D-2004: This is an updated version of the STP standard, incorporating IEEE 802.1w.



PVST+: This is a Cisco enhancement of STP that provides a separate 802.1D spanning tree instance for each VLAN configured in the network.



Rapid PVST+: This is a Cisco enhancement that provides a separate instance of 802.1w per VLAN.



STP: This is the original IEEE 802.1D version (802.1D-1998 and earlier) that provides a loop-free topology in a network with redundant links.

Complete the cells in Table 2-2 to identify each the characteristics of each STP variety. Table 2-2

STP Characteristics - Exercise 1

Protocol

Standard

Resources Needed

Convergence

Tree Calculation

STP

802.1D

Low

Slow

All VLANs

PVST+

Cisco

High

Slow

Per VLAN

RSTP

802.1w

Medium

Fast

All VLANs

Rapid PVST+

Cisco

Very high

Fast

Per VLAN

MSTP

802.1s, Cisco

Medium or high

Fast

Per instance

In Table 2-3, indicate which varieties of STP are best described by the characteristic. Some characteristics apply to more than one STP variety.

instructor.indb 20

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

Table 2-3

21

STP Characteristics - Exercise 2

Characteristic

STP

PVST+

RSTP

Rapid PVST+

MSTP

A Cisco implementation of 802.1s that provides up to 16 instances of RSTP.

X

Cisco enhancement of RSTP.

X

The default STP mode for Cisco Catalyst switches.

X

Has the highest CPU and memory requirements. Can lead to suboptimal traffic flows.

X X

X

Cisco proprietary versions of STP.

X

Cisco enhancement of STP. Provides a separate 802.1D spanning-tree instance for each VLAN.

X

There is only 1 root bridge and 1 tree.

X

Uses 1 IEEE 802.1D spanning-tree instance for the entire bridged network, regardless of the number of VLANs.

X

Supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard. An evolution of STP that provides faster STP convergence.

X

X

X

X

X X

Maps multiple VLANs that have the same traffic flow requirements into the same spanning-tree instance. First version of STP to address convergence issues, but still provided only one STP instance.

MST

X

X

PVST+ Operation After a switch boots, the spanning tree is immediately determined as ports transition through five possible states and three BPDU timers on the way to convergence. Briefly describe each state:

instructor.indb 21



Blocking: The port is an alternate port and does not participate in frame forwarding. The port continues to process received BPDU frames to determine the location and root ID of the root bridge and what port role the switch port should assume in the final active STP topology.



Listening: STP has determined that the port can be selected as a root port or designated port based upon the information in the BPDU frames it has received so far. At this point, the switch port is not only receiving BPDU frames, it is also transmitting its own BPDU frames and informing adjacent switches that the switch port is preparing to participate in the active topology. The port returns to blocking state if it is determined that the port does not provide the lowest cost path to the root bridge.

3/12/14 7:51 AM

22

CCNA Routing and Switching Practice and Study Guide



Learning: The port prepares to participate in frame forwarding and begins to populate the MAC address table.



Forwarding: The port is considered part of the active topology and forwards frames and also sends and receives BPDU frames.



Disabled: The Layer 2 port does not participate in spanning tree and does not forward or process frames. The switch port is administratively disabled.

Once stable, every active port in the switched network is either in the forwarding state or the blocking state. List and briefly describe the four steps PVST+ performs for each VLAN to provide a loop-free logical topology. Step 1.

Elects one root bridge: The root bridge is the switch with the lowest bridge ID.

Step 2.

Selects the root port on each nonroot bridge: STP establishes one root port on each nonroot bridge. The root port is the lowest-cost path from the nonroot bridge to the root bridge.

Step 3.

Selects the designated port on each segment: The designated port is selected on the switch that has the lowest-cost path to the root bridge.

Step 4.

The remaining ports in the switched network are alternate ports: Alternate ports normally remain in the blocking state, to logically break the loop topology.

In Table 2-4, answer the “Operation Allowed” question with “yes” or “no” for each port state. Table 2-4

Operations Allowed at Each Port State

Operation Allowed

Port State Blocking

Listening

Learning

Forwarding

Disabled

Can receive and process BPDUs

Yes

Yes

Yes

Yes

No

Can forward data frames received on interface

No

No

No

Yes

No

Can forward data frames No switched from another interface

No

No

Yes

No

Can learn MAC addresses

No

Yes

Yes

No

No

Rapid PVST+ Operation RSTP (IEEE 802.1w) is an evolution of the original 802.1D standard and is incorporated into the IEEE 802.1D-2004 standard. Rapid PVST+ is the Cisco implementation of RSTP on a perVLAN basis. What is the primary difference between Rapid PVST+ and RSTP? With Rapid PVST+, an independent instance of RSTP runs for each VLAN. Briefly describe the RSTP concept that corresponds to the PVST+ PortFast feature. RSTP identifies those ports that can be considered edge ports that are directly connected to an end device. Because edge ports are not connected to another switch, they can immediately transition to the forwarding state.

instructor.indb 22

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

23

What command implements Cisco’s version of an edge port? spanning-tree portfast In Table 2-5, indicate whether the characteristic describes PVST+, Rapid PVST+, or both. Table 2-5

Comparing PVST+ and Rapid PVST+

Characteristic

PVST+

Rapid PVST+

Cisco proprietary protocol.

Both

X

Port roles: root, designated, alternate, edge, backup.

X

CPU processing and trunk bandwidth usage is greater than with STP.

X

Ports can transition to forwarding state without relying on a timer.

X

The root bridge is determined by the lowest BID + VLAN ID + MAC. Runs a separate IEEE 802.1D STP instance for each VLAN.

X X

Possible to have load sharing with some VLANS forwarding on each trunk.

X

Sends a BPDU “hello message” every 2 seconds.

X

Spanning-Tree Configuration It is crucial to understand the impact of a default switch configuration on STP convergence and what configurations can be applied to adjust the default behavior.

PVST+ and Rapid PVST+ Configuration Complete Table 2-6 to show the default spanning-tree configuration for a Cisco Catalyst 2960 series switch. Table 2-6

Default Switch Configuration

Feature

Default Setting

Enable state

Enabled on VLAN 1

Spanning-tree mode

PVST+

Switch priority

32768

Spanning-tree port priority (configurable on a per-interface basis)

128

Spanning-tree port cost (configurable on a per-interface basis)

1000 Mbps: 4 100 Mbps: 19 10 Mbps: 100

Spanning-tree VLAN port priority (configurable on a per-VLAN basis)

instructor.indb 23

128

3/12/14 7:51 AM

24

CCNA Routing and Switching Practice and Study Guide

Feature

Default Setting

Spanning-tree VLAN port cost (configurable on a per-VLAN basis)

1000 Mbps: 4 100 Mbps: 19 10 Mbps: 100

Spanning-tree timers

Hello time: 2 seconds Forward-delay time: 15 seconds Maximum-aging time: 20 seconds Transmit hold count: 6 BPDUs

Document the two different configuration commands that you can use to configure the bridge priority value so that the switch is root for VLAN 1. Use the value 4096 when necessary: S1(config)# spanning-tree vlan 1 root primary !or S1(config)# spanning-tree vlan 1 priority 4096

Record the command to verify that the local switch is now root: S1# show spanning-tree

VLAN0001 Spanning tree enabled protocol ieee Root ID

Priority

24577

Address

000A.0033.3333

This bridge is the root Hello Time

Bridge ID

2 sec

Max Age 20 sec

Priority

24577

Address

0019.aa9e.b000

Hello Time

2 sec

Forward Delay 15 sec

(priority 24576 sys-id-ext 1)

Max Age 20 sec

Forward Delay 15 sec

Aging Time 300

Interface

Role Sts Cost

Prio.Nbr Type

---------------- ---- --- --------- -------- -------------------------------Fa0/1

Desg FWD 4

128.1

Shr

Fa0/2

Desg FWD 4

128.2

Shr

Explain the purpose of the BPDU guard feature on Cisco switches. The BPDU guard feature protects the spanning tree from recalculations that might occur if a BPDU is received on an edge port because it connected to a switch.

instructor.indb 24

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

25

What command interface configuration command enables BPDU guard? spanning-tree bpduguard enable What global configuration command will configure all nontrunking ports as edge ports? spanning-tree portfast default What global configuration command will configure BPDU guard on all PortFast-enabled ports? spanning-tree portfast bpduguard default The power of PVST+ is that it can load balance across redundant links. By default, the leastfavored redundant link is not used. So, you must manually configure PVST+ to use the link. Figure 2-5 represents a small section of Figure 2-1, showing only two distribution layer switches and one access layer switch. For this example, we have attached PC2 to S1. PC1 is assigned to VLAN 15, and PC2 is assigned to VLAN 25. D1 should be the primary root for VLAN 1 and VLAN 15 and the secondary root for VLAN 25. D2 should be the primary root for VLAN 25 and the secondary root for VLAN 15. Figure 2-5

PVST+ Configuration Topology Root for VLAN 15

Root for VLAN 25

D1

D2

S1

PC1

PC2

VLAN 15

VLAN 25

Based on these requirements, document the commands to modify the default PVST+ operation on D1 and D2. D1 commands D1(config)# spanning-tree vlan 1 root primary D1(config)# spanning-tree vlan 15 root primary D1(config)# spanning-tree vlan 25 root secondary

D2 commands D2(config)# spanning-tree vlan 15 root secondary D2(config)# spanning-tree vlan 25 root primary

instructor.indb 25

3/12/14 7:51 AM

26

CCNA Routing and Switching Practice and Study Guide

Document the commands to configure all nontrunking ports on S1 as edge ports with BPDU guard enabled. S1(config)# spanning-tree portfast default S1(config)# spanning-tree portfast bpduguard default

Now, assume that you want to run rapid PVST+ on all three switches. What command is required? spanning-tree mode rapid-pvst Lab - Configuring Rapid PVST+, PortFast, and BPDU Guard (SN 2.3.2.3/SwN 4.3.2.3) Packet Tracer Activity Packet Tracer Activity

Packet Tracer - Configuring PVST+ (SN 2.3.1.5/SwN 4.3.1.5) Packet Tracer - Configuring Rapid PVST+ (SN 2.3.2.2/SwN 4.3.2.2)

First Hop Redundancy Protocols Up to this point, we’ve been reviewing STP and how to manipulate the election of root bridges and load balance across redundant links. In addition to Layer 1 and Layer 2 redundancy, a high-availability network might also implement Layer 3 redundancy by sharing the default gateway responsibility across multiple devices. Through the use of a virtual IP address, two Layer 3 devices can share the default gateway responsibility. The section reviews First Hop Redundancy Protocols (FHRPs) that provide Layer 3 redundancy.

instructor.indb 26

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

27

Identify FHRP Terminology Match the definition on the left with the terms on the right. This is a one-to-one matching exercise. Definitions

Terms

b. The ability to dynamically recover from the failure of a device acting as the default gateway

b. First-hop redundancy

h. Two or more routers sharing a single MAC and IP address

d. Redundancy rrotocol

c. A device that is part of a virtual router group assigned to the role of default gateway

f. Virtual IP address

d. Provides the mechanism for determining which router should take the active role in forwarding traffic

a. Default gateway c. Forwarding router e. Standby router g. Virtual MAC address h. Virtual router

a. A device that routes traffic destined to network segments beyond the source network segment e. A device that is part of a virtual router group assigned the role of alternate default gateway f. A Layer 3 address assigned to a protocol that shares the single address among multiple devices g. The Layer 2 address returned by ARP for an FHRP gateway

instructor.indb 27

3/12/14 7:51 AM

28

CCNA Routing and Switching Practice and Study Guide

Identify the Type of FHRP In Table 2-7, indicate whether the characteristic describes HSRP, VRRP, or GLBP. Table 2-7

FHRP Characteristics

FHRP Characteristic

HSRP

Used in a group of routers for selecting an active device and a standby device.

GLBP

X

A nonproprietary election protocol that allows several routers on a multi-access link to use the same virtual IPv4 address. Cisco-proprietary FHRP protocol designed to allow for transparent failover of a first-hop IPv4 devices.

VRRP

X X

Cisco-proprietary FHRP protocol that protects data traffic from a failed router or circuit while also allowing load sharing between a group of redundant routers.

X

One router is elected as the virtual router master, with the other routers acting as backups in case the virtual router master fails.

X

HSRP and GLBP Configuration and Verification Refer to the topology in Figure 2-6. R2 has been configured for HSRP group 20, priority 120, IP address 192.168.1.20, and virtual IP address 192.168.1.1. Figure 2-6

HSRP and GLBP Configuration Topology

Core

R2 192.168.1.20

Virtual IP 192.168.1.1

R1 192.168.1.10

Example 2-1 shows the HSRP configuration for R2. Example 2-1

R2 HSRP Configuration

R2# show run interface g0/1 interface GigabitEthernet0/1 ip address 192.168.1.20 255.255.255.0 standby 20 ip 192.168.1.1 standby 20 priority 120

instructor.indb 28

3/12/14 7:51 AM

Chapter 2: LAN Redundancy

29

Using the information in Example 2-1, document the commands to configure R1 as the HSRP active router in group 20 using a priority of 210. R1(config)# interface GigabitEthernet0/1 R1(config-if)# ip address 192.168.1.10 255.255.255.0 R1(config-if)# no shutdown R1(config-if)#standby 20 ip 192.168.1.1 R1(config-if)#standby 20 priority 210

What command would generate the following output to verify the HSRP configuration? R1# show standby brief P indicates configured to preempt. | Interface

Grp

Pri P State

Active

Standby

Virtual IP

Gi0/1

20

210

local

192.168.1.20

192.168.1.1

Active

Now assume that all HSRP configurations have been removed. R2 has been configured for GLBP group 20, priority 120, IP address 192.168.1.20, and virtual IP address 192.168.1.1. Example 2-2 shows the GLBP configuration for R2. Example 2-2

R2 GLBP Configuration

R2# show run interface g0/1 interface GigabitEthernet0/1 ip address 192.168.1.20 255.255.255.0 glbp 20 ip 192.168.1.1 glbp 20 priority 120

Using the information in Example 2-2, document the commands to configure R1 to be in GLBP group 20 using a priority of 210. R1(config)# interface GigabitEthernet0/1 R1(config-if)# ip address 192.168.1.10 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# glbp 20 ip 192.168.1.1 R1(config-if)# glbp 20 priority 210

What command would generate the following output to verify the GLBP configuration? R1# show glbp GigabitEthernet0/0 - Group 20 State is Active 1 state change, last state change 00:03:05 Virtual IP address is 192.168.1.1

instructor.indb 29

3/12/14 7:51 AM

30

CCNA Routing and Switching Practice and Study Guide

Hello time 3 sec, hold time 10 sec Next hello sent in 1.792 secs Redirect time 600 sec, forwarder timeout 14400 sec Preemption disabled Active is local Standby is 192.168.1.20, priority 120 (expires in 9.024 sec) Priority 210 (configured) Weighting 100 (default 100), thresholds: lower 1, upper 100 Load balancing: round-robin Group members: 0006.f671.db58 (192.168.1.10) local 0006.f671.eb38 (192.168.1.20) There are 2 forwarders (1 active) Forwarder 1 State is Active 1 state change, last state change 00:02:53 MAC address is 0007.b400.0a01 (default) Owner ID is 0006.f671.db58 Redirection enabled Preemption enabled, min delay 30 sec Active is local, weighting 100 Forwarder 2 State is Listen MAC address is 0007.b400.0a02 (learnt) Owner ID is 0006.f671.eb38 Redirection enabled, 599.040 sec remaining (maximum 600 sec) Time to live: 14399.040 sec (maximum 14400 sec) Preemption enabled, min delay 30 sec Active is 192.168.1.20 (primary), weighting 100 (expires in 9.312 sec)

Lab - Configuring HSRP and GLBP (SN 2.4.3.4/SwN 4.4.3.4)

instructor.indb 30

3/12/14 7:51 AM

CHAPTER 3

Link Aggregation

Link aggregation is the ability to create one logical link using multiple physical links between two devices. This allows load sharing among the physical links, rather than having a STP block one or more of the links.

instructor.indb 31

3/12/14 7:51 AM

32

CCNA Routing and Switching Practice and Study Guide

Link Aggregation Concepts One of the best ways to reduce the time it takes for STP convergence is to simply avoid STP. EtherChannel is a form of link aggregation used in switched networks.

EtherChannel Advantages EtherChannel technology was originally developed by Cisco as a technique of grouping several Fast Ethernet or Gigabit Ethernet switch ports into one logical channel. List at least three advantages to using EtherChannel: ■

Most configuration tasks can be done on the EtherChannel interface instead of on each individual port.



EtherChannel relies on existing switch ports. No need to upgrade.



Load balancing takes place between links that are part of the same EtherChannel.



EtherChannel creates an aggregation that is seen as one logical link. Where there is only one EtherChannel link, all physical links in the EtherChannel are active because STP sees only one (logical) link.



EtherChannel provides redundancy because the overall link is seen as one logical connection. Assuming at least one physical link is present; the EtherChannel remains functional, even if its overall throughput decreases because of a lost link within the EtherChannel.

EtherChannel Operation You can configure EtherChannel as static or unconditional. However, there are also two protocols that can be used to configure the negotiation process: Port Aggregation Protocol (PAgP— Cisco proprietary) and Link Aggregation Control Protocol (LACP—IEEE 802.3ad). These two protocols ensure that both sides of the link have compatible configurations—same speed, duplex setting, and VLAN information. The modes for each differ slightly. For PAgP, briefly describe each of the following modes: ■

On: This mode forces the interface to channel without PAgP.



Desirable: The interface initiates negotiations with other interfaces by sending PAgP packets.



Auto: The interface responds to the PAgP packets that it receives, but does not initiate PAgP negotiation.

For LACP, briefly describe each of the following modes: ■

On: This mode forces the interface to channel without LACP.



Active: The interface initiates negotiations with other interfaces by sending LACP packets.



Passive: The interface responds to the LACP packets that it receives, but does not initiate LACP negotiation.

In Table 3-1, indicate the mode that is described.

instructor.indb 32

3/12/14 7:51 AM

Chapter 3: Link Aggregation

Table 3-1

33

PAgP and LACP Modes

Mode

PAgP and/or LACP Mode Description

Active

Initiates LACP negotiations with other interfaces.

On

Forces EtherChannel state without PAgP or LACP initiated negotiations.

Auto

Places an interface in a passive, responding state. Does not initiate PAgP negotiations.

Desirable

Actively initiates PAgP negotiations with other interfaces.

Passive

Places an interface in a passive, responding state. Does not initiate LACP negotiations.

The mode that is configured on each side of the EtherChannel link determines whether EtherChannel will be operational. In Table 3-2, two switches are using PAgP. Indicate with “yes” or “no” whether EtherChannel is established. Table 3-2

EtherChannel Negotiation Using PAgP

Switch 1 Mode

Switch 2 Mode

EtherChannel Established?

Auto

Auto

No

Auto

Desirable

Yes

On

Desirable

No

On

Off

No

Desirable

Desirable

Yes

In Table 3-3, two switches are using LACP. Indicate with “yes” or “no” whether EtherChannel is established. Table 3-3

EtherChannel Negotiation Using LACP

Switch 1 Mode

Switch 2 Mode

EtherChannel Established?

Passive

On

No

Passive

Active

Yes

On

On

Yes

Passive

Passive

No

On

Active

No

Link Aggregation Configuration EtherChannel configuration is rather straightforward once you decide on which protocol you will use. In fact, the easiest method is to just force both sides to be on.

instructor.indb 33

3/12/14 7:51 AM

34

CCNA Routing and Switching Practice and Study Guide

Configuring EtherChannel To configure EtherChannel, complete the following steps: Step 1.

Specify the interfaces that, participate in the EtherChannel group using the interface range interface command. What are the requirements for each interface before they can form an EtherChannel? All interfaces must support EtherChannel, be configured with the same speed and duplex settings, support the same VLAN or be configured as a trunk, and share the same range of allowed VLANs on trunks.

Step 2.

Create the port channel interface with the channel-group identifier mode {on | auto | desirable | active | passive} command in interface range configuration mode. The keyword on forces the port to channel without PAgP or LACP. The keywords auto and desirable enable PAgP. The keywords active and passive enable LACP.

Step 3.

The channel-group command automatically creates a port channel interface using the identifier as the number. Use the interface port-channel identifier command to configure channel-wide settings like trunking, native VLANs, or allowed VLANs.

As you can see from the configuration steps, the way you specify whether to use PAgP, LACP, or no negotiations is by configuring one keyword in the channel-group command. So, with those steps in mind, consider Figure 3-1 in each of the following configuration scenarios. Figure 3-1

EtherChannel Topology Fa0/1 S1

Fa0/2

S2

EtherChannel Configuration Scenario 1 Record the commands, including the switch prompt, to configure the S1 Fa0/1 and Fa0/2 into an EtherChannel without negotiations. Then force the channel to trunking using native VLAN 99. S1(config)# interface range fa0/1-2 S1(config-range-if)# channel-group 1 mode on S1(config-range-if)# interface port-channel 1 S1(config-if)# switchport mode trunk S1(config-if)# switchport trunk native vlan 99

EtherChannel Configuration Scenario 1 Record the commands, including the switch prompt, to configure the S1 Fa0/1 and Fa0/2 into an EtherChannel using PAgP. S1 should initiate the negotiations. The channel should trunk, allowing only VLANs 1, 10, and 20. S1(config)# interface range fa0/1-2 S1(config-range-if)# channel-group 1 mode desirable S1(config-range-if)# interface port-channel 1 S1(config-if)# switchport mode trunk S1(config-if)# switchport trunk allowed vlan 1,10,20

instructor.indb 34

3/12/14 7:51 AM

Chapter 3: Link Aggregation

35

EtherChannel Configuration Scenario 1 Record the commands, including the switch prompt, to configure the S1 Fa0/1 and Fa0/2 into an EtherChannel using LACP. S1 should not initiate the negotiations. The channel should trunk, allowing all VLANs. S1(config)# interface range fa0/1-2 S1(config-range-if)# channel-group 1 mode passive S1(config-range-if)# interface port-channel 1 S1(config-if)# switchport mode trunk

Lab - Configuring EtherChannel (SN 3.2.1.4/SwN 5.2.1.4) Packet Tracer Activity

Packet Tracer - Configuring EtherChannel (SN 3.2.1.3/SwN 5.2.1.3)

Verifying and Troubleshooting EtherChannel Record the commands used to display the output in Example 3-1. Example 3-1

EtherChannel Verification Commands

S1# show interface port-channel1 Port-channel1 is up, line protocol is up (connected) Hardware is EtherChannel, address is 0cd9.96e8.8a01 (bia 0cd9.96e8.8a01) MTU 1500 bytes, BW 200000 Kbit/sec, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255

S1# show etherchannel summary Flags:

D - down

P - bundled in port-channel

I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3

S - Layer2

U - in use

f - failed to allocate aggregator

M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port

Number of channel-groups in use: 1 Number of aggregators:

instructor.indb 35

1

3/12/14 7:51 AM

36

CCNA Routing and Switching Practice and Study Guide

Group

Port-channel

Protocol

Ports

------+-------------+-----------+----------------------------------------------1

Po1(SU)

LACP

Fa0/1(P)

Fa0/2(P)

S1# show etherchannel port-channel Channel-group listing: ----------------------

Group: 1 ---------Port-channels in the group: ---------------------------

Port-channel: Po1

(Primary Aggregator)

------------

Age of the Port-channel Logical slot/port

= 0d:00h:25m:17s

= 2/1

Number of ports = 2

HotStandBy port = null Port state

= Port-channel Ag-Inuse

Protocol

=

Port security

= Disabled

LACP

Ports in the Port-channel:

Index

Load

Port

EC state

No of bits

------+------+------+------------------+----------0

00

Fa0/1

Active

0

0

00

Fa0/2

Active

0

Time since last port bundled:

0d:00h:05m:41s

Fa0/2

Time since last port Un-bundled: 0d:00h:05m:48s

Fa0/2

S1# show interfaces f0/1 etherchannel Port state

Channel group = 1

Mode = Active

Gcchange = -

Port-channel

= Po1

GC

Pseudo port-channel = Po1

Port index

= 0

Load = 0x00

Flags:

instructor.indb 36

= Up Mstr Assoc In-Bndl

=

-

Protocol =

LACP

S - Device is sending Slow LACPDUs

F - Device is sending fast LACPDUs.

A - Device is in active mode.

P - Device is in passive mode.

3/12/14 7:51 AM

Chapter 3: Link Aggregation

37

Local information: LACP port

Admin

Oper

Port

Port

Port

Flags

State

Priority

Key

Key

Number

State

Fa0/1

SA

bndl

32768

0x1

0x1

0x102

0x3D

Partner's information:

LACP port Port

Flags

Priority

Dev ID

Fa0/1

SA

32768

0cd9.96d2.4000

Admin

Oper

Port

Port

Age

key

Key

Number

State

4s

0x0

0x1

0x102

0x3D

Age of the port in the current state: 0d:00h:24m:59s S1#

When troubleshooting an EtherChannel issue, keep in mind the configuration restrictions for interfaces that participate in the channel. List at least four restrictions. ■

All ports must be in the same VLANs or configured as trunks.



Trunking mode must be the same for each side of the channel.



Allowed VLANs on trunks must be the same for both sides.



Both sides of the channel must be configured with compatible PAgP or LACP dynamic negotiation options.



The link speed and duplex setting must match.

Refer to the output for S1 and S2 in Example 3-2. Record the command that generated the output. Example 3-2

Troubleshooting an EtherChannel Issue

S1# show etherchannel summary Flags:

D - down

P - bundled in port-channel

I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3

S - Layer2

U - in use

f - failed to allocate aggregator

M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port Number of channel-groups in use: 1 Number of aggregators:

1

Group

Ports

Port-channel

Protocol

------+-------------+-----------+----------------------------------------------1

Po1(SD)

-

Fa0/1(D)

Fa0/2(D)

S1# show run | begin interface Port-channel

instructor.indb 37

3/12/14 7:51 AM

38

CCNA Routing and Switching Practice and Study Guide

interface Port-channel1 switchport mode trunk ! interface FastEthernet0/1 switchport mode trunk channel-group 1 mode auto ! interface FastEthernet0/2 switchport mode trunk channel-group 1 mode auto ! S 1# S2# show run | begin interface Port-channel interface Port-channel1 switchport mode trunk ! interface FastEthernet0/1 switchport mode trunk channel-group 1 mode auto ! interface FastEthernet0/2 switchport mode trunk channel-group 1 mode auto ! S2#

Explain why the EtherChannel between S1 and S2 is down. Both sides of the link are set to the PAgP auto mode, which means that the interface will listen for PAgP packets but will not initiate negotiations. Neither side initiates negotiation, so the channel is down. EtherChannel and spanning tree must interoperate. For this reason, the order in which EtherChannel-related commands are entered is important. To correct this issue, you must first remove the port channel. Otherwise, spanning-tree errors cause the associated ports to go into blocking or errdisabled state. With that in mind, what would you suggest to correct the issue shown in Example 3-2 if the requirement is to use PAgP? What commands would be required? Remove the port channel 1 interface, and then configure the interfaces to use desirable mode. This can be done on one or both switches. S1(config)# no interface Port-channel 1 S1(config)# interface range f0/1 - 2 S1(config-if-range)# channel-group 1 mode desirable

instructor.indb 38

3/12/14 7:51 AM

Chapter 3: Link Aggregation

39

S1(config-if-range)# interface Port-channel 1 S1(config-if)# switchport mode trunk S2(config)# no interface Port-channel 1 S2(config)# interface range f0/1 - 2 S2(config-if-range)# channel-group 1 mode desirable S2(config-if-range)# no shutdown S2(config-if-range)# interface Port-channel 1 S2(config-if)# switchport mode trunk

Lab - Troubleshooting EtherChannel (SN 3.2.2.4/SwN 5.2.2.4) Packet Tracer Activity

instructor.indb 39

Packet Tracer - Troubleshooting EtherChannel (SN 3.2.2.3/SwN 5.2.2.3) Packet Tracer - Skills Integration Challenge (SN 3.3.1.2/SwN 5.3.1.2)

3/12/14 7:51 AM

instructor.indb 40

3/12/14 7:51 AM

CHAPTER 4

Wireless LANs

Wireless networks are becoming increasingly ubiquitous. If you have a router at home, chances are it supports a wireless LAN (WLAN). In the work environment, WLANs provide the ability to connect from any location at any time within the campus network. WLANs use radio frequencies that present some unique design and implementation considerations. This chapter reviews WLAN technology, components, security, planning, implementation, and troubleshooting.

instructor.indb 41

3/12/14 7:51 AM

42

CCNA Routing and Switching Practice and Study Guide

Wireless LAN Concepts Wireless access can result in increased productivity and more relaxed employees. With wireless networking, employees have the flexibility to work when they want, where they want. This section reviews basic wireless concepts and components.

Identify Wireless Technologies When referring to communication networks, the term wireless encompasses a wide variety of technologies. Although the focus for the CCNA student is on WLANs, you should also be aware of the basic features of other wireless technologies and applications. In Table 4-1, indicate the wireless technology described by each feature. Table 4-1

Identify the Wireless Technology

Wireless Technology Feature

Bluetooth

Wi-Fi

WiMax

Cellular

Clear line of sight required

X

IEEE 802.16 IEEE 802.15

X X

Uses 2G, 3G, and 4G variations

X

Supports speeds up to 1 Gbps

X

Provides mobile broadband connectivity

X

Supports download speeds up to 10 Mbps

X

Supports speeds up to 5 Mbps

X

Distance transmissions of up to 300 meters

X

Requires directional dish aligned with GEO device Supports speeds up to 24 Mbps

X X

Transmission distances of up to 30 miles (50 km) Distance transmissions of up to 100 meters

Satellite

X X

Supports speeds up to 7 Gbps

X

IEEE 802.11

X

WLANs standards began in 1997 with the first 802.11 specification. Subsequent revisions have increased the speed and changed the frequency. As the standard rapidly evolved, it became important to maintain backward compatibility so that devices would still be able to connect to newer and faster access points. In Table 4-2, all the current flavors of 802.11 are listed in chronological order. For each one, indicate the maximum speed, frequency or frequencies, and with what earlier versions the specification is compatible (if any).

instructor.indb 42

3/12/14 7:51 AM

Chapter 4: Wireless LANs

Table 4-2

43

Comparing the WLAN Standards

IEEE Standard Maximum Speed

Frequency

Backward Compatibility With

802.11

2 Mbps

2.4 GHz

None

802.11a

54 Mbps

5 GHz

None

802.11b

11 Mbps

2.4 GHz

None

802.11g

54 Mbps

2.4 GHz

802.11b

802.11n

600 Mbps

2.4 GHz and 5 GHz

802.11a/b/g

802.11ac

1.3 Gbps

5 GHz

802.11a/n

802.11ad

7 Gbps

2.4 GHz, 5 GHz, and 60 GHz 802.11a/b/g/n/ac

Using your completed Table 4-2, indicate in Table 4-3 the frequencies at which each standard operates. Table 4-3

WLAN Standards and Frequencies

2.4 GHz (UHF)

5 GHz (SFH)

802.11a

802.11a

60 GHz (EHF)

X

802.11a

802.11b

X

802.11b

802.11b

802.11g

X

802.11g

802.11g

802.11n

X

802.11n

X

802.11n

802.11ac

X

802.11ac

802.11ad

X

802.11ad

802.11ac X

802.11ad

X

As a network technician, you should be aware of other wireless applications that could potentially cause problems with your WLAN implementations. In Table 4-4, indicate the frequency for each wireless application. Some applications may use more than one frequency. Table 4-4

Wireless Application Frequencies

Wireless Application

2.4 GHz (UHF)

Cellular broadband

X

5 GHz (SHF)

X

Radar landing systems GPS systems

X X

Radio astronomy Bluetooth

60 GHz (EHF)

X

X

Satellite communications

X

Microwave communications

X

In Table 4-5, indicate whether the feature describes LANs or WLANs.

instructor.indb 43

3/12/14 7:51 AM

44

CCNA Routing and Switching Practice and Study Guide

Table 4-5

Comparing LANs and WLANs

WLAN or LAN Feature

802.3 LANs

Collision detection (CSMA/CD).

X

Cables are used to interconnect devices.

X

802.11 WLANs

Additional laws and regulations in local areas may apply.

X

Allows for device mobility.

X

Signal interference is normally not a problem.

X

Collision avoidance (CSMA/CA). Connects to an Ethernet switch.

X X

Radio frequencies (RFs) are used to interconnect devices.

X

Connects to an access point.

X

Provides for better security.

X

WLANs Components and Topologies Today, all laptops, tablets, and smartphones include an integrated wireless NIC. However, desktop computers usually do not. In a home or small office network, it might not be desirable or feasible to run cabling to a desktop. In such situations, you can easily install a wireless network interface card (NIC) to provide connectivity. Wireless NICs associate (and possibly authenticate) with an access point (AP). Briefly explain the difference between an autonomous AP and controller-based AP. Autonomous APs are standalone devices configured using the Cisco CLI or a GUI. Autonomous APs are useful in situations where only a couple of APs are required in the network. A home router is a good example of an autonomous AP. Controller-based APs are serverdependent devices that require no initial configuration, but are automatically configured and managed by a WLAN controller. Two or more autonomous APs can be combined into a cluster to ease management requirements. What four conditions must be met before a cluster can be formed: ■

Clustering mode is enabled on the APs.



The APs joining the cluster have the same cluster name.



The APs are connected on the same network segment.



The APs use the same radio mode.

Briefly explain the two main 802.11 wireless topologies:

instructor.indb 44



Ad hoc mode: When two devices connect wirelessly without the aid of an infrastructure device, such as a wireless router or AP. Examples include Bluetooth and Wi-Fi Direct.



Infrastructure mode: When wireless clients interconnect via a wireless router or AP, such as in WLANs. APs connect to the network infrastructure using the wired distribution system (DS), such as Ethernet.

3/12/14 7:51 AM

Chapter 4: Wireless LANs

45

In Figure 4-1, label the two wireless topologies with either infrastructure mode or ad hoc mode. Figure 4-1

WLAN Topologies

The topology on the left shows an example of infrastructure mode. The topology on the right shows an example of ad hoc mode. Infrastructure mode uses two topology building blocks: a basic service set (BSS) and an extended service set (ESS). Briefly describe each and how they interrelate. A BSS consists of a single AP interconnecting all associated wireless clients. When a single BSS provides insufficient RF coverage, two or more BSSs can be joined through a common distribution system (DS) into an ESS. Lab - Investigating Wireless Implementations (SN 4.1.2.10/SwN 8.1.2.10)

Wireless LAN Operations WLAN operations have similar structures and concepts to Ethernet’s 802.3. 802.11 uses a frame format similar to 802.3, but with more fields. 802.11 uses a collision detection system similar to Ethernet’s carrier sense multiple access collision detect (CSMA/CD). However, Ethernet does not have to worry about finding, authenticating, and associating with an AP. Nor does Ethernet have to worry about managing channels on the wireless radio frequencies. This section reviews the 802.11 frame, CSMA/CA, AP association, and channel management.

Label the 802.11 Frame In Figure 4-2, label each field in the 802.11 frame.

instructor.indb 45

3/12/14 7:51 AM

46

CCNA Routing and Switching Practice and Study Guide

Figure 4-2

802.11 Frame Format

Header

Figure 4-2a

Payload

FCS

Payload

FCS

802.11 Frame Format (answer)

Header

Frame Control

Duration

Address1 Address2 Address3

Sequence Address4 Control

Power Protocol Frame Frame More More ToDS FromDS Retry ManageSecurity Reserved Version Type Subtype Fragments Data ment

instructor.indb 46

3/12/14 7:51 AM

Chapter 4: Wireless LANs

47

Match the subfield description on the left with the subfield on the right. This is a one-to-one matching exercise. Subfield Description e. Indicates whether encryption/authentication is

being used b. Identifies the frame as either a management,

control, or data frame d. Active or power-save mode status of the send-

ing device

Subfield a. Protocol version b. Frame subtype c. FromDS d. Power management e. Security

a. Specifies which 802.11 protocols is being used c. Indicates to an associated AP client that data

is exiting a DS (distributed system)

instructor.indb 47

3/12/14 7:51 AM

48

CCNA Routing and Switching Practice and Study Guide

Wireless Media Contention A wireless device operates in a half-duplex, shared media environment. So, a wireless device must also sense the carrier because multiple devices have access—carrier sense multiple access (CSMA). However, unlike half-duplex Ethernet operations, a wireless device that is sending cannot also listen for collision. Therefore, IEEE developed a collision avoidance (the CA in CSMA/CA) mechanism called the distributed coordination function (DCF). Using DCF, a wireless client transmits only if the channel is clear. All transmissions are acknowledged. Therefore, if a wireless client does not receive an acknowledgment, it assumes a collision occurred and retries after a random waiting interval. In the flowchart in Figure 4-3, label the missing steps in the CSMA/CA process. Figure 4-3

CSMA/CA Process Start

Assemble a Frame

No

Yes

No

Yes Transmit Application Data

End

instructor.indb 48

3/12/14 7:51 AM

Chapter 4: Wireless LANs

Figure 4-3a

49

CSMA/CA Process (answer) Start

Assemble a Frame

Is the Channel Idle?

No

Wait for Random Backoff Time

Yes Transmit RTS

CTS Received?

No

Yes Transmit Application Data

End

instructor.indb 49

3/12/14 7:51 AM

50

CCNA Routing and Switching Practice and Study Guide

Associating with an AP Before a wireless device can communicate over the network, it must first associate with an AP or wireless router. To do so, it must discover and authenticate with an AP. Match the definitions on the left with the association parameter on the right. This is a one-to-one matching activity. Definitions

Security Parameter

e. A unique identifier that wireless clients use to distinguish between multiple wireless networks in the same vicinity

b. Password

d. Identifies the 802.11 WLAN standards supported by the AP

d. Network mode

a. Currently standards include WEP, WPA, or WPA2

a. Security mode c. Channel settings e. SSID

c. Refers to the frequency bands being used to transmit wireless data b. Prevents intruders and other unwanted users from associating with the AP

instructor.indb 50

3/12/14 7:51 AM

Chapter 4: Wireless LANs

51

To discover and connect with an AP or wireless routers, clients use a probing process, which can either be passive or active, as shown in Figure 4-4. Label each example as either passive or active. Figure 4-4

Two Methods to Discover an AP Sender

Sender

Receiver

Beacon Frame (0x08)

Probe Request Frame (0x04)

• SSID • Supported standards • Security settings

Beacon Frame (0x08)

Receiver

• SSID • Supported standards

Probe Response Frame (0x05)

• SSID • Supported standards • Security settings

• SSID • Supported standards • Security settings

Beacon Frame (0x08) • SSID • Supported standards • Security settings

Passive mode is illustrated on the left. Active mode is illustrated on the right. Briefly explain the two authentication mechanisms: ■

Open authentication: Fundamentally a NULL authentication where the wireless client says “authenticate me” and the AP responds with “yes.” Open authentication provides wireless connectivity to any wireless device and should only be used in situations where security is of no concern.



Shared-key authentication: Technique is based on a key that is pre-shared between the client and the AP.

After discovering and authenticating with an AP or wireless router, the wireless device goes through an association process. Label Step 3 in Figure 4-5 with the association substeps. Figure 4-5

instructor.indb 51

The AP Association Process Step 1 (Discovery):

Step 2 (Authentication):

Listen for beacon frames to find WLAN SSIDs (passive mode)

Agree with AP to share Open authentication

or

or

Send a probe request to the AP with or without a known SSID (active mode)

Initiate Shared Key authentication process

Step 3 (Association):

1

1.

Send client’s MAC address to AP.

2.

Receive AP’s MAC address (BSSID).

3.

Receive AP’s association identifier (AID).

2 3

3/12/14 7:51 AM

52

CCNA Routing and Switching Practice and Study Guide

Channel Management Concepts In wireless implementations, a common practice is for the radio wave frequencies to be allocated as ranges. Such ranges are then split into smaller ranges called channels. Depending on the 802.11 standard, there are various ways to manage these channels. Match the channels, frequency modulation technique, or standard on the right with the definitions on the left. Definitions

Channels, Frequency Modulation, and Standards

h. Spreads the signal over larger-frequency bands; used by 802.11b, cordless phones, CDMA cellular, and GPS networks

b. 12

c. Number of channels identified in Europe for 802.11b

d. 1,5,10

e. Nonoverlapping 802.11b channels i. Rapidly switches the signal over many frequency channels; used by the original 802.11 standard, walkie-talkies, and Bluetooth g. Supports four nonoverlapping channels and channel bonding

a. 11 c. 13 e. 1,6,11 f. 802.11g g. 802.11n h. DSSS i. FHSS j. OFDM

a. Number of channels identified in North America for 802.11b j. Maximizes spectral efficiency without causing adjacent channel interference; used by 802.11a/g/n/ad

instructor.indb 52

3/12/14 7:51 AM

Chapter 4: Wireless LANs

53

Wireless LAN Security WLANs present unique security concerns because anyone within range of the AP and with the correct credentials can gain access to the network.

WLAN Security Terminology Match the definitions on the left with the WLAN security terms on the right. This is a one-to-one matching exercise. Definitions k. Wireless home router connected to the corporate network without authorization f. Attacker sends a series of “disassociate” commands to all wireless clients within a BSS g. Attacker takes advantage of the CSMA/CA contention method to monopolize the bandwidth and deny all other clients access to the AP j. The 802.11i industry standard for securing wireless networks b. An AP configured with the same SSID as a legitimate AP

WLAN Security Term a. TKIP b. Man-in-the-middle attack c. SSID cloaking d. AES e. WEP f. Spoofed disconnect attack g. CTS Flood h. WPA i. MAC address filtering j. WPA2 k. Rogue AP

a. Uses Message Integrity Check (MIC) to ensure the message has not been tampered with h. Basically WEP with TKIP encryption e. Obsolete wireless authentication method i. Manually allow or deny based on physical address c. Disable the transmission of the beacon d. Uses Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), which allows destination hosts to recognize whether the bits have been tampered with

instructor.indb 53

3/12/14 7:51 AM

54

CCNA Routing and Switching Practice and Study Guide

Identify the WLAN Security Characteristics The best way to secure a wireless network is to use authentication and encryption systems. The two major types of authentication are open authentication and shared authentication. Open is basically no authentication. Shared-key authentication comes in three flavors: WEP, WPA, and WPA2. In Table 4-6, indicate the authentication method for each characteristic. Table 4-6

WLAN Security Characteristics

WLAN Security Characteristic

Open Authentication

Shared-Key Authentication WEP

TKIP data encryption

WPA

X

AES data encryption

X

MIC authentication No password authentication

WPA2

X X

Medium security risk

X

Shared-key authentication

X

RC4 data encryption

X

No data encryption

X

Highest security risk

X

Lowest security risk High security risk

X X

CCMP authentication

X

Wireless LAN Configuration Modern wireless routers offer a variety of features, and most are designed to be functional right out of the box with the default settings. However, it is good practice to change this initial configuration—particularly, the default administrator password—so that public known default settings cannot be used to access the wireless settings.

Configuring WLAN Routers and Clients The best way to practice configuring wireless routers is to complete the Lab and Packet Tracer activities associated with the course. You can also make sure your own home router is configured with some of the following settings:

instructor.indb 54



Change the administrator password.



Change the IP addressing assigned through DHCP to wireless clients.



Change the service set identification (SSID) name. However, if you disable SSID broadcasts, users will have to manually enter the SSID.



Enable the strongest authentication protocol supported by the wireless router: hopefully WPA2.

3/12/14 7:51 AM

Chapter 4: Wireless LANs

55



Enable MAC address filtering if you know the devices that will be joining the WLAN. Otherwise, you will have to manually add new devices each time someone wants to access the WLAN.



If desired, configure a guest network and password for guest users to access the WLAN.

If you do not have access to a wireless router, Packet Tracer, or Lab equipment, you can search the Internet for “wireless router configuration simulation.” Several wireless router manufacturers host a simulation web page where you can practice configuring their specific GUI. Lab - Configuring a Wireless Router and Client (SN 4.4.2.3/SwN 8.4.2.3) Packet Tracer Activity

Packet Tracer - Configuring Wireless LAN Access (SN 4.4.2.2/SwN 8.4.2.2)

Troubleshooting WLAN Issues Troubleshooting WLAN issues normally requires an elimination process. Start with the wireless client by checking the following: ■

Does the client have a valid IP address configuration?



Can the client successfully access the wired network?



Is the client configured with the correct security settings?



Is the client configured with the correct channel and SSID?



Is the wireless NIC driver up-to-date?

If the wireless client is operating as expected, check the following: ■

Is the AP powered on?



How far away is the closest AP?



Are other devices in the area interfering with the signal?



Are there any cabling or connector issues?

Finally, check the configuration of the AP to verify that it conforms to the desired specifications. Occasionally, issues with the AP software are identified and corrected by the manufacturer. So, you should regularly check to make sure that the firmware is up-to-date on the AP. Packet Tracer Challenge

instructor.indb 55

Packet Tracer - Skills Integration Challenge (SN 4.5.1.2/SwN 8.5.1.2)

3/12/14 7:51 AM

instructor.indb 56

3/12/14 7:51 AM

CHAPTER 5

Adjust and Troubleshoot Single-Area OSPF

Although we will spend a little bit of time on it, you should already know how to configure basic single-area OSPF. This chapter focuses on the concepts and configurations to fine-tune the operation of OSPF, including manipulating the designated router / backup designated router (DR/BDR) election, propagating a default router, fine-tuning Open Shortest Path First (OSPF) Protocol interfaces, and authenticating OSPF neighbors.

instructor.indb 57

3/12/14 7:51 AM

58

CCNA Routing and Switching Practice and Study Guide

Advanced Single-Area OSPF Configurations In this section, we review the concepts and configurations to fine-tune the operation of OSPFv2 and OSPFv3.

Single-Area OSPF Configuration Review The following activity may look familiar to you if you also used the CCENT Practice and Study Guide. It is repeated here so that you can get back up to speed on OSPF before we look at more advanced configurations.

Configuring Single-Area OSPFv2 Figure 5-1 shows the topology that we will use to configure OSPFv2 and OSPFv3. This first topology shows IPv4 network addresses. The IPv4 addressing scheme is in Table 5-1. Figure 5-1

OSPFv2 Topology with IPv4 Network Addresses 192.168.1.0/26

G0/0

S0/0/0

192.168.1.252/30

S0/0/1 192.168.1.248/30 S0/0/1

384 kbps

S0/0/0 DCE

192.168.1.64/26 G0/0

RTB

IPv4 Addressing Scheme for OSPFv2

Device

Interface

IPv4 Address

Subnet Mask

RTA

G0/0

192.168.1.1

255.255.255.192

S0/0/0

192.168.1.253

255.255.255.252

S0/0/1

192.168.1.245

255.255.255.252

Router ID

1.1.1.1

G0/0

192.168.1.65

255.255.255.192

S0/0/0

192.168.1.249

255.255.255.252

S0/0/1

192.168.1.246

255.255.255.252

Router ID

2.2.2.2

G0/0

192.168.1.129

255.255.255.192

S0/0/0

192.168.1.254

255.255.255.252

S0/0/1

192.168.1.250

255.255.255.252

Router ID

3.3.3.3

RTB

RTC

instructor.indb 58

192.168.1.244/30 T1

S0/0/0 DCE

RTC

Table 5-1

S0/0/1 DCE

OSPF Area 0

T1

192.168.1.128/26 G0/0

RTA

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

59

In the space provided, document the correct commands, including the router prompt, to configure the routers in Figure 5-1 with OSPFv2. Include commands to configure the router ID and disable updates on the LAN interface. RTA(config)# router ospf 1 RTA(config-router)# router-id 1.1.1.1 RTA(config-router)# network 192.168.1.0 0.0.0.63 area 0 RTA(config-router)# network 192.168.1.244 0.0.0.3 area 0 RTA(config-router)# network 192.168.1.252 0.0.0.3 area 0 RTA(config-router)# passive-interface g0/0 RTB(config)# router ospf 1 RTB(config-router)# router-id 2.2.2.2 RTB(config-router)# network 192.168.1.64 0.0.0.63 area 0 RTB(config-router)# network 192.168.1.244 0.0.0.3 area 0 RTB(config-router)# passive-interface g0/0 RTC(config)# router ospf 1 RTC(config-router)# router-id 3.3.3.3 RTC(config-router)#network 192.168.1.128 0.0.0.63 area 0 RTC(config-router)#network 192.168.1.252 0.0.0.3 area 0 RTC(config-router)# passive-interface g0/0

Verifying Single-Area OSPFv2 Fill in the missing command to complete the following sentences: The show ip ospf neighbor command can be used to verify and troubleshoot OSPF neighbor relationships. The show ip protocols command is a quick way to verify vital OSPF configuration information, including the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance, which is 110 for OSPF. The show ip ospf command can also be used to examine the OSPF process ID and router ID. In addition, this command displays the OSPF area information as well as the last time the SPF algorithm was calculated. The quickest way to verify Hello and Dead intervals is to use the show ip ospf interface command. The quickest way to verify OSPF convergence is to use the show ip route command to view the routing table for each router in the topology.

Configuring Single-Area OSPFv3 Figure 5-2 shows the same topology we used for OSPFv2, but with IPv6 network addresses. Table 5-2 shows the IPv6 addressing scheme.

instructor.indb 59

3/12/14 7:51 AM

60

CCNA Routing and Switching Practice and Study Guide

Figure 5-2

OSPFv3 Topology with IPv6 Network Addresses 2001:DB8:1:1::/64

G0/0

RTA

S0/0/0

2001:DB8:F:AC::/64

OSPF Area 0

T1

2001:DB8:1:3::/64 G0/0

Device

RTA

RTB

RTC

2001:DB8:F:AB::/64 T1

S0/0/0 DCE

S0/0/1 2001:DB8:F:BC::/64

RTC

Table 5-2

S0/0/1 DCE

S0/0/1

384 kbps

S0/0/0 DCE

2001:DB8:1:2::/64 G0/0

RTB

IPv6 Addressing Scheme for OSPFv3 Interface

IPv6 Address/Prefix

G0/0

2001:DB8:1:1::1/64

S0/0/0

2001:DB8:F:AC::1/64

S0/0/1

2001:DB8:F:AB::1/64

Link-local

FE80::A

Router ID

1.1.1.1

G0/0

2001:DB8:1:2::1/64

S0/0/0

2001:DB8:F:BC::1/64

S0/0/1

2001:DB8:F:AB::2/64

Link-local

FE80::B

Router ID

2.2.2.2

G0/0

2001:DB8:1:3::1/64

S0/0/0

2001:DB8:F:AC::2/64

S0/0/1

2001:DB8:F:BC::2/64

Link-local

FE80::C

Router ID

3.3.3.3

The routers are already configured with interface addressing. Record the correct commands, including the router prompt, to configure the routers with OSPFv3. Include commands to enable IPv6 routing, configure the router ID, change the reference bandwidth to 10000, and disable updates on the LAN interface. Except for the router ID, the commands are the same for all three routers. So, you need to document only one router. RTA(config)# ipv6 unicast-routing RTA(config)# ipv6 router ospf 10 RTA(config-rtr)# router-id 1.1.1.1 RTA(config-rtr)# auto-cost reference-bandwidth 10000 RTA(config-rtr)# passive-interface g0/0

instructor.indb 60

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

61

RTA(config-rtr)# interface g0/0 RTA(config-if)# ipv6 ospf 10 area 0 RTA(config-if)# interface s0/0/0 RTA(config-if)# ipv6 ospf 10 area 0 RTA(config-if)# interface s0/0/1 RTA(config-if)# ipv6 ospf 10 area 0

Verifying Single-Area OSPFv3 Fill in the missing command to complete the following sentences: The show ipv6 ospf neighbor command can be used to verify and troubleshoot OSPF neighbor relationships. The show ipv6 protocols command is a quick way to verify vital OSPF configuration information, including the OSPF process ID, the router ID, and interfaces the router is advertising. The show ipv6 ospf command can also be used to examine the OSPF process ID and router ID. In addition, this command displays the OSPF area information as well as the last time the SPF algorithm was calculated. To view a quick summary of OSPFv3-enabled interfaces, use the show ipv6 ospf interface brief command. However, the quickest way to verify Hello and Dead intervals is to use the show ipv6 ospf interface command. The quickest way to verify OSPF convergence is to use the show ipv6 route command to view the routing table for each router in the topology. Lab - Configuring Basic Single-Area OSPFv2 (SN 5.1.1.9)

instructor.indb 61

3/12/14 7:51 AM

62

CCNA Routing and Switching Practice and Study Guide

Identify Network Types Match the definition on the left with the network type on the right. This is a one-to-one matching exercise. Definitions

Network Type

e. Connects distant OSPF networks to the backbone area

a. Broadcast multi-access b. Nonbroadcast multi-access

b. Connects multiple routers using Frame Relay

c. Point to multipoint

c. Connects multiple routers in a hub-and-spoke topology

d. Point to point e. Virtual links

d. Connects two routers directly on a single WAN network a. Connects multiple routers using Ethernet technology

instructor.indb 62

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

63

In Figure 5-3, label each network type. Figure 5-3

Network Types

Internet

R2

R1

Frame Relay

R3

R3

R3

Starting from the top and going clockwise: point to point, broadcast multi-access, nonbroadcast multi-access (NBMA), point to multipoint.

OSPF and Multi-Access Networks A multi-access network is a network with more than two devices on the same shared media. Examples of multi-access networks include Ethernet and Frame Relay. Frame Relay is a WAN technology that is discussed in a later CCNA course. The following exercises cover the concepts of multi-access networks in OSPF and the DR/BDR election process.

OSPF and Multi-Access Networks Completion Exercise Complete the missing words or phrases in the following paragraphs. On multi-access networks (networks supporting more than two routers) such as Ethernet and Frame-Relay networks, the hello protocol elects a designated router (DR) and a backup designated router (BDR). Among other things, the designated router is responsible for generating LSAs for the entire multi-access network which allows a reduction in routing update traffic. The DR, BDR, and every other router in an OSPF network sends out Hellos using 224.0.0.5 as the destination address. If a DRother (a router that is not the DR) needs to send a link-state advertisement (LSA), it will send it using 224.0.0.6 as the destination address. The DR and the BDR will receive LSAs at this address. The DR/BDR election is based on OSPF priority and OSPF router ID. By default, all OSPF routers have a priority of 1. If all OSPF routers have the same priority, the highest router ID determines the DR and BDR. If the router ID is not explicitly configured and a loopback interface is not configured, the highest IP address on an active interface at the moment of OSPF process startup is used as the router ID. In Figure 5-4, label the steps taken to elect the DR.

instructor.indb 63

3/12/14 7:51 AM

64

CCNA Routing and Switching Practice and Study Guide

Figure 5-4

Steps in the DR Election Process

Step 2a

If router values from Step 1 are exactly the same,then...

Step 1

Step 2

Step 2b

Step 2c

Step 1: Highest interface priority values. Step 2: Highest router ID. Step 2a: Highest manually configured router ID. Step 2b: Highest loopback address. Step 2c: Highest active interface IP address. Use the topology in Figure 5-5 to determine the router ID for each router, and then determine which router will be the DR, if applicable. Figure 5-5

Determine the Router ID RTF

G0/0: 10.1.19.1/24

S0/0: 209.165.201.2/27

Lo0: 192.168.10.5/32 RTA

S0/0: 10.1.16.2/30

RTB

G0/1: 10.1.10.4/24

S0/0: 10.1.16.1/30 Lo0 192.168.10.1/32

RTE

S0/0: 209.165.201.1/27

G0/0: 10.1.10.2/24

G0/1: 10.1.10.3/24 Lo0: 192.168.10.3/32

RTD

G0/0: 10.1.13.2/24

G0/1: 10.1.10.1/24 RTC

G0/0: 10.1.13.1/24

In Table 5-3, record the router ID for each router. Table 5-3

Listing of Router IDs

Device

Router ID

Router A

192.168.10.5

Router B

209.165.201.1

Router C

10.1.10.1

Router D

192.168.10.3

Router E

192.168.10.1

Router F

209.165.201.2

In Table 5-4, determine whether a DR will be elected for each network and record the DR’s hostname. If no DR is elected, indicate so with “none.”

instructor.indb 64

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

Table 5-4

65

Listing of DRs

Network

DR

209.165.201.0

None

10.1.16.0

None

10.1.13.0

Router D

10.1.10.0

Router B

Note: Configure your OSPFv2 routers with a router ID to control the DR/BDR election. With OSPFv3, you must configure a router ID.

Setting the priority on the interface is another way to control DR or BDR. In addition to configuring loopbacks, it is a good idea to configure RTA with an OSPF priority that will ensure it always wins the DR/BDR election. The syntax for configuring OSPF priority is as follows: Router(config-if)# ip ospf priority priority

Document the commands you use to configure on RTA to make sure that its priority will always win the DR/BDR election. RTA(config)# interface Fa 0/0 RTA(config-if)# ip ospf priority 2 !Any priority higher than the default of 1 will work.

DR/BDR Election Exercise In the following exercises, assume that all routers are simultaneously booted and that router priorities are set to the default. Determine the network type, if applicable, and label which router is elected as the DR and which router is elected as the BDR. Refer to Figure 5-6 and answer the following questions. Figure 5-6

DR/BDR Election Exercise 1 Topology Fa0/0 = 172.16.1.1 Lo0 = 192.168.1.4

Fa0/0 = 172.16.1.2 Lo0 = 192.168.1.3

RTA

RTB

RTC

RTD

Fa0/0 = 172.16.1.3 S0/0/0 = 192.168.5.1 Lo0 = 192.168.1.2

Fa0/0 = 172.16.1.4 S0/0/0 = 192.168.5.2 Lo0 = 192.168.1.1

What is the router ID for RTA? 192.168.1.4 What is the router ID for RTB? 192.168.1.3 What is the router ID for RTC? 192.168.1.2 What is the router ID for RTD? 192.168.1.1

instructor.indb 65

3/12/14 7:51 AM

66

CCNA Routing and Switching Practice and Study Guide

Which router will be elected DR? RTA Which router will be elected BDR? RTB Refer to Figure 5-7 and determine whether there will be a DR/BDR election. If applicable, designate which router is DR and which router is BDR. Figure 5-7

DR/BDR Election Exercise 2 Topology 172.15.1.1/30 S0/0/0

172.18.1.2/30 S0/0/1

RTA

172.15.1.2/30 S0/0/0

172.18.1.1/30 S0/0/0

RTD

RTB

Fa0/0 172.16.1.2/24

Fa0/0 172.17.1.2/24

Fa0/1 172.16.1.1/24

Fa0/0 172.17.1.1/24

RTC

Network

DR/BDR Election?

Which Router Is the DR?

Which Router Is the BDR?

172.15.1.0/30

No

N/A

N/A

172.16.1.0/24

Yes

RTC

RTD

172.17.1.0/24

Yes

RTB

RTC

172.18.1.0/30

No

N/A

N/A

Refer to Figure 5-8 and answer the following questions. Figure 5-8

DR/BDR Election Exercise 3 Topology Fa0/0 = 192.168.0.1/24 S0/0/0 = 209.165.201.2/30

RTA

S0/0/0

ISP S0/0/0 = 209.165.201.1/30

Fa0/0

OSPF Area 0 Fa0/0

Fa0/0 S0/0/0

RTC

S0/0/0

Fa0/0 = 192.168.0.3/24 S0/0/0 = 192.168.1.3/30 Lo0 = 10.1.1.1/32

instructor.indb 66

RTB Fa0/0 = 192.168.0.2/24 S0/0/0 = 192.168.1.2/30

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

67

What is the router ID for RTA? 209.165.201.2 What is the router ID for RTB? 192.168.1.2 What is the router ID for RTC? 10.1.1.1 Which router is DR for the 192.168.0.0/24 network? RTA Which router is BDR for the 192.168.0.0/24 network? RTB Now assume a priority of zero on RTA. Which router is DR for the 192.168.1.0/24 network? RTB What will happen if another router, RTD, joins the 192.168.0.0/24 network with a router ID of 209.165.201.9? Nothing. Both the DR and BDR have to go down before RTD can become the DR.

Redistributing an OSPF Default Route Exercise In some topology configurations and routing policy situations, it is desirable to have an Autonomous System Boundary Router (ASBR) redistribute a default route to the OSPF neighbors in the area. This can be quickly accomplished in both OSPFv2 and OSPFv3.

OSPFv2 Default Route Redistribution In Figure 5-9, notice that RTA is now our gateway router because it provides access outside the area. In OSPF terminology, RTA is called the Autonomous System Boundary Router (ASBR) because it connects to an external routing domain that uses a different routing policy. Figure 5-9

Propagating a Default Route in OSPFv2 192.168.1.0/26

Default Route

G0/0

S0/0/0 DCE

S0/1/0

Address Space 192.168.1.0/24

RTA S0/0/0

209.165.201.2/30 S0/0/1 DCE

RTA Propagates Default Route to RTB and RTC

192.168.1.252/30 T1

209.165.201.1/30

ISP

Static Route

192.168.1.244/30

Public Web Server

T1

209.165.202.129/30

S0/0/0 DCE

192.168.1.128/26 G0/0

RTC

OSPF Area 0 192.168.1.64/26

S0/0/1 384 kbps

S0/0/0 DCE

S0/0/1 192.168.1.248/30

G0/0

RTB

Each routing protocol handles the propagation of default routing information a little differently. For OSPF, the gateway router must be configured with two commands. First, RTA will need a static default route pointing to ISP. Document the command to configure a static default route on RTA using the exit interface argument. RTA(config)# ip route 0.0.0.0 0.0.0.0 serial 0/1/0

instructor.indb 67

3/12/14 7:51 AM

68

CCNA Routing and Switching Practice and Study Guide

Using the exit interface argument, document the command necessary to configure ISP with a static route pointing to the 192.168.1.0/24 address space. ISP(config)# ip route 192.168.1.0 255.255.255.0 serial 0/0/0

At this point, any host on the LAN attached to RTA will be able to access ISP and be able to ping the Public Web Server at 209.165.202.129. However, RTB and RTC still cannot ping outside the 192.168.1.0/24 address space. Why? Because neither router has a default route Document the command that needs to be configured on RTA to fix this problem. RTA(config)# router ospf 1 RTA(config-router)# default-information originate

OSPFv3 Default Route Redistribution Configuring OSPFv3 to propagate a default route is essentially the same tasks as you do in OSPFv2. Figure 5-10 is an IPv6 version of Figure 5-9. Figure 5-10

Propagating a Default Route in OSPFv3 2001:DB8:1:1::/64 2001:DB8:CAFE:1::F/64 Default Route

G0/0

S0/0/0 DCE

S0/1/0

Address Space 2001:DB:1::/48

RTA S0/0/0

209.165.201.2/30 S0/0/1 DCE

RTA Propagates Default Route to RTB and RTC

2001:DB8:1:AC::/64 T1

209.165.201.1/30

ISP

Static Route

2001:DB8:1:AB::/64

Public Web Server

T1

2001:DB8:CAFE:F::F/64

S0/0/0 DCE

2001:DB8:1:3::/64 G0/0

RTC

OSPF Area 0 2001:DB8:1:2::/64

S0/0/1 384 kbps

S0/0/0 DCE

S0/0/1 2001:DB8:1:BC::/64

G0/0

RTB

Document the command to configure a static default route on RTA using the exit interface argument. RTA(config)# ipv6 route ::/0 serial 0/1/0

Using the exit interface argument, document the command necessary to configure ISP with a static route pointing to the 2001:DB8:1::/48 address space. ISP(config)# ipv6 route 2001:DB8:1::/48 serial 0/0/0

Document the command that will cause RTA to propagate the default router to RTB and RTC. RTA(config)#ipv6 router ospf 1 RTA(config-rtr)#default-information originate

instructor.indb 68

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

69

Fine-Tuning OSPF Interfaces OSPF routers must use matching Hello intervals and Dead intervals on the same link. The default interval values result in efficient OSPF operation and seldom need to be modified. However, you can change them. Again, refer to Figure 5-9. Assuming that the current intervals are 10 and 40, document the commands necessary to change these OSPFv2 intervals on the link between RTB and RTC to a value four times greater than the current value. RTB(config)# interface serial 0/0/0 RTB(config-if)# ip ospf hello-interval 40 RTB(config-if)# ip ospf dead-interval 160 RTC(config)# interface serial 0/0/1 RTC(config-if)# ip ospf hello-interval 40 RTC(config-if)# ip ospf dead-interval 160

Note that it is not necessary to configure the Dead interval as long as the desired interval is four times the Hello. The IOS will automatically increase the Dead interval to four times the configured Hello interval. Now refer to Figure 5-10. Assuming that the current intervals are 10 and 40, document the commands necessary to change the OSPFv3 intervals on the link between RTB and RTC to a value four times greater than the current value. RTB(config)# interface serial 0/0/0 RTB(config-if)# ipv6 ospf hello-interval 40 RTB(config-if)# ipv6 ospf dead-interval 160 RTC(config)# interface serial 0/0/1 RTC(config-if)# ipv6 ospf hello-interval 40 RTC(config-if)# ipv6 ospf dead-interval 160

Other than the show run command, what commands can you use to verify OSPF timers on an interface for both IPv4 and IPv6? show ip ospf interface show ipv6 ospf interface

Securing OSPFv2 with MD5 Authentication Because routers are targets for network attacks, you should always configure authentication services for OSPFv2 using the strongest authentication available: MD5 (message digest algorithm 5). Assume the routers in Figure 5-11 are using MD5 authentication to exchange OSPFv2 routing updates. Briefly explain the steps in MD5 authentication as R1 sends an OSPF message to R2. Figure 5-11

OSPFv2 MD5 Authentication Between R1 and R2 S0/0/0 R1

instructor.indb 69

S0/0/1

R2

3/12/14 7:51 AM

70

CCNA Routing and Switching Practice and Study Guide

Both routers are configured with a pre-shared key. So when R1 has a message to send to R2, it combines the message with the key using MD5 to calculate a signature—known as a hash value. R1 adds the signature to the message and sends it to R2. Once received by R2, it combines the message with the key and uses MD5 to calculate the signature. If signatures match, R2 accepts the message. If not, R2 discards the message. You can configure OSPFv2 MD5 authentication globally, forcing all OSPF interfaces to use authentication. Or you can configure authentication on specific interfaces. Document the command syntax, including the router prompt, to enable OSPFv2 MD5 authentication on all interfaces. In router configuration mode: Router(config-router)# area area-id authentication message-digest

Then on each interface: Router(config-if)# ip ospf message-digest-key key md5 password

Document the command syntax including the router prompt to enable OSPFv2 MD5 authentication only on specific interfaces. On a specific interface: Router(config-if)# ip ospf message-digest-key key md5 password Router(config-if)# ip ospf authentication message-digest

Refer to Figure 5-9. Document the commands to configure RTA to use MD5 authentication globally on all OSPF interfaces. Choose your own process ID and key values. RTA(config)# router ospf 1 RTA(config-router)# area 0 authentication message-digest RTA(config-router)# interface s0/0/0 RTA(config-if)# ip ospf message-digest-key 1 md5 cisco123 RTA(config-if)# interface s0/0/1 RTA(config-if)# ip ospf message-digest-key 1 md5 cisco123

Document the commands to configure RTB to use MD5 authentication on the serial interfaces only. Choose your own process ID and key values. RTB(config)# interface s0/0/0 RTB(config-if)# ip ospf message-digest-key 1 md5 cisco123 RTB(config-if)# ip ospf authentication message-digest RTB(config-if)# interface s0/0/1 RTB(config-if)# ip ospf message-digest-key 1 md5 cisco123 RTB(config-if)# ip ospf authentication message-digest

What command can you use to verify OSPF MD5 authentication? show ip ospf interface Note: Cisco IOS supports a simple authentication method. However, this method sends the password in plain text. Therefore, it is not considered a best practice.

instructor.indb 70

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

71

Lab - Configuring OSPFv2 Advance Features (SN 5.1.5.8/RP 7.1.4.8) Packet Tracer Activity

Packet Tracer - Configuring OSPFv2 Advance Features (SN 5.1.5.7/RP 7.1.4.7)

Troubleshooting Single-Area OSPF Implementations Troubleshooting single-area OSPF is required skill for any network professional involved in the implementation and maintenance of an OSPF network. Solid understanding of OSPF operation and the impact of the OSPF configuration commands is essential.

OSPF Adjacency Issues A common problem in OSPF convergence is a lack of adjacency with OSPF neighbors. List at least four reasons why adjacency might fail to establish. ■

The interfaces are not on the same network.



OSPF network types do not match.



OSPF Hello or Dead timers do not match.



Interface to neighbor is incorrectly configured as passive.



There is a missing or incorrect OSPF network command (OSPFv2), or OSPF is not configured correctly on the interface (OSPFv3).



Authentication is misconfigured.

What are the OSPFv2 and OSPFv3 commands you use to quickly verify adjacency between OSPF routers? show ip ospf neighbors show ipv6 ospf neighbors The command will list a state for each known OSPF router. What are the seven states OSPF transitions through on its way to convergence? Down, Init, Two-Way, Exstart, Exchange, Loading, Full

Identify OSPFv2 Troubleshooting Commands The following output is from the topology shown in Figure 5-9. Indicate the command used to generate the output. RTA# show ip route ospf Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route

instructor.indb 71

3/12/14 7:51 AM

72

CCNA Routing and Switching Practice and Study Guide

o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override

Gateway of last resort is 0.0.0.0 to network 0.0.0.0

192.168.1.0/24 is variably subnetted, 9 subnets, 3 masks O

192.168.1.64/26 [110/65] via 192.168.1.246, 00:19:35, Serial0/0/1

O

192.168.1.128/26 [110/65] via 192.168.1.254, 00:19:10, Serial0/0/0

O

192.168.1.248/30 [110/128] via 192.168.1.254, 00:19:10, Serial0/0/0 [110/128] via 192.168.1.246, 00:19:35, Serial0/0/1

RTA# show ip ospf neighbor

Neighbor ID

Pri

State

192.168.1.254

0

FULL/

192.168.1.249

0

FULL/

Dead Time

Address

Interface

-

00:00:31

192.168.1.254

Serial0/0/0

-

00:00:32

192.168.1.246

Serial0/0/1

RTA# show ip ospf interface serial 0/0/0 Serial0/0/0 is up, line protocol is up Internet Address 192.168.1.253/30, Area 0, Attached via Network Statement Process ID 1, Router ID 192.168.1.253, Network Type POINT_TO_POINT, Cost: 64 Topology-MTID

Cost

Disabled

Shutdown

0

64

no

no

Topology Name Base

Transmit Delay is 1 sec, State POINT_TO_POINT Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 oob-resync timeout 40 Hello due in 00:00:03 Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF helper support enabled Index 3/3, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1, maximum is 1 Last flood scan time is 0 msec, maximum is 0 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 192.168.1.254 Suppress hello for 0 neighbor(s) RTA# show ip protocols *** IP Routing is NSF aware ***

Routing Protocol is "ospf 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Router ID 192.168.1.253 It is an autonomous system boundary router

instructor.indb 72

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

73

Redistributing External Routes from, Number of areas in this router is 1. 1 normal 0 stub 0 nssa Maximum path: 4 Routing for Networks: 192.168.1.0 0.0.0.63 area 0 192.168.1.244 0.0.0.3 area 0 192.168.1.252 0.0.0.3 area 0 Routing Information Sources: Gateway

Distance

Last Update

192.168.1.246

110

00:18:13

192.168.1.254

110

00:17:48

Distance: (default is 110) RTA# show ip ospf Routing Process "ospf 1" with ID 192.168.1.253 Start time: 00:44:46.536, Time elapsed: 00:23:27.360 Supports only single TOS(TOS0) routes Supports opaque LSA Supports Link-local Signaling (LLS) Supports area transit capability Supports NSSA (compatible with RFC 3101) Event-log enabled, Maximum number of events: 1000, Mode: cyclic It is an autonomous system boundary router Redistributing External Routes from, Router is not originating router-LSAs with maximum metric Initial SPF schedule delay 5000 msecs Minimum hold time between two consecutive SPFs 10000 msecs Maximum wait time between two consecutive SPFs 10000 msecs Incremental-SPF disabled Minimum LSA interval 5 secs Minimum LSA arrival 1000 msecs LSA group pacing timer 240 secs Interface flood pacing timer 33 msecs Retransmission pacing timer 66 msecs Number of external LSA 1. Checksum Sum 0x003416 Number of opaque AS LSA 0. Checksum Sum 0x000000 Number of DCbitless external and opaque AS LSA 0 Number of DoNotAge external and opaque AS LSA 0 Number of areas in this router is 1. 1 normal 0 stub 0 nssa Number of areas transit capable is 0 External flood list length 0 IETF NSF helper support enabled Cisco NSF helper support enabled

instructor.indb 73

3/12/14 7:51 AM

74

CCNA Routing and Switching Practice and Study Guide

Reference bandwidth unit is 100 mbps Area BACKBONE(0) Number of interfaces in this area is 3 Area has no authentication SPF algorithm last executed 00:16:47.472 ago SPF algorithm executed 4 times Area ranges are Number of LSA 3. Checksum Sum 0x00E037 Number of opaque link LSA 0. Checksum Sum 0x000000 Number of DCbitless LSA 0 Number of indication LSA 0 Number of DoNotAge LSA 0 Flood list length 0

Identify OSPFv3 Troubleshooting Commands The following output is from the topology shown in Figure 5-10. Indicate the command used to generate the output. RTC# show ipv6 protocols IPv6 Routing Protocol is "connected" IPv6 Routing Protocol is "ND" IPv6 Routing Protocol is "ospf 1" Router ID 3.3.3.3 Number of areas: 1 normal, 0 stub, 0 nssa Interfaces (Area 0): GigabitEthernet0/0 Serial0/0/1 Serial0/0/0 Redistribution: None RTC# show ipv6 ospf neighbor

OSPFv3 Router with ID (3.3.3.3) (Process ID 1)

Neighbor ID

Pri

State

2.2.2.2

0

FULL/

1.1.1.1

0

FULL/

Dead Time

Interface ID

Interface

-

00:00:39

6

Serial0/0/1

-

00:00:31

6

Serial0/0/0

RTC# show ipv6 ospf interface serial 0/0/1 Serial0/0/1 is up, line protocol is up Link Local Address FE80::C, Interface ID 7 Area 0, Process ID 1, Instance ID 0, Router ID 3.3.3.3 Network Type POINT_TO_POINT, Cost: 64 Transmit Delay is 1 sec, State POINT_TO_POINT

instructor.indb 74

3/12/14 7:51 AM

Chapter 5: Adjust and Troubleshoot Single-Area OSPF

75

Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:06 Graceful restart helper support enabled Index 1/2/2, flood queue length 0 Next 0x0(0)/0x0(0)/0x0(0) Last flood scan length is 2, maximum is 4 Last flood scan time is 0 msec, maximum is 0 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 2.2.2.2 Suppress hello for 0 neighbor(s) RTC# show ipv6 ospf Routing Process "ospfv3 1" with ID 3.3.3.3 Event-log enabled, Maximum number of events: 1000, Mode: cyclic Router is not originating router-LSAs with maximum metric Initial SPF schedule delay 5000 msecs Minimum hold time between two consecutive SPFs 10000 msecs Maximum wait time between two consecutive SPFs 10000 msecs Minimum LSA interval 5 secs Minimum LSA arrival 1000 msecs LSA group pacing timer 240 secs Interface flood pacing timer 33 msecs Retransmission pacing timer 66 msecs Number of external LSA 1. Checksum Sum 0x00B657 Number of areas in this router is 1. 1 normal 0 stub 0 nssa Graceful restart helper support enabled Reference bandwidth unit is 100 mbps RFC1583 compatibility enabled Area BACKBONE(0) Number of interfaces in this area is 3 SPF algorithm executed 4 times Number of LSA 15. Checksum Sum 0x07E293 Number of DCbitless LSA 0 Number of indication LSA 0 Number of DoNotAge LSA 0 Flood list length 0 RTC#show ipv6 route ospf IPv6 Routing Table - default - 11 entries Codes: C - Connected, L - Local, S - Static, U - Per-user Static route B - BGP, R - RIP, I1 - ISIS L1, I2 - ISIS L2 IA - ISIS interarea, IS - ISIS summary, D - EIGRP, EX - EIGRP external ND - ND Default, NDp - ND Prefix, DCE - Destination, NDr - Redirect O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2 ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2

instructor.indb 75

3/12/14 7:51 AM

76

CCNA Routing and Switching Practice and Study Guide

OE2 ::/0 [110/1], tag 1 via FE80::A, GigabitEthernet0/0 O

2001:DB8:1:1::/64 [110/1] via GigabitEthernet0/0, directly connected

O

2001:DB8:1:AB::/64 [110/65] via FE80::B, GigabitEthernet0/0

O

2001:DB8:2:1::/64 [110/1] via GigabitEthernet0/0, directly connected

Lab - Troubleshooting Basic Single-Area OSPFv2 and OSPFv3 (SN 5.2.3.3/RP 7.2.3.3) Lab - Troubleshooting Advanced Single-Area OSPFv2 (SN 5.2.3.4/RP 7.2.3.4) Packet Tracer Activity

instructor.indb 76

Packet Tracer - Troubleshooting Single-Area OSPFv2 (SN 5.2.2.3/RP 7.2.2.3) Packet Tracer - Skills Integration Challenge (SN 5.3.1.2/RP 7.3.1.2)

3/12/14 7:51 AM

CHAPTER 6

Multiarea OSPF

In larger network implementations, single-area OSPF can require a significant amount of CPU and memory resources. As the number of routers grows, network administrators often implement multiarea OSPF to control the size of link-state databases, routing table entries, and the number of SPF calculations. This chapter reviews the concepts and configurations for multiarea OSPFv2 and OSPFv3.

instructor.indb 77

3/12/14 7:51 AM

78

CCNA Routing and Switching Practice and Study Guide

Multiarea OSPF Operation Multiarea OSPF was specifically designed to address several issues that result from single-area OSPF growing beyond its constraints.

Multiarea OSPF Terminology and Concepts Briefly describe three issues that arise if an OSPF area becomes too big. ■

OSPF does not perform route summarization by default, so the routing table can become very large.



The LSDB includes every link in the area which each router must maintain, even if every link is not selected for the routing table.



In areas that are too large, recalculating the SFP algorithm consumes many CPU cycles.

Briefly describe the role of each of the following OSPF router types. ■

Internal router: A router with all of its interfaces in the same area



Backbone router: A router that belongs to backbone area which is, by convention, configured as area 0



Area Border Router (ABR): A router with interfaces attached to multiple OSPF areas, but not an external network



Autonomous System Boundary Router (ASBR): A router with at least one interface attached to an external, non-OSPF network

In Table 6-1, indicate the OSPF router type for each router in Figure 6-1. A router can be more than one type. Figure 6-1

Sample Multiarea OSPF Topology Area 1

Area 0

R1

Area 2

BB2

R2

BB3

BB1

R4 R3

BB4

External AS

instructor.indb 78

3/12/14 7:51 AM

Chapter 6: Multiarea OSPF

Table 6-1

79

Indentify the OSPF Router Type

OSPF Router Type

BB1

BB2

BB3

X

Internal router Backbone router

X

Area Border Router (ABR)

X

X

X

BB4

R1

R2

R3

R4

X

X

X

X

X

X

X X

Autonomous System Boundary Router (ASBR)

Multiarea OSPF LSA Operation Although the RFCs for OSPF specify up to 11 different LSA types, at the CCNA level we are only concerned with the first 5. In Table 6-2, indicate the name for each LSA type. Table 6-2

Most Common OSPF LSA Types

LSA Type

Description

1

Router LSA

2

Network LSA

3 and 4

Summary LSAs

5

AS External LSA

Refer to Figure 6-1. In Table 6-3, indicate which LSA type is used in each of the scenarios. Table 6-3

Determine the LSA Type

LSA Scenario

Type 1

Type 2

Type 3

Type 4

BB1 is advertising to Area 1 a link to an external autonomous system. BB1 and BB3 do not forward these LSAs into Area 0.

X X

As DR, R2 sends this LSA type to R3.

X

BB4 is advertising an external network to BB3 and BB1.

X

BB3 is advertising to Area 2 that BB4 is the ASBR. BB2 is advertising its directly connected OSPF-enabled links to BB1 and BB3.

Type 5

X X

BB2 is advertising the links in Area 0 to the routers in Area 1.

X

OSPF Routing Table and Types of Routes Because of the different LSA types with routes originating from different areas and from nonOSPF networks, the routing table uses different codes to identify the various types of routes. Refer to Example 6-1. Briefly describe each of the three OSPF route types shown.

instructor.indb 79

3/12/14 7:51 AM

80

CCNA Routing and Switching Practice and Study Guide

Example 6-1

A Sample Multiarea OSPF Routing Table

BB1# show ip route | begin Gateway Gateway of last resort is 10.0.0.1 to network 0.0.0.0

O*E2

0.0.0.0/0 [110/1] via 10.0.0.1, 00:02:16, Serial0/0/0 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks

C

10.0.0.0/30 is directly connected, Serial0/0/0

L

10.0.0.2/32 is directly connected, Serial0/0/0

O

10.0.1.0/30 [110/128] via 10.0.0.1, 00:03:24, Serial0/0/0 172.16.0.0/16 is variably subnetted, 7 subnets, 4 masks

C

172.16.0.0/23 is directly connected, GigabitEthernet0/0

L

172.16.0.1/32 is directly connected, GigabitEthernet0/0

C

172.16.2.0/23 is directly connected, GigabitEthernet0/1

L

172.16.2.1/32 is directly connected, GigabitEthernet0/1

O

172.16.5.0/24 [110/65] via 10.0.0.1, 00:03:24, Serial0/0/0

O IA

172.16.16.0/21 [110/129] via 10.0.0.1, 00:03:24, Serial0/0/0

O IA

172.16.24.0/21 [110/129] via 10.0.0.1, 00:03:24, Serial0/0/0

BB1#

O: Indicates the router received router (type 1) and network (type 2) LSAs describing the details within an area, meaning that the route is intra-area. O IA: Indicates the router received a summary (type 3) LSA from an ABR. This is an interarea route. O*E2: Indicates the router received an AS External (type 5) LSA either from an ABR or an ASBR. This is an external route. List the steps in order that OSPF uses to calculate the best paths. 1. Calculate intra-area OSPF routes. 2. Calculate best path to interarea OSPF routes. 3. Calculate best path route to external non-OSPF networks.

Configuring Multiarea OSPF At the CCNA level, the configuration of multiarea OSPF is rather straightforward if you are already comfortable configuring single-area OSPF. This section reviews configuring and verifying multiarea OSPFv2 and OSPFv3.

Configuring Multiarea OSPF We will use the topology in Figure 6-2 and the addressing in Table 6-4 to configure a dualstack network running multiarea OSPFv2 and OSPFv3.

instructor.indb 80

3/12/14 7:51 AM

Chapter 6: Multiarea OSPF

Figure 6-2

81

Dual-Stacked Multiarea OSPF Topology Area 0 172.16.5.0/24 2001:DB8:5:1::/64

G0/0 .1 Lo0 BB2

.1 10.0.0.0/30 2001:DB8:0:E::/64

.2

Area 1

S0/0/0

Internet

.1

S0/0/0 S0/0/1

10.0.1.0/30 2001:DB8:0:F::/64

S0/0/1

BB1 .1 G0/0 G0/1 .1

172.16.0.0/23 2001:DB8:1:1::/64

209.165.201.0/30 2001:DB8:F:F::/64

Area 2

172.16.2.0/23 2001:DB8:1:2::/64

.2

BB3 .1 G0/0 G0/1 .1

172.16.16.0/21 2001:DB8:3:1::/64

172.16.24.0/21 2001:DB8:3:2::/64

Based on the addressing shown in the topology, finish documenting the addressing scheme in Table 6-4. Table 6-4

Addressing for the Dual-Stacked Multiarea OSPF Topology

Device

Interface

Addressing Information

BB1

G0/0

172.16.0.0

255.255.254.0

2001:DB8:1:1::2/64 G0/1

172.16.2.0

255.255.254.0

2001:DB8:1:2::2/64 S0/0/0

10.0.0.2

255.255.255.252

2001:DB8:0:E::2/64 Link-Local BB2

FE80::1

Router ID

1.1.1.1

G0/0

172.16.5.1

255.255.255.0

2001:DB8:5:1::1/64 S0/0/0

10.0.0.1

255.255.255.252

2001:DB8:0:E::1/64 S0/0/1

10.0.1.1

255.255.255.252

2001:DB8:0:F::1/64 Lo0

209.165.201.1

255.255.255.252

2001:DB8:F:F::1/64

instructor.indb 81

Link-Local

FE80::2

Router ID

2.2.2.2

3/12/14 7:51 AM

82

CCNA Routing and Switching Practice and Study Guide

Device

Interface

Addressing Information

BB3

G0/0

172.16.16.1

255.255.248.0

2001:DB8:3:1::2/64 G0/1

172.16.24.0

255.255.248.0

2001:DB8:3:2::2/64 S0/0/1

10.0.1.2

255.255.255.252

2001:DB8:0:F::2/64 Link-Local

FE80::3

Router ID

3.3.3.3

The only difference between configuring single-area OSPF and multiarea OSPF is assigning the area value. Recall that for OSPFv2, you configure the area as part of the network command in OSPF router configuration mode. In OSPFv3, you configure the area as part of the ipv6 ospf command in interface configuration mode. Document the OSPFv2 and OSPFv3 routing configurations for all three routers. Include default routing to the Internet with BB2 redistributing the IPv4 and IPv6 default routes to BB1 and BB2. !BB1!!!!!!!!!!!!!!!!!!! router ospf 10 router-id 1.1.1.1 network 172.16.0.0 0.0.1.255 area 1 network 172.16.2.0 0.0.1.255 area 1 network 10.0.0.0 0.0.0.3 area 0 ipv6 router ospf 10 router-id 1.1.1.1 interface g0/0 ipv6 ospf 10 area 1 interface g0/1 ipv6 ospf 10 area 1 interface s0/0/0 ipv6 ospf 10 area 0 !BB2!!!!!!!!!!!!!!!!!!! ip route 0.0.0.0 0.0.0.0 Lo0 ipv6 route ::/0 Lo0 router ospf 10 router-id 2.2.2.2 network 172.16.5.0 0.0.0.255 area 0 network 10.0.0.0 0.0.0.3 area 0 network 10.0.1.0 0.0.0.3 area 0 default-information originate ipv6 router ospf 10 router-id 2.2.2.2

instructor.indb 82

3/12/14 7:51 AM

Chapter 6: Multiarea OSPF

83

default-information originate interface g0/0 ipv6 ospf 10 area 0 interface s0/0/0 ipv6 ospf 10 area 0 interface s0/0/1 ipv6 ospf 10 area 0 !BB3!!!!!!!!!!!!!!!!!!! router ospf 10 router-id 3.3.3.3 network 172.16.16.0 0.0.7.255 area 2 network 172.16.24.0 0.0.7.255 area 2 network 10.0.1.0 0.0.0.3 area 0 ipv6 router ospf 10 router-id 3.3.3.3 interface g0/0 ipv6 ospf 10 area 2 interface g0/1 ipv6 ospf 10 area 2 interface s0/0/1 ipv6 ospf 10 area 0

Configuring Route Summarization for Multiarea OSPFv2 ABRs do not automatically summarize network addresses across area boundaries. To reduce the size of routing tables, you can manually configure ABRs and ASBRs to summarize networks so that they will then inject them into another area. In Figure 6-2, BB1 and BB3 can summarize the two LANs into one network advertisement. What is the command syntax to configure an ABR interarea summary route? Router(config-router)# area area-id range address mask

What is the summary route for the two LANs attached to BB1: Address: 172.16.0.0 Mask: 255.255.252.0 Document the command to configure BB1 with an interarea summary route. BB1(config-router)# area 1 range 172.16.0.0 255.255.252.0

What is the summary route for the two LANs attached to BB3: Address: 172.16.16.0 Mask: 255.255.240.0 Document the command to configure BB3 with an interarea summary route. BB3(config-router)# area 2 range 172.16.16.0 255.255.240.0

Your OSPF routing tables should look like the output in Example 6-2.

instructor.indb 83

3/12/14 7:51 AM

84

CCNA Routing and Switching Practice and Study Guide

Example 6-2

Multiarea OSPFv2 and OSPFv3 Routing Tables

BB1# show ip route ospf | begin Gateway Gateway of last resort is 10.0.0.1 to network 0.0.0.0

O*E2

0.0.0.0/0 [110/1] via 10.0.0.1, 00:08:36, Serial0/0/0 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks

O

10.0.1.0/30 [110/128] via 10.0.0.1, 00:08:36, Serial0/0/0 172.16.0.0/16 is variably subnetted, 7 subnets, 5 masks

O

172.16.0.0/22 is a summary, 00:08:36, Null0

O

172.16.5.0/24 [110/65] via 10.0.0.1, 00:08:36, Serial0/0/0

O IA

172.16.16.0/20 [110/129] via 10.0.0.1, 00:04:44, Serial0/0/0

BB1# show ipv6 route ospf | begin OE2 OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2 OE2 ::/0 [110/1], tag 10 via FE80::2, Serial0/0/0 O

2001:DB8:0:F::/64 [110/128]

OI

2001:DB8:3:1::/64 [110/129]

via FE80::2, Serial0/0/0

via FE80::2, Serial0/0/0 OI

2001:DB8:3:2::/64 [110/129]

O

2001:DB8:5:1::/64 [110/65]

via FE80::2, Serial0/0/0

via FE80::2, Serial0/0/0 BB1# BB2# show ip route ospf | begin Gateway Gateway of last resort is 0.0.0.0 to network 0.0.0.0

172.16.0.0/16 is variably subnetted, 4 subnets, 4 masks O IA

172.16.0.0/22 [110/65] via 10.0.0.2, 00:09:51, Serial0/0/0

O IA

172.16.16.0/20 [110/65] via 10.0.1.2, 00:05:59, Serial0/0/1

BB2# show ipv6 route ospf | begin OI OI

2001:DB8:1:1::/64 [110/65]

OI

2001:DB8:1:2::/64 [110/65]

2001

via FE80::1, Serial0/0/0

via FE80::1, Serial0/0/0 OI

2001:DB8:3:1::/64 [110/65]

OI

2001:DB8:3:2::/64 [110/65]

via FE80::3, Serial0/0/1

via FE80::3, Serial0/0/1 BB2# BB3# show ip route ospf | begin Gateway Gateway of last resort is 10.0.1.1 to network 0.0.0.0

instructor.indb 84

3/12/14 7:51 AM

Chapter 6: Multiarea OSPF

O*E2

85

0.0.0.0/0 [110/1] via 10.0.1.1, 00:05:31, Serial0/0/1 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks

O

10.0.0.0/30 [110/128] via 10.0.1.1, 00:05:31, Serial0/0/1 172.16.0.0/16 is variably subnetted, 7 subnets, 5 masks

O IA

172.16.0.0/22 [110/129] via 10.0.1.1, 00:05:31, Serial0/0/1

O

172.16.5.0/24 [110/65] via 10.0.1.1, 00:05:31, Serial0/0/1

O

172.16.16.0/20 is a summary, 00:05:31, Null0

BB3# show ipv6 route ospf | begin OE2 OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2 OE2 ::/0 [110/1], tag 10 via FE80::2, Serial0/0/1 O

2001:DB8:0:E::/64 [110/128] via FE80::2, Serial0/0/1

OI

2001:DB8:1:1::/64 [110/129]

OI

2001:DB8:1:2::/64 [110/129]

via FE80::2, Serial0/0/1

via FE80::2, Serial0/0/1 O

2001:DB8:5:1::/64 [110/65] via FE80::2, Serial0/0/1

BB3#

Verifying Multiarea OSPF In Table 6-5, indicate which command or commands will provide the multiarea OSPFv2 verification information. Table 6-5

Multiarea OSPFv2 Verification Commands

Verification Information

Process ID

show ip protocols

show ip ospf interface brief

X

X

X

X X

Interface Cost Router ID

X

Administrative Distance

X

Number of Areas

X

Networks from Other Areas

X X X X

All Known Routes Total Cost of Route

show ip ospf database

X

State of OSPF Interface Networks Configured

show ip route ospf

X

Verification commands for multiarea OSPFv3 are almost identical to OSPFv2. In Table 6-6, indicate which command or commands will provide the multiarea OSPFv3 verification information.

instructor.indb 85

3/12/14 7:51 AM

86

CCNA Routing and Switching Practice and Study Guide

Table 6-6

Multiarea OSPFv3 Verification Commands

Verification Information

show ipv6 protocols

show ipv6 ospf interface brief

show ipv6 route ospf

show ipv6 ospf database

X

Administrative Distance

X

All Known Routes X

Interface Cost

X

Networks from Other Areas Number of Areas

X

Process ID

X

Router ID

X

State of OSPF Interface

X

X X X

X

Total Cost of Route

X

Lab - Configuring Multiarea OSPFv2 (SN 6.2.3.8/RP 8.2.3.8) Lab - Configuring Multiarea OSPFv3 (SN 6.2.3.9/RP 8.2.3.9) Lab - Troubleshooting Multiarea OSPFv2 and OSPFv3 (SN 6.2.3.10/RP 8.2.3.10) Packet Tracer Activity

Packet Tracer - Configuring Multiarea OSPFv2 (SN 6.2.3.6/RP 8.2.3.6) Packet Tracer - Configuring Multiarea OSPFv3 (SN 6.2.3.7/RP 8.2.3.7)

instructor.indb 86

3/12/14 7:51 AM

CHAPTER 7

EIGRP

The main purpose in Cisco’s development of Enhanced Interior Gateway Routing Protocol (EIGRP) was to create a classless version of IGRP. EIGRP includes several features that are not commonly found in other distance vector routing protocols such as RIP (RIPv1 and RIPv2) and IGRP. Although EIGRP may act like a link-state routing protocol, it is still a distance vector routing protocol.

instructor.indb 87

3/12/14 7:51 AM

88

CCNA Routing and Switching Practice and Study Guide

Characteristics of EIGRP EIGRP is considered an advanced distance vector routing protocol because it has characteristics not found in other distance vector protocols like RIP and IGRP.

Describe Basic EIGRP Features A major difference between EIGRP and other distance vector protocols is the algorithm it uses to calculate the best rate. Name and briefly describe this algorithm. The Diffusing Update Algorithm (DUAL) guarantees a loop-free route and provides backup paths throughout the routing domain. These backup routes are maintain in a topology table and can be immediately installed in the routing table if the primary route fails. What protocol, unique to EIGRP, provides for the delivery of EIGRP packets to neighbors? Reliable Transport Protocol (RTP) What is meant by the statement, “EIGRP provides partial and bounded updates”? EIGRP doesn’t send periodic updates (like RIP or IGRP). Instead, EIGRP sends out a partial update if there is a change in a route or routes. Bounded means that the partial update is only sent to those routers that need it. Protocol-dependent modules (PDMs) allow EIGRP to route several different network layer protocols. List at least four functions of EIGRP’s PDMs. ■

Maintaining the neighbor and topology tables of EIGRP routers that belong to that protocol suite



Building and translating protocol-specific packets for DUAL



Interfacing DUAL to the protocol-specific routing table



Computing the metric and passing this information to DUAL



Implementing filtering and access lists



Performing redistribution functions to and from other routing protocols



Redistributing routes that are learned by other routing protocols

What are the IPv4 and IPv6 multicast addresses used by EIGRP’s RTP? IPv4 uses 224.0.0.10 and IPv6 uses FF02::A.

Identify and Describe EIGRP Packet Types Like the Open Shortest Path First (OSPF) Protocol, EIGRP relies on different types of packets to maintain its tables and establish relationships with neighbor routers. In Table 7-1, provide a brief description for each EIGRP packet type.

instructor.indb 88

3/12/14 7:51 AM

Chapter 7: EIGRP

Table 7-1

89

EIGRP Packet Types

Packet Type

Description

Hello

Used to discover other EIGRP routers in the network

Acknowledgment

Used to acknowledge the receipt of any EIGRP packet

Update

Used to convey routing information to known destinations

Query

Used to request specific information from a neighbor router

Reply

Used to respond to a query

Complete the missing elements in this exercise by filling in appropriate words or phrases. When encountered, circle whether the packet is reliable or unreliable and whether it is unicast or multicast. Hello packets: ■

(Reliable/unreliable) (unicast/multicast) sent to the address, 224.0.0.10, to discover and maintain neighbors; contains the router’s neighbor table



Default Hello interval depends on the bandwidth: ■

≤ 1.544 Mbps = 60 sec. Hello interval (180 holdtime)



> 1.544 Mbps = 5 sec. Hello interval (15 holdtime)

Update packets. Sent (reliably/unreliably), there are two types: ■

(Unicast/multicast) to new neighbor discovered; contains routing information



(Unicast/multicast) to all neighbors when topology changes

Query packets. Queries are (unicast/multicast) (reliably/unreliably) during route recomputation, asking neighbors for a new successor to a lost route. Reply packets. Neighbors (unicast/multicast) a reply to a query whether they have a route. Acknowledgment packets. “Dataless” (unicast/multicast) packet that acknowledges the receipt of a packet that was sent reliably. This type is actually a Hello packet with a nonzero value in the Acknowledgment field. An EIGRP router assumes that as long as it is receiving Hello packets from a neighbor, the neighbor and its routes remain viable. Holdtime tells the router the maximum time the router should wait to receive the next Hello before declaring that neighbor as unreachable. By default, this waiting period is three times the Hello interval, or 15 seconds on most networks and 180 seconds on networks with speeds of T1 or slower. If the time expires, EIGRP will declare the route as down, and DUAL will search for a new path by sending out queries.

Identify Elements of the EIGRP Message Formats Figure 7-1 shows an example of an encapsulated EIGRP message. Fill in the missing field contents.

instructor.indb 89

3/12/14 7:51 AM

90

CCNA Routing and Switching Practice and Study Guide

Figure 7-1

Encapsulated EIGRP Message

Data Link Frame Header

IP Packet Header

EIGRP Packet Header

Type/Length/Values Types

Data Link Frame MAC Source Address = Address of Sending Interface MAC Destination Address = Multicast: 01-00-5E-00-00-0A IP Packet IP Source Address = Address of Sending Interface IP Destination Address = Multicast: Protocol Field = for EIGRP EIGRP Packet Header Opcode for EIGRP Packet Type TLV Types Some Types Include: 0x0001 0x0102 0x0103

Figure 7-1a

Encapsulated EIGRP Message (answer)

Data Link Frame Header

IP Packet Header

EIGRP Packet Header

Type/Length/Values Types

Data Link Frame MAC Source Address = Address of Sending Interface MAC Destination Address = Multicast: 01-00-5E-00-00-0A IP Packet IP Source Address = Address of Sending Interface IP Destination Address = Multicast: 224.0.0.10 Protocol Field = 88 for EIGRP EIGRP Packet Header Opcode for EIGRP Packet Type AS Number TLV Types Some Types Include: 0x0001 EIGRP Parameters 0x0102 IP Internal Routes 0x0103 IP External Routes

The EIGRP packet header is included with every EIGRP packet, regardless of its type. In the IP packet header, the Protocol field is set to 88 to indicate EIGRP, and the destination address is set to the multicast 224.0.0.10. Every EIGRP message includes the header as shown in Figure 7-2. Fill in the missing field contents.

instructor.indb 90

3/12/14 7:51 AM

Chapter 7: EIGRP

Figure 7-2

91

EIGRP Packet Header Data Link Frame Header

Bit

0

IP Packet Header

EIGRP Packet Header

7 8

15 16

Type/Length/Values Types

23 24 Checksum

Version

31

Flags EIGRP Header

Sequence Ack

EIGRP Message

Figure 7-2a

Numbers TLVs

EIGRP Packet Header (answer) Data Link Frame Header

Bit

0

IP Packet Header

EIGRP Packet Header

7 8

15 16

23 24 Checksum

Opcode

Version

Type/Length/Values Types

31

Flags EIGRP Header

Sequence Ack Autonomous System

EIGRP Message

Numbers TLVs

Important fields for our discussion include the Opcode field and the Autonomous System (AS) field. Opcode specifies the EIGRP packet type, one of the following: ■

Update



Query



Reply



Hello

The number in the AS field is used to track multiple instances of EIGRP. Encapsulated in the EIGRP packet header is the TLV (Type/Length/Values) shown in Figure 7-3. Fill in the missing field contents. Figure 7-3

EIGRP Parameters TLV

Data Link Frame Header Bit

Values

instructor.indb 91

0

IP Packet Header

7 8 Type = 0x0001

EIGRP Packet Header 15 16

Type/Length/Values Types: EIGRP Parameters TLV 23 24 Length

31

Reserved

3/12/14 7:51 AM

92

CCNA Routing and Switching Practice and Study Guide

Figure 7-3a

EIGRP Parameters TLV (answer) Data Link Frame Header

Bit

0

Values

IP Packet Header

7 8 Type = 0x0001

EIGRP Packet Header 15 16

K1

K2

K5

Reserved

Type/Length/Values Types: EIGRP Parameters TLV 23 24 Length

K3

31 K4

Hold Time

This EIGRP parameters message includes the weights that EIGRP uses for its composite metric. By default, only bandwidth and delay are weighted. Both are equally weighted; therefore, the K1 field for bandwidth and the K3 field for delay are both set to 1. The other K values are set to 0. The holdtime is the amount of time the EIGRP neighbor receiving this message should wait before considering the advertising router to be down. Figure 7-4 shows the IP Internal message that is used to advertise EIGRP routes within an autonomous system. Fill in the missing field contents. Figure 7-4

IP Internal Routes TLV Data Link Frame Header

Bit

0

IP Packet Header

7 8 Type = 0x0102

EIGRP Packet Header 15 16

Type/Length/Values Types: IP Internal Routes TLV 23 24 Length

31

Next Hop

Values

MTU Reliability

Figure 7-4a

Reserved

IP Internal Routes TLV (answer) Data Link Frame Header

Bit

Hope Count

Load

0

IP Packet Header

7 8 Type = 0x0102

EIGRP Packet Header 15 16

Type/Length/Values Types: IP Internal Routes TLV 23 24 Length

31

Next Hop Delay Bandwidth

Values

MTU Reliability Prefix Length

instructor.indb 92

Load

Hope Count Reserved Destination

3/12/14 7:51 AM

Chapter 7: EIGRP

93

Important fields include the metric fields (Delay and Bandwidth), the subnet mask field (Prefix Length), and the Destination field. Explain how the delay value is calculated? Delay is calculated as the sum of delays from source to destination in units of 10 microseconds. Explain how the bandwidth value is determined? Bandwidth is the lowest configured bandwidth of any interface along the route. The subnet mask is specified as the prefix length or the number of network bits in the subnet mask. For example, the subnet mask 255.255.255.0 has a prefix length of 24. Figure 7-5 shows the IP External message that is used when external routes are imported into the EIGRP routing process. Notice that the bottom half of the IP External TLV includes all the fields used by the IP Internal TLV. Fill in the missing field contents. Figure 7-5

IP External Routes TLV Data Link Frame Header

Bit

0

IP Packet Header

EIGRP Packet Header

7 8 Type = 0x0103

Type/Length/Values Types: IP External Routes TLV

15 16

23 24 Length

31 Value fields used to track external source of route.

Originating Routers Originating Autonomous System Number Arbitrary Tag Values

Reserved

Ext. Protocol ID

MTU Reliability

Figure 7-5a

0

Hope Count

Load

Reserved

IP Packet Header

EIGRP Packet Header

7 8 Type = 0x0103

15 16

Type/Length/Values Types: IP External Routes TLV 23 24 Length

31

Next Hop Originating Routers Originating Autonomous System Number Arbitrary Tag External Protocol Metric Values

Reserved

Ext. Protocol ID

Flags

Delay Bandwidth MTU Reliability Prefix Length

instructor.indb 93

Same value fields used in the IP Internal TLV.

IP External Routes TLV (answer)

Data Link Frame Header Bit

Flags

Load

Hope Count Reserved Destination

Value fields used to track external source of route. Same value fields used in the IP Internal TLV.

3/12/14 7:51 AM

94

CCNA Routing and Switching Practice and Study Guide

Configuring EIGRP for IPv4 Implementing EIGRP for IPv4 is with basic configurations is straightforward. Tweaking EIGRP with more advanced settings is the topic of the next chapter.

Configuring EIGRP with IPv4 Briefly explain the purpose of the autonomous system number in EIGRP configurations. The autonomous system number functions as a process ID to help routers keep track of multiple running instances of EIGRP. It has nothing to do with the autonomous system number assigned by IANA and RIRs to ISPs for their BGP routing configurations What are the steps a Cisco router uses to choose its router ID? 1. Use the IPv4 address configured with the eigrp router-id command. 2. If the router ID is not configured, use the highest IPv4 address loopback interfaces. 3. If no loopbacks are configured, use the highest active IPv4 address of physical interfaces. What are the two main reasons for using the passive-interface command? 1. To stop unnecessary traffic from being sent out an interface where there are no other EIGRP routers. 2. To provide security to the EIGRP routing process by preventing a rogue device from injecting false or less than optimal routing information. We will use the topology in Figure 7-6 and the addressing in Table 7-2 to configure a dualstack network running EIGRP for IPv4 and IPv6. Figure 7-6

Dual-Stacked Multiarea EIGRP Topology 10.10.0.0/22 2001:DB8:1:1::/64

10.10.4.0/22 2001:DB8:1:2::/64

209.165.201.0/30 2001:DB8:F:F::/64

G0/1 G0/0 S0/0/0

10.10.8.0/23 2001:DB8:1:3::/64

Lo0 HQ

S0/0/1

172.16.1.248/30 2001:DB8:F:1::/64

172.16.1.252/30 2001:DB8:F:2::/64 768 kbps

S0/0/0

instructor.indb 94

B1 G0/1

S0/0/1

128 kbps S0/0/1

10.10.12.0/24 2001:DB8:1:5::/64

512 kbps

G0/0 10.10.10.0/23 2001:DB8:1:4::/64

Internet

S0/0/0 172.16.1.244/30 2001:DB8:F::/64

B3

G0/0 G0/1

10.10.13.0/24 2001:DB8:1:6::/64

3/12/14 7:51 AM

Chapter 7: EIGRP

Table 7-2

95

Addressing for the Dual-Stacked EIGRP Topology

Device

Interface

Addressing Information

HQ

G0/0

10.10.0.1

255.255.252.0

2001:DB8:1:1::1/64 G0/1

10.10.4.1

255.255.252.0

2001:DB8:1:2::1/64 S0/0/0

172.16.1.249

255.255.255.252

2001:DB8:F:1::1/64 S0/0/1

172.16.1.253

255.255.255.252

2001:DB8:F:2::1/64 Lo0

209.165.201.1

255.255.255.252

2001:DB8:F:F::1/64 Link-Local B1

FE80::2

Router ID

2.2.2.2

G0/0

10.10.8.1

255.255.254.0

2001:DB8:1:3::1/64 G0/1

10.10.10.1

255.255.254.0

2001:DB8:1:4::1/64 S0/0/0

172.16.1.250

255.255.255.252

2001:DB8:F:1::2/64 S0/0/1

172.16.1.245

255.255.255.252

2001:DB8:F::1/64

B3

Link-Local

FE80::1

Router ID

1.1.1.1

G0/0

10.10.12.1

255.255.255.0

2001:DB8:1:5::1/64 G0/1

10.10.13.1

255.255.255.0

2001:DB8:1:6::1/64 S0/0/0

172.16.1.246

255.255.255.252

2001:DB8:F::2/64 S0/0/1

172.16.1.254

255.255.255.252

2001:DB8:F:2::2/64 Link-Local

FE80::3

Router ID

3.3.3.3

Document the most basic routing commands you could use to configure EIGRP for IPv4. Include the commands to configure the LAN interfaces as passive. The commands for all three routers are the same, except for the router ID configuration for each router. !B1!!!!!!!!!!! router eigrp 1 eigrp router-id 1.1.1.1 network 10.0.0.0

instructor.indb 95

3/12/14 7:51 AM

96

CCNA Routing and Switching Practice and Study Guide

network 172.16.0.0 passive-interface g0/0 passive-interface g0/1 !HQ!!!!!!!!!!! router eigrp 1 eigrp router-id 2.2.2.2 network 10.0.0.0 network 172.16.0.0 passive-interface g0/0 passive-interface g0/1 !B3!!!!!!!!!!! router eigrp 1 eigrp router-id 3.3.3.3 network 10.0.0.0 network 172.16.0.0 passive-interface g0/0 passive-interface g0/1

Now, for each router, document the network commands you would configure if the policy stated that you must also configure the wildcard mask for each interface participating in the EIGRP routing domain. !B1!!!!!!!!!!! router eigrp 1 no network 10.0.0.0 no network 172.16.0.0 network 10.10.8.0 0.0.1.255 network 10.10.10.0 0.0.1.255 network 172.16.1.248 0.0.0.3 !HQ!!!!!!!!!!! router eigrp 1 no network 10.0.0.0 no network 172.16.0.0 network 10.10.0.0 0.0.3.255 network 10.10.4.0 0.0.3.255 network 172.16.1.248 0.0.0.3 network 172.16.1.252 0.0.0.3 !B3!!!!!!!!!!! router eigrp 1 no network 10.0.0.0 no network 172.16.0.0 network 10.10.12.0 0.0.0.255 network 10.10.13.0 0.0.0.255 network 172.16.1.252 0.0.0.3

instructor.indb 96

3/12/14 7:51 AM

Chapter 7: EIGRP

97

Verifying EIGRP with IPv4 Before any updates can be sent or received by EIGRP, routers must establish adjacencies with their neighbors. EIGRP routers establish adjacencies with neighbor routers by exchanging EIGRP Hello packets. Use the show ip eigrp neighbors command to view the neighbor table and verify that EIGRP has established an adjacency with its neighbors. This command enables you to verify and troubleshoot EIGRP. Example 7-1 shows the neighbor table for HQ. Example 7-1

EIGRP Neighbor Table for HQ

HQ# show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(1) H

Address

Interface

Hold Uptime

SRTT

(sec)

(ms)

RTO

Q

Seq

Cnt Num

1

172.16.1.254

Se0/0/1

14 00:28:35

2

100

0

33

0

172.16.1.250

Se0/0/0

10 00:28:48

1

100

0

36

As with OSPF, you can use the show ip protocols command shown in Example 7-2 to verify that EIGRP is enabled. Because this configuration was done on a router with IOS 15.1, automatic summarization is disabled by default. Example 7-2

Verifying EIGRP Is Enabled on HQ

HQ# show ip protocols *** IP Routing is NSF aware ***

Routing Protocol is "eigrp 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates EIGRP-IPv4 Protocol for AS(1) Metric weight K1=1, K2=0, K3=1, K4=0, K5=0 NSF-aware route hold timer is 240 Router-ID: 2.2.2.2 Topology : 0 (base) Active Timer: 3 min Distance: internal 90 external 170 Maximum path: 4 Maximum hopcount 100 Maximum metric variance 1

Automatic Summarization: disabled Maximum path: 4

instructor.indb 97

3/12/14 7:51 AM

98

CCNA Routing and Switching Practice and Study Guide

Routing for Networks: 10.10.0.0/22 10.10.4.0/22 172.16.1.248/30 172.16.1.252/30 Passive Interface(s): GigabitEthernet0/0 GigabitEthernet0/1 Routing Information Sources: Gateway

Distance

Last Update

172.16.1.254

90

00:29:47

172.16.1.250

90

00:29:47

Distance: internal 90 external 170

Another way to verify that EIGRP and other functions of the router are configured properly is to examine the routing tables with the show ip route command. EIGRP routes are denoted in the routing table with a D, which stands for DUAL. Example 7-3 shows output from the routing table for B1 with only the EIGRP routes shown. Also, notice that the output begins at the “Gateway of last resort is not set” statement. What command generated this output? show ip route eigrp | begin Gateway Example 7-3

B1 Routing Table with EIGRP Routes

B1# show ip route eigrp | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 8 subnets, 4 masks D

10.10.0.0/22 [90/2172416] via 172.16.1.249, 00:43:44, Serial0/0/0

D

10.10.4.0/22 [90/2172416] via 172.16.1.249, 00:43:44, Serial0/0/0

D

10.10.12.0/24 [90/2684416] via 172.16.1.249, 00:43:31, Serial0/0/0

D

10.10.13.0/24 [90/2684416] via 172.16.1.249, 00:43:31, Serial0/0/0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.252/30 [90/2681856] via 172.16.1.246, 00:00:05, Serial0/0/1

B1#

instructor.indb 98

3/12/14 7:51 AM

Chapter 7: EIGRP

99

Lab - Configuring Basic EIGRP with IPv4 (SN 7.2.2.5/RP 4.2.2.5) Packet Tracer Activity

Packet Tracer - Configuring Basic EIGRP with IPv4 (SN 7.2.2.4/RP 4.2.2.4)

Operation of EIGRP EIGRP uses the Diffusing Update Algorithm (DUAL) to select the best routes based on a composite metric. This section reviews the values of the EIGRP metric and how EIGRP performs the calculation to arrive at the metric displayed in the routing table.

EIGRP Metric Concepts List the values EIGRP uses in its composite metric to calculate the preferred path to a network: ■

Bandwidth



Delay



Reliability



Load

Record the formula used to calculate the default EIGRP composite metric. Default metric = [K1 * Bandwidth + K3 * Delay] * 256 What command can you use to change the default K values? Router(config-router)# metric weights tos k1 k2 k3 k4 k5

What command do you use to verify the K values used by EIGRP? show ip protocols What command enables you to verify the actual values of the EIGRP metric? show interface The bandwidth metric is displayed in Kbit (kilobits). The WIC-2T and HWIC-2T use the default value of 1,544,000 bps, which is the value for a T1 connection. The value may or may not reflect the actual physical bandwidth of the interface. If actual bandwidth of the link differs from the default value, you should modify the value. We will review modifying the bandwidth calculation to reflect actual values in the next chapter. Delay is a measure of the time it takes for a packet to traverse a route. This metric is a static value and is expressed in microseconds. Complete Table 7-3. Table 7-3

instructor.indb 99

Interface Delay Values

Media

Delay

Ethernet

1000

Fast Ethernet

100

Gigabit Ethernet

10

FDDI

100

T1 (serial default)

20,000

3/12/14 7:51 AM

100

CCNA Routing and Switching Practice and Study Guide

Media

Delay

DS0 (64 Kbps)

20,000

1024 Kbps

20,000

56 Kbps

20,000

Reliability is based on the worst value on a particular link and is computed based on keepalives. Load is based on the worst value on a particular link and is computed based on packet rates. However, because the EIGRP composite metric defaults to bandwidth and delay only, reliability and load are not normally considered in the calculation of metric.

DUAL Concepts Exercise Dual provides the following: ■

Loop-free paths



Loop-free backup paths which can be used immediately



Fast convergence



Minimum bandwidth usage with bounded updates

Briefly explain the term successor. A successor is a neighboring router that is used for packet forwarding and is the least-cost route to the destination network. Briefly explain what is meant by feasible distance. Feasible distance (FD) is the lowest calculated metric to reach the destination network. Examine the following output for B1’s routing table shown in Example 7-4. Example 7-4

Feasible Distance and Successors in the B1 Routing Table

B1# show ip route eigrp | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 8 subnets, 4 masks D

10.10.0.0/22 [90/2172416] via 172.16.1.249, 03:06:49, Serial0/0/0

D

10.10.4.0/22 [90/2172416] via 172.16.1.249, 03:06:49, Serial0/0/0

D

10.10.12.0/24 [90/2684416] via 172.16.1.249, 03:06:49, Serial0/0/0

D

10.10.13.0/24 [90/2684416] via 172.16.1.249, 03:06:49, Serial0/0/0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

instructor.indb 100

172.16.1.252/30 [90/2681856] via 172.16.1.249, 03:06:50, Serial0/0/0

3/12/14 7:51 AM

Chapter 7: EIGRP

101

Answer the questions that follow: What is the IP address of the successor for network 10.10.4.0/22? 172.16.1.249, which is HQ What is the feasible distance to 10.10.4.0/22? 2172416 What is the IP address of the successor for network 10.10.12.0/24? 172.16.1.249, which is HQ What is the feasible distance to 10.10.12.0/24? 2684416 Briefly explain the term feasible successor. A backup path to other routers maintained in a separate table so that DUAL does not have to be recomputed when the successor becomes unavailable. A feasible successor satisfies the feasibility condition Briefly explain feasibility condition. The feasibility condition (FC) is met when a neighbor’s reported distance (RD) to a network is less than the local router’s feasible distance to the same destination network. Briefly explain reported distance. The reported distance or advertised distance is simply an EIGRP neighbor’s feasible distance to the same destination network. The reported distance is the metric that a router reports to a neighbor about its own cost to that network. The successor, feasible distance, and any feasible successors with their reported distances are kept by a router in its EIGRP topology table or topology database. This table can be viewed using the show ip eigrp topology command, as shown in Example 7-5. Example 7-5

Successors and Feasible Successors in the B1 Topology Table

B1# show ip eigrp topology EIGRP-IPv4 Topology Table for AS(1)/ID(1.1.1.1) Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - reply Status, s - sia Status

P 10.10.8.0/23, 1 successors, FD is 28160 via Connected, GigabitEthernet0/0 P 172.16.1.248/30, 1 successors, FD is 2169856 via Connected, Serial0/0/0 P 172.16.1.244/30, 1 successors, FD is 3845120 via Connected, Serial0/0/1 P 10.10.12.0/24, 1 successors, FD is 2684416 via 172.16.1.249 (2684416/2172416), Serial0/0/0 via 172.16.1.246 (3847680/28160), Serial0/0/1 P 10.10.4.0/22, 1 successors, FD is 2172416 via 172.16.1.249 (2172416/28160), Serial0/0/0 P 172.16.1.252/30, 1 successors, FD is 2681856 via 172.16.1.249 (2681856/2169856), Serial0/0/0 via 172.16.1.246 (4357120/2169856), Serial0/0/1

instructor.indb 101

3/12/14 7:51 AM

102

CCNA Routing and Switching Practice and Study Guide

P 10.10.0.0/22, 1 successors, FD is 2172416 via 172.16.1.249 (2172416/28160), Serial0/0/0 P 10.10.13.0/24, 1 successors, FD is 2684416 via 172.16.1.249 (2684416/2172416), Serial0/0/0 via 172.16.1.246 (3847680/28160), Serial0/0/1 P 10.10.10.0/23, 1 successors, FD is 28160 via Connected, GigabitEthernet0/1

The topology table lists all successors and feasible successors that DUAL has calculated to destination networks. Use the partial output in Example 9-5 to answer the following questions: For route 10.10.12.0/24... What is the IP address of the successor? 172.16.1.249 What is the reported distance of the successor? 2172416 What is the feasible distance of the successor? 2684416 What is the IP address of the feasible successor? 172.16.1.246 What is the reported distance of the feasible successor? 28160 What is the feasible distance of the feasible successor? 3847680 Notice that the reported distance of the feasible successor is less than the feasible distance of the successor. What happens if an EIGRP router doesn’t have feasible successor in the topology table and the router loses connection to the successor? Then DUAL must be recomputed and neighbors queried for a possible backup route.

DUAL FSM Completion Exercise A finite state machine (FSM) is an abstract machine, not a mechanical device with moving parts. FSMs define a set of possible states that something can go through, what events cause those states, and what events result from those states. Designers use FSMs to describe how a device, computer program, or routing algorithm will react to a set of input events. Figure 7-7 is a simplified flowchart of DUAL’s FSM. Fill in the flowchart with the states EIGRP moves through when it loses connectivity with a successor. The flowchart should serve as a visual study aid to help you remember how DUAL converges on new routes.

instructor.indb 102

3/12/14 7:51 AM

Chapter 7: EIGRP

Figure 7-7

103

DUAL FSM Flowchart

Lost Connectivity to Successor

Yes

No

Yes

No

instructor.indb 103

3/12/14 7:51 AM

104

CCNA Routing and Switching Practice and Study Guide

Figure 7-7

DUAL FSM Flowchart (answer)

Lost Connectivity to Successor

Promote to Successor

Yes

Feasible Successor?

Yes

One or More New Routes?

No

Place Destination Network in Active State

Install Successor in Routing Table

Select New Successor

Query Neighbors for New Route

No

Install Feasible Successor(s), if any, in Topology Table

Remove Destination Network from Topology and Routing Tables

7.3.4.4 Packet Tracer - Investigating DUAL FSM

Configuring EIGRP for IPv6 EIGRP for IPv4 and EIGRP for IPv6 are almost identical in their operation. Configuring EIGRP for IPv6 is actually easier than IPv4. No need to configure network statements. Simply enable EIGRP for IPv6 globally, assigning a router ID. Then enable EIGRP on each interface you want to participate in the EIGRP routing process.

Comparing EIGRP for IPv4 and EIGRP for IPv6 In Table 7-4, indicate whether an EIGRP feature is associated with EIGRP for IPv4, EIGRP for IPv6, or both.

instructor.indb 104

3/12/14 7:51 AM

Chapter 7: EIGRP

Table 7-4

105

Comparing EIGRP for IPv4 and IPv6

Features

EIGRP for IPv4

Advertised IPv4 networks

EIGRP for IPv6

Both

X

Advertised IPv6 networks

X

Distance vector

X

DUAL algorithm

X

Default metric: bandwidth and delay

X

Transport protocol: RTP

X

Incremental, partial, and bounded updates

X

Neighbor discovery: Hello packets

X

224.0.0.10 multicast

X

FF02::10 multicast

X

Configuring and Verifying EIGRP for IPv6 The steps to configure EIGRP for IPv6 are as follows: Step 1.

Enable IPv6 routing.

Step 2.

Enable EIGRP for IPv6 globally and configure the router ID.

Step 3.

Enable the interfaces that are to participate in EIGRP for IPv6.

With those steps in mind, document the configurations for each router shown in Figure 7-6. Instructor Note: Although not required of the student, the IPv6 interface addressing is also including in the following scripts. !HQ!!!!!!!!!!! en conf t ipv6 unicast-routing ipv6 router eigrp 1 eigrp router-id 2.2.2.2 no shutdown interface g0/0 ipv6 address 2001:db8:1:1::1/64 ipv6 address fe80::2 link-local ipv6 eigrp 1 no shutdown interface g0/1 ipv6 address 2001:db8:1:2::1/64 ipv6 address fe80::2 link-local ipv6 eigrp 1 no shutdown interface s0/0/0 ipv6 address 2001:db8:f:1::1/64 ipv6 address fe80::2 link-local

instructor.indb 105

3/12/14 7:51 AM

106

CCNA Routing and Switching Practice and Study Guide

ipv6 eigrp 1 no shutdown interface s0/0/1 ipv6 address 2001:db8:f:2::1/64 ipv6 address fe80::2 link-local ipv6 eigrp 1 no shutdown int lo0 ipv6 address 2001:db8:f:f::1/64 end !B1!!!!!!!!!!! en conf t ipv6 unicast-routing ipv6 router eigrp 1 eigrp router-id 1.1.1.1 no shutdown interface g0/0 ipv6 address 2001:db8:1:3::1/64 ipv6 address fe80::1 link-local ipv6 eigrp 1 no shutdown interface g0/1 ipv6 address 2001:db8:1:4::1/64 ipv6 address fe80::1 link-local ipv6 eigrp 1 no shutdown interface s0/0/0 ipv6 address 2001:db8:f:1::2/64 ipv6 address fe80::1 link-local ipv6 eigrp 1 no shutdown interface s0/0/1 ipv6 address 2001:db8:f::1/64 ipv6 address fe80::1 link-local ipv6 eigrp 1 no shutdown end !B3!!!!!!!!!!! en conf t ipv6 unicast-routing ipv6 router eigrp 1 eigrp router-id 3.3.3.3

instructor.indb 106

3/12/14 7:51 AM

Chapter 7: EIGRP

107

no shutdown interface g0/0 ipv6 address 2001:db8:1:5::1/64 ipv6 address fe80::3 link-local ipv6 eigrp 1 no shutdown interface g0/1 ipv6 address 2001:db8:1:6::1/64 ipv6 address fe80::3 link-local ipv6 eigrp 1 no shutdown interface s0/0/0 ipv6 address 2001:db8:f::2/64 ipv6 address fe80::3 link-local ipv6 eigrp 1 no shutdown interface s0/0/1 ipv6 address 2001:db8:f:2::2/64 ipv6 address fe80::3 link-local ipv6 eigrp 1 no shutdown end

What command enables you to verify adjacency with other EIGRP routers? B1# show ipv6 eigrp neighbors EIGRP-IPv6 Neighbors for AS(1) H

Address

Interface

Hold Uptime

SRTT

(sec)

(ms)

RTO

Q

Seq

1

Link-local address:

Se0/0/1

11 00:14:52

1

186

0

50

Se0/0/0

12 00:14:53

1

100

0

25

Cnt Num

FE80::3 0

Link-local address: FE80::2

What command enables you to display the EIGRP parameters, including the K values, router ID, process ID, and administrative distances? B1# show ipv6 protocols IPv6 Routing Protocol is "connected" IPv6 Routing Protocol is "eigrp 1" EIGRP-IPv6 Protocol for AS(1) Metric weight K1=1, K2=0, K3=1, K4=0, K5=0 NSF-aware route hold timer is 240 Router-ID: 1.1.1.1 Topology : 0 (base) Active Timer: 3 min

instructor.indb 107

3/12/14 7:51 AM

108

CCNA Routing and Switching Practice and Study Guide

Distance: internal 90 external 170 Maximum path: 16 Maximum hopcount 100 Maximum metric variance 1

Interfaces: Serial0/0/0 Serial0/0/1 GigabitEthernet0/0 GigabitEthernet0/1 Redistribution: None IPv6 Routing Protocol is "ND"

What command enables you to verify the EIGRP routes are installed in the routing table? B1# show ipv6 route eigrp IPv6 Routing Table - default - 14 entries Codes: C - Connected, L - Local, S - Static, U - Per-user Static route B - BGP, R - RIP, H - NHRP, I1 - ISIS L1 I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary, D - EIGRP EX - EIGRP external, ND - ND Default, NDp - ND Prefix, DCE - Destination NDr - Redirect, O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1 OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2 D

2001:DB8:1:1::/64 [90/2172416]

D

2001:DB8:1:2::/64 [90/2172416]

via FE80::2, Serial0/0/0

via FE80::2, Serial0/0/0 D

2001:DB8:1:5::/64 [90/2684416]

D

2001:DB8:1:6::/64 [90/2684416]

via FE80::2, Serial0/0/0

via FE80::2, Serial0/0/0 D

2001:DB8:F:2::/64 [90/2681856] via FE80::2, Serial0/0/0

Lab - Configuring Basic EIGRP for IPv6 (SN 7.4.3.5/RP 4.4.3.5) Packet Tracer Activity

instructor.indb 108

Packet Tracer - Configuring Basic EIGRP with IPv6 (SN 7.4.3.4/RP 4.4.3.5)

3/12/14 7:51 AM

CHAPTER 8

EIGRP Advanced Configurations and Troubleshooting This chapter reviews the various ways you can adjust your Enhanced Interior Gateway Routing Protocol (EIGRP) implementation to provide additional capabilities and functionality. In addition, troubleshooting EIGRP is also covered.

instructor.indb 109

3/12/14 7:51 AM

110

CCNA Routing and Switching Practice and Study Guide

Advanced EIGRP Configurations Now that you are familiar with the basic configuration and verification commands for implementing EIGRP, this section focuses on ways you can tweak the implementation to improve performance, enable load balancing, and authenticate updates between EIGRP neighbors.

Automatic Summarization Before Cisco IOS 15.01(1)M and 12.2(33), automatic summarization in EIGRP was enabled by default. Briefly explain the concept of automatic summarization. Automatic summarization occurs at classful boundaries. So an EIGRP router with several subnets of a Class A, B, or C network will only advertise that network. Assume an EIGRP router is using automatic summarization. In Table 8-1, record the classful address advertised by the router for each listing of subnets. Table 8-1

Determine the Classful Networks Advertised by an EIGRP Router

Subnets

Classful Networks

10.10.10.0/24, 10.10.11.0/24, 10.10.12.0/24

10.0.0.0/8

172.16.16.0/22, 172.16.18.0/22

172.16.0.0/16

192.168.1.0/25, 192.168.1.128/25, 192.168.2.0/25, 192.168.2.128/25

192.168.1.0/24, 192.168.2.0/24

EIGRP automatic summarization should be used only if you are absolutely sure that you do not have any discontiguous subnets. For example, in Figure 8-1, the addressing scheme is discontiguous. Figure 8-1

EIGRP Automatic Summarization Topology with Discontiguous Subnets 10.10.0.0/22 HQ

172.16.1.248/30

172.16.1.252/30

10.10.8.0/23

10.10.12.0/24 B1

B3

If you enable automatic summarization on the routers, they will not advertise the specific subnets that belong to 10.0.0.0/8 across the 172.16.0.0 WAN links. Instead, they automatically summarize the subnets to 10.0.0.0/8 and advertise the classful network. But each router already has a link in the 10.0.0.0/8 address space, so the update from the neighbor is stored in the topology table. No routes to the subnets are installed. Automatic summarization is disabled by default in IOS 15 and later. What command including the router prompt will enable automatic summarization? Router(config-router)# auto-summary

instructor.indb 110

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

111

You can verify whether automatic summarization is enabled with the show ip protocols command displayed in Example 8-1 for HQ from Figure 8-1. Example 8-1

Verifying Automatic Summarization Is in Effect

HQ# show ip protocols *** IP Routing is NSF aware ***

Routing Protocol is "eigrp 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates EIGRP-IPv4 Protocol for AS(1) Metric weight K1=1, K2=0, K3=1, K4=0, K5=0 NSF-aware route hold timer is 240 Router-ID: 2.2.2.2 Topology : 0 (base) Active Timer: 3 min Distance: internal 90 external 170 Maximum path: 4 Maximum hopcount 100 Maximum metric variance 1

Automatic Summarization: enabled 172.16.0.0/16 for Gi0/0 Summarizing 2 components with metric 2169856 10.0.0.0/8 for Se0/0/0, Se0/0/1 Summarizing 1 component with metric 28160 Maximum path: 4 Routing for Networks: 10.0.0.0 172.16.0.0 Routing Information Sources: Gateway

Distance

Last Update

172.16.1.254

90

00:01:30

172.16.1.250

90

00:01:30

Distance: internal 90 external 170

To view the entire EIGRP topology table for HQ, use the show ip eigrp topology all-links command to generate the output displayed in Example 8-2.

instructor.indb 111

3/12/14 7:51 AM

112

CCNA Routing and Switching Practice and Study Guide

Example 8-2

Viewing the Complete EIGRP Topology Table

HQ# show ip eigrp topology all-links EIGRP-IPv4 Topology Table for AS(1)/ID(2.2.2.2) Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - reply Status, s - sia Status

P 172.16.1.248/30, 1 successors, FD is 2169856, serno 2 via Connected, Serial0/0/0 P 172.16.0.0/16, 1 successors, FD is 2169856, serno 4 via Summary (2169856/0), Null0 P 10.0.0.0/8, 1 successors, FD is 28160, serno 3 via Summary (28160/0), Null0 via 172.16.1.250 (2172416/28160), Serial0/0/0 via 172.16.1.254 (2172416/28160), Serial0/0/1 P 172.16.1.252/30, 1 successors, FD is 2169856, serno 8 via Connected, Serial0/0/1 P 10.10.0.0/22, 1 successors, FD is 28160, serno 1 via Connected, GigabitEthernet0/0

You can see that HQ has a route for 10.0.0.0/8 from both B1 and B3 in its topology table. However, it also has its own summary route with a better metric. This is the route installed and used by HQ, as verified with the show ip route eigrp command displayed in Example 8-3. Example 8-3

Verifying the Summary Route Installed on HQ

HQ# show ip route eigrp | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 3 subnets, 3 masks D

10.0.0.0/8 is a summary, 00:08:42, Null0 172.16.0.0/16 is variably subnetted, 5 subnets, 3 masks

D

172.16.0.0/16 is a summary, 00:09:01, Null0

Briefly explain the purpose of the Null0 interface. The Null0 interface is installed in the routing table to prevent routing loops.

Manual Summarization In EIGRP design scenarios where it is not desirable to prevent discontiguous subnets, you may still want to encourage scalable designs so that you can take advantage of EIGRP’s manual summarization. This will help reduce the size of routing tables.

instructor.indb 112

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

113

IPv4 Manual Summarization Figure 8-2 shows the same EIGRP topology we used in Chapter 7, “EIGRP.” However, now the topology shows the contracted bandwidth rates on each of the serial interfaces. We will use that information later to tune how EIGRP chooses the best route. Note: The bandwidths shown in Figure 8-2 are not realistic for today’s network implementations that require gigabit speeds across WAN links. These bandwidths are used for simplicity. Figure 8-2

Dual-Stack EIGRP Topology with Bandwidths 10.10.0.0/22 2001:DB8:1:1::/64

10.10.4.0/22 2001:DB8:1:2::/64

209.165.201.0/30 2001:DB8:F:F::/64

G0/1 G0/0 S0/0/0

10.10.8.0/23 2001:DB8:1:3::/64

Lo0 HQ

S0/0/1

172.16.1.248/30 2001:DB8:F:1::/64

172.16.1.252/30 2001:DB8:F:2::/64 768 kbps

S0/0/0 B1 G0/1

S0/0/1

128 kbps S0/0/1

10.10.12.0/24 2001:DB8:1:5::/64

512 kbps

G0/0 10.10.10.0/23 2001:DB8:1:4::/64

Internet

S0/0/0 172.16.1.244/30 2001:DB8:F::/64

B3

G0/0 G0/1

10.10.13.0/24 2001:DB8:1:6::/64

To calculate the IPv4 summary routes, use the same technique you used to calculate a IPv4 static summary routes: Step 1.

Write out the networks to be summarized in binary.

Step 2.

To find the subnet mask for summarization, start with the far-left bit.

Step 3.

Working from left to right, find all the bits that match consecutively.

Step 4.

When there is a column of bits that do not match, stop. This is the summary boundary.

Step 5.

Count the number of far-left matching bits, which in this example is 22. This number is used to determine the subnet mask for the summarized route: /22 or 255.255.252.0.

Step 6.

To find the network address for summarization, copy the matching 22 bits and add all 0 bits to the end to make 32 bits.

Once you have your summary, configure the desired interfaces with the ip summary-address eigrp command. Each interface that will send out an EIGRP update should have the command. In Figure 8-2, each router can summarizes the two local LANs into one summary route. Calculate the summary routes for each route and record the commands to configure the serial interfaces.

instructor.indb 113

3/12/14 7:51 AM

114

CCNA Routing and Switching Practice and Study Guide

HQ Summary Route: 10.10.0.0/21 Command to configure Serial 0/0/0 and Serial 0/0/1: ip summary-address eigrp 1 10.10.0.0 255.255.248.0

B1 Summary Route: 10.10.8.0/22 Command to configure Serial 0/0/0 and Serial 0/0/1: ip summary-address eigrp 1 10.10.8.0 255.255.252.0

B3 Summary Route: 10.10.12.0/23 Command to configure Serial 0/0/0 and Serial 0/0/1: ip summary-address eigrp 1 10.10.12.0 255.255.254.0

The following calculations focus on the third octet: HQ

B1

B3

00000000

00001000

00001100

LAN 2

00000100

00001010

00001101

Summary Route

10.10.0.0/21

10.10.8.0/22

10.10.12.0/23

If you are following along in a simulator or on lab equipment, your EIGRP routing tables should look like Example 8-4. Note: We have not yet configured the bandwidth values shown in Figure 8-2. Example 8-4

EIGRP Routing Tables with Manual Summarization in Effect

HQ# show ip route eigrp | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 7 subnets, 4 masks D

10.10.0.0/21 is a summary, 00:06:50, Null0

D

10.10.8.0/22 [90/2172416] via 172.16.1.250, 00:01:43, Serial0/0/0

D

10.10.12.0/23 [90/2172416] via 172.16.1.254, 00:01:13, Serial0/0/1 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.244/30 [90/2681856] via 172.16.1.254, 00:01:43, Serial0/0/1 [90/2681856] via 172.16.1.250, 00:01:43, Serial0/0/0

B1# show ip route eigrp | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 7 subnets, 4 masks

instructor.indb 114

D

10.10.0.0/21 [90/2172416] via 172.16.1.249, 00:00:54, Serial0/0/0

D

10.10.8.0/22 is a summary, 00:06:21, Null0

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

D

115

10.10.12.0/23 [90/2172416] via 172.16.1.246, 00:00:54, Serial0/0/1 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.252/30 [90/2681856] via 172.16.1.249, 00:00:54, Serial0/0/0 [90/2681856] via 172.16.1.246, 00:00:54, Serial0/0/1

B3# show ip route eigrp | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 7 subnets, 5 masks D

10.10.0.0/21 [90/2172416] via 172.16.1.253, 00:00:48, Serial0/0/1

D

10.10.8.0/22 [90/2172416] via 172.16.1.245, 00:00:48, Serial0/0/0

D

10.10.12.0/23 is a summary, 00:00:19, Null0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.248/30 [90/2681856] via 172.16.1.253, 00:00:48, Serial0/0/1 [90/2681856] via 172.16.1.245, 00:00:48, Serial0/0/0

IPv6 Manual Summarization Briefly explain why IPv6 does not support automatic summarization. Automatic summarization is based on classful addressing, which does not exist in IPv6. You can manually configure IPv6 summary routes. However, the IPv6 addressing in Figure 8-2 was not designed for summary routes. If you summarized the IPv6 LANs on any of the routers, you would be including IPv6 LANs from one or both of the other routers. For example, the summary for the IPv6 LANs on B3 would be 2001:DB8:1:4::/62. The calculation focuses on the fourth hextet since it is the one that is changing: 0000 0000 0000 0100 --> included in summary (B1 LAN) 0000 0000 0000 0101 --> B3 LAN 0000 0000 0000 0110 --> B3 LAN 0000 0000 0000 0111 --> included in a B1 summary, if configured

You can see that this summary would include the B1 IPv6 LAN, 2001:DB8:1:4::/64. But it would also include additional address space summarized by B1 if B1 also configured an IPv6 manual summary route. In fact, a summary route on B1 would include all the IPv6 LANs in the topology. Prove this using the following workspace to calculate what the IPv6 summary route would be for B1. 0000 0000 0000 0000 0000 0000 0000 0001 --> HQ LAN 0000 0000 0000 0010 --> HQ LAN 0000 0000 0000 0011 --> B1 LAN 0000 0000 0000 0100 --> B1 LAN 0000 0000 0000 0101 --> B3 LAN 0000 0000 0000 0110 --> B3 LAN 0000 0000 0000 0111

instructor.indb 115

3/12/14 7:51 AM

116

CCNA Routing and Switching Practice and Study Guide

What would be the summary route for B1? 2001:DB8:1::/61 Packet Tracer Activity

Packet Tracer - Configuring EIGRP Manual Summary Routes for IPv4 and IPv6 (SN 8.1.2.5/RP 5.1.2.5)

Default Route Propagation Propagating a default route in EIGRP requires one additional command in your EIGRP configuration. What is the command, including the router prompt, for both IPv4 and IPv6? IPv4: Router(config-router)# redistribute static

IPv6: Router(config-rtr)# redistribute static

Figure 8-2 is using a Loopback interface to simulate a connection to the Internet. Record the commands to configure an IPv4 default route, IPv6 default route, and redistribute the routes to B1 and B3. HQ(config)# ip route 0.0.0.0 0.0.0.0 Lo0 HQ(config)# ipv6 route ::/0 Lo0 HQ(config)# router eigrp 1 HQ(config-router)# redistribute static HQ(config-router)# ipv6 router eigrp 1 HQ(config-rtr)# redistribute static

If you are following along in a simulator or on lab equipment, your verification output for B1 and B3 should look like Example 8-5. Example 8-5

EIGRP Routing Tables with Default Route Propagation

B1# show ip route eigrp | begin Gateway Gateway of last resort is 172.16.1.249 to network 0.0.0.0

D*EX

0.0.0.0/0 [170/2297856] via 172.16.1.249, 00:12:58, Serial0/0/0 10.0.0.0/8 is variably subnetted, 7 subnets, 4 masks

D

10.10.0.0/21 [90/2172416] via 172.16.1.249, 06:04:19, Serial0/0/0

D

10.10.8.0/22 is a summary, 00:05:31, Null0

D

10.10.12.0/23 [90/2172416] via 172.16.1.246, 06:04:19, Serial0/0/1 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.252/30 [90/2681856] via 172.16.1.249, 06:04:19, Serial0/0/0 [90/2681856] via 172.16.1.246, 06:04:19, Serial0/0/1

B1# show ipv6 route eigrp | begin EX EX

::/0

::/0 [170/2169856] via FE80::2, Serial0/0/0

D

2001:DB8:1:1::/64 [90/2172416] via FE80::2, Serial0/0/0

instructor.indb 116

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

D

117

2001:DB8:1:2::/64 [90/2172416] via FE80::2, Serial0/0/0

D

2001:DB8:1:6::/64 [90/2172416] via FE80::3, Serial0/0/1

D

2001:DB8:F:2::/64 [90/2681856] via FE80::2, Serial0/0/0 via FE80::3, Serial0/0/1

B1# ping 209.165.201.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.201.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms B1# ping 2001:db8:f:f::1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2001:DB8:F:F::1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms B3# show ip route eigrp | begin Gateway Gateway of last resort is 172.16.1.253 to network 0.0.0.0

D*EX

0.0.0.0/0 [170/2297856] via 172.16.1.253, 00:13:32, Serial0/0/1 10.0.0.0/8 is variably subnetted, 7 subnets, 5 masks

D

10.10.0.0/21 [90/2172416] via 172.16.1.253, 06:04:52, Serial0/0/1

D

10.10.8.0/22 [90/2172416] via 172.16.1.245, 06:04:52, Serial0/0/0

D

10.10.12.0/23 is a summary, 06:05:05, Null0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.248/30 [90/2681856] via 172.16.1.253, 06:04:52, Serial0/0/1 [90/2681856] via 172.16.1.245, 06:04:52, Serial0/0/0

B3# show ipv6 route eigrp | begin EX EX

::/0 [170/2169856]

D

2001:DB8:1:1::/64 [90/2172416]

::/0

via FE80::2, Serial0/0/1

via FE80::2, Serial0/0/1 D

2001:DB8:1:2::/64 [90/2172416]

D

2001:DB8:1:4::/64 [90/2172416]

via FE80::2, Serial0/0/1

via FE80::1, Serial0/0/0 D

2001:DB8:F:1::/64 [90/2681856] via FE80::1, Serial0/0/0 via FE80::2, Serial0/0/1

B3# ping 209.165.201.1 Type escape sequence to abort.

instructor.indb 117

3/12/14 7:51 AM

118

CCNA Routing and Switching Practice and Study Guide

Sending 5, 100-byte ICMP Echos to 209.165.201.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms B3# ping 2001:db8:f:f::1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2001:DB8:F:F::1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms

8.1.3.4 Packet Tracer - Propagating a Default Route in EIGRP for IPv4 and IPv6

Fine-Tuning EIGRP Interfaces Bandwidth Utilization By default, EIGRP will use only up to 50 percent of the bandwidth of an interface for EIGRP information. This prevents the EIGRP process from overutilizing a link and not allowing enough bandwidth for the routing of normal traffic. The ip bandwidth-percent eigrp command can be used to configure the percentage of bandwidth that may be used by EIGRP on an interface. Record the full syntax for this command. Router(config-if)# ip bandwidth-percent eigrp as-number percent

This command uses the amount of configured bandwidth (or the default bandwidth) when calculating the percent that EIGRP can use. Hello Intervals and Holdtimes Hello intervals and holdtimes are configurable on a per-interface basis and do not have to match with other EIGRP routers to establish adjacencies. Record the command to configure a different Hello interval. Router(config-if)# ip hello-interval eigrp as-number seconds

If you change the Hello interval, make sure that you also change the holdtime to a value equal to or greater than the Hello interval. Otherwise, neighbor adjacency will go down after the holdtime expires and before the next Hello interval. Record the command to configure a different holdtime. Router(config-if)# ip hold-time eigrp as-number seconds

EIGRP has different default Hello intervals and holdtimes based on the type of link. Complete Table 8-2 with the default values. Table 8-2

instructor.indb 118

Default Hello Intervals and Holdtimer for EIGRP

Bandwidth

Example Link

Default Hello Interval

Default Holdtime

1.544 Mbps

Multipoint Frame Relay

60 seconds

180 seconds

Greater Than 1.544 Mbps

T1, Ethernet

5 seconds

15 seconds

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

119

Load Balancing Briefly describe equal-cost load balancing. Load balancing is the ability of a router to use all local interfaces that routes with the same metric to a destination address. By default, EIGRP uses up to four equal-cost paths to load balance traffic. You can see load balancing in effect in the routing tables shown in previous Examples 8-4 and 8-5. The reason EIGRP is load balancing is that we have not configured the actual bandwidth shown in Figure 8-2. Record the commands to configure the routers with the correct bandwidth values. HQ(config)# int s0/0/0 HQ(config-if)# bandwidth 768 HQ(config-if)# int s0/0/1 HQ(config-if)# bandwidth 512 B1(config)# int s0/0/0 B1(config-if)# bandwidth 768 B1(config-if)# int s0/0/1 B1(config-if)# bandwidth 128 B3(config)# int s0/0/0 B3(config-if)# bandwidth 128 B3(config-if)# int s0/0/1 B3(config-if)# bandwidth 512

Once the routers are properly configured with the actual bandwidth values, EIGRP recalculates the metrics and installs the best route in the routing table, as shown in Example 8-6. Notice that B1 and B3 are no longer using the 128-Kbps link to route to each other’s LANs. Instead, they are each using the faster path through HQ. Example 8-6

EIGRP Routing Tables After Bandwidth Configuration

B1# show ip route eigrp | begin Gateway Gateway of last resort is 172.16.1.249 to network 0.0.0.0

D*EX

0.0.0.0/0 [170/3973120] via 172.16.1.249, 00:05:50, Serial0/0/0 10.0.0.0/8 is variably subnetted, 7 subnets, 4 masks

D

10.10.0.0/21 [90/3847680] via 172.16.1.249, 00:05:50, Serial0/0/0

D

10.10.8.0/22 is a summary, 00:05:21, Null0

D

10.10.12.0/23 [90/6026496] via 172.16.1.249, 00:05:21, Serial0/0/0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.252/30 [90/6023936] via 172.16.1.249, 00:05:31, Serial0/0/0

B1# show ipv6 route eigrp | begin EX EX

::/0

::/0 [170/3845120] via FE80::2, Serial0/0/0

D

2001:DB8:1:1::/64 [90/3847680] via FE80::2, Serial0/0/0

instructor.indb 119

3/12/14 7:51 AM

120

CCNA Routing and Switching Practice and Study Guide

D

2001:DB8:1:2::/64 [90/3847680] via FE80::2, Serial0/0/0

D

2001:DB8:1:6::/64 [90/6026496] via FE80::2, Serial0/0/0

D

2001:DB8:F:2::/64 [90/6023936] via FE80::2, Serial0/0/0

B3# show ip route eigrp | begin Gateway Gateway of last resort is 172.16.1.253 to network 0.0.0.0

D*EX

0.0.0.0/0 [170/5639936] via 172.16.1.253, 00:05:43, Serial0/0/1 10.0.0.0/8 is variably subnetted, 7 subnets, 5 masks

D

10.10.0.0/21 [90/5514496] via 172.16.1.253, 00:05:43, Serial0/0/1

D

10.10.8.0/22 [90/6026496] via 172.16.1.253, 00:05:43, Serial0/0/1

D

10.10.12.0/23 is a summary, 00:06:11, Null0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.248/30 [90/6023936] via 172.16.1.253, 00:05:43, Serial0/0/1

B3# show ipv6 route eigrp | begin EX EX

::/0 [170/5511936]

D

2001:DB8:1:1::/64 [90/5514496]

::/0

via FE80::2, Serial0/0/1

via FE80::2, Serial0/0/1 D

2001:DB8:1:2::/64 [90/5514496]

D

2001:DB8:1:4::/64 [90/6026496]

via FE80::2, Serial0/0/1

via FE80::2, Serial0/0/1 D

2001:DB8:F:1::/64 [90/6023936] via FE80::2, Serial0/0/1

Securing EIGRP Routing Updates In most production networks, you would want to configure the EIGRP routers to authenticate updates received from neighbors. The steps to configure EIGRP with MD5 authentication are as follows: Step 1.

Create a keychain and key. Record the command syntax including the router prompt to configure a keychain and key. Router(config)# key chain name-of-chain Router(config-keychain)# key key-id Router(config-keychain-key)# key-string key-string-text

instructor.indb 120

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

Step 2.

121

Configure EIGRP authentication to use the keychain and key. Record the command syntax, including the router prompt, to configure EIGRP authentication using the keychain and key. Router(config)# interface type number Router(config-if)# ip authentication mode eigrp as-num md5 Router(config-if)# ip authentication key-chain eigrp as-num name-of-chain

Now record the commands to configure HQ to authenticate updates from B1 and B3. Assume that B1 and B3 are already configured. Use MYKEY as the keychain name, 1 as the key ID, and cisco123 as the key string. HQ(config)# key chain MYKEY HQ(config-keychain)# key 1 HQ(config-keychain-key)# key-string cisco123 HQ(config-keychain-key)# int s0/0/0 HQ(config-if)# ip authentication mode eigrp 1 md5 HQ(config-if)# ip authentication key-chain eigrp 1 MYKEY HQ(config-if)# int s0/0/1 HQ(config-if)# ip authentication mode eigrp 1 md5 HQ(config-if)# ip authentication key-chain eigrp 1 MYKEY

Use the show ip eigrp neighbors command as displayed in Example 8-7 to verify that HQ has reestablished adjacency with B1 and B3. Example 8-7

Verifying EIGRP Authentication

HQ# show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(1) H

Address

Interface

Hold Uptime

SRTT

(sec)

(ms)

RTO

Q

Seq

Cnt Num

1

172.16.1.250

Se0/0/0

10 00:06:25

2

192

0

59

0

172.16.1.254

Se0/0/1

13 00:07:09

3

288

0

59

Lab - Configuring Advanced EIGRP for IPv4 Features (SN 8.1.5.5/RP 5.1.5.5)

Troubleshoot EIGRP This section reviews the tools and procedures to troubleshoot EIGRP issues.

Commands for Troubleshooting EIGRP In Table 8-3, the IPv4 version of the troubleshooting commands for EIGRP are listed. The same commands are available for IPv6. Indicate which command or commands you would use to answer each of the questions.

instructor.indb 121

3/12/14 7:51 AM

122

CCNA Routing and Switching Practice and Study Guide

Table 8-3

Diagnosing EIGRP Connectivity Issues

Command

Is the Neighbor Table Correct?

show ip eigrp neighbors

X

show ip interface brief

X

show ip eigrp interface

X

Is the Routing Table Correct?

show ip protocols

X

show ip route eigrp

X

Does Traffic Take the Desired Path?

X

Troubleshoot EIGRP Connectivity Issues Using the configuration for the devices in Figure 8-2 and the following command outputs diagnose the EIGRP connectivity issue and recommend a solution.

Connectivity Issue #1 HQ and B1 have not formed a neighbor adjacency. Use the output in Example 8-8 to troubleshoot the first issue. Example 8-8

Troubleshooting Command Output for Issue #1

HQ# show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(1) H

Address

Interface

0

172.16.1.254

Se0/0/1

Hold Uptime

SRTT

(sec)

(ms)

10 00:23:18

1

RTO

Q

Seq

Cnt Num 288

0

65

HQ# show ip interface brief Interface

IP-Address

OK? Method Status

Protocol

Embedded-Service-Engine0/0 unassigned

YES unset

GigabitEthernet0/0

10.10.0.1

YES manual up

administratively down down up

GigabitEthernet0/1

10.10.4.1

YES manual up

up

Serial0/0/0

172.16.1.250

YES manual up

up

Serial0/0/1

172.16.1.253

YES manual up

up

Loopback0

209.165.201.1

YES manual up

up

B1# show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(1) H

1

Address

172.16.1.246

Interface

SRTT

(sec)

(ms)

Se0/0/1

Hold Uptime

12 00:26:47

9

RTO

Q

Seq

Cnt Num 1170

0

67

B1# show ip interface brief Interface

instructor.indb 122

IP-Address

OK? Method Status

Protocol

Embedded-Service-Engine0/0 unassigned

YES unset

administratively down down

GigabitEthernet0/0

10.10.8.1

YES manual up

up

GigabitEthernet0/1

10.10.10.1

YES manual up

up

Serial0/0/0

172.16.1.250

YES manual up

up

Serial0/0/1

172.16.1.245

YES manual up

up

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

123

Problem and Solution: HQ and B1 are both using the same IP address on the 172.16.1.248/30 link. Change either one to use IP address 172.16.1.249 and the neighbor relationship will be restored.

Connectivity Issue #2 HQ and B3 have not formed a neighbor adjacency. Example 8-9 displays the output for the second issue. Example 8-9

Troubleshooting Command Output for Issue #2

HQ# show ipv6 eigrp neighbors EIGRP-IPv6 Neighbors for AS(1) H

Address

Interface

0

Link-local address:

Se0/0/0

Hold Uptime

SRTT

(sec)

(ms)

14 05:12:49

1

RTO

Q

Seq

Cnt Num 186

0

57

FE80::1 B3# show ipv6 eigrp neighbors EIGRP-IPv6 Neighbors for AS(2)

Problem and Solution: B3 does not have EIGPR neighbors because it is configured with a different AS number than HQ. Configure B3 to use AS number 1 for its IPv6 EIGRP configuration.

Connectivity Issue #3 Although the IPv6 routes look correct, B3 is using a less-than-optimal route to reach the B1 and HQ IPv4 LANs. Use the output in Example 8-10 to troubleshoot the third issue. Example 8-10

Troubleshooting Command Output for Issue #3

HQ# show ip protocols *** IP Routing is NSF aware ***

Routing Protocol is "eigrp 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates Redistributing: static EIGRP-IPv4 Protocol for AS(1) Metric weight K1=1, K2=0, K3=1, K4=0, K5=0 NSF-aware route hold timer is 240 Router-ID: 2.2.2.2 Topology : 0 (base) Active Timer: 3 min

instructor.indb 123

3/12/14 7:51 AM

124

CCNA Routing and Switching Practice and Study Guide

Distance: internal 90 external 170 Maximum path: 4 Maximum hopcount 100 Maximum metric variance 1

Automatic Summarization: disabled Address Summarization: 10.10.0.0/21 for Se0/0/0, Se0/0/1 Summarizing 2 components with metric 28160 Maximum path: 4 Routing for Networks: 10.0.0.0 172.16.0.0 Passive Interface(s): GigabitEthernet0/0 GigabitEthernet0/1 Serial0/0/1 Routing Information Sources: Gateway

Distance

Last Update

172.16.1.254

90

00:17:55

172.16.1.250

90

00:00:41

Distance: internal 90 external 170 B3# show ip route eigrp | begin Gateway Gateway of last resort is 172.16.1.245 to network 0.0.0.0

D*EX

0.0.0.0/0 [170/21152000] via 172.16.1.245, 00:08:32, Serial0/0/0 10.0.0.0/8 is variably subnetted, 7 subnets, 5 masks

D

10.10.0.0/21 [90/21026560] via 172.16.1.245, 00:08:32, Serial0/0/0

D

10.10.8.0/22 [90/20514560] via 172.16.1.245, 00:08:32, Serial0/0/0

D

10.10.12.0/23 is a summary, 04:39:57, Null0 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks

D

172.16.1.248/30 [90/21024000] via 172.16.1.245, 00:08:32, Serial0/0/0

B3# show ipv6 route eigrp | begin EX EX

::/0

::/0 [170/5511936] via FE80::2, Serial0/0/1

D

2001:DB8:1:1::/64 [90/5514496] via FE80::2, Serial0/0/1

D

2001:DB8:1:2::/64 [90/5514496] via FE80::2, Serial0/0/1

D

2001:DB8:1:4::/64 [90/6026496] via FE80::2, Serial0/0/1

D

2001:DB8:F:1::/64 [90/6023936] via FE80::2, Serial0/0/1

instructor.indb 124

3/12/14 7:51 AM

Chapter 8: EIGRP Advanced Configurations and Troubleshooting

125

Problem and Solution: The EIGRP configuration on HQ has the Serial 0/0/1 interface set to passive. Therefore, HQ and B3 have not established adjacency and HQ is not sending IPv4 routing updates to B3. Lab - Troubleshooting Basic EIGRP for IPv4 and IPv6 (SN 8.2.3.6/RP 5.2.3.6) Lab - Troubleshooting Advanced EIGRP (SN 8.2.3.7/RP 5.2.3.7) Packet Tracer Activity

instructor.indb 125

Packet Tracer - Troubleshooting EIGRP for IPv4 (SN 8.2.3.5/RP 5.2.3.5) Packet Tracer - Skills Integration Challenge (SN 8.3.1.2/RP 5.3.1.2)

3/12/14 7:51 AM

instructor.indb 126

3/12/14 7:51 AM

CHAPTER 9

IOS Images and Licensing

Network administrators are responsible for managing the routers and switches owned by the organization. This responsibility includes backing up and upgrading software images when needed. This chapter reviews basic IOS image concepts and management tasks.

instructor.indb 127

3/12/14 7:51 AM

128

CCNA Routing and Switching Practice and Study Guide

Managing IOS System Files Cisco IOS software is a sophisticated operating system that includes multiple release versions that are organized into software release families and software trains.

IOS Families, Trains, and Naming Conventions A software release family is comprised of multiple IOS software release versions. What are the three features that distinguish an IOS software release family? ■

Share the same code base



Apply to a related platform (for example, 1900 series routers)



Overlap in support coverage

What are some major software releases within the software release family? 12.3, 12.4, 15.0, and 15.1 Briefly describe a software train. New versions are created to fix bugs and add new features to an existing software family. These releases are organized into trains that may contain several releases over the life of a software family. The Cisco IOS Software 12.4 train is considered the mainline train, which receives mostly software (bug) fixes with the goal of increasing software quality. These releases are also designated as Maintenance Deployment releases (MD). A mainline train is always associated with a technology train (T train). A T train, such as 12.4T, receives the same software bug fixes as the mainline train. What else does a T train include? T trains receive new software and hardware support features. T train releases are considered Early Deployment (ED) releases. Decoding the IOS release numbering conventions will go a long way in helping you understand the various trains used in the IOS 12.4 software release family. In Figure 9-1, indicate whether the release is a mainline train or a technology train. Then fill in the blanks for each part of the IOS 12 software release numbering scheme. Releases before IOS 15 consisted of eight packages for Cisco routers. These packages were the following: Five nonpremium packages:

instructor.indb 128



IP Base: Entry-level Cisco IOS Software Image



IP Voice: Converged voice and data, VoIP, VoFR, and IP Telephony



Advanced Security: Security and VPN features, including Cisco IOS Firewall, IDS/IPS, IPsec, 3DES, and VPN



SP (Service Provider) Services: Adds SSH/SSL, ATM, VoATM, and MPLS to IP Voice



Enterprise Base: Includes AppleTalk, IPX, and IBM Support

3/12/14 7:51 AM

Chapter 9: IOS Images and Licensing

Figure 9-1

129

The IOS 12.4 Software Release Numbering Convention 12.4(21 a)

12.4

12.4(20) T

1

12.4T

Figure 9-1a

The IOS 12.4 Software Release Numbering Convention (answer) 12.4(21 a)

12.4

Train Number Maintenance Identifier

Mainline Train

Rebuild Identifier

12.4(20) T

1

Train Number 12.4T

Maintenance Identifier Train Identifier

T Train

Rebuild Identifier

Three premium packages: ■

Advanced Enterprise Services: Full Cisco IOS software features



Enterprise Services: Enterprise base and service provider services



Advanced IP Services: Advanced security, service provider services, and support for IPv6

How does the Cisco IOS 15.0 release model differ from the mainline and T trains of 12.4? Instead of diverging into separate trains, Cisco IOS Software 15 mainline and T will have extended maintenance release (EM release) and standard maintenance release (T release). With the new IOS release model, Cisco IOS 15 mainline releases are referred to as M trains. New releases for the T trains are available two to three times a year. EM releases are available every 16 to 20 months.

instructor.indb 129

3/12/14 7:51 AM

130

CCNA Routing and Switching Practice and Study Guide

In Figure 9-2, indicate whether the release is a mainline train or a technology train. Then fill in the blanks for each part of the IOS 15 software release numbering scheme. Figure 9-2

The IOS 15 Software Release Numbering Convention

15.0 (1) M1 15.0M

15.1 (1) T1 15.0T

Figure 9-2a

The IOS 15 Software Release Numbering Convention (answer) New Feature Release Number 15.0 (1) M1 15.0M

EM Release

Major Release Number Minor Release Number M = Extended Maintenance Release Maintenance Rebuild Number

New Feature Release Number 15.1 (1) T1 15.0T

T Release

Major Release Number Minor Release Number T = Standard Maintenance Release Maintenance Rebuild Number

Briefly explain how Services on Demand for Cisco Integrated Services Routers Generation Two (ISR G2) works. With the Services on Demand model, all features are included in one universal image shipped with all ISR G2s. The network administrator then activates feature sets using licensing keys. The IP base feature set is installed by default. What is the key difference between universalk9 and universalk9_npe IOS images? The universalk9_npe software image is provided for customers in those countries with import requirements disallowing routers with strong cryptography functionality. The npe extension to the image name stands for no payload encryption. Decode the IOS 12 image name in Table 9-1. The first one is done for you.

instructor.indb 130

3/12/14 7:51 AM

Chapter 9: IOS Images and Licensing

Table 9-1

131

Decoding IOS 12 Image Names

IOS Images

Hardware Feature Set

Train Maintenance Train Rebuild Number Release Identifier Identifier

c1841-ipbasek9-mz.124-12.bin

1841

Ipbasek9

12.4

12

M

c1841-advipservicesk9-mz.124-10b. bin

1841

Advanced 12.4 services

10

M

c3725-entbase-mz.124-6.T.bin

3725

Enterprise 12.4 base

6

T

b

Decode the IOS 15 image name in Table 9-2. The first one is done for you. Table 9-2

Decoding IOS 15 Image Names

IOS Images

Hardware Feature Set

Major Minor New Feature Maintenance Maintenance Release Release Release Release Rebuild

c1900-universalk9-mz. SPA.153-2.T.bin

1900

Universal 15

3

2

T

c2900-universalk9-mz. 2900 SPA.153-3.M.bin

Universal 15

3

3

M

c1841-advipservicesk9- 1841 mz.151-4.M6.bin

Advanced 15 services

1

4

M

6

Backing Up Cisco IOS Images To back up an IOS image to a TFTP server, complete the following steps: Step 1.

Ping the TFTP server to test connectivity.

Step 2.

Verify the TFTP server has enough memory to accept the image file. Use the show flash command to determine the size of the image.

Step 3.

Copy the image to the TFTP server using the copy source-url destination-url command.

In Figure 9-3, you are copying the image c1900-universalk9-mz.SPA.152-4.M1.bin from RTA to the TFTP server at 10.10.10.10. Record the commands, including the router prompt, to complete this task. Figure 9-3

Backing Up an IOS to a TFTP Server

RTA TFTP Server 10.10.10.10

RTA# ping 10.10.10.10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.10.10, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms

instructor.indb 131

3/12/14 7:51 AM

132

CCNA Routing and Switching Practice and Study Guide

RTA# show flash -#- --length-- -----date/time------ path 1

67998028 Nov 30 1983 00:00:00 +00:00 c1900-universalk9-mz.SPA.152-4.M1.bin

188608512 bytes available (68001792 bytes used) RTA# copy flash tftp Source filename []? c1900-universalk9-mz.SPA.152-4.M1.bin Address or name of remote host []? 10.10.10.10 Destination filename [c1900-universalk9-mz.SPA.152-4.M1.bin]? !!!!!!!!!!!!!!!!!!!!!!!!! 67998028 bytes copied in 107.928 secs (630031 bytes/sec)

RTA#

Packet Tracer Activity Video Demonstration

Packet Tracer - Using a TFTP Server to Upgrade a Cisco IOS Image (SN 9.1.2.5/RP 10.1.2.5) Video Demonstration - Managing Cisco IOS Images (SN 9.1.2.6/RP 10.1.2.6)

IOS Licensing Before Cisco IOS Software Release 15.0, your router came with the IOS already installed for the features you desired. If you wanted to upgrade the feature set, you had to order, download, and install a new version. That all changed with 15.0. Each device ships with the same universal image. You enable the features you need through the use of licensing keys.

Software Licensing The feature sets that you enable with licensing keys are called technology packages. What are the four technology packages available? IP Base Data Unified Communications (UC) Security (SEC) On which Cisco ISR G2 platforms can these licenses be used? Cisco 1900, 2900, and 3900 series routers What command enables you to view the licenses currently supported on the router? Router# show license feature

What are the three major steps to activate a new software package or feature on the router?

instructor.indb 132

Step 1.

Purchase the software package or feature to be installed.

Step 2.

Obtain a Software Activation License file from Cisco.

Step 3.

Install the license file.

3/12/14 7:51 AM

Chapter 9: IOS Images and Licensing

133

What two things are needed to obtain a license? The product activation key (PAK) and a unique device identifier (UDI) How is the UDI constructed? The UDI is a combination of the product ID (PID), the serial number (SN), and the hardware version What command displays the UDI? Router# show license udi

What command installs the license? Router# license install stored-location-url

License Verification and Management After installing a license, you must reboot the router before the technology package is active and ready to use. What two commands are used in Example 9-1 to verify the licenses installed? Example 9-1

Verifying License Installation

Router# show version | begin License Info: License Info:

License UDI:

------------------------------------------------Device#

PID

SN

------------------------------------------------*0

CISCO1941/K9

FTX163283RZ

Technology Package License Information for Module:'c1900'

----------------------------------------------------------------Technology

Technology-package

Technology-package

Current

Next reboot

Type

-----------------------------------------------------------------ipbase

ipbasek9

Permanent

security

securityk9

EvalRightToUse securityk9

ipbasek9

data

None

None

None

Configuration register is 0x2102

instructor.indb 133

3/12/14 7:51 AM

134

CCNA Routing and Switching Practice and Study Guide

Router# show license Index 1 Feature: ipbasek9 Period left: Life time License Type: Permanent License State: Active, In Use License Count: Non-Counted License Priority: Medium Index 2 Feature: securityk9 Period left: 8

weeks 1

Period Used: 2

days 0

day hour

License Type: EvalRightToUse License State: Active, In Use License Count: Non-Counted License Priority: Low Index 3 Feature: datak9 Period left: Not Activated Period Used: 0

minute

0

second

License Type: EvalRightToUse License State: Not in Use, EULA not accepted License Count: Non-Counted License Priority: None

In Example 9-1, the datak9 technology package is not in use. Record the commands, including the router prompt, to accept the EULA and activate the datak9 package. Router(config)# license accept end user agreement Router(config)# license boot module c1900 technology-package securityk9

What message do you receive when activate a package? % use 'write' command to make license boot config take effect on next boot

To back up your license files, save them to flash. Record the command, including the router prompt, to save the license files to flash. Router(config)# license save flash0:R1_license_files

Complete the following steps to uninstall a license: Step 1.

Disable the technology package. Record the command, including the router prompt, to disable the datak9 technology package. Router(config)# license boot module c1900 technology-package datak9 disable

Step 2.

After reloading the router, clear the license from storage. Record the commands, including the router prompt, to clear the datak9 technology package. Router# license clear datak9 Router# configure terminal Router(config)# no license boot module c1900 technology-package datak9 disable

instructor.indb 134

3/12/14 7:51 AM

Chapter 9: IOS Images and Licensing

Packet Tracer Activity

135

Packet Tracer - EIGRP Capstone (SN 9.3.1.2/RP 10.3.1.2) Packet Tracer - OSPF Capstone (SN 9.3.1.3/RP 10.3.1.3) Packet Tracer - Skills Integration Challenge (SN 9.3.1.4/RP 10.3.1.4)

Video Demonstration

instructor.indb 135

Video Demonstration - Working with IOS 15 Image Licenses (SN 9.2.2.5/RP 10.2.2.5)

3/12/14 7:51 AM

instructor.indb 136

3/12/14 7:51 AM

CHAPTER 10

Hierarchical Network Design

Part of your job as a network administrator is understanding how to build networks that are flexible, resilient, and manageable. Even if your direct responsibilities do not include actually designing the network, you still need a firm grasp of the benefits incurred from using a systematic design approach.

instructor.indb 137

3/12/14 7:51 AM

138

CCNA Routing and Switching Practice and Study Guide

Hierarchical Network Design Overview Networks come in all sizes. The size of the network is directly proportional to the complexity of the design. However, structured engineering principles can help guide the designer in formulating a plan even for the most complex networks.

Enterprise Network Campus Design What are the three main categories of network sizes and how are they distinguished? Small network for up to 200 devices Medium-sized network for 200 to 1000 devices Large network for 1000+ devices In Table 10-1, indicate the structured engineering principle that is best described by the characteristic. Table 10-1

Structured Engineering Principles

Characteristic

Hierarchy

Modularity Resiliency

Is available to users regardless of the current conditions High-level tool for designing a reliable network

Flexibility

X X

Can be easily modified Examples include the data center and the Internet edge

X X

Hierarchical Network Design Briefly describe the three layers of the hierarchical network design. ■

Access layer: Provides workgroup/user access to the network



Distribution layer: Provides policy-based connectivity and controls the boundary between the access and core layers



Core layer: Provides fast transport between distribution switches within the enterprise campus

In Table 10-2, indicate the layer that is best described by the function Table 10-2

Hierarchical Network Layer Functions

Layer Function

Access

Distribution

Highest speed switching of the three layers

X

Policy-based security Port security

instructor.indb 138

X X

Redundancy and load balancing

X

Broadcast domain control

X

Spanning tree

Core

X

3/12/14 7:51 AM

Chapter 10: Hierarchical Network Design

Layer Function

Access

Layer 2 switching

Distribution

139

Core

X

Avoid CPU-intensive packet manipulation

X

Aggregates traffic from distribution devices

X

Aggregating LAN and WAN links

X

Briefly explain the concept of a collapsed core. Small networks and many medium-sized networks are not large enough to justify the expense and complexity of different devices at each of the three layers. A collapsed core design incorporates the distribution and core layer functions in one device. This reduces the costs of the design while still maintaining the benefits of a hierarchical design.

Cisco Enterprise Architecture Hierarchical network design is fine for campus network implementations. But the networks for many organizations span larger areas than just a campus to include teleworkers, branch sites, and data centers. These networks call for design approach where functions can be separated into modules.

Modular Network Design Briefly describe three benefits for using a modular approach to network design. Failures that occur within a module can be isolated from the remainder of the network. Network changes, upgrades, or the introduction of new services can be made in a controlled and staged fashion. When a specific module no longer has sufficient capacity or is missing a new function or service, it can be updated or replaced by another module. Security can be implemented on a modular basis. In Table 10-3, indicate which module is described by the feature. Table 10-3

Features of Modules in the Enterprise Architecture

Module Feature

AccessDistribution

Services

Provides resources necessary to employees so that they can effectively create, collaborate, and interact X X

Consists of the Internet Edge and WAN Edge

X

Provide connectivity outside the enterprise

X

Originally called the server farm

instructor.indb 139

Enterprise Edge

X

Could include wireless controls, policy gateways, and unified communications services Fundamental component of a campus design

Data Center

X

3/12/14 7:51 AM

140

CCNA Routing and Switching Practice and Study Guide

In Figure 10-1, label the modules of the Enterprise Architecture. Figure 10-1

Identify Modules of the Enterprise Architecture

Services Block

Data Center

MetroE

HDLC

Figure 10-1a Identify Modules of the Enterprise Architecture (answer)

Access

Distribution Internet Edge

Services Block

Core Data Center

WAN Edge MetroE

HDLC

Cisco Enterprise Architecture Model What are the three primary modules of the Cisco Enterprise Architecture model? Enterprise Campus Enterprise Edge Service Provider Edge

instructor.indb 140

3/12/14 7:51 AM

Chapter 10: Hierarchical Network Design

141

Which module provides connectivity to the data center, branches, and teleworkers? Service Provider Edge What are the submodules of the Enterprise Campus module? Building Access Building Distribution Campus Core Data Center What are the submodules of the Enterprise Edge module? E-Commerce Internet Connectivity Remote Access and VPN WAN Site-to-Site VPN What is the main purpose of the Service Provider Edge module? The Service Provider Edge module provides connectivity between the Enterprise Edge module and submodules of the Remote module (Branch Locations, Teleworkers, Data Center). In Table 10-4, indicate the service provider solution described. Table 10-4

Service Provider Designs

Service Provider Connectivity Solution

SingleHomed

DualHomed

Multihomed

Connections to 2 or more ISPs

DualMultihomed

X

A single connection to 1 ISP

X

Multiple connections to 2 or more ISPs

X

2 or more connections to 1 ISP

X

What are the submodules of the remote module? Enterprise Branch Enterprise Teleworker Enterprise Data Center In Table 10-5, indicate which module is best described by the function. Table 10-5

Cisco Enterprise Architecture Model Functions

Cisco Enterprise Architecture Feature

Aggregates connectivity from various functional areas.

Enterprise Campus

Enterprise Edge

Service Provider Edge

X

Allows employees to work at noncampus locations. Provides cost-effective access across large geographic areas.

instructor.indb 141

Remote

X X

3/12/14 7:51 AM

142

CCNA Routing and Switching Practice and Study Guide

Cisco Enterprise Architecture Feature

Enterprise Campus

Enterprise Edge

Service Provider Edge

Could use high-end Cisco Catalyst switches or just a ISR G2, depending on size of location.

X

Authenticates remote users and branch sites.

X

Incorporates the enterprise WAN links.

X

Uses multicast traffic and QoS to optimize network traffic.

X

Connects users with campus, server farm, and enterprise edge.

X

Mobile users connect using a local ISP. High availability through resilient hierarchical network design.

X X

Converges voice, video, and data across a single IP communications network.

X

Offsite data center to provide disaster recovery and business continuance services.

X

Devices located here include firewall and firewall routers, and network intrusion prevention systems.

X

Routes traffic into the Campus Core submodule.

X

Access management with VLANs and IPsec.

X

Supports security over Layer 2 and Layer 3 WANs. Provides internal users with secure connectivity to Internet services.

Remote

X X

In Figure 10-2, label the modules and submodules of the Cisco Enterprise Architecture model.

instructor.indb 142

3/12/14 7:51 AM

Chapter 10: Hierarchical Network Design

143

Figure 10-2 Cisco Enterprise Architecture Model

Building Distribution

Campus Infrastructure Module

E-Commerce ISP A

ISP B

Enterprise Teleworker

PSTN

WAN Site-to-site VPN Frame Relay, ATM, MAN, ...

Network Management

Figure 10-2a Cisco Enterprise Architecture Model (answer) Enterprise Campus

Enterprise Edge

Service Provider Edge

Building Access

Enterprise Branch

Campus Core

Campus Infrastructure Module

E-Commerce

Building Distribution

Remote

ISP A

Internet Connectivity ISP B

Enterprise Teleworker

Remote Access and VPN PSTN Server Farm and Data Center

Enterprise Data Center WAN Site-to-site VPN

Network Management

instructor.indb 143

Frame Relay, ATM, MAN, ...

3/12/14 7:51 AM

144

CCNA Routing and Switching Practice and Study Guide

Evolving Network Architectures Network architectures need to rapidly evolve to meet the needs of users. Traditionally, employees and students alike used devices provided by the organization. However, you more than likely currently use some type of mobile device to conduct some of your business or school work. Today’s enterprise networks should seamlessly provide services to users of all modes of access.

Cisco Enterprise Architectures What are the top trends that are impacting networks? Bring your own device (BYOD) Online collaboration Video communication Cloud computing What network architectures has Cisco introduced to address these trends? Cisco Borderless Network Architecture Collaboration Architecture Data Center/Virtualization Architecture

Emerging Network Architectures What are the two primary sets of services provided by the Cisco Borderless Network Architecture? Borderless end-point/user services Borderless network services What are the three layers of the Cisco Collaboration Architecture? Application and Devices Collaboration Services Network and Computer Infrastructure What are the three components of the Cisco Data Center/Virtualization Architecture? Cisco Unified Management Solutions Unified Fabric Solutions Unified Computing Solutions In Table 10-6, indicate the emerging network architecture described by the feature or service.

instructor.indb 144

3/12/14 7:51 AM

Chapter 10: Hierarchical Network Design

Table 10-6

Emerging Network Architectures

Emerging Network Architecture Functions and Services

Cisco Borderless Networks

Cisco Collaboration Architecture

Comprehensive set of technologies that bring together the network, computing, and storage platforms.

Any device must be able to connect securely, reliably, and seamlessly from anywhere.

X X

Portfolio of products, applications, and software development kits that provide a comprehensive solution to allow people to cooperate and contribute to the production of something. Unified approach to deliver application services to users in a highly distributed environment.

X

X

Network infrastructure and services are united via Cisco unified system services options.

instructor.indb 145

Cisco Data Center/ Virtualization Architecture

X

Applications include WebEx Meeting, WebEx Social, Cisco Jabber, and TelePresence.

Packet Tracer Challenge

145

X

Packet Tracer - Skills Integration Challenge - OSPF (CN 1.4.1.2) Packet Tracer - Skills Integration Challenge - EIGRP (CN 1.4.1.3)

3/12/14 7:51 AM

instructor.indb 146

3/12/14 7:51 AM

CHAPTER 11

Connecting to the WAN

Wide-area networks (WANs) are used to connect remote LANs together. Various technologies are used to achieve this connection. This chapter reviews WAN technologies and the many WAN services available.

instructor.indb 147

3/12/14 7:51 AM

148

CCNA Routing and Switching Practice and Study Guide

WAN Technologies Overview WAN access options differ in technology, speed, and price. Each has advantages and disadvantages. Selecting the best technology depends largely on the network design.

Network Types and Their Evolving WAN Needs The WAN needs of a network depend greatly on the size of the network. These network types run the spectrum from small offices that really only need a broadband connection to the Internet all the way up to multinational enterprises that need a variety of WAN options to satisfy local, regional, and global restrictions. In Table 11-1, indicate the network type that fits each of the descriptions. Some descriptions may apply to more than one network type. Table 11-1

Identify the Network Type

Network Description

Outsourced IT support

Small Office Network

Campus Network

Branch Network

X

Very large sized business Connectivity to the Internet

X X

Converged network and application services

X

Hundreds of employees

X

X

Home, branch, and regional offices, teleworkers, and a central office Limited number of employees

X

X

In-house IT staff and network support

X

X

Thousands of employees

instructor.indb 148

X X

Several remote, branch, and regional offices (one central office)

X

Small-sized business

X

LAN focus of operations with broadband

X

Small to medium-sized business

X

Multiple campus LANs

X

Medium-sized business

Distributed Network

X

3/12/14 7:51 AM

Chapter 11: Connecting to the WAN

149

WAN Operations and Terminology WANs operate at which layers of the OSI model? Data link (Layer 2) and physical (Layer 1) Which organizations are responsible for WAN standards? Telecommunication Industry Association and the Electronic Industries Alliance (TIA/EIA) International Organization for Standardization (ISO) Institute of Electrical and Electronics Engineers (IEEE) What are some of the Layer 2 WAN technologies? Frame Relay, Point-to-Point Protocol (PPP), MetroEthernet, VSAT, MPLS, Broadband Why is the Layer 2 address field not usually used in WAN services? WAN links are normally point to point. Therefore, there is no need for a data link layer address.

instructor.indb 149

3/12/14 7:51 AM

150

CCNA Routing and Switching Practice and Study Guide

Match the definition on the left with a term on the right. This exercise is a one-to-one matching. Definitions a. The boundary between customer equipment

and service provider equipment b. Devices inside the enterprise edge wiring

closet that are owned or leased by the organization c. Provider equipment that resides in the WAN

backbone capable of supporting routing protocols d. Digital modem used by DSL or cable Internet

service providers e. Dynamically establishes a dedicated circuit

before communication starts f. Provides an interface to connect subscribers to

a WAN link g. Splits traffic so that it can be routed over the

shared network h. Local service provider facility that connects

the CPE to the provider network

Terms g. Packet-switched network n. WAN switch b. Customer premises equipment (CPE) h. Central office (CO) o. Dialup modem p. Access server f. Data communications equipment (DCE) l. Router m. Data terminal equipment (DTE) i. Local loop j. CSU/DSU e. Circuit-switched network a. Demarcation point d. Broadband modem k. Toll network c. Core multilayer switch

i. Physical connection between the CPE to the

CO j. Required by digital leased lines to provide ter-

mination of the digital signal and convert into frames ready for transmission on the LAN k. Consists of the all-digital, long-haul commu-

nications lines, switches, routers, and other equipment in the provider network l. Customer device that provides internetwork-

ing and WAN access interface ports m. Customer device that transmits data over the

WAN link n. Multiport device that sits at the service pro-

vider edge to switch traffic o. Legacy technology device that converts digital

signals into analog signals transmitted over telephone lines p. Legacy technology device that can support

hundreds of dial-in and dial-out users

instructor.indb 150

3/12/14 7:51 AM

Chapter 11: Connecting to the WAN

151

Selecting a WAN Technology The WAN access connections your small to medium-sized business purchases could use a public or private WAN infrastructure—or a mix of both. Each type provides various WAN technologies. Understanding which WAN access connections and technologies are best suited to your situation is an important part of network design.

Varieties of WAN Link Connections Your ISP can recommend several WAN link connection options that based on your specific requirements. These options can be classified in various categories. Use the list of WAN access options to label Figure 11-1. Figure 11-1

WAN Access Options WAN

Public

Dedicated

instructor.indb 151

Internet

3/12/14 7:51 AM

152

CCNA Routing and Switching Practice and Study Guide

Figure 11-1

WAN Access Options (answer) WAN

Private

Dedicated

Public

Switched

Internet

Leased Lines

CircuitSwitched

PacketSwitched

Broadband VPN

T1/E1 T3/E3

PSTN ISDN

Metro Ethernet MPLS Frame Relay ATM

DSL Cable Wireless

Labels T1/E1/T3/E3

ATM

Switched

Frame Relay

Circuit switched

Packet switched

Metro Ethernet

Cable

Wireless

MPLS

PSTN

DSL

VPN

Private

Broadband

ISDN

Leased lines

Private and Public WAN Access Options As shown in Figure 11-1, WAN access options can first be classified as either private or public. Table 11-2 lists descriptions for various private WAN access options. Indicate which one is described. Some options are described more than once. Table 11-2

Private WAN Access Options

Private WAN Access Options

Considered the most expensive of all WAN access technologies.

Leased MPLS Ethernet ATM ISDN Lines WAN

instructor.indb 152

Dialup Frame Relay

X

Analog telephone lines are used to provide a switched WAN connection. A permanent, dedicated WAN connection which uses a T- or E-carrier system.

VSAT

X

X

3/12/14 7:51 AM

Chapter 11: Connecting to the WAN

Private WAN Access Options

Leased MPLS Ethernet ATM ISDN Lines WAN

Satellite to router communications for WAN connections. X

X

X

Connects multiple sites using virtual circuits and data-link connection identifiers. Includes MetroE, EoMPLS, and VPLS as WAN connection options.

X

Converts analog to digital signals to provide a switched WAN connection over telephone lines. A popular replacement for traditional Frame Relay and ATM WAN access technologies.

instructor.indb 153

Dialup Frame Relay

X

Delivers data using fixed 53-byte packet cells over permanent and switched virtual circuits. Service providers and short-path labeling are used for leased lines, Ethernet WANs, and Frame Relay WANs.

VSAT

153

X

X

3/12/14 7:51 AM

154

CCNA Routing and Switching Practice and Study Guide

Match the definition on the left with a public WAN access option on the right. This exercise is a one-to-one matching. Public WAN Access Options

Definitions a. Radio and directional-antenna modem WAN

access option provided to public organizations b. WAN access option that uses telephone lines

to transport data via multiplexed links c. High-speed long-distance wireless connections

through nearby special service provider towers d. Cellular radio waves WAN access option used

with smartphones and tablets e. Dish and modem-based WAN access option

d. 3G/4G Cellular f. VPN Remote c. WiMax e. Satellite Internet b. DSL h. Cable a. Municipal WiFi g. VPN site-to-site

for rural users where cable and DSL are not available f. Secure Internet-based WAN access option

used by teleworkers and extranet users g. Entire networks connected together by using

VPN routers, firewalls, and security appliances h. A shared WAN access option that transports

data using television-signal networks Lab - Researching WAN Technologies (CN 2.2.4.3)

instructor.indb 154

3/12/14 7:51 AM

CHAPTER 12

Point-to-Point Connections

Point-to-point connections are the most common type of WAN connections. These connections are also called serial or leased lines. This chapter reviews the terms, technology, and protocols used in serial connections.

instructor.indb 155

3/12/14 7:51 AM

156

CCNA Routing and Switching Practice and Study Guide

Serial Point-to-Point Overview Understanding how point-to-point serial communication across a leased line works is important to an overall understanding of how WANs function.

Serial Communications Briefly explain the difference between serial and parallel communications. In serial communications, the data is sent 1 bit at a time down one link. In parallel communications, bits are transmitted simultaneously over multiple links. What is clock skew issue in parallel communications? Clock skew is when the bits do not arrive at the same time causing synchronization issues.

instructor.indb 156

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

157

Match the serial communications definition on the left with a term on the right. This is a one-to-one matching exercise. Definitions a. Cable that allows two WAN end devices to be

directly connected together

Terms h. Physical k. DCE

b. Signals sent sequentially 1 bit after another

f. Demarc

c. A networking device that converts signals into

n. CPE

an ISP WAN circuit format d. Universal ports that have replaced both

RS-232 and parallel ports on newer PCs e. A WAN connection that interconnects two

LANs directly f. The point at the customer site where the ISP

network ends g. A technique that reassembles multiple data

transmissions h. The OSI layer where time-division multiplex-

ing (TDM) operates

i. ISDN l. DTE j. Variable m. Parallel c. CSU/DSU d. USB e. Leased line a. Null modem b. Serial g. Bit interleaving

i. A WAN technology that uses TDM j. The way that STDM divides bandwidth into

multiple slots for data transmission k. Provides a clocking signal for the WAN circuit l. LAN/WAN routers at the customer location m. Transmission signals split between multiple

wires concurrently n. The network equipment connected to the

WAN circuit at the customer location

instructor.indb 157

3/12/14 7:51 AM

158

CCNA Routing and Switching Practice and Study Guide

WAN Protocols Just like LANs, data is encapsulated into frames before transmission onto a WAN link. Various encapsulation protocols can be used to achieve the framing. In Table 12-1, indicate which protocol best fits the description. Table 12-1

WAN Encapsulation Protocols

WAN Protocol Description

HDLC

Provides connections over synchronous and asynchronous circuits

PPP

SLIP

X.25/LAPB

Frame Relay ATM

X

International standard for cell relay

X

Predecessor to Frame Relay

X

Default encapsulation on a serial link between two Cisco devices

X

Eliminates the need for error correction and flow control Forms the basis for synchronous PPP

X X

Built-in security with PAP and CHAP

X

Transfers data 53 bytes at a time so that processing can occur in hardware

X

Next-generation protocol after X.25

X

Largely replaced by PPP

X

An ITU-T standard that defines connections between a DTE and DCE

X

HDLC Encapsulation What is the major difference between the ISO 13239 HDLC standard and Cisco’s implementation of HDLC? Cisco’s implementation of HDLC uses a Protocol field to support multiple protocols. In Figure 12-1, label the fields of Cisco HDLC frame. Figure 12-1

Cisco HDLC Frame Format

Figure 12-1a Cisco HDLC Frame Format (answer)

Flag

instructor.indb 158

Address

Control

Protocol

Data

FCS

Flag

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

159

List the three different formats of the Control field. Information (I) Frame Supervisory (S) Frame Unnumbered (U) Frame

HDLC Configuration and Troubleshooting Although High-Level Data Link Control (HDLC) is the default encapsulation on Cisco synchronous serial lines, you may need to change the encapsulation back to HDLC. Record the commands, including the router prompt, to change the first serial interface on a 1900 series router to HDLC. R1# configure terminal R1(config)# interface serial 0/0/0 R1(config-if)# encapsulation hdlc

Troubleshooting Serial Interfaces Troubleshooting the cause of a serial interface issue usually begins by entering the show interface serial command. This command can return one of six possible statuses for the line. In Table 12-2, indicate what status would display for each of the conditions of the serial interface. Some statuses are used more than once. Table 12-2

Line Conditions and Status Indicators

Condition of the Serial Interface

Serial X Is Up, Line Protocol Is Up

Serial X Is Down, Line Protocol Is Down

Serial X Is Up, Line Protocol Is Down

Serial X Is Up, Line Protocol Is Up (Looped)

A high error rate has occurred due to a WAN service provider problem. X

The router configuration includes the shutdown interface configuration command.

X

Cabling is faulty or incorrect.

X X

The clockrate command is not configured on the interface.

The router is not sensing a carrier detect (CD) signal. The same random sequence number in the keepalive is returned over the link.

instructor.indb 159

Serial X Is Administratively Down, Line Protocol Is Down

X

Keepalives are not being sent by the remote router.

This is the proper status line condition.

Serial X Is Up, Line Protocol Is Down (Disabled)

X X X

3/12/14 7:51 AM

160

CCNA Routing and Switching Practice and Study Guide

What command will show whether a DTE or DCE cable is attached to the interface? show controllers Packet Tracer Activity

Packet Tracer - Troubleshooting Serial Interfaces (CN 3.1.2.7)

PPP Operation PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for transmission over Layer 2 physical links.

PPP Components Briefly described the three main components of PPP. ■

HDLC-like framing for transporting multiprotocol packets over point-to-point links



Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection



Network Control Protocols (NCPs) for establishing and configuring different network layer protocols

In Figure 12-2, fill in the missing parts of the PPP layered architecture. Figure 12-2 PPP Layered Architecture IPv4

IPv6

IPCP

IPv6CP Network Layer

PPP Data Link Layer

Physical Layer

Figure 12-2a PPP Layered Architecture (answer) IPv4

IPv6

IPCP

IPv6CP Network Layer

Network Control Protocol (NCP) PPP

instructor.indb 160

Authentication, Other Options Link Control Protocol (LCP)

Data Link Layer

Synchronous or Asynchronous Physical Media

Physical Layer

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

161

List the type of physical interfaces supported by PPP. ■

Asynchronous serial



Synchronous serial



HSSI



ISDN

What automatic configurations does the Link Control Protocol (LCP) provide at each end of the link? ■

Handling varying limits on packet size



Detecting common misconfiguration errors



Terminating the link



Determining when a link is functioning properly or when it is failing

Briefly describe how PPP uses Network Control Protocol (NCP). PPP uses NCPs to negotiate the Layer 3 protocols that will be used to carry data packets. They provide functional fields containing standardized codes to indicate the network layer protocol type that PPP encapsulates. In Table 12-3, indicate whether each characteristic describes LCP or NCP. Table 12-3

LCP and NCP Characteristics

Characteristic

LCP

Can configure authentication, compression, and error detection

X

NCP

Bring network layer protocols up and down

X

Encapsulate and negotiate options for IPv4 and IPv6

X

Negotiate and set up control options on the WAN circuit

X

Handles limits on packet size

X

Establish, configure, and test the data link connection

X

Uses standardized codes to indicate the network layer protocol

X

Determine if link is functioning properly

X

Terminate the link

X

Manage packets from several network layer protocols

X

Figure 12-3 shows the PPP frame format. Answer the following questions about the specific features and purpose of each field. Figure 12-3 PPP Frame Format Field Length, in Bytes

instructor.indb 161

1

1

1

2

Variable

2 or 4

1

Flag

Address

Control

Protocol

Data

FCS

Flag

3/12/14 7:51 AM

162

CCNA Routing and Switching Practice and Study Guide

What is the bit pattern for the Flag field? 01111110 Why is the Address field all 1s or 0xFF? On a point-to-point link, the destination node does not need to be addressed. What is the purpose of the Control field? The Control field calls for transmission of user data in an unsequenced frame, providing a connectionless link that does not require data links to be established. What is the purpose of the Protocol field? The Protocol field uses a 2-byte value to identify what network layer protocol is encapsulated in the data. What is the default size of the information stored in the Data field? 1500 bytes What does FCS stand for and what is the purpose of this field? The Frame Check Sequence field is used by the receiver to test the integrity of the frame received. If the FCS calculated by the receiver doesn’t match, the frame is silently discarded.

PPP Sessions What are the three phase for establishing a PPP session? ■

Phase 1: Link establishment and configuration negotiation



Phase 2: Link quality determination (optional)



Phase 3: Network layer protocol configuration negotiation

Figure 12-4 shows a partially labeled flowchart for the LCP link negotiation process. Complete the flowchart by properly labeling it with the provided steps. Figure 12-4 Steps in the LCP Link Negotiation Process

Sends ConfigureRequest

All options acceptable?

Yes

No Yes

All options recognized?

No Determine new negotiation parameters

instructor.indb 162

Yes

Authentication option?

No

Link is established

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

163

Figure 12-4a Steps in the LCP Link Negotiation Process (answer)

Sends ConfigureRequest

Process ConfigureRequest

All options acceptable?

Yes

Send Configure-Ack

Receive Configure-Ack

No

Send Configure-Nak

Yes

All options recognized?

Authentication Phase

Yes

Authentication option?

No Determine new negotiation parameters

Send ConfigureReject

No

Link is established

Missing Labels for Figure 12-4 ■

Send Configure-Reject



Receive Configure-Ack



Process Configure-Request



Send Configure-Ack



Authentication Phase



Send Configure-Nak

PPP can be configured to support optional functions, including the following: ■

Authentication using either PAP or CHAP



Compression using either Stacker or Predictor



Multilink that combines two or more channels to increase the WAN bandwidth

After the link is established, the LCP passes control to the appropriate NCP. Figure 12-5 shows the NCP process for IPv4. Complete the figure by properly labeling it with the provided phases and steps. Missing Labels for Figure 12-5

instructor.indb 163



IPv4 Data Transfer



NCP Termination



IPCP Configure-Request



IPCP Configure-Ack



IPCP Terminate-Request



LCP Maintenance



IPCP Terminate-Ack



NCP Configuration

3/12/14 7:51 AM

164

CCNA Routing and Switching Practice and Study Guide

Figure 12-5 The NCP Process

LCP Configuration

IPv4 DATA Exchange

LCP Termination

Figure 12-5a The NCP Process (answer)

LCP Configuration

IPCP Configure-Request IPCP Configure-Ack

NCP Configuration

IPv4 Data Transfer and LCP Maintenance

IPv4 DATA Exchange

IPCP Terminate-Request NCP Termination

IPCP Terminate-Ack

LCP Termination

instructor.indb 164

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

165

Configure PPP PPP is a robust WAN protocol supporting multiple physical layer and network layer implementations. In addition, PPP has many optional features the network administrator can choose to implement.

Basic PPP Configuration with Options Figure 12-6 shows the topology and Table 12-4 shows the addressing we will use for PPP configuration. Figure 12-6 PPP Topology S0/0/0

S0/0/0 RTA

.2

.1

RTB

172.16.1.0/30 2001:DB8:1:F::/64

Table 12-4 Device

Addressing Table for PPP Interface

IPv4 Address

Subnet Mask

IPv6 Address/Prefix

RTA

S0/0/0

172.16.1.1

255.255.255.252

2001:DB8:1:F::1/64 RTB

S0/0/0

172.16.1.2

255.255.255.252

2001:DB8:1:F::2/64

Assume that the router interfaces are already configured with IPv4 and IPv6 addressing. RTB is fully configured with PPP. Record the commands, including the router prompt, to configure RTA with a basic PPP configuration. RTA# configure terminal RTA(config)# interface serial 0/0/0 RTA(config-if)# encapsulation ppp

RTB is configured for software compression using the Stacker compression algorithm. What happens if RTA is not configured with compression? During the LCP negotiation phase, RTA and RTB will negotiate to not use compression. Record the command, including the router prompt, to configure the same compression on RTA. RTA(config-if)# compress stac

RTB is configured to take down the link if the quality falls below 70 percent. Record the command, including the router prompt, to configure the equivalent on RTA. RTA(config-if)# ppp quality 70

In Figure 12-7, RTA and RTB are now using two serial links to transfer data. RTB is already configured with PPP multilink to load balance the traffic to RTA. Record the commands, including the router prompt, to configure the RTA multilink interface including IPv4 and IPv6 addressing and the necessary commands for the serial interfaces. Use the addressing in Table 12-4 for the multilink interface rather than Serial 0/0/0.

instructor.indb 165

3/12/14 7:51 AM

166

CCNA Routing and Switching Practice and Study Guide

Figure 12-7

PPP Multilink Topology S0/0/0

S0/0/0 RTA

S0/0/1

S0/0/1

RTB

172.16.1.0/30 2001:DB8:1:F::/64

RTA(config)# interface multilink 1 RTA(config-if)# ip address 172.16.1.1 255.255.255.252 RTA(config-if)# ipv6 address 2001:db8:1:f::1/64 RTA(config-if)# ppp multilink RTA(config-if)# ppp multilink group 1 RTA(config-if)# interface serial 0/0/0 RTA(config-if)# no ip address RTA(config-if)# no ipv6 address RTA(config-if)# encapsulation ppp RTA(config-if)# ppp multilink RTA(config-if)# ppp multilink group 1 RTA(config-if)# interface serial 0/0/1 RTA(config-if)# no ip address RTA(config-if)# no ipv6 address RTA(config-if)# encapsulation ppp RTA(config-if)# ppp multilink RTA(config-if)# ppp multilink group 1

You can verify the operation of PPP using the following show commands. Record the commands used to generate the output on RTA. RTA# show interface serial 0/0/0 Serial0/0/0 is up, line protocol is up Hardware is WIC MBRD Serial Internet address is 172.16.1.1/30 MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation PPP, LCP Open Open: IPCP, IPV6CP, CCP, CDPCP, loopback not set Keepalive set (10 sec)

RTA# show ppp multilink

Multilink1 Bundle name: RTA Remote Endpoint Discriminator: [1] RTB Local Endpoint Discriminator: [1] RTA

instructor.indb 166

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

167

Bundle up for 00:01:20, total bandwidth 3088, load 1/255 Receive buffer limit 24000 bytes, frag timeout 1000 ms 0/0 fragments/bytes in reassembly list 0 lost fragments, 0 reordered 0/0 discarded fragments/bytes, 0 lost received 0x2 received sequence, 0x2 sent sequence Member links: 2 active, 0 inactive (max 255, min not set) Se0/0/0, since 00:01:20 Se0/0/1, since 00:01:06 No inactive multilink interfaces

PPP Authentication Briefly explain the difference between PAP and CHAP. PAP uses a two-way process to authenticate with unencrypted plain-text passwords. CHAP uses a three-way process with an encrypted hash value generated by the MD5 algorithm. The password is never sent. PAP is not interactive. When you configure an interface with the ppp authentication pap command, the username and password are sent as one LCP data package. You are not prompted for a username. The receiving node checks the username and password combination and either accepts or rejects the connection. List three situations where PAP would be the appropriate choice for authentication. ■

A large installed base of client applications that do not support CHAP



Incompatibilities between different vendor implementations of CHAP



Situations where a plain-text password must be available to simulate a login at the remote host

Once PAP authentication is established, the link is vulnerable to attack. Why? PAP does not reauthenticate. So, a hacker can piggyback on an open connection. CHAP challenges periodically to make sure that the remote node still has a valid password. Complete the missing information in the following steps as RTA authenticates with RTB using CHAP.

instructor.indb 167

Step 1.

RTA initially negotiates the link connection using LCP with router RTB, and the two systems agree to use CHAP authentication during the PPP LCP negotiation.

Step 2.

RTB generates an ID and a random number, and sends that and its username as a CHAP challenge packet to RTA.

Step 3.

RTA uses the username of the challenger (RTB) and cross references it with its local database to find its associated password. RTA then generates a unique MD5 hash number using the RTB’s username, ID, random number, and the shared secret password.

Step 4.

RTA then sends the challenge ID, the hashed value, and its username (RTA) to RTB.

3/12/14 7:51 AM

168

CCNA Routing and Switching Practice and Study Guide

Step 5.

RTB generates its own hash value using the ID, the shared secret password, and the random number it originally sent to RTA.

Step 6.

RTB compares its hash value with the hash value sent by RTA. If the values are the same, RTB sends a link established response to RTA.

When authentication is local (no AAA/TACACS+), what is the command syntax to configure PPP authentication on an interface? Router(config-if)# ppp authentication {chap | chap pap | pap chap | pap }

Assume that both PAP and CHAP are configured with the command ppp authentication chap pap on the interface. Explain how authentication will proceed. The first method specified, CHAP, will be requested during link negotiation. If the receiving node is not configured for CHAP, the second method specified, PAP, will be used.

PAP Configuration In Figure 12-6, RTB is already configured with PAP authentication with the password cisco123. Record the commands to configure PAP on RTA. RTA(config)# username RTB password cisco123 RTA(config)# interface s0/0/0 RTA(config-if)# ppp authentication pap RTA(config-if)# ppp pap sent-username RTA password cisco123

CHAP Configuration CHAP uses one less command than PAP. Now record the commands to remove PAP and configure RTA to use CHAP authentication. RTA(config)# interface s0/0/0 RTA(config-if)# no ppp authentication pap RTA(config-if)# no ppp pap sent-username RTA password cisco123 RTA(config-if)# ppp authentication chap

Packet Tracer - Configuring PAP and CHAP Authentication (CN 3.3.2.7) Lab - Configuring Basic PPP with Authentication (CN 3.3.2.8)

Troubleshoot WAN Connectivity If you cannot ping across a PPP link and you have checked the physical and data link layer issues reviewed in the “Troubleshooting Serial Interfaces” section earlier, the issue is probably the PPP configuration. You can use the debug command to troubleshoot PPP issues using the debug ppp {parameter} syntax. Based on the descriptions in Table 12-5, fill in the corresponding parameter you would use with the debug ppp command.

instructor.indb 168

3/12/14 7:51 AM

Chapter 12: Point-to-Point Connections

Table 12-5

169

Parameters for the debug ppp Command

Parameter

Usage

error

Displays issues associated with PPP connection negotiation and operation

compression

Displays information specific to the exchange of PPP connections using MPPC

negotiation

Displays PPP packets transmitted during PPP startup

packet

Displays PPP packets being sent and received

authentication

Displays authentication protocol messages

cbcp

Displays protocol errors and statistics associated with PPP connection negotiations using MSCB

Lab - Troubleshooting Basic PPP with Authentication (CN 3.4.1.5) Packet Tracer Activity

instructor.indb 169

Packet Tracer - Troubleshooting PPP with Authentication (CN 3.4.1.4) Packet Tracer - Skills Integration Challenge (CN 3.5.1.2)

3/12/14 7:51 AM

instructor.indb 170

3/12/14 7:51 AM

CHAPTER 13

Frame Relay

Although newer services are rapidly replacing it in some locations, Frame Relay has been a popular alternative to expensive dedicated leased lines. Frame Relay provides a cost-efficient solution for WAN access between multiple sites. This chapter reviews Frame Relay technology, configuration, verification, and troubleshooting.

instructor.indb 171

3/12/14 7:51 AM

172

CCNA Routing and Switching Practice and Study Guide

Introduction to Frame Relay Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Unlike leased lines, Frame Relay requires only a single access circuit to the Frame Relay provider to communicate with other sites connected to the same provider.

Frame Relay Concepts and Terminology Match the definition on the left with a term on the right. Terms are only used once. Definitions a. Bandwidth “borrowing” from other PVCs

when available b. Read Frame Relay was popular when com-

pared to private leased lines c. A preconfigured logical path between two

endpoints and assigned a DLCI d. A logical connection that is established

dynamically for the time needed e. The equivalent of 24 DS0 channels

Terms m. Access rate n. ANSI k. Black hole a. Bursting f. CIR b. Cost savings p. DE h. Disable

f. Guaranteed bandwidth for a specific PVC

l. DLCI

g. Downstream notification that there is conges-

r. DTE

tion on a Frame Relay switch h. Manual configuration will do this to the auto-

sensing of LMI-type feature on Cisco routers

g. FECN q. Inverse ARP j. LMI

i. Holding frame in a buffer before sending

c. PVC

j. Frame Relay extension that allows the DTE to

i. Queuing

discover the list of available DLCIs configured on the access link k. A PVC that no longer exists l. Used to identify each Frame Relay circuit

endpoint

o. Status d. SVC e. T1 s. X.25

m. Port bandwidth of the local loop n. One of the three LMI types other than cisco

and q933a o. LMI provides these updates about Frame

Relay connectivity p. Identifies the frames to be dropped in times of

congestion q. Process used by LMI to associate network

layer addresses to data link layer addresses r. The end of the Frame Relay connection that

initiates requests about the status of its Frame Relay links s. Protocol replaced by Frame Relay

instructor.indb 172

3/12/14 7:51 AM

Chapter 13: Frame Relay

173

Frame Relay Operation Frame Relay networks use permanent virtual circuits (PVCs), which uniquely define a logical path between two endpoints. Frame Relay is a more cost-effective option than leased lines for two reasons: The cost of a leased line includes the cost of a full end-to-end dedicated connection. The cost of Frame Relay includes only the cost to the local loop. Frame Relay shares bandwidth with other customers across the same physical circuit. The end of each PVC uses a number to identify it called the data link connection identifier (DLCI). What does it mean to say that these numbers are locally significant? Locally significant DLCIs means that only the local devices need to know this number. That way, the DLCI number can be reused on other equipment throughout the network. Frame Relay is statistically multiplexed, meaning that it transmits only one frame at a time, but that many logical connections can coexist on a single physical line. In Figure 13-1, label the missing fields in a standard Frame Relay frame. Figure 13-1

Fields of the Standard Frame Relay Frame 8 bits

16 bits

Variable

16 bits

8 bits

Flag

Address

Data

FCS

Flag

C/R EA

EA

Byte 1

Byte 2

Figure 13-1a Fields of the Standard Frame Relay Frame (answer) 8 bits

16 bits

Variable

16 bits

8 bits

Flag

Address

Data

FCS

Flag

DLCI

Byte 1

instructor.indb 173

C/R EA

DLCI

FECN BECN DE

EA

Byte 2

3/12/14 7:51 AM

174

CCNA Routing and Switching Practice and Study Guide

Identify and briefly describe each of the three Frame Relay topologies. Star topology: Also known as a hub-and-spoke topology with a central site connected to branch sites. All branch-to-branch communication is sent through the central (hub) site. Therefore, branch sites are only configured with one VC. Full mesh: Every node is configured with a VC to every other node in the network. However, each node usually only has one physical link to the local Frame Relay switch. Partial mesh: Nodes may have more than one VC configured to remote locations. But all nodes are not configured with all VCs, as in full mesh. This works better for larger networks where a full-mesh topology would be cost prohibitive. A router must know what remote Layer 3 address maps to the locally configured DLCI before it can send data over the link. This mapping can be achieved statically or dynamically. Briefly describe the IPv4 protocol that provides dynamic mapping. Dynamic address mapping relies on Inverse ARP to resolve a next-hop network layer IPv4 address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its PVC to discover the protocol address of the remote device connected to the Frame Relay network. On Cisco routers, what must you do to make sure Inverse ARP is operational? Nothing; Inverse ARP is enabled by default. What is the command syntax to disable Inverse ARP? Router(config-if)# no frame-relay inverse-arp

What is the command syntax to override dynamic mapping and statically configure the map? Router(config-if)# frame-relay map protocol protocol-addressdlci [broadcast] [ietf] [cisco]

Why would you use the keyword ietf? Use the keyword ietf when connecting to a non-Cisco router. Why would you use the keyword broadcast? The keyword broadcast allows broadcast and multicast traffic to be sent over the VC, which can greatly simplify the configuration of routing protocols like OSPF. What command can you use to verify Frame Relay maps? show frame-relay map Briefly describe the Local Management Interface (LMI). LMI is an extension of Frame Relay that provides additional capabilities including the ability for DTEs to dynamically acquire information about the status of the network. LMI uses reserved DLCIs in the range from 0 to 1023 to exchange LMI messages between the DTE and DCE. What are the three LMI types supported by Cisco routers? CISCO, ANSI, Q933A With Cisco IOS software release 11.2, the LMI type does not need to be configured because it is autosensed.

instructor.indb 174

3/12/14 7:51 AM

Chapter 13: Frame Relay

175

In Figure 13-2, RTA and RTB are both configured to use Frame Relay with the IPv4 addressing and DLCIs shown. RTA has just booted up. Fully explain how RTA will dynamically learn the DLCIs from the local Frame Relay switch and then dynamically learn the IPv4 address of RTB. Figure 13-2 Frame Relay Topology

S0/0/0 10.10.10.1/30 RTA

Frame Relay

DLCI 201

S0/0/0 10.10.10.2/30

DLCI 102

RTB

PVC

After booting, RTA will autosense the LMI type used on the local loop. Then RTA will send an LMI status inquiry message to the local Frame Relay switch. The local Frame Relay switch replies to the query with all the VCs configured on the access link. This will include the DLCI 201, which the Frame Relay network has mapped internally to reach RTB. Once RTA has the DLCIs for the access link (only 201 in this example), it sends an Inverse ARP message which is forwarded by the Frame Relay network to RTB. RTB responds to the Inverse ARP message with its IPv4 address. When RTA receives the response from RTB, it will map the local DLCI 201 to the IPv4 address of RTB. From the customer’s point of view, Frame Relay is one interface configured with one or more PVCs. The rate at which data will be accepted by the local Frame Relay switch is contracted. The access rate is the actual speed of the port connected to the service provider. It is not possible to send data any faster. The committed information rate (CIR) is the rate at which the customer can send data into the Frame Relay network. All data at or below this rate is guaranteed. What does the term oversubscription mean in relation to Frame Relay? What problems can it cause? A service provider may decide to oversell an access link on the assumption that everyone that is subscribed on the link will not need to use the link for their full subscription all the time. Traffic will be dropped in situations where a link is oversubscribed and then subsequently overutilized. When the Frame Relay network is underutilized, customers can burst over their CIR at no additional cost. The committed burst size (Bc) is a negotiated rate above the CIR that the customer can use to transmit for short bursts, and represents the maximum allowed traffic under normal working conditions. When sending at a rate higher than the CIR, the Discard Eligibility (DE) bit is set to 1 in every frame so that the Frame Relay network can discard the frame if congestion is occurring. However, when there is congestion on the Frame Relay network, the switch that is experiencing congestion will begin setting the Forward Explicit Congestion Notification (FECN) bit to 1 to inform downstream devices that there is congestion on the network. It will also set the Backward Explicit Congestion Notification (BECN) bit to 1 and send a message to the source to throttle back the speed at which it is sending data. In addition, the Frame Relay switch experiencing congestion will discard every frame that has the DE bit set to 1.

instructor.indb 175

3/12/14 7:51 AM

176

CCNA Routing and Switching Practice and Study Guide

Configure Frame Relay Frame Relay connections are created by configuring customer premise equipment (CPE) routers or other devices to communicate with a service provider Frame Relay switch. The service provider configures the Frame Relay switch, which helps keep end-user configuration tasks to a minimum.

Configure Basic Frame Relay Because so many of the features of Frame Relay are enabled by default, configuration is straightforward. Assuming the interface is correctly addressed, the basic configuration is simply a matter of changing the encapsulation on the interface. In Figure 13-3, RTB is configured and ready to send traffic on the Frame Relay network. Assume RTA is already configured with IPv4 and IPv6 addressing. Record the commands, including the router prompt, to enable Frame Relay. Figure 13-3 S0/0/0 10.10.10.1/30 2001:DB8:1:F::1/64 Link Local: FE80::1 RTA

Frame Relay

S0/0/0 10.10.10.2/30 2001:DB8:1:F::2/64 Link Local: FE80::2

DLCI 201

DLCI 102

RTB

PVC RTA# configure terminal RTA(config)# interface serial 0/0/0 RTA(config-if)# encapsulation frame-relay

Connectivity between RTA and RTB should now be operational for IPv4 traffic. However, in our example, IPv6 requires static mapping. You will need to map both the globally unique and link local IPv6 addresses. Because the link local address is used for multicasts, you will need to add the keyword broadcast to your frame relay map configuration. Record the commands, including the router prompt, to statically configure RTA with IPv6 frame relay maps. RTA(config)# interface s0/0/0 RTA(config-if)# frame-relay map ipv6 2001:db8:1:f::2 201 RTA(config-if)# frame-relay map ipv6 fe80::2 201 broadcast

Record the command used to generate the following output verifying the IPv4 and IPv6 maps. RTA# show frame-relay map Serial0/0/0 (up): ipv6 FE80::2 dlci 201(0xC9,0x3090), static, broadcast, CISCO, status defined, active Serial0/0/0 (up): ipv6 2001:DB8:1:F::2 dlci 201(0xC9,0x3090), static, CISCO, status defined, active Serial0/0/0 (up): ip 10.10.10.2 dlci 201(0xC9,0x3090), dynamic, broadcast, CISCO, status defined, active Packet Tracer Activity

instructor.indb 176

Packet Tracer - Configuring Static Frame Relay Maps (CN 4.2.1.4)

3/12/14 7:51 AM

Chapter 13: Frame Relay

177

Configure Subinterfaces When configuring a hub-and-spoke topology with Frame Relay, you must create subinterfaces so that each PVC can have its own Layer 3 addressing. In a Frame Relay nonbroadcast multiaccess (NBMA) topology like the one shown in Figure 13-4, this can cause reachability issues without proper configuration. Figure 13-4 Frame Relay NBMA Topology S0/0/0 10.10.10.2/30 DLCI 102 S0/0/0.201 10.10.10.1/30 DLCI 201

RTB Frame Relay NBMA

RTA S0/0/0.301 10.10.10.5/30 DLCI 301

PVC

S0/0/0 10.10.10.6/30 DLCI 103

RTC

Briefly describe the three reachability issues caused by NBMA topologies. Split horizon: This rule states that an update received on a physical interface should not be retransmitted out that same physical interface. Broadcast and multicast replication: Broadcast and multicast traffic must be replicated for each PVC that is configured on the interface. This can consume considerable bandwidth which might impact user traffic if the path already has low bandwidth. Neighbor discovery: In OSPF, the DR/BDR election must result in the hub router as DR because it is the only router that has PVCs to all other routers. What are the three ways to solve these reachability issues? One or more of the following: disable split horizon, build a full mesh topology, configure subinterfaces. In Figure 13-4, RTA is the hub router and RTB and RTC are spokes. Given the information shown in Figure 13-4, record the commands, including the router prompts, to configure RTA with Frame Relay using point-to-point subinterfaces. RTA(config)# interface serial 0/0/0 RTA(config-if)# encapsulation frame-relay RTA(config-if)# no ip address RTA(config-if)# no shutdown RTA(config-if)# exit RTA(config)# interface serial 0/0/0.201 point-to-point RTA(config-subif)# ip address 10.10.10.1 255.255.255.252 RTA(config-subif)# frame-relay interface-dlci 201 RTA(config-fr-dlci)# exit RTA(config-subif)# exit

instructor.indb 177

3/12/14 7:51 AM

178

CCNA Routing and Switching Practice and Study Guide

RTA(config)# interface serial 0/0/0.301 RTA(config-subif)# ip address 10.10.10.5 255.255.255.252 RTA(config-subif)# frame-relay interface-dlci 301 RTA(config-fr-dlci)#

Lab - Configuring Frame Relay and Subinterfaces (CN 4.2.2.7) Packet Tracer Activity

Packet Tracer - Configuring Frame Relay Point-to-Point Subinterfaces (CN 4.2.2.6)

Troubleshoot Connectivity Frame Relay is generally a reliable service. Nonetheless, sometimes the network performs at less-than-expected levels, and troubleshooting is necessary. Record the Frame Relay verification commands that generated the following output: RTA# show frame-relay pvc

PVC Statistics for interface Serial0/0/0 (Frame Relay DTE)

Active

Inactive

Deleted

Static

Local

1

0

0

0

Switched

0

0

0

0

Unused

0

0

0

0

DLCI = 201, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/0

input pkts 1

output pkts 1

in bytes 34

out bytes 34

dropped pkts 0

in pkts dropped 0

out pkts dropped 0

out bytes dropped 0

in FECN pkts 0

in BECN pkts 0

out FECN pkts 0

out BECN pkts 0

in DE pkts 0

out DE pkts 0

out bcast pkts 1

out bcast bytes 34

5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec pvc create time 00:02:12, last time pvc status changed 00:01:38 RTA# show frame-relay lmi

LMI Statistics for interface Serial0/0/0 (Frame Relay DTE) LMI TYPE = CISCO

instructor.indb 178

Invalid Unnumbered info 0

Invalid Prot Disc 0

Invalid dummy Call Ref 0

Invalid Msg Type 0

Invalid Status Message 0

Invalid Lock Shift 0

Invalid Information ID 0

Invalid Report IE Len 0

Invalid Report Request 0

Invalid Keep IE Len 0

Num Status Enq. Sent 14

Num Status msgs Rcvd 15

3/12/14 7:51 AM

Chapter 13: Frame Relay

Num Update Status Rcvd 0

Num Status Timeouts 0

Last Full Status Req 00:00:23

Last Full Status Rcvd 00:00:23

179

RTA# show interface serial 0/0/0 Serial0/0/0 is up, line protocol is up Hardware is WIC MBRD Serial Internet address is 10.10.10.1/30 MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation FRAME-RELAY, loopback not set Keepalive set (10 sec) LMI enq sent

15, LMI stat recvd 16, LMI upd recvd 0, DTE LMI up

LMI enq recvd 0, LMI stat sent LMI DLCI 1023

LMI type is CISCO

0, LMI upd sent

0

frame relay DTE

FR SVC disabled, LAPF state down Broadcast queue 0/64, broadcasts sent/dropped 1/0, interface

RTA# show frame-relay map Serial0/0/0 (up): ip 10.10.10.2 dlci 201(0xC9,0x3090), dynamic, broadcast, CISCO, status defined, active Serial0/0/0 (up): ipv6 2001:DB8:1:F::2 dlci 201(0xC9,0x3090), static, CISCO, status defined, active Serial0/0/0 (up): ipv6 FE80::2 dlci 201(0xC9,0x3090), static, broadcast, CISCO, status defined, active RTA#

In Table 13-1, indicate which command enables you to verify the described information. Some information can be verified with more than one command. Table 13-1

Frame Relay Verification Commands

Frame Relay Information Verified

show interface serial

show framerelay lmi

show framerelay pvc

Broadcast status for the PVC

X

PVC status

instructor.indb 179

X

Number of LMI status queries sent and received

X

Layer 1 and Layer 2 status information

X

LMI type

X

Invalid LMI types

show framerelay map

X

X

X X

3/12/14 7:51 AM

180

CCNA Routing and Switching Practice and Study Guide

Frame Relay Information Verified

Packet Tracer Challenge

instructor.indb 180

show interface serial

show framerelay lmi

show framerelay pvc

Number of ECN packets in and out

X

DLCI assigned to the PVC

X

The encapsulation type

X

Frame Relay DTE/DCE type

X

show framerelay map

X

Packet Tracer - Skills Integration Challenge (CN 4.4.1.2)

3/12/14 7:51 AM

CHAPTER 14

Network Address Translation for IPv4

All public IPv4 addresses that transverse the Internet must be registered with a Regional Internet Registry (RIR). Only the registered holder of a public Internet address can assign that address to a network device. With the proliferation of personal computing and the advent of the World Wide Web, it soon became obvious that 4.3 billion IPv4 addresses would not be enough. The long-term solution was to eventually be IPv6. But for the short term, several solutions were implemented by the IETF, including Network Address Translation (NAT) and RFC 1918 private IPv4 addresses.

NAT Operation There are not enough public IPv4 addresses to assign a unique address to each device connected to the Internet. Networks are commonly implemented using private IPv4 addresses.

NAT Characteristics Fill in the table with the private addresses defined by RFC 1918. Class

Address Range

CIDR Prefix

A

10.0.0.0–10.255.255.255

10.0.0.0/8

B

172.16.0.0–172.31.255.255

172.16.0.0/12

C

192.168.0.0–192.168.255.255

192.168.0.0/16

Briefly explain the following terms:

instructor.indb 181



Inside local address: The address of the source as seen from inside the network.



Inside global address: The address of source as seen from the outside network.



Outside global address: The address of the destination as seen from the outside network. Most often the outside local and outside global addresses are the same.



Outside local address: The address of the destination as seen from the inside network. Although uncommon, this address could differ from the globally routable address of the destination.

3/12/14 7:51 AM

182

CCNA Routing and Switching Practice and Study Guide

In Figure 14-1, label each type of NAT address. Figure 14-1

Identify NAT Address Types

203.0.113.11

192.168.51.5 198.51.100.2 WWW

PC1 R1 ISP

192.168.51.1

Web Server

Figure 14-1a Identify NAT Address Types (Answer) 203.0.113.11

192.168.51.5 198.51.100.2 WWW

PC1 R1 ISP

192.168.51.1

Web Server

Outside Local

Outside Global

Inside Global

Inside Local

Types and Benefits of NAT Briefly describe the three types of NAT: ■

Static address translation (static NAT): One-to-one address mapping between local and global addresses.



Dynamic address translation (dynamic NAT): Many-to-many address mapping between local and global addresses.



Port Address Translation (PAT): Many-to-one address mapping between local and global addresses. This method is also known as overloading (NAT overloading).

When is it appropriate to use static NAT? Static NAT is particularly useful for web servers or devices that must have a consistent address that is accessible from the Internet, such as a company web server. It is also useful for devices that must be accessible by authorized personnel when offsite, but not by the general public on the Internet. What is the difference between dynamic NAT and PAT? Dynamic NAT uses a pool of public addresses and assigns them on a first-come, first-served basis. PAT maps multiple private addresses to one or a few public addresses using the source port number to track connections. List and explain at least three advantages and three disadvantages to using NAT. Advantages

instructor.indb 182



Conserves the legally registered addressing scheme



Increases the flexibility of connections to the public network

3/12/14 7:51 AM

CHAPTER 14: Network Address Translation for IPv4



Provides consistency for internal network addressing schemes



Provides network security

183

Disadvantages

Packet Tracer Activity



Performance is degraded.



End-to-end functionality is degraded.



End-to-end IP traceability is lost.



Tunneling becomes more complicated.



Initiating TCP connections can be disrupted.

Packet Tracer - Investigating NAT Operation (RSE 11.1.2.6/WAN 5.1.2.6)

Configuring NAT Configuring NAT is straightforward if you follow a few simple steps. Static NAT and dynamic NAT configurations vary slightly. Adding PAT to a dynamic NAT is as simple as adding a keyword to the configuration.

Configuring Static NAT Use the following steps to configure static NAT: Step 1.

Create a map between the inside local IP address and the inside global IP address with the ip nat inside source static local-ip global-ip global configuration command.

Step 2.

Configure the inside interface of the LAN the device is attached to participate in NAT with the ip nat inside interface configuration command.

Step 3.

Configure the outside interface where NAT translation will occur with the ip nat outside interface configuration command.

Refer to the topology in Figure 14-2 to configure static NAT. Figure 14-2 Static NAT Configuration Topology Inside Network

Outside Network S0/0/0

S0/1/0

Internet

R2 Web Server 172.16.1.10 Static NAT Translation

Client 209.165.201.254 http://64.100.10.1

The web server uses an inside local address 172.16.1.10 that needs to be translated to the inside global address 64.100.10.1. Record the command including router prompt to configure the static translation on R2. R2(config)# ip nat inside source static 172.16.1.10 64.100.10.1

instructor.indb 183

3/12/14 7:51 AM

184

CCNA Routing and Switching Practice and Study Guide

Record the commands including router prompt to configure the inside interface. R2(config)# interface Serial0/0/0 R2(config-if)# ip nat inside

Record the commands including router prompt to configure the outside interface. R2(config)# interface Serial0/1/0 R2(config-if)# ip nat outside

Packet Tracer Activity

Packet Tracer - Configuring Static NAT (RP 11.2.1.4/WAN 5.2.1.4)

Configuring Dynamic NAT Use the following steps to configure dynamic NAT: Step 1.

Define the pool of addresses that will be used for dynamic translation using the ip nat pool name start-ip end-ip {netmask netmask | prefix-length prefix-length} global configuration command.

Step 2.

Configure an ACL to specify which inside local addresses will be translated using a standard ACL.

Step 3.

Bind the NAT pool to the ACL with the ip nat inside source list ACL-number pool name global configuration command.

Step 4.

Configure the inside interface of the LAN the device is attached to participate in NAT with the ip nat inside interface configuration command.

Step 5.

Configure the outside interface where NAT translation will occur with the ip nat outside interface configuration command.

Refer to the topology in Figure 14-3 to configure dynamic NAT. Figure 14-3 Dynamic NAT Configuration Topology 172.16.1.0/24 PC1 Outside Network

Inside Network 172.16.1.10 S0/0/0 R1 PC2 172.16.2.10

S0/1/0

Internet

R2 NAT POOL: 64.100.10.0/30

Server

Dynamic NAT

172.16.2.0/24

The pool of available addresses is 64.100.10.0/30. Record the command including router prompt to configure the NAT pool with an appropriate name. R1(config)# ip nat pool NAT 64.100.10.0 64.100.10.3 netmask 255.255.255.252

instructor.indb 184

3/12/14 7:51 AM

CHAPTER 14: Network Address Translation for IPv4

185

The two LANs, 172.16.1.0/24 and 172.16.2.0/24, need to be translated. No other addresses are allowed. Record the command including router prompt to configure the ACL. R1(config)# access-list 1 permit 172.16.1.0 0.0.0.255 R1(config)# access-list 1 permit 172.16.2.0 0.0.0.255

Record the command including router prompt to bind the NAT pool to the ACL. R1(config)# ip nat inside source list 1 pool NAT

Record the commands including router prompt to configure the inside interface. R2(config)# interface Serial0/0/0 R2(config-if)# ip nat inside

Record the commands including router prompt to configure the outside interface. R2(config)# interface Serial0/1/0 R2(config-if)# ip nat outside

Lab - Configuring Dynamic and Static NAT (RP 11.2.2.6/WAN 5.2.2.6) Packet Tracer Activity

Packet Tracer - Configuring Dynamic NAT (RP 11.2.2.5/WAN 5.2.2.5)

Configuring Port Address Translation Configuring Port Address Translation (PAT) is just like configuring dynamic NAT except you add the keyword overload to your binding configuration: Router(config)# ip nat inside source list ACL-number pool name overload

However, a more common solution in a small business enterprise network is to simply overload the IP address on the gateway router. In fact, this is what a home router does “out of the box.” To configure NAT to overload the public IP address on an interface, use the following command: Router(config)# ip nat inside source list ACL-number interface type number overload

In this case, of course, there is no pool configuration. Refer to the topology in Figure 14-4 to configure PAT. Figure 14-4 Dynamic NAT Configuration Topology 172.16.1.0/24 PC1 Outside Network

Inside Network 172.16.1.10 S0/0/0 R1

S0/1/0

Internet

R2 Server

PC2 172.16.2.10

64.100.10.1

172.16.2.0/24

instructor.indb 185

3/12/14 7:51 AM

186

CCNA Routing and Switching Practice and Study Guide

R1 is using the public IP address 64.100.10.1 on the Serial 0/1/0 interface. Record the command including router prompt to bind the ACL you configured for dynamic NAT to the Serial 0/1/0 interface. R1(config)# ip nat inside source list 1 interface s0/1/0 overload

That’s it! The rest of the commands are the same as dynamic NAT. However, the process of translating inbound and outbound packets is a bit more involved. PAT maintains a table of inside and outside addresses mapped to port numbers to track connections between the source and destination. The series of Figures 14-5 through 14-8 illustrate the PAT process overloading an interface address. Use the options in Table 14-1 to fill in the source address (SA), destination address (DA), and corresponding port numbers as the packet travels from source to destination and back. Table 14-1

Addresses and Port Numbers

64.100.10.2

192.168.51.5

1268

209.165.201.11

1150

53

192.168.51.1

80

Figure 14-5 Hop 1: PC1 to NAT-Enabled R1 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

SA

DA

Source Port

Destination Port

1150

80

Figure 14-5a Hop1: PC1 to NAT-Enabled R1 (Answer) 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

instructor.indb 186

SA

DA

192.168.51.5

209.165.201.11

Source Port

Destination Port

1150

80

3/12/14 7:51 AM

CHAPTER 14: Network Address Translation for IPv4

187

Figure 14-6 Hop 2: NAT-Enabled R1 to Web Server 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

SA

DA

Source Port

Destination Port

1268

Figure 14-6a Hop 2: NAT-Enabled R1 to Web Server (Answer) 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

Figure 14-7

SA

DA

64.100.10.2

209.165.201.11

Source Port

Destination Port

1268

80

Hop 3: Web Server to NAT-Enable R1

192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

instructor.indb 187

SA

DA

Source Port

Destination Port

3/12/14 7:51 AM

188

CCNA Routing and Switching Practice and Study Guide

Figure 14-7a Hop 3: Web Server to NAT-Enable R1 (Answer) 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

SA

DA

209.165.201.11

64.100.10.2

Source Port

Destination Port

80

1268

Figure 14-8 Hop 4: NAT-Enabled R1 to PC1 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

SA

DA

Source Port

Destination Port

Figure 14-8a Hop 4: NAT-Enabled R1 to PC1 (Answer) 192.168.51.5

192.168.51.1

209.165.201.11

ISP

PC1

Internet

R1 64.100.10.2

Web Server

instructor.indb 188

SA

DA

209.165.201.11

192.168.51.5

Source Port

Destination Port

80

1150

3/12/14 7:51 AM

CHAPTER 14: Network Address Translation for IPv4

189

Lab - Configuring NAT Pool Overload and PAT (RP 11.2.3.7/WAN 5.2.3.7) Packet Tracer Activity

Packet Tracer - Implementing Static and Dynamic NAT (RP 11.2.3.6/WAN 5.2.3.6)

A Word About Port Forwarding Because NAT hides internal addresses, peer-to-peer connections work only from the inside out, where NAT can map outgoing requests against incoming replies. The problem is that NAT does not allow requests initiated from the outside. To resolve this problem, you can configure port forwarding to identify specific ports that can be forwarded to inside hosts. The port forwarding configuration is commonly done in a GUI. However, you can also configure port forwarding in the Cisco IOS adding the following command to your NAT configuration: Router(config)# ip nat inside source {static {tcp | udp local-ip local-port global-ip global-port} [extendable]

Packet Tracer Activity

Packet Tracer - Configuring Port Forwarding on a Linksys Router (RP 11.2.4.4/WAN 5.2.4.4)

Configuring NAT and IPv6 IPv6 includes both its own IPv6 private address space and NAT, which are implemented differently than they are for IPv4. IPv6 uses a unique local address (ULA) for communication within a local site. In Figure 14-9, label the missing parts of the IPv6 ULA address structure. Figure 14-9 IPv6 Unique Local Address Structure Bits

L

Subnet ID

PseudoRandom Algorithm

EUI-64, Random, or Manual Configuration

1 or 0

instructor.indb 189

3/12/14 7:51 AM

190

CCNA Routing and Switching Practice and Study Guide

Figure 14-9a IPv6 Unique Local Address Structure (Answer) Bits

7

1

40

16

64 /64

Prefix

L

Global ID

PseudoRandom Algorithm

FC00::/7

Subnet ID

Interface ID

EUI-64, Random, or Manual Configuration

1 or 0

ULAs are also known as local IPv6 addresses. Briefly describe three characteristics of ULAs. ■

Allow sites to be combined or privately interconnected, without creating any address conflicts or requiring renumbering of interfaces that use these prefixes



Independent of any ISP and can be used for communications within a site without having any Internet connectivity



Not routable across the Internet, but if accidentally leaked by routing or DNS, there is no conflict with other addresses

What is the main purpose of NAT for IPv6? To provide a translation mechanism between IPv6 and IPv4 networks Briefly describe the three transition strategies to move from IPv4 to IPv6. Dual stack is when the devices are running protocols associated with both the IPv4 and IPv6. Tunneling for IPV6 is the process of encapsulating an IPv6 packet inside an IPv4 packet. This allows the IPv6 packet to be transmitted over an IPv4-only network. Translation strategies include NAT-PT, which is now replaced with NAT64.

Troubleshooting NAT When there are IPv4 connectivity problems in a NAT environment, it is often difficult to determine the cause of the problem. The first step in solving the problem is to rule out NAT as the cause. Follow these steps to verify that NAT is operating as expected:

instructor.indb 190

Step 1.

Review the purpose of the NAT configuration. Is there a static NAT implementation? Are the addresses in the dynamic pool actually valid? Are the inside and outside interfaces correctly identified?

Step 2.

Verify that correct translations exist in the translation table using the show ip nat translations command.

Step 3.

Use the clear ip nat translations * and debug ip nat commands to verify that NAT is operating as expected. Check to see whether dynamic entries are re-created after they are cleared.

Step 4.

Review in detail what is happening to the packet, and verify that routers have the correct routing information to move the packet.

3/12/14 7:51 AM

CHAPTER 14: Network Address Translation for IPv4

191

Lab - Troubleshooting NAT Configurations (RP 11.3.1.5/WAN 5.3.1.5) Packet Tracer Activity

Packet Tracer - Verifying and Troubleshooting NAT Configurations (RP 11.3.1.4/WAN 5.3.1.4) Packet Tracer - Skills Integration Challenge (RP 11.4.1.2/WAN 5.4.1.2)

instructor.indb 191

3/12/14 7:51 AM

instructor.indb 192

3/12/14 7:51 AM

CHAPTER 15

Broadband Solutions

With the advent of broadband technologies like digital subscriber line (DSL) and cable, working from home has become a popular option for both employees and companies alike. Virtual private networks (VPN) allow workers to securely connect to the business from remote locations. There are several factors to consider when choosing a broadband solution. This chapter reviews DLS, cable, wireless, VPN, and the factors to consider when implementing broadband solutions.

instructor.indb 193

3/12/14 7:51 AM

194

CCNA Routing and Switching Practice and Study Guide

Teleworking Teleworking is working away from the traditional workplace by using telecommunication technologies such as broadband and VPN security.

Benefits of Teleworking The groups that benefit from teleworking include employees, employers, local governments, and communities. In Table 15-1, indicate which group primarily receives the benefit described. Table 15-1

Benefits of Teleworking

Benefit

Employer

Improves employee morale

X

Decreases recruitment and retention costs

X

Government/ Community

Reduces local infrastructure costs

X

Attracts local employment and development

X

Individual

Saving time or earning more in the same time

X

Increases available time to care for dependents

X

Reduces absenteeism levels

X

Reduces the impact of urban drift

X

Reduces costs associated with commuting

X

Can reduce regional traffic delays

X

Flexibility to deal with personal tasks Customers experience improved response times

X X

Costs of Teleworking Teleworking does have some costs, as well. List at least two costs from the employer’s perspective and two costs from the employee’s perspective. Employer It may be difficult to keep track of employee progress on work. Managers must use a different management style to oversee teleworkers. Employees Teleworkers can feel isolated working alone. Lack of technology support and services compared to colleagues that are in the office. Teleworking can have its own set of distractions like household chores or leisure pursuits like watching TV.

Business Requirements for Teleworker Services Both the teleworker and the business must meet certain minimum requirements to implement teleworking services for the organization. In Table 15-2, indicate whether the teleworker or the company is responsible for each requirement.

instructor.indb 194

3/12/14 7:51 AM

Chapter 15: Broadband Solutions

Table 15-2

195

Teleworker Services Requirements

Responsibility

Usually uses cable or DSL to access the VPN.

Teleworker

Company

X

Manages VPN authentication procedures. Uses client software for network access.

X X

Determines link aggregation and VPN termination methods. Uses network access while traveling.

X X

Maintains VPN concentrators and security appliances.

X

Comparing Broadband Solutions Depending on the location of the teleworker, connecting to the corporate network can be done in one of three ways: cable, DSL, or broadband wireless.

Cable Cable broadband uses a coaxial cable that carries radio frequency (RF) signals across the network. What portion of the electromagnetic spectrum do these signals occupy? Radio frequencies occur between 1 KHz and 1 THz on the electromagnetic spectrum. Traditionally, cable communications was one way. Modern cable systems now provide two-way communication. What three main telecommunication services are offered by today’s cable companies? Cable companies now offer digital cable TV, residential phone service, and high-speed Internet access. Two-way communications occurs downstream in the 50- to 860-MHz range and upstream in the 5- to 42-MHz range. The Data-over-Cable Service Interface Specification (DOCSIS) is the international standard developed by CableLabs that cable operators use to provide Internet access over their existing hybrid fiber-coaxial (HFC) infrastructure. What two types of equipment are required to send digital modem signals upstream and downstream on a cable system? Cable Modem Termination System (CMTS) at the headend of the cable operator Cable Modem (CM) on the subscriber end

instructor.indb 195

3/12/14 7:51 AM

196

CCNA Routing and Switching Practice and Study Guide

Match the definition on the left with a term on the right. Terms are only used once. Definitions a. Combining both fiber-optic and coax cabling

together into a hybrid cabling infrastructure b. Defines the communications and operation

support interface that permits the addition of high-speed data transfer to a traditional cable TV system c. The direction of a signal transmission from

Terms d. CMTS b. DOCSIS c. Downstream e. Frequency a. HFC f. Upstream

the headend to subscribers d. Located in the headend (and communicates

with CMs located in subscriber homes) e. The rate at which current (voltage) cycles

(computed as the number of waves per second) f. The direction of a signal transmission from

subscribers to the headend

instructor.indb 196

3/12/14 7:51 AM

Chapter 15: Broadband Solutions

197

DSL Digital subscriber line (DSL) technology takes advantage of the additional bandwidth available in telephone networks between 3 KHz and 1 MHz. Briefly describe the two main types of DSL. Asymmetric DSL (ADSL) provides higher downstream bandwidth than upload speed. Symmetric DSL (SDSL) provides the same bandwidth in both directions. The local loop connection to the CO must be less than 3.39 miles (5.46 km). What two components are required to provide a DSL connection to the teleworker? Equipment required includes a transceiver (DSL modem), which connects the teleworker’s network to the DSL network and a DSL access multiplexer (DSLAM) located at the CO to combine individual DSL subscribers into one link to an ISP. The analog voice and ADSL signals must be separated to avoid interference. What two devices can separate the signals? There are two ways to separate ADSL from voice at the customer premises: using a microfilter or using a splitter.

instructor.indb 197

3/12/14 7:51 AM

198

CCNA Routing and Switching Practice and Study Guide

Match the definition on the left with a term on the right. Terms are only used once. Definitions a. Located at the CO, a device that combines

individual DSL connections from subscribers into one high-capacity link to an ISP b. Sometimes referred to as the DSL modem,

a device that connects the subscriber to the DSL network c. The category of DSL technology that provides

Terms c. ADSL f. DSL a. DSLAM d. Microfilter e. SDSL b. Transceiver

high-speed downstream data capacity value with a lower upstream capacity value d. Device with one end connecting to a tele-

phone device and the other end connecting to the telephony wall jack e. Category of DSL technology that provides

equal high-speed downstream and upstream data capacities f. A means of providing high-speed connections

over pre-existing installed copper wire infrastructure

instructor.indb 198

3/12/14 7:51 AM

Chapter 15: Broadband Solutions

199

Broadband Wireless Of the three broadband technologies, wireless offers the largest variety of ways to connect. Whether from your laptop or from a smartphone, urban or rural, broadband wireless has a solution. Match the definition on the left with a term on the right. Terms are only used once. Definitions a. Uses a point-to-multipoint topology to pro-

vide wireless cellular broadband access at speeds up to 1 Gbps b. Newer and faster technology for high-speed

cellular data (considered to be part of 4G) c. Cellular broadband access that gets faster with

each generation

Terms c. 3G/4G Wireless b. LTE d. Municipal WiFi f. VSAT a. WiMAX e. Wireless Internet

d. Employs a mesh network with an access

points at each node for 802.11 connections e. A general term for Internet service from a

mobile phone or any other mobile device that uses the same technology f. Two-way satellite Internet using IP multicast-

ing technology

instructor.indb 199

3/12/14 7:51 AM

200

CCNA Routing and Switching Practice and Study Guide

Selecting Broadband Solutions Ideally, a teleworker would have a fiber-optic cable directly connected to the home office. When selecting the broadband solution that is right for you, you want to consider several factors. In Table 15-3, indicate the factors for each broadband solution. Table 15-3

Broadband Solutions: Factors to Consider

Factor to Consider

Cable

DSL

Requires fiber installation directly to the home.

Fiberto-theHome

Cellular/ Mobile

Wi-Fi Mesh

X

Coverage is often an issue, bandwidth is limited, and data may not be unlimited.

X

Bit rate is limited to 2 Mbps per subscriber, cell size is 1 to 2 km (1.25 mi). Bandwidth is shared by many users, and upstream data rates are often slow. Limited bandwidth that is distance sensitive, and the upstream rate is proportionally quite small compared to downstream rate.

WiMAX Satellite

X

X

X

Expensive, limited capacity per subscriber; often provides access where no other access is possible. Most municipalities do not have a mesh network deployed; if it is available and the SOHO is in range, it is a viable option.

X

X

Configuring xDSL Connectivity The underlying data-link protocol commonly used by Internet service providers (ISPs) to send and receive data across DSL links is PPP over Ethernet (PPPoE).

PPPoE Overview For the ISP, what are the benefits of using PPP? PPP supports the ability to assign IP addresses to the remote end of the link. PPP with CHAP authentication allows the ISP to check the customer’s records to make sure that the bill is paid.

instructor.indb 200

3/12/14 7:51 AM

Chapter 15: Broadband Solutions

201

What are the three stages of evolution in teleworker connections from the home that use PPP? First there was analog dialup, which was later replaced with ISDN, which was then replaced by DSL.

Configuring PPPoE Although PPPoE configuration is beyond the scope of the course, understanding how PPPoE is implemented will help solidify your skills in configuring PPP. The two steps to configure PPPoE are as follows: Step 1.

Create a PPP tunnel using dialer interface with the following settings: ■

Encapsulation is PPP.



IP address is negotiated.



MTU size is set to 1492. Why?

To allow for the additional 8-byte PPP header, the MTU is reduced from the maximum Ethernet size of 1500 bytes to 1492.

Step 2.



Dialer interface is assigned a pool.



CHAP authentication with username and password assigned by ISP.

Enable PPPoE on the interface attached to the DSL modem and assign it as a PPPoE client using the dialer pool defined in Step 1.

You can verify the dialer interface was assigned an IP address with the show ip interface brief command. In Figure 15-1, the ISP router is already configured. Record the commands to configure the Customer router using the following CHAP information: Figure 15-1

PPPoE Configuration Topology

Internet G0/0

G0/0

Customer

ISP DSL Modem



Username is CustomerBob.



Password is Bob$connect.

DSLAM

Customer(config)# interface dialer 1 Customer(config-if)# ip address negotiated Customer(config-if)# encapsulation ppp Customer(config-if)# ip mtu 1492 Customer(config-if)# dialer pool 1

instructor.indb 201

3/12/14 7:51 AM

202

CCNA Routing and Switching Practice and Study Guide

Customer(config-if)# ppp chap hostname CustomerBob Customer(config-if)# ppp chap password Bob$connect Customer(config-if)# no shutdown Customer(config-if)# interface g0/0 Customer(config-if)# no ip address Customer(config-if)# pppoe enable Customer(config-if)# pppoe-client dial-pool-number 1 Customer(config-if)# no shutdown

If you want to configure this on lab equipment, connect two routers through a switch or with a crossover cable and use the following configuration for ISP: username CustomerBob password Bob$connect ! bba-group pppoe global virtual-template 1 ! interface GigabitEthernet0/0 no ip address pppoe enable group global no shutdown ! interface Virtual-Template1 mtu 1492 ip address 64.100.1.254 255.255.255.0 peer default ip address pool CUSTOMER_POOL ppp authentication chap callin ! ip local pool CUSTOMER_POOL 64.100.1.1 64.100.1.253

Lab - Configuring a Router as a PPPoE Client for DSL Connectivity (CN 6.3.2.3)

instructor.indb 202

3/12/14 7:51 AM

CHAPTER 16

Securing Site-to-Site Connectivity

Up to this point in our WAN discussions, we have covered access options, including leased lines, Frame Relay, cable, digital subscriber line (DSL), and wireless. Now it is time to turn our attention toward a popular solution for linking two sites or a teleworker to the corporate office. With the use of generic routing encapsulation (GRE) and IP security (IPsec), virtual private networks (VPNs) play an important role in today’s network implementations.

instructor.indb 203

3/12/14 7:51 AM

204

CCNA Routing and Switching Practice and Study Guide

VPNs With the proper implementation at that central site, VPNs provide the flexibility of having safe and secure connections regardless of the underlying access technology. This is increasingly important as more users need or want access to their corporate networks no matter their current location.

Fundamentals of VPNs VPNs are used to create a private tunnel over the Internet regardless of the WAN access option used to make the connection. Briefly describe three different scenarios in which VPNs are a viable solution. VPNs are ideal for connecting teleworkers, remote/branch offices, and business partners to the corporate network at the central site. What is the difference between VPN and secure VPN? Secure VPNs are implemented with data encryption using IPsec. To implement a VPN, a VPN gateway is needed. List three devices can serve as a VPN gateway. A router, a firewall, and Cisco’s Adaptive Security Appliance (ASA) can all serve as VPN gateways. Briefly describe four benefits to using VPNs. Cost savings: VPNs allow organizations to replace expensive dedicated WAN links or modem banks by using Internet connections to connect end users. Scalability: It is easy to add branches, partners, or users because ISP choices can be made locally. Compatibility with broadband technology: Home, branch, and mobile workers can take advantage of whatever broadband technology they are using to connect to the Internet. Security: VPNs use advanced encryption technology to secure data as it travels across the Internet.

Types of VPNs There are two main types of VPN networks. Site-to-site VPNs support connections where the two locations are permanent and contain more than one user. For example, a branch site or a business partner site most likely would benefit from a site-to-site VPN. Remote-access VPNs are best used for single user connection needs such as teleworkers and mobile users. In Table 16-1, indicate the type of VPN described by each characteristic. Table 16-1

Comparing Site-to-Site and Remote-Access VPNs

Characteristic

Remote-Access VPNs

VPN is dynamically enabled when needed.

X

Most likely uses VPN client software to establish VPN connection and encrypt data.

X

Users have no knowledge of the VPN.

instructor.indb 204

Site-to-Site VPN

X

3/12/14 7:51 AM

Chapter 16: Securing Site-to-Site Connectivity

Characteristic

Site-to-Site VPN

Connects networks together through peer VPN gateways.

Remote-Access VPNs

X

Uses a client/server model.

X

Connects teleworkers and mobile users.

X

VPN connection is static.

Packet Tracer Activity

205

X

Packet Tracer - Configuring VPNs (Optional) (CN 7.1.2.4)

Site-to-Site GRE Tunnels Generic routing encapsulation (GRE) is a site-to-site VPN tunneling protocol developed by Cisco. GRE can encapsulate a wide variety of protocol packet types inside IP tunnels.

Fundamentals of Generic Routing Encapsulation List three protocols that GRE can encapsulate. IPv4, IPv6, AppleTalk, DECnet, or IPX Figure 16-1 shows the basic fields in a GRE encapsulated packet. Figure 16-1

GRE Encapsulated Packet

IP

GRE

IP

TCP

Data

Figure 16-2 shows the topology we will use to configure GRE later in this section. Notice how the protocol packet, IP, is encapsulated with GRE, then encapsulated in an IP packet for transport across the Internet. The inside IP packet is using private addressing and the outside IP packet is using public addressing. Note: The public addressing is on the same subnet. This is uncommon on real networks. However, we are doing it here so that you can easily attach to routers and use this configuration for practice. Figure 16-2 GRE Topology 64.100.1.2/30 S0/0/0 PC1

G0/0

Tunnel RTB

10.10.2.10/24

64.100.1.1/30 S0/0/0

G0/0

10.1.1.2/30 Tunnel1

10.1.1.0/30

10.1.1.2/30 Tunnel1

RTA IPv4

10.10.1.10/24

Original Packet

IP Header

instructor.indb 205

GRE Header

Payload Packet

3/12/14 7:51 AM

206

CCNA Routing and Switching Practice and Study Guide

GRE is defined by IETF RFC 2784. In the outer IP header, 47 is used in the Protocol field to indicate that a GRE header follows. In the GRE header, a Protocol Type field specifies the OSI Layer 3 protocol that is encapsulated (IP in Figure 16-2). GRE is stateless, meaning that it does not include any flow-control mechanisms. Also, GRE does not include any security mechanisms to protect the payload. The GRE header and additional IP header creates at least 24 bytes of additional overhead for tunneled packets.

Configuring GRE Tunnels In Figure 16-2 shown earlier, assume the physical interfaces on RTA and RTB are configured and active. Also assume that RTA is already configured with a GRE tunnel and OSPF routing. To configure GRE on RTB, complete the following steps: Step 1.

Create a tunnel interface using the interface tunnel number command. The interface numbers do not have to match between RTA and RTB.

Step 2.

Configure an IP address for the tunnel interface. The two routers on the tunnel should use addresses from the same subnet. In our topology, the subnet is 10.1.1.0/30.

Step 3.

Specify the tunnel’s source IP address in the public part of the network with the tunnel source ip-address command. The IP address must match the other side’s configuration for tunnel destination ip-address. For RTB, this address is the 64.100.1.2 IP address configured on its S0/0/0 interface.

Step 4.

Specify the tunnel’s destination IP address in the public part of the network with the tunnel destination ip-address command. The IP address must match the other side’s tunnel source ip-address. For RTB, this address is the 64.100.1.1 IP address configured on RTA’s S0/0/0.

Step 5.

Configure routing to use the tunnel to advertise the private LANs at each site. Note: These steps do not include configuring the tunnel mode command because the default, GRE IP, is what is needed here. However, in the future, the GRE tunnel will most likely be IPv6.

Using these steps, record the commands including the router prompt to configure RTB with a GRE tunnel to RTA. RTB(config)# interface tunnel 1 RTB(config-if)# ip address 10.1.1.2 255.255.255.252 RTB(config-if)# tunnel source 64.100.1.2 RTB(config-if)# tunnel destination 64.100.1.1 RTB(config-if)# router ospf 1 RTB(config-router)# network 10.10.2.0 0.0.0.255 area 0 RTB(config-router)# network 10.1.1.0 0.0.0.3 area 0

A number of commands can be used to verify the GRE tunnel is operational. Of course, the ultimate test is that PC1 should now be able to ping the server attached to the RTA LAN. If connectivity fails, use the following commands to troubleshoot the issue.

instructor.indb 206

3/12/14 7:51 AM

Chapter 16: Securing Site-to-Site Connectivity

207

Record the commands and command filtering used to generate the following output. RTB# show ip ospf neighbor

Neighbor ID

State

0

FULL/

64.100.1.1

Pri

-

Dead Time

Address

Interface

00:00:34

10.1.1.1

Tunnel1

RTB# show ip interface brief | include Tunnel Tunnel1

10.1.1.2

YES manual up

up

RTB# show ip route ospf | begin Gateway Gateway of last resort is not set

10.0.0.0/8 is variably subnetted, 5 subnets, 3 masks O

10.10.1.0/24 [110/1001] via 10.1.1.1, 00:23:49, Tunnel1

RTB# show interface Tunnel 1 Tunnel1 is up, line protocol is up Hardware is Tunnel Internet address is 10.1.1.2/30 MTU 17916 bytes, BW 100 Kbit/sec, DLY 50000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation TUNNEL, loopback not set Keepalive not set Tunnel source 64.100.1.2, destination 64.100.1.1 Tunnel protocol/transport GRE/IP Key disabled, sequencing disabled Checksumming of packets disabled Tunnel TTL 255, Fast tunneling enabled Tunnel transport MTU 1476 bytes RTB#

In the output from the last command shown, why is the maximum transmission unit (MTU) set at 1476 bytes? The overhead for GRE is 24 bytes, which limits the encapsulated packet from the normal 1500 bytes to 1476 bytes. Lab - Configuring a Point-to-Point GRE VPN Tunnel (CN 7.2.2.5)

Packet Tracer Activity

instructor.indb 207

Packet Tracer - Configuring GRE (CN 7.2.2.3) Packet Tracer - Troubleshooting GRE (CN 7.2.2.4)

3/12/14 7:51 AM

208

CCNA Routing and Switching Practice and Study Guide

Introducing IPsec Although GRE is excellent for creating a tunnel across the Internet, it does not include any kind of security. This section reviews basic IPsec concepts. IPsec configuration is not a CCNA Routing and Switching exam topic. So, any practice you do is purely optional.

Internet Protocol Security RFC 4301, Security Architecture for the Internet Protocol, defines IP security, or simply IPsec. Briefly describe each of the four critical functions of IPsec security services. ■

Confidentiality (encryption): IPsec provides strong algorithms used to encrypt the data before it is sent across the VPN tunnel.



Data integrity: When data is received on the other end of the tunnel, IPsec has uses a hash to ensure that the packet has not been changed.



Authentication: IPsec uses Internet Key Exchange (IKE) to authenticate that the connection is made with the desired communication partner.



Anti-replay protection: This is the ability to detect and reject replayed packets and helps prevent spoofing. Late and duplicate packets are dropped.

IPsec Framework Encryption protects data confidentiality and integrity. Authentication ensures that the sender and receiver actually know and trust each other. Encryption What two factors impact the degree of confidentiality in an encryption algorithm? The shorter a key used in the encryption, the easier it is to hack. Therefore, longer keys (such as 256-bit) provide stronger encryption and data confidentiality. In addition, the sophistication of the algorithm impacts confidentiality. What is the main difference between symmetric and asymmetric encryption? In symmetric encryption, the source and destination use a pre-shared key, whereas in asymmetric encryption, the source and the destination use two different keys. In what scenarios are symmetric and asymmetric encryption used? Symmetric encryption is commonly used to encrypt the contents of a message, and asymmetric encryption is commonly used for digital certificates. What is the main purpose of the Diffie-Hellman (DH) algorithm? DH is a method for two parties to establish a shared secret key that will be used by encryption and hash algorithms. Hash-based Message Authentication Code (HMAC) is a mechanism for message authentication using hash functions. A keyed HMAC is a data integrity algorithm that guarantees the integrity of a message. What are the two common HMAC algorithms? MD5 and SHA

instructor.indb 208

3/12/14 7:51 AM

Chapter 16: Securing Site-to-Site Connectivity

209

Briefly describe the operation of an HMAC algorithm. A shared secret key and variable-length message are combined and run through the algorithm. The result is a hash that is appended to the original message. The receiving end reverses the process to decrypt the variable-length message. Authentication Encryption is crucial, as we have seen. However, a VPN tunnel must also authenticate the device on the other end before the path can be considered secure. Briefly describe the two main peer authentication methods. ■

PSK: A secret key that is shared between the two parties using a secure channel before it needs to be used. It is manually configured and used to authenticate at each end.



RSA signatures: Digital certificates are obtained from a certificate authority and then are exchanged to authenticate peers.

Figure 16-3 is a depiction of the IPsec framework with all the possible algorithm choices for each piece in the framework. Figure 16-3 IPsec Framework IPsec Framework Choices

IPsec Protocol

AH

Confidentiality

ESP

ESP + AH

DES

3DES

AES

DH5

DH...

Integrity

MD5

SHA

Authentication

PSK

RSA

Diffie-Hellman

DH1

DH2

SEAL

Briefly describe each of the following: IPsec framework protocol: The protocol used to encapsulate the full packet. Most likely, the Encapsulating Security Payload (ESP) is used. Confidentiality: The selection of an encryption algorithm to encrypt and decrypt the original message. Integrity: A hash algorithm is used to guarantee that the data has not been altered in transit. Authentication: A method is used to authenticate the two ends of a tunnel, either PSK or RSA. DH algorithm: The method in which a shared secret key is established between peers.

instructor.indb 209

3/12/14 7:51 AM

210

CCNA Routing and Switching Practice and Study Guide

Packet Tracer Activity

Packet Tracer - Configuring GRE over IPsec (Optional) (CN 7.3.2.8)

Remote Access As discussed earlier in this chapter, VPNs are an ideal remote-access solution for many reasons. Secure communications can easily be implemented, scaled, and tailored to the access rights of the individual. This section briefly reviews types of remote-access VPN solutions.

Remote-Access VPN Solutions What are the two primary methods for deploying remote-access VPNs? IPsec and SSL List three benefits or features of Cisco SSL VPN solutions. Web-based, clientless access, and complete network access without preinstalled desktop software Protection against viruses, worms, spyware, and hackers on a VPN connection by integrating network and endpoint security in the Cisco SSL VPN platform Use of a single device for both SSL VPN and IPsec VPN In Table 16-2, label the two columns with the Cisco SSL VPN solution that is best described by the statements. Table 16-2

Cisco SSL VPN Solutions

Cisco SSL VPN Solution Description

Cisco AnyConnect Secure Mobility Client with SSL

Non-corporate-managed devices are provided VPN remote access

X

Provides access to corporate resources for devices that are not managed by the corporation

X

Provides clients with a LAN-like full network access

X

Remote users establish the SSL session using a web browser

X

A client application must be installed on the end-user device

X

Requires a standalone application be installed on the end-user device

X

Access to services is limited to browser-based file-sharing resources

instructor.indb 210

Cisco Secure Mobility Clientless SSL

X

3/12/14 7:51 AM

Chapter 16: Securing Site-to-Site Connectivity

211

IPsec Remote-Access VPNs The Cisco Easy VPN solution feature offers flexibility, scalability, and ease of use for both site-to-site and remote-access IPsec VPNs. The Cisco Easy VPN solution consists of three components. Label each based on the following descriptions. ■

Cisco Easy VPN Remote: A Cisco IOS router or Cisco ASA firewall acting as a VPN client



Cisco VPN Client: An application supported on a PC used to access a Cisco VPN server



Cisco Easy VPN Server: A Cisco IOS router or Cisco ASA Firewall acting as the VPN headend device in site-to-site or remote-access VPNs

IPsec exceeds SSL in many ways. In Table 16-3, indicate whether the characteristic belongs to SSL or IPsec. Table 16-3

Comparing SSL and IPsec

Characteristic

40- to 256-bit key-length encryption.

SSL

Access to all IP-based applications. X

One- or two-way authentication.

X

Specifically configured devices can connect.

X

Shared secrets or digital certificates for authentication.

X

56 to 256-bit, key-length encryption.

instructor.indb 211

X

Any device can connect.

Web applications and file sharing.

Packet Tracer Activity

IPsec

X

X X

Packet Tracer - Skills Integration Challenge (CN 7.5.1.2)

3/12/14 7:51 AM

instructor.indb 212

3/12/14 7:51 AM

CHAPTER 17

Monitoring the Network

Most of your CCNA studies have focused on implementing networking technologies. But what if there is currently no design or implementation to do in your job as network administrator? What if the network is already up and running? Then chances are you will be responsible for monitoring the network. Over the years, several tools have evolved to help you do just that. This chapter focuses on three popular monitoring tools: Syslog, Simple Network Management Protocol (SNMP), and NetFlow.

instructor.indb 213

3/12/14 7:51 AM

214

CCNA Routing and Switching Practice and Study Guide

Syslog The most common method of accessing system messages that networking devices provide is to use a protocol called syslog.

Syslog Operation Developed in the 1980s and documented as RFC 3164, syslog used UDP port 514 to send notifications across IP networks to a syslog server. Briefly describe the three main syslog functions. ■

Gathers logging information for monitoring and troubleshooting



Can be configured to select the type of logging information that is captured



Can be configured to send captured syslog messages to a destination IP address

List the four destinations these messages can be sent to. ■

RAM (logging buffer)



Console line



Terminal line



Syslog server

Because you have configured many routers by now, one of the more common messages you have seen is the interface “up” and “up” message, as shown in Example 17-1. Example 17-1

Syslog Message: Interface Is “Up” and “Up”

000039: *Nov 13 15:20:39.999: %LINK-3-UPDOWN: Interface GigabitEthernet0/0, changed state to up 000040: *Nov 13 15:20:40.999: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to up

In Table 17-1, use the second line of output from Example 17-1 to provide an example of each field in the syslog message format. Table 17-1

Syslog Message Format

Field

Example

Sequence Number

000040:

Timestamp

*Nov 13 15:20:40.999:

Facility

%LINEPROTO

Severity

5

Mnemonic

UPDOWN

Description

Line protocol on Interface GigabitEthernet0/0, changed state to up

By default, the Sequence Number field is not shown. Record the command, including the router prompt, to add this field to syslog messages. Router(config)# service sequence-numbers

instructor.indb 214

3/12/14 7:51 AM

Chapter 17: Monitoring the Network

215

What are the two different methods to make sure the timestamp is accurate? Manually set the date and time using the clock command. Configure the router to get its date and time from an NTP server using the ntp server ip-address command.

Configuring Syslog Using the topology and addressing shown in Figure 17-1, record the commands including the router prompt to configure the logging service on RTA with the following requirements: ■

All logging messages should be sent to the console and to the buffer as well as the syslog server.



Only log messages with severity 5 or lower.



The source interface for logged messages should always be the G0/0 interface.

Figure 17-1

Syslog Configuration Topology G0/0 Syslog Server

RTA 10.10.10.1

10.10.10.10

RTA# configure terminal RTA(config)# logging console RTA(config)# logging buffer RTA(config)# logging 10.10.10.10 RTA(config)# logging trap 5 RTA(config)# logging source interface g0/0

What command will display the messages logged to RAM? RTA# show logging

Lab - Configuring Syslog and NTP (CN 8.1.2.6) Packet Tracer Activity

Packet Tracer - Configuring Syslog and NTP (CN 8.1.2.5)

SNMP SNMP began with a series of three RFCs back in 1988 (1065, 1066, and 1067). The SNMP name is derived from RFC 1067, A Simple Network Management Protocol. Since then, SNMP has undergone several revisions.

SNMP Operation SNMP is an application layer protocol that provides a standardized way of communicating information between SNMP agents and SNMP managers using UDP port 162. The SNMP manager is part of a network management system (NMS). The SNMP manager can collect

instructor.indb 215

3/12/14 7:51 AM

216

CCNA Routing and Switching Practice and Study Guide

information from agents using “get” messages. Each agent stores data about the device in the Management Information Base (MIB) locally so that it is ready to respond to these messages from the NMS. Agents can also be configured to forward directly to the NMS using “trap” messages. In Table 17-2, indicate the SNMP message type for each of the descriptions provided. Table 17-2

SNMP Message Type

Operation

Description

get-request

Retrieves a value from a specific variable.

get-next-request

Retrieves a value from a variable within a table. The SNMP manager does not need to know the exact variable name; a sequential search is performed to find the needed variable from within a table.

get-bulk-request

Retrieves large blocks of data, such as multiple rows in a table; only works with SNMPv2 or later.

get-response

Replies to messages sent by an NMS.

set-request

Stores a value in a specific variable.

trap

An unsolicited message sent by an SNMP agent to an SNMP manager when some event has occurred.

Although SNMPv1 is legacy, Cisco IOS supports all three versions. All versions of SNMP use SNMP managers, agents, and MIBs. In today’s networks, you will most likely encounter SNMPv3 or SNMPv2c. In Table 17-3, indicate whether the SNMP characteristic applies to SNMPv2c, SNMPv3, or both. Table 17-3

Comparing SNMPv2c and SNMPv3

Characteristic

SNMPv2c

Used for interoperability and includes message integrity

SNMPv3

X

Provides services for security models Uses community-based forms of security

X X

Includes expanded error codes with types

X

Provides services for both security models and security levels

X

Authenticates the source of management messages

X

Cannot provide encrypted management messages

Both

X

Supported by Cisco IOS software

X

In SNMPv1 and SNMPv2c, access to the MIB is controlled through the use of two types of community strings: ■

Read-only(ro): Access to MIB variables but no changes allowed



Read-write(rw): Access and manipulation of MIB variables allowed

Why is this type of access no longer considered best practice? Community strings are sent in plain text across the network. They are easy to intercept, read, alter, and resend. The MIB defines a variable using a MIB object ID. These IDs are derived hierarchically using the scheme shown in Figure 17-2. Label Figure 17-2 with the most common public variables.

instructor.indb 216

3/12/14 7:51 AM

Chapter 17: Monitoring the Network

Figure 17-2

217

Management Information Base Object ID Scheme

cisco (9).

local variables (2).

cisco mgmt (9).

interface group (2).

cisco flash group (10).

Management Information Base Object ID Scheme (answer) iso (1).

org (3).

dod (6).

internet (1).

private (4).

enterprises (1).

cisco (9).

instructor.indb 217

local variables (2).

cisco mgmt (9).

interface group (2).

cisco flash group (10).

3/12/14 7:51 AM

218

CCNA Routing and Switching Practice and Study Guide

Lab - Researching Network Monitoring Software (CN 8.2.1.8)

Configuring SNMP In Figure 17-3, RTA is an SNMP agent and NMS is an SNMP manager. Record the commands to configure SNMPv2 on RTA with the following requirements: ■

Use an ACL to allow NMS read-only access to the router using community string NMS_eyesonly.



Location is Aloha_Net and the contact is Bob Metcalfe.



Specify that 10.10.10.10 is the recipient of traps and explicitly configure the router to send traps.

Figure 17-3

SNMP Configuration Topology Gets G0/0

NMS

RTA 10.10.10.10

10.10.10.1 Traps

RTA(config)# ip access-list standard SNMP RTA(config-std-nacl)# permit 10.10.10.10 RTA(config-std-nacl)# exit RTA(config)# snmp-server community NMS_eyesonly ro SNMP RTA(config)# snmp-server location Aloha_Net RTA(config)# snmp-server contact Bob Metcalfe RTA(config)# snmp-server host 10.10.10.10 version 2c NMS_eyesonly RTA(config)# snmp-server enable traps

Record the commands that generate the SNMP verification output for RTA shown in Example 17-2. Example 17-2

SNMP Verification Commands

RTA# show snmp Chassis: FTX163283RZ Contact: Bob Metcalfe Location: Aloha_Net 0 SNMP packets input 0 Bad SNMP version errors 0 Unknown community name 0 Illegal operation for community name supplied 0 Encoding errors 0 Number of requested variables 0 Number of altered variables

instructor.indb 218

3/12/14 7:51 AM

Chapter 17: Monitoring the Network

219

0 Get-request PDUs 0 Get-next PDUs 0 Set-request PDUs 0 Input queue packet drops (Maximum queue size 1000) 0 SNMP packets output 0 Too big errors (Maximum packet size 1500) 0 No such name errors 0 Bad values errors 0 General errors 0 Response PDUs 0 Trap PDUs SNMP Dispatcher: queue 0/75 (current/max), 0 dropped SNMP Engine: queue 0/1000 (current/max), 0 dropped

SNMP logging: enabled Logging to 10.10.10.10.162, 0/10, 0 sent, 0 dropped.

RTA# show snmp community

Community name: ILMI Community Index: cisco0 Community SecurityName: ILMI storage-type: read-only

active

Community name: NMS_eyesonly Community Index: cisco1 Community SecurityName: NMS_eyesonly storage-type: nonvolatile

active access-list: SNMP

Community name: NMS_eyesonly@1 Community Index: cisco2 Community SecurityName: NMS_eyesonly@1 storage-type: nonvolatile

active access-list: SNMP

NetFlow Although syslog and SNMP are powerful tools for collecting information about networking devices, owners of networks were looking for a tool to measure TCP/IP flows. So, Cisco engineers developed NetFlow, which quickly gained popularity in the marketplace.

instructor.indb 219

3/12/14 7:51 AM

220

CCNA Routing and Switching Practice and Study Guide

NetFlow Operation What is the latest version of NetFlow called? Flexible NetFlow What improvements does it make over the original version? Flexible NetFlow adds the capability to customize the traffic analysis parameters for the specific requirements of a network administrator. Briefly describe four reasons to use NetFlow. ■

Measuring who is using what network resources for what purpose



Accounting and charging back according to the resource utilization level



Using the measured information to do more effective network planning so that resource allocation and deployment is well aligned with customer requirements



Using the information to better structure and customize the set of available applications and services to meet user needs and customer service requirements

NetFlow is not a replacement for SNMP. Both have their purposes in network monitoring. In Table 17-4, indicate whether the characteristic describes SNMP or NetFlow. Table 17-4

Comparing SNMP and NetFlow

Characteristics

SNMP

Agents can send traps to a network management system when defined events occur.

X

Access to the MIB is controlled through community string settings.

X

NetFlow

An external server (collector) is used to record IP network monitored cache changes.

X

Interface errors, CPU usage, and memory usage are not recorded.

X

A Management Information Base (MIB) is used to record network monitored events.

X

Collects IP data to record who used network resources and for what purpose those resources were used.

X

Define a TCP/IP flow. A flow is a unidirectional stream of packets between a source and a destination. What fields in a packet are used to determine that the packet is from a different flow? Source IP address, destination IP address, source port number, destination port number, Layer 3 protocol type, ToS marking, and input logical interface

Configuring NetFlow To implement NetFlow on a router, complete the following steps:

instructor.indb 220

Step 1.

Configure NetFlow to capture inbound and outbound packets.

Step 2.

Configure where to send NetFlow data.

Step 3.

Verify NetFlow is operational.

3/12/14 7:51 AM

Chapter 17: Monitoring the Network

221

Using Figure 17-4 as a reference, record the commands configure RTA to capture and send NetFlow data from interface G0/0 to the collector using Version 9. Figure 17-4

NetFlow Configuration Topology NetFlow Collector G0/0 RTA 10.10.10.1

10.10.10.10

RTA(config)# interface g0/0 RTA(config-if)# ip flow ingress RTA(config-if)# ip flow egress RTA(config-if)# exit RTA(config)# ip flow-export destination 10.10.10.10 2055 RTA(config)# ip flow-export version 9

Record the commands that generated the NetFlow verification output on RTA shown in Example 17-3. Example 17-3

NetFlow Verification

RTA# show ip flow interface GigabitEthernet0/0 ip flow ingress ip flow egress RTA# show ip cache flow IP packet size distribution (132959 total packets): 1-32

64

96

128

160

192

224

256

288

320

352

384

416

448

480

.998 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000

512

544

576 1024 1536 2048 2560 3072 3584 4096 4608

.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000

IP Flow Switching Cache, 278544 bytes 1 active, 4095 inactive, 32 added 728 ager polls, 0 flow alloc failures Active flows timeout in 30 minutes Inactive flows timeout in 15 seconds IP Sub Flow Cache, 34056 bytes 1 active, 1023 inactive, 28 added, 28 added to flow 0 alloc failures, 0 force free 1 chunk, 1 chunk added last clearing of statistics never

instructor.indb 221

3/12/14 7:51 AM

222

CCNA Routing and Switching Practice and Study Guide

Protocol

Total

Flows

Packets Bytes

--------

Flows

/Sec

/Flow

UDP-other

13

0.0

ICMP

18

0.0

Total:

31

0.0

Packets Active(Sec) Idle(Sec)

/Pkt

/Sec

/Flow

/Flow

10225

32

37.4

17.6

15.5

1

181

0.0

0.1

15.0

4288

32

37.4

7.5

15.2

SrcIf

SrcIPaddress

DstIf

DstIPaddress

Pr SrcP DstP

Pkts

SrcIf

SrcIPaddress

DstIf

DstIPaddress

Pr SrcP DstP

Pkts

Gi0/0

10.10.10.10

Local

10.10.10.1

01 0000 0303

1

RTA# show ip flow export Flow export v9 is enabled for main cache Export source and destination details : VRF ID : Default Destination(1)

10.10.10.10 (2055)

Version 9 flow records 63 flows exported in 29 udp datagrams 0 flows failed due to lack of export packet 0 export packets were sent up to process level 0 export packets were dropped due to no fib 0 export packets were dropped due to adjacency issues 0 export packets were dropped due to fragmentation failures 0 export packets were dropped due to encapsulation fixup failures

Lab - Collecting and Analyzing NetFlow Data (CN 8.3.3.3)

instructor.indb 222

3/12/14 7:51 AM

CHAPTER 18

Troubleshooting the Network

In an ideal world, networks would never fail. But mechanical failures happen. Users of the network do unexpected things. So, issues will arise that require a network administrator’s effective troubleshooting skills—one of the most sought after skills in IT. This chapter reviews network documentation, general troubleshooting methods, and tools.

instructor.indb 223

3/12/14 7:51 AM

224

CCNA Routing and Switching Practice and Study Guide

Troubleshooting with a Systematic Approach Documentation is the starting point and is a crucial factor in the success of any troubleshooting effort. With documentation in hand, a network administrator can choose a troubleshooting method, isolate the problem, and implement a solution.

Network Documentation List three types of documentation a network administrator should have to effectively troubleshoot issues. Configuration files Physical and logical topology diagrams Baseline performance measurements List at least four pieces of information that could be included in a network device’s configuration documentation. Type of device, model designation IOS image name Device network hostname Location of the device (building, floor, room, rack, panel) Module types and in which module slot they are located Data link layer addresses Network layer addresses List at least four pieces of information that could be included in an end system’s configuration documentation. Device name (purpose) Operating system and version MAC addresses IPv4 and IPv6 addresses Subnet mask and prefix length Default gateway, DNS server, and WINS server addresses Any high-bandwidth network applications that the end system runs In Table 18-1, indicate whether the feature is part of a physical topology document or logical topology document.

instructor.indb 224

3/12/14 7:51 AM

Chapter 18: Troubleshooting the Network

Table 18-1

225

Physical and Logical Topology Features

Feature

Physical Topology

Logical Topology

WAN technologies used

X

Interface identifiers

X

Connector type

X

Device identifiers or names

X

Cable specification

X

Operating system version

X

Cabling endpoints

X

Device type

X

Data-link protocols

X

DLCI for virtual circuits

X

Site-to-site VPNs

X

Static routes

X

Cable type and identifier

X

Routing protocols

X

Connection type

X

IP address and prefix lengths

X

Model and manufacturer

X

As you learned in Chapter 17, “Monitoring the Network,” the purpose of network monitoring is to watch network performance in comparison to a predetermined baseline. What is the minimum duration for capturing data to establish a baseline? 7 days When is the best time to establish a baseline of network performance? During the hours when the network is used the most In Table 18-2, indicate which statements describe benefits of establishing a network baseline. Table 18-2

Benefits of Establishing a Network Baseline

Statements

Benefit

Enable fast transport services between campuses Investigate if the network can meet the identified policies and use requirements

X X

Combine two hierarchical design layers

instructor.indb 225

Not a Benefit

X

Locate areas of the network that are most heavily used

X

Identify the parts of the network that are least used

X

Identify where the most errors occur

X

Establish the traffic patterns and loads for a normal or average day

X

3/12/14 7:51 AM

226

CCNA Routing and Switching Practice and Study Guide

When documenting the network, it is often necessary to gather information directly from routers and switches using a variety of show commands. Match the information gathered on the left with the show command on the right. Information Gathered

Command

a. Contents of the address resolution table

e. show ip route

b. Uptime and information about device soft-

a. show arp

ware and hardware c. Detailed settings and status for device inter-

faces d. Summary of the NetFlow accounting statistics e. Contents of the routing table f. Summarized table of the up/down status of all

device interfaces

g. show vlan f. show ip interface brief h. show running-config b. show version c. show interface d. show ip cache flow

g. Summary of VLANs and access ports on a

switch h. Current configuration of the device

instructor.indb 226

3/12/14 7:51 AM

Chapter 18: Troubleshooting the Network

Packet Tracer Activity

227

Packet Tracer - Troubleshooting Challenge - Documenting the Network (CN 9.1.1.8)

Troubleshooting Process and Methodologies All troubleshooting methodologies have four stages they share in common: three stages to find and solve the problem and a final important stage after the problem is resolved. In Figure 18-1, label the four major stages in the troubleshooting process. Figure 18-1

Major Troubleshooting Stages

Stage 1:

Stage 2:

Stage 3:

No

Yes

Problem Fixed?

If it did not fix the problem or if it created another problem, undo corrective action and start again.

Stage 4:

Figure 18-1a Major Troubleshooting Stages (answer)

Stage 1: Gather Symptoms

Stage 2: Isolate the Problem

Stage 3: Implement Corrective Action

No

If it did not fix the problem or if it created another problem, undo corrective action and start again.

instructor.indb 227

Problem Fixed?

Yes

Stage 4: Document solution and save changes.

3/12/14 7:51 AM

228

CCNA Routing and Switching Practice and Study Guide

Note: The Academy curriculum does not label the last stage as Stage 4. However, that is most likely an oversight. Stage 4 is indeed the final and arguably most important stage.

The gathering symptoms stage can be broken into five steps:

instructor.indb 228

Step 1.

Gather information

Step 2.

Determine ownership

Step 3.

Narrow the scope

Step 4.

Gather symptoms from suspect devices

Step 5.

Document symptoms

3/12/14 7:51 AM

Chapter 18: Troubleshooting the Network

229

In Step 1, you will most likely use a variety of commands to progress through the process of gathering symptoms. In the following activity, match the information gathered with the testing command. Information Gathered a. Displays a summary status of all the IP

Version 6 interfaces on a device b. Shows the path a packet takes through the

networks c. Displays the IP version 6 routing table d. Connects remotely to a device by IP address

or URL e. Offers a list of options for real-time diagnos-

tics

Testing Command h. show running-config e. debug ? b. traceroute a. show ipv6 interface brief f. show protocols c. show ipv6 route g. ping d. telnet

f. Shows global and interface specific status of

Layer 3 protocols g. Sends an echo request to an address and waits

for a reply h. Shows the current configuration of the device

instructor.indb 229

3/12/14 7:51 AM

230

CCNA Routing and Switching Practice and Study Guide

In Table 18-3, identify the troubleshooting methodology described by each statement. Table 18-3

Troubleshooting Methodologies

Statements

Disadvantage is it requires you to check every device and interface

Bottom Up

Top Down

Divide Conquer

Spot the Difference

Move the Problem

X

Begins at the OSI application layer

X

Use an experienced troubleshooting guess to investigate a possible cause

X

Used for problems that likely involve software settings

X

Compare a working and nonworking situation while looking for the significant differences

X

Use when suspected problem is cabling or device failure

X

Begins at the OSI physical layer

X

Swap the problematic device with a knownworking device

X

Start with an informed guess for which OSI layer to begin troubleshooting Disadvantage is it requires you to check every network application

Shoot from the Hip

X

X

Network Troubleshooting Effective troubleshooting requires good tools and systematic approaches. The section reviews some of the tools used in today’s networks and some specific troubleshooting symptoms at various OSI layers.

instructor.indb 230

3/12/14 7:51 AM

Chapter 18: Troubleshooting the Network

231

Troubleshooting Tools A wide variety of software and hardware tools is available to make troubleshooting easier. You can use these tools to gather and analyze symptoms of network problems. Match the description on the left with the tool on the right. Description a. Online repositories of experience-based infor-

mation b. Discovers VLAN configuration, average and

peak bandwidth utilization using a portable device c. Tools that document tasks, draw network

diagrams, and establish network performance statistics d. Measures electrical values of voltage, current,

and resistance e. Tests data communication cabling for broken

Software and Hardware Tools h. Host-based protocol analyzer e. Cable tester b. Portable network analyzer c. Baseline establishment tool j. Cable analyzer i. Network Management System Tool f. Cisco IOS Embedded Packet Capture a. Knowledge Base g. Network Analysis Module d. Digital multimeter

wires, crossed wiring, and shorted connections f. Powerful troubleshooting and tracing tool that

provides traffic tracking as it flows through a router g. Provides a graphical representation of traffic

from local and remote switches and routers h. Analyzes network traffic, specifically source

and destination frames i. Includes device-level monitoring, configura-

tion, and fault management j. Tests and certifies copper and fiber cables for

different services and standards via a handheld device

instructor.indb 231

3/12/14 7:51 AM

232

CCNA Routing and Switching Practice and Study Guide

Network Troubleshooting and IP Connectivity A network administrator should be able to quickly isolate the OSI layer where an issue is most likely located. In Table 18-4, indicate the most likely layer associated with each issue. Table 18-4

Isolating the OSI Layer Where an Issue Resides

Network Problems and Issues

OSI Layers 1

2

A computer is configured with the wrong default gateway.

3

4

X

The DNS server is not configured with the correct A records. Traffic is congested on a low capacity link and frames are lost.

X X

STP loops and route flapping are generating a broadcast storm. A cable was damaged during a recent equipment install.

X X

ACLs are misconfigured and blocking all web traffic.

X

SSH error messages display unknown/untrusted certificates. The show processes cpu command displays usage way beyond the baseline.

X X

A VPN connection is not working correctly across a NAT boundary.

X

A static route is sending packets to the wrong router.

X

The routing table is missing routes and has unknown networks listed.

X

On a PPP link, one side is using the default Cisco encapsulation. SNMP messages are unable to traverse NAT.

5, 6, and 7

X X

Knowing which command to use to gather the necessary information for troubleshooting is crucial to effectively and efficiently resolving problems. All the commands you have mastered over the course of your CCNA studies are part of your troubleshooting toolkit. This next exercise only highlights a few.

instructor.indb 232

3/12/14 7:51 AM

Chapter 18: Troubleshooting the Network

233

Match the command output on the left with the command on the right. Command Output a. Displays all known destinations on a Windows

PC b. Displays all known IPv6 destinations on a

router c. Can be used to verify the transport layer d. Clears the MAC to IP address table on a PC e. Displays the MAC to IP address table for other

IPv6 devices f. Displays the known MAC addresses on a

Command e. show ipv6 neighbors h. ipconfig b. show ipv6 route c. telnet f. show mac address-table d. arp -d a. route print g. show interfaces

switch g. Displays input and output queue drops h. Displays the IP addressing information on a

Windows PC

instructor.indb 233

3/12/14 7:51 AM

234

CCNA Routing and Switching Practice and Study Guide

Note: No book or study guide will effectively teach you how to troubleshoot networks. To get proficient at it, you must practice troubleshooting on lab equipment and simulators. This practice works best with a partner or a team because (1) you can collaborate together to resolve issues and (2) you can swap roles, taking turns breaking the network while the other person or team resolves the issue. For those readers with access to the Academy curriculum, the Packet Tracer activities in this chapter are great resources for just such practice sessions with your team. But you also know enough now that you can create your own troubleshooting scenarios to try out on each other. There is no doubt that you will be asked to troubleshoot several issues on the CCNA exam. So, practice as much as you can now in preparation for the test. You might be surprised how fun and rewarding it can be. Packet Tracer Activity

Packet Tracer - Troubleshooting Enterprise Networks 1 (CN 9.2.3.12) Packet Tracer - Troubleshooting Enterprise Networks 2 (CN 9.2.3.13) Packet Tracer - Troubleshooting Enterprise Networks 3 (CN 9.2.3.14) Packet Tracer - Troubleshooting Challenge - Using Documentation to Solve Issues (CN 9.2.3.15) Packet Tracer - CCNA Skills Integration Challenge (CN 9.3.1.2)

instructor.indb 234

3/12/14 7:51 AM

instructor.indb 235

3/12/14 7:51 AM

instructor.indb 236

3/12/14 7:51 AM

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF