24
HSRP The virtual MAC address of HSRP version 1 is 0000.0C07.ACxx, where xx is the HSRP group number in hexadecimal based on the respective interface. HSRP version 2 uses a virtual MAC address of 0000.0C9F.FXXX. Virtual MAC address can be configured manually. HSRP version 1 hello packets are sent to multicast address 224.0.0.2 while HSRP version 2 hello packets are sent to multicast address 224.0.0.102. Currently HSRPv1 is the default version when running HSRP on Cisco devices. Hello time = 3 sec Hold time = 10 sec HSRP consists of 5 states: State Description Initi al This is the beginning state. It indicates HSRP is not running. It happens when the configuration changes or the interface is first turned on Liste n The router knows both IP and MAC address of the virtual router but it is not the active or standby router. For example, if there are 3 routers in HSRP group, the router which is not in active or standby state will remain in listen state. Speak The router sends periodic HSRP hellos and participates in the election of the active or standby router. Stand by In this state, the router monitors hellos from the active router and it will take the active state when the current active router fails (no packets heard from active router) Activ e The router forwards packets that are sent to the HSRP group. The router also sends periodic hello messages Please notice that not all routers in a HSRP group go through all states above. In a HSRP group, only one router reaches active state and one router reaches standby state. Other routers will stop at listen state. + The group numbers of HSRP version 1 range from 0 to 255. HSRP does support group number of 0 (we do check it and in fact, it is the default group number if you don’t enter group number in the

Ccna notes

Embed Size (px)

Citation preview

Page 1: Ccna notes

HSRP

The virtual MAC address of HSRP version 1 is 0000.0C07.ACxx, where xx is the HSRP group number in hexadecimal based on the respective interface. HSRP version 2 uses a virtual MAC address of 0000.0C9F.FXXX. Virtual MAC address can be configured manually.

HSRP version 1 hello packets are sent to multicast address 224.0.0.2 while HSRP version 2 hello packets are sent to multicast address 224.0.0.102. Currently HSRPv1 is the default version when running HSRP on Cisco devices.

Hello time = 3 sec

Hold time = 10 sec

HSRP consists of 5 states:

State Description

Initial This is the beginning state. It indicates HSRP is not running. It happens when the configuration changes or the interface is first turned on

ListenThe router knows both IP and MAC address of the virtual router but it is not the active or standby router. For example, if there are 3 routers in HSRP group, the router which is not in active or standby state will remain in listen state.

Speak The router sends periodic HSRP hellos and participates in the election of the active or standby router.

Standby In this state, the router monitors hellos from the active router and it will take the active state when the current active router fails (no packets heard from active router)

Active The router forwards packets that are sent to the HSRP group. The router also sends periodic hello messages

Please notice that not all routers in a HSRP group go through all states above. In a HSRP group, only one router reaches active state and one router reaches standby state. Other routers will stop at listen state.

+ The group numbers of HSRP version 1 range from 0 to 255. HSRP does support group number of 0 (we do check it and in fact, it is the default group number if you don’t enter group number in the configuration) so HSRP version 1 supports up to 256 group numbers. HSRP version 2 supports 4096 group numbers.

With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IP address. There are two version of HSRP.

+ With HSRP version 1, the virtual router’s MAC address is 0000.0c07.ACxx , in which xx is the HSRP group.+ With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group.

Note: Another case is HSRP for IPv6, in which the MAC address range from 0005.73A0.0000 through 0005.73A0.0FFF.

Page 2: Ccna notes

GLBP

When the routers are configured to a GLBP group, they first elect one gateway to be the Active Virtual Gateway (AVG) for that group. The election is based on the priority of each gateway (highest priority wins). If all of them have the same priority then the gateway with the highest real IP address becomes the AVG. The AVG, in turn, assigns a virtual MAC address to each member of the GLBP group. Each gateway which is assigned a virtual MAC address is called Active Virtual Forwarder (AVF). A GLBP group only has a maximum of four AVFs. If there are more than 4 gateways in a GLBP group then the rest will become Standby Virtual Forwarder (SVF) which will take the place of a AVF in case of failure. The virtual MAC address in GLBP is 0007.b400.xxyy where xx is the GLBP group number and yy is the different number of each gateway (01, 02, 03…).

To detect a gateway failure, GLBP members communicate between each other through hello messages sent every 3 seconds to the multicast address 224.0.0.102, User Datagram Protocol (UDP) port 3222.

GLBP supports up to 1024 virtual routers (GLBP groups) per physical interface of a router.

Load balancing algorithm

GLBP load sharing is done in one of three ways:

Round-robin load-balancing algorithm: Each router MAC is used sequentially to respond to ARP requests. This is the default load balancing mode in GLBP and is suitable for any number of end hosts.Weighted load-balancing algorithm: Traffic is balanced proportional to a configured weight. Each GLBP router in the group will advertise its weighting and assignment; the AVG will act based on that value. For example, if there are two routers in a group and R1 has double the forwarding capacity of router B, the weighting value of router A should be configured to be double the amount of R2.Host-dependent load-balancing algorithm: A given host always uses the same router.

VRRP

Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group. Unlike HSRP which can track interface status directly, VRRP can only track interface status through a tracked object.

SNMP

SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.The SNMP framework has three parts:

Page 3: Ccna notes

+ An SNMP manager+ An SNMP agent+ A Management Information Base (MIB)

The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP. The most common managing system is called a Network Management System (NMS). The term NMS can be applied to either a dedicated device used for network management, or the applications used on such a device. A variety of network management applications are available for use with SNMP. These features range from simple command-line applications to feature-rich graphical user interfaces (such as the CiscoWorks2000 line of products).

The SNMP agent is the software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. The agent and MIB reside on the routing device (router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you must define the relationship between the manager and the agent.

The Management Information Base (MIB) is a virtual information storage area for network management information, which consists of collections of managed objects.

A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they’re unacknowledged so you don’t actually know if the remote application received your oh-so-important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.

Cisco IOS software supports the following versions of SNMP:

+ SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

+ SNMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the “c” stands for “community”) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

+ SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are as follows:

Page 4: Ccna notes

– Message integrity: Ensuring that a packet has not been tampered with in transit.– Authentication: Determining that the message is from a valid source.– Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source.

SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998.

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents.

NETFLOW

NetFlow traditionally enables several key customer applications including:

+ Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

Page 5: Ccna notes

+ Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.

What is an IP Flow?Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.IP Packet attributes used by NetFlow:+ IP source address+ IP destination address+ Source port+ Destination port+ Layer 3 protocol type+ Class of Service+ Router or switch interface

Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring process based on the key and nonkey fields in the record, which is configured for the flow monitor and stored in the flow monitor cache.For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters Flexible NetFlow flow monitor configuration mode:

Page 6: Ccna notes

Router(config)# flow monitor FLOW-MONITOR-1Router(config-flow-monitor)#

etFlow facilitates solutions to many common problems encountered by IT professionals.+ Analyze new applications and their network impactIdentify new application network loads such as VoIP or remote site additions.+ Reduction in peak WAN trafficUse NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network top talkers.+ Troubleshooting and understanding network pain pointsDiagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command line interface or reporting tools. + Detection of unauthorized WAN trafficAvoid costly upgrades by identifying the applications causing congestion. + Security and anomaly detectionNetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars.+ Validation of QoS parametersConfirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.

SYSLOG

By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.

Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename.

The Message Logging is divided into 8 levels as listed below:

Level Keyword Description

0 emergencies System is unusable

1 alerts Immediate action is needed

2 critical Critical conditions exist

3 errors Error conditions exist

Page 7: Ccna notes

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist

6 informational Informational messages

7 debugging Debugging messages

The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.

ETHER CHANNEL

EtherChannel Load-Balancing

EtherChannel load-balances traffic among port members of the same channel. Load balancing between member interface is based on:+ Source MAC address+ Destination MAC address+ Source IP Address+ Destination IP Address+ Combinations of the four

Note: Some old switch/router flatforms do not support all the load-balancing methods above.

To configure load-distribution method, use the command port-channel load-balance under global configuration mode. For example to load-balance based on destination MAC use the command:

Router(config)#port-channel load-balance dst-mac

BASIC QUESTIONS

Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).

The following locations can be configured as a source for the IOS image:+ Flash (the default location)

Page 8: Ccna notes

+ TFTP server+ ROM (used if no other source is found)

When you turn the router on, it runs through the following boot process.

The Power-On Self Test (POST) checks the router’s hardware. When the POST completes successfully, the System OK LED indicator comes on.The router checks the configuration register to identify where to load the IOS image from. A setting of 0×2102 means that the router will use information in the startup-config file to locate the IOS image. If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image:

1. Flash (the default location)2. TFTP server3. ROM (used if no other source is found)

The router loads the configuration file into RAM (which configures the router).

CISCO BOOT SECQUENCE

Page 9: Ccna notes

In some series of routers, the RAM information is displayed by 2 parameters (in this case 60416K/5120K). The first parameter indicates how much RAM is in the router while the second parameter (5120K) indicates how much DRAM is being used for Packet memory.

SWITCHING

Microsegmentation is a network design (functionality) where each workstation or device on a network gets its own dedicated segment (collision domain) to the switch. Each network device gets the full bandwidth of the segment and does not have to share the segment with other devices. Microsegmentation reduces and can even eliminate collisions because each segment is its own collision domain -> . Note: Microsegmentation decreases the number of collisions but it increases the number of collision domains.

TRUNKING

The show vlan command only displays access ports, the trunk ports are not shown in this command (we can use the “show interface trunk” command to see trunked ports)

STP

Spanning Tree Protocol convergence (Layer 2 convergence) happens when bridges and switches have transitioned to either the forwarding or blocking state. When layer 2 is converged, root bridge is elected and all port roles (Root, Designated and Non-Designated) in all switches are selected.

RSTP

There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into the 802.1w discarding state.

Page 10: Ccna notes

* Discarding – the port does not forward frames, process received frames, or learn MAC addresses – but it does listen for BPDUs (like the STP blocking state)* Learning – receives and transmits BPDUs and learns MAC addresses but does not yet forward frames (same as STP).* Forwarding – receives and sends data, normal operation, learns MAC address, receives and transmits BPDUs (same as STP).

STP State (802.1d) RSTP State (802.1w)

Blocking Discarding

Listening Discarding

Learning Learning

Forwarding Forwarding

Disabled Discarding

Although the learning state is also used in RSTP but it only takes place for a short time as compared to STP. RSTP converges with all ports either in forwarding state or discarding state.

RSTP Quick Summary:

RSTP provides faster convergence than 802.1D STP when topology changes occur.* RSTP defines three port states: discarding, learning, and forwarding.* RSTP defines five port roles: root, designated, alternate, backup, and disabled.

NAT

NAT terms:

* Inside local address – The IP address assigned to a host on the inside network. The address is usually not an IP address assigned by the Internet Network Information Center (InterNIC) or service provider. This address is likely to be an RFC 1918 private address. * Inside global address – A legitimate IP address assigned by the InterNIC or service provider that represents one or more inside local IP addresses to the outside world. * Outside local address – The IP address of an outside host as it is known to the hosts on the inside network. * Outside global address – The IP address assigned to a host on the outside network. The owner of the host assigns this address.

Page 11: Ccna notes

VLAN

When a switch cannot find a destination MAC address listed on its MAC Address Table, it will flood a frame to every single port except the one it came in from – this frame is called unknown unicast frame. It’s a broadcast mac address FF:FF:FF:FF:FF:FF

FRAME RELAY

The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses:

+ ACTIVE: the PVC is operational and can transmit data+ INACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not available+ DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch+ STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen so it is ignored in some books.

In general, BECN is used on frames traveling away from the congested area to warn source devices that congestion has occurred on that path while FECN is used to alert receiving devices if the frame experiences congestion.

Page 12: Ccna notes

BECN also informs the transmitting devices to slow down the traffic a bit until the network returns to normal state.

IP ROUTING

When there is more than one way to reach a destination, it will choose the best one based on a couple of things. First, it will choose the route that has the longest match; meaning the most specific route. So, in this case the /24 routes will be chosen over the /16 routes. Next, from all the /24 routes it will choose the one with the lowest administrative distance. Directly connected routes have an AD of 1 so this will be the route chosen.

Routers treatment with incoming packet

Whereas switches can only examine and forward packets based on the contents of the MAC header, routers can look further into the packet to discover the network for which a packet is destined. Routers make forwarding decisions based on the packet's network-layer header (such as an IPX header or IP header). These network-layer headers contain source and destination network addresses. Local devices address packets to the router's MAC address in the MAC header. After receiving the packets, the router must perform the following steps:

1. Check the incoming packet for corruption, and remove the MAC header . The router checks the packet for MAC-layer errors. The router then strips off the MAC header and examines the network- layer header to determine what to do with the packet.

2. Examine the age of the packet. The router must ensure that the packet has not come too far to be forwarded. For example, IPX headers contain a hop count. By default, 15 hops is the maximum number of hops (or routers) that a packet can cross. If a packet has a hop count of 15, the router discards the packet. IP headers contain a Time to Live (TTL) value. Unlike the IPX hop count, which increments as the packet is forwarded through each router, the IP TTL value decrements as the IP packet is forwarded through each router. If an IP packet has a TTL value of 1, the router discards the packet. A router cannot decrement the TTL value to 1 and then forward the packet.

3. Determine the route to the destination. Routers maintain a routing table that lists available networks, the direction to the desired network (the outgoing interface number), and the distance to those networks. After determining which direction to forward the packet, the router must build a new header. (If you want to read the IP routing tables on a Windows 95/98 workstation, type ROUTE PRINT in the DOS box.)

4. Build the new MAC header and forward the packet. Finally, the router builds a new MAC header for the packet. The MAC header includes the router's MAC address and the final destination's MAC address or the MAC address of the next router in the path.

Page 13: Ccna notes

Syntax for default route is:

ip route <Remote_Network> <Netmask> <Next_Hop_Address>.

DHCP

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

OSPF

In ospf these entries must match on neighboring routers:

- Hello and dead intervals– Area ID (Area 0 in this case)– Authentication password– Stub area flag

Page 14: Ccna notes

EIGRP

The following information must be matched so as to create neighborhood. EIGRP routers to establish, must match the following information:

1. AS Number;

2. K value.

TROUBLESHOOTING

From the output we see the Serial0/0 of RouterA is in “status up/protocol down” state which indicates a Layer 2 problem so the problem can be:

+ Keepalives mismatch+ Encapsulation mismatch+ Clocking problem

IPv6

Below is the list of common kinds of IPv6 addresses:

Loopback address ::1

Link-local address FE80::/10

Site-local address FEC0::/10

Global address 2000::/3

Multicast address FF00::/8

Page 15: Ccna notes
Page 16: Ccna notes

Question 5

What is SNMPv3 authentication protocol?

Answer: HMAC-MD5 or HMAC-SHA (Maybe either of them will appear in the exam)

Question 1

Etherchannel question: You are given sw1 and sw2. The output of show etherchannel summary and show interface fa0/1. What is the cause of the problem? in exhibit, switch a cable is 100mb/s speed and b is 10mb/s. If you can look very carefully, there is speed mismatched to cause that problem. I selected “speed mismatch”

Question 2

Q2 (Etherchannel Questions that goes like this)Refer to the exhibit. Etherchannel has been configured on Switch1 as shown.

Switch1# conf tSwitch1(config)# interface range gigabitethernet 1/1Switch1(config)# Channel-group 5 Mode “AUTO”Switch1#Switch1(config)# interface range gigabitethernet 1/2Switch1(config)# Channel-group 5 Mode “AUTO”

Which is the correct command set to configure etherchannel on Switch2?

A.Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode auto

B.Switch2# configure terminalSwitch2(config)# interface range gigabitethemet3/1 -2Switch2(config-if)# channel-group 5 mode passive

C.Switch2# configure terminal

Page 17: Ccna notes

Switch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode desirable

D.Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode ACTIVE

 

Answer: C

Good resource: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_13_ea1/configuration/guide/swethchl.html#wp1028480

Question 3

Which OSPF command turn OSPF on all interfaces of a router?

Answer: network 0.0.0.0 255.255.255.255

Question 4

Network admin creates a layer 3 Etherchannel, bounding 4 interfaces into channel group 1. On what interface is the IP address configured?

A. the port-channel 1 interface

B. the highest number member interface

C. all member interfaces

D. the lowest number member interface

 

Answer: A

Question 5

3. What is the authentication type of SNMPv2?

Answer: Community string

Question 6

What parameters can be different on ports with an Etherchannel?

A. speedB. trunk encapsulation

Page 18: Ccna notes

C. DTP negotiation settingD. duplex

 

Answer: C

Question 7

Which is true about OSPF router-id? (Choose two)

A. It is used for type 1 router LSA B. Highest IP address of the loopback is usedC. router-id needs to be matched on ospf neighborsD. router-id is 16 bit

 

Answer: A B

Page 19: Ccna notes

www.9tut.com

CCNA DUPMS