尊æ•Ŧįš„ 垎äŋĄæą‡įŽ‡īŧš1円 ≈ 0.046166 元 支äģ˜åŽæą‡įŽ‡īŧš1円 ≈ 0.046257元 [退å‡ēį™ģåŊ•]
SlideShare a Scribd company logo
1
Distance Vector
Link State
Hybrid
Distance Vector vs. Link State
Route table
Topology
Incremental Update
Periodic UpdateRouting by rumor
A B C D
X
E
2
Distance Vector vs. Link State
Distance Vector
â€ĸ Updates frequently
â€ĸ Each router is
"aware" only of its
immediate neighbors
â€ĸ Slow convergence
â€ĸ Prone to routing loops
â€ĸ Easy to configure
Link State
â€ĸ Updates are event
triggered
â€ĸ Each router is
"aware" of all other
routers in the "area"
â€ĸ Fast convergence
â€ĸ Less subject to
routing loops
â€ĸ More difficult to
configure
3
Comparison Continued
Distance Vector
â€ĸ Fewer router resources
required
â€ĸ Updates require more
bandwidth
â€ĸ Does not "understand"
the topology of the
network
Link State
â€ĸ More router resource
intensive
â€ĸ Updates require less
bandwidth
â€ĸ Has detailed knowledge
of distant networks and
routers
5
Link State
īąExample
īƒ˜OSPF
īƒ˜IS-IS
īąOSPF is used for corporate networks
īąIS-IS is used for ISP’s
6
7
Open Shortest Path First (OSPF)
īƒ˜ OSPF is an open standards routing protocol
īƒ˜ This works by using the Dijkstra algorithm
īƒ˜ OSPF provides the following features:
īƒ˜Minimizes routing update traffic
īƒ˜Allows scalability (e.g. RIP is limited to 15 hops)
īƒ˜Has unlimited hop count
īƒ˜Supports VLSM/CIDR
īƒ˜Allows multi-vendor deployment (open standard)
8
Link State
īąThere are two types of Packets
īąHello
īąLSA’s
9
OSPF Hello
â€ĸ When router A starts it send Hello packet – uses 224.0.0.5
â€ĸ Hello packets are received by all neighbors
â€ĸ B will write A’s name in its neighbor table
â€ĸ C also process the same way
A
B C
10
"Hello" Packets
â€ĸ Small frequently issued packets
â€ĸ Discover neighbours and negotiate "adjacencies"
â€ĸ Verify continued availability of adjacent neighbours
â€ĸ Hello packets and Link State Advertisements (LSAs) build
and maintain the topological database
â€ĸ Hello packets are addressed to 224.0.0.5.
11
Link State Advertisement
(LSA)
īƒ˜An OSPF data packet containing link state and routing
information that is shared among OSPF routers
īƒ˜LSAs are shared only with routers with whom it has
formed adjacencies
īƒ˜LSA packets are used to update and maintain the
topology database.
12
Link State
īąThere are three type of tables
īąNeighbor
īąTopology
īąRouting
13
Tables
īą Neighbor
īąContain information about the neighbors
īąNeighbor is a router which shares a link on same
network
īąAnother relationship is adjacency
īąNot necessarily all neighbors
īąLSA updates are only when adjacency is established
14
Tables
īą Topology
īąContain information about all network and path to
reach any network
īąAll LSA’s are entered in to topology table
īąWhen topology changes LSA’s are generated and send
new LSA’s
īąOn topology table an algorithm is run to create a
shortest path, this algorithm is known as SPF or
dijkstra algorithm
15
Tables
īą Routing Table
īąAlso knows as forwarding database
īąGenerated when an algorithm is run on the topology
database
īąRouting table for each router is unique
16
OSPF Terms
īąLink
īąRouter ID
īąNeighbours
īąAdjacency
īąOSPF Area
īąBackbone area
īąInternal routers
īąArea Border Router
(ABR)
īąAutonomous System
Boundary Router
(ASBR)
17
Link
īƒ˜ A network or router interface assigned to a
given network
īƒ˜ Link (interface) will have "state" information
associated with it
īļStatus (up or down)
īļIP Address
īļNetwork type (e.g. Fast Ethernet)
īļBandwidth
īļAddresses of other routers attached to this
interface
18
OSPF Term: Link
īƒ˜A link is a network or router interface assigned to any given
network
īƒ˜This link, or interface, will have state information associated
with it (up or down) as well as one or more IP addresses
19
OSPF Term: Link State
īƒ˜Status of a link between two routers
īƒ˜Information is shared between directly connected routers.
īƒ˜This information propagates throughout the network unchanged and
is also used to create a shortest path first (SPF) tree.
20
Router ID
īą The Router ID (RID) is an IP address used to identify the router
īą Cisco chooses the Router ID by using the highest IP address of all
configured loopback interfaces
īą If no loopback interfaces are configured with addresses, OSPF will
choose the highest IP address of all active physical interfaces.
īą You can manually assign the router ID.
īą The RID interface MUST always be up, therefore loopbacks are
preferred
21
Neighbours
īƒ˜Neighbours are two or more routers that
have an interface on a common network
īƒ˜E.g. two routers connected on a serial link
īƒ˜E.g. several routers connected on a common
Ethernet or Frame relay network
īƒ˜Communication takes place between /
among neighbours
īƒ˜neighbours form "adjacencies"
22
Adjacency
īƒ˜A relationship between two routers that
permits the direct exchange of route
updates
īƒ˜Not all neighbours will form adjacencies
īƒ˜This is done for reasons of efficiency – more
later
23
OSPF Design
īļEach router connects to the backbone called area 0, or the backbone area.
īļRouters that connect other areas to the backbone within an AS are called Area Border Routers (ABRs). One
interface must be in area 0.
īļOSPF runs inside an autonomous system, but can also connect multiple autonomous systems together. The
router that connects these ASes together is called an Autonomous System Boundary Router (ASBR).
24
OSPF Areas
īƒ˜ An OSPF area is a grouping of contiguous networks and
routers
īƒ˜Share a common area ID
īƒ˜ A router can be a member of more than one area (area
border router)
īƒ˜ All routers in the same area have the same topology
database
īƒ˜ When multiple areas exist, there must always be an area
0 (the backbone) to which other areas connect
25
Why areas?
īƒ˜ Decreases routing overhead
īļCompare to multiple smaller broadcast domains
instead of one large one
īƒ˜ Speeds convergence
īƒ˜ Confines network instability (e.g. route "flapping") to
single area of the network
īƒ˜ Adds considerably to the complexity of setting up OSPF
īļCCNA certification deals only with single-area OSPF
26
Area Terminology
27
LSA’s in Area
â€ĸ LSAs communicate with adjacent routers in the same
OSPF area
â€ĸ Subsequently, a change in a link state is "flooded" to all
area routers via LSAs
â€ĸ In larger networks, multiple areas may be created
– LSAs are sent only to adjacent routers in the same
area
– "Area border routers" connect areas, passing
summarized route information between
28
Path Calculation
īą Changes to the topological database of a router trigger a
recalculation to re-establish the best route(s) to known
networks
īƒ˜Uses the SPF (shortest path first) algorithm developed
by a computer scientist named Dijkstra
īƒ˜This is done by each individual router using its
detailed "knowledge" of the whole network
īƒ˜Leads to rapid and accurate convergence
īƒ˜Based on detailed knowledge of every link in the area
and the OSPF "cost" of each
īƒ˜builds an OSPF tree with itself at the route
29
Terminology: Cost
â€ĸ Various criteria can be selected by
the administrator to determine the
metric
â€ĸ Usually,
OSPF cost=108/bandwidth
Do not forget to
configure the
bandwidth`
command on serial
links to ensure
correct
default OSPF cost
30
Pros and Cons
īą Note that OSPF is a more sophisticated routing protocol
īƒ˜Converges rapidly and accurately
īƒ˜Can use a metric calculation that effectively selects
the "best" route(s) primarily based on bandwidth,
although an OSPF cost can be administratively
assigned
īą Use of OSPF requires
īƒ˜More powerful routing hardware
īƒ˜More detailed knowledge by the administrator,
especially when large multi-area networks are used
31
Types of Neighbors
â€ĸ OSPF can be defined for three type of neighbors
– Broadcast Multi Access (BMA) ex- Ethernet
– Point to Point
– Non-Broadcast Multi Access (NBMA)
32
OSPF Network Types
33
Adjacencies
īą Point to Point all routers form adjacencies
īą BMA & NBMA one router is elected as DR
īą DR establish adjacency with every neighbor router
īą LSA updates are exchanged only to DR
īą DR is the router which has highest priority
īą All CISCO routers has priority 1
īą If priority is same then router id is seen
īą The RID is highest IP address of all interfaces
34
Point-to-Point Links
īƒ˜ Usually a serial interface running either PPP
or HDLC
īƒ˜No DR or BDR election required
īƒ˜ OSPF autodetects this interface type
īƒ˜ OSPF packets are sent using multicast 224.0.0.5
īƒ˜All routers form adjacencies
35
Multi-access Broadcast Network
â€ĸ Generally LAN technologies like Ethernet and Token Ring
â€ĸ DR and BDR selection required
â€ĸ All neighbor routers form full adjacencies with the DR and
BDR only
â€ĸ Packets to the DR use 224.0.0.6
â€ĸ Packets from DR to all other routers use 224.0.0.5
36
Electing the DR and BDR
īƒ˜ Hello packets are exchanged via IP multicast.
īƒ˜ The router with the highest priority is
selected as the DR.
īƒ˜If Priority is same then Router ID is seen
īƒ˜ Use the OSPF router ID as the tie breaker.
37
Terminology: DRs and BDRs
īą The
designated
router (DR) is
responsible for
generating
LSAs on
behalf of all
routers
connected to
the same
segment
38
DR Responsibility
īƒ˜ When a router sees a new or changed link-state, it sends
an LSA to its DR using a particular multicast address
īƒ˜ The DR then forwards the LSA to all the other routers
with whom it is adjacent
īƒ˜Minimizes the number of formal adjacencies that
must be formed and therefore the amount of LSU
(link state update) packet traffic in a multi-router
network
39
OSPF Summary
īą AD -100
īą Hop count is unlimited
īą Metric = Cost – 108/BW
īą Classless, VLSM
īą Load balance up to SIX routers
īą Require more processing power
40
Basic OSPF Configuration
Router(config)# router ospf 1
īą The number 1 in this example is a process-id # that
begins an OSPF process in the router
īƒ˜More than one process can be launched in a router,
but this is rarely necessary
īƒ˜Usually the same process-id is used throughout the
entire network, but this is not required
īƒ˜The process-id # can actually be any value from 1 to
"very large integer“
īƒ˜The process-id # cannot be ZERO
īƒ˜This is NOT the same as the AS# used in IGRP and
EIGRP
41
Configuring OSPF Areas
īą After identifying the OSPF process, you need to identify the interfaces that
you want to activate OSPF communications
Lab_A#config t
Lab_A(config)#router ospf 1
Lab_A(config-router)#network 10.0.0.0 0.255.255.255
area ?
<0-4294967295> OSPF area ID as a decimal value
A.B.C.D OSPF area ID in IP address format
Lab_A(config-router)#network 10.0.0.0 0.255.255.255
area 0
â€ĸ Every OSPF network must have an area 0 (the backbone area) to which
other areas connect
īƒ˜ So in a multiple area network, there must be an area 0
īƒ˜ The wildcard mask represents the set of hosts supported by the
network and is really just the inverse of the subnet mask.
42
OSPF Configuration
â€ĸ OSPF Process ID number is irrelevant. It can be the same on every
router on the network
â€ĸ The arguments of the network command are the network number
(10.0.0.0) and the wildcard mask (0.255.255.255)
â€ĸ Wildcards - A 0 octet in the wildcard mask indicates that the
corresponding octet in the network must match exactly
â€ĸ A 255 indicates that you don’t care what the corresponding octet is
in the network number
â€ĸ A network and wildcard mask combination of 1.1.1.1 0.0.0.0 would
match 1.1.1.1 only, and nothing else.
â€ĸ The network and wildcard mask combination of 1.1.0.0 0.0.255.255
would match anything in the range 1.1.0.0–1.1.255.255
43
OSPF Configuration -1
R2
R1 R3
S0 S1
E0
S0
E0
S0
10.0.0.1
20.0.0.1
20.0.0.2 30.0.0.1
30.0.0.2 40.0.0.1
10.0.0.2
40.0.0.2
A B
44
OSPF Configuration -1
R2
R1 R3
S0 S1
E0
S0
E0
S0
10.0.0.1 20.0.0.1
20.0.0.2 30.0.0.1
30.0.0.2 40.0.0.1
10.0.0.2
40.0.0.2
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#router ospf 1
R1(config-router)#network 10.0.0.0 0.255.255.255 area 0
R1(config-router)#network 20.0.0.0 0.255.255.255 area 0
R1(config-router)#^Z
A B
45
OSPF Configuration -2
R2
R1 R3
S0 S1
E0
S0
E0
S0
200.0.0.16/28
200.0.0.8/30
200.0.0.12/30
200.0.0.32/27
A B
46
OSPF Configuration -2
R2
R1 R3
S0 S1
E0
S0
E0
S0
200.0.0.17
200.0.0.9
200.0.0.10 200.0.0.13
200.0.0.14 200.0.0.33
200.0.0.18 200.0.0.34255.255.255.240
255.255.255.252 255.255.255.252
255.255.255.224
A B
47
OSPF Configuration -2
R2
R1 R3
S0 S1
E0
S0
E0
S0
200.0.0.17
200.0.0.9
200.0.0.10 200.0.0.13
200.0.0.14 200.0.0.33
200.0.0.18 200.0.0.34255.255.255.240
255.255.255.252 255.255.255.252
255.255.255.224
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#router ospf 1
R1(config-router)#network 200.0.0.16 0.0.0.15 area 0
R1(config-router)#network 200.0.0. 8 0.0.0.3 area 0
R1(config-router)#^Z
A B
R3#config t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#router ospf 1
R3(config-router)#network 200.0.0. 32 0.0.0.31 area 0
R3(config-router)#network 200.0.0. 12 0.0.0.3 area 0
R3(config-router)#^Z
48
OSPF and Loopback Interfaces
īƒ˜ Configuring loopback interfaces when using the OSPF routing
protocol is important
īƒ˜ Cisco suggests using them whenever you configure OSPF on a
router
īƒ˜ Loopback interfaces are logical interfaces, which are virtual,
software-only interfaces; they are not real router interfaces
īƒ˜ Using loopback interfaces with your OSPF configuration ensures that
an interface is always active for OSPF processes.
īƒ˜ The highest IP address on a router will become that router’s RID
īƒ˜ The RID is used to advertise the routes as well as elect the DR and
BDR.
īƒ˜ If you configure serial interface of your router with highest IP
Address this Address becomes RID of t is the RID of the router
because e router
īƒ˜ If this interface goes down, then a re-election must occur
īƒ˜ It can have an big impact when the above link is flapping
49
Configuring Loopback Interfaces
R1#config t
Enter configuration commands, one per line. End
with CNTL/Z.
R1(config)#int loopback 0
R1(config-if)#ip address 172.16.10.1
255.255.255.255
R1(config-if)#no shut
R1(config-if)#^Z
R1#
50
show ip protocols
Router#
â€ĸ Verifies the configured IP routing protocol
processes, parameters and statistics
Verifying OSPF Operation
show ip route ospf
Router#
â€ĸ Displays all OSPF routes learned by the router
show ip ospf interface
Router#
â€ĸ Displays the OSPF router ID, area ID and
adjacency information
51
show ip ospf
Router#
â€ĸ Displays the OSPF router ID, timers, and statistics
Verifying OSPF Operation
(Cont.)
show ip ospf neighbor [detail]
Router#
â€ĸ Displays information about the OSPF neighbors,
including Designated Router (DR) and Backup
Designated Router (BDR) information on
broadcast networks
52
The show ip route ospf
Command
RouterA# show ip route ospf
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile,
B - BGP, D - EIGRP, EX - EIGRP external, O - OSPF,
IA - OSPF inter area, E1 - OSPF external type 1,
E2 - OSPF external type 2, E - EGP, i - IS-IS, L1 - IS-IS
level-1, L2 - IS-IS level-2, * - candidate default
Gateway of last resort is not set
10.0.0.0 255.255.255.0 is subnetted, 2 subnets
O 10.2.1.0 [110/10] via 10.64.0.2, 00:00:50, Ethernet0
53
The show ip ospf interface
Command
RouterA# show ip ospf interface e0
Ethernet0 is up, line protocol is up
Internet Address 10.64.0.1/24, Area 0
Process ID 1, Router ID 10.64.0.1, Network Type BROADCAST, Cost: 10
Transmit Delay is 1 sec, State DROTHER, Priority 1
Designated Router (ID) 10.64.0.2, Interface address 10.64.0.2
Backup Designated router (ID) 10.64.0.1, Interface address 10.64.0.1
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:04
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with neighbor 10.64.0.2 (Designated Router)
Suppress hello for 0 neighbor(s)
54
The show ip ospf neighbor
Command
RouterB# show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
10.64.1.1 1 FULL/BDR 00:00:31 10.64.1.1 Ethernet0
10.2.1.1 1 FULL/- 00:00:38 10.2.1.1 Serial0
55
show ip ospf neighbor detail
show ip ospf database
56
Setting Priority for DR Election
ip ospf priority number
īƒ˜This interface configuration command assigns the OSPF
priority to an interface.
īƒ˜Different interfaces on a router may be assigned different
values.
īƒ˜The default priority is 1. The range is from 0 to 255.
īƒ˜0 means the router is a DROTHER; it can’t be the DR or
BDR.
Router(config-if)#
57
58
EIGRP
â€ĸ IGRP
– DV
– Easy to configure
– Neighbor
– Advanced Metric
– Periodic
– Broadcast
â€ĸ OSPF
– LS
– Incremental Updates
– Multicast
– Open Standard
â€ĸ EIGRP
– Hybrid
– DUAL
– Topology Database
– Rapid Convergence
– Reliable
59
Overview
īƒ˜Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-
proprietary routing protocol based on Interior Gateway Routing Protocol
(IGRP).
īƒ˜Released in 1994, Unlike IGRP, which is a classful routing protocol,
EIGRP supports CIDR and VLSM.
īƒ˜ it is probably one of the two most popular routing protocols in use
today.
īƒ˜Compared to IGRP, EIGRP boasts faster convergence times, improved
scalability, and superior handling of routing loops.
īƒ˜EIGRP is often described as a hybrid routing protocol, offering the
best of distance vector and link-state algorithms.
60
Comparing EIGRP with IGRP
īƒ˜IGRP and EIGRP are compatible with each other.
īƒ˜EIGRP offers multiprotocol support, but IGRP does not.
īƒ˜Communication via Reliable Transport Protocol (RTP)
īƒ˜Best path selection via Diffusing Update Algorithm (DUAL)
īƒ˜Improved convergence time
īƒ˜Reduced network overhead
Introducing EIGRP
EIGRP supports:
īąRapid convergence
īąReduced bandwidth usage
īąMultiple network-layer protocols
62
EIGRP Tables
â€ĸ EIGRP maintains 3 tables
– Neighbor table
– Topology table
– Routing table
63
Neighbor Discovery
īƒ˜There are three conditions that must be
met for neighborship establishment
īļHello or ACK received
īļAS numbers match
īļIdentical metrics (K values)
? AS
? K
K1 – BW
K2- Delay
K3-Load
K3-Reliability
K5-MTU
64
īą The metrics used by EIGRP in making routing decisions are (lower the metric the
better):
īą bandwidth
īą delay
īą load
īą Reliability
īą MTU
īą By default, EIGRP uses only:
īą Bandwidth
īą Delay
Analogies:
Think of bandwidth as the width of the pipe
and
delay as the length of the pipe.
īą Bandwidth is the carrying capacity
īą Delay is the end-to-end travel time.
Metric Calculation
65
Neighbor Table
īƒ˜ The neighbor table is the most important table in EIGRP
īƒ˜ Stores address and interface of neighbor
66
Topology Table
Network
67
Topology Table
īƒ˜The topology table is made up of all the EIGRP routing tables in the
autonomous system.
īƒ˜DUAL takes the information and calculates the lowest cost routes to each
destination.
īƒ˜By tracking this information, EIGRP routers can identify and switch to
alternate routes quickly.
īƒ˜The information that the router learns from the DUAL is used to determine
the successor route, which is the term used to identify the primary or best
route.
īƒ˜Every EIGRP router maintains a topology table. All learned routes to a
destination are maintained in the topology table.
68
Routing Tables
īƒ˜ A successor is a route selected as the primary route to
use to reach a destination.
īƒ˜ DUAL calculates Successor (Primary Route) and places it
in the routing table (and topology table)
īƒ˜ Can have up to 4 successors of equal or unequal value
īƒ˜ DUAL calculates Feasible Successor (Backup Route) and
places it in the Topology Table.
īƒ˜ Promoted to successor if the route goes down if it has a
lower cost than current successor
īƒ˜ If no FS in Table - Send query
īƒ˜ Multiple feasible successors for a destination can be
retained in the topology table although it is not
mandatory
69
EIGRP Concepts & Terminology
īą EIGRP routers that belong to different autonomous
systems (ASes) don’t automatically share routing
information
īą The only time EIGRP advertises its entire routing table is
when it discovers a new neighbor and forms an
adjacency with it through the exchange of Hello packets
īą When this happens, both neighbors advertise their entire
routing tables to one another
īą After each has learned its neighbor’s routes, only
changes to the routing table are propagated
70
172.16.100.0
1.544Mbps
56Kbps
1.544Mbps
Dist to 172.16.100.0 =100Dist to 172.16.100.0 =100
Dist to 172.16.100.0 =350
10Mbps
10Mbps – 100
1,544Mbps – 250
56Kbps -1000
īąChennai receives an update from Mumbai with a cost of 100, which is Mumbai's cost to reach 172.16.100.0, This
cost is referred to as the reported distance (RD)
īąBangalore will report its cost to reach 172.16.100.0. Bangalore's RD is 350
īąChennai will compute its cost to reach 172.16.100.0 via Mumbai and Bangalore and compare the metrics for the
two paths
īąChennai's cost via Mumbai is 1100. Chennai's cost via Bangalore is 600. The lowest cost to reach a destination is
referred to as the feasible distance (FD) for that destination
īąChennai's FD to 172.16.100.0 is 600. The next-hop router in the lowest-cost path to the destination is referred to
as the successor.
īąA feasible successor is a path whose reported distance is less than the feasible distance, and it is considered a
backup route.
71
EIGRP Terms
īą Feasible distance (FD) - This is the lowest calculated metric to
reach destination. This is the route that you will find in the
routing table, because it is considered the best path
īą Reported distance (RD) - The distance reported by an
adjacent neighbor to a specific destination.
īą Interface information - The interface through which the
destination can be reached.
īą Route status - The status of a route. Routes are identified as
being either passive, which means that the route is stable and
ready for use, or active, which means that the route is in the
process of being recomputed by DUAL
72
īą Successor – Current Route
īļ A successor is a route selected as the primary route to use to reach
a destination.
īļ Successors are the entries kept in the routing table.
īą Feasible Successor - A backup route
īļ A feasible successor is a backup route.
īļ These routes are selected at the same time the successors are
identified, but they are kept in the topology table.
īļ Multiple feasible successors for a destination can be retained in the
topology table.
EIGRP Terminology and
Operations
73
Reliable Transport Protocol (RTP)
īą Used by EIGRP for its routing updates in place of TCP
īą EIGRP can call on RTP to provide reliable or unreliable service
ī‚§ EIGRP uses reliable service for route updates
ī‚§ Unreliable for Hellos
īą Reliable Transport Protocol (RTP) is a transport layer protocol that
guarantees ordered delivery of EIGRP packets to all neighbors.
īą On an IP network, hosts use TCP to sequence packets and ensure
their timely delivery. RIP uses UDP
īą However, EIGRP is protocol-independent and does not rely on TCP/IP
to exchange routing information the way that RIP, IGRP, and OSPF
do.
īą EIGRP uses RTP as its own proprietary transport layer protocol to
guarantee delivery of routing information.
īą With RTP, EIGRP can multicast and unicast to different peers
simultaneously.
74
Diffusing Update Algorithm
(DUAL)
īą All route computations in EIGRP are handled by DUAL
īą One of DUAL's tasks is maintaining a table of loop-free paths to
every destination.
īą This table is referred to as the topology table
īą DUAL saves all paths in the topology table
īą The least-cost path(s) is copied from the topology table to the
routing table
īą In the event of a failure, the topology table allows for very quick
convergence if another loop-free path is available
īą If a loop-free path is not found in the topology table, a route
recomputation must occur
īą DUAL queries its neighbors, who, in turn, may query their
neighbors, and so on...
īą Hence the name "Diffusing" Update Algorithm
75
VLSM Support
â€ĸ EIGRP supports the use of Variable- Length Subnet
Masks
â€ĸ Can use 30-bit subnet masks for point-to-point networks
â€ĸ Because the subnet mask is propagated with every route
update, EIGRP also supports the use of discontiguous
subnets
â€ĸ Discontiguous network is the one that has two or more
subnetworks of a classful network connected together by
different classful networks
76
Discontiguous Network
Configuring EIGRP
Router(config-router)#network network-number
â€ĸ Selects participating attached networks
Router(config)#router eigrp autonomous-system
â€ĸ Defines EIGRP as the IP routing protocol
EIGRP Configuration Example
80
EIGRP Configuration
R2
R1 R3
S0 S1
E0
S0
E0
S0
200.0.0.17
200.0.0.9
200.0.0.10 200.0.0.13
200.0.0.14 200.0.0.33
200.0.0.18 200.0.0.34255.255.255.240
255.255.255.252 255.255.255.252
255.255.255.224
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#router eigrp 10
R1(config-router)#network 200.0.0.16
R1(config-router)#network 200.0.0. 8
R1(config-router)#^Z
A B
R3#config t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#router eigrp 10
R3(config-router)#network 200.0.0. 32
R3(config-router)#network 200.0.0. 12
R3(config-router)#^Z
81
Verifying the EIGRP Configuration
To verify the EIGRP configuration a number of show
and debug commands are available.
These commands are shown on the next few slides.
82
show ip eigrp topology
show ip eigrp topology
[active | pending | successors]
83
show ip eigrp topology
all-links
show ip eigrp traffic
84
Administrative Distances
85
TELNET
īą Getting information about remote device
īą Can connect to remote device and configure a device
īą Password must be set
R1(config)# line vty 0 4
Password cisco
login
86
Š 2002, Cisco Systems, Inc. All rights reserved. 86
Discovering Neighbors on the
Network
Cisco Discovery Protocol
īąCDP is a proprietary utility that gives you a summary of directly
connected switches, routers, and other Cisco devices.
īąCDP discovers neighboring devices regardless of which protocol
suite they are running.
īąRuns on the Data link layer
īąPhysical media must support the Subnetwork Access Protocol
(SNAP) encapsulation.
īąOnly give directly connected device
īąBy default enabled, you can enable or disable
Discovering Neighbors with
CDP
īąCDP runs on routers with Cisco IOSÂŽ
software Release 10.3 or later and on Cisco
switches.
īąShow CDP ?
īąSummary information
includes:
ī‚§ Device ID
ī‚§ Local Interface
ī‚§ Port ID
ī‚§ Capabilities list
ī‚§ Platform
89
CDP
īą CDP timer is how often CDP packets are transmitted to
all active interfaces.
Router(config)#cdp timer 90
īą CDP holdtime is the amount of time that the device will
hold packets received from neighbor devices.
Router(config)#cdp holdtime 240
90
Using CDP
91
Using the show cdp
neighbors Command
The show cdp neighbor command (sh cdp nei for short) delivers
information about directly connected devices.
92
CDP
show cdp neighbor detail
īąThis command can be run on both routers
and switches, and it displays detailed
information about each device connected
to the device
93
Using the show cdp entry
Command
The show cdp entry * command displays the same information as the show cdp
neighbor details command.
94
Additional CDP Commands
The show cdp traffic command displays information about
interface traffic, including the number of CDP packets sent and
received and the errors with CDP.
95
CDP Commands
īąTo disable the CDP on particular interface use
the "no cdp enable" command
īąTo disable CDP on the entire router use the "no
cdp run" in global configuration mode.
96
Summary
īąCisco Discovery Protocol is an information-gathering tool used
by network administrators to get information about directly
connected devices.
īąCDP exchanges hardware and software device information
with its directly connected CDP neighbors.
īąYou can enable or disable CDP on a router as a whole or on a
port-by-port basis.
īąThe show cdp neighbors command displays information about
a router’s CDP neighbors.
īąThe show cdp entry, show cdp traffic, and show cdp interface
commands display detailed CDP information on a Cisco device.
97
īąManage IP traffic as network access grows
īąFilter packets as they pass through the router
Why Use Access Lists?
99
What are ACLs?
īąACLs are lists of conditions that are applied to traffic traveling across
a router's interface.
īąThese lists tell the router what types of packets to accept or deny.
īąAcceptance and denial can be based on specified conditions.
īąACLs can be configured at the router to control access to a network
or subnet.
īąSome ACL decision points are source and destination addresses,
protocols, and upper-layer port numbers.
100
Reasons to Create ACLs
īąThe following are some of the primary reasons to create
ACLs:
ī‚§Limit network traffic and increase network performance.
ī‚§Provide traffic flow control.
ī‚§Provide a basic level of security for network access.
ī‚§Decide which types of traffic are forwarded or blocked at the router
interfaces
ī‚§For example: Permit e-mail traffic to be routed, but block all telnet traffic.
ī‚§If ACLs are not configured on the router, all packets passing through the
router will be allowed onto all parts of the network.
101
ACL’s
īą Different access list for Telnet
īą When configuring ISDN you need to use access list
īą Implicit deny at bottom
īą All restricted statements should be on first
īą There are two types
īą Standard
īą Extended
102
Network
N1 N2
N3 N4 N5 N6
192.168.12.0
A
B C
192.168.34.0
192.168.56.0
192.168.12.2
192.168.12.3
103
IP Packet
īąSRC IP Address
īąDEST IP Address
īąProtocol type
īąSRC Port
īąDEST Port
The first 2 bytes in the TCP/UDP header are the source port number
The next 2 bytes in the TCP/UDP header are the Destination port number
104
īąStandard
īļChecks source address
īļPermits or denies entire protocol suite
īąExtended
īļChecks source and destination address
īļGenerally permits or denies specific protocols
Types of Access Lists
How to Identify Access Lists
īą Standard IP lists (1-99) test conditions of all IP packets from
source addresses.
īą Extended IP lists (100-199) test conditions of source and destination
addresses, specific TCP/IP protocols, and destination ports.
īą Standard IP lists (1300-1999) (expanded range).
īą Extended IP lists (2000-2699) (expanded range).
106
Standard ACLs
īąThe full syntax of the standard ACL command is:
īąRouter(config)#access-list access-list-number {deny | permit} source
[source-wildcard ]
īąThe no form of this command is used to remove a standard ACL. This is
the syntax:
īąRouter(config)#no access-list access-list-number
Config# Access-list 1 deny 192.168.1.0 0.0.0.255
Config# access-list 1 permit any
107
Wildcard Mask
Access-list 99 permit 192.168.1.1 wildcard mask
All 32 bits of an IP Address can be filtered
Wildcard inverse mask
0=must match
1= ignore
MASK (192.168.1.1) Matching IP
0.0.0.0 (host) 192.168.1.1
0.0.0.255 192.168.1.0-255
0.0.255.255 192.168.0-255.0-255
0.255.255.255 192.0-255.0-255.0-255
255.255.255.255 0-255.0-255.0-255.0-255 (any)
108
The ANY and HOST keyword
Access-list 1 permit 200.0.0.9 0.0.0.0
Or
permit host 200.0.0.9
Access-list 1 permit 0.0.0.0 255.255.255.255
Or
permit any
Testing Packets with
Standard Access Lists
Outbound ACL Operation
â€ĸ If no access list statement matches, then discard the packet.
111
Reading an ACL
īą First Hit or Best Fit?
1. Access-list 99 deny host 192.168.1.1 0.0.0.0
access-list 99 permit any 255.255.255.255
2. Access-list 99 permit 192.168.1.0 0.0.0.255
Access-list 99 deny host 192.168.1.1
access-list 99 permit any
3. Access-list 99 deny host 192.168.1.1
īļ Implicit deny at the end of every ACL
112
Creating ACLs
ACLs are created in the global configuration mode. There are many
different types of ACLs including standard, extended, IPX, AppleTalk, and
others. When configuring ACLs on a router, each ACL must be uniquely
identified by assigning a number to it. This number identifies the type of
access list created and must fall within the specific range of numbers that
is valid for that type of list.
Since IP is by far the most
popular routed protocol,
addition ACL numbers have
been added to newer router
IOSs.
Standard IP: 1300-1999
Extended IP: 2000-2699
113
The ip access-group command
{ in | out }
114
Exercise – Standard Access List
A B
Account should be denied access to Sales
To steps to configure
â€ĸCreate a standard Access list
â€ĸApply ACL to proper interface inbound or outbound
S0 S0
E0
E0
192.168.0.18
255.255.255.248
S0
S1192.168.0.17
255.255.255.248
192.168.0.5
255.255.255.252
192.168.0.6
255.255.255.252
192.168.0.9
255.255.255.252
192.168.0.10
255.255.255.252
192.168.0.33
255.255.255.240
192.168.0.34
255.255.255.240
115
Exercise – Standard Access List
A B
S0 S0
E0
E0
192.168.0.18
255.255.255.248
S0
S1192.168.0.17
255.255.255.248
192.168.0.5
255.255.255.252
192.168.0.6
255.255.255.252
192.168.0.9
255.255.255.252
192.168.0.10
255.255.255.252
192.168.0.33
255.255.255.240
192.168.0.34
255.255.255.240
Config# Access-list 1 deny 192.168.0.18 0.0.0.7
Config# access-list 1 permit any
Config#int e 0
Config-if# ip access-group 1 out
116
Extended ACLs
īąExtended ACLs are used more often than standard ACLs because they provide a
greater range of control.
īąExtended ACLs check the source and destination packet addresses as well as
being able to check for protocols and port numbers.
īąAt the end of the extended ACL statement, additional precision is gained from a
field that specifies the optional Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP) port number.
īąLogical operations may be specified such as, equal (eq), not equal (neq), greater
than (gt), and less than (lt), that the extended ACL will perform on specific
protocols.
īąExtended ACLs use an access-list-number in the range 100 to 199 (also from 2000
to 2699 in recent IOS).
117
Configuration
â€ĸ Access-list acl# {permit/Deny} â€ĸ Protocol
â€ĸ Src IP src WCM
â€ĸ Dst IP dst WCM
â€ĸ Opetrator port
â€ĸ Protocol
– OSPF
– EIGRP
– ICMP
– TCP
– UDP
RP If you need to Block a routing protocol
IP
â€ĸ Operator
– eq
– gt
– lt
– neq
Testing Packets with
Extended Access Lists
119
Extended ACL Syntax
121
Extended ACL LAB -2
S0
S0
E0
E0
A B
192.168.0.34 should be denied FTP of 192.168.0.18
On Router R1
Config# Access-list 100 deny tcp 192.168.0.34 0.0.0.0 192.168.0.18
0.0.0.0 eq 21
Config# access-list 100 permit IP any any
Config#int s0
Config-if# ip access-group 100 IN
192.168.0.18 should be denied website of 192.168.0.34
On Router R3
Config# Access-list 100 deny tcp 192.168. 0.18 0.0.0.0 192.168.0.34
0.0.0.0 eq 80
Config# access-list 100 permit IP any any
Config#int s0
Config-if# ip access-group 100 IN
S1
S0
192.168.0.18
255.255.255.248
192.168.0.17
255.255.255.248
192.168.0.5
255.255.255.252
192.168.0.6
255.255.255.252
192.168.0.9
255.255.255.252
192.168.0.10
255.255.255.252
192.168.0.33
255.255.255.240
192.168.0.34
255.255.255.240
122
Deny FTP
access-list 101 deny tcp any any eq 21
access-list 101 permit ip any any
or
access-list 101 deny tcp any any eq ftp
access-list 101 permit ip any any
123
Rules
īąFor extended access list apply near to the
source
īąFor standard access list apply near to the
destination
124
Named ACLs
IP named ACLs were introduced in Cisco IOS Software Release 11.2,
allowing standard and extended ACLs to be given names instead of
numbers.
The characteristics of named accesslist:
īļ Identify an ACL using an alphanumeric name.
īļ You can delete individual statements in a named access list
īļ Named access lists must be specified as standard or extended
īļ You can use the ip access-list command to create named access
lists.
īąNamed ACLs are not compatible with Cisco IOS releases prior to Release
11.2.
īąThe same name may not be used for multiple ACLs.
125
Named ACL’s
īą Numbered Access list did not give you any hint, What is
filtered
īą Named ACL’s are both basic and advanced filtering tool
īą Name cannot start with a number or !
īą Cannot have space in the name
īą Should not have ? Character anywhere in the name
īą Name is case sensitive
126
Named ACL Example
R1(config)#ip access-list standard blocksales
â€ĸ R1(config-std-nacl)#deny 172.16.40.0 0.0.0.255
â€ĸ R1(config-std-nacl)#permit any
â€ĸ R1(config-std-nacl)#exit
â€ĸ R1(config)#^Z
â€ĸ R1#
#Int e 0
#Ip access-group blocksales out
127
Verify Access List
128
Basic Rules for ACLs
īą Standard IP access lists should be applied closest to the destination.
īą Extended IP access lists should be applied closest to the source.
īą Use the inbound or outbound interface reference as if looking at the port
from inside the router.
īą Statements are processed sequentially from the top of list to the bottom
until a match is found, if no match is found then the packet is denied.
īą There is an implicit deny at the end of all access lists. This will not appear
in the configuration listing.
īą Access list entries should filter in the order from specific to general.
Specific hosts should be denied first, and groups or general filters should
come last.
īą Never work with an access list that is actively applied.
īą New lines are always added to the end of the access list.
īą A no access-list x command will remove the whole list. It is not possible
to selectively add and remove lines with numbered ACLs.
īą Outbound filters do not affect traffic originating from the local router.

More Related Content

What's hot

CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
Reetesh Gupta
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
Ann Joseph
 
Dynamic Routing IGRP
Dynamic Routing IGRPDynamic Routing IGRP
Dynamic Routing IGRP
Kishore Kumar
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
Mikrotik Tutorial
Mikrotik TutorialMikrotik Tutorial
Mikrotik Tutorial
Md Sohrab Hossain Sourav
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
arpit
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
ThousandEyes
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
Edgardo Scrimaglia
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
yasir1122
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
Respa Peter
 
Ccna
CcnaCcna
Router and routing
Router  and routingRouter  and routing
Router and routing
Iran-Gul Mukhlis
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
Edgardo Scrimaglia
 

What's hot (20)

CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
Dynamic Routing IGRP
Dynamic Routing IGRPDynamic Routing IGRP
Dynamic Routing IGRP
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Mikrotik Tutorial
Mikrotik TutorialMikrotik Tutorial
Mikrotik Tutorial
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Ccna
CcnaCcna
Ccna
 
Router and routing
Router  and routingRouter  and routing
Router and routing
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 

Viewers also liked

WIRELESS ROBOT PPT
WIRELESS ROBOT PPTWIRELESS ROBOT PPT
WIRELESS ROBOT PPT
AIRTEL
 
FOOD PRESERVATION
FOOD PRESERVATIONFOOD PRESERVATION
FOOD PRESERVATION
AIRTEL
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
AIRTEL
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Bts installation & commisioning.ppt
Bts installation & commisioning.pptBts installation & commisioning.ppt
Bts installation & commisioning.ppt
AIRTEL
 

Viewers also liked (6)

WIRELESS ROBOT PPT
WIRELESS ROBOT PPTWIRELESS ROBOT PPT
WIRELESS ROBOT PPT
 
FOOD PRESERVATION
FOOD PRESERVATIONFOOD PRESERVATION
FOOD PRESERVATION
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Bts installation & commisioning.ppt
Bts installation & commisioning.pptBts installation & commisioning.ppt
Bts installation & commisioning.ppt
 

Similar to Ccna ppt1

Ccna day3
Ccna day3Ccna day3
Ccna day3
Reetesh Gupta
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
AHMED NADIM JILANI
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
Sachin Morya
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
Ccna day3Ccna day3
Ccna day3
danishrafiq
 
C C N A Day3
C C N A  Day3C C N A  Day3
C C N A Day3
darulquthni
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
parthashee3
 
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.pptMenggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
RochmadGSaputra
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
shubham katiyar
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
shubham katiyar
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
Ospf
OspfOspf
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
SolWeje
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Atakan ATAK
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
OSPF Fundamental
OSPF FundamentalOSPF Fundamental
OSPF Fundamental
Reza Farahani
 

Similar to Ccna ppt1 (20)

Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
C C N A Day3
C C N A  Day3C C N A  Day3
C C N A Day3
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.pptMenggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Ospf
OspfOspf
Ospf
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
OSPF Fundamental
OSPF FundamentalOSPF Fundamental
OSPF Fundamental
 

More from AIRTEL

EMBEDDED SYSTEM
EMBEDDED  SYSTEMEMBEDDED  SYSTEM
EMBEDDED SYSTEM
AIRTEL
 
WIRELESS ROBOT
WIRELESS ROBOTWIRELESS ROBOT
WIRELESS ROBOT
AIRTEL
 
CCCNA REPORT
CCCNA REPORTCCCNA REPORT
CCCNA REPORT
AIRTEL
 
Bts installation & commisioning
Bts installation & commisioningBts installation & commisioning
Bts installation & commisioning
AIRTEL
 
Abstract of bts installation & commisioning
Abstract of bts installation & commisioningAbstract of bts installation & commisioning
Abstract of bts installation & commisioning
AIRTEL
 
4 G Mobile Communications
4 G Mobile   Communications4 G Mobile   Communications
4 G Mobile Communications
AIRTEL
 
4 G TECHNOLOGY
4 G TECHNOLOGY4 G TECHNOLOGY
4 G TECHNOLOGY
AIRTEL
 
4 G TECHNOLOGY
4 G TECHNOLOGY4 G TECHNOLOGY
4 G TECHNOLOGY
AIRTEL
 
4 g technology pdf file
4 g technology pdf file4 g technology pdf file
4 g technology pdf file
AIRTEL
 

More from AIRTEL (9)

EMBEDDED SYSTEM
EMBEDDED  SYSTEMEMBEDDED  SYSTEM
EMBEDDED SYSTEM
 
WIRELESS ROBOT
WIRELESS ROBOTWIRELESS ROBOT
WIRELESS ROBOT
 
CCCNA REPORT
CCCNA REPORTCCCNA REPORT
CCCNA REPORT
 
Bts installation & commisioning
Bts installation & commisioningBts installation & commisioning
Bts installation & commisioning
 
Abstract of bts installation & commisioning
Abstract of bts installation & commisioningAbstract of bts installation & commisioning
Abstract of bts installation & commisioning
 
4 G Mobile Communications
4 G Mobile   Communications4 G Mobile   Communications
4 G Mobile Communications
 
4 G TECHNOLOGY
4 G TECHNOLOGY4 G TECHNOLOGY
4 G TECHNOLOGY
 
4 G TECHNOLOGY
4 G TECHNOLOGY4 G TECHNOLOGY
4 G TECHNOLOGY
 
4 g technology pdf file
4 g technology pdf file4 g technology pdf file
4 g technology pdf file
 

Recently uploaded

Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...
âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...
âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...
hotchicksescort
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...
đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...
đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...
aarusi sexy model
 
College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...
College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...
College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...
Ak47
 
一比一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†
一比一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†ä¸€æ¯”一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†
一比一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†
gapboxn
 
Basic principle and types Static Relays ppt
Basic principle and  types  Static Relays pptBasic principle and  types  Static Relays ppt
Basic principle and types Static Relays ppt
Sri Ramakrishna Institute of Technology
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
Geoffrey Wardle. MSc. MSc. Snr.MAIAA
 
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book NowKandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
SONALI Batra $A12
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
Kamal Acharya
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
Tsuyoshi Horigome
 
Call Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 MinutesCall Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 Minutes
kamka4105
 
Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
ssuser381403
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
sathishkumars808912
 
Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...
simrangupta87541
 
Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...
shourabjaat424
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 

Recently uploaded (20)

Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...
âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...
âŖUnsatisfied Bhabhi Call Girls Surat đŸ’¯Call Us 🔝 7014168258 🔝💃Independent Sura...
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...
đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...
đŸ”Ĩ Hyderabad Call Girls  👉 9352988975 đŸ‘Ģ High Profile Call Girls Whatsapp Numbe...
 
College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...
College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...
College Call Girls Kolkata đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available...
 
一比一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†
一比一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†ä¸€æ¯”一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†
一比一原į‰ˆ(UOæ¯•ä¸šč¯)æ¸Ĩå¤Ē华大å­Ļæ¯•ä¸šč¯åĻ‚äŊ•åŠžį†
 
Basic principle and types Static Relays ppt
Basic principle and  types  Static Relays pptBasic principle and  types  Static Relays ppt
Basic principle and types Static Relays ppt
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
 
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book NowKandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
 
Call Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 MinutesCall Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur đŸ‘¯â€â™€ī¸ 7339748667 đŸ”Ĩ Free Home Delivery Within 30 Minutes
 
Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
 
Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi đŸ”Ĩ 9711199012 ❄- Pick Your Dream Call Girls with 1...
 
Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh đŸ”Ĩ 7014168258 đŸ”Ĩ Real Fun With Sexual Girl Available 24/7...
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 

Ccna ppt1

  • 1. 1 Distance Vector Link State Hybrid Distance Vector vs. Link State Route table Topology Incremental Update Periodic UpdateRouting by rumor A B C D X E
  • 2. 2 Distance Vector vs. Link State Distance Vector â€ĸ Updates frequently â€ĸ Each router is "aware" only of its immediate neighbors â€ĸ Slow convergence â€ĸ Prone to routing loops â€ĸ Easy to configure Link State â€ĸ Updates are event triggered â€ĸ Each router is "aware" of all other routers in the "area" â€ĸ Fast convergence â€ĸ Less subject to routing loops â€ĸ More difficult to configure
  • 3. 3 Comparison Continued Distance Vector â€ĸ Fewer router resources required â€ĸ Updates require more bandwidth â€ĸ Does not "understand" the topology of the network Link State â€ĸ More router resource intensive â€ĸ Updates require less bandwidth â€ĸ Has detailed knowledge of distant networks and routers
  • 4. 5 Link State īąExample īƒ˜OSPF īƒ˜IS-IS īąOSPF is used for corporate networks īąIS-IS is used for ISP’s
  • 5. 6
  • 6. 7 Open Shortest Path First (OSPF) īƒ˜ OSPF is an open standards routing protocol īƒ˜ This works by using the Dijkstra algorithm īƒ˜ OSPF provides the following features: īƒ˜Minimizes routing update traffic īƒ˜Allows scalability (e.g. RIP is limited to 15 hops) īƒ˜Has unlimited hop count īƒ˜Supports VLSM/CIDR īƒ˜Allows multi-vendor deployment (open standard)
  • 7. 8 Link State īąThere are two types of Packets īąHello īąLSA’s
  • 8. 9 OSPF Hello â€ĸ When router A starts it send Hello packet – uses 224.0.0.5 â€ĸ Hello packets are received by all neighbors â€ĸ B will write A’s name in its neighbor table â€ĸ C also process the same way A B C
  • 9. 10 "Hello" Packets â€ĸ Small frequently issued packets â€ĸ Discover neighbours and negotiate "adjacencies" â€ĸ Verify continued availability of adjacent neighbours â€ĸ Hello packets and Link State Advertisements (LSAs) build and maintain the topological database â€ĸ Hello packets are addressed to 224.0.0.5.
  • 10. 11 Link State Advertisement (LSA) īƒ˜An OSPF data packet containing link state and routing information that is shared among OSPF routers īƒ˜LSAs are shared only with routers with whom it has formed adjacencies īƒ˜LSA packets are used to update and maintain the topology database.
  • 11. 12 Link State īąThere are three type of tables īąNeighbor īąTopology īąRouting
  • 12. 13 Tables īą Neighbor īąContain information about the neighbors īąNeighbor is a router which shares a link on same network īąAnother relationship is adjacency īąNot necessarily all neighbors īąLSA updates are only when adjacency is established
  • 13. 14 Tables īą Topology īąContain information about all network and path to reach any network īąAll LSA’s are entered in to topology table īąWhen topology changes LSA’s are generated and send new LSA’s īąOn topology table an algorithm is run to create a shortest path, this algorithm is known as SPF or dijkstra algorithm
  • 14. 15 Tables īą Routing Table īąAlso knows as forwarding database īąGenerated when an algorithm is run on the topology database īąRouting table for each router is unique
  • 15. 16 OSPF Terms īąLink īąRouter ID īąNeighbours īąAdjacency īąOSPF Area īąBackbone area īąInternal routers īąArea Border Router (ABR) īąAutonomous System Boundary Router (ASBR)
  • 16. 17 Link īƒ˜ A network or router interface assigned to a given network īƒ˜ Link (interface) will have "state" information associated with it īļStatus (up or down) īļIP Address īļNetwork type (e.g. Fast Ethernet) īļBandwidth īļAddresses of other routers attached to this interface
  • 17. 18 OSPF Term: Link īƒ˜A link is a network or router interface assigned to any given network īƒ˜This link, or interface, will have state information associated with it (up or down) as well as one or more IP addresses
  • 18. 19 OSPF Term: Link State īƒ˜Status of a link between two routers īƒ˜Information is shared between directly connected routers. īƒ˜This information propagates throughout the network unchanged and is also used to create a shortest path first (SPF) tree.
  • 19. 20 Router ID īą The Router ID (RID) is an IP address used to identify the router īą Cisco chooses the Router ID by using the highest IP address of all configured loopback interfaces īą If no loopback interfaces are configured with addresses, OSPF will choose the highest IP address of all active physical interfaces. īą You can manually assign the router ID. īą The RID interface MUST always be up, therefore loopbacks are preferred
  • 20. 21 Neighbours īƒ˜Neighbours are two or more routers that have an interface on a common network īƒ˜E.g. two routers connected on a serial link īƒ˜E.g. several routers connected on a common Ethernet or Frame relay network īƒ˜Communication takes place between / among neighbours īƒ˜neighbours form "adjacencies"
  • 21. 22 Adjacency īƒ˜A relationship between two routers that permits the direct exchange of route updates īƒ˜Not all neighbours will form adjacencies īƒ˜This is done for reasons of efficiency – more later
  • 22. 23 OSPF Design īļEach router connects to the backbone called area 0, or the backbone area. īļRouters that connect other areas to the backbone within an AS are called Area Border Routers (ABRs). One interface must be in area 0. īļOSPF runs inside an autonomous system, but can also connect multiple autonomous systems together. The router that connects these ASes together is called an Autonomous System Boundary Router (ASBR).
  • 23. 24 OSPF Areas īƒ˜ An OSPF area is a grouping of contiguous networks and routers īƒ˜Share a common area ID īƒ˜ A router can be a member of more than one area (area border router) īƒ˜ All routers in the same area have the same topology database īƒ˜ When multiple areas exist, there must always be an area 0 (the backbone) to which other areas connect
  • 24. 25 Why areas? īƒ˜ Decreases routing overhead īļCompare to multiple smaller broadcast domains instead of one large one īƒ˜ Speeds convergence īƒ˜ Confines network instability (e.g. route "flapping") to single area of the network īƒ˜ Adds considerably to the complexity of setting up OSPF īļCCNA certification deals only with single-area OSPF
  • 26. 27 LSA’s in Area â€ĸ LSAs communicate with adjacent routers in the same OSPF area â€ĸ Subsequently, a change in a link state is "flooded" to all area routers via LSAs â€ĸ In larger networks, multiple areas may be created – LSAs are sent only to adjacent routers in the same area – "Area border routers" connect areas, passing summarized route information between
  • 27. 28 Path Calculation īą Changes to the topological database of a router trigger a recalculation to re-establish the best route(s) to known networks īƒ˜Uses the SPF (shortest path first) algorithm developed by a computer scientist named Dijkstra īƒ˜This is done by each individual router using its detailed "knowledge" of the whole network īƒ˜Leads to rapid and accurate convergence īƒ˜Based on detailed knowledge of every link in the area and the OSPF "cost" of each īƒ˜builds an OSPF tree with itself at the route
  • 28. 29 Terminology: Cost â€ĸ Various criteria can be selected by the administrator to determine the metric â€ĸ Usually, OSPF cost=108/bandwidth Do not forget to configure the bandwidth` command on serial links to ensure correct default OSPF cost
  • 29. 30 Pros and Cons īą Note that OSPF is a more sophisticated routing protocol īƒ˜Converges rapidly and accurately īƒ˜Can use a metric calculation that effectively selects the "best" route(s) primarily based on bandwidth, although an OSPF cost can be administratively assigned īą Use of OSPF requires īƒ˜More powerful routing hardware īƒ˜More detailed knowledge by the administrator, especially when large multi-area networks are used
  • 30. 31 Types of Neighbors â€ĸ OSPF can be defined for three type of neighbors – Broadcast Multi Access (BMA) ex- Ethernet – Point to Point – Non-Broadcast Multi Access (NBMA)
  • 32. 33 Adjacencies īą Point to Point all routers form adjacencies īą BMA & NBMA one router is elected as DR īą DR establish adjacency with every neighbor router īą LSA updates are exchanged only to DR īą DR is the router which has highest priority īą All CISCO routers has priority 1 īą If priority is same then router id is seen īą The RID is highest IP address of all interfaces
  • 33. 34 Point-to-Point Links īƒ˜ Usually a serial interface running either PPP or HDLC īƒ˜No DR or BDR election required īƒ˜ OSPF autodetects this interface type īƒ˜ OSPF packets are sent using multicast 224.0.0.5 īƒ˜All routers form adjacencies
  • 34. 35 Multi-access Broadcast Network â€ĸ Generally LAN technologies like Ethernet and Token Ring â€ĸ DR and BDR selection required â€ĸ All neighbor routers form full adjacencies with the DR and BDR only â€ĸ Packets to the DR use 224.0.0.6 â€ĸ Packets from DR to all other routers use 224.0.0.5
  • 35. 36 Electing the DR and BDR īƒ˜ Hello packets are exchanged via IP multicast. īƒ˜ The router with the highest priority is selected as the DR. īƒ˜If Priority is same then Router ID is seen īƒ˜ Use the OSPF router ID as the tie breaker.
  • 36. 37 Terminology: DRs and BDRs īą The designated router (DR) is responsible for generating LSAs on behalf of all routers connected to the same segment
  • 37. 38 DR Responsibility īƒ˜ When a router sees a new or changed link-state, it sends an LSA to its DR using a particular multicast address īƒ˜ The DR then forwards the LSA to all the other routers with whom it is adjacent īƒ˜Minimizes the number of formal adjacencies that must be formed and therefore the amount of LSU (link state update) packet traffic in a multi-router network
  • 38. 39 OSPF Summary īą AD -100 īą Hop count is unlimited īą Metric = Cost – 108/BW īą Classless, VLSM īą Load balance up to SIX routers īą Require more processing power
  • 39. 40 Basic OSPF Configuration Router(config)# router ospf 1 īą The number 1 in this example is a process-id # that begins an OSPF process in the router īƒ˜More than one process can be launched in a router, but this is rarely necessary īƒ˜Usually the same process-id is used throughout the entire network, but this is not required īƒ˜The process-id # can actually be any value from 1 to "very large integer“ īƒ˜The process-id # cannot be ZERO īƒ˜This is NOT the same as the AS# used in IGRP and EIGRP
  • 40. 41 Configuring OSPF Areas īą After identifying the OSPF process, you need to identify the interfaces that you want to activate OSPF communications Lab_A#config t Lab_A(config)#router ospf 1 Lab_A(config-router)#network 10.0.0.0 0.255.255.255 area ? <0-4294967295> OSPF area ID as a decimal value A.B.C.D OSPF area ID in IP address format Lab_A(config-router)#network 10.0.0.0 0.255.255.255 area 0 â€ĸ Every OSPF network must have an area 0 (the backbone area) to which other areas connect īƒ˜ So in a multiple area network, there must be an area 0 īƒ˜ The wildcard mask represents the set of hosts supported by the network and is really just the inverse of the subnet mask.
  • 41. 42 OSPF Configuration â€ĸ OSPF Process ID number is irrelevant. It can be the same on every router on the network â€ĸ The arguments of the network command are the network number (10.0.0.0) and the wildcard mask (0.255.255.255) â€ĸ Wildcards - A 0 octet in the wildcard mask indicates that the corresponding octet in the network must match exactly â€ĸ A 255 indicates that you don’t care what the corresponding octet is in the network number â€ĸ A network and wildcard mask combination of 1.1.1.1 0.0.0.0 would match 1.1.1.1 only, and nothing else. â€ĸ The network and wildcard mask combination of 1.1.0.0 0.0.255.255 would match anything in the range 1.1.0.0–1.1.255.255
  • 42. 43 OSPF Configuration -1 R2 R1 R3 S0 S1 E0 S0 E0 S0 10.0.0.1 20.0.0.1 20.0.0.2 30.0.0.1 30.0.0.2 40.0.0.1 10.0.0.2 40.0.0.2 A B
  • 43. 44 OSPF Configuration -1 R2 R1 R3 S0 S1 E0 S0 E0 S0 10.0.0.1 20.0.0.1 20.0.0.2 30.0.0.1 30.0.0.2 40.0.0.1 10.0.0.2 40.0.0.2 R1#config t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf 1 R1(config-router)#network 10.0.0.0 0.255.255.255 area 0 R1(config-router)#network 20.0.0.0 0.255.255.255 area 0 R1(config-router)#^Z A B
  • 44. 45 OSPF Configuration -2 R2 R1 R3 S0 S1 E0 S0 E0 S0 200.0.0.16/28 200.0.0.8/30 200.0.0.12/30 200.0.0.32/27 A B
  • 45. 46 OSPF Configuration -2 R2 R1 R3 S0 S1 E0 S0 E0 S0 200.0.0.17 200.0.0.9 200.0.0.10 200.0.0.13 200.0.0.14 200.0.0.33 200.0.0.18 200.0.0.34255.255.255.240 255.255.255.252 255.255.255.252 255.255.255.224 A B
  • 46. 47 OSPF Configuration -2 R2 R1 R3 S0 S1 E0 S0 E0 S0 200.0.0.17 200.0.0.9 200.0.0.10 200.0.0.13 200.0.0.14 200.0.0.33 200.0.0.18 200.0.0.34255.255.255.240 255.255.255.252 255.255.255.252 255.255.255.224 R1#config t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf 1 R1(config-router)#network 200.0.0.16 0.0.0.15 area 0 R1(config-router)#network 200.0.0. 8 0.0.0.3 area 0 R1(config-router)#^Z A B R3#config t Enter configuration commands, one per line. End with CNTL/Z. R3(config)#router ospf 1 R3(config-router)#network 200.0.0. 32 0.0.0.31 area 0 R3(config-router)#network 200.0.0. 12 0.0.0.3 area 0 R3(config-router)#^Z
  • 47. 48 OSPF and Loopback Interfaces īƒ˜ Configuring loopback interfaces when using the OSPF routing protocol is important īƒ˜ Cisco suggests using them whenever you configure OSPF on a router īƒ˜ Loopback interfaces are logical interfaces, which are virtual, software-only interfaces; they are not real router interfaces īƒ˜ Using loopback interfaces with your OSPF configuration ensures that an interface is always active for OSPF processes. īƒ˜ The highest IP address on a router will become that router’s RID īƒ˜ The RID is used to advertise the routes as well as elect the DR and BDR. īƒ˜ If you configure serial interface of your router with highest IP Address this Address becomes RID of t is the RID of the router because e router īƒ˜ If this interface goes down, then a re-election must occur īƒ˜ It can have an big impact when the above link is flapping
  • 48. 49 Configuring Loopback Interfaces R1#config t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#int loopback 0 R1(config-if)#ip address 172.16.10.1 255.255.255.255 R1(config-if)#no shut R1(config-if)#^Z R1#
  • 49. 50 show ip protocols Router# â€ĸ Verifies the configured IP routing protocol processes, parameters and statistics Verifying OSPF Operation show ip route ospf Router# â€ĸ Displays all OSPF routes learned by the router show ip ospf interface Router# â€ĸ Displays the OSPF router ID, area ID and adjacency information
  • 50. 51 show ip ospf Router# â€ĸ Displays the OSPF router ID, timers, and statistics Verifying OSPF Operation (Cont.) show ip ospf neighbor [detail] Router# â€ĸ Displays information about the OSPF neighbors, including Designated Router (DR) and Backup Designated Router (BDR) information on broadcast networks
  • 51. 52 The show ip route ospf Command RouterA# show ip route ospf Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP, D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP, i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default Gateway of last resort is not set 10.0.0.0 255.255.255.0 is subnetted, 2 subnets O 10.2.1.0 [110/10] via 10.64.0.2, 00:00:50, Ethernet0
  • 52. 53 The show ip ospf interface Command RouterA# show ip ospf interface e0 Ethernet0 is up, line protocol is up Internet Address 10.64.0.1/24, Area 0 Process ID 1, Router ID 10.64.0.1, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DROTHER, Priority 1 Designated Router (ID) 10.64.0.2, Interface address 10.64.0.2 Backup Designated router (ID) 10.64.0.1, Interface address 10.64.0.1 Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:04 Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 10.64.0.2 (Designated Router) Suppress hello for 0 neighbor(s)
  • 53. 54 The show ip ospf neighbor Command RouterB# show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 10.64.1.1 1 FULL/BDR 00:00:31 10.64.1.1 Ethernet0 10.2.1.1 1 FULL/- 00:00:38 10.2.1.1 Serial0
  • 54. 55 show ip ospf neighbor detail show ip ospf database
  • 55. 56 Setting Priority for DR Election ip ospf priority number īƒ˜This interface configuration command assigns the OSPF priority to an interface. īƒ˜Different interfaces on a router may be assigned different values. īƒ˜The default priority is 1. The range is from 0 to 255. īƒ˜0 means the router is a DROTHER; it can’t be the DR or BDR. Router(config-if)#
  • 56. 57
  • 57. 58 EIGRP â€ĸ IGRP – DV – Easy to configure – Neighbor – Advanced Metric – Periodic – Broadcast â€ĸ OSPF – LS – Incremental Updates – Multicast – Open Standard â€ĸ EIGRP – Hybrid – DUAL – Topology Database – Rapid Convergence – Reliable
  • 58. 59 Overview īƒ˜Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco- proprietary routing protocol based on Interior Gateway Routing Protocol (IGRP). īƒ˜Released in 1994, Unlike IGRP, which is a classful routing protocol, EIGRP supports CIDR and VLSM. īƒ˜ it is probably one of the two most popular routing protocols in use today. īƒ˜Compared to IGRP, EIGRP boasts faster convergence times, improved scalability, and superior handling of routing loops. īƒ˜EIGRP is often described as a hybrid routing protocol, offering the best of distance vector and link-state algorithms.
  • 59. 60 Comparing EIGRP with IGRP īƒ˜IGRP and EIGRP are compatible with each other. īƒ˜EIGRP offers multiprotocol support, but IGRP does not. īƒ˜Communication via Reliable Transport Protocol (RTP) īƒ˜Best path selection via Diffusing Update Algorithm (DUAL) īƒ˜Improved convergence time īƒ˜Reduced network overhead
  • 60. Introducing EIGRP EIGRP supports: īąRapid convergence īąReduced bandwidth usage īąMultiple network-layer protocols
  • 61. 62 EIGRP Tables â€ĸ EIGRP maintains 3 tables – Neighbor table – Topology table – Routing table
  • 62. 63 Neighbor Discovery īƒ˜There are three conditions that must be met for neighborship establishment īļHello or ACK received īļAS numbers match īļIdentical metrics (K values) ? AS ? K K1 – BW K2- Delay K3-Load K3-Reliability K5-MTU
  • 63. 64 īą The metrics used by EIGRP in making routing decisions are (lower the metric the better): īą bandwidth īą delay īą load īą Reliability īą MTU īą By default, EIGRP uses only: īą Bandwidth īą Delay Analogies: Think of bandwidth as the width of the pipe and delay as the length of the pipe. īą Bandwidth is the carrying capacity īą Delay is the end-to-end travel time. Metric Calculation
  • 64. 65 Neighbor Table īƒ˜ The neighbor table is the most important table in EIGRP īƒ˜ Stores address and interface of neighbor
  • 66. 67 Topology Table īƒ˜The topology table is made up of all the EIGRP routing tables in the autonomous system. īƒ˜DUAL takes the information and calculates the lowest cost routes to each destination. īƒ˜By tracking this information, EIGRP routers can identify and switch to alternate routes quickly. īƒ˜The information that the router learns from the DUAL is used to determine the successor route, which is the term used to identify the primary or best route. īƒ˜Every EIGRP router maintains a topology table. All learned routes to a destination are maintained in the topology table.
  • 67. 68 Routing Tables īƒ˜ A successor is a route selected as the primary route to use to reach a destination. īƒ˜ DUAL calculates Successor (Primary Route) and places it in the routing table (and topology table) īƒ˜ Can have up to 4 successors of equal or unequal value īƒ˜ DUAL calculates Feasible Successor (Backup Route) and places it in the Topology Table. īƒ˜ Promoted to successor if the route goes down if it has a lower cost than current successor īƒ˜ If no FS in Table - Send query īƒ˜ Multiple feasible successors for a destination can be retained in the topology table although it is not mandatory
  • 68. 69 EIGRP Concepts & Terminology īą EIGRP routers that belong to different autonomous systems (ASes) don’t automatically share routing information īą The only time EIGRP advertises its entire routing table is when it discovers a new neighbor and forms an adjacency with it through the exchange of Hello packets īą When this happens, both neighbors advertise their entire routing tables to one another īą After each has learned its neighbor’s routes, only changes to the routing table are propagated
  • 69. 70 172.16.100.0 1.544Mbps 56Kbps 1.544Mbps Dist to 172.16.100.0 =100Dist to 172.16.100.0 =100 Dist to 172.16.100.0 =350 10Mbps 10Mbps – 100 1,544Mbps – 250 56Kbps -1000 īąChennai receives an update from Mumbai with a cost of 100, which is Mumbai's cost to reach 172.16.100.0, This cost is referred to as the reported distance (RD) īąBangalore will report its cost to reach 172.16.100.0. Bangalore's RD is 350 īąChennai will compute its cost to reach 172.16.100.0 via Mumbai and Bangalore and compare the metrics for the two paths īąChennai's cost via Mumbai is 1100. Chennai's cost via Bangalore is 600. The lowest cost to reach a destination is referred to as the feasible distance (FD) for that destination īąChennai's FD to 172.16.100.0 is 600. The next-hop router in the lowest-cost path to the destination is referred to as the successor. īąA feasible successor is a path whose reported distance is less than the feasible distance, and it is considered a backup route.
  • 70. 71 EIGRP Terms īą Feasible distance (FD) - This is the lowest calculated metric to reach destination. This is the route that you will find in the routing table, because it is considered the best path īą Reported distance (RD) - The distance reported by an adjacent neighbor to a specific destination. īą Interface information - The interface through which the destination can be reached. īą Route status - The status of a route. Routes are identified as being either passive, which means that the route is stable and ready for use, or active, which means that the route is in the process of being recomputed by DUAL
  • 71. 72 īą Successor – Current Route īļ A successor is a route selected as the primary route to use to reach a destination. īļ Successors are the entries kept in the routing table. īą Feasible Successor - A backup route īļ A feasible successor is a backup route. īļ These routes are selected at the same time the successors are identified, but they are kept in the topology table. īļ Multiple feasible successors for a destination can be retained in the topology table. EIGRP Terminology and Operations
  • 72. 73 Reliable Transport Protocol (RTP) īą Used by EIGRP for its routing updates in place of TCP īą EIGRP can call on RTP to provide reliable or unreliable service ī‚§ EIGRP uses reliable service for route updates ī‚§ Unreliable for Hellos īą Reliable Transport Protocol (RTP) is a transport layer protocol that guarantees ordered delivery of EIGRP packets to all neighbors. īą On an IP network, hosts use TCP to sequence packets and ensure their timely delivery. RIP uses UDP īą However, EIGRP is protocol-independent and does not rely on TCP/IP to exchange routing information the way that RIP, IGRP, and OSPF do. īą EIGRP uses RTP as its own proprietary transport layer protocol to guarantee delivery of routing information. īą With RTP, EIGRP can multicast and unicast to different peers simultaneously.
  • 73. 74 Diffusing Update Algorithm (DUAL) īą All route computations in EIGRP are handled by DUAL īą One of DUAL's tasks is maintaining a table of loop-free paths to every destination. īą This table is referred to as the topology table īą DUAL saves all paths in the topology table īą The least-cost path(s) is copied from the topology table to the routing table īą In the event of a failure, the topology table allows for very quick convergence if another loop-free path is available īą If a loop-free path is not found in the topology table, a route recomputation must occur īą DUAL queries its neighbors, who, in turn, may query their neighbors, and so on... īą Hence the name "Diffusing" Update Algorithm
  • 74. 75 VLSM Support â€ĸ EIGRP supports the use of Variable- Length Subnet Masks â€ĸ Can use 30-bit subnet masks for point-to-point networks â€ĸ Because the subnet mask is propagated with every route update, EIGRP also supports the use of discontiguous subnets â€ĸ Discontiguous network is the one that has two or more subnetworks of a classful network connected together by different classful networks
  • 76. Configuring EIGRP Router(config-router)#network network-number â€ĸ Selects participating attached networks Router(config)#router eigrp autonomous-system â€ĸ Defines EIGRP as the IP routing protocol
  • 78. 80 EIGRP Configuration R2 R1 R3 S0 S1 E0 S0 E0 S0 200.0.0.17 200.0.0.9 200.0.0.10 200.0.0.13 200.0.0.14 200.0.0.33 200.0.0.18 200.0.0.34255.255.255.240 255.255.255.252 255.255.255.252 255.255.255.224 R1#config t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router eigrp 10 R1(config-router)#network 200.0.0.16 R1(config-router)#network 200.0.0. 8 R1(config-router)#^Z A B R3#config t Enter configuration commands, one per line. End with CNTL/Z. R3(config)#router eigrp 10 R3(config-router)#network 200.0.0. 32 R3(config-router)#network 200.0.0. 12 R3(config-router)#^Z
  • 79. 81 Verifying the EIGRP Configuration To verify the EIGRP configuration a number of show and debug commands are available. These commands are shown on the next few slides.
  • 80. 82 show ip eigrp topology show ip eigrp topology [active | pending | successors]
  • 81. 83 show ip eigrp topology all-links show ip eigrp traffic
  • 83. 85 TELNET īą Getting information about remote device īą Can connect to remote device and configure a device īą Password must be set R1(config)# line vty 0 4 Password cisco login
  • 84. 86 Š 2002, Cisco Systems, Inc. All rights reserved. 86 Discovering Neighbors on the Network
  • 85. Cisco Discovery Protocol īąCDP is a proprietary utility that gives you a summary of directly connected switches, routers, and other Cisco devices. īąCDP discovers neighboring devices regardless of which protocol suite they are running. īąRuns on the Data link layer īąPhysical media must support the Subnetwork Access Protocol (SNAP) encapsulation. īąOnly give directly connected device īąBy default enabled, you can enable or disable
  • 86. Discovering Neighbors with CDP īąCDP runs on routers with Cisco IOSÂŽ software Release 10.3 or later and on Cisco switches. īąShow CDP ? īąSummary information includes: ī‚§ Device ID ī‚§ Local Interface ī‚§ Port ID ī‚§ Capabilities list ī‚§ Platform
  • 87. 89 CDP īą CDP timer is how often CDP packets are transmitted to all active interfaces. Router(config)#cdp timer 90 īą CDP holdtime is the amount of time that the device will hold packets received from neighbor devices. Router(config)#cdp holdtime 240
  • 89. 91 Using the show cdp neighbors Command The show cdp neighbor command (sh cdp nei for short) delivers information about directly connected devices.
  • 90. 92 CDP show cdp neighbor detail īąThis command can be run on both routers and switches, and it displays detailed information about each device connected to the device
  • 91. 93 Using the show cdp entry Command The show cdp entry * command displays the same information as the show cdp neighbor details command.
  • 92. 94 Additional CDP Commands The show cdp traffic command displays information about interface traffic, including the number of CDP packets sent and received and the errors with CDP.
  • 93. 95 CDP Commands īąTo disable the CDP on particular interface use the "no cdp enable" command īąTo disable CDP on the entire router use the "no cdp run" in global configuration mode.
  • 94. 96 Summary īąCisco Discovery Protocol is an information-gathering tool used by network administrators to get information about directly connected devices. īąCDP exchanges hardware and software device information with its directly connected CDP neighbors. īąYou can enable or disable CDP on a router as a whole or on a port-by-port basis. īąThe show cdp neighbors command displays information about a router’s CDP neighbors. īąThe show cdp entry, show cdp traffic, and show cdp interface commands display detailed CDP information on a Cisco device.
  • 95. 97
  • 96. īąManage IP traffic as network access grows īąFilter packets as they pass through the router Why Use Access Lists?
  • 97. 99 What are ACLs? īąACLs are lists of conditions that are applied to traffic traveling across a router's interface. īąThese lists tell the router what types of packets to accept or deny. īąAcceptance and denial can be based on specified conditions. īąACLs can be configured at the router to control access to a network or subnet. īąSome ACL decision points are source and destination addresses, protocols, and upper-layer port numbers.
  • 98. 100 Reasons to Create ACLs īąThe following are some of the primary reasons to create ACLs: ī‚§Limit network traffic and increase network performance. ī‚§Provide traffic flow control. ī‚§Provide a basic level of security for network access. ī‚§Decide which types of traffic are forwarded or blocked at the router interfaces ī‚§For example: Permit e-mail traffic to be routed, but block all telnet traffic. ī‚§If ACLs are not configured on the router, all packets passing through the router will be allowed onto all parts of the network.
  • 99. 101 ACL’s īą Different access list for Telnet īą When configuring ISDN you need to use access list īą Implicit deny at bottom īą All restricted statements should be on first īą There are two types īą Standard īą Extended
  • 100. 102 Network N1 N2 N3 N4 N5 N6 192.168.12.0 A B C 192.168.34.0 192.168.56.0 192.168.12.2 192.168.12.3
  • 101. 103 IP Packet īąSRC IP Address īąDEST IP Address īąProtocol type īąSRC Port īąDEST Port The first 2 bytes in the TCP/UDP header are the source port number The next 2 bytes in the TCP/UDP header are the Destination port number
  • 102. 104 īąStandard īļChecks source address īļPermits or denies entire protocol suite īąExtended īļChecks source and destination address īļGenerally permits or denies specific protocols Types of Access Lists
  • 103. How to Identify Access Lists īą Standard IP lists (1-99) test conditions of all IP packets from source addresses. īą Extended IP lists (100-199) test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports. īą Standard IP lists (1300-1999) (expanded range). īą Extended IP lists (2000-2699) (expanded range).
  • 104. 106 Standard ACLs īąThe full syntax of the standard ACL command is: īąRouter(config)#access-list access-list-number {deny | permit} source [source-wildcard ] īąThe no form of this command is used to remove a standard ACL. This is the syntax: īąRouter(config)#no access-list access-list-number Config# Access-list 1 deny 192.168.1.0 0.0.0.255 Config# access-list 1 permit any
  • 105. 107 Wildcard Mask Access-list 99 permit 192.168.1.1 wildcard mask All 32 bits of an IP Address can be filtered Wildcard inverse mask 0=must match 1= ignore MASK (192.168.1.1) Matching IP 0.0.0.0 (host) 192.168.1.1 0.0.0.255 192.168.1.0-255 0.0.255.255 192.168.0-255.0-255 0.255.255.255 192.0-255.0-255.0-255 255.255.255.255 0-255.0-255.0-255.0-255 (any)
  • 106. 108 The ANY and HOST keyword Access-list 1 permit 200.0.0.9 0.0.0.0 Or permit host 200.0.0.9 Access-list 1 permit 0.0.0.0 255.255.255.255 Or permit any
  • 108. Outbound ACL Operation â€ĸ If no access list statement matches, then discard the packet.
  • 109. 111 Reading an ACL īą First Hit or Best Fit? 1. Access-list 99 deny host 192.168.1.1 0.0.0.0 access-list 99 permit any 255.255.255.255 2. Access-list 99 permit 192.168.1.0 0.0.0.255 Access-list 99 deny host 192.168.1.1 access-list 99 permit any 3. Access-list 99 deny host 192.168.1.1 īļ Implicit deny at the end of every ACL
  • 110. 112 Creating ACLs ACLs are created in the global configuration mode. There are many different types of ACLs including standard, extended, IPX, AppleTalk, and others. When configuring ACLs on a router, each ACL must be uniquely identified by assigning a number to it. This number identifies the type of access list created and must fall within the specific range of numbers that is valid for that type of list. Since IP is by far the most popular routed protocol, addition ACL numbers have been added to newer router IOSs. Standard IP: 1300-1999 Extended IP: 2000-2699
  • 111. 113 The ip access-group command { in | out }
  • 112. 114 Exercise – Standard Access List A B Account should be denied access to Sales To steps to configure â€ĸCreate a standard Access list â€ĸApply ACL to proper interface inbound or outbound S0 S0 E0 E0 192.168.0.18 255.255.255.248 S0 S1192.168.0.17 255.255.255.248 192.168.0.5 255.255.255.252 192.168.0.6 255.255.255.252 192.168.0.9 255.255.255.252 192.168.0.10 255.255.255.252 192.168.0.33 255.255.255.240 192.168.0.34 255.255.255.240
  • 113. 115 Exercise – Standard Access List A B S0 S0 E0 E0 192.168.0.18 255.255.255.248 S0 S1192.168.0.17 255.255.255.248 192.168.0.5 255.255.255.252 192.168.0.6 255.255.255.252 192.168.0.9 255.255.255.252 192.168.0.10 255.255.255.252 192.168.0.33 255.255.255.240 192.168.0.34 255.255.255.240 Config# Access-list 1 deny 192.168.0.18 0.0.0.7 Config# access-list 1 permit any Config#int e 0 Config-if# ip access-group 1 out
  • 114. 116 Extended ACLs īąExtended ACLs are used more often than standard ACLs because they provide a greater range of control. īąExtended ACLs check the source and destination packet addresses as well as being able to check for protocols and port numbers. īąAt the end of the extended ACL statement, additional precision is gained from a field that specifies the optional Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number. īąLogical operations may be specified such as, equal (eq), not equal (neq), greater than (gt), and less than (lt), that the extended ACL will perform on specific protocols. īąExtended ACLs use an access-list-number in the range 100 to 199 (also from 2000 to 2699 in recent IOS).
  • 115. 117 Configuration â€ĸ Access-list acl# {permit/Deny} â€ĸ Protocol â€ĸ Src IP src WCM â€ĸ Dst IP dst WCM â€ĸ Opetrator port â€ĸ Protocol – OSPF – EIGRP – ICMP – TCP – UDP RP If you need to Block a routing protocol IP â€ĸ Operator – eq – gt – lt – neq
  • 118. 121 Extended ACL LAB -2 S0 S0 E0 E0 A B 192.168.0.34 should be denied FTP of 192.168.0.18 On Router R1 Config# Access-list 100 deny tcp 192.168.0.34 0.0.0.0 192.168.0.18 0.0.0.0 eq 21 Config# access-list 100 permit IP any any Config#int s0 Config-if# ip access-group 100 IN 192.168.0.18 should be denied website of 192.168.0.34 On Router R3 Config# Access-list 100 deny tcp 192.168. 0.18 0.0.0.0 192.168.0.34 0.0.0.0 eq 80 Config# access-list 100 permit IP any any Config#int s0 Config-if# ip access-group 100 IN S1 S0 192.168.0.18 255.255.255.248 192.168.0.17 255.255.255.248 192.168.0.5 255.255.255.252 192.168.0.6 255.255.255.252 192.168.0.9 255.255.255.252 192.168.0.10 255.255.255.252 192.168.0.33 255.255.255.240 192.168.0.34 255.255.255.240
  • 119. 122 Deny FTP access-list 101 deny tcp any any eq 21 access-list 101 permit ip any any or access-list 101 deny tcp any any eq ftp access-list 101 permit ip any any
  • 120. 123 Rules īąFor extended access list apply near to the source īąFor standard access list apply near to the destination
  • 121. 124 Named ACLs IP named ACLs were introduced in Cisco IOS Software Release 11.2, allowing standard and extended ACLs to be given names instead of numbers. The characteristics of named accesslist: īļ Identify an ACL using an alphanumeric name. īļ You can delete individual statements in a named access list īļ Named access lists must be specified as standard or extended īļ You can use the ip access-list command to create named access lists. īąNamed ACLs are not compatible with Cisco IOS releases prior to Release 11.2. īąThe same name may not be used for multiple ACLs.
  • 122. 125 Named ACL’s īą Numbered Access list did not give you any hint, What is filtered īą Named ACL’s are both basic and advanced filtering tool īą Name cannot start with a number or ! īą Cannot have space in the name īą Should not have ? Character anywhere in the name īą Name is case sensitive
  • 123. 126 Named ACL Example R1(config)#ip access-list standard blocksales â€ĸ R1(config-std-nacl)#deny 172.16.40.0 0.0.0.255 â€ĸ R1(config-std-nacl)#permit any â€ĸ R1(config-std-nacl)#exit â€ĸ R1(config)#^Z â€ĸ R1# #Int e 0 #Ip access-group blocksales out
  • 125. 128 Basic Rules for ACLs īą Standard IP access lists should be applied closest to the destination. īą Extended IP access lists should be applied closest to the source. īą Use the inbound or outbound interface reference as if looking at the port from inside the router. īą Statements are processed sequentially from the top of list to the bottom until a match is found, if no match is found then the packet is denied. īą There is an implicit deny at the end of all access lists. This will not appear in the configuration listing. īą Access list entries should filter in the order from specific to general. Specific hosts should be denied first, and groups or general filters should come last. īą Never work with an access list that is actively applied. īą New lines are always added to the end of the access list. īą A no access-list x command will remove the whole list. It is not possible to selectively add and remove lines with numbered ACLs. īą Outbound filters do not affect traffic originating from the local router.
  įŋģč¯‘īŧš