Pages

Braniac Bhai Headline Animator

Search This Blog

Showing posts with label 640 – 802 CCNA. Show all posts
Showing posts with label 640 – 802 CCNA. Show all posts

Feb 22, 2012

How to Configure Extended Access List On Router

Configure Extended Access Lists


An extended ACL gives you much more power than just a standard ACL. Extended IP ACLs check both the source and destination packet addresses. They can also check for specific protocols, port numbers, and other parameters, which allow administrators more flexibility and control.

access-list access-list-number {permit | deny}
protocol source source-wildcard [operator port]
destination destination-wildcard [operator port]
[established] [log]
 
Command Parameters Descriptions
access-list Main command
access-list-number Identifies the list using a number in the ranges of 100.199 or 2000. 2699.
permit | deny Indicates whether this entry allows or blocks the specified address.
protocol IP, TCP, UDP, ICMP, GRE, or IGRP.
source and destination Identifies source and destination IP addresses.
source-wildcard and destination-wildcard The operator can be lt (less than), gt (greater than), eq (equal to), or neq (not equal to). The port number referenced can be either the source port or the destination port, depending on where in the ACL the port number is configured. As an alternative to the port number, well-known application names can be used, such as Telnet, FTP, and SMTP.
established For inbound TCP only. Allows TCP traffic to pass if the packet is a response to an outbound-initiated session. This type of traffic has the acknowledgement (ACK) bits set. (See the Extended ACL with the Established Parameter example.)
log Sends a logging message to the console.

How to Configure Standard Access List On Router

Standard Access Lists


Because a standard access list filters only traffic based on source traffic, all you need is the IP address of the host or subnet you want to permit or deny. ACLs are created in global configuration mode and then applied on an interface. The syntax for creating a standard ACL is
access-list {1-99 | 1300-1999} {permit | deny} source-address
 [wildcard mask]
In this article we will configure standard access list. If you want read the feature and characteristic of access list reads this previous article.


In this article we will use a RIP running topology. Which we created in RIP routing practical.


Access Control List Standard Extended

Access Control List


ACLs are basically a set of commands, grouped together by a number or name that is used to filter traffic entering or leaving an interface.
When activating an ACL on an interface, you must specify in which direction the traffic should be filtered:
  • Inbound (as the traffic comes into an interface)
  • Outbound (before the traffic exits an interface)
Inbound ACLs:
Incoming packets are processed before they are routed to an outbound interface. An inbound ACL is efficient because it saves the overhead of routing lookups if the packet will be discarded after it is denied by the filtering tests. If the packet is permitted by the tests, it is processed for routing.

Outbound ACLs:
Incoming packets are routed to the outbound interface and then processed through the outbound ACL.

Network Security Mitigating Common Threats

Network Security Mitigating Common Threats


Improper and incomplete network device installation is an often-overlooked security threat that, if left unaddressed, can have terrible results. Software-based security measures alone cannot prevent intended or even accidental network damage caused by poor installation. Now we will describe how to mitigate common security threats to Server Routers and Switches.

Physical Installations

Physical installations involve four types of threats:
hardware, electrical, environmental, and maintenance.

Hardware threats

Hardware threats involve threats of physical damage to the router or switch hardware. Mission-critical Cisco network equipment should be located in wiring closets or in computer or telecommunications rooms that meet these minimum requirements:

Network Security Types of Attack Reconnaissance Attack

Reconnaissance Attacks


A reconnaissance attack occurs when an adversary tries to learn information about your network.

Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities.

Reconnaissance is also known as information gathering and, in most cases, precedes an actual access or DoS attack. First, the malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive. Then the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the type and version of the application and operating system running on the target host.

Feb 21, 2012

Network Security Types of Attack Passive Attack Active Attack

Network Security


A security policy defines what people can and can't do with network components and resources.

Need for Network Security

In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies.

The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
Because they have no Internet connectivity, networks designed in this way can be considered safe from Internet attacks. However, internal threats still exist.
There is a estimates that 60 to 80 percent of network misuse comes from inside the enterprise where the misuse has taken place.

Network Definitions Characteristics Components locations

What Is a Network?


The first assignment in understanding how to build a computer network is defining what a network is and understanding how it is used to help a business meet its objectives.

Network is a combination of computer hardware, cabling, network devices, and computer software used together to allow computers to communicate with each other.

Or

A network is basically all of the components (hardware and software) involved in connecting computers across small and large distances. Networks are used to provide easy access to information, thus increasing productivity for users.

Network hardware is mainly made by two basic components: the entities that want to share the information or resources, such as servers and workstations, and the medium that enables the entities to communicate, which is a cable or a wireless medium

Jun 12, 2011

How to Configure EIGRP With RIP On Same Network

How to Configure EIGRP With RIP On Same Network


In this article we will discuss how can two routing protocols exist in same network? We have discussed basic of both EIGRP and RIP in our pervious article. Now we will go in more depth by including both RIP and EIGRP in same network.

Scenario

You are the administrator at http://earnkori.blogspot.com. Company network is given below,


R0
PortIP addressConnected to
F0/080.0.0.1R1   F0/1
F1/090.0.0.1R2 F0/1
F1/1100.0.0.1R3 F0/1



R1
PortIP addressConnected to
F0/0.1010.0.0.1S1 F0/24
F0/0.2020.0.0.1S1 F0/24
F0/180.0.0.2R0 F0/0
S0/0/030.0.0.1R2 S0/0
R2
PortIP addressConnected to
F0/190.0.0.2R0 F1/0
S0/030.0.0.2R1 S0/0/0
F0/040.0.0.1WR1 0/1
S0/150.0.0.1R3 S0/0/1
R3
PortIP addressConnected to
F0/1100.0.0.2R0 F1/1
S0/0/150.0.0.2R2 S0/1
F0/0.6060.0.0.1S1 G0/1
F0/0.7070.0.0.1S1 G0/1

IP address and other necessary configurations are already done on routers, switches, and on pc's, you need only to configure routing.

How to Configure Open Shortest Path First Routing Protocol

OSPF Routing Configurations


In this article I will demonstrate an example of OSPF Routing configurations. We will use four different series router so you can get familiar with all different platform covered in CCNA exam. Create a topology as shown in figure.



Configuring OSPF is slightly different from configuring RIP. When configuring OSPF, use the following syntax:
Router(config)# router ospf process_ID
Router(config-router)# network IP_address wildcard_mask
area area_#

Open Shortest Path First OSPF Protocols Description Notes Tutorials Guide

OPEN SHORTEST PATH FIRST(OSPF)



 Biggest advantage of OSPF over EIGRP is that it will run on any device as its based on open standard

Advantages

  • It will run on most routers, since it is based on an open standard.
  • It uses the SPF algorithm, developed by Dijkstra, to provide a loop-free topology.
  • It provides fast convergence with triggered, incremental updates via Link State Advertisements (LSAs).
  • It is a classless protocol and allows for a hierarchical design with VLSM and route summarization.

Disadvantages:

  • It requires more memory to hold the adjacency (list of OSPF neighbors), topology and routing tables.
  • It requires extra CPU processing to run the SPF algorithm
  • It is complex to configure and more difficult to troubleshoot.

How to Configure Enhanced Interior Gateway Routing Protocol

EIGRP Routing Configurations



EIGRP is a Cisco-proprietary routing protocol for TCP/IP. It’s actually based on Cisco’s proprietary IGRP routing protocol, with many enhancements built into it. Because it has its roots in IGRP, the configuration is similar to IGRP; however, it has many link state characteristics that were added to it to allow EIGRP to scale to enterprise network sizes. To know these characteristics read our pervious article.

In this article I will demonstrate an example of EIGRP Routing configurations. We will use four different series router so you can get familiar with all different platform covered in CCNA exam. Create a topology as shown in figure.



Jun 10, 2011

Enhanced Interior Gateway Routing Protocol Configurations

Enhanced Interior Gateway Routing Protocol (EIGRP)



EIGRP is the advance version of Cisco’s earlier version IGRP. Before you learn more about EIGRP let be familiar with IGRP.

Interior Gateway Routing Protocol (IGRP)

The Interior Gateway Routing Protocol (IGRP) is a Cisco-proprietary routing protocol for IP. it is a distance vector protocol.
  • It uses a sophisticated metric based on bandwidth and delay.
  • It uses triggered updates to speed-up convergence.
  • It supports unequal-cost load balancing to a single destination.
IGRP is Cisco proprietary uses bandwidth, delay, reliability, load, and MTU as its metrics (bandwidth and delay be default).
IGRP's routing update period is every 90 seconds. Its hold-down period is 280 seconds, and its flush period is 630 seconds.
It also supports triggered updates and load balancing across unequal-cost paths.
IGRP requires an AS number in its router command; plus, when entering network numbers for the network command, they are entered as the classful network number, as they are for RIP.
IGRP supports both equal- and unequal-cost paths for load balancing to single destination Equal-cost paths are enabled by default, where IGRP supports up to six equal-cost paths (four by default) to a single destination in the IP routing table. IGRP, however, also supports unequal-cost paths, but this feature is disabled by default.

Routing information protocol RIP Description Notes Tutorials Guide

Routing Information Protocol RIP


Routing Information Protocol (RIP) is a standards-based, distance-vector, interior gateway protocol (IGP) used by routers to exchange routing information. RIP uses hop count to determine the best path between two locations. Hop count is the number of routers the packet must go through till it reaches the destination network. The maximum allowable number of hops a packet can traverse in an IP network implementing RIP is 15 hops.

It has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it's inefficient on large networks with slow WAN links or on networks with a large number of routers installed.

In a RIP network, each router broadcasts its entire RIP table to its neighboring routers every 30 seconds. When a router receives a neighbor's RIP table, it uses the information provided to update its own routing table and then sends the updated table to its neighbors.

How to configure Routing Information Protocol RIP routing

Rip Routing Configurations


In this article I will demonstrate an example of Rip Routingconfigurations. We will use four different series router so you can get familiar with all different platform covered in CCNA exam. Create a topology as shown in figure.


IP RIP comes in two different versions: 1 and 2. Version 1 is a distance vector protocol and is defined in RFC 1058. Version 2 is a hybrid protocol and is defined in RFCs 1721 and 1722. The CCNA exam now primarily focuses on version 2. There are no major differences between RIPv1 or RIPv2 so far configurations concern. To read more about differences between RIPv1 or RIPv2 or know about the characteristics read our pervious article about RIP.

Jun 5, 2011

How to Configure Static Route on CISCO Router

Static Route Configurations


In this article I will demonstrate an example of static route configurations. We will use four different series router so you can get familiar with all different platform covered in CCNA exam. Create a topology as shown in figure.

A static route is a manually configured route on your router. Static routes are typically used in smaller networks and when few networks or subnets exist, or with WAN links that have little available bandwidth. With a network that has hundreds of routes, static routes are not scalable, since you would have to configure each route and any redundant paths for that route on each router.
1841 Series Router0 (R1)

FastEthernet0/0Serial0/0/0
IP address10.0.0.120.0.0.1
Connected WithPc0R2 on Serial 0/0
2811 Series Router0 (R4)

FastEthernet0/0Serial0/0/0
IP address50.0.0.140.0.0.2
Connected WithPc1R3 on Serial 0/0
2621XM Series Router0 (R3)

FastEthernet0/0Serial0/0/0
IP address30.0.0.240.0.0.1
Connected WithFastEthernet0/0R4 on Serial 0/0/0
2620XM Series Router1 (R2)

FastEthernet0/0Serial0/0
IP address30.0.0.120.0.0.2
Connected WithR3 on FastEthernet0/0R1 on Serial 0/0/0
PC-PT PC0

FastEthernet0Default Gateway
IP address10.0.0.210.0.0.1
Connected WithR1 on FastEthernet0/0
PC-PT PC1

FastEthernet0Default Gateway
IP address50.0.0.250.0.0.1
Connected WithR4 on FastEthernet0/0

To configure any router double click on it and select CLI.To configure this topology use this step by step guide.

(1841Router0) Hostname R1

To configure and enable static routing on R1 follow these commands exactly.

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 10.0.0.1 255.0.0.0
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R1(config-if)#exit
R1(config)#interface serial 0/0/0
R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#bandwidth 64
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
R1(config-if)#exit
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
R1(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2
R1(config)#ip route 40.0.0.0 255.0.0.0 20.0.0.2
R1(config)#ip route 50.0.0.0 255.0.0.0 20.0.0.2

(2620XM-Router1) Hostname R2

To configure and enable static routing on R2 follow these commands exactly.

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#interface serial 0/0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
R2(config-if)#exit
R2(config)#interface fastethernet 0/0
R2(config-if)#ip address 30.0.0.1 255.0.0.0
R2(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
R2(config-if)#exit
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1
R2(config)#ip route 40.0.0.0 255.0.0.0 30.0.0.2
R2(config)#ip route 50.0.0.0 255.0.0.0 30.0.0.2

(2620XM-Router2)Hostname R3

To configure and enable static routing on R3 follow these commands exactly.

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R3
R3(config)#interface fastethernet 0/0
R3(config-if)#ip address 30.0.0.2 255.0.0.0
R3(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R3(config-if)#interface serial 0/0
R3(config-if)#ip address 40.0.0.1 255.0.0.0
R3(config-if)#clock rate 64000
R3(config-if)#bandwidth 64
R3(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0, changed state to down
R3(config-if)#exit
%LINK-5-CHANGED: Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
R3(config)#ip route 10.0.0.0 255.0.0.0 30.0.0.1
R3(config)#ip route 20.0.0.0 255.0.0.0 30.0.0.1
R3(config)#ip route 50.0.0.0 255.0.0.0 40.0.0.2

(2811Router3) Hostname R4

To configure and enable static routing on R4 follow these commands exactly.

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 40.0.0.2 255.0.0.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up
Router(config-if)#exit
Router(config)#interface fastethernet 0/0
Router(config-if)#ip address 50.0.0.1 255.0.0.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Router(config-if)#exit
Router(config)#ip route 10.0.0.0 255.0.0.0 40.0.0.1
Router(config)#ip route 20.0.0.0 255.0.0.0 40.0.0.1
Router(config)#ip route 30.0.0.0 255.0.0.0 40.0.0.1

PC-1

PC>ipconfig

IP Address......................: 10.0.0.2
Subnet Mask.....................: 255.0.0.0
Default Gateway.................: 10.0.0.1

PC>ping 50.0.0.2

Pinging 50.0.0.2 with 32 bytes of data:

Reply from 50.0.0.2: bytes=32 time=156ms TTL=124
Reply from 50.0.0.2: bytes=32 time=127ms TTL=124
Reply from 50.0.0.2: bytes=32 time=156ms TTL=124
Reply from 50.0.0.2: bytes=32 time=140ms TTL=124

Ping statistics for 50.0.0.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 127ms, Maximum = 156ms, Average = 144ms
PC>

PC-2

PC>ipconfig

IP Address......................: 50.0.0.2
Subnet Mask.....................: 255.0.0.0
Default Gateway.................: 50.0.0.1

PC>ping 10.0.0.2

Pinging 10.0.0.2 with 32 bytes of data:

Reply from 10.0.0.2: bytes=32 time=140ms TTL=124
Reply from 10.0.0.2: bytes=32 time=141ms TTL=124
Reply from 10.0.0.2: bytes=32 time=157ms TTL=124
Reply from 10.0.0.2: bytes=32 time=156ms TTL=124

Ping statistics for 10.0.0.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 140ms, Maximum = 157ms, Average = 148ms

To test static routing do ping from pc1 to pc2 and vice versa. If you get replay then you have successfully configured static routing but if you did not get replay double check this configuration and try to troubleshoot. I have uploaded a configured and tested topology in case you are unable to locate the problem spot then download this configuration file. And try to find out where have you committed mistake.

Thanks to All..........

Jun 3, 2011

Basic of static routing configure cisco router

Basic of static routing configure cisco router


Static routing occurs when you manually add routes in each router's routing table. There are advantages and disadvantages to static routing, but that's true for all routing processes.

Static routing has the following advantages:

  • There is no overhead on the router CPU.
  • There is no bandwidth usage between routers.
  • It adds security because the administrator can choose to allow routing access to certain networks only.

Static routing has the following disadvantages:

  • The administrator must really understand the internetwork and how each router is connected in order to configure routes correctly.
  • If a network is added to the internetwork, the administrator has to add a route to it on all routers—manually.
  • It's not possible in large networks because maintaining it would be a full-time job in itself.

Command syntax for static route:



ip route [destination_network] [mask] [next-hop_address or
exit_interface] [administrative_distance] [permanent]

ip route The command used to create the static route.

destination_network The network you're placing in the routing table.

mask The subnet mask being used on the network.

next-hop_address The address of the next-hop router that will receive the packet and forward it to the remote network.

exit_interfaceUsed in place of the next-hop address if you want, and shows up as a directly connected route.

administrative_distance By default, static routes have an administrative distance of 1 (or even 0 if you use an exit interface instead of a next-hop address).

permanent Keyword (Optional) Without the permanent keyword in a static route statement, a static route will be removed if an interface goes down. Adding the permanent keyword to a static route statement will keep the static routes in the routing table even if the interface goes down and the directly connected networks are removed.

In this article we will recall all the topics you have learnt yet
and will try to implement these command in practically.
Create a topology as shown in figure on packet tracer


Now configure PC-0 first.To configure pc double click on pc and select desktop


Now click on IP configurations



Set ip address as shown in figure





IP address 10.0.0.2
Subnet mask 255.0.0.0
Default Gateway 10.0.0.1

Follow the same process in PC-2 and set the ip address to



IP address 30.0.0.2
Subnet mask 255.0.0.0
Default Gateway 30.0.0.1

Now double click on 1841 Router 0 and select CLI



Type no and press enter to avoid startup configuration
Now you are in user exec mode.
                --- System Configuration Dialog ---


Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>

Set Hostname to R1 and assign 10.0.0.1 255.0.0.0 ip address to fast Ethernet 0/0. also set a message “ Unauthorized access is prohibited”.

Router>enable

Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#banner motd # Unauthorized access is prohibited #
R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 10.0.0.1 255.0.0.0
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
R1(config-if)#exit
R1(config)#

Configure Router-2 in same way with hostname R2 and 30.0.0.1 255.0.0.0 ip address on fast Ethernet 0/0.

Router>enable

Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#interface fastEthernet 0/0
R2(config-if)#ip address 30.0.0.1 255.0.0.0
R2(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R2(config-if)#exit
R2(config)#

Now we have connectivity between local segment and router's Ethernet port.

Configure serial port

When Serial connections are configured they need one more command that normal Ethernet connections do not. That command is the clock rate command.
The clock rate command establishes a common rate at which the sending and receiving routers will send data to each other.
It should be noted that if using a service provider circuit, there is no need for the clock rate command since the service provider provides the clocking. Establish a simple serial to serial connection between R1 Serial 0/0/0 and R2 Serial 0/0/0.

Now configure serial port on both router with ip address 20.0.0.1 255.0.0.0 on one and 20.0.0.2 255.0.0.0 on two.

On R1

R1(config)#interface serial 0/0/0

R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#bandwidth 64
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up
R1(config-if)#exit
R1(config)#

On R2

R2(config)#interface serial 0/0

R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#exit

At this point you have configured ip address on interfaces.
But still pc0 will not ping to pc1 as R1 have no information the network of 30.0.0.0

There are two way to configure route in router. Static or Dynamic. You will learn more about static and dynamic in our next article. In this example we will use simple static route.

First tell R1 about to network of 30.0.0.0

R1(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2

R1(config)#

In this command 30.0.0.0 is the destination network and 255.0.0.0 is the subnetmask on destination network and 20.0.0.2 is the ip address of next hope

30.0.0.0 = destination network.

255.0.0.0 = subnet mask.
20.0.0.2 = next-hop address.

Say this way "To get to the destination network of 30.0.0.0, with a subnet mask of 255.0.0.0, send all packets to 20.0.0.2"

Now tell R2 about to network of 10.0.0.0

R2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1

R2(config)#

Now test the connectivity. Go on pc1 and
C:\> ping 30.0.0.2

If you get reply then you have successfully configured static routing between R1 and R2.


Default Routing

default routingis used to send packets with a remote destination network not in the routing table to the next-hop router. You should only use default routing on stub networks—those with only one exit path out of the network.

May 30, 2011

Basic of routing distance vector protocol problems solutions

Basic of routing


Routing is the process by which a packet gets from one location to another. To route a packet, a router needs to know the destination address and on what interface to send the traffic out .When a packet comes into an interface (in interface) on a router, it looks up the destination IP address in the packet header and compares it with its routing table. The routing table, which is stored in RAM, tells the router which outgoing interface the packet should go out to reach the destination network. There are three ways to control routing decisions on your router:

  • Static routes
  • Default routes
  • Dynamic routes

Static Routes

Use a static route when you want to manually define the path that the packet will take through your network. Static routes are useful in small networks with rarely changing routes, when you have little bandwidth and do not want the overhead of a dynamic routing protocol, or when you want to manually define all of your routes for security reasons. Static routes are created in global configuration mode. The syntax for the static route is as follows:



ip route destination network address [subnet mask]
{next-hop-address | interface] [distance]

Defaults routers

This is the special type of static route, commonly called the gateway of last resort. If the specified destination is not listed in the routing table, the default route can be used to route the packet. A default route has an IP address of 0.0.0.0 and a subnet mask of 0.0.0.0, often represented as 0.0.0.0/0. Default routes are commonly used in small networks on a perimeter router pointing to the directly connected ISP router.

Dynamic Routes

A router learns dynamic routes by running a routing protocol. Routing protocols will learn about routes from other neighboring routers running the same routing protocol. Through this sharing process, a router will eventually learn about all of the reachable network and subnet numbers in the network.

Now be familiar with the terms routing protocol and routed protocol that have two different meanings. A routing protocol learns about routes for a routed protocol.

Routed protocol:

Any network protocol that provides enough information in its network layer address to enable a packet to be forwarded from one host to another host based on the addressing scheme, without knowing the entire path from source to destination. Packets generally are conveyed from end system to end system. IP is an example of a routed protocol.

Routing protocol:

Facilitates the exchange of routing information between networks, enabling routers to build routing tables dynamically. Traditional IP routing stays simple because it uses next-hop (next-router) routing, in which the router needs to consider only where it sends the packet and does not need to consider the subsequent path of the packet on the remaining hops (routers). Routing Information Protocol (RIP) is an example of a routing protocol.

There are two types of routing protocols:

  • Interior Gateway Protocols (IGP): These routing protocols exchange routing information within an autonomous system. Routing Information Protocol version 2 (RIPv2), Enhanced Interior Gateway Routing (EIGRP), and Open Shortest Path First (OSPF) are examples of IGPs.
  • Exterior Gateway Protocols (EGP): These routing protocols are used to route between autonomous systems. Border Gateway Protocol (BGP) is the EGP of choice in networks today.

Metrics

Metrics can be calculated based on a single characteristic of a path. More complex metrics can be calculated by combining several path characteristics. The metrics that routing protocols most commonly use are as follows:

  • Hop count:
    The number of times that a packet passes through the output port of one router
  • Bandwidth:
    The data capacity of a link; for instance, normally, a 10-Mbps Ethernet link is preferable to a 64-kbps leased line
  • Delay:
    The length of time that is required to move a packet from source to destination
  • Load:
    The amount of activity on a network resource, such as a router or link
  • Reliability:
    Usually refers to the bit error rate of each network link
  • Cost:
    A configurable value that on Cisco routers is based by default on the bandwidth of the Interface
Routing ProtocolsMetricDescription
RIPHop countHow many layer 3 hops away from the destination
OSPFCostMeasurement in the inverse of the bandwidth of the links
EIGRPBandwidthThe capacity of the links in Kbps (T1 = 1554)
EIGRPDelayTime it takes to reach the destination
EIGRPLoadThe path with the least utilization
EIGRP MTU The path that supports the largest frame sizes
EIGRP Reliability The path with the least amount of errors or down time

Autonomous Systems

An autonomous system (AS) is a group of networks under a single administrative control, which could be your company, a division within your company, or a group of companies.
Not every routing protocol understands the concept of an AS. Routing protocols that understand the concept of an AS are EIGRP, OSPF, IS-IS, and BGP. RIP doesn’t understand autonomous systems, while OSPF does; but OSPF doesn’t require you to configure the AS number, whereas other protocols, such as EIGRP, do.

Administrative Distance

Administrative distance is the measure of trustworthiness that a router assigns to how a route to a network was learned.
An administrative distance is an integer from 0 to 255. A routing protocol with a lower administrative distance is more trustworthy than one with a higher administrative distance.

Administrative Distance Route Type
0 Connected interface route
1 Static route
90 Internal EIGRP route (within the same AS)
110 OSPF route
120 RIPv1 and v2 route
170 External EIGRP (from another AS)
255 Unknown route (is considered an invalid route and will not be used)

Routing protocols can be further classified into two categories:

  • Distance vector routing protocols
  • Link state routing protocols

Distance Vector Routing Protocols

Distance vector–based routing algorithms (also known as Bellman-Ford-Moore algorithms) pass periodic copies of a routing table from router to router and accumulate distance vectors. (Distance means how far, and vector means in which direction.) Regular updates between routers communicate topology changes.

Sometimes these protocols are referred to as routing by rumor, since the routers learn routing information from directly connected neighbors, and these neighbors might have learned these networks from other neighboring routers. RIP is an example of a routing protocol that is a distance vector.

Advertising Updates

Routers running distance vector protocols learn who their neighbors are by listening for routing broadcasts on their interfaces. No formal handshaking process or hello process occurs to discover who are the neighboring routers. Distance vector protocols assume that through the broadcast process, neighbors will be learned, and if a neighbor fails, the missed broadcasts from these neighbors will eventually be detected

Distance vector algorithms call for each router to send its entire routing table to each of its adjacent or directly connected neighbors. Distance vector routing tables include information about the total path cost (defined by its metric) and the logical address of the first router on the path to each network it knows about.

When a router receives an update from a neighboring router, it compares the update to its own routing table. The router adds the cost of reaching the neighboring router to the path cost reported by the neighbor to establish the new metric. If the router learns about a better route (smaller total metric) to a network from its neighbor, the router updates its own routing table.

Distance Vector Protocol Problems and Solutions

Problem: Convergence

The term convergence refers to the time it takes for all of the routers to understand the current topology of the network. When a router receives an update from a neighboring router, it compares the update to its own routing table. The router adds the cost of reaching the neighboring router to the path cost reported by the neighbor to establish the new metric. If the router learns about a better route (smaller total metric) to a network from its neighbor, the router updates its own routing table. It’s too time consuming process. Because in a 10 router topology last router will know about the network of first router only while all middle router will complete their periodic update. For example if interval timer is set to 60 second then last router will know about first network in 60*8 480 second or 8 minute.

Solution: Change the periodic timer interval

One solution is to change the periodic timer interval. For instance, in an example the timer was set to 60 seconds. To speed up convergence, you might want to set the interval to 10 seconds. Also, by setting the timer to 10 seconds, you are creating six times the amount of routing broadcast traffic, which is not very efficient

A second solution is to implement triggered updates

The distance vector routing protocol would still generate periodic updates; however, whenever a change takes place, the router will immediately generate an update without waiting for the periodic timer to expire. This can decrease convergence times, but it also creates a problem. If you have a flapping route, then an update will be triggered each time the route changes state, which creates a lot of unnecessary broadcast traffic in your network and could cause a broadcast storm.

Problem: Routing Loops

A routing loop is a layer-3 loop in the network. Basically, it is a disagreement about how to reach a destination network. Because distance vector routing protocols trust the next router without compiling a topology map of all networks and routers, distance vector protocols run the risk of creating loops in a network. This is analogous of driving to a location without a map. Instead, you trust what each sign tells you. Trusting the street signs might get you where you want to go, but I've been in some cities where trusting what the signs say will lead you in loops. The same is true with distance vector routing protocols. Simply trusting what the next router tells it can potentially lead the packets to loop endlessly. These loops could saturate a network and cause systems to crash. This, in turn, makes managers very upset and means that you have to work late into the evening to fix it.

Solution: Counting to Infinity Solution: Maximum Hop Count

IP packets have inherent limits via the Time-To-Live (TTL) value in the IP header. In other words, a router must reduce the TTL field by at least 1 each time it gets the packet. If the TTL value becomes 0, the router discards that packet. However, this does not stop the router from continuing to attempt to send the packet to a network that is down. To avoid this prolonged problem, distance vector protocols define infinity as some maximum number. This number refers to a routing metric, such as a hop count.

Solution: Split Horizon

Split horizon states that if a neighboring router sends a route to a router, the receiving router will not propagate this route back to the advertising router on the same interface. Split horizon prevents a router from advertising a route back out the same interface where the router originally learned the route. One way to eliminate routing loops and speed up convergence is through the technique called split horizon. The split horizon rule is that sending information about a route back in the direction from which the original update came is never useful.

Solution: Route Poisoning

Another operation complementary to split horizon is a technique called route poisoning. Route poisoning attempts to improve convergence time and eliminate routing loops caused by inconsistent updates. With this technique, when a router loses a link, the router advertises the loss of a route to its neighbor device. Route poisoning enables the receiving router to advertise a route back toward the source with a metric higher than the maximum. The advertisement back seems to violate split horizon, but it lets the router know that the update about the down network was received. The router that received the update also sets a table entry that keeps the network state consistent while other routers gradually converge correctly on the topology change. This mechanism allows the router to learn quickly of the down route and to ignore other updates that might be wrong for the hold-down period. This prevents routing loops.

A poisoned route has an infinite metric assigned to it. A poison reverse causes the router to break split horizon rule and advertise the poisoned route out all interfaces. When a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it. In IP RIP, the route is assigned a hop count of 16 (15 is the maximum), thus making it an unreachable network. When a router advertises a poised route to its neighbors, its neighbors break the rule of split horizon and send back to the originator the same poisoned route, called a poison reverse. This ensures that everyone received the original update of the poisoned route.

Solution:Hold-Down Timers

In order to give the routers enough time to propagate the poisoned route and to ensure that no routing loops occur while propagation is occurring; the routers implement a hold-down mechanism. During this period, the routers will freeze the poisoned route in their routing tables for the period of the hold-down timer, which is typically three times the interval of the routing broadcast update. When hold-down timers are used, a poisoned route will remain in the routing table until the timer expires. However, if a router with a poisoned route receives a routing update from a neighboring router with a metric that is the same or better than the original route, the router will abort the hold-down period, remove the poisoned route, and put the new route in its table. However, if a router receives a worse route from a neighboring router, the router treats this as a suspect route and assumes that this route is probably part of a routing loop, ignoring the update. One of the problems of using hold-down timers is that they cause the distance vector routing protocol to converge slowly—if the hold-down period is 180 seconds, you can’t use a valid alternative path with a worse metric until the hold-down period expires. Therefore, your users will lose their connections to this network for at least three minutes.

Hold-down timers perform route maintenance as follows:

  1. When a router receives an update from a neighbor indicating that a previously accessible network is now inaccessible, the router marks the route as inaccessible and starts a hold-down timer.
  2. If an update arrives from a neighboring router with a better metric than originally recorded for the network, the router marks the network as accessible and removes the hold-down timer.
  3. If at any time before the hold-down timer expires, an update is received from a different neighboring router with a poorer metric, the update is ignored. Ignoring an update with a higher metric when a holddown is in effect enables more time for the knowledge of the change to propagate through the entire network.
  4. During the hold-down period, routes appear in the routing table as “possibly down.”

Basic router configurations login in router show commands

Basic router configurations show commands

In our last article I show you that how can you connect Cisco router. In this article I will show how can you can configure router. For demonstration purpose I used packet tracer software. If you haven’t install packet tracer read our pervious article to download and install packet tracer. Link is given on the top side of left. Create a simple topology by dragging dives on workspace as show in figure.


Basic Show Commands

Router#show running-config

Building configuration...

Current configuration : 419 bytes
!
version 12.4
no service password-encryption
!
hostname Router
!
ip ssh version 1
!
interface FastEthernet0/0
[output is Omitted]

Show the active configuration in memory. The currently active configuration script running on the router is referred to as the running-config on the routers command-line interface. Note that privileged mode is required. The running configuration script is not automatically saved on a Cisco router, and will be lost in the event of power failure. The running configuration must be manually saved with the 'copy' command

Router#show flash

System flash directory:
File Length Name/status
1 33591768 c1841-advipservicesk9-mz.124-15.T1.bin
[33591768 bytes used, 30424616 available, 64016384 total]
63488K bytes of processor board System flash (Read/Write)

Flash memory is a special kind of memory on the router that contains the operating system image file(s). Unlike regular router memory, Flash memory continues to maintain the file image even after power is lost.

Router#show history

The routers Command Line Interface (CLI) maintains by default the last 10 commands you have entered in memory.
To retrieve the previous command you typed
Press the up arrow
To retrieve the next command you typed
Press the down arrow

Router#show protocols

Use this command to view the status of the current layer 3 routed protocols running on your router

Router#show version

Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1,
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team

ROM: System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)

System returned to ROM by power-on
System image file is "flash:c1841-advipservicesk9-mz.124-15.T1.bin"
[output is Omitted]
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
Processor board ID FTX0947Z18E
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
1 Low-speed serial(sync/async) network interface(s)
191K bytes of NVRAM.
31360K bytes of ATA CompactFlash (Read/Write)

Configuration register is 0x2102

This command will give you critical information, such as: router platform type, operating system revision, operating system last boot time and file location, amount of memory, number of interfaces, and configuration register

Router#show clock

*1:46:13.169 UTC Mon Nov 1 2009

Will show you Routers clock

Router#show hosts

will display a cached list of hosts and all of their interfaces IP addresses

Router#show users

Will show a list of all users who are connected to the router

Router#show interfaces

will give you detailed information about each interface

Router#show protocols

will show the global and interface-specific status of any layer 3 protocols

Router#show ip interface brief

Interface              IP-Address      OK? Method Status                Protocol

FastEthernet0/0 10.0.0.1 YES manual up up

FastEthernet0/1 unassigned YES manual administratively down down

Serial0/0/0 20.0.0.1 YES manual up up

Vlan1 unassigned YES manual administratively down down
Router#

This command will show brief descriptions about interface. This command mostly used in troubleshooting. There may be three possible conditions of status.
UP :- interface is up and operational
DOWN :- physical link is detected but there are some problem in configurations.
Administratively down :- port is disable by shutdown command ( Default mode of any port on router.)

R1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 10.0.0.0/8 is directly connected, FastEthernet0/0
C 20.0.0.0/8 is directly connected, Serial0/0/0
D 30.0.0.0/8 [90/40514560] via 20.0.0.2, 00:02:55, Serial0/0/0
D 40.0.0.0/8 [90/41026560] via 20.0.0.2, 00:02:54, Serial0/0/0
D 50.0.0.0/8 [90/41029120] via 20.0.0.2, 00:02:50, Serial0/0/0
R1#

This command will give a detail about known route. Router will not forward packet if route is not shown here for that packet. Router’s routing decision is made by this routing table.


R1#show controllers serial 0/0/0

Interface Serial0/0/0
Hardware is PowerQUICC MPC860
DCE V.35, clock rate 64000
idb at 0x81081AC4, driver data structure at 0x81084AC0

Most common use of this command is to find out whether the port is DCE end or DTE. If the port is DCE end then clock rate and bandwidth command will require. As you can see in output that port is DCE.


R1#show ip protocols


Routing Protocol is "eigrp 1 "
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0
EIGRP maximum hopcount 100
EIGRP maximum metric variance 1
Redistributing: eigrp 1
Automatic network summarization is in effect
Automatic address summarization:
Maximum path: 4
Routing for Networks:
10.0.0.0
20.0.0.0
Routing Information Sources:
Gateway Distance Last Update
20.0.0.2 90 16
Distance: internal 90 external 170

Use this command to know about running routing protocols. This will give the complete status about routing protocols likes on which interface its receiving updates and on which interface its broadcasting update what is time intervals

press enter to get back router prompt
Router>

You are now in User mode. Type ?to view all the available commands at this prompt.
Router>?

From privilege mode you can enter in configuration mode by typing configure terminal you can exit configuration mode type exit or +z

Router>enable
Router#config terminal
Router(config)#exit
Router#

To read more about Cisco mode read our previous article

To view all commands available from this mode type: ? and press: enter This will give you the list of all available commands for the router in your current mode. You can also use the question mark after you have started typing a command. For example if you want to use a show command but you do not remember which one it uses 'show ?' will output all commands that you can use with the show command.


Router#show ?

access-expression List access expression
access-lists List access lists
backup Backup status
cdp CDP information
clock Display the system clock
cls DLC user information
compress Show compression statistics
configuration Contents of Non-Volatile memory
--More--

To read more about available help options read our previous article