147
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1 Building a Simple Network Understanding Ethernet

Building a Simple Network

  • Upload
    ollie

  • View
    32

  • Download
    2

Embed Size (px)

DESCRIPTION

Understanding Ethernet. Building a Simple Network. Local Area Network. LAN Components. Computers PCs Servers Interconnections NICs Media Network devices Hubs Switches Routers Protocols Ethernet IP ARP DHCP. Functions of a LAN. Data and applications Share resources - PowerPoint PPT Presentation

Citation preview

Page 1: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1

Building a Simple Network

Understanding Ethernet

Page 2: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Local Area Network

Page 3: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

LAN Components Computers

– PCs

– Servers

Interconnections

– NICs

– Media

Network devices

– Hubs

– Switches

– Routers

Protocols

– Ethernet

– IP

– ARP

– DHCP

Page 4: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Functions of a LAN

Data and applications

Share resources

Provide communication path to other networks

Page 5: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

LAN Sizes

Page 6: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Ethernet Evolution

Page 7: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

LAN Standards

Page 8: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

Ethernet Frame Structure

Page 9: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Communicating Within the LAN

Page 10: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

MAC Address Components

Page 11: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Ethernet LANs

Understanding the Challenges of Shared LANs

Page 12: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

Signals degrade with transmission distance.

Each Ethernet type has a maximum segment length.

LAN Segment Limitations

Page 13: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Extending LAN Segments

Shares bandwidth

Extends cable distances

Repeats or amplifies signal

Page 14: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

Collisions

Page 15: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

CSMA/CD

Page 16: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

Ethernet LANs

Solving Network Challenges with Switched LAN Technology

Page 17: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-17

Network Congestion

High-performance PCs

More networked data

Bandwidth-intensive applications

Page 18: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-18

Bridges

Operate at Layer 2 of the OSI model

Forward, filter, or flood frames

Have few ports

Are slow

Page 19: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-19

LAN Switch

High port density

Large frame buffers

Mixture of port speeds

Fast internal switching

Switching modes:

– Cut-through

– Store-and-forward

– Fragment-free

Page 20: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-20

LAN Switch Features

Page 21: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-21

Switches Supersede Bridges

Operate at Layer 2 of the OSI model

Forward, filter, or flood frames

Have many ports

Are fast

Page 22: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-22

Switching Frames

Page 23: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-23

LANs Today

Users grouped by physical location

More switches added to networks

Switches connected by high-speed links

Page 24: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-24

Medium-Sized Switched Network Construction

Implementing VLANs and Trunks

Page 25: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-25

Issues in a Poorly Designed Network

Unbounded failure domains

Large broadcast domains

Large amount of unknown MAC unicast traffic

Unbounded multicast traffic

Management and support challenges

Possible security vulnerabilities

Page 26: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-26

VLAN Overview

VLAN = Broadcast Domain = Logical Network (Subnet)

Segmentation

Flexibility

Security

Page 27: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-27

Designing VLANs for an Organization

VLAN design must take into consideration the implementation of a hierarchical network addressing scheme.

The benefits of hierarchical addressing are:

– Ease of management and troubleshooting

– Minimization of errors

– Reduced number of routing table entries

Page 28: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-28

Guidelines for Applying IP Address Space

Allocate one IP subnet per VLAN.

Allocate IP address spaces in contiguous blocks.

Page 29: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-29

VLAN Operation

Page 30: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-30

VLAN Membership Modes

Page 31: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-31

802.1Q Trunking

Page 32: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-32

802.1Q Frame

Page 33: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-33

Understanding Native VLANs

Page 34: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-34

Configuring 802.1Q Trunking

Configures the port as a VLAN trunk

SwitchX(config-if)#

switchport mode trunk

switchport mode {access | dynamic {auto | desirable} | trunk}

SwitchX(config-if)#

Configures the trunking characteristics of the port

Page 35: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-35

SwitchX# show interfaces fa0/11 trunk

Port Mode Encapsulation Status Native vlanFa0/11 desirable 802.1q trunking 1

Port Vlans allowed on trunkFa0/11 1-4094

Port Vlans allowed and active in management domainFa0/11 1-13

SwitchX# show interfaces fa0/11 switchportName: Fa0/11Switchport: EnabledAdministrative Mode: trunkOperational Mode: downAdministrative Trunking Encapsulation: dot1qNegotiation of Trunking: OnAccess Mode VLAN: 1 (default)Trunking Native Mode VLAN: 1 (default) . . .

Verifying a TrunkSwitchX# show interfaces interface [switchport | trunk]

Page 36: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-36

VLAN Creation Guidelines

The maximum number of VLANs is switch-dependent.

Most Cisco Catalyst desktop switches support 128 separate spanning-tree instances, one per VLAN.

VLAN 1 is the factory default Ethernet VLAN.

Cisco Discovery Protocol and VTP advertisements are sent on VLAN 1.

The Cisco Catalyst switch IP address is in the management VLAN (VLAN 1 by default).

If using VTP, the switch must be in VTP server or transparent mode to add or delete VLANs.

Page 37: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-37

Adding a VLAN

SwitchX# configure terminalSwitchX(config)# vlan 2SwitchX(config-vlan)# name switchlab99

Page 38: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-38

SwitchX# show vlan id 2

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------2 switchlab99 active Fa0/2, Fa0/12

VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------2 enet 100002 1500 - - - - - 0 0

. . .SwitchX#

Verifying a VLAN

SwitchX# show vlan [brief | id vlan-id || name vlan-name]

Page 39: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-39

Assigning Switch Ports to a VLAN

SwitchX# configure terminalSwitchX(config)# interface range fastethernet 0/2 - 4SwitchX(config-if)# switchport access vlan 2

SwitchX# show vlan

VLAN Name Status Ports---- -------------------------------- --------- ----------------------1 default active Fa0/1 2 switchlab99 active Fa0/2, Fa0/3, Fa0/4

switchport access [vlan vlan# | dynamic]

SwitchX(config-if)#

Page 40: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-40

SwitchX# show vlan briefVLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/12 switchlab99 active Fa0/2, Fa0/3, Fa0/4 3 vlan3 active4 vlan4 active1002 fddi-default act/unsup1003 token-ring-default act/unsup

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------1004 fddinet-default act/unsup1005 trnet-default act/unsup

SwitchX# show vlan brief

Verifying VLAN Membership

Page 41: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-41

Verifying VLAN Membership (Cont.)

SwitchX# show interfaces fa0/2 switchportName: Fa0/2Switchport: EnabledAdministrative Mode: dynamic autoOperational Mode: static accessAdministrative Trunking Encapsulation: dot1qOperational Trunking Encapsulation: nativeNegotiation of Trunking: OnAccess Mode VLAN: 2 (switchlab99)Trunking Native Mode VLAN: 1 (default)--- output omitted ----

show interfaces interface switchport

SwitchX(config-if)#

Page 42: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-42

Medium-Sized Switched Network Construction

Improving Performance with Spanning Tree

Page 43: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-43

Advantages of EtherChannel

Logical aggregation of similar links between switches

Load-shares across links

Viewed as one logical port to STP

Redundancy

Page 44: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-44

Redundant Topology

Redundant topology eliminates single points of failure.

Redundant topology causes broadcast storms, multiple frame copies, and MAC address table instability problems.

Page 45: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-45

Station D sends a broadcast frame.

Broadcast frames are flooded to all ports except the originating port.

Broadcast Frames

Page 46: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-46

Multiple Frame Copies

Host X sends a unicast frame to router Y.

The MAC address of router Y has not been learned by either switch.

Router Y will receive two copies of the same frame.

Page 47: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-47

Host X sends a unicast frame to router Y.

The MAC address of router Y has not been learned by either switch.

Switches A and B learn the MAC address of host X on port 1.

The frame to router Y is flooded.

Switches A and B incorrectly learn the MAC address of host X on port 2.

MAC Database Instability

Page 48: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-48

Broadcast Storms

Host X sends a broadcast.

Switches continue to propagate broadcast traffic over and over.

Page 49: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-49

Provides a loop-free redundant network topology by placing certain ports in the blocking state

Published in the IEEE 802.1D specification

Enhanced with the Cisco PVST+ implementation

Loop Resolution with STP

Page 50: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-50

Spanning-Tree Operation One root bridge per broadcast domain.

One root port per nonroot bridge.

One designated port per segment.

Nondesignated ports are unused.

Page 51: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-51

STP Root Bridge Selection

BPDU (default = sent every 2 seconds)

Root bridge = bridge with the lowest bridge ID

Bridge ID =BridgePriority

MACAddress

Page 52: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-52

Per VLAN Spanning Tree Plus

Page 53: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-53

PVST+ Extended Bridge ID

Bridge ID without the extended system ID

Extended bridge ID with system ID

System ID = VLAN

Page 54: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-54

Default Spanning-Tree Configuration

Cisco Catalyst switches support three types of STPs:

– PVST+

– PVRST+

– MSTP

The default STP for Cisco Catalyst switches is PVST+ :

– A separate STP instance for each VLAN

– One root bridge for all VLANs

– No load sharing

Page 55: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-55

PVRST+ Implementation Commands

spanning-tree mode rapid-pvst

SwitchX(config)#

Configures PVRST+

show spanning-tree vlan vlan# [detail]

SwitchX#

Verifies the spanning-tree configuration

debug spanning-tree pvst+

SwitchX#

Displays PVST+ event debug messages

Page 56: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-56

Verifying PVRST+

The spanning-tree mode is set to PVRST.

SwitchX# show spanning-tree vlan 30 VLAN0030Spanning tree enabled protocol rstpRoot ID Priority 24606Address 00d0.047b.2800This bridge is the rootHello Time 2 sec Max Age 20 sec Forward Delay 15 secBridge ID Priority 24606 (priority 24576 sys-id-ext 30) Address 00d0.047b.2800Hello Time 2 sec Max Age 20 sec Forward Delay 15 secAging Time 300Interface Role Sts Cost Prio.Nbr Type-------- ----- --- --- -------- ----Gi1/1 Desg FWD 4 128.1 P2pGi1/2 Desg FWD 4 128.2 P2pGi5/1 Desg FWD 4 128.257 P2p

Page 57: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-57

Configuring the Root and Secondary Bridges

Page 58: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-58

Configuring the Root and Secondary Bridges: SwitchA

spanning-tree vlan 1 root primary

This command forces this switch to be the root for VLAN 1.

spanning-tree vlan 2 root secondary

This command configures this switch to be the secondary root for VLAN 2.

OR

spanning-tree vlan # priority priority

This command statically configures the priority (increments of 4096).

SwitchA(config)#

SwitchA(config)#

SwitchA(config)#

Page 59: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-59

Configuring the Root and Secondary Bridges: SwitchB

spanning-tree vlan 2 root primary

This command forces the switch to be the root for VLAN 2.

spanning-tree vlan 1 root secondary

This command configures the switch to be the secondary root VLAN 1.

OR

spanning-tree vlan # priority priority

This command statically configures the priority (increments of 4096).

SwitchB(config)#

SwitchB(config)#

SwitchB(config)#

Page 60: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-60

Implementing High Availability in a Campus Environment

Configuring Layer 3 Redundancy with HSRP

Page 61: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-61

Routing Issues: Using Default Gateways

Page 62: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-62

Routing Issues: Using Proxy ARP

Page 63: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-63

Router Redundancy

Page 64: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-64

Router Redundancy

Page 65: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-65

HSRP

Standby group: The set of routers participating in HSRP that jointly emulate a virtual router

Page 66: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-66

The active router responds to ARP requests with the MAC address of the virtual router.

The Active Router

Page 67: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-67

The Virtual Router MAC Address

Page 68: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-68

The Standby Router

The standby router listens for periodic hello messages on 224.0.0.2.

Page 69: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-69

Active and Standby Router Interaction

Page 70: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-70

HSRP States

An HSRP router can be in one of six different states:• Initial

• Learn

• Listen

• Speak

• Standby

• Active

Page 71: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-71

HSRP State Transition

Initial Initial

Listen Listen

Active Speak

Standby Listen

Speak Speak

Standby

Router APriority

100

Router BPriority

50

HSRP Standby Group 1

Router B hears that router A has a higher priority, so router B returns to the listen state.

Router A does not hear any higher priority than itself, so promotes itself to standby.

Router A does not hear an active router, so promotes itself to active.

Page 72: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-72

A router in the standby state:• Is a candidate for active router • Sends hello messages• Knows the virtual router IP address

HSRP Standby State

Page 73: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-73

A router in the active state:• Assumes the active forwarding of packets for the virtual router • Sends hello messages• Knows the virtual router IP address

HSRP Active State

Page 74: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-74

HSRP Configuration Commands

Configure standby 1 ip 10.1.1.1

Verify show running-config

show standby

Page 75: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-75

Enabling HSRP on a Cisco router interface automatically disables ICMP redirects.

Configuring an HSRP Standby Interface

Page 76: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-76

Displaying the Standby Brief Status

Switch#show standby brief P indicates configured to preempt. |Interface Grp Prio P State Active addr Standby addr Group addrVl11 11 110 Active local 172.16.11.114 172.16.11.115

Page 77: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-77

Implementing High Availability in a Campus Environment

Optimizing HSRP

Page 78: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-78

HSRP Optimization Options

These options can be configured to optimize HSRP: HSRP standby priority

HSRP standby preempt

Hello message timers

HSRP interface tracking

Page 79: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-79

Configuring HSRP Standby Priority

• The router with the highest priority in an HSRP group becomes the active router.

• The default priority is 100.

• In the case of a tie, the router with the highest configured IP address will become active.

Page 80: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-80

Configuring HSRP Standby Preempt

Preempt enables a router to resume the forwarding router role.

Page 81: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-81

Configuring the Hello Message Timers

The holdtime parameter value should be at least three times the value of the hellotime parameter.

Page 82: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-82

HSRP Interface Tracking

Page 83: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-83

HSRP Interface Tracking (Cont.)

Page 84: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-84

Configuring HSRP Tracking

Switch(config-if)#standby [group-number] track type number [interface-priority]

• Configures HSRP tracking

Switch(config)#interface vlan 10Switch(config-if)#standby 1 track GigabitEthernet 0/7 50Switch(config-if)#standby 1 track GigabitEthernet 0/8 60

• Example of HSRP tracking

Note: Preempt must be configured on all participating devices within the HSRP group.

Page 85: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-85

Tuning HSRP

Configure hellotime and holdtime to millisecond values.

Configure preempt delay timer so that preempt occurs only after the distribution switch has fully rebooted and established full connectivity to the rest of the network.

Page 86: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-86

To load balance routers, assign them to multiple groups on the same subnet.

Multiple HSRP Groups

Page 87: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-87

Addressing HSRP Groups Across Trunk Links

To load balance routers and links:

– Per VLAN, configure the HSRP active router and the spanning tree root to be the same multilayer switch.

Page 88: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-88

About the HSRP Debug Command

debug standby events

debug standby terse

Page 89: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-89

Debugging HSRP

• Example of HSRP debug showing standby group number mismatch

DSW111#debug standby*Mar 4 19:08:08.918: HSRP: Vl1 Grp 1 Hello out 172.16.1.111 Active pri 150 vIP 172.16.1.113*Mar 4 19:08:09.287: HSRP: Vl1 Grp 2 Hello in 172.16.1.112 Active pri 50 vIP 172.16.1.113*Mar 4 19:08:09.287: HSRP: Vl1 API active virtual address 172.16.1.113 found*Mar 4 19:08:09.891: HSRP: Vl1 API Duplicate ARP entry detected for 172.16.1.113*Mar 4 19:08:09.891: HSRP: Vl1 Grp 1 Hello out 172.16.1.111 Active pri 150 vIP 172.16.1.113*Mar 4 19:08:10.294: HSRP: Vl1 Grp 2 Hello in 172.16.1.112 Active pri 50 vIP 172.16.1.113*Mar 4 19:08:10.294: HSRP: Vl1 API active virtual address 172.16.1.113 found*Mar 4 19:08:10.294: HSRP: Vl1 API Duplicate ARP entry detected for 172.16.1.113*Mar 4 19:08:10.294: HSRP: Vl1 Grp 1 Hello out 172.16.1.111 Active pri 150 vIP 172.16.1.113*Mar 4 19:08:10.294: HSRP: Vl1 Grp 2 Hello in 172.16.1.112 Active pri 50 vIP 172.16.1.113*Mar 4 19:08:10.294: HSRP: Vl1 API active virtual address 172.16.1.113 found*Mar 4 19:08:10.898: HSRP: Vl1 API Duplicate ARP entry detected for 172.16.1.113*Mar 4 19:08:10.898: HSRP: Vl1 Grp 1 Hello out 172.16.1.111 Active pri 150 vIP 172.16.1.113*Mar 4 19:08:10.965: HSRP: Vl1 Grp 2 Hello in 172.16.1.112 Active pri 50 vIP 172.16.1.113*Mar 4 19:08:11.300: HSRP: Vl1 API active virtual address 172.16.1.113 found

Page 90: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-90

Access Control Lists

Introducing ACL Operation

Page 91: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-91

Why Use ACLs?

Filtering: Manage IP traffic by filtering packets passing through a router

Classification: Identify traffic for special handling

Page 92: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-92

ACL Applications: Filtering

Permit or deny packets moving through the router.

Permit or deny vty access to or from the router.

Without ACLs, all packets could be transmitted to all parts of your network.

Page 93: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-93

Special handling for traffic based on packet tests

ACL Applications: Classification

Page 94: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-94

Outbound ACL Operation

If no ACL statement matches, discard the packet.

Page 95: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-95

A List of Tests: Deny or Permit

Page 96: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-96

Types of ACLs

Standard ACL– Checks source address

– Generally permits or denies entire protocol suite

Extended ACL– Checks source and destination address

– Generally permits or denies specific protocols and applications

Two methods used to identify standard and extended ACLs:

– Numbered ACLs use a number for identification

– Named ACLs use a descriptive name or number for identification

Page 97: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-97

How to Identify ACLs

Numbered standard IPv4 lists (1–99) test conditions of all IP packets for source addresses. Expanded range (1300–1999).

Numbered extended IPv4 lists (100–199) test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports. Expanded range (2000–2699).

Named ACLs identify IP standard and extended ACLs with an alphanumeric string (name).  

Page 98: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-98

IP Access List Entry Sequence Numbering

Requires Cisco IOS Release 12.3

Allows you to edit the order of ACL statements using sequence numbers

– In software earlier than Cisco IOS Release 12.3, a text editor is used to create ACL statements, then the statements are copied into the router in the correct order.

Allows you to remove a single ACL statement from the list using a sequence number

– With named ACLs in software earlier than Cisco IOS Release 12.3, you must use no {deny | permit} protocol source source-wildcard destination destination-wildcard to remove an individual statement.

– With numbered ACLs in software earlier than Cisco IOS Release 12.3, you must remove the entire ACL to remove a single ACL statement.

Page 99: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-99

ACL Configuration Guidelines

Standard or extended indicates what can be filtered. Only one ACL per interface, per protocol, and per direction is allowed. The order of ACL statements controls testing, therefore, the most specific

statements go at the top of the list. The last ACL test is always an implicit deny everything else statement, so every

list needs at least one permit statement. ACLs are created globally and then applied to interfaces for inbound or outbound

traffic. An ACL can filter traffic going through the router, or traffic to and from the router,

depending on how it is applied. When placing ACLs in the network:

– Place extended ACLs close to the source

– Place standard ACLs close to the destination

Page 100: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-100

Dynamic ACLs

Dynamic ACLs (lock-and-key): Users that want to traverse the router are blocked until they use Telnet to connect to the router and areauthenticated.

Page 101: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-101

Time-Based ACLs

Time-based ACLs: Allow for access control based on the time of day and week

Page 102: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-102

172.30.16.29 0.0.0.0 matches all of the address bits

Abbreviate this wildcard mask using the IP address preceded by the keyword host (host 172.30.16.29)

Wildcard Bit Mask Abbreviations

0.0.0.0 255.255.255.255 ignores all address bits

Abbreviate expression with the keyword any

Page 103: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-103

Wildcard Bits: How to Check the Corresponding Address Bits

0 means to match the value of the corresponding address bit

1 means to ignore the value of the corresponding address bit

Page 104: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-104

Match for IP subnets 172.30.16.0/24 to 172.30.31.0/24.

Wildcard Bits to Match IP Subnets

Address and wildcard mask:

172.30.16.0 0.0.15.255

Page 105: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-105

Access Control Lists

Configuring and Troubleshooting ACLs

Page 106: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-106

Testing Packets with Numbered Standard IPv4 ACLs

Page 107: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-107

Activates the list on an interface.

Sets inbound or outbound testing.

no ip access-group access-list-number {in | out} removes the ACL from the interface.

ip access-group access-list-number {in | out}

Uses 1 to 99 for the access-list-number.

The first entry is assigned a sequence number of 10, and successive entries are incremented by 10.

Default wildcard mask is 0.0.0.0 (only standard ACL).

no access-list access-list-number removes the entire ACL.

remark lets you add a description to the ACL.

access-list access-list-number {permit | deny | remark} source [mask]

RouterX(config)#

RouterX(config-if)#

Numbered Standard IPv4 ACL Configuration

Page 108: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-108

Permit my network only

Numbered Standard IPv4 ACLExample 1

RouterX(config)# access-list 1 permit 172.16.0.0 0.0.255.255(implicit deny all - not visible in the list)(access-list 1 deny 0.0.0.0 255.255.255.255)

RouterX(config)# interface ethernet 0RouterX(config-if)# ip access-group 1 outRouterX(config)# interface ethernet 1RouterX(config-if)# ip access-group 1 out

Page 109: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-109

Deny a specific host

Numbered Standard IPv4 ACL Example 2

RouterX(config)# access-list 1 deny 172.16.4.13 0.0.0.0 RouterX(config)# access-list 1 permit 0.0.0.0 255.255.255.255(implicit deny all)(access-list 1 deny 0.0.0.0 255.255.255.255)

RouterX(config)# interface ethernet 0RouterX(config-if)# ip access-group 1 out

Page 110: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-110

Deny a specific subnet

Numbered Standard IPv4 ACL Example 3

RouterX(config)# access-list 1 deny 172.16.4.0 0.0.0.255RouterX(config)# access-list 1 permit any(implicit deny all)(access-list 1 deny 0.0.0.0 255.255.255.255)

RouterX(config)# interface ethernet 0RouterX(config-if)# ip access-group 1 out

Page 111: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-111

Permits only hosts in network 192.168.1.0 0.0.0.255 to connect to the router vty lines

access-list 12 permit 192.168.1.0 0.0.0.255(implicit deny any) !line vty 0 4 access-class 12 in

Example:

access-class access-list-number {in | out}

Restricts incoming or outgoing connections between a particular vty and the addresses in an ACL

RouterX(config-line)#

Standard ACLs to Control vty Access

Page 112: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-112

Testing Packets with Numbered Extended IPv4 ACLs

Page 113: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-113

ip access-group access-list-number {in | out}

Activates the extended list on an interface

Sets parameters for this list entry

access-list access-list-number {permit | deny} protocol source source-wildcard [operator port] destination destination-wildcard [operator port] [established] [log]

RouterX(config)#

RouterX(config-if)#

Numbered Extended IPv4 ACL Configuration

Page 114: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-114

Numbered Extended IPv4 ACL Example 1

RouterX(config)# access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21RouterX(config)# access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20RouterX(config)# access-list 101 permit ip any any(implicit deny all)(access-list 101 deny ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255)

RouterX(config)# interface ethernet 0RouterX(config-if)# ip access-group 101 out

Deny FTP traffic from subnet 172.16.4.0 to subnet 172.16.3.0 out E0 Permit all other traffic

Page 115: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-115

Numbered Extended IPv4 ACL Example 2

RouterX(config)# access-list 101 deny tcp 172.16.4.0 0.0.0.255 any eq 23RouterX(config)# access-list 101 permit ip any any(implicit deny all)

RouterX(config)# interface ethernet 0RouterX(config-if)# ip access-group 101 out

Deny only Telnet traffic from subnet 172.16.4.0 out E0

Permit all other traffic

Page 116: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-116

ip access-list {standard | extended} name

[sequence-number] {permit | deny} {ip access list test conditions}

{permit | deny} {ip access list test conditions}

ip access-group name {in | out}

Named IP ACL Configuration

Alphanumeric name string must be unique

If not configured, sequence numbers are generated automatically starting at 10 and incrementing by 10

no sequence number removes the specific test from the named ACL

Activates the named IP ACL on an interface

RouterX(config {std- | ext-}nacl)#

RouterX(config-if)#

RouterX(config)#

Page 117: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-117

Deny a specific host

Named Standard IPv4 ACL Example

RouterX(config)#ip access-list standard troublemakerRouterX(config-std-nacl)#deny host 172.16.4.13RouterX(config-std-nacl)#permit 172.16.4.0 0.0.0.255RouterX(config-std-nacl)#interface e0RouterX(config-if)#ip access-group troublemaker out

Page 118: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-118

Deny Telnet from a specific subnet

Named Extended IPv4 ACL Example

RouterX(config)#ip access-list extended badgroupRouterX(config-ext-nacl)#deny tcp 172.16.4.0 0.0.0.255 any eq 23RouterX(config-ext-nacl)#permit ip any anyRouterX(config-ext-nacl)#interface e0RouterX(config-if)#ip access-group badgroup out

Page 119: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-119

Commenting ACL Statements

access-list access-list-number remark remark

ip access-list {standard|extended} name

Creates a named ACL comment

Creates a numbered ACL comment

RouterX(config {std- | ext-}nacl)#

RouterX(config)#

remark remark

RouterX(config)#

Creates a named ACL

Or

Page 120: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-120

Monitoring ACL Statements

RouterX# show access-lists {access-list number|name}

RouterX# show access-lists Standard IP access list SALES 10 deny 10.1.1.0, wildcard bits 0.0.0.255 20 permit 10.3.3.1 30 permit 10.4.4.1 40 permit 10.5.5.1Extended IP access list ENG 10 permit tcp host 10.22.22.1 any eq telnet (25 matches) 20 permit tcp host 10.33.33.1 any eq ftp 30 permit tcp host 10.44.44.1 any eq ftp-data

Displays all access lists

Page 121: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-121

Verifying ACLs

RouterX# show ip interfaces e0Ethernet0 is up, line protocol is up Internet address is 10.1.1.11/24 Broadcast address is 255.255.255.255 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is 1 Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP Feature Fast switching turbo vector IP multicast fast switching is enabled IP multicast distributed fast switching is disabled <text ommitted>

Page 122: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-122

Troubleshooting Common ACL Errors

Error 1: Host 10.1.1.1 has no connectivity with 10.100.100.1.

Page 123: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-123

LAN Extension into a WAN

Introducing VPN Solutions

Page 124: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-124

What Is a VPN?

Virtual: Information within a private network is transported over a public network.

Private: The traffic is encrypted to keep the data confidential.

Page 125: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-125

Benefits of VPN

Cost Security Scalability

Page 126: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-126

Site-to-Site VPNs

Site-to-site VPN: extension of classic WAN

Page 127: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-127

Remote-Access VPNs

Remote-access VPN: evolution of dial-in networks and ISDN

Page 128: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-128

Cisco Easy VPN

Page 129: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-129

VPN-Enabled Cisco IOS Routers

Page 130: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-130

Cisco ASA Adaptive Security Appliances

Page 131: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-131

(legacy)

VPN Clients

Page 132: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-132

What Is IPsec?

IPsec acts at the network layer, protecting and authenticating IP packets. It is a framework of open standards that is algorithm independent. It provides data confidentiality, data integrity, and origin authentication.

Page 133: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-133

IPsec Security Services

Confidentiality

Data integrity

Authentication

Antireplay protection

Page 134: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-134

Confidentiality (Encryption)

Page 135: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-135

Encryption Algorithms

Encryption algorithms: DES

AES

3DES

RSA

Page 136: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-136

DH Key Exchange

Diffie-Hellman algorithms: DH1

DH2

DH5

Page 137: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-137

Data Integrity

Hashing algorithms: HMAC-MD5

HMAC-SHA-1

Page 138: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-138

Authentication

Peer authentication methods: PSKs

RSA signatures

Page 139: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-139

IPsec Security Protocols

Page 140: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-140

IPsec Framework

Page 141: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-141

EZVPN 服务器端配置第一步:配置 XAUTHR1(config)#aaa new-modelR1(config)#aaa authentication login ezvpnauthen local

R1(config)# aaa authorization network ezvpnauthor local R1(config)#username cisco password ciscoR1(config)#enable secret ciscoR1(config)#crypto isakmp xauth timeout 30

第二步:建立 IP地址池R1(config)#ip local pool dypool 100.1.1.100 100.1.1.200

第三步:配置 ISAKMP策略R1(config)#crypto isakmp policy 1R1(config-isakmp)#authentication pre-shareR1(config-isakmp)#encryption 3desR1(config-isakmp)#group 2R1(config-isakmp)#exit

Page 142: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-142

EZVPN 服务器端配置第四步:定义用户组策略R1(config)#crypto isakmp client configuration group ezvpngroupR1(config-isakmp-group)#key cisco123R1(config-isakmp-group)#dns 100.1.1.10 100.1.1.11R1(config-isakmp-group)#wins 100.1.1.12 100.1.1.13R1(config-isakmp-group)#domain cisco.comR1(config-isakmp-group)#pool dypoolR1(config-isakmp-group)#exit

第五步:设置 IPsec策略R1(config)#crypto ipsec transform-set ezset esp-3des esp-sha-hmacR1(cfg-crypto-trans)#mode transport

R1(cfg-crypto-trans)#exit

第六步:定义 Ezvpn profileR1(config)# crypto isakmp profile vpnclient

R1(config-isakmp-profile)#match identity group ezvpngroup

R1(config-isakmp-profile)#client authen list ezvpnauthen

R1(config-isakmp-profile)#isakmp author list ezvpnauthor

R1(config-isakmp-profile)#client config address respond

Page 143: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-143

EZVPN 服务器端配置第七步:建立动态MAPR1(config)#crypto dynamic-map dymap 1

R1(config-crypto-map)# set isakmp-profile vpnclientR1(config-crypto-map)#set transform-set ezsetR1(config-crypto-map)#reverse-routeR1(config-crypto-map)#exit

R1(config)# crypto map MAP 10 ipsec-isakmp dynamic dymap

第八步:将动态加密映射应用到接口R1(config)#int s0/0R1(config-if)#crypto map MAPR1(config-if)#exit

Page 144: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-144

EZVPN 客户端配置crypto ipsec client ezvpn

  connect auto 

mode client

group ezvpngroup

  key cisco123

  peer 10.1.1.1

interfac e0/0  

  crypto ipsec client ezvpn inside

interface s0/0

crypto ipsec client ezvpn outside

Page 145: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-145

PPPoE配置 使用 ADSL modemvpdn enable no vpdn logging vpdn-group 1 request-dialin protocol pppoe interface Ethernet0/0 ip address 192.168.0.1 255.255.255.0 ip nat inside no ip mroute-cache interface Ethernet0/1 no ip address pppoe enable pppoe-client dial-pool-number 1

Page 146: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-146

PPPoE配置 使用 ADSL modeminterface Dialer1 ip address negotiated ip nat outside ip mtu 1492 encapsulation ppp no ip mroute-cache dialer pool 1 dialer-group 1 ppp authentication pap ppp pap sent-username [email protected] password xxxxxxxx! ip classless no ip http server ! dialer-list 1 protocol ip permit ip nat inside source list 1 interface Dialer1 overloadip route 0.0.0.0 0.0.0.0 dialer1

Page 147: Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-147