142
www.ncp.edu.pk 1 Introduction to Switched Networks Routing And Switching

Introduction to Switched Networks - ncp.edu.pk

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Introduction to Switched Networks - ncp.edu.pk

www.ncp.edu.pk 1

Introduction to Switched Networks

Routing And Switching

Page 2: Introduction to Switched Networks - ncp.edu.pk

2www.ncp.edu.pk

Converged NetworksGrowing Complexity of Networks

Our digital world is changing

Information must be accessed from anywhere in the world

Networks must be secure, reliable, and highly available

Page 3: Introduction to Switched Networks - ncp.edu.pk

3www.ncp.edu.pk

Converged NetworksElements Of A Converged Network

Collaboration is a requirement

To support collaboration, networks employ converged solutions

Data services such as voice systems, IP phones, voice gateways, video support, and video conferencing

Call control, voice messaging, mobility and automated attendant are also common features

Page 4: Introduction to Switched Networks - ncp.edu.pk

4www.ncp.edu.pk

Converged NetworksElements Of A Converged Network

Benefits of Converged Networks include:

Multiple types of traffic; Only one network to manage

Substantial savings over installation and management of separate voice, video and data networks

Integrates IT management

Page 5: Introduction to Switched Networks - ncp.edu.pk

5www.ncp.edu.pk

Converged NetworksHierarchy in the Borderless Switched Network

Borderless switched network design guidelines are built upon the following principles:

HierarchicalModularityResiliencyFlexibility

Page 6: Introduction to Switched Networks - ncp.edu.pk

6www.ncp.edu.pk

Converged NetworksCore, Distribution, Access

Page 7: Introduction to Switched Networks - ncp.edu.pk

7www.ncp.edu.pk

Switched NetworksRole of Switched Networks

The role of switched networks has evolved

A switched LAN allows more flexibility, traffic management

It also support features such as quality of service, additional security, support for wireless, support for IP telephony and mobility services

Page 8: Introduction to Switched Networks - ncp.edu.pk

8www.ncp.edu.pk

Switched NetworksForm Factor

Fixed Modular Stackable

Page 9: Introduction to Switched Networks - ncp.edu.pk

9www.ncp.edu.pk

Frame ForwardingSwitching as a General Concept

A Switch makes a decision based on ingress and destination port

A LAN switch keeps a table that it uses to determine how to forward traffic through the switch

LAN switches forward Ethernet frames based on the destination MAC address of the frames.

Page 10: Introduction to Switched Networks - ncp.edu.pk

10www.ncp.edu.pk

Frame ForwardingDynamically Populating a Switch MAC Address Table

A switch must first learn which devices exist on each port before it can transmit a frame

It builds a table called a MAC address, or content addressable memory (CAM) table

The mapping device <-> port is stored in the CAM table

CAM is a special type of memory used in high-speed searching applications.

The information in the MAC address table is used to send frames

When a switch receives an incoming frame with a MAC address that is not found in the CAM table, it floods it to all ports but the one that received the frame.

Page 11: Introduction to Switched Networks - ncp.edu.pk

11www.ncp.edu.pk

Frame ForwardingSwitch Forwarding Methods

Page 12: Introduction to Switched Networks - ncp.edu.pk

12www.ncp.edu.pk

Frame ForwardingStore-and-Forward Switching

Store-and-Forwarding allows the switch to:Check for errors (via FCS check)Perform Automatic Buffering

Slower forwarding

Page 13: Introduction to Switched Networks - ncp.edu.pk

13www.ncp.edu.pk

Frame ForwardingCut-Through Switching

Cut-Through allows the switch to start forwarding in about 10 microseconds

No FCS check

No Automatic Buffering

Page 14: Introduction to Switched Networks - ncp.edu.pk

14www.ncp.edu.pk

Switching DomainsCollision Domains

Collision domain is the segment where devices must compete to communicate

All ports of a hub belong to the same collision domain

Every port of a switch is a collision domain on its own

A switch break the segment into smaller collision domains, easing device competition.

Page 15: Introduction to Switched Networks - ncp.edu.pk

15www.ncp.edu.pk

Switching DomainsBroadcast Domains

Broadcast domain is the extend of the network where a broadcast frame can be heard.

Switches forward broadcast frames to all ports. Therefore switches don’t break broadcast domains.

All ports of a switch (with its default configuration) belong to the same broadcast domain

If two or more switches are connected, broadcasts will be forward to all ports of all switches (except for the port that originally received the broadcast)

Page 16: Introduction to Switched Networks - ncp.edu.pk

16www.ncp.edu.pk

Switching DomainsAlleviating Network CongestionSwitches help alleviating network congestion by:

facilitating the segmentation of a LAN into separate collision domains

providing full-duplex communication between devices

taking advantage of their high port density

buffering large frames

employing high speed ports

taking advantage of their fast internal switching process

having a low per-port cost

Page 17: Introduction to Switched Networks - ncp.edu.pk

17www.ncp.edu.pk

Basic Switch ConfigurationSwitch Boot Sequence

1. POST (Power On Self Test)

2. Run boot loader software

3. Boot loader does low-level CPU initialization

4. Boot loader initializes the flash filesystem

5. Boot loader locates and loads a default IOS operating system software image into memory and hands control of the switch over to the IOS.

Page 18: Introduction to Switched Networks - ncp.edu.pk

18www.ncp.edu.pk

Basic Switch ConfigurationSwitch Boot Sequence

In order to find a suitable IOS image, the switch goes through the following steps:

1. It attempts to automatically boot by using information in the BOOT environment variable

2. If this variable is not set, the switch performs a top-to-bottom search through the flash file system. It will load and execute the first executable file, if it can.

3. The IOS operating system then initializes the interfaces using the IOS commands found in the configuration file, startup configuration, which is stored in NVRAM.

Note: the command boot system can be used to set the BOOT environment variable.

Page 19: Introduction to Switched Networks - ncp.edu.pk

19www.ncp.edu.pk

Basic Switch ConfigurationPreparing for Basic Switch Management

In order to remotely manage a switch, it needs to be configured to access the network

An IP address and a subnet mask must be configured

If managing the switch from a remote network, a default gateway must also be configured

The IP information (address, subnet mask, gateway) is to be assigned to a switch SVI (switch virtual interface)

Although these IP settings allow remote management and remote access to the switch, they do not allow the switch to route Layer 3 packets.

Page 20: Introduction to Switched Networks - ncp.edu.pk

20www.ncp.edu.pk

Basic Switch ConfigurationPreparing for Basic Switch Management

Page 21: Introduction to Switched Networks - ncp.edu.pk

21www.ncp.edu.pk

Configure Switch PortsConfigure Switch Ports at the Physical Layer

Page 22: Introduction to Switched Networks - ncp.edu.pk

22www.ncp.edu.pk

Configure Switch PortsMDIX Auto Feature

Certain cable types (straight-through or crossover) were required when connecting devices

The automatic medium-dependent interface crossover (auto-MDIX) feature eliminates this problem

When auto-MDIX is enabled, the interface automatically detects and configures the connection appropriately

When using auto-MDIX on an interface, the interface speed and duplex must be set to auto

Page 23: Introduction to Switched Networks - ncp.edu.pk

23www.ncp.edu.pk

Configure Switch PortsMDIX Auto Feature

Page 24: Introduction to Switched Networks - ncp.edu.pk

24www.ncp.edu.pk

Configure Switch PortsVerifying Switch Port Configuration

Page 25: Introduction to Switched Networks - ncp.edu.pk

25www.ncp.edu.pk

Security Concerns in LANsMAC Address Flooding

Attacker flooding the CAM table with bogus entries

Page 26: Introduction to Switched Networks - ncp.edu.pk

26www.ncp.edu.pk

Security Concerns in LANsMAC Address Flooding

The switch now behaves as a hub

Page 27: Introduction to Switched Networks - ncp.edu.pk

27www.ncp.edu.pk

Security Concerns in LANsDHCP Spoofing

DHCP is a network protocol used to assign IP info automatically

Two types of DHCP attacks are:•DHCP spoofing•DHCP starvation

In DHCP spoofing attacks, a fake DHCP server is placed in the network to issue DHCP addresses to clients.

DHCP starvation is often used before a DHCP spoofing attack to deny service to the legitimate DHCP server

Page 28: Introduction to Switched Networks - ncp.edu.pk

28www.ncp.edu.pk

Security Concerns in LANsDHCP Spoofing

DHCP Spoof Attack

Page 29: Introduction to Switched Networks - ncp.edu.pk

29www.ncp.edu.pk

Security Best PracticesNetwork Security Tools: Options

Network Security Tools are very important to network administrators

Such tools allow an administrator to test the strength of the security measures implemented

An administrator can launch an attack against the network and analyze the results

This is also to determine how to adjust security policies to mitigate those types of attacks

Security auditing and penetration testing are two basic functions that network security tools perform

Page 30: Introduction to Switched Networks - ncp.edu.pk

30www.ncp.edu.pk

Security Best PracticesNetwork Security Tools: Audits

Network Security Tools can be used to audit the network

By monitoring the network, an administrator can assess what type of information an attacker would be able to gather

For example, by attacking and flooding the CAM table of a switch, an administrator would learn which switch ports are vulnerable to MAC flooding and correct the issue

Network Security Tools can also be used as penetration test tools

Page 31: Introduction to Switched Networks - ncp.edu.pk

31www.ncp.edu.pk

Security Best PracticesNetwork Security Tools: Audits

Penetration testing is a simulated attack

It helps to determine how vulnerable the network is when under a real attack.

Weaknesses within the configuration of networking devices can be identified based on pen test results

Changes can be made to make the devices more resilient to attacks

Such tests can damage the network and should be carried out under very controlled conditions

An off-line test bed network that mimics the actual production network is the ideal.

Page 32: Introduction to Switched Networks - ncp.edu.pk

32www.ncp.edu.pk

Switch Port SecuritySecure Unused Ports

Disable Unused Ports is a simple yet efficient security guideline

Page 33: Introduction to Switched Networks - ncp.edu.pk

33www.ncp.edu.pk

Switch Port SecurityDHCP Snooping

DHCP Snooping specifies which switch ports can respond to DHCP requests

Page 34: Introduction to Switched Networks - ncp.edu.pk

34www.ncp.edu.pk

Switch Port SecurityPort Security: Operation

Port security limits the number of valid MAC addresses allowed on a port

The MAC addresses of legitimate devices are allowed access, while other MAC addresses are denied

Any additional attempts to connect by unknown MAC addresses will generate a security violation

Secure MAC addresses can be configured in a number of ways:

• Static secure MAC addresses• Dynamic secure MAC addresses• Sticky secure MAC addresses

Page 35: Introduction to Switched Networks - ncp.edu.pk

35www.ncp.edu.pk

Switch Port SecurityPort Security: Violation Modes

IOS considers a security violation when either of these situations occurs:

• The maximum number of secure MAC addresses for that interface have been added to the CAM, and a station whose MAC address is not in the address table attempts to access the interface.

• An address learned or configured on one secure interface is seen on another secure interface in the same VLAN.

There are three possible action to be taken when a violation is detected:

• Protect• Restrict• Shutdown

Page 36: Introduction to Switched Networks - ncp.edu.pk

36www.ncp.edu.pk

Switch Port SecurityPort Security: Configuring

Dynamic Port Security Defaults

Page 37: Introduction to Switched Networks - ncp.edu.pk

37www.ncp.edu.pk

Switch Port SecurityPort Security: Configuring

Configuring Dynamic Port Security

Page 38: Introduction to Switched Networks - ncp.edu.pk

38www.ncp.edu.pk

Switch Port SecurityPort Security: Configuring

Configuring Port Security Sticky

Page 39: Introduction to Switched Networks - ncp.edu.pk

39www.ncp.edu.pk

Switch Port SecurityPort Security: Verifying

Verifying Port Security Sticky

Page 40: Introduction to Switched Networks - ncp.edu.pk

40www.ncp.edu.pk

Switch Port SecurityPort Security: Verifying

Verifying Port Security Sticky – Running Config

Page 41: Introduction to Switched Networks - ncp.edu.pk

41www.ncp.edu.pk

Switch Port SecurityPorts In Error Disabled State

A port security violation can put a switch in error disabled state

A port in error disabled is effectively shut down

The switch will communicate these events through console messages

Page 42: Introduction to Switched Networks - ncp.edu.pk

42www.ncp.edu.pk

Switch Port SecurityPorts In Error Disabled State

The show interface command also reveals a switch port on error disabled state

Page 43: Introduction to Switched Networks - ncp.edu.pk

43www.ncp.edu.pk

Switch Port SecurityPorts In Error Disabled State

A shutdown/no shutdown interface command must be issued to re-enable the port

Page 44: Introduction to Switched Networks - ncp.edu.pk

44www.ncp.edu.pk

How is reliability in a network achieved and downtime reduced?

by using reliable equipment

by designing networks that are tolerant to failures and faults

Networks should be designed to re-converge rapidlyso that a fault is bypassed

Fault tolerance is achieved by redundancy

Spanning-Tree Protocol

Page 45: Introduction to Switched Networks - ncp.edu.pk

45www.ncp.edu.pk

Spanning-Tree ProtocolRedundant Switched Topologies

Redundant topologies eliminate single points of failure

If a path or device fails, the redundant path or device can take over the tasks of the failed path or device.

A Simple Redundant Switched Topology

Page 46: Introduction to Switched Networks - ncp.edu.pk

46www.ncp.edu.pk

Spanning-Tree ProtocolSwitching loops?

Switches flood traffic out all ports when the traffic is sent to a destination that is not yet known

Broadcast and multicast traffic is forwarded out every port, except the port on which the traffic arrived

This traffic can be caught in a loop

Page 47: Introduction to Switched Networks - ncp.edu.pk

47www.ncp.edu.pk

Spanning-Tree Protocol Avoiding Switching Loops

The Spanning-Tree Protocol is used in switched networks to create a loop free logical topology from a physical topology that has loops

“Given a connected, undirected graph, a spanning tree of that graph is a subgraph which is a tree and connects all the vertices together”.

A single graph can have many different spanning trees.

Page 48: Introduction to Switched Networks - ncp.edu.pk

48www.ncp.edu.pk

Spanning-Tree Protocol Intro to Spanning-Tree Protocol (STP)

IEEE 802.1D Spanning-Tree Protocol

Used by Ethernet bridges and switches to construct a loop free shortest path network using the spanning-tree algorithm

Shortest path is based on cumulative link costs

Link costs are based on the speed of the link

Page 49: Introduction to Switched Networks - ncp.edu.pk

49www.ncp.edu.pk

Spanning-Tree Protocol Intro to STP continued…

The Spanning-Tree Protocol establishes a root node, called the root bridge

STP constructs a topology that has one path for reaching every network node

The resulting tree originates from the root bridge

Redundant links that are not part of the shortest path tree are blocked.

Data frames received on blocked links are dropped.

Because certain paths are blocked, a loop free topology is possible

Page 50: Introduction to Switched Networks - ncp.edu.pk

50www.ncp.edu.pk

Bridge Protocol Data Units (BPDUs)

The Spanning-Tree Protocol requires network devices to exchange messages to help form a loop-free logical topology

These messages are called Bridge Protocol Data Units (BPDUs)

Links that will cause a loop are put into a blocking state

BPDUs continue to be received on blocked ports(ensures that if an active path or device fails, a new spanning tree can be calculated)

Page 51: Introduction to Switched Networks - ncp.edu.pk

51www.ncp.edu.pk

More on BPDUs…BPDUs help switches do the following:

Select a single switch that will act as the root of the spanning treeCalculate the shortest path from itself to the root switch Designate one of the switches as the closest one to the root, for each LAN segment. This bridge is called the “designated switch”

The designated switch handles all communication from that LAN towards the root bridge.

Choose one of its ports as a root port (if it is a non-root switch)This is the interface that gives the best path to root switch.

Select ports that are part of the spanning tree, called designated portsNon-designated ports are blocked

Page 52: Introduction to Switched Networks - ncp.edu.pk

52www.ncp.edu.pk

Root Ports, Designated Ports, & Non-Designated Ports

Page 53: Introduction to Switched Networks - ncp.edu.pk

53www.ncp.edu.pk

Information Contained in BPDUs

Page 54: Introduction to Switched Networks - ncp.edu.pk

54www.ncp.edu.pk

Spanning-Tree Operation

When the network has stabilized, it has converged and there is one spanning tree per network

For every switched network the following elements exist:

One root bridge per networkOne root port per non root bridgeOne designated port per segmentUnused, non-designated ports

Root ports and designated ports forward data traffic.

Non-designated ports discard data trafficThese ports are called blocking or discarding ports

Page 55: Introduction to Switched Networks - ncp.edu.pk

55www.ncp.edu.pk

Selecting the Root Bridge

The first decision that all switches in the network make, is to identify the root bridge using the spanning-tree algorithm

the bridge with the smallest Bridge ID(BID) value will be the root bridge.

BPDUs are sent out with the Bridge ID (BID).

The BID consists of a bridge priority (that defaults to 32768) and the switch base MAC address

By default BPDUs are sent every two seconds

All switches see the BIDs sent

Page 56: Introduction to Switched Networks - ncp.edu.pk

56www.ncp.edu.pk

Selecting the Root Bridge Cont’dWhen a switch first starts up, it assumes it is the root switch and sends “inferior” BPDUs.

These BPDUs contain the bridge priority and switch MAC address in both the root and sender BID

As a switch receives a BPDU with a lower root BID it replaces that in the subsequent BPDUs it sends out

A network administrator can influence the decision by setting the switch priority to a smaller value than the default (which will make the BID smaller)

Should only be implemented when the traffic flow on the network is well understood

Page 57: Introduction to Switched Networks - ncp.edu.pk

57www.ncp.edu.pk

Four Stages of Spanning-Tree Port States

•A port can also be in a disabled state which occurs when an administrator shuts down the port or the port fails.

Page 58: Introduction to Switched Networks - ncp.edu.pk

58www.ncp.edu.pk

Blocking State

Ports can only receive BPDUs

Data frames are discarded and no addresses can be learned

It may take up to 20 seconds to change from this state

Listening State

Switches determine if there are any other paths to the root bridge

The path that is not the least cost path to the root bridge goes back to the blocked state

BPDUs are still processed.

User data is not being forwarded and MAC addresses are not being learned

The listening period is called the forward delay and lasts for 15 seconds

Four Stages of Spanning-Tree Port States

Page 59: Introduction to Switched Networks - ncp.edu.pk

59www.ncp.edu.pk

Learning Stateuser data is not forwarded, but MAC addresses are learned from any traffic that is seen

The learning state lasts for 15 seconds and is also called the forward delay

BPDUs are still processed

Forwarding stateuser data is forwarded and MAC addresses continue to be learnedBPDUs are still processed

Disabled State (Fifth State)can occur when an administrator shuts down the port or the port fails

Four Stages of Spanning-Tree Port States

Page 60: Introduction to Switched Networks - ncp.edu.pk

60www.ncp.edu.pk

Spanning-Tree RecalculationA switched internetwork has converged when all the switch and bridge ports are in either the forwarding or blocked state

Forwarding ports send and receive data traffic and BPDUs

Blocked ports will only receive BPDUs

When the network topology changes, switches and bridges recompute the Spanning Tree causing a disruption of user traffic.

Convergence on a new spanning-tree topology using the IEEE 802.1D standard can take up to 50 seconds

Page 61: Introduction to Switched Networks - ncp.edu.pk

61www.ncp.edu.pk

Link AggregationAlso known as port bundling, link bundling, Etherchannel

You can use multiple links in parallel as a single, logical link

For increased capacityFor redundancy (fault tolerance)

LACP (Link Aggregation Control Protocol) is a standardized method of negotiating these bundled links between switches using LACPDUs

PAgP is Cisco’s proprietary Port Aggregation Protocol.

Page 62: Introduction to Switched Networks - ncp.edu.pk

62www.ncp.edu.pk

Link Aggregation

Two switches connected via multiple links will send control packets to form a single logical link.

active Enable LACP unconditionallypassive Enable LACP only if a LACP device is detected

auto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel only

Page 63: Introduction to Switched Networks - ncp.edu.pk

63www.ncp.edu.pk

LACP Operation

LACPDUs• Two switches are connected to each other using two sets of Fast Ethernet ports.

LACP is enabled and the ports are turned on

• Switches start sending LACPDUs, then negotiate how to set up the aggregation

100 Mbps

100 Mbps

200 Mbps logical link

100 Mbps

100 Mbps

••The result is an aggregated 200 Mbps logical link which is fault tolerant.

Page 64: Introduction to Switched Networks - ncp.edu.pk

www.ncp.edu.pk 64

VLANs

Routing And Switching

Page 65: Introduction to Switched Networks - ncp.edu.pk

65www.ncp.edu.pk

Overview Of VLANsVLAN Definitions

VLAN (virtual LAN) is a logical partition of a layer 2 network

Multiple partition can be created, allowing for multiple VLANs to co-exist

Each VLAN is a broadcast domain, usually with its own IP network

VLANS are mutually isolated and packets can only pass between them through a router

The partitioning of the layer 2 network takes inside a layer 2 device, usually a switch.

The hosts grouped within a VLAN are unaware of the VLAN’s existence

Page 66: Introduction to Switched Networks - ncp.edu.pk

66www.ncp.edu.pk

Overview Of VLANsVLAN Definitions

Page 67: Introduction to Switched Networks - ncp.edu.pk

67www.ncp.edu.pk

Overview Of VLANsBenefits of VLANs

Security

Cost reduction

Better performance

Shrink broadcast domains

Improved IT staff efficiency

Simpler project and application management

Page 68: Introduction to Switched Networks - ncp.edu.pk

68www.ncp.edu.pk

Overview Of VLANsTypes of VLANs

Data VLAN

Default VLAN

Native VLAN

Management VLAN

Private VLAN

Page 69: Introduction to Switched Networks - ncp.edu.pk

69www.ncp.edu.pk

Overview Of VLANsTypes of VLANs

Page 70: Introduction to Switched Networks - ncp.edu.pk

70www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentVLAN Trunks

A VLAN trunk carries more than one VLAN

Usually established between switches so same-VLANdevices can communicate even if physically connected to different switches

A VLAN trunk is not associated to any VLANs.

Cisco IOS supports IEEE802.1q, a popular VLAN trunk protocol

Page 71: Introduction to Switched Networks - ncp.edu.pk

71www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentVLAN Trunks

Page 72: Introduction to Switched Networks - ncp.edu.pk

72www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentControlling Broadcast Domains with VLANs

VLANs can be used to limit the reach of broadcast frames

A VLAN is a broadcast domain of its own

Therefore, a broadcast frame sent by a device in a specific VLAN is forwarded within that VLAN only.

This help controlling the reach of broadcast frames and their impact in the network

Unicast and multicast frames are forwarded within the originating VLAN as well

Page 73: Introduction to Switched Networks - ncp.edu.pk

73www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentTagging Ethernet Frames for VLAN Identification

Frame tagging is used to properly transmit multiple VLAN frames through a trunk link

Switches will tag frames to identify the VLAN they belong. Different tagging protocols exist, with IEEE 802.1q being a very popular one

The protocol defines the structure of the tagging header added to the frame

Switches will add VLAN tags to the frames before placing them into trunk links and remove the tags before forwarding frames through non-trunk ports

Once properly tagged, the frames can transverse any number of switches via trunk links and still be forward within the correct VLAN at the destination

Page 74: Introduction to Switched Networks - ncp.edu.pk

74www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentTagging Ethernet Frames for VLAN Identification

Page 75: Introduction to Switched Networks - ncp.edu.pk

75www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentNative VLANs and 802.1q Tagging

A frame that belongs to the native VLAN will not be tagged

A frame that is received untagged will remain untagged and placed in the native VLAN when forwarded

If there are no ports associated to the native VLAN and no other trunk links, an untagged frame will be dropped

In Cisco switches, the native VLAN is VLAN 1 by default

Page 76: Introduction to Switched Networks - ncp.edu.pk

76www.ncp.edu.pk

VLANs in a Multi-Switched EnvironmentVoice VLAN Tagging

Page 77: Introduction to Switched Networks - ncp.edu.pk

77www.ncp.edu.pk

VLAN AssignmentVLAN Ranges On Catalyst Switches

The Catalyst 2960 and 3560 Series switches support over 4,000 VLANs

These VLANs are split into 2 categories:

Normal Range VLANs• VLAN numbers from 1 through 1005• Configurations stored in the vlan.dat (in the flash)• VTP can only learn and store normal range VLANs

Extended Range VLANs• VLAN numbers from 1006 through 4096• Configurations stored in the running-config (in the NVRAM)• VTP does not learn extended range VLANs

Page 78: Introduction to Switched Networks - ncp.edu.pk

78www.ncp.edu.pk

VLAN AssignmentCreating a VLAN

Page 79: Introduction to Switched Networks - ncp.edu.pk

79www.ncp.edu.pk

VLAN AssignmentAssigning Ports To VLANs

Page 80: Introduction to Switched Networks - ncp.edu.pk

80www.ncp.edu.pk

VLAN AssignmentDeleting VLANs

Page 81: Introduction to Switched Networks - ncp.edu.pk

81www.ncp.edu.pk

VLAN AssignmentVerifying VLAN Information

Page 82: Introduction to Switched Networks - ncp.edu.pk

82www.ncp.edu.pk

VLAN AssignmentConfiguring IEEE 802.1q Trunk Links

Page 83: Introduction to Switched Networks - ncp.edu.pk

83www.ncp.edu.pk

VLAN AssignmentResetting the Trunk To Default State

Page 84: Introduction to Switched Networks - ncp.edu.pk

84www.ncp.edu.pk

VLAN AssignmentResetting the Trunk To Default State

Page 85: Introduction to Switched Networks - ncp.edu.pk

85www.ncp.edu.pk

VLAN AssignmentVerifying Trunk Configuration

Page 86: Introduction to Switched Networks - ncp.edu.pk

www.ncp.edu.pk 86

VLAN TrunkingProtocol (VTP)

Page 87: Introduction to Switched Networks - ncp.edu.pk

87www.ncp.edu.pk

VLAN Management Challenge (1)

It is not difficult to add new VLAN for a small network

Page 88: Introduction to Switched Networks - ncp.edu.pk

88www.ncp.edu.pk

VLAN Management Challenge (2)

It is not easy to add a new VLAN to all of switches

Page 89: Introduction to Switched Networks - ncp.edu.pk

89www.ncp.edu.pk

What is VTP?

VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches in the network.

The switch can be configured in the role of a VTP server or a VTP client. VTP server distributes and synchronizes VLAN information to VTP-enabled switches throughout the switched network

VTP only learns about normal-range VLANs (VLAN IDs 1 to 1005).

Extended-range VLANs (IDs greater than 1005) are not supported by VTP.

Page 90: Introduction to Switched Networks - ncp.edu.pk

90www.ncp.edu.pk

VTP benefits

Page 91: Introduction to Switched Networks - ncp.edu.pk

91www.ncp.edu.pk

VTP Components

VTP Domain: consists of one or more interconnected switches. All switches in a domain share VLAN configuration details using VTP advertisements. A router or Layer 3 switch defines the boundary of each domain.VTP Advertisements : VTP uses a hierarchy of advertisements to distribute and synchronize VLAN configurations across the network.

VTP Modes: A switch can be configured in one of three modes: server, client, or transparent.VTP Pruning: VTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to reach the destination devices.

Page 92: Introduction to Switched Networks - ncp.edu.pk

92www.ncp.edu.pk

Dynamic Trunking ProtocolIntroduction to DTP

Switch ports can be manually configured to form trunks

Switch ports can also be configured to negotiate and establish a trunk link with a connected peer

Dynamic Trunking Protocol (DTP) is a protocol to manage trunk negotiation

DTP is a Cisco proprietary protocol and is enabled by default in Cisco Catalyst 2960 and 3560 switches

If the port on the neighbor switch is configured in a trunk mode that supports DTP, it manages the negotiation

The default DTP configuration for Cisco Catalyst 2960 and 3560 switches is dynamic auto

Page 93: Introduction to Switched Networks - ncp.edu.pk

93www.ncp.edu.pk

Dynamic Trunking ProtocolNegotiated Interface Modes

Cisco Catalyst 2960 and 3560 support the following trunk modes:

•switchport mode dynamic auto•switchport mode dynamic desirable•switchport mode trunk•switchport nonegotiate

Page 94: Introduction to Switched Networks - ncp.edu.pk

www.ncp.edu.pk 94

Routing Concepts

Routing Protocols

Page 95: Introduction to Switched Networks - ncp.edu.pk

95www.ncp.edu.pk

Functions of a RouterWhy Routing?

The router is responsible for the routing of traffic between networks.

Page 96: Introduction to Switched Networks - ncp.edu.pk

96www.ncp.edu.pk

Routers can connect multiple networks.

Routers have multiple interfaces, each on a different IP network.

Functions of a RouterRouters Interconnect Networks

Page 97: Introduction to Switched Networks - ncp.edu.pk

97www.ncp.edu.pk

Determine the best path to send packetsUses its routing table to determine path

Forward packets toward their destinationForwards packet to interface indicated in routing table.Encapsulates the packet and forwards out toward destination.

Routers use static routes and dynamic routing protocols to learn about remote networks and build their routing tables.

Functions of a RouterRouters Choose Best Paths

Page 98: Introduction to Switched Networks - ncp.edu.pk

98www.ncp.edu.pk

Process switching – An older packet forwarding mechanism still available for Cisco routers.

Fast switching – A common packet forwarding mechanism which uses a fast-switching cache to store next hop information.

Cisco Express Forwarding (CEF) – The most recent, fastest, and preferred Cisco IOS packet-forwarding mechanism. Table entries are not packet-triggered like fast switching but change-triggered.

Functions of a RouterPacket Forwarding Methods

Page 99: Introduction to Switched Networks - ncp.edu.pk

99www.ncp.edu.pk

To enable network access devices must be configured with the following IP address information

IP address - Identifies a unique host on a local network.Subnet mask -Identifies the host’s network subnet.Default gateway -Identifies the router a packet is sent to to when the destination is not on the same local network subnet.

Connect DevicesDefault Gateways

Page 100: Introduction to Switched Networks - ncp.edu.pk

100www.ncp.edu.pk

Network Documentation should include at least the following in a topology diagram and addressing table:

Device names

Interfaces

IP addresses and

subnet mask

Default gateways

Connect DevicesDocument Network Addressing

Page 101: Introduction to Switched Networks - ncp.edu.pk

101www.ncp.edu.pk

Statically Assigned IP address – host is manually assigned the IP address, subnet mask and default gateway. DNS server IP address can also be assigned.

Used to identify specific network resources such as network servers and printers

Can be used in very small networks with few hosts.

Dynamically Assigned IP Address – IP Address information is dynamically assigned by a server using Dynamic Host Configuration Protocol (DHCP)

Most hosts acquire their IP address information through DHCP

Connect DevicesEnable IP on a Host

Page 102: Introduction to Switched Networks - ncp.edu.pk

102www.ncp.edu.pk

Network infrastructure devices require IP addresses to enable remote management.

On a switch the management IP address is assigned on a virtual interface

Connect DevicesEnable IP on a Switch

Page 103: Introduction to Switched Networks - ncp.edu.pk

103www.ncp.edu.pk

Basics tasks that should be first configured on a Cisco Router and Cisco Switch:

Name the device – Distinguishes it from other routers

Secure management access – Secures privileged EXEC, user EXEC, and Telnet access, and encrypts passwords to their highest level

Configure a banner – Provides legal notification of unauthorized access.

Basic Settings on a Router Configure Basic Router Settings

Page 104: Introduction to Switched Networks - ncp.edu.pk

104www.ncp.edu.pk

To be available a router interface must be:

Configured with an address and subnet mask .Activated – by default LAN and WAN interfaces are not activated. Must be activated using no shutdown command.

Other parameters - serial cable end labeled DCE must be configured with the clock rate command.

Optional description can be included.

Basic Settings on a Router Configure Router Interfaces

Page 105: Introduction to Switched Networks - ncp.edu.pk

105www.ncp.edu.pk

Loopback interface is a logical interface internal to the router.

It is not assigned to a physical port, it is considered a software interface that is automatically in an UP state.

Useful for testing and important in the OSPF routing process.

Basic Settings on a Router Configure a Loopback Interface

Page 106: Introduction to Switched Networks - ncp.edu.pk

106www.ncp.edu.pk

Show commands to verify operation and configuration of interface.

show ip interfaces briefshow ip routeshow running-config

Show commands to gather more detailed interface information.

show interfacesshow ip interfaces

Verify Connectivity of Directly Connected Networks Verify Interface Settings

Page 107: Introduction to Switched Networks - ncp.edu.pk

107www.ncp.edu.pk

Switching Packets between NetworksRouter Switching Functions

Page 108: Introduction to Switched Networks - ncp.edu.pk

108www.ncp.edu.pk

Switching Packets between NetworksSend a Packet

Page 109: Introduction to Switched Networks - ncp.edu.pk

109www.ncp.edu.pk

Switching Packets between Networks Forward to the Next Hop

Page 110: Introduction to Switched Networks - ncp.edu.pk

110www.ncp.edu.pk

Switching Packets between Networks Packet Routing

Page 111: Introduction to Switched Networks - ncp.edu.pk

111www.ncp.edu.pk

Switching Packets between Networks Reach the Destination

Page 112: Introduction to Switched Networks - ncp.edu.pk

112www.ncp.edu.pk

Path DeterminationRouting Decisions

Page 113: Introduction to Switched Networks - ncp.edu.pk

113www.ncp.edu.pk

Path DeterminationBest Path

Best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network.

A metric is the value used to measure the distance to a given network.

Best path to a network is the path with the lowest metric.

Dynamic routing protocols use their own rules and metrics to build and update routing tables for example:

Routing Information Protocol (RIP) - Hop count

Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to destination

Enhanced Interior Gateway Routing Protocol (EIGRP) -Bandwidth, delay, load, reliability

Page 114: Introduction to Switched Networks - ncp.edu.pk

114www.ncp.edu.pk

Path DeterminationLoad Balancing

When a router has two or more paths to a destination with equal cost metrics, then the router forwards the packets using both paths equally.

Page 115: Introduction to Switched Networks - ncp.edu.pk

115www.ncp.edu.pk

Path Determination of the routeAdministrative Distance

If multiple paths to a destination are configured on a router, the path installed in the routing table is the one with the best (lowest) Administrative Distance (AD).

Administrative Distance is the “trustworthiness” of the route

The Lower the AD the more trustworthy the route.

Page 116: Introduction to Switched Networks - ncp.edu.pk

116www.ncp.edu.pk

The Routing TableThe Routing Table

Routing Table is a file stored in RAM that contains information about

Directly Connected Routes

Remote Routes

Network or Next hop Associations

Page 117: Introduction to Switched Networks - ncp.edu.pk

117www.ncp.edu.pk

The Routing TableRouting Table Sources

Show ip route command is used to display the contents of the routing table

Directly connected interfaces -Added to the routing table when an interface is configured and active.

Static routes - Added when a route is manually configured and the exit interface is active.

Dynamic routing protocol - Added when EIGRP or OSPF are implemented and networks are identified.

Page 118: Introduction to Switched Networks - ncp.edu.pk

118www.ncp.edu.pk

The Routing TableRouting Table Sources

Page 119: Introduction to Switched Networks - ncp.edu.pk

119www.ncp.edu.pk

The Routing TableRemote Network Routing Entries

Interpreting the entries in the routing table.

Page 120: Introduction to Switched Networks - ncp.edu.pk

120www.ncp.edu.pk

Directly Connected RoutesDirectly Connected Interfaces

A newly deployed router, without any configured interfaces, has an empty routing table.

An active, configured directly connected interface creates two routing table entries Link Local (L) and Directly Connected (C)

Page 121: Introduction to Switched Networks - ncp.edu.pk

121www.ncp.edu.pk

Directly Connected RoutesDirectly Connected Interfaces

A newly deployed router, without any configured interfaces, has an empty routing table.

An active, configured directly connected interface creates two routing table entries Link Local (L) and Directly Connected (C)

Page 122: Introduction to Switched Networks - ncp.edu.pk

122www.ncp.edu.pk

Statically Learned Routes Static Routes

Manually configured

Define an explicit path between two networking devices.

Must be manually updated if the topology changes.

Benefits include improved security and control of resources.

Static route to a specific network. ip routenetworkmask {next-hop-ip | exit-intf}

Default Static Route used when the routing table does not contain a path for a destination network.

ip route 0.0.0.0 0.0.0.0 {exit-intf | next-hop-ip

Page 123: Introduction to Switched Networks - ncp.edu.pk

123www.ncp.edu.pk

Statically Learned Routes Static Routes Example

Page 124: Introduction to Switched Networks - ncp.edu.pk

124www.ncp.edu.pk

Dynamic Routing ProtocolsDynamic Routing

Used by routers to share information about the reachability and status of remote networks.

Performs network discovery and maintaining routing tables.

Page 125: Introduction to Switched Networks - ncp.edu.pk

125www.ncp.edu.pk

Dynamic Routing ProtocolsIPv4 Routing Protocols

Cisco ISR routers can support a variety of dynamic IPv4 routing protocols including:

EIGRP – Enhanced Interior Gateway Routing Protocol

OSPF – Open Shortest Path First

IS-IS – Intermediate System-to-Intermediate System

RIP – Routing Information Protocol

Page 126: Introduction to Switched Networks - ncp.edu.pk

126www.ncp.edu.pk

Dynamic Routing ProtocolsIPv4 Routing Protocols

Page 127: Introduction to Switched Networks - ncp.edu.pk

www.ncp.edu.pk 127

Inter-VLAN Routing

Routing And Switching

Page 128: Introduction to Switched Networks - ncp.edu.pk

128www.ncp.edu.pk

Inter-VLAN Routing OperationWhat is Inter-VLAN Routing?

Layer 2 switches can’t forward traffic between VLANswithout the assistance of a router

Inter-VLAN routing is a process for forwarding network traffic from one VLAN to another using a router

Page 129: Introduction to Switched Networks - ncp.edu.pk

129www.ncp.edu.pk

Inter-VLAN Routing OperationRouter-On-A-Stick Inter-VLAN Routing

The so called router-on-a-stick approach uses a different path to route between VLANs

One of the router’s physical interfaces is configured as a 802.1Q trunk port. Now that interface can understand VLAN tags

Logical sub-interfaces are then created. One sub-interface per VLAN

Each sub-interface is configured with an IP address from the VLAN it represents

VLAN members (hosts) are configured to use the sub-interface address as a default gateway.

Only one of the router’s physical interface is used

Page 130: Introduction to Switched Networks - ncp.edu.pk

130www.ncp.edu.pk

Inter-VLAN Routing OperationMultilayer Switch Inter-VLAN Routing

Multilayer switches can perform Layer 2 and Layer 3 functions. Routers are not required anymore

Each VLAN existent in the switch is a SVI

SVI are seen as layer 3 interfaces

The switch understands network layer PDUs and therefore, it can route between its SVIs just as a router routes between its interfaces

With a multilayer switch, traffic is routed internal to the switch device

Very scalable solution

Page 131: Introduction to Switched Networks - ncp.edu.pk

131www.ncp.edu.pk

Configure Router-On-A-StickPreparation

An alternative to legacy inter-VLAN routing is to use VLAN trunking and sub-interfaces

VLAN trunking allows a single physical router interface to route traffic for multiple VLANs

The physical interface of the router must be connected to a trunk link on the adjacent switch

On the router, sub-interfaces are created for each unique VLAN on the network

Each sub-interface is assigned an IP address specific to its subnet/VLAN and is also configured to tag frames for that VLAN

Page 132: Introduction to Switched Networks - ncp.edu.pk

132www.ncp.edu.pk

Configure Router-On-A-StickSwitch Configuration

Page 133: Introduction to Switched Networks - ncp.edu.pk

133www.ncp.edu.pk

Configure Router-On-A-StickRouter Interface Configuration

Page 134: Introduction to Switched Networks - ncp.edu.pk

134www.ncp.edu.pk

Configure Router-On-A-StickVerifying Sub-interfaces

Page 135: Introduction to Switched Networks - ncp.edu.pk

135www.ncp.edu.pk

Configure Router-On-A-StickVerifying Sub-interfaces

Page 136: Introduction to Switched Networks - ncp.edu.pk

136www.ncp.edu.pk

Access to devices on remote VLANs can be tested using the ping command.

The ping command sends an ICMP echo request to the destination address

When a host receives an ICMP echo request, it responds with an ICMP echo reply

Tracert is a useful utility for confirming the routed path taken between two devices

Configure Router-On-A-StickVerifying Routing

Page 137: Introduction to Switched Networks - ncp.edu.pk

137www.ncp.edu.pk

Layer 3 switches usually have packet-switching throughputs in the millions of packets per second (pps)

All Catalyst switches support two types of Layer 3 interfaces:

• Routed Port• SVI

High-performance switches, such as the Catalyst 6500 and Catalyst 4500, are able to perform most of the router’s functions

But several models of Catalyst switches require enhanced software for specific routing protocol feature

Layer 3 Switching Operation And ConfigurationIntroduction To Layer 3 Switching

Page 138: Introduction to Switched Networks - ncp.edu.pk

138www.ncp.edu.pk

Today routing has become faster and cheaper and can performed at hardware speed

It can be transferred to core and distribution devices with little to no impact on network performance

Many users are in separate VLANs, and each VLAN is usually a separate subnet

This implies that each distribution switch must have IP addresses matching each access switch VLAN

Layer 3 (routed) ports are normally implemented between the distribution and the core layer

Layer 3 Switching Operation And ConfigurationInter-VLAN Routing with SVIs

Page 139: Introduction to Switched Networks - ncp.edu.pk

139www.ncp.edu.pk

By default, an SVI is created for the default VLAN(VLAN1). This allows for remote switch administration

Any additional SVIs must be created by the admin

SVIs are created the first time the VLAN interface configuration mode is entered for a particular VLAN SVI

The interface vlan 10 entered by the first time creates an SVI named VLAN 10

The VLAN number used corresponds to the VLAN tag associated with data frames on an 802.1Qencapsulated trunk

Whenever the SVI is created, ensure that particular VLAN is present in the VLAN database

Layer 3 Switching Operation And ConfigurationInter-VLAN Routing with SVIs (cont)

Page 140: Introduction to Switched Networks - ncp.edu.pk

140www.ncp.edu.pk

SVIs advantages include:• It is much faster than router-on-a-stick, because everything is

hardware switched and routed.• No need for external links from the switch to the router for

routing.• Not limited to one link. Layer 2 EtherChannels can be used

between the switches to get more bandwidth.• Latency is much lower, because it does not need to leave the

switch.

Layer 3 Switching Operation And ConfigurationInter-VLAN Routing with SVIs (cont)

Page 141: Introduction to Switched Networks - ncp.edu.pk

141www.ncp.edu.pk

To troubleshoot Layer 3 switching issues, check the following items for accuracy:

VLANs• VLANs must be defined across all the switches• VLANs must be enabled on the trunk ports• Ports must be in the right VLANs

SVIs• SVI must have the correct IP address or subnet mask• SVI must be up• SVI must match with the VLAN number

Troubleshooting Layer 3 SwitchingLayer 3 Switching Configuration Issues

Page 142: Introduction to Switched Networks - ncp.edu.pk

142www.ncp.edu.pk

To troubleshoot Layer 3 switching issues, check the following items for accuracy (cont):

Routing• Routing must be enabled• Each interface or network should be added to the routing

protocol

Hosts• Hosts must have the correct IP address or subnet mask• Hosts must have a default gateway associated with an SVI or

routed port

Troubleshooting Layer 3 SwitchingLayer 3 Switching Configuration Issues