Table of Contents Theoretical Training ...................................................................................................................................... 2 Entry training ............................................................................................................................................ 2 Intermediate Training ............................................................................................................................. 18 Advanced Enterprise Solutions (Overview) ........................................................................................ 18 Link Aggregation ................................................................................................................................. 18 VLAN(Virutal Local Area Network) Principles ..................................................................................... 19 GARP and GVRP................................................................................................................................... 21 VLAN routing ....................................................................................................................................... 23 Wireless LAN Overview ....................................................................................................................... 23 Principle and Configuration of HDLC and PPP .................................................................................... 24 Frame Relay Principles ........................................................................................................................ 25 Principle and Configuration of PPPoE (Point-to-Point over Ethernet)................................................ 26 Network Address Translation (NAT) ................................................................................................... 27 Establishing Enterprise Radio Access Network Solutions ................................................................... 29 Access Control Lists (ACL) ................................................................................................................... 30 AAA (authentication, Accounting, Authorisation) .............................................................................. 31 Securing Data with IPSec VPN ............................................................................................................. 31 Generic Routing Encapsulation (GRE) ................................................................................................. 32 Simple Network Management Protocol (SNMP) ................................................................................ 33 eSight Network Management Solutions (Huawei solution) ............................................................... 34 Introducing IPv6 Networks.................................................................................................................. 34 IPv6 Routing Technologies .................................................................................................................. 34 IPv6 Application Services DHCPv6 ...................................................................................................... 34 Practical Training......................................................................................................................................... 34 Entry Training .......................................................................................................................................... 34 Intermediate Training ............................................................................................................................. 34 Lessons from the mock exams .................................................................................................................... 35 Multiple choice section ........................................................................................................................... 36 Theoretical Training Entry training Point-to-Point network Wired or wireless RG-45 cable Network cables: Coaxial: -10Base2 maximum transmission distance 185m -10Base5 maximum 500m Or use bridges or boosters, repeaters to extend the distance. Finally use fibre optics others Ethernet all 100m: • • • 10Base-T 100Base-Tx 1000Base-T 4 pairs of category 5e twisted pair cable supports 1Ghz transmission speed Fiber Optic -10Base-F distance of 2000m 10mb/ps -100Base-FX 100mb/ps -1000Base-LX 316-50000m 1gb/ps single-mode does not work simultaneously -1000Base-SX multi-mode supports simultaneous transmission Serial -RS-232 20000bps -RS-422 RECOMMENDED 1200m Broadcast domains Sending to multiple from one place Collision Domains Place in a network where packets collide. -Carrier Sense Multiple-Access Collision Detection or Collision Avoidance (CSMA/CD): Tells you when not to send a packet Duplex Modes (w.r.t point to point networks): -Half duplex: You can only send or receive -Full duplex: You can send and receive at the same time. Act as a server and client simultaneously. . . . . . Layered Models- OSI Encryption: Provide protection over the network to mitigate from hacking. Required key. Application (protocol data units) and Presentation layer are unformatted Physical layer – bits cables 0/1 Data linked layer: a frame, meta address Network layer: packet network address Transport layer uses segments TCP/IP Session Sender top to bottom Receiver bottom to top: Application, presentation, session, transportation, network, data link, physical Frame Formats >=1536 0x0600 – ethernet 2 <=1500 (0x05DC) IEEE802.3 Frame check sequence: To check if the packet is complete or if there if it is fragmented. A packet is 1500/1536 2048 (0x0800) - IP 2054(0x0806) - ARP MAC address are 48 bits (24bits OUI and 24bits organisation) Huawei addresses are ( Representing a broadcast packet FF:FF:FF;FF:FF:FF Multicast: Packets sent to unintended devices are dropped. Carrier sense: Carrier sense multiple access... Packets can be dropped, received or resent. Layer 2 Just need a switch and the end device. A switch can establish a connection with only MAC Addresses. Network layer: IP packet (0x0800) length 60 bytes, source destination. Time to leave 255-0, packet dropped afterwards at 0. IP addresses (Private addresses): -Class A 10.0.0.0 ~ 10.255(network).255.255 Multiple hosts. Check first that number ranges /8 -Class B /16 -Class C 192.0.0.0 - 223.0.0.2 for smaller networks /24 Class D -Class E 240.-255.255.244.254 experimental Private IP addresses are not linked to the internet. E.G Class C 192.168.1.0 Network 6 -First binary switch: 0110 -Network range/IP addresses VLSM or classless inter domain routing. IP Gateway GIves us access to the. Time to live: If the packet gets to an unintended destination. Internet Control Message Protocol ICMP Reporting errors. Routing to test compatibility. Broadcast messages as Unicast – unknown intended devices. Investigating Unreachable devices. ICMP Types Echo request type=8 code = 0 multicast Echo reply type=0 code=0 unicast Every link is counted as a hop count and ads to the time required to send a message. Address Resolution Protocol Broadcast send, unicast reply. Reverse address protocol operates on level 3 Proxy ARP takes longer because of connecting with the proxy gateway. TCP Wired networks, conjunction control, monitoring packets. Three hand-way shake, security and sharing of certificates. TCP is the best for safety. UDP. Doesn’t do floor control or three-way handshake. Company usually wireless network. Wireless access point is linked to the wired connection so that monitoring occurs on the main router, called traceback. Logs are maintained according to MAC address, which are constant per devices. Data forwarding scenarios ARP to get the MAC address. VRP (Versatile routing platform) Multiple collisions. Establishing connectivity to the Switch or router: Remotely, tele, or mini usb/console physically Console Access Setup Procedures: Bits per second 9600 Data bits 8 Party: None Stop bits 1 Flow control none. Correct Usage: COM3 Not recommended to autoconfigure Navigating the CLI CLI Clock settings CLI Interfaces: Allows remote access VTY (Virtual teletype terminal) 0-4 five times. Can be changed. CLI interface configuration LoopbacK? Assign IP addresses. Viewing the file system / Updating the software Cd, pwd, dir, more To reboot, Type reboot. There is one root bridge and following from there are non-root bridges or downstream bridges. Redundancy is recommended however there may be broadcast storms. MAC instability. So, the spanning tree protocol was introduced. To send the packet along the shortest path. -Bridge ID (Bridge number and MAC ID): BPDU packet sent to the switches, returning switch number and MAC address. Only if the bridge ID is the same, the path codes are used to determine the shortest path according to the cable speed. The smallest bridge ID is elected as the root bridge. The highest priority or election criteria. The MAC address is the determinant. BPDU (Bridge Protocol Data Unit) through STP (Spanning Tree Protocol) for bridges and switches: -We are trying to control the management of data to avoid loops and broadcast storms. The bridge facilitates communication. -BPDU: A communication from the root to downstream switches to avoid loops. -TCN BDPU: Goes from downstream roots to the upstream roots to better understand the topology of the tree. A status call, these protocols are a notification and update the tree hierarchy. Hello tree over 2 seconds. The TCN BPDU refreshes/responds every 30 seconds. -This is done to mitigate the loops and broadcast storms. -Criteria: MAC address and lowest bit -To select the route bridge. Packets exist for 20seconds. -Path Cost Standards: Faster and shortest data transmission • • • • 10 mbps path cost 1999 100 mbps path cost 199 1Gbps path cost 20 10Gbps path cost 2 Finally use the Port ID if the path IDs are equal -Root port: From a designated port to downstream -Designated port: Touching/attached to the root bridge -Alternative port: not a designated or root port Route Path Cost: In order to determine the shortest path that is loop free. The root bridge path cost is always 0. The highest port identifier (the lowest port number) represents the port assigned as the root port with other ports defaulting to the alternative port role. To propagate a Hello Timer (2 seconds) the upstream will propagate over 1 second. A maximum ae timer by default represents a period of 20 seconds. Root election process Port role establishment process Port state Transition SUMMARY Root Failure: When a switch is done it cannot send BPDU, so the switches reestablish the bridge root through the Spanning Tree Protocol (STP). If the device fails Indirect link failure: If the port is down. The port table is relabeled. The alternative port is named as a designated port as it cannot be communicated any other way in this circumstance. Full recovery of the STP topology occurs after approximately 50 seconds. Direct Root Failure: Topology Change MAC instability A converging spanning tree network. A MAC Address black hole is made Port transition state: Disabled, blocking and listening do not send. STP Modes: To further mitigate against loops, the switches are not all the same mode and must be configured by the technician. -mstp (multiple) -rstp (rapid) -stp If the stp is a priority the priority refers to integers between 0 to 61440 in increments of 4096, 16 increments. With a default value of 32768. If a legcy stp standard is use the path cost ranges between 1 to 200000 If IEEE 802.1D standard is used the path cost ranges from 1 to 65535 If the IEEE 802.1t standard is used the path cost is ranges from 1 to 200000000. All root bridges must be designated. Root protection only applies while not an edge port or a command of loop protection is enabled. When a link fails: Bridge ID, Path cost, Port ID comparison.] If a link fails update the MAC address table. RSTP (Rapid spanning tree protocol) Improvement on STP, backup STP Weaknesses: Ensures loop-free network however has a slow network topography as changes occur. Convergence timers (30-50 seconds). Regular service interuptions . RSTP: Employs a proposal and agreement process which allows for immediate negotiation of links to take place, effectively removing the time taken for convergence-based timers to expire before spanning tree convergence can occur. Proposal & Agreement, immediate negotiation. Each downstream switch gradually begins to learn of the true root bridge and the path via which the root bridge can be reached. RSTP port toles Backup port role represents the backup for the path for the LAN segment in the direction leading away from the root bride. An edge port directly connects to a terminal and no other, where redundant links exist, RSTP edge ports: System not participating gin RSTP connect to the edge port. Edge ports do not receive BDPU and instanly forward data. Port states of RSTP - RST BPDU -00 unknown -01 Alternate/backup -10 root port -Designated port Static route would have to be reconfigured manually should the route fail. Only use a static route for small networks of few users. The convergence of a RSTP follow on from STP. There is an additional port on the LAN side, the edge port. RST BDPU Proposal All designated ports. One is a superior BPDU. When the BDPU is sent, not propagated downstream. The edge port is connected to the computer. RST BPDU Agreement RSTP Converged Link The downstream port is blocked, and synchronization occurs. RST BPDU sent back and forth. Link/Root failure After not receiving three consecutive Hello intervals, the agreement process is reinsitialised in order to discover port roles for the LAN segment. Link failure is noticed immediately, the address entries are flushed. An RST BPDU will negotiate the port states as part of negotiation and agreement process - MAC Addresses are dropped and updated No waiting, part of configuration settings. When an STP enabled device is added to an RSTP system it reverts to STP. Network Management Station (NMS) The edge ports that are shut down by the switch can be manually started only by the network administrator. STP DPDU-protection command should be ued to enable BDPU protection and is confiugred globally within the system view. Distance Vector Routing protocfol (RIP) Performance is slow, Hop count limit of 15 Loop prevention Packet is df RIP has 2 method Extent is UDP. -Authentication RIP version 2 is recommended, defauit 1 Does not use I{ adfe Metric OSPD OSPF For 4 devices Request + Acknoledgenent X2 10 seconds 4 packets sent over 40 seconds is the limit Point-to point 10 second interval 40 seconds to withdraw packets 30 second interval Higher prioirty the better the network Between 1 - 255 range to select designated and back up value. THe higher the number the better the network. The higher the authorisation/prioritu on router the beter the network OSPF metric: By default, the metric is 10 which can be changed as per user preference, there can be alternative. 10/8*bandwidth OSFP tree recommended Shortest path algorithm with the potential OSFFP Areas for one domain such as uni campus. OSFP Authentication simply password OSPF silent interface only receives updates DHCP Dynamically assign IP addresses to users. Usually wireless To assign an IP address -Manual: Administrator visits the machine and the IP address assigned is physically -Dynamic: Assign to specific machines the -Dynamic however the address is reassigned regularly DHCP messages DISCOVER: CLient can locate DHCP server OFFer: When available REQUEST: Client sends request but a message broadcast is sent, it is unicast. Reply is unicast Once a user/machine leaves the IP address can be reassigned. Maximum of 24hrs usage of an IP address. Notification to renew sent at 50% usage. Down to the minute and second. Without the message sent you can be disconnected. FTP Used to transfer files from the server to the client. VRP operating system. Both the client and server must use the same password otherwise they cannot communicate with each other. Two port numbers used to exchange packets. -20 – data control/connections between client and server -21 – file transfer Two transmission modes -ASCII mode for text -Binary mode for pictures/images Telnet (VTY) with the limit to trials) Protocol to connect remotely to manage devices -Port 23 Authentication modes: -none: Login without authentication -AAA: AAA authentication -Password: Authentication For some you can determine if a change was made and by who Basic Knowledge of IP Routing (Routing packets) -AS (Autonomous Systems): A clear method of sending the data. E.g 2 LANs connected by a LAN. LAN a, LAN b, LAN c. Where LAN c is he link between LAN a,b. Relying on the IP address a Router uses the routing table, compared to a switch which utilises MAC Addresses. Routers are responsible for routing decisions because of the routing table. All network nodes are included. ROUTING Protocol: RIPv1, RIPv2, ARP PRE: Preferences. A router selects the best path based on the highest preferences (smallest val) Direct = 0 (a direct link) RIP = 100 OSPF = 10 Static preference = 60 A router command; ‘display’ 10.1.1.0 = router A Next hop is the next port I.e 20.1.1.2 Routing Decision – preferences Select the lowest preference value. The protocol helps to decide. Routing Decision – Metric/cost The decision maker, the metric. Routing table forwarding requirements Inbound: Default gateway Outbound: To the internet or other network IP Static (manually, stationery, fixed) Routes IP static route/path, a unique non-changing path, if unavailable or something changes it is down. A static route can be assigned on serial links or on ethernet (data link layer) link/cable. Configuring/creating a static route [RTB] IP route-static 192.168.1.0 (router A/destination) 255.255.255.0 (subnet mask) 10.0.12.1 (next hop router B) [RTB} (On router B) ip route-static 192.168.1.0 255.255.255.0 (Subnet mask) Serial 1/0/0 [RTB] ip route-static 192.168.1.0 24 Serial 1/0/0 Static Route load balancing More than one static route to a destination. Which comes with additional cost, ISP. Verifying static route load balancing [RTB] ip route-static 192.168.1.0 255.255.255.0 10.0.12.1 + 2nd line is equivalent to *[RTB] display ip routing-table 192.168.1.0/24 static 60 0 RD 10.0.12.1 GigabitEthernet 0/0/0 + 2 nd line Floating static route check but the when a preference is assigned the route chosen might still be the highest preference by default Special case of default static route when a destination static route is unknown. Works on any unassigned network: [RTA] ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 preference of 60 by default. Can access any + verification Display ip route-table: 0.0.0./0 static 60 0 RD 10.0.12.2 GigabitEthernet0/0/0 Distance Vector Routing with RIP – a dynamic routing protocol Without a static route you are required to have a routing protocol saved on the routing table. Small organisation Simple to implement RIP, according to the Bellman-Ford algorithm, operates a n interior gateway protocol Principle Behavior Route advertisements periodically Only carry best route info Metric number is important A hope limit of 15 hops to prevent infinite forwarding/loops. Hops represent a metric of 1 When a network fails the next best route might have loops, the routers learn among themselves. The metric cap can be changed. Through the use of split horizons we can prevent loops. Split horizon: A route that is down and learnt on an interface cannot be advertised on the same to prevent loops. Enabled by default except on NBMA Loop prevention-poisoned reverse: Has additional overheads, the routing message size is increased because of advanced notifications as the routing table is updated. Allows the speed of erroneous routes to be timed out to become instantaneous. On Huawei AR2200 series router split horizon and poisoned reverse cannot be applied at the same time, poison reverse is preferred and enabled. Loop prevention-triggered update Updates of the routing table are sent periodically. RIP extension authentication (RIPv2) Additional security fixtures. Process of security comparison. Malicious packets are filtered. Plaintext is not completely secure. If the router is not configured for RIP version 2 authentication it reverts back to RIP version 1 and discards authenticated RIPv2 messages. RIP load balancing In case of link being down RIP network advertisement [RTA] rip [RTA-rip-1] version 2 [RTA-rip-1] network 10.0.0.0 RIP metricin/out Supports manipulation of metrics. Metricin: Change takes effect Metricout: Changes do not apply *Command: [RTC] interface GigabitEthernet 0/0/0 [RTC-GigabitEthernet0/0/0] rip metricin 2 RIP output: Outbound interface RIP inbound: Inbound interface *[RTA-GigabitEthernet0/0/0] undo rip output: restrict advertisement. Update message cease to be forwarded out of the given interface. Usable where an enterprise does not want to share its internal routes to an external network via the interface. *[RTA-rip-1]silent-interface GigabitEthernet 0/0/1 receive no advertisement OSPF (Open Shortest Path First) Minimal routing traffic Rapid convergence Scalable Accurate route metrics Configure on ethernet Configure on serial but defaulted to point-to-point type Configure as High-level data link control (HDLC) -data link layer OSI model IP address on the network layer OSPF can operate on multiaccess network that does not support broadcast. Designated Router are implemented by NBMA (Non-broadcast multi access) act as an access point with backup routers (neighbor(not BDR-backup designated router) or adjacent(linked to neighbour)) Link State Establishment: Each router transitions between neighbour and adjacent state. Each router according to LSA has its own individual unique LSDB DR election process: Priority set at 1. If priority of 0 then it doesn’t participate in the election. Highest priority becomes the Designated Router (sends advertisements for efficiency) Cost metric formula 10^8/bandwidth By using the bandwidth, the metric accuracy is improved A link state protocol, uses LSA (link state advertisement) the information is LSA saved on the LSDB (link state database) on the routing table. Router ID is 32-bit used to identify each router running OSPF protocol If a logical interface has been configured the Router ID is the highest configured logical interfaces IP address OSPF areas-single area As the network grows, Area 0 is recommended but can be assigned Multi area Allows an OSPF to compartmentalise based on a link state database that is identical for an area while granting information on destination of the OSPF domain Default Process id 1 Selects the lowest router ID [RTA-ospf-1-area-0.0.0.0]network 192.168.1.0 0.0.0.255 The network to be advertised. OSPF authentication Once advertisement is concluded, security can be incorporated [RTA-GigabitEthernet0/0/0]ospf authentication-mode md5 1 huawei OSPF silent interface Prevent an interface from forming neighbor relationships with peers (sharing its router table) DR and BDR use the multicast address 224.0.0.6 DHCP address acquisition Discover (broadcast) Offer (unicast) Request (broadcast) ACK (unicast) DHCP lease renewal request (unicast) DHCP interface pool configuration Dhcp select interface Dhco server dns-list 10.1.1.2 Dhcp server excluded-ip-address 10.1.1.2 ***excluded the Ip address of the DNS IP address server Exclude the gateway IP address as it is used by everyone as an entry. DHCP global pool configuration Dhcp enable [Huawei-ip-pool-pool2]network 10.2.2.0 mask 24 [Huawei-ip-pool-pool2]gateway-list 10.2.2.1 [Huawei-ip-pool-pool2]lease day 1 [Huawei-ip-pool-pool2]quit [Huawei-GigabitEthernet0/0/1]dhcp select global FTP protocol Sending files E.g Updating operating system Telnet protocol principel Remote access for large organisations Security, ssh Telnet client and telnet server Password vty 0 4 Gateway vs next hop (address) Switches have a gateway only if it is layer 3 separating full access to private access. On a router, its port assigned Ip address Default gateway: IP address door taking your from one subnet to another. Layer 2 switch have are not gateways they use MAC addresses and are on the same LAN VLANs isolate into sub interfaces - datalink layer Next hop is a link for a specific device to another port. Intermediate Training Huawei enterprise solutions for performance, scalability, reliability, security and management Advanced Enterprise Solutions (Overview) Expanding Enterprise Networks Telecoms Solutions for Enterprise Networks Enterprise Network Efficiency Enterprise Network Security Network and application Enterprise Network Management Monitoring through eSight. Remote, such as with wire shark. Next Generation Enterprise Networks Private, public and hybrid cloud. Link Aggregation Optimizing the throughput of data, link aggregation enables the binding of multiple physical interfaces into a single logical pipe. (Performance, scalability, reliability) Link Aggregation Provides for increased bandwidth, enhanced reliability and support of load balancing. Application in the Enterprise Network Where is demand for data transmission the highest. Point of departure to foreign destination, Like Aggregation Modes on the LACP on a link aggregation Data Flow Control Speed 1000. Frames with the same source MAC addresses are transmitted over the same physical link Frames with the same destination.... …. …. … ... L2 Link Aggregation Configuration L3 Link Aggregation Configuration Transition the trunk from 2nd layer to the 3rd layer Use undo port switch, then an IP address can be assigned to the interface. Displaying Aggrgation …. VLAN(Virutal Local Area Network) Principles For safety, put it on a separate VLAN. Manage the large network by dividing into subnetworks. Improve the manageability LAN Limitation VLAN Technology Enable logical isolation of network traffic At the data link layer. Created on switches same OSI model layer as switches. VLAN Frame Format VLAN tag contains Tag Protocol Identifier (TPID)-IEEE 802.1Q tag format and Tag Control Information (TCI) to carry data. Priority Code Point is a form of traffic classification field that is used to differentiate forms of traffic. Classification such as voice, video, data, etc. Show as a 3 bit value (0-7) understood on gerneral 802.1Q class of service (COS). Drop Eligibility Criteria (DEI) such as true or false bit. determines eligiblity to discard data. Link Types Trunk: Backbone for the transmission of VLAN traffic. Difference between switches Access: Between and end system and a swtich device participating in VLAN tagging. Port VLAN ID You can set each VLAN to accept default VLAN for the interface to be recognised as the Port VLAN ID (PVID). This deter,mines the behaviour that is applied to any frames being received or transmitted. Port Types – Access Access ports associated with access links and frames being transmitted from an interface are assigned VLAN tag that is equal to the Port VLAN ID (PVID). if a tag and PVID vary the frame is not forwarded and discarded. A untagged fram is forwarded to the interface of the switch to all other destinations to be understood Port types –Trunk Decides what is transmitted. Trunk port associated with the trunk links, the PVID identifies VLAN frames requried to carry a VLAN tag before forwarding. If it has the PVID it can travel otherwise VLAN tag must be included Port Types – Hybrid Hybrrd ports are either tagged or untagged. VLAN communication is managed port by port. A trunk port is not connected to a machine but a switch. Hybrid ports Represent the default for Huawei devices. If it is tagged the PVID allows it to travel. If it is untagged it must be in the access area to be transmitted. If it is on the trunk it must be tagged to travel. A tag must be added by the port which received an untagged frame from an end system. Hybrid ports something about tags corresponding to a PVID VLAN Assignment Methods Port based e.g. G0/0, g0/0/7 MAC Address 00:01:02:03:04:AA, IP based subnet 10.0.0.1 Protocol based e.g. IP, IPX Policy based10.0.1, g0/07, 00:01:02:04:AA Creating a VLAN VLAN range 1-4094. VLAN batch (each host) All ports are associated with VLAN 1 as the default Setting the port Link type 0/0/1 the layer for trunks: tagged 0/0/5 trunk access: untagged All Huawei switches are Hybrid Look at the image for the switch. Creating VLANs vlan <ID> port <location> port link type <access/trunk> Forwarding over the Trunk port link-type trunk port trunk pvid vlan 10 port trunk allow-pass vlan 2 3 #forwarding over the trunk Access untagged, link down(inactive) as it as it is unspecified Access untagged, link up(active), specified... it was added to the trunk Configuring Hybrid Port [SWA.....0/0/5] Voice VLAN Application voice-vlan 2 enable …..(required) mode auto: to add the port or not voice-vlan mac-address <mac-address> Associated with voice VLAN based on the Organisationallu Unique identifer (OUI) GARP and GVRP The VLAN organising themselves as though they were routers (network layer 2), this is however the datalink layer 2. For implementation and removal of Generic Attribute Registration Protocol (GARP) An architecture for the registration, deregistration and propagation of attributes between switches is enabled. GARP is employed by GVRP - the shell, the virtual machine. PDU (Protocol Data Unit) are sent from GARP and use multicast MAC address 01:20-C2-00-00-21. Events between switches: 0: LeaveAll event 1: JoinEmpty event 2: JoinIn event 3: LeaveEmpty event 4: LeaveIn event 5: Empty event Attrbute events – Join Message Allows the device to join the attributes. Either: JoinEmpty: Unregistered JoinIn: Declared a registered attribute Attribute events - leave message Trying to deregister what has been registered. LeaveIn: LeaveEmpty: Attribute events – Leave All message GVRP Registration modes VLAN Types: Static (Manually for registration) Dynamic (Automatically for registration) Registration modes: Fixed: Only sends declaration static registration Normal: Permits static and dynamic VLANs Forbidden: The GVRP interface is disabled from dynamically registering and deregistering VLANs except for VLAN 1 – default Huawei router Enabling GVRP Command gvrp is used to enable GVRP once the interface has neem configured to operate as part of VLAN. port trunk allow-pass vlan all gvrp registration fixed/normal [SWA]display gvrp status … “GVRP is enabled” VLAN routing VLAN Disadvantages Forbidden access VLAN Routing VLAN frames are routed over a trunk link for port conservation. VLAN routing features 2 IP addresses however one IP address is virtual – sub interface VLAN Routing Config **[SWA]vlan batch 2 3 [SWA]port link-type access [SWA]port trunk allow-access all** [RTA] interface GigabitEthenet0/0/0/1.1... Creating the sub interface [RTA-GigabitEthernet0/0/1.1]dotlq terminate vid 2 performs port receiving VLAN packet will remove the VLAN tag from the fram and forward the packet via layer 3 routing [RTA-GigabitEthernet0/0/1.1]arp broadcast enable Applied to each logical interface, if it remains disabled on the sub-interface the router will discard packets!! *** learn the sequence of all commands**** L3 Switch based VLAN routing VLANIF (VLAN interfaces) are used by each VLAN as a route gateway. Benefit over router: Forwarding VLAN traffic with minimum delay. Known as line speed forwarding VLAN Gateway assigned Wireless LAN Overview Development of WLAN Wireless Local Area Network Evolution Fixed network 802.11a/b 54 MBps 2.4GHz 802.11n 600Mbps 2.4-5GHz 802.11 ac >1 Gbps 5GHz BYOD Wireless coverage Wireless LAN solutions Wireless LAN security Principle and Configuration of HDLC and PPP Point-to-point : Data link layer 2 Frame relay : Data link layer 2 HDLC : Data layer 2 Serial Signaling Connect via ethernet or serial link Synchrnoous access Asynchrnonouos access THe HDLC (High Level Data Link Control) Protocol Supports both Basic Config of HDLC [RTA[ interface serial 1/0/0 [RTA] link-protocoo hdlc [RTA] ip address 10.0.1.1 30 Assigning Unnumbered Addresses in HDLC IP addresses can be borrowed from other interfaces in order to establish connectivity I.e. Eduroam ISP provides links occasionally. Config validation [RTA] display ip interface brief PPP protocol Application A multiprotocol standard used as with HDLC to define the link layer operation over a serial medium. Encapsulates and transmits network layer packets over point-to-point (P2P) over full-duplex synchronous and asynchronous links. Built on Serial Line Internet Protocol (SLIP). Frame relay (FR) only supports synchronous links – such as with Banks that are standalone. Components of PPP PPP encapsulation method: …. Link Control protocol: … Network Control Protocol: …. PPP Frame: LCP packets, NCP packets... Packet types used in LCP negotiation Configure Request Configure-Acknolodgement Configure-Nak, unaccepted configuration options Configure-Reject Common Link Parameters of LCP Negotiation Maximum Receive Unit Authenticaton protocol Magic Number PPP Basic Configuration [RTA] interface serial 0/0/0 [RTA serial ] protocol PPP PPP Authentication Mode – PAP PPP Authentication Mode – CHAP (Challenge handshake authentication protocol) Configuring PAP Authentication Less secure than CHAP (encryption based) as it is plaintext [RTA] aaa [RTA-aaa] local-user huawei password: cipher huawei123 AAA: Authentication, Acknowledge Frame Relay Principles Frame relay networks comprise of Data terminal equipment (DTE) and Data circuit terminating equipment(DCE). DTE is at the edge of the customer network LMI Negotiation Process LMI protocol one link can negotiate with the frame relay switch Inverse ARP Neogtiation Process Main function to resolve the IP address of the remote device that is connected to every virtual circuit. (VC). If protocol address of the remote device connected to the VC is known, the mapping between the remote protocol address and DLCI can be created on the local end, which can avoid configuring the address mapping manually. Frame Relay & Split Horizon Split Horizon: Prevents data received on an interface from being forwarded out of the same physical interface. Frame relay sub-interfaces Apply a logical sub-interface to a single physical interface. Two types: Point-to-Point: Connect a single remote device. The peer address is identified Point-to-Multipoint: Used to connect multiple remote devices, each PVC will map the protocol address of its connected remote device. Different PVCs can reach different remote devices. The address mapping must be configured manually, or dynamically set up through the Inverse address resolution protocol(InARP) Frame Relay Config –Dynamic Mapping You need InArp – Inverse Address Resolution Protocol, Need a linked layer ptocol type. The interface on the custome side must be DTE on the edge. . This is by default on Huawei ARG3 series routers, set to DTE. To allow the dynamic mapping to cocur the fr in arp command is applied. ***See Syntax*** Using the fr Inarp it is possible to discover all permanent virtual circuits (PVC) associated with the local interface Frame Relay Configuration –Static Mapping The fr map ip [des-addr [mask] dlci-numer] configures a static mapping by associating the protocol address. This config helps upper layer protocols locate a peer device based on the protocol address o f the peer device. READ rules Need DLCI number. Simple methods to transmit and exchange data. Principle and Configuration of PPPoE (Point-to-Point over Ethernet) Fiber is possible. Digital Subscriber Lines Old tech, dial-up, BRAS (Broadband Remote Access Server) PPPoE Application in DSL No security, no authentiation PPPoE Protocol Packets: PADI: Active Discovery Initiative Packet PADO: PADR: PADS: PADT: Padi, Pado, Padr needed to open a connection. PADT to close the connection PPPoE session Establishment Protocol PADI to all to determine who needs the data. PADO sent back, If no response is received, PADR sent to the address that is relevant PADS is the session to be open. PADT: The session is over terminate the session Configuring A PPP Dialer interface Old reliable. Three steps: Dial-up interface Network Address Translation (NAT) Private & Public Networks NAT behaviour Uses the established boundary of the gateway router to identify network domains for translation. Separates public from private. A NAT must be able to create a mapping table within the gateway to allow the gateway to allow the gateway to determine as to which private network destination address a packet received from the public network should be sent, again requiring address translation to be performed along the return path Static NAT Represents a one –to-one (1 IP address) mapping of static NAT that is manually configured by the administrator Dynamic NAT Works on the principle of an address pool. Internal end systems wishing to forward traffic to a public network can associate with a public address from an address pool. Network Address port translation (NAPT) Security reason. Internals ports should not be available externally. Hide the IP address and the port numbers. The ISP provides public port numbers in lieu of the private individuals port number. More like dynamic. Easy IP The WAN interfaces address used as a single public address for all internal users, with port numbers used to distinguish sessions. Create an Easy IP through a dial-up to receive a temporary public IP address received by the outbound interface. Small scale enterprises. NAT Internal Server E.g. Accessing the UCT/WITs server externally External sources can reach internal addresses. Mapping of both the IP address and port number is performed. Mapping occurs. Static NAT Config [RTA]interface GigabitEthernet0/0/1 …. Inbound, default gateway [RTA-GigabitEthernet0/0/1]ip address 19.2.168.1.254 24 …. [RTA] interface Serial1/0/0 [RTA-Serial1/0/1]ip address 200.10.10.1 24 [RTA]nat static global 200.10.10.5 inside 192.168.1.1 .... invoking NAT static [RTA} display nat static … … … ... Netmask: 255.255.255.255 Dynamic NAT Config [RTA]nat address-group 1 200.10.10.11 200.10.10.16 …. pool of IP addresses [RTA]acl 2000 …. Access Control List (ACL) [RTA-acl-basic-2000]rule 5 permit source 192.168.1 0 0.0.255 (subnet) [RTA-acl-basic-2000]quit [RTA-Serial1/0/0]nat outbound 2000 address-group 1 no-pat We have ACL (Access Control List) 2000 Rule 5, 10, 15 outbound – we request their port numbers and IP addresses, belongs to address group 1 no-pat : No port address translation Easy IP Configuration Very similar to dynamic, rely on the creation of an access control list for defining address range to which to translate. Perform the nat outbound command. NAT Internal Server Configuration [RTA] nat server protcol tcp global. 200.10.10.5 www inside 192.168.1.1 8080 Establishing Enterprise Radio Access Network Solutions Wireless WAN Overview (WWAN) Mobile station (MS) or User Equipment (UE) to communicate. On 3G (UMTS) and 4G (LTE) Wireless WAN and the Enterprise Network Security, reliability Enterprise Wireless WAN Solution Failover solutions for 2G and 3G... If 2G is down you seamlessly transfer to 3G vice versa Establishing the 3G Network 3G network parameters are defined on the cellular interface. Create the interface, known as [Huawei] \interface cellular. 0/0/0 ip address ppp-negotiate prof Setting the dial control center Dial Control Center is implemented. The dialer-rule command inititiates the dialer-rule view where the rules are defined to enable IPv4 –32 bits- to carry over the interface. Dialer-rule number (E.g. +27 ZAR). Configure NAT Role & Static Route [Huawei]acl number 3002 [Huawei-acl-adv-3002]acl <5,10,15> permit ip source 192.168.1.0 0.0.0.255 [Huawei-acl-adv-3002]quit [Huawei]interface cellular 0/0/0 [Huawei0cellular0/0/0]nat outbound 3002 [Huawei-cellular0/0/0]quit [Huawei]ip route-static 0.0.0.0 cellular 0/0/0 Access Control Lists (ACL) IPv4 –32 bits security but bulky. IPv6-128 bits due to increased security, however it is streamlined and incorporated making it less bulky Monitoring (performance) and Security. ACL: For better management and filtering of traffic as part of security. Filtering Restricted Traffic ACL is a mechanism that implements access control for a system resource by listing the entities based on parameters (rules) to permit access to the resource. Filtering Interesting Traffic ACL Types Basic Value Range: 2000-2999 Parameter: Source IP Advanced Value Range: 3000-3999 Parameter: Source & Destination IP, Protocol, Source & Destination port Layer 2 ACL Value Range: 4000-49999 Parameter: MAC Address Can all be applied on AR2200 series routers Packet filtering parameters vary for each ACL types ACL Rule Management Rules increment 5 -> 10-> 15-> 20 Basic ACL [RTA-acl-basic-2000]rule deny source 192.168.1.0 0.0.0.255 [RTA-acl-basic-2000[rule permit source 192.168.2.0 0.0.0.255 [RTA]interface GigabitEthernet 0/0/0 [RTA-GigabitEthernet0/0/0]traffic-filter outbound acl 2000 Advanced ACL [RTA]acl 3000 [RTA-acl-adv-3000]rule deny tcp source 192.168.1.0 0.0.0.255 desination 172.16.10.1 0.0.0.0 destination-port eq 21 … FTP ports 20 or 21 [RTA-acl-adv-3000]rule deny ip source 192.168.2.0 0.0.0.255 destination 172.16.10.2 0.0.0.0 ..default route, all IPv4 addresses on the local machine [RTA-GigabitEthernet0/0/1]traffic-filter inbound acl 3000 ACL Application –NAT (Network Address Translation) You can apply ACL on NAT AAA (authentication, Accounting, Authorisation) Authentication You must be authenticated to communicate Accounting AAA Local Config Both must have the same user name and password Securing Data with IPSec VPN The methods of securing your environment. IPSec – network layer 3 A SA (Security Association) is shared in a single direction Two modes: IPSec Transport Mode: IPSec Tunnel Mode: More secure Reachability Identify interesting traffic Establish IPSec Proposal Create IPSec Policy Apply Policy to Interface IPSec VPN Configuration … … ... Required network layer communication for an IPSec VPN. An advanced ACL is needed to determine the protocols, ports and ip addresses. E.g. use authentication algorithms [md5 | sha1 | sha2-256 | sha 2-384 | ….] The sha* must correlate between devices that are to communicate. IPSec Policy Creation IPSec Policy defines parameters for establishing IPSec SA: Policy-name seq-number (1-15) Multiple IPSec policies with the same IPSec policy name constitute an IPSec policy group. The IPSec policy gorup contains a maximum of 16 IPSec policies. The smalledst IPSec sequence number has the highest priority. The group must be applied to an interface The Tunnel local and Tunnel remote have links that determine where the tunnel starts and ends. The SPI (Source Parameter Index) The Inbound SPI must be the same as the outbound SPI, the number Finally, authentication key must be defined as inbound and outbound, they must be the same IPSec policy Creation [RTA]ipsec policy P1 10 manual [RTA-ipsec-policy-manual-P1-10]security acl 3001 … ... Applying policies to interfaces … IPSec Policy Verification Generic Routing Encapsulation (GRE) GRE Application Supports encapsulation of protocols over other protocols: supports multiple protocols simultaneously. Enables routing between remote and disparate networks. Can be implemented on tunneling. Less secure. Ideal to implement GRE tunnel and IPSec VPN IPSec VPN (Virtual Private Network) support for GRE (Generic Routing Encapsulation) GRE Keepalive ,,, GRE Configuration Simple Network Management Protocol (SNMP) Management solutions widely used in TCP/IP networks. Adaptation of SGMP protocol, forms the basis for common network management throughout the system. SNMP is effectively a communication medium between the network elements and the network adminstrator/(NMS). Network Management Station (NMS) relies on SNMP to define sources for network information. SNMP relays reports in the form of trap messages to the NMS so that the station can obtain network status in near real time. This allows the network administrator to quickly act on system discrepancies and failures. SNMP is used to manage: Software: Applications User Accounts Write/read permissions (licenses) Hardware: Workstations Servers Network cards Routing devices Switches SNMP Architecture The network management station (NMS) has network management requests that it makes know to the elements; hosts, gateways, terminal servers etc. The management agent resides on the network element in order to Retrieve/get or alter/set vaiables. NMS associates with the management agent on each of the network elements that perform NMS designed functions composing the MIB (Management Information Base) objects. SNMP messages of IP require UDP MIB Objects Specifies the variables to be maintained by each network element. These variables are queried and set by the management process. The SNMP MIB has the same tree structure as the DNS (Domain Name System) with the top objects: ISO ITU-T (CCITT) Joint organisation branch V1; Version2: Security upgrade Version 3: eSight Network Management Solutions (Huawei solution) Monitors each component Traffic Introducing IPv6 Networks IPv6 Routing Technologies IPv6 Application Services DHCPv6 Practical Training Entry Training .. // Intermediate Training .. Lessons from the mock exams Loopback address 127.0.0.1 VLAN 12 bits Huawei switch forwarding delay: 0.15 seconds ICMP protocol is applied to the network layer ID of the Backbone OSFP = area 0 OSI Model layer: -Application -Presentation -Session -Transportation -Network -Data link -Physical TCP/IP Model Layers: -Application, sessio, presentation -Transport -Network -Data link OSFP uses SPF (Shortest Path First) algorithm to calculate the shortest route Link state routing protocol = OSPF (Open Shortest First Protocol) Repeaters, hubs, network interface cards, cables and connector operate on the Physical layer Maximum hop count RIP DNS port number 53 Two others will either exchange LSA or send Hello packet to each other due to the existence of DR in Broadcast network of OSPF A static route can be neither configured manually by a network administrator nor generated automatically. When a network condition changes a static route canNOT be rectified automatically without reconfiguration by the network administrator Root bridges provide root ports and designated, alternative ports Routing information Protocol (RIP) is NOT available in the RIPv2, RIPv2 and RIPv3 versions When a trunk port receives an untagged frame, the switch will NOT drop the frame One router forwards the packets according to the routing table on itself without considering the routing table of any neighbour routers A trunk port does not always send tagged frames to the peer equipment. Each router only knows how to forward the packet to the net hop IP address. It doesn’t know the end to end forwarding path. This type of forwarding is called Hop by Hop forwarding OSFP version specific to the IPv6 technology = OSPFv3 The IP protocol is unreliable and connectionless orientated. The subnet mask of a class A address is 255.255.240.0 has 12 bits When a node transmits data over a network medium, the data is transmitted to all the nodes on the network. The topology used is BUS A router runs OSFP and its interface serial 0 and IP address 10.0.0.1/30 belongs to the backbone area. The command used to enable OSFP on this interface is = [Quidway-osfp –1area-0.0.0.0]network 10.0.0.0 0.0.0.3 Switch –A and Switch-B are configured with ports in VLAN for deparments. Each VLAN contains 20 users. Only 5 subnets are required. Multiple choice section The functions of all seven layers of the OSI reference model -The email server -network management server. Access ports: -Belong to only one VLAN -Are used for connection between switches and PC’s Data link layer has two sub-layers: -MAC sub-layer -LLC sub-layer RIP (Routing information protocol): -User can specify the route preference of RIP higher than that of static routes -If the route calculated by other routing protocol which is imported by RIP does not specify the cost value, the cost value will be set as 1 by default Routed protocols: -IP -OSPF (Open shortest path first) VLAN interfaces: -A virtual interface is required to be created for VLAN if we want to assign an IP address for that VLAN -VLAN interface number must be the same as the VLAN ID If two static routes are configured to the route 10.1.1.1/32. If one does not have a value for the preference_value parameter and the other static route is assigned with 100 for the preference_value parameter -The route not assigned a preference_value parameter will function as the working route -A static route supports route backup Functions of a router: -Check the destination address in a datagram -Discover possible routes -Verify and maintain route information Packet filtering firewall filters packet based on quintuplet. Components of quintuplet: -IP address -Protocol number -Port number Protocols used for file transfer: -FTP -TFTP Standards defined by IEEE to regulate the implementation of VLAN between switches OSPF takes the precedence to select the biggest IP address of all the loopback addresses as a router ID unless you specify a router ID manually. The frame is the PDU that resides at the data link layer EUI-64 used to configure IPv6 ICMP used to ping test sending a series of packets DD packets are used to describe LSDBs STP interface states: -Blocking -Listening -Learning -Forwarding -Disabled Interior Gateway Protocol (IGP): Route Information Protocol uses the hop count to determine the value cost IP address consists of: Network address, Host address, subnet field, non-default masks, default subnet mask CHAP (Challenge-Handshake authentication protocol): -Verify remote clients -Challenge packet -Response packet -Success packet -Failure packet Link aggregation benefits: -Increased bandwidth (the capacity of multiple links is combined into one logical link -Automatic failover -Failback (The traffic from a failed link is automatically switched over to other working links ESight is supported by SNMPv1, SNMPv2c and SNMPv3 DHCP offer packet can carry more than one DNS server address After a fault occurs in a network, a static route canNOT be rectified automatically and the network administrator is needed to reconfigure. (RIP) Routing Information Protocol is not available in RIPv1, RIPv2 and RIPv3 versions On Huawei switches you can run the VLAN batch command to create multiple VLANs in batches HDLC is ISO standard link layer protocol and it is used to encapsulate data transmitted on asynchronous link One of the significant features of the PPP protocol is the authentication function. With this function, the two ends of a link can negotiate with each other to use which authentication protocol and then perform authentication. A PPP connection is established only when the authentication is successful. When you configure Frame Relay on Quidway routers, you can configure inverse ARP instead of static address mapping because the function of inverse ARP is to provide dynamic address mapping. The operation deleting the configuration files saved in the storage devices will become effective after rebooting the router. Frame relay point-to-multipoint sub-port canNOT connect multiple remote nodes together through a PVC ICMP protocol is applied to the Network Layer Protocols can dynamically register VLAN information: -MVRP (Multiple VLAN registration Protocol) sends PDU (protocol data unit) -MRP (Multiple Registration Protocol) -GARP (Generic Attribute Registration Protocol)) ARP (Address Resolution Protocol) performs required IP routing. It finds the hardware address (MAC address) from the IP address. ARP maintains a cache table of MAC addresses mapped to IP addresses. HDLC is NOT ISO standard link layer protocol and it is used to encapsulated data transmitted on asynchronous link. The standard defined by IEEE to regulate the implementation of VLAN between switches is 802.1Q A switch supporting 802.1Q protocol can support a maximum number of 4096 VLANs ESight is not only for Huawei When two routers synchronise their LSDBs they use DD packets to describe their LSDBs IGP(Internal gateway protocol) is the protocol which is used for asynchronous systems OSPF takes the precedence to select the IP address of all loopback port addresses as a router ID unless you specify a router ID Hop count is the parameter used by RIP to calculate the value of cost On Huawei switches running STP, the default value of forward delay is 15 seconds The broadcast MAC address is FF:FF:FF:FF:FF To release the IP address assigned by the DHCP server on Windows XP, command IPconfig/release IPv6 is 128 bits, processed in order The protocols that can be used for file transfer is FTP and TFTP CHAP packets: Challenge Response Success Failure