Uploaded by Thành Nguyễn Trần

Tai-lieu-CCNA 2017

advertisement
12/2017
1 INTRODUCATION TO NETWORKS
Networking Today
Networks in Our Past and Daily Lives
Tài liệu Quản trị mạng cơ bản CCNA
1
12/2017
Networking Today
The Global Community
Interconnecting Our Lives
Networking Impacts in Our Daily Lives
Networks support the way we learn.
Networks support the way we communicate.
Networks support the way we work.
Networks support the way we play.
Tài liệu Quản trị mạng cơ bản CCNA
2
12/2017
Providing Resources in a Network
Networks of Many Sizes
Providing Resources in a Network
Clients and Servers
Tài liệu Quản trị mạng cơ bản CCNA
3
12/2017
Providing Resources in a Network
Peer-to-Peer
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
Devices
Media
Services
Tài liệu Quản trị mạng cơ bản CCNA
4
12/2017
Components of a Network
End Devices
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smart phones, tablets, PDAs, and
wireless debit / credit card readers and barcode scanners)
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access points)
Internetworking Devices (routers)
Security Devices (firewalls)
Tài liệu Quản trị mạng cơ bản CCNA
5
12/2017
Components of a Network
Network Media
Components of a Network
Network Representations
Tài liệu Quản trị mạng cơ bản CCNA
6
12/2017
Components of a Network
Topology Diagrams
2. NETWORKING TYPES
Tài liệu Quản trị mạng cơ bản CCNA
7
12/2017
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
LANs and WANs
Local Area Networks (LAN)
Tài liệu Quản trị mạng cơ bản CCNA
8
12/2017
LANs and WANs
Wide Area Networks (WAN)
LANs, WANs, and the Internet
The Internet
Tài liệu Quản trị mạng cơ bản CCNA
9
12/2017
Connecting to the Internet
Connecting Remote Users to the Internet
Connecting to the Internet
Connecting Businesses to the Internet
Tài liệu Quản trị mạng cơ bản CCNA
10
12/2017
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic
characteristics that the underlying architectures need to address in
order to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
Network Trends
Cloud Computing
Cloud computing offers the following potential benefits:
Organizational flexibility
Agility and rapid deployment
Reduced cost of infrastructure
Refocus of IT resources
Creation of new business
models
Tài liệu Quản trị mạng cơ bản CCNA
11
12/2017
Networking Technologies for the Home
Technology Trends in the Home
Networking Technologies for the Home
Powerline Networking
Tài liệu Quản trị mạng cơ bản CCNA
12
12/2017
Networking Technologies for the Home
Wireless Broadband
Future of Networking
Network Security
Tài liệu Quản trị mạng cơ bản CCNA
13
12/2017
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service (DoS) attacks
Data interception and theft
Identity theft
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
Tài liệu Quản trị mạng cơ bản CCNA
14
12/2017
3. OSI Reference Model
Protocols
Network Protocols
How the message is formatted or structured
The process by which networking devices share information about
pathways with other networks
How and when error and system messages are passed between
devices
The setup and termination of data transfer sessions
Tài liệu Quản trị mạng cơ bản CCNA
15
12/2017
Protocols
Interaction of Protocols
Application Protocol – Hypertext Transfer Protocol (HTTP)
Transport Protocol – Transmission Control Protocol (TCP)
Internet Protocol – Internet Protocol (IP)
Network Access Protocols – Data link & physical layers
Protocol Suites
Protocol Suites and Industry Standards
Tài liệu Quản trị mạng cơ bản CCNA
16
12/2017
Protocol Suites
TCP/IP Protocol Suite and
Communication
Standards Organizations
Open Standards
The Internet Society (ISOC)
The Internet Architecture Board (IAB)
The Internet Engineering Task Force (IETF)
Institute of Electrical and Electronics Engineers (IEEE)
The International Organization for Standards (ISO)
Tài liệu Quản trị mạng cơ bản CCNA
17
12/2017
Standards Organizations
ISOC, IAB, and IETF
Standards Organizations
IEEE
38 societies
130 journals
1,300 conferences each year
1,300 standards and projects
400,000 members
160 countries
IEEE 802.3
IEEE 802.11
Tài liệu Quản trị mạng cơ bản CCNA
18
12/2017
Standards Organizations
ISO
OSI Model
Standards Organizations
Other Standards Organization
The Electronic Industries Alliance (EIA)
The Telecommunications Industry Association (TIA)
The International Telecommunications Union –
Telecommunications Standardization Sector (ITU-T)
The Internet Corporation for Assigned Names and Numbers
(ICANN)
The Internet Assigned Numbers Authority (IANA)
Tài liệu Quản trị mạng cơ bản CCNA
19
12/2017
Reference Models
Benefits of Using a Layered Model
Reference Models
The OSI Reference Model
Tài liệu Quản trị mạng cơ bản CCNA
20
12/2017
4. TCP / IP LAYER
Reference Models
The TCP/IP Reference Model
Tài liệu Quản trị mạng cơ bản CCNA
21
12/2017
Reference Models
Comparing the OSI and TCP/IP Models
5. ETHERNET TECHNOLOGIES AND CABLING
Tài liệu Quản trị mạng cơ bản CCNA
22
12/2017
Ethernet Operation
LLC and MAC Sublayers
Ethernet
▪ One of the most widely used LAN technologies
▪ Operates in the data link layer and the physical layer
▪ Family of networking technologies that are defined in the
IEEE 802.2 and 802.3 standards
▪ Supports data bandwidths of 10, 100, 1000, 10,000, 40,000,
and 100,000 Mbps (100 Gbps)
Ethernet Standards
▪ Define Layer 2 protocols and Layer 1 technologies
▪ Two separate sub layers of the data link layer to operate –
Logical link control (LLC) and the MAC sublayers
Ethernet Operation
MAC Sublayer (cont.)
MAC
▪ Responsible for the placement of frames on the media and the removal of
frames from the media
▪ Communicates directly with the physical layer
▪ If multiple devices on a single medium attempt to forward data
simultaneously, the data will collide resulting in corrupted, unusable data
▪ Ethernet provides a method for controlling how the nodes share access
through the use a Carrier Sense Multiple Access (CSMA) technology
Tài liệu Quản trị mạng cơ bản CCNA
23
12/2017
Ethernet Operation
Media Access Control
Carrier Sense Multiple Access (CSMA) process
▪ Used to first detect if the media is carrying a signal
▪ If no carrier signal is detected, the device transmits its data
▪ If two devices transmit at the same time - data collision
Ethernet Operation
Media Access Control (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
24
12/2017
Ethernet Operation
Media Access Control (cont.)
CSMA is usually implemented in conjunction with a method for
resolving media contention. The two commonly used methods are:
CSMA/Collision Detection and CSMA/Collision Avoidance
CSMA/Collision Detection
• The device monitors the media for the presence of a data signal
• If a data signal is absent, indicating that the media is free, the
device transmits the data
• If signals are then detected that show another device was
transmitting at the same time, all devices stop sending & try again
later
• While Ethernet networks are designed with CSMA/CD technology,
with today’s intermediate devices, collisions do not occur and the
processes utilized by CSMA/CD are really unnecessary
• Wireless connections in a LAN environment still have to take
collisions into account
Ethernet Operation
Media Access Control (cont.)
CSMA/Collision Avoidance (CSMA/CA) media access method
• Device examines the media for the presence of data signal - if the media is
free, the device sends a notification across the media of its intent to use it
• The device then sends the data.
• Used by 802.11 wireless networking technologies
Tài liệu Quản trị mạng cơ bản CCNA
25
12/2017
Ethernet Frame Attributes
Ethernet Frame Size
▪ Ethernet II and IEEE 802.3 standards define the minimum frame size as 64
bytes and the maximum as 1518 bytes
▪ Less than 64 bytes in length is considered a "collision fragment" or "runt
frame”
▪ If size of a transmitted frame is less than the minimum or greater than the
maximum, the receiving device drops the frame
▪ At the physical layer, different versions of Ethernet vary in their method for
detecting and placing data on the media
Ethernet MAC
End-to-End Connectivity, MAC, and IP
IP Packet Encapsulated in an Ethernet Frame
Tài liệu Quản trị mạng cơ bản CCNA
26
12/2017
Ethernet MAC
End-to-End Connectivity, MAC, and IP (cont.)
ARP
Introduction to ARP
ARP Purpose
▪ Sending node needs a way to find the MAC address of the destination for a
given Ethernet link
The ARP protocol provides two basic functions:
▪ Resolving IPv4 addresses to MAC addresses
▪ Maintaining a table of mappings
Tài liệu Quản trị mạng cơ bản CCNA
27
12/2017
ARP
Introduction to ARP (cont.)
ARP
ARP Functions/Operation
ARP Table
▪ Used to find the data link layer address that is mapped to the destination
IPv4 address.
▪ As a node receives frames from the media, it records the source IP and
MAC address as a mapping in the ARP table.
ARP Request
▪ Layer 2 broadcast to all devices on the Ethernet LAN.
▪ The node that matches the IP address in the broadcast will reply.
▪ If no device responds to the ARP request, the packet is dropped because a
frame cannot be created.
Note: Static map entries can be entered in an ARP table, but this is rarely
done.
Tài liệu Quản trị mạng cơ bản CCNA
28
12/2017
ARP
ARP Operation
ARP
ARP Operation (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
29
12/2017
ARP
ARP Operation (cont.)
ARP
ARP Operation (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
30
12/2017
ARP
ARP Functions/Operation (cont.)
ARP
ARP Role in Remote Communication
▪ If the destination IPv4 host is on the local network, the frame will use the
MAC address of this device as the destination MAC address.
▪ If the destination IPv4 host is not on the local network, the source uses the
ARP process to determine a MAC address for the router interface serving as
the gateway.
▪ In the event that the gateway entry is not in the table, an ARP request is
used to retrieve the MAC address associated with the IP address of the
router interface.
Tài liệu Quản trị mạng cơ bản CCNA
31
12/2017
ARP
Removing Entries from an ARP Table
▪ The ARP cache
timer removes ARP
entries that have
not been used for
a specified period
of time.
▪ Commands may
also be used to
manually remove
all or some of the
entries in the ARP
table.
Link Aggregation
• Link Aggregation (LA): The combination of
multiple physical links to function as a single
logical link.
• Link Aggregation Group (LAG): A group of
physical links that make up a single aggregation.
Each physical port may be a member of a single
LAG.
• Link Aggregation Control Protocol (LACP): The
protocol specified by IEEE 802.3.ad-2000 to
outline standardized Link Aggregation
Tài liệu Quản trị mạng cơ bản CCNA
32
12/2017
Link Aggregation
• Also known as port bundling, link bundling
• You can use multiple links in parallel as a single,
logical link
For increased capacity
For redundancy (fault tolerance)
• LACP (Link Aggregation Control Protocol) is a
standardized method of negotiating these
bundled links between switches
LACP Operation
• Two switches connected via multiple links will
send LACPDU packets, identifying themselves
and the port capabilities
• They will then automatically build the logical
aggregated links, and then pass traffic.
• Switche ports can be configured as active or
passive
Tài liệu Quản trị mạng cơ bản CCNA
33
12/2017
LACP Operation
100 Mbps
Switch A
Switch B
100 Mbps
LACPDUs
• Switches A and B are connected to each other
using two sets of Fast Ethernet ports
• LACP is enabled and the ports are turned on
• Switches start sending LACPDUs, then negotiate
how to set up the aggregation
LACP Operation
100 Mbps
Switch A
Switch B
100 Mbps
200 Mbps logical link
• The result is an aggregated 200 Mbps logical link
• The link is also fault tolerant: If one of the member links fail, LACP will
automatically take that link off the bundle, and keep sending traffic over
the remaining link
Tài liệu Quản trị mạng cơ bản CCNA
34
12/2017
SLAs for IP/MPLS Networks
• Cisco IOS IP SLAs’ operations measure per VPN
• Allows measurements from a PE to CE routers
SP Converged IP/MPLS Network
Measure Either
CE–PE or CE–
CE Links
Cisco
Exclusive
P Router
CRS-1
Enterprise
Site 1
Measure Either CE–PE
or CE–CE or
PE-PE Links
Enterprise
Site 2
Cisco IOS IP SLAs
Understanding IP Service Levels
• Optimize IP business applications and services
Voice over IP, Video, and VPN
• Reduce total cost of ownership
• End to end service level measurements
Tài liệu Quản trị mạng cơ bản CCNA
35
12/2017
Cisco IOS IP SLAs Benefits
OPTIMIZED APPLICATIONS
& SERVICES
• Performance visibility
• Prove service levels
• Enhance Customer satisfaction
• Enhance acceptance of businesscritical services
REDUCED TOTAL COST OF
OWNERSHIP AND OpEx
• Reduce deployment time
• Lower mean time to restore and
downtime
• Proactive identification of issues
enforces higher reliability
Continuous
Predictable Reliable
Measurements and Metrics
Automated Intelligence
Proactive
Cisco IOS IP SLAs Advantages
VPN
VoIP
• SLAs are
essential to VPN
services
• Quality of Service
(QoS)-based
measurements
• Revenue for
differentiated
services
• Brings IP service
customer
confidence
• Demonstrate how
VoIP is working
• Deploy with
confidence
• Enhanced
customer
satisfaction
• Metrics useful for
trouble shooting &
and reducing
down time
Business
Applications
• Assure delivery
with network
performance
• Meet business
objectives with
guaranteed
service levels
• Assure network
quality of service
• Reduce downtime
Key Services Benefit from Cisco IOS IP SLA
Tài liệu Quản trị mạng cơ bản CCNA
36
12/2017
Cisco IOS IP SLAs Uses and Metrics
*DATA
TRAFFIC
REQUIREMENT
• Minimize
Delay, Packet
Loss
• Verify QoS
IP SLA MEASURMENT
•
•
•
•
Jitter
Packet loss
Latency
per QoS
*VoIP
• Minimize
Delay, Packet
Loss, Jitter
•
•
•
•
Jitter
Packet loss
Latency
MOS Voice
Quality Score
*SERVICE LEVEL
AGREEMENT
• Measure Delay,
Packet Loss,
Jitter
• One-way
•
•
•
•
•
Jitter
Packet loss
Latency
One-way
Enhanced
accuracy
• NTP
*AVAILABILITY
Connectivity
testing
**STREAMING
VIDEO
• Minimize
Delay, Packet
Loss
• Connectivity
tests to IP
devices
• Jitter
• Packet loss
• Latency
Chapter 2:
IP Addressing and Subnets
Tài liệu Quản trị mạng cơ bản CCNA
37
12/2017
Chapter 2
1
2
3
4
5
IP Addresses – Composition, Types and Classes
Private and Public IP Address
Subnetting
Variable Length Subnet mask ( VLSM)
Route Summarizion
1. IP ADDRESSES – COMPOSITION, TYPES AND CLASSES
Tài liệu Quản trị mạng cơ bản CCNA
38
12/2017
IPv4 Address Structure
Converting a Binary Address to Decimal
IPv4 Address Structure
Converting from Decimal to Binary
168 = ? binary
Tài liệu Quản trị mạng cơ bản CCNA
39
12/2017
IPv4 Address Structure
Converting from Decimal to Binary (Cont.)
2. PRIVATE AND PUBLIC IP ADDRESS
Tài liệu Quản trị mạng cơ bản CCNA
40
12/2017
Types of IPv4 Address
Public and Private IPv4 Addresses
Private address blocks are:
Hosts that do not require access to the Internet can use private addresses
▪ 10.0.0.0 to 10.255.255.255 (10.0.0.0/8)
▪ 172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
▪ 192.168.0.0 to 192.168.255.255 (192.168.0.0/16)
Shared address space addresses:
Not globally routable
Intended only for use in service provider networks
Address block is 100.64.0.0/10
Types of IPv4 Address
Special Use IPv4 Addresses
Network and Broadcast addresses – within each network the first and last
addresses cannot be assigned to hosts
Loopback address – 127.0.0.1 a special address that hosts use to direct traffic
to themselves (addresses 127.0.0.0 to 127.255.255.255 are reserved)
Link-Local address – 169.254.0.0 to 169.254.255.255 (169.254.0.0/16)
addresses can be automatically assigned to the local host
TEST-NET addresses – 192.0.2.0 to 192.0.2.255 (192.0.2.0/24) set aside for
teaching and learning purposes, used in documentation and network examples
Experimental addresses – 240.0.0.0 to 255.255.255.254 are listed as reserved
Tài liệu Quản trị mạng cơ bản CCNA
41
12/2017
consistency.
Types of IPv4 Address
Legacy Classful Addressing
3 SUBNETTING
Tài liệu Quản trị mạng cơ bản CCNA
42
12/2017
Network Segmentation
Reasons for Subnetting
Subnetting is the process of segmenting a network into multiple smaller
network spaces called subnetworks or subnets.
Large networks must be segmented into smaller subnetworks, creating
smaller groups of devices and services to:
• Control traffic by containing broadcast traffic within each subnetwork.
• Reduce overall network traffic and improve network performance.
Communication Between Subnets
A router is necessary for devices on different networks and subnets to
communicate.
Each router interface must have an IPv4 host address that belongs to the
network or subnet that the router interface is connected.
Devices on a network and subnet use the router interface attached to their
LAN as their default gateway.
Subnetting an IPv4 Network
Basic Subnetting
Borrowing Bits to Create Subnets
Borrowing 1 bit 21 = 2 subnets
Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask
Subnet 0
Subnet 1
Network 192.168.1.0-127/25
Network 192.168.1.128-255/25
Mask: 255.255.255.128
Mask: 255.255.255.128
Tài liệu Quản trị mạng cơ bản CCNA
43
12/2017
Subnetting an IPv4 Network
Subnets in Use
Subnets in Use
Subnet 0
Network 192.168.1.0-127/25
Subnet 1
Network 192.168.1.128-255/25
Determining the Subnet Mask
Subnetting Based on Host Requirements
Two considerations when planning subnets:
Number of subnets required
Number of host addresses required
Formula to determine number of usable hosts: 2^n-2
▪ 2^n (where n is the number of remaining host bits) is
used to calculate the number of hosts.
▪ -2 (The subnetwork ID and broadcast address cannot
be used on each subnet.)
Tài liệu Quản trị mạng cơ bản CCNA
44
12/2017
Determining the Subnet Mask
Subnetting Network-Based Requirements
Calculate the number
of subnets:
2^n (where n is the
number
of
bits
borrowed)
Subnet needed for
each department.
Determining the Subnet Mask
Subnetting To Meet Network Requirements
▪ Balance the required
number of subnets
and hosts for the
largest subnet.
▪ Design the addressing
scheme to
accommodate the
maximum number of
hosts for each
subnet.
▪ Allow for growth in
each subnet.
Tài liệu Quản trị mạng cơ bản CCNA
45
12/2017
Benefits of Variable Length Subnet Masking
Traditional Subnetting Wastes Addresses
Traditional subnetting – Uses
the same number of
addresses is allocated for
each subnet.
Subnets that require fewer
addresses have unused
(wasted) addresses; for
example, WAN links only
need two addresses.
4 VARIABLE LENGTH SUBNET MASKS (VLSM)
Tài liệu Quản trị mạng cơ bản CCNA
46
12/2017
Benefits of Variable Length Subnet Masking
Variable Length Subnet Masks (VLSM)
The variable-length subnet
mask (VLSM) or subnetting a
subnet provides more
efficient use of addresses.
VLSM allows a network space
to be divided in unequal
parts.
Subnet mask varies, depending
on how many bits have been
borrowed for a particular
subnet.
Network is first subnetted, and
then the subnets are
resubnetted.
Benefits of Variable Length Subnet Masking
Basic VLSM
Tài liệu Quản trị mạng cơ bản CCNA
47
12/2017
Benefits of Variable Length Subnet Masking
VLSM in Practice
Using VLSM subnets, the LAN and WAN segments in example below can be
addressed with minimum waste.
Each LANs will be assigned a subnet with /27 mask.
Each WAN link will be assigned a subnet with /30 mask.
Benefits of Variable Length Subnet Masking
VLSM Chart
Tài liệu Quản trị mạng cơ bản CCNA
48
12/2017
Structured Design
Planning to Address the Network
Allocation of network addresses should be planned and documented for the
purposes of:
Preventing duplication of addresses
Providing and controlling access
Monitoring security and performance
Client addresses – Usually dynamically assigned using the Dynamic Host
Configuration Protocol (DHCP).
Sample
Network
Addressing
Plan
Chapter 3 – Introduction to Cisco
Routers, Switches and IOS
Tài liệu Quản trị mạng cơ bản CCNA
49
12/2017
Chapter 3
1 Introduction to Cisco Routers, Switches, IOS & the Boot Process
2 Using the Command-Line Interface (CLI)
3 Basic Configuration of Router and Switches
4 Configuring Router Interfaces
5 Gathering Information and Verifying Configuration
6 Saving, Erasing, Restoring and Backing up Configuration & IOS File
7 Password Recovery on a Cisco Router
8 Cisco Discovery Protocol (CDP)
9 Using Telnet, SSH on IOS
1 INTRODUCTION TO CISCO ROUTERS, SWITCHES, IOS
& THE BOOT PROCESS
Tài liệu Quản trị mạng cơ bản CCNA
50
12/2017
Cisco IOS
Operating Systems
All networking equipment dependent on operating systems
The operating system on home routers is usually called firmware
Cisco IOS – Collection of network operating systems used on Cisco devices
Cisco IOS
Operating Systems (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
51
12/2017
Cisco IOS
Purpose of OS
PC operating systems (Windows 8 and OS X) perform technical functions that
enable:
▪ Use of a mouse
▪ View output
▪ Enter text
Switch or router IOS provides options to:
▪ Configure interfaces
▪ Enable routing and switching functions
All networking devices come with a default IOS
Possible to upgrade the IOS version or feature set
In this course, primary focus is Cisco IOS Release 15.x
Cisco IOS
Location of the Cisco IOS
Cisco IOS stored in Flash
Non-volatile storage, not lost when power is lost
Can be changed or overwritten as needed
Can be used to store multiple versions of IOS
IOS copied from flash to volatile RAM
Quantity of flash and RAM memory determines IOS that can be used
Tài liệu Quản trị mạng cơ bản CCNA
52
12/2017
Cisco IOS
IOS Functions
These are the major functions performed or enabled by Cisco routers and
switches.
Accessing a Cisco IOS Device
Console Access Method
Most common methods to access the CLI:
Console
Telnet or SSH
AUX port
Tài liệu Quản trị mạng cơ bản CCNA
53
12/2017
Accessing a Cisco IOS Device
Console Access Method
Console Port
Device is accessible even if no networking services have been configured (outof-band)
Need a special console cable
Allows configuration commands to be entered
Should be configured with passwords to prevent unauthorized access
Device should be located in a secure room so console port cannot be easily
accessed
Accessing a Cisco IOS Device
Telnet, SSH, and AUX Access Methods
Telnet
Method for remotely accessing the CLI over a network
Require active networking services and one active interface that is configured
Secure Shell (SSH)
Remote login similar to Telnet, but utilizes more security
Stronger password authentication
Uses encryption when transporting data
Aux Port
Out-of-band connection
Uses telephone line
Can be used like console port
Tài liệu Quản trị mạng cơ bản CCNA
54
12/2017
Accessing a Cisco IOS Device
Terminal Emulation Programs
Software
available
for
connecting to a networking
device:
PuTTY
Tera Term
SecureCRT
HyperTerminal
OS X Terminal
3-2 USING THE COMMAND-LINE INTERFACE (CLI)
Tài liệu Quản trị mạng cơ bản CCNA
55
12/2017
Navigating the IOS
Cisco IOS Modes of Operation
Navigating the IOS
Primary Modes
Tài liệu Quản trị mạng cơ bản CCNA
56
12/2017
Navigating the IOS
Global Configuration Mode and Submodes
Navigating the IOS
Navigating Between IOS Modes
Tài liệu Quản trị mạng cơ bản CCNA
57
12/2017
Navigating the IOS
Navigating Between IOS Modes (cont.)
The Command Structure
IOS Command Structure
Tài liệu Quản trị mạng cơ bản CCNA
58
12/2017
The Command Structure
Cisco IOS Command Reference
To navigate to Cisco’s IOS Command Reference to find a command:
1. Go to http://www.cisco.com.
2. Click Support.
3. Click Networking Software (IOS & NX-OS).
4. Click 15.2M&T (for example).
5. Click Reference Guides.
6. Click Command References.
7. Click the particular technology that encompasses the command you
reference.
8. Click the link on the left that alphabetically matches the command you
referencing.
9. Click the link for the command.
The Command Structure
Context-Sensitive Help
Tài liệu Quản trị mạng cơ bản CCNA
59
12/2017
The Command Structure
Command Syntax Check
The Command Structure
Hot Keys and Shortcuts
Tab – Completes the remainder of a partially typed command or keyword.
Ctrl-R – Redisplays a line.
Ctrl-A – Moves to the beginning of the line.
Ctrl-Z – Exits the configuration mode and returns to user EXEC.
Down Arrow – Allows the user to scroll forward through former
commands.
Up Arrow – Allows the user to scroll backward through former commands.
Ctrl-shift-6 – Allows the user to interrupt an IOS process such as ping
or traceroute.
Ctrl-C – Exits the current configuration or aborts the current command.
Tài liệu Quản trị mạng cơ bản CCNA
60
12/2017
The Command Structure
IOS Examination Commands
The Command Structure
The show version Command
Tài liệu Quản trị mạng cơ bản CCNA
61
12/2017
4 CONFIGURING ROUTER INTERFACES
Hostnames
Why the Switch
Let’s focus on:
Creating a two PC network connected via a switch
Setting a name for the switch
Limiting access to the device configuration
Configuring banner messages
Saving the configuration
Tài liệu Quản trị mạng cơ bản CCNA
62
12/2017
Hostnames
Device Names
Some guidelines for naming conventions:
Start with a letter
Contains no spaces
Ends with a letter or digit
Uses only letters, digits, and dashes
Be less than 64 characters in length
Without names, network
devices are difficult to
identify for configuration
purposes.
Hostnames
Configuring Device Names
Hostnames allow
devices to be identified
by network
administrators over a
network or the
Internet.
Tài liệu Quản trị mạng cơ bản CCNA
63
12/2017
Hostnames
Configuring Hostnames
Limiting Access to Device Configurations
Securing Device Access
These are device access passwords:
▪
▪
▪
▪
enable password – Limits access to the privileged EXEC mode
enable secret – Encrypted, limits access to the privileged EXEC mode
console password – Limits device access using the console connection
VTY password – Limits device access over Telnet
Note: In most of the labs in this course, we will be using simple
passwords such as cisco or class.
Tài liệu Quản trị mạng cơ bản CCNA
64
12/2017
Limiting Access to Device Configurations
Securing Privileged EXEC Access Mode
Use the enable secret command, not the older enable
password command.
The enable secret command provides greater security because the
password is encrypted.
Limiting Access to Device Configurations
Securing User EXEC Access
▪ Console port must be secured; it reduces the chance of unauthorized
personnel physically plugging a cable into the device and gaining
device access.
▪ VTY lines allow access to a Cisco device via Telnet. The number of VTY
lines supported varies with the type of device and the IOS version.
Tài liệu Quản trị mạng cơ bản CCNA
65
12/2017
Limiting Access to Device Configurations
Encrypting Password Display
service
passwordencryption
Prevents
passwords
from showing up as
plain
text
when
viewing
the
configuration
Keeps
unauthorized
individuals
from
viewing passwords in
the configuration file
Once
applied,
removing
the
encryption
service
does not reverse the
encryption
Limiting Access to Device Configurations
Banner Messages
Important part of the
legal process in the
event that someone is
prosecuted
for
breaking into a device
Wording that implies
that
a
login
is
"welcome" or "invited"
is not appropriate
Often used for legal
notification because it
is displayed to all
connected terminals
Tài liệu Quản trị mạng cơ bản CCNA
66
12/2017
5,6 GATHERING INFORMATION AND VERIFYING CONFIGURATION
Saving Configurations
Configuration Files
Switch# reload
System configuration has
been modified. Save?
[yes/no]: n
Proceed with reload?
[confirm]
Startup configuration is removed
by using the erase startupconfig
Switch# erase startupconfig
On a switch, you must also issue
the delete vlan.dat
Switch# delete vlan.dat
Delete filename
[vlan.dat]?
Delete flash:vlan.dat?
[confirm]
Tài liệu Quản trị mạng cơ bản CCNA
67
12/2017
Saving Configurations
Capturing Text
Ports and Addresses
IP Addressing of Devices
Each end device on a
network must be configured
with an IP address.
Structure of an IPv4 address
is called dotted decimal.
IP address displayed in
decimal notation, with four
decimal numbers between 0
and 255.
With the IP address, a
subnet
mask
is
also
necessary.
IP addresses can be assigned
to both physical ports and
virtual interfaces.
Tài liệu Quản trị mạng cơ bản CCNA
68
12/2017
Ports and Addresses
Interfaces and Ports
Network communications depend on end user device interfaces, networking
device interfaces, and the cables that connect them.
Types of network media include twisted-pair copper cables, fiber-optic
cables, coaxial cables, or wireless.
Different types of network media have different features and benefits.
Ethernet is the most common local area network (LAN) technology.
Ethernet ports are found on end user devices, switch devices, and other
networking devices.
Cisco IOS switches have physical ports for devices to connect to, but also have
one or more switch virtual interfaces (SVIs; no physical hardware on the
device associated with it; created in software).
SVI provides a means to remotely manage a switch over a network.
Addressing Devices
Configuring a Switch Virtual Interface
IP address – Together with subnet mask, uniquely identifies end device on
internetwork.
Subnet mask – Determines which part of a larger network is used by an IP
address.
interface VLAN 1 – Available in interface configuration mode,
ip address 192.168.10.2 255.255.255.0 – Configures the IP
address and subnet mask for the switch.
no shutdown – Administratively enables the interface.
Switch still needs to have physical ports configured and VTY lines to enable
remote management.
Tài liệu Quản trị mạng cơ bản CCNA
69
12/2017
Addressing Devices
Configuring a Switch Virtual Interface
Addressing Devices
Manual IP Address Configuration for End Devices
Tài liệu Quản trị mạng cơ bản CCNA
70
12/2017
Addressing Devices
Automatic IP Address Configuration for End Devices
Addressing Devices
IP Address Conflicts
Tài liệu Quản trị mạng cơ bản CCNA
71
12/2017
Verifying Connectivity
Test the Loopback Address on an End Device
Verifying Connectivity
Testing the Interface Assignment
Tài liệu Quản trị mạng cơ bản CCNA
72
12/2017
Verifying Connectivity
Testing End-to-End Connectivity
7 PASSWORD RECOVERY ON A CISCO ROUTER
http://www.cisco.com/c/en/us/support/docs/routers/
2600-series-multiservice-platforms/22188-pswdrec-2600.html
9 USING TELNET, SSH ON IOS
Tài liệu Quản trị mạng cơ bản CCNA
73
12/2017
CHAPTER 4 – INTRODUCTION TO IP ROUTING
Routing & Switching
Chapter 4
1 Understanding IP Routing
2 Static, Default and Dynamic Routing
3 Administrative Distance and Routing Metrics
4 Classes of Routing Protocols
5 Routing Loops
6 Route Redistribution
7 Understanding DHCP and DNS server
Tài liệu Quản trị mạng cơ bản CCNA
74
12/2017
Functions of a Router
Why Routing?
The router is responsible for the routing of traffic
between networks.
1. UNDERSTANDING IP ROUTING
Tài liệu Quản trị mạng cơ bản CCNA
75
12/2017
Functions of a Router
Routers are Computers
Routers are specialized computers containing the
following required components to operate:
• Central processing unit (CPU)
• Operating system (OS) - Routers use Cisco IOS
• Memory and storage (RAM, ROM, NVRAM, Flash,
hard drive)
Functions of a Router
Routers are Computers
Routers use specialized ports and network
interface cards to interconnect to other networks.
Tài liệu Quản trị mạng cơ bản CCNA
76
12/2017
Functions of a Router
Routers Interconnect Networks
Routers can connect multiple networks.
Routers have multiple interfaces, each on a
different IP network.
Functions of a Router
Routers Choose Best Paths
Routers use static routes and dynamic routing
protocols to learn about remote networks and
build their routing tables.
Routers use routing tables to determine the best
path to send packets.
Routers encapsulate the packet and forward it to
the interface indicated in routing table.
Tài liệu Quản trị mạng cơ bản CCNA
77
12/2017
Functions of a Router
Routers Choose Best Paths
Connect Devices
Default Gateways
To enable network access
devices must be configured with
the following IP address
information
▪IP address - Identifies a
unique host on a local
network.
▪Subnet mask - Identifies
the host’s network subnet.
▪Default gateway - Identifies
the router a packet is sent to
to when the destination is
not on the same local
network subnet.
Tài liệu Quản trị mạng cơ bản CCNA
78
12/2017
Basic Settings on a Router
Configure Basic Router Settings
Basics tasks that should be first configured on a Cisco Router and Cisco
Switch:
Name the device – Distinguishes it from other routers
Secure management access – Secures privileged EXEC, user EXEC, and
Telnet access, and encrypts passwords to their highest level
Configure a banner – Provides legal notification of unauthorized access.
Save the Configuration
Basic Settings on a Router
Configure an IPv4 Router Interface
To be available, a router interface
must be:
Configured with an address and
subnet mask .
Must be activated using no shutdown
command. By default LAN and WAN
interfaces are not activated.
Serial cable end labeled DCE must be
configured
with
the
clock
rate command.
Optional description can be included.
Tài liệu Quản trị mạng cơ bản CCNA
79
12/2017
Basic Settings on a Router
Configure a Loopback Interface
A loopback interface is a
logical interface that is
internal to the router:
It is not assigned to a physical
port, it
is considered a
software interface that is
automatically in an UP state.
A loopback interface is useful
for testing.
It is important in the OSPF
routing process.
Verify Connectivity of Directly Connected Networks
Verify Interface Settings
Show commands are used to
verify
operation
and
configuration of interface:
show ip interfaces brief
show ip route
show running-config
Show commands are used to
gather more detailed interface
information:
show interfaces
show ip interfaces
Tài liệu Quản trị mạng cơ bản CCNA
80
12/2017
Verify Connectivity of Directly Connected Networks
Verify Interface Settings
Some of the common commands
to verify the IPv6 interface
configuration are:
show ipv6 interface brief - displays
a summary for each of the
interfaces.
show
ipv6
interface
gigabitethernet 0/0 - displays the
interface status and all the IPv6
addresses for this interface.
show ipv6 route - verifies that
IPv6 networks and specific IPv6
interface addresses have been
installed in the IPv6 routing table.
Verify Connectivity of Directly Connected Networks
Filter Show Command Output
Show command output can be managed using the following command and filters:
Use the terminal length number command to specify the number of lines to be
displayed. A value of 0 (zero) prevents the router from pausing between screens of
output.
To filter specific output of commands use the (|)pipe character after show
command. Parameters that can be used after pipe include:
section, include, exclude, begin
Tài liệu Quản trị mạng cơ bản CCNA
81
12/2017
Switching Packets between Networks
Router Switching Functions
Switching Packets between Networks
Packet Routing
Tài liệu Quản trị mạng cơ bản CCNA
82
12/2017
Switching Packets between Networks
Reach the Destination
Path Determination
Routing Decisions
Tài liệu Quản trị mạng cơ bản CCNA
83
12/2017
Statically Learned Routes
Static Routes
Static routes and default static routes can be implemented after directly
connected interfaces are added to the routing table:
Static routes are manually configured
They define an explicit path between two networking devices.
Static routes must be manually updated if the topology changes.
Their benefits include improved security and control of resources.
Configure a static route to a specific network using the ip route
network
mask {next-hop-ip | exit-intf} command.
A default static route is used when the routing table does not contain a path
for a destination network.
Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exitintf | next-hop-ip} command.
2 STATIC, DEFAULT AND DYNAMIC ROUTING
Tài liệu Quản trị mạng cơ bản CCNA
84
12/2017
Statically Learned Routes
Default Static Routes Example
Statically Learned Routes
Static Routes Example
Tài liệu Quản trị mạng cơ bản CCNA
85
12/2017
Dynamic Routing Protocols
Dynamic Routing
Dynamic routing is used by routers to share information about the
reachability and status of remote networks. It performs network discovery
and maintains routing tables.
Dynamic Routing Protocols
IPv4 Routing Protocols
Cisco ISR routers can support a variety of dynamic IPv4
routing protocols including:
EIGRP – Enhanced Interior Gateway Routing Protocol
OSPF – Open Shortest Path First
IS-IS – Intermediate System-to-Intermediate System
RIP – Routing Information Protocol
Tài liệu Quản trị mạng cơ bản CCNA
86
12/2017
Types of Routing Protocols
Classifying Routing Protocols
Types of Routing Protocols
IGP and EGP Routing Protocols
Interior Gateway
Protocols (IGP) ▪ Used for routing
within an AS
▪ Include RIP, EIGRP,
OSPF, and IS-IS
Exterior Gateway
Protocols (EGP) ▪ Used for routing
between AS
▪ Official routing
protocol used by the
Internet
Tài liệu Quản trị mạng cơ bản CCNA
87
12/2017
Types of Routing Protocols
Distance Vector Routing Protocols
Distance vector IPv4 IGPs:
▪ RIPv1 - First generation
legacy protocol
▪ RIPv2 - Simple distance
vector routing protocol
▪ IGRP - First generation
Cisco proprietary protocol
(obsolete)
▪ EIGRP - Advanced
version of distance vector
routing
For R1, 172.16.3.0/24 is one hop away
(distance). It can be reached through R2
(vector).
Types of Routing Protocols
Distance Vector or Link-State Routing Protocols
Distance vector protocols use routers as sign posts
along the path to the final destination.
A link-state routing protocol is like having a complete map of the network
topology. The sign posts along the way from source to destination are not
necessary, because all link-state routers are using an identical map of the
network. A link-state router uses the link-state information to create a
topology map and to select the best path to all destination networks in the
topology.
Tài liệu Quản trị mạng cơ bản CCNA
88
12/2017
Types of Routing Protocols
Link-State Routing Protocols
Link-state IPv4 IGPs:
▪ OSPF - Popular standards
based routing protocol
▪ IS-IS - Popular in
provider networks.
Types of Routing Protocols
Classful Routing Protocols
Classful routing protocols do not send subnet mask information in their routing updates:
▪ Only RIPv1 and IGRP are classful.
▪ Created when network addresses were allocated based on classes (class A, B, or C).
▪ Cannot provide variable length subnet masks (VLSMs) and classless interdomain
routing (CIDR).
▪ Create problems in discontiguous networks.
Tài liệu Quản trị mạng cơ bản CCNA
89
12/2017
Types of Routing Protocols
Classless Routing Protocols
Classless routing protocols include subnet mask information in the routing updates:
▪ RIPv2, EIGRP, OSPF, and IS_IS
▪ Support VLSM and CIDR
▪ IPv6 routing protocols
Types of Routing Protocols
Routing Protocol Characteristics
Tài liệu Quản trị mạng cơ bản CCNA
90
12/2017
Types of Routing Protocols
Routing Protocol Metrics
A metric is a measurable value that is assigned by the routing protocol to
different routes based on the usefulness of that route:
▪ Used to determine the overall “cost” of a path from source to destination.
▪ Routing protocols determine the best path based on the route with the lowest
cost.
Distance Vector Routing Protocol Operation
Distance Vector Technologies
Distance vector routing protocols:
▪ Share updates between neighbors
▪ Not aware of the network topology
▪ Some send periodic updates to broadcast IP
255.255.255.255 even if topology has not changed
▪ Updates consume bandwidth and network device CPU
resources
▪ RIPv2 and EIGRP use multicast addresses
▪ EIGRP will only send an update when topology has
changed
Tài liệu Quản trị mạng cơ bản CCNA
91
12/2017
Distance Vector Routing Protocol Operation
Distance Vector Algorithm
RIP uses the Bellman-Ford algorithm as its routing algorithm.
IGRP and EIGRP use the Diffusing Update Algorithm (DUAL) routing algorithm
developed by Cisco.
Types of Distance Vector Routing Protocols
Routing Information Protocol
Routing
updates
broadcasted
every 30
seconds
Updates
use UDP
port 520
RIPng is based on RIPv2 with a 15 hop limitation and the
administrative distance of 120
Tài liệu Quản trị mạng cơ bản CCNA
92
12/2017
Configuring the RIP Protocol
Disabling Auto Summarization
▪
▪
▪
▪
▪
Similarly to RIPv1, RIPv2 automatically summarizes networks at major network
boundaries by default.
To modify the default RIPv2 behavior of automatic summarization, use the no
auto-summary router configuration mode command.
This command has no effect when using RIPv1.
When automatic summarization has been disabled, RIPv2 no longer summarizes
networks to their classful address at boundary routers. RIPv2 now includes all
subnets and their appropriate masks in its routing updates.
The show ip protocols now states that automatic network summarization is
not in effect.
Configuring the RIP Protocol
Configuring Passive Interfaces
Sending out unneeded updates on
a LAN impacts the network in
three ways:
▪ Wasted Bandwidth
▪ Wasted Resources
▪ Security Risk
Tài liệu Quản trị mạng cơ bản CCNA
93
12/2017
7 UNDERSTANDING DHCP AND DNS SERVER
DHCPv4 Operation
Introducing DHCPv4
DHCPv4 uses three different address allocation methods:
Manual Allocation – The administrator assigns a pre-allocated IPv4 address
to the client, and DHCPv4 communicates only the IPv4 address to the device.
Automatic Allocation – DHCPv4 automatically assigns a static IPv4 address
permanently to a device, selecting it from a pool of available addresses.
Dynamic Allocation – DHCPv4 dynamically assigns, or leases, an IPv4 address
from a pool of addresses for a limited period of time chosen by the server, or
until the client no longer needs the address. This method is the most
commonly used.
Tài liệu Quản trị mạng cơ bản CCNA
94
12/2017
DHCPv4 Operation
DHCPv4 Operation
DHCPv4 Operation
DHCPv4 Message Format
Tài liệu Quản trị mạng cơ bản CCNA
95
12/2017
DHCPv4 Operation
Format DHCPv4 Discover and Offer Messages
DHCPv4 Operation
Configuring a DHCPv4 Server
A Cisco router running the Cisco IOS software can be configured to act as a
DHCPv4 server. To set up DHCP:
1. Exclude addresses from the pool.
2. Set up the DHCP pool name.
3. Define the range of addresses and subnet mask.
Use the default-router command for the
default gateway. Optional parameters that can be
included in the pool – dns server, domain-name.
To disable DHCP, use the no service dhcp command.
Tài liệu Quản trị mạng cơ bản CCNA
96
12/2017
DHCPv4 Operation
Verifying a DHCPv4 Server
Commands to verify DHCP:
show running-config | section dhcp
show ip dhcp binding
show ip dhcp server statistics
On the PC, issue the ipconfig /all command.
DHCPv4 Operation
DHCPv4 Relay
Using an IP helper address enables a router to
forward DHCPv4 broadcasts to the DHCPv4 server.
Acting as a relay.
Tài liệu Quản trị mạng cơ bản CCNA
97
12/2017
Configuring a DHCPv4 Client
Configuring a Router as a DHCPv4 Client
Troubleshoot DHCPv4
Verifying the Router DHCPv4 Configuration
Tài liệu Quản trị mạng cơ bản CCNA
98
12/2017
Troubleshoot DHCPv4
Debugging DHCPv4
Providing IP Addressing Services
Domain Name Service
A human legible
name is resolved to
its numeric network
device address by
the DNS protocol.
Tài liệu Quản trị mạng cơ bản CCNA
99
12/2017
Providing IP Addressing Services
Domain Name Service (cont.)
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol.
Providing IP Addressing Services
Domain Name Service (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
100
12/2017
Providing IP Addressing Services
DNS Message Format
▪ DNS server stores different types of resource records used to resolve names
▪ Contains the name, address, and type of record.
▪ Record types are:
▪ A – An end device address
▪ NS – An authoritative name server
▪ CNAME – The canonical name for an alias; used when multiple services
have the single network address, but each service has its own entry in
DNS
▪ MX – Mail exchange record; maps a domain name to a list of mail
exchange servers
▪ Unable to resolve the name using its stored records, contacts other servers.
▪ Server temporarily stores the numbered address that matches the name in
cache memory.
▪ Windows ipconfig /displaydns displays all cached DNS.
Providing IP Addressing Services
DNS Hierarchy
Examples toplevel domains:
.au - Australia
.co - Colombia
.com - business or
industry
.jp - Japan
.org - non-profit
organization
Tài liệu Quản trị mạng cơ bản CCNA
101
12/2017
Providing IP Addressing Services
nslookup
▪ Operating system utility called nslookup allows the user to manually query
the name servers to resolve a given host name
▪ Utility can be used to troubleshoot name resolution issues and to verify the
current status of the name servers
CHAPTER 5 – ROUTING PROTOCOLS WITH EIGRP
Tài liệu Quản trị mạng cơ bản CCNA
102
12/2017
Chapter 5
1 Introdude Enhanced Interior Gateway Routing
Protocol
2 Configuring EIGRP
3 Verifying and Troubleshooting EIGRP
1 INTRODUDE ENHANCED INTERIOR GATEWAY ROUTING
PROTOCOL (EIGRP)
Tài liệu Quản trị mạng cơ bản CCNA
103
12/2017
Basic Features of EIGRP
Features of EIGRP
Released in 1992 as a Cisco proprietary protocol.
2013 basic functionality of EIGRP released as an open standard.
Advanced Distance Vector routing protocol.
Uses the Diffusing Update Algorithm (DUAL) to calculate paths and back-up
paths.
Establishes Neighbor Adjacencies.
Uses the Reliable Transport Protocol to provide delivery of EIGRP packets to
neighbors.
Partial and Bounded Updates. Send updates only when there is a change and
only to the routers that need the information.
Supports Equal and Unequal Cost Load Balancing.
Basic Features of EIGRP
Protocol Dependent Modules
Tài liệu Quản trị mạng cơ bản CCNA
104
12/2017
Basic Features of EIGRP
Reliable Transport Protocol
Basic Features of EIGRP
Authentication
EIGRP can be configured
to authenticate routing
information.
Ensures routers only
accept updates from
routers that have been
configured with the
correct
authentication
information.
Tài liệu Quản trị mạng cơ bản CCNA
105
12/2017
Types of EIGRP Packets
EIGRP Packet Types
Types of EIGRP Packets
EIGRP Hello Packets
Used to discover EIGRP neighbors.
Used to form and maintain EIGRP neighbor adjacencies.
Sent as IPv4 or IPv6 multicasts.
IPv4 multicast address 224.0.0.10.
IPv6 multicast address FF02::A.
Unreliable delivery.
Sent every 5 seconds (every 60 seconds on low-speed NBMA networks).
EIGRP uses a default Hold timer of three times the Hello interval before
declaring neighbor unreachable.
Tài liệu Quản trị mạng cơ bản CCNA
106
12/2017
Types of EIGRP Packets
EIGRP Update & Acknowledgement Packets
Update packets are sent to
propagate routing information,
only when necessary.
Sends Partial updates – only
contains information about route
changes.
Sends Bounded updates-sent only
to routers affected by the change.
Updates use reliable delivery,
therefore,
require
an
acknowledgement.
Types of EIGRP Packets
EIGRP Query and Reply Packets
Used when searching for networks.
Queries use reliable delivery, which can be multicast or unicast.
Replies use reliable delivery.
Tài liệu Quản trị mạng cơ bản CCNA
107
12/2017
EIGRP Messages
Encapsulating EIGRP Messages
EIGRP Messages
EIGRP Packet Header and TLV
Tài liệu Quản trị mạng cơ bản CCNA
108
12/2017
Metrics
Calculating the EIGRP Metric
Step 1. Determine the link with the slowest bandwidth. Use that value to
calculate bandwidth (10,000,000/bandwidth).
Step 2. Determine the delay value for each outgoing interface on the way to
the destination. Add the delay values and divide by 10 (sum of
delay/10).
Step 3. Add the computed values for bandwidth and delay, and multiply the
sum by 256 to obtain the EIGRP metric.
DUAL and the Topology Table
DUAL Concepts
▪ Diffusing Update ALgorithm (DUAL) provides the following:
▪ Loop-free paths and loop-free backup paths
▪ Fast convergence
▪ Minimum bandwidth usage with bounded updates
▪ The decision process for all route computations is done by the DUAL
Finite State Machine (FSM)
▪ DUAL FSM tracks all routes.
▪ Uses EIGRP metrics to select efficient, loop-free paths.
▪ Identifies the routes with the least-cost path to be inserted into the
routing table.
▪ EIGRP maintains a list of backup routes that DUAL has already
determined that can be used immediately if the primary path fails.
Tài liệu Quản trị mạng cơ bản CCNA
109
12/2017
DUAL and the Topology Table
Successor and Feasible Distance
▪ The Successor is the least-cost route to the destination
network.
▪ The Feasible Distance (FD) is the lowest calculated metric to
reach the destination network.
Feasible Successors, Feasibility Condition, and
Reported Distance
▪ Feasible Successor (FS) is a neighbor that has a loop-free
backup path to the same network as the successor, and it
satisfies the Feasibility Condition (FC).
▪ Feasibility Condition (FC) is met when a neighbor’s Reported
Distance (RD) to a network is less than the local router’s
feasible distance to the same destination network.
▪ Reported Distance (RD) is an EIGRP neighbor’s feasible
distance to the same destination network.
Tài liệu Quản trị mạng cơ bản CCNA
110
12/2017
DUAL and the Topology Table
Topology Table: show ip eigrp Command
DUAL and the Topology Table
Topology Table: No Feasible Successor
Tài liệu Quản trị mạng cơ bản CCNA
111
12/2017
DUAL and Convergence
DUAL Finite State Machine (FSM)
DUAL and Convergence
DUAL: Feasible Successor
Tài liệu Quản trị mạng cơ bản CCNA
112
12/2017
DUAL and Convergence
DUAL: No Feasible Successor
2 CONFIGURING EIGRP FOR IPV4
Tài liệu Quản trị mạng cơ bản CCNA
113
12/2017
Configuring EIGRP with IPv4
EIGRP Network Topology
This course uses the topology that configures EIGRP with IPv4.
Configuring EIGRP with IPv4
Autonomous System Numbers
The router eigrp autonomous-system command enables the
EIGRP process.
The autonomous system number is only significant to the EIGRP routing
domain.
The EIGRP autonomous system number is not associated with the Internet
Assigned Numbers Authority (IANA) globally assigned autonomous system
numbers used by external routing protocols.
Internet Service Providers (ISPs) require an autonomous system number
from IANA.
ISPs often use the Border Gateway Protocol (BGP), which does use the IANA
autonomous system number in its configuration.
Tài liệu Quản trị mạng cơ bản CCNA
114
12/2017
Configuring EIGRP with IPv4
Router EIGRP Command
Router(config)# router eigrp autonomous-system
To completely remove the EIGRP routing process from a device, use
the no router eigrp autonomous-system command.
Configuring EIGRP with IPv4
EIGRP Router ID
Used in both EIGRP and OSPF routing protocols, the router ID’s role is
more significant in OSPF.
Tài liệu Quản trị mạng cơ bản CCNA
115
12/2017
Configuring EIGRP with IPv4
Configuring the EIGRP Router ID
Configuring the EIGRP router ID
Router(config)# router eigrp autonomous-system
Router(config-router)# eigrp router-id ipv4-address
The IPv4 loopback address can be used as the router ID.
If the eigrp router-id value is not configured, the highest loopback
address is selected as the router ID.
Configuring a loopback interface
Router(config)# interface loopback number
Router(config-if)# ip addressipv4-address subnetmask
Configuring EIGRP with IPv4
Network Command
Enables any interface on this router that matches the network address in
the network router configuration mode command to send and receive
EIGRP updates.
These networks are included in EIGRP routing updates.
Tài liệu Quản trị mạng cơ bản CCNA
116
12/2017
Configuring EIGRP with IPv4
Network Command
The eigrp log-neighbor-changes router configuration mode
•
•
•
•
On by default
Displays changes in neighbor adjacencies
Verifies neighbor adjacencies during configuration
Indicates when any adjacencies have been
removed
Configuring EIGRP with IPv4
The Network Command and Wildcard Mask
To configure EIGRP to advertise specific subnets only, use the wildcard-mask
option with the network command.
Router(config-router)#
network
network
address [wildcard-mask]
The wildcard mask is the inverse of the subnet mask.
To calculate the wildcard mask, subtract the subnet mask from
255.255.255.255:
255.255.255.255
-- 255.255.255.252
0. 0. 0. 3 wildcard mask
Note: Some IOS versions also let you enter the subnet mask instead of a
wildcard mask.
Tài liệu Quản trị mạng cơ bản CCNA
117
12/2017
Configuring EIGRP with IPv4
Passive Interface
Use the passive-interface command to:
▪ Prevent neighbor adjacencies
▪ Suppress unnecessary update traffic
▪ Increase security controls, such as preventing unknown rogue routing
devices from receiving EIGRP updates
To configure:
Router(config)# router eigrp as-number
Router(config-router)# passiveinterface interface-type interface-number
To verify:
Router# show ip protocols
Configuring EIGRP with IPv4
Verifying EIGRP: Examining Neighbors
Tài liệu Quản trị mạng cơ bản CCNA
118
12/2017
Configuring EIGRP with IPv4
Verifying EIGRP: show ip protocols Command
Configuring EIGRP with IPv4
Verifying EIGRP: Examine the IPv4 Routing Table
Tài liệu Quản trị mạng cơ bản CCNA
119
12/2017
3 VERIFYING AND TROUBLESHOOTING EIGRP
CHAPTER 6 – ROUTING PROTOCOLS WITH IS – IS, OSPF
Tài liệu Quản trị mạng cơ bản CCNA
120
12/2017
Chapter 8
1 Open Shortest Path First (OSPF)
2 Configuring OSPF
3 Verifying and Troubleshooting OSPF
1 OPEN SHORTEST PATH FIRST (OSPF)
Tài liệu Quản trị mạng cơ bản CCNA
121
12/2017
Open Shortest Path First
Evolution of OSPF
Interior Gateway Protocols
1988
1989
updated in
2008
Open Shortest Path First
Features of OSPF
Tài liệu Quản trị mạng cơ bản CCNA
122
12/2017
Open Shortest Path First
Components of OSPF
Open Shortest Path First
Components of OSPF (cont.)
OSPF Routers Exchange Packets - These packets are used to discover neighboring
routers and also to exchange routing information to maintain accurate information
about the network.
Tài liệu Quản trị mạng cơ bản CCNA
123
12/2017
Open Shortest Path First
Link-State Operation
If a neighbor is present, the OSPFenabled router attempts to establish
a neighbor adjacency with that
neighbor
Open Shortest Path First
Link-State Operation (cont.)
▪ LSAs contain the state and
cost of each directly
connected link.
▪ Routers flood their LSAs to
adjacent neighbors.
▪ Adjacent neighbors receiving
the LSA immediately flood
the LSA to other directly
connected neighbors, until all
routers in the area have all
LSAs.
Tài liệu Quản trị mạng cơ bản CCNA
124
12/2017
Open Shortest Path First
Link-State Operation
▪ Build the topology table
based on the received LSAs.
▪ This database eventually
holds all the information
about the topology of the
network.
▪ Execute the SPF Algorithm.
Open Shortest Path First
Link-State Operation (cont.)
From the SPF tree, the best
paths are inserted into the
routing table.
Tài liệu Quản trị mạng cơ bản CCNA
125
12/2017
Open Shortest Path First
Single-area and Multiarea OSPF
Open Shortest Path First
Single-area and Multiarea OSPF (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
126
12/2017
OSPF Messages
Encapsulating OSPF Messages
OSPF Messages
Types of OSPF Packets
Tài liệu Quản trị mạng cơ bản CCNA
127
12/2017
OSPF Messages
Hello Packet
OSPF Type 1 packet = Hello packet:
▪
▪
▪
Discover OSPF neighbors and establish neighbor adjacencies.
Advertise parameters on which two routers must agree to become
neighbors.
Elect the Designated Router (DR) and Backup Designated Router
(BDR) on multiaccess networks like Ethernet and Frame Relay.
OSPF Messages
Hello Packet (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
128
12/2017
OSPF Messages
Hello Packet Intervals
OSPF Hello packets are transmitted:
▪ To 224.0.0.5 in IPv4 and FF02::5 in IPv6 (all OSPF routers)
▪ Every 10 seconds (default on multiaccess and point-to-point networks)
▪ Every 30 seconds (default on non-broadcast multiaccess [NBMA] networks)
▪ Dead interval is the period that the router waits to receive a Hello packet before
declaring the neighbor down
▪ Router floods the LSDB with information about down neighbors out all OSPF
enabled interfaces
▪ Cisco’s default is 4 times the Hello interval
OSPF Messages
Link-State Updates
Tài liệu Quản trị mạng cơ bản CCNA
129
12/2017
OSPF Operation
OSPF Operational States
When an OSPF router is initially
connected to a network, it attempts to:
▪ Create adjacencies with neighbors
▪ Exchange routing information
▪ Calculate the best routes
▪ Reach convergence
▪ OSPF progresses through several
states while attempting to reach
convergence.
OSPF Operation
Establish Neighbor Adjacencies
Tài liệu Quản trị mạng cơ bản CCNA
130
12/2017
OSPF Operation
Establish Neighbor Adjacencies (cont.)
DR and BDR election only occurs on multi-access networks such as Ethernet LANs.
OSPF Operation
OSPF DR and BDR
Tài liệu Quản trị mạng cơ bản CCNA
131
12/2017
OSPF Operation
Synchronizing OSPF Database
OSPF Operation
Synchronizing OSPF Database (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
132
12/2017
OSPF Router ID
OSPF Network Topology
OSPF Router ID
Router IDs
Tài liệu Quản trị mạng cơ bản CCNA
133
12/2017
2 CONFIGURING OSPF
Configure Single-area OSPFv2
The network Command
Tài liệu Quản trị mạng cơ bản CCNA
134
12/2017
Configure Single-Area OSPFv2
Passive Interface
By default, OSPF messages are forwarded out all OSPF-enabled interfaces.
However, these messages really only need to be sent out interfaces
connecting to other OSPF-enabled routers.
Sending out unneeded messages on a LAN affects the network in three
ways:
▪ Inefficient Use of Bandwidth
▪ Inefficient Use of Resources
▪ Increased Security Risk
The Passive Interface feature helps limiting the scope of routing updates
advertisements.
Configure Single-area OSPFv2
Configuring Passive Interfaces
Use the passive-interface router configuration mode command to
prevent the transmission of routing messages through a router
interface, but still allow that network to be advertised to other
routers.
Tài liệu Quản trị mạng cơ bản CCNA
135
12/2017
OSPF Cost
OSPF Metric = Cost
Cost = reference bandwidth / interface bandwidth
(default reference bandwidth is 10^8)
Cost = 100,000,000 bps / interface bandwidth in bps
OSPF Cost
OSPF Accumulates Costs
Cost of an OSPF route is the accumulated value from one router to the
destination network.
Tài liệu Quản trị mạng cơ bản CCNA
136
12/2017
OSPF Cost
Adjusting the Reference Bandwidth
▪ Use the command - auto-cost reference-bandwidth
▪ Must be configured on every router in the OSPF domain
▪ Notice that the value is expressed in Mb/s:
▪ Gigabit Ethernet - auto-cost reference-bandwidth 1000
▪ 10 Gigabit Ethernet - auto-cost reference-bandwidth 10000
OSPF Cost
Default Interface Bandwidths
On Cisco routers, the default bandwidth on most serial interfaces is set to 1.544
Mb/s.
Tài liệu Quản trị mạng cơ bản CCNA
137
12/2017
OSPF Cost
Adjusting the Interface Bandwidths
OSPF Cost
Manually Setting the OSPF Cost
Both the bandwidth interface command and the ip ospf cost interface
command achieve the same result, which is to provide an accurate value for
use by OSPF in determining the best route.
Tài liệu Quản trị mạng cơ bản CCNA
138
12/2017
3 VERIFYING AND TROUBLESHOOTING OSPF
Verify OSPF
Verify OSPF Neighbors
Verify that the router has formed an adjacency with its
neighboring routers.
Tài liệu Quản trị mạng cơ bản CCNA
139
12/2017
Verify OSPF
Verify OSPF Protocol Settings
Verify OSPF
Verify OSPF Process Information
Tài liệu Quản trị mạng cơ bản CCNA
140
12/2017
Verify OSPF
Verify OSPF Interface Settings
4. IS-IS Protocols
Tài liệu Quản trị mạng cơ bản CCNA
141
12/2017
IS-IS Protocols
• Intermediate System to Intermediate System
• ISO 10589 specifies OSI IS-IS routing protocol for
CLNS traffic
- A Link State protocol with a 2 level
hierarchical architecture
- Type/Length/Value (TLV) options to enhance
the protocol
• RFC 1195 added IP support n Integrated IS-IS
• IS/IS-IS runs on top of the Data Link Layer
IS-IS Adjacencies
• Once an adjacency is formed, neighbours share
their link state information
• Information goes in a Link State PDU (LSP)
• LSPs are flooded to all neighbours p
• New information received from neighbours is
used to compute a new view of the network
• On a link failure n New LSPs are flooded n The
routers recompute the routing table
Tài liệu Quản trị mạng cơ bản CCNA
142
12/2017
Designated IS
• There is ONE designated router per multi-access
network
• Generates network link advertisements
• Assists in database synchronization
• Scales IS-IS for multi-access (ethernet)
networks
Adding interfaces to IS-IS
Tài liệu Quản trị mạng cơ bản CCNA
143
12/2017
IS-IS Neighbour Authentication
IS-IS Neighbour Authentication
Tài liệu Quản trị mạng cơ bản CCNA
144
12/2017
Handling IPv6 in IS-IS
Chapter 7 – VLANs and VTP
Tài liệu Quản trị mạng cơ bản CCNA
145
12/2017
Chapter 3
1 Virtual LANs (VLANs)
2 Types of Switch Ports
3 VLAN Trunking: ISL and 802.1Q
4 VLAN Trunking Protocol (VTP)
5 Inter-VLAN Routing
6 VLAN Configuration
7 Inter-VLAN Routing Configuration
1 VIRTUAL LANS (VLANS)
Tài liệu Quản trị mạng cơ bản CCNA
146
12/2017
Overview of VLANs
VLAN Definitions
A VLAN is a logical partition of a Layer 2 network.
Multiple partitions can be created, allowing for multiple VLANs to co-exist.
Each VLAN is a broadcast domain, usually with its own IP network.
VLANs are mutually isolated and packets can only pass between them via a
router.
The partitioning of the Layer 2 network takes place inside a Layer 2 device,
usually via a switch.
The hosts grouped within a VLAN are unaware of the VLAN’s existence.
Overview of VLANs
VLAN Definitions (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
147
12/2017
Overview of VLANs
Benefits of VLANs
Security
Cost reduction
Better performance
Shrink broadcast domains
Improved IT staff efficiency
Simpler project and application management
Overview of VLANs
Types of VLANs
Data VLAN
Default VLAN
Native VLAN
Management VLAN
Tài liệu Quản trị mạng cơ bản CCNA
148
12/2017
Overview of VLANs
Types of VLANs (cont.)
Overview of VLANs
Voice VLANs
VoIP traffic is time-sensitive and requires:
• Assured bandwidth to ensure voice quality.
• Transmission priority over other types of
network traffic.
• Ability to be routed around congested areas on
the network.
• Delay of less than 150 ms across the network.
The voice VLAN feature enables access ports to carry IP voice traffic from
an IP phone.
The switch can connect to a Cisco 7960 IP phone and carry IP voice traffic.
The sound quality of an IP phone call can deteriorate if the data is
unevenly sent; the switch supports quality of service (QoS).
Tài liệu Quản trị mạng cơ bản CCNA
149
12/2017
Overview of VLANs
Voice VLANs (cont.)
The Cisco 7960 IP phone has two RJ-45 ports that each support
connections to external devices.
• Network Port (10/100 SW) - Use this port to connect the
phone to the network. The phone can also obtain inline power
from the Cisco Catalyst switch over this connection.
• Access Port (10/100 PC) - Use this port to connect a network
device, such as a computer, to the phone.
Overview of VLANs
Voice VLANs (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
150
12/2017
2 TYPES OF SWITCH PORTS
3 VLAN TRUNKING: ISL AND 802.1Q
Tài liệu Quản trị mạng cơ bản CCNA
151
12/2017
VLANs in a Multi-Switched Environment
VLAN Trunks
A VLAN trunk carries more than one VLAN.
A VLAN trunk is usually established between switches so same-VLAN devices
can communicate, even if physically connected to different switches.
A VLAN trunk is not associated to any VLANs; neither is the trunk ports used
to establish the trunk link.
Cisco IOS supports IEEE802.1q, a popular VLAN trunk protocol.
VLANs in a Multi-Switched Environment
VLAN Trunks (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
152
12/2017
VLANs in a Multi-Switched Environment
Controlling Broadcast Domains with VLANs
VLANs can be used to limit the reach of broadcast frames.
A VLAN is a broadcast domain of its own.
A broadcast frame sent by a device in a specific VLAN is forwarded within
that VLAN only.
VLANs help control the reach of broadcast frames and their impact in the
network.
Unicast and multicast frames are forwarded within the originating VLAN.
VLANs in a Multi-Switched Environment
Tagging Ethernet Frames for VLAN Identification
Frame tagging is the process of adding a VLAN identification header to the
frame.
It is used to properly transmit multiple VLAN frames through a trunk link.
Switches tag frames to identify the VLAN to that they belong. Different
tagging protocols exist; IEEE 802.1Q is a vey popular example.
The protocol defines the structure of the tagging header added to the
frame.
Switches add VLAN tags to the frames before placing them into trunk links
and remove the tags before forwarding frames through nontrunk ports.
When properly tagged, the frames can transverse any number of switches
via trunk links and still be forwarded within the correct VLAN at the
destination.
Tài liệu Quản trị mạng cơ bản CCNA
153
12/2017
VLANs in a Multi-Switched Environment
Tagging Ethernet Frames for VLAN Identification
VLANs in a Multi-Switched Environment
Native VLANs and 802.1Q Tagging
Frames that belong to the native VLAN are not tagged.
Frames received untagged remain untagged and are placed in the native
VLAN when forwarded.
If there are no ports associated to the native VLAN and no other trunk links,
an untagged frame is dropped.
In Cisco switches, the native VLAN is VLAN 1, by default.
Tài liệu Quản trị mạng cơ bản CCNA
154
12/2017
VLANs in a Multi-Switched Environment
Voice VLAN Tagging
VLAN Assignment
VLAN Ranges on Catalyst Switches
Cisco Catalyst 2960 and 3560 Series switches support over 4,000 VLANs.
VLANs are split into two categories:
• Normal range VLANs
• VLAN numbers from 1 to 1,005
• Configurations stored in the vlan.dat (in the flash memory)
• VTP can only learn and store normal range VLANs
• Extended Range VLANs
• VLAN numbers from 1,006 to 4,096
• Configurations stored in the running configuration (NVRAM)
• VTP does not learn extended range VLANs
Tài liệu Quản trị mạng cơ bản CCNA
155
12/2017
Dynamic Trunking Protocol
Introduction to DTP
Switch ports can be manually configured to form trunks.
Switch ports can also be configured to negotiate and establish a trunk link
with a connected peer.
The Dynamic Trunking Protocol (DTP) manages trunk negotiation.
DTP is a Cisco proprietary protocol and is enabled, by default, in Cisco
Catalyst 2960 and 3560 switches.
If the port on the neighbor switch is configured in a trunk mode that
supports DTP, it manages the negotiation.
The default DTP configuration for Cisco Catalyst 2960 and 3560 switches is
dynamic auto.
Dynamic Trunking Protocol
Negotiated Interface Modes
Cisco Catalyst 2960 and 3560 support the following trunk
modes:
• Switchport mode dynamic auto
• Switchport mode dynamic desirable
• Switchport mode trunk
• Switchport nonegotiate
Tài liệu Quản trị mạng cơ bản CCNA
156
12/2017
Troubleshooting VLANs and Trunks
IP Addressing Issues with VLAN
It is a common practice to associate a VLAN with an IP network.
Because different IP networks only communicate through a router, all
devices within a VLAN must be part of the same IP network to communicate.
The figure displays that PC1 cannot communicate to the server because it
has a wrong IP address configured.
Troubleshooting VLANs and Trunks
Missing VLANs
If all the IP addresses mismatches have been solved, but the device still
cannot connect, check if the VLAN exists in the switch.
Tài liệu Quản trị mạng cơ bản CCNA
157
12/2017
Troubleshooting VLANs and Trunks
Introduction to Troubleshooting Trunks
Troubleshooting VLANs and Trunks
Common Problems with Trunks
Trunking issues are usually associated with incorrect configurations.
The most common type of trunk configuration errors are:
1. Native VLAN mismatches
2. Trunk mode mismatches
3. Allowed VLANs on trunks
If a trunk problem is detected, the best practice guidelines recommend to
troubleshoot in the order shown above.
Tài liệu Quản trị mạng cơ bản CCNA
158
12/2017
Troubleshooting VLANs and Trunks
Trunk Mode Mismatches
If a port on a trunk link is configured with a trunk mode that is incompatible
with the neighboring trunk port, a trunk link fails to form between the two
switches.
Use the show interfaces trunk command to check the status of the trunk
ports on the switches.
To fix the problem, configure the interfaces with proper trunk modes.
Troubleshooting VLANs and Trunks
Incorrect VLAN List
VLANs must be allowed in the trunk before their frames can be transmitted
across the link.
Use the switchport trunk allowed vlan command to specify which VLANs are
allowed in a trunk link.
Use the show interfaces trunk command to ensure the correct VLANs are
permitted in a trunk.
Tài liệu Quản trị mạng cơ bản CCNA
159
12/2017
5 INTER-VLAN ROUTING
Inter-VLAN Routing Operation
What is Inter-VLAN routing?
Layer 2 switches cannot forward traffic between VLANs without the
assistance of a router.
Inter-VLAN routing is a process for forwarding network traffic from one
VLAN to another, using a router.
Tài liệu Quản trị mạng cơ bản CCNA
160
12/2017
Inter-VLAN Routing Operation
Legacy Inter-VLAN Routing
In the past:
Actual routers were used to route between VLANs.
Each VLAN was connected to a different physical router interface.
Packets would arrive on the router through one through interface, be
routed and leave through another.
Because the router interfaces were connected to VLANs and had IP
addresses from that specific VLAN, routing between VLANs was achieved.
Large networks with large number of VLANs required many router
interfaces.
Inter-VLAN Routing Operation
Router-on-a-Stick Inter-VLAN Routing
The router-on-a-stick approach uses a different path to route between
VLANs.
One of the router’s physical interfaces is configured as a 802.1Q trunk port
so it can understand VLAN tags.
Logical subinterfaces are created; one subinterface per VLAN.
Each subinterface is configured with an IP address from the VLAN it
represents.
VLAN members (hosts) are configured to use the subinterface address as a
default gateway.
Only one of the router’s physical interface is used.
Tài liệu Quản trị mạng cơ bản CCNA
161
12/2017
Inter-VLAN Routing Operation
Multilayer Switch Inter-VLAN Routing
Multilayer switches can perform Layer 2 and Layer 3 functions, replacing the
need for dedicated routers.
Multilayer switches support dynamic routing and inter-VLAN routing.
The multilayer switch must have IP routing enabled.
A switch virtual interface (SVI) exists for VLAN 1 by default. On a multilayer
switch, a logical (layer 3) interface can be configured for any VLAN.
The switch understands network-layer PDUs; therefore, can route between
its SVIs, just as a router routes between its interfaces.
With a multilayer switch, traffic is routed internal to the switch device.
This routing process is a suitable and scalable solution.
Configure Legacy Inter-VLAN Routing
Preparation
Legacy inter-VLAN routing requires routers to have multiple physical
interfaces.
Each one of the router’s physical interfaces is connected to a unique VLAN.
Each interface is also configured with an IP address for the subnet
associated with the particular VLAN.
Network devices use the router as a gateway to access the devices
connected to the other VLANs.
Tài liệu Quản trị mạng cơ bản CCNA
162
12/2017
Configure Legacy Inter-VLAN Routing
Preparation (cont.)
6 VLAN CONFIGURATION
Tài liệu Quản trị mạng cơ bản CCNA
163
12/2017
VLAN Assignment
Creating a VLAN
VLAN Assignment
Assigning Ports to VLANs
Tài liệu Quản trị mạng cơ bản CCNA
164
12/2017
VLAN Assignment
Assigning Ports to VLANs (cont.)
VLAN Assignment
Changing VLAN Port Membership
Tài liệu Quản trị mạng cơ bản CCNA
165
12/2017
VLAN Assignment
Changing VLAN Port Membership (cont.)
VLAN Assignment
Deleting VLANs
Tài liệu Quản trị mạng cơ bản CCNA
166
12/2017
VLAN Assignment
Verifying VLAN Information
VLAN Assignment
Verifying VLAN Information (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
167
12/2017
VLAN Assignment
Configuring IEEE 802.1q Trunk Links
VLAN Assignment
Resetting the Trunk To Default State
Tài liệu Quản trị mạng cơ bản CCNA
168
12/2017
VLAN Assignment
Resetting the Trunk To Default State (cont.)
VLAN Assignment
Verifying Trunk Configuration
Tài liệu Quản trị mạng cơ bản CCNA
169
12/2017
7 INTER-VLAN ROUTING CONFIGURATION
Configure Legacy Inter-VLAN Routing
Switch Configuration
Tài liệu Quản trị mạng cơ bản CCNA
170
12/2017
Configure Legacy Inter-VLAN Routing
Router Interface Configuration
Configure Router-on-a-Stick
Preparation
An alternative to legacy inter-VLAN routing is to use VLAN trunking and
subinterfaces.
VLAN trunking allows a single physical router interface to route traffic for
multiple VLANs.
The physical interface of the router must be connected to a trunk link on
the adjacent switch.
On the router, subinterfaces are created for each unique VLAN.
Each subinterface is assigned an IP address specific to its subnet or VLAN
and is also configured to tag frames for that VLAN.
Tài liệu Quản trị mạng cơ bản CCNA
171
12/2017
Configure Router-on-a-Stick
Switch Configuration
Configure Router-on-a-Stick
Router Subinterface Configuration
Tài liệu Quản trị mạng cơ bản CCNA
172
12/2017
Configure Router-on-a-Stick
Verifying Subinterfaces
Configure Router-on-a-Stick
Verifying Subinterfaces (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
173
12/2017
Configure Router-on-a-Stick
Verifying Routing
Access to devices on remote VLANs can be tested using
the ping command.
The ping command sends an ICMP echo request to the
destination address.
When a host receives an ICMP echo request, it responds with an
ICMP echo reply.
Tracert is a useful utility for confirming the routed path taken
between two devices.
Chapter 8 – Switching and
Spanning Tree Protocol
Tài liệu Quản trị mạng cơ bản CCNA
174
12/2017
Chapter 8 – Switching and Spanning Tree
Protocol
1 Spanning Tree Protocol (STP)
2 Cisco’s additions to STP (Portfast, BPDUGuard, BPDUFilter,
3 Per-VLAN Spanning Tree Plus (PVST+)
4 EtherChannel
1 SPANNING TREE PROTOCOL (STP)
Tài liệu Quản trị mạng cơ bản CCNA
175
12/2017
Purpose of Spanning Tree
Redundancy at OSI Layers 1 and 2
Multiple cabled paths between switches:
Provide physical redundancy in a switched network.
Improves the reliability and availability of the network.
Enables users to access network resources, despite path disruption.
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
MAC Database Instability
Ethernet frames do not have a time to live (TTL) attribute.
• Frames continue to propagate between switches
endlessly, or until a link is disrupted and breaks the loop.
• Results in MAC database instability.
• Can occur due to broadcast frames forwarding.
If there is more than one path for the frame to be forwarded
out, an endless loop can result.
• When a loop occurs, it is possible for the MAC address
table on a switch to constantly change with the updates
from the broadcast frames, resulting in MAC database
instability.
Tài liệu Quản trị mạng cơ bản CCNA
176
12/2017
Purpose of Spanning Tree
Issues with Layer 1 Redundancy: Broadcast
Storms
A broadcast storm occurs when there are so many broadcast frames
caught in a Layer 2 loop that all available bandwidth is consumed. It is also
known as denial of service
A broadcast storm is inevitable on a looped network.
• As more devices send broadcasts over the network, more traffic is
caught within the loop; thus consuming more resources.
• This eventually creates a broadcast storm that causes the network
to fail.
Purpose of Spanning Tree
Issues with Layer 1 Redundancy: Broadcast
Storms
Tài liệu Quản trị mạng cơ bản CCNA
177
12/2017
Purpose of Spanning Tree
Issues with Layer 1 Redundancy: Duplicate
Unicast Frames
Unicast frames sent onto a looped network can result in duplicate frames
arriving at the destination device.
Most upper layer protocols are not designed to recognize, or cope with,
duplicate transmissions.
Layer 2 LAN protocols, such as Ethernet, lack a mechanism to recognize
and eliminate endlessly looping frames.
Purpose of Spanning Tree
Issues with Layer 1 Redundancy: Duplicate
Unicast Frames
Tài liệu Quản trị mạng cơ bản CCNA
178
12/2017
STP Operation
Spanning Tree Algorithm: Introduction
STP ensures that there is only one logical path between all destinations on
the network by intentionally blocking redundant paths that could cause a
loop.
A port is considered blocked when user data is prevented from entering or
leaving that port. This does not include bridge protocol data unit (BPDU)
frames that are used by STP to prevent loops.
The physical paths still exist to provide redundancy, but these paths are
disabled to prevent the loops from occurring.
If the path is ever needed to compensate for a network cable or switch
failure, STP recalculates the paths and unblocks the necessary ports to
allow the redundant path to become active.
STP Operation
Spanning Tree Algorithm: Introduction
Tài liệu Quản trị mạng cơ bản CCNA
179
12/2017
STP Operation
Spanning Tree Algorithm: Introduction
STP Operation
Spanning Tree Algorithm: Introduction
Tài liệu Quản trị mạng cơ bản CCNA
180
12/2017
STP Operation
Spanning Tree Algorithm: Port Roles
STP Operation
Spanning Tree Algorithm: Root Bridge
Tài liệu Quản trị mạng cơ bản CCNA
181
12/2017
STP Operation
Spanning Tree Algorithm: Path Cost
STP Operation
802.1D BPDU Frame Format
Tài liệu Quản trị mạng cơ bản CCNA
182
12/2017
STP Operation
BPDU Propagation and Process
STP Operation
BPDU Propagation and Process
Tài liệu Quản trị mạng cơ bản CCNA
183
12/2017
STP Operation
Extended System ID
STP was enhanced to include support for VLANs, requiring the VLAN ID
to be included in the BPDU frame through the use of the extended system
ID
STP Operation
Extended System ID
In the example, the priority of all the switches is 32769. The value is based
on the 32768 default priority and the VLAN 1 assignment associated with
each switch (32768+1).
Tài liệu Quản trị mạng cơ bản CCNA
184
12/2017
STP Configuration Issues
Analyzing the STP Topology
STP Configuration Issues
Expected Topology versus Actual Topology
Tài liệu Quản trị mạng cơ bản CCNA
185
12/2017
STP Configuration Issues
Overview of Spanning Tree Status
STP Configuration Issues
Spanning-Tree Failure Consequences
▪ STP erroneously moves one
or more ports into the
forwarding state.
▪ Any frame that is flooded by
a switch enters the loop.
Tài liệu Quản trị mạng cơ bản CCNA
186
12/2017
STP Configuration Issues
Repairing a Spanning Tree Problem
One way to correct spanning-tree failure is to manually remove redundant
links in the switched network, either physically or through configuration,
until all loops are eliminated from the topology.
Before restoring the redundant links, determine and correct the cause of
the spanning-tree failure.
Carefully monitor the network to ensure that the problem is fixed.
Rapid PVST+
Overview of Rapid PVST+
Tài liệu Quản trị mạng cơ bản CCNA
187
12/2017
2 CISCO’S ADDITIONS TO STP (PORTFAST, BPDUGUARD, BPDUFILTER,
Rapid PVST+
RSTP BPDU
Tài liệu Quản trị mạng cơ bản CCNA
188
12/2017
Rapid PVST+
Edge Ports
Rapid PVST+
Link Types
The link type can determine whether the port can immediately transition
to forwarding state. Edge port connections and point-to-point connections
are candidates for rapid transition to forwarding state.
Tài liệu Quản trị mạng cơ bản CCNA
189
12/2017
PVST+ Configuration
Catalyst 2960 Default Configuration
2 CISCO’S ADDITIONS TO STP (PORTFAST, BPDUGUARD, BPDUFILTER,
UPLINKFAST, BACKBONEFAST)
Tài liệu Quản trị mạng cơ bản CCNA
190
12/2017
PVST+ Configuration
PortFast and BPDU Guard
▪ When a switch port is
configured with PortFast that
port transitions from
blocking to forwarding state
immediately.
▪ BPDU guard puts the port in
an error-disabled state on
receipt of a BPDU.
3 PER-VLAN SPANNING TREE PLUS (PVST+)
Tài liệu Quản trị mạng cơ bản CCNA
191
12/2017
Overview
List of Spanning Tree Protocols
STP or IEEE 802.1D-1998
PVST+
IEEE 802.1D-2004
Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w
Rapid PVST+
Multiple Spanning Tree Protocol (MSTP) or IEEE 802.1s
STP Overview
Characteristics of the Spanning Tree Protocols
Tài liệu Quản trị mạng cơ bản CCNA
192
12/2017
PVST+
Overview of PVST+
Networks running PVST+ have these characteristics:
A network can run an independent IEEE 802.1D STP instance for each VLAN
in the network.
Optimum load balancing can result.
One spanning-tree instance for each VLAN maintained can mean a
considerable waste of CPU cycles for all the switches in the network. In
addition to the bandwidth that is used for each instance to send its own
BPDU.
PVST+
Overview of PVST+
Tài liệu Quản trị mạng cơ bản CCNA
193
12/2017
PVST+
Port States and PVST+ Operation
STP introduces the five port states:
PVST+
Extended System ID and PVST+ Operation
In a PVST+ environment, the extended switch ID ensures each switch has a
unique BID for each VLAN.
For example, the VLAN 2 default BID would be 32770; priority 32768, plus
the extended system ID of 2.
Tài liệu Quản trị mạng cơ bản CCNA
194
12/2017
Rapid PVST+
Overview of Rapid PVST+
RSTP is the preferred protocol for preventing Layer 2 loops in a switched
network environment.
With Rapid PVST+, an independent instance of RSTP runs for each VLAN.
RSTP supports a new port type: an alternate port in discarding state.
There are no blocking ports. RSTP defines port states as discarding,
learning, or forwarding.
RSTP (802.1w) supersedes STP (802.1D) while retaining backward
compatibility
RSTP keeps the same BPDU format as IEEE 802.1D, except that the version
field is set to 2 to indicate RSTP, and the flags field uses all 8 bits.
PVST+ Configuration
PVST+ Load Balancing
Tài liệu Quản trị mạng cơ bản CCNA
195
12/2017
PVST+ Configuration
PVST+ Load Balancing
Another method to specify the root bridge is to set the spanning tree
priority on each switch to the lowest value so that the switch is selected as
the primary bridge for its associated VLAN.
PVST+ Configuration
PVST+ Load Balancing
Display and verify spanning tree configuration details.
Tài liệu Quản trị mạng cơ bản CCNA
196
12/2017
PVST+ Configuration
PVST+ Load Balancing
Rapid PVST+ Configuration
Spanning Tree Mode
Rapid PVST+ is the Cisco
implementation of RSTP. It
supports RSTP on a per-VLAN
basis.
Tài liệu Quản trị mạng cơ bản CCNA
197
12/2017
PVST+ Configuration
Configuring and Verifying the Bridge ID
PVST+ Configuration
Configuring and Verifying the Bridge ID
Tài liệu Quản trị mạng cơ bản CCNA
198
12/2017
8 ETHER CHANEL
Tài liệu Quản trị mạng cơ bản CCNA
199
12/2017
Chapter 9: Access Control Lists
Tài liệu Quản trị mạng cơ bản CCNA
200
12/2017
Chapter 9
1 Introduction to Access Lists
2 Standard Access Lists
3 Extended Access Lists
1 INTRODUCTION TO ACCESS LISTS
Tài liệu Quản trị mạng cơ bản CCNA
201
12/2017
Purpose of ACLs
What is an ACL?
Purpose of ACLs
A TCP Conversation
Tài liệu Quản trị mạng cơ bản CCNA
202
12/2017
Purpose of ACLs
Packet Filtering
Packet filtering, sometimes called static packet
filtering, controls access to a network by analyzing
the incoming and outgoing packets and passing or
dropping them based on given criteria, such as the
source IP address, destination IP addresses, and the
protocol carried within the packet.
A router acts as a packet filter when it forwards or
denies packets according to filtering rules.
An ACL is a sequential list of permit or deny
statements, known as access control entries (ACEs).
Purpose of ACLs
Packet Filtering (Cont.)
Tài liệu Quản trị mạng cơ bản CCNA
203
12/2017
Purpose of ACLs
ACL Operation
The last statement of an ACL is always an implicit deny.
This statement is automatically inserted at the end of
each ACL even though it is not physically present. The
implicit deny blocks all traffic. Because of this implicit
deny, an ACL that does not have at least one permit
statement will block all traffic.
Standard versus Extended IPv4 ACLs
Types of Cisco IPv4 ACLs
Standard ACLs
Extended ACLs
Tài liệu Quản trị mạng cơ bản CCNA
204
12/2017
Standard versus Extended IPv4 ACLs
Numbering and Naming ACLs
Wildcard Masks in ACLs
Introducing ACL Wildcard Masking
Wildcard masks and subnet masks differ in the way they
match binary 1s and 0s. Wildcard masks use the following
rules to match binary 1s and 0s:
Wildcard mask bit 0 - Match the corresponding bit value in the
address.
Wildcard mask bit 1 - Ignore the corresponding bit value in the
address.
Wildcard masks are often referred to as an inverse mask. The
reason is that, unlike a subnet mask in which binary 1 is equal
to a match and binary 0 is not a match, in a wildcard mask the
reverse is true.
Tài liệu Quản trị mạng cơ bản CCNA
205
12/2017
Wildcard Masks in ACLs
Wildcard Mask Examples: Hosts / Subnets
Wildcard Masks in ACLs
Wildcard Mask Examples: Match Ranges
Tài liệu Quản trị mạng cơ bản CCNA
206
12/2017
Wildcard Masks in ACLs
Calculating the Wildcard Mask
Calculating wildcard masks can be challenging. One
shortcut method is to subtract the subnet mask from
255.255.255.255.
Wildcard Masks in ACLs
Wildcard Mask Keywords
Tài liệu Quản trị mạng cơ bản CCNA
207
12/2017
Wildcard Masks in ACLs
Examples Wildcard Mask Keywords
Guidelines for ACL creation
General Guidelines for Creating ACLs
Use ACLs in firewall routers positioned between your
internal network and an external network such as the
Internet.
Use ACLs on a router positioned between two parts
of your network to control traffic entering or exiting a
specific part of your internal network.
Configure ACLs on border routers, that is routers
situated at the edges of your networks.
Configure ACLs for each network protocol configured
on the border router interfaces.
Tài liệu Quản trị mạng cơ bản CCNA
208
12/2017
Guidelines for ACL creation
General Guidelines for Creating ACLs (cont.)
The Three Ps
One ACL per protocol - To control traffic flow on an
interface, an ACL must be defined for each protocol
enabled on the interface.
One ACL per direction - ACLs control traffic in one
direction at a time on an interface. Two separate
ACLs must be created to control inbound and
outbound traffic.
One ACL per interface - ACLs control traffic for an
interface, for example, GigabitEthernet 0/0.
Guidelines for ACL creation
ACL Best Practices
Tài liệu Quản trị mạng cơ bản CCNA
209
12/2017
Guidelines for ACL Placement
Where to Place ACLs
Every ACL should be placed where it has the greatest
impact on efficiency. The basic rules are:
Extended ACLs - Locate extended ACLs as close as
possible to the source of the traffic to be filtered.
Standard ACLs - Because standard ACLs do not specify
destination addresses, place them as close to the
destination as possible.
Placement of the ACL and therefore the type of ACL used
may also depend on: the extent of the network
administrator’s control, bandwidth of the networks
involved, and ease of configuration.
Guidelines for ACL Placement
Standard ACL Placement
Tài liệu Quản trị mạng cơ bản CCNA
210
12/2017
Guidelines for ACL Placement
Extended ACL Placement
Configure Standard IPv4 ACLs
Entering Criteria Statements
Tài liệu Quản trị mạng cơ bản CCNA
211
12/2017
2 STANDARD ACCESS LISTS
Configure Standard IPv4 ACLs
Configuring a Standard ACL
Example ACL
access-list
access-list
access-list
access-list
2
2
2
2
deny host 192.168.10.10
permit 192.168.10.0 0.0.0.255
deny 192.168.0.0 0.0.255.255
permit 192.0.0.0 0.255.255.255
Tài liệu Quản trị mạng cơ bản CCNA
212
12/2017
Configure Standard IPv4 ACLs
Configuring a Standard ACL (cont.)
The full syntax of the standard ACL command is as
follows:
Router(config)# access-list accesslist-number deny permit remark source
[ source-wildcard ] [ log ]
To remove the ACL, the global configuration no
access-list command is used.
The remark keyword is used for documentation and
makes access lists a great deal easier to understand.
Configure Standard IPv4 ACLs
Internal Logic
Cisco IOS applies an internal logic when accepting
and processing standard access list statements. As
discussed previously, access list statements are
processed sequentially. Therefore, the order in which
statements are entered is important.
Tài liệu Quản trị mạng cơ bản CCNA
213
12/2017
Configure Standard IPv4 ACLs
Applying Standard ACLs to Interfaces
After a standard ACL is configured, it is linked to an
interface using the ip access-group command
in interface configuration mode:
Router(config-if)# ip access-group {
access-list-number
|
access-listname } { in | out }
To remove an ACL from an interface, first enter the
no ip access-group command on the
interface, and then enter the global no accesslist command to remove the entire ACL.
Configure Standard IPv4 ACLs
Applying Standard ACLs to Interfaces (Cont.)
Tài liệu Quản trị mạng cơ bản CCNA
214
12/2017
Configure Standard IPv4 ACLs
Creating Named Standard ACLs
Configure Standard IPv4 ACLs
Commenting ACLs
Tài liệu Quản trị mạng cơ bản CCNA
215
12/2017
Modify IPv4 ACLs
Editing Standard Numbered ACLs
Modify IPv4 ACLs
Editing Standard Numbered ACLs (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
216
12/2017
Modify IPv4 ACLs
Editing Standard Named ACLs
Modify IPv4 ACLs
Verifying ACLs
Tài liệu Quản trị mạng cơ bản CCNA
217
12/2017
Modify IPv4 ACLs
ACL Statistics
Modify IPv4 ACLs
Standard ACL Sequence Numbers
Another part of the IOS internal logic involves the internal
sequencing of standard ACL statements. Range
statements that deny three networks are configured first
followed by five host statements. The host statements are
all valid statements because their host IP addresses are
not part of the previously entered range statements.
The host statements are listed first by the show
command, but not necessarily in the order that they were
entered. The IOS puts host statements in an order using a
special hashing function. The resulting order optimizes
the search for a host ACL entry.
Tài liệu Quản trị mạng cơ bản CCNA
218
12/2017
Securing VTY ports with a Standard IPv4 ACL
Configuring a Standard ACL to Secure a VTY Port
Filtering Telnet or SSH traffic is typically considered
an extended IP ACL function because it filters a
higher level protocol. However, because the
access-class command is used to filter
incoming or outgoing Telnet/SSH sessions by source
address, a standard ACL can be used.
Router(config-line)#
access-class
access-list-number { in [ vrf-also ]
| out }
Securing VTY ports with a Standard IPv4 ACL
Verifying a Standard ACL used to Secure a VTY Port
Tài liệu Quản trị mạng cơ bản CCNA
219
12/2017
Structure of an Extended IPv4 ACL
Extended ACLs
3 EXTENDED ACCESS LISTS
Tài liệu Quản trị mạng cơ bản CCNA
220
12/2017
Structure of an Extended IPv4 ACL
Extended ACLs (Cont.)
Configure Extended IPv4 ACLs
Configuring Extended ACLs
The procedural steps for configuring extended ACLs
are the same as for standard ACLs. The extended ACL
is first configured, and then it is activated on an
interface. However, the command syntax and
parameters are more complex to support the
additional features provided by extended ACLs.
Tài liệu Quản trị mạng cơ bản CCNA
221
12/2017
Configure Extended IPv4 ACLs
Applying Extended ACLs to Interfaces
Configure Extended IPv4 ACLs
Filtering Traffic with Extended ACLs
Tài liệu Quản trị mạng cơ bản CCNA
222
12/2017
Configure Extended IPv4 ACLs
Creating Named Extended ACLs
Configure Extended IPv4 ACLs
Verifying Extended ACLs
Tài liệu Quản trị mạng cơ bản CCNA
223
12/2017
Configure Extended IPv4 ACLs
Editing Extended ACLs
Editing an extended ACL can be accomplished using
the same process as editing a standard. An extended
ACL can be modified using:
Method 1 - Text editor
Method 2 – Sequence numbers
Processing Packets with ACLs
Inbound ACL Logic
Packets are tested against an inbound ACL, if one
exists, before being routed.
If an inbound packet matches an ACL statement with
a permit, it is sent to be routed.
If an inbound packet matches an ACL statement with
a deny, it is dropped and not routed.
If an inbound packet does not meet any ACL
statements, then it is “implicitly denied” and dropped
without being routed.
Tài liệu Quản trị mạng cơ bản CCNA
224
12/2017
Processing Packets with ACLs
Outbound ACL Logic
Packets are first checked for a route before being sent
to an outbound interface. If there is no route, the
packets are dropped.
If an outbound interface has no ACL, then the packets
are sent directly to that interface.
If there is an ACL on the outbound interface, it is
tested before being sent to that interface.
If an outbound packet matches an ACL statement
with a permit, it is sent to the interface.
Processing Packets with ACLs
Outbound ACL Logic (cont.)
If an outbound packet matches an ACL statement
with a deny, it is dropped.
If an outbound packet does not meet any ACL
statements, then it is “implicitly denied” and
dropped.
Tài liệu Quản trị mạng cơ bản CCNA
225
12/2017
Processing Packets with ACLs
ACL Logic Operations
When a packet arrives at a router interface, the
router process is the same, whether ACLs are used or
not. As a frame enters an interface, the router checks
to see whether the destination Layer 2 address
matches its the interface Layer 2 address or if the
frame is a broadcast frame.
If the frame address is accepted, the frame
information is stripped off and the router checks for
an ACL on the inbound interface. If an ACL exists, the
packet is tested against the statements in the list.
Processing Packets with ACLs
ACL Logic Operations (cont.)
If the packet is accepted, it is then checked against
routing table entries to determine the destination
interface. If a routing table entry exists for the
destination, the packet is then switched to the outgoing
interface, otherwise the packet is dropped.
Next, the router checks whether the outgoing interface
has an ACL. If an ACL exists, the packet is tested against
the statements in the list.
If there is no ACL or the packet is permitted, the packet is
encapsulated in the new Layer 2 protocol and forwarded
out the interface to the next device.
Tài liệu Quản trị mạng cơ bản CCNA
226
12/2017
Processing Packets with ACLs
Standard ACL Decision Process
Standard ACLs only examine the source IPv4 address.
The destination of the packet and the ports involved
are not considered.
Cisco IOS software tests addresses against the
conditions in the ACL. The first match determines
whether the software accepts or rejects the address.
Because the software stops testing conditions after
the first match, the order of the conditions is critical.
If no conditions match, the address is rejected.
Processing Packets with ACLs
Extended ACL Decision Process
The ACL first filters on the source address, then on
the port and protocol of the source. It then filters on
the destination address, then on the port and
protocol of the destination, and makes a final permit
or deny decision.
Tài liệu Quản trị mạng cơ bản CCNA
227
12/2017
Common ACLs Errors
Troubleshooting Common ACL Errors - Example 1
Host 192.168.10.10
has no connectivity
with 192.168.30.12.
Common ACLs Errors
Troubleshooting Common ACL Errors – Example 2
The 192.168.10.0 /24
network cannot use
TFTP to connect to
the 192.168.30.0 /24
network.
Tài liệu Quản trị mạng cơ bản CCNA
228
12/2017
Common ACLs Errors
Troubleshooting Common ACL Errors – Example 3
The 192.168.11.0 /24 network can use Telnet to connect to 192.168.30.0
/24, but according to company policy, this connection should not be
allowed.
Common ACLs Errors
Troubleshooting Common ACL Errors – Example 4
Host 192.168.30.12 is able to Telnet to connect to 192.168.31.12, but
company policy states that this connection should not be allowed.
Tài liệu Quản trị mạng cơ bản CCNA
229
12/2017
Common ACLs Errors
Troubleshooting Common ACL Errors – Example 5
Host 192.168.30.12 can use Telnet to connect to 192.168.31.12, but
according to the security policy, this connection should not be allowed.
Chapter 10 – Network Address
Translation (NAT)
Tài liệu Quản trị mạng cơ bản CCNA
230
12/2017
Chapter 1
1 Introduction to NAT
2 Static NAT Configuration & Verification
3 Dynamic NAT Configuration
4 NAT Overloading aka Port Address Translation (PAT)
1 INTRODUCTION TO NAT
Tài liệu Quản trị mạng cơ bản CCNA
231
12/2017
NAT Characteristics
IPv4 Private Address Space
IPv4 address space is not big enough to uniquely address all the devices that
must be connected to the Internet.
Network private addresses are described in RFC 1918 and are to designed to
be used within an organization or site only.
Private addresses are not routed by Internet routers while public addresses
are.
Private addresses can alleviate IPv4 scarcity, but because they aren’t routed
by Internet devices, they first need to be translated.
NAT is process used to perform such translation.
NAT Characteristics
IPv4 Private Address Space
Tài liệu Quản trị mạng cơ bản CCNA
232
12/2017
NAT Characteristics
What is NAT?
NAT is a process used to translate network addresses.
NAT’s primary use is to conserve public IPv4 addresses.
NAT is usually implemented at border network devices, such as firewalls or
routers.
NAT allows the networks to use private addresses internally, only translating
to public addresses when needed.
Devices within the organization can be assigned private addresses and
operate with locally unique addresses.
When traffic must be sent or received to or from other organizations or the
Internet, the border router translates the addresses to a public and globally
unique address.
NAT Characteristics
What is NAT? (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
233
12/2017
NAT Characteristics
NAT Terminology
Inside network is the set of
devices using private addresses
Outside network refers to all
other networks
NAT includes four types of
addresses:
• Inside local address
• Inside global
address
• Outside local
address
• Outside global
address
NAT Characteristics
NAT Terminology (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
234
12/2017
Types of NAT
Static NAT
Static NAT uses a one-to-one mapping of local and global
addresses.
These mappings are configured by the network administrator
and remain constant.
Static NAT is particularly useful when servers hosted in the inside
network must be accessible from the outside network.
A network administrator can SSH to a server in the inside
network by pointing the SSH client to the proper inside global
address.
Types of NAT
Static NAT (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
235
12/2017
Types of NAT
Dynamic NAT
Dynamic NAT uses a pool of public addresses and assigns them
on a first-come, first-served basis.
When an inside device requests access to an outside network,
dynamic NAT assigns an available public IPv4 address from the
pool.
Dynamic NAT requires that enough public addresses are
available to satisfy the total number of simultaneous user
sessions.
Types of NAT
Dynamic NAT (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
236
12/2017
Types of NAT
Port Address Translation
Port Address Translation (PAT) maps multiple private IPv4 addresses to a
single public IPv4 address or a few addresses.
PAT uses the pair source port and source IP address to keep track of what
traffic belongs to what internal client.
PAT is also known as NAT overload.
By also using the port number, PAT forwards the response packets to the
correct internal device.
The PAT process also validates that the incoming packets were requested,
thus adding a degree of security to the session.
Types of NAT
Comparing NAT and PAT
NAT translates IPv4 addresses on a 1:1 basis between private IPv4 addresses
and public IPv4 addresses.
PAT modifies both the address and the port number.
NAT forwards incoming packets to their inside destination by referring to the
incoming source IPv4 address provided by the host on the public network.
With PAT, there is generally only one or a very few publicly exposed IPv4
addresses.
PAT is able to translate protocols that do not use port numbers, such as ICMP;
each one of these protocols is supported differently by PAT.
Tài liệu Quản trị mạng cơ bản CCNA
237
12/2017
Benefits of NAT
Benefits of NAT
Conserves the legally registered addressing scheme
Increases the flexibility of connections to the public network
Provides consistency for internal network addressing schemes
Provides network security
Benefits of NAT
Disadvantages of NAT
Performance is degraded
End-to-end functionality is degraded
End-to-end IP traceability is lost
Tunneling is more complicated
Initiating TCP connections can be disrupted
Tài liệu Quản trị mạng cơ bản CCNA
238
12/2017
2 STATIC NAT CONFIGURATION & VERIFICATION
Configuring Static NAT
Configuring Static NAT
There are two basic tasks to perform when
configuring static NAT translations:
Create the mapping between the inside local and
outside local addresses.
Define which interfaces belong to the inside network
and which belong to the outside network.
Tài liệu Quản trị mạng cơ bản CCNA
239
12/2017
Configuring Static NAT
Configuring Static NAT
Configuring Static NAT
Analyzing Static NAT
Tài liệu Quản trị mạng cơ bản CCNA
240
12/2017
Configuring Static NAT
Verifying Static NAT
Configuring Static NAT
Verifying Static NAT (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
241
12/2017
3 DYNAMIC NAT CONFIGURATION
Configuring Dynamic NAT
Dynamic NAT Operation
The pool of public IPv4 addresses (inside global address pool) is
available to any device on the inside network on a first-come, firstserved basis.
With dynamic NAT, a single inside address is translated to a single
outside address.
The pool must be large enough to accommodate all inside devices.
A device is unable to communicate to any external networks if no
addresses are available in the pool.
Tài liệu Quản trị mạng cơ bản CCNA
242
12/2017
Configuring Dynamic NAT
Configuring Dynamic NAT
Configuring Dynamic NAT
Analyzing Dynamic NAT
Tài liệu Quản trị mạng cơ bản CCNA
243
12/2017
Configuring Dynamic NAT
Analyzing Dynamic NAT
Configuring Dynamic NAT
Verifying Dynamic NAT
Tài liệu Quản trị mạng cơ bản CCNA
244
12/2017
Configuring Dynamic NAT
Verifying Dynamic NAT
4 NAT OVERLOADING AKA PORT ADDRESS TRANSLATION (PAT)
Tài liệu Quản trị mạng cơ bản CCNA
245
12/2017
Configuring PAT
Configuring PAT: Address Pool
Configuring PAT
Configuring PAT: Single Address
Tài liệu Quản trị mạng cơ bản CCNA
246
12/2017
Configuring PAT
Analyzing PAT
Configuring PAT
Analyzing PAT
Tài liệu Quản trị mạng cơ bản CCNA
247
12/2017
Configuring PAT
Verifying PAT Translations
Port Forwarding
Port Forwarding
Port forwarding is the act of forwarding a network port from one network
node to another.
A packet sent to the public IP address and port of a router can be
forwarded to a private IP address and port in inside network.
Port forwarding is helpful in situations where servers have private
addresses, not reachable from the outside networks.
Tài liệu Quản trị mạng cơ bản CCNA
248
12/2017
Port Forwarding
Configuring Port Forwarding with IOS
In IOS, Port forwarding is essentially a static NAT translation with a
specified TCP or UDP port number.
Configuring NAT and IPv6
NAT for IPv6?
NAT is a workaround for IPv4 address scarcity.
IPv6 with a 128-bit address provides 340 undecillion addresses.
Address space is not an issue for IPv6.
IPv6 makes IPv4 public-private NAT unnecessary by design; however,
IPv6 does implement a form of private addresses, and it is
implemented differently than they are for IPv4.
Tài liệu Quản trị mạng cơ bản CCNA
249
12/2017
Chapter 11 – Wide Area Networks
Chapter 2
1 Introduction to Wide-Area Networks
2 PPP Concepts
3 PPP Configuration
Tài liệu Quản trị mạng cơ bản CCNA
250
12/2017
1 Introduction to Wide-Area Networks
Purpose of WANs
Why Choose a WAN?
Operates beyond the
geographic scope of a LAN
Used to interconnect the
enterprise LAN to remote
LANs in branch sites and
telecommuter sites
Owned by a service
provider
Organization must pay a
fee to use the provider’s
services to connect sites
Tài liệu Quản trị mạng cơ bản CCNA
251
12/2017
WAN Operations
WANs in the OSI Model
WAN access standards
typically describe both
physical layer delivery
methods and data link layer
requirements, including
physical addressing, flow
control, and encapsulation.
WAN Operations
WAN Devices
Tài liệu Quản trị mạng cơ bản CCNA
252
12/2017
WAN Operations
Circuit Switching
The two most common types of circuit-switched WAN technologies are
the public switched telephone network (PSTN) and the Integrated
Services Digital Network (ISDN).
WAN Operations
Packet Switching
Splits traffic data into packets that are routed over a shared network. Packetswitching allow many pairs of nodes to communicate over the same channel.
Tài liệu Quản trị mạng cơ bản CCNA
253
12/2017
WAN Services
WAN Link Connection Options
WAN Services
Service-Provided Network Infrastructure
Tài liệu Quản trị mạng cơ bản CCNA
254
12/2017
Private WAN Infrastructures
Leased Lines
Advantages:
Disadvantages:
▪ Simplicity
▪ Cost
▪ Quality
▪ Limited flexibility
▪ Availability
Private WAN Infrastructures
Dialup
Advantages:
Disadvantages:
▪ Simplicity
▪ Low data rates
▪ Availability
▪ Relatively long
connection time
▪ Low implementation cost
Tài liệu Quản trị mạng cơ bản CCNA
255
12/2017
Private WAN Infrastructures
ISDN
Sample ISDN Topology
ISDN BRI
ISDN PRI
Private WAN Infrastructures
Frame Relay
▪ PVCs carry both voice and
data traffic.
▪ PVCs are uniquely
identified by a data-link
connection identifier
(DLCI).
▪ PVCs and DLCIs ensure
bidirectional
communication from one
DTE device to another.
▪ R1 uses DLCI 102 to reach
R2 while R2 uses DLCI
201 to reach R1.
Tài liệu Quản trị mạng cơ bản CCNA
256
12/2017
Private WAN Infrastructures
ATM
Built on a cell-based architecture, rather than on a frame-based architecture.
ATM cells are always a fixed length of 53 bytes.
Private WAN Infrastructures
Ethernet WAN
Features and Benefits of Ethernet
WAN include:
▪ Reduced expenses and
administration
▪ Easy integration with existing
networks
▪ Enhanced business productivity
▪ Service providers now offer
Ethernet WAN service using
fiber-optic cabling.
▪ Known as Metropolitan
Ethernet (MetroE), Ethernet
over MPLS (EoMPLS), and
Virtual Private LAN Service
(VPLS).
Tài liệu Quản trị mạng cơ bản CCNA
Note: Commonly used to replace the
traditional Frame Relay and ATM WAN
links.
257
12/2017
Private WAN Infrastructures
MPLS
Multiprotocol Label Switching (MPLS) is a multiprotocol highperformance WAN technology that directs data from one router to the
next, based on short path labels rather than IP network addresses.
Private WAN Infrastructures
VSAT
Very small aperture
terminal (VSAT) - a
solution that creates a
private WAN using
satellite communications.
Tài liệu Quản trị mạng cơ bản CCNA
258
12/2017
Private WAN Infrastructures
DSL
▪ Always-on connection
technology that uses
existing twisted-pair
telephone lines to
transport highbandwidth data, and
provides IP services to
subscribers.
▪ A DSL modem converts
an Ethernet signal from
the user device to a DSL
signal, which is
transmitted to the
central office.
Private WAN Infrastructures
Cable
▪ Network access is
available from some
cable television
networks.
▪ Cable modems
provide an always-on
connection and a
simple installation.
Tài liệu Quản trị mạng cơ bản CCNA
259
12/2017
Private WAN Infrastructures
Wireless
New developments in
broadband wireless
technology:
▪ Municipal Wi-Fi – Many
cities have begun setting up
municipal wireless
▪ WiMAX – Worldwide
Interoperability for
Microwave Access
(WiMAX) is a new
technology that is just
beginning to come into use.
▪ Satellite Internet
Private WAN Infrastructures
3G/4G Cellular
Common cellular industry terms include:
▪ 3G/4G Wireless – Abbreviation for 3rd generation and 4th generation
cellular access. These technologies support wireless Internet access.
▪ Long-Term Evolution (LTE) – A newer and faster technology,
considered to be part of the 4th generation (4G) technology.
Tài liệu Quản trị mạng cơ bản CCNA
260
12/2017
Private WAN Infrastructures
VPN Technology
VPN is an encrypted connection
between private networks over a
public network.
Benefits:
▪ Cost savings
▪ Security
▪ Scalability
▪ Compatibility with broadband
technology
Two types of VPN:
▪ Site-to-site VPNs
▪ Remote-access VPNs
Selecting WAN Services
Choosing a WAN Link Connection
Answer the following questions when choosing a WAN Connection:
▪ What is the purpose of the WAN?
▪ What is the geographic scope?
▪ What are the traffic requirements?
Tài liệu Quản trị mạng cơ bản CCNA
261
12/2017
Selecting WAN Services
Choosing a WAN Link Connection
2 PPP CONCEPTS
Connecting Networks
Tài liệu Quản trị mạng cơ bản CCNA
262
12/2017
Serial Communications
Point-to-Point Communication Links
Point-to-point links can connect two geographically distant sites.
Carrier dedicates specific resources for a line leased by the customer (leasedline).
Point-to-point links are usually more expensive than shared services.
Serial Communications
DTE-DCE
▪ DTE – Commonly CPE, generally a router, could also be a terminal, computer,
printer, or fax machine if they connect directly to the service provider
network.
▪ DCE – Commonly a modem or CSU/DSU, it is a device used to convert the
user data from the DTE into a form acceptable to the WAN service provider
transmission link. The signal is received at the remote DCE, which decodes
the signal back into a sequence of bits; the remote DCE then signals this
sequence to the remote DTE.
Tài liệu Quản trị mạng cơ bản CCNA
263
12/2017
Serial Communications
Serial Cables
Serial Communications
Serial Bandwidth
Bandwidth refers to the rate at which data is transferred over the
communication link.
Tài liệu Quản trị mạng cơ bản CCNA
264
12/2017
HDLC Encapsulation
WAN Encapsulation Protocols
Data is encapsulated into frames before crossing the WAN link; an appropriate
Layer 2 encapsulation type must be configured.
HDLC Encapsulation
HDLC Encapsulation
▪ Bit-oriented, synchronous data link layer protocol developed by the
International Organization for Standardization (ISO).
▪ Uses synchronous serial transmission to provide error-free communication
between two points.
▪ Defines a Layer 2 framing structure that allows for flow control and error
control through the use of acknowledgments.
▪ Cisco has developed an extension to the HLDC protocol to solve the inability
to provide multiprotocol support (Cisco HLDC also referred to as cHDLC).
Tài liệu Quản trị mạng cơ bản CCNA
265
12/2017
HDLC Encapsulation
HDLC Frame Types
• The Flag field initiates and
terminates error checking, and
the frame always starts and ends
with an 8-bit flag field,
01111110.
• I-frames carry upper layer information and
some control information; sends and
receives sequence numbers, and the poll
final (P/F) bit performs flow and error
control.
• S-frames provide control information –
Request and suspend transmission, report on
status, and acknowledge receipt of I-frame.
• U-frames support control purposes
and are not sequenced.
HDLC Encapsulation
Configuring HDLC Encapsulation
▪ Default encapsulation method used by Cisco devices on synchronous serial
lines
▪ Point-to-point protocol on leased lines between two Cisco devices
▪ Connecting to a non-Cisco device, use synchronous PPP
Tài liệu Quản trị mạng cơ bản CCNA
266
12/2017
HDLC Encapsulation
Troubleshooting a Serial Interface
HDLC Encapsulation
Troubleshooting a Serial Interface (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
267
12/2017
HDLC Encapsulation
Troubleshooting a Serial Interface (cont.)
HDLC Encapsulation
Troubleshooting a Serial Interface (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
268
12/2017
HDLC Encapsulation
Troubleshooting a Serial Interface (cont.)
HDLC Encapsulation
Troubleshooting a Serial Interface (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
269
12/2017
PPP OPERATION
Benefits of PPP
Introducing PPP
PPP contains three main
components:
▪ HDLC protocol for
encapsulating datagrams over
point-to-point links
▪ Extensible Link Control
Protocol (LCP) to establish,
configure, and test the data
link connection
▪ Family of Network Control
Protocols (NCPs) to establish
and configure different
network layer protocols (IPv4,
IPv6, AppleTalk, Novell IPX, and
SNA Control Protocol)
Tài liệu Quản trị mạng cơ bản CCNA
270
12/2017
Benefits of PPP
Advantages of PPP
▪ PPP not proprietary
▪ PPP includes many features not available in HDLC
▪ Link quality management feature monitors the quality of the link. If too
many errors are detected, PPP takes down the link
▪ Supports PAP and CHAP authentication
LCP and NCP
PPP Layered Architecture
▪ LCP sets up the
PPP connection
and its
parameters
▪ NCPs handle
higher layer
protocol
configurations
▪ LCP terminates
the PPP
connection
Tài liệu Quản trị mạng cơ bản CCNA
271
12/2017
LCP and NCP
PPP Control Protocol (LCP)
LCP provides automatic
configuration of the
interfaces at each end,
including:
▪ Handling varying
limits on packet size.
▪ Detecting common
misconfiguration
errors.
▪ Terminating the link.
▪ Determining when a
link is functioning
properly or when it is
failing.
LCP and NCP
PPP Network Control Protocol (NCP)
▪ PPP permits
multiple network
layer protocols to
operate on the
same
communications
link.
▪ For every network
layer protocol
used, PPP uses a
separate NCP.
Tài liệu Quản trị mạng cơ bản CCNA
272
12/2017
LCP and NCP
PPP Frame Structure
PPP Sessions
Establishing a PPP Session
Phase 1 – LCP must first open the connection and negotiate
configuration options; it completes when the receiving router sends a
configuration-acknowledgment frame back to the router initiating the
connection.
Tài liệu Quản trị mạng cơ bản CCNA
273
12/2017
PPP Sessions
Establishing a PPP Session (cont.)
Phase 2 – LCP tests the link to determine whether the link
quality is sufficient to bring up network layer protocols.
PPP Sessions
Establishing a PPP Session (cont.)
Phase 3 – After the LCP has finished the link quality determination
phase, the appropriate NCP can separately configure the network
layer protocols, and bring them up and take them down at any time.
Tài liệu Quản trị mạng cơ bản CCNA
274
12/2017
PPP Sessions
LCP Operation
▪ LCP operation includes provisions for link establishment, link maintenance,
and link termination.
▪ LCP operation uses three classes of LCP frames to accomplish the work of
each of the LCP phases:
▪ Link-establishment frames establish and configure a link.
▪ Configure-Request, Configure-Ack, Configure-Nak, and ConfigureReject
▪ Link-maintenance frames manage and debug a link.
▪ Code-Reject, Protocol-Reject, Echo-Request, Echo-Reply, and
Discard-Request
▪ Link-termination frames terminate a link.
▪ Terminate-Request and Terminate-Ack
PPP Sessions
LCP Operation (cont.)
During link maintenance, LCP can use messages to provide feedback and test
the link.
▪ Echo-Request, Echo-Reply, and Discard-Request can be used to test the
link.
▪ Code-Reject and Protocol-Reject provides feedback when one device
receives an invalid frame due to either an unrecognized LCP code (LCP
frame type) or a bad protocol identifier.
Tài liệu Quản trị mạng cơ bản CCNA
275
12/2017
PPP Sessions
LCP Operation (cont.)
PPP Sessions
LCP Packet
Tài liệu Quản trị mạng cơ bản CCNA
276
12/2017
PPP Sessions
LCP Packet
PPP Sessions
LCP Packet (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
277
12/2017
PPP Sessions
PPP Configuration Options
Optional functions
include:
▪ Authentication
using either PAP
or CHAP
▪ Compression
using either
Stacker or
Predictor
▪ Multilink that
combines two or
more channels to
increase the
WAN bandwidth
PPP Sessions
NCP Explained
Tài liệu Quản trị mạng cơ bản CCNA
278
12/2017
3.3 CONFIGURING PPP
Configure PPP
PPP Configuration Options
▪ Authentication – Two authentication
Authentication Protocol (PAP) and
Authentication Protocol (CHAP).
choices are Password
Challenge Handshake
▪ Compression – Increases the effective throughput on PPP connections
by reducing the amount of data in the frame that must travel across
the link. The protocol decompresses the frame at its destination. Two
compression protocols available in Cisco routers are Stacker and
Predictor.
▪ Error detection – Identifies fault conditions. The Quality and Magic
Number options help ensure a reliable, loop-free data link. The Magic
Number field helps in detecting links that are in a looped-back
condition. Magic numbers are generated randomly at each end of the
connection.
Tài liệu Quản trị mạng cơ bản CCNA
279
12/2017
Configure PPP
PPP Configuration Options
▪ PPP Callback – PPP callback is used to enhance security. With this LCP
option, a Cisco router can act as a callback client or a callback server.
The client makes the initial call, requests that the server call it back,
and terminates its initial call. The callback router answers the initial
call and makes the return call to the client based on its configuration
statements. The command is ppp callback [accept |
request].
▪ Multilink – This alternative provides load balancing over the router
interfaces that PPP uses. Multilink PPP provides a method for
spreading traffic across multiple physical WAN links while providing
packet fragmentation and reassembly, proper sequencing,
multivendor interoperability, and load balancing on inbound and
outbound traffic.
Configure PPP
PPP Basic Configuration Command
Tài liệu Quản trị mạng cơ bản CCNA
280
12/2017
Configure PPP
PPP Compression Commands
Configure PPP
PPP Link Quality Monitoring Command
The ppp quality percentage command ensures that the
link meets the quality requirement set; otherwise, the link closes
down.
Tài liệu Quản trị mạng cơ bản CCNA
281
12/2017
Configure PPP
PPP Multilink Commands
Configure PPP
Verifying PPP Configuration
Tài liệu Quản trị mạng cơ bản CCNA
282
12/2017
Configure PPP
Verifying PPP Configuration (cont.)
The output indicates the interface Multilink 1, the hostnames of both the local
and remote endpoints, and the serial interfaces assigned to the multilink
bundle.
PPP Authentication
PPP Authentication Protocols
Tài liệu Quản trị mạng cơ bản CCNA
283
12/2017
PPP Authentication
Password Authentication Protocol (PAP)
Initiating PAP
Completing PAP
PPP Authentication
Challenge Handshake Authentication Protocol
Initiating CHAP
Responding CHAP
Tài liệu Quản trị mạng cơ bản CCNA
284
12/2017
PPP Authentication
CHAP (cont.)
Completing CHAP
PPP Authentication
PPP Encapsulation and Authentication Process
Tài liệu Quản trị mạng cơ bản CCNA
285
12/2017
PPP Authentication
Configuring PPP Authentication
PPP Authentication
Configuring PPP Authentication (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
286
12/2017
PPP Authentication
Configuring PPP Authentication (cont.)
Chapter 12 – Virtual Private Networks
Tài liệu Quản trị mạng cơ bản CCNA
287
12/2017
Chapter 7: Securing Site-to-Site Connectivity
1 VPN Concepts
2 Types of VPN
3 Encryption
4 IPsec VPNs
5 SSL VPNs & Tunneling Protocols
6 GRE Tunnels
1 VPN CONCEPTS
Tài liệu Quản trị mạng cơ bản CCNA
288
12/2017
Fundamentals of VPNs
Introducing VPNs
VPNs are used to create an end-to-end private network connection over thirdparty networks, such as the Internet or extranets.
To implement VPNs, a VPN gateway is necessary: Could be a router, a firewall,
or a Cisco Adaptive Security Appliance (ASA).
Fundamentals of VPNs
Benefits of VPNs
Cost savings
• Enable organizations to use cost-effective, thirdparty Internet transport to connect remote offices
and remote users to the main site.
Scalability
• Enable organizations to use the Internet
infrastructure within ISPs and devices, which
makes it easy to add new users.
Tài liệu Quản trị mạng cơ bản CCNA
289
12/2017
Fundamentals of VPNs
Benefits of VPNs (cont.)
Compatibility with broadband technology
• Allow mobile workers and telecommuters to take
advantage of high-speed, broadband connectivity, such as
DSL and cable, to gain access to the networks of their
organization, providing workers flexibility and efficiency.
• Provide a cost-effective solution for connecting remote
offices.
Security
• Can include security mechanisms that provide the highest
level of security by using advanced encryption and
authentication protocols that protect data from
unauthorized access.
2 TYPES OF VPN
Tài liệu Quản trị mạng cơ bản CCNA
290
12/2017
Types of VPNs
Site-to-Site VPNs
Connect entire networks to each other, in the past, a leased line
or Frame Relay connection was required to connect sites, but
because most corporations now have Internet access, these
connections can be replaced with site-to-site VPNs.
Internal hosts have no knowledge that a VPN exists.
Created when devices on both sides of the VPN connection are
aware of the VPN configuration in advance.
Types of VPNs
Site-to-Site VPNs (cont.)
End hosts send and receive normal TCP/IP traffic through a VPN
gateway.
The VPN gateway is responsible for encapsulating and
encrypting outbound traffic for all traffic from a particular site
The VPN gateway then sends it through a VPN tunnel over the
Internet to a peer VPN gateway at the target site.
Upon receipt, the peer VPN gateway strips the headers, decrypts
the content, and relays the packet toward the target host inside
its private network.
Tài liệu Quản trị mạng cơ bản CCNA
291
12/2017
Types of VPNs
Site-to-Site VPNs (cont.)
Types of VPNs
Remote Access VPNs
Support the needs of telecommuters, mobile users, and extranet,
consumer-to-business traffic.
Support a client/server architecture, where the VPN client
(remote host) gains secure access to the enterprise network via a
VPN server device at the network edge.
Used to connect individual hosts that must access their company
network securely over the Internet.
VPN client software may need to be installed on the mobile user’s
end device (Cisco AnyConnect Secure Mobility Client).
When the host tries to send any traffic, the VPN Client software
encapsulates and encrypts this traffic and sends over the Internet
to the VPN gateway at the edge of the target network.
Tài liệu Quản trị mạng cơ bản CCNA
292
12/2017
Types of VPNs
Remote Access VPNs (cont.)
3 Encryption
Tài liệu Quản trị mạng cơ bản CCNA
293
12/2017
Encryption Algorithms
▪ As key length increases, it becomes more difficult to break
the encryption. However, a longer key requires more
processor resources when encrypting and decrypting data.
▪ Two main types of encryption are:
▪ Symmetric Encryption
▪ Asymmetric Encryption
Symmetric Encryption
▪ Encryption and decryption use the same key.
▪ Each of the two networking devices must know the key to decode the
information.
▪ Each device encrypts the information before sending it over the network to
the other device.
▪ Typically used to encrypt the content of the message.
▪ Examples: DES and 3DES (no longer considered secure) and AES (256-bit
recommended for IPsec encryption).
Tài liệu Quản trị mạng cơ bản CCNA
294
12/2017
Asymmetric Encryption
▪ Uses different keys for encryption and decryption.
▪ Knowing one of the keys does not allow a hacker to deduce the second key
and decode the information.
▪ One key encrypts the message, while a second key decrypts the message.
▪ Public key encryption is a variant of asymmetric encryption that uses a
combination of a private key and a public key.
▪ Typically used in digital certification and key management
▪ Example: RSA
Diffie-Hellman Key Exchange
▪ Diffie-Hellman (DH) is not an encryption mechanism and is not typically
used to encrypt data.
▪ DH is a method to securely exchange the keys that encrypt data.
▪ DH algorithms allow two parties to establish a shared secret key used by
encryption and hash algorithms.
▪ DH is part of the IPsec standard.
▪ Encryption algorithms, such as DES, 3DES, and AES, as well as the MD5
and SHA-1 hashing algorithms, require a symmetric, shared secret key to
perform encryption and decryption.
▪ DH algorithm specifies a public key exchange method that provides a way
for two peers to establish a shared secret key that only they know,
although they are communicating over an insecure channel.
Tài liệu Quản trị mạng cơ bản CCNA
295
12/2017
Diffie-Hellman Key Exchange
Integrity with Hash Algorithms
▪ The original sender generates a hash of the message and
sends it with the message itself.
▪ The recipient parses the message and the hash, produces
another hash from the received message, and compares the
two hashes.
▪ If they are the same, the recipient can be reasonably sure of
the integrity of the original message.
Tài liệu Quản trị mạng cơ bản CCNA
296
12/2017
Integrity with Hash Algorithms (cont.)
Integrity with Hash Algorithms (cont.)
Hash-based Message Authentication Code (HMAC) is a mechanism for message
authentication using hash functions.
▪ HMAC has two parameters: A message input and a secret key known only to
the message originator and intended receivers.
▪ Message sender uses an HMAC function to produce a value (the message
authentication code) formed by condensing the secret key and the message
input.
▪ Message authentication code is sent along with the message.
▪ Receiver computes the message authentication code on the received
message using the same key and HMAC function as the sender used.
▪ Receiver compares the result that is computed with the received message
authentication code.
▪ If the two values match, the message has been correctly received and the
receiver is assured that the sender is a user community member who share
the key.
Tài liệu Quản trị mạng cơ bản CCNA
297
12/2017
Integrity with Hash Algorithms (cont.)
There are two common HMAC algorithms:
▪ MD5 – Uses a 128-bit shared secret key. The variable-length message and
128-bit shared secret key are combined and run through the HMAC-MD5
hash algorithm. The output is a 128-bit hash. The hash is appended to the
original message and forwarded to the remote end.
▪ SHA – SHA-1 uses a 160-bit secret key. The variable-length message and
the 160-bit shared secret key are combined and run through the HMACSHA1 hash algorithm. The output is a 160-bit hash. The hash is appended
to the original message and forwarded to the remote end.
4 IPSEC VPNS
Tài liệu Quản trị mạng cơ bản CCNA
298
12/2017
Internet Protocol Security
IPsec VPNs
▪ Information from a
private network is
securely
transported over a
public network.
▪ Forms a virtual
network instead of
using a dedicated
Layer 2 connection.
▪ To remain private,
the
traffic
is
encrypted to keep
the
data
confidential.
Internet Protocol Security
IPsec Functions
▪ Defines how a VPN can be configured in a secure manner using IP.
▪ Framework of open standards that spells out the rules for secure
communications.
▪ Not bound to any specific encryption, authentication, security algorithms, or
keying technology.
▪ Relies on existing algorithms to implement secure communications.
▪ Works at the network layer, protecting and authenticating IP packets between
participating IPsec devices.
▪ Secures a path between a pair of gateways, a pair of hosts, or a gateway and
host.
▪ All implementations of IPsec have a plaintext Layer 3 header, so there are no
issues with routing.
▪ Functions over all Layer 2 protocols, such as Ethernet, ATM, or Frame Relay.
Tài liệu Quản trị mạng cơ bản CCNA
299
12/2017
Internet Protocol Security
IPsec Characteristics
IPsec characteristics can be summarized as follows:
▪ IPsec is a framework of open standards that is algorithmindependent.
▪ IPsec provides data confidentiality, data integrity, and origin
authentication.
▪ IPsec acts at the network layer, protecting and authenticating IP
packets.
Internet Protocol Security
IPsec Security Services
▪ Confidentiality (encryption) – encrypt the data before
transmitting across the network
▪ Data integrity – verify that data has not been changed while in
transit, if tampering is detected, the packet is dropped
▪ Authentication – verify the identity of the source of the data
that is sent, ensures that the connection is made with the
desired communication partner, IPsec uses Internet Key
Exchange (IKE) to authenticate users and devices that can carry
out communication independently.
▪ Anti-Replay Protection – detect and reject replayed packets
and helps prevent spoofing
CIA: confidentiality, integrity, and authentication
Tài liệu Quản trị mạng cơ bản CCNA
300
12/2017
IPsec Framework
Confidentiality with Encryption
▪ For encryption to work, both the sender and the receiver must know the rules
used to transform the original message into its coded form.
▪ Rules are based on algorithms and associated keys.
▪ Decryption is extremely difficult (or impossible) without the correct key.
IPsec Framework
Encryption Algorithms
▪ As key length increases, it becomes more difficult to break
the encryption. However, a longer key requires more
processor resources when encrypting and decrypting data.
▪ Two main types of encryption are:
▪ Symmetric Encryption
▪ Asymmetric Encryption
Tài liệu Quản trị mạng cơ bản CCNA
301
12/2017
IPsec Framework
Symmetric Encryption
▪ Encryption and decryption use the same key.
▪ Each of the two networking devices must know the key to decode the
information.
▪ Each device encrypts the information before sending it over the network to
the other device.
▪ Typically used to encrypt the content of the message.
▪ Examples: DES and 3DES (no longer considered secure) and AES (256-bit
recommended for IPsec encryption).
IPsec Framework
Asymmetric Encryption
▪ Uses different keys for encryption and decryption.
▪ Knowing one of the keys does not allow a hacker to deduce the second key
and decode the information.
▪ One key encrypts the message, while a second key decrypts the message.
▪ Public key encryption is a variant of asymmetric encryption that uses a
combination of a private key and a public key.
▪ Typically used in digital certification and key management
▪ Example: RSA
Tài liệu Quản trị mạng cơ bản CCNA
302
12/2017
IPsec Framework
Diffie-Hellman Key Exchange
▪ Diffie-Hellman (DH) is not an encryption mechanism and is not typically
used to encrypt data.
▪ DH is a method to securely exchange the keys that encrypt data.
▪ DH algorithms allow two parties to establish a shared secret key used by
encryption and hash algorithms.
▪ DH is part of the IPsec standard.
▪ Encryption algorithms, such as DES, 3DES, and AES, as well as the MD5
and SHA-1 hashing algorithms, require a symmetric, shared secret key to
perform encryption and decryption.
▪ DH algorithm specifies a public key exchange method that provides a way
for two peers to establish a shared secret key that only they know,
although they are communicating over an insecure channel.
IPsec Framework
Diffie-Hellman Key Exchange
Tài liệu Quản trị mạng cơ bản CCNA
303
12/2017
IPsec Framework
Integrity with Hash Algorithms
▪ The original sender generates a hash of the message and
sends it with the message itself.
▪ The recipient parses the message and the hash, produces
another hash from the received message, and compares the
two hashes.
▪ If they are the same, the recipient can be reasonably sure of
the integrity of the original message.
IPsec Framework
Integrity with Hash Algorithms (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
304
12/2017
IPsec Framework
Integrity with Hash Algorithms (cont.)
Hash-based Message Authentication Code (HMAC) is a mechanism for message
authentication using hash functions.
▪ HMAC has two parameters: A message input and a secret key known only to
the message originator and intended receivers.
▪ Message sender uses an HMAC function to produce a value (the message
authentication code) formed by condensing the secret key and the message
input.
▪ Message authentication code is sent along with the message.
▪ Receiver computes the message authentication code on the received
message using the same key and HMAC function as the sender used.
▪ Receiver compares the result that is computed with the received message
authentication code.
▪ If the two values match, the message has been correctly received and the
receiver is assured that the sender is a user community member who share
the key.
IPsec Framework
Integrity with Hash Algorithms (cont.)
There are two common HMAC algorithms:
▪ MD5 – Uses a 128-bit shared secret key. The variable-length message and
128-bit shared secret key are combined and run through the HMAC-MD5
hash algorithm. The output is a 128-bit hash. The hash is appended to the
original message and forwarded to the remote end.
▪ SHA – SHA-1 uses a 160-bit secret key. The variable-length message and
the 160-bit shared secret key are combined and run through the HMACSHA1 hash algorithm. The output is a 160-bit hash. The hash is appended
to the original message and forwarded to the remote end.
Tài liệu Quản trị mạng cơ bản CCNA
305
12/2017
IPsec Framework
IPsec Authentication
▪ IPsec VPNs support authentication.
▪ Device on the other end of the VPN tunnel must be authenticated before
the communication path is considered secure.
IPsec Framework
IPsec Authentication (cont.)
There are two peer authentication methods, PSK and RSA signatures:
▪ PSK
▪ A secret key shared between the two parties using a secure channel
before it needs to be used.
▪ Use symmetric key cryptographic algorithms.
▪ A PSK is entered into each peer manually and is used to authenticate the
peer.
Tài liệu Quản trị mạng cơ bản CCNA
306
12/2017
IPsec Framework
IPsec Authentication (cont.)
▪ RSA signatures
▪ Digital certificates are exchanged to authenticate peers.
▪ Local device derives a hash and encrypts it with its private key.
▪ Encrypted hash, or digital signature, is attached to the message and
forwarded to the remote end.
▪ At the remote end, the encrypted hash is decrypted using the public key
of the local end.
▪ If the decrypted hash matches the recomputed hash, the signature is
genuine.
IPsec Framework
IPsec Protocol Framework
Authentication Header (AH)
▪ Appropriate protocol to use when confidentiality is not required or
permitted.
▪ Provides data authentication and integrity for IP packets that are passed
between two systems.
▪ Does not provide data confidentiality (encryption) of packets.
Encapsulating Security Payload (ESP)
▪ A security protocol that provides confidentiality and authentication by
encrypting the IP packet.
▪ Authenticates the inner IP packet and ESP header.
▪ Both encryption and authentication are optional in ESP, at a minimum, one
of them must be selected.
Tài liệu Quản trị mạng cơ bản CCNA
307
12/2017
IPsec Framework
IPsec Protocol Framework (cont.)
IPsec Framework
IPsec Protocol Framework (cont.)
Four basic building block of the IPsec framework that must be selected:
▪ IPsec framework protocol – A combination of ESP and AH, ESP or ESP+AH
options are almost always selected because AH itself does not provide
encryption.
▪ Confidentiality (if IPsec is implemented with ESP) – DES, 3DES, or AES, AES is
strongly recommended since provides the greatest security.
▪ Integrity – Guarantees that the content has not been altered in transit using
hash algorithms (MD5 or SHA).
▪ Authentication – Represents how devices on either end of the VPN tunnel are
authenticated (PSK or RSA).
▪ DH algorithm group – Represents how a shared secret key is established
between peers, DH24 provides the greatest security.
Tài liệu Quản trị mạng cơ bản CCNA
308
12/2017
IPsec Framework
IPsec Protocol Framework (cont.)
5 SSL VPNS & TUNNELING PROTOCOLS
Tài liệu Quản trị mạng cơ bản CCNA
309
12/2017
Remote Access VPN Solutions
Types of Remote Access VPNs
▪ There are two primary methods for deploying remote access VPNs:
▪ Secure Sockets Layer (SSL)
▪ IP Security (IPsec)
▪ Type of VPN method based on the access requirements of the users and
the organization’s IT processes.
▪ Both types offer access to virtually any network application or resource.
Remote Access VPN Solutions
Cisco SSL VPN
▪ Provides remote access by using a web browser and the web browser’s
native SSL encryption.
▪ Can provide remote access using the Cisco AnyConnect Secure Mobility
Client software
Tài liệu Quản trị mạng cơ bản CCNA
310
12/2017
Remote Access VPN Solutions
Cisco SSL VPN Solutions
Cisco AnyConnect Secure Mobility Client with SSL
▪ Client-Based SSL VPNs provide authenticated users with LAN-like, full
network access to corporate resources
▪ The remote devices require a client application, such as the Cisco VPN
Client or the newer AnyConnect client to be installed on the end-user
device
Cisco Secure Mobility Clientless SSL VPN
▪ Enables corporations to provide access to corporate resources even when
the remote device is not corporately-managed
▪ Cisco ASA is used as a proxy device to network resources
▪ Provides a web portal interface for remote devices to navigate the
network using port-forwarding capabilities
IPsec Remote Access VPNs
IPsec Remote Access
Tài liệu Quản trị mạng cơ bản CCNA
311
12/2017
IPsec Remote Access VPNs
IPsec Remote Access (cont.)
▪ The Cisco Easy VPN solution consists of three components:
▪ Cisco Easy VPN Server – A Cisco IOS router or Cisco ASA Firewall acting
as the VPN head-end device in site-to-site or remote-access VPNs.
▪ Cisco Easy VPN Remote – A Cisco IOS router or Cisco ASA Firewall acting
as a remote VPN client.
▪ Cisco VPN Client – An application supported on a PC used to access a
Cisco VPN server.
▪ The Cisco Easy VPN solution feature offers flexibility, scalability, and ease of
use for both site-to-site and remote access IPsec VPNs.
IPsec Remote Access VPNs
Cisco Easy VPN Server and Remote
Tài liệu Quản trị mạng cơ bản CCNA
312
12/2017
IPsec Remote Access VPNs
Comparing IPsec and SSL
6 GRE TUNNELS
Tài liệu Quản trị mạng cơ bản CCNA
313
12/2017
Fundamentals of Generic Routing Encapsulation
Introduction to GRE
▪ Basic, non-secure, siteto-site VPN tunneling
protocol developed by
Cisco
▪ Encapsulates a wide
variety
of
protocol
packet types inside IP
tunnels
▪ Creates a virtual pointto-point link to routers
at remote points, over
an IP internetwork
Fundamentals of Generic Routing Encapsulation
Characteristics of GRE
Tài liệu Quản trị mạng cơ bản CCNA
314
12/2017
Fundamentals of Generic Routing Encapsulation
Characteristics of GRE
GRE has these characteristics:
▪ GRE is defined as an IETF standard.
▪ IP protocol 47 is used to identify GRE packets.
▪ GRE encapsulation uses a protocol type field in the GRE header to support
the encapsulation of any OSI Layer 3 protocol.
▪ GRE itself is stateless; it does not include any flow-control mechanisms, by
default.
▪ GRE does not include any strong security mechanisms to protect its
payload.
▪ The GRE header, together with the tunneling IP header, creates at least 24
bytes of additional overhead for tunneled packets.
Configuring GRE Tunnels
GRE Tunnel Configuration
Tài liệu Quản trị mạng cơ bản CCNA
315
12/2017
Configuring GRE Tunnels
GRE Tunnel Configuration
Configuring GRE Tunnels
GRE Tunnel Verification
Verify Tunnel
Interface is
Up
Verify OSPF
Adjacency
Tài liệu Quản trị mạng cơ bản CCNA
316
12/2017
Chapter 13 – IPv6
Chapter 13
1 IPv6 Introduction
2 IPv6 Address Configuration
3 Static route with IPV6
4 OSPF Version 3
5 EIGRP for IPv6
Tài liệu Quản trị mạng cơ bản CCNA
317
12/2017
1 IPV6 INTRODUCTION
IPv4 Issues
The Need for IPv6
▪ IPv6 is designed to be the successor to IPv4.
▪ Depletion of IPv4 address space has been the motivating factor for moving
to IPv6.
▪ Projections show that all five RIRs will run out of IPv4 addresses between
2015 and 2020.
▪ With an increasing Internet population, a limited IPv4 address space, issues
with NAT and an Internet of things, the time has come to begin the
transition to IPv6!
▪ IPv4 has a theoretical maximum of 4.3 billion addresses, plus private
addresses in combination with NAT.
▪ IPv6 larger 128-bit address space provides for 340 undecillion addresses.
▪ IPv6 fixes the limitations of IPv4 and includes additional enhancements,
such as ICMPv6.
Tài liệu Quản trị mạng cơ bản CCNA
318
12/2017
IPv4 Issues
IPv4 and IPv6 Coexistence
The migration techniques can be divided into three categories:
Dual-stack, Tunnelling, and Translation.
Dual-stack
Dual-stack: Allows IPv4 and IPv6 to coexist on the same network. Devices
run both IPv4 and IPv6 protocol stacks simultaneously.
IPv4 Issues
IPv4 and IPv6 Coexistence (cont.)
Tunnelling
Tunnelling: A method of transporting an IPv6 packet over an IPv4
network. The IPv6 packet is encapsulated inside an IPv4 packet.
Tài liệu Quản trị mạng cơ bản CCNA
319
12/2017
IPv4 Issues
IPv4 and IPv6 Coexistence (cont.)
Translation
Translation: The Network Address Translation 64 (NAT64) allows IPv6enabled devices to communicate with IPv4-enabled devices using a
translation technique similar to NAT for IPv4. An IPv6 packet is translated to
an IPv4 packet, and vice versa.
2 IPV6 ADDRESS CONFIGURATION
Tài liệu Quản trị mạng cơ bản CCNA
320
12/2017
IPv6 Addressing
Hexadecimal Number System
Hexadecimal is a base
sixteen system.
Base 16 numbering system
uses the numbers 0 to 9 and
the letters A to F.
Four bits (half of a byte) can
be represented with a single
hexadecimal value.
IPv6 Addressing
Hexadecimal Number System (cont.)
Look at the binary bit patterns
that match the decimal and
hexadecimal values
Tài liệu Quản trị mạng cơ bản CCNA
321
12/2017
IPv6 Addressing
IPv6 Address Representation
128 bits in length and written as a string of hexadecimal values
In IPv6, 4 bits represents a single hexadecimal digit, 32 hexadecimal value = IPv6
address
2001:0DB8:0000:1111:0000:0000:0000:0200
FE80:0000:0000:0000:0123:4567:89AB:CDEF
Hextet used to refer to a segment of 16 bits or four hexadecimals
Can be written in either lowercase or uppercase
IPv6 Addressing
IPv6 Address Representation (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
322
12/2017
IPv6 Addressing
Rule 1- Omitting Leading 0s
The first rule to help reduce the notation of IPv6 addresses is any leading 0s
(zeros) in any 16-bit section or hextet can be omitted.
01AB can be represented as 1AB.
09F0 can be represented as 9F0.
0A00 can be represented as A00.
00AB can be represented as AB.
IPv6 Addressing
Rule 2 - Omitting All 0 Segments
A double colon (::) can replace any single, contiguous string of one or more 16bit segments (hextets) consisting of all 0’s.
Double colon (::) can only be used once within an address otherwise the
address will be ambiguous.
Known as the compressed format.
Incorrect address - 2001:0DB8::ABCD::1234.
Tài liệu Quản trị mạng cơ bản CCNA
323
12/2017
IPv6 Addressing
Rule 2 - Omitting All 0 Segments (cont.)
Example #1
Example #2
Types of IPv6 Addresses
IPv6 Prefix Length
IPv6 does not use the dotted-decimal subnet mask notation
Prefix length indicates the network portion of an IPv6 address using the
following format:
▪ IPv6 address/prefix length
▪ Prefix length can range from 0 to 128
▪ Typical prefix length is /64
Tài liệu Quản trị mạng cơ bản CCNA
324
12/2017
Types of IPv6 Addresses
IPv6 Address Types
There are three types of IPv6 addresses:
▪
Unicast
▪
Multicast
▪
Anycast.
Note: IPv6 does not have broadcast addresses.
Types of IPv6 Addresses
IPv6 Unicast Addresses
Unicast
▪ Uniquely
identifies an
interface on an
IPv6-enabled
device.
▪ A packet sent to a
unicast address is
received by the
interface that is
assigned that
address.
Tài liệu Quản trị mạng cơ bản CCNA
325
12/2017
Types of IPv6 Addresses
IPv6 Unicast Addresses (cont.)
Types of IPv6 Addresses
IPv6 Unicast Addresses (cont.)
Global Unicast
▪
▪
▪
▪
Similar to a public IPv4 address
Globally unique
Internet routable addresses
Can be configured statically or assigned dynamically
Link-local
▪ Used to communicate with other devices on the same local
link
▪ Confined to a single link; not routable beyond the link
Tài liệu Quản trị mạng cơ bản CCNA
326
12/2017
Types of IPv6 Addresses
IPv6 Unicast Addresses (cont.)
Loopback
▪ Used by a host to send a packet to itself and cannot be
assigned to a physical interface.
▪ Ping an IPv6 loopback address to test the configuration of
TCP/IP on the local host.
▪ All-0s except for the last bit, represented as ::1/128 or just ::1.
Unspecified Address
▪ All-0’s address represented as ::/128 or just ::
▪ Cannot be assigned to an interface and is only used as a source
address.
▪ An unspecified address is used as a source address when the
device does not yet have a permanent IPv6 address or when
the source of the packet is irrelevant to the destination.
Types of IPv6 Addresses
IPv6 Unicast Addresses (cont.)
Unique Local
▪ Similar to private addresses for IPv4.
▪ Used for local addressing within a site or between
a limited number of sites.
▪ In the range of FC00::/7 to FDFF::/7.
IPv4 Embedded (not covered in this course)
▪ Used to help transition from IPv4 to IPv6.
Tài liệu Quản trị mạng cơ bản CCNA
327
12/2017
Types of IPv6 Addresses
IPv6 Link-Local Unicast Addresses
Every IPv6-enabled network interface is REQUIRED to have a link-local
address
Enables a device to communicate with other IPv6-enabled devices on the
same link and only on that link (subnet)
FE80::/10 range, first 10 bits are 1111 1110 10xx xxxx
1111 1110 1000 0000 (FE80) - 1111 1110 1011 1111 (FEBF)
Types of IPv6 Addresses
IPv6 Link-Local Unicast Addresses (cont.)
Packets with a source
or destination linklocal address cannot
be routed beyond the
link from where the
packet originated.
Tài liệu Quản trị mạng cơ bản CCNA
328
12/2017
IPv6 Unicast Addresses
Structure of an IPv6 Global Unicast Address
IPv6 global unicast addresses are globally unique and routable on
the IPv6 Internet
Equivalent to public IPv4 addresses
ICANN allocates IPv6 address blocks to the five RIRs
IPv6 Unicast Addresses
Structure of an IPv6 Global Unicast Address (cont.)
Currently, only global unicast addresses with the first three bits of 001 or
2000::/3 are being assigned
Tài liệu Quản trị mạng cơ bản CCNA
329
12/2017
IPv6 Unicast Addresses
Structure of an IPv6 Global Unicast Address (cont.)
A global unicast address has three parts: Global Routing Prefix, Subnet ID, and
Interface ID.
▪ Global Routing Prefix is the prefix or network portion of the address
assigned by the provider, such as an ISP, to a customer or site,
currently, RIR’s assign a /48 global routing prefix to customers.
▪ 2001:0DB8:ACAD::/48 has a prefix that indicates that the first 48 bits
(2001:0DB8:ACAD) is the prefix or network portion.
IPv6 Unicast Addresses
Structure of an IPv6 Global Unicast Address (cont.)
Subnet ID is used by an organization to identify subnets within its site
Interface ID
▪ Equivalent to the host portion of an IPv4 address.
▪ Used because a single host may have multiple
interfaces, each having one or more IPv6 addresses.
Tài liệu Quản trị mạng cơ bản CCNA
330
12/2017
IPv6 Unicast Addresses
Static Configuration of a Global Unicast Address
IPv6 Unicast Addresses
Static Configuration of an IPv6 Global Unicast Address
(cont.)
Windows
IPv6 Setup
Tài liệu Quản trị mạng cơ bản CCNA
331
12/2017
IPv6 Unicast Addresses
Dynamic Configuration of a Global Unicast Address
using SLAAC
Stateless Address Autoconfiguraton (SLAAC)
▪ A method that allows a device to obtain its prefix, prefix length and default
gateway from an IPv6 router
▪ No DHCPv6 server needed
▪ Rely on ICMPv6 Router Advertisement (RA) messages
IPv6 routers
▪ Forwards IPv6 packets between networks
▪ Can be configured with static routes or a dynamic IPv6 routing protocol
▪ Sends ICMPv6 RA messages
IPv6 Unicast Addresses
Dynamic Configuration of a Global Unicast Address using
SLAAC (cont.)
▪ The IPv6 unicast-routing command enables IPv6 routing.
▪ RA message can contain one of the following three options:
▪ SLAAC Only – Uses the information contained in the RA message.
▪ SLAAC and DHCPv6 – Uses the information contained in the RA message
and get other information from the DHCPv6 server, stateless DHCPv6 (for
example, DNS).
▪ DHCPv6 only – The device should not use the information in the RA,
stateful DHCPv6.
▪ Routers send ICMPv6 RA messages using the link-local address as the source
IPv6 address
Tài liệu Quản trị mạng cơ bản CCNA
332
12/2017
IPv6 Unicast Addresses
Dynamic Configuration of a Global Unicast Address
using SLAAC (cont.)
IPv6 Unicast Addresses
Dynamic Configuration of a Global Unicast
Address using DHCPv6 (cont.)
Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
▪ Similar to IPv4
▪ Automatically receives addressing information, including a global unicast
address, prefix length, default gateway address and the addresses of DNS
servers using the services of a DHCPv6 server.
▪ Device may receive all or some of its IPv6 addressing information from a
DHCPv6 server depending upon whether option 2 (SLAAC and DHCPv6) or
option 3 (DHCPv6 only) is specified in the ICMPv6 RA message.
▪ Host may choose to ignore whatever is in the router’s RA message and
obtain its IPv6 address and other information directly from a DHCPv6
server.
Tài liệu Quản trị mạng cơ bản CCNA
333
12/2017
IPv6 Unicast Addresses
Dynamic Configuration of a Global Unicast Address
using DHCPv6 (cont.)
IPv6 Unicast Addresses
EUI-64 Process or Randomly Generated
EUI-64 Process
▪ Uses a client’s 48-bit Ethernet MAC address and inserts another 16 bits in
the middle of the 46-bit MAC address to create a 64-bit Interface ID.
▪ Advantage is that the Ethernet MAC address can be used to determine the
interface; is easily tracked.
EUI-64 Interface ID is represented in binary and comprises three parts:
▪ 24-bit OUI from the client MAC address, but the 7th bit (the
Universally/Locally bit) is reversed (0 becomes a 1).
▪ Inserted as a 16-bit value FFFE.
▪ 24-bit device identifier from the client MAC address.
Tài liệu Quản trị mạng cơ bản CCNA
334
12/2017
IPv6 Unicast Addresses
EUI-64 Process or Randomly Generated (cont.)
IPv6 Unicast Addresses
EUI-64 Process or Randomly Generated (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
335
12/2017
IPv6 Unicast Addresses
EUI-64 Process or Randomly Generated (cont.)
Randomly Generated Interface IDs
▪ Depending upon the operating system, a device can use a randomly
generated Interface ID instead of using the MAC address and the EUI64 process.
▪ Beginning with Windows Vista, Windows uses a randomly generated
Interface ID instead of one created with EUI-64.
▪ Windows XP (and previous Windows operating systems) used EUI-64.
IPv6 Unicast Addresses
Dynamic Link-local Addresses
Link-Local Address
▪ After a global unicast address is assigned to an interface, an IPv6enabled device automatically generates its link-local address.
▪ Must have a link-local address that enables a device to communicate
with other IPv6-enabled devices on the same subnet.
▪ Uses the link-local address of the local router for its default gateway
IPv6 address.
▪ Routers exchange dynamic routing protocol messages using link-local
addresses.
▪ Routers’ routing tables use the link-local address to identify the nexthop router when forwarding IPv6 packets.
Tài liệu Quản trị mạng cơ bản CCNA
336
12/2017
IPv6 Unicast Addresses
Dynamic Link-local Addresses (cont.)
Dynamically Assigned
The link-local address is dynamically created using the FE80::/10 prefix and the
Interface ID.
IPv6 Unicast Addresses
Static Link-local Addresses
Configuring Link-local
Tài liệu Quản trị mạng cơ bản CCNA
337
12/2017
IPv6 Unicast Addresses
Static Link-local Addresses (cont.)
Configuring Link-local
IPv6 Global Unicast Addresses
Verifying IPv6 Address Configuration
Each interface has two IPv6
addresses 1.
2.
global unicast address that
was configured
one that begins with FE80
is automatically added as a
link-local unicast address
Tài liệu Quản trị mạng cơ bản CCNA
338
12/2017
IPv6 Global Unicast Addresses
Verifying IPv6 Address Configuration (cont.)
IPv6 Multicast Addresses
Assigned IPv6 Multicast Addresses
IPv6 multicast addresses have the prefix FF00::/8
There are two types of IPv6 multicast addresses:
▪ Assigned multicast
▪ Solicited node multicast
Tài liệu Quản trị mạng cơ bản CCNA
339
12/2017
IPv6 Multicast Addresses
Assigned IPv6 Multicast Addresses (cont.)
Two common IPv6 assigned multicast groups include:
▪ FF02::1 All-nodes multicast group –
▪ All IPv6-enabled devices join
▪ Same effect as an IPv4 broadcast address
▪ FF02::2 All-routers multicast group
▪ All IPv6 routers join
▪ A router becomes a member of this group when it is
enabled as an IPv6 router with the ipv6 unicastrouting global configuration mode command.
▪ A packet sent to this group is received and processed
by all IPv6 routers on the link or network.
IPv6 Multicast Addresses
Assigned IPv6 Multicast Addresses (cont.)
Tài liệu Quản trị mạng cơ bản CCNA
340
12/2017
IPv6 Multicast Addresses
Solicited Node IPv6 Multicast Addresses
▪ Similar to the all-nodes
multicast address, matches
only the last 24 bits of the
IPv6 global unicast address of
a device
▪ Automatically created when
the global unicast or linklocal unicast addresses are
assigned
▪ Created by combining a
special
FF02:0:0:0:0:0:FF00::/104
prefix with the right-most 24
bits of its unicast address
IPv6 Multicast Addresses
Solicited Node IPv6 Multicast Addresses (cont.)
The solicited node multicast
address consists of two parts:
FF02:0:0:0:0:0:FF00::/104
multicast prefix – First 104 bits
of the all solicited node
multicast address
Least significant 24-bits –
Copied from the right-most 24
bits of the global unicast or linklocal unicast address of the
device
Tài liệu Quản trị mạng cơ bản CCNA
341
12/2017
3 STATIC ROUTE WITH IPV6
Configure IPv6 Static Routes
The ipv6 route Command
Most of parameters are identical to the IPv4 version of
the command. IPv6 static routes can also be implemented
as:
Standard IPv6 static route
Default IPv6 static route
Summary IPv6 static route
Floating IPv6 static route
Tài liệu Quản trị mạng cơ bản CCNA
342
12/2017
Configure IPv6 Static Routes
Next-Hop Options
The next hop can be identified by an IPv6 address, exit
interface, or both. How the destination is specified
creates one of three route types:
Next-hop IPv6 route - Only the next-hop IPv6 address
is specified.
Directly connected static IPv6 route - Only the router
exit interface is specified.
Fully specified static IPv6 route - The next-hop IPv6
address and exit interface are specified.
Configure IPv6 Static Routes
Configure a Next-Hop Static IPv6 Route
Tài liệu Quản trị mạng cơ bản CCNA
343
12/2017
Configure IPv6 Static Routes
Configure Directly Connected Static IPv6 Route
Configure IPv6 Static Routes
Configure Fully Specified Static IPv6 Route
Tài liệu Quản trị mạng cơ bản CCNA
344
12/2017
Configure IPv6 Static Routes
Verify IPv6 Static Routes
Along with ping and traceroute, useful
commands to verify static routes include:
show ipv6 route
show ipv6 route static
show ipv6 route network
Configure IPv6 Default Routes
Default Static IPv6 Route
Tài liệu Quản trị mạng cơ bản CCNA
345
12/2017
Configure IPv6 Default Routes
Configure a Default Static IPv6 Route
Configure IPv6 Default Routes
Configure a Default Static IPv6 Route
Tài liệu Quản trị mạng cơ bản CCNA
346
12/2017
4 OSPF VERSION 3
Configuring OSFPv3
OSPFv3 Network Topology
Tài liệu Quản trị mạng cơ bản CCNA
347
12/2017
Configuring OSFPv3
OSPFv3 Network Topology (cont.)
Configuring OSFPv3
Link-Local
Addresses
▪
▪
▪
▪
▪
Link-local addresses are automatically created when an IPv6 global unicast
address is assigned to the interface (required).
Global unicast addresses are not required.
Cisco routers create the link-local address using FE80::/10 prefix and the EUI-64
process unless the router is configured manually,
EUI-64 involves using the 48-bit Ethernet MAC address, inserting FFFE in the
middle and flipping the seventh bit. For serial interfaces, Cisco uses the MAC
address of an Ethernet interface.
Notice in the figure that all three interfaces are using the same link-local address.
Tài liệu Quản trị mạng cơ bản CCNA
348
12/2017
Configuring OSFPv3
Assigning Link-Local Addresses
Manually configuring
the link-local address
provides the ability to
create an address that
is recognizable and
easier to remember.
Configuring OSFPv3
Configuring the OSPFv3 Router ID
Tài liệu Quản trị mạng cơ bản CCNA
349
12/2017
Configuring OSFPv3
Configuring the OSPFv3 Router ID (cont.)
Configuring OSFPv3
Modifying an OSPFv3 Router ID
Tài liệu Quản trị mạng cơ bản CCNA
350
12/2017
OSPF Configuring OSFPv3
Enabling OSPFv3 on Interfaces
Instead of using the network router configuration mode command
to specify matching interface addresses, OSPFv3 is configured
directly on the interface.
Verify OSPFv3
Verify OSPFv3 Neighbors/Protocol Settings
Tài liệu Quản trị mạng cơ bản CCNA
351
12/2017
Verify OSPFv3
Verify OSPFv3 Interfaces
Verify OSPFv3
Verify IPv6 Routing Table
Tài liệu Quản trị mạng cơ bản CCNA
352
12/2017
5 EIGRP FOR IPV6
EIGRP for IPv4 vs. IPv6
EIGRP for IPv6
Tài liệu Quản trị mạng cơ bản CCNA
353
12/2017
EIGRP for IPv4 vs. IPv6
Comparing EIGRP for IPv4 and IPv6
EIGRP for IPv4 vs. IPv6
IPv6 Link-local Addresses
Tài liệu Quản trị mạng cơ bản CCNA
354
12/2017
Configuring EIGRP for IPv6
EIGRP for IPv6 Network Topology
Configuring EIGRP for IPv6
Configuring IPv6 Link-Local Addresses
Manually configuring link-local addresses
Verifying link-local addresses
Tài liệu Quản trị mạng cơ bản CCNA
355
12/2017
Configuring EIGRP for IPv6
Configuring EIGRP for the IPv6 Routing Process
▪ The ipv6 unicast-routing global
configuration mode command is required to enable
any IPv6 routing protocol.
▪ Configuring EIGRP for IPv6
▪ The no shutdown command and a router ID are
required for the router to form neighbor adjacencies.
Configuring EIGRP for IPv6
IPv6 EIGRP interface Command
Enabling EIGRP of IPv6 on an Interface
Tài liệu Quản trị mạng cơ bản CCNA
356
12/2017
Verifying EIGRP for IPv6
Verifying EIGRP for IPv6: Examining Neighbors
Verifying EIGRP for IPv6
Verifying EIGRP for IPv6: show ip protocols Command
Tài liệu Quản trị mạng cơ bản CCNA
357
12/2017
Verifying EIGRP for IPv6
Verifying EIGRP for IPv6: Examine the Routing Table
Use the show ipv6 route command to examine the IPv6
routing table.
Chapter 14 – IP Services
Tài liệu Quản trị mạng cơ bản CCNA
358
12/2017
CHAPTER 14 – IP SERVICES
Chapter 14
1 High Availability – HSRP
2 Cisco IOS NetFlow, SNMP
Tài liệu Quản trị mạng cơ bản CCNA
359
12/2017
1 HIGH AVAILABILITY – HSRP
HSRP
HSRP is a Cisco proprietary protocol that
can be run on most, but not all, of
Cisco’s router and multilayer switch
models. It defines a standby group, and
each standby group that you define
includes the following routers:
▪Active router
▪Standby router
▪Virtual router
▪Any other routers that maybe attached
to the subnet
Tài liệu Quản trị mạng cơ bản CCNA
360
12/2017
HSRP active and standby routers
The problem with HSRP is that with it, only
one router is active and two or more routers
just sit there in standby mode and won’t be
used unless a failure occurs—not very cost
effective or efficient!
The standby group will always have at least
two routers participating in it. The primary
players in the group are the one active
router and one standby router that
communicate to each other using multicast
Hello messages.
HSRP Virtual MAC
The HSRP MAC address has
only one variable piece in it. ▪
The first 24 bits still identify the
vendor who manufactured the
device (the organizationally ▪
unique identifier, or OUI).
The next 16 bits in the address
tells us that the MAC address is ▪
a well-known HSRP MAC
Tài liệu Quản trị mạng cơ bản CCNA
Here is an example of what an HSRP MAC address
would look like:0000.0c07.ac0a
The first 24 bits (0000.0c) are the vendor ID of the
address; in the case of HSRP being a Cisco protocol,
the ID is assigned to Cisco.
The next 16 bits (07.ac) are the well-known HSRP ID.
This part of the address was assigned by Cisco in the
protocol, so it’s always easy to recognize that this
address is for use with HSRP.
The last 8 bits (0a) are the only variable bits and
represent the HSRP group number that you assign. In
this case, the group number is 10 and converted to
hexadecimal when placed in the MAC address, where
it becomes the 0a that you see.
361
12/2017
2 CISCO IOS NETFLOW, SNMP
SNMP
SNMP is an Application layer protocol that provides a message
format for agents on a variety of devices to communicate with
network management stations (NMSs)
The NMS periodically queries or polls the SNMP agent on a device to
gather and analyze statistics via GET messages. End devices running
SNMP agents would send an SNMP trap to the NMS if a problem
occurs.
Tài liệu Quản trị mạng cơ bản CCNA
362
12/2017
SNMP versions
SNMP has three versions, with version 1 being rarely, if ever implemented today.
Here’s a summary of these three versions:
SNMPv1
Supports plaintext authentication with community strings and uses only by UDP.
SNMPv2c
Supports plaintext authentication (using community strings) with MD5 or SHA with no
encryption but provides GET BULK, which is a way to gather many types of information
at once and minimize the number of GET requests. It offers a more detailed error
message reporting method, but it’s not more secure than v1. It uses UDP even though
it can be configured to use TCP.
SNMPv3
Supports strong authentication with MD5 or SHA, providing confidentiality
(encryption) and data integrity of messages via DES or DES-256 encryption between
agents and managers. GET BULK is a supported feature of SNMPv3, and this version
also uses TCP.
NetFlow
Cisco IOS NetFlow efficiently provides a key set of services for IP
applications, including network traffic accounting for baselining, usagebased network billing for consumers of network services, network design
and planning, general network security, and DoS and DDoS monitoring
capabilities as well as general network monitoring.
Tài liệu Quản trị mạng cơ bản CCNA
363
12/2017
Service providers use NetFlow to do the following
▪ Efficiently measuring who is using network service and for
which purpose
▪ Accounting and charging back according to the resource
utilizing level
▪ Using the measure information for more effective network
planning so that resource allocation and deployment are
well aligned with customer requirements
▪ Using the information to better structure and customize
the set of available applications and services to meet user
needs and customer service requirements
NetFlow Uses
▪ Major users of the network, meaning top talkers, top listeners,
top protocols, and so on
▪ Websites that are routinely visited, plus what’s been
downloaded
▪ Who’s generating the most traffic and using excessive
bandwidth
▪ Descriptions of bandwidth needs for an application as well as
your available bandwidth
Tài liệu Quản trị mạng cơ bản CCNA
364
12/2017
Configuring NetFlow
SF(config)#int fa0/0
SF(config-if)#ip flow ingress
SF(config-if)#ip flow egress
SF(config-if)#exit
SF(config)#ip flow-export destination
172.16.20.254 9996
SF(config)#ip flow-export version ?
1
5
9
SF(config)#ip flow-export version 9
SF(config)#ip flow-export source loopback
0
Show ip cache flow
SF#sh ip cache flow
IP packet size distribution (161 total packets):
[output cut]
IP Flow Switching Cache, 278544 bytes
1 active, 4095 inactive, 1 added
215 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes
Inactive flows timeout in 15 seconds
IP Sub Flow Cache, 21640 bytes
1 active, 1023 inactive, 1 added, 1 added to flow
0 alloc failures, 0 force free
1 chunk, 1 chunk added
last clearing of statistics never
Protocol
Total
Flows
Packets Bytes Packets Active(Sec)
Idle(Sec)
-------Flows
/Sec
/Flow /Pkt
/Sec
/Flow
/Flow
TCP-Telnet
14
0.0
19
58
0.1
6.5
11.7
TCP-WWW
8
0.0
9
108
0.1
2.5
1.7
SrcIf
SrcIPaddress
DstIf
DstIPaddress
Pr SrcP DstP
Pkts
Fa0/0
172.16.10.1
gig0/1
255.255.255.255 11 0044 0050
1161
Tài liệu Quản trị mạng cơ bản CCNA
365
12/2017
Chapter 15 – Network Security
Chapter 15 – Network Security
1 Network Security
2 Cisco Firewalls
3 Layer 2 Security
4 AAA Security Services
5 Secure Device Management
6 Secure Communications
Tài liệu Quản trị mạng cơ bản CCNA
366
12/2017
1 NETWORK SECURITY
Future of Networking
Network Security
Tài liệu Quản trị mạng cơ bản CCNA
367
12/2017
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service (DoS) attacks
Data interception and theft
Identity theft
2 CISCO FIREWALLS
Tài liệu Quản trị mạng cơ bản CCNA
368
12/2017
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
3 LAYER 2 SECURITY
Tài liệu Quản trị mạng cơ bản CCNA
369
12/2017
2950 CISCO SWITCH
2950 CISCO SWITCH
The Cisco Catalyst® 2950 Series is a
family of wire-speed Fast Ethernet
desktop switches that delivers the next
generation
of
performance
and
functionality
for
the
LAN
with
10/100/1000BaseT uplinks, enhanced
IOS service, quality of service (QoS),
multicast management, high availability
and security features using a simple,
Web-based interface.
Tài liệu Quản trị mạng cơ bản CCNA
370
12/2017
Introduction
Secured ports restrict a port to a user-defined
group of stations. When you assign secure
addresses to a secure port, the switch does not
forward any packets with source addresses outside
the defined group of addresses. If you define the
address table of a secure port to contain only one
address, the workstation or server attached to that
port is guaranteed the full bandwidth of the port.
As part of securing the port, you can also define
the size of the address table for the port.
IMPORTANT NOTE
Port security can only be configured on
static access ports.
Tài liệu Quản trị mạng cơ bản CCNA
371
12/2017
Secured ports generate address security violations
under these conditions
• The address table of a secured port is full, and
the address of an incoming packet is not found in
the table.
• An incoming packet has a source address
assigned as a secure address on another port
ADVANTAGES OF PORT SECURITY
Dedicated bandwidth If the size of the address
table is set to 1, the attached device is
guaranteed the full bandwidth of the port.
Added security—Unknown devices cannot
connect to the port
Tài liệu Quản trị mạng cơ bản CCNA
372
12/2017
COMMANDS TO VALIDATE PORT
SECURITY
Interface :Port to secure.
Security :Enable port security on the port.
Trap :Issue a trap when an addresssecurity violation occurs.
Shutdown Port :Disable the port when an
address-security violation occurs.
COMMANDS TO VALIDATE PORT
SECURITY
Secure Addresses :Number of addresses
in the secure address table for this port.
Secure ports have at least one address.
Max Addresses :Number of addresses that
the secure address table for the port can
contain.
Security Rejects :Number of unauthorized
addresses seen on the port.
Tài liệu Quản trị mạng cơ bản CCNA
373
12/2017
Security Violation Mode
Shutdown- The interface is shut down immediately
following a security violation
Restrict- A security violation sends a trap to the
network management station.
Protect- When the port secure addresses reach the
allowed limit on the port, all packets with unknown
addresses are dropped.
**The default is shutdown
Defining the Maximum Secure Address Count
A secure port can have from 1 to 132
associated secure addresses. Setting one
address in the MAC address table for the port
ensures that the attached device has the full
bandwidth of the port. If the secure-port
maximum addresses are set between 1 to 132
addresses and some of the secure addresses
have not been added by user, the remaining
addresses are dynamically learnt and become
secure addresses.
Tài liệu Quản trị mạng cơ bản CCNA
374
12/2017
IMPORTANT NOTE
If the port link goes down, all the
dynamically learned addresses
are removed
Enabling Port Security on The Switch
Beginning in privileged EXEC mode on the switch,
follow these steps to enable port security, these
settings will guarantee accurate and tight security. s
Tài liệu Quản trị mạng cơ bản CCNA
375
12/2017
TABLE OF COMMANDS
Command
Purpose
Step 1
configure terminal
Enter global configuration
mode.
Step 2
interface interface
Enter interface configuration
mode for the port you want to
secure.
Step 3
switchport portsecurity
Enable basic port security on
the interface.
Step 4
switchport portsecurity maximum
max_addrs
Set the maximum number of
MAC addresses that is allowed
on this interface.
•
TABLE OF COMMANDS
Step 5
switchport port-security
violation {shutdown |
restrict | protect}
Set the security violation mode for the interface.
The default is shutdown.
For mode, select one of these keywords:
•
shutdown—The interface is shut down
immediately following a security violation.
•
restrict—A security violation sends a trap
to the network management station.
•
protect—When the port secure
addresses reach the allowed limit on the
port, all packets with unknown addresses
are dropped.
Step 6
end
Return to privileged EXEC mode.
Step 7
show port security
[interface interface-id |
address]
Verify the entry.
Tài liệu Quản trị mạng cơ bản CCNA
376
12/2017
DISABLING PORT SECURITY
Step 1
configure terminal
Enter global configuration
mode.
Step 2
interface interface
Enter interface
configuration mode for the
port that you want to
unsecure.
Step 3
no switchport portsecurity
Disable port security.
Step 4
end
Return to privileged EXEC
mode.
Step 5
show port security
[interface interfaceid | address]
Verify the entry.
TABLE OF CONFLICTING FEATURES
Port
Group
Port
Security
SPAN
Source
Port
SPAN
Destination
Port
Connect
to
Cluster
Protected
Port
802.1X
Port
Port Group
-
No
Yes
No
Yes
Yes
No
Port
Security
No
-
Yes
No
Yes
No
No
SPAN
Source
Port
Yes
Yes
-
No
Yes
Yes1
Yes
SPAN
Destination
Port
No
No
No
-
Yes
Yes
No
Connect to
Cluster
Yes
Yes
Yes
Yes
-
Yes
-
Protected
Port
Yes
No
Yes1
Yes1
Yes
-
-
802.1X
Port
No
No
Yes
No
-
-
-
Tài liệu Quản trị mạng cơ bản CCNA
377
12/2017
4 AAA SECURITY SERVICES
Major Concepts
• Local Authentication
• Enhancements to Local Authentication
• Describe the purpose of AAA and the various implementation
techniques
• Implement AAA using the local database
• Implement AAA using TACACS+ and RADIUS protocols
• Implement AAA Authorization and Accounting
Tài liệu Quản trị mạng cơ bản CCNA
378
12/2017
Lesson Objectives
Upon completion of this lesson, the successful participant will be
able to:
1. Describe the importance of AAA as it relates to
authentication, authorization, and accounting
2. Configure AAA authentication using a local database
3. Configure AAA using a local database in SDM
4. Troubleshoot AAA using a local database
5. Explain server-based AAA
6. Describe and compare the TACACS+ and RADIUS protocols
Lesson Objectives
7. Describe the Cisco Secure ACS for Windows software
8. Describe how to configure Cisco Secure ACS for Windows as
a TACACS+ server
9. Configure server-based AAA authentication on Cisco Routers
using CLI
10. Configure server-based AAA authentication on Cisco Routers
using SDM
11. Troubleshoot server-based AAA authentication using Cisco
Secure ACS
12. Configure server-based AAA Authorization using Cisco Secure
ACS
13. Configure server-based AAA Accounting using Cisco Secure
ACS
Tài liệu Quản trị mạng cơ bản CCNA
379
12/2017
AAA Access Security
Authorization
Authentication
which resources the user is allowed to access and which
operations the user is allowed to perform?
Who are you?
Accounting
What did you spend it on?
Authentication – Password-Only
Password-Only Method
Internet
User Access Verification
Password: cisco
Password: cisco1
Password: cisco12
% Bad passwords
R1(config)# line vty 0 4
R1(config-line)# password cisco
R1(config-line)# login
•
•
•
•
Uses a login and password combination on access lines
Easiest to implement, but most unsecure method
Vulnerable to brute-force attacks
Provides no accountability
Tài liệu Quản trị mạng cơ bản CCNA
380
12/2017
Authentication – Local Database
•
•
•
•
Creates individual user account/password on each device
Provides accountability
User accounts must be configured locally on each device
Provides no fallback authentication method
R1(config)# username Admin secret
Str0ng5rPa55w0rd
R1(config)# line vty 0 4
R1(config-line)# login local
User Access Verification
Username: Admin
Password: cisco1
% Login invalid
Username: Admin
Password: cisco12
% Login invalid
Internet
Local Database Method
Local Versus Remote Access
Remote Access
Local Access
LAN 2
R1 Firewall R2
R1
LAN 1
Internet
Interne
t
LAN 3
Console Port
Administrator
Requires a direct connection to a
console port using a computer
running terminal emulation software
Management
LAN
Administratio
n Host
Logging
Host
Uses Telnet, SSH HTTP or SNMP
connections to the router from a computer
Tài liệu Quản trị mạng cơ bản CCNA
381
12/2017
Password Security
To increase the security of passwords, use additional
configuration parameters:
– Minimum password lengths should be enforced
– Unattended connections should be disabled
– All passwords in the configuration file should be encrypted
R1(config)# service password-encryption
R1(config)# exit
R1# show running-config
line con 0
exec-timeout 3 30
password 7 094F471A1A0A
login
line aux 0
exec-timeout 3 30
password 7 094F471A1A0A
login
Passwords
An acceptable password length is 10 or more characters
Complex passwords include a mix
of upper and lowercase letters,
numbers, symbols and spaces
Avoid any password based on
repetition, dictionary words, letter or
number sequences, usernames,
relative
or
pet
names,
or
biographical information
Deliberately misspell a password
(Security = 5ecur1ty)
Do not write passwords down and
leave them in obvious places
Tài liệu Quản trị mạng cơ bản CCNA
Change passwords often
382
12/2017
Access Port Passwords
Command to restrict access to
privileged EXEC mode
R1(config)# enable secret cisco
Commands to establish a login
password on incoming Telnet sessions
Commands to establish a
login password for dial-up
modem connections
R1(config)# line vty 0 4
R1(config-line)# password cisco
R1(config-line)# login
R1(config)# line aux 0
R1(config-line)# password cisco
R1(config-line)# login
R1
R1(config)# line con 0
R1(config-line)# password cisco
R1(config-line)# login
Commands to establish a
login password on the
console line
Creating Users
username name secret {[0]password|5encrypted-secret}
Parameter
Description
name
This parameter specifies the username.
0
(Optional) This option indicates that the plaintext
password is to be hashed by the router using MD5.
password
This parameter is the plaintext password to be
hashed using MD5.
5
This parameter indicates that the encrypted-secret
password was hashed using MD5.
encrypted-secret
This parameter is the MD5 encrypted-secret
password that is stored as the encrypted user
password.
Tài liệu Quản trị mạng cơ bản CCNA
383
12/2017
Enhanced Login Features
Login block-for Command
All login enhancement features are disabled by
default. The login block-for command enables
configuration of the login enhancement features.
– The login block-for feature monitors login device
activity and operates in two modes:
• Normal-Mode (Watch-Mode) —The router keeps count of
the number of failed login attempts within an identified
amount of time.
• Quiet-Mode (Quiet Period) — If the number of failed
logins exceeds the configured threshold, all login
attempts made using Telnet, SSH, and HTTP are denied.
Tài liệu Quản trị mạng cơ bản CCNA
384
12/2017
System Logging Messages
• To generate log messages for successful/failed logins:
– login on-failure log
– login on-success log
• To generate a message when failure rate is exceeded:
– security authentication failure rate thresholdrate log
• To verify that the login block-for command is configured and
which mode the router is currently in:
– show login
• To display more information regarding the failed attempts:
– show login failures
Access Methods
Character Mode
A user sends a request to
establish an EXEC mode
process with the router for
administrative purposes
Packet Mode
A user sends a request to
establish a connection
through the router with a
device on the network
Tài liệu Quản trị mạng cơ bản CCNA
385
12/2017
Self-Contained AAA Authentication
Remote Client
AAA
Router
1
2
3
Self-Contained AAA
1. The client establishes a connection with the router.
2. The AAA router prompts the user for a username and password.
3. The router authenticates the username and password using the local database and the user is authorized to access the network
based on information in the local database.
• Used for small networks
• Stores usernames and passwords locally in the Cisco router
Server-Based AAA Authentication
• Uses an external database server
– Cisco Secure Access Control Server (ACS) for Windows Server
– Cisco Secure ACS Solution Engine
– Cisco Secure ACS Express
• More appropriate if there are multiple routers
Remote Client
1
2
AAA
Router
4
Cisco Secure
ACS Server
3
Server-Based AAA
1. The client establishes a connection with the router.
2. The AAA router prompts the user for a username and password.
3. The router authenticates the username and password using a remote AAA server.
4. The user is authorized to access the network based on information on the remote AAA Server.
Tài liệu Quản trị mạng cơ bản CCNA
386
12/2017
AAA Authorization
• Typically implemented using an AAA server-based solution
• Uses a set of attributes that describes user access to the
network
1. When a user has been authenticated, a session is established with
an AAA server.
2. The router requests authorization for the requested service from the
AAA server.
3. The AAA server returns a PASS/FAIL for authorization.
AAA Accounting
• Implemented using an AAA server-based solution
• Keeps a detailed log of what an authenticated user does on a
device
1. When a user has been authenticated, the AAA accounting process
generates a start message to begin the accounting process.
2. When the user finishes, a stop message is recorded ending the
accounting process.
Tài liệu Quản trị mạng cơ bản CCNA
387
12/2017
Local AAA Authentication
Commands
R1# conf t
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
username JR-ADMIN secret Str0ngPa55w0rd
username ADMIN secret Str0ng5rPa55w0rd
aaa new-model
aaa authentication login default local-case
aaa local authentication attempts max-fail 10
To authenticate administrator access (character
mode access)
1. Add usernames and passwords to the local
router database
2. Enable AAA globally
3. Configure AAA parameters on the router
4. Confirm and troubleshoot the AAA
configuration
Additional Commands
aaa authentication enable
Enables AAA for EXEC mode access
aaa authentication ppp
Enables AAA for PPP network access
Tài liệu Quản trị mạng cơ bản CCNA
388
12/2017
AAA Authentication
Command Elements
router(config)#
aaa authentication login {default | list-name}
method1…[method4]
Command
default
Description
Uses the listed authentication methods that follow this
keyword as the default list of methods when a user logs in
list-name
Character string used to name the list of authentication
methods activated when a user logs in
passwordexpiry
Enables password aging on a local authentication list.
method1
Identifies the list of methods that the authentication
[method2... algorithm tries in the given sequence. You must enter at
]
least one method; you may enter up to four methods.
Method Type Keywords
Keywords
Description
enable
Uses the enable password for authentication. This keyword cannot be used.
krb5
Uses Kerberos 5 for authentication.
krb5-telnet
Uses Kerberos 5 telnet authentication protocol when using Telnet to connect
to the router.
line
Uses the line password for authentication.
local
Uses the local username database for authentication.
local-case
Uses case-sensitive local username authentication.
none
Uses no authentication.
cache group-name
Uses a cache server group for authentication.
group radius
Uses the list of all RADIUS servers for authentication.
group tacacs+
Uses the list of all TACACS+ servers for authentication.
group group-name
Uses a subset of RADIUS or TACACS+ servers for authentication as defined
by the aaa group server radius or aaa group server tacacs+ command.
Tài liệu Quản trị mạng cơ bản CCNA
389
12/2017
Additional Security
router(config)#
aaa local authentication attempts max-fail [number-ofunsuccessful-attempts]
R1# show aaa local user lockout
Local-user
JR-ADMIN
Lock time
04:28:49 UTC Sat Dec 27 2008
R1# show aaa sessions
Total sessions since last reload: 4
Session Id: 1
Unique Id: 175
User Name: ADMIN
IP Address: 192.168.1.10
Idle Time: 0
CT Call Handle: 0
Sample Configuration
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default local-case enable
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
Tài liệu Quản trị mạng cơ bản CCNA
390
12/2017
Verifying AAA Authentication
• AAA is enabled by default in SDM
• To verify or enable/disable AAA, choose Configure >
Additional Tasks > AAA
Using SDM
1. Select Configure > Additional Tasks > Router Access >
User Accounts/View
2. Click Add
3. Enter username
and password
4. Choose 15
5. Check the box and
select a view
6. Click OK
Tài liệu Quản trị mạng cơ bản CCNA
391
12/2017
Configure Login Authentication
1. Select Configure > Additional Tasks > AAA > Authentication
Policies > Login and click Add
2. Verify that Default is selected
3. Click Add
4. Choose local
6. Click OK
5. Click OK
The debug aaa Command
R1# debug aaa ?
accounting
administrative
api
attr
authentication
authorization
cache
coa
db
dead-criteria
id
ipc
mlist-ref-count
mlist-state
per-user
pod
protocol
server-ref-count
sg-ref-count
sg-server-selection
subsys
testing
R1# debug aaa
Tài liệu Quản trị mạng cơ bản CCNA
Accounting
Administrative
AAA api events
AAA Attr Manager
Authentication
Authorization
Cache activities
AAA CoA processing
AAA DB Manager
AAA Dead-Criteria Info
AAA Unique Id
AAA IPC
Method list reference counts
Information about AAA method list state change and
notification
Per-user attributes
AAA POD processing
AAA protocol processing
Server handle reference counts
Server group handle reference counts
Server Group Server Selection
AAA Subsystem
Info. about AAA generated test packets
392
12/2017
Sample Output
R1# debug aaa authentication
113123: Feb 4 10:11:19.305 CST: AAA/MEMORY: create_user (0x619C4940) user=''
ruser='' port='tty1' rem_addr='async/81560' authen_type=ASCII service=LOGIN priv=1
113124: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): port='tty1' list=''
action=LOGIN service=LOGIN
113125: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): using "default" list
113126: Feb 4 10:11:19.305 CST: AAA/AUTHEN/START (2784097690): Method=LOCAL
113127: Feb 4 10:11:19.305 CST: AAA/AUTHEN (2784097690): status = GETUSER
113128: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): continue_login
(user='(undef)')
113129: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETUSER
113130: Feb 4 10:11:26.305 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL
113131: Feb 4 10:11:26.305 CST: AAA/AUTHEN (2784097690): status = GETPASS
113132: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): continue_login
(user='diallocal')
113133: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = GETPASS
113134: Feb 4 10:11:28.145 CST: AAA/AUTHEN/CONT (2784097690): Method=LOCAL
113135: Feb 4 10:11:28.145 CST: AAA/AUTHEN (2784097690): status = PASS
Local Versus Server-Based
Authentication
Local Authentication
1. The user establishes a connection with the router.
2. The router prompts the user for a username and password authenticating
the user using a local database.
Perimeter
Router
1
Cisco Secure ACS
for Windows Server
3
2
4
Remote User
Server-Based Authentication
1. The user establishes a connection with the router.
2. The router prompts the user for a username and password.
3. The router passes the username and password to the Cisco Secure ACS (server or engine).
4. The Cisco Secure ACS authenticates the user. The user is authorized to access the router (administrative access) or the
network based on information found in the Cisco Secure ACS database.
Tài liệu Quản trị mạng cơ bản CCNA
393
12/2017
Overview of TACACS+ and RADIUS
TACACS+ or RADIUS protocols are used to
communicate between the clients and AAA
security servers.
Cisco Secure ACS for
Windows Server
Perimeter
Router
Cisco Secure
ACS Express
Remote User
TACACS+/RADIUS Comparison
TACACS+
RADIUS
Functionality
Separates AAA according to the AAA
architecture, allowing modularity of
the security server implementation
Combines authentication and
authorization but separates
accounting, allowing less flexibility in
implementation than TACACS+.
Standard
Mostly Cisco supported
Open/RFC standard
Transport Protocol
TCP
UDP
CHAP
Bidirectional challenge and response
as used in Challenge Handshake
Authentication Protocol (CHAP)
Unidirectional challenge and response
from the RADIUS security server to
the RADIUS client.
Protocol Support
Multiprotocol support
No ARA, no NetBEUI
Confidentiality
Entire packet encrypted
Password encrypted
Customization
Provides authorization of router
commands on a per-user or
per-group basis.
Has no option to authorize router
commands on a per-user or
per-group basis
Confidentiality
Limited
Extensive
Tài liệu Quản trị mạng cơ bản CCNA
394
12/2017
TACACS+ Authentication Process
Connect
Username prompt?
Username?
Use “Username”
JR-ADMIN
JR-ADMIN
Password prompt?
Password?
Use “Password”
“Str0ngPa55w0rd”
“Str0ngPa55w0rd”
Accept/Reject
• Provides separate AAA services
• Utilizes TCP port 49
RADIUS Authentication Process
Access-Request
Username?
(JR_ADMIN, “Str0ngPa55w0rd”)
JR-ADMIN
Access-Accept
Password?
Str0ngPa55w0rd
• Works in both local and roaming situations
• Uses UDP ports 1645 or 1812 for authentication and UDP
ports 1646 or 1813 for accounting
Tài liệu Quản trị mạng cơ bản CCNA
395
12/2017
Cisco Secure ACS Benefits
Extends
access
security
by
combining
authentication, user access, and administrator
access with policy control
Allows greater flexibility and mobility, increased
security, and user-productivity gains
Enforces a uniform security policy for all users
Reduces the administrative and management
efforts
Advanced Features
Automatic service monitoring
Database synchronization and importing of tools for largescale deployments
Lightweight Directory Access Protocol (LDAP) user
authentication support
User and administrative access reporting
Restrictions to network access based on criteria
User and device group profiles
Tài liệu Quản trị mạng cơ bản CCNA
396
12/2017
Installation Options
Cisco Secure ACS for Windows can be installed on:
- Windows 2000 Server with Service Pack 4
- Windows 2000 Advanced Server with Service Pack 4
- Windows Server 2003 Standard Edition
- Windows Server 2003 Enterprise Edition
Cisco Secure ACS Solution Engine
- A highly scalable dedicated platform that serves as a highperformance ACS
- 1RU, rack-mountable
- Preinstalled with a security-hardened Windows software, Cisco
Secure ACS software
- Support for more than 350 users
Cisco Secure ACS Express 5.0
- Entry-level ACS with simplified feature set
- Support for up to 50 AAA device and up to 350 unique user ID logins
in a 24-hour period
Deploying ACS
Consider Third-Party Software Requirements
Verify Network and Port Prerequisites
AAA clients must run Cisco IOS Release 11.2 or later.
Cisco devices that are not Cisco IOS AAA clients must be configured with
TACACS+, RADIUS, or both.
Dial-in, VPN, or wireless clients must be able to connect to AAA clients.
The computer running ACS must be able to reach all AAA clients using
ping.
Gateway devices must permit communication over the ports that are
needed to support the applicable feature or protocol.
A supported web browser must be installed on the computer running
ACS.
All NICs in the computer running Cisco Secure ACS must be enabled.
Configure Secure ACS via the HTML interface
Tài liệu Quản trị mạng cơ bản CCNA
397
12/2017
Cisco Secure ACS Homepage
add, delete, modify settings for AAA clients (routers)
set menu display options for TACACS and RADIUS
configure database settings
Network Configuration
1. Click Network Configuration on the navigation bar
2. Click Add Entry
3. Enter the hostname
4. Enter the IP address
5. Enter the secret key
7. Make any other necessary
selections and click Submit
and Apply
Tài liệu Quản trị mạng cơ bản CCNA
6. Choose the appropriate
protocols
398
12/2017
Interface Configuration
The selection made in the Interface Configuration window
controls the display of options in the user interface
External User Database
1. Click the External User Databases button on the navigation bar
2. Click Database Configuration
3. Click Windows Database
Tài liệu Quản trị mạng cơ bản CCNA
399
12/2017
Windows User Database Configuration
4. Click configure
5. Configure options
Configuring the Unknown User Policy
1. Click External User Databases on the navigation bar
2. Click Unknown User Policy
3. Place a check in the box
4. Choose the database in from the list and click
the right arrow to move it to the Selected list
5. Manipulate the databases to reflect the order
in which each will be checked
Tài liệu Quản trị mạng cơ bản CCNA
6. Click Submit
400
12/2017
Group Setup
Database group mappings - Control authorizations for users
authenticated by the Windows server in one group and those
authenticated by the LDAP server in another
1. Click Group Setup on the navigation bar
2. Choose the
group to edit
and click
Edit Settings
3. Click Permit in the Unmatched
Cisco IOS commands option
4. Check the Command check box
and select an argument
5. For the Unlisted Arguments option,
click Permit
User Setup
1. Click User Setup on the navigation bar
2. Enter a username and click Add/Edit
3. Enter the data to define the user account
4. Click Submit
Tài liệu Quản trị mạng cơ bản CCNA
401
12/2017
Configuring Server-Based AAA
Authentication
1. Globally enable AAA to allow the user of all AAA
elements (a prerequisite)
2. Specify the Cisco Secure ACS that will provide AAA
services for the network access server
3. Configure the encryption key that will be used to
encrypt the data transfer between the network access
server and the Cisco Secure ACS
4. Configure the AAA authentication method list
AAA authentication Command
R1(config)# aaa authentication type { default | list-name } method1 … [method4]
R1(config)# aaa authentication login default ?
enable
Use enable password for authentication.
group
Use Server-group
krb5
Use Kerberos 5 authentication.
krb5-telnet
Allow logins only if already authenticated via Kerberos V
Telnet.
line
Use line password for authentication.
local
Use local username authentication.
local-case
Use case-sensitive local username authentication.
none
NO authentication.
passwd-expiry enable the login list to provide password aging support
R1(config)# aaa authentication login default group ?
WORD
Server-group name
radius
Use list of all Radius hosts.
tacacs+ Use list of all Tacacs+ hosts.
R1(config)# aaa authentication login default group
Tài liệu Quản trị mạng cơ bản CCNA
402
12/2017
Sample Configuration
•
•
Multiple RADIUS servers can be
identified by entering a radius-server
command for each
For TACACS+, the single-connection
command maintains a single TCP
connection for the life of the session
TACACS+ or RADIUS protocols are
used to communicate between the
clients and AAA security servers.
192.168.1.100
R1
Cisco Secure ACS
for Windows
using RADIUS
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
R1(config)#
aaa new-model
radius-server host 192.168.1.100
radius-server key RADIUS-Pa55w0rd
tacacs-server host 192.168.1.101
tacacs-server key TACACS+Pa55w0rd single-connection
192.168.1.101
aaa authentication login default group tacacs+ group radius local-case
Cisco Secure ACS
Solution Engine
using TACACS+
Add TACACS Support
1. Choose Configure > Additional Tasks > AAA > AAA Servers and
Groups > AAA Servers
2. Click Add
3. Choose TACACS+
192.168.1.101
4. Enter the IP address
(or hostname) of the
AAA server
5. Check the Single
Connection check box to
maintain a single
connection
7. Click OK
Tài liệu Quản trị mạng cơ bản CCNA
6. Check the Configure Key
to encrypt traffic
403
12/2017
Create AAA Login Method
1. Choose Configure>Additional Tasks>AAA>Authentication Policies>Login
2. Click Add
3. Choose User Defined
4. Enter the name
5. Click Add
6. Choose group tacacs+ from the list
7. Click OK
8. Click Add to add a backup method
9. Choose enable from the list
Click OK twice
Apply Authentication Policy
1. Choose Configure>Additional Tasks>Router Access>VTY
2. Click Edit
3. Choose the authentication
policy to apply
Tài liệu Quản trị mạng cơ bản CCNA
404
12/2017
Sample Commands
R1# debug aaa authentication
AAA Authentication debugging is on
R1#
14:01:17: AAA/AUTHEN (567936829): Method=TACACS+
14:01:17: TAC+: send AUTHEN/CONT packet
14:01:17: TAC+ (567936829): received authen response status = PASS
14:01:17: AAA/AUTHEN (567936829): status = PASS
• The debug aaa authentication command provides a view of
login activity
• For successful TACACS+ login attempts, a status message of
PASS results
Sample Commands
R1# debug radius ?
accounting
RADIUS accounting packets only
authentication RADIUS authentication packets only
brief
Only I/O transactions are recorded
elog
RADIUS event logging
failover
Packets sent upon fail-over
local-server
Local RADIUS server
retransmit
Retransmission of packets
verbose
Include non essential RADIUS debugs
<cr>
R1# debug radius
R1# debug tacacs ?
accounting
TACACS+
authentication TACACS+
authorization
TACACS+
events
TACACS+
packet
TACACS+
<cr>
Tài liệu Quản trị mạng cơ bản CCNA
protocol
protocol
protocol
protocol
packets
accounting
authentication
authorization
events
405
12/2017
AAA Authorization Overview
show version
Command authorization for user
JR-ADMIN, command “show version”?
Display “show
version” output
configure terminal
Accept
Command authorization for user
JR-ADMIN, command “config terminal”?
Do not permit
“configure terminal”
•
•
•
The TACACS+ protocol allows the separation of authentication from authorization.
Can be configured to restrict the user to performing only certain functions after successful
authentication.
Authorization can be configured for
–
–
•
Reject
character mode (exec authorization)
packet mode (network authorization)
RADIUS does not separate the authentication from the authorization process
AAA Authorization Commands
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default group tacacs+
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# aaa authorization exec default group tacacs+
R1(config)# aaa authorization network default group tacacs+
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
R1(config-line)# ^Z
•
•
To configure command authorization, use:
aaa authorization service-type {default | list-name} method1 [method2] [method3]
[method4]
Service types of interest include:
–
–
–
commands level
For exec (shell) commands
exec
For starting an exec (shell)
network
For network services. (PPP, SLIP, ARAP)
Tài liệu Quản trị mạng cơ bản CCNA
406
12/2017
Using SDM to Configure Authorization
Character Mode
1. Choose Configure>Additional Tasks>AAA>Authorization Policies>Exec
2. Click Add
3. Choose Default
4. Click Add
5. Choose group tacacs+ from the list
6. Click OK
7. Click OK to return to the Exec Authorization window
1. Choose Configure>Additional Tasks>AAA>Authorization Policies>Network
2. Click Add
3. Choose Default
4. Click Add
7. Click OK to return to
5. Choose group tacacs+ from the list
the Exec Authorization
pane
6. Click OK
Tài liệu Quản trị mạng cơ bản CCNA
407
12/2017
AAA Accounting Overview
Provides the ability to track usage, such as dial-in access; the
ability to log the data gathered to a database; and the ability
to produce reports on the data gathered
To configure AAA accounting using named method lists:
aaa accounting {system | network | exec | connection
| commands level} {default | list-name} {start-stop | waitstart | stop-only | none} [method1 [method2]]
Supports six different types of accounting: network,
connection, exec, system, commands level, and resource.
AAA Accounting Commands
R1# conf t
R1(config)# username JR-ADMIN secret Str0ngPa55w0rd
R1(config)# username ADMIN secret Str0ng5rPa55w0rd
R1(config)# aaa new-model
R1(config)# aaa authentication login default group tacacs+
R1(config)# aaa authentication login TELNET-LOGIN local-case
R1(config)# aaa authorization exec group tacacs+
R1(config)# aaa authorization network group tacacs+
R1(config)# aaa accounting exec start-stop group tacacs+
R1(config)# aaa accounting network start-stop group tacacs+
R1(config)# line vty 0 4
R1(config-line)# login authentication TELNET-LOGIN
R1(config-line)# ^Z
•
•
aaa accounting exec default start-stop group tacacs+
Defines a AAA accounting policy that uses TACACS+ for logging both start
and stop records for user EXEC terminal sessions.
aaa accounting network default start-stop group tacacs+
Defines a AAA accounting policy that uses TACACS+ for logging both start
and stop records for all network-related service requests.
Tài liệu Quản trị mạng cơ bản CCNA
408
12/2017
CHAPTER 16 BACKUP, RESTORE, UPGRACE
1 BACKUP, RESTORE
Tài liệu Quản trị mạng cơ bản CCNA
409
12/2017
Back up and Restore Configuration Files
Requirements Before you use the information in
this document, make sure that you meet these
requirements:
Access to a Trivial File Transfer Protocol (TFTP) or
File Transfer Protocol (FTP) server.
Connectivity − Routers must be able to access the
FTP or TFTP server. Use the ping command to verify
connectivity.
Make a Backup of the Configuration
Use a TFTP Server to Backup and Restore a
Configuration
Use an FTP Server to Backup and Restore a
Configuration
Use a Terminal Emulation Program to Backup and
Restore a Configuration
Verify
Tài liệu Quản trị mạng cơ bản CCNA
410
12/2017
Tài liệu Quản trị mạng cơ bản CCNA
411
12/2017
2 UPGRADING THE CISCO IOS SOFTWARE
Tài liệu Quản trị mạng cơ bản CCNA
412
12/2017
Why Would I Upgrade the System Image?
At some point, you may want to load a different
image onto the router or the access point. For
example, you may want to upgrade your IOS
software to the latest release, or you may want to
use the same Cisco IOS release for all the routers in
a network. Each system image contains different
sets of Cisco IOS features, therefore select an
appropriate system image to suit your network
requirements.
Tài liệu Quản trị mạng cơ bản CCNA
413
12/2017
How to Upgrade the Cisco IOS Image
This section provides information about upgrading the Cisco
IOS image on the router.
Saving Backup Copies of Your Old System Image and
Configuration
Ensuring Adequate DRAM for the New System Image,
Ensuring Adequate Flash Memory for the New System
Image
Copying the System Image into Flash Memory
Loading the New System Image
Saving Backup Copies of Your New System Image and
Configuration, pag
Tài liệu Quản trị mạng cơ bản CCNA
414
Download