Professional Documents
Culture Documents
0haracteristics include2
0o%er large areas . may span the world
0ompared to LANs . slow speed communication
Access to 1ANs is limited . a LAN will access a 1AN through a single point $o!ten a
bottleneck&
1ill use de%ices such as routers, modems and WAN switches
*>?, March *+ . The telephone is in%ented
/ =
*@>6 Aebruary 4 The Mercury consortium recei%ed a licence to build and operate an
independent network to compete across the !ull range o! telecoms ser%ices)
*@>7 April 4 Mercury launched its !irst telecoms ser%ices in the 0ity o! London)
May Licences were granted to 0ellnet and (oda!one to pro%ide national cellular radio
networks)
*@>, May 4 Mercury began o!!ering basic network ser%ices
Barly *@,+s Ad%anced Research #roCects Agency $AR#A& begins work on AR#Anet
Airst nodes connected to 3ni%ersity o! 0ali!ornia
*@?* . 67 nodes now connected
*@?= 4 #ackets and T0# established
*@?, 4 The :ueen sends her !irst email
T0#/"# de!ines !uture communications
*@>, 4 sees ;+++ hosts and 6=* newsgroups
*@>? 4 sees 6>+++ hosts
*@>> 4 "nternet Relay 0hat $"R0& de%eloped
*@>@ 4 Military portion split o!! as DAR#Anet, lea%ing public in!rastructure now known as
E"nternetF
Success o! "nternet due to BSD 3N"G
MaCor American uni%ersities !orm !irst backbone !or the "nternet known as NSANBT
*@>@ 4 hosts now o%er *++ +++
*@@+ 4 Airst "S# EThe 1orldF comes on line
*@@* 4 sees !irst commercial use o! "nternet
*@@* 4 A Briton $Tim Berners4Lee& establishes 1orld 1ide 1eb $released by 0BRN&
*@@= 4 0ommercialisation Begins $7 million hosts, *+ +++ 111 sites, *+ +++ News Hroups
*@@= 4 Airst pi''a !rom #i''a ut online in 3S
*@@; 4 ,); Million hosts, *++ +++ web sites
*@@; 4 Search Bngines
*@@, 4 Microso!t enter) Browser war begins
*@@? 4 6+ Million hosts, * * Million 111 sites
*@@? onwards . growth is EexponentialF I)
The Abilene #roCect $"nternet 6&, @; uni%ersities, *6 regional giga#-#s
/ ;
/ ,
/
Basic LAN Configuration
?
/
This kind Of Cable is looking like a Dish net cable.
Co-axial Cable is a old Technology
It uses BNC connector
BNC Connector
BNC Terminator & BNC Barrell
BNC T Connector
lo! "eed of Transmission
#sed in $ogical and %hysical Bus To"ology
&irst 'eneration Cable
It o(erla"s by T!isted %air cables yet
>
/
There Are Several Kinds of Networking Cables
Co-axial Cable
Twisted Pair
Fiber Optic
These are Soe cables !sing for networking
That eans we can attach ore than two or ore devices in
A network" These are soe g!ided edia"
#!ided $edia % Ph&sical $edia which are !sef!l to co-
!niciate o!r cop!ter
@
/
Coaxial Cable is Devided in four parts.
Inner Conductor is a solid metal wire surrounded by
insulation
A tin tubular piece of metal is surrounds on tat insulation
!creen outer conductor is tere for covered tat cable
"uter #lastic Covering
$innet Coaxial Cable
$ic%net Coaxial Cable
*+
/
$innet Coaxial Cable &
'.()* tic%ness
lengt is +,) meter
flexible- tin- ceap
Baseband !ignal
$ic%net Coaxial Cable
'.)'* tic%ness
lengt is )'' meter
.ard- tic%- expensive
Broadband !ignal
$ese are two different types of
coaxial cable.
**
/
$is is te most popular type of cable wic is also
!ubparts of it. $at is transfer voice in place of data
$is %ind of cable is used for a long time firstly it is
Introduced wit telepone cable tan it is used in
networ%ing of computers.
*6
/
!ielded $wisted #air
/nsielded $wisted #air
$is is unsielded twisted #air Cable type wic is not coverd
By any %ind of !ield tere is only tree parts of tat cable
#vc 0ac%et
1oil
Copper 2ire
But in a !ielded $wisted #air cable
$ere is four parts of cable all tose uppers wit a siels of copper
*7
/
Cat + 3oice only ( #airs4 5wire Dtr 6 ( 7bps
Cat ( 3oice 8 Data only 5 #airs4 ,wire Dtr 6 5 7bps
Cat 9 3oice 8 Data only 5 #airs4 ,wire Dtr 6 , 7bps
Cat 5 3oice 8 Data only 5 #airs4 ,wire Dtr 6 +: 7bps
Cat ) 3oice 8 Data only 5 #airs4 ,wire Dtr 6 +'' 7bps
Cat )e 3oice 8 Data only 5 #airs4 ,wire Dtr & +''' mbps
Cat : 3oice 8 Data only 5 #airs4 ,wire Dtr & +'''mbps
*=
!andeep Aga rwal
Cut- !trip 8 Crimp $ools
7a%e your own
patc cords
Cuts and strips
pairs
;05) end crimped
onto ends of wire
/ *;
/
#atc #anel
$ermination
puncdown in bac%
#atc cord plugin in
front
*,
/
Cabling ;ules
Tr& to avoid r!nning cables parallel to power cables"
'o not bend cables to less than fo!r ties the diaeter of the cable"
(f &o! b!ndle a gro!p of cables together with cable ties )*ip ties+, do not
over-cinch the" -o! sho!ld be able to t!rn the tie with fingers"
Keep cables awa& fro devices which can introd!ce noise into
the" .ere/s a short list0 cop& achines, electric heaters, speakers,
printers, T1 sets, fl!orescent lights, copiers, welding achines,
icrowave ovens, telephones, fans, elevators, otors, electric
ovens, dr&ers, washing achines, and shop e2!ipent"
Avoid stretching 3TP cables )tention when p!lling cables sho!ld not
exceed 45 67S+"
Do not run #T% cable outside of a building. It "resents a (ery
dangerous lightning ha)ard*
'o not !se a stapler to sec!re 3TP cables" 3se telephone wire89:;
coaxial wire hangers which are available at ost hardware stores"
Color Codes
0rosso%er
* 7
6 ,
*?
/
7a%ing Cables
*>
/
$is is advanced type of cable used in modern tecni<ue.
It does not $ransfer te data in a voice format it uses electronic
signal to transmit $e data. It is not so popular because it is
very costly. It*s speed is very 1ast and it is very easy to
access data wit tese media on better transmission speed.
1iber #atc Cords
=9'
>nds are eiter !C
or !$
Connects switces 8
fast bac%bones
*@
/
#unc Down $ool
$erminates wires to
bac% of patc
panels
6+
1hat is the -S" model J
K Open Systems Interconnection model is !undamental to all communications between network
de%ices)
K De%eloped in *@?= by "$% a!ter the American Department o! De!ence began using the
T0#/"# suite o! protocols)
K Ainally adopted in *@??) "t is now the theoretical model !or how communication takes place
between network de%ices
/
2ire $esting ><uipment
$est wire for
correct
termination of ,
wires
$est for speed
capabilities
i.e. 2ave$e%Brand
6*
S!pports the co!nication between
applications over the network
Presents data to the receiver
in a for it recognises
<stablishes a connection and
terinates it when no longer re2!ired
Acknowledges the flow of data
incl!ding re-transission where re2!ired
Adds the appropriate network
addresses to packets
Adds the $AC addresses to packets
Transits the data on the edi!
NOD+ ,
ending De(ice
NOD+ B
-ecei(ing De(ice
$ayer .
Application 6a&er
$ayer /
Presentation 6a&er
$ayer 0
Session 6a&er
$ayer 1
Transport 6a&er
$ayer 2
Network 6a&er
$ayer 3
'ata 6ink 6a&er
$ayer 4
Ph&sical 6a&er
$ayer .
Application 6a&er
$ayer /
Presentation 6a&er
$ayer 0
Session 6a&er
$ayer 1
Transport 6a&er
$ayer 2
Network 6a&er
$ayer 3
'ata 6ink 6a&er
$ayer 4
Ph&sical 6a&er
Bncapsulation
/
Session
#hysical
Transport
Network
Data Link
#resentation
Application
2at are te seven layers ?
Layer ?
Layer,
Layer ;
Layer =
Layer 7
Layer 6
Layer *
66
Appli cat ion
Present at i on
Sessi on
Transport
Net work
Dat a Li nk
Physi cal
DATA
DATA
DATA
DATA
DATA
DATA
Presentat i on Header
Session Header
Transport Header
Network Header
Data Link Header Data Link Trai ler
PH
SH
TH
NH
DLH DLT
PH
PH
PH
PH
SH
SH
SH
TH
TH NH
Bi ts
To Destination Device
,a%"r
Na-"
a.i ,a%"r Fun'ion T%+" of A++.ia'ion 7 Pro'oo.& U&"d
Applicatio
n
3p
per
La
yer
s
#ro%ides a 3ser "nter!ace / !ile,
print, message, database and
application ser%ices
111, B4mail gateways $SMT# or
G)=++&
BD" $Blectronic data interchange . !low
control o! accounting, shipping, in%entory
tracking&
Special "nterest bulleting boards . chat
rooms
"nternet na%igation utilities . Hoogle L
MahooN Search engines, Hopher, 1A"S
Ainancial transaction ser%ices . currency
exchange rates, market
trading,commodities etc)
#resentati
on
#resents Data, andles
processes o! encryption,
compression and translation
ser%ices
#"0T, T"AA, O#BH, M"D", M#BH, RTA,
Puick Time $manages audio and %ideo
applications o! Macintosh programmes&
Session Setting up, managing and
ending up sessions between
presentation layer entities,
<eeps di!!erent applications9
data separate / Dialog 0ontrol
NAS, SPL, R#0, G 1indow $H3" based
protocol . like H3" inter!ace in Linux&,
Apple Talk Session #rotocol $AS#&,
Digital Network Architecture Session
0ontrol #rotocol $DNA S0& . DB0net
session layer protocol
Transport Lo
we
r
La
yer
s
Bnd to Bnd 0onnecti%ity /
#ro%ides reliable or unreliable
deli%er, #er!orms error
correction be!ore retransmit)
<nown as Co--unia'ion
,a%"r also
$T0#/3D#& Alow 0ontrol2 pre%ents bu!!er
!rom o%er!lowing in recei%ing host . no
loss o! data, 0onnection -riented
#rotocol, 1indowing .
Acknowledgement
/ 67
Network Routing / #ro%ides logical
addressing, which routers use
!or path determination
#asses 3ser Data #ackets . routed
protocols $"#/"#G&
#asses Route 3pdate #ackets . routing
protocols $R"#, "HR#, B"HR#, -S#A,
BH#&
Routing Tables 2 #rotocol4speci!ic
network address, Bxit "nter!ace, Metric
$load, reliability, bandwidth, MT3, hop
count . distance&, Access lists, (LAN
0onnections, PoS !or speci!ic network
tra!!ic
Data Link Araming / 0ombines packets
into bytes and bytes into
!rames, #ro%ides access to
media using MA0 address,
#er!orms error detection not
correction
#ro%ides physical transmission o! data and
handles error noti!ication, network
topology and !low control)
MA0 Layer $>+6)7&2 De!ines how packets
are placed on media) #hysical addressing,
logical topologies $signal path through
physical topology&, line discipline, error
noti!ication $not correction&, ordered
deli%ery o! !rames, optional !low control)
LL0 Layer $>+6)6&2 "denti!y the network
layer protocols and then encapsulate them)
Decides where to destined the packed
when !rame recei%ed $"# #rotocol at the
network layer&, !low control and
se:uencing o! control bits)
Layer 6 Switches and Bridges work here)
#hysical #hysical topology / Mo%es bits
between de%ices, speci!ies
%oltage, wire speed and pin4out
o! cables
Sends / recei%es bits) $+s/*s&) Di!!erent
signaling methods !or di!!erent type o!
medias) 1e can identi!y the inter!ace
between DTB $attached de%ice& and D0B
$located at ser%ice pro%ider& DTB can be
accessed through modem or 0S3/DS3)
,a0 Equi+-"n'
Although lab e:uipment is not needed to bene!it !rom this book, ha%ing your own e:uipment is
highly recommended) By being able to !ollow the commands outlined in this book, you will
experience !or yoursel! the process o! con!iguring a network !rom the ground up) "! you choose to
obtain your own e:uipment, Table *47 lists all the needed e:uipment !or this lab network)
Ta0." 829: ,a0 Equi+-"n'
Hard(ar"; <uan'i'%
0atalyst *@++ series switch *
0isco 6;+* 7
0isco 6;+= 6
0isco 6;*= *
/ 6=
Ta0." 829: ,a0 Equi+-"n'
Hard(ar"; <uan'i'%
0isco 6;67 *
0isco 6;** *
Black Box "SDN Simulator *
0ables2
0at ; straight4through cables with RO4=; connectors $!or "SDN ports& 6
0at ; Bthernet cables with RO4=; connectors ,
Token Ring DB@.to.Type * inter!ace cable 6
Standard power cables @
()7; DTB4D0B back4to4back cables $DB,+ to DB,+& =
-ctal cable $Aor terminal ser%er 6;**& *
Miscellaneous2
Bthernet A3".to.RO4=; Transcei%er ,
Token Ring MA3 6
#ower strips
Q*R
SSS
E'$"rn"' N"'(or!in);
A media access method that allows all hosts on a network to share the same bandwidth o! a link
"t is scalable to Aast Bthernet and Higa Bthernet
Basy to implement and troubleshoot
3se Data Link and #hysical layer speci!ications
3ses 0SMA/0D protocol to a%oid collision o! data being trans!erred by two de%ices at the same
time
B!!ect o! 0SMA/0D network sustaining hea%y collision like Delay, Low throughput and
0ongestion
al! Duplex $>+6)7& uses one pair o! wire with a signal running in both directions on the wire
Aull Duplex uses two pairs o! wire and sends and recei%es the data on separate pair makes data
trans!er !aster
Aull Duplex can be used between Switch to host, Switch to Switch, ost to ost
1hen powered on, !irst connects to remote end, negotiate with the other end $called auto detect
mechanism method& which decides the exchange capability $*+/*++/*+++ Mbps&)
E'$"rn"' a' '$" Da'a ,in! ,a%"r ;
MA0 Addressing and data trans!er takes place through the !orm o! !rames like Bthernet "" !rame,
>+6)7 Bthernet !rame, >+6)6 SNA# !rame and >+6)6 SA# !rame)
8= Ba&" > ; *+ Mbps, baseband technology, *>; Mtrs) length, thinnet, supports up to 7+ nodes on a
single segment) 3se BN0 $British Na%al 0onnector& and T4connectors) 3se logical and physical bus
with A3" $*; pins& connectors) $Attachment 3nit "nter!ace allows one bit4at4a4time trans!er to the
physical layer !rom data link media access method)&
/ 6;
8= Ba&" 5 ; *+ Mbps, baseband technology, ;++ Mtrs) length, thicknet, up to *+6= users with 6;++
meters with repeaters) 3se logical and physical bus with A3" connectors)
8= Ba&" T ; *+ Mbps using 0at 7 3T# wiring, each de%ice must connect to hub/switch so one host
per segment or wire) 3ses RO4=; connector $> pin modular connector& with physical star and logical
bus topology)
8== Ba&" T? ; B"A/T"A 0at ;,,,or ? 3T# two4pair wiring) -ne user per segment, up to *++ Mtrs)
long) RO4=; 0onnector with a physical star and a logical bus topology) 3se M"" 44 Media
"ndependent "nter!ace $uses nibble, de!ined as = bits& which pro%ides *++ Mbps throughput)
8== Ba&" F? ; 3se !iber cabling ,6);/*6;4micron multimode !iber) #oint4to4point technology, up to
=*6 Mtrs) long, ST or S0 connector which are M"")
8=== Ba&" C? ; 0opper twisted4pair called twinax $a balanced coaxial pair& that can run up to only
6; meters) HM"" inter!ace)
8=== Ba&" T ; 0at ; 3T# !our pair wiring up to *++ meters long)
8=== Ba&" S? ; MMA using ,6);/;+ micron core, uses >;+ nano4meter laser, and range is !rom 7
<ms to *+ <ms
T$" Ci&o T$r""2,a%"r Hi"rar$ia. Mod".
T$" Cor" ,a%"r @ Ba!0on"
T$" Di&'ri0u'ion ,a%"r @ Rou'in)
T$" A"&& ,a%"r @ S(i'$in)
T$" Cor" ,a%"r;
Responsible !or transporting large amounts o! tra!!ic reliably and :uickly
-nly purpose is to switch tra!!ic as !ast as possible
"! !ailure, e%ery single user will be a!!ected
ADD", Aast Bthernet and ATMs are suitable technologies
Routing protocols with lower con%ergence time
T$" Di&'ri0u'ion ,a%"r;
Re!erred to as 1orkgroup Layer also
0ommunication point between core and access layers
#ro%ides routing, !iltering and 1AN access and how packets access to the core i! needed
#lace where policies are de!ined !or network like 4444
Routing
Access lists, packet !iltering, :ueuing
Security and network policies, including address translation and !irewalls
Redistributing between routing protocols and static routing
Routing between (LANs
De!initions o! broadcast and multicast domains
T$" A"&& ,a%"r;
Also known as Desktop Layer
/ 6,
0ontrols user and workgroup access to inter network resources
Layer where end user directly connects
0ontinued access control and policies !rom distribution layer
0reates separate collision domain
1orkgroup connecti%ity into the distribution layer
DDR and Bthernet Switching technologies
TCP7IP & DoD Mod".
T0#/"# suit was created by the Department o! De!ense to ensure and preser%e data integrity)
DoD Mod". OSI Mod". Pro'oo.&
U&"d
Fun'ion
#rocess/
Application
Application Telnet,
AT#,
L#D, SNM#,
TAT#, SMT#,
NAS, G
1indow
De!ines protocols !or node4to4node
application communication and also
controls user4inter!ace speci!ications)
#resentation
Session
ost4to4
ost
Transport T0#, 3D# De!ines protocols !or transmission ser%ice,
creates reliable end4to4end error !ree
communication, handles packet4se:uencing
and maintains data integrity)
"nternet Network "0M#, AR#,
"# RAR#,
B"HR#,
"HR#, -S#A
Designates the packet !or transmission o%er
network, pro%ides "# addresses to hosts and
handles routing o! packets among multiple
networks)
Network
Access
Data link
#hysical
Bthernet, Aast
Bthernet,
Token Ring,
ADD"
Monitors the data exchange between the
host and the network) -%ersees hardware
addressing and de!ines protocols !or
physical transmission o! data)
TCP H"ad"r For-a'
Bit + Bit *; Bit*, Bit 7*
Source #ort $*,& Destination #ort $*,&
Se:uence Number $76&
Acknowledgement Number $76&
eader
Length
$=&
Reser%ed
$,&
0ode Bits
$,&
1indow $*,&
0hecksum $*,& 3rgent $*,&
-ptions $+ or 76 i! any&
Data $%aries&
The T0# header is 6+ bytes long, or 6= bytes with options)
UDP H"ad"r For-a'
/ 6?
Bit + Bit *; Bit *, Bit 7*
Source #ort $*,& Destination #ort $*,&
Length $*,& 0hecksum $*,&
Data $i! any&
Diff"r"n"&;
TCP UDP
Se:uenced 3n se:uenced
Reliable 3nreliable
0onnection4oriented 0onnectionless
(irtual circuit Low o%erhead
Acknowledgements No acknowledgements
1indowing !low control No windowing or !low control
Por' Nu-0"r&;
T0# and 3D# must use port numbers to communicate with upper layers, because they keeps track o!
di!!erent con%ersations crossing the network simultaneously) Source port numbers are assigned by
the source host dynamically with port starting number *+6=)
Por' Nu-0"r& for TCP and UDP
Application Layer
#ort Numbers
Transport Layer
AT# Telnet Doom DNS TAT# #-#7 News
T0# 3D#
#ort Numbers below *+6= are well4known ports and de!ined in RS 7676
*+6= L abo%e are used by upper layers to set up sessions with other hosts, and by T0# to use as
source and destination addresses in T0# segment
IP H"ad"r
Bit + Bit *; Bit *, Bit 7*
(ersi
on $=&
eader
Length
$=&
#riority and
Type o! Ser%ice
$>&
Total Length
$*,&
"denti!ication $*,& Alags
$7&
Aragment -!!set $*7&
Time to Li%e $>& #rotocol $>& eader 0hecksum $*,&
Source "# Address $76&
Destination "# Address $76&
-ptions $+ or 76 i! any&
Data $%aries i! any&
Pro'oo. fi".d in '$" IP $"ad"r
Transport Layer T0# 3D#
/ 6>
**
@
**
+
,
@
;
7
,,
,
6
7
6
*
*? ,
#rotocol Number
"nternet Layer
"#
"n this example, protocol !ield tells "# header to send the data to either T0# $,& or 3D# $*?& port)
Po&&i0." +ro'oo.& found in +ro'oo. fi".d of '$" IP $"ad"r
Pro'oo. Pro'oo.
Nu-0"r
"0M# *
"HR# @
B"HR# >>
-S#A >@
"p%, =*
HRB =?
"#G in "# ***
Layer 6 Tunnel $L6T#& **;
ICMP
"nternet 0ontrol Message #rotocol works at the Network layer and is used by "# !or many di!!erent
ser%ices) "0M# is a management protocol and messaging ser%ice pro%ider !or "#)
"ts messages are carried as "# datagrams)
E/"n'& of ICMP;
D"&'ina'ion Unr"a$a0."; "! router doesn9t know about the destination !or packet it recei%ed, it will
send and "0M#4Destination 3nreachable message back to the sending station)
Buff"r Fu..; "! a router9s memory bu!!er !or recei%ing incoming datagrams is !ull, it will send the
message until the congestion abates)
Ho+&; Bach "# datagram is allotted a certain number o! routers, called hops, to pass through) "! it
reaches its limit o! hops be!ore arri%ing at its destination, the last router to recei%e that datagram
deletes it)
Pin) (Pa!"' In'"rn"' 6ro+$"r); 3ses "0M# echo messages to check the physical and logical
connecti%ity o! machines on an internetwork)
Tra"rou'"; 3sing "0M# timeouts, traceroute is used to disco%er the path a packet takes as it
tra%erses an internetwork)
ARP (Addr"&& R"&o.u'ion Pro'oo.)
AR# !inds hardware address !rom known "# address
1hen "# has a packet to send, it must in!orm the Network Access #rotocol $Bthernet or Token
Ring& o! the destination9s hardware address on the local network)
"! "# doesn9t !ind the destination host9s hardware address in the AR# cache, it uses AR# to !ind
this in!ormation)
AR# will work as "#9s detecti%e by interrogating the local network by sending out a broadcast
with host9s "# address and asking !or the hardware address)
RARP (R"/"r&" Addr"&& R"&o.u'ion Pro'oo.)
/ 6@
Resol%es MA0 address into "# address
1hen any machine without disks know its MA0 address, not "# address, so it broadcast its MA0
address to get its "# address to communicate to the network)
Then this re:uest go to the RAR# Ser%er through RAR# re:uest and that ser%er will assign one "#
address to the recei%ed MA0 address and thus the sending host will recei%e the MA0 and "# address
!rom the ser%er)
Binar% 'o D"i-a. and H"3ad"i-a. Con/"r&ion
Ni00." Aa.u"& (B 0i'&) @ C B > 8
B%'" Aa.u"& (C 0i'&) @ 8>C DB 9> 8D C B > 8
exa to Binary to Decimal 0hart
exadecimal (alue Binary (alue Decimal (alue
+ ++++ +
* +++* *
6 ++*+ 6
7 ++** 7
= +*++ =
; +*+* ;
, +**+ ,
? +*** ?
> *+++ >
@ *++* @
A *+*+ *+
B *+** **
0 **++ *6
D **+* *7
B ***+ *=
A **** *;
Bxample 2
*& +x,A T $to con%ert hex %alue to binary/decimal, take = bits as a nibble&
exa use nibble $= bits& to represent one character
ere two characters T , and A) $+x is a cisco style to know that they are a hex
%alue, no any special meaning otherwise& So , T +**+ and A T *+*+
Total > bits T +**+*+*+ T binary
And decimal would be the total o! binary, that is T *+,
6& +*+*+*+* T $to con%ert !rom binary to hex %alue, take a byte and break it into nibble&
so it would be two nibble here like +*+* and +*+*
now +*+* T ; $see the table& and other +*+* is also T ;
so hex %alue would be ;; !or +*+*+*+* binary number $?; in binary&
IP Addr"&&in)
An "# address is a numeric identi!ier assigned to each machine on an "# network
"t designates the speci!ic location o! a de%ice on the network
"t is a so!tware $logical& address, not a hardware $physical& address like N"0
/ 7+
"t was designed to allow host on one network to communicate the with a host on other network
regardless o! the types o! LANs the hosts are participating in
IP T"r-ino.o)%
Bi' A bit is one digitU either a * or a +
B%'" A byte is ? or > bits, depending on whether parity is used) Mostly > bits)
O'"' Made up o! > bits, same as byte
N"'(or! addr"&& The designation used in routing to send packets to a remote network
Bxample 2 *+)+)+)+, *?6)*,)+)+ and *@6)*,>)+)+
Broada&' addr"&& The address used by the applications and hosts to send in!ormation to all
nodes on a network is called the !roadcast address.
Bxample 2 6;;)6;;)6;;)6;; which is all networks, all nodes on network
*?6)*,)6;;)6;; which is all subnets, all hosts on network
*?6)*,)+)+
*+)6;;)6;;)6;; which broadcasts to all subnets and hosts on
network *+)+)+)+
T$" $i"rar$ia. IP Addr"&&in) S$"-"
The "# address consists o! 76 bits o! in!ormation which are di%ided into = octets or bytes o! > bits
each) Mou can depict an "# address using one o! the three methods2
*& Dotted4decimal, as in *?6)*,)7+);,
6& Binary, as in *+*+**++)+++*++++)+++****+)++***+++
7& exadecimal, as in A0)*+)*B)7>
All these examples represent the same "# address
The 1indows Registry key is a program that stores machine9s "# address in hex %alues
Maximum =)7 billion $=,6@,=@,,?,6@,&
"t is a structured two4three layer numbering scheme which is based on telephone numbering
system like one large geographical code, then pre!ix, narrows the scope to a local calling area and
then the !inal segment 'ooms with direct customer number)
Same in "# . network and host, or network, subnet and host)
N"'(or! Addr"&&in)
M"dia A"&& Con'ro. addr"&& $MAC addr"&&
E'$"rn"' Hard(ar" Addr"&& $EHA&, $ard(ar" addr"&&, ada+'"r addr"&& or +$%&ia. addr"&& is
a :uasi4uni:ue identi!ier assigned to most network adapters or network inter!ace cards $N"0s& by the
manu!acturer !or identi!ication) "! assigned by the manu!acturer, a MA0 address usually encodes the
manu!acturerVs registered identi!ication number)
Three numbering spaces, managed by the "nstitute o! Blectrical and Blectronics Bngineers $"BBB&,
are in common use !or !ormulating a MA0 address2 MAC2BC, EUI2BC, and EUI2DB) The "BBB
claims trademarks on the names WB3"4=>W and WB3"4,=W, where WB3"W stands !or E3'"nd"d Uniqu"
Id"n'ifi"r)
"n T0#/"# networks, the MA0 address o! a subnet inter!ace can be :ueried with the "# address using
the Address Resolution #rotocol $AR#& !or "nternet #rotocol (ersion = $"#%=& or the Neighbor
/ 7*
Disco%ery #rotocol $ND#& !or "#%,) -n broadcast networks, such as Bthernet, the MA0 address
uni:uely identi!ies each node and allows !rames to be marked !or speci!ic hosts) "t thus !orms the
basis o! most o! the Link layer $-S" Layer 6& networking upon which upper layer protocols rely to
produce complex, !unctioning networks)
The standard $"BBB >+6& !ormat !or printing MA04=> addresses in human4!riendly !orm is six
groups o! two hexadecimal digits, separated by hyphens $-& or colons $:&, in transmission order, e)g)
01-23-45-67-89-ab, 01:23:45:67:89:ab) This !orm is also commonly used !or B3"4,=) -ther less
common con%entions use three groups o! !our hexadecimal digits separated by dots $.&, e)g)
0123.4567.89abU again in transmission order)
Addr"&& d"'ai.&
All three numbering systems use the same !ormat and di!!er only in the length o! the identi!ier)
Addresses can either be Wuni%ersally administered addressesW or Wlocally administered addresses)W
A uni/"r&a..% ad-ini&'"r"d addr"&& is uni:uely assigned to a de%ice by its manu!acturerU these are
sometimes called Wburned4in addressesW $B"A&) The !irst three octets $in transmission order& identi!y
the organi'ation that issued the identi!ier and are known as the -rgani'ationally 3ni:ue "denti!ier
$-3"&)
Q6R
The !ollowing three $MA04=> and B3"4=>& or !i%e $B3"4,=& octets are assigned by that
organi'ation in nearly any manner they please, subCect to the constraint o! uni:ueness) The "BBB
expects the MA04=> space to be exhausted no sooner than the year 6*++U B3"4,=s are not expected
to run out in the !oreseeable !uture
Qcitation neededR
)
A .oa..% ad-ini&'"r"d addr"&& is assigned to a de%ice by a network administrator, o%erriding the
burned4in address) Locally administered addresses do not contain -3"s)
3ni%ersally administered and locally administered addresses are distinguished by setting the second
least signi!icant bit o! the most signi!icant byte o! the address) "n B3"4,= addresses, i! the bit is +, the
/ 76
address is uni%ersally locally administered) "! it is *, the address is locally globally administered) The
bit is + in all -3"s) Aor example, +64++4++4++4++4+*) The most signi!icant byte is +6h) The binary is
++++++8+ and the second least signi!icant bit is *) There!ore, it is a locally administered address)
Q7R
"! the least signi!icant bit o! the most signi!icant byte is set to a +, the packet is meant to reach only
one recei%ing N"0) This is called unicast) "! the least signi!icant bit o! the most signi!icant byte is set
to a *, the packet is meant to be sent only once but still reach se%eral N"0s) This is called multicast)
The !ollowing technologies use the MA04=> identi!ier !ormat2
Bthernet
>+6)** wireless networks
Bluetooth
"BBB >+6); token ring
most other "BBB >+6 networks
ADD"
ATM $switched %irtual connections only, as part o! an NSA# address&
Aibre 0hannel and Serial Attached S0S" $as part o! a 1orld 1ide Name&
The distinction between B3"4=> and MA04=> identi!iers is purely semantic2 MA04=> is used !or
network hardwareU B3"4=> is used to identi!y other de%ices and so!tware) $Thus, by de!inition, an
B3"4=> is not in !act a WMA0 addressW, although it is syntactically indistinguishable !rom one and
assigned !rom the same numbering space)&
The "BBB now considers the label MA04=> to be an obsolete term which was pre%iously used to
re!er to a speci!ic type o! B3"4=> identi!ier used to address hardware inter!aces within existing >+64
based networking applications and should not be used in the !uture) "nstead, the term B3"4=> should
be used !or this purpose)
"t uni:uely identi!ies each network
B%ery machine on the same network shares that network address as part o! its "# address
"n "# address *?6)*,)7+);,, *?6)*, is network number and 7+);, is node number
The networks are classi!ied into three classes
0lass A 2 small number o! networks with large number o! hosts
0lass B 2 between %ery large networks and large hosts
0lass 0 2 numerous networks with small amount o! hosts
0lass A Network ost ost ost
0lass B Network Network ost ost
0lass 0 Network Network Network ost
0lass D Multicast
0lass B Research
De!ined heading bit !or classes to make routing decision !aster
0lass A 2 =1 0lass B 2 8=1 0lass 0 2 88=
$which helps router to decide which class an "# address belongs and make !aster routing decision&
/ 77
R"&"r/"d IP Addr"&&"&
Addr"&& Fun'ion
Network address o! all +s this network or segment
Network address o! all *s All networks
Network *6?)+)+)* Reser%ed !or loopback tests) Designates the local node and
allows that node to send a test packet to itsel! without
generating network tra!!ic
Node address o! all +s Network address or any host on speci!ied network
Node address o! all *s All nodes, on the speci!ied network, !or example,
*6>)6)6;;)6;; means all nodes on network *6>)6 $class B
network&
Bntire "# address set to all +s 3sed by 0isco routers to designate the de!ault root) 0ould
also mean any network
Bntire "# address set to all *s
$same as 6;;)6;;)6;;)6;;&
Broadcast to all nodes on the current networkU sometimes
called an all *s broadcast or limited broadcast
C.a&& A addr"&&"&;
Network.node.node.node
Range : 1.0.0.0 to 127.255.255.254
0lass A (alid ost "Ds
All host bits o!! is the network address2 *+)+)+)+
All host bits on is the broadcast address2 *+)6;;)6;;)6;;
(alid hosts are between the network address and broadcast address2 *+)+)+)* through
*+)6;;)6;;)6;=)
C.a&& B addr"&&"&;
Network.network.node.node
Range: 128.0.0.1 to 191.255.255.254
0lass B (alid ost "Ds
All host bits turned o!! is the network address2 *?6)*,)+)+
All host bits turned on is the broadcast address2 *?6)*,)6;;)6;;
(alid hosts between network and broadcast address2 *?6)*,)+)* through *?6)*,)6;;)6;=
C.a&& C addr"&&"&;
Network.network.network.node
Range: 192.0.0.0 to 223.255.255.254
0lass 0 (alid ost "Ds
All host bits turned o!! is the network "D2 *@6)*,>)*++)+
All host bits turned on is the broadcast address2 *@6)*,>)*++)6;;
(alid hosts between network and broadcast address2*@6)*,>)*++)* through *@6)*,>)*++)6;=
/ 7=
Pri/a'" IP Addr"&&"&
These addresses can be used on a pri%ate network, but they are not routable through the "nternet
This is designed !or the purpose o! creating a measure o! well4needed security, but it also
con%eniently sa%es %aluable "# address space
R"&"r/"d IP Addr"&& S+a"
Addr"&& C.a&& R"&"r/"d Addr"&& S+a"
0lass A *+)+)+)+ through *+)6;;)6;;)6;;
0lass B *?6)*,)+)+ through *?6)7*)6;;)6;;
0lass 0 *@6)*,>)+)+ through *@6)*,>)6;;)6;;
Broada&' Addr"&&"&
Four '%+"& of 0roada&' addr"&&;
,a%"r > 0roada&'& These are sent to all nodes on a LAN) $one to all comm)&
,a%"r 9 0roada&'& These are sent to all nodes on the network) $one to all comm))&
Unia&' These are sent to a single destination host) $one to one comm)&
Mu.'ia&' These are packets sent !rom a single source, and transmitted to many de%ices on
di!!erent networks $sends message to group o! users only . one to many communication&)
Rou'"r Co-+on"n'&
0isco routers ha%e %arious components that are controlled by the 0isco "-S) These components
include such things as memory, inter!aces, and ports) Bach component has a purpose that pro%ides
added !unctionality to a router) A re%iew o! these components will be use!ul in understanding each o!
their roles within a router)
M"-or%
A router contains di!!erent types o! memory, where it can store images, con!iguration !iles, and
microcode) The types o! memory and their purposes are as !ollows2
RAMX -!ten re!erred to as dynamic random4access memory $DRAM&) RAM is the working
area o! memory storage used by the 0#3 to execute 0isco "-S so!tware and to hold the
running con!iguration !ile, routing tables, and AR# cache) The running con!iguration !ile
$running4con!ig& contains the current con!iguration o! the so!tware) "n!ormation in RAM is
cleared when the router is power4cycled or reloaded)
R-MX Sometimes re!erred to as erasable programmable read4only memory $B#R-M&)
R-M is hard4wired read4only memory in the router) R-M contains power4on sel!4test
$#-ST& diagnostics and the bootstrap or boot4loader so!tware) This code allows the router to
boot !rom R-M when it cannot !ind a %alid 0isco "-S so!tware image) This is known as
R-M Monitor mode) This is a diagnostic mode that pro%ides a user inter!ace when the router
cannot !ind a %alid image)
/ 7;
AlashX A%ailable as B#R-Ms, single in4line memory modules $S"MMs&, or #0M0"A cards)
Alash is the de!ault location where a router !inds and boots its "-S image) -n some plat!orms,
additional con!iguration !iles or boot images can be stored in Alash) The contents o! Alash are
retained when the router is power4cycled or reloaded)
N(RAMX Non%olatile random4access memory) N(RAM stores the startup con!iguration
!ile $startup4con!ig&, which is used during system startup to con!igure the so!tware) "n
addition, N(RAM contains the so!tware con!iguration register, a con!igurable setting in
0isco "-S so!tware that determines which image to use when booting the router) The
contents o! N(RAM are retained when the router is power4cycled or reloaded)
Table 64* pro%ides a summary o! these memory types, their !unction, and use!ul 0isco "-S so!tware
commands when managing these di!!erent types o! memory)
Ta0." >28: M"-or% T%+"&
M"-or% T%+" Con'"n'& U&"fu. Ci&o IOS Sof'(ar" Co--and&
RAM Running con!iguration !ile
Routing tables
AR# cache
1orking memory
show running4con!ig
show ip route
show arp
show memory
R-M #-ST
Bootstrap
R-M Monitor mode
Locate and load "-S
X
Alash "-S
Additional con!iguration !iles
Additional "-S images
show !lash
N(RAM Startup con!iguration !ile
0on!iguration register
show startup4con!ig
show %ersion
An understanding o! the di!!erent types o! memory and their !unction within the router helps not only
clari!y where the "-S image and con!iguration !iles are stored, but also pro%es use!ul by allowing the
user to manipulate these con!iguration !iles during the con!iguration process and understand what
area o! memory is being changed)
/ 7,
In'"rfa"& and Por'&
Routers contain di!!erent types o! inter!aces and ports) "nter!aces assist the router in routing packets
and bridging !rames between network segments, and they pro%ide a connection point to di!!erent
types o! transmission media) #orts, on the other hand, pro%ide management access to the router)
Some common inter!ace types are as !ollows2
Serial
Bthernet
Token Ring
Asynchronous
ADD"
The preceding types o! inter!aces are some o! the most commonU howe%er, inter!ace types are in no
way static) "nter!ace types are added as new technologies e%ol%e and methods are needed to
interconnect and integrate network de%ices) An example o! this is the %oice inter!ace a%ailable in the
0isco 6,++ series that connects to a pri%ate branch exchange $#BG& or standard analog phone)
#orts on the router enable a user to connect to the router !or management and con!iguration purposes)
Mou can connect either a terminal $DTB& or a modem $D0B& to these ports) Some o! the common
ports are2
0onsole
Auxiliary $A3G&
The console and auxiliary ports are physical ports on the router that pro%ide management access to
the router) "n addition to these, there are also %ty lines, which are so!tware4de!ined lines that allow
Telnet access to the router) The de!ault %ty con!iguration is %ty lines + through =, allowing !i%e
simultaneous Telnet sessions to the router) #asswords can be con!igured on each %ty line to secure
access to the router)
Co--and2,in" In'"rfa"
0L" is the acronym used by 0isco to denote the command4line inter!ace o! the "-S) 0L" is the
primary inter!ace used to con!igure, manage, and troubleshoot 0isco de%ices) This user inter!ace
enables you to directly execute "-S commands, and it can be accessed through a console, modem, or
Telnet connection) Access by any o! these methods is generally re!erred to as an BGB0 session)
E?EC ,"/".& or Mod"&
Two di!!erent BGB0 sessions exist, user BGB0 le%el and pri%ileged BGB0 le%el) Bach le%el
pro%ides a di!!erent amount o! access to the commands within the "-S) 3ser BGB0 pro%ides access
to a limited number o! commands that allow basic troubleshooting and monitoring o! the router)
#ri%ileged BGB0 le%el allows access to all router commands, such as con!iguration and management
settings) #assword protection to the pri%ileged BGB0 le%el is highly recommended to pre%ent
unauthori'ed con!iguration changes !rom being made to the router) 3pon initiating an BGB0 session
/ 7?
on the router, a user is placed in user BGB0 mode) This is denoted in the router with the 5 promptX
!or example2
Router>
To change to the pri%ileged BGB0 le%el, type in the command enable, as shown2
Router> enable
Password: [enable password
"! an enable password has been set, the router prompts you !or it) 1hen you enter the correct enable
password, the prompt changes !rom Router5 to RouterY) This indicates that you ha%e success!ully
entered into pri%ileged BGB0 mode, as shown2
Router>
Password: [enable password
Router!
T"#
Bnable passwords show up as clear text in the running con!iguration !ile) "! this is undesirable !or
your en%ironment, 0isco "-S so!tware o!!ers another optionXencrypt the enable password using the
enable secret command) 3sing the enable secret command ensures that the password is not displayed
as clear text in the running con!iguration !ile)
IOS C,I Hi"rar$%
0isco "-S so!tware is structured in a hierarchical manner) "t is important to understand this structure
to success!ully na%igate within 0isco "-S so!tware) As mentioned pre%iously, there are two BGB0
modes2 user BGB0 and pri%ileged BGB0) #ri%ileged BGB0 mode is composed o! %arious
con!iguration modes2
Hlobal con!iguration mode
"nter!ace con!iguration mode
Router con!iguration mode
Line con!iguration mode
Aigure 64* pro%ides a %isual breakdown o! the con!iguration modes)
Fi)ur" >28: Ci&o IOS Sof'(ar" C,I Hi"rar$%
1ithin each mode, certain commands are a%ailable !or execution) 3sing the context4sensiti%e help,
you can see a list o! which commands are a%ailable) 1hile na%igating the 0L", the router prompt
changes to re!lect your current position within the 0L" hierarchy) Table 646 summari'es the main
command prompts within the 0L" hierarchy)
/ 7>
Ta0." >2>: C,I Co--and Pro-+'& 0% Mod"
Co--and
Pro-+' Mod"
IOS Co--and 'o En'"r
Co--and Mod" D"&ri+'ion
Router5 3ser BGB0 mode De!ault mode upon login Limited inspection o!
router in!ormation
Router Y #ri%ileged BGB0
mode
Arom Router5, type enable Detailed inspection,
testing, debug, and
con!iguration
commands
Router$con!ig&Y 0on!iguration mode Arom RouterY, type con!ig
terminal
igh4le%el
con!iguration or global
con!iguration changes
Router $con!ig4
i!&Y
"nter!ace le%el
$submenu o!
con!iguration mode&
Arom Router$con!ig&Y, type
inter!ace Qinter!ace nameRX!or
example, Bthernet+
"nter!ace4speci!ic
commands
Router $con!ig4
router&Y
Routing engine le%el
$submenu o!
con!iguration mode&
Arom Router$con!ig&Y, type
router Qrouting protocolRX!or
example, rip, igrp, and so !orth
Routing engine
commands
Router $con!ig4
line&Y
Line le%el $submenu
o! con!iguration
mode&
Arom Router$con!ig&Y, type line
QportRX!or example, aux+,
console+, %ty + =
Line4con!iguration
commands
Con'"3'2S"n&i'i/" H".+
"n both user and pri%ileged BGB0 modes, you can see a listing o! a%ailable commands by typing a
:uestion mark $J& at the Router5 or RouterY prompts) This is re!erred to as context4sensiti%e help)
Bxample 64* shows context4sensiti%e help !rom user BGB0 mode)
E3a-+." >28 Con'"3'2S"n&i'i/" H".+ fro- U&"r E?EC Mod"
Router>"
#$e% %o&&ands:
'1-99> (ess)on nu&ber to resu&e
a%%ess-enable *reate a te&porar+ ,%%ess--)st entr+
%lear Reset .un%t)ons
%onne%t /pen a ter&)nal %onne%t)on
d)sable 0urn o.. pr)1)le2ed %o&&ands
d)s%onne%t 3)s%onne%t an e$)st)n2 networ4 %onne%t)on
enable 0urn on pr)1)le2ed %o&&ands
e$)t #$)t .ro& t5e #6#*
5elp 3es%r)pt)on o. t5e )ntera%t)1e 5elp s+ste&
lat /pen a lat %onne%t)on
lo%4 -o%4 t5e ter&)nal
lo2)n -o2 )n as a part)%ular user
lo2out #$)t .ro& t5e #6#*
&r)n.o Re7uest ne)25bor and 1ers)on )n.or&at)on .ro& a &ult)%ast
router
&stat (5ow stat)st)%s a.ter &ult)ple &ult)%ast tra%eroutes
&tra%e 0ra%e re1erse &ult)%ast pat5 .ro& dest)nat)on to sour%e
na&e-%onne%t)on 8a&e an e$)st)n2 networ4 %onne%t)on
pad /pen a 6.29 P,3 %onne%t)on
p)n2 (end e%5o &essa2es
/ 7@
ppp (tart 9#0: Po)nt-to-Po)nt Proto%ol ;PPP<
--=ore--
Bxample 64* displays the commands a%ailable !or execution !rom user BGB0 mode) 1hen the
number o! commands a%ailable exceed that which can be displayed on the screen, the "-S displays
the 44More44 prompt) #ressing the Spacebar presents the next page o! commands, o!ten !ollowed by
another 44More44 until all remaining commands are displayed and youVre returned to the Router5
prompt, as demonstrated in Bxample 646)
E3a-+." >2> Hi''in) '$" S+a"0ar Con'inu"& '$" Con'"3'2S"n&i'i/" H".+ ,i&'in) and
R"'urn& You 'o '$" U&"r E?EC Mod" Pro-+'
-o2out #$)t .ro& t5e #6#*
&r)n.o Re7uest ne)25bor and 1ers)on )n.or&at)on .ro& a &ult)%ast
router
&stat (5ow stat)st)%s a.ter &ult)ple &ult)%ast tra%eroutes
&tra%e 0ra%e re1erse &ult)%ast pat5 .ro& dest)nat)on to sour%e
na&e-%onne%t)on 8a&e an e$)st)n2 networ4 %onne%t)on
pad /pen a 6.29 P,3 %onne%t)on
p)n2 (end e%5o &essa2es
ppp (tart 9#0: Po)nt-to-Po)nt Proto%ol ;PPP<
resu&e Resu&e an a%t)1e networ4 %onne%t)on
rlo2)n /pen an rlo2)n %onne%t)on
s5ow (5ow runn)n2 s+ste& )n.or&at)on
sl)p (tart (er)al-l)ne 9P ;(-9P<
s+stat 3)spla+ )n.or&at)on about ter&)nal l)nes
telnet /pen a telnet %onne%t)on
ter&)nal (et ter&)nal l)ne para&eters
tn3270 /pen a tn3270 %onne%t)on
tra%eroute 0ra%e route to dest)nat)on
tunnel /pen a tunnel %onne%t)on
w5ere -)st a%t)1e %onne%t)ons
$3 (et 6.3 para&eters on P,3
$re&ote #nter 6Re&ote &ode
Router>
Mou can repeat the same process to get a list o! a%ailable commands !rom pri%ileged BGB0 mode)
The only di!!erence is that more commands are a%ailable within pri%ileged BGB0 mode)
To !ind out what commands are a%ailable that begin with the letter c, you would type the letter c
immediately !ollowed by a J) This is re!erred to as word help, and it is use!ul when you know what
the command begins with, but not the exact syntax) Bxample 647 demonstrates this concept)
E3a-+." >29 U&in) #ord H".+ 'o Find '$" E3a' S%n'a3 of a Co--and
Router!%"
%lear %lo%4 %on.)2ure %onne%t %op+
As more letters are added to the command you need help !or, the context4sensiti%e help !eature
narrows down the a%ailable commands to choose !rom) Bxample 64= demonstrates what you would
see i! you narrowed your search by adding additional letters such as coJ or conJ)
E3a-+." >2B Addin) C$ara'"r& in a Co--and I--"dia'".% Fo..o("d 0% a * H".+& You
Narro( Your Co--and S"ar$
Router!%"
%lear %lo%4 %on.)2ure %onne%t %op+
Router!%o"
/ =+
%on.)2ure %onne%t %op+
Router!%on"
%on.)2ure %onne%t
Suppose that you need more in!ormation on the syntax o! the con!igure command) 0ommand help is
a%ailable to list arguments that are a%ailable with a gi%en command by typing the command,
!ollowed by a space and a J) Aor example, i! you want to !ind out what commands were a%ailable to
use with the con!igure command, you would type con!igure J, as demonstrated in Bxample 64;)
E3a-+." >25 En'"rin) C$ara'"r& in a Co--and Fo..o("d 0% * H".+& You Find '$" E3a'
S%n'a3 of a Co--and
Router!%on.)2ure "
&e&or+ *on.)2ure .ro& 8> &e&or+
networ4 *on.)2ure .ro& a 0:0P networ4 5ost
o1erwr)te-networ4 /1erwr)te 8> &e&or+ .ro& 0:0P networ4 5ost
ter&)nal *on.)2ure .ro& t5e ter&)nal
'%r>
Ainally, the command parser has the capability to distinguish erroneous commands that are entered
incorrectly, as well as prompt you when more speci!ic command arguments are needed) 1hen an
erroneous command is entered, the help !eature returns the output shown in Bxample 64,)
E3a-+." >2D En'"rin) an Erron"ou& Co--and 6"n"ra'"& a M"&&a)" 'o India'" '$" S%n'a3
Error
Router!s5ow rnn)n2-%on.)2
?
@ 9n1al)d )nput dete%ted at A?A &ar4er.
The Z marker indicates where the error in the syntax occurred) 1hen a more speci!ic command
argument is needed to distinguish among multiple possibilities, the help !eature returns [Ambiguous
command2, as shown in Bxample 64?)
E3a-+." >24 En'"rin) a Co--and R"quirin) Mor" S+"ifi Para-"'"r& 6"n"ra'"& an
A-0i)uou& Co--and M"&&a)"
Router!s5ow a%%ess
@ ,&b)2uous %o&&and: Bs5ow a%%essB
This is easily corrected by typing more o! the command so that multiple possibilities no longer exist,
as shown in Bxample 64>)
E3a-+." >2C En'"rin) a Co--and (i'$ '$" R"quir"d Ar)u-"n'& 'o E.i-ina'" '$"
A-0i)uou& Co--and Error
Router!s5ow a%%ess-l)sts
(tandard 9P a%%ess l)st 1
per&)t an+
Bach o! these context4sensiti%e help !eatures is use!ul in helping you determine whether the
command syntax is incorrect)
Ho' K"%&
The 0L" also pro%ides hot keys !or easier na%igation within the "-S and pro%ide shortcuts !or editing
!unctions) Table 647 pro%ides a list o! shortcuts that are a%ailable)
/ =*
Ta0." >29: C,I Ho' K"%& for Ci&o IOS Sof'(ar" Co--and Edi'in) Fun'ion&
K"% S"qu"n" D"&ri+'ion
0trl4A Mo%es the cursor to the beginning o! the current line
0trl4R Redisplays a line
0trl43 Brases a line
0trl41 Brases a word
0trl4\ Bnds con!iguration mode and returns to pri%ileged BGB0 mode
Tab Ainishes a partial command
Backspace Remo%es one character to the le!t o! the cursor
0trl4# or 3p Arrow Allows you to scroll !orward through !ormer commands
0trl4N or Down Arrow Allows you to scroll backward through !ormer commands
0trl4B Mo%es the cursor to the end o! the current line
0trl4A or right arrow Mo%es !orward one character
0trl4B or le!t arrow Mo%es back one character
Bsc]B Mo%es back one word
Bsc]A Mo%es !orward one word
Dir"' A"&& 'o Rou'"r& and S(i'$"& T$rou)$ a Con&o." Por'
Most 0isco de%ices use a rollo%er cable connected to the console port on the router or switch) Aor
exceptions, consult the product documentation to %eri!y whether you should use a straight4through or
rollo%er cable) The cable is then connected to an RO4=;.to.DB4@ or RO4=;.to.DB46; terminal
adapter that is attached to a serial communications port $0-M*, 0-M6, or other 0-M port& on the
#0) Aigure =4* shows how this is done)
Fi)ur" B28: Conn"'in) a D"/i" (i'$ a Con&o." Ca0."
Co-+on"n'& of Rou'in) Da'a
Rou'in) Ta0."&; rou'"rE&$ i+ rou'"
R or I or D 845:>8:=:=78D F8>=78G or F8==785955BCG /ia 8=:8=:8=:81 ==;==;8C1 &"ria.=7=
C 8=:8=:8=:= i& dir"'.% onn"'"d1 &"ria.=7=
1here R means by which the entry was learned on this router) ere it is R"#) I means "HR#, D
means B"HR#
845:>8:=:=78D is the network address and number o! bits in subnet mask o! the destination network
F8>= or 8== is the administrati%e distance o! the route)
78 or 785955BC is the metric o! the route speci!ic to the routing protocol used to determine the route)
R"# uses hops $max)*;& as its metric) A hop is how many routers away the destination network is)
And composite metric $with bandwidth, delay o! line by de!ault plus reliability, load, MT3 in igrp,
eigrp&
/ia 8=:8=:8=:8 is the next hop address !or the route) This is the address the packet will need to be
sent to in order !or the packet to reach its destination)
/ =6
==;==;8C the length o! the time since the route has been updated in the routing table) "n this case the
route was updated *> seconds ago)
S"ria.=7= the inter!ace the route was learned through) This is also the inter!ace the packet will be
switched to " order !or the packet to be !orwarded toward its destination)
S'a'ia..% D"fin"d Rou'"&
A statically de!ined route is one in which a route is manually entered into the router) A static route
can be entered into the router with the !ollowing command in global con!iguration mode2
>5=8(onfi))Ei+ rou'" +r"fi3 -a&! Haddr"&& I in'"rfa"J di&'an"
>5=8(onfi))Ei+ rou'" 8K>:8DC:>=:= >55:>55:>55:= 84>:8D:5=:8
D"fau.' Rou'"; i+ rou'" =:=:=:= =:=:=:= 84>:8D:5=:8
D%na-i Rou'"&; A dynamic routing is a process in which a routing protocol will !ind the best
path in a network and maintain that route) "t will disco%er all the possible routes to one destination,
implement its prede!ined rules, and come up with the best route to the destination)
D%na-i Rou'in) Pro'oo.&
In'"rior 6a'"(a% Pro'oo. (I6P) E3'"rior 6a'"(a% Pro'oo.
(E6P)
Border Hateway #rotocol
Ca'")oriL"d in'o '(o a'")ori"&;
8: C.a&&fu. Rou'in) Pro'oo. C.a&&."&& Rou'in) Pro'oo.
R"#%*, "HR# R"#%6, B"HR#, -S#A, "S4"S, BH#
>: Di&'an"2A"'or Rou'in) Pro'oo. ,in! S'a'" Rou'in) Pro'oo.
R"#, "HR#, BHR# -S#A, "S4"S
Di&'an"2A"'or Co-+ari&on&
C$ara'"ri&'i RIP/8 RIP/> I6RP EI6RP
0ount to in!inity ? ? ?
Split hori'on with poison re%erse ? ? ? ?
old down timer ? ? ?
Triggered update with route
poisoning
? ? ? ?
Load balancing with e:ual paths ? ? ? ?
Load balancing with une:ual paths ? ?
(LSM support ? ?
Automatic Summari'ation ? ? ? ?
Metric Ho+& Ho+& Co-+o&i'" Co-+o&i'"
op count limit 8D 8D >55 (8== 0%
d"f:)
>55 (8== 0%
d"f:)
Support !or si'e o! network M"diu
-
M"diu
-
,ar)" ,ar)"
I6RP & EI6RP ar" '$" on.% Ci&o +ro+ri"'ar% rou'in) +ro'oo.&:
Mo&' di&'an"2/"'or rou'in) +ro'oo.& $a/" fo..o(in) $ara'"ri&'i&;
P"riodi U+da'"&; The length o! time be!ore a router will send out an update) Aor R"#, its 7+
seconds and !or "HR#, its @+ seconds)
/ =7
N"i)$0or&; -ther routers on the same logical, or data link, connection)
Broada&' U+da'"&; 1hen a router becomes acti%e it will send out a message to the broadcast
address stating that it is ali%e) "n return, neighboring routers participating in the same routing
protocol will respond to this broadcast)
Fu.. Rou'in) Ta0." U+da'"&; Most d4% routing protocols will send their entire routing table to their
neighbors) This occurs when the periodic update timer expires)
Rou'in) 0% Ru-or; A router will send its routing table to all o! its directly connected neighbors) "n
return, all o! the neighboring routers will send their routing tables to all o! their directly connected
neighbors) This will continue until all routers running the same distance4%ector routing protocol are
reached)
In/a.id Ti-"r; Determines the length o! time that must elapse $*>+ seconds !or R"#& be!ore a router
determines that a route has become in%alid) "t happens when a router inter!ace not heard any updates
about a particular route !or that period)
S+.i' HoriLon; #re%ents what is known as a re%erse route) A re%erse route occurs when a router
learns a route !rom a neighbor and the router turns around and sends that route back to the neighbor
that the router learned it !rom, causing an in!inite loop) The split hori'on pre%ents this by setting a
rule that a route cannot be ad%ertised out the same inter!ace the route was learned out)
Coun'in) 'o Infini'%; "n networks that are slow to con%erge, another type o! routing loop can occur)
This loop occurs when routers ha%e multiple paths to the same destination) 1hat happens in this case
is the routing table is populated with the best route to the destination e%en though it has two routes to
the e destination) So, when the destination network goes down, the updates about the destination
being unreachable can arri%e at the router at di!!erent times) The router in turn ad%ertises out that it
has another route to the destination) This will continue across the network, incrementing the hop
count at each router it encounters) B%en though the destination network is down, all o! the routers
participating in the routing process think they ha%e an alternate route to the network, causing a loop)
This issue has been corrected by en!orcing maximum hop counts) 1hen a route reaches the
maximum hop count limit, the route is marked as unreachable and remo%ed !rom the router9s routing
table)
Tri))"r"d U+da'"&; "t increases the speed o! con%ergence on a network) "nstead o! the router9s
ha%ing to wait until the periodic update timer expires and sends out an update, a triggered update will
send out an update as soon as a signi!icant e%ent occurs and speeding up con%ergence and cutting
down on the risk o! the network loops due to con%ergence issues)
Ho.d2do(n Ti-"r; "t is used when in!ormation about a route changes) 1hen the new in!ormation is
recei%ed or a route is remo%ed, the router will place that route in a hold4down state) This means that
the router will not ad%ertise, nor will it accept ad%ertisements about this route !or the time period
speci!ied by the hold4down timer) A!ter the time period expires, the router will start accepting and
sending ad%ertisements about the route)
ROUTIN6 INFORMATION PROTOCO, (RIP)
RIP/8 @ C.a&&fu. rou'in) +ro'oo. ((i.. no' &"nd a &u0n"' -a&! in '$" rou'in) u+da'")
RIP/> @ C.a&&."&& rou'in) +ro'oo. ((i.. &"nd a &u0n"' -a&! in '$" rou'in) u+da'")
Authentication o! routing updates through clear text or md; $optional&
Multicast route updates
Next4hop addresses carried with each route entry
Rou'"r(onfi))Erou'"r ri+1 /"r&ion > o--and 'o u&" RIP/>
C$ara'"ri&'i& of RIP
Distance4(ector Routing #rotocol
3se Bellman4Aord algorithm
3se hop count as metric, maximum *;, *, is unreachable
Route update timer, periodic updates is set to 7+ seconds by de!ault
/ ==
Route in%alid timer is set to *>+ seconds) This is the time it will take be!ore a route will be
marked as unreachable)
Route !lush timer is 6=+ seconds) This is the time between the route being marked as
unreachable and the route being remo%ed !rom the routing table) "n the time period between
the in%alid timer and the !lush timer, neighboring routers will be noti!ied about the route9s
unreachable)
,in!2S'a'" Rou'in);
"n link4state routing, each router knows the exact topology o! the network)
This will limit the number o! bad routing decisions that can be made because each router in the
process has an
identical %iew o! the network)
Bach router in the network will report on its state, the directly connected links, and the state o!
each link) The router
will then propagate this in!ormation to all routers in the network)
"t does not pass the entire routing table, on.% '$" $an)"d infor-a'ion or a -"&&a)" of no
$an)" a!ter a gi%en period o! time is passed) This is known as LSA $Link state ad%ertisement&)
Bach LSA will include an identi!ier !or the link, the state o! the link and a metric !or the link)
3se o! LSA will reduce the bandwidth utili'ation)
But more complex to con!igure than distance4%ector routing protocol
-S#A and "S4"S $"ntegrated "ntermediate System to "ntermediate System& LSR protocols
Ho( ,SR (or!&;
1hen router becomes acti%e, it has to !orm adCacency with its directly connected neighbors
A!ter !orming adCacencies, the router then sends out link4state ad%ertisements to each o! its
neighbors) A!ter recei%ing
and copying the in!ormation !rom the LSA, the router !orwards, or !loods, the LSA to each o! its
neighbors)
All o! the routers then store the LSAs in their own database) This means all routers ha%e the same
%iew o! the network
topology)
Bach router then uses the DiCkstra algorithm to compute its best route to a destination)
,in!2S'a'" Co-+ari&on&
B"HR# is a hybrid protocol, contains the characteristics !rom both d4% and l4s routing protocols)
C$ara'"ri&'i OSPF IS2IS EI6RP
ierarchical topology needed ? ?
Retains knowledge o! all possible
routes
? ? ?
Manual route summari'ation ? ? ?
Automatic route summari'ation ?
B%ent4triggered announcement ? ? ?
Load balancing with une:ual paths ?
Load balancing with e:ual paths ? ? ?
(LSM support ? ? ?
Metric Co&' Co&' Co-+o&i'"
op count limit Un.i-i'"d 8=>B 8== 0% d"f:
Support !or si'e o! network ,ar)" A"r% .ar)" ,ar)"
D"fau.' Ad-ini&'ra'i/" Di&'an"
Sour" of Rou'" D"fau.' AD Sour" of Rou'" D"fau.' AD
/ =;
0onnected "nter!ace + "S4"S **;
Static Route * R"# *6+
B"HR# Summary ; BH# *=+
Bxternal BH# 6+ Bxternal B"HR# *?+
B"HR# @+ "nternal BH# 6++
"HR# *++ 3nknown 6;;
-S#A **+
A"rif%in) rou'"&; >5=8M&$ i+ rou'"
T"&'in) and 'rou0."&$oo'in); +in)1 'ra"rou'"
N"'(or! Addr"&& Tran&.a'ion;
NAT $Network Address Translation& and #AT $#ort Address Translation& are used to extend the
current address space by translating one address to another and help to alle%iate shortage)
NAT T"r-ino.o)%;
NAT can be broken into two types, NAT and #AT)
NAT is the one4to4one translation o! "# addresses !rom an inside local "# address to an outside
global "# address that is uni:ue and routable on the "nternet)
#AT is sometimes re!erred to as NA#T $Network Address and #ort Translation&) "t is a many4to4
one translation because it can take multiple inside local "# addresses and translate them to one inside
global "# address)
In&id" .oa.; The inside local address is the "# address used by a host on the pri%ate side o! the
network)
In&id" 6.o0a.; The inside global address is the public "# address into which the inside local address
will be translated) This is typically a globally uni:ue and routable "# address, which hosts on the
outside network would use to communicate with the inside local "# address)
Ou'&id" ).o0a.; The outside global address is the actual "# address o! a host that resides on the
outside public network and is usually a globally uni:ue and routable "# address)
Ou'&id" .oa.; The outside local address is the "# address used to translate an outside global "#
address) This may or may not be a registered "# address, but it must be routable on the inside o! your
network)
Ho( NAT (or!&;
Tra!!ic that is sourced on the inside o! the network !rom inside host $"nside ost&, coming to an
inter!ace marked as inside, will ha%e an inside local address as its source "# address $SA "nside
Local& and an outside local address as the destination "# address $DA -utside Local&)
/ =,
NAT "nter!ace
"nside ost
NAT "nter!ace
-utside ost
SA "nside
Local
DA -utside
Local
SA "nside
Hlobal
DA -utside
Hlobal
DA "nside
Local
SA -utside
Local
DA "nside
Hlobal
SA -utside
Hlobal
NAT
Route
r
1hen that tra!!ic reaches the NAT process and is switched to the outside network, going out an
inter!ace marked as outside, the source "# address will be known as the inside global address $SA
"nside Hlobal& and the destination "# address will be known as the outside global address $DA
-utside Hlobal&)
1hen tra!!ic is sourced on the outside o! the network !rom outside host $-utside ost&, coming to
an inter!ace marked as outside, the source "# address is known as the outside global address $SA
-utside Hlobal&, while the destination "# address is known as the inside global address $DA "nside
Hlobal&)
1hen the tra!!ic reaches the NAT process and is switched to the inside network, going out an
inter!ace marked as an inside, the source "# address will be known as the outside local address $SA
-utside Local& and the destination "# address will be known as the inside local address $DA "nside
Local&)
Ad/an'a)" of NAT;
NAT allows you to incrementally increase or decrease the number o! registered "# addresses
without changing de%ices $hosts, switches, routers etc)& in the network) But sometimes you need to
change the de%ice with NAT)
NAT can be used either statically or dynamically2
Static translations are manually con!igured to translate a single global "# address to a
single local "# address and %ice %ersa) This transaction always exists in the NAT table until it is
manually remo%ed) -ptionally, this translation could be con!igured between a single inside "#
address and port pair to a single outside "# address and port pair using either T0# or 3D#) These
port %alues needn9t be the same %alue)
Dynamic mappings are con!igured on the NAT border router by using a pool o! one or
more registered "# addresses) De%ices on the inside o! the network that wish to communicate with a
host on the outside network can use these addresses in the pool) This allows multiple internal de%ices
to utili'e a single pool o! "# addresses) Mou can also use a single "# address by con!iguring
o%erloading, which will translate both the "# address and port number)
NAT can be con!igured to allow the basic load sharing o! packets among multiple ser%ers
using the T0# load distribution !eature) T0# load distribution uses a single outside "# address, which
is mapped to multiple internal "# addresses) "ncoming connections are distributed in a round .robin
!ashion among the "# addresses in the internal pool) The packets !or each indi%idual connection, or
!low, are sent to the same "# address to ensure proper session communications)
"! you switch "nternet Ser%ice #ro%iders and need to change the registered "# addresses
you are using, NAT makes it so you don9t ha%e to renumber e%ery de%ice in your network) The only
change is the addresses that are being used in the NAT pool)
Mou can con!igure NAT on the border router between your routing domain to translate the
address !rom one network to the other and %ice %ersa)
Di&ad/an'a)" of NAT;
NAT increases latency $delay&
NAT hides end4to4end "# addresses that render some applications unusable)
Since NAT changes "# addresses, there is a loss in the ability to track an "# !low end4to4end)
NAT also makes troubleshooting or tracking down where malicious tra!!ic is coming !rom more
troublesome)
/ =?
A host needs to be accessed !rom the outside network will ha%e two "# addresses, one inside and
one outside, this creates a problem called split DNS) Mou need to setup two DNS ser%ers, one !or
external addresses and one !or internal addresses) This can lead to administrati%e nightmares and
problems i! internal hosts are pointing to the external DNS ser%er)
Su++or'"d NAT Traffi T%+"&;
T0#/3D# tra!!ic that does not carry source and destination "# addresses inside the application
stream
TT#, TAT#, NAS, "0M#, NT# $Network Time #rotocol&, AT# $AT# #-RT and #AS(
command&
Archie, which pro%ides lists o! anonymous AT# archi%es
Ainger, a tool that determines whether a person has an account on a particular computer
Many o! the rS 3nix utilities $rlogin, rsh, rcp&
NetB"-S o%er T0# $datagram, name and session ser%ices&
#rogressi%e Network9s RealAudio, 1hite #ine9s 0usSeeMe, Ging Technologies9 Stream 1orks
DNS A and #TR :ueries
)767 $"-S releases *6)+$*&/*6)+$*&T or later&, (D-Li%e $"-S releases **)7$=&/**)7$=&T or later&
NetMeeting $"-S releases *6)+$*&/*6)+$*&T or later&, (xtreme $"-S **)6$=&/**)7$=&T or later&
"# MulticastXsource address translation only $"-S releases *6)+$*&T or later&
##T# support with #ort Address Translation $#AT& $"-S releases *6)+$6&T or later&
Skinny 0lient #rotocol, "# #hone to 0isco 0allManager $"-S releases *6)+$;&T or later&
Un&u++or'"d Traffi T%+"&;
Routing protocols, DNS 'one trans!ers, B--T# / D0#, Talk, Ntalk, SNM#, Netshow
NAT O+"ra'ion&;
*) Translating inside local addresses
6) -%erloading inside global addresses
7) 3sing T0# load distribution
=) -%erlapping networks
Confi)urin) NAT;
Border$con!ig&Yin'"rfa" "= Border$con!ig&Yin'"rfa" &=
Border$con!ig4i!&Yi+ na' in&id" Border$con!ig4i!&Yi+ na' ou'&id"
Border$con!ig4i!&Y"3i' Border$con!ig4i!&Y"3i'
S'a'i NAT;
Border$con!ig&Yi+ na' in&id" &our" &'a'i 8=:8:>:>5 >==:8:8:>5
Border$con!ig&Y
This creates a permanent entry in the NAT table, and now when tra!!ic is sent to "# address
6++)*)*)6; !rom the outside network, it will be translated to *+)*)6)6; on the inside o! the network
and %ice %ersa)
-ptionally, you can con!igure Cust a certain port to be translated) Adding a protocol and port numbers
to the abo%e command does this)
Border$con!ig&Yi+ na' in&id" &our" &'a'i '+ 8=:8:>:>5 C= >==:8:8:>5 C=
Border$con!ig&Yi+ na' in&id" &our" &'a'i '+ 8=:8:>:>B C= >==:8:8:>5 C8
Border$con!ig&Y
D%na-i NAT;
Dynamic NAT is used to map inside "# addresses to outside "# addresses on the !ly !rom a pool o!
a%ailable "# addresses) Again, you must ha%e "# addresses assigned to the inter!aces on the router
that will be participating in the NAT process)
/ =>
Border$con!ig&Yin' "=
Border$con!ig4i!&Yi+ na' in&id"
Border$con!ig4i!&Y"3i'
Border$con!ig&Yin' &=
Border$con!ig4i!&Yi+ na' ou'&id"
Border$con!ig4i!&Y"3i'
Border$con!ig&Ya"&&2.i&' 8> +"r-i' 8=:8:>:= =:=:=:>55
Border$con!ig&Yi+ na' +oo. ou'0ound >==:8:8:> >==:8:8:>5B +r"fi32 ."n)'$ >B
I+ na' +oo. poo na!e (ou'0ound7in0ound) start ip end ip (>==:8:8:> >==:8:8:>5B)
n"'-a&! net"!ask or +r"fi32."n)'$ ength (+r"fi32 ."n)'$ >B@CIDR7&u0n"' 0i'&)
Border$con!ig&Yi+ na' in&id" &our" .i&' 8> +oo. ou'0ound
Border$con!ig&Y
1hen source wants to send packet to host on the "nternet, the nat border router recei%es a packet
!rom an inter!ace NAT inside)
Then any access lists or policy routing will be applied to the packet) So the routing will take
place)
The next step is to con!igure a pool o! "# addresses that will be allocated to outbound sessions)
Then the router will choose an a%ailable "# address !rom the pool and assign it to the NAT table
entry) Then that same "# will not be allocated to another translation entry until that entry times out or
is manually remo%ed)
Ainally, you need to tie the access list and pool together with the i+ na' in&id" &our" command)
Confi)urin) NAT U&in) O/"r.oadin)
-nce all "# addresses in a pool ha%e been allocated, any new connection attempts will !ail) So i!
your "S# allocated you only *= "# addresses, then only the !irst *= users will be able to access the
"nternet unless any existing user entry expires and release the "# address) This is not %ery e!!icient
manner)
So, con!iguring o%erloading allows the router to reuse each "# address in the pool) Because it
changes not only the "# address but also the port number) This is called Por' Addr"&& Tran&.a'ion
(PAT) or N"'(or! Addr"&& and Por' Tran&.a'ion (NPAT)) The router will add the protocol and
port in!ormation !or each translation entry, which allows more inside "# addresses to access the
outside network than there are "# addresses in the pool)
Border$con!ig&Yi+ na' in&id" &our" .i&' 8> +oo. ou'0ound o/"r.oad
The pool o! addresses can e%en be Cust one "# address in si'e, but it can support approximately
,=,+++ inside users, using a single protocol by %arying the outbound port numbers)
Border$con!ig&Yi+ na' in&id" &our" .i&' 8> in'"rfa" "'$"rn"'8 o/"r.oad (if DHCP u&"d on
ou'0ound in'"rfa")
Confi)urin) TCP ,oad Di&'ri0u'ion
This allows a host that is hea%ily used, such as a web ser%er, be able to handle the load o!
incoming re:uests by spreading the load among se%eral hosts) Destination addresses that match an
access list are replaced with addresses !rom a pool that has been designated as a rotary pool by
adding the '%+" ro'ar% keyword in the command)
Border$con!ig&Yin' "=
Border$con!ig4i!&Yi+ na' in&id"
Border$con!ig4i!&Y"3i'
Border$con!ig&Yin' &=
/ =@
Border$con!ig4i!&Yi+ na' ou'&id"
Border$con!ig4i!&Y"3i'
Border$con!ig&Yi+ na' +oo. ("02$o&'& 8=:8:8:8 8=:8:8:K n"'-a&! >55:>55:>55:= '%+" ro'ar%
Border$con!ig&Ya"&&2.i&' 8> +"r-i' 8=:8:8:>5B
Border$con!ig&Yi+ na' in&id" d"&'ina'ion .i&' 8> +oo. ("02$o&'&
Border$con!ig&Y
Confi)urin) NAT for O/"r.a++in) Addr"&&"&
0on!iguring NAT !or o%erlapping address translation is similar to con!iguring dynamic NAT) The
44di!!erence is that you must create and apply a pool o! "# addresses !or the tra!!ic to the inside o! the
network, as well as a pool !or the outbound tra!!ic)
Mou still need to create an access list to identi!y the tra!!ic to NAT, but you need to create second
pool) Then you need to use the i+ na' ou'&id" &our" command to tie the access list and second pool
to NAT tra!!ic coming !rom the outside inter!ace)
Border$con!ig&Ya"&&2.i&' 8> +"r-i' 8=:8:8:= =:=:=:>55
Border$con!ig&Yi+ na' +oo. in&id"+oo. 8=:8:>:8 8=:8:>:>5B n"'-a&! >55:>55:>55:=
Border$con!ig&Yi+ na' +oo. ou'&id"+oo. >==:8:8:> >==:8:8:>5B +r"fi32 ."n)'$ >B
Border$con!ig&Yi+ na' in&id" &our" .i&' 8> +oo. in&id"+oo.
Border$con!ig&Yi+ na' ou'&id" &our" .i&' 8> +oo. ou'&id"+oo.
Border$con!ig&Y
Trou0."&$oo'in) and A"rif%in) NAT Confi)ura'ion
&$o( i+ na' 'ran&.a'ion& &$o( i+ na' 'ran&.a'ion& /"r0o&"
i+ na' &'a'i&'i& d"0u) i+ na'
I6RP (In'"rior 6a'"(a% Rou'in) Pro'oo.)
"HR# was de%eloped by 0isco to o%ercome the limitations o! R"# in mid4*@>+s)
"nstead o! hop count used by R"#, it uses composite metric o! 0and(id'$1 d".a%1 .oad and
r".ia0i.i'%1 MTU to decide best path)
"HR# does not use hop count as a metric, it only tracks hop count) "t can tra%el up to *++ hops by
de!ault, which can be changed to accommodate up to 6;; hops)
"HR# is 0isco proprietary protocol) "t will not run on other routers)
"HR# is a 0lass!ul distance4%ector routing protocol, not scale well !or large internetworks $does
not support (LSM&
F"a'ur"& and O+"ra'ion;
"HR# sends out periodic broadcasts o! its entire routing table
3pon initiali'ation, "HR# broadcast a re:uest out all "HR#4enabled inter!aces)
Then it per!orms a check on recei%ed update with the pre%ious update and con!irm that it is o!
same subnet
Bach router will then use the learned routes to determine the best route to e%ery destination
network
"HR# recogni'es three types o! routes within its updates2
In'"rior; Network directly connected to a router inter!ace
S%&'"-; Routes ad%ertised by other "HR# neighbors within the same "HR# AS
E3'"rior; Routes learned %ia H"A# !rom a di!!erent "HR# AS, which pro%ides
in!ormation used by the router to set the gateway o! last resort) T$" )a'"(a% of .a&' r"&or' is the
path a packet will take i! a speci!ic route isn9t !ound on the router)
/ ;+
I6RP Ti-"r&; 3pdate Timer T @+ seconds
"n%alid Timer T 6?+ seconds
old down Timer T 6>+ seconds
Alush Timer T ,7+ seconds
I6RP M"'ri&; Metrics are the mathematics used to select a route) 3se B"..-an2Ford
a.)ori'$- to calculate metric) Lower metric route is the desirable route) K /a.u"& ar" -"'ri&:
K8@Band(id'$ (B
"
)1 K>@D".a% (D