CCNAX|
IInterconnecting
Cisco Networking
Devices: Accelerated
Student Guide Volume 4
Version 3.0
Part Number: 97-3839.03cisco!
‘emergas Headquarters ‘Asia Paci Headquarters Europe Headquarters
(isco Systems, ne Cisco Systane (USA) Pe Led. Cisco Systane intrnationl BY
Sandose, OA ‘Singapore Kratedar,
‘he Netaronss
Cisco has more than 200 offices ordvde, Adresses, phone numbers, and fax numbers ae listed onthe Cisco Website at
enti comigetmces
Cisco andthe Cisco logo are rademars or roger ademas of isco andlor is silts in he US. and other curtis. To
a It of Caco vademarks, go fo fis URL; vnv.cisc.comgairadsarks. Third-party vademarks fat are eon ae the
Property of har rspecave ones. Theuse othe word pare doesnot imply a parinershisretonship betwean Cisco an ty
her oomeary. (11108).
DISCLAIMER WARRANTY: THS CONTENT IS BEING PROVIDED“AS IS" AND AS SUCH MAY INCLUDE TYPOGRAPHICAL,
GRAPHICS, OR FORMATTING ERRORS, CISCO MAKES AND YOU RECEIVE NO WARRANTIES IN CONNECTION WT TH
CONTENT PROVIDED HEREUNDER EXPRESS IMPLIED, STATUTORY OR IN ANY OTHER PROVISION OF THIS CONTENT
‘GR.CCMMUNICATION BETWWEEN CISCO AND YOU. CISCO SPECIFICALLY DISCLAIMS ALL IMPUED WARRANTIES,
INCLUDING INARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND ETTNESS FOR A PARTICULAR PURPOSE,
(GRARISING FROW A COURSE OF DEALING. USAGE OR TRADE PRACTICE. Tic lemirg product may conan ay rlaze
content, and whic Cisco Geleves to be accurate, falssubjet ote disclaimer above
(©2017 Cisco Systems, ne.Table of Contents
1
Lesson 1: Understanding WAN Technologies ... = z = 3
Introduction to WAN Technologies Z Z Z Z 3
WAN Topology Options... Z Z Z Z 6
WAN Conneciivity Options... Z Z Z Z 8
Provider-Managed VPNS...... Z Z Z Z 10
Enterprise-Managed VPNs... Z Z Z Z 1
WAN Devices... . . . . . 15
Challenge. z = z = z = 19
‘Answer Key. = z = 20
Lesson 2: Understanding Point-to-Point Protocols = = = 24
‘Serial Point-to-Point Communication Links... . . . a
Point-to-Point Protocol... - . - 24
Discovery 47: Configure Serial Interface and PPP - . - 26
Discovery 48: Configure and Verify MLP...... = z = a4
Discovery 49: Configure and Verify a PPPoE Client... . . 58
Challenge. . - . - - - 66
Answer Key. - - - - 68
Lesson 3: Configuring GRE Tunnels 2 = 2 = 69
GRE Tunnel Overview ........ . . . 69
Discovery 50: Configure and Verity a GRE Tunnel. - - - n
Challenge. - - . - - - at
Answer Key. - - - - 83
Lesson 4: Configuring Single-Homed EBGP = = = 85
Interdomain Routing, . . . . . 85
Introduction to EBGP. . - - 87
Discovery 51: Configure and Venty Single-Homed EBGP.. - - 88
Challenge..
Introducing Sysiog - . - - - 103
‘Syslog Message Format... - - - - 105
‘Syslog Configuration. - - - - - 107
Discovery 52: Configure Syslog - z - - 108
‘SNMP Overview... . - . - 112
Discovery 53: Configure SNMP - - - - 115
Challenge. - - - - - - 121
Answer Key. = - - 1
Lesson 2: Leaming About the Evolution of inteligent Networks : . 13
‘Switch Stacking... - - 123,
Cloud Computing and Its Effect on Enterprise Networks... - - 126
‘Overview of Network Programmability in Enterprise Networks, - - 130
Application Programming Interfaces - - - - 1Cisco APIC-EM z i : i : oon 134
Cisco Intelligent WAN... - - - - on BT
Challenge. - - - - - _. 138
Answer Key - = - - _ 139
Lesson 3: introducing QoS. - - 141
Traffic Characteristics... - : - : wn 144
Need for QoS - . - . cn 144
‘QoS Mechanisms Overview... = - - 145
Trust Boundary = - - _. 146
‘Qos Mechanisms—Classification and Marking... - - 147
Classification Tools... - . cn 149
(QoS Mechanisms—Policing, Shaping, and Re-Marking...... - 154
Tools for Managing Congestion... - - - ce 153
Tools for Congestion Avoidance... - - . son 156
Challenge. - - - - - _. 157
Answer Key = - - — 158
Lesson 4: Managing Cisco Devices.. - _. 159
Router Intermal Components... - - - on 159
ROM Functions . . - . sn 162
‘Stages of the Router Power-On Boot Sequence... - - ce 163
Configuration Register... - - - sn 185
Changing the Configuration Register - - - so 189
Locaiing Cisco 10S Image Files... - - - son 470
Loading Cisco IOS Image Files ... - - - soe 472
Loading Cisco 10S Configuration Files - - - son TB
Cisco IOS Integrated File System and Devices... - - coon TT
Managing Cisco IOS Images... - - - — 180
Deciphering Cisco IOS Image Filenames. - - - co 184
Creating the Cisco 10S Image Backup. - z - — 183
Uporading Cisco IOS Images - - - 186
Managing Device Configuration Files. - - - on 189
Password Recovery....... - = - - 193
Challenge. - - - - - _. 196
Answer Key - - = - - 198
Lesson 5: Licensing... - - _. 199
Introducing Licensing..... - - os 199
Licensing Verification .... - - - - sn 208
Permanent License Installation... . - . sn 204
Evaluation License Installation... . - . so 206
Backing Up the License . - - - - so 209
Uninstalling the License. - - - - sn 210
Cisco Smart Software Manager... - - - a 212
Challenge. - - - - - a 213
‘Lesson 4: Troubleshooting Scalabl
Challenge. . . . . . a 217
Answer Key . : 7 : 7 os 219Lesson 2: Implementing and Troubleshooting Scalable Multiarea Network. 201
Challenge - - - 2a
Answer Key. - - - 223
Glossary 225
e207jevoas:Accaloratad (CCNA (© 2017 Cisco Systems neModule 1/1: Implementing
Wide-Area Networks
Introduction
WANS are most often fee-for-service networks, providing the means for users to access resources ACTOSS 2
‘wide geographical area. Some services are considered Laver 2 connections between your remote locations,
typically provided by a telephone company over its WAN switches. Some of these technologies include a
setial point-to-point (leased line) connection and Frame Relay connections.
Other connections leverage the Intemet infrastructure, a Layer3 altemative, to intercomnect the remote
locations of an organization. To provide security across the publie Intemet, you can implement a VEN
solution.Intesconnactng Cisco Network
jevoas:Accaloratad (CCNA (© 2017 Cisco Systems neLesson 1| Understanding
WAN Technologies
Introduction
Inorderto continue to advance in your career, you have asked Bob if you can get more involved in WAN
deployments. Although Bob is glad that you want to expand your skills and lmowledge, he wants to assess
your level of preparedness before taking you with him on WAN deployment jobs. To gauge your level of
preparedness for WAN deployments, CCS provides atest. Bob tells you that the test will require you to
demonstrate your knowledge of WAN devices, WAN cabling, WAN protocols, and WAN technologies.
Introduction to WAN Technologies
A.WAN is a data communications network that operates beyond the geographic scope of LAN. WANs wse
facilities that a service provider or carrier, such as a telephone or cable company, provides. The provider
comnects the locations of an organization to each other, fo locations of other organizations, to extemal
services, and to remote users. WANs cary various traffic types such as voice, data, and video.‘The following are three major characteristics of WANs:
+ WANs generally connect devices that are separated by a broader geographic area than a LAN can serve.
+ WANS use the services of carriers such as telephone companies, cable companies, satelite systems, and
network providers.
+ WANS use connections of warious types to provide access to bandwidth over large geographic areas.
Introduction to WAN Technologies (Cont.)
a acer
‘There are several reasons why WANs are necessary in 2 communications environment
4 Irtexconnectng isco Networking Davies: Accelerated (CCNA) 2017 Cisco Systems, neLAN technologies provide speed and cost efficiency for the transmission of data in organizations in
relatively small geographic areas. You need WANS in a communications environment because some
business needs require communication among remote sites for many reasons, including the following
+ People in the regional or branch offices of an organization need to be sble to communicate and share
ata.
+ Organizations often want to share information with other organizations across large distances.
+ Employees wino travel on company busines: frequently need to access information that esis on their
‘corporate networks,
Because itis not feasible to connect computers across a country or around the world in the same way that
computers are connected in a LAN environment with cables, different technologies have evolved to support
this need, Increasingly, the Intemet is being used as an inexpensive altemative to an enterprise WAN for
some applicationsWAN Topology Options
A physical topology describes the physical arranger(@)vof network devices that allows for data to move
from a source to a destination network. There are three basic topologies for a WAN design.
WAN Topology Options
Sia, or Huang Spoke, Topology
enefita: Network snp. ow number of crests
{Drawoseks: Sutoptinal tate Rou. no reeundsncy
Futy Meshes Toptony:
tia: Anjan covectty,hgh ew otredundancy qb
“Drawoacks: Confiqusion complenty number treats
Pactiay Meshod Topoleny
“A compromse between stand uly meshed
Star or hub-and-spoke topology: This topology features a single hub (central router) that provides aocess
from remote networks to a Core router. All communication among the networks goes through the core
router. The advantages ofa star approach are simplified management and minimized tariff costs. However,
the disadvantages are sigificant
+The central router (hub) represents a single point of failure
+The central router limits the overall performance for access to centralized resources. The central router
is.a single pipe that manages al trafic thet is intended either forthe centralized resources or for the
other regional routers,
Fullly meshed topology: In this topology, each routing node on the periphery ofa given packet-switching
network has a direct path to every other node om the cloud. The key rationale for creating a fully meshed
environment is to provide a high level of redundancy. A fully meshed topology is not viable in large packet-
switched networks. The following are the key issues of a fully meshed topology.
+ Many virtual circuits are required (one for every conection between router).
+ Configuration is complex for routers without multicast support in nonbroadcast environments,
(isco Networking Davies:Partially meshed topology: This topology reduces the number of routers within a region that have direct
‘connections to all other nodes in the region, All nodes are not commected to all other nodes, There are many
forms of partially meshed topologies. In genera, partially meshed approaches provide the best balance for
regional topologies, which are based on the number of virtual circuits, redundancy, and performance
Note Large networks usually deploy layered combination ofthese teshnologies—for example, spatial mesh in
the network core, redundent hub-ang-spoke for larger branches, and simple hub-anc-speke for noneiical
remote looatons|
‘Network downtime can be very expensive in terms of decreased productivity and potential loss of revenue.
To increase network availability, many organizations deploy a dual-carrier (VAN design to increase
redundancy and path diversity
‘Single-carrier WANs are simpler and easier to support and manage. However, network outages can be
catastrophic. You should perform an analysis ofthe downtime cost. You should make sure that there are
adequate penalties inthe contract with the service provider to cover the cost of downtime.
Duel-carrier WANs provide better path diversity with better fault isolation between providers. The cost of
downtime to your organization usually exceeds the additional cost of the second provider and the
complexity of managing redundancyWAN Connectivity Options
‘You have many options for implementing WAI solutions. These options differ in technology, speed, and
cost. WAN connections can be either over a prvate(@@\astructue or over a public infrastructure such asthe
Intemet.
WAN Connectivity Options
Ee Internet
Private WAN connections include dedicated and switched communication link options:
+ Dedicated communication links: When permanent dedicated connections are required, point-to-point
lines are used with various capacities that are limited only by the underlying physical facilities andthe
‘willingness of users to pay for these dedicated lines. A point-to-point link provides a pre-established
WAN communications path from the customer premises through the provider network to a remote
destination. You usually lease point-to-point lines from a carrier, so they are also called leased lines
Leased lines were more popular in the past. Now a company may use a provider-managed VPN or
enterprise: managed VPN over the Intemet. Companies prefer enterprise- or provider-managed VPNs
because leased lines are by far the most expensive solution.
+ Switched communication links: Switched communication links can be either circuit-switched or
packet-switched,
— Cirevit.switched communication links: Cireuit switching dynamically establishes a dedicated
virtual comnection for voice or data between a sender and a receiver. Before communication can
start, the connection through the network of the service provider must be established. Examples of
circuit-switched communication links are analog dialup (PSTN) and ISDN.
~ Packet-switched communication links: Many WAN users do not make efficient ure ofthe fixed
‘bandwidth that is available with dedicated, switched, or permanent circuits because the data flow
‘fluctuates. Communications providers have data networks that are available to more appropriately
service these users. In packet-switched networks, the data is transmitted in labeled frames, cells, or
packets. Packetswitched communication links include Frame Relay, ATM, and X25.
Intaconnacting isco Networking Davies: Acca
1d (CONAN 2017 Cisco Systems, nePublic connections use the global Internet infrastructure. Until recently, the Internet was not a viable
networking option for many organizations because of the significant security risks and lack of adequate
performance guarantees in an end-to-end Intemet connection. With the development of the VPN
fechnology, however, the Intemet is now an inexpensive and secure option for connecting to teleworkers
and remote offices where performance guarantees are not critical. Intemet WAN connection links go
through broadband services such as DSI. cable modem, and broadband wireless, and they are combined
with VEN technologies (for example, DMVPN, GET VPN) to provide privacy across the Internet.
Broadband comection options are typically used to connect telecommuting employees to a corporate site
over the Intemet |
Service providers build networks by using different underlying technologies, the most popular being IVPLS.
Examples of provider-manazed VPNs are Layer 3 MPLS VPN and Layer 2 MPLS VPNs (VPWS and
\VPLS). MPLS is an IETF standard that defines a packet label-based switching technique, which was
onginally devised to perform fast switching in the core of IP networks. This technique helped carriers and
lage enterprises scale their networks as increasingly large routing tables become more complex to manage
‘The industry began using MPLS over a decade ago 28 a way to allow enterprises to ereate end-to-end
circuits scross any type of transport medium using any available WAN technology
‘WAN Connectivity Options (Cont.)
SPs use several diferent WAN technologies to connect their subscribers. The comnection type that is used
onthe local loop, or last mile, may not be the same as the WAN comnection type that the ISP employs
‘within the ISP network or between various ISPs.
Each of these technologies provides advantages and disadvantages for the customer. Not all teclmologies are
available at all locations. When a service provider receives data, it must forward this data to other remote
sites for final delivery to the recipient. These remote sites either connect to the ISP network or pass the data
from ISP to ISP and to the recipient. Long-range communications are usually these connections between
ISPs or among branch offices in very large companies.Provider-Managed VPNs
Provider-managed VPNs can either offer Layer ? or Layer 3 connectivity. IMPLS is a tecimology that was
designed to support efficent forwarding of packets (G\ss the network core that is based om a simplified
header
Provider-Managed VPNs
Ha
4
Layer 2 MPLS VPN (VPLS and VPWS}:
© Customer routers exchange routes directly.
Some applications need Layer 2 connectivity to work
Layer 3 MPLS VPN:
Customer routers exchange routes with service provider routers,
Ihprovides Layer 3 service aeross the backbone,
Layer 2MPLS VPN is useful for customers who rin their own Layer 3 infrastructure and require Layer 2
connectivity from the service provider. In this case, the customer manages its own routing information. One
advantage that Layer 2 VPN has over its Layer 3 counterpart is that some applications do not work if nodes
are not in the same Layer 2 network
Some typical examples of Layer 2 VPN are VPLS and PWS. Ifyou look from the customer perspective,
with Layer 2 MPLS VPN, you can imagine a whole service provider network as one big virtual switch,
Layer 3 MPLS VPN provides Layer 3 service across the backbone. A separate IP subnet is used on each
customer site, When you daploy a routing protocol over this VPN, the service provider needs to participate
inthe exchange of routes. Nejzhbor adjacency is established between your CE router and PE router (which
the service provider owns). Within the service provider network, there are many P routers (service provider
core routers). The job of P routers is to provide comectivity between PE routers. What this situation means
is tha the service provider becomes the backbone of your (customer) network.
Layer 3 VEN is appropriate for customers who prefer to outsource their routing to a service provider. The
service provider maintains and manages routing forthe customer sites, Ifyou look from the customer
perspective, with Layer 3 MPLS VPN, you can imagine the whole service provider network as one big
virtual router.
(isco Networking Davies:Enterprise-Managed VPNs
Organizations need secure, reliable, and cost-effective ways to comnect corporate headquarters, branch
offices, and teleworkers working in home offices and other remote locations. A VPN is usually a bridge
betnveen two private networks. You build that bride((@ era public network, typically th Intemet. VEN
enables headquarters and branch office devices to send and receive dats as if they were directly connected.
Enterprise-Managed VPNs
=
alle
ate
© Regen Once win
Home Oise win Mbe Worker wh
‘SEacoRcuer Chaco AmySonnact en
aapinp Compt | Ea Aoworscomon
A.VPN is a virtual private network that is constructed within a public network infrastructure, such as the
¢global Internet. VPNs provide an inexpensive altemative to private WAN connections. They are particularly:
hhelpfil in organizations whose workforce is highly mobile and frequently needs to connect remotely to the
conporate network and access sensitive data.
‘As shown in the figure, there are two types of VPN networks:
+ Site-to-site VPN: A siteto-site VPN is an extension ofa classic WAN network. End hosts send and
receive traffic through 2 VPN device, which could be a router or Cisco Adaptive Security Appliance
(Cisco ASA). This device is responsible for encapsulating and encrypting outbound traffic for all traffic
‘rom a particular site and sending it through a VPN tunnel over the Interzet to a peer VPI device on the
‘target site. Upon receipt, the peer VPN gateway strips the headers, decrypts the content if it was
‘encrypted, and relays the packet toward the target host that is inside its private network. Many site-to-
site VEN options are available
+ Remote-access VPN: Remote-access VPNs can support the needs of telecommuters, mobile users, and
‘extranet, consumer-to-business traffic. In a remote-aocess VPN, each host typically uses the Cisco
AuyComnect VPN Client software, Whenever the host ties to send any traffic, the Cisco AnyConnect
‘VEN Client software encapsulates the traffic before sending it over the Internet to the VEN gateway at
the edge of the target network. The VEN client may also encrypt the traffic before sending it over the
Intemet to the VPN gateway. Upon receipt, the VEN gateway behaves as it does for site-fo-site VENs.‘VPNs provide the following benefits:
+ Cost savings: VPNs enable organizations to use a cost-effective, third-party Intemet transport to
conmect remote offices and remote users to the main corporate site. The use of VPNs therefore
eliminates expensive, dedicated WAN links, Furthermore, with the advent of cost-effective,
bandwidth technologies such as DSL organizations can use VPNs to reduce their connectivity costs
‘while simultaneously increasing remote comection bandwidth.
+ Scalability: VPNs enable comporations to use the Internet infrastructure, which makes new users easy to
add. Therefore, comporations can adil large amounts of cepacity without adding sienificant
infrastructure. For example, « corporation with an existing VPN between a branch office and the
headquarters can securely connect new offices by simply making a few changes to the VPN
configuration and ensuring that the new office has an Internet connection. Scalability is a major benefit
of VPNs,
+ Compatibility with broadband technology: VPNs allow mobile workers, telecommuters, and people
‘who want to extend their work day to take advantage of high-speed, broadband connectivity, such as
DSL and eable, to gain access to their corporate network. This ability provides workers with significant
flexibility and efficiency. Furthermore, high-speed, broadband comections provide a cost-effective
solution for connecting remote offices
+ Security: VPNs can provide the highest level of security by using advanced encryption and
authentication protocols that protect deta from unauthorized access. The two available options are [Psec
and SSL.
‘There are many site-to-site VPIN options. However, each option isa litle bit different than the other.
Enterprise-Managed VPNs (Cont.)
Site-to-site VPN options:
= IPsec tunnel:
IPsoc is a tameworkf open secunty standards,
+ GRE over IPsec:
‘Addlton of GRE to HPeac enables routing and multicast
+ DMVPN (Cisco proprietary):
Simple hub-and-spoke configuration.
—Zero-touch caniguraton or naw spokes.
¥¢c VT (Cisco proprietary):
= Sinpliiad [Pees tunnel mode configuration
~_Natively supports features that previously equied GRE (outing, multicast)
(isco Networking Davies:IPsec Tunnel
Psee provides a tunnel mode of operation that enables you to use it as a standalone connection method.
‘This option isthe most fndamental IPsec VPN design model. IPsec provides four important security
services:
+ Confidentiality (encryption): The sender can encrypt the packets before transmitting them across 2
network. By doing so, nobody can eavesdrop on the communication. If nother device intercepts the
‘communication, it cannot reat
+ Data integrity: The receiver can verify thatthe data was transmitted through the path without being
‘changed or altered in any way. IPsec ensures dats integrity by using checksums, which isa simple
sedmdancy check,
+ Authentication: Authentication makes sure that the comnectiom is made with the desired
‘communication partner. The receiver can authenticate the source ofthe packet by guaranteeing and
‘certifying the source of the information. IPsec uses IKE to authenticate users and devices that can carry
‘out commuication independently. IKE uses several types of authentication including usemames and.
passwords, one-time passwords, biometrics, PSKs, and digital certificates.
+ Antireplay protection: Antireplay protection verifies that each packet is unique and not duplicated
‘IPsec packets are protected by comparing the sequence number of the received packets with a sliding
‘window on the destination host. A packet that has 2 sequence number that is before the sliding window
4s considered either a late or duplicate packet. Late and duplicate packets are dropped.
GRE over IPsec
Although IPsec provides a secure method for tunneling data across an IP network, it has limitations. Psec
does not support IP broadcast or IP multicast, preventing the use of protocols that rely on these features,
such as routing protocols. Psec also does not support the use ofthe multiprotocol traffic. GRE is protocol
that can be used to cary other passenger protocols, such as IP broadcast or IP multicast, and non-[P
protocols. Using GRE tunnels with IPsec will give you the ability to nm a routing protocol, IP multicast, or
rultiprotoeol traffic seross the network between the headend or headends and branch offices,
With a generic huib-and-spoke topology, you can typically implement static tumnels (typically GRE over
Psec) between the central hub and remoie spokes. When you want to add a new spoke to the network, you
need to configure it on the hub router. Also, the trafic between spokes has to traverse the hub, where it must
eit one tumnel and enter another. Static tunnels may be an appropriate solution for small networks, but this
solution becomes unacceptable as the mumber of spokes grows larger and larger.Cisco DMVPN
The Cisco Dyuamie Multipoint Virtual Private Network (DMVPN) enables you to better scale large and
small IPsec VPNs. The Cisco DMVPN provides simple provisioning of maniy VPN peers. It also easily
supports dynamically addressed spoke routers by its design, if you use an appropriate peer authentication
method, such as PKI-enabled peer authentication, The DMPVN enables you to configure a sinzle mGRE,
tunnel interface and a single IPsec profile on the hub router to manage all spoke routers. Thus, the size of
the configuration on the Hub router remBins constant even if you add more spoke routers to the network. The
DMIVEN also allows IPsec to be immediately triggered to create point-to-point GRE tunnels without any
IPsec peering configuration.
Cisco IPsec VTI
‘The VII mode of an IPsec configuration simplifies a VPN configuration. There are two types of VII—
static and dynamic. With VTI, you implement the IPsec session as an interface. Simple configuration and
routing adjacency directly over the virtual interface are great benefits. But keep in mind that all traffic is
encrypted and thet it supports, like standard IPsec, only one protocol ([Pvd or IPv6), The IPsec tunel
protects the routing protocol and multicast traffic, like with GRE over IPsec. The only difference is that with
‘VII, you do not need GRE and the overhead that it brings.
(conan
Cisco SystemsWAN Devices
Several types of devices are specific to WAN envire(@\nts, including CSUDSU devices, modems, and
certain types of routers and switches,
WAN Devices
+ Router: A router provides internetworking and WAN access interface ports that are used to connect to
‘the service provider network. These interfaces may be serial connections or other WAN interfaces. With
some types of WAN interfaces, you need an extemal device such as a CSU/DSU or modem (analog,
‘cable, or DSI) to connect the router to the local POP of the service provider.
+ Core router: A core router resides within the middle or backbone of the WAN, rather than at its
periphery. To full the role of the core router, a router must be able to support multiple
‘telecommunications interfaces of the highest speed in use in the WAN core. It must also be able to
‘forward IP packets at wire speed on al these interfaces. The router must support the routing protocols
‘that are being used in the core.
+ CPE: Devices on subscriber premises are referred to as CPE. A subscriber to a service provider owns
‘the CPE or leases the CPE from the service provider. A copper or fiber cable comnects the CPE to the
nearest exchange or OO of the service provider. This cabling is often called the local loop or last mile.
‘CSUIDSU devices, DSL modems, and optical fiber converters are just three of many WAN connection
‘pes
(Cisco Systems, Ine Intrconnectng isco Networking Devioes: Accelerated (CCNAWAN Devices (Cont.)
ore) cayosu
igtal cater tine
tephone o Coma Cale)
CSUMDSU: A CSUDSU is a device thatis used to connect DTE to a digital ciruit, suchas a TI carrier
line. A device is considered DTE ifitis either a source or destination for digital data. Examples of DTE,
include PCs, servers, and routers. In the figure, the router is considered DTE because it passes data to
the CSUDSU, which will forward the data to the service provider. Although the CSUIDSU connects to
the service provider infrastructure using a telephone or coaxial cable, such as a TI or El line, it
connects to the router with a serial eable. A CSU:DSU is actually two devices in one box. The CSU
provides termination forthe digital signal and ensures connection integrity through error correction and
line monitoring. The DSU converts the T-carier line frames into frames that the LAN can interpret and
vice versa. You can also implement a CSU/DSU as a module within a router, so that a serial cable is not
necessary. A CSUDSU is sometimes referred to as DCE because it provides a path for communication.
DCE is amore general label for devices that provide interfaces for DTE into communication links on
the WAN cloud: When the links are digital, the DCE is 2 CSU-DSU. When analog telephone lines are
used, the DCE is amodem.
(isco Networking Davies:WAN Devices (Cont)
Telephone Cobee
+ Modem: A modem is a device that interprets digital and analog signals, enabling data to be transmitted
‘over voice-grade telephone lines. At the source, digital signals are converted to 3 form that is suitable
‘for transmission over analog communication facilities. At the destination, these analog signals are
xetumed to their digital form. There are various types of modems. Inthe figure, a DSL modem (which is
‘wed in DSL broadband environments) connects fo a router with an Ethernet cable and comnects to the
service provider network with a telephone cable. You can also implement a modem as a router module
WAN Devices (Cont.)
+ Optical fiber converters: Optical ber converters are used where a fiber-optic link terminates in order
‘to convert optical signals into electrical signals and vice versa. You can also imaplement the converter a2
router or switch module.
(Cisco Systems, Ine Intrconnectng Cisco Networking Devioes: Accolerated (CCNA) 17+ Wireless router: Wireless routers are used when you are using the wireless medium for WAN
connectivity. You can also use an access point instead of a wireless router.
118 lneroonnecing Cisco Networking Devices: Acalrated (CONAK} 2017 Cisco Systems, neChallenge
1. Which two statements about WANs are true? (Choose two)
A. WANs generally connect devices that are located over a broader geographical area
B. WANs generally connect devices that are close to each other.
C. WAN stands for World Around Networks.
1D. WANs use connections pf various types to provide access to bandwidth over large geographical
2. Which WAN topology option provides the highest level of redundancy?
A. Imuband-spoke
B. partially meshed
C. filly meshed
D. point-to-point
Which two VPNs are examples of service provider-managed VPNs? (Choose two)
A. remote-access VPN,
Bl Layer? MPLS VPN
C. Layer3 MPLS VPN
D. DMVPN
4. Which two technologies are examples of Layer 2 MPLS VPN technologies? (Choose two.)
A. VPLS
B. DMVPN
C. GETVEN
D. VPwS
5. Which protocol should be used with IPsec to give you the ability to num 2 routing protocol or IP
‘multicast across the network between two site-to-site VPN peers?
A. GRE
B. Psectumel
c WAN
D. MPLS
6. Which protocol provides confidentiality, data integrity, authentication, and antireplay protection?
AL GRE
Bo Prec
c. ISDN
D. MPLS
7. Which service ensures that transmitted data has not been changed or altered in any way?
confidentiality
data integrity
authentication
antireplay protection
voyAnswer Key
Challenge
1 AD
2
3. BC
4.A,D
5
6
A
B
. B: Understanding
Point-to-Point Protocols
Introduction
ACCS customer is adding two new branch offices. At one branch, the customer is running HDILC for the
WAN protocol for the connection back to the corporate site. At the other branch, itis rmning PPPoE. You
‘wil be the primary technician forthe deployment. Would you like to go onsite now to complete the job or
study the training before the deployment?
Serial Point-to-Point Communication Links
‘A poluto-poit (or seria) communication ink provides sil, established WAN communication path
from the customer premises through a carrier network to a remote network.
‘Serial Point-to-Point Communication Links
Serial point-to-point links use leased lines to provide a dedicated
connection.
sence Pro —— —D
won :‘When permanent dedicated connections are required, a point-to-point link is used to provide a pre-
established WAN communications path from the customer premises through the provider network to a
remote destination. A serial line can connect two geographically distant sites, such as a corporate office in
‘New York and 2 regional office in London. Point-to-point lines are usually leased from 2 carrier and are
therefore often called leased lines. For a point-to-point line, the carrier dedicates fixed transport capacity
and facility hardware to the line that the customer is leasing. However, the carrier will still se multiplexing
teclologies within the network,
Point-to-point links are usually more ekpensive than shared services such as Frame Relay. The cost of
leased-line solutions can become significant if you use them to connect many sites over increasing
distances. However, there are times when the benefits outweigh the cost ofthe leased line. The dedicated
capacity removes latency or jitter between the endpoints. Constant availability is essential for some
applications such as VolP or video over IP.
‘You need a router serial port for each leased-line connection, Ifthe underlying network is based on the
‘North American (T-care”) or European (Fcarzie) technologies, the leased line comects to the network of
the carrer through CSU/DSU. The purpose of the CSU:DSU is to provide a clocking signal to the
customer equipment interface ffom the DSU and terminate the chamnelized transport media of the carrier on
the CSU. The CSU also provides diagnostic fimctions such as a loopback test. Most Tl or El TDM
interfaces on current routers include approved CSU/DSU capabilities,
Leased lines provide permanent dedicated capacity and are used extensively for building WANs. They have
been the traditional choice of connection but have several disadvantages. Leased lines have a fixed capacity
However, WAN traffic is often variable and leaves some of the capacity unused. In addition, each endpoint
needs a separate physical interface on the router, which increases equipment costs. Any change tothe leased
line generally requires a ste visit bythe carrier persomel.
Bandwidth
Bandwith refers to the rate at which data is transferred over the communication link. The underlying
carrier technology depends on the bandwidth that is available. There isa difference in bandwidth points
between the T-carrier specification and the E-camrier system, as shown in the table,
Bandwidth
Ne Tae oe
Nene ee
on rea Ta
i ECR ET
mre teste
eee 2s (1 Dae
ir Eeecee Oe
ome ereptetnas a
(isco Networking Davies:Leased lines are available in different capacities and are generally priced based on the bandwidth that is
required and the distance between the tio connected pots,Point-to-Point Protocol
PEP criginally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links.
PPP also established a standard for the assignment and management of IP adiiresses, asynchronous (start
and stop bit) and bit oriented synchronous encapsulation, network protocol multiplexing, link configuration,
link quality testing, error detection, and option negotiation for such capabilities as network layer address,
negotiation and data compression negotiation.
PPP provides router-to-router and host-to-network comections over both synchronous and asynchronous
cireuts. An example of an asynchrong)s conection is a dialup connection. An example of @ synchronous
connection is a leased line.
‘There are many advantages to using PPP, including the fact that it is not proprietary. Moreover, it includes
many features thet are not available in Cisco High-Level Data Link Control (Cisco HDLC), including the
link-quality management feature. If too many errors are detected, PPP takes down the link. PPP also
supports PAP and CHAP authentication,
Point-to-Point Protocol
Overview of PPP:
PPP provides a standard method for transporting datagrams over point-to-
point links,
PPP supports PAP and CHAP authentication
Pe PPP
Cisco HDLC is a data link layer protocol that can be used om leased Lines between two Cisco devices. For
communicating with a device from another vendor, synchronous PPP isa better option.
PPP provides a standard method for transporting multiprotocol datagrams (packets) over point-to-point
Tinks,
Intaconnacting isco Networking Davies: Acca
(Conny 2017 Cisco Systems, nePoint-to-Point Protocol (Cont.)
PPPis a layered architecture:
+ PPP can eanty packets from several protocol suites by using NCP.
+ PPP controls tho setup of several ink options by using LCP.
PEP includes these three main components:
+ Amethod for encapsulating multiprotocol datagrams
+ Extensible LCP to establish, configure, and test the WAN data-link connection
+A family of NPs for establishing and configuring different network layer protocols; PPP allows the
‘simultaneous use of multiple network layer protocols,
LCP provides versatility and portability to-a wide varity of environments. LCP is used to automatically
determine the encapsulation format option, to manage varying limits on sizes of packets, and to detect a
loopback link, and terminate the link: Other optional facilities that LCP provides are authentication of the
identity of its peer on the lik and the determination of wien a link is functioning comectly o failing
‘The authentication phase of a PPP session is optional. After the link has been established and the
authentication protocol is chosen. the peer can be authenticated. Ifthe authentication option is used,
authentication takes place before the network layer protocol configuration phase begins
Cisco offers CHAP and PAP for PPP authentication.
(©2017 Cisco Systems, ne Intrconnectng isco Networking Devioes: Accelerated (CCNA) 25Discovery 47: Configure Serial Interface and PPP.
Introduction
This discovery will guide you through the configuration of the clock rate on the DCE side of a serial link
and the configuration of PPP encapsulation on both sides of a serial link between twwo Cisco IOS routers.
‘The virtual lab is prepared with two routers as depicted inthe topology diagram and the connectivity table.
RI has the DCE side ofthe serial link, jhile R2 has the DTF side. Both routers have their basic
configurations in place, including hostnames, IP addresses, and EIGRP asthe routing protocol.
First you will configure and verify a serial interface to use PPP encapsulation, and then you will configure
PAP and CHAP authentication for PPP.
Topology
Topology
Loo Loo
Lot Lot
(conan
Cisco Systems‘The configuration is as follows:
+ Both routers have their basic configurations in place, including hostmames and TP addresses.
+ EIGRP is configured on both routers, making them aware of other loopback interface networks.
Device Details
Device lntertace Netghtbor lip Address
Rt [serait 2 hovares
Rt Leosbecko L 102.1681.104
Rt lLocsbeckt L 172.10.1.1124
re [Serisi1 Rt horas
Re Loopback L 02.1882. 1704
Re lLeceteckt L ra.re.204Task 1: Configure Serial Interface for PPP
Activity F
Configure Serial Interface for PPP
To configure a serial interface for PPP, perform the following actions:
Enter serial interface configuration mode.
‘Set bandwidth on the intorface (this setting does not physically
change the bandwidth of the interface).
4 nat ban
~ 9
Set the clock at oa spoctiod valve. This action shouldbe sat on
DCE cable ony
o.oo 0
Configure Serial Interface for PPP (Cont.)
‘Set the interface encapsulation to PPP (the defauit is HDLC).
2e-b01) mowenctation re
Interconnectng Cisco Networking Devios: Accserted (CCNA) 2017 Cisco Systems, neTo configure a serial interface, follow these steps:
1. Enter the global configuration mode, and use the configure terminal commend,
2. When in you are in the global configuration mode, enter the interface configuration mode. In this,
‘example, you would use the interface serial 0/0/0 command.
‘Ifa DOE cable is atached, use the clock rate Js interface configuration command to configure the
‘lock rate for the hardware connections on serial interfaces, such as network interface modules and
‘interface processors, to an accfptable bit rate. Be sue to enter the complete clock speed. For example, a
‘lock rate of 64,000 cannot be abbreviated to 64. On serial links, one side ofthe link acts as the DCE,
‘and the other side ofthe link acts as the DTE. By default, Cisco routers are DTE devices, but you can
‘configure them as DCE devices. In a "back-to-back" router configuration in which a modem is not used,
‘yoummst configure one ofthe interfaces as the DCE to provide a clocking signal. You must specify the
‘lock rate for each DCE interface that is configured inthis type of environment. The clock rates in bits
per second are as follows: 1200; 2400: 4800; 9600; 19,200; 38,400; 56,000; 64,000; 72,000: 125,000;
148,000; 500,000; 800,000; 1,000,000; 1,300,000: 2,000,000; and 4,000,000.
Note Some ofthe routers donot require clock rate configuration anymore,
+ Enter the specified bandwidth forthe interface. The bandwidth Kips command overrides the defrult
‘bandwith that the show interfaces command displays. It is used by some routing protocols, such as
EIGRP, for routing metric calculations. The router also uses the bandwidth for other types of
‘calculations, such as those calculations that are required for RSVP. The default bandwidth for serial
‘ines is the T1 speed (1 544 Mbps). The entered bandwidth has no effect on the actual speed ofthe line
Note The attached serial cable determines the OTE or OCE mode ofthe Cison router. Choose the cable to match
tha network requirement
‘The table provides a description of the commands that you use to configure a serial interface.
‘Commanct Description
‘interface serial interface_number [Enters the serial interface configurtion mode forthe specified interface,
‘bandwidth Barnciviath [Sets the interface bandwith metric in klbits per seoond
clock vate clock rene [sets the interiace clock rae in bits per second. You use this command on
DCE interiaces ony
‘encapsulation ppp |Seis the interface encapsulation to PPP.Note A comnman misconception for students who are new to networking and Cisco IOS Software is to assume
{hat the Bandwidth command changes the physosl Bandiith ofthe ink. The bandwidth command
‘adifes only the banciieth mri that routing proteoals such 2s EIGRP and OSPF use. Sometimes, 2
network scministrator changes the bancvidth value o have more control over the chosen eutgcing
interfece
‘The encapsulation ppp command has ho arguments, but you mus fist configure the router with an IP
routing protocol to use the PPP encapsulation. Ifyou do not configure PPP on a Cisco router, the default
encapsulation for serial interfaces is Cisco High 1 evel Data Link Control (Cisco HDLC).
Step 1 Access the console of R1. The Seriall/l interface on R.1 has the DCE cable. Configure it for a
clock rate of 64,000 bps and define the bandwidth as 64 kbps.
On Ri, enter the following commands:
Rilconfig)# interface Seriali/t
(configif]® clock eate 64000
(configif]# bendeidth 68
(config-i)# end
‘The clock rate command controls the actual speed at which the serial link runs. The banchwidth
command does not affect the rmning speed of the interface, but instead sets the information that
is provided to dynamic routing protocols for determining the metrics thet are associated with the
link.
‘The clock rate command expects its argument in bits per second, while the bandwidth
command expects its argument in kilobits per second.
(isco Networking Davies:Verify Serial Interface
Verity Serial Interface
‘To-verity a serial interface for PPP, perform the following actions:
Display information about the physical interface and to determine
the type of cable.
Verify the encapsulation method that is configured on the serial
interface.
‘The show controllers command displays information about the physical interfaces. This command is useful
‘with serial interfaces to determine the type of cable that is comuécted without the need to physically inspect
‘the cable itself,
Use the show interfaces command to verify thet the proper encapsulation is enabled om the serial interface.
‘The output shows which encapsulation is enabled on the serial interface
Step 2 Use the show controllers command to verify the configuration of Serial1/1 and to verify that the
status indicators are all up.
(Oni, enter the following command:
17 Cisco Systems, Inc Intrconnectng Cisco
ring Devices selaatad (OMAK)Step 3
Rif chow contwollers Serieli/1
MAT: show controle
7 lime eenfegron200
Line stave: op
cable oype : V1 (i.23) CENRSEleyiSnecesred TeXEREaSeySS000
Eunningei, port 4=0811750)
Use the show interfaces command to verify the bandwith setting thatthe routing protocols will
use, along with the current serial encapsulation method,
(On RI, enter the following command:
iE show inteefoces Sevialt/t
Sessati/a is up dine pretecel 42 up
IG LEG) byesss BWediisfaes, atx 20000 usee,
relisbilicy 200/00" ealona 1/208, reload 1/28
Qceusing serstagy: £162
Oatper queue: 0/40 (site/man)
S minute input ace 0 bize/oec, 0
san, 0 ignored, 0 abort
bytes, 0 underruns
0 satpur buffer Zailares, 0 ourpuc buffers swapped our
3 carrier transitions | OCD=up OSR-up DIR-up RTSup CTS-up
Both R1 and R2 are using the default Cisco HDLC encapsulation method.
Step4 — EIGRP is preconfigured on both RI and R2. Verify the content of the routing table on RI.Step 5
Step 6
On RI, enter the following command:
Loopback)
‘The marked networks have been leamed via the EIGRP protocal.
From R1, ping the Loopback0 interface (192.168.2.1) of R2.
On Ri, enter the following command:
Sending 5, 100-byte ICMP Echos to 192.168.2.1, timeout is 2 seconds:
UE
Success rate is 100 percent (6/8), round
‘The ping should succeed.
On the R1 Seriall interface, set the encapsulation protocol to PPP.
On Ri, enter the following command:
Rit conf
Enter configuration somas
iz) one per line. End with GNTL/2,
(Sonfig)? snterface Seriali/2
198: apuai~s-nERcHRN
nolding eine exp:
Ris using PPP for encapsulation while R2 is using HDLC. These encapsulation protocols are
incompatible, which is why the protocol on the Ri Seriall/l interface went down and the BIGRP
neighbor relationship with R2 kas timed out.Step 7
Step 8
Step 9
Display the status of the Seriall/'1 interface on R1 with the show ip interface brief command.
(On RI, enter the following command:
Rit chow Sp interface brief Seriala/t
Interface wPlkddsess OR? Mechod Status Bravocol
Serdali/1 ota YES manual up dom
‘The administrative status ofthe interface is up, but the protocol is down,
‘Access the console of R2. Configure its Seriall/1 interface to use PPP encapsulation and
‘configure its bandwidth setting to 64
(On R2, enter the following command:
Rat cone
Enver configurstion comnde, one per line. End wich CNTE/2
Ra (config) anterface Sevinli/1
RZ (config-s£)¥ Dandhricth 68
2 (config-s2)¥ encmprulation PEP
Rolconfigeisit
296: SLINEFROTO-S-UFLOW: [Sse PROBSESINSHIUREEESSES)
Dec 3 14
Baiconfig-s2)
Shee 2 ie
AGO: ODURL-S-1SRCEONGE: RIGRRSIRS TA OUSNGSGHESENIONSIO
2 new adjacency
Ricnfigad)? ord
Ree
‘When the encapsulation protocol is compatible with its peer, the line protocol state changes to
up. With the line protecel up, the EIGRP neighbor relationship with R 1 is able to reestablish
‘You did not need the clock rate command on R2 because the router it is connected with the DTE.
side of the cable.
Use the show interface command on R2 to verify the serial encapsulation method.
(On R, enter the following command:
(isco Networking Davies:Ret chow Snterfaces Seviali/t
MU 1500 byces, BN 68 Hbic/eec, OLY 20000 usecy
8, exleed 1/288, exload 1/255
open
hang neve
2 2); Total curpar drops: 0
Guevesng sracegy
S minute inpus eave O bits/sec,
S minute outpot rate 0 bis
28088 packets input, 13
Receaved 0 brosdensts (0 7
failures, 0 output bus
Sirtier transitions DCD=up Di
Both Ri and R2 are using the PPP encapsulation method
Step 10 For one last verification of connectivity, fom R2, ping the Loopback interface (192.168.1.1) of
RL
(On R2, enter the following command:
Ret ping 192.168.2.2
Type aneape sequence to shore
Sending &) 100-byee TMP Echos co 192.168.1.1, timeout iz 2 seconds
Task 2: Configure PAP Authentication for PPP
Activity
To improve security mitigation, the PPP protocol suite was designed to offer the optional feature of user
authentication, Devices that initiate « PPP session must pass a strict identity verification before the link
establishment is approved. The lnk is activated only after the proper eredentials have been given and
accepted. IF PPP authentication fails for any reason, access is denied and the lik is prompt terminated.
Although you may configure proprietary authentication methods to work with PPP. the two main types of
PPP authentication methods are PAP and CHAP.
PAP is a two-way handshake that provides 2 simple method for a remote node to establish its identity. PAP
is performed only upon initial link establishment, There sno encryption. The usemame and password are
sent in plaintext. After the PPP link establishment phase is complete, the remote node repeatedly sends a
username and password pair to the router until authentication is acknowledged or the connection is
terminated.PAP is not a strong authentication protocol, but it may be adequate in environments that use token-type
passwords that change with each authentication, PPP is not secure in most environments. Also, there is no
from playback or repeated trial-and. ‘remote node is in control ofthe ffequency
and timing of the login attempts.
Configure PAP Authentication for PPP
PAP authentication for PPP works in the following manner:
Usemame HO Username Branch
Password Ciscot23 Pasaword Ciscot23
Inthe example, the Branch router frst sends its PAP usemame and password to the HO router. The HQ
router evaluates the Branch router credentials azaint its local database. Ifthe Branch router credentials
match, the FQ router accepts the connection. Ifnot, the HQ router rejects the connection. This process isthe
‘two-way handshake in which the Branch router authenticates to the EIQ router. Then the reverse process
‘occurs With the HQ router authenticating to the Branch router.
Configure PAP Authentication for PPP (Cont.)
To configure PAP authentication for PPP, perform the following
actions:
Define the username and password that the lacal router uses to
authenticate the PPP peer in the global configuration mode.
aciocntsg\¢ uanmame usernane paovon
‘Set the authentication type to PAP on the Serial interface,
(Optional) Enable outbound PAP authentication. To authenticate
itself to a remote device, the local router uses the usemame and
password that the ppp pap sent-usarname command specifies.
26 _Interconnectng Cisco Networking Davies: Accelerated (CCNA) 2017 Cisco Systems, ne‘The router that the ppp authentication pap command is configured on will use PAP to verify the identity
ofthe other side (peer). Itmeans that the other side (peer) must present its usemame and password to the
local device for verification
‘Usernames and passwords thatthe local router uses to authenticate the PPP peer are defined by using the
username password command. When the peer sends its PAP usemame and password, the local router will
check hader that usemame and password are configured locally. If there is a successful match, the peer is
authenticated
‘The ppp pap sent-username username password password command enables outbound PAP
authentication, The local router uses the tsemame and password that the ppp pap sent-usermame command
specifies in order to authenticate itself toa remote device. The other router must have this same username
and password configured by using the username password command.
Step 1 OnRI, define the usemame User? that uses the cisco password.
On RI, enter the following command:
cont t
(config)? uremane User? password cisco
‘The usemame value is not case-sensitive, but the password value is case-sensitive
Step 2 OnR2, define the usemame User] that uses the cisco password.
(On R2, enter the following command:
Rot cont ©
Ra (config)? username Useri pessword cisco
Step 3 Configure PAP authentication on the Serial 1/1 interface on RI. Set User] as the sent usemame
and cisco as the password,
(On RI, enter the following commands:
(config) # anterface Seriali/1
Ri lconfigeif]# ppp authentication pap
(sontigéit]
Eee # Ieitosee.204: QLINEEROTO-S-UEDOM: Line protocol on Tntestacs
Seeiali/1y changed stare vo down
“Dec 4 14:10:48.997: SDIRL-S-NERCIANGE: ELGRESIDSHNO0=SNGSGHESETAOSIEISZ]
(Serieli/2) ap sown: incesface dows
(configrif)$ ppp pep zentwuremane User! pasword cisco
(configeif)# enet
‘The line protocol for the Serial1/1 interface goes down because R2 is not configured for PAP
authentication yet. The result is a lost EIGRP neighbor relationship
Step 4 Configure PAP authentication on the Serial 1/1 interface on R2. Set User? as the sent usemame
and cisco as the password
(On R2, enter the following command:Ra (config)? antexface Serial! /1
Ru (cenfig-té)$ ppp suthentaestion pap
Ra (cenfig-i2)$ ppp pep sent-username User? paseword cizco
Ra icontig-e2i
Dec 4 14:11747_057: $LINEFROTO-S-UFDOM: [Sisal SEStSHSHl/SaUIREEESSES!
Seriall/1, changed state te up
Rejeenfigei2)
Sbec. 4 14:11:42.911: 4DURL-S-NERCHANGE: EIGRE-1Pvé 100: MENGHEGETAOUNEIES
Rat
‘The PPP session is reestablished with PAP authentication. The results that the line protocol on
the Seriall/I interface goes up and the EIGRP neighbor relationship is reestablished.
Verify PPP Ses:
n
Verify PPP Session
Verify the PPP session establishment and authentication type.
‘The show ppp all command verifies that the PPP session is established. It also displays information about
the authentication used, peer name, and IP address,
Step 5 On R2, verify that the PPP session is established,
(On R2, enter the following command:
Raf chow ppp all
as. Cp} FAP4 IECE+ COSC InseiT OSUSEIN) = aa
‘The PPP session is established with PAP authentication on the Seriall/! interface to the peer that
ismamed RI by using the peer IP address 10.1.1.1
17 Cisco yet
(isco Networking Davies:Task 3: Configure CHAP Authentication for PPP
Activity
(CHAP isthe preferred authentication method and is considered superior to PAP. CHAP involves a three-
‘way exchange ofa shared secret. When authentication is established with PAP, it essentially stops working,
‘which leaves a network vulnerable to attacks. Unlike PAP, which only authenticates once, CHAP conducts
periodic challenges to make sure thatthe remote node still has a valid password value. CHAP, which uses 2
ttyee-way handshake, occurs at the startup of ink and periodically thereafter to verify the identity ofthe
remote node,
‘After the PPP link establishment phase is complete the local router sends 2 challenge message to the remote
node. The remote node responds with a value that is calculated using a one-way hash fmction, typically
D5, based on the password and challenge message. The local router checks the response azainst its own
calculation of the expected hash value, the values match, the authentication is acknowledged. Otherwise,
the comection is terminated immediately
CHAP protects against a playback attack by using a variable challenge value that is unigue and
unpredictable. Because the challenge is unique and random, the resulting hat value will also be unique and
random. The use of repeated challenges is intended to limit exposure to any single attack. The local router
ora third-party authentication server is in contol of the frequency and timing ofthe challenges.
‘Configure CHAP Authentication for PPP.
CHAP authentication for PPP works in the following manner:
Usemame Branch
Inthe example, the HQ router sends a challenge message to the Branch router. The Branch router responds
to the HQ router by sending its CHAP usemame and password. The HQ router evaluates the Branch router
credentials agains its local databace. Ifthe credentials match, it accepts the comection, If they do not, it
rejects the connection. This process is 2 three-way handshake of the HQ router authenticating the Branch
router. A three-way handshake ofthe Branch router authenticating the HQ router follows,
17 Cisco Systems, Inc Intrconnectng Cisco
ring Devices Aosslaatad (CCNAX) 30Configure CHAP Authentication for PPP (Cont.)
To configure CHAP authentication for PPP, perform the following
actions:
Configure the router hostname to identify it.
Configure the username and password in the global configuration
‘mode to authenticate the PPP peer.
‘Set the authentication type to CHAP on the Serial interface,
‘To configure PPP authentication, you must configure the interface for PPP encapsulation. Follow these
steps to enable CHAP authentication:
‘Verify that each router has a hostname assigned to it. To assign a hostname, enter the hostname
Jostname command in the global configuration mode. This name must match the usemame that the
authenticating router expects at the other end ofthe link.
On each router, define the username and password that are expected from the remote router with the
username username password password global configuration command. Add a usemame entry for
cach remote system thatthe local router communicates with and that requires authentication. Note that
the remote device must have a corresponding usemame entry Zor the local router with a matching
password
(Configure PPP uthentication with the ppp authentication {chap | chap pap | pap chap | pap}
‘interface configuration command.
— Tfyou configure ppp authentication chap on an interface, all incoming PPP sessions on that
inierface are authenticated via CHAP.
~ Hfyou configure ppp authentication pap, all incoming PPP sessions on that interface are
authenticated via PAP.
~ Ifyou configure ppp authentication chap pap, the router attempts to authenticate all incoming
PEP sessions via CHAP. If the remote device does not support CHAP, the router tries to
authenticate the PPP session via PAP. Ifthe remote device does not support either CHAP or PAP,
the authentication fils, and the PPP session is dropped,
~ Ifyou configure ppp authentication pap chap. the router attempts to authenticate all incoming
PPP sessions via PAP. Ifthe remote device does not support PAP, the router tries to authenticate the
PPP session via CHAP. If the remote device does uot support either protocol, the authentication
fails and the PPP session is dropped.
(isco Networking Davies:Note
Ifyou enable both methods, the frst method tht you speci is requested during link negotisbon. Ifthe pear
sugges using the second method or refuses the fist methed, the second method is ried
‘The table describes the commands that you use to configure CHAP authentication.
‘Command [Description
‘hostname hostrizme [Sets s device hostname
‘username usermume password password — [Configures anew userto the deviow
‘interface interface_name Enters the interface configuration made for the specified interface.
‘encapsulation ppp [Configures s ink with the PPP-type encapsulation,
‘ppp authentication chap [Enebles CHAP suthentiostion en the interface with PPP
fencepsuistion
Step 1
Step 2
Step 3
OnRI, define the usemmame R2 and the cisco password.
On Ri, enter the following command:
‘The usemame value is not case-sensitive, but the password value is case-sensitive
On R2, define the usemame RI and the cisco password.
On R2, enter the following command:
228 cont
Ra (config)? username Ri password cisco
Change the PPP authentication type to CHAP on the Serial1/1 interface on RI. You also need to
remove all configuration related to PAP authentication
On RI, enter the following commands
cont ©
(config)? anterface Seriali/1
(configrit]# no ppp authentication pep
(configrif)i ne ppp pap cent-ureenama Ureel paccword eizes
(config-it)# ppp suthentication chapstep 4
Step 5
(Change the PPP authentication type to CHAP on the Seriall/1 interface on R2. You also need to
remove all configuration related to PAP authentication,
(On, enter the following commands:
Rat cont £,
R2[config)? interface Serial! /t
Rl(config-is)¥ no ppp authentication pop
Rilconfig-i2)$ no ppp php sentwasername User? pasword cizco
Ra (configi#)# ppp authentication chap
RZ [configiZ)# east
Ra (centig)#
Enable debugging of PPP authentication on R2. Then disable and re-enable the Seriall/1
interface to reinitiate PPP session establishment. Observe the debug messages that are associated
with the CHAP authentication process.
(On R2, enter the following commands:
Ri (config) intertace Serial 1/1
Rilconfig- it) ao aebug ppp suthentication
R2(config-if)# shutdown -
“Dec 7 09:37:08.0892 SDURLS-NORCHANGE: RIGRESIEO0=9ISGHES ASSEN
0.099: 4LINEFROTO-S-UFDOM: (Se SESESESNSSTISEEESSES!
RZleenfignis)£ ne chutdoum
Re (centig-iz]#
Raiconfagi2i 8
Dec 7 08:27,
fecialt/1, changed stave to up
Teenting connection as 3 deaicztad 1
Session handle [P000012] Session ad
Dee
“Dee
bee
“Dee
bee
“Dee
Ra icontigsz)
Sbee 7 o9e4
{LINEFROTO-S-UFIOWG: [SHSROESESINSRIURESESEEST
B2iconfag"s2i®
ys naw adjacency
Rajcenfig-s2)¥ end
Rat
‘The debug output shows the bidirectional CHAP authentication procedure. Both sides challenge
each other, respond to each other, and pass each other. After successful authentication, the line
protocol comes back: up and the EIGRP neighbor relationship is establishedStep 6 For one last verification of connectivity, from R2, ping the R1 Loopback0 interface
(192.168...
(On R2, enter the following command:
Ret ping 192.168.2.2
Type eecape sequence to skort
Sending §, L00-zyee TQ@ Echos vo 192.162.1.2, vineour iz 2 seconds:
Step 7 — OnR2, verify that the PPP session is established
On R2, enter the following command:
R2t chow ppp all
‘The PPP session is established by using the CHAP authentication method on the Seriall/1
interface to the peer that is named RI with the peer IP address 10.1.1.1
‘This is the and ofthe ciscovery lab.Discovery 48: Configure and Verify MLP
Introduction
This discovery will guide you through the configuration of the Multilink PPP, also mown as MLP. MLP
provides « method for spreading traffic across multiple distinct PPP comnections. You can use it, for
example, either to connect a home computer to an ISP by using two traditional modems or to comnect a
company through two leased lines
‘You will configure an MLP bundle on R1 and R2, which are connected by two serial interfaces.
Topology
Topology
— Se112)
eT Set
Cisco Systems
(conan‘The configuration is as follows:
+ Both routers have their basic configurations in place, including hostmames and TP addresses.
+ PPP encapsulation is configured om all serial interfaces.
Device Details
Device lintertace Neighbor l> Address
Rt [seratt lee frora.w2e
Rt [seriait:2 Re Hror.2o4
Rt Loopback L 192 168.1.1124
Rt Loopback L jivet04.124
Re [seratt lea hor1206
Re [serait:2 lea hor2204
Re loopback | j192-188.21704
Re Loopback | lrr2ta2ve4Task 1: Configure and Verify MLP
Activity F
Multilink PPP
o
MLP overview:
Multilink PPP bundlo.
4
Point-to-Point
+ MLP combines mutiple physical links into a logical bundle called a
———. OO 0
Multilink PPP (Cont.)
MLP overview:
functionalities:
~ Load balancing
— Increased redundancy
Link fragmeriation and intreaving (LF)
+The MLP over serial interfaces feature provides the following
‘The MLP feeture provides 2 load-balancing fimetionalty over multiple WAN links while providing
imultvendor interoperability and support for packet fragmentation, proper sequencing, and load calculation
on both inbound and outbound traffic. The MLP feature supports the fragmentation and packet-sequencinz
specifications that are described in RFC 1990.
Interconnectng Cisco Networking Devios: Accserted (CCNA)
2017 Cisco Systems, neMLP allows packets to be fragmented and fragments to be sent atthe same time over multiple point-to-point
links to the same remote adress. Multiple links come up in response to a defined dialer load threshold. The
load can be calculated on inbound or outbound traffic, as required, for the traffic between specific sites.
MLP provides bandwidth on demand and reduces transmission latency across WAN links,
MLP can work over synchronous and asynchronous serial types of single or multiple interfaces that have
been configured to support both dial-on-demand rotary groups and PPP encapsulation.
MLP combines multiple physical finks into a logical bundle that is called an MLP bundle. An MLP bundle
isa single, virtual interface that connects to the peer system. Having a single interface (MLP bundle
interface) provides a sinale point to apply hierarchical queueing. shaping, and policing to traffic flows.
Individual links in a bundle do not perform any hierarchical queueing. None ofthe links have any
Innowledge about the traffic om parallel links. Hierarchical queueing and QoS cannot be applied uniformly to
the entire ageregate traffic between 2 system and its peer system. A single, virtual interface also simplifies
the task of monitoring traffic to the peer system (for example, all traffic statistics rum on one interface).
MLP works with fully functional PPP interfaces. An MLP bundle can have multiple links connecting peer
devices. These links can be serial links or broadband links (Ethemet or ATM). As long as each link behewes
like a standard serial interface, mixed links work properly in a bundle
‘The MLP over serial interfaces feature enables you to bundle interfaces into a single, logical connection
called an MLP bundle. This feature also provides the following imctionalities:
+ Load balancing: MLP provides bandwidth on demand and uses load balancing across all member links
‘ap to ten) to transmit packets and packet fragments. MLP mechanisms calculate the load on inbound or
‘outbound trafic between specific sites, Because MLP splits packets and fragments across all member
‘inks during transmission, MLP reduces transmission latency across WAN links, Ideally, all member
‘inks ina bundle would be ofthe same bandwidth (for example, Ts). Load balancing and
‘fragmentation and interleaving also allow for a mix of unequal cost member links for situations where a
‘suall increment in the bundle bandwidth is required.
+ Increased redundaney: MLP allows traffic to flow over remaining member lines when 2 port fails.
‘When you configure an MLP bundle that consists of T! lines from more than one line card and if one
‘ine card stops operating, a part of the bundle on other line cards continues to operate.
+ Link fragmentation and interleaving: The MLP fagmenting mechanism fregments large, nonreal-
‘time packets and sends fragments at the same time over multiple point-to-point links to the same remote
address. Smaller, real-time packets remain intact. The MLP interleaving mechanism sends real-time
packets betveen fragntents of nonreal-time packets, thus reducing real-time packet delay.
Step 1 Access the console of RI and verify the status of serial interfaces that are connected to R2
On Ri, enter the following commands:
Rif chow Snterfaces Sexiali/t
Hardvare is MST
255/285, cxload 1/255, reload 1/255
open
Open: ECP; CDPCE, ceo 16) loopback nov serStep 2
Step 3
Rit show intexfacer Serial3/2
MI 1500 byces, BW 2044 Fbit/eec, DLY 20000 usec,
welishiliey 255/258, exised 1/255, exlead 1/255
speciation FPF, LCP Open
Open: IFCP, CDECP, cre 16, Loopback not set
‘The Serial1/1 and Seriall 2jnterfaces are connected to R2. Both interfaces are up and have IP
addresses assigned. Encapsulation is set to PPP on serial interfaces that commect Rl and R2
EIGRP is preconfigured on both Ri and R2. Verify the content ofthe routing table on RI.
On Ri, enter the following command:
show 3p route
IS sumazy, 12 ~ 1
o> OR, P - periodic downloaded seatic source,
$+ geplicated route, #~ nexe hop override
yy subnetied, § subnet:
[y connected,
y tennected,
‘The highlighted networks are leamed via EIGRP. Traffic to these networks is load-balanced via.
Seriall’1 and Serial1/2 links.
From RI, ping the Loopback0 interface (192.168.2.1) on R2.
(On RI, enter the following command:
Rif ping 152.260.2.1
Eipe escape sequence £0 abore
preen
Saccene rate 4s 100 percent (8/8), sound
sip min/avg/max = 21/21/24 me
‘The ping should be successful
NetworkingConfigure a Multilink Bundle
Configure a Multilink Bundle
To.canfigure a multiink bundle, perform the following actions:
‘Assign a multlink bundle group number and enter the interface
configuration mode.
Assign an IP address to the muitiink interface.
a-t0n4 Ap tena
Enable MLP.
Configure a Multilink Bundle (Cont.)
Restrict a physical link to join only the designated multlink group
intertace.
When you configure MLP, you need to first configure a multilink bundle by creating a multilink interface,
‘You need to assign an IP address to this multlink interface, enable the MLP feature, and restrict a physical
link to join only the designated multilink group interface
Step 4 Create a multilink interface on R1 with the following specified characteristics:
+ Set the group mumiber as 1.
+ Setthe IP address as 10.1.1.1/24.
(©2017 Cisco Systems, ne Intrconnectng isco Networking Devioes: Accolerated (CCNA) 49Step 5
+ Enable the MLP feature
+ Restrict physical links with the multlink group 1 only to join this bundle.
OnRi, enter the following commands:
RiP cone &
Create a multilink interface on R2 with the following specified characteristics.
+ Set the group mumber as 1
+ Set the IP addrese as 10.1.1.2/24.
+ Eneble the MLP feature,
+ Restrict physical links with the multilink group 1 only to join this bundle.
(On R2, enter the following commands:
Rat cone
Enea configuestion remands,
Relccafig)# antevfuce Maitalinx?
Releentig-ssit
2 ALL: ALTNK-6-UFDOM: RRS MSNA SE ESESTESY
Re (config i2)$ sp adders 10.2.4.2 255.255.255.0
Ra (config-s#)$ ppp meltilink
Ra (config-i2)$ ppp meltilink group 2
Re (config-if)# end
Ro
per line. End with CHTE/2
(isco Networking Davies:Assign an Interface to a Multilink idle:
Assign an Interface to a Multilink Bundle
‘To.assign an interface to a multitink bundle, perform the following
actions:
Enter the interface configuration mode for the serial interface.
Remove any specified IP address.
Enable PPP encapsulation,
Enable MLP.
Assign an Interface to a Multilink Bundle (Cont.)
Restrict a physical link to join only the designated muttlink group
interface.
After you create the multilink interface, you need to assign a serial interface to the multilink interface
To designate 2 link to a specified bundle, use the ppp multilink group command for configuring the Link
‘This command restricts the link to join only the specified bundle. When a link negotiates to join an MLP
bundle, the link must provide proper identification that is associated with the MLP bundle. If the negotiation
is successful, the links assigned to the requested MLP bundle If te link provides identification that
coincides with the identification that is associated with a different MLP bundle in the system or ifthe Linke
fails to match the identity of an MLP bundle that is already active on the multilink group interface, the
connection terminates.
(Cisco Systems, Ine Ietrconnectng Cisco Networking Devioes: Accelerated (CCNA) 51A link joins an MLP bundle only if it negotiates to use the bundle when a conection is established and the
identification information that is exchanged matches thet of an existing bundle.
‘When you configure the ppp multilink group command on link, the command applies the following
restrictions on the link:
+ The link is not allowed to join any bundle other than the indicated group interface,
+ The PPP session must be terminatell ifthe peer device attempts to join a different bundle,
Step 6 Remove the IP addresses from the Seriall/1 and Serial 1/2 interfaces on both RI and R2.
On Ri and R2, enter the following commands:
(config)? interface Serinlt/1
(seafig-if)# no ap addeeas
contig #2]
amare: "down
Rat cone &
Enter configuration comands, one per line. End with CNTE/Z
Ra(config)? antexface Serinli/t
R2(config-i#)¥ no ip addeess
Ra (configs#)# exits
Ri (config)? interface Seriall/2
Ra (config-i#)¥ no Sp addeess
Ra (config-s#)¥ end
Re
After you remove the IP adress fiom the interfaces on R1, the EIGRP neighbor relationship
immediately goes down,
Step 7 Assign the Seriall/1 and Seriall/2 interfaces to the interface Multilink on R1
On Ri, enter the following commands:
(isco Networking Davies:Step &
Enter cenfigueation commands, one per line. End with CVTL/Z
contig) # antevénce Sevanli/2
(configeit)# ppp maltilank
all/l, changed sezee to down
@ ib:gare8. 276, SUINEGROTO-S-CEDOM: Line pratocst
(config if)? ppp maltalank group 2
(contigyét) |
INEEROTO-S-UFDORK: Line protocal
44:08.031: SLINEEROTO-S-UEDOMN: Line protocol,
Seriali/1, changed state to wp
(conig"if)# ext
(config)? anterface Seriati/2
Ri lconfig-if]# ppp mlbilisle
(contignit)$
Dac 9 10:34:76.984: SLINEEROTO-S-UEDOMN: Line peotocsl,
Sesiali/2, changed stave vo wp
(configif)# ppp maltalank group 2
(contignis)#
Dee 9 10:24:29.999: @LINEEROTO-S-UEDOMH: Line peotecsl
Seziali/2, changed stare to down
cendignif}# end
Assign the Seriall/1 and Serial1/2 interfaces to the interface Multilink on R2.
On R2, enter the following commands:Rat cone
Enter cenfiguestion comands, on per Line
Relccnfig)# antevfuce Sevinli/?
Ra (config-s#)$ ppp meltilink
changed state te dem “
"4o:98249.840: SLINEFROTO-S-UFLOMY: Line provecol on Inte
End wieh CMTE/Z
SS: ALIMEFROTO-S-UPDOMI: Line peotecel on Ince
RZ (config-ifl ppp multilink group 1
Re(config-se]$
Dec § 10:48251.050: SLINEPROTO-S-UEDOM: Line protocol on Inves
Aecesel, changed suate vo down
Shee" 10:98201.062: ALINEFROTO-S-UPDOMT: Line peatecal on Ines
Seriati/2, changed staie to dora
Dac 9 10:28:31 087: #LINK-2-UEDONN: ([SSRSSSHRMGIES SWE Ty UERSRSEMSEESTESIES
Relecntignslé
co Vizeual-
stax 9 10:28+01-104: #cINEPROTO-S-UPDOMN: Line pectorol en Ines
Seriali/2, changed stave to up
“Dex 10:25291.216: $DURL-S-NBRCHANGE: BEGRESERSA)AU0=N=SGRESETZOSESISHS
Ri(confignaf)# exit
Ra(config)? interface Sexialt/2
Ra (config-s2)$ ppp meltilink
Dec # 10:25:86 861: ALINEFROTO-S-UPDOM: Line protocel,
Seriali/2, changed state to dom
Bec § 1ovaerse.so2: sETEsRGTO-S-veLom: Line pestesol
Dec § 10:48:56,512: SLINEPROTO-S-UEDOM: Line protocol
Seriaii/2, changed state ro dom,
Ralconfig-if)® ppp multilink group 2
Geriali/2, changed state to up
“Dec # 10:26700.78: 4LINEFROZO-S-UPDOM: Line provocel,
Seriali/2, changed state to upVerify Multilink Bundle
‘Verify Multilink Bundle
Display the multtink PPP bundle information.
‘The show ppp multilink command verifies that all the desired interfaces are in the multilink PPP bundle
Step 9 Verify the multilink PPP bundle information by using the show ppp mulilinks command on RI
On RI, enter the following command:
Rig show ppp multalink
Bundle name: R2
Remove Enapoint Discriminator: [1] RZ
Eoual Endpoint Discriminsrer! [1] RE
Bundle up Zor 02:97:05, total Bandwidth 3088, Joad 2/255,
Receive buffer Linit 24000 byses, frag vimeous 1000 me
0/0 fraguents/bytes in reassenbly List
0/0 discarded Seagence/ayzen, 0 lost received
OxS6E saceivad sequence, OwS72 sane sequence
No insevive muleilank anterSsces
‘The Serial 1 and Serial) interfaces are members of the logical interface bundle Multilink {.
Step 10 Shut down the Serial1/1 interface on Ri to simulate a failure om this lik.
On RI, enter the following commandsStep 11
Step 12
Rit cone
Enear configuestion comands, ons per line. End with CHTE/2
Rijecafig)? anterfuce Sevinli/?
Rilconfig-s2)# shutdown
te dom
CHANGED: Incerface Seriaii/2, changed state co
Riicotigaa? cna
‘Verify the status ofthe interface Multilink! on RI.
(On RI, enter the following command:
chow inte
les Maltilinkd
MPO 1500 byces, BW A844 Rbic/eec, BLY 20000 usec,
relisbilisy 255/258, cxiead 1/255, rxlead 1/255
aprcisvion FPP, LCP Open, multizink Open
Open: IFCP, CLECP, Isopback oz ser
Heepalive set (10sec)
<-> eutpus cmisted o>
‘The logical interface Multilink is still up, even though one of the members of the bundle was
shut down.
‘Verify the content ofthe routing table on RI again,
(On RI, enter the following command:
ey R~ RIP, > mobi
OSEr, ZA ~ OUEF inter arcs
2 EIGRE, EX ~ EIGRF =
212 semary,
ea, ~~ candid
ay connected, Malitinil
Toopeacko
‘The outgoing interface in the routing table for networks that are leamed via EIGRP points to the
logical interface Multilink 1
Neto Systems, InStep 13 From R1, ping the Loopback0 interface (192.168.2.1) on R2.
(Oni, enter the following command:
Type escape sequence +0 aboss
Sending $y 100nyee IME Echos vo 192.168.2.1, timeout is 2 seconds
Hae
Succees rate is 100] percent (6/8), ron
‘The ping should be successful despite the Seriall/1 interface on R being shut down. Note: You
may have to wait a couple of seconds for the ping to werk,
‘This is the and ofthe ciscovery lab.Discovery 49: Configure and Verify a PPPoE
Client
Introduction
‘This discovery will guide you through the configuration of 2 PPPoE client, PPoE provides an emulated (and
optionally authenticated) point-to-poinf link across a shared medium, typically @ broadband agaregation
network such as the ones that you can find in DSI. service providers. A very common scenario is to run a
PPPoE client on the customer side, which connects to and obtains its configuration from the PPPOE server
(headend router) atthe ISP side,
‘You will configure RI as a PPPCE client, while R2 is preconfigured as the PPPoE server.
Topology
Topology
Cisco Systems
(conan‘The configuration is as follows:
+ Both routers have ther basic configurations in place, including hostames and JP addresses.
+ Ris preconfigured as the PPPOE server.
Device Details
Device lntertace Neighbor hp Address
Rt lEthemes0'1 Ro -
Rt Leopbecko! | 02 188.1108
Rt Loopback L fra. t6.1.1126
re themeso/1 Rt jor 124
Re Loopback: | 102 168.21708
Re Loopback | lrraso2026Task 1: Configure and Verify a PPPoE Client
PPPoE Client
PPPoE client overview:
‘PPPOE is a commonly used application in the deployment of DSL.
+ ACisco router can act as a PPPOE client.
+ You can connect muitiple PCs on the Ethemet segment that is connected
to the Cisco 10S router hat acts as a PPPOE cient
‘The PPPCE client feature provides PPPoE client support on routers on customer premises, Before the
introduction ofthis feature, Cisco TOS Software supported PPPoE on the access server side only. The figure
shows a typical network topology for PPPoE client deployment
PPPOE is 2 commonly used application in a DSL deployment. The PPPOE client feature expands the PPPoE
functionality by providing support for PPPoE on both the client and the server.
ISPs often provide their customers with a DSL modem that has one Ethemet interface to comnect to the
customer Fthemet segment, and another interface for DSL line connectivity. ATM is typically rm between
the customer modem and the DSLAM Tn such acase, the DSL modem acts as abridge only when the CPE
isnot configurable for any IP connectivity or enhanced features over DSL. This situation limits your
connectivity to only one PPPoE client PC. With the addition of a Ciseo 10S router that connects tothe
Ethemet of the DSL modem, you can run the PPPoE client IOS feature on the Cisco router. This way, you
can connect multiple PCs on the Ethemet segment that is connected to the Cisco 10S router. With the use of
the Cisco 108 router, you can enhance your DSL connectivities and all IOS features, such as Security, NAT.
and DHCP to internal hosts
‘The PPPoE client initiates a PPPoE session. Ifthe session has a timeout or is disconnected, the PPPoE client
‘will immediately attempt to reestablish the session. The following four steps describe the exchange of
packets that occurs when a PPPoE client initiates a PPPoE session:
1, The client broadeaste a PADI packet
2. When the access concentrator receives a PADI that it can serve, itreplies by sending 2 PADO packet to
the client
(isco Networking Davies:3. Because the PADI was broaclcast, the host may receive more than one PADO packet. The host looks
‘through the PADO packets that itreceives and chooses one. The choice can be based on the arcess
‘concentrator name or on the services that ae offered. The host then sends a single PADR. packet tothe
‘access concentrator that it has chosen,
4. The access concentrator responds to the PADR by sending aPADS packet. At this point, a virtual
access interface is created that will ten negotiate the PPP, and the PPPOE session will run on this,
‘virtual access
Ifa client does not receive a PADO for a preceding PADI, the client sends out a PADI at predetermined
intervals. That interval length is doubled for every successive PADI that does not evoke a response, until the
interval reaches a configured maximum. If PPP negotiation fails or the PPP line protocol is brought down
for any reason, the PPPOE session and the virtual access will be brought down. When the PPPoE session is
brought down, the client waits for a predetermined number of seconds before trying again to establish a
PEPOE.
Configure a Dialer Interface on a PPPoE Client
Configure a Dialer Interface on a PPPoE Client
‘To configure a dialer interface on a PPPOE client, perform the
following actions:
Define a dialer interface.
‘Specify that the IP address for the dialer interface is obtained via
PPP/IPCP address negotiation.
‘Set the encapsulation mode to PPP.Configure a Dialer Interface on a PPPoE Client (Cont.)
‘Specify the dialing poo! that the dialer interface uses to connect to a
‘specific destination subnetwork.
‘The PPPoE client configuration is relatively simple. You need to create a dialer interface to manage the
PPPoE comnection, then tie it later to-a physical interface that provides the transport.
To create a dialer interface and to enter the interface configuration mode, use the interface dialer mamber
command. When you are in the interface configuration mode, you need to specify thatthe IP address for a
dialer interface is obtained via PPP/IPCP address negotiation, Also set the encapsulation mode to PPP. The:
last task requires you to specify the dialing pool that the dialer interface uses to comnect toa specific
destination subnetwork.
Step 1 Create a dialer interface to handle the PPPoE comection:
+ Instruct the client to use an IP adress thatthe PPPoE server provides
+ Set the encapsulation type to PPP.
+ Specify the dialing poo! that the dialer interface uses to comnectto a specific destination
subnetwork to "1"
On Ri, enter the following commands:
Rit cone &
Enter configuration comands, on per line. End with CHIL/Z.
Rilconfig)? intexface Dialer!
Ri(config-if)$ ip address negotiated
Ri (config-s2)¥ encapralation PEP
Ri (config-s#)¥ dialer pool 2
Ri lconfig EZ] 8 end
Re
(isco Networking Davies:Assign a Physical Interface to the PPPoE Dial Group
Assign a Physical Interface to the PPPoE Dial Group
To assign a physical interface to the PPPOE dial group, perform the
following actions:
Enter the interface configuration mode.
Remove all IP addresses from the interface.
Configure @ PPPOE client and connect the dialer interface
configuration to a physical interface.
‘You need to connect the dialer interface configuration to a physical interface by using the pppoe-client
dial-pool-mumber rmomber command, You also need to make sure that no IP address is manuelly assigned
to the physical interface.
Step 2 Assign the interface Ethemet0/I toa newly created PPPoE dial group 1. Also make sure that no
IP address is manually assigned to the Ethernet01 interface.
On RI, enter the following commands:
Rit cont
Enter configuration comands; one per Line. End wich QITL/Z.
Ri (config) # interEace EthemctO/t
Ri(configit)# no ap address
Ri (configif)# pppoe-client dinl-pool-runber
SBec 11 12:49:17,541. QLINE-O-UPDOM: Incerface Virtual-Access?, changed stace
0 up
Ri leontagnseit
Access?) changed state to up
“Dec i1/12:49:17.589; Q0UAL-S-NERCHANGE: ELGAE-IPrs 100: Neighbor 10.10.19.2
(Disaert) is up: new adjacency
Bi (configrée}# ene
RE
‘You should see a notification indicating that the PPPoE session is successfully formed, An
EIGRP neighbor relationship also gets established between R1 and R2 immediately after an IP
address is assigned to the RI router (PPPoE client) from the R2 router (PPPoE server)Verify the PPPoE Client
Verify the PPPoE Client
To verify the PPPOE client, perform the following actions:
Verify that the dialer interface is up.
Verify that the PPPoE session gets established,
When you verify a PPPoE client, first make sure that the dialer interface is up and running. Then also make
sure that the PPPoE session is established by using the show pppoe session command.
Step 3. On Ri, verify thatthe interface Dialer] has negotiated an IP address from R2.
On Ri, enter the following command:
Rig show ip interface brict!
Eshernet0/0 wasesigned YES IVR up we
Eshernet0/2 unassigned «YES NVRAM up =
Loopbako s02.462.1.1 Yee WVRAM up =
Hoopbacka qgas.d.i YES RAM up =
Ri gets the IP address from the PPPoE server (R2) and from the pool of IP adresses starting
‘with 10,10.10.3 and ending with 10.10.10.10. Notice that the IP adress is om the dialer interface,
not the physical Ethemet0)l interface
Step 4 Verify that the PPPOE session is established on RI
OnRI, enter the following command:
(isco Networking Davies:Step 5
WA 4 ash 2e00.21
‘You should see that th PPPoE. session is established on the interface Ethernet01
Note: The MAC addresses in your output may be different.
From RI, ping the Loopback0 interface (192.168.2.1) on R2.
On RI, enter the following command:
ping 492.168.2.1
O0-byee TOME Echos zo 182 168.21, cinesut is 2 seconde:
sp min/avg/nan = 4/4/S me
‘The ping should be successful because EIGRP is preconfigured on both routers,
‘This isthe and ofthe ciscovery lab.Challenge
1. Which PPP authentication protocol authenticates a device on the other end ofa link with an encrypted
password?
A MDS
B. PAP
C. CHAR
D. DES
2. Which two commands must be configured on two routers that have their serial links directly comnected
‘with DTE and DCE cables in order to ping each other? (Choose two.)
A. encapsulation ppp
Bo ip address
C. clockrate
D. no encapsulation hale
Which PPP protocol controls the Layer 2 operation of PPP?
A PoP
BLO
Cc. cDPcP
D. IPXcP
4, Tworonters, RI and R2_ have 2 leased line between them. Each router had its configuration erased and
‘was then reloaded. R1 was then configured with the commands shown here:
Rilconf)# hostname RL
iconf)# interface =0/0
Ri (config"i#)# encapeclavion ere
Rilconfig"i#)# ppp suchenticstion chap
‘Which configuration command can complete the configuration on RI so that CHAP can work
correctly? Assume thet R2 has been correctly configured and that the password is "fred."
A. Noother configuration is needed.
BL ppp chap (global command)
C. username RI password fred
D._ username R2 password fred
E. pppchap password fred
5. Here isthe output ofa show command. Which two statements about the $0/0/1 interface are true?
(Choose two.)
show interfaces serial 0/0/2
-ia10/0/0 iz vp, Line pet
Internet address is 10.0-1.2/20
selisbilicy 258/258, cxload 1/255, reload 1/285,
spealation EPP, LCP Open
Open: TRCE,CORCP, loopback mot set
Bee «a0 222)
CAC checking enabled
(isco Networking Davies:‘The interface uses HDLC.
‘The interface uses PPP.
‘The link should be able to pass PPP frames.
‘The interface curently cannot pass [Pv traffic.
6. Heres an excerpt from the output of a show interfaces command on an interface that is configured to
‘use PPP. A ping of the IP address on the other end ofthe link fails. Which two options are reasons for
the failure, ming thatthe problem that is listed inthe answer is the only problem with the link?
(Choose two.)
yop
overs
Internet address 42 10.0.2.1/20
A. The CSU/DSU that is connected to the other router is not powered on.
B. The IP address on the router at the other end of the link is not inthe subnet 192.168.2.0/24,
C. CHAP authentication failed.
1D. The router on the other end of the link is configured to use HDLC.
7. Which usemame must be configured on routers for PPP CHAP authentication?
ausemame that matches the hostname of the local router
ausemame that matches the hostname of the remote router
‘ausemame that matches neither hosmame
xo restriction on usemames exists
vowAnswer Key
ChallengeLesson 3
Tunnels
: Configuring GRE
Introduction
A customer wants to comect a branch office to its headquarters. Because the comnection is over the Intemet
‘and running 2 routing protocol, CCS has determined thatthe customer needs a GRE tunnel. You are the
technician Who is assigned to do the deployment and you need to know how to establish a GRE tunnel and
‘verify its proper operation. Would you like to go onsite now to complete the job or would you like to finish
the traning?
GRE Tunnel Overview
Generic Routing Encapsulation, also known as GRE, is a tmeling protocol which provides a secure path
for transporting packets over a public network by encapsulating packets inside a transport protocol. GRE
supports multiple Layer 3 protocols such as IP, [PX, and AppleTalk. It also enables the use of multicast
routing protocols across the tunnel.
GRE adds a 20-byte IP header and a 4-byte GRE header, hiding the existing packet headers. The GRE
header contains 2 flag field and a protocol type field to identify the Layer 3 protocol being transported. It
may contain a tunnel checksum, tunnel key, and tunnel sequence number. GRE does not encrypt traffic or
use any strong security meanures to protect the traffic.
GRE can be used along with IPsec to provide data source authentication and data confidentiality and ensure
data integrity. GRE over IPsec tumels are typically comfigured in a hub-and-spoke topology over anGRE Tunnel Overview
The following are the main GRE characteristics:
+ GRE is one of many tunneling protocols.
+ IP protocol 47 dofines GRE packets,
+ Itallows routing information to pass between connected networks,
* No eneryption is used.
Note GRE, developed by Cisco, is designed fo encapsulate arbivary types of network layer packets inside
‘arbitrary types ef network layer packets, 2s defined in RFC 1701, Generic Routing Encapsulation (GRE)
RFC 1702, Generic Routing Encapeulaton over IPv4 Networks; and RFC 2784, Generic Routing
Enogpaulation (GRE).
A tunnel interface supports a header for each of the follow
+ A passenger protocol or encapsulated protocol such 2s IP\4 or [Pyf; this protocol is the one that is
‘beng encapsulated
+ A carrier or encapsulation protocol (GRE, im this case)
+A transport delivery protocol, such a8 IP, which is the protocol that caries the encapsulated protocol
GRE has these characteristics:
+ Ttusesa protocol-type field in the GRE header to support the encapsulation of any OSI Layer 3
protocol
+ Itis stateless. It does not include any flow control mechanisms, by default
+ It does not include any strong security mechanisms to protect its payload.
+ The GRE header, together with the tunneling IP header, creates at least 24 bytes of additional overhead
for tumneled packets.
Note Youray have to adjust the [TL] on GRE tunnels by using the ip mtu interface configuration command,
‘Tris MTU must match on both sides,
70 Inteconnactng isco Networking Davies: Accalerated (CCNA) 2017 Cisco Systems, neDiscovery 50: Configure and Verify a GRE Tunnel
Introduction
This discovery will guide you through the configuration, verification, and usage of a GRE tunnel to comnect
IP networks by using a completely different IP network as a transit link. The live virtual lab is prepared with
the devices that are represented in the topology diagram and the connectivity table. All devices have their
basic configurations in place, including hostnames and [P adclresses on the Ethernet and loopback
interfaces. EIGRP is configured on R and R3 forthe 10.0.0.018 network. R2 and R3 are not aware of any
of the 172.16.0.0/16 networks that exist on R1 and R4. The tunnel interfaces have not been configured yet,
Configuring them is one of your tasks during this discovery. Once the tunnel interfaces are up and
operational, you will verify commectivity between the 172. 16.0.0/16 networks through the GRE tunnel.
Topology
7‘The configuration is as follows:
+All devices have their basic configurations in place, including hosmames and IP addresses.
+ EIGRP is configured on R2 and R3.
+ A static route is configured for 10,0.0.0/8 on RI and R4.
+ OSPFis configured on Rl and Ré after the tunnel is configured
Device Information
Device Details
Device lnterace Neighbor lp Aderess
Ri ethemeo0 Ro H0.10.1.1708
Ri lthemetor | fra set.ve8
RA Locrbecks | jz2seti.t4
Ri [rune Re i721600.1
R2 ethemeoo ea 10.10.1276
R2 lthemetor ks Ho.10.2.1008
R2 loopbecko | jo-10.12.4728
17 Cisco yet
(isco Networking Davies:Device Interface Neighbor lp Address,
Ra lEtrerneto10 Re Horos.s2
Ra letnernetort Re horo2.206
RS Leopbeckcl L- lroro.13.124|
Re lEtrernet010 Rs horo3.206
Re fEthermetort L 1172, 10.4.1124
Re Leopbacka. L l72.10.14.1108
Re [runnato Ra l172.10.002
Task 1: Configure and Verify a GRE Tunnel
Activity
Complete the following steps:
Step 1
In the first few steps ofthis discovery, you will veriff the status of the network as it has been
prepared. Start by accessing the console of R1 and displaying its routing table
Enter this command on Ri:
show ip route
Wi ~ OSEF NSSA external
ie route, H-TERE, 1
10-10.1.0/24 a2 directly connected, Behernet0/0
20.20.1.4/22 dz aizectiy connected, Eeherner0/0
372126.1.0/24 is dareaciy connected, Eshernet0/1
Connected, Eehernet0/1
iy connected; Leoposckd
i
Rl is not nimning any dynamic routing protocols, Other than the locally connected routes, the
only other route isa static route for the 10.0.0.0/8 network. Ré-is configured ina similar fashion.
Verify that R1 can ping the R4 Ethemet010 interface (10.10.3.2)Step 3
Bending 5, 100-byte ICMP Echos to 10.10.9.2, timeout is 2 seconds
Rl and R4 can reach each ofher by using the 10.0.0.0'8 network.
Access the console of R2 and display its routing table.
Enter this command on R2:
Rat show sp route
Codes: Z - local, C - connected,
= OSEF excernal ype 1) E2 ~ OSPF excernal 2)
3, gu 1S-I3 summary, 11 - ISIS aevel-1,
$0.0.0.0/8
3010.2.0/24 as directay connect
20-10.2.1/22 is directly connect
subnets, 2 masks
4, Eeherner0/0
a, Behernes0/4
R2 ismming EIGRP and is peering with R3. Between them, they are aware ofthe entire
10.0.0.018 address space within the topology. Neither R2 nor R3 is aware ofthe 172.16.0.0/16
address space that is behind R1 and Ra.
(isco Networking Davies:Configure a GRE Tunnel
Configure a GRE Tunnel
To implement a GRE tunnel, perform the following actions:
Create a tunnel interface,
Configure the GRE tunnel mode. This mode is @ default tunnel mode
So itis not necessary to configure I.
v4 ema mae ge
Configure an IP address for the tunnel interface.
sted abn Spradic
Configure a GRE Tunnel (Cont.)
‘Specify the tunnel source IP address,
‘Specify the tunnel destination IP address,
‘The mininauma GRE tunnel configuration requires specification of the tumnel source address and destination
address. You must also configure an IP subnet to provide IP connectivity across the tumne! link.
Note Ateach end ofthe tunnel, you must use symmetrical, reechable sddresses. You can use lnepbeck
‘adcresses ifthey sre reachable
(©2017 Cisco Systems, ne Intrconnectng isco Networking Devioes: Accelerated (CCNA‘Command Description
tunnel source ip-adahecs |specifes the tunnel source IP adress in interface tunnel configuration
rede, This IP ederess isthe ene that is assigned tthe local intrisce
tunnel destination jp-adiress] | Species the tunnel destination IP cress in interface tunnel oofiguetion
Imede. This IP edcress isthe one that is assigned to the local interface or
lhe remote router
ip address ip-adress mask |Specifes the I ecéress ofthe tunnel intrtsce
tunnel mode gre ip |specifes the GRE tunnel mode asthe funnelinterfce mode in interisce
funnel eanfiguraon made. The GRE tunnel mode is the defaut tunnel
rede on Gisco routers, so you do not need fo enter his command.
Step 4 Access the console of RI and define the interface Tunel0. Assign it the IP address
172.16.99.1/24. The RI Ethernet00 interface (10.10.1.1) should be the source and the R4
Ethemet 0:0 interface (10.10.3.2) should be the destination.
Enter these commands on Rl
Rit cont t
Enter configuration commande, ons per Line. End with CNTL/Z
(config)? smtexface tannel0
Rileonfig-i2)
Step 5
‘The Tunnel0 interface was administratively up immediately after being defined, and its line
protocol came up immediately after being fully configured.
Access the console of R4 and define the peer Tunnel0 interface. Assign it the IP address
172.16.99.2/24. The Rd Ethernet0i0 interface (10.10.3.2) should be the source and the RI
Ethemet 0,0 interface (10.10.1.1) should be the destination.
Enter these commands on Rd:
Networking Systems, InRet cont
Enter configuestion comands, one par line. End wih CVTL/Z.
Re |contag)# antereace tunnelO
Re (contigs)?
changed sezea co deve
BM (configeit)? ip sdieass 172.46.99.2 285.258.285.0
RG (config'é#)# tunnel eource 10.10.3.2
RG (config'st)# tonnel destination 10.10.4.2
Bi (contigs) 4]
/-TIEEROTO“S-UEEOMT: Line protocol on Tnvesface TunnelO,
hanged state So up
BA lconfigrif}# end
Be
Again, the Tunnel0 interface was administratively up immediately after being defined, and its
lime protocol came up inamediately after being fully configured
Verify a GRE Tunnel
Verify a GRE Tunnel
‘To-verity a GRE tunnel, perform the following actions:
Determine whether the tunnel interface is up or down.
ify the stato of the GRE tunn
Verify that the tunnel network is seen as directly connected in the
routing table.
To determine whether the tunnel interface is up or down, use the show ip interface brief command.
‘You can verify the state of a GRE tunel by using the show interface tunnel command. The line protocel,
ona GRE tunnel interface is up as long as there isa route to the tunnel destination,
By issuing the show ip route command, you can identify the route between the GRE tunnel-enabled
routers. Because a tunnel is established between the two routers, the path is seen as directly connected,
Step 6 Verify that the Turnell interface on Rl is up.
Enter this command on Ri:Step 7
Step &
Step 9
Rit chow Sp interface brief Tennel 0
Interface iEhidvess OK? Mached Seatus
‘The status and line protocol for the Tuanel0 interface are up.
‘Verify that the Tunnel0 intefface on RA is up.
Instead of using the show ip interface brief command on R4, use the show interface command:
RAP chow intexface Tenrel 0
jes; BW 100 Rbit/aec, DLY 50000 sec,
y 255/255, exioad 1/295, reload 1/285
‘The status and line protocol for the Tunel0 interface are up. You can also see the IP adress of
the tunel interface, the source and destination IP addresses, and the tunnel mode.
Display the routing table on RL.
Enter this command on R1:
RIG haw sp route
3 10.0-0.0
"2.16.1.0/24 = ainest
2.46 411/42 is divect
Connaccad, Eehernetl/1
Connected, Eeheznes0/1
272.46.11.1/22 is dizectly connected, Loopback®
© 172.16.98.0/24 is dizecsty connected, Tunnel0
(Ec eraeaisess 8/82 Ss Sisestiy Sennestesy Tennela
As you can see, the traffic that is destined for 172.16.99.0/24 enters the GRE tunnel interface.
Ping the IP address of the R4 Tumnel0 interface from RL
Enter this command on R1:
Rif ping 172.26.99.2
Type eetape sequence to sbort
preen
Saccene rate 4s 100 percent (8/8), sound
NetworkingStep 10
Step 11
Step 12
‘The ping was successful through the GRE tunnel. The ICMP echo and echo reply packets were
encapsulated in the GRE tunnel, That is, ftom R1 to R4, the IP packet from 172.16.99.1 and
destined for 172.16.99.2 was encapsulated with 2 second IP header from 10.10.1.1 and destined
to 10.10.32. This packet was sent out the R1 Bthemet 0/0 interface and was forwarded by R2
and R3 to the Rd Ethemet0/0 interface. R4 then stripped the outer IP header to reveal the
encapsulated IP packet that is destined for 172.16.99.2.
R3 and R2 did not know that that other IP packets were embeded in the packets that they
forwarded, The 10.0.0)/8 network was used to forward packets for 172.16.0.0/16 even though
the transitrouters had no awareness of 172.16:0.0/16
Being able to forward packets between the two tunnel interfaces is good. But you can also ru a
dynamic routing protocol through the tunnel. Configure the OSPF process ID 1 on R4. Assign
Ra the router ID 0.0.0.4. Include the network 172.16.0.0/16 (which cludes the interfaces
Ethemnet(/1, Loopback0, and Tunel0) in Area 0.
Enter these commands on R4:
REP cont
Ri (contig)# wouter ope 1
Ré(config-router)$ router-id 0.0.0.4
BE (config-souter)# network 272/16.0.0 0.0.255.255 aren 0
BS (contigresuter) # end
Rae
Access the console of RI to configure it for OSPF. Configure the OSPF process ID 1. Assign the
router ID 0.0.0.1, Include the network 172.16.0.0/16 (which includes the interfaces Ethemet0'l
Loopback, and TumnelO) in Area 0.
Enter these commands on RI
ait cont
Enter configuestion comands, one per line End vith CWTL/2
(config)? vente o=pe 1
(configrsoutes) # routerid 0.0.0.2
(config-souter) # network 272/16.0-0 0.0.255.255 aren 0
configeeouter] £
Nov 4 14:44:61.080: S0SPF-S-ADJCHG: Process 1, Nex 0.0.0.4 on [SRWSLONSSSI
(configrzsurer) # end
Display the routing table on RI.
Enter this command on R1:Step 13
Step 14
Rit chew Sp route
++ usps emiteed -->
2 30-0.0.0/8 (2/0) »
a 10110.1-0/24 is directs Eeherner0/0
¢ 392.26.1.0/24 i> aivecciy connected, Eeheme=0/1
L S02116.111/32 fis dizeccly connecsed, Bthernes0/1
L Ly connected, Loopback
1 has leamed about the networks that are running belaind the R4 Loopback0 and Ethemet0/L
interfaces via OSPF. The traffic that is destined to the R4 Loopback0 and Ethemet0'l interfaces
will enter the GRE Tunnel0 interface.
Ping the R4 Ethemet0/1 interface (172.16.4.1) from R1.
Enter this command on R1:
ping 172.6.4.2
gp min/avg/max = 1/2/1 ms
Again, this traffic and al other 172.16.0.0/16 trafic between Rl and Re traverses the GRE
tunel. This traffic is forwarded by R2 and R3, but they are unaware of it. They see it as traffic
between the Ri Ethemet0/0 interface (10.10.1.1) and the Ré Ethemet00 interface (10.10.3.2)
Display the OSPF neighbors of RI
Enter this command on R1:
Rif chew Sp oxpe neighbor
Neighbor 1D Pri address Invexface
Rd is an OSPF neighbor of R1, using the GRE tumel.
‘hiss the and ofthe ciccovery lab,
(isco Networking Davies:Challenge
1. Which ofthe following statements is true regarding the GRE tunnel mode?
A. GRE isthe default tame! interface mode in Cisco IOS Software.
B. GRE tunnel mode is a protocol that encapsulates any network layer packet
C. GRE tunel mode works by encapsulating only Cisco router payload that needs to be delivered to
a destination network|
2. Which two statements describe GRE characteristics? (Choose two.)
A. GRE encapsulation uses a protocol-type field in the GRE header to support the encapsulation of
any OSI Layer 3 protocol
B. GRE itselfis stateful. It includes flow control mechanisms, by defauit.
C. GRE includes strong security mechanisms to protect its payload.
D. The GRE header, together with the tumeling IP header, creates atleast 14 bytes of additional
overhead for tunneled packets.
GRE tunnel is lapping with the following error message:
Ton
Jenporarily disabled dus to secursi:
SLINEPROTO~£~UEDOM:
Eine protecel on Interface Tunnel, changed state ro down
‘What could be the reason for the tunnel flapping?
A. routing has not been enabled on the tunel interface.
B) There is an MTU issue om the tunel interface.
C. The router is trying to route to the tunnel destination address by using the tumnel interface itself
1D. An access lists blocking traffic om the tunnel interface
4. Isa GRE tunnel secure?
A. AGRE tumnel isnot secure
B ‘AGRE tummel with point-to-point links is considered secure
C. AGRE tumel is secure.
5. Which command does not tell you whether the GRE tunnel X isin an "up'up" state?
A. show ip interface brief
B. show interface tunnel X
C. show ip interface tunnel X
D. show run interface tunnel X
6. Which of the following statements is accurate regarding functionality forthe loopback adress asthe
‘tumel source IP address?
A. Youcan have the tum! source address as the loopback address.
B. Only the main or sub-interface can be the tunnel interface.
C. Only the main interface can be the tunnel interface.A
B.
c.
7. Which of the following represents the correct description of the GRE tunnel for multicast?
GRE tunnels will not support multicast and can not be used to send multicast trafic across a
network.
GRE supports multicast, 20 you can nun the routing protocals,
GRE supports multicast, and the only requirement is to enable PIM sparse mode on the GRE
‘interfaces between source and destination
(conan
Cisco SystemsAnswer Key
Challenge
A
AD
c
A
D
A
BIntesconnactng Cisco Network
jevoas:Accaloratad (CCNA 2017 Cisco Systems, neLesson 4; Configuring
Single-Homed EBGP
Introduction
[BGP is the routing protocol that is one of the underlying foundations ofthe Intemet. This protocol is
complex and scalable, but itis also reliable and secure. ER.GP is 2 part of the BGP that you use for
exchanging routes between different autonomous systems.
Interdomain Routing
‘The Intemet is a collection of autonomous systems that are interconnected to allow communication between
them, An autonomous system is by definition a collection of networks under a single technical
administration domain, EGP provides the routing between these autonomous systems.
To understand BGP, you must frst mderstand how it differs from other routing protocols,Interdomain Routing
:
eof
“AS
IGP
© Optimum nea AS routing
~ OSPF, RiP, EIGRP, ISS, et
Cotecton of networks under a single technical administration
OS
Interdomain Routing (Cont.)
coe
= Runa bebmen sdonomove naar
Enables routing poles
= Improves secuty
(One way you can categorize routing protocols is whether they are interior or exterior.
is a routing protocol that exchanges routing information within an,
‘examples of IGP
EGP isa routing protocol that exchanges routing infomation between different autonomous systems,
BGP isan example ofan EGP.
Interconnectng Cisco Networking Devios: Accserted (CCNA) 2017 Cisco Systems, neIntroduction to EBGP
Introduction to EBGP
EBGP characteristics:
= Rollable updates: TCP port 179
—s = nterdomsin routing —EGP
(eee Neer + Customer exchanges routes with
intemet
the ISP.
ISPs exchange routes with other
ISPs
‘Scalable
Secure
‘Supports routing policies
BGP uses TCP as the transport mechanism, which provides reliable commection-oriented delivery. BGP uses
TCP port 179. Two routers that are using BGP form a TCP connection with one another. These two BGP
routers are called peer routers, or neighbors,
When BGP is ruming between routers in different autonomous systems, it is called EBGP. When BGP is
running between routers inthe same autonomous system, it 8 called IGP. IBGP is used between routers in
the same autonomous system mostly for redundancy and load-balancing purposes,
Different customers are using EBGP for route exchanges between their local environments and their ISPs.
The IANA is responsible for the global coordination and assignment of AS numbers and public IP addresses
(usualy through a local ISP). Each customer has to place a request for an AS number and a set of public
space IP prefixes. The customer then establishes an EBGP session with its ISP and they exchange routing
information
ISPs are also interconnected, Each ISP has its owm AS number. ISPs can communicate directly or they can
use IXP for route distribution
‘The Intemet is expanding with high speed and the size of all outing information is extremely large. In
2015, more than $70,000 routes exist in a fall BGP table, and the number of routes is still expanding
‘Therefore, scalbility isa very important feature of BGP. BGP enables reliable information exchange and is
capable of batching the routing updates. These two characteristics allow BGP to-scale to large, Intemet-
sized networks.
BGP also has security features. You can configure peer authentication and route filtering.
For more advanced networks, BGP also provides routing policies for route update manipulationsDiscovery 51: Configure and Verify Single-Homed
EBGP
Introduction
In this discovery, you will leam how to configure extemal BGP between the service provider and customer.
‘The service provider (ISP!) has two different customers (Ri and R2). It has to establish a separate EBGP
session with each ofthe customers. All devices have their basic configurations in place, including
hhostnames and IP addresses. R1 and R2 are also preconfigured with BGP.
Topology
Topology
188 ——_Interconnectng Cisco Networking Davies: Acoserated (CCNA) 2017 Cisco Systems, ne‘The configuration is as follows:
‘+ All devices have their basic configurations in place, including hostnames and IP addresses.
+ Ri and R2 are preconfigured with BGP.
Ri has BGP AS 100.
— R2has BGP AS 200.
= Both routers are announcing @ loopback interface network.
Device Information
Device Details
Device lntertace WP Address Description
IsP1 thereto H1e2.108.1.1024 |connection to Fe
Isp letnemnetor2 l1e2.1082.106 |connection to R2
IsPt Looptecko hooo74 Lcoptecks simulate LAN
Jrctworcs
RI Ethernet l1e0.108.1.11708 [connection to ISPt
RI Leopbacko Hoor.724 Lconbacks simulste LAN
Jrstworcs
17 Cisco Systems, Inc Interconnectng isco Networking Devioes: Accolerated (CCNA) 89Device lintertace lp Address [Description
R2 letnernetor2 he2.t0a2.19128 [connection to ISPs
R2 Leopbecko: hoozs2s Lcopbacks simulcte LAN
networks
Device AS Information|
Device las Number
Isp lass
RI las 100
R2 las 200
Task 1: Configure and Verify Single-Homed EBGP
Configure EBGP
Intemet | WEBS lea a ee] Ea 49 100
Define the BGP process.
Establish a BGP neighbor retaionship.
Advertise the networks,
‘The requirements to configure basic EBGP include the following details:
‘+ AS numbers (your own and all remote AS numbers, which must be different)
+ Allthe neighbors (peers) that are involved in BGP, and IP addressing that is used among the BGP
neighbors
+ Networks that need to be advertised into BGP
(isco Networking Davies:Note IGP is the routing protocol that rung inside an AS, An IGP is not run between the ESGP neighbors that are
rasicing n ferent autonomous aystems. Therefore, te IP acliress that is used in the BGP neighbor
‘coramand must be reschable without using an IGP. which can be eccomplished by peinting stan ederess
thats reachable tough © craciy connected network or by using state Foutes to thet IP adress
A typical BGP configuration involves configuring BGP between a customer network and an ISP. This
process is called EBGP.
‘The basic BGP configuration requires three main steps
1. Define the BGP process.
2. Establish one or more neighbor relationships,
3. Advertise the networks into BGP.
Configure EBGP (Cont.)
‘To.canfigure EBGP, perform the following actions:
‘Start the BGP routing process,
| routar bap
nto BO erg es et rox hme
Define an extemal neighbor.
Advertise networks into BGP.
1. To start the BGP process on 2 router, use the router bgp command. Each process must be as.
‘ocal AS number. There can be, at most, one BGP process in a router, which means that exch router can
‘only be in one AS at any given time.
Note
‘The AS numbers @ 16-bt integer inthe range From 11065.504. When the AS-number pool rom [ANA
‘pproschad exhaustion, new 22-bit AS numbers were created2. Because BGP does not automatically discover neighbors like other routing protocols do, you have to
enplicitly configure them by using the meighbor peer-ip-acdress remote-as peer-
" character in the left column,
ISPI has the following networks in the BGP table:
+ 10.0.0.0/24, which has beem locally configured on ISP.
+ 10.0.1.0/24, which has been announced from the 192.168.1.11 (RI) neighbor
+ 10.0.2.0024, which has been announced from the 192.168.2.11 (2) neighbor
Because the command displays all routing information, the network 10.0.0.0/24, with the next-
hop attribute set to 0.0.0.0, is displayed. The next-hop attribute is set to 0.0.0.0 when you view:
the BGP table on the router that originates the route in BGP. The 10.0.0.0/24 network is the
network that you locally amnounced on ISP1 inte BGP.
Each path is marked as the best path, because there is only one path to each of the networks,
‘This is the and ofthe ciscovery lab.Challenge
1. Which ofthese is an EGP?
A. EIGR
Bo OSPF
C RP
D. BGA
When BGP nus between two peers in the same AS, what is it referred to as?
A EBGP
B. IBGP
Cc. MBGP
In the following output, the AS number 65200 is for which router?
Rilconfig-sourer)# neighbor 10.108-200.1 rencte-as 65200
A. the local router R1
B. theneighhor router with the IP address 10.108.200.1
CC. both routers
D. none of the above
Which TCP port does BGP use to establish a BGP session?
Au
Bal
Cc 179
D. 441
Refer to the output. Is the BGP session established between the peers?
10.1.1.) local AS mumber 6
BGP table version is 1, main rousing table version 1
Neighbor v
AS Meagher Ue
ing Outg Up/De
seate/PEaRed
A. Yes, itis active
B. No, active means that the router is trying to establish a BGP session, but is still nat established,
C. No, itis on the “never” stage
6. Which command can you use to know the hold time on the two BGP peers?
AL show ip bgp
BL show ip bgp summary
C. show ip bgp all
show ip bgp neighbor
D.
(conan
Cisco Systems7. What does a next hop of 0.0.0.0 mean in this show ip bgp command output?
Rowvest show Sp bgp
Seacue codes: » suppressed, d damped, h hietory, ~ valid) > best, 4 ~ intemal,
2 RIB Eailure
origin codes: i 162, b - 26, 7 - incomplece
Network Next Hop Metric LocPs= Weight Path
+> tto/26 0.0.0.0 °
+> 10.13.32.0/28 0.0.0.0 °
+> 10115.18.0/28 0.0.0.0 °
A. The router does not know the next hop.
B. The network is locally originated via the network command in BGP.
C. The network isnot valid
D. The next hop is not reachable.Answer Key
Challenge
D
wowomDModule 12: Network Device
Management
Introduction
‘The network staf is responsible for managing each device on the network according to industry best
practices and in an effort to reduce device downtime. This module describes the commands and processes
that are sed to determine network operational status, eather information about remote devices, and manage
Cisco 10S Software images, configuration files, and devices on anetwork. The module also explains how to
enable Cisco IOS Software feature sets by obtaining and validating a Cisco software license.182__Iterconnecng Cisco Network
jevoas:Accaloratad (CCNA (© 2017 Cisco Systems neLesson 1}: Implementing
Basic Network Device
Management
Introduction
‘Your boss sends you to your customer to enable device management using system logging and SNMP. You
‘will need to explain to the customer how to configure and verify syslog and SNMP.
Introducing Syslog
‘Syslog is a protocol that allows a machine to send event notification messages across IP networks to event
message collectors. By default, a network device sends the output fiom system messages and debug-
privileged EXEC commands to a logging process. The logging process controls the distribution of logging
messages to various destinations, such as the logging buffer, terminal lines, ora syslog server, depending on
your configuration. The process also sends messages to the console. Logging services provide a means to
gather logging information for monitoring and troubleshooting, to select the type of logging information.
that is captured, and to specify the destinations of captured syslog messages.Introducing syslog
Characteristics of syslog are as follows:
+ Syslog is @ protocol that allows a network device to send event notification
messages across IP networks to event message collectors,
+ You ean configure a device so that it generates a sysiog message and
forwards ito various destinations, as follows:
Loggig buter
Congo tine
Terminal toes
Syslog server
‘Youcan set the severity level ofthe messages to control the type of messages thet the consoles display and
cach ofthe destinations. You can time-stamp log messages or Set the syslog source adress to enhance real-
‘time debugging and management
‘Youcan access logged system messages by using the device CLI or by saving them to a comectly:
configured syslog server. The switch or router software saves syslog messages in an intemal buffer.
‘You can remotely monitor system messages by viewing the logs on a syslog server or by accessing the
device through Telnet, SSH, or through the console port.
10% _lnterconnectng Cisco Networking Devices: Acca
1d (CONAN 2017 Cisco Systems, neSyslog Message Format
Following isthe general format of sslog messages thatthe syslog process on Cisco 10S Software generates
by default:
seq no:tine stanp: @fscility severity WEIENIC:deseription
Syslog Message Format
‘Tne general format of syslog messages thatthe syslog process on
Ciseo IOS Software generates by defaut follows:
{An example ofa syslog message that is informing the administrator
that FastEthernet0/22 came up follows:
This table explains the items that a Ciseo TOS Software syslog message contains.
Syslog Message Format (Cont.)
CS
an ‘Sums lg messopa wha sequce
‘mie oaruthesardce sequence:
‘numbers git congestion carwnand is
‘nied
tine stamp ‘Dae aed te of he manage or event wich
Sipccrs oly fhe service tne stamps 1a)
{atetme og gb cotton
‘command is cone
tacany
severity ‘Single gt code om 0107 Bat tb
‘Sey ofthe message
(©2017 Cisco Systems, ne Intrconnectng isco Networking Devioes: Accoleated (CCNA) 105,—__f
Syslog Message Format (Cont.)
se
NEMO ‘Tha ext ing at ulcaly dose the
message
desertion “The et sg contanng diated efonmabon
out te event hatte mestage fs roporing
OS OO
‘This table explains the eight message severity levels from the most severe level to the least severe level.
Syslog Message Format (Cont.)
Emergency (seventy 0) System's unsabie|
‘Alert (soveriy 1) immediate acon needed
(cial (every 2) cetes! conatan
Error (soventy 3) eer cnaten
Waming (very 4) Wai contin
otteation seventy 8) Nema but sprifeant conten
Aetormational (ove 6) Informational message
‘Oxbuosing serrty 7) ebupgna message
Ifeeverity level 0 is configured, it means that only emergency-level messages will be displayed. For
example, if severity evel 4 is configured, all messages with severity levels up to 4 will be displayed
(Emergency, Alert, Critical, Error, and Warning),
‘The highest severity level is level 7, which is the debugging-level message. Much information can be
displayed at this level, and it can even hamper the performance of your network. Use it with caution.
1108 lnteroonnecing Cisco Networking Devices: Acalrate (CONAK} 2017 Cisco Systems, neSyslog Configuration
To implement a syslog configuration, specify a sysl@Wrver host as a destination for syslog messages and
limit the syslog messages that are sent to the syslog server based on the severity.
Syslog Configuration
|. Speciy the syslog server host as a destination for syslog messages.
2 Limit syslog messages that aro sent to the syslog server based on
sever
sas es
10.110.100 101.104
“The configuration of systog on Rt follows:
Configuration of syslog is based on the commands that the following table describes
‘Command leserption
logging (hosouzme | ip-aciressy cents «syslog server hot to receive fogging
messages,
logging trap severity Limits the eytog massages that are sent othe aston
eens ap “ [server. It limits the messages besed an severity.
The figure shows configurations for logging syslog messages toa syslog server with IP address 10.1.10.100,
‘where you can observe syslog messages.
‘The logging command identifies a syslog server host to receive logging messages. By issuing this command
more than once, you build alist of syslog servers that receive logging messages. You can limit the syslog
messages that are sent to the syslog server based on severity, using the logging trap command.Discovery 52: Configure Syslog
Introduction
The objective ofthis discovery lab isto provide you with some experience with the syntax of basic syslog
configuration to facilitate the management of Cisco 0S devices. This lab is prepared with the router and
server that are represented inthe topology diagram and the connectivity table. The devices have their basic
configurations in place, including hostukmes and IP addresses,
Inthe discovery lab, you will configure the syslog server address ofthe router and set the severity threshold
for messages that are forwarded to the earver. You will also use show commands to verify the syslog
configuration and examine the syslog messages inthe local logging buffer of the router
Topology
Topology
Job Aids
Device Information
Information Table
Device |characteristio. Wvatue
RVI Hostname lspvi
RVI IP deeee hor.1s08
RI Hostname ea
RI JEtherneto"t description Lins te Sv
(conan
Cisco SystemsDevice |characteristic Jvatue
RI ethernet IP adcress horases
‘SRV im the virtual lab environment is simulated as a router, so you should use Cisco IOS commands to
configure it or make verifications.
Task 1: Configure| Syslog
Activity
Step1 Access the R1 console. Define RVI (100.1.1.10) as the R1 syslog server.
Oni, enter the following commands:
Rit conf
Enter configuration comands, one per ine. End with GVTL/Z
Rileonfig)# logging 10-1.2.20
‘The most commonly used commands are abbreviated in this guided discovery. For example, you
use conf t for configure terminal, If there is any confusion, you can perform tab completion of
commands to see the full commands during the discovery execution. For example, conf=tab>
{tetab> would expand to configure terminal.
Step 2 Set “informational” asthe threshold for the minimum severity level for messages to send to
syslog servers.
On RI, enter the following commands
2 (contig)? legging teap anfemational
e982 aavs-s-conruG
Configuead
console by console
‘There is 2 syslog message that is displayed to the console indicating that logging has started to
the server at 10:1.1.10. The first message is of severity 5 (Notification), andthe second message
is of severity 6 (Informational). Setting the threshold to "informational means that messages of
severity 0 through 6 will be forwarded to the syslog server. Both ofthese messages are
forwarded.
Step 3 Enter the show logging command to display the syslog status and the local logging bute.
On RI, enter the following command:Step 4
Syslog legging: enabled (0 messages despped, 2 messages eat
ies, Q overturns, wal disabled, filtering disabled)
messages logged) sl disables,
Mo active Silver modules.
Tagging t=
Tint opi
0 message Lines deopped-by-,
Bec 1 07:49:59.544
cable No such file or di
rr entpur emieed =>
‘The output indicates that R1 is now sending
syslog messages to 10.1.1 10, with the minimum
severity threshold set to "informational." The output also indicates that two messages have been
sent to the syslog server. Syslog uses UDP for transport and is inherently not reliable. If these
thvo messages are lost somewhere in the transport path, there is no mechanism to recognize the
lost message or to request a retransmission.
‘There is 2 local logging buffer. It isin its default state, with a severity threshold of "debugging"
(Severity 7) and sized at 4096 bytes. In the eample transcript, 32 messages have been logged in
the local buffer. The end of the show logging command output displays the contents of the
buffer. At this point inthe discovery, the buffer is mostly filled with the messages that were
produced when R1 booted. At the end of the buffer, however, are the two syslog messages that
‘were produced as a result ofthe syslog configuration activity”
‘The output of the show logging command documents that tivo messages were sent to 10.1.1.10
Initiate some activity thet will generate more syslog messages on RU. Enter the configuration
‘mode, enable the Ethernet()3 interface, then disable the interface back down, and leave the
configuration mode.
On Ri, enter the following commands:
NetworkingStep 5
ait cont
Enter cenfigueation commands, one per line. End with CVTL/Z
Rifecntig)? ant 2 0/3
Ri (config'st)# no chat
Ri (contigs?
Dee 1 08:10:64.261
0/2, changed stzee es
Ri (eontages}#
adninistratively down
“bec 1 09:11:03.061: @LINEEROTO~:
Ri (config"if)# enc
Re
“Dec 1 08:11:06.063: #S¥S-S-CONTIG_I: Configured from console by console
Re
Line protocol on Inte:
This sample activity caused the generation of five syslog messages,
Display the logging status and the local logging buffer.
On RI, enter the following command:
REE chow Jogging
<.-- cusps embed >
ad tine stamp egging nezeages: disabled
Yo active Eileer modules
“Dee 1 08:10:55.265: SLINEEROTO-S-UEDOMK: Line protocol on Interface
Dee 1 08:11:02.057: SLINK-S-CHANGED: Interface Echernet0/2, changed state to
‘Dee 1 08:11:03.061: SLINEEROTO-S-UEDOMK: Line protocol on Interface
Evhernet0/3, changed state co down
Dec 1 08:12:06.063: #8zs-S-CONFIG_t: Configured from console by console
Additional messages were logged to 10.1.1.10.
‘The five syslog messages that were produced in response to your previous activity are at the end
of the local logging buter.
This isthe end ofthe discovery lab.SNMP Overview
Inthe complex network of routers, switches, and servers today, it can seem like a daunting task to manaze
all devices on your network and make sure that they are not only up and running but also perfonming
optimally. This area is where SNMP can help. SNMP was introduced to meet the growing need fora
standard of managing IP devices.
SNMP exposes the environment and pe}formance parameters of a network device, allowing an NMS to
collect and process data.
SNMP Overview
‘SNMP is a management protocol mono
that supports message exchange: |
+ SNMP manager: Polls agents on
the network and displays
information, ===,
+ SNMP agent: Siores information
‘and responds to manager
requests, It generates traps,
— "You can set thresholds to tigger
iteaion procoas when they
fare exceeded.
MIB: Contains a database of
‘objects (information variables),
‘SNMP is an application layer protocol that defines how SNMP managers and SNMP agents exchange
‘management information. SNMP uses the UDP transport mechanism to retrieve and send management
information, such as MIB variables.
SNMP is broken down into these three components:
+ SNMP manager: Periodically polls the SNMP agents on managed devices by querying the device for
data, The SNMP manager can be part of an NMS such as Cisco Prime Infrastructure.
+ SNMP agent: Runs directly on managed devices, collects device information, and translates it info a
compatible SNMP format according to the MIB.
+ MIB: Represents a virtual information storage location that contains collections of managed objects.
‘Within the MIB, there are objects that relate fo different defined MIB modules (for example, the
interface module).
12 Interconnectng isco Networking Davies: Acca
1d (CONAN 2017 Cisco Systems, neRouters and other network devices keep statistics about the information of their processes and interfaces
locally. SNMP ona device nuns a special process that is called an agemt. This agent can be queried, using
SNMP. SNMP is typically used to gather environment and performance data such as device CPU usage,
memory usage, interface traffic, inferface error rate, and so on. By periodically querying or “polling” the
SNMP agent on a device, an NMS can gather or collet statistics over time. The NMS polls devices
periodically to obtain the values of the MIB objects that it is setup to collect. It then offers a look into
historical data and anticipated trends. Based on SNMP values, NMS triggers alarms to notify network
operators. |
To obtain information from the MIB on the SNMP agent, you can use several different operations:
‘+ Get: This operation is used to get information from the MIB to an SNMP agent
+ Get-next: This operation is used to get the next object from the MIB to an SNMP agent.
+ Get-bulk: This operation allows a management application to retrieve a large section of a table at once,
+ Sets This operation is used to get information to the MIB from an SNMP manager.
+ Trap: This operation is used by the SNMP agent to send a triggered piece of information to the SNMP
manager
+ Inform: This operation is the same as a trap, but it adds an acknowledgment that a trap does not
provide.
SNMP Versions
‘New fimetionalities have been added to SNMP. There are currently three versions of SNMP,
SNMP Versions
‘SNM Planted avmentcaton th No
onan erage
‘sume Panto athetcalon mth Yee
‘oneneniy mg
umes ‘Seong matenscaten, Yar
content, ar negity
17 Cisco Systems, Inc Intrconnectng Cisco
ring Devices Aosslaratad (CCNAX) 119‘The following list describes the different versions of SNP.
+ SNMP version 1: SNMPv is the initial version of SNMP. SNMPv1 security is based on communities
that are nothing more than passwords: plaintext strings that allow any SNMP-based application thet
[now the strings to gain aoceas to the management information of a davice. There are typically three
communities in SNMPv'I: reacLonly, read-write, and trap,
A key security flaw in SNMPv! is thatthe only authentication available is through @ community string.
‘Anyone who knows the community string is allowed access. Adding to this problem is the fact that all
SNMPv1 packets pass across the nbtwork unencrypted. Therefore, anyone wito can sniffa single SNMP
packet now has the community string thet is needed to get access
+ SNMP version 2c: SNMPv? was the first attempt to fix SNMPv'I security laws. However, SNMPv2
never really took off. The only prevalent version of SNMPv2 today is SNMP 2c, which contains
SNMP\2 protocol enhancements but leaves out the security features that no one could agree on. The "c"
designates v2c as being "community based," which means thet it uses the same authentication
mechanism as vl—community strings
+ SNMP version 3: SNMPv’ is the latest version. Itadds support for strong authentication and private
communication between managed entities. You can define 2 secure policy for each group, and
optionally you can limit the IP addresses to which its members can belong. You have to define
encryption and hashing algonthms and passwords for each user. The key security additions to SNMPv3
areas follows:
~ Can use MDS or SHA hashes for authentication
~ Can encrypt the entire packet
Can guarantee message integrity
SNMPV3 introduces three levels of security:
+ noAuthNoPriv: No authentication is required, and no privacy (encryption) is provided.
+ anthNoPriv: Authentication is required, but no encryption is provided.
+ authPriv: In addition to authentication, encryption is also used.
Note Neither SNMPW nor SNMFVZe ofer secunityfestures. Specifealy, SNFv1 and SNNFV2e can neither
_alihantioate the source of a management message ner provide encryption.
(conan
Cisco SystemsDiscovery 53: Configure SNMP
Introduction
This discovery will provide you with some experience with the syntax of a basic SIWMP configuration that
facilitates the management of Cisco IOS devices. The live virtual lab is prepared with the router and server
that are represented in the topology diagram and the connectivity table. The devices have their basic
configurations in place, including hostnames and IP addresses. In the discovery, you will configure the
router SNMP system contact and location variables. You wall alzo define a read-only and a read-write
community string and an SNMP server as the destination for SNMP traps.
Topology
Topology
eo eon]
Rt
SRV!Job Aids
Device Information
‘The configuration is as follows:
All devices have their basic configurations in place, including hostnames and IP addresses.
Device Details
Device Interface Neighbor lP Address
RI lEtrerneto10 lsevs ho.s.ar24
RVI Ethernet Ra Horssone
Note PC and SRWin the vitual lab environmvant are simulated as reuters, <0 you should use Ciste IOS
‘commands fo configure them or make veifistions,
Task 1: Configure SNMP.
To implement SNMP access to the router, you must do the following:
nthe router, set the system contact and location of the SNMP agent onthe router.
Configure a community access string with a read-write privilege to permit access to the SNMP.
17 Cisco yet
(isco Networking Davies:Configure SNMP
1. Configure the system contact
2 Configure the system location,
2: Define the community access string
‘SNMP configuration is based on the steps that are described inthe table.
Command Description
snmp-server contact contact_name Sets the system oontect tring.
sump-server location location Sets the system locaton sting
sump-server community string [ro | rw] Deine he oman ces tig wh read
Note The frst snmp-server command thet you ssue enables SNMP on the device,
A community string authenticates access to MIB objects and can have one of these attributes:
+ Read-only: Gives read access to authorized management stations to all objects in the MIB, except the
‘community strings, but it does not allow write access.
+ Read-write: Gives read and write access to authorized management stations to all objects in the MIB,
‘but it does not allow access to the community strings.
‘The system contact and the location of the SNMP agent are also set on the router so that you can access
these descriptions through the configuration file. Configuring the basic information is recommended
because it may be useful when troubleshooting your configurationActivity
Step 1
Step 2
Step 3
Access the R1 console. Set the R1 SNMP system contact to [email protected] and set the R
SNMP system location to Remote Lab Facility
Rit cone &
Enver configurstion commande, one per Line. End wich CNTE/2
(Gonfig)# srap-server| contact admindicnd? tab
(Config)? nep-seever location Renate Lab Facility
Not
All devices that support SNMP management must support MIB-2. IMIB-? stores data that
is generically applicable to all IP devices. The three basic objects in MIB-2 are the system name,
system contact, and system location, You just defined the later two. The SNMP system name
automatically inherits the value of the hostname setting on a Cisco 10S device, so the R1 SNMP
system name was already RI.
Define Ciscol as a read-only community string and Cisco? as a read-write community sting,
(config)? erap-server comunity Ciccot xo
(config)? armp-server comunity Cizco? ow
‘SNMP community strings should be treated with the same care as passwords. The read-only
community string has privileges that are similar toa login password, andthe read-vrite
community string has privileges that are similar tothe enable secret. The strings that are used in
this example are too easy to guess to use ina production environment.
Define SRV1 (10.1.1.10) as the SNMP destination forthe traps that Rll generates. Specify
(Ciseo3 2s the community string to be included in the traps,
To specify the recipient of the SNMP notification operation, use the smmp-server host i-
adress community command.
(config)? erap-seever Hest 10-1.2.10 Cizco3
(contig)? exit
‘Traps provide the facility for the managed device to send unsolicited alerts to the SNMP system.
Itallows for faster response times than would be practical with periodic polling by the
‘management system.
(isco Networking Davies:Verify SNMP
Verity SNMP
Display SNMP community access stings.
Display SNMP system location string,
Display SNMP system contact information,
Display the SNMP host details.
‘The following table represents the commands that are used to verify SNMP.
‘Command Description
show snmp community biselays SNMP community socess sings.
‘show snmp location Displays SNMP system locaton sting
show snmp contact Displays SINUP system contactinfermation
show snmp host Disoiays the recipient detsls for SNMP notiiction
lopertions.
Step 4 Use the show snmp community command to verify that the three community strings that you
just defined are active.ALP chow srmp community
Community name: TEE
sesragereypa: sesdvenly 2
Community Index: c1scol]
Gonmunity SecuritjWane: Ciscod
The ILDMI community string is defined within Cisco 10S Software. You camot configure it Itis
read-only community string that is associated with the LMI protocol that is running between a
router and an ATM switch,Challenge
1
“How can you access the syslog of a router?
A. oma remote router that is receiving the syslog
B. ona router that is placed between the router that is sending the syslog messages and a syslog
server that is receiving the log messages
C. ona syslog server that ib receiving the syslog
D. onaremote switch that is receiving the sys
. Look atthe format of the following syslog message:
seq no: time stamp: Séfacility-severity-MNEMONIC:descviption
‘What is the MNEMONIC?
A. the text string or code that uniquely describes the message
B. the text that isa fill senfence-like description of the event
C. away of remembering previous events
1D. amumber that is part event mumber and part MAC address
‘You want to contol the severity of the event that determines when a syslog should be sent. Which
command do you use?
A. logging hostname | ip address?
Blogging trap severity
C. logging severity
D. logging level severity
Which of the following severity levels is used whem a system is unusable?
A. Emergency
Bo Alert
C. Critical
D. Enor
Severity level "Emergency" has which number assigned to it?
Ao
Boa
© 6
D7
A router is configured with the snmp-server community Cisco RO command. An NMS is trying to
Communicate to this router via SNMP. Which action can be performed by the NMS?
A. The NMS can only read obtained results,
B. The NMS can read obtained results and change the hostname of the router.
C. The NMS can only change the hostame of the router.
D. None ofthe above,
‘Match the operations that are used by an SNMP agent to their explanations
Trap ‘Used to get information ftom the MIB to an SNMP agent
Set ‘Used to send a triggered piece of information to the SNMP manager
Get ‘Used to get information to the MIB from an SNMP manager
Is the same asa trap, but it adds an acknowledgment that a trap does not
Inform provideAnswer Key
Challenge
c
Al
B
A
A
A
Get Used to get information from the MIB fo an SNMP agent
Trp Used to send a triggered piece of information tothe SNMP mensger
Set Used to pet information to the MIB from sn SNMP mansger
Inform isthe serne as aap, butt adds an acknowledgment that a trap does nat provideLesson 2; Learning About
the Evolution of Intelligent
Networks
Introduction
Bob, the senior engineer at CSS, asks you fora favor. He is really busy this week, so_he would like you to
explain to one of the customers what switch stacking is and also discuss its benefits. Bob also informs you
that the manager heard that intelligent networks are becoming increasingly popular, so the customer is
‘wondering if you can use them in the corporate networks. Bob asks you sit down with the manager and
explain what an intelligent network really means—including cloud computing,
“You can decide when during ths week you will nish thee two taske—you can either doit today, or you
ccan first do some research about the topics.
Switch Stacking
A typical switch topology on the access and the distribution layers has two (or more) access switches that
are placed next to each otter in the same rack in order to provide enough access ports forall network.
devices. Each access switch has two redundant comections to each of the distribution switches. This
topology introduces certain ovethead in terms of management, resiliency, and performance.
The Cisco StackWise technology is typically used to unite access suitches that are mounted in the same
rack, Multiple switches are used to provide enough access ports. The stack, which consists of up to nine
switches, is managed as a single unit, reducing the mumber of units you have to manage in your network, All
switches in the tack share configuration and routing information, creating a single switching wait. You can
add and delete switches on a working stack without affecting the perfomanceStackWise can join mutiple physical switches into a single logical
‘switching uni
Switches are united by special interconnect cables.
+ The master switch is elected
+ Tow sacks managed as ange objet and has ange management
ress,
‘You unite switches into @ single logical unit by using special tack interconnect cables that create @
bidirectional closed-loop pati. The network topology and routing information are updated continuously
through the stack interconnect. All stack members have full access to the stack interconnect bandwidth. A
master switch manages the stack as a single unit. The master switch is elected from one ofthe stack member
switches. You can join up to nine separate switches.
Each stack of switches has a single IP adress and is managed 2s a single object. This single IP management
applies to activities such as fault detection, VLAN creation and modification, security, and QoS controls.
Each stack as only one configuration file, which is distributed to each member in the stack.
‘When you add anew switch to the stack, the master switch automatically configures the unit with the
currently ruming [OS image and the configuration of the stack. You do not have to do anything to bring up
the switch before itis ready to operate.
:24_Inerconnasing Cisco Networking Devices Aalst (©CNAX) 2017 Cisco Systems, neSwitch Stacking (Cont.)
lowe cows
Switch Stacking (Cont)
Typical switch topology
= Management overhead,
‘STP blocks hatf of the uplinks.
‘No direct communication between
access switches,
‘Topology using StackWise:
‘Mutiple accass switches in the
same rack.
Reduced management overhead.
‘Stack interconnect
“Muttiple switches can create an
EtherChannel connection.
Multiple switches in a stack can create an EtherChannel connection. You might therefore avoid STP,
doubling the available bandwidth of the uplink ofthe existing distribution switches.
(©2017 Cisco Systems, ne
Intrconnectng isco Networking Devioes: Accelerated (CCNA
25Cloud Computing and Its Effect on Enterprise
Networks
Cloud computing is a general term that describes a way of using resources: processing, storage, network,
and so on. The term "cloud and its deployment are (om bewhat new concepts, but the base concepts have
been used for decades.
Cloud Computing and Its Effect on Enterprise
Networks
+ IT resources and services are abstracted from the underlying
infrastructure
Computing s delivered as a service rather than as a product
‘Acloud can be an off-premises hosted model, either application hosting or
storage hosting.
se
business conenars |
‘Servces ‘Consumer
vind niasncure >) — Gerwces
(Compute Storage, Netwekig)
ee )
oF lor [-ones>
On lor [ese cero
On lon [znat>
of fen [ene
+ Bit 13 determines the response of the router to a bootload failure. Setting bit 13 causes the router to load
‘operating software from ROM after six unsuccessful attempts to load a boot file, Clearing bit 13 causes,
‘the router to continue ‘indefinitely to attempt loading a boot file. By factory default, bit 13 is set to 0
Configuration Register (Cont.)
0 Stymatthe ROM nontor on aeaad oc pom oa
1 Boots the ft iage in fash memory a sate nage
2F Enables deautoating tom fash memary
[Enables Boot ayatem corns tat over detaut toatng tom fash marry
‘The boot field specifies a mumber in binary form. Ifyou set the boot field value to 0, you must have console
port access to boot the operating system manually. If you set the boot field to a value of ? to F, and there is a
valid boot system command thatis stored in the configuration file, the router software processes each hoot
command in sequence until the process is successful or the end of the list is reached. If there are no boot
commands in the configuration file, the router attempts to boot the first file in the flash memory
Bit5, bit 11, and bit 12 of the configuration register determine the baud rate of the console terminal. The
table shows the bit settings for the eight available rates. The default baud rate is 9600 bps.
17 Cisco Systems, Inc Intrconnectng Cisco
ring Devices: Aoelaratd (CCNAX)Configuration Register (Cont.)
CCorsie Teint Baud Rate Stings
1
Interconnectng Cisco Networking Davies: Accserted (CONAN) (© 2017 Cisco Systems, Ine.Changing the Configuration Register
Before altering the configuration register, you should use the show version command to determine the
curent configuration register value. The last line of the show version command output shows the
configuration register value
Note Record he configuration fegister sating, whichis ypically G2 102, so you can change back tothe enginal
seting necessary
‘You can use the config-register command in the global configuration mode to set the configuration register
value. The syntax for this command is eonfig-register value. The value argument is 2 hexadecimal number.
Changing the Configuration Register
First, erly the current configuration register valve
ion register value.
Set the configur
Verify the new configuration register value
: wzi02 (wid be exzish at sect eons)
‘You shouldbe careful when using the config-register command because the value argument sets all 16 bits
of the configuration register. Only the lowest 4 bits of the configuration register (bits 3,2, 1, and 0) forma the
boot field. For example the default value of Ox2102 not only instructs the router to boot the system image
from flash memory but also instructs the router to load the startup configuration with 2 console speed of
{9600 baud (for most platforms), ignore the console Break key, and boot mo ROM if the initial boot fails. If
you modify the configuration register value, the change takes effect when the router reloads.
Inthe example, the configuration register value is changed from the default setting to Ox2101, and the
configuration is saved to NVRAM. The new configuration register value will cause the router to load the
bootstrap code.
If you issue the show version command again after changing the configuration register value, the command
output shows both the currently configured value of the configuration register and the value that will be
used at the next reloadLocating Cisco IOS Image Files
When a Cisco router boot, it searches forthe Cisco(@)image in aspeciic sequence. It searches forthe
location that is specified inthe configuration register, Nash memory, a TFTP server, and ROM.
Locating Cisco lOS Image Files
="
‘The bootstrap code is responsible for locating Cisco 10S Software. It searches forthe Cisco IS image in
the following sequence:
1. The bootstrap code checks the boot field ofthe configuration register. The boot field tells the router how
to boot up. The boot field can point to flash memory for the Cisco 1OS image, the startup configuration.
file (if one exists) for commands that tell the router hove to boot, or a remote TFTP server
Alternatively, the boot field can specify that no Cisco 1OS image will be loaded, and the router should
start a Cisco ROM monitor.
2. The bootstrap code executes the specifications of the configuration resister boot field value as described
in the following bullets. Ina configuration register value, the "Ox" indicates thatthe digits that follow
are in hexadecimal notation. A configuration register value of (x2102 has a boot field value of 0x2. The
right-most digit inthe register value is 2 and represents the lowest 4 bits of the register.
+ Hfthe boot field value is Ox0, the router boots to the ROM monitor a the next power cycle or reload.
+ tthe boot field value is Gx, the router searches flash memory for Cisco IOS images.
+ the boot field value is Ox? to OxF, a the next power cycle or reload, the bootstrap code parses the
startup configuration file in NVRAM for boat system commands that specify the name and location
ofthe Cisco10S Software image to load. (Examples of boot system commands will follow.) If
‘boot system commands are found, the router sequentially processes each boot system command in
the configuration. If there are no boot system commands in the configuration, the router searches
the flash memory for @ Cisco IOS image.
If the router searches for and finds valid Cisco IOS images in flash memory it loads the first valid
‘mage and nuns it.
7TO_lterconnecng Cisco Networking Devices: Accelerated (CONAN) 2017 Cisco Systems, ne4. Tit does not find a valid Cisco 10S image in flash memory, the router attempts to boot from a network
‘TETP server using the boot field value as part of the Cisco 1OS image filename.
5. After six msuccessful attempts at locating a TFTP server, the router loads the ROM monitor.
Note The procadure for locating the Cisco IOS image depends on the Cisco router platform and defauit
‘configuration register values. The procedure thatis deseried here enpies tothe Cisco Integrated Services
Routers]
Entering boot system commands in sequence in a router configuration can create 2 fault-tolerant boot plan.
‘The boot system command is a elobal configuration command that allows you to specify the source forthe
Cisco 10S Software image to load. For example, the following command boots the system boot image fle
that is named 2900-universalk9-anz.SPA.152-4_Ml.bin from the flash memory device:
Beanch(configl# ‘boot system flash: <2900-universelki-ms SPA.152-4.1 bin
This next example specifies a TFTP server as a source of a Cisco IOS image, with a ROM monitor as the
backup
Beanch (config) boot system tftp: //c2900~aniversalkS-me-SPA.152-4.10 bin
Beach (config) boot system rom
7Loading Cisco IOS Image Files
When the router locates a valid Cisco 10S image file in the flash memory, the Cisco 10S image is normally
loaded into RAM to run. Ifthe image needs to be loaded from the flash memory into RAM it must first be
decompressed. After the file is decompressed into R@Myit is started. When Cisco IOS Software begins to
load, you may see a string of pound signs (#), as shovin in the figure, while the image decommpresses.
Loading Cisco IOS Image Files
OS OO
Loading Cisco 10S Image Files (Cont.)
"72 Inerconnacing Cisco Networking Devices Aalst (©CNAX)Loading Cisco IOS Image Files (Cont.)
‘The Cisco 10S image file is decompressed and stored te RAM. The
‘output shows the boot process on a router.
‘The show version command can be used to help verify and troubleshoot some of the basic hardware and
software components ofthe router. The show version command displays information about the version of
Cisco 10S Software that is currently rumning on the router, the version of the bootstrap program, and
information about the hardware configuration, including the amount of system memory.
Loading Cisco IOS Image Files (Cont.)
Displays information about the currently loaded software, hardware,
‘and device information,
‘The output from the show version command includes the following:
+ Cisco 10S version
Cisco 105 softuare, C2900 Sofeware (C2S00-UNIVERSALKS-M), Version 15.2(4)Mi, RELERSE
SOFTWARE (221)
(©2017 Cisco Systems, ne Intrconnectng isco Networking Devioes: Accolerated (CCNA) 173This line from the example output shows the version of Cisco [OS Software in RAM that the route is using.
+ ROM bootstrap program
ROM: System Boscateap, Version 16 0(1z/MIS, RELEASE SOFTWARE (c1)
‘This ine from the example output shows the version ofthe system bootstrap software that is stored in ROM
and was intially used to boot up the rote.
+ Location of Cisco IOS image
"ELash0: <2800-univers:
System image £1
‘This line from the example output shows where the Cisco IOS image is located and loaded as well as its
complete filename.
+ Interfaces
This section ofthe output displays the physical interfaces on the router. In this example, the Cisco 2901
router has two Gigabit Ethernet interfaces and one zerial interface
+ Amount of NVRAM
255 HB of REM
‘This line from the example output shows the amount of NVRAM on the router.
+ Amount of Flash
This line ftom the example output shows the amount of flash memory’ou the router
+ Configuration register
Configuration register is oxzi02
‘The last line of the show version command displays the current configured value of the software
configuration register in hexadecimal format. This value indicates that the router will attempt to load a
Cisco IOS Software image fiom flash memory and load the startup configuration file from NVRAM,
(isco Networking Davies: