Terminal Server
Reverse Telnet
1. Set Loopback Address
2. Telnet loopback to port 2000 and above
EIGRP Metric
1. Bandwidth *Can be set in the interface
2. Delay *
3. Reliability ** Always Change
4. Load **
5. MTU
Load Balancing for Unequal Cost Path
1.
2.
Feasible Distance of Successor * Variance = Max Cost Path
Latest IOS have more MAX path=16
EIGRP MD5 Authentication
Send livetime
Accept lifetime
Enter global configuration mode.
Dallas#configure terminal
Create the key chain. MYCHAIN is used in this example.
Dallas(config)#key chain MYCHAIN
Specify the key number. 1 is used in this example.
Note: It is recommended that the key number be the same on all routers involved in the configuration.
Dallas(config-keychain)#key 1
Specify the key-string for the key. securetraffic is used in this example.
Dallas(config-keychain-key)#key-string securetraffic
Dallas(config-keychain-key)#accept-lifetime 09:00:00 13 MAY 2008 17:00:00 13 MAY 2008
Dallas(config-keychain-key)#send-lifetime 09:00:00 13 MAY 2008 duration 28800
End the configuration.
Dallas(config-keychain-key)#end
Dallas#
**Overlap lifetime of two key to have no downtime.
Enter global configuration mode.
Dallas#configure terminal
From global configuration mode, specify the interface that you want to configure EIGRP message authentication on. In this example the first interface is Serial 0/0.1.
Dallas(config)#interface serial 0/0.1
Enable EIGRP message authentication.
The 10 used here is the autonomous system number of the network.
md5 indicates that the md5 hash is to be used for authentication.
Dallas(config-subif)#ip authentication mode eigrp 10 md5
Specify the keychain that should be used for authentication. 10 is the autonomous system number. MYCHAIN is the keychain that was created in the Create a Keychain section.
Dallas(config-subif)#ip authentication key-chain eigrp 10 MYCHAIN
Dallas(config-subif)#end
Complete the same configuration on interface Serial 0/0.2.
Dallas#configure terminal
Dallas(config)#interface serial 0/0.2
Dallas(config-subif)#ip authentication mode eigrp 10 md5
Dallas(config-subif)#ip authentication key-chain eigrp 10 MYCHAIN
Dallas(config-subif)#end
Dallas#
Debug EIGRP
Dallas#debug eigrp packets
Dallas#show key chain
http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a00807f5a63.shtml
Clock Set
Router# clock set 22:55:05 June 19 2006
Router# show clock detail
Access Control List (ACL)
Assign Into interface, Packet Filtering
OSPF
Shows all the possible path to Destination.
Area 0 <- Root Route Summarized within the Area Border Router. HELLO PACKET->Router ID,
Not more than 50 router in single Area.
Cost = Reference Bandwidth/ Interface Bandwidth
1. enable
2. conf t
3. router ospf [119]
4. network 8.0.1.2 0.0.0.0 area 0
5. network 8.0.1.5 0.0.0.0 area 0
6. network 172.19.90.252 [0.0.0.0] area 0
Line 4 & 5 can be replace by
network 8.0.1.0 0.0.0.7 area 0
Unadvertised Loopback Address
Router ID->Router Name for OSPF-> Ethernet IP address
Link-State Advertisement (LSA) Types:
1. Within the same Area
Got 5 types.
DR's exist for the purpose of reducing network traffic by providing a source for routing updates, the DR maintains a complete topology table of the network and sends the updates to the other routers via multicast
Select :
1. Destinate Router (DR)
2. Backup Destinate Router (BDR)
3. DR Other
*Highest Router ID->DR
*2nd Highest Router ID->BDR
Loop back have Higher Priority than Ethernet
RESET DR
1. enable
2. clear ip ospf process
Set OSPF Priority
1. conf t
2. [interface]
3. ip ospf priority [3]
Debug OSPF
1. debug ospf packets
Load Balance with OSPF?
Tricky...
Set OSPF Cost
1. conf t
2. interface
3. ip ospf cost ?
Manually set all the path cost for every path to be same,
so the router will load balance all the path.
OSPF Authentication (MD5/Plain Text)
1. conf t
2. interface
3. ip ospf authentication-key [password]
4. ip ospf authentication [message-digest/null]
HELLO PACKET
* Router ID
* Hello & Date intervals **
* Neighbors
* Area ID **
* ROuter Priority
* DR IP address
* BDR IP address
* Authentication PW **
* Stub Area Flag **
**
Implementing VLANs and Trunks
Logical Network
Segmentation, Flexibility, Security
Trunks Link (Carried Encapsulated VLAN infomation)
-Bridge betweens Swicthes
-Must be Fast Ethernet
Encapsulation types:
1. Inter Switch Link, *Cisco Only
2. IEEE 802.1Q, Native VLAN1(Untagged)
Syntax
1. en
2. vlan 10
3. name HR
4. int [fa0/0]
5. switchport mode access
6. switchport access vlan10
Inter VLAN routing
Router on State
Create two sub interface on single physical interface
HR VLAN-> 10.10.0.0
SALES VLAN->10.20.0.0
Different network
Dynamic VLAN membership Modes
VMPS very expensive
EDS<-Networking Company
Tuesday, 13 May 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment