Before You Begin: Assign Information Classification

Download Report

Transcript Before You Begin: Assign Information Classification

CCNA Configuration
Lab Hands on
Natthapong Wannurat
CCNA, CCDA, CSE, SMBAM, SMBSE
Channel Account Manager
South Region
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Introduction to CCNA Exam
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Cisco Icons and Symbols
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Defining Components of the Network
Home
Office
Mobile
Users
Internet
Branch Office
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Main Office
4
Defining the Components of a Network
(cont.)
Branch
Office
Floor 2
Server Farm
ISDN
Floor 1
Telecommuter
Remote
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Campus
Cisco Confidential
5
Network Structure Defined by Hierarchy
Core Layer
Distribution
Layer
Access
Layer
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
OSI Model Overview
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
OSI Model Overview
Application
Application
(Upper)
Layers
Presentation
Session
Transport Layer
Network Layer
Data Link
Data Flow
Layers
Physical
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Role of Application Layers
EXAMPLES
Application
Presentation
Session
User Interface
Telnet
FTP
• How data is presented
• Special processing
such as encryption
ASCII
EBCDIC
JPEG
Keeping different
applications’
data separate
Operating System/
Application Access
Scheduling
Transport Layer
Network Layer
Data Link
Physical
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Role of Data Flow Layers
Application
Presentation
EXAMPLES
Session
• Reliable or unreliable delivery
• Error correction before retransmit
TCP
UDP
SPX
Network
Provide logical addressing which
routers use for path determination
IP
IPX
Data Link
• Combines bits into bytes and
bytes into frames
• Access to media using MAC address
• Error detection not correction
802.3 / 802.2
HDLC
Physical
• Move bits between devices
• Specifies voltage, wire speed and
pin-out cables
Transport
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
EIA/TIA-232
V.35
10
Encapsulating Data
Application
Presentation
Session
Upper Layer Data
TCP Header
Upper Layer Data
IP Header
Data
LLC Header
Data
FCS
MAC Header
Data
FCS
0101110101001000010
Presentation_ID
Transport
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
(Protocol Data Unit)
PDU
Segment
Network
Packet
Data Link
Frame
Physical
Bits
11
Introduction to TCP/IP
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Introduction to TCP/IP
TCP (Transmission Control Protocol) is a set of rules (protocol) used along with
the Internet Protocol (IP) to send data in the form of message units between
computers over the Internet. While IP takes care of handling the actual delivery of
the data, TCP takes care of keeping track of the individual units of data (called
packets) that a message is divided into for efficient routing through the Internet.
User Datagram Protocol (UDP) is one of the core protocols of the Internet
protocol suite. Using UDP, programs on networked computers can send short
messages sometimes known as datagrams (using Datagram Sockets) to one
another. UDP is sometimes called the Universal Datagram Protocol or Unreliable
Datagram Protocol.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Introduction to TCP/IP
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
Introduction to TCP/IP
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
IP Addressing, Subnetting and Variable-Length
Subnet Masks (VLSM)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
1.Agenda
 Explain basic IP Addressing
 Review Subnetting concepts
 How to Calculate Subnets, host Addresses and
broadcast id's
 Explain VLSM concepts and Route Summarization
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Why IP Addresses?
Uniquely identifies each
device on an IP network so
that data can be sent
correctly to those locations.
Real life analogies:
Address on a letter
Telephone number
Every host (computer,
networking device,
peripheral) must have a
unique address.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Parts of the IP Address
 Each IP address consists of:
Network ID
Identifies the network to which the host belongs
Assigned by registry authority and cannot be changed
Host ID
Identifies the individual host
Assigned by organizations to individual devices
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19
IP Address Format: Dotted Decimal
Notation
Remember binary-to-decimal
and decimal-to-binary
conversion.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
20
IP Address Classes: The First Octet
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
21
IP Address Ranges
*127 (011111111) is a Class A address reserved for loopback testing and cannot
be assigned to a network.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
22
Example Class B Network Address
(Reserved)
Total number of host addresses available = 2h – 2
where h is the number of bits in the host field
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
23
Example Class B Broadcast Address
(Reserved)
Total number of host addresses available = 2h – 2
where h is the number of bits in the host field
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
24
Public IP Addresses
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
25
Private IP Addresses
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
26
Subnetworks
• Smaller networks are
easier to manage.
• Overall traffic is
reduced.
• You can more easily
apply network
security policies.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
27
Number of Subnets Available
 To identify subnets, you will “borrow” bits from the host ID
portion of the IP address
Number of subnets available depends on the number of bits borrowed.
One address is still reserved as the network address.
One address is still reserved as broadcast address.
Available number of subnets = 2s where s is the number of bits
borrowed.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
28
Possible Subnets and Hosts for a Class
A Network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
29
What a Subnet Mask Does
Tells the router the number of bits to look at when routing
Defines the number of bits that are significant
Used as a measuring tool, not to hide anything
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
30
8 Easy Steps for Determining Subnet
Addresses
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
31
8 Easy Steps for Determining Subnet
Addresses (Cont.)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
32
Example: Applying a Subnet Mask for a
Class B Address
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
33
What Is a Variable-Length
Subnet Mask?
Subnet 172.16.14.0/24 is divided into smaller subnets
Subnet with one mask (/27)
Then further subnet one of the unused /27 subnets into multiple /30 subnets
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
34
Calculating VLSMs
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
35
What Is Route Summarization?
Routing protocols can summarize addresses of several networks into one
address.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
36
Summarizing Within an Octet
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
37
Summarizing Addresses in a
VLSM-Designed Network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
38
Example
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
39
Summary
 Basic IP Addressing
 Subnetting concepts
 Calculate Subnets, host Addresses and broadcast id's
 VLSM concepts and Route Summarization
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
40
Using Cisco IOS Command Line Interface (CLI)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
41
Agenda
• Overview
• Cisco IOS Software Features and Functions
• Starting up Cisco Network Routers and Switches
• Cisco IOS Command-Line Interface Functions
• Entering the EXEC Modes
• Entering Configuration Mode
• Using the CLI to configure and test Routers and
Switches
• Summary
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
42
Cisco IOS Software CLI
A common interface for managing Cisco devices.
• Features to carry the chosen network protocols and functions
• Connectivity for high-speed traffic between devices
• Security to control access and prohibit unauthorized network use
• Scalability to add interfaces and capability as needed for network
growth
• Reliability to ensure dependable access to networked resources
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
43
Initial Startup of Routers and Switches
• System startup routines initiate device software.
• Switch: Initial startup uses default configuration parameters.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
44
Example: Initial Bootup Output from the
Catalyst 2950 Switch
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
45
Example: Initial Bootup Output from the
Router
• Unconfigured vs. Configured Router
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
46
Example: Initial Bootup of a Cisco Router
- The Setup facility -
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
47
Configuring Network Devices
• Configuration sets up the device with the
following:
• Network policy of the functions required
• Protocol addressing and parameter settings
• Options for administration and management
• A Catalyst switch memory has initial
configuration with default settings.
• A Cisco router will prompt for initial
configuration if there is no configuration
previously saved in memory.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
48
Cisco IOS User Interface Functions
• A CLI is used to enter commands.
• Specific Operations vary on
different internetworking devices.
• Users type or paste entries in the
console command modes.
• Command modes have distinctive
prompts.
• <Enter> key instructs device to
parse and execute the command.
• Two primary EXEC modes are
User Mode and Privileged Mode.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
49
Cisco IOS Software EXEC Mode (User)
• There are two main EXEC modes for
entering commands.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
50
User-Mode
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
51
User-Mode Command List
 You can abbreviate a command to the fewest characters that make a unique
character string.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
52
Cisco IOS Software EXEC Mode (Privileged)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
53
Privileged-Mode
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
54
Privileged-Mode Command List
You can complete a command string by entering the unique
character string, then pressing the Tab key.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
55
Configuration Mode
Third Mode - Configuration mode:
• Global configuration mode
• wg_sw_a#configure terminal
• wg_sw_a(config)#
• Interface configuration mode
• wg_sw_a(config)#interface
e0/1
• wg_sw_a(config-if)#
• Other configuration modes also exist.
(line configuration, routing configuration, etc…)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
56
Overview of Router & Switch Modes
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
57
Router Context-Sensitive Help
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
58
Router Context-Sensitive Help (Cont.)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
59
Enhanced Editing Commands
Router>Shape the future of internetworking by creating unpreced
• Shape the future of internetworking by creating
unprecedented value for customers, employees, and
partners.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
60
Enhanced Editing Commands (Cont.)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
61
Router Command History
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
62
show version Command
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
63
Viewing the Configuration
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
64
show running-config and show startupconfig Commands
• Displays the current and saved configuration
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
65
Summary
• The Cisco switch or router has considerable
configuration and testing capabilities and can be
configured using the Command Line Interface (CLI).
• A switch or router can be configured from a local terminal
connected to the console port or from a remote terminal
connected via a modem connection to the auxiliary port.
• The CLI is used by network administrators to monitor and
to configure various Cisco IOS devices. CLI also offers a
help facility to aid network administrators with the
verification and configuration commands.
• The CLI supports two EXEC modes: user and privileged.
The privileged EXEC mode provides more functionality
than the user EXEC mode.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
66
Summary (Cont.)
• From the privileged EXEC mode, the global
configuration mode can be entered, providing
access to other configuration modes such as the
interface configuration mode or line configuration
mode.
• The CLI will be used to configure the router name,
password, and other console commands.
• Interface characteristics such as the IP address
and bandwidth are configured using the interface
configuration mode.
• When the router configuration has been completed,
it can be verified by using show commands.
• Always remember to save your configuration!
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
67
Part 1 – Routing
Protocols
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
68
Router Operations
 To route packets, a router needs to do the following:
 Know the destination address
 Identify the sources from which the router can learn
 Discover possible routes to the intended destination
 Select the best route
 Maintain and verify routing information
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
69
Router Operations (Cont.)
 The Router knows only the networks it is directly
connected to. It must learn all other destinations.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
70
Static Routes vs. Dynamic Routes
Two different ways of learning routes to
remote networks:
 Static Routes
 Dynamic Routes
• A network administrator
enters them into the router
manually.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
• Learned by Routing protocols
and added to the routing
table. Dynamic routes are
adjusted automatically for
topology or traffic changes.
71
Static Route Configuration
Router(config)#ip route network [mask]
{address | interface}[distance] [permanent]
 Defines a path to an IP destination network or subnet or host by
specifying the next hop router interface IP address.
 Address = IP address of the next hop router
 Interface = outbound interface of the local router
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
72
Static Route Example
RouterX(config)# ip route 172.16.1.0 255.255.255.0 172.16.2.1
or
Router(config)#ip route 172.16.1.0 255.255.255.0 s0/0/0
 This is a unidirectional route. You must have a route configured in the
opposite direction.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
73
Verifying the Static route Configuration
RouterA(config)#ip route 172.16.1.0 255.255.255.0 Serial0/0 172.16.2.1
RouterA#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
S
C
Presentation_ID
172.16.0.0/24 is subnetted, 2 subnets
172.16.1.0 [1/0] via 172.16.2.1, Serial0/0
172.16.2.0 is directly connected, Serial0/0
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
74
A special case: Default Routes
 This route allows the stub network to reach all known
networks beyond router A.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
75
Static Routes: Benefits and Disadvantages
Benefits:
- No overhead on the router CPU
- No bandwidth usage between routers
- Security and control
Disadvantages:
- Administrative burden.
- Not practical in large networks.
- By default it is not conveyed to other
routers as part of an update process.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
76
Dynamic Routing Configuration
Router(config)#router protocol [keyword]
Defines an IP routing protocol
Router(config-router)#network network-number
• Mandatory configuration command for each IP routing
process
• Identifies the physically connected network to which routing
updates are forwarded
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
77
RIP Overview
19.2 kbps
T1
T1
T1
Hop-count metric selects the path.
Routes update every 30 seconds.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
78
RIP Configuration
Router(config)#router rip
• Starts the RIP routing process.
Router(config-router)#network network-number
• Selects participating attached networks.
• Requires a major classful network number.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
79
RIP Configuration Example
e0
172.16.1.0
s2
s2
A
172.16.1.1 10.1.1.1
10.1.1.2
2.3.0.0
router rip
network 172.16.0.0
network 10.0.0.0
s3
B
s3
e1
C
10.2.2.2 10.2.2.3 192.168.1.1
192.168.1.0
2.3.0.0
router rip
network 192.168.1.0
network 10.0.0.0
router rip
network 10.0.0.0
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
80
Configuring EIGRP
Router(config)#router eigrp autonomous-system
• Defines EIGRP as the IP routing protocol
Router(config-router)#network network-number
• Selects participating attached networks
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
81
EIGRP Configuration Example
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
82
Configuring Single-Area OSPF
RouterX(config)#
router ospf process-id
 Defines OSPF as the IP routing protocol
RouterX(config-router)#
network address wildcard-mask area area-id
 Assigns networks to a specific OSPF area
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
83
Verifying the OSPF Configuration
RouterX# show ip protocols
 Verifies that OSPF is configured
RouterX# show ip route
 Displays all the routes learned by the router
RouterX# show ip route
Codes: I - IGRP derived, R - RIP derived, O - OSPF derived,
C - connected, S - static, E - EGP derived, B - BGP derived,
E2 - OSPF external type 2 route, N1 - OSPF NSSA external type 1 route,
N2 - OSPF NSSA external type 2 route
Gateway of last resort is 10.119.254.240 to network 10.140.0.0
O
O
O
O
O
.
Presentation_ID
10.110.0.0 [110/5] via 10.119.254.6, 0:01:00, Ethernet2
IA 10.67.10.0 [110/10] via 10.119.254.244, 0:02:22, Ethernet2
10.68.132.0 [110/5] via 10.119.254.6, 0:00:59, Ethernet2
10.130.0.0 [110/5] via 10.119.254.6, 0:00:59, Ethernet2
E2 10.128.0.0 [170/10] via 10.119.254.244, 0:02:22, Ethernet2
. .
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
84
Verifying the OSPF Configuration (Cont.)
RouterX# show ip ospf
 Displays the OSPF router ID, timers, and statistics
RouterX# show ip ospf
Routing Process "ospf 50" with ID 10.64.0.2
<output omitted>
Number of areas in this router is 1. 1 normal 0 stub 0 nssa
Number of areas transit capable is 0
External flood list length 0
Area BACKBONE(0)
Area BACKBONE(0)
Area has no authentication
SPF algorithm last executed 00:01:25.028 ago
SPF algorithm executed 7 times
<output omitted>
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
85
Verifying the OSPF Configuration (Cont.)
RouterX# show ip ospf interface
 Displays the area ID and adjacency information
RouterX# show ip ospf interface ethernet 0
Ethernet 0 is up, line protocol is up
Internet Address 192.168.254.202, Mask 255.255.255.0, Area 0.0.0.0
AS 201, Router ID 192.168.99.1, Network Type BROADCAST, Cost: 10
Transmit Delay is 1 sec, State OTHER, Priority 1
Designated Router id 192.168.254.10, Interface address 192.168.254.10
Backup Designated router id 192.168.254.28, Interface addr 192.168.254.28
Timer intervals configured, Hello 10, Dead 60, Wait 40, Retransmit 5
Hello due in 0:00:05
Neighbor Count is 8, Adjacent neighbor count is 2
Adjacent with neighbor 192.168.254.28 (Backup Designated Router)
Adjacent with neighbor 192.168.254.10 (Designated Router)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
86
Verifying the OSPF Configuration (Cont.)
RouterX# show ip ospf neighbor
 Displays the OSPF neighbor information on a per-interface basis
RouterX# show ip ospf neighbor
ID
10.199.199.137
172.16.48.1
172.16.48.200
10.199.199.137
Presentation_ID
Pri
1
1
1
5
State
Dead Time
FULL/DR
0:00:31
FULL/DROTHER 0:00:33
FULL/DROTHER 0:00:33
FULL/DR
0:00:33
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Address
192.168.80.37
172.16.48.1
172.16.48.200
172.16.48.189
Interface
FastEthernet0/0
FastEthernet0/1
FastEthernet0/1
FastEthernet0/1
87
Verifying the OSPF Configuration (Cont.)
RouterX# show ip ospf neighbor 10.199.199.137
Neighbor 10.199.199.137, interface address 192.168.80.37
In the area 0.0.0.0 via interface Ethernet0
Neighbor priority is 1, State is FULL
Options 2
Dead timer due in 0:00:32
Link State retransmission due in 0:00:04
Neighbor 10.199.199.137, interface address 172.16.48.189
In the area 0.0.0.0 via interface Fddi0
Neighbor priority is 5, State is FULL
Options 2
Dead timer due in 0:00:32
Link State retransmission due in 0:00:03
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
88
OSPF debug Commands
RouterX# debug ip ospf events
OSPF:hello with invalid timers on interface Ethernet0
hello interval received 10 configured 10
net mask received 255.255.255.0 configured 255.255.255.0
dead interval received 40 configured 30
OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.117
aid:0.0.0.0 chk:6AB2 aut:0 auk:
RouterX# debug ip ospf packet
OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116
aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
89
Routing Protocols vs. Routed Protocols
• Routing protocols exchange
messages between routers to
determine paths, build and
maintain routing tables.
• Examples: RIP, IGRP, OSPF
• After the path is determined, a
router can route or forward packets
defined by a routed protocol.
• Examples: IP, IPX
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
90
Selecting the most “trustworthy” routing protocol
using Administrative Distance:
Routing
Protocol
Admin
Distance
Static
1
EIGRP
90
IGRP
100
OSPF
110
RIP
120
 The lowest Administrative Distance is preferred
 The Administrative distance is locally configured and are not
exchanged between routers
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
91
Selecting the Best Route using Metrics
 The route with the lowest metric is selected and added to the routing table.
 If the best route becomes unavailable, the next lowest metric route is selected to replace it.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
92
Examination of the IP Routing Table
RouterA#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
R
C
C
C
S
O
O
C
O
172.16.0.0/24 is subnetted, 2 subnets
172.16.1.0 [120/1] via 172.16.2.1, 00:00:09, Serial0/0
172.16.2.0 is directly connected, Serial0/0
10.0.0.0/8 is variably subnetted, 7 subnets, 4 masks
10.1.14.0/24 is directly connected, FastEthernet0/0
10.1.13.0/29 is directly connected, FastEthernet0/1
10.1.2.0/24 [1/0] via 172.16.2.1, Serial0/0
10.1.4.4/32 [110/2] via 10.1.14.4, 15:02:19, FastEthernet0/0
10.1.3.3/32 [110/2] via 10.1.13.3, 15:02:20, FastEthernet0/1
10.1.1.1/32 is directly connected, Loopback0
10.1.34.0/28 [110/2] via 10.1.13.3, 15:02:20, FastEthernet0/1
[110/2] via 10.1.14.4, 15:02:20, FastEthernet0/0
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
93
Classful Routing Overview
 Classful routing protocols do not include the subnet mask with the
route advertisement.
 Within the same network, consistency of the subnet masks is
assumed (all subnet masks must be off the same length).
 Summary routes are exchanged between foreign networks.
 Examples of classful routing protocols:
 RIP version 1 (RIPv1)
 IGRP
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
94
Classless Routing Overview
 Classless routing protocols include the subnet mask with the
route advertisement.
 Classless routing protocols support variable-length subnet
mask (VLSM).
 Summary routes can be manually controlled within the network.
 These are examples of classless routing protocols:
 RIP version 2 (RIPv2)
 EIGRP
 OSPF
 IS-IS
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
95
Routing Protocol Comparison Chart
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
96
Cisco LAN Switching
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
97
L2 Devices
 Bridge
 Switch

Software-based L2 Device

Hardware-based L2 device

Learn MAC addresses

Learns MAC addresses

Segment LANs

Builds a CAM Table

Floods broadcasts

Single station or LAN segment on

Filters Frames


Usually less than 16 ports

Floods broadcasts

Can have 100 or more ports
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
each port
98
Layer 2 Switching Logic
 A frame is received:
Destination – Multicast or Broadcast
Frame
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Flood
Frame
99
Layer 2 Switching Logic
 A frame is received:
Destination – Unknown Unicast
Frame
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Flood
Frame
Cisco Confidential
100
Layer 2 Switching Logic
 A frame is received:
Destination – Unicast in MAC Table
Forward
Different Port
Frame
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
101
Layer 2 Switching Logic
 A frame is received:
Destination – Unicast – Same Port
Frame
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Filter
X
Cisco Confidential
102
Layer 2 Switching Logic
 A frame is received:
Destination – Multicast or Broadcast
Presentation_ID
Flood
Destination – Unknown Unicast
Flood
Destination – Unicast in MAC Table
Forward
Destination – Unicast – Same Port
Filter
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
103
Ethernet Switches and Bridges
Address learning
Forward/filter decision
Loop avoidance
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
104
Transmitting Frames
Cut-Through
• Switch checks destination
address and immediately
begins forwarding frame.
Store and Forward
Complete frame is received
and checked before
forwarding.
Fragment-Free
• Switch checks the first 64 bytes,
then immediately
begins forwarding frame.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
105
MAC Address Table
• Initial MAC address table is empty.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
106
Learning Addresses
• Station A sends a frame to station C.
• Switch caches the MAC address of station A to port E0 by
learning the source address of data frames.
• The frame from station A to station C is flooded out to all
ports except port E0 (unknown unicasts are flooded).
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
107
Learning Addresses (Cont.)
• Station D sends a frame to station C.
• Switch caches the MAC address of station D to port E3 by
learning the source address of data frames.
• The frame from station D to station C is flooded out to all ports
except port E3 (unknown unicasts are flooded).
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
108
Filtering Frames
• Station A sends a frame to station C.
• Destination is known; frame is not flooded.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
109
Broadcast and Multicast Frames
• Station D sends a broadcast or multicast frame.
• Broadcast and multicast frames are flooded to all ports
other than the originating port.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
110
Forward/Filter Decisions
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
111
Port Security
Switch(config)#interface fastEthernet 0/1
Switch(config-if)#switchport port-security ?
mac-address Secure mac address
maximum
violation
Max secure addresses
Security violation mode
<cr>
Switch(config-if)#switchport port-security maximum 1
Switch(config-if)#switchport port-security violation shutdown
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
112
Spanning-Tree Protocol
• Provides a loop-free redundant network topology by
placing certain ports in the blocking state.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
113
Spanning-Tree Operation
•
•
•
•
Presentation_ID
One root bridge per network
One root port per nonroot bridge
One designated port per segment
Nondesignated ports are unused
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
114
Spanning-Tree Protocol
Root Bridge Selection
• Bpdu = Bridge Protocol Data Unit
(default = sent every two seconds)
• Root bridge = Bridge with the lowest bridge ID
• Bridge ID =
• In the example, which switch has the lowest bridge ID?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
115
Spanning-Tree Path Cost
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
116
Spanning-Tree
Switch#show spanning-tree vlan 1
VLAN0001
Spanning tree enabled protocol ieee
Root ID
Priority
Address
32769
0001.96DC.1A62
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
Address
32769 (priority 32770 sys-id-ext 1)
0010.1116.A3A4
Aging Time 300
Interface
Role Sts Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------Fa0/1
Desg FWD 19
128.3
Shr
Fa0/2
Root FWD 19
128.3
Shr
Switch(config)#spanning-tree vlan 1 priority 4096
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
117
VTP Modes
• Creates VLANs
• Modifies VLANs
• Deletes VLANs
• Sends/forwards
advertisements
• Synchronizes
• Saved in NVRAM
• Creates VLANs
• Forwards
advertisements
• Modifies VLANs
• Synchronizes
• Forwards
advertisements
• Deletes VLANs
• Not saved in
NVRAM
• Does not
synchronize
• Saved in NVRAM
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
118
VTP Operation
• VTP advertisements are sent as multicast frames.
• VTP servers and clients are synchronized to the latest revision number.
• VTP advertisements are sent every 5 minutes or when there is a change.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
119
Scaling the Network with NAT and PAT
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
120
Objectives
 Explain the difference between public and private IP
addresses
 Summarize three problems with IP addressing that NAT
and PAT solve
 Describe the basic functionality of NAT and NAT
Overloading (PAT)
 Identify the differences between Static and Dynamic
Translations
 Configure Static and Dynamic NAT
 Configure NAT Overloading (PAT)
 Verify NAT and PAT Operation
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
121
IP Addressing Review
Network ID
Class A
0
7 bits
Node ID (24 bits)
1.0.0.0 - 127.255.255.255
Network ID
Class B
10
14 bits
Node ID (16 bits)
128.0.0.0 - 191.255.255.255
Network ID
Class C
Class D
Class E
Presentation_ID
110
1110
11110
21 bits
Node ID (8 bits)
Multicasts
Multicast Group ID (28 bits)
Experimental Use
Reserved for Future Use (27 bits)
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
192.0.0.0 - 223.255.255.255
224.0.0.0 - 239.255.255.255
240.0.0.0 - 254.255.255.255
122
IP Addressing – Private Addresses
“Reserved/Private” Addresses exist in the first three classes of IP Addresses.
Network ID
Class A
0
7 bits
Node ID (24 bits)
10.0.0.0 – 10.255.255.255
Network ID
Class B
10
14 bits
Node ID (16 bits)
172.16.0.0 – 172.31.255.255
Network ID
Class C
110
21 bits
Node ID (8 bits)
192.168.0.0 – 192.168.255.255
These addresses are not globally routable through the public Internet.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
123
Not Enough IP Addresses
 Public IP address space (non-reserved/private) is
limited and obtaining a large block of registered
addresses is difficult and expensive.
Your Home Network
ISP Rtr
Hey, I need some IP Addresses
for my network. How about
something in the Class-B range
so I can grow in the future?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Internet
Are you crazy?? All I can
give you is a little subnet
of a Class-C network. Be
happy with that!
124
I Can See You!!
 Internal network (layout/addressing/design) shouldn’t
be visible to external (ex. Internet) users.
I can see your IP Address!
I’ve got you now! Time to
attack!!
Your Home Network
ISP Rtr
160.1.1.1
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Internet
Cisco Confidential
125
NAT Networks – Inside / Outside
 NAT translates the source and/or destination IP
addresses from packets on the inside network to
different IP addresses on the outside network.
NAT Rtr
Inside network
Outside network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
126
Configuring Static Translations
Router(config)# ip nat inside source static local-ip global-ip
 Establishes static translation between an inside local address
and an inside global address
Router(config-if)# ip nat inside
 Marks the interface as connected to the inside
Router(config-if)# ip nat outside
 Marks the interface as connected to the outside
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
127
Enabling Static NAT
Address Mapping Example
193.50.1.1
SA
193.50.1.2
interface serial0
ip address 193.50.1.1 255.255.255.0
ip address
193.50.1.1 255.255.255.0
ip
nat outside
!
interface ethernet 0
ip address 10.1.1.1 255.255.255.0
ip nat inside
!
193.50.1.2
ip nat inside source static 10.1.1.2 193.50.1.2
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
128
Dynamic Translations – Pros and Cons
 Dynamic Translations – Pros and Cons
Pros – Conserves addresses. Outside Local addresses get aged out and
can be reused after inactivity timer expires.
Cons – No ability for outside hosts to initiate conversations.
Dynamic Translation Table
Pool of addresses for NAT
80.0.0.3 – 80.0.0.6
IL
IG
10.0.0.1 = 80.0.0.3
10.0.0.2 = 80.0.0.4
Inside network
10.0.0.1
10.0.0.2
10.0.0.3
10.0.0.4
10.0.0.5
Presentation_ID
NAT Rtr
Switch
© 2006 Cisco Systems, Inc. All rights reserved.
10.0.0.6
Cisco Confidential
80.0.0.2
Outside network
129
Configuring Dynamic Translations
Router(config)# ip nat pool name start-ip end-ip
{netmask netmask | prefix-length prefix-length}
 Defines a pool of global addresses to be allocated as needed.
Router(config)# access-list access-list-number permit
source [source-wildcard]
 Defines a standard IP ACL permitting those inside local
addresses that are to be translated.
Router(config)# ip nat inside source list
access-list-number pool name
 Establishes dynamic source translation, specifying the ACL
that was defined in the prior step.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
130
Dynamic Address Translation Example
ip nat pool net-208 171.69.233.209 171.69.233.222 netmask
255.255.255.240
ip nat inside source list 1 pool net-208
!
interface serial0
ip address 172.69.232.182 255.255.255.240
ip nat outside
!
interface ethernet 0
ip address 192.168.1.94 255.255.255.0
ip nat inside
!
access-list 1 permit 192.168.1.0 0.0.0.255
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
131
How Does PAT (NAT Overloading)
Change All This?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
132
NAT Overloading - PAT
 NAT Overloading (PAT):
All inside devices get translated to the SAME Inside Global
address on NAT Router.
Source Port number differentiates traffic.
 How NAT Router chooses the source port number:
NAT Router will attempt to preserve original source port number if
not already in use.
If Source Port number is already in use, another, unused source
port number will be selected from the following ranges:
0-511 , 512-1023, 1024-65535
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
133
Configuring Overloading
Router(config)# access-list access-list-number permit
source source-wildcard
 Defines a standard IP ACL that will permit the inside local
addresses that are to be translated
Router(config)# ip nat inside source list
access-list-number interface interface overload
 IP address configured on interface (in command above) will
be used as the Overloaded address.
 Establishes dynamic source translation, specifying the ACL
that was defined in the prior step
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
134
PAT / NAT Overload Config Example
192.168.3.7
Switch
192.168.4.12
Presentation_ID
Interface Ethernet 0
ip address 192.168.3.1 255.255.255.0
ip nat inside
Switch
!
192.168.3.1
E0
Interface Ethernet1
ip address 192.168.4.1 255.255.255.0
E1
ip nat inside
192.168.4.1
S0
172.17.38.1 !
Interface Serial0
ip address 172.17.38.1 255.255.255.0
ip nat outside
Internet
!
Ip nat inside source list 1 interface Serial0
overload
!
Access-list 1 permit 192.168.3.0 0.0.0.255
Access-list 1 permit 192.168.4.0 0.0.0.255
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
135
Clearing the NAT Translation Table
Router# clear ip nat translation *
 Clears all dynamic address translation entries
Router# clear ip nat translation inside global-ip
local-ip [outside local-ip global-ip]
 Clears a simple dynamic translation entry that contains an
inside translation or both an inside and outside translation
Router# clear ip nat translation outside
local-ip global-ip
 Clears a simple dynamic translation entry that contains an
outside translation
Router# clear ip nat translation protocol inside global-ip
global-port local-ip local-port [outside local-ip
local-port global-ip global-port]
 Clears an extended dynamic translation entry
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
136
Displaying Information with ‘show’ Commands
Router# show ip nat translations
 Displays active translations
Router# show ip nat translation
Pro Inside global
Inside local
--- 172.16.131.1
10.10.10.1
Outside local
---
Outside global
---
Router# show ip nat statistics
 Displays translation statistics
Router# show ip nat statistics
Total active translations: 1 (1 static, 0 dynamic; 0 extended)
Outside interfaces:
Ethernet0, Serial2.7
Inside interfaces:
Ethernet1
Hits: 5 Misses: 0
…
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
137
Access Control Lists
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
138
Objectives
 Upon completion, you will be able to:
 Identify the Two Types of IP Access Control Lists.
 Describe typical Uses for IP Access Lists.
 Understand Access List related Terms and Concepts.
 Configure a Standard IP ACL
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
139
What Are IP Access Control Lists?
 A Cisco IOS feature
 Sequential list of “permit” or “deny” statements, which block or allow
routed traffic.
 Block Unwanted Traffic – inbound or outbound
Basic network security
Bandwidth control
Enforce network policy
Permit the Good Stuff
• The good side of the list shown above
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
140
Types of IP ACLs
Less Common:
• Lock and Key (dynamic ACLs)
Most Common (90%): • Reflexive ACLs
• Time-based ACLs using time ranges
• Standard ACLs
• Commented IP ACL entries
• Extended ACLs
• Context-based ACL
• Authentication proxy
• Named ACLs
• Turbo ACLs
• Distributed time-based ACLs
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
141
Standard IP ACL Syntax
access-list access-list-number {permit|deny} {host | source source-wildcard
| any}
 Numbered 1 – 99
 Only look at the IP Source Address
 Easiest to configure
 Good for blocking traffic close to the destination device
Two Notes:
• One cannot delete lines of a numbered access list. You must first
remove the entire access list.
• Every ACL has an implicit ‘Deny All’ statement as the last line of the
ACL
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
142
The ‘Infamous’ Wildcard Mask

The Inverse of the Subnet Mask
 255.255.255.192 (SM) = 0.0.0.63 (WM)
 Defines either the specific host or size of a subnet to be permitted or denied
by the ACL
 How to Calculate the Wildcard Mask?
Subtract the subnet mask from 255.255.255.255
Single Host – (SM) 255.255.255.255 (WM) 0.0.0.0
Subnet with 16 addresses – (SM) 255.255.255.240 (WM) 0.0.0.15
Subnet with 64 addresses – (SM) 255.255.255.192 (WM) 0.0.0.63
access-list access-list-number {permit|deny} {host | source source-wildcard |
any}
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
143
The ‘Infamous’ Wildcard Mask
 Subnet with 16 addresses – (SM) 255.255.255.240
255.255.255.255
-255.255.255.240 (SM)
0 . 0 . 0 . 15 (WM)
access-list access-list-number {permit|deny} {host | source source-wildcard |
any}
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
144
Two Basic Steps
 Create the Access Control List, then…
Router(config)# access-list 8 deny 131.108.7.0 0.0.0.3
Router(config)# access-list 8 permit 131.108.2.0 0.0.0.255
Router(config)# access-list 8 permit any
(access-list 8 deny any)
• Apply it to the Correct Interface
Router(config)# interface serial0
Router(config-if)# ip access-group 8 in
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
145
Configuring an Extended IP ACL
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
146
Extended IP ACL Syntax
access-list access-list-number {permit|deny} protocol {host | source
source-wildcard | any} {host | destination destination-wildcard | any}
[precedence precedence name or #]
• Numbered 100 – 199
• Looks both the IP source address and destination
address
• Checks many IP layer (L3) and upper layer (L4)
header fields
• Good for blocking traffic anywhere (near source)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
147
Applying Access Lists
To a Specific Interface:
Router (config-if)# ip access-group {access-list-number} {in |
out}
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
148
ACL Guidelines
 Use Standard IP Access Lists when filtering near Destination
• Use Extended IP Access Lists when filtering using
both the Source address and a Destination address
and/or need to specify a Protocol, Ports, etc.
• STEPS:
• Create ACL first, then Apply to interface
• Remember the implicit “deny all” at end of ACL
• Carefully place your ACL…consider bandwidth, etc.
• No editing or re-ordering of numbered ACLs (other than
adding lines at end)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
149
Q and A
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
150
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
151