Vous êtes sur la page 1sur 47

Fundamentals

 Created by Cisco to manage Cisco Devices, like


Switches & Routers.
 Cisco devices uses ".bin" extension.
Cisco IOS Versions
Version 10
10.1, 10.2 10.3, 10.4

Version 11
11.1, 11.2 11.3, 11.4

Version 12
12.1, 12.2 12.3, 12.4
 Version 15 (LATEST)
Switches
 Layer 2 Switches
 Performs only Switching.

 Layer 2 Switches
 Switching as well as Routing can be performed.
Fundamental Terminologies
 Serial
 Clock Rate
 Fast-Ethernet
 Console
 Auxilliary
Serial
 It is used to make Peer to Peer connections between
two Routers.

Types of Serial
 DCE: Data Communication Equipment
Clock-Rate is to be given here.
 DTE: Data Terminal Equipment
Clock Rate
 It’s used to tell how many bits to be sent per second.

Fast Ethernet
 It’s used to connect LAN Devices.

Console
 It’s used to configure Cisco device viz Router or Switch.
Auxilliary
 It’s used for MODEM's connectivity. Can be used as a
Console cable for configuration purpose.

Flash
 It’s used to store IOS.
 It can be said that its Router's HDD.

Normally a Router doesn’t have more than 2 Fast-


Ethernet Ports but in HIGH SERIES ROUTERS it can be 5
or 6.
How to connect with a Router for configuration?

Step-1) Connect router’s console port with PC


serial, through CONSOLE CABLE.
Step-2) Use any third party application:
 Hyper Terminal
 Secure.CRT
 Putty.exe
Router's Boot Process
 Step 1) POST test

 Step 2) Load IOS from:


 Flash
 ROM
 TFTP

Step 3) Load Startup-config from:


 NVRAM, if startup-config is present.
 If not present then it would ask:
(Would you like to enter setup mode ?Y/N)
SAY NO.
Router’s Mode

Global
Configuration
Enable/ Mode
User Mode Privilege • Interface
Configuration Mode
Mode • Sub-Interface Mode
• Line Mode
• Router Mode
User Mode
Router>
 Its used for user login.
 Very basic commands can be used here.

Enable/Privilege Mode
Router#
 Troubleshooting is done in this scenario.
 this mode defines user privilege level by
"show $ privilege"
Global Configuration Mode
Router(config)#
 In this mode, we configure Routers & Switches.
Example:
IP Addressing,
Password Setting
Routing Protocols configuration etc....
 Interface mode:
Router(config-if )#
 It’s used to put information on an
interface.

 Sub-Interface Mode:
Router(config-subif)#
 It’s used to make logical interfaces.

 Router Mode:
Router(config-router)#
 It’s used for Routing Protocols
RIP, EIGRP OSPF
Password Setting
 Simple Text Password:
#enable $ password $ pune

 Encrypted Password:
#enable $ secret $ pune
 Console Password
#conf $ t
#line $ console $ 0
#password $ pune
#login

Line Console “0” is given because one


user/admin can connect through console.
 Telnet Password
#conf $ t
#line $ vty $ 0 $ 2
#password $ pune
#exit
 Enable Password is “MUST” for configuring
Telnet Password.
Fundamentals
 It’s a process to move packets from one LAN to another
LAN.
 Routing Process generates a Routing Table, Routing
Information Base(RIB).
 If RIB don’t have information, then, Packet Failure.
 A knowledge based method to create Routing
Information Base is Routing Table.
Static Dynamic Default

Advanced Distance Link


Distance Vector State
Static Routing
 In Static routing we define routes manually and we always define
Indirectly Connected network.
Advantage
 There is no overhead on the router CPU .
 It adds security because the administrator can chose to
allow routing access to certain network only.
Disadvantage
 The administrator must really understand the internetwork and
how each router connected in order to configure routers correctly.
 If a network is added to the internetwork ,the administrator has to
add a route to it on all routers –by hand.
 It is not feasible networks because maintaining it would be a full-
time job it self.
Configuration in Static Routing
R(config)# ip route A.B.C.D. W.X.Y.Z <forwarding
port address>
OR
R(config)# ip route A.B.C.D. W.X.Y.Z <Gateway ip
address>

To See the Routing Table:


R# show ip route
To See the Static Route :
R# show ip route static
Default Routing
 Default routing is basically used on stub router or stub
network.
Stub Router :
 A router which has only one entry or exit point.
Configuration in Default
Routing
R(config)# ip route 0.0.0.0 0.0.0.0 <exiting port
address>
OR
R(config)# ip route 0.0.0. 0.0.0.0 <Gateway ip
address>

To Verify:
R# show ip route
Administrative Distance (AD)
 It’s a unique value from 0 to 255.
 AD is used by Routing Protocols to rate the
trustworthiness of routing information received.

Routing Protocols AD Value


Lower
AD value Connected 0
Static Routing 1
EIGRP 90
More
OSPF 110
Preferred
RIP 120
Dynamic Routing Protocol
 We use routing protocols, they dynamically learn
about route and do send route information to the
neighbor router.
 In dynamic routing we always define directly
connected network.
Dynamic Routing Protocols

Distance- Link-
Hybrid
Vector State
Routing
Routing Routing
Distance Vector Routing
 It selects the route based on distance i.e. hop count.
 When a packet cross a router i.e. called hop.
 It will select the route, which provides a network after
crossing least hop.
eg: RIP
Link-State Routing
 It’s also called shortest path-first Protocol .
 It will send update based on the state of the link.
 When a link Goes down or up it sends update.
eg: OSPF (Open Shortest Path First)

Hybrid Protocols
 Hybrid protocol use aspects of both distance vector and link
eg: EIGRP ( Enhanced Interior Gateway Routing
Protocol)
Routing Information Protocols(RIP)
 RIP is a true distance-vector routing protocol.
 RIP only use the hope count to determine the best path to a
remote network.
 RIP sends the complete routing table out to all active
interface every 30 sec.
 RIP maximum allowable next hop count of 15 by default.
 It has two version.
Version 1
Version 2
Configuration for RIP Routing
R(config)# router rip
R(config-router)# network<connected network>

For RIPv2
R(config)#router rip
R(config-router)#version
R(config-router)#network <connected network>

To Verify:
R# show ip route
R# show ip protocol
R#debug ip rip
 Switch provides
Reliable,
Manageable.
 Good network design will improve performance
and also reduce the difficulties associated.
The design of larger LANs
includes:
 An Access layer that connects end users into the LAN.
 A Distribution layer that provides policy-based
connectivity between end-user LANs.
 A Core layer that provides the fastest connection between
the distribution points.
Access Layer
 The access layer is the entry point for user workstations and
servers to the network.
 In a campus LAN the device used at the access layer can be
a switch or a hub.
Access Layer Switches
 An access layer switch should provide its
functionality with low cost and high port density.
Catalyst 1900 Series

Catalyst 2820 Series

Catalyst 2950 Series

Catalyst 4000 Series

Catalyst 5000 Series


Distribution Layer
 Switches in this layer are referred to as multilayer switches.
 The distribution layer also prevents Networking Issues
from affecting the core layer.
 Must have High Performance.
Distribution Layer Switches
 Switches in this layer operate at Layer 2 and Layer 3.
 A point at which a broadcast domain is delineated
because
It deviate VLAN traffic towards WAN.
Catalyst 2926 G

Catalyst 5000 family

Catalyst 6000 family


Core Layer
 The core layer is a high-speed switching backbone.
 Providing a core infrastructure with redundant alternate
paths gives stability to the network in the event of a single
device failure.
 The core can be designed to use Layer 2 or Layer 3
switching.
Core Layer Switches
 If the distance between the core layer switches is not too
great, the switches can use Layer-2 Ethernet technology.
 Core layer switches are designed to provide efficient Layer 3
functionality when needed.
 It provides:
Need, Low Cost, Performance
Catalyst 6500 Series

Catalyst 8500 Series

IGX 8400 Series

Light-stream 1010
Startup of The Catalyst Switch
 Switches are dedicated, specialized
computers, which contain a CPU,
RAM, and an operating system.
 A switch can be managed by
connecting to the console port to
view and make changes to the
configuration.
 Switches typically have no power
switch to turn them on and off.
They simply connect or disconnect
from a power source.
Fundamentals
 Once the power cable is connected, the switch initiates a
series of tests called the power-on self test (POST).
 The System LED indicates the success or failure of POST.
Connecting a Switch to a Computer

RJ 45
Switch Command Modes
• Default mode ends with “>”
• Displays commands that change terminal settings,
USER MODE
perform basic tests, and display system information.

• “Privileged Mode ends with “#”, using enable” keyword


ENABLE MODE
• Troubleshooting steps is done in this mode.

GLOBAL
CONFIGURATION
MODE
Verification Commands in Enable
Mode
IP Addresses
32 bits
version header Type of Service/TOS Total Length (in bytes)
(4 bits) length (8 bits) (16 bits)
flags
Identification (16 bits) Fragment Offset (13 bits)
(3 bits)
TTL Time-to-Live Protocol
Header Checksum (16 bits)
(8 bits) (8 bits)

Source IP address (32 bits)

Destination IP address (32 bits)

Ethernet Header IP Header TCP Header Application data Ethernet Trailer

Ethernet frame
Typical Addressing Plan for an Organization that uses
subnetting
 Each layer-2 network (Ethernet segment, FDDI segment)
is allocated a subnet address.

128.143.71.0 / 24

128.143.0.0/16
128.143.16.0 / 24

128.143.7.0 / 24 128.143.8.0 / 24

128.143.17.0 / 24

128.143.22.0 / 24

128.143.136.0 / 24

Vous aimerez peut-être aussi