Showing posts with label cisco. Show all posts
Showing posts with label cisco. Show all posts

Friday, October 28, 2016

OSPF routing between Cisco Router and Mikrotik Router

For this I have used GNS3 for cisco router and Virtual box for mikrotic router. Cisco router in GNS3 is connected to a host which is configured by my LAN card adapter. Mikrotic router  is connected to also LAN  by bridging in virtualbox.
GNS3 Settings

Virtual box setting
C

Cisco Router IP                                           Mikrotic Router IP
      G0/0: 192.168.0.60/24                                 ether1: 192.168.0.50/24
      loopback1: 2.2.2.2/24                                    loopback1:1.1.1.1/24
      ospf area 400                                                 ospf area id: 0.0.1.144
                                                                           
Area ID calculation in Mikrotic, convert 400 decimal into binary (i.e. 110010000). The binary number needs to show 32 digits, representing the digits of the 4 octets in the IP type format. So, 110010000 binary = 00000000.00000000.0000001.10010000 as broken into octets. Finally, convert each octet into a decimal value. (e.g. 00000000.00000000.0000001.10010000 = 0.0.1.144). Therefore, 400 = 0.0.1.144
Command in Cisco 
R1>ena
R1#conf t
R1(config)#int loopback 1
R1(config-if)#ip address 2.2.2.0 255.255.255.0
R1(config-if)#no shut
R1(config)#int G0/0 
R1(config-if)#ip address 192.168.1.0 255.255.255.0
R1(config-if)#no shut

R1(config)#router ospf 1
R1(config-router)#network 192.168.0.0 0.0.0.255 area 400
R1(config-router)#network 2.2.2.0 0.0.0.255 area 400
R1(config-router)#

Command in Mikrotic


[jahid@MikroTik] >
[jahid@MikroTik] > interface bridge add name=loopback1
[jahid@MikroTik] > ip address add address=1.1.1.1/24 interface=loopback1
[jahid@MikroTik] > ip address add address=192.168.0.50/30 interface=ether1
[jahid@MikroTik] >
[jahid@MikroTik] > routing ospf
[jahid@MikroTik] /routing ospf> area add name=area400 area-id=0.0.1.144
[jahid@MikroTik] /routing ospf> network add network=192.168.0.0/24 area=

Area ::= area1 | area2 | area5 | area400 | limon | ...

[jahid@MikroTik] /routing ospf> network add network=192.168.0.0/24 area=area400
[jahid@MikroTik] >
[jahid@MikroTik] >

Then Checking in cisco



Then Checking in Mikrotik






Thank you everybody. 





Tuesday, October 25, 2016

NTP Configuration in Cisco Router

The NTP Server is the master NTP server in this activity. You will configure authentication on the NTP server and the routers. You will configure the routers to allow the software clock to be synchronized by NTP to the time server. Also, you will configure the routers to periodically update the hardware clock with the time learned from NTP.





Configuring NTP 

Step 1: Enable NTP authentication on PC-A. 

On PC-A, click NTP under the Services tab to verify NTP service is enabled.
To configure NTP authentication, click Enable under Authentication. Use key 1 and password NTPpa55

Step 2: Configure R1, R2, and R3 as NTP clients. 

R1(config)# ntp server 192.168.1.5
R2(config)# ntp server 192.168.1.5
R3(config)# ntp server 192.168.1.5

Verify client configuration using the command show ntp status.

Step 3: Configure routers to update hardware clock. 

Configure R1, R2, and R3 to periodically update the hardware clock with the time learned from NTP.
R1(config)# ntp update-calendar
R2(config)# ntp update-calendar
R3(config)# ntp update-calendar
Exit global configuration and verify that the hardware clock was updated using the command show clock.

Step 4: Configure NTP authentication on the routers. 

Configure NTP authentication on R1, R2, and R3 using key 1 and password NTPpa55.
R1(config)# ntp authenticate
R1(config)# ntp trusted-key 1
R1(config)# ntp authentication-key 1 md5 NTPpa55

R2(config)# ntp authenticate
R2(config)# ntp trusted-key 1
R2(config)# ntp authentication-key 1 md5 NTPpa55

R3(config)# ntp authenticate
R3(config)# ntp trusted-key 1
R3(config)# ntp authentication-key 1 md5 NTPpa55

Step 5: Configure routers to timestamp log messages. 

Configure timestamp service for logging on the routers.
R1(config)# service timestamps log datetime msec
R2(config)# service timestamps log datetime msec
R3(config)# service timestamps log datetime msec

Then this command is used to show the current time
R1(config)#show clock
or
R1(config)#show clock details

Friday, April 8, 2016

RIP routing protocol


The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination.

RIP is a relatively old but still commonly used interior gateway protocol created for use in small, homogeneous networks.
RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. This RIP routing protocol updates routing in every 30 seconds to active interface, which is termed advertising. If a router does not receive an update from another router for 180 seconds or more, it marks the routes served by the non updating router as being unusable. If there is still no update after 240 seconds, the router removes all routing table entries for the non updating router.

RIP sends updates to the interfaces in the specified networks. If the network of an interface network is not specified, it will not be advertised in any RIP update.

RIP Version 2 supports authentication, key management, route summarization, CIDR, and VLSMs.
In One sentence RIPv1 is a classful routing protocol but RIP v2 is a classless routing protocol.

(This information is enough for CCNA. For more information go to http://www.9tut.com/rip-routing-protocol-tutorial. There is no any LAB of RIP in CCNA Exam).





***R0***

Router#
Router#conf t
Router(config)#router rip
Router(config-router)#ver
Router(config-router)#version 2
Router(config-router)#network 1.1.1.0
Router(config-router)#exit
Router(config)#exit
Router#

***R1***

Router#
Router#conf t
Router(config)#router rip
Router(config-router)#ver
Router(config-router)#version 2
Router(config-router)#network 1.1.1.0
Router(config-router)#exit
Router(config)#exit
Router#


</div>

Thursday, March 3, 2016

EIGRP Routing Protocols


EIGRP use five types of packets to communicate:

  > Hello    : used to identify neighbors. They are sent as periodic multicasts
  > Update : used to advertise routes, only sent as multicasts when something is changed
  > Ack      : acknowledges receipt of an update. In fact, Ack is Hello packet without data. It is always unicast and uses   UDP.
  > Query  : used to find alternate paths when all paths to a destination have failed
  > Reply  : is sent in response to query packets to instruct the originator not to recompute the route because feasible successors exist. Reply packets are always unicast to the originator of the query

Advertised distance(AD): 
the cost from the neighbor to the destination. 
Feasible distance (FD):
The sum of the AD plus the cost between the local router and the next-hop router
Successor: 
The primary route used to reach a destination. The successor route is kept in the routing table. Notice that successor is the best route to that destination. 

Feasible successor: 
The backup route. To be a feasible successor, the route must have an AD less than the FD of the current successor route


EIGRP Neighbor,Topogoly and Routing Table
EIGRP routers will start sending hello packets to other routers just like OSPF does, if you send hello packets and you receive them you will become neighbors. EIGRP neighbors will exchange routing information which will be saved in the topology table. The best path from the topology table will be copied in the routing table.

Neighbor table: The neighbor relationships are tracked in this table which are the basis for EIGRP routing and convergence activity. The address and the interface of a neighbor is discovered and recorded in a new entry of the neighbor table, whenever a new neighbor is discovered. These tables are used for reliable and sequenced delivery of packets.

Topology table: Routers use topology table which route traffic in a network. All routing tables inside the autonomous system are available in this table, where the router is positioned. Each router uses routing protocol and maintains a topology table for each configured network protocol. The routes leading to a destination are found in the topology table.

Route Table: The routes of particular destinations are stored in the routing tables. The information contains the network topology that is immediately around it. The primary goal of routing protocols and routes is the construction of routing tables. Network id, cost of the packet path and next hop are the details are available in the routing table.



Normal Configuration:

**************
      R1
**************

Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#inter g0/0
Router(config-if)#ip address 1.1.1.1 255.255.255.252
Router(config-if)#exit
Router(config)#router eigrp 100
Router(config-router)#network 1.1.1.0
Router(config-router)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console

Router#

**************
      R2
**************

Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#inter g0/0
Router(config-if)#ip address 1.1.1.2 255.255.255.252
Router(config-if)#exit
Router(config)#router eigrp 100
Router(config-router)#network 1.1.1.0
Router(config-router)#exit
Router(config)#exit
Router#

  In CCNA Exam Lab troubleshoot the eigrp with just changing AS number of this topology



Thats all. Thanks

Saturday, February 27, 2016

OSPF EIGRP Redistribution



R2#show interface s0/0/0
Write down these 5 parameters, notice that we have to divide the Delay by 10 because the metric unit is in tens of microsecond. For example, we get Bandwidth=1544 Kbit, Delay=20000 us, Reliability=255, Load=1, MTU=1500 bytes then we would redistribute as follows:
R2#config terminalR2(config)# router ospf 24
R2(config-router)#
 redistribute eigrp 100 metric-type 1 subnetsR2(config-router)#exitR2(config-router)#router eigrp 100R2(config-router)#redistribute ospf 24 metric 1544 2000 255 1 1500

R3#show interface fa0/0
For example we get Bandwidth=10000 Kbit, Delay=1000 us, Reliability=255, Load=1, MTU=1500 bytes
R3#config terminal
R3(config)#
router ospf 34
R3(config-router)#
redistribute eigrp 100 metric-type 1 subnets
R3(config)#
exit
R3(config-router)#
router eigrp 100
R3(config-router)#
redistribute ospf 34 metric 10000 100 255 1 1500

Tuesday, February 16, 2016

CCNP routing question and answer 2

Q18.A network engineer has configured a tracking object to monitor the reachability of IP SLA 1.
In order to update the next hop for the interesting traffic, which feature must be used in
conjunction with the newly created tracking object to manipulate the traffic flow as
required?

A. SNMP
B. PBR
C. IP SLA
D. SAA
E. ACLs
F. IGP

Answer: B

Q19. A network administrator is troubleshooting a DMVPN setup between the hub and the
spoke. Which action should the administrator take before troubleshooting the IPsec
configuration?


A. Verify the GRE tunnels.
B. Verify ISAKMP.
C. Verify NHRP.
D. Verify crypto maps.

Answer: A


Q20. Which statement is a restriction for PPPoE configuration?


A. Multiple PPPoE clients can use the same dialer interface.
B. Multiple PPPoE clients can use the same dialer pool.
C. A PPPoE session can be initiated only by the client.
D. A PPPoE session can be initiated only by the access concentrator.

Answer: C

Q21.Which three items can you track when you use two time stamps with IP SLAs? (Choose
three.)

A. delay
B. jitter
C. packet loss
D. load
E. throughput
F. path

Answer: A,B,C


Q22. What are the default timers for RIPng?


A. Update: 30 seconds Expire: 180 seconds Flush: 240 seconds
B. Update: 20 seconds Expire: 120 seconds Flush: 160 seconds
C. Update: 10 seconds Expire: 60 seconds Flush: 80 seconds
D. Update: 5 seconds Expire: 30 seconds Flush: 40 seconds

Answer: A


Q23. An engineer is asked to monitor the availability of the next-hop IP address of 172.16.201.25
every 3 seconds using an ICMP echo packet via an ICMP echo probe. Which two
commands accomplish this task? (Choose two.)


A. router(config-ip-sla)#icmp-echo 172.16.201.25 source-interface FastEthernet 0/0
B. router(config-ip-sla-echo)#timeout 3
C. router(config-ip-sla)#icmp-jitter 172.16.201.25 interval 100
D. router(config-ip-sla-echo)#frequency 3
E. router(config-ip-sla)#udp-echo 172.16.201.25 source-port 23
F. router(config-ip-sla-echo)#threshold 3

Answer: A,D

Q24. The OSPF database of a router shows LSA types 1, 2, 3, and 7 only. Which type of area is
this router connected to?


A. stub area
B. totally stubby area
C. backbone area
D. not-so-stubby area

Answer: D


Q25. If the total bandwidth is 64 kbps and the RTT is 3 seconds, what is the bandwidth delay
product?


A. 8,000 bytes
B. 16,000 bytes
C. 24,000 bytes
D. 32,000 bytes
E. 62,000 bytes

Answer: C


Q26. On which two types of interface is Frame Relay switching supported? (Choose two.)


A. serial interfaces
B. Ethernet interfaces
C. fiber interfaces
D. ISDN interfaces
E. auxiliary interfaces

Answer: A,D


Q27. A network engineer is considering enabling load balancing with EIGRP. Which
consideration should be analyzed?


A. EIGRP allows a maximum of four paths across for load balancing traffic.
B. By default, EIGRP uses a default variance of 2 for load balancing.
C. EIGRP unequal path load balancing can result in routing loops.
D. By default, EIGRP performs equal cost load balancing at least across four equal cost
paths.

Answer: D


Q28.Which two routing protocols are supported by Easy Virtual Network? (Choose two.)


A. RIPv2
B. OSPFv2
C. BGP
D. EIGRP
E. IS-IS

Answer: B,D



Q29.Which statement is true?


A. RADIUS uses TCP, and TACACS+ uses UDP.
B. RADIUS encrypts the entire body of the packet.
C. TACACS+ encrypts only the password portion of a packet.
D. TACACS+ separates authentication and authorization.

Answer: D


Q30. Which type of BGP AS number is 64591?


A. a private AS number
B. a public AS number
C. a private 4-byte AS number
D. a public 4-byte AS number

Answer: A

Q31. Which parameter in an SNMPv3 configuration offers authentication and encryption?

A. auth
B. noauth
C. priv
D. secret

Answer: C


Q32. Which protocol is used in a DMVPN network to map physical IP addresses to logical IP
addresses?


A. BGP
B. LLDP
C. EIGRP
D. NHRP

Answer: D


Q33. What is the purpose of the route-target command?


A. It extends the IP address to identify which VRF instance it belongs to.
B. It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol
    capabilities.
C. It manages the import and export of routes between two or more VRF instances.
D. It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol
capabilities.

Answer: C


Q34. A route map uses an ACL, if the required matching is based on which criteria?


A. addressing information
B. route types
C. AS paths
D. metrics

Answer: A


Q35. Which two authentication protocols does PPP support? (Choose two.)

A. WAP
B. PAP
C. CHAP
D. EAP
E. RADIUS

Answer: B,C


Q36. Which two statements indicate a valid association mode for NTP synchronization? (Choose
two.)


A. The client polls NTP servers for time.
B. The client broadcasts NTP requests.
C. The client listens to NTP broadcasts.
D. The client creates a VPN tunnel to an NTP server.
E. The client multicasts NTP requests.

Answer: A,C

Q37. Various employees in the same department report to the network engineer about slowness
in the network connectivity to the Internet. They are also having latency issues
communicating to the network drives of various departments. Upon monitoring, the
engineer finds traffic flood in the network. Which option is the problem?


A. network outage
B. network switching loop
C. router configuration issue
D. wrong proxy configured

Answer: B

Q38. Which option is invalid when configuring Unicast Reverse Path Forwarding?


A. allow self ping to router
B. allow default route
C. allow based on ACL match
D. source reachable via both

Answer: D

Q39. Which traffic characteristic is the reason that UDP traffic that carries voice and video is
assigned to the queue only on a link that is at least 768 kbps?

A. typically is not fragmented
B. typically is fragmented
C. causes windowing
D. causes excessive delays for video traffic

Answer: A