SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 3: Branch
Connections
CCNA Routing and Switching
Connecting Networks
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10
Chapter 3: Branch
Connections
Connecting Networks
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3- Sections & Objectives
 3.1 Remote Access Connections
• Select broadband remote access technologies to support business
requirements.
 3.2 PPPoE
• Configure a Cisco router with PPPoE.
 3.3 VPNs
• Explain how VPNs secure site-to-site and remote access connectivity.
 3.4 GRE
• Implement a GRE tunnel.
 3.5 eBGP
• Implement eBGP in a single-homed remote access network.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
3.1 Remote Access
Connections
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Remote Access Connections
Broadband Connections
 The cable system uses a coaxial cable that carries radio
frequency (RF) signals across the network.
 A headend CMTS communicates with CMs located in
subscriber homes.
 The HFC network is a mixed optical-coaxial network in
which optical fiber replaces the lower bandwidth coaxial
cable.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Remote Access Connections
Broadband Connections
 A Digital Subscriber Line (DSL)
is a means of providing high-
speed connections over installed
copper wires.
 The two important components
are the DSL transceiver and the
DSLAM
 The advantage that DSL has
over cable technology is that
DSL is not a shared medium.
Each user has a separate direct
connection to the DSLAM.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Remote Access Connections
Broadband Connections
 Developments in broadband wireless technology are
increasing wireless availability through three main
technologies:
• Municipal Wi-Fi - Most municipal wireless networks use a mesh of
interconnected access points. Each access point is in range and can
communicate with at least two other access points. The mesh blankets
a particular area with radio signals.
• Cellular/mobile - Mobile phones use radio waves to communicate
through nearby cell towers. Cellular/mobile broadband access consists
of various standards.
• Satellite Internet - Satellite Internet services are used in locations
where land-based Internet access is not available, or for temporary
installations that are mobile. Internet access using satellites is
available worldwide.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Remote Access Connections
Select a Broadband Connection
 Each broadband solution has advantages and
disadvantages.
 Some factors to consider in making a decision include:
• Cable - Bandwidth is shared by many users, upstream data rates are often
slow during high-usage hours in areas with over-subscription.
• DSL - Limited bandwidth that is distance sensitive (in relation to the ISP’s
central office), upstream rate is proportionally quite small compared to
downstream rate.
• Fiber-to-the-Home - Requires fiber installation directly to the home.
• Cellular/Mobile - Coverage is often an issue, even within a SOHO where
bandwidth is relatively limited.
• Wi-Fi Mesh - Most municipalities do not have a mesh network deployed; if it
is available and the SOHO is in range, then it is a viable option.
• Satellite - Expensive, limited capacity per subscriber; often provides access
where no other access is possible.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
3.2 Varieties of Spanning
Tree Protocols
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PPPoE
PPPoE Overview
 PPP can be used on all serial links including those links
created with dial-up analog and ISDN modems.
• PPP supports the ability to assign IP addresses to remote ends of a
PPP link.
• PPP supports CHAP authentication.
• Ethernet links do not natively support PPP. PPP over Ethernet (PPPoE)
provides a solution to this problem. PPPoE creates a PPP tunnel over
an Ethernet connection.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PPPoE
Implement PPPoE
 PPPoE Configuration
• The dialer interface is created using the interface dialer number command.
• The PPP CHAP configuration usually defines one-way authentication; therefore, the ISP authenticates
the customer.
• The physical Ethernet interface that connects to the DSL modem is then enabled with the
command pppoe enable.
• The dialer interface is linked to the Ethernet interface with the dialer pool and pppoe-
client commands, using the same number.
• The maximum transmission unit (MTU) should be set down to 1492, versus the default of 1500, to
accommodate the PPPoE headers.
 PPPoE Verification
• The show ip interface brief command is issued to verify the IPv4 address automatically assigned to
the dialer interface by the ISP router.
• The show interface dialer command verifies the MTU and PPP encapsulation configured on the dialer
interface.
• The show pppoe session command is used to display information about currently active PPPoE
sessions.
• The Ethernet MAC addresses can be verified by using the show interfaces command on each router.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PPPoE
Implement PPPoE
 PPPoE Troubleshooting
• Verify PPP negotiation using the debug ppp negotiation command.
• Re-examine the output of the debug ppp negotiation command.
• PPPoE supports an MTU of only 1492 bytes in order to accommodate
the additional 8-byte PPPoE header.
• The ip tcp adjust-mss max-segment-size interface command adjusts
the MSS value during the TCP 3-way handshake.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
3.3 VPNs
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VPNs
Fundamentals of VPNs
 Introducing VPNs
• Organizations use VPNs to create an end-to-end private network
connection over third-party networks, such as the Internet.
• Today, a secure implementation of VPN with encryption, such as IPsec
VPNs, is what is usually meant by virtual private networking.
• To implement VPNs, a VPN gateway is necessary. The VPN gateway
could be a router, a firewall, or a Cisco Adaptive Security Appliance
(ASA).
 Benefits of VPNs
• Cost savings
• Scalability
• Compatibility with broadband technology
• Security
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VPNs
Types of VPNs
 Site-to-Site
• Site-to-site VPNs connect entire
networks to each other, for example,
they can connect a branch office
network to a company headquarters
network.
 Remote Access
• Remote-access VPNs are used to
connect individual hosts that must
access their company network securely
over the Internet.
 DMVPN
• Dynamic Multipoint VPN (DMVPN) is a
Cisco software solution for building
multiple VPNs in an easy, dynamic, and
scalable manner.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24
3.4 GRE
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
GRE
GRE Overview
 GRE Introduction
• Generic Routing Encapsulation (GRE) is designed to manage the
transportation of multiprotocol and IP multicast traffic between two or
more sites, that may only have IP connectivity.
 GRE Characteristics
• IP tunneling using GRE
enables network
expansion across a single-
protocol backbone
environment.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
GRE
Implement GRE
 There are five steps to configuring a GRE tunnel:
• Step 1. Create a tunnel interface using the interface tunnel number command.
• Step 2. Configure an IP address for the tunnel interface. This is normally a
private IP address.
• Step 3. Specify the tunnel source IP address.
• Step 4. Specify the tunnel destination IP address.
• Step 5. (Optional) Specify GRE tunnel mode as the tunnel interface mode.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
GRE
Implement GRE
 Verify GRE
• To determine whether the tunnel interface is up or down, use the show ip
interface brief command.
• To verify the state of a GRE tunnel, use the show interface tunnel command.
• Verify that an OSPF adjacency has been established over the tunnel interface
using the show ip ospf neighbor command.
 Troubleshoot GRE
• Use the show ip interface brief command on both routers to verify that the
tunnel interface is up and configured with the correct IP addresses for the
physical interface and the tunnel interface.
• Use the show ip ospf neighbor command to verify neighbor adjacency.
• Use show ip route to verify that networks are being passed between the two
routers
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
3.5 eBGP
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
eBGP
BGP Overview
 IGP and EGP
• Interior Gateway Protocols (IGPs) are used to exchange routing
information within a company network or an autonomous system (AS).
• Exterior Gateway Protocols (EGPs) are used for the exchange of
routing information between autonomous systems.
 eBGP and iBGP
• External BGP (eBGP) is the routing protocol used between routers in
different autonomous systems.
• Internal BGP (iBGP) is the routing protocol used between routers in the
same AS.
 This course focuses on eBGP only.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
eBGP
BGP Design Considerations
 When to use BGP
• The use of BGP is most appropriate when an AS has connections to
multiple autonomous systems.
• BGP should not be used when at least one of the following conditions
exist:
o There is a single connection to the Internet or another AS. This is
known as single-homed.
o When there is a limited understanding of BGP.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
eBGP
BGP Design Considerations
 BGP Options
• There are three common ways an organization can choose to
implement BGP in a multi-homed environment:
o Default Route Only - This is the simplest method to implement
BGP. However, because the company only receives a default
route from both ISPs, sub-optimal routing may occur.
o Default Route and ISP Routes - This option allows Company-A to
forward traffic to the appropriate ISP for networks advertised by
that ISP.
o All Internet Routes - Because Company-A receives all Internet
routes from both ISPs, Company-A can determine which ISP to
use as the best path to forward traffic for any network. Although
this solves the issue of sub-optimal routing, the Company-A’s
BGP router must contain all Internet routes.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
eBGP
BGP Branch Configuration
 BGP Configuration Commands
• There are three steps to implement eBGP:
o Step 1: Enable BGP routing.
o Step 2: Configure BGP neighbor(s) (peering).
o Step 3: Advertise network(s) originating from this AS.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
eBGP
BGP Branch Configuration
 Verify eBGP
• Three commands can be used to verify eBGP
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34
3.6 Chapter Summary
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Broadband transmission is provided by a wide range of technologies,
including DSL, fiber-to-the-home, coaxial cable systems, wireless, and
satellite. This transmission requires additional components at the home
end and at the corporate end. Broadband wireless solutions include
municipal Wi-Fi, cellular/mobile, and satellite Internet. Municipal Wi-Fi
mesh networks are not widely deployed. Cellular/mobile coverage can
be limited and bandwidth can be an issue. Satellite Internet is relatively
expensive and limited, but it may be the only method to provide access.
 If multiple broadband connections are available to a particular location, a
cost-benefit analysis should be performed to determine the best solution.
The best solution may be to connect to multiple service providers to
provide redundancy and reliability.
 PPPoE is a popular data link protocol for connecting remote networks to
their ISPs. PPPoE provides the flexibility of PPP and the convenience of
Ethernet.
Chapter Summary
Summary
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 VPNs are used to create a secure end-to-end private network connection
over a third party network, such as the Internet. GRE is a basic, non-
secure site-to-site VPN tunneling protocol that can encapsulate a wide
variety of protocol packet types inside IP tunnels, thus allowing an
organization to deliver other protocols through an IP-based WAN. Today
it is primarily used to deliver IP multicast traffic or IPv6 traffic over an
IPv4 unicast-only connection.
 BGP is the routing protocol implemented between autonomous systems.
Three basic design options for eBGP are as follows:
 The ISP advertises a default route only to the customer
 The ISP advertises a default route and all of its routes to the customer.
 The ISP advertises all Internet routes to the customer.
 Implementing eBGP in a single-homed network only requires a few
commands.
Chapter Summary
Summary Continued
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
KISHOYIANKISH
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
Alejandro Marin
 
ccna project
ccna projectccna project
ccna project
Amardeep Singh Brar
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
 
CCNA
CCNACCNA
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
A comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsA comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodings
Gunter Van de Velde
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
newbie2019
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
Febrian ‎
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
Chaing Ravuth
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
Gorantla Mohanavamsi
 

What's hot (20)

CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
 
ccna project
ccna projectccna project
ccna project
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
CCNA
CCNACCNA
CCNA
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
A comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsA comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodings
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 

Similar to CCNA4 Verson6 Chapter3

CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
Waqas Ahmed Nawaz
 
CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptx
VishalThakor19
 
CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02CCCNP ROUTE v6_ch02
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
Visalini Kumaraswamy
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
Andy Juan Sarango Veliz
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
ssuser06ea42
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Waqas Ahmed Nawaz
 
Introduction to Segment Routing
Introduction to Segment RoutingIntroduction to Segment Routing
Introduction to Segment Routing
MyNOG
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
Irsandi Hasan
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
Chaing Ravuth
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Yaser Rahmati
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
eyad alaa
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
Chaing Ravuth
 
Nec exp ether071719
Nec exp ether071719Nec exp ether071719
Nec exp ether071719
Yutaka Kawai
 

Similar to CCNA4 Verson6 Chapter3 (20)

CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
 
CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptx
 
CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
Introduction to Segment Routing
Introduction to Segment RoutingIntroduction to Segment Routing
Introduction to Segment Routing
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
 
Nec exp ether071719
Nec exp ether071719Nec exp ether071719
Nec exp ether071719
 

More from Chaing Ravuth

CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
Chaing Ravuth
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
Chaing Ravuth
 
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5
Chaing Ravuth
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
Chaing Ravuth
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
Chaing Ravuth
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
Chaing Ravuth
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
Chaing Ravuth
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
Chaing Ravuth
 
CCNP Switching Chapter 2
CCNP Switching Chapter 2CCNP Switching Chapter 2
CCNP Switching Chapter 2
Chaing Ravuth
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
Chaing Ravuth
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
Chaing Ravuth
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8
Chaing Ravuth
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
Chaing Ravuth
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
Chaing Ravuth
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
Chaing Ravuth
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
Chaing Ravuth
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
Chaing Ravuth
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
Chaing Ravuth
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
 

More from Chaing Ravuth (20)

CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
CCNP Switching Chapter 2
CCNP Switching Chapter 2CCNP Switching Chapter 2
CCNP Switching Chapter 2
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

CCNA4 Verson6 Chapter3

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 3: Branch Connections CCNA Routing and Switching Connecting Networks
  • 2. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10 Chapter 3: Branch Connections Connecting Networks
  • 3. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 3- Sections & Objectives  3.1 Remote Access Connections • Select broadband remote access technologies to support business requirements.  3.2 PPPoE • Configure a Cisco router with PPPoE.  3.3 VPNs • Explain how VPNs secure site-to-site and remote access connectivity.  3.4 GRE • Implement a GRE tunnel.  3.5 eBGP • Implement eBGP in a single-homed remote access network.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12 3.1 Remote Access Connections
  • 5. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Remote Access Connections Broadband Connections  The cable system uses a coaxial cable that carries radio frequency (RF) signals across the network.  A headend CMTS communicates with CMs located in subscriber homes.  The HFC network is a mixed optical-coaxial network in which optical fiber replaces the lower bandwidth coaxial cable.
  • 6. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Remote Access Connections Broadband Connections  A Digital Subscriber Line (DSL) is a means of providing high- speed connections over installed copper wires.  The two important components are the DSL transceiver and the DSLAM  The advantage that DSL has over cable technology is that DSL is not a shared medium. Each user has a separate direct connection to the DSLAM.
  • 7. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Remote Access Connections Broadband Connections  Developments in broadband wireless technology are increasing wireless availability through three main technologies: • Municipal Wi-Fi - Most municipal wireless networks use a mesh of interconnected access points. Each access point is in range and can communicate with at least two other access points. The mesh blankets a particular area with radio signals. • Cellular/mobile - Mobile phones use radio waves to communicate through nearby cell towers. Cellular/mobile broadband access consists of various standards. • Satellite Internet - Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile. Internet access using satellites is available worldwide.
  • 8. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Remote Access Connections Select a Broadband Connection  Each broadband solution has advantages and disadvantages.  Some factors to consider in making a decision include: • Cable - Bandwidth is shared by many users, upstream data rates are often slow during high-usage hours in areas with over-subscription. • DSL - Limited bandwidth that is distance sensitive (in relation to the ISP’s central office), upstream rate is proportionally quite small compared to downstream rate. • Fiber-to-the-Home - Requires fiber installation directly to the home. • Cellular/Mobile - Coverage is often an issue, even within a SOHO where bandwidth is relatively limited. • Wi-Fi Mesh - Most municipalities do not have a mesh network deployed; if it is available and the SOHO is in range, then it is a viable option. • Satellite - Expensive, limited capacity per subscriber; often provides access where no other access is possible.
  • 9. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17 3.2 Varieties of Spanning Tree Protocols
  • 10. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PPPoE PPPoE Overview  PPP can be used on all serial links including those links created with dial-up analog and ISDN modems. • PPP supports the ability to assign IP addresses to remote ends of a PPP link. • PPP supports CHAP authentication. • Ethernet links do not natively support PPP. PPP over Ethernet (PPPoE) provides a solution to this problem. PPPoE creates a PPP tunnel over an Ethernet connection.
  • 11. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PPPoE Implement PPPoE  PPPoE Configuration • The dialer interface is created using the interface dialer number command. • The PPP CHAP configuration usually defines one-way authentication; therefore, the ISP authenticates the customer. • The physical Ethernet interface that connects to the DSL modem is then enabled with the command pppoe enable. • The dialer interface is linked to the Ethernet interface with the dialer pool and pppoe- client commands, using the same number. • The maximum transmission unit (MTU) should be set down to 1492, versus the default of 1500, to accommodate the PPPoE headers.  PPPoE Verification • The show ip interface brief command is issued to verify the IPv4 address automatically assigned to the dialer interface by the ISP router. • The show interface dialer command verifies the MTU and PPP encapsulation configured on the dialer interface. • The show pppoe session command is used to display information about currently active PPPoE sessions. • The Ethernet MAC addresses can be verified by using the show interfaces command on each router.
  • 12. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PPPoE Implement PPPoE  PPPoE Troubleshooting • Verify PPP negotiation using the debug ppp negotiation command. • Re-examine the output of the debug ppp negotiation command. • PPPoE supports an MTU of only 1492 bytes in order to accommodate the additional 8-byte PPPoE header. • The ip tcp adjust-mss max-segment-size interface command adjusts the MSS value during the TCP 3-way handshake.
  • 13. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21 3.3 VPNs
  • 14. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VPNs Fundamentals of VPNs  Introducing VPNs • Organizations use VPNs to create an end-to-end private network connection over third-party networks, such as the Internet. • Today, a secure implementation of VPN with encryption, such as IPsec VPNs, is what is usually meant by virtual private networking. • To implement VPNs, a VPN gateway is necessary. The VPN gateway could be a router, a firewall, or a Cisco Adaptive Security Appliance (ASA).  Benefits of VPNs • Cost savings • Scalability • Compatibility with broadband technology • Security
  • 15. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VPNs Types of VPNs  Site-to-Site • Site-to-site VPNs connect entire networks to each other, for example, they can connect a branch office network to a company headquarters network.  Remote Access • Remote-access VPNs are used to connect individual hosts that must access their company network securely over the Internet.  DMVPN • Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.
  • 16. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24 3.4 GRE
  • 17. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential GRE GRE Overview  GRE Introduction • Generic Routing Encapsulation (GRE) is designed to manage the transportation of multiprotocol and IP multicast traffic between two or more sites, that may only have IP connectivity.  GRE Characteristics • IP tunneling using GRE enables network expansion across a single- protocol backbone environment.
  • 18. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential GRE Implement GRE  There are five steps to configuring a GRE tunnel: • Step 1. Create a tunnel interface using the interface tunnel number command. • Step 2. Configure an IP address for the tunnel interface. This is normally a private IP address. • Step 3. Specify the tunnel source IP address. • Step 4. Specify the tunnel destination IP address. • Step 5. (Optional) Specify GRE tunnel mode as the tunnel interface mode.
  • 19. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential GRE Implement GRE  Verify GRE • To determine whether the tunnel interface is up or down, use the show ip interface brief command. • To verify the state of a GRE tunnel, use the show interface tunnel command. • Verify that an OSPF adjacency has been established over the tunnel interface using the show ip ospf neighbor command.  Troubleshoot GRE • Use the show ip interface brief command on both routers to verify that the tunnel interface is up and configured with the correct IP addresses for the physical interface and the tunnel interface. • Use the show ip ospf neighbor command to verify neighbor adjacency. • Use show ip route to verify that networks are being passed between the two routers
  • 20. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28 3.5 eBGP
  • 21. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential eBGP BGP Overview  IGP and EGP • Interior Gateway Protocols (IGPs) are used to exchange routing information within a company network or an autonomous system (AS). • Exterior Gateway Protocols (EGPs) are used for the exchange of routing information between autonomous systems.  eBGP and iBGP • External BGP (eBGP) is the routing protocol used between routers in different autonomous systems. • Internal BGP (iBGP) is the routing protocol used between routers in the same AS.  This course focuses on eBGP only.
  • 22. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential eBGP BGP Design Considerations  When to use BGP • The use of BGP is most appropriate when an AS has connections to multiple autonomous systems. • BGP should not be used when at least one of the following conditions exist: o There is a single connection to the Internet or another AS. This is known as single-homed. o When there is a limited understanding of BGP.
  • 23. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential eBGP BGP Design Considerations  BGP Options • There are three common ways an organization can choose to implement BGP in a multi-homed environment: o Default Route Only - This is the simplest method to implement BGP. However, because the company only receives a default route from both ISPs, sub-optimal routing may occur. o Default Route and ISP Routes - This option allows Company-A to forward traffic to the appropriate ISP for networks advertised by that ISP. o All Internet Routes - Because Company-A receives all Internet routes from both ISPs, Company-A can determine which ISP to use as the best path to forward traffic for any network. Although this solves the issue of sub-optimal routing, the Company-A’s BGP router must contain all Internet routes.
  • 24. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential eBGP BGP Branch Configuration  BGP Configuration Commands • There are three steps to implement eBGP: o Step 1: Enable BGP routing. o Step 2: Configure BGP neighbor(s) (peering). o Step 3: Advertise network(s) originating from this AS.
  • 25. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential eBGP BGP Branch Configuration  Verify eBGP • Three commands can be used to verify eBGP
  • 26. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34 3.6 Chapter Summary
  • 27. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Broadband transmission is provided by a wide range of technologies, including DSL, fiber-to-the-home, coaxial cable systems, wireless, and satellite. This transmission requires additional components at the home end and at the corporate end. Broadband wireless solutions include municipal Wi-Fi, cellular/mobile, and satellite Internet. Municipal Wi-Fi mesh networks are not widely deployed. Cellular/mobile coverage can be limited and bandwidth can be an issue. Satellite Internet is relatively expensive and limited, but it may be the only method to provide access.  If multiple broadband connections are available to a particular location, a cost-benefit analysis should be performed to determine the best solution. The best solution may be to connect to multiple service providers to provide redundancy and reliability.  PPPoE is a popular data link protocol for connecting remote networks to their ISPs. PPPoE provides the flexibility of PPP and the convenience of Ethernet. Chapter Summary Summary
  • 28. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  VPNs are used to create a secure end-to-end private network connection over a third party network, such as the Internet. GRE is a basic, non- secure site-to-site VPN tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, thus allowing an organization to deliver other protocols through an IP-based WAN. Today it is primarily used to deliver IP multicast traffic or IPv6 traffic over an IPv4 unicast-only connection.  BGP is the routing protocol implemented between autonomous systems. Three basic design options for eBGP are as follows:  The ISP advertises a default route only to the customer  The ISP advertises a default route and all of its routes to the customer.  The ISP advertises all Internet routes to the customer.  Implementing eBGP in a single-homed network only requires a few commands. Chapter Summary Summary Continued
  • 29. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 30. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential