Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
The document discusses the Internet Control Message Protocol (ICMP). ICMP provides error reporting, congestion reporting, and first-hop router redirection. It uses IP to carry its data end-to-end and is considered an integral part of IP. ICMP messages are encapsulated in IP datagrams and are used to report errors in IP datagrams, though some errors may still result in datagrams being dropped without a report. ICMP defines various message types including error messages like destination unreachable and informational messages like echo request and reply.
IPv6 is the next generation Internet Protocol that provides a vastly larger number of IP addresses compared to the current IPv4. It features 128-bit addressing which allows for trillions of devices to have unique IP addresses. IPv6 also aims to make networking more secure and allow for more efficient routing. The transition from IPv4 to IPv6 is underway, with most modern operating systems and network hardware now supporting IPv6, though applications support is still growing. IPv6's expanded addressing capabilities and additional features will help meet future demands on the Internet as more devices connect online.
This document provides an overview of Network Address Translation (NAT) including:
- Why NAT is used to connect networks with private IP addresses to the Internet and during network mergers.
- NAT implementation considerations such as advantages of address conservation and flexibility but disadvantages of delays and incompatible applications.
- Common NAT configurations like dynamic NAT, dynamic NAT with overloading, and static NAT.
The document discusses the transition from classful networks to classless inter-domain routing (CIDR) networks. CIDR allows for more flexibility in assigning blocks of IP addresses and improves routing efficiency by allowing routes to be aggregated. Valid CIDR blocks must have the host bits set to zero so the address falls on the network boundary. Large blocks are allocated by regional organizations like RIPE and then assigned to ISPs and other organizations in smaller blocks.
BGP is the exterior gateway protocol that connects different autonomous systems on the internet. It allows for the exchange of routing and reachability information between these systems. BGP operates using a finite state machine to manage the states of connections between peers. It establishes TCP connections between routers to exchange routing updates and keep connections alive through regular keepalive messages. BGP version 4, defined in RFC 4271, is the current standard implementation which supports features like classless inter-domain routing and route aggregation.
The document provides an overview of the Dynamic Host Configuration Protocol (DHCP) including its history, operation, message types, client states, security considerations, and future developments. It also outlines testing procedures for DHCP clients and servers to validate their basic functionality and behaviors.
ICMP is a helper protocol that supports IP by providing error reporting and simple queries. ICMP messages are encapsulated as IP datagrams with a 4 byte header containing the type, code, and checksum. Common ICMP error messages include Destination Unreachable (sent when a datagram cannot be forwarded), Redirect (informs about a better route), and Time Exceeded (sent when the TTL reaches zero).
The document discusses the Internet Control Message Protocol (ICMP). ICMP provides error reporting, congestion reporting, and first-hop router redirection. It uses IP to carry its data end-to-end and is considered an integral part of IP. ICMP messages are encapsulated in IP datagrams and are used to report errors in IP datagrams, though some errors may still result in datagrams being dropped without a report. ICMP defines various message types including error messages like destination unreachable and informational messages like echo request and reply.
IPv6 is the next generation Internet Protocol that provides a vastly larger number of IP addresses compared to the current IPv4. It features 128-bit addressing which allows for trillions of devices to have unique IP addresses. IPv6 also aims to make networking more secure and allow for more efficient routing. The transition from IPv4 to IPv6 is underway, with most modern operating systems and network hardware now supporting IPv6, though applications support is still growing. IPv6's expanded addressing capabilities and additional features will help meet future demands on the Internet as more devices connect online.
This document provides an overview of Network Address Translation (NAT) including:
- Why NAT is used to connect networks with private IP addresses to the Internet and during network mergers.
- NAT implementation considerations such as advantages of address conservation and flexibility but disadvantages of delays and incompatible applications.
- Common NAT configurations like dynamic NAT, dynamic NAT with overloading, and static NAT.
The document discusses the transition from classful networks to classless inter-domain routing (CIDR) networks. CIDR allows for more flexibility in assigning blocks of IP addresses and improves routing efficiency by allowing routes to be aggregated. Valid CIDR blocks must have the host bits set to zero so the address falls on the network boundary. Large blocks are allocated by regional organizations like RIPE and then assigned to ISPs and other organizations in smaller blocks.
BGP is the exterior gateway protocol that connects different autonomous systems on the internet. It allows for the exchange of routing and reachability information between these systems. BGP operates using a finite state machine to manage the states of connections between peers. It establishes TCP connections between routers to exchange routing updates and keep connections alive through regular keepalive messages. BGP version 4, defined in RFC 4271, is the current standard implementation which supports features like classless inter-domain routing and route aggregation.
The document provides an overview of the Dynamic Host Configuration Protocol (DHCP) including its history, operation, message types, client states, security considerations, and future developments. It also outlines testing procedures for DHCP clients and servers to validate their basic functionality and behaviors.
ICMP is a helper protocol that supports IP by providing error reporting and simple queries. ICMP messages are encapsulated as IP datagrams with a 4 byte header containing the type, code, and checksum. Common ICMP error messages include Destination Unreachable (sent when a datagram cannot be forwarded), Redirect (informs about a better route), and Time Exceeded (sent when the TTL reaches zero).
Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP addresses, subnet masks, default gateways and other network configuration options to clients on a network. DHCP reduces network configuration workload. It uses a four step packet exchange process during the initial IP address lease and will attempt renewal at 50% and 87.5% of the lease time. DHCP servers must be authorized in Active Directory to lease addresses. Scopes are configured to define address ranges for clients, reservations assign specific addresses by MAC address, and relays allow a single DHCP server to service multiple subnets.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
The document provides an overview of IPv6 implementation including key features like larger address space, simplified headers, and auto-configuration. It discusses IPv6 addressing modes like unicast, multicast, and anycast. Special address types and the IPv6 header are also explained. Methods for transitioning from IPv4 to IPv6 like dual stack routers and tunneling are covered. IPv6 routing protocols and basic configuration are also summarized.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
The document provides an overview of the Border Gateway Protocol (BGP). It discusses BGP concepts such as autonomous systems, path attributes, and the BGP protocol operation. Key points include that BGP establishes peering sessions to exchange routing information, uses route attributes like AS path, next hop, and communities to determine the best path, and supports techniques like route reflection and confederation to improve scalability in large networks.
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
ARP resolves IP addresses to MAC addresses for local network delivery. It uses broadcast datagrams to request MAC addresses and unicasts to reply. Proxy ARP allows routers to answer for hosts on remote networks during subnet transition. RARP and Inverse ARP work in reverse to resolve MAC addresses to IP addresses.
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes the history and development of EIGRP, its basic operation and components, including reliable transport protocol, packet types, neighbor discovery via hello packets, and route updates using the diffusing update algorithm. It also covers basic EIGRP configuration such as enabling it with the router eigrp command, advertising networks, and verifying neighbor relationships.
This ppt contains what is dhcp, it's need, advantages, disadvantages, IP address assignment process and types, DHCP architecture and lastly some differences.
BGP is an inter-AS routing protocol used to exchange routing and reachability information between autonomous systems on the internet. It uses path vector routing rather than distance vector, and carries richer metric information than IGPs. BGP configurations establish neighbor relationships between routers in different ASes to exchange routing updates.
Border Gateway Protocol (BGP) is the routing protocol that controls how data routes between autonomous systems on the Internet. It works by maintaining a table of IP network prefixes and their accessibility between networks. BGP allows for fully decentralized routing and is used internally by gateways to determine the best route to a given destination network. There are two types of BGP sessions - internal BGP (iBGP) for intra-autonomous system routing and external BGP (eBGP) for inter-autonomous system routing. BGP uses messages like OPEN, UPDATE, KEEPALIVE and NOTIFICATION to establish and maintain sessions between routers to exchange routing information.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
The document discusses the IS-IS routing protocol. It provides an overview of IS-IS, including that it is an interior gateway protocol used within an autonomous system. It also describes IS-IS levels, areas, and backbone routers. Finally, it discusses CLNS addressing, IS-IS PDUs like Hello packets, and other IS-IS concepts.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
This document provides an overview of IP routing and routing protocols. It begins with a high-level explanation of how routing works on the internet through IP addressing and packet forwarding. It then discusses the history of routing, from static routing in early networks to the development of dynamic routing protocols. The rest of the document outlines key interior gateway protocols like OSPF and IS-IS, exterior gateway protocols like BGP, and concepts like autonomous systems and routing policy.
Connect end devices like PCs to a switch and server. Configure the DHCP server by assigning it an IP address and subnet mask, and enabling DHCP service to assign IP addresses from a range to the maximum number of users. With DHCP enabled on the clients, the server will automatically assign IP addresses to the PCs, easing configuration and reducing administrative overhead compared to manually assigning each IP address.
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
The document provides an overview of Border Gateway Protocol (BGP) which is the routing protocol used to exchange routes between institutions and the KAREN network. BGP allows different autonomous systems (AS) to exchange routing information and is more than just a routing protocol as it contains additional route attributes that are used for policy rules. BGP can operate internally within an AS or externally between ASes to control route propagation based on commercial agreements.
IPv6 or Internet Protocol Version 6 is the next generation internet protocol that will replace the current IPv4 protocol. It features a 128-bit address space compared to IPv4's 32-bit addresses, which allows for vastly more IP addresses needed to meet the increased demands of internet-connected devices. IPv6 also provides improved routing of internet traffic and better built-in security. The presentation discusses key aspects of IPv6 including why the new protocol is needed, its features, address types, addressing structure, advantages over IPv4, and challenges in transitioning to IPv6.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP addresses, subnet masks, default gateways and other network configuration options to clients on a network. DHCP reduces network configuration workload. It uses a four step packet exchange process during the initial IP address lease and will attempt renewal at 50% and 87.5% of the lease time. DHCP servers must be authorized in Active Directory to lease addresses. Scopes are configured to define address ranges for clients, reservations assign specific addresses by MAC address, and relays allow a single DHCP server to service multiple subnets.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
The document provides an overview of IPv6 implementation including key features like larger address space, simplified headers, and auto-configuration. It discusses IPv6 addressing modes like unicast, multicast, and anycast. Special address types and the IPv6 header are also explained. Methods for transitioning from IPv4 to IPv6 like dual stack routers and tunneling are covered. IPv6 routing protocols and basic configuration are also summarized.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
The document provides an overview of the Border Gateway Protocol (BGP). It discusses BGP concepts such as autonomous systems, path attributes, and the BGP protocol operation. Key points include that BGP establishes peering sessions to exchange routing information, uses route attributes like AS path, next hop, and communities to determine the best path, and supports techniques like route reflection and confederation to improve scalability in large networks.
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
ARP resolves IP addresses to MAC addresses for local network delivery. It uses broadcast datagrams to request MAC addresses and unicasts to reply. Proxy ARP allows routers to answer for hosts on remote networks during subnet transition. RARP and Inverse ARP work in reverse to resolve MAC addresses to IP addresses.
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes the history and development of EIGRP, its basic operation and components, including reliable transport protocol, packet types, neighbor discovery via hello packets, and route updates using the diffusing update algorithm. It also covers basic EIGRP configuration such as enabling it with the router eigrp command, advertising networks, and verifying neighbor relationships.
This ppt contains what is dhcp, it's need, advantages, disadvantages, IP address assignment process and types, DHCP architecture and lastly some differences.
BGP is an inter-AS routing protocol used to exchange routing and reachability information between autonomous systems on the internet. It uses path vector routing rather than distance vector, and carries richer metric information than IGPs. BGP configurations establish neighbor relationships between routers in different ASes to exchange routing updates.
Border Gateway Protocol (BGP) is the routing protocol that controls how data routes between autonomous systems on the Internet. It works by maintaining a table of IP network prefixes and their accessibility between networks. BGP allows for fully decentralized routing and is used internally by gateways to determine the best route to a given destination network. There are two types of BGP sessions - internal BGP (iBGP) for intra-autonomous system routing and external BGP (eBGP) for inter-autonomous system routing. BGP uses messages like OPEN, UPDATE, KEEPALIVE and NOTIFICATION to establish and maintain sessions between routers to exchange routing information.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
The document discusses the IS-IS routing protocol. It provides an overview of IS-IS, including that it is an interior gateway protocol used within an autonomous system. It also describes IS-IS levels, areas, and backbone routers. Finally, it discusses CLNS addressing, IS-IS PDUs like Hello packets, and other IS-IS concepts.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
This document provides an overview of IP routing and routing protocols. It begins with a high-level explanation of how routing works on the internet through IP addressing and packet forwarding. It then discusses the history of routing, from static routing in early networks to the development of dynamic routing protocols. The rest of the document outlines key interior gateway protocols like OSPF and IS-IS, exterior gateway protocols like BGP, and concepts like autonomous systems and routing policy.
Connect end devices like PCs to a switch and server. Configure the DHCP server by assigning it an IP address and subnet mask, and enabling DHCP service to assign IP addresses from a range to the maximum number of users. With DHCP enabled on the clients, the server will automatically assign IP addresses to the PCs, easing configuration and reducing administrative overhead compared to manually assigning each IP address.
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
The document provides an overview of Border Gateway Protocol (BGP) which is the routing protocol used to exchange routes between institutions and the KAREN network. BGP allows different autonomous systems (AS) to exchange routing information and is more than just a routing protocol as it contains additional route attributes that are used for policy rules. BGP can operate internally within an AS or externally between ASes to control route propagation based on commercial agreements.
IPv6 or Internet Protocol Version 6 is the next generation internet protocol that will replace the current IPv4 protocol. It features a 128-bit address space compared to IPv4's 32-bit addresses, which allows for vastly more IP addresses needed to meet the increased demands of internet-connected devices. IPv6 also provides improved routing of internet traffic and better built-in security. The presentation discusses key aspects of IPv6 including why the new protocol is needed, its features, address types, addressing structure, advantages over IPv4, and challenges in transitioning to IPv6.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Juniper JNCIA – Juniper RIP and OSPF Route ConfigurationHamed Moghaddam
The document describes configuring OSPF routing between routers R1, R2, and R3, and exporting OSPF routes into RIP to advertise them to router R4. R2 is configured with OSPF to neighbors R1 and R3, and with RIP to neighbor R4. The routing policy on R2 is updated to export OSPF routes into RIP. This allows R4 to now see the loopback routes of R1 and R3 in its routing table via RIP.
Microsoft MCSA - Install active directory domain services (adds) roleHamed Moghaddam
This document provides instructions for installing the Active Directory Domain Services (ADDS) role on a Windows Server to promote it to an Active Directory domain controller. It describes launching Server Manager, selecting the Add Roles and Features option, choosing the ADDS role, and completing the installation process by pressing Install and Close. The role is added through the Server Manager to enable centralized management of users, resources, and group policies through Active Directory.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
- The document describes how to configure a site-to-site IPsec VPN tunnel between Router R1 and Router R3 using pre-shared keys for authentication.
- The key steps are to configure ISAKMP policies for phase 1 negotiation, IPsec transform sets for phase 2 encryption and authentication, and crypto maps on each router to establish the VPN tunnel.
- Connectivity tests are then run to verify end-to-end connectivity between networks over the encrypted IPsec tunnel.
How to Configure Routing Information Protocol (RIP)IT Tech
The document describes how to configure Routing Information Protocol (RIP) version 2 on three routers to enable routing between connected networks. It provides the configuration steps for setting hostnames, IP addresses and RIP on each router. It also shows how to verify the routing tables and connectivity between hosts on different networks using the ping command.
The document provides instructions for a lab activity to configure and verify EIGRP routing between two routers, R1 and R2. The key steps are:
1. Configure IP addresses on the interfaces of R1 and R2.
2. Check the routing tables on each router which initially only show directly connected networks.
3. Enable the EIGRP routing protocol on each router to exchange routing information.
4. Verify the EIGRP neighbor relationship forms and each router learns routes to networks attached to the other router.
The document describes the configuration of OSPFv3 in a single area network across four routers. Key steps include:
1. Configuring IPv6 unicast routing and interface addresses on each router;
2. Enabling OSPFv3 on each router and assigning a router ID, then configuring interfaces to advertise connected networks;
3. Verification shows each router has established full adjacencies and is exchanging routes, including successful ping from R3 to R4.
Here are the key steps to reset the router configuration to factory defaults:
1. Access privileged EXEC mode by entering "enable"
2. Erase the startup configuration file by entering "erase startup-config", then confirm by pressing enter. This removes any saved configuration.
3. Reload the router by entering "reload". This will perform a soft reboot and reload the factory default configuration stored in ROM.
The router is now reset to its original factory settings. The IP addresses, passwords, and all other configuration changes made are erased.
Eigrp on a cisco asa firewall configuration3Anetwork com
The document discusses configuring EIGRP routing on a Cisco ASA firewall. It describes setting up interfaces, IP addressing, and EIGRP routing on the ASA and two routers. The ASA separates an internal, DMZ, and external network, and redistributes a default static route into EIGRP. Configuration is verified by showing EIGRP neighbors, routes, and that the routers have learned routes from all connected networks.
The document discusses configuring OSPF routing on Ethernet and Frame Relay networks. For the Ethernet network, OSPF is configured to elect R1 as the DR and R2 as the BDR by setting their interface priorities. For the Frame Relay network, OSPF is configured with static mappings between routers since Frame Relay is non-broadcast by default. Neighbor statements are used to define neighbors since hellos are unicast. Verification commands show the elected DR and neighbors.
Networking Tutorial Goes to Basic PPP Configuration3Anetwork com
Leading Cisco networking products distributor-3network.com
Here we will be going over Basic Configuration of PPP (Point-to-Point Protocol). It includes Basic Configuration tasks on a router, configuring OSPF routing protocol, and configuring PPP PAP and CHAP authentication
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The serial interface is up but the line protocol is down. This indicates that while the physical layer connection is up, the data link layer is not establishing properly. Common reasons for this include:
- Mismatched encapsulation types on either end (e.g. one side PPP other side HDLC)
- Authentication failure if using PPP (e.g. wrong username/password)
- Layer 1 issues like clock rate mismatch if using HDLC
So in summary, the interface is physically up but the data link layer is failing to establish due to a configuration mismatch between the two directly connected routers.
This document discusses configuring next-hop-self on routers to change the next hop attribute for BGP routes advertised between autonomous systems. It shows the configuration of ISP1, ISP2 and Branch routers without changing the next hop. ISP1 is then configured with next-hop-self so that routes learned from ISP2 and advertised to Branch will have ISP1 as the next hop rather than ISP2. This allows Branch to successfully ping the network learned via BGP.
The document describes a set of exercises to configure basic routing and OSPF routing on routers. It includes instructions on configuring interfaces, static routing, and OSPF routing. Participants will work in groups to configure three routers and four switches with a common IP addressing scheme and network topology. The exercises progress from basic router configuration to static routing and finally dynamic routing using OSPF.
This document provides instructions for configuring Cisco routers and switches. It includes details on:
- Memory types on Cisco devices like RAM, NVRAM, FLASH, and ROM
- Show commands to view configurations, interfaces, versions, and more
- Configuring IP addresses, descriptions, saving configurations
- Common configuration mode commands
- Configuring IP addresses, default gateways on switches on VLAN 1 interfaces
The document then provides tasks for configuring hostnames, IP addresses on all devices, assigning IP settings to PCs, and testing connectivity using ping commands to verify reachability between devices on the same and different networks.
This document describes the configuration of a 6to4 topology between routers R1, R2, R3, and R4. Interface addresses and tunnel interfaces are configured on each router. Static routes are configured to establish connectivity over the 6to4 tunnels. OSPFv3 routing is then configured and enabled on the interfaces to automate routing. Connectivity is verified by pinging between routers to confirm end-to-end IPv6 reachability over the 6to4 topology.
The document discusses routing concepts including routing tables, directly connected routes, statically configured routes, and dynamic routing protocols. It provides examples of configuring RIP routing between two routers to automatically exchange routing information and populate each router's routing table with routes to networks connected to other interfaces. Key steps include configuring RIP, enabling RIP on connected interfaces, and verifying routes are learned through RIP.
The document discusses securing Cisco routers by hardening configurations based on the NSA Router Security Configuration Guide. It covers topics such as physical security of routers, defining loopback interfaces, banner configuration, blocking SYN flooding attacks using TCP intercept, tuning IP stack parameters like limiting embryonic connections and enabling TCP selective acknowledgment. It also discusses access control measures like basic authentication, AAA authentication using RADIUS/TACACS+, privilege levels, and disabling unused ports and protocols like CDP.
The document provides instructions for configuring basic settings on Cisco switches and routers, including enabling privileged modes, setting passwords, configuring interfaces, VLANs, routing protocols, ACLs, SNMP, and more. Example commands are given for tasks like configuring device hostnames, IP addresses, routing protocols, trunking, VLANs, DHCP, ACLs, and other common switch and router configurations.
The document provides instructions for configuring basic settings on Cisco switches and routers, including enabling privileged modes, setting passwords, configuring interfaces, VLANs, routing protocols, ACLs, SNMP, and more. Example commands are given for tasks like configuring device hostnames, IP addresses, routing protocols, trunking, VLANs, DHCP, ACLs, and other common switch and router configurations.
Similar to Cisco CCNA IP SLA with tracking configuration (20)
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
This document provides instructions on configuring a router on a stick topology. It describes configuring a switch port as a trunk, and then creating subinterfaces on the router's physical interface that correspond to each VLAN. It shows assigning IP addresses to the subinterfaces to act as the default gateway for each VLAN subnet. Finally, it describes configuring PCs with IP addresses in the correct subnets and default gateways, and confirms connectivity between the VLANs via ping tests through the router.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
This document discusses configuring a Cisco router to act as a DHCP server. It describes the steps to create DHCP pools for two networks, 10.10.10.0/24 and 20.20.20.0/24, and configure the router's interfaces. It also explains the DHCP process and provides configuration snippets from the router to illustrate excluding addresses and verifying the configuration. The goal is to prepare readers for the Cisco CCNA certification exam.
Microsoft MCSA- Joining Client Machines To The Domain!Hamed Moghaddam
The document describes the steps to join a Windows 8 client computer to an Active Directory domain. It involves logging into the client computer with the local administrator account, accessing the system properties, selecting the domain to join and providing the domain administrator credentials, then restarting the computer. Once restarted, the user can sign in to the domain using the format domainname\username and password.
The document discusses asset security and data management. It outlines the objectives of classifying information and assets, determining and maintaining ownership, protecting privacy, and establishing handling requirements. It then provides details on determining and maintaining data ownership, including developing sound data policies, defining roles and responsibilities, and ensuring data quality. It also discusses data security controls and standards for protecting data at rest, in transit, and in various states.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. CISCO CCNA
IP SLA withTracking Configuration
To watch our Cisco CCNA Video Trainings Please Check out the link below:
www.asmed.com/c1
ASM Educational Center Inc. (ASM)
Where Training, Technology & Service Converge
Phone: (301) 984-7400
Rockville,MD
3. IP SLA withTracking Configuration
Now we will do Lab for Tracking
In here we have as follow
Above we have a router (R1) that is connected to two ISPs. We want to use ISP1 as the primary and
ISP2 as the backup link. All traffic will be sent towards ISP1 but when it’s unreachable we’ll switch
over to ISP2. You can achieve this by using two default routes:
R1=f0/0 192.168.12.1 /24 connected to ISP1=192.168.12.2
R1=F0/1 192.168.13.1 /24 connected to ISP2= 192.168.13.3
R1#show ip int brief
4. IP SLA withTracking Configuration
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.1 YES manual up up
FastEthernet1/0 192.168.13.1 YES manual up up
Serial0/1/0 unassigned YES Unset administratively down down
5. IP SLA withTracking Configuration
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.13.3 50
As we see in above we are using the floating Static route that is top one has
AD=1 for static route and 2nd one the AD=50 , so when I go to
R1#show ip route
6. IP SLA withTracking Configuration
I will see the top commands on the routing tables
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.12.2 to network 0.0.0.0
C 192.168.12.0/24 is directly connected, FastEthernet0/0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.12.2
R1#
7. IP SLA withTracking Configuration
Here R1 can ping both ISP and from above we see it prefer top ISP1
R1#ping 192.168.12.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.12.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
R1#
R1#ping 192.168.13.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.13.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
R1#
8. IP SLA withTracking Configuration
R1#show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
D - Remote, C - CVTA, M - Two-port Mac Relay
Device ID Local Intrfce Holdtme Capability Platform Port ID
ISP2 Fas 1/0 136 R 7206VXR Fas 1/0
ISP1 Fas 0/0 143 R 7206VXR Fas 0/0
9. IP SLA withTracking Configuration
Now If I go to R1 and shut down the f0/0 (which is connected to ISP1) then since I have the
Floating point the R1 #show ip route will be pointed to ISP2
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#int f0/0
R1(config-if)#shut
10. IP SLA withTracking Configuration
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
11. IP SLA withTracking Configuration
As we see in above now R1 goes to internet via ISP2 , which is called the floating point----
But what happen if the link on ISP1 goes than ; then R1 in his table still will have original route to ISP1=192.168.12.2
so in here we will use the concept of Ip SLA with adding the track on the static route of R1
12. IP SLA withTracking Configuration
Lets bring up the int f0/0 on r1;
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#int f0/0
R1(config-if)#no shut
13. IP SLA withTracking Configuration
R1#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.1 YES manual up up
FastEthernet1/0 192.168.13.1 YES manual up up
Serial0/1/0 unassigned YES Unset administratively down down
14. IP SLA withTracking Configuration
R1#
R1#
R1#show ip rou
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.12.2 to network 0.0.0.0
C 192.168.12.0/24 is directly connected, FastEthernet0/0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.12.2
R1#
15. IP SLA withTracking Configuration
Now life is back to normal, that is using ISP1=192.168.12.2
Now we will do tracking with Ip SLA
Step 1) I will create an IP SLA instance that pings the IP address of the ISP1
router:
R1(config)#ip sla 1
R1(config-ip-sla)#
18. IP SLA withTracking Configuration
Now we will use the same concept as before that is icmp-echo
R1(config-ip-sla)#icmp-echo 192.168.12.2 ( Point to ISP1=192.168.12.2)
R1(config-ip-sla-echo)#
R1(config-ip-sla-echo)#?
IP SLAs echo Configuration Commands:
default Set a command to its defaults
exit Exit operation configuration
frequency Frequency of an operation
history History and Distribution Data
no Negate a command or set its defaults
owner Owner of Entry
request-data-size Request data size
19. IP SLA withTracking Configuration
tag User defined tag
threshold Operation threshold in milliseconds
timeout Timeout of an operation
tos Type Of Service
verify-data Verify data
vrf Configure IP SLAs for a VPN Routing/Forwarding instance
R1(config-ip-sla-echo)#frequency ?
<1-604800> Frequency in seconds (default 60)
R1(config-ip-sla-echo)#frequency 20 ?
<cr>
R1(config-ip-sla-echo)#frequency 20
20. IP SLA withTracking Configuration
Here is show run so far
R1#show run
ip sla 1
icmp-echo 192.168.12.2
frequency 20
21. IP SLA withTracking Configuration
Step 2) Go back to global configuration to schedule now for forever
R1#
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip sla
R1(config)#ip sla ?
<1-2147483647> Entry Number
22. IP SLA withTracking Configuration
enable Enable Event Notifications
ethernet-monitor IP SLAs Auto Ethernet configuration
group Group Configuration or Group Scheduling
key-chain Use MD5 authentication for IP SLAs Control Messages
logging Enable Syslog
low-memory Configure Low Water Memory Mark
reaction-configuration IP SLAs Reaction-Configuration
reaction-trigger IP SLAs Trigger Assignment
reset IP SLAs Reset
responder Enable IP SLAs Responder
restart Restart An Active Entry
schedule IP SLAs Entry Scheduling
23. IP SLA withTracking Configuration
R1(config)#ip sla schedule ?
<1-2147483647> Entry number
R1(config)#ip sla schedule 1 ?
ageout How long to keep this Entry when inactive
life Length of time to execute in seconds
recurring Probe to be scheduled automatically every day
start-time When to start this entry
<cr>
24. IP SLA withTracking Configuration
R1(config)#ip sla schedule 1 sta
R1(config)#ip sla schedule 1 start-time ?
after Start after a certain amount of time from now
hh:mm Start time (hh:mm)
hh:mm:ss Start time (hh:mm:ss)
now Start now
pending Start pending
25. IP SLA withTracking Configuration
R1(config)#ip sla schedule 1 start-time now ?
ageout How long to keep this Entry when inactive
life Length of time to execute in seconds
recurring Probe to be scheduled automatically every day
<cr>
R1(config)#ip sla schedule 1 start-time now li
R1(config)#ip sla schedule 1 start-time now life ?
<0-2147483647> Life seconds (default 3600)
forever continue running forever
26. IP SLA withTracking Configuration
R1(config)#ip sla schedule 1 start-time now life for
R1(config)#ip sla schedule 1 start-time now life forever ?
ageout How long to keep this Entry when inactive
recurring Probe to be scheduled automatically every day
<cr>
R1(config)#ip sla schedule 1 start-time now life forever
R1(config)#
27. IP SLA withTracking Configuration
Here is show run so far
R1#show run
ip sla 1
icmp-echo 192.168.12.2
frequency 20
ip sla schedule 1 life forever start-time now
28. IP SLA withTracking Configuration
let’s check with show commands
life is good now
R1#show ip sla sta
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:40:17.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 6
Number of failures: 1
Operation time to live: Forever
29. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:40:57.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 8
Number of failures: 1
Operation time to live: Forever
30. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:41:37.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 10
Number of failures: 1
Operation time to live: Forever
31. IP SLA withTracking Configuration
Step 3) now I will define the track number; and then later on I will append it to default route
pointed to ISP1=192.168.12.2
R1#
R1#
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#trac
R1(config)#track 1 ?
interface Select an interface to track
ip IP protocol
list Group objects in a list
stub-object Stub tracking object
32. IP SLA withTracking Configuration
R1(config)#track 1 ip ?
route IP route
sla IP Service Level Agreement
R1(config)#track 1 ip sla ?
<1-2147483647> Entry number
R1(config)#track 1 ip sla 1 ?
reachability Reachability
state Return code state
<cr>
33. IP SLA withTracking Configuration
R1(config)#track 1 ip sla 1 re
R1(config)#track 1 ip sla 1 reachability ?
<cr>
R1(config)#track 1 ip sla 1 reachability
R1(config-track)#
34. IP SLA withTracking Configuration
Here is show run so far
track 1 ip sla 1 reachability
ip route 0.0.0.0 0.0.0.0 192.168.12.2
ip route 0.0.0.0 0.0.0.0 192.168.13.3 50
!
!
!
ip sla 1
icmp-echo 192.168.12.2
frequency 20
ip sla schedule 1 life forever start-time now
35. IP SLA withTracking Configuration
Step 4) now I go to default router that I had; remove it and add it with new track number 1
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#no ip route 0.0.0.0 0.0.0.0 192.168.12.2
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 ?
<1-255> Distance metric for this route
name Specify name of the next hop
permanent permanent route
tag Set tag for this route
track Install route depending on tracked item
<cr>
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 tr
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 track ?
<1-500> tracked object number
36. IP SLA withTracking Configuration
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1 ?
<1-255> Distance metric for this route
name Specify name of the next hop
tag Set tag for this route
<cr>
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1
37. IP SLA withTracking Configuration
So here is show run so far:
r1#show run
!track 1 ip sla 1 reachability
!
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.13.1 255.255.255.0
duplex auto
speed auto
!
38. IP SLA withTracking Configuration
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1 ( here I have added the Track)
ip route 0.0.0.0 0.0.0.0 192.168.13.3 50
!
!
!
ip sla 1
icmp-echo 192.168.12.2 ( this is IP address of Main ISP1 that I am looking )
frequency 20
ip sla schedule 1 life forever start-time now
!
39. IP SLA withTracking Configuration
Now we will test it
That is if ISP1=f0/0=192.168.12.2 goes down ; then when I go to R1#show ip route I will see the routing table
has been changed to the new one
ISP1#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.2 YES manual up up
FastEthernet1/0 unassigned YES NVRAM administratively down down
FastEthernet1/1 unassigned YES NVRAM administratively down down
40. IP SLA withTracking Configuration
ISP1#config t
Enter configuration commands, one per line. End with CNTL/Z.
ISP1(config)#int f0/0
ISP1(config-if)#shut
ISP1(config-if)#
41. IP SLA withTracking Configuration
Now I will go to R1#show ip route and see the routing table should point to ISP2=192.168.13.3
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
42. IP SLA withTracking Configuration
Which it did with AD=50
Now let’s look at some show commands it shows it changed
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: NoConnection/Busy/Timeout
Latest operation start time: *05:50:57.723 UTC Thu Dec 15 2016
Latest operation return code: No connection (here says no connection)
Number of successes: 34
Number of failures: 5 ( here is number changing)
Operation time to live: Forever
43. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: NoConnection/Busy/Timeout
Latest operation start time: *05:51:37.723 UTC Thu Dec 15 2016
Latest operation return code: No connection
Number of successes: 34
Number of failures: 7 ( here is the number changes)
Operation time to live: Forever
44. IP SLA withTracking Configuration
R1#
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: NoConnection/Busy/Timeout
Latest operation start time: *05:52:17.723 UTC Thu Dec 15 2016
Latest operation return code: No connection
Number of successes: 34
Number of failures: 9
Operation time to live: Forever
45. IP SLA withTracking Configuration
R1#
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
46. IP SLA withTracking Configuration
R1#
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.13.3 to network 0.0.0.0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [50/0] via 192.168.13.3
R1#
47. IP SLA withTracking Configuration
Now I go back to ISP1 and bring back online
ISP1#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.12.2 YES manual up up
FastEthernet1/0 unassigned YES NVRAM administratively down down
FastEthernet1/1 unassigned YES NVRAM administratively down down
48. IP SLA withTracking Configuration
ISP1#config t
Enter configuration commands, one per line. End with CNTL/Z.
ISP1(config)#int f0/0
ISP1(config-if)#no shut
ISP1(config-if)#
49. IP SLA withTracking Configuration
Now I go back to R1#show ip route and check the work
R1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.12.2 to network 0.0.0.0
C 192.168.12.0/24 is directly connected, FastEthernet0/0
C 192.168.13.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.12.2
50. IP SLA withTracking Configuration
Life is back to normal
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:54:37.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 36
Number of failures: 14
Operation time to live: Forever
51. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:54:57.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 37
Number of failures: 14
Operation time to live: Forever
52. IP SLA withTracking Configuration
R1#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1
Type of operation: icmp-echo
Latest RTT: 1 milliseconds
Latest operation start time: *05:55:17.723 UTC Thu Dec 15 2016
Latest operation return code: OK
Number of successes: 38
Number of failures: 14
Operation time to live: Forever
53. IP SLA withTracking Configuration
So summary on R1 show run
R1#show run
!
track 1 ip sla 1 reachability ( track 1 is pointed to default route)
!
!
!
interface FastEthernet0/0
ip address 192.168.12.1 255.255.255.0
duplex auto
speed auto
54. IP SLA withTracking Configuration
!
interface FastEthernet0/1
ip address 192.168.13.1 255.255.255.0
duplex auto
speed auto
!
55. IP SLA withTracking Configuration
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.12.2 track 1 ( here we are tracking 1)
ip route 0.0.0.0 0.0.0.0 192.168.13.3 50 ( this is 2ndary static route since it has AD=50)
!
!
!
ip sla 1
icmp-echo 192.168.12.2 ( this is pointed to Main ISP1 =primary)
frequency 20
ip sla schedule 1 life forever start-time now
56. ASM Educational Center Inc. (ASM)
Where Training, Technology & Service Converge
To watch our CiscoCCNAVideoTrainings PleaseCheck out the link below:
www.asmed.com/c1
Phone: (301) 984-7400
Rockville,MD