EIGRP is an advanced distance vector routing protocol created by Cisco that uses the Diffusing Update Algorithm to calculate paths and backup paths. It establishes neighbor adjacencies, uses reliable transport for packet delivery, and sends partial and bounded updates only when there are changes.
Presentation about interior gateway routing protocol EIGRP which covers most of the concepts and features of the protocol.
Delivered by Dmitry Figol, CCIE R&S #53592.
Presentation about interior gateway routing protocol EIGRP which covers most of the concepts and features of the protocol.
Delivered by Dmitry Figol, CCIE R&S #53592.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
ospf is routing protocol.The OSPF protocol is a link state Protocol that handles routing for IP traffic.The two important concepts in case of OSPF are Autonomous Systems and Areas.
It is an open standard, distance vector, classfull routing protocol. Rip version 2 supports classless.
It sends the complete routing table out to all active interfaces every 30 seconds. Rip only uses hop count
to determine the best way to a remote network, but it has a maximum allowable hop count of 15 by
default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it’s inefficient on
large networks with slow WAN links or on networks with a large number of routers installed.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a faulttolerant default gateway, and has been described in detail in RFC 2281.
The protocol establishes a framework between network routers in order to achieve default gateway
failover if the primary gateway becomes inaccessible, in close association with a rapid-converging
routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the
multicast address 224.0.0.2 (all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985,
to other HSRP-enabled routers, defining priority between the routers.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
ospf is routing protocol.The OSPF protocol is a link state Protocol that handles routing for IP traffic.The two important concepts in case of OSPF are Autonomous Systems and Areas.
It is an open standard, distance vector, classfull routing protocol. Rip version 2 supports classless.
It sends the complete routing table out to all active interfaces every 30 seconds. Rip only uses hop count
to determine the best way to a remote network, but it has a maximum allowable hop count of 15 by
default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it’s inefficient on
large networks with slow WAN links or on networks with a large number of routers installed.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a faulttolerant default gateway, and has been described in detail in RFC 2281.
The protocol establishes a framework between network routers in order to achieve default gateway
failover if the primary gateway becomes inaccessible, in close association with a rapid-converging
routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the
multicast address 224.0.0.2 (all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985,
to other HSRP-enabled routers, defining priority between the routers.
BlockTrail's CTO Ruben De Vries presentation on HD wallets at Bitcoin Wednesday meetup Amsterdam.
*Disclaimer: This presentation is meant to be a general overview of the cryptography concepts mainly aimed at the non-tech user.
Visit www.blocktrail.com for more information.
Esta presentación muestra el funcionamiento y configuración de "Redistribución" en protocolos de enrutamiento RIP, EIGRP y OSPF. Como configurar una IPSLA y un PBR.
BlockTrail's CTO Ruben De Vries presentation on HD wallets at Bitcoin Wednesday meetup Amsterdam.
*Disclaimer: This presentation is meant to be a general overview of the cryptography concepts mainly aimed at the non-tech user.
Visit www.blocktrail.com for more information.
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
IGRP and EIGRP.
Comparison between traditional Distance Vector Routing Protocols and Enhanced Distance Vector Routing Protocols.
EIGRP Message Format and Packet Header.
EIGRP Parameters (K1,K2, K3, K4, K5, Reserved, and Hold Time).
Protocol Dependent Modules (PDM).
Reliable Transport Protocol (RTP).
EIGRP Packet Types (Hello Packets, Update packets, Acknowledgment packets, Query and Reply packets).
EIGRP Bounded Updates.
Introduction to DUAL Algorithm.
EIGRP Administrative Distance.
The router eigrp Command, the network command with a Wildcard Mask, Verifying EIGRP and using the Bandwidth command
EIGRP Metric Calculation, EIGRP uses Bandwidth, delay, reliability, and load in its metric.
DUAL Concepts, successor, Feasible distance (FD), Feasible successor (FS), Reported distance (RD)/ AD and Feasibility Condition (FC).
DUAL Finite State Machine, Null0 Summary Route, Disabling Automatic Summarization, Manual Summarization and EIGRP default route
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
This presentation gives a basic idea of routing with Routing Information Protocol (RIP) configurations. Also, walkthrough about static routes and dynamic routes has included.
"El presente documento tiene por objetivo ayudar a entender el calculo de subredes aplicadas a ejercicios practicos. Este documento presenta dos formas de realizar VLSM a partir de requerimientos dados, los cuales nos permiten entender como se realiza el calculo a nivel de bits, para luego entrenarnos para realizarlos de forma mental cada uno de los requerimientos.
En esta presentación se aprederá sobre las direcciones IP privadas, publicas y sus respectivas clases. Esto con el objetivo de conocer que son las subredes, y como se aplica el VLSM. En la presentación se enseñan dos tecnicas para relizar VLSM y se termina con un ejercicio par apracticar. Tambien se explica el mismo proceso para IPv6.
Introducción a BGP orientado a tecnologías routers Cisco. Este material tiene el objetivo de enseñar como funciona BGP, como debería ser implementado y como toma las decisiones de enrutamiento. También se agregan laboratorios de practica con sus respectivas configuraciones. El material esta orientado a la certificación CCNP route 642-902.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
2. EIGRP
Enhanced Interior Gateway Routing es un protocolo de enrutamiento creado
por Cisco. Es llamado Hibrido o Vector distancia avanzado.
Released in 1992 as a Cisco proprietary protocol.
2013 basic functionality of EIGRP released as an open standard.
Advanced Distance Vector routing protocol.
Uses the Diffusing Update Algorithm (DUAL) to calculate paths and back-up paths.
Establishes Neighbor Adjacencies.
Uses the Reliable Transport Protocol to provide delivery of EIGRP packets to neighbors.
Partial and Bounded Updates. Send updates only when there is a change and only to the
routers that need the information.
Supports Equal and Unequal Cost Load Balancing.
4. EIGRP Hello Packets
Used to discover EIGRP neighbors.
Used to form and maintain EIGRP neighbor adjacencies.
Sent as IPv4 or IPv6 multicasts.
IPv4 multicast address 224.0.0.10.
IPv6 multicast address FF02::A.
Sent every 5 seconds (every 60 seconds on low-speed NBMA
networks).
EIGRP uses a default Hold timer of three times the Hello interval
before declaring neighbor unreachable.
5. EIGRP Update & Acknowledgement Packets
Update packets are sent to
propagate routing information,
only when necessary.
Sends Partial updates – only
contains information about route
changes.
Sends Bounded updates-sent
only to routers affected by the
change.
Updates use reliable delivery,
therefore, require an
acknowledgement.
6. EIGRP Query and Reply Packets
Used when searching for networks.
Queries use reliable delivery, which can be multicast or unicast.
Replies use reliable delivery.
7. EIGRP
Tablas de EIGRP
Utiliza Hellos para generar
adyacencia con sus vecinos.
(Neighbor table).
Cuando ya establece adyacencia,
intercambia información de
enrutamiento con sus vecinos
(Topology Table).
El mejor camino es copiado a la
tabla de enrutamiento. (Routing
Table)
11. EIGRP
Topology Table.
Contiene la información de todos los
caminos posibles a través de EIGRP.
Para seleccionar el mejor camino,
Eigrp define los siguientes términos:
Advertised Distance: Distancia
Anunciada por mi vecino hacia el
destino.
Feasible Distance: Distancia total
hasta el destino.
Succesor: Mejor camino hacia el
destino.
Feasible Succesor: Camino Backup.
Regla:
Advertised distance of feasible successor < Feasible distance of successor.
12. EIGRP
Topology Table.
Contiene la información de todos los
caminos posibles a través de EIGRP.
Para seleccionar el mejor camino,
Eigrp define los siguientes términos:
Advertised Distance: Distancia
Anunciada por mi vecino hacia el
destino.
Feasible Distance: Distancia total
hasta el destino.
Succesor: Mejor camino hacia el
destino.
Feasible Succesor: Camino Backup.
Regla:
Advertised distance of feasible successor < Feasible distance of successor.
13. EIGRP
Métricas de Eigrp
Para el calculo de la métrica utiliza los siguientes valores K:
Banwidth
Delay
Load
Reliability
Adyacencia entre vecinos
Para formar adyacencia entre vecinos con EIGRP los siguientes valores deben ser iguales:
El Sistema Autónomo en ambos debe ser el mismo
Interfaces deben estar dentro del mismo segmento de red
Las interfaces no deben estar como pasivas
Los valores K de la métrica deben ser iguales
La Autenticación debe ser aceptada (En caso de exista)
Por defecto se solo vienen habilitados el
Bandwidth y el Delay.
14. Configuración
Comandos:
R1(config)#router eigrp 1 <1-65535> Autonomous system number
R1(config-router)#network 192.168.12.0 0.0.0.255 <Red Wildcard>
R1(config-router)#network 192.168.13.0 0.0.0.255
R1(config-router)#network 192.168.16.0 0.0.0.255
R1(config-router)#passive-interface loopback 0 <Interface>
R1(config-router)#no auto-summary <Deshabilita sumarización auto>
The router eigrp autonomous-system command
enables the EIGRP process.
The autonomous system number is only significant to the EIGRP
routing domain.
The EIGRP autonomous system number is not associated with the
Internet Assigned Numbers Authority (IANA) globally assigned
autonomous system numbers used by external routing protocols
15. Verificación
R1#show ip protocols
Routing Protocol is "eigrp 1 "
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0
EIGRP maximum hopcount 100
EIGRP maximum metric variance 1
Redistributing: eigrp 1
Automatic network summarization is not in effect
Maximum path: 4
Routing for Networks:
192.168.12.0
192.168.13.0
192.168.16.0
Passive Interface(s):
Loopback0
Routing Information Sources:
Gateway Distance Last Update
192.168.13.3 90 169559657
192.168.16.6 90 169618418
192.168.12.2 90 169663419
Distance: internal 90 external 170
16. Verificación
R1#show ip eigrp topology
IP-EIGRP Topology Table for AS 1/ID(10.1.1.1)
Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,
r - Reply status
P 10.2.2.0/24, 1 successors, FD is 2297856
via 192.168.12.2 (2297856/128256), Serial0/0/0
via 192.168.13.3 (2300416/156160), Serial0/0/1
P 10.3.3.0/24, 1 successors, FD is 2297856
via 192.168.13.3 (2297856/128256), Serial0/0/1
via 192.168.12.2 (2300416/156160), Serial0/0/0
P 10.6.6.0/24, 1 successors, FD is 156160
via 192.168.16.6 (156160/128256), FastEthernet0/0
P 192.168.12.0/24, 1 successors, FD is 2169856
via Connected, Serial0/0/0
P 192.168.13.0/24, 1 successors, FD is 2169856
via Connected, Serial0/0/1
P 192.168.16.0/24, 1 successors, FD is 28160
via Connected, FastEthernet0/0
P 192.168.123.0/24, 2 successors, FD is 2172416
via 192.168.13.3 (2172416/28160), Serial0/0/1
via 192.168.12.2 (2172416/28160), Serial0/0/0
17. Verificación
R1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 4 subnets
C 10.1.1.0 is directly connected, Loopback0
D 10.2.2.0 [90/2297856] via 192.168.12.2, 00:09:03, Serial0/0/0
D 10.3.3.0 [90/2297856] via 192.168.13.3, 00:10:19, Serial0/0/1
D 10.6.6.0 [90/156160] via 192.168.16.6, 00:09:29, FastEthernet0/0
C 192.168.12.0/24 is directly connected, Serial0/0/0
C 192.168.13.0/24 is directly connected, Serial0/0/1
C 192.168.16.0/24 is directly connected, FastEthernet0/0
D 192.168.123.0/24 [90/2172416] via 192.168.13.3, 00:10:19, Serial0/0/1
[90/2172416] via 192.168.12.2, 00:08:52, Serial0/0/0
19. LAB1. EIGRP
Instrucciones:
- Abrir archivo LAB1 EIGRP.doc
- Responder las 4 preguntas
asociadas a cada uno de los
archivos PKT que se
encuentran en la guía.