SlideShare a Scribd company logo
SIX WEEKS INDUSTRIAL TRAINING
               REPORT
                                       On
                                    “CCNA”

 In partial fulfillment of the degree of Bachelor of Technology in Electronics and
                             communication Engineering
                                          AT
                     “NETMAX TECHNOLOGIES PATIALA”




                                Submitted to




 Guided by                                               Submitted by
Mr. Barinder Singh


      DEPARTMENT OF ELECTRONICS AND COMMUNICATION
                       ENGINEERING
      RIMT-INSTITUTE OF ENGINEERING AND TECHNOLOGY
                 MANDI GOBINDGARH-147301
                                                                            Page | 1
ACKNOWLEDGEMENT


While presenting this report I would like to express my deep sense of gratitude to entire

NETMAX staff that were indispensable part of my training giving me unending guidance,

inspiration, encouragement and providing me excellent environment throughout my training at

NETMAX TECHNOLOGIES. The training was an extremely productive & enriching

experience, not only technically but also from providing some practical skills.

I am extremely thankful to Mr.Barinder Singh who had devoted a lot of time in guiding and

supervising me during my training.

I must place my gratitude towards Prof. Rajneesh Talwar (H.O.D. of E.C.E. Dept.) for their

valuable advice and guidance in carrying out this enjoyable and productive experience, which

provided me a great opportunity to search new horizons.



                                                                    Ashima Malhotra




                                                                                            Page | 2
PREFACE


Technology has rapidly grown in past two-three decades. An engineer without practical
knowledge and skills cannot survive in this technical era. Theoretical knowledge does matter but
it is the practical knowledge that is the difference between the best and the better. Organizations
also prefer experienced engineers than fresher ones due to practical knowledge and industrial
exposure of the former. The practical training is highly conductive for solid foundation for:-




   1. Knowledge and personality

    2. Exposure to industrial environment.

    3. Confidence building.

     4. Enhancement of creativity.




                                                                                           Page | 3
TABLE OF CONTENTS



Sr. No.                     DESCRIPTION       PAGE NO.

   1.     COMPANY PROFILE                        32


   2.     INTRODUCTION TO CCNA                   35


   3.     BASIC                                  35


   4.     IP ADDRESS V4                          49


   5.     IP ROUTING                             51


   6.     LAN SWITCHING                          63


   7.     ACL                                    68


   8.     NAT                                    72


   9.     PROJECT                                76


  10.     REFERCENCES                            83




                                                  Page | 4
INTRODUCTION

                                         NETMAX TECHNOLOGIES,
                                         SCO 52, 2ND FLOOR LEELA BHAWAN PATIALA .

COMPANY PROFILE

NETMAX TECHNOLOGIES as an organization is established in 2001 in the field of Network
Support, Network training, Software training and Embedded systems.
In Education, we have strategic alliance with Pearson VUE and Prometric. We are authorized
Testing Partner of REDHAT & CISCO. We are also NOVELL EDUCATION PARTNER with
which we provide NOVELL and SUSE LINUX courses. NetMax Technologies also conduct
courses in CADENCE based design tools.

NETMAX TECHNOLOGIES also provide Technical Research & Development support and
consultancy to some electronics companies.
Our clients for R&D support in field of embedded systems:
    Recorders and Medicare Ltd Chandigarh.
    TELEBOX India Ltd.
    Lotus Machines Pvt. Ltd. Chandigarh.
    Impearl Electronics Pvt. Ltd. Chandigarh.
    KANTA Electrical Ltd. Mohali.

The partial list of our client for network field is as below:
    CEDTI, Mohali
    Premier ISP, Chandigarh
    Innovative solutions, Chandigarh
    Emmtel ISP, Chandigarh
    NIPER, Mohali
    Navik Technologies, Chandigarh
    Software Technology Parks India, Mohali
    Glide Internet Services
    Rana Group
    IDS
    HFCL Infotel Ltd.
    Targus Technologies Pvt Ltd
    STPI, Mohali
    BBMB
    The Tribune

                                                                                    Page | 5
 Ind Swift


OUR TEAM

We are a strong technical team of certified professionals for catering to these solutions and have
presence in Chandigarh and Punjab. We have skilled team of engineers who are experienced in
design, programming. We are having more than 15 engineers who are having prestigious
certifications like CCNA, CCNP, CCSP, CCSA, MCSE, RHCE,C++,C,JAVA & PhP, MySql
Programming.

Support Area (network solutions):
    LINUX / UNIX networks
    SUN networks
    CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc)
    Bandwidth Manager software and hardware
    Radio Links
    Security Solutions

 NETMAX TECHNOLOGIES provide the following Courses in IT & Embedded Systems given
below:

Network Training:
    CISCO CCNA, CCNP
    RED HAT LINUX 5
    WINDOWS 2000, 2003 (MCP,MCSA & MCSE)
    MCITP 2008.

Software Training:
    C++
    C
    JAVA ( CORE JAVA & ADVANCE JAVA)
    ASP.NET
    PHP My sql Programming.

           We provide Technical support and consultancy to electronics companies in the field
of Embedded micro controllers like 8 bit and 16 bit family based embedded system design,
analog systems design(including signal conditioning circuits, filter design, etc) ,precision signal
amplifier design for applications like ECG, low power design, precision temperature
measurement etc .Power electronics including dc/dc converters, ac/dc converters,thyristor firing
based circuit, battery charging and monitor circuits etc. Application of Embedded systems and
analog control systems in industrial as well as home automation.
Our core strengths are our commitment, technical expertise and cost effective solutions.
We ensure high service levels and prompt support availability leading to lower downtime.

                                                                                            Page | 6
NETMAX TECHNOLOGIES is a leader in education services and developer of innovative
embedded solutions. To meet the demands of Post PC era, NeTmax provides complete solutions
as well as design-to-order services to satisfy our customers.

NETMAX TECHNOLOGIES:

    BARINDER SINGH, 9914713373
    HARPREET SINGH, 9814900118

HEAD OFFICE:

NETMAX TECHNOLOGIES, SCO 58-59, Sector 34A, Chandigarh.
0172-4644644

Branch Office:

NETMAX TECHNOLOGIES, SCO 52 2ND FLOOR LEELA BHAWAN PATIALA.
0175- 5018351,9914713373, 9814900118.




                                                                                   Page | 7
INTRODUCTION TO CCNA


What is Network?

In one network more than one computer connected with each other through centralized device.
They can share files and resources with each other.
LAN
LAN stands for Local Area Network. The scope of the LAN is within one building, one school
or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each
computer sense the carrier before sending the data over the n/w. if carrier is free then you can
transmit otherwise you have to wait or you have to listen. In multiple access each computer have
right that they can access each other. If two computers sense the carrier on same time then the
collision occur. Each computer, in the network, aware about the collision. Now this stop
transmitting and they will use back off algorithm. In which random number is generated. This
number or algorithm is used by each computer. Who has short number or small number, he has
first priority to transmit the data over the network and other computers will wait for their turn.
WAN
WAN stands for Wide Area Network, in which two local area networks are connected through
public n/w. it may be through telecommunication infrastructure or dedicated lines. For e.g: -
ISDN lines, Leased lines etc.
In which we can use WAN devices and WAN technology. You can also connect with your
remote area through existing Internetwork called Internet.


Devices
Hub
Hub is centralized device, which is used to connect multiple workstations. There are two types of
Hub: -
(i) Active Hub
(ii) Passive Hub

it has no special kind of memory. It simply receives the frame (data) and forwards it to all its
nodes except the receiving node. It always performs broadcasting. In case of hub, there is one
collision domain and one broadcast domain. In case of hub, the media access method is used
CSMA/CD (Carrier Sense Multiple Access/Collision Detection).

(i) Active Hub
    In Active hub, it receives the frame regenerate and then forward to all its nodes.
                                                                                            Page | 8
(ii) Passive Hub
     In Passive hub, it simply receives the frame and forward to all its connected nodes.

You cannot perform LAN segmentation using hub.

Switch
Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has
special kind of memory called mac address/filter/lookup table. Switch reads mac addresses.
Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the
destination mac address and consult with its filter table. If he has entry in its filter table then he
forwards the frame to that particular mac address, if not found then it performs broadcasting to
all its connected nodes.
        Every port has its own buffer memory. A port has two queues one is input queue and
second is output queue. When switch receives the frame, the frame is received in input queue and
forward from output queue. So in case of switch there is no chance or place for collisions. In case
of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision
Avoidance). Switches provide more efficiency, more speed and security.
There are two types of switches: -
(i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.
We can perform LAN segmentation by using switches.
Bridge
Bridge is a hardware device, which is used to provide LAN segmentation means it is used for
break the collision domain. It has same functionality as performed by switch. We can use bridge
between two different topologies. It has fewer ports. Each port has a own buffer memory. It
works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table.
In case of bridge there is one broadcast domain.
Router
Router is hardware device, which is used to communicate two different networks. Router
performs routing and path determination. It does not perform broadcast information. There are
two types of routers: -
(i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and remote access. This feature is
offered by Microsoft. This feature is by default installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient.
But in case of software routers, it has less features, slow performance. They are not very much
efficient.


                                                                                               Page | 9
Lan Card
Lan card is media access device. Lan card provide us connectivity in the network. There is a
RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is
another led which is also called heartbeat of Lan card. When any activity occur it may be
receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan
card.


LAN Topologies


BUS Topology


Cable Type           – Coaxial
Connector Type      – BNC (Bayonet Neill-Concelman), T type, Terminator
Coaxial – Thick        Maximum length – 500 meters
                       N/w devices 100
Coaxial – Thin         Maximum length – 185 meters
                       N/w devices 30




                                                                                             Page | 10
Star Topology
Cable type      - UTP
Connector type - RJ45
Maximum Length – 100 meters (with proper color coding)




UTP (Unshielded Twisted Pair)




STP (Shielded Twisted Pair)




In case of hub media access method will be CSMA/CD.

                                                         Page | 11
Ring Topology
Cable - UTP




There is token ring method used, so there is no collision chance.



Ethernet Family


Speed                  Base band
10                     Base 2                200-meter          Coaxial cable
10                     Base 5                500-meter          Thick Coaxial cable
10                     Base T                100 meter          Twisted Pair (UTP)
10/100(present)        Base TX                100 meter         UTP
100                    Base T4                100 meter         UTP 4 Pairs used
100                    Base FX                 up to 4 kms       Fiber Optic
1000(Server)           Base TX                100 meter         UTP
1000                   Base FX                 up to 10 kms      Fiber Optic
10000                  Base FX                 Fiber Optic

Color
Green – Green white
Orange – Orange white
Blue    – Blue white
Brown – Brown white


Green cable has maximum twists.




                                                                                      Page | 12
Pin Configuration


    Cross                              Straight
1                3                 1              1
2                6                 2              2
3                1                 3              3
6                2                 6              6


Straight Cable
1       Orange white -    Orange white
2       Orange        -   Orange
3       Green white   -   Green white
4       Blue          -   Blue
5       Blue white    -   Blue white
6       Green         -   Green
7       Brown white -     Brown white
8       Brown         -   Brown


        Cross Cable
1       Orange white -    Green white
2       Orange        -   Green
3       Green white   -   Orange white
4       Blue          -   Blue
5       Blue white    -   Blue white
6       Green         -   Orange
7       Brown white -     Brown white
8       Brown         -   Brown




                                                      Page | 13
RJ45 Connector




OSI (Open Systems Interconnection) Model
OSI model is the layer approach to design, develop and implement network. OSI provides
following advantages: -
    (i)    Designing of network will be standard base.
    (ii)   Development of new technology will be faster.
    (iii) Devices from multiple vendors can communicate with each other.
    (iv)   Implementation and troubleshooting of network will be easy.

    (1) Application Layer: -
        Application layer accepts data and forward into the protocol stack. It creates user
       interface between application software and protocol stack.

    (2) Presentation Layer: -
       This layer decides presentation format of the data. It also able to performs other function
       like compression/decompression and encryption/decryption.

    (3) Session Layer: -
       This layer initiate, maintain and terminate sessions between different applications. Due to
       this layer multiple application software can be executed at the same time.

    (4) Transport Layer: -
       Transport layer is responsible for connection oriented and connection less
       communication. Transport layer also performs other functions like
           a. Error checking
           b. Flow Control
                      Buffering
                      Windowing
                      Multiplexing
           c. Sequencing
           d. Positive Acknowledgement
           e. Response


                                                                                          Page | 14
(5) Network Layer

     This layer performs function like logical addressing and path determination. Each
     networking device has a physical address that is MAC address. But logical addressing is
     easier to communicate on large size network.

     Logical addressing defines network address and host address. This type of addressing is
     used to simplify implementation of large network. Some examples of logical addressing
     are: - IP addresses, IPX addresses etc.


   (6) Data Link Layer

     The functions of Data Link layer are divided into two sub layers
         a. Logical Link Control
         b. Media Access Control

         (i)    Logical Link Control defines the encapsulation that will be used by the NIC to
                delivered data to destination. Some examples of Logical Link Control are
                ARPA (Ethernet), 802.11 wi-fi.
         (ii)   Media Access Control defines methods to access the shared media and
                establish the identity with the help of MAC address. Some examples of Media
                Access Control are CSMA/CD, Token Passing.

   (7) Physical Layer

     Physical Layer is responsible to communicate bits over the media this layer deals with the
     standard defined for media and signals. This layer may also perform modulation and
     demodulation as required.




Router Architecture


                                                                                     Page | 15
LAN
              Processor
                                                 I/O
                                                 Controlle            WAN
                                                 r
      Memory
      Controller                 RAM


   BIOS
   ROM                       Flash
                             RAM
 Incomplete                  O/S
 IOS
                               IOS
   NVRAM

Startup Configuration


  Non-Volatile
  RAM




Router Access Modes

When we access router command prompt the router will display different modes. According to
the modes, privileges and rights are assigned to the user.

User mode

                                                                                   Page | 16
In this mode, we can display basic parameter and status of the router we can test connectivity and
perform telnet to other devices. In this mode we are not enable to manage & configure router.

Privileged mode

In this mode, we can display all information, configuration, perform administration task,
debugging, testing and connectivity with other devices. We are not able to perform here
configuration editing of the router.
               The command to enter in this mode is ‘enable’. We have to enter enable password
or enable secret password to enter in this mode. Enable secret has more priority than enable
password. If both passwords are configured then only enable secret will work.


Global configuration

This mode is used for the configuration of global parameters in the router. Global parameters
applied to the entire router.
For e.g: - router hostname or access list of router
The command enter in this mode is ‘configure terminal’.


Line configuration mode

This mode is used to configure lines like console, vty and auxiliary. There are main types of line
that are configured.
(i) Console
   router(config)#line console 0

(ii) Auxiliary
     router(config)#line aux 0

(iii) Telnet or vty
    router(config)#line vty 0 4



Interface configuration mode

This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc.
Router(config)#interface <type> <number>
Router(config)#interface serial 1

Routing configuration mode

This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.


                                                                                         Page | 17
Router(config)#router <protocol> [<option>]
Router(config)#router rip
Router(config)#router eigrp 10

Configuring Password

There are five types of password available in a router

(1) Console Password
    router#configure terminal
    router(config)#line console 0
    router(config-line)#password <word>
    router(config-line)#login
    router(config-line)#exit

to erase password do all steps with no command.

(2) Vty Password
router>enable
router#configure terminal
router(config)#line vty 0 4
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit

(3) Auxiliary Password
router#configure terminal
router(config)#line Aux 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit

(4) Enable Password
router>enable
router#configure terminal
router(config)#enable password <word>
router(config)#exit


(5) Enable Secret Password
Enable Password is the clear text password.

Router>enable
Router#configure terminal
Router(config)#enable secret <word>
Router(config)#exit

                                                         Page | 18
Encryption all passwords

All passwords other than enable secret password are clear text password. We can encrypt all
passwords using level 7 algorithm. The command to encrypt all password are

Router#configure terminal
Router(config)#service password-encryption

Managing Configuration

There are two types of configuration present in a router
(1) Startup Configuration
(2) Running Configuration

(1) Startup configuration is stored in the NVRAM. Startup configuration is used to save settings
in a router. Startup configuration is loaded at the time of booting in to the Primary RAM.

(2) Running Configuration is present in the Primary RAM wherever we run a command for
configuration, this command is written in the running configuration.

To save configuration

Router#copy running-configuration startup-configuration
Or
Router#write

To display running-configuration

Router#show running-configuration

To display startup configuration

Router#show startup-configuration

To erase old configuration

Router#erase startup-configuration
Configuring HostName

Router#configure terminal
Router#hostname <name>
<name>#exit or end or /z

Configuration Interfaces

                                                                                        Page | 19
Interfaces configuration is one of the most important part of the router configuration. By default,
all interfaces of Cisco router are in disabled mode. We have to use different commands as our
requirement to enable and configure the interface.


Configuring IP, Mask and Enabling the Interface

Router#configure terminal
Router(config)#interface <type> <no>
Router(config-if)#ip address <ip> <mask>
Router(config-if)#no shutdown
Router(config-if)#exit

To configure Interface description

Router#configure terminal
Router(config)#interface <type> <no>
Router(config-if)#description <line>

To display interface status

Router#show interfaces (to show all interfaces)
Router#show interface <type> <no>

This command will display following parameters about an interface
   1)     Status
   2)     Mac address
   3)     IP address
   4)     Subnet mask
   5)     Hardware type / manufacturer
   6)     Bandwidth
   7)     Reliability
   8)     Delay
   9)     Load ( Tx load
              Rx load)
   10) Encapsulation
   11) ARP type (if applicable)
   12) Keep alive

Configuring secondary IP

Router#config terminal
Router(config)#interface <type> <no>
Router(config-if)#IP address 192.168.10.5 255.255.255.0
Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary
Router(config-if)#no shutdown (to enable the interface because they always shutdown)

                                                                                          Page | 20
Router(config-if)#exit

Router#show run (to display secondary IP)

To display commands present in history

Router#show history

To display history size

Router#show terminal

Configuring Banners

Banners are just a message that can appear at different prompts according to the type. Different
banners are: -

Message of the day (motd)
This banner appear at every access method




                                 IP Address v4

IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts
one is network address and second is host address. in local area network, we can used private IP
address, which is provided by IANA (Internet Assigning Numbering Authority). IP addresses are
divided into five classes.

                                                                                             Page | 21
Class Range         N/w bits Host bits         Subnet mask           Total IP     Valid IP
A      1 – 126        8           24           255.0.0.0         16777216       16777214
B      128 – 191      16          16           255.255.0.0           65536      65534
C      192 – 223      24          8            255.255.255.0         256        254
D      224 – 239       it is reserved for multicast.
E      240 – 255       it is reserved for research/scientific use.


We can use first three classes. IANA provides private IP addresses from first three classes.


Class Private IP Range
A      10.0.0.0 – 10.255.255.255
B      172.16.0.0 – 172.31.255.255
C      192.168.0.0 – 192.168.255.255


Subnet Mask
Subnet mask is also 32-bit address, which tell us how many bits are used for network and how
many bits are used for host address.
In Subnet mask Network bits are always 1 and Host bits are always 0.


IP Addresses invalid or reserve IP Addresses
When we are going to assign IP addresses to our computers then we have to follow some rules.
Rules: -
(1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network
(10th network).
(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default
routing is used in case of Stub n/w (means our network has one exit point).
(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
C:>ipconfig
C:>ipconfig/all

                                                                                             Page | 22
It shows all detail.




                                    IP Routing
When we want to connect two or more networks using different n/w addresses then we have to
use IP Routing technique. The router will be used to perform routing between the networks. A
router will perform following functions for routing.
    (1) Path determination
    (2) Packet forwarding


                                                                                     Page | 23
(1) Path determination
     The process of obtaining path in routing table is called path determination. There are three
different methods to which router can learn path.
i) Automatic detection of directly connected n/w.
ii) Static & Default routing
iii) Dynamic routing

(2) Packet forwarding
    It is a process that is by default enable in router. The router will perform packet forwarding
only if route is available in the routing table.


                              Static Routing

In this routing, we have to use IP route commands through which we can specify routes for
different networks. The administrator will analyze whole internetwork topology and then specify
the route for each n/w that is not directly connected to the router.

Steps to perform static routing

(1) Create a list of all n/w present in internetwork.
(2) Remove the n/w address from list, which is directly connected to n/w.
(3) Specify each route for each routing n/w by using IP route command.

Router(config)#ip route <destination n/w> <mask> <next hop ip>

Next hop IP it is the IP address of neighbor router that is directly connected our router.

Static Routing Example: -

Router#conf ter
Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2

Advantages of static routing

(1) Fast and efficient.
(2) More control over selected path.
(3) Less overhead for router.

Disadvantages of static routing

(1) More overheads on administrator.
(2) Load balancing is not easily possible.
(3) In case of topology change routing table has to be change manually.



                                                                                             Page | 24
Alternate command to specify static route

Static route can also specify in following syntax: -
Old
Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2
Or
Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0


Default Routing
Default routing means a route for any n/w. these routes are specify with the help of following
syntax: -
Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>
                                              Or
                                      <exit interface>

To display routing table

Router#sh ip route

To check all the interface of a router

Router#sh interface brief


                            Dynamic Routing
In dynamic routing, we will enable a routing protocol on router. This protocol will send its
routing information to the neighbor router. The neighbors will analyze the information and write
new routes to the routing table.
        The routers will pass routing information receive from one router to other router also. If
there are more than one path available then routes are compared and best path is selected. Some
examples of dynamic protocol are: -
RIP, IGRP, EIGRP, OSPF




Types of Dynamic Routing Protocols

According to the working there are two types of Dynamic Routing Protocols.
(1) Distance Vector
(2) Link State

According to the type of area in which protocol is used there are again two types of protocol: -

                                                                                         Page | 25
(1) Interior Routing Protocol
(2) Exterior Routing Protocol


                                Autonomous system

Autonomous system is the group of contiguous routers and n/w, which will share their routing
information directly with each other. If all routers are in single domain and they share their
information directly with each other then the size of routing updates will depend on the no. of
n/w present in the Internetwork. Update for each n/w may take 150 – 200 bytes information.
For example: - if there are 1000 n/ws then size of update will be
               200*1000 = 200000 bytes
The routing information is send periodically so it may consume a large amount of bandwidth in
our n/w.
                                                                       Border
                  Exterior Routing                                     Routing




     Interior Routing
                                         AS
         AS 200                                                      AS
Domain
                                         400
                                                                     500
Protocols




Distance Vector Routing

The Routing, which is based on two parameters, that is distance and direction is called Distance
Vector Routing. The example of Distance Vector Routing is RIP & IGRP.

Operation: -


                                                                                        Page | 26
(1) Each Router will send its directly connected information to the neighbor router. This
information is send periodically to the neighbors.

(2) The neighbor will receive routing updates and process the route according to following
conditions: -
    (i) If update of a new n/w is received then this information is stored in routing table.
   (ii) If update of a route is received which is already present in routing table then route will
be refresh that is route times is reset to zero.
  (iii) If update is received for a route with lower metric then the route, which is already present
in our routing table. The router will discard old route and write the new route in the routing table.
  (iv) If update is received with higher metric then the route that is already present in routing
table, in this case the new update will be discard.

(3) A timer is associated with each route. The router will forward routing information on all
interfaces and entire routing table is send to the neighbor. There are three types of timers
associated with a route.




Configuring RIP
Router#conf ter
Router(config)#router rip
Router(config-router)#network <own net address>
Router(config-router)#network <own net address>
--------------
--------------

                                                                                            Page | 27
Router(config-router)#exit


                                                   172.16.0.6


                     10.0.0.1       172.16.0.5                  175.2.1.1
                                R
                                1 200.100.100.12




Router(config-router)#network 10.0.0.0
Router(config-router)#network 172.16.0.0
Router(config-router)#network 200.100.100.0

175.2.0.0 via 172.16.0.6


                                Configuring IGRP

Router(config)#router igrp <as no>(1 – 65535)
Router(config-router)#network <net address>
Router(config-router)#network <net address>
Router(config-router)#exit




              Serial E1         modem                           Serial E1



         2048 k                                                 2048 k
                                      256 k

                                                                            Page | 28
sync



Configuring following options in IGRP as same as in case of RIP: -

(1) Neighbor
(2) Passive interface
(3) Timer
(4) Distance (AD)
(5) Maximum path




                              Link State Routing

This type of routing is based on link state. Its working is explain as under

(1) Each router will send Hello packets to all neighbors using all interfaces.
(2) The router from which Hello reply receive are stored in the neighborship table. Hello packets
are send periodically to maintain the neighbor table.

                                                                                        Page | 29
(3) The router will send link state information to the all neighbors. Link state information from
one neighbor is also forwarded to other neighbor.
(4) Each router will maintain its link state database created from link state advertisement
received from different routers.
(5) The router will use best path algorithm to store the path in routing table.

Problems of Link State Routing

The main problems of link state routing are: -
(1) High bandwidth consumption.
(2) More hardware resources required that is processor and memory (RAM)

The routing protocols, which use link state routing are: -
(1) OSPF
(2) EIGRP

Enhanced Interior Gateway Routing Protocol

Features: -
* Cisco proprietary
* Hybrid protocol
        Link State
        Distance Vector
* Multicast Updates using
        Address 224.0.0.10
* Support AS
* Support VLSM
* Automatic Route Summarization
* Unequal path cost load balancing
* Metric (32 bit composite)
        Bandwidth
        Delay
        Load
        Reliability
        MTU
* Neighbor Recovery
* Partial updates
* Triggered updates
* Backup Route

Configuring EIGRP

Router(config)#router eigrp <as no>
Router(config-router)#network <net addr.>
Router(config-router)#network <net addr.>
Router(config-router)#exit

                                                                                          Page | 30
OSPF Terminology
Already known topics in this: -
(1) Hello packets
(2) LSA (Link State Advertisement)
(3) Neighbor
(4) Neighbor table
(5) Topology table (LSA database)


Router ID

Router ID is the highest IP address of router interfaces. This id is used as the identity of the
router. It maintaining link state databases. The first preference for selecting router ID is given to
the Logical interfaces. If logical interface is not present then highest IP of physical interface is
selected as router id.




                                                       Highest ip is router id of a router

                                  50.0.0.6


11.0.0.2               13.0.0.1



Area

Area is the group of routers & n/ws, which can share their routing information directly with each
other.

Adjacency

A router is called adjacency when neighbor relationship is established. We can also say
adjacency relationship is formed between the routers.



OSPF Hierarchical Model                                        Area 0



                                                                                             Page | 31
br                            br                               br




              abr                          abr                              abr




   asb        ar        ar                    ar
   r



         ar        ar    ar




Area 20                         Area 70                              Area 90

Area Router (Autonomous System Border Router – ASBR)

A router, which has all interfaces member of single area, is called area router.

Backbone Area


                                                                                   Page | 32
Area 0 is called backbone area. All other areas must connect to the backbone area for
communication.

Backbone Router

A router, which has all interfaces members of area 0, is called backbone router.

Area Border Router

A router, which connects an area with area 0, is called area border router.

LSA Flooding in OSPF

If there are multiple OSPF routers on multi access n/w then there will be excessive no. of LSA
generated by the router and they can choke bandwidth of the network.


                L            K            M             N




               A             B            C             D




A              B              C               D

B              A              A               A              Neighbor
C              C              B               B
D              D              D               C
L              K              M               N

This problem is solved with the help of electing a router as designated router and backup
designated router.

Designated Router




                                                                                        Page | 33
A router with highest RID (router id) will be designated router for a particular interface. This
router is responsible for receiving LSA from non-DR router and forward LSA to the all DR
router.

Backup Designated Router

This router will work as backup for the designated router. In BDR mode, it will receive all
information but do not forward this information to other non-DR router.

Commands to configure OSPF

Router#conf ter
Router(config)#router ospf <process no>
Router(config-router)#network <net address> <wild mask> area <area id>
Router(config-router)#network <net address> <wild mask> area <area id>
Router(config-router)#exit


Wild Mask – Complement of subnet mask

Example 255.255.0.0
         0.0.255.255

       255.255.255.255
     - Subnet mask

       Wild mask


       255.255.255.255
     - 255.255.192.0   subnet mask

       0.0.63.255         wild mask




                                                                                           Page | 34
Area 0


                 R    200.100.100.33/30             200.100.100.34/30
                                                                    R
                 1                                                  2



                     200.100.100.66/27               200.100.100.160/26




R1
Router(config)#router ospf 33
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.64 0.0.0.31 area 0
Router(config-router)#exit

R2
Router(config)#router ospf 2
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.128 0.0.0.63 area 0
Router(config-router)#exit




                                  Access Control List
ACL are the basic security feature that is required in any network to control the flow of traffic.
Most of time our network may have servers and clients for which traffic control is required.
       We can also use ACL to classify the traffic. ACLs are used in features like QOS (Quality
of Service), Prioritize traffic and interesting traffic for ISDN.


Classification Access Control List: -

Types of ACL based on Protocol: -
(1) IP Access Control List
(2) IPX Access Control List

                                                                                         Page | 35
(3) Appletalk Access Control List

Types of ACL based on Feature: -
(1) Standard ACL
(2) Extended ACL

Types of ACL based on Access mode: -
(1) Numbered ACL
(2) Named ACL

Types of ACL based on Order of rules: -
(1) Deny, permit
(2) Permit, deny


IP Standard ACL (Numbered)
In Standard ACL, we are only able to specify source address for the filtering of packets. The
syntax to create IP standard ACL are: -

Router#conf ter
Router(config)#access-list <no> <permit|deny> <source>
Router(config)#exit

<source>       Single pc      host 192.168.10.5
                              192.168.10.5
                              192.168.10.5 0.0.0.0

               N/w            200.100.100.0 0.0.0.255

               Subnet         200.100.100.32 0.0.0.15


Applying ACL on interface

Router#conf ter
Router(config)#interface <type> <no>
Router(config-if)#ip access-group <ACL no.> <in|out>
Router(config-if)#exit




                                     Internet



           Router
                                                                                        Page | 36
Router(config)#access-list 25 permit 192.168.10.32 0.0.0.31
Router(config)#access-list 25 permit 192.168.10.64 0.0.0.3
Router(config)#access-list 25 permit 192.168.10.68
Router(config)#access-list 25 permit 192.168.10.69
Router(config)#access-list 25 permit 192.168.10.70

Router(config)#interface serial 0
Router(config-if)#ip access-group 25 out

IP Standard ACL (Named)
In Numbered ACL editing feature is not available that is we are not able to delete single rule
from the ACL. In Named ACL editing feature is available.

Router#config ter
Router(config)#ip access-list standard <name>
Router(config-std-nacl)#<deny|permit> <source>
Router(config-std-nacl)#exit




Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#deny 172.16.0.16
Router(config-std-nacl)#deny 172.16.0.17
Router(config-std-nacl)#deny 172.16.0.18
Router(config-std-nacl)#permit any
Router(config-std-nacl)#exit

To modify the ACL

Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#no deny 172.16.0.17
Router(config-std-nacl)#exit


                                                                                         Page | 37
IP Extended ACL (Numbered)
Extended ACL are advanced ACL. ACL, which can control traffic flow on the basis of five
different parameters that are: -
(i) Source address
(ii) Destination address
(iii) Source port
(iv) Destination port
(v) Protocol (layer 3/layer 4)


The syntax to create Extended ACL

Router#conf ter
Router(config)#access-list <no> <deny|permit> <protocol> <source> [<s.port>]
               <destination> [<d.port>]
router(config)#exit


To display ACL

Router#show access-lists or
Router#show access-list <no>


To display ACL applied on interface

Router#show ip interface

Router#show ip interface <type> <no>
Router#show ip interface Ethernet 0
Time-Based ACLs
In this you can specify a certain time of day and week and then identity that particular period by
giving it a name referenced by a task. The reference function will fall under whatever time
constraints you have dictated. The time period is based upon the router’s clock, but it is highly
recommended that using it in conjunction with Network Time Protocol (NTP) synchronization.

Router#conf ter
Router(config)#time-range no-http
Router(config-time-range)#periodic <Wednesday|weekdays|weekend> 06:00 to 12:00
Router(config-time-range)#exit



Router(config)#time-range tcp-yes
Router(config-time-range)#periodic weekend 06:00 to 12:00

                                                                                          Page | 38
Router(config-time-range)#exit

Router(config)ip access-list extended time
Router(config-ext-nacl)#deny tcp any any eq www time-range no-http
Router(config-ext-nacl)#permit tcp any any time-range tcp-yes

Router(config-ext-nacl)#interface f0/0
Router(config-if)#ip access-group time in
Router(config-if)#do show time-range




                             Network Address Translation

NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we are
able to translate network layer addresses that are IP addresses of packets. With the help of Port
Address Translation, we are also able to translate port no.s present in transport layer header.

There are two reasons due to which we use NAT: -

(1) Conserve Live IP address
    On Internet, there are limited no of IP addresses. If our Pc wants to communicate on Internet
then it should have a Live IP address assigned by our ISP. So that IP address request will depend
on no. of PCs that we want to connect on Internet. Due to this, there will be a lot of wastage in IP

                                                                                          Page | 39
addresses. To reduce wastage, we can share live IP addresses between multiple PCs with the help
of NAT.

(2) NAT enhances the network security by hiding PC & devices behind NAT.

Working of NAT & PAT




10.0.0.5


                                                                    Internet
10.0.0.6               10.0.0.1          200.100.100.12
            Switc              NAT
            h

10.0.0.7



10.0.0.8


 10.0.0.5
 200.100.100.1
 2
          1080

 10.0.0.6
 200.100.100.1
 2
          1085
 10.0.0.7
 200.100.100.1                      Port Translation
 2                   1100
          1024

 10.0.0.8
 200.100.100.1
 2
          1024                                                                        Page | 40
Types of NAT

Static NAT

This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT
will forward on the traffic for the Live IP to the Local PC in the n/w.


     Static NAT
200.1.1.5 = 192.168.10.6
                                                Interne
                    Route                       t
                    r
                              Live 200.1.1.5




         Local 192.168.10.6


Dynamic NAT

Dynamic NAT is used for clients, which want to access Internet. The request from multiple
client IPs are translated with the Live IP obtained from the Pool. It is also called Pool Based
Dynamic NAT.


        Pool => 200.1.1.8 – 200.1.1.12/28
Local address => 172.16.X.X
Except => 172.16.0.5                                   Interne
          172.16.0.6                                   ttt
          172.16.0.7

                      Route                                                                Page | 41
                      r
Web Server   DNS Full access                  172.16.X.X
          172.16.0.5 172.16.0.6 172.16.0.7

Configuring NAT

Router#conf ter
Router(config)#int serial 0
Router(config-if)#ip nat outside
Router(config-if)#int eth 0
Router(config-if)#ip nat inside
Router(config-if)#exit

Router(config)#ip nat inside source static 172.16.0.7 200.1.1.3
Router(config)#ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80
Router(config)#ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53

Router(config)#access-list 30 deny 172.16.0.5
Router(config)#access-list 30 deny 172.16.0.6
Router(config)#access-list 30 deny 172.16.0.7
Router(config)#access-list 30 permit any
Router(config)#ip nat pool abc 200.1.1.8 200.1.1.12 netmask 255.255.255.240
Router(config)#ip nat inside source list 30 pool abc overload


                                                    NAT + PAT

Command for Basic NAT

Router(config)#ip nat inside source list 30 interface serial 0
                                                     <exiting interface name>

To display NAT translation


                                                                                Page | 42
Router#sh ip nat translations
(after ping any address, it shows ping details)


To clear IP NAT Translation

Router#clear ip nat Translation *



SECURING PRIVATE ENVIORNMENT
           BY USING NAT

                                PROJECT REPORT




                                                  Page | 43
The project is based on network addressing translation(nat).
The beauty of configuring nat on routers is that it can help
users access internet on private ip address which are
otherwise excluded by internet service provider(isp).
We have used inter VLAN technology to make work efficient
between 3 different and independent organisations. The
vlans have been divided into web servers and internet
clients.

DESCRIPTION
We have three organisations. Org1, org2 and org3.
Each organisation comprises a router, to route the data from
and to isp. There are manageable switches in each
organisation and we have created separate vlans for servers
and internet clients.
If we want the communication between the internet clients
and servers then we configure inter vlan concept on the
router. And if we want to block some internet clients cannot
access our servers then we create acl for that particular user.
These organisations are linked externally to an isp which
provides live(public) ip addresses to each organisation, and
isp also provides the internet connections to others.




                                                         Page | 44
CONFIGURATION
FOR ORG1




%SYS-5-CONFIG_I: Configured frROUTER ORG1
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname ORG1
ORG1(config)#line console 0
ORG1(config-line)#password net
ORG1(config-line)#login
ORG1(config-line)#exit
ORG1(config)#line vty 0 4

                                                               Page | 45
ORG1(config-line)#password net
ORG1(config-line)#login
ORG1(config-line)#exit
ORG1(config)#enable password net
ORG1(config)#enable secret net1
ORG1(config)#int f0/0
ORG1(config-if)#no sh

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
ORG1(config-if)#exit
ORG1(config)#int f0/0.1

%LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to
upRouter(config-subif)#encapsulation dot1q 2
ORG1(config-subif)#ip nat inside
ORG1(config-subif)#ip address 10.0.0.1 255.0.0.0
ORG1(config-subif)#no sh
ORG1(config-subif)#exit
ORG1(config)#int f0/0.2

ORG1(config-subif)#encapsulation dot1q 3
ORG1(config-subif)#ip nat inside
ORG1(config-subif)#ip address 192.168.10.1 255.255.255.240
ORG1(config-subif)#no sh
ORG1(config-subif)#exit
ORG1(config)#int s0/0/0
ORG1(config-if)#ip nat outside
ORG1(config-if)#clock rate 64000
ORG1(config-if)#ip address 200.10.10.5 255.255.255.252
ORG1(config-if)#no sh

%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
ORG1(config-if)#exit
ORG1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0



We have place our web server in the private area so that the internet client cannot
directly access it. So, we have configured static nat and open port number 80(http)
only.
                                                                            Page | 46
ORG1(config)#ip nat inside source static tcp 10.0.0.2 80 200.10.10.17 80



In our organisation our clients want to access internet so we will configure
dynamic nat with overload for clients.



ORG1(config)#access-list 20 permit any
ORG1(config)#ip nat pool netmax 200.10.10.18 200.10.10.18 netmask
255.255.255.240
ORG1(config)#ip nat inside source list 20 pool netmax overload
ORG1(config)#exit

ORG1#wr
Building configuration...
[OK]
ORG1#



SWITCH




                                                                               Page | 47
Switch>en
Switch#vlan database
% Warning: It is recommended to configure VLAN from config mode,
 as VLAN database mode is being deprecated. Please consult user
 documentation for configuring VTP/VLAN in config mode.
Switch(vlan)#vlan 2 name server
VLAN 2 added:
  Name: server
Switch(vlan)#vlan 3 name clients
VLAN 3 added:
  Name: clients
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr



FOR ORG2
ROUTER
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname ORG2
ORG2(config)#line console 0
ORG2(config-line)#password net
ORG2(config-line)#login
ORG2(config-line)#exit
                                                                   Page | 48
ORG2(config)#line vty 0 4
ORG2(config-line)#password net
ORG2(config-line)#login
ORG2(config-line)#exit
ORG2(config)#enable password net
ORG2(config)#enable secret net1
ORG2(config)#int f0/0
ORG2(config-if)#no sh
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
ORG2(config-if)#exit
ORG2(config)#int f0/0.1

%LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to
upRouter(config-subif)#encapsulation dot1q 2
ORG2(config-subif)#ip nat inside
ORG2(config-subif)#ip address 10.0.0.1 255.0.0.0
ORG2(config-subif)#no sh
ORG2(config-subif)#exit
ORG2(config)#int f0/0.2

ORG2(config-subif)#encapsulation dot1q 3
ORG2(config-subif)#ip nat inside
ORG2(config-subif)#ip address 192.168.10.1 255.255.255.240
ORG2(config-subif)#no sh
ORG2(config-subif)#exit
ORG2(config)#int s0/0/0
ORG2(config-if)#ip nat outside
ORG2(config-if)#clock rate 64000
ORG2(config-if)#ip address 200.10.10.9 255.255.255.252
ORG2(config-if)#no sh
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
ORG2(config-if)#exit
ORG2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0
ORG2(config)#ip nat inside source static 10.0.0.2 200.10.10.33
ORG2(config)#access-list 20 permit any
ORG2(config)#ip nat pool netmax 200.10.10.34 200.10.10.36 netmask
255.255.255.240
ORG2(config)#ip nat inside source list 20 pool netmax
ORG2(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
                                                                    Page | 49
ORG2#wr
Building configuration...
[OK]
ORG2#




SWITCH
Switch>en
Switch#vlan database
% Warning: It is recommended to configure VLAN from config mode,
 as VLAN database mode is being deprecated. Please consult user
 documentation for configuring VTP/VLAN in config mode.
Switch(vlan)#vlan 2 name server
VLAN 2 added:
  Name: server
Switch(vlan)#vlan 3 name clients
VLAN 3 added:
  Name: clients
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr


                                                                   Page | 50
FOR ORG3
ROUTER
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname ORG3
ORG3(config)#line console 0
ORG3(config-line)#password net
ORG3(config-line)#login
ORG3(config-line)#exit
ORG3(config)#line vty 0 4
ORG3(config-line)#password net
ORG3(config-line)#login
ORG3(config-line)#exit
ORG3(config)#enable password net
ORG3(config)#enable secret net1
ORG3(config)#int f0/0
ORG3(config-if)#no sh
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
ORG3(config-if)#exit
ORG3(config)#int f0/0.1

%LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to
upRouter(config-subif)#encapsulation dot1q 2
ORG3(config-subif)#ip nat inside
ORG3(config-subif)#ip address 10.0.0.1 255.0.0.0
ORG3(config-subif)#no sh
ORG3(config-subif)#exit
ORG3(config)#int f0/0.2
ORG3(config-subif)#encapsulation dot1q 3
ORG3(config-subif)#ip nat inside
ORG3(config-subif)#ip address 192.168.10.1 255.255.255.240
ORG3(config-subif)#no sh
ORG3(config-subif)#exit
ORG3(config)#int s0/0/0

                                                                  Page | 51
ORG3(config-if)#ip nat outside
ORG3(config-if)#clock rate 64000
ORG3(config-if)#ip address 200.10.10.13 255.255.255.252
ORG3(config-if)#no sh

%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
ORG3(config-if)#exit
ORG3(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0
ORG3(config)#ip nat inside source static 10.0.0.2 200.10.10.50
ORG3(config)#access-list 20 permit any
ORG3(config)#ip nat pool netmax 200.10.10.51 200.10.10.51 netmask
255.255.255.240
ORG3(config)#ip nat inside source list 20 pool netmax overload
ORG3(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
ORG3#wr
Building configuration...
[OK]
ORG3#




SWITCH

Switch>en
Switch#vlan database
% Warning: It is recommended to configure VLAN from config mode,
 as VLAN database mode is being deprecated. Please consult user
 documentation for configuring VTP/VLAN in config mode.
Switch(vlan)#vlan 2 name server
VLAN 2 added:

                                                                    Page | 52
Name: server
Switch(vlan)#vlan 3 name clients
VLAN 3 added:
  Name: clients
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr




REFERENCES


     Wikipedia
     Google
     www.edu.ac.in
     NETMAX TECHNOLOGIES
     CISCO




                                                               Page | 53

More Related Content

What's hot

Carlos Morales 2016v3_sinRef
Carlos Morales  2016v3_sinRefCarlos Morales  2016v3_sinRef
Carlos Morales 2016v3_sinRefcarlos morales
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...
Chowdhury Mohammad Masum Refat
 
Microlink Profile Credentials
Microlink Profile  CredentialsMicrolink Profile  Credentials
Microlink Profile Credentials
gajananp2008
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN JOY
 
Jahir cv
Jahir cvJahir cv
Jahir cv
Jahir hussian
 
Network data
Network dataNetwork data
Network data
networkdata2018
 
telecom engineer cv-1
telecom engineer cv-1telecom engineer cv-1
telecom engineer cv-1mohamed ccf
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
dkaya
 
Tufail javed -cv
Tufail javed -cvTufail javed -cv
Tufail javed -cv
TUFAIL JAVED
 
Salman Mahmood Resume
Salman Mahmood ResumeSalman Mahmood Resume
Salman Mahmood Resumesalman321
 
Basic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling SystemBasic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling System
Md. Abdul Awal
 
Ccda desgn v2.0 sg ppt to pdf
Ccda desgn v2.0 sg ppt to pdfCcda desgn v2.0 sg ppt to pdf
Ccda desgn v2.0 sg ppt to pdfLuzMarina116
 
Muhammad khalid cv
Muhammad khalid cvMuhammad khalid cv
Muhammad khalid cv
Tanveer Akram
 

What's hot (20)

Sunil Resume
Sunil ResumeSunil Resume
Sunil Resume
 
Carlos Morales 2016v3_sinRef
Carlos Morales  2016v3_sinRefCarlos Morales  2016v3_sinRef
Carlos Morales 2016v3_sinRef
 
Resume_Mayalagu updated
Resume_Mayalagu updatedResume_Mayalagu updated
Resume_Mayalagu updated
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...
 
Microlink Profile Credentials
Microlink Profile  CredentialsMicrolink Profile  Credentials
Microlink Profile Credentials
 
Giri - Resume 6+exp
Giri - Resume 6+expGiri - Resume 6+exp
Giri - Resume 6+exp
 
KRISHNAMOORTHI_NW
KRISHNAMOORTHI_NW KRISHNAMOORTHI_NW
KRISHNAMOORTHI_NW
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTAC
 
Jahir cv
Jahir cvJahir cv
Jahir cv
 
Network data
Network dataNetwork data
Network data
 
telecom engineer cv-1
telecom engineer cv-1telecom engineer cv-1
telecom engineer cv-1
 
Rehan Rauf CV
Rehan Rauf CVRehan Rauf CV
Rehan Rauf CV
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
finalwithrec4
finalwithrec4finalwithrec4
finalwithrec4
 
Resume - 2016
Resume - 2016Resume - 2016
Resume - 2016
 
Tufail javed -cv
Tufail javed -cvTufail javed -cv
Tufail javed -cv
 
Salman Mahmood Resume
Salman Mahmood ResumeSalman Mahmood Resume
Salman Mahmood Resume
 
Basic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling SystemBasic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling System
 
Ccda desgn v2.0 sg ppt to pdf
Ccda desgn v2.0 sg ppt to pdfCcda desgn v2.0 sg ppt to pdf
Ccda desgn v2.0 sg ppt to pdf
 
Muhammad khalid cv
Muhammad khalid cvMuhammad khalid cv
Muhammad khalid cv
 

Viewers also liked

Moving Pictures Presentation
Moving Pictures PresentationMoving Pictures Presentation
Moving Pictures Presentation
yogscast1511
 
TSI Recent Workshops Oct. 2013
TSI   Recent Workshops Oct. 2013TSI   Recent Workshops Oct. 2013
TSI Recent Workshops Oct. 2013
Lisa MacLeod
 
Résultats Coupe Lesdiguieres
Résultats Coupe Lesdiguieres Résultats Coupe Lesdiguieres
Résultats Coupe Lesdiguieres Entre Nous
 
Diary Bahasa Jerman
Diary Bahasa JermanDiary Bahasa Jerman
Diary Bahasa Jerman
radiprawira
 
Stowarzyszenie lokalne salezjańskiej organizacji sportowej rzeczpospolitej ...
Stowarzyszenie lokalne  salezjańskiej organizacji sportowej  rzeczpospolitej ...Stowarzyszenie lokalne  salezjańskiej organizacji sportowej  rzeczpospolitej ...
Stowarzyszenie lokalne salezjańskiej organizacji sportowej rzeczpospolitej ...Jacek Bielski
 
Ramesh Babu.N.S.
Ramesh Babu.N.S.Ramesh Babu.N.S.
Ramesh Babu.N.S.mogokalana
 
Wireless Wednesdays: Part 1
Wireless Wednesdays: Part 1Wireless Wednesdays: Part 1
Wireless Wednesdays: Part 1
Teamstudio
 
BIOGRAFIA (Tatiana Padilla)
BIOGRAFIA (Tatiana Padilla)BIOGRAFIA (Tatiana Padilla)
BIOGRAFIA (Tatiana Padilla)tatiana1404
 
Making the Controllers Job Easier
Making the Controllers Job EasierMaking the Controllers Job Easier
Making the Controllers Job Easier
Christopher S. Kelley
 
1000n policeheart 1091 - women helpline for emergency rescue
1000n policeheart 1091 - women helpline for emergency rescue1000n policeheart 1091 - women helpline for emergency rescue
1000n policeheart 1091 - women helpline for emergency rescue
Shakun Chauhan
 
How to get started with facebook ads
How to get started with facebook adsHow to get started with facebook ads
How to get started with facebook ads
MooMu Media
 
Cortextual Presentation
Cortextual PresentationCortextual Presentation
Cortextual Presentation
Cortextual
 
Chemistry hl human biochemistry option self study guide
Chemistry hl human biochemistry option self study guideChemistry hl human biochemistry option self study guide
Chemistry hl human biochemistry option self study guidetwhite25
 

Viewers also liked (20)

Moving Pictures Presentation
Moving Pictures PresentationMoving Pictures Presentation
Moving Pictures Presentation
 
Kx tg2361
Kx tg2361Kx tg2361
Kx tg2361
 
Power point
Power pointPower point
Power point
 
Advanced
AdvancedAdvanced
Advanced
 
Advanced
AdvancedAdvanced
Advanced
 
TSI Recent Workshops Oct. 2013
TSI   Recent Workshops Oct. 2013TSI   Recent Workshops Oct. 2013
TSI Recent Workshops Oct. 2013
 
Résultats Coupe Lesdiguieres
Résultats Coupe Lesdiguieres Résultats Coupe Lesdiguieres
Résultats Coupe Lesdiguieres
 
Diary Bahasa Jerman
Diary Bahasa JermanDiary Bahasa Jerman
Diary Bahasa Jerman
 
Stowarzyszenie lokalne salezjańskiej organizacji sportowej rzeczpospolitej ...
Stowarzyszenie lokalne  salezjańskiej organizacji sportowej  rzeczpospolitej ...Stowarzyszenie lokalne  salezjańskiej organizacji sportowej  rzeczpospolitej ...
Stowarzyszenie lokalne salezjańskiej organizacji sportowej rzeczpospolitej ...
 
Ramesh Babu.N.S.
Ramesh Babu.N.S.Ramesh Babu.N.S.
Ramesh Babu.N.S.
 
Wireless Wednesdays: Part 1
Wireless Wednesdays: Part 1Wireless Wednesdays: Part 1
Wireless Wednesdays: Part 1
 
BIOGRAFIA (Tatiana Padilla)
BIOGRAFIA (Tatiana Padilla)BIOGRAFIA (Tatiana Padilla)
BIOGRAFIA (Tatiana Padilla)
 
Making the Controllers Job Easier
Making the Controllers Job EasierMaking the Controllers Job Easier
Making the Controllers Job Easier
 
Bangs msc103
Bangs msc103Bangs msc103
Bangs msc103
 
1000n policeheart 1091 - women helpline for emergency rescue
1000n policeheart 1091 - women helpline for emergency rescue1000n policeheart 1091 - women helpline for emergency rescue
1000n policeheart 1091 - women helpline for emergency rescue
 
How to get started with facebook ads
How to get started with facebook adsHow to get started with facebook ads
How to get started with facebook ads
 
Cortextual Presentation
Cortextual PresentationCortextual Presentation
Cortextual Presentation
 
Chemistry hl human biochemistry option self study guide
Chemistry hl human biochemistry option self study guideChemistry hl human biochemistry option self study guide
Chemistry hl human biochemistry option self study guide
 
Seizoen 2013
Seizoen 2013Seizoen 2013
Seizoen 2013
 
Idea Generation
Idea GenerationIdea Generation
Idea Generation
 

Similar to Nat report 1

CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
Infosec
 
Best CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptxBest CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptx
APTRON Solutions Noida
 
Vikram_Sharma_M_Resume
Vikram_Sharma_M_ResumeVikram_Sharma_M_Resume
Vikram_Sharma_M_ResumeVikram Sharma
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
Santanu Mukhopadhyay
 
245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan
AshnaWaseem1
 
Ace Technologies Presentation
Ace Technologies PresentationAce Technologies Presentation
Ace Technologies Presentation
AceTechnologies
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
Pulkit Singhal
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
Networking Training
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab khan
 
Sujayan-Resume
Sujayan-ResumeSujayan-Resume
Sujayan-ResumeSujayan Pn
 
Sanjay Patidar CV RJIL
Sanjay Patidar CV RJILSanjay Patidar CV RJIL
Sanjay Patidar CV RJILSanjay Patidar
 
CCNP Training in Delhi
CCNP Training in DelhiCCNP Training in Delhi
CCNP Training in Delhi
digital anil
 
Hardware Technology Group
Hardware Technology GroupHardware Technology Group
Hardware Technology Group
Hardware Technology Group
 
Akash rajguru project report sem VI
Akash rajguru project report sem VIAkash rajguru project report sem VI
Akash rajguru project report sem VI
Akash Rajguru
 
Cognitel corporate profile may 2014
Cognitel corporate profile may 2014Cognitel corporate profile may 2014
Cognitel corporate profile may 2014
Practilearn
 

Similar to Nat report 1 (20)

CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Best CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptxBest CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptx
 
Vikram_Sharma_M_Resume
Vikram_Sharma_M_ResumeVikram_Sharma_M_Resume
Vikram_Sharma_M_Resume
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
EHSAN-TELECOM-NETWORK-latest
EHSAN-TELECOM-NETWORK-latestEHSAN-TELECOM-NETWORK-latest
EHSAN-TELECOM-NETWORK-latest
 
245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan
 
Ace Technologies Presentation
Ace Technologies PresentationAce Technologies Presentation
Ace Technologies Presentation
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)
 
Sujayan-Resume
Sujayan-ResumeSujayan-Resume
Sujayan-Resume
 
Sanjay Patidar CV RJIL
Sanjay Patidar CV RJILSanjay Patidar CV RJIL
Sanjay Patidar CV RJIL
 
CCNP Training in Delhi
CCNP Training in DelhiCCNP Training in Delhi
CCNP Training in Delhi
 
Resume
ResumeResume
Resume
 
alexander Eze
alexander Ezealexander Eze
alexander Eze
 
Hardware Technology Group
Hardware Technology GroupHardware Technology Group
Hardware Technology Group
 
Akash rajguru project report sem VI
Akash rajguru project report sem VIAkash rajguru project report sem VI
Akash rajguru project report sem VI
 
Cognitel corporate profile may 2014
Cognitel corporate profile may 2014Cognitel corporate profile may 2014
Cognitel corporate profile may 2014
 
Ravindra pujari
Ravindra pujariRavindra pujari
Ravindra pujari
 
Senior_Network_Engineer
Senior_Network_EngineerSenior_Network_Engineer
Senior_Network_Engineer
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Nat report 1

  • 1. SIX WEEKS INDUSTRIAL TRAINING REPORT On “CCNA” In partial fulfillment of the degree of Bachelor of Technology in Electronics and communication Engineering AT “NETMAX TECHNOLOGIES PATIALA” Submitted to Guided by Submitted by Mr. Barinder Singh DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING RIMT-INSTITUTE OF ENGINEERING AND TECHNOLOGY MANDI GOBINDGARH-147301 Page | 1
  • 2. ACKNOWLEDGEMENT While presenting this report I would like to express my deep sense of gratitude to entire NETMAX staff that were indispensable part of my training giving me unending guidance, inspiration, encouragement and providing me excellent environment throughout my training at NETMAX TECHNOLOGIES. The training was an extremely productive & enriching experience, not only technically but also from providing some practical skills. I am extremely thankful to Mr.Barinder Singh who had devoted a lot of time in guiding and supervising me during my training. I must place my gratitude towards Prof. Rajneesh Talwar (H.O.D. of E.C.E. Dept.) for their valuable advice and guidance in carrying out this enjoyable and productive experience, which provided me a great opportunity to search new horizons. Ashima Malhotra Page | 2
  • 3. PREFACE Technology has rapidly grown in past two-three decades. An engineer without practical knowledge and skills cannot survive in this technical era. Theoretical knowledge does matter but it is the practical knowledge that is the difference between the best and the better. Organizations also prefer experienced engineers than fresher ones due to practical knowledge and industrial exposure of the former. The practical training is highly conductive for solid foundation for:- 1. Knowledge and personality 2. Exposure to industrial environment. 3. Confidence building. 4. Enhancement of creativity. Page | 3
  • 4. TABLE OF CONTENTS Sr. No. DESCRIPTION PAGE NO. 1. COMPANY PROFILE 32 2. INTRODUCTION TO CCNA 35 3. BASIC 35 4. IP ADDRESS V4 49 5. IP ROUTING 51 6. LAN SWITCHING 63 7. ACL 68 8. NAT 72 9. PROJECT 76 10. REFERCENCES 83 Page | 4
  • 5. INTRODUCTION NETMAX TECHNOLOGIES, SCO 52, 2ND FLOOR LEELA BHAWAN PATIALA . COMPANY PROFILE NETMAX TECHNOLOGIES as an organization is established in 2001 in the field of Network Support, Network training, Software training and Embedded systems. In Education, we have strategic alliance with Pearson VUE and Prometric. We are authorized Testing Partner of REDHAT & CISCO. We are also NOVELL EDUCATION PARTNER with which we provide NOVELL and SUSE LINUX courses. NetMax Technologies also conduct courses in CADENCE based design tools. NETMAX TECHNOLOGIES also provide Technical Research & Development support and consultancy to some electronics companies. Our clients for R&D support in field of embedded systems:  Recorders and Medicare Ltd Chandigarh.  TELEBOX India Ltd.  Lotus Machines Pvt. Ltd. Chandigarh.  Impearl Electronics Pvt. Ltd. Chandigarh.  KANTA Electrical Ltd. Mohali. The partial list of our client for network field is as below:  CEDTI, Mohali  Premier ISP, Chandigarh  Innovative solutions, Chandigarh  Emmtel ISP, Chandigarh  NIPER, Mohali  Navik Technologies, Chandigarh  Software Technology Parks India, Mohali  Glide Internet Services  Rana Group  IDS  HFCL Infotel Ltd.  Targus Technologies Pvt Ltd  STPI, Mohali  BBMB  The Tribune Page | 5
  • 6.  Ind Swift OUR TEAM We are a strong technical team of certified professionals for catering to these solutions and have presence in Chandigarh and Punjab. We have skilled team of engineers who are experienced in design, programming. We are having more than 15 engineers who are having prestigious certifications like CCNA, CCNP, CCSP, CCSA, MCSE, RHCE,C++,C,JAVA & PhP, MySql Programming. Support Area (network solutions):  LINUX / UNIX networks  SUN networks  CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc)  Bandwidth Manager software and hardware  Radio Links  Security Solutions NETMAX TECHNOLOGIES provide the following Courses in IT & Embedded Systems given below: Network Training:  CISCO CCNA, CCNP  RED HAT LINUX 5  WINDOWS 2000, 2003 (MCP,MCSA & MCSE)  MCITP 2008. Software Training:  C++  C  JAVA ( CORE JAVA & ADVANCE JAVA)  ASP.NET  PHP My sql Programming. We provide Technical support and consultancy to electronics companies in the field of Embedded micro controllers like 8 bit and 16 bit family based embedded system design, analog systems design(including signal conditioning circuits, filter design, etc) ,precision signal amplifier design for applications like ECG, low power design, precision temperature measurement etc .Power electronics including dc/dc converters, ac/dc converters,thyristor firing based circuit, battery charging and monitor circuits etc. Application of Embedded systems and analog control systems in industrial as well as home automation. Our core strengths are our commitment, technical expertise and cost effective solutions. We ensure high service levels and prompt support availability leading to lower downtime. Page | 6
  • 7. NETMAX TECHNOLOGIES is a leader in education services and developer of innovative embedded solutions. To meet the demands of Post PC era, NeTmax provides complete solutions as well as design-to-order services to satisfy our customers. NETMAX TECHNOLOGIES:  BARINDER SINGH, 9914713373  HARPREET SINGH, 9814900118 HEAD OFFICE: NETMAX TECHNOLOGIES, SCO 58-59, Sector 34A, Chandigarh. 0172-4644644 Branch Office: NETMAX TECHNOLOGIES, SCO 52 2ND FLOOR LEELA BHAWAN PATIALA. 0175- 5018351,9914713373, 9814900118. Page | 7
  • 8. INTRODUCTION TO CCNA What is Network? In one network more than one computer connected with each other through centralized device. They can share files and resources with each other. LAN LAN stands for Local Area Network. The scope of the LAN is within one building, one school or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each computer sense the carrier before sending the data over the n/w. if carrier is free then you can transmit otherwise you have to wait or you have to listen. In multiple access each computer have right that they can access each other. If two computers sense the carrier on same time then the collision occur. Each computer, in the network, aware about the collision. Now this stop transmitting and they will use back off algorithm. In which random number is generated. This number or algorithm is used by each computer. Who has short number or small number, he has first priority to transmit the data over the network and other computers will wait for their turn. WAN WAN stands for Wide Area Network, in which two local area networks are connected through public n/w. it may be through telecommunication infrastructure or dedicated lines. For e.g: - ISDN lines, Leased lines etc. In which we can use WAN devices and WAN technology. You can also connect with your remote area through existing Internetwork called Internet. Devices Hub Hub is centralized device, which is used to connect multiple workstations. There are two types of Hub: - (i) Active Hub (ii) Passive Hub it has no special kind of memory. It simply receives the frame (data) and forwards it to all its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one collision domain and one broadcast domain. In case of hub, the media access method is used CSMA/CD (Carrier Sense Multiple Access/Collision Detection). (i) Active Hub In Active hub, it receives the frame regenerate and then forward to all its nodes. Page | 8
  • 9. (ii) Passive Hub In Passive hub, it simply receives the frame and forward to all its connected nodes. You cannot perform LAN segmentation using hub. Switch Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes. Every port has its own buffer memory. A port has two queues one is input queue and second is output queue. When switch receives the frame, the frame is received in input queue and forward from output queue. So in case of switch there is no chance or place for collisions. In case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance). Switches provide more efficiency, more speed and security. There are two types of switches: - (i) Manageable switches (can be configured with console cable). (ii) Non-manageable switches. We can perform LAN segmentation by using switches. Bridge Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. It has same functionality as performed by switch. We can use bridge between two different topologies. It has fewer ports. Each port has a own buffer memory. It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table. In case of bridge there is one broadcast domain. Router Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. There are two types of routers: - (i) Hardware Routers are developed by Cisco, HP. (ii) Software Routers is configured with the help of routing and remote access. This feature is offered by Microsoft. This feature is by default installed, but you have to enable or configure it. Hardware routers are dedicated routers. They are more efficient. But in case of software routers, it has less features, slow performance. They are not very much efficient. Page | 9
  • 10. Lan Card Lan card is media access device. Lan card provide us connectivity in the network. There is a RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is another led which is also called heartbeat of Lan card. When any activity occur it may be receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan card. LAN Topologies BUS Topology Cable Type – Coaxial Connector Type – BNC (Bayonet Neill-Concelman), T type, Terminator Coaxial – Thick Maximum length – 500 meters N/w devices 100 Coaxial – Thin Maximum length – 185 meters N/w devices 30 Page | 10
  • 11. Star Topology Cable type - UTP Connector type - RJ45 Maximum Length – 100 meters (with proper color coding) UTP (Unshielded Twisted Pair) STP (Shielded Twisted Pair) In case of hub media access method will be CSMA/CD. Page | 11
  • 12. Ring Topology Cable - UTP There is token ring method used, so there is no collision chance. Ethernet Family Speed Base band 10 Base 2 200-meter Coaxial cable 10 Base 5 500-meter Thick Coaxial cable 10 Base T 100 meter Twisted Pair (UTP) 10/100(present) Base TX 100 meter UTP 100 Base T4 100 meter UTP 4 Pairs used 100 Base FX up to 4 kms Fiber Optic 1000(Server) Base TX 100 meter UTP 1000 Base FX up to 10 kms Fiber Optic 10000 Base FX Fiber Optic Color Green – Green white Orange – Orange white Blue – Blue white Brown – Brown white Green cable has maximum twists. Page | 12
  • 13. Pin Configuration Cross Straight 1 3 1 1 2 6 2 2 3 1 3 3 6 2 6 6 Straight Cable 1 Orange white - Orange white 2 Orange - Orange 3 Green white - Green white 4 Blue - Blue 5 Blue white - Blue white 6 Green - Green 7 Brown white - Brown white 8 Brown - Brown Cross Cable 1 Orange white - Green white 2 Orange - Green 3 Green white - Orange white 4 Blue - Blue 5 Blue white - Blue white 6 Green - Orange 7 Brown white - Brown white 8 Brown - Brown Page | 13
  • 14. RJ45 Connector OSI (Open Systems Interconnection) Model OSI model is the layer approach to design, develop and implement network. OSI provides following advantages: - (i) Designing of network will be standard base. (ii) Development of new technology will be faster. (iii) Devices from multiple vendors can communicate with each other. (iv) Implementation and troubleshooting of network will be easy. (1) Application Layer: - Application layer accepts data and forward into the protocol stack. It creates user interface between application software and protocol stack. (2) Presentation Layer: - This layer decides presentation format of the data. It also able to performs other function like compression/decompression and encryption/decryption. (3) Session Layer: - This layer initiate, maintain and terminate sessions between different applications. Due to this layer multiple application software can be executed at the same time. (4) Transport Layer: - Transport layer is responsible for connection oriented and connection less communication. Transport layer also performs other functions like a. Error checking b. Flow Control Buffering Windowing Multiplexing c. Sequencing d. Positive Acknowledgement e. Response Page | 14
  • 15. (5) Network Layer This layer performs function like logical addressing and path determination. Each networking device has a physical address that is MAC address. But logical addressing is easier to communicate on large size network. Logical addressing defines network address and host address. This type of addressing is used to simplify implementation of large network. Some examples of logical addressing are: - IP addresses, IPX addresses etc. (6) Data Link Layer The functions of Data Link layer are divided into two sub layers a. Logical Link Control b. Media Access Control (i) Logical Link Control defines the encapsulation that will be used by the NIC to delivered data to destination. Some examples of Logical Link Control are ARPA (Ethernet), 802.11 wi-fi. (ii) Media Access Control defines methods to access the shared media and establish the identity with the help of MAC address. Some examples of Media Access Control are CSMA/CD, Token Passing. (7) Physical Layer Physical Layer is responsible to communicate bits over the media this layer deals with the standard defined for media and signals. This layer may also perform modulation and demodulation as required. Router Architecture Page | 15
  • 16. LAN Processor I/O Controlle WAN r Memory Controller RAM BIOS ROM Flash RAM Incomplete O/S IOS IOS NVRAM Startup Configuration Non-Volatile RAM Router Access Modes When we access router command prompt the router will display different modes. According to the modes, privileges and rights are assigned to the user. User mode Page | 16
  • 17. In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not enable to manage & configure router. Privileged mode In this mode, we can display all information, configuration, perform administration task, debugging, testing and connectivity with other devices. We are not able to perform here configuration editing of the router. The command to enter in this mode is ‘enable’. We have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are configured then only enable secret will work. Global configuration This mode is used for the configuration of global parameters in the router. Global parameters applied to the entire router. For e.g: - router hostname or access list of router The command enter in this mode is ‘configure terminal’. Line configuration mode This mode is used to configure lines like console, vty and auxiliary. There are main types of line that are configured. (i) Console router(config)#line console 0 (ii) Auxiliary router(config)#line aux 0 (iii) Telnet or vty router(config)#line vty 0 4 Interface configuration mode This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc. Router(config)#interface <type> <number> Router(config)#interface serial 1 Routing configuration mode This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc. Page | 17
  • 18. Router(config)#router <protocol> [<option>] Router(config)#router rip Router(config)#router eigrp 10 Configuring Password There are five types of password available in a router (1) Console Password router#configure terminal router(config)#line console 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit to erase password do all steps with no command. (2) Vty Password router>enable router#configure terminal router(config)#line vty 0 4 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (3) Auxiliary Password router#configure terminal router(config)#line Aux 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (4) Enable Password router>enable router#configure terminal router(config)#enable password <word> router(config)#exit (5) Enable Secret Password Enable Password is the clear text password. Router>enable Router#configure terminal Router(config)#enable secret <word> Router(config)#exit Page | 18
  • 19. Encryption all passwords All passwords other than enable secret password are clear text password. We can encrypt all passwords using level 7 algorithm. The command to encrypt all password are Router#configure terminal Router(config)#service password-encryption Managing Configuration There are two types of configuration present in a router (1) Startup Configuration (2) Running Configuration (1) Startup configuration is stored in the NVRAM. Startup configuration is used to save settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM. (2) Running Configuration is present in the Primary RAM wherever we run a command for configuration, this command is written in the running configuration. To save configuration Router#copy running-configuration startup-configuration Or Router#write To display running-configuration Router#show running-configuration To display startup configuration Router#show startup-configuration To erase old configuration Router#erase startup-configuration Configuring HostName Router#configure terminal Router#hostname <name> <name>#exit or end or /z Configuration Interfaces Page | 19
  • 20. Interfaces configuration is one of the most important part of the router configuration. By default, all interfaces of Cisco router are in disabled mode. We have to use different commands as our requirement to enable and configure the interface. Configuring IP, Mask and Enabling the Interface Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#ip address <ip> <mask> Router(config-if)#no shutdown Router(config-if)#exit To configure Interface description Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#description <line> To display interface status Router#show interfaces (to show all interfaces) Router#show interface <type> <no> This command will display following parameters about an interface 1) Status 2) Mac address 3) IP address 4) Subnet mask 5) Hardware type / manufacturer 6) Bandwidth 7) Reliability 8) Delay 9) Load ( Tx load Rx load) 10) Encapsulation 11) ARP type (if applicable) 12) Keep alive Configuring secondary IP Router#config terminal Router(config)#interface <type> <no> Router(config-if)#IP address 192.168.10.5 255.255.255.0 Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary Router(config-if)#no shutdown (to enable the interface because they always shutdown) Page | 20
  • 21. Router(config-if)#exit Router#show run (to display secondary IP) To display commands present in history Router#show history To display history size Router#show terminal Configuring Banners Banners are just a message that can appear at different prompts according to the type. Different banners are: - Message of the day (motd) This banner appear at every access method IP Address v4 IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts one is network address and second is host address. in local area network, we can used private IP address, which is provided by IANA (Internet Assigning Numbering Authority). IP addresses are divided into five classes. Page | 21
  • 22. Class Range N/w bits Host bits Subnet mask Total IP Valid IP A 1 – 126 8 24 255.0.0.0 16777216 16777214 B 128 – 191 16 16 255.255.0.0 65536 65534 C 192 – 223 24 8 255.255.255.0 256 254 D 224 – 239 it is reserved for multicast. E 240 – 255 it is reserved for research/scientific use. We can use first three classes. IANA provides private IP addresses from first three classes. Class Private IP Range A 10.0.0.0 – 10.255.255.255 B 172.16.0.0 – 172.31.255.255 C 192.168.0.0 – 192.168.255.255 Subnet Mask Subnet mask is also 32-bit address, which tell us how many bits are used for network and how many bits are used for host address. In Subnet mask Network bits are always 1 and Host bits are always 0. IP Addresses invalid or reserve IP Addresses When we are going to assign IP addresses to our computers then we have to follow some rules. Rules: - (1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved for router. (2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network (10th network). (3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default routing is used in case of Stub n/w (means our network has one exit point). (4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting. (5) 127.0.0.1 - This is Loopback address, which is used for self-communication or troubleshooting purpose. C:>ipconfig C:>ipconfig/all Page | 22
  • 23. It shows all detail. IP Routing When we want to connect two or more networks using different n/w addresses then we have to use IP Routing technique. The router will be used to perform routing between the networks. A router will perform following functions for routing. (1) Path determination (2) Packet forwarding Page | 23
  • 24. (1) Path determination The process of obtaining path in routing table is called path determination. There are three different methods to which router can learn path. i) Automatic detection of directly connected n/w. ii) Static & Default routing iii) Dynamic routing (2) Packet forwarding It is a process that is by default enable in router. The router will perform packet forwarding only if route is available in the routing table. Static Routing In this routing, we have to use IP route commands through which we can specify routes for different networks. The administrator will analyze whole internetwork topology and then specify the route for each n/w that is not directly connected to the router. Steps to perform static routing (1) Create a list of all n/w present in internetwork. (2) Remove the n/w address from list, which is directly connected to n/w. (3) Specify each route for each routing n/w by using IP route command. Router(config)#ip route <destination n/w> <mask> <next hop ip> Next hop IP it is the IP address of neighbor router that is directly connected our router. Static Routing Example: - Router#conf ter Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2 Advantages of static routing (1) Fast and efficient. (2) More control over selected path. (3) Less overhead for router. Disadvantages of static routing (1) More overheads on administrator. (2) Load balancing is not easily possible. (3) In case of topology change routing table has to be change manually. Page | 24
  • 25. Alternate command to specify static route Static route can also specify in following syntax: - Old Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2 Or Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0 Default Routing Default routing means a route for any n/w. these routes are specify with the help of following syntax: - Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop> Or <exit interface> To display routing table Router#sh ip route To check all the interface of a router Router#sh interface brief Dynamic Routing In dynamic routing, we will enable a routing protocol on router. This protocol will send its routing information to the neighbor router. The neighbors will analyze the information and write new routes to the routing table. The routers will pass routing information receive from one router to other router also. If there are more than one path available then routes are compared and best path is selected. Some examples of dynamic protocol are: - RIP, IGRP, EIGRP, OSPF Types of Dynamic Routing Protocols According to the working there are two types of Dynamic Routing Protocols. (1) Distance Vector (2) Link State According to the type of area in which protocol is used there are again two types of protocol: - Page | 25
  • 26. (1) Interior Routing Protocol (2) Exterior Routing Protocol Autonomous system Autonomous system is the group of contiguous routers and n/w, which will share their routing information directly with each other. If all routers are in single domain and they share their information directly with each other then the size of routing updates will depend on the no. of n/w present in the Internetwork. Update for each n/w may take 150 – 200 bytes information. For example: - if there are 1000 n/ws then size of update will be 200*1000 = 200000 bytes The routing information is send periodically so it may consume a large amount of bandwidth in our n/w. Border Exterior Routing Routing Interior Routing AS AS 200 AS Domain 400 500 Protocols Distance Vector Routing The Routing, which is based on two parameters, that is distance and direction is called Distance Vector Routing. The example of Distance Vector Routing is RIP & IGRP. Operation: - Page | 26
  • 27. (1) Each Router will send its directly connected information to the neighbor router. This information is send periodically to the neighbors. (2) The neighbor will receive routing updates and process the route according to following conditions: - (i) If update of a new n/w is received then this information is stored in routing table. (ii) If update of a route is received which is already present in routing table then route will be refresh that is route times is reset to zero. (iii) If update is received for a route with lower metric then the route, which is already present in our routing table. The router will discard old route and write the new route in the routing table. (iv) If update is received with higher metric then the route that is already present in routing table, in this case the new update will be discard. (3) A timer is associated with each route. The router will forward routing information on all interfaces and entire routing table is send to the neighbor. There are three types of timers associated with a route. Configuring RIP Router#conf ter Router(config)#router rip Router(config-router)#network <own net address> Router(config-router)#network <own net address> -------------- -------------- Page | 27
  • 28. Router(config-router)#exit 172.16.0.6 10.0.0.1 172.16.0.5 175.2.1.1 R 1 200.100.100.12 Router(config-router)#network 10.0.0.0 Router(config-router)#network 172.16.0.0 Router(config-router)#network 200.100.100.0 175.2.0.0 via 172.16.0.6 Configuring IGRP Router(config)#router igrp <as no>(1 – 65535) Router(config-router)#network <net address> Router(config-router)#network <net address> Router(config-router)#exit Serial E1 modem Serial E1 2048 k 2048 k 256 k Page | 28
  • 29. sync Configuring following options in IGRP as same as in case of RIP: - (1) Neighbor (2) Passive interface (3) Timer (4) Distance (AD) (5) Maximum path Link State Routing This type of routing is based on link state. Its working is explain as under (1) Each router will send Hello packets to all neighbors using all interfaces. (2) The router from which Hello reply receive are stored in the neighborship table. Hello packets are send periodically to maintain the neighbor table. Page | 29
  • 30. (3) The router will send link state information to the all neighbors. Link state information from one neighbor is also forwarded to other neighbor. (4) Each router will maintain its link state database created from link state advertisement received from different routers. (5) The router will use best path algorithm to store the path in routing table. Problems of Link State Routing The main problems of link state routing are: - (1) High bandwidth consumption. (2) More hardware resources required that is processor and memory (RAM) The routing protocols, which use link state routing are: - (1) OSPF (2) EIGRP Enhanced Interior Gateway Routing Protocol Features: - * Cisco proprietary * Hybrid protocol Link State Distance Vector * Multicast Updates using Address 224.0.0.10 * Support AS * Support VLSM * Automatic Route Summarization * Unequal path cost load balancing * Metric (32 bit composite) Bandwidth Delay Load Reliability MTU * Neighbor Recovery * Partial updates * Triggered updates * Backup Route Configuring EIGRP Router(config)#router eigrp <as no> Router(config-router)#network <net addr.> Router(config-router)#network <net addr.> Router(config-router)#exit Page | 30
  • 31. OSPF Terminology Already known topics in this: - (1) Hello packets (2) LSA (Link State Advertisement) (3) Neighbor (4) Neighbor table (5) Topology table (LSA database) Router ID Router ID is the highest IP address of router interfaces. This id is used as the identity of the router. It maintaining link state databases. The first preference for selecting router ID is given to the Logical interfaces. If logical interface is not present then highest IP of physical interface is selected as router id. Highest ip is router id of a router 50.0.0.6 11.0.0.2 13.0.0.1 Area Area is the group of routers & n/ws, which can share their routing information directly with each other. Adjacency A router is called adjacency when neighbor relationship is established. We can also say adjacency relationship is formed between the routers. OSPF Hierarchical Model Area 0 Page | 31
  • 32. br br br abr abr abr asb ar ar ar r ar ar ar Area 20 Area 70 Area 90 Area Router (Autonomous System Border Router – ASBR) A router, which has all interfaces member of single area, is called area router. Backbone Area Page | 32
  • 33. Area 0 is called backbone area. All other areas must connect to the backbone area for communication. Backbone Router A router, which has all interfaces members of area 0, is called backbone router. Area Border Router A router, which connects an area with area 0, is called area border router. LSA Flooding in OSPF If there are multiple OSPF routers on multi access n/w then there will be excessive no. of LSA generated by the router and they can choke bandwidth of the network. L K M N A B C D A B C D B A A A Neighbor C C B B D D D C L K M N This problem is solved with the help of electing a router as designated router and backup designated router. Designated Router Page | 33
  • 34. A router with highest RID (router id) will be designated router for a particular interface. This router is responsible for receiving LSA from non-DR router and forward LSA to the all DR router. Backup Designated Router This router will work as backup for the designated router. In BDR mode, it will receive all information but do not forward this information to other non-DR router. Commands to configure OSPF Router#conf ter Router(config)#router ospf <process no> Router(config-router)#network <net address> <wild mask> area <area id> Router(config-router)#network <net address> <wild mask> area <area id> Router(config-router)#exit Wild Mask – Complement of subnet mask Example 255.255.0.0 0.0.255.255 255.255.255.255 - Subnet mask Wild mask 255.255.255.255 - 255.255.192.0 subnet mask 0.0.63.255 wild mask Page | 34
  • 35. Area 0 R 200.100.100.33/30 200.100.100.34/30 R 1 2 200.100.100.66/27 200.100.100.160/26 R1 Router(config)#router ospf 33 Router(config-router)#network 200.100.100.32 0.0.0.3 area 0 Router(config-router)#network 200.100.100.64 0.0.0.31 area 0 Router(config-router)#exit R2 Router(config)#router ospf 2 Router(config-router)#network 200.100.100.32 0.0.0.3 area 0 Router(config-router)#network 200.100.100.128 0.0.0.63 area 0 Router(config-router)#exit Access Control List ACL are the basic security feature that is required in any network to control the flow of traffic. Most of time our network may have servers and clients for which traffic control is required. We can also use ACL to classify the traffic. ACLs are used in features like QOS (Quality of Service), Prioritize traffic and interesting traffic for ISDN. Classification Access Control List: - Types of ACL based on Protocol: - (1) IP Access Control List (2) IPX Access Control List Page | 35
  • 36. (3) Appletalk Access Control List Types of ACL based on Feature: - (1) Standard ACL (2) Extended ACL Types of ACL based on Access mode: - (1) Numbered ACL (2) Named ACL Types of ACL based on Order of rules: - (1) Deny, permit (2) Permit, deny IP Standard ACL (Numbered) In Standard ACL, we are only able to specify source address for the filtering of packets. The syntax to create IP standard ACL are: - Router#conf ter Router(config)#access-list <no> <permit|deny> <source> Router(config)#exit <source> Single pc host 192.168.10.5 192.168.10.5 192.168.10.5 0.0.0.0 N/w 200.100.100.0 0.0.0.255 Subnet 200.100.100.32 0.0.0.15 Applying ACL on interface Router#conf ter Router(config)#interface <type> <no> Router(config-if)#ip access-group <ACL no.> <in|out> Router(config-if)#exit Internet Router Page | 36
  • 37. Router(config)#access-list 25 permit 192.168.10.32 0.0.0.31 Router(config)#access-list 25 permit 192.168.10.64 0.0.0.3 Router(config)#access-list 25 permit 192.168.10.68 Router(config)#access-list 25 permit 192.168.10.69 Router(config)#access-list 25 permit 192.168.10.70 Router(config)#interface serial 0 Router(config-if)#ip access-group 25 out IP Standard ACL (Named) In Numbered ACL editing feature is not available that is we are not able to delete single rule from the ACL. In Named ACL editing feature is available. Router#config ter Router(config)#ip access-list standard <name> Router(config-std-nacl)#<deny|permit> <source> Router(config-std-nacl)#exit Router#conf ter Router(config)#ip access-list standard abc Router(config-std-nacl)#deny 172.16.0.16 Router(config-std-nacl)#deny 172.16.0.17 Router(config-std-nacl)#deny 172.16.0.18 Router(config-std-nacl)#permit any Router(config-std-nacl)#exit To modify the ACL Router#conf ter Router(config)#ip access-list standard abc Router(config-std-nacl)#no deny 172.16.0.17 Router(config-std-nacl)#exit Page | 37
  • 38. IP Extended ACL (Numbered) Extended ACL are advanced ACL. ACL, which can control traffic flow on the basis of five different parameters that are: - (i) Source address (ii) Destination address (iii) Source port (iv) Destination port (v) Protocol (layer 3/layer 4) The syntax to create Extended ACL Router#conf ter Router(config)#access-list <no> <deny|permit> <protocol> <source> [<s.port>] <destination> [<d.port>] router(config)#exit To display ACL Router#show access-lists or Router#show access-list <no> To display ACL applied on interface Router#show ip interface Router#show ip interface <type> <no> Router#show ip interface Ethernet 0 Time-Based ACLs In this you can specify a certain time of day and week and then identity that particular period by giving it a name referenced by a task. The reference function will fall under whatever time constraints you have dictated. The time period is based upon the router’s clock, but it is highly recommended that using it in conjunction with Network Time Protocol (NTP) synchronization. Router#conf ter Router(config)#time-range no-http Router(config-time-range)#periodic <Wednesday|weekdays|weekend> 06:00 to 12:00 Router(config-time-range)#exit Router(config)#time-range tcp-yes Router(config-time-range)#periodic weekend 06:00 to 12:00 Page | 38
  • 39. Router(config-time-range)#exit Router(config)ip access-list extended time Router(config-ext-nacl)#deny tcp any any eq www time-range no-http Router(config-ext-nacl)#permit tcp any any time-range tcp-yes Router(config-ext-nacl)#interface f0/0 Router(config-if)#ip access-group time in Router(config-if)#do show time-range Network Address Translation NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we are able to translate network layer addresses that are IP addresses of packets. With the help of Port Address Translation, we are also able to translate port no.s present in transport layer header. There are two reasons due to which we use NAT: - (1) Conserve Live IP address On Internet, there are limited no of IP addresses. If our Pc wants to communicate on Internet then it should have a Live IP address assigned by our ISP. So that IP address request will depend on no. of PCs that we want to connect on Internet. Due to this, there will be a lot of wastage in IP Page | 39
  • 40. addresses. To reduce wastage, we can share live IP addresses between multiple PCs with the help of NAT. (2) NAT enhances the network security by hiding PC & devices behind NAT. Working of NAT & PAT 10.0.0.5 Internet 10.0.0.6 10.0.0.1 200.100.100.12 Switc NAT h 10.0.0.7 10.0.0.8 10.0.0.5 200.100.100.1 2 1080 10.0.0.6 200.100.100.1 2 1085 10.0.0.7 200.100.100.1 Port Translation 2 1100 1024 10.0.0.8 200.100.100.1 2 1024 Page | 40
  • 41. Types of NAT Static NAT This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT will forward on the traffic for the Live IP to the Local PC in the n/w. Static NAT 200.1.1.5 = 192.168.10.6 Interne Route t r Live 200.1.1.5 Local 192.168.10.6 Dynamic NAT Dynamic NAT is used for clients, which want to access Internet. The request from multiple client IPs are translated with the Live IP obtained from the Pool. It is also called Pool Based Dynamic NAT. Pool => 200.1.1.8 – 200.1.1.12/28 Local address => 172.16.X.X Except => 172.16.0.5 Interne 172.16.0.6 ttt 172.16.0.7 Route Page | 41 r
  • 42. Web Server DNS Full access 172.16.X.X 172.16.0.5 172.16.0.6 172.16.0.7 Configuring NAT Router#conf ter Router(config)#int serial 0 Router(config-if)#ip nat outside Router(config-if)#int eth 0 Router(config-if)#ip nat inside Router(config-if)#exit Router(config)#ip nat inside source static 172.16.0.7 200.1.1.3 Router(config)#ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80 Router(config)#ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53 Router(config)#access-list 30 deny 172.16.0.5 Router(config)#access-list 30 deny 172.16.0.6 Router(config)#access-list 30 deny 172.16.0.7 Router(config)#access-list 30 permit any Router(config)#ip nat pool abc 200.1.1.8 200.1.1.12 netmask 255.255.255.240 Router(config)#ip nat inside source list 30 pool abc overload NAT + PAT Command for Basic NAT Router(config)#ip nat inside source list 30 interface serial 0 <exiting interface name> To display NAT translation Page | 42
  • 43. Router#sh ip nat translations (after ping any address, it shows ping details) To clear IP NAT Translation Router#clear ip nat Translation * SECURING PRIVATE ENVIORNMENT BY USING NAT PROJECT REPORT Page | 43
  • 44. The project is based on network addressing translation(nat). The beauty of configuring nat on routers is that it can help users access internet on private ip address which are otherwise excluded by internet service provider(isp). We have used inter VLAN technology to make work efficient between 3 different and independent organisations. The vlans have been divided into web servers and internet clients. DESCRIPTION We have three organisations. Org1, org2 and org3. Each organisation comprises a router, to route the data from and to isp. There are manageable switches in each organisation and we have created separate vlans for servers and internet clients. If we want the communication between the internet clients and servers then we configure inter vlan concept on the router. And if we want to block some internet clients cannot access our servers then we create acl for that particular user. These organisations are linked externally to an isp which provides live(public) ip addresses to each organisation, and isp also provides the internet connections to others. Page | 44
  • 45. CONFIGURATION FOR ORG1 %SYS-5-CONFIG_I: Configured frROUTER ORG1 Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname ORG1 ORG1(config)#line console 0 ORG1(config-line)#password net ORG1(config-line)#login ORG1(config-line)#exit ORG1(config)#line vty 0 4 Page | 45
  • 46. ORG1(config-line)#password net ORG1(config-line)#login ORG1(config-line)#exit ORG1(config)#enable password net ORG1(config)#enable secret net1 ORG1(config)#int f0/0 ORG1(config-if)#no sh %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up ORG1(config-if)#exit ORG1(config)#int f0/0.1 %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to upRouter(config-subif)#encapsulation dot1q 2 ORG1(config-subif)#ip nat inside ORG1(config-subif)#ip address 10.0.0.1 255.0.0.0 ORG1(config-subif)#no sh ORG1(config-subif)#exit ORG1(config)#int f0/0.2 ORG1(config-subif)#encapsulation dot1q 3 ORG1(config-subif)#ip nat inside ORG1(config-subif)#ip address 192.168.10.1 255.255.255.240 ORG1(config-subif)#no sh ORG1(config-subif)#exit ORG1(config)#int s0/0/0 ORG1(config-if)#ip nat outside ORG1(config-if)#clock rate 64000 ORG1(config-if)#ip address 200.10.10.5 255.255.255.252 ORG1(config-if)#no sh %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down ORG1(config-if)#exit ORG1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0 We have place our web server in the private area so that the internet client cannot directly access it. So, we have configured static nat and open port number 80(http) only. Page | 46
  • 47. ORG1(config)#ip nat inside source static tcp 10.0.0.2 80 200.10.10.17 80 In our organisation our clients want to access internet so we will configure dynamic nat with overload for clients. ORG1(config)#access-list 20 permit any ORG1(config)#ip nat pool netmax 200.10.10.18 200.10.10.18 netmask 255.255.255.240 ORG1(config)#ip nat inside source list 20 pool netmax overload ORG1(config)#exit ORG1#wr Building configuration... [OK] ORG1# SWITCH Page | 47
  • 48. Switch>en Switch#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. Switch(vlan)#vlan 2 name server VLAN 2 added: Name: server Switch(vlan)#vlan 3 name clients VLAN 3 added: Name: clients Switch(vlan)#exit APPLY completed. Exiting.... Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#int f0/1 Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int range f0/2 - 3 Switch(config-if-range)#switchport access vlan 3 Switch(config-if-range)#exit Switch(config)#int f0/24 Switch(config-if)#switchport mode trunk Switch(config-if)#exit Switch(config)#exit Switch#wr FOR ORG2 ROUTER Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname ORG2 ORG2(config)#line console 0 ORG2(config-line)#password net ORG2(config-line)#login ORG2(config-line)#exit Page | 48
  • 49. ORG2(config)#line vty 0 4 ORG2(config-line)#password net ORG2(config-line)#login ORG2(config-line)#exit ORG2(config)#enable password net ORG2(config)#enable secret net1 ORG2(config)#int f0/0 ORG2(config-if)#no sh %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up ORG2(config-if)#exit ORG2(config)#int f0/0.1 %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to upRouter(config-subif)#encapsulation dot1q 2 ORG2(config-subif)#ip nat inside ORG2(config-subif)#ip address 10.0.0.1 255.0.0.0 ORG2(config-subif)#no sh ORG2(config-subif)#exit ORG2(config)#int f0/0.2 ORG2(config-subif)#encapsulation dot1q 3 ORG2(config-subif)#ip nat inside ORG2(config-subif)#ip address 192.168.10.1 255.255.255.240 ORG2(config-subif)#no sh ORG2(config-subif)#exit ORG2(config)#int s0/0/0 ORG2(config-if)#ip nat outside ORG2(config-if)#clock rate 64000 ORG2(config-if)#ip address 200.10.10.9 255.255.255.252 ORG2(config-if)#no sh %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down ORG2(config-if)#exit ORG2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0 ORG2(config)#ip nat inside source static 10.0.0.2 200.10.10.33 ORG2(config)#access-list 20 permit any ORG2(config)#ip nat pool netmax 200.10.10.34 200.10.10.36 netmask 255.255.255.240 ORG2(config)#ip nat inside source list 20 pool netmax ORG2(config)#exit %SYS-5-CONFIG_I: Configured from console by console Page | 49
  • 50. ORG2#wr Building configuration... [OK] ORG2# SWITCH Switch>en Switch#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. Switch(vlan)#vlan 2 name server VLAN 2 added: Name: server Switch(vlan)#vlan 3 name clients VLAN 3 added: Name: clients Switch(vlan)#exit APPLY completed. Exiting.... Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#int f0/1 Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int range f0/2 - 3 Switch(config-if-range)#switchport access vlan 3 Switch(config-if-range)#exit Switch(config)#int f0/24 Switch(config-if)#switchport mode trunk Switch(config-if)#exit Switch(config)#exit Switch#wr Page | 50
  • 51. FOR ORG3 ROUTER Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname ORG3 ORG3(config)#line console 0 ORG3(config-line)#password net ORG3(config-line)#login ORG3(config-line)#exit ORG3(config)#line vty 0 4 ORG3(config-line)#password net ORG3(config-line)#login ORG3(config-line)#exit ORG3(config)#enable password net ORG3(config)#enable secret net1 ORG3(config)#int f0/0 ORG3(config-if)#no sh %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up ORG3(config-if)#exit ORG3(config)#int f0/0.1 %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to upRouter(config-subif)#encapsulation dot1q 2 ORG3(config-subif)#ip nat inside ORG3(config-subif)#ip address 10.0.0.1 255.0.0.0 ORG3(config-subif)#no sh ORG3(config-subif)#exit ORG3(config)#int f0/0.2 ORG3(config-subif)#encapsulation dot1q 3 ORG3(config-subif)#ip nat inside ORG3(config-subif)#ip address 192.168.10.1 255.255.255.240 ORG3(config-subif)#no sh ORG3(config-subif)#exit ORG3(config)#int s0/0/0 Page | 51
  • 52. ORG3(config-if)#ip nat outside ORG3(config-if)#clock rate 64000 ORG3(config-if)#ip address 200.10.10.13 255.255.255.252 ORG3(config-if)#no sh %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down ORG3(config-if)#exit ORG3(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0 ORG3(config)#ip nat inside source static 10.0.0.2 200.10.10.50 ORG3(config)#access-list 20 permit any ORG3(config)#ip nat pool netmax 200.10.10.51 200.10.10.51 netmask 255.255.255.240 ORG3(config)#ip nat inside source list 20 pool netmax overload ORG3(config)#exit %SYS-5-CONFIG_I: Configured from console by console ORG3#wr Building configuration... [OK] ORG3# SWITCH Switch>en Switch#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. Switch(vlan)#vlan 2 name server VLAN 2 added: Page | 52
  • 53. Name: server Switch(vlan)#vlan 3 name clients VLAN 3 added: Name: clients Switch(vlan)#exit APPLY completed. Exiting.... Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#int f0/1 Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int range f0/2 - 3 Switch(config-if-range)#switchport access vlan 3 Switch(config-if-range)#exit Switch(config)#int f0/24 Switch(config-if)#switchport mode trunk Switch(config-if)#exit Switch(config)#exit Switch#wr REFERENCES Wikipedia Google www.edu.ac.in NETMAX TECHNOLOGIES CISCO Page | 53