Thursday, February 23, 2012

IP v6 : How to convert IPv4 to IPv6

IPv6 is 128 bit hexadecimal addressing scheme .
ex- 2001: B82C:1234:0000::DA55:0000:0000:ABCD


To enable IPv6 on a particular interface ,we should give some commands to enable it :


R1(config)#int e 0  :- on the ethernet 0 port 
R1(config-if )# ipv6 add 2004:abcd:1234:0001::/64 eui-64 :- particular address which has to be enable 
R1(config-if )# ipv6 rip 1 enable
R1(config-if )# no shutdown 


now on serial interface 0

R1(config)#int s 0  :- on the serial 0 port 
R1(config-if )# ipv6 add 2005:abcd:1234:0002::/64 eui-64 :- particular address which has to be enable 
R1(config-if )# ipv6 rip 1 enable
R1(config-if )# no shutdown 


now we have to give same commands on Router 2 
R2(config)# ipv6 unicast-routing (to enable routing in IPv6 )

R2(config)#int e 0  :- on the ethernet 0 port 
R2(config-if )# ipv6 add 2003:abcd:1234:0001::/64 eui-64 :- particular address which has to be enable 
R2(config-if )# ipv6 rip 1 enable
R2(config-if )# no shutdown 




now on the serial port 0 of another side 



R2(config)#int s 0  :- on the serial 0 port 
R2(config-if )# ipv6 add 2005:abcd:1234:0002::/64 eui-64 :- particular address which has to be enable 
R2(config-if )# no shutdown 
R2(config-if )# ipv6 rip 1 enable
R2(config-if )# clock rate 64000  ( clock rate is always givento D.C.E. side )



Some commands to check the interface address : - 


R2# sh ipv6 int brief 


R2# sh ipv6 int e0 


R2# sh ipv6 route 









Monday, November 21, 2011

Configuring Cisco Discovery Protocol


Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. CDP can also be used to show information about the interfaces your router uses. CDP is media- and protocol independent, and runs on all Cisco-manufactured equipment including routers, bridges, access servers, and switches.
Use of SNMP with the CDP Management Information Base (MIB) allows network management applications to learn the device type and the SNMP agent address of neighboring devices, and to send
SNMP queries to those devices. Cisco Discovery Protocol uses the CISCO-CDP-MIB.


CDP runs on all media that support Subnetwork Access Protocol (SNAP), including local-area network (LAN), Frame Relay, and Asynchronous Transfer Mode (ATM) physical media. CDP runs over the data link layer only. Therefore, two systems that support different network-layer protocols can learn about each other.


Each device configured for CDP sends periodic messages, known as advertisements, to a multicast address. Each device advertises at least one address at which it can receive SNMP messages. The
advertisements also contain time-to-live, or holdtime, information, which indicates the length of time a receiving device should hold CDP information before discarding it. Each device also listens to the
periodic CDP messages sent by others in order to learn about neighboring devices and determine when their interfaces to the media go up or down.


CDP Version-2 (CDPv2) is the most recent release of the protocol and provides more intelligent device tracking features. These features include a reporting mechanism which allows for more rapid error tracking, thereby reducing costly downtime. Reported error messages can be sent to the console or to a logging server, and cover instances of unmatching native VLAN IDs (IEEE 802.1Q) on connecting ports,and unmatching port duplex states between connecting devices. See the Cisco IOS Software System
Error Messages document for detailed examples of CDP error messages.


CDPv2 show commands can provide detailed output on VLAN Trunking Protocol (VTP) management domain and duplex modes of neighbor devices, CDP-related counters, and VLAN IDs of connecting ports



VLAN Trunking Protocol (VTP) is a discovery technique deployed by switches where each switch advertises its management domain on its trunk ports, its configuration revision number, and its known VLANs and their specific parameters. A VTP domain is made up of one or more interconnected devices that share the same VTP domain name. A switch can be configured to be in only one VTP domain.


The command used for enabling cdp globally is 


# cdp run                 -  to enable cdp globally
# cdp enable            -  to enable cdp on a particular interface
# clear cdp table     -   to delete the cdp table information about                                                   
                                    neighbours 
# show cdp              -  Displays the interval between transmissions of
                                    CDP advertisements,the number of seconds  
                                    the CDP advertisement is valid for a given
                                    port, and the version of the advertisement.

Monday, October 31, 2011

Cisco IOS Command Modes



The basic hierarchy of these command modes is as follows:
user EXEC mode->privileged EXEC mode->global configuration mode->
specific configuration modes->configuration submodes->configuration subsubmodes.




When you start a session on the router, you begin in user EXEC mode. For security purposes, only a
limited subset of EXEC commands are available in user EXEC mode. This level of access is reserved for
tasks which do not change the configuration of the router, like checking the router status.


1) USER EXEC MODE : -  




To list the user EXEC commands, use the following command:
The user-level prompt consists of the host name followed by the angle bracket (>):
Router>
The default host name is Router unless it has been changed during initial configuration using the setup
command. Refer to the product user guide for information on the setup facility. You can also change the
host name using the hostname global configuration command described in the “Basic System
Management Commands” chapter in the Cisco IOS Configuration Fundamentals Command Reference.
To list the commands available in user EXEC mode, enter a question mark (?) as shown in the following
example:
Router> ?


Exec commands:
<1-99>                Session number to resume
connect                Open a terminal connection
disconnect            Disconnect an existing telnet session
enable                  Turn on privileged commands
exit                       Exit from the EXEC
help                      Description of the interactive help system
lat                         Open a lat connection
lock                      Lock the terminal
login                     Log in as a particular user
logout                   Exit from the EXEC
menu                    Start a menu-based user interface
mbranch               Trace multicast route for branch of tree
mrbranch              Trace reverse multicast route to branch of tree
mtrace                  Trace multicast route to group
name-connection    Name an existing telnet connection
pad                       Open a X.29 PAD connection
ping                      Send echo messages
resume                  Resume an active telnet connection
show                    Show running system information
systat                    Display information about terminal lines
telnet                    Open a telnet connection
terminal                Set terminal line parameters
tn3270                 Open a tn3270 connection
trace                     Trace route to destination
where                   List active telnet connections
x3                        Set X.3 parameters on PAD
xremote                Enter XRemote mode


2)  Privileged EXEC Mode


Because many of the privileged commands set operating parameters, privileged access should be
password protected to prevent unauthorized use. The privileged command set includes those commands
contained in user EXEC mode, as well as the configure command through which you can access the
remaining command modes. Privileged EXEC mode also includes high-level testing commands, such as
debug. For details on the debug commands, see the Cisco IOS Debug Command Reference.
The privileged EXEC mode prompt consists of the devices’s host name followed by the pound sign (#),
as shown in the following example:




Router#


Step 1  :    Router> enable [password]                 Enters the privileged EXEC mode.
Step 2  :   Router# ?                                            Lists privileged EXEC commands.




3) Global Configuration Mode : 


Global configuration mode is used to configure your system globally, or to enter specific configuration modes
to configure specific elements such as interfaces or protocols. Use the configure terminal privileged
EXEC command to enter global configuration mode.
To access global configuration mode, use the following command in privileged EXEC mode:




Router# configure terminal                  From privileged EXEC mode, enters global configuration
                                                               mode.


The following example shows the process of entering global configuration mode from privileged EXEC
mode:


Router# configure terminal


Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#


Note that the system prompt changes to indicate that you are now in global configuration mode. The
prompt for global configuration mode consists of the host-name of the device followed by (config) and
the pound sign (#). To list the commands available in privileged EXEC mode, issue the ? command at
the prompt.


3 ) Interface Configuration Mode :- 


Step 1:  Router(config)# interface type number              From global configuration mode, enters interface
                                                                                    configuration mode.
Interface type no. are serial and ethernet ports , first check your interface type by typing command :
Router# show ip interface brief  ( Exec Mode )
By typing this command your known interface will be displayed .


Step 2 : Router(config-if)# ?                                         Lists the interface configuration commands.


It will look like as :         Router(config)# interface serial 0        < Press Return >
                                     Router(config-if)#







NETWORKING BASICS

  • Network – Connection of Computers

  • Ethernet uses only one cable that is used to connect all over the world – RJ45/CAT 5/CAT 6/10 baset. Earlier Token ring was used in Ethernet.

  • Types
    1. Broadcast Multi-Access: All systems are connected to the network and only the addressed system receives the packets. First messages are broadcasted, addresses are received and then the packets are unicasted.
    2. Point-to-point: Only two computers are connected. Address is not mandatory (But is present).It is not broadcasted.

·         Routers: Router is an intelligent device that receives data (packet) and checks from where it comes and where it goes (in the best route).Router is a CISCO product.
Note: CCNA tells about
ü  How to connect computers?
ü  How hosts systems talks to each other, when and why?
ü  How it interacts with the router and how router talks to the outer world?

·         Networks are divided as the private (illegal, reserved, non-routable) and public (Legal) networks. The private networks are secured leased lines that are over a particular area-used internally only. The public networks are world wide. 
·         Computers will have two addresses:
1.      Logical Address – IP Address
2.      Physical Address – Hardware address
                                  -- MAC address
                                  -- Ethernet address
                                  -- Permanent address

·         MAC Address – Media Access Control Address. No two network cards will have the same MAC addresses.

            E.g.:  0010ab 1234cd
                           Vendor    Card No.
                            Code

·         Operating System: OS interfaces between the hardware and the software. The software program that binds itself to the machine components
·         We need a protocol to transfer data between two systems else your system will be a stand-alone system. In order for two systems to communicate NOS (Network Operating Systems) is needed.
·         TCP/IP is used to transfer data between systems. It is not a single protocol instead it is a stack of protocols.
  

COURSE OBJECTIVES



The CCNA certification indicates knowledge of networking for the small-office,
home-office (SOHO) market and the ability to work in small businesses or
organizations whose networks have fewer than 100 nodes. A CCNA certified
individual can:
■ Install and configure Cisco switches and routers in multiprotocol
internetworks using LAN and WAN interfaces
■ Provide Level 1 troubleshooting service
■ Improve network performance and security
■ Perform entry-level tasks in the planning, design, installation, operation and
troubleshooting of Ethernet, TCP/IP Networks.
CCNA 2 is an integral step towards achieving CCNA Certification.
Upon completion of this course, students will be able to perform tasks related to:
■ Routers and their role in WANs


■ Cisco IOS
■ Router Configuration
■ Router File Management
■ RIP and IGRP Routing Protocols
■ TCP/IP Error and Control Messages
■ Router Troubleshooting
■ Intermediate TCP
■ Access Control Lists

CCNA COURSE SPECIFICATION



CCNA : Cisco Certified Network Associate


CCNA  focuses on initial router configuration, Cisco IOS Software management, routing
protocol configuration, TCP/IP, and access control lists (ACLs). Students will
develop skills on how to configure a router, managing Cisco IOS Software,
configuring routing protocol on routers, and set the access lists to control the
access to routers.