Document ID: Introduction
|
|
|
- Jeffrey Stephens
- 9 years ago
- Views:
Transcription
1 Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4 Tunnels A Tunneling Scenario Configure Network Diagram Configurations Verify Troubleshoot Related Information Introduction This document describes how an enterprise campus customer (for example, an educational institution, a small software firm, or a small manufacturing company) can connect to the 6bone by using 6to4 tunnels The 6bone is an IP version 6 (IPv6) test network that was set up to assist in the evolution and deployment of IPv6 in the Internet This document is one of a set of documents that support and complement the IPv6 Deployment Strategies publication, which is available at IPv6 Design Guides You should read this document in conjunction with IPv6 Deployment Strategies to better understand IPv6 predeployment activities Prerequisites Requirements Before you implement a 6to4 tunnel to the 6bone, you must perform the following tasks: Identify the border router at your site that you will configure to run dual-stack This border router must have a static, globally routable IPv4 address A data license is required to enable all IPv6 features In order to verify which license is enabled on the router, use the show license command From the 6bone ISP, obtain the IPv4 address of the 6to4 relay router that you will use for 6bone access Note: When you configure tunnels for your enterprise border routers, you must use globally routable IPv4 addresses The IPv4 addresses used in the example configurations in this document are not globally routable and are provided for illustrative purposes only Ensure that your DNS is running (or has the equivalent capabilities of) Berkeley Internet Name Domain (BIND) version 9, which provides an implementation of the major components of the DNS for IPv6 DNS configuration is beyond the scope of this document Recognize that the current dual-stack implementation in Cisco IOS software permits an interim network management solution, which allows applications such as TFTP, ping, Telnet, and traceroute to be run over either an IPv4 or an IPv6 transport Select an IPv6 interior routing protocol, such as RIPng, that is appropriate to your network configuration For simplicity, the solution presented in this document uses a static route The relevant IPv4 exterior routing protocol handles exterior routing Configure all your dual-stack routers to use RIP Refer to Cisco IOS IPv6 Configuration Library for more information on configuring your network for IPv6 Components Used The information in this document is based on Cisco IOS images with IPv6 support The information in this document was created from the devices in a specific lab environment All of the devices used in this document started with a cleared (default) configuration If your network is live, make sure that you understand the potential impact of any command The following figure shows the initial IPv4 network topology for the enterprise campus customer This network uses several routers to provide IP connectivity among local users A permanent IPv4 connection to an Internet service provider (ISP) provides external connectivity The following table describes the devices used in this solution Device Enterprise Border Router 6bone ISP Router Host Name 6bone-gw ipv6-router Chassis Type Cisco 3660 router Cisco 7206 router Physical Interfaces Software Loaded 2 Ethernet 2 Fast Ethernet 4 Serial Cisco IOS Release 122(4)T 4 Ethernet 2 Fast Ethernet 4 Serial Cisco IOS Release 122(4)T Memory 64MV RAM; 16 MB Flash 128 MB RAM; 20 MB Flash
2 IP Addresses Ethernet0: IPv Tunnel2002: IPv6 2002:C0A8::1/128 Ethernet0/0: IPv Tunnel2002: IPv6 2002:C0A8:2102::1/128 Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions How 6to4 Tunnels Work A 6to4 tunnel is configured on an enterprise dual-stack border router All the enterprise IPv6 traffic destined for the 6bone is routed over IPv4 through the tunnel to the 6bone ISP 6to4 relay router Traffic from the 6bone to an enterprise host is routed over IPv4 through the tunnel to the enterprise dual-stack border router, and then to the IPv6 destination host The benefits to the enterprise of using 6to4 tunnels are as follows: Cisco IOS software supports 6to4 tunnels The end-user host configuration is simple it requires minimal management overhead The tunnel is automatic; no enterprise-specific configuration is required at the 6to4 relay site 6to4 tunnels scale well This solution accommodates dynamic IP addresses at the enterprise The tunnel exists only for the duration of the session A 6to4 tunnel requires only a one-time configuration at the ISP, which makes the 6to4 relay service available simultaneously to many enterprises Limitations of 6to4 Tunnels 6to4 tunnel usage has the following limitations: Independently managed NAT is not allowed along the path of the tunnel You cannot easily implement multihoming The 6to4 tunnel mechanism provides a /48 address block; no more addresses are available Because 6to4 tunnels are configured many-to-one and tunnel traffic can originate from multiple endpoints, 6to4 tunnels can provide only overall traffic information to the ISP The underlying IPv4 address determines the enterprise 6to4 IPv6 address prefix, so the migration to native IPv6 requires renumbering the network This solution is limited to static or BGP4+ routing A Tunneling Scenario A small software company (considered to be a typical enterprise campus environment) with an IPv4 network is discussing a merger with another company that runs IPv6 on its network To assess the connectivity impact that the merger would have on the merged companies, the customer wants to expand its knowledge of IPv6 by connecting to the 6bone The business objectives of the enterprise campus customer discussed in this document are as follows: Gain IPv6 experience on an established IPv6 backbone using its existing IPv4 topology, with a minimal investment Test transitional and operational procedures in a real-world IPv6 environment before deploying IPv6 Transitional procedures are those procedures that are necessary to migrate from IPv4 to IPv6 These procedures include setting up dualstack routers and end systems, tunneling mechanisms, Domain Name System (DNS) servers, and, in the future, the testing of Network Address Translation-Protocol Translation (NAT-PT) Operational procedures are related to network management, element management of dual-stack hosts and end systems, and other similar functions Test IPv6 applications and implementations on local workstations Minimize the management overhead associated with a 6bone connection Note: Although the 6bone comprises many types of organizations (for example, academic and government organizations, hardware and software vendors, and service providers), this document uses the term 6bone ISP when referring to the organization that is at the 6bone end of the tunnel Configure The IPv4 address of your border router is Derive your 6to4 prefix from your IPv4 address by converting the decimal components of the IPv4 address to hexadecimal and then prefixing 2002 to the resulting hexadecimal numbers So the 6to4 prefix for the IPv6 nodes in your network is 2002:C0A8:6301::/128 The C0A8:6301 part of the preceding IPv6 address is formed from the IPv4 address by converting each octet of the dotted decimal notation to its hexadecimal equivalent, as shown in Table 6 Decimal 192 C0 168 A Hexadecimal This section presents the information to configure the features described in this document Note: Use the Command Lookup Tool (registered customers only) to find more information on the commands used in this document Network Diagram This document uses the network setup shown in the diagram below This figure shows the topology of a typical 6to4 tunnel to the 6bone
3 Configurations Your 6bone ISP has provided you with the IPv4 address its 6bone border router: Use the preceding address information to configure a 6to4 tunnel on your identified dual-stack border router by entering the following commands: Enterprise Router interface Ethernet0 description connection to 6bone ISP ip address description 6to4 tunnel to 6bone ISP ipv6 address 2002:C0A8:6301::1/128 tunnel source ethernet0 --- In some cases, a user will require a data license -- in order to issue the tunnel mode ipv6ip command ipv6 route 2002::/16 Tunnel2002 ipv6 route ::/0 2002:C0A8:2101::1 The 2002:C0A8:2101::1 in the second ipv6 route command is the IPv6 address of the ISP 6to4 relay router that provides access to the 6bone The C0A8:2101 part of the address is derived from the IPv4 address ( ) of the 6to4 relay router in a manner similar to Table 6 At the other end of the tunnel, the border router at your 6bone ISP would have a configuration like the following IPv6 unicast routing example: ISP 6to4 Relay Router interface ethernet0/0 description connection to enterprise ip address description 6to4 relay service ipv6 address 2002:C0A8:2101::1/128 tunnel source ethernet0/0 ipv6 route 2002::/16 tunnel2002 Enterprise Router 6bon2-gw maui-soho-01# show running-config Building configuration username maui-nas-05 password cisco Identify the version of Cisco IOS software running on the router version 122 Include timestamps on log and debug entries that are useful for troubleshooting and optimizing the network service timestamps debug datetime localtime show-timezone service timestamps log datetime localtime show-timezone Specify that passwords will be encrypted in configuration output service password-encryption Configure the router name hostname 6bone-gw Configure boot options boot system flash slot0: boot system flash bootflash: Configure logging logging buffered debugging Configure secret password
4 enable secret 5 [removed] Configure clock timezone and summertime rule clock timezone PST -8 clock summer-time PDT recurring ip subnet-zero no ip source-route no ip rcmd domain-lookup Configure router domain name ip domain-name EnterpriseDomaincom Configure DNS name servers ip name-server ip name-server ip name-server 2002:C0A8:6301:1::21 Enable IPv6 routing Configure Tunnel interface description 6to4 tunnel to 6bone ISP ipv6 address 2002:C0A8:6301::1/128 tunnel source ethernet0 Configure physical interface interface Ethernet0 description connection to 6bone ISP ip address interface Ethernet1 description connection to Lab interface router ip address ipv6 address 3FFE:FFFF:8023:100::1/64 ipv6 rip v6rip enable interface FastEthernet2/0 description connection to core router ip address ipv6 address 3FFE:FFFF:8023:200::1/64 ipv6 rip v6rip enable interface FastEthernet3/0 description connection to IPv4-only core router ip address Other interfaces are all unused interface Serial4/0 interface Serial4/1 interface Serial4/2 interface Serial4/3 Configure basic IP routing ip default-gateway ip classless ip route Configure IPv6 static route ipv6 route 2002::/16 tunnel2002 ipv6 route ::/0 2002:C0A8:2101::1 ipv6 router rip v6rip
5 end end 6bone IPv6 ISP Router maui-soho-01# show running-config Building configuration username maui-nas-05 password cisco Identify the version of Cisco IOS software running on the router version 122 Include timestamps on log and debug entries that are useful for troubleshooting and optimizing the network service timestamps debug datetime localtime show-timezone service timestamps log datetime localtime show-timezone Specify that passwords will be encrypted in configuration output service password-encryption Configure the router name hostname ipv6-router Configure boot options boot system flash slot0: boot system flash bootflash: Configure logging logging buffered debugging Configure secret password enable secret 5 [removed] Configure clock timezone and summertime rule clock timezone PST -8 clock summer-time PDT recurring ip subnet-zero no ip source-route no ip rcmd domain-lookup Configure router's domain name ip domain-name 6boneISPcom Configure DNS name servers ip name-server ip name-server ip name-server 3FFE:FFFF:8001::4 Enable IPv6 routing Configure Tunnel interface description 6to4 relay service ipv6 address 2002:C0A8:2101::1/128 tunnel source ethernet0/0 Configure physical interface interface Ethernet0/0 description connection to enterprise ip address interface Ethernet0/1 interface Ethernet0/2
6 interface Ethernet0/3 interface FastEthernet1/0 description connection to ISP-core-A ip address ipv6 address 3FFE:FFFF:8023:2::6/64 duplex auto speed auto interface FastEthernet2/0 description connection to ISP-core-B ip address ipv6 address 3FFE:FFFF:8023:2::8/64 duplex auto speed auto Other interfaces are all unused interface Serial4/0 interface Serial4/1 interface Serial4/2 interface Serial4/3 Configure basic IP routing ip default-gateway ip classless ip route Configure IPv6 static route ipv6 route 2002::/16 tunnel2002 end Verify This optional task explains how to confirm that your tunnel is configured and working properly The commands contained in the task steps can be used in any sequence and may need to be repeated The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands Use the OIT to view an analysis of show command output enable show interfaces tunnel number [accounting] ping [protocol] destination show ip route [address [mask]] Troubleshoot There is currently no specific troubleshooting information available for this configuration Related Information IPv6 Deployment Strategies Implementing IPv6 for Cisco IOS Software IPv6 for Cisco IOS Software Command Reference RFC 2185, Routing Aspects of IPv6 Transition (informationa RFC 2373, IP Version 6 Addressing Architecture RFC 2374, An IPv6 Aggregatable Global Unicast Address Format RFC 2460, Internet Protocol, Versionb 6 (IPv6) Specification RFC 2464, Transmission of IPv6 Packets over Ethernet Networks RFC 2471, IPv6 Testing Address Allocation RFC 2893, Transition Mechanisms for IPv6 Hosts and Routers RFC 3056, Connection of IPv6 Domains via IPv4 Clouds IP Routed Protocols Support Page Technical Support & Documentation - Cisco Systems Updated: Aug 10, 2005 Document ID: Contacts Feedback Help Site Map
7 Cisco Systems, Inc All rights reserved Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc
Interconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
Sample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
Domain Name System Server Round-Robin Functionality for the Cisco AS5800
Domain Name System Server Round-Robin Functionality for the Cisco AS5800 This feature module describes Domain Name System (DNS) server round-robin functionality for the Cisco AS5800 universal access server.
Sample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Configuring a Gateway of Last Resort Using IP Commands
Configuring a Gateway of Last Resort Using IP Commands Document ID: 16448 Contents Introduction Prerequisites Requirements Components Used Conventions ip default gateway ip default network Flag a Default
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
IOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
LAB Configuring NAT. Objective. Background/Preparation
LAB Configuring NAT Objective Configure a router to use network address translation (NAT) to convert internal IP addresses, typically private addresses, into outside public addresses. Configure static
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS
Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Document ID: 23408 Contents Introduction Prerequisites Requirements Components
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products
Configuring Basic Settings
CHAPTER 10 This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example
PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example Document ID: 69374 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Configuring DNS on Cisco Routers
Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example
ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example
PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Domain Name System (DNS) Services
12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................
IPv6 Fundamentals: A Straightforward Approach
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background
IPv6 Deployment Strategies
Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
How To Configure InterVLAN Routing on Layer 3 Switches
How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
Basic Router Configuration Using Cisco Configuration Professional
Basic Router Configuration Using Cisco Configuration Professional Document ID: 111999 Contents Introduction Prerequisites Components Used Install Cisco Configuration Professional Router Configuration to
Configuring Basic Settings
CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Packet Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.
Application Note Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.323 Gateway Introduction This document describes the interoperability
ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example
ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example Document ID: 112182 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Configuring Fax Pass-Through
Configuring Fax Pass-Through This chapter describes the configuration of fax pass-through. With fax pass-through, modulated fax information from the PSTN is passed in-band over a voice speech path in an
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
L2F Case Study Overview
LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
Configuring DHCP. DHCP Server Overview
Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Device Interface IP Address Subnet Mask Default Gateway
Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Lab: Basic Router Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Def. Gateway R1 Fa0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 192.168.2.1 255.255.255.0 N/A R2 Fa0/0 192.168.3.1 255.255.255.0 N/A
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Per-Packet Load Balancing
Per-Packet Load Balancing Feature History Release 12.0(19)ST 12.0(21)S 12.0(22)S Modification This feature was introduced on the Cisco 10000 series routers. This feature was introduced on the Cisco 12000
IP Addressing and Subnetting for New Users
IP Addressing and Subnetting for New Users Document ID: 13788 Contents Introduction Prerequisites Requirements Components Used Additional Information Conventions Understanding IP Addresses Network Masks
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
Understanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
Table of Contents. Cisco IP Addressing and Subnetting for New Users
Table of Contents IP Addressing and Subnetting for New Users...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Additional Information...1 Understanding IP
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
Table of Contents. Configuring IP Access Lists
Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message
Network Scenarios Pagina 1 di 35
Network Scenarios Pagina 1 di 35 Table of Contents Network Scenarios Cisco 827 s Network Connections Internet Access Scenarios Before You Configure Your Internet Access Network Replacing a Bridge or Modem
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D
Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: [email protected] Configuring a Vyatta 4.0 release
Configuring a Router
CHAPTER 3 Configuring a Router This chapter provides information and commands concerning the following topics: Configuring a router, specifically: Names Passwords Interfaces MOTD banners IP host tables
PIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note
Using a Sierra Wireless AirLink Raven X or Raven-E with a Application Note Cisco routers deliver the performance, availability, and reliability required for scaling mission-critical business applications
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Table of Contents. Cisco Configuring CET Encryption with a GRE Tunnel
Table of Contents Configuring CET Encryption with a GRE Tunnel...1 Document ID: 14120...1 Cisco has announced the end of life for the Cisco Encryption Technology. For more information, please see the End
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt Objective This lab may introduce new CCNP lab equipment and certain IOS features. This introductory activity also describes how to
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
Reverse Proxy Caching
CHAPTER 7 This chapter explains reverse proxy caching and shows configuration examples relevant to the Content Engine. This chapter contains the following sections: Overview, page 7-1 Configuring Reverse
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
