Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents
|
|
|
- Silvia McCoy
- 9 years ago
- Views:
Transcription
1 Table of Contents Table of Contents Chapter 1 ARP Configuration Commands ARP Configuration Commands arp static arp timer aging debugging arp packet display arp display arp timer aging reset arp Chapter 2 DHCP-Snooping Configuration Commands DHCP-Snooping Configuration Commands dhcp-snooping display dhcp-snooping Chapter 3 Access Management Configuration Commands Access Management Configuration Commands am enable am isolate am trap enable am user-bind display am display am user-bind Chapter 4 IP Performance Configuration Commands IP Performance Configuration Commands display fib display icmp statistics display ip socket display ip statistics display tcp statistics display tcp status reset ip statistics reset tcp statistics tcp timer fin-timeout tcp timer syn-timeout tcp window i
2 Chapter 1 ARP Configuration Commands Chapter 1 ARP Configuration Commands 1.1 ARP Configuration Commands arp static arp static ip-address mac-address [ vlan-id { interface_type interface_num interface_name } ] undo arp ip-address System view ip-address: IP address of the ARP mapping entry. mac-address: MAC address of ARP mapping entry, whose format is H-H-H ( H indicates a hexadecimal number). vlan-id: VLAN to which the static ARP entry belongs, which is in the range of 1 to interface_name: Port to which the static ARP entry belong, represented with interface_name= interface_type interface_num. interface_type is port type and interface_num is port number. For details about interface_type, interface_num and interface_name, refer to the Port Command Manual. Using arp static command, you can configure the static ARP mapping entries in an ARP mapping table. Using undo arp static command, you can cancel a static ARP mapping entry from the ARP table By default, the mapping table of the system ARP is empty and the switch can maintain its address mapping by means of dynamic ARP. Note that: 1-1
3 Chapter 1 ARP Configuration Commands Static ARP map entry will be always valid as long as Ethernet switch works normally. But if the VLAN corresponding ARP mapping entry is deleted, the ARP mapping entry will be also deleted. The valid period of dynamic ARP map entries will last only 20 minutes by default. The parameter vlan-id must be the ID of a VLAN that has been created by the user, and the Ethernet port specified behind this parameter must belong to the VLAN. For the related command, see reset arp, display arp, debugging arp. # Associate the IP address with the MAC address 00e0-fc , and the ARP mapping entry belongs to the Ethernet port Ethernet0/1 on VLAN1. [Quidway] arp static e0-fc ethernet0/ arp timer aging arp timer aging aging-time undo arp timer aging System view aging-time: Aging time of dynamic ARP aging timer, which is in the range of 1 to 1440 minutes. By default, the aging time is 20 minutes. Using arp timer aging command, you can configure the dynamic ARP aging timer. Using undo arp timer aging command, you can restore the default dynamic ARP aging time. For the related command, see display arp timer aging. # Configure the dynamic ARP aging timer to 10 minutes. [Quidway] arp timer aging
4 Chapter 1 ARP Configuration Commands debugging arp packet debugging arp packet undo debugging arp packet User view packet: ARP packet debugging. Using debugging arp packet command, you can enable ARP debugging. Using undo debugging arp packet command, you can disable the corresponding ARP debugging. By default, undo ARP debugging is enabled. For the related command, see arp static, display arp. # Enable ARP packet debugging. <Quidway> debugging arp packet * ARP-8-S1-arp_send:Send an ARP Packet, operation : 1, sender_eth_addr : 00e0-fc ,sender_ip_addr : , target_eth_addr : , target_ip_addr : * ARP-8-S1-arp_rcv:Receive an ARP Packet, operation : 2, sender_eth_addr : 0050-ba22-6fd7, sender_ip_addr : , target_eth_addr : 00e0-fc , target_ip_addr : Table 1-1 Output description of the debugging arp packet display Field operation sender_eth_addr Kind of ARP packets: 1 ARP request packet; 2 ARP reply packet Ethernet address of the sender 1-3
5 Chapter 1 ARP Configuration Commands Field sender_ip_addr target_eth_addr target_ip_addr IP address of the sender Target Ethernet address. If the packet is ARP request packet, the target IP address will be 0 Target IP address display arp display arp [ dynamic static ip-address ] Any view dynamic: Display the dynamic ARP entries in ARP mapping table. static: Display the static ARP entries in ARP mapping table. ip-address: Display ARP mapping entries according to specified IP address. Using display arp command, you can view the ARP mapping table. For the related command, see arp static, reset arp, debugging arp. # Display all the ARP entries. <Quidway> display arp IP Address MAC Address VLAN ID Port Name Aging Type e0-fc N/A N/A N/A Static ba22-6fd7 1 Ethernet0/1 20 Dynamic entries found
6 Chapter 1 ARP Configuration Commands Table 1-2 Output description of the display arp display Field IP Address MAC Address VLAN ID Port Name Aging Type IP address of the ARP mapping entry MAC address of the ARP mapping entry VLAN to which the static ARP entry belongs Port to which the static ARP entry belongs Aging time of dynamic ARP entry in minutes Type of ARP entry display arp timer aging display arp timer aging Any view vlan-id: VLAN interface. Using display arp timer aging command, you can view the current setting of the dynamic ARP map aging timer. For the related command, see arp timer aging. # Display the current setting of the ARP map aging timer. [Quidway] display arp timer aging Current ARP aging time is 10 minute(s) 1-5
7 Chapter 1 ARP Configuration Commands reset arp reset arp [ dynamic static interface { interface_type interface_num interface_name } ] User view dynamic: Clear the dynamic ARP mapping entries. static: Clear the static ARP mapping entries interface interface_name: Clear the ARP mapping entries that are related to the specified. port, represented with interface_name= interface_type interface_num. interface_type is port type and interface_num is port number. For details about interface_type, interface_num and interface_name, refer to the Port Command Manual. Using reset arp command, you can reset the ARP mapping entries. For the related command, see arp static, display arp. # Reset the static ARP entries. <Quidway> reset arp static 1-6
8 Chapter 2 DHCP-Snooping Configuration Commands Chapter 2 DHCP-Snooping Configuration Commands 2.1 DHCP-Snooping Configuration Commands dhcp-snooping dhcp-snooping undo dhcp-snooping System view none Using dhcp-snooping command, you can enable DHCP-Snooping function on the switch to record users IP addresses. Using undo dhcp-snooping command, you can disable this function. By default, The switch is disabled to listen to DHCP broadcast packets and record users IP addresses. For the related command, see display dhcp-snooping. # Enable DHCP-Snooping. [Quidway] dhcp-snooping 2-1
9 Chapter 2 DHCP-Snooping Configuration Commands display dhcp-snooping display dhcp-snooping Any view none Using display dhcp-snooping command, you can view the IP address and MAC address bindings recorded through DHCP-Snooping. For the related command, see dhcp-snooping. # Display clients IP addresses and MAC addresses recorded through DHCP-Snooping. <Quidway>display dhcp-snooping IP Address MAC Address e0-fc a3-de In the above terminal outputs, the IP Addresses are learned from the DHCP broadcast packets and the MAC Addresses belong to the clients corresponding to the IP addresses. 2-2
10 Chapter 3 Access Management Configuration Commands Chapter 3 Access Management Configuration Commands Note: S3050C-48 and S3026 switches don t support the chapter in S3000 series switches. 3.1 Access Management Configuration Commands am enable am enable undo am enable System view none Using am enable command, you can enable the access management function. Using undo am enable command, you can disable the function. By default, Access management function disabled. When using the access management function, It is recommended to cancel the static ARP configuration to ensure that the binding of IP address and Ethernet switch take effect. If you have configured the static ARP for an IP address in the current port IP address pool from some other port, the system will prompt to cancel the static ARP setting. 3-1
11 Chapter 3 Access Management Configuration Commands # Enable the access management function. [Quidway] am enable am isolate am isolate interface-list undo am isolate interface-list Ethernet port view interface-list: Specifies a list of ports isolated from the specified port in the { { interface_type interface_num interface_name } [ to { interface_type interface_num interface_name } ] } &<1-10> format. interface_name: Specified the port name, represented with interface_name= interface_type interface_num. interface_type is port type and interface_num is port number. For details about interface_type, interface_num and interface_name, refer to the Port Command Manual. &<1-10> indicates the preceding parameter can be input up to 10 times. Using am isolate command, you can configure Layer 2 isolation on a port so as to prevent the packets from being forwarded on Layer 2 between the specified port and some other port (group). Using undo am isolate command, you can cancel the Layer 2 isolation on the port. By default, The isolation port pool is null and the packets are allowed to be forwarded between the specified port and all other ports on Layer 2. The port isolation is bidirectional. Isolating the port itself does not make any sense. # Isolate Ethernet0/1 from Ethernet0/2, and Ethernet0/4 through Ethernet0/7. [Quidway-Ethernet0/1] am isolate ethernet0/2 ethernet 0/4 to ethernet 0/7 3-2
12 Chapter 3 Access Management Configuration Commands am trap enable am trap enable undo am trap enable System view none Using am trap enable command, you can enable the access management trap function. Using undo am trap enable command, you can disable the access management trap function. By default, The access management trap disabled. # Enable the access management trap. [Quidway] am trap enable am user-bind am user-bind { interface { interface-name interface-type interface-num } { mac-addr mac ip-addr ip }* mac-addr mac { interface { interface-name interface-type interface-num } ip-addr ip }* ip-addr ip { interface { interface-name interface-type interface-num } mac-addr mac }* } undo am user-bind { interface { interface-name interface-type interface-num } { mac-addr mac ip-addr ip }* mac-addr mac { interface { interface-name interface-type interface-num } ip-addr ip }* ip-addr ip { interface { interface-name interface-type interface-num } mac-addr mac }* } System view 3-3
13 Chapter 3 Access Management Configuration Commands interface-name: Specifies the port name in the interface-name= interface-type interface-num format. interface-type: Specifies the port type. interface-num: Specifies the port number. For parameter description, refer to the interface command. mac: MAC address. ip: IP address. Using am user-bind command, you can bind port, IP address and MAC address. Using undo am user-bind command, you can remove the binding of port, IP address and MAC address binding. Note that: One MAC address or one IP address cannot be bound more than once. The maximum binding number is 128. Do not perform Port+IP+MAC and Port+IP on the same port. S3026E switch supports this configuration in S3000 series switches. # Bind port Ethernet0/1 and IP address [Quidway] am user-bind interface ethenet0/1 ip-addr display am display am [ interface-list ] Any view interface-list: Specifies a list of ports isolated from the specified port in the { { interface_type interface_num interface_name } [ to { interface_type interface_num interface_name } ] } &<1-10> format. interface_name: Specified the port name, represented with interface_name= interface_type interface_num. interface_type is port type and interface_num is port number. For details about interface_type, interface_num 3-4
14 Chapter 3 Access Management Configuration Commands and interface_name, refer to the Port Command Manual. &<1-10> indicates the preceding parameter can be input up to 10 times. Using display am command, you can view the current access management configurations on part or all of the ports. # Display the access management configurations on Ethernet0/1 and Ethernet0/2. <Quidway> display am ethernet0/1 ethernet0/2 Ethernet0/1 Status : disabled IP Pools : (NULL) Isolate Ports: Ethernet0/2 Ethernet0/2 Status : disabled IP Pools : (NULL) Isolate Ports: Ethernet0/1 Table 3-1 of information generated by the command display am Field Ethernet Status IP Pools Isolate Ports Port to be displayed AM state on the port: enabled or disabled IP pools. NULL represents no configuration. Each IP address section is represented in X.X.X.X (number), of these, X.X.X.X represents the first address, and number represents that number consecutive IP addresses from the beginning of this address are within the IP pools Isolate ports. NULL represents no configuration display am user-bind display am user-bind [ interface { interface-name interface-type interface-num } mac-addr mac ip-addr ip ] Any view 3-5
15 Chapter 3 Access Management Configuration Commands interface-name: Specifies the port name in the interface-name= interface-type interface-num format. interface-type: Specifies the port type. interface-num: Specifies the port number. For parameter description, refer to the interface command. mac: MAC address. ip: IP address. Using display am user-bind command, you can view Port, IP address and MAC address binding information. Note that S3026E switch supports this configuration in S3000 series switches. # Display binding information of Ethernet0/1 port. <Quidway> display am user-bind interface ethernet0/1 Mac IP Port NULL Ethernet0/1 3-6
16 Chapter 4 IP Performance Configuration Commands Chapter 4 IP Performance Configuration Commands 4.1 IP Performance Configuration Commands display fib display fib Any view none Using display fib command, you can view the summary of the Forwarding Information Base. The information includes: destination address/mask length, next hop, current flag and outbound interface. # Display the summary of the Forwarding Information Base. <Quidway> display fib Destination/Mask Nexthop Flag Interface / D InLoopBack display icmp statistics display icmp statistics 4-1
17 Chapter 4 IP Performance Configuration Commands Any view none Using display icmp statistics command, you can view the statistics information about ICMP packets. For the related command, see display ip interface vlan-interface, reset ip statistics. # statistics about ICMP packets. <Quidway> display icmp statistics Input: bad formats 0 bad checksum 0 echo 5 destination unreachable 0 source quench 0 redirects 0 echo reply 10 parameter problem 0 timestamp 0 information request 0 mask requests 0 mask replies 0 time exceeded 0 Output:echo 10 destination unreachable 0 source quench 0 redirects 0 echo reply 5 parameter problem 0 timestamp 0 information reply 0 mask requests 0 mask replies 0 time exceeded 0 Table 4-1 of the output information of the display icmp statistics command Field Input: bad formats bad checksum echo destination unreachable source quench redirects echo reply Number of input packets in bad format Number of input packets with wrong checksum Number of input/output echo request packets Number of input/output packets with unreachable destination Number of input/output source quench packets Number of input/output redirected packets Number of input/output echo reply packets 4-2
18 Chapter 4 IP Performance Configuration Commands Field parameter problem timestamp information request mask requests mask replies information reply time exceeded Number of input/output packets with parameter problem Number of input/output timestamp packets Number of input information request packets Number of input/output mask request packets Number of input/output mask reply packets Number of output information reply packets Number of time exceeded packets display ip socket display ip socket [ socktype sock-type ] [ task-id socket-id ] Any view sock-type: The type of a socket: (tcp:1, udp 2, raw ip 3). task-id: The ID of a task, with the value ranging from 1 to 100. socket-id: The ID of a socket, with the value ranging from 0 to Using the display ip socket command, you can display the information about the sockets in the current system. # Display the information about the socket of TCP type. <Quidway> display ip socket socktype 1 SOCK_STREAM: Task = VTYD(18), socketid = 1, Proto = 6, LA = :23, FA = :0, sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0, socket option = SO_ACCEPTCONN SO_KEEPALIVE SO_SENDVPNID SO_SETKEEPALIVE, 4-3
19 Chapter 4 IP Performance Configuration Commands socket state = SS_PRIV SS_ASYNC Task = VTYD(18), socketid = 2, Proto = 6, LA = :23, FA = :1161, sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0, socket option = SO_KEEPALIVE SO_OOBINLINE SO_SENDVPNID SO_SETKEEPALIVE, socket state = SS_ISCONNECTED SS_PRIV SS_ASYNC Task = VTYD(18), socketid = 3, Proto = 6, LA = :23, FA = :1121, sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0, socket option = SO_KEEPALIVE SO_OOBINLINE SO_SENDVPNID SO_SETKEEPALIVE, socket state = SS_ISCONNECTED SS_PRIV SS_ASYNC Table 4-2 Output description of the display ip socket display Field SOCK_STREAM Task socketid Proto sndbuf rcvbuf sb_cc rb_cc socket option socket state The socket type The ID of a task The ID of a socket The protocol number used by the socket The sending buffer size of the socket The receiving buffer size of the socket The current data size in the sending buffer. The value makes sense only for the socket of TCP type, because only TCP is able to cache data The current data size in the receiving buffer The option of the socket The state of the socket display ip statistics display ip statistics Any view 4-4
20 Chapter 4 IP Performance Configuration Commands none Using display ip statistics command, you can view the statistics information about IP packets. For the related command, see display ip interface vlan-interface, reset ip statistics. # statistics about IP packets. <Quidway> display ip statistics Input: sum 7120 local 112 bad protocol 0 bad format 0 bad checksum 0 bad options 0 Output: forwarding 0 local 27 dropped 0 no route 2 compress fails 0 Fragment:input 0 output 0 dropped 0 fragmented 0 couldn't fragment 0 Reassembling:sum 0 timeouts 0 Table 4-3 of the output information of the display ip statistics command Field Input: sum local bad protocol bad format bad checksum bad options Output: forwarding local dropped no route compress fails Fragment: input Sum of input packets Number of received packets whose destination is the local device Number of packets with wrong protocol number Number of packets in bad format Number of packets with wrong checksum Number of packets that has wrong options Number of forwarded packets Number of packets that are sent by the local device Number of dropped packets during transmission Number of packets that cannot be routed Number of packets that cannot be compressed Number of input fragments 4-5
21 Chapter 4 IP Performance Configuration Commands Field output dropped fragmented couldn't fragment Reassembling: sum timeouts Number of output fragments Number of dropped fragments Number of packets that are fragmented Number of packets that cannot be fragmented Number of packets that are reassembled Number of packets that time out display tcp statistics display tcp statistics Any view none Using display tcp statistics command, you can view the statistics information about TCP packets. The statistics information about TCP packets are divided into two major kinds which are Received packets and Sent packets. And each kind of packets are further divided into different kinds such as window probe packets, window update packets, duplicate packets, and out-of-order packets. Some statistics information that is closely related to TCP connection, such as window probe packets, window update packets, and data packets retransmitted is also displayed. All these displayed information are measured in packet. For the related commands, see display tcp status, reset tcp statistics. # statistics about TCP packets. [Quidway]display tcp statistics 4-6
22 Chapter 4 IP Performance Configuration Commands Received packets: Total: 753 packets in sequence: 412 (11032 bytes) window probe packets: 0, window update packets: 0 checksum error: 0, offset error: 0, short error: 0 duplicate packets: 4 (88 bytes), partially duplicate packets: 5 (7 bytes) out-of-order packets: 0 (0 bytes) packets of data after window: 0 (0 bytes) packets received after close: 0 ACK packets: 481 (8776 bytes) duplicate ACK packets: 7, too much ACK packets: 0 Sent packets: Total: 665 urgent packets: 0 control packets: 5 (including 1 RST) window probe packets: 0, window update packets: 2 data packets: 618 (8770 bytes) data packets retransmitted: 0 (0 bytes) ACK-only packets: 40 (28 delayed) Retransmitted timeout: 0, connections dropped in retransmitted timeout: 0 Keepalive timeout: 0, keepalive probe: 0, keepalive timeout, so connections disc onnected : 0 Initiated connections: 0, accepted connections: 0, established connections: 0 Closed connections: 0 (dropped: 0, initiated dropped: 0) display tcp status display tcp status Any view none 4-7
23 Chapter 4 IP Performance Configuration Commands Using display tcp status command, you can view the TCP connection state. # Display the state of all TCP connections. <Quidway> display tcp status TCPCB Local Add:port Foreign Add:port State 03e37dc : :0 Listening : :65508 EstablishedOutput description of the display tcp status display Field Local Add: port Foreign Add: port State Local IP address: local port Remote IP address; remote port State of the TCP link reset ip statistics reset ip statistics User view none Using reset ip statistics command, you can reset the IP statistics information. For the related commands, see display ip interface vlan-interface, display ip statistics. # Reset the IP statistics information. 4-8
24 Chapter 4 IP Performance Configuration Commands <Quidway> reset ip statistics reset tcp statistics reset tcp statistics User view none Using reset tcp statistics command, you can reset the TCP statistics information. For the related command, see display tcp statistics. # Reset the TCP statistics information. <Quidway> reset tcp statistics tcp timer fin-timeout tcp timer fin-timeout time-value undo tcp timer fin-timeout System view time-value: TCP finwait timer value in second, with the value ranging from 76 to 3600; By default, 675 seconds. 4-9
25 Chapter 4 IP Performance Configuration Commands Using tcp timer fin-timeout command, you can configure the TCP finwait timer. Using undo tcp timer fin-timeout command, you can restore the default value of the TCP finwait timer. When the TCP connection state changes from FIN_WATI_1 to FIN_WAIT_2, the finwait timer is enabled. If the switch does not receive FIN packet before finwait timer timeouts, the TCP connection will be terminated. For the related command, see tcp timer syn-timeout, tcp window. # Configure the TCP finwait timer value as 800 seconds. [Quidway] tcp timer fin-timeout tcp timer syn-timeout tcp timer syn-timeout time-value undo tcp timer syn-timeout System view time-value: TCP synwait timer value measured in second, whose value ranges from 2 to 600. The default time-value is75 seconds. Using tcp timer syn-timeout command, you can configure the TCP synwait timer. Using undo tcp timer syn-timeout command, you can restore the default value of the timer. TCP will enable the synwait timer, if a SYN packet is sent. The TCP connection will be terminated If the response packet is not received. For the related command, see tcp timer fin-timeout, tcp window. 4-10
26 Chapter 4 IP Performance Configuration Commands # Configure the TCP synwait timer value as 80 seconds. [Quidway] tcp timer syn-timeout tcp window tcp window window-size undo tcp window System view window-size: The size of the transmission and receiving buffers measured in kilobytes (KB), whose value ranges from 1 to 32. By default, the window-size is 4KB. Using tcp window command, you can configure the size of the transmission and receiving buffers of the connection-oriented Socket. Using undo tcp window command, you can restore the default size of the buffer. For the related command, see tcp timer fin-timeout, tcp timer syn-timeout. # Configure the size of the transmission and receiving buffers as 3KB. [Quidway] tcp window
HP 5120 SI Switch Series
HP 5120 SI Switch Series Layer 3 - IP Services Command Reference Part number: 5998-1810 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright 2012 Hewlett-Packard
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Chapter 11 Network Address Translation
Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Hands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
HP 5820X & 5800 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract
HP 5820X & 5800 Switch Series Layer 3 - IP Services Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
Configuring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Understanding and Configuring NAT Tech Note PAN-OS 4.1
Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Chapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
MAC Address Table Attribute Configuration
Table of Contents Table of Contents Chapter 1 Configuring MAC Address Attribute... 1 1.1 MAC Address Configuration Task List... 1 1.2 MAC Address Configuration Task... 1 1.2.1 Configuring Static Mac Address...
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software
Monitoring and Analyzing Switch Operation
B Monitoring and Analyzing Switch Operation Contents Overview..................................................... B-3....................................... B-4 Menu Access To Status and Counters.........................
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Application Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
Introduction to IP networking
DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture
Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs
How To Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs Introduction In a large network where internal users cannot be trusted, it is nearly impossible to stop a host from
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Internet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
Configuring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside
H3C MSR Series Routers
H3C MSR Series Routers Layer 3 - IP Services Configuration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320 Copyright
Configuring the Switch IP Address and Default Gateway
CHAPTER 3 Configuring the Switch IP Address and Default Gateway This chapter describes how to configure the IP address, subnet mask, and default gateway on the Catalyst enterprise LAN switches. Note For
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Vanguard Applications Ware IP and LAN Feature Protocols. Firewall
Vanguard Applications Ware IP and LAN Feature Protocols Firewall Notice 2008 Vanguard Networks. 25 Forbes Boulevard Foxboro, Massachusetts 02035 Phone: (508) 964-6200 Fax: 508-543-0237 All rights reserved
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
Chapter 25 DHCP Snooping
Chapter 25 DHCP Snooping Introduction...25-2 The Binding Database... 25-2 DHCP Filtering... 25-4 DHCP Option 82... 25-4 DHCP Snooping ARP Security... 25-5 Configuration Examples...25-5 Command Reference...25-6
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Terminal Server Configuration and Reference Errata
Doc. No. 78-0944-06A0 June 14, 1993 Terminal Server Configuration and Reference Errata This document supplies corrections and additional informaiton for the 9.0 version of the Cisco publication Terminal
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
Chapter 3 Using Access Control Lists (ACLs)
Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008
Configuring Network Security with ACLs
CHAPTER 46 This chapter describes how to use access control lists (ACLs) to configure network security on the Catalyst 4500 series switches. The Catalyst 4500 series switch supports time-based ACLs. For
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
HOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
Junos OS Support for OpenFlow v1.0 Beta Draft
Junos OS Support for OpenFlow v1.0 Beta Draft Published: 2012-12-20 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes
Configuring NetFlow-lite
CHAPTER 55 Note NetFlow-lite is only supported on Catalyst 4948E Ethernet Switch. This chapter describes how to configure NetFlow-lite on the Catalyst 4948E switch. NetFlow-lite provides traffic monitoring
IP Filter/Firewall Setup
IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from
Network Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
Firewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
IOS Server Load Balancing
IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported
Innominate mguard Version 6
Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
1000 CCNA Certification Exam Preparation Questions and Answers:
1000 CCNA Certification Exam Preparation Questions and Answers: One Thousand Practice Questions for Passing the CCNA Exams - Pass On Your First Try 1 Copyright 2009 Notice of rights All rights reserved.
DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.
Advanced TCP/IP Overview There is one primary set of protocols that runs networks and the Internet today. In this lesson, you will work with those protocols: the Transmission Control Protocol (TCP) and
Troubleshooting IP Routing
C H A P T E R 7 Troubleshooting IP Routing This troubleshooting chapter has several goals. First, it explains several tools and functions not covered in Chapters 4 through 6 specifically, tools that can
Laboratorio 3 Comunicación sincrónica Vía Satélite
Laboratorio 3 Comunicación sincrónica Vía Satélite Esquema de la Red WAN 192.168.0.0 /30 192.168.0.1 Router 1 Router 2 10.0.1.1 192.168.0.1 10.0.2.1 Ethernet Ethernet 10.0.1.20 LAN 1 10.0.1.0 /24 LAN 2
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
Understanding Layer 2, 3, and 4 Protocols
2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new
Chapter 3 Configuring Basic IPv6 Connectivity
Chapter 3 Configuring Basic IPv6 Connectivity This chapter explains how to get a ProCurve Routing Switch that supports IPv6 up and running. To configure basic IPv6 connectivity, you must do the following:
