SlideShare una empresa de Scribd logo
1 de 49
SIX WEEKS INDUSTRIAL TRAINING
               REPORT
                         On
                        “CCNA”




                     Submitted to




 Guided by                          Submitted by
Mr. Barinder Singh


     DEPARTMENT OF ELECTRONICS AND COMMUNICATION
                      ENGINEERING
     RIMT-INSTITUTE OF ENGINEERING AND TECHNOLOGY
                MANDI GOBINDGARH-147301
ACKNOWLEDGEMENT




While presenting this report I would like to express my deep sense of gratitude to entire

NETMAX staff that were indispensable part of my training giving me unending guidance,

inspiration, encouragement and providing me excellent environment throughout my training at

NETMAX TECHNOLOGIES. The training was an extremely productive & enriching

experience, not only technically but also from providing some practical skills.

I am extremely thankful to Mr.Barinder Singh who had devoted a lot of time in guiding and

supervising me during my training.

I must place my gratitude towards Prof. Rajneesh Talwar (H.O.D. of E.C.E. Dept.) for their

valuable advice and guidance in carrying out this enjoyable and productive experience, which

provided me a great opportunity to search new horizons.



                                                                    Ashima Malhotra
PREFACE


Technology has rapidly grown in past two-three decades. An engineer without practical
knowledge and skills cannot survive in this technical era. Theoretical knowledge does matter but
it is the practical knowledge that is the difference between the best and the better. Organizations
also prefer experienced engineers than fresher ones due to practical knowledge and industrial
exposure of the former. The practical training is highly conductive for solid foundation for:-




    1. Knowledge and personality

    2. Exposure to industrial environment.

    3. Confidence building.

     4. Enhancement of creativity.
TABLE OF CONTENTS



Sr. No.                   DESCRIPTION

   1.     COMPANY PROFILE


   2.     INTRODUCTION TO CCNA


   3.     BASIC


   4.     IP ADDRESS V4


   5.     IP ROUTING


   6.     LAN SWITCHING


   7.     ACL


   8.     NAT


   9.     PROJECT


  10.     REFERCENCES
INTRODUCTION
COMPANY PROFILE

NETMAX TECHNOLOGIES as an organization is established in 2001 in the field of Network
Support, Network training, Software training and Embedded systems.
In Education, we have strategic alliance with Pearson VUE and Prometric. We are authorized
Testing Partner of REDHAT & CISCO. We are also NOVELL EDUCATION PARTNER with
which we provide NOVELL and SUSE LINUX courses. NetMax Technologies also conduct
courses in CADENCE based design tools.

NETMAX TECHNOLOGIES also provide Technical Research & Development support and
consultancy to some electronics companies.
Our clients for R&D support in field of embedded systems:
   • Recorders and Medicare Ltd Chandigarh.

   •   TELEBOX India Ltd.

   •   Lotus Machines Pvt. Ltd. Chandigarh.

   •   Impearl Electronics Pvt. Ltd. Chandigarh.

   •   KANTA Electrical Ltd. Mohali.

The partial list of our client for network field is as below:
   • CEDTI, Mohali

   •   Premier ISP, Chandigarh

   •   Innovative solutions, Chandigarh

   •   Emmtel ISP, Chandigarh

   •   NIPER, Mohali

   •   Navik Technologies, Chandigarh

   •   Software Technology Parks India, Mohali

   •   Glide Internet Services
•   Rana Group

   •   IDS

   •   HFCL Infotel Ltd.

   •   Targus Technologies Pvt Ltd

   •   STPI, Mohali

   •   BBMB

   •   The Tribune

   •   Ind Swift


OUR TEAM

We are a strong technical team of certified professionals for catering to these solutions and have
presence in Chandigarh and Punjab. We have skilled team of engineers who are experienced in
design, programming. We are having more than 15 engineers who are having prestigious
certifications like CCNA, CCNP, CCSP, CCSA, MCSE, RHCE,C++,C,JAVA & PhP, MySql
Programming.

Support Area (network solutions):
   • LINUX / UNIX networks

   •   SUN networks

   •   CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc)

   •   Bandwidth Manager software and hardware

   •   Radio Links

   •   Security Solutions

 NETMAX TECHNOLOGIES provide the following Courses in IT & Embedded Systems given
below:

Network Training:
   • CISCO CCNA, CCNP

   •   RED HAT LINUX 5

   •   WINDOWS 2000, 2003 (MCP,MCSA & MCSE)
•   MCITP 2008.

Software Training:
   • C++

   •   C

   •   JAVA ( CORE JAVA & ADVANCE JAVA)

   •   ASP.NET

   •   PHP My sql Programming.


           We provide Technical support and consultancy to electronics companies in the field
of Embedded micro controllers like 8 bit and 16 bit family based embedded system design,
analog systems design(including signal conditioning circuits, filter design, etc) ,precision signal
amplifier design for applications like ECG, low power design, precision temperature
measurement etc .Power electronics including dc/dc converters, ac/dc converters,thyristor firing
based circuit, battery charging and monitor circuits etc. Application of Embedded systems and
analog control systems in industrial as well as home automation.
Our core strengths are our commitment, technical expertise and cost effective solutions.
We ensure high service levels and prompt support availability leading to lower downtime.

NETMAX TECHNOLOGIES is a leader in education services and developer of innovative
embedded solutions. To meet the demands of Post PC era, NeTmax provides complete solutions
as well as design-to-order services to satisfy our customers.

NETMAX TECHNOLOGIES:

   •   BARINDER SINGH, 9914713373

   •   HARPREET SINGH, 9814900118


HEAD OFFICE:

NETMAX TECHNOLOGIES, SCO 58-59, Sector 34A, Chandigarh.
0172-4644644

Branch Office:

NETMAX TECHNOLOGIES, SCO 52 2ND FLOOR LEELA BHAWAN PATIALA.
0175- 5018351,9914713373, 9814900118.
INTRODUCTION TO CCNA



What is Network?

In one network more than one computer connected with each other through centralized device.
They can share files and resources with each other.
LAN
         LAN stands for Local Area Network. The scope of the LAN is within one building, one
school or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each
computer sense the carrier before sending the data over the n/w. if carrier is free then you can
transmit otherwise you have to wait or you have to listen. In multiple access each computer have
right that they can access each other. If two computers sense the carrier on same time then the
collision occur. Each computer, in the network, aware about the collision. Now this stop
transmitting and they will use back off algorithm. In which random number is generated. This
number or algorithm is used by each computer. Who has short number or small number, he has
first priority to transmit the data over the network and other computers will wait for their turn.


WAN
         WAN stands for Wide Area Network, in which two local area networks are connected
through public n/w. it may be through telecommunication infrastructure or dedicated lines. For
e.g: - ISDN lines, Leased lines etc.
         In which we can use WAN devices and WAN technology. You can also connect with
your remote area through existing Internetwork called Internet.


MAN
        MAN stands for Metropolitan Area Network . When the number of computer and the
area covered by computer crosses a cretain limit, we have to create a larger network that is an
extension to local area networks. This type of large network is called metropolitan area
networks(MAN). MAN is an estension of local area networks that can connet coputers placed in
an entire city. The MAN can be created as a single network such as a cable network, covering
entire city or a group of serval Local Area Networks. This way, resources can be shared form
LAN to LAN and form computer to computer also.
        Metropolitan Area Network are mainly owned by lrge organization to interconnect all
their branches across a city
BASIC
DEVICES
Hub
       Hub is centralized device, which is used to connect multiple workstations. There are two
types of Hub: -
(i) Active Hub
(ii) Passive Hub

        it has no special kind of memory. It simply receives the frame (data) and forwards it to all
its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one
collision domain and one broadcast domain. In case of hub, the media access method is used
CSMA/CD (Carrier Sense Multiple Access/Collision Detection).


(i) Active Hub
     In Active hub, it receives the frame regenerate and then forward to all its nodes.

(ii) Passive Hub
     In Passive hub, it simply receives the frame and forward to all its connected nodes.

        You cannot perform LAN segmentation using hub.

Switch
        Switch is also used to connect multiple workstations. Switch is more intelligent than hub.
It has special kind of memory called mac address/filter/lookup table. Switch reads mac
addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it
reads the destination mac address and consult with its filter table. If he has entry in its filter table
then he forwards the frame to that particular mac address, if not found then it performs
broadcasting to all its connected nodes.
        Every port has its own buffer memory. A port has two queues one is input queue and
second is output queue. When switch receives the frame, the frame is received in input queue and
forward from output queue. So in case of switch there is no chance or place for collisions. In case
of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision
Avoidance). Switches provide more efficiency, more speed and security.
There are two types of switches: -
(i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.
We can perform LAN segmentation by using switches.
Bridge
        Bridge is a hardware device, which is used to provide LAN segmentation means it is used
for break the collision domain. It has same functionality as performed by switch. We can use
bridge between two different topologies. It has fewer ports. Each port has a own buffer memory.
It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter
table. In case of bridge there is one broadcast domain.


Router
       Router is hardware device, which is used to communicate two different networks. Router
performs routing and path determination. It does not perform broadcast information. There are
two types of routers: -
(i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and remote access. This feature is
offered by Microsoft. This feature is by default installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient.
But in case of software routers, it has less features, slow performance. They are not very much
efficient.


Lan Card
        Lan card is media access device. Lan card provide us connectivity in the network. There
is a RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is
another led which is also called heartbeat of Lan card. When any activity occur it may be
receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan
card.


LAN TOPOLOGIES

BUS Topology
       Cable Type            – Coaxial
       Connector Type         – BNC (Bayonet Neill-Concelman), T type, Terminator
       Coaxial – Thick        --Maximum length – 500 meters
                               N/w devices 100
       Coaxial – Thin          --Maximum length – 185 meters
STAR Topology
    Cable type     - UTP
    Connector type - RJ45
    Maximum Length – 100 meters (with proper color coding)
UTP (Unshielded Twisted Pair)




STP (Shielded Twisted Pair)




In case of hub media access method will be CSMA/CD.




RING Topology
       Cable - UTP




There is token ring method used, so there is no collision chance.
Ethernet Family

Speed                  Base band
10                     Base 2             200-meter        Coaxial cable
10                     Base 5             500-meter        Thick Coaxial cable
10                     Base T             100 meter        Twisted Pair (UTP)
10/100(present)        Base TX             100 meter       UTP
100                    Base T4             100 meter       UTP 4 Pairs used
100                    Base FX              up to 4 kms     Fiber Optic
1000(Server)           Base TX             100 meter       UTP
1000                   Base FX              up to 10 kms    Fiber Optic
10000                  Base FX              Fiber Optic



Color
Green – Green white
Orange – Orange white
Blue    – Blue white
Brown – Brown white
Green cable has maximum twists.




Pin Configuration


    Cross                              Straight
1             3                    1              1
2             6                    2              2
3             1                    3              3
6             2                    6              6
Straight Cable
1    Orange white -    Orange white
2    Orange        -   Orange
3    Green white   -   Green white
4    Blue          -   Blue
5    Blue white    -   Blue white
6    Green         -   Green
7    Brown white -     Brown white
8    Brown         -   Brown


     Cross Cable
1    Orange white -    Green white
2    Orange        -   Green
3    Green white   -   Orange white
4    Blue          -   Blue
5    Blue white    -   Blue white
6    Green         -   Orange
7    Brown white -     Brown white
8    Brown         -   Brown




RJ45 Connector
OSI (Open Systems Interconnection) Model

    OSI model is the layer approach to design, develop and implement network. OSI provides
following advantages: -
    •      Designing of network will be standard base.
    •      Development of new technology will be faster.
    •      Devices from multiple vendors can communicate with each other.
    •      Implementation and troubleshooting of network will be easy.

    (1) Application Layer: -
              Application layer accepts data and forward into the protocol stack. It creates user
             interface between application software and protocol stack.

    (2) Presentation Layer: -
              This layer decides presentation format of the data. It also able to performs other
             function like compression/decompression and encryption/decryption

    (3) Session Layer: -
              This layer initiate, maintain and terminate sessions between different applications.
              Due to this layer multiple application software can be executed at the same time.

    (4) Transport Layer: -
             Transport layer is responsible for connection oriented and connection less
             communication. Transport layer also performs other functions like
           .   Error checking
           •   Flow Control
                      Buffering
                      Windowing
                      Multiplexing
           •   Sequencing
           •   Positive Acknowledgement
           •   Response

     (5) Network Layer

               This layer performs function like logical addressing and path determination. Each
               networking device has a physical address that is MAC address. But logical
               addressing is easier to communicate on large size network.
Logical addressing defines network address and host address. This type of
              addressing is used to simplify implementation of large network. Some examples
              of logical addressing are: - IP addresses, IPX addresses etc.


      (6) Data Link Layer

            The functions of Data Link layer are divided into two sub layers
            • Logical Link Control
            • Media Access Control

          Logical Link Control defines the encapsulation that will be used by the NIC to
          delivered data to destination. Some examples of Logical Link Control are ARPA
          (Ethernet), 802.11 wi-fi.
          Media Access Control defines methods to access the shared media and establish the
          identity with the help of MAC address. Some examples of Media Access Control are
          CSMA/CD, Token Passing.

       (7) Physical Layer

              Physical Layer is responsible to communicate bits over the media this layer deals
              with the standard defined for media and signals. This layer may also perform
              modulation and demodulation as required.




Router Architecture

LAN

Processor

I/O Controller

WAN

Memory Controller

RAM

BIOS ROM
Flash RAM O/S

Incomplete IOS

NVRAM

IOS

Startup Configuration

Non-Volatile RAM


Router Access Modes
      When we access router command prompt the router will display different modes.
According to the modes, privileges and rights are assigned to the user.

User mode
       In this mode, we can display basic parameter and status of the router we can test
connectivity and perform telnet to other devices. In this mode we are not enable to manage &
configure router.

Privileged mode
       In this mode, we can display all information, configuration, perform administration task,
debugging, testing and connectivity with other devices. We are not able to perform here
configuration editing of the router.
       The command to enter in this mode is ‘enable’. We have to enter enable password or
enable secret password to enter in this mode. Enable secret has more priority than enable
password. If both passwords are configured then only enable secret will work.

Global configuration
        This mode is used for the configuration of global parameters in the router. Global
parameters applied to the entire router.
For e.g: - router hostname or access list of router
The command enter in this mode is ‘configure terminal’.

Line configuration mode
         This mode is used to configure lines like console, vty and auxiliary. There are main types
of line that are configured.
(i) Console
   router(config)#line console 0
(ii) Auxiliary
     router(config)#line aux 0
(iii) Telnet or vty
    router(config)#line vty 0 4


Interface configuration mode
       This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc.

 Router(config)#interface <type> <number>
 Router(config)#interface serial 1

Routing configuration mode
       This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.

 Router(config)#router <protocol> [<option>]
 Router(config)#router rip
 Router(config)#router eigrp 10
Configuring Password
       There are five types of password available in a router

(1) Console Password
      router#configure terminal
      router(config)#line console 0
      router(config-line)#password <word>
      router(config-line)#login
      router(config-line)#exit

   to erase password do all steps with no command.

(2) Vty Password
       router>enable
       router#configure terminal
       router(config)#line vty 0 4
       router(config-line)#password <word>
       router(config-line)#login
       router(config-line)#exit

(3) Auxiliary Password
      router#configure terminal
      router(config)#line Aux 0
      router(config-line)#password <word>
      router(config-line)#login
      router(config-line)#exit
(4) Enable Password
      router>enable
      router#configure terminal
      router(config)#enable password <word>
      router(config)#exit


(5) Enable Secret Password
       Enable Password is the clear text password.

      Router>enable
      Router#configure terminal
      Router(config)#enable secret <word>
      Router(config)#exit


Encryption all passwords
        All passwords other than enable secret password are clear text password. We can encrypt
all passwords using level 7 algorithm. The command to encrypt all password are

    Router#configure terminal
    Router(config)#service password-encryption
Managing Configuration
        There are two types of configuration present in a router
(1) Startup Configuration
(2) Running Configuration

(1) Startup configuration is stored in the NVRAM. Startup configuration is used to save
settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM.
(2) Running Configuration is present in the Primary RAM wherever we run a command for
configuration, this command is written in the running configuration.


To save configuration
   Router#copy running-configuration startup-configuration
   Or
   Router#write

To display running-configuration
   Router#show running-configuratio
To display startup configuration
   Router#show startup-configuration


To erase old configuration
   Router#erase startup-configuration

Configuring HostName
   Router#configure terminal
   Router#hostname <name>
   <name>#exit or end or /z

Configuration Interfaces
        Interfaces configuration is one of the most important part of the router configuration. By
default, all interfaces of Cisco router are in disabled mode. We have to use different commands
as our requirement to enable and configure the interface.

Configuring IP, Mask and Enabling the Interface
   Router#configure terminal
   Router(config)#interface <type> <no>
   Router(config-if)#ip address <ip> <mask>
   Router(config-if)#no shutdown
   Router(config-if)#exit

To configure Interface description
   Router#configure terminal
   Router(config)#interface <type> <no>
   Router(config-if)#description <line>

To display interface status
   Router#show interfaces (to show all interfaces)
   Router#show interface <type> <no>

   This command will display following parameters about an interface
   •      Status
   •      Mac address
   •      IP address
   •      Subnet mask
   •      Hardware type / manufacturer
   •      Bandwidth
   •      Reliability
   •      Delay
   •      Load ( Tx load Rx load)
•       Encapsulation
   •       ARP type (if applicable)
   •       Keep alive

Configuring secondary IP
   Router#config terminal
   Router(config)#interface <type> <no>
   Router(config-if)#IP address 192.168.10.5 255.255.255.0
   Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary
   Router(config-if)#no shutdown (to enable the interface because they always shutdown)
   Router(config-if)#exit
   Router#show run (to display secondary IP)

To display commands present in history
   Router#show history

To display history size
   Router#show terminal

Configuring Banners
       Banners are just a message that can appear at different prompts according to the type.
Different banners are: -

Message of the day (motd)
      This banner appear at every access method
IP ADDRESS V4

        IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has
two parts one is network address and second is host address. in local area network, we can used
private IP address, which is provided by IANA (Internet Assigning Numbering Authority). IP
addresses are divided into five classes.


Class Range          N/w bits Host bits        Subnet mask           Total IP     Valid IP
A        1 – 126       8           24          255.0.0.0         16777216       16777214
B        128 – 191    16           16          255.255.0.0           65536      65534
C        192 – 223    24           8           255.255.255.0         256        254
D        224 – 239     it is reserved for multicast.
E        240 – 255     it is reserved for research/scientific use.


We can use first three classes. IANA provides private IP addresses from first three classes.


Class       Private IP Range
A           10.0.0.0 – 10.255.255.255
B           172.16.0.0 – 172.31.255.255
C           192.168.0.0 – 192.168.255.255


Subnet Mask
      Subnet mask is also 32-bit address, which tell us how many bits are used for network and
how many bits are used for host address.
         In Subnet mask Network bits are always 1 and Host bits are always 0.
         IP Addresses invalid or reserve IP Addresses
         When we are going to assign IP addresses to our computers then we have to follow some
rules.
Rules: -
    (1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is
reserved for router.
    (2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that
network (10th network).
    (3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing.
Default routing is used in case of Stub n/w (means our network has one exit point).
    (4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
    (5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
    C:>ipconfig
    C:>ipconfig/all
 It shows all detail.
IP ROUTING

    When we want to connect two or more networks using different n/w addresses then we have
to use IP Routing technique. The router will be used to perform routing between the networks. A
router will perform following functions for routing.
    • Path determination
    • Packet forwarding

(1) Path determination
     The process of obtaining path in routing table is called path determination. There are three
different methods to which router can learn path.
     i) Automatic detection of directly connected n/w.
    ii) Static & Default routing
   iii) Dynamic routing

(2) Packet forwarding
    It is a process that is by default enable in router. The router will perform packet forwarding
only if route is available in the routing table.

Static Routing
        In this routing, we have to use IP route commands through which we can specify routes
for different networks. The administrator will analyze whole internetwork topology and then
specify the route for each n/w that is not directly connected to the router.
Steps to perform static routing
   (1) Create a list of all n/w present in internetwork.
   (2) Remove the n/w address from list, which is directly connected to n/w.
   (3) Specify each route for each routing n/w by using IP route command.

   Router(config)#ip route <destination n/w> <mask> <next hop ip>

   Next hop IP it is the IP address of neighbor router that is directly connected our router.

Static Routing Example: -
   Router#conf ter
   Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2

Advantages of static routing
   (1) Fast and efficient.
   (2) More control over selected path.
   (3) Less overhead for router.
Disadvantages of static routing
   (1) More overheads on administrator.
   (2) Load balancing is not easily possible.
   (3) In case of topology change routing table has to be change manually.

Alternate command to specify static route
   Static route can also specify in following syntax: -
   Old
   Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2
   Or
   Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0



Default Routing
       Default routing means a route for any n/w. these routes are specify with the help of
following syntax: -
Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>
                                              Or
                                      <exit interface>

To display routing table
   Router#sh ip route


To check all the interface of a router
   Router#sh interface brief


Dynamic Routing
         In dynamic routing, we will enable a routing protocol on router. This protocol will send
its routing information to the neighbor router. The neighbors will analyze the information and
write new routes to the routing table.
         The routers will pass routing information receive from one router to other router also. If
there are more than one path available then routes are compared and best path is selected. Some
examples of dynamic protocol are: -
RIP, IGRP, EIGRP, OSPF

Types of Dynamic Routing Protocols
        According to the working there are two types of Dynamic Routing Protocols.
   (1) Distance Vector
   (2) Link State
According to the type of area in which protocol is used there are again two types of
protocol: -
   (1) Interior Routing Protocol
   (2) Exterior Routing Protocol




Autonomous system
        Autonomous system is the group of contiguous routers and n/w, which will share their
routing information directly with each other. If all routers are in single domain and they share
their information directly with each other then the size of routing updates will depend on the no.
of n/w present in the Internetwork. Update for each n/w may take 150 – 200 bytes information.
For example: - if there are 1000 n/ws then size of update will be
               200*1000 = 200000 bytes

Border Routing
      The routing information is send periodically so it may consume a large amount of
bandwidth in our n/w.
AS 500
AS 400
AS 200
Domain
Protocols


Distance Vector Routing
       The Routing, which is based on two parameters, that is distance and direction is called
Distance Vector Routing. The example of Distance Vector Routing is RIP & IGRP.
Operation: -
 (1) Each Router will send its directly connected information to the neighbor router. This
information is send periodically to the neighbors.
 (2) The neighbor will receive routing updates and process the route according to following
conditions: -
      (i) If update of a new n/w is received then this information is stored in routing table.
     (ii) If update of a route is received which is already present in routing table then route
will be refresh that is route times is reset to zero.
    (iii) If update is received for a route with lower metric then the route, which is already present
in our routing table. The router will discard old route and write the new route in the routing table.
    (iv) If update is received with higher metric then the route that is already present in routing
table, in this case the new update will be discard.
(3) A timer is associated with each route. The router will forward routing information on all
interfaces and entire routing table is send to the neighbor. There are three types of timers
associated with a route.

Configuring RIP
  Router#conf ter
  Router(config)#router rip
  Router(config-router)#network <own net address>
  Router(config-router)#network <own net address>
  --------------
  --------------
  Router(config-router)#exit
  172.16.0.6
  10.0.0.1
  172.16.0.5
  175.2.1.1
  200.100.100.12
  Router(config-router)#network 10.0.0.0
  Router(config-router)#network 172.16.0.0
  Router(config-router)#network 200.100.100.0
  175.2.0.0 via 172.16.0.6

Configuring IGRP
  Router(config)#router igrp <as no>(1 – 65535)
  Router(config-router)#network <net address>
  Router(config-router)#network <net address>
  Router(config-router)#exit

  Serial E1               modem          Serial E1

  2048 k              2048 k             256 ksync

Configuring following options in IGRP as same as in case of RIP: -
  (1) Neighbor
  (2) Passive interface
  (3) Timer
  (4) Distance (AD)
  (5) Maximum path
Link State Routing
        This type of routing is based on link state. Its working is explain as under
   (1) Each router will send Hello packets to all neighbors using all interfaces.
   (2) The router from which Hello reply receive are stored in the neighborship table. Hello
packets are send periodically to maintain the neighbor table.
   (3) The router will send link state information to the all neighbors. Link state information
from one neighbor is also forwarded to other neighbor.
   (4) Each router will maintain its link state database created from link state advertisement
received from different routers.
   (5) The router will use best path algorithm to store the path in routing table.

Problems of Link State Routing
       The main problems of link state routing are: -
  (1) High bandwidth consumption.
  (2) More hardware resources required that is processor and memory (RAM)
       The routing protocols, which use link state routing are: -
  (1) OSPF
  (2) EIGRP

Enhanced Interior Gateway Routing Protocol
       Features: -
   * Cisco proprietary
   * Hybrid protocol
           Link State
           Distance Vector
   * Multicast Updates using
           Address 224.0.0.10
   * Support AS
   * Support VLSM
   * Automatic Route Summarization
   * Unequal path cost load balancing
   * Metric (32 bit composite)
           Bandwidth
           Delay
           Load
           Reliability
           MTU
   * Neighbor Recovery
   * Partial updates
   * Triggered updates
   * Backup Route
Configuring EIGRP
   Router(config)#router eigrp <as no>
   Router(config-router)#network <net addr.>
   Router(config-router)#network <net addr.>
   Router(config-router)#exit

OSPF Terminology
       Already known topics in this: -
   (1) Hello packets
   (2) LSA (Link State Advertisement)
   (3) Neighbor
   (4) Neighbor table
   (5) Topology table (LSA database)


Router ID
        Router ID is the highest IP address of router interfaces. This id is used as the identity of
the router. It maintaining link state databases. The first preference for selecting router ID is given
to the Logical interfaces. If logical interface is not present then highest IP of physical interface is
selected as router id.
Highest ip is router id of a router
 50.0.0.6       11.0.0.2        13.0.0.1



Area
       Area is the group of routers & n/ws, which can share their routing information directly
with each other.


Adjacency
       A router is called adjacency when neighbor relationship is established. We can also say
adjacency relationship is formed between the routers.


OSPF Hierarchical Model                                                Area 0
Area 20                          Area 70                               Area 90


Area Router (Autonomous System Border Router – ASBR)
       A router, which has all interfaces member of single area, is called area router.
Backbone Area
     Area 0 is called backbone area. All other areas must connect to the backbone area for
communication.

Backbone Router
       A router, which has all interfaces members of area 0, is called backbone router.


Area Border Router
       A router, which connects an area with area 0, is called area border router.

LSA Flooding in OSPF
      If there are multiple OSPF routers on multi access n/w then there will be excessive no. of
LSA generated by the router and they can choke bandwidth of the network.


                L            K            M             N
                A            B            C             D



A              B              C               D
B              A              A               A              Neighbor
C              C              B               B
D              D              D               C
L              K              M               N

       This problem is solved with the help of electing a router as designated router and backup
designated router.

Designated Router
        A router with highest RID (router id) will be designated router for a particular interface.
This router is responsible for receiving LSA from non-DR router and forward LSA to the all DR
router.

Backup Designated Router
        This router will work as backup for the designated router. In BDR mode, it will receive
all information but do not forward this information to other non-DR router.
Commands to configure OSPF
  Router#conf ter
  Router(config)#router ospf <process no>
  Router(config-router)#network <net address> <wild mask> area <area id>
  Router(config-router)#network <net address> <wild mask> area <area id>
  Router(config-router)#exit


Wild Mask – Complement of subnet mask

  R1
  Router(config)#router ospf 33
  Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
  Router(config-router)#network 200.100.100.64 0.0.0.31 area 0
  Router(config-router)#exit

  R2
  Router(config)#router ospf 2
  Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
  Router(config-router)#network 200.100.100.128 0.0.0.63 area 0
  Router(config-router)#exit
Access Control List(ACL)
         ACL are the basic security feature that is required in any network to control the flow of
traffic. Most of time our network may have servers and clients for which traffic control is
required.
         We can also use ACL to classify the traffic. ACLs are used in features like QOS (Quality
of Service), Prioritize traffic and interesting traffic for ISDN.


Classification Access Control List: -

Types of ACL based on Protocol: -
  (1) IP Access Control List
  (2) IPX Access Control List
  (3) Appletalk Access Control List

Types of ACL based on Feature: -
  (1) Standard ACL
  (2) Extended ACL

Types of ACL based on Access mode: -
  (1) Numbered ACL
  (2) Named ACL

Types of ACL based on Order of rules: -
  (1) Deny, permit
  (2) Permit, deny

IP Standard ACL (Numbered)
       In Standard ACL, we are only able to specify source address for the filtering of packets.
The syntax to create IP standard ACL are: -
  Router#conf ter
  Router(config)#access-list <no> <permit|deny> <source>
  Router(config)#exit

   <source>       Single pc host      192.168.10.5
                                      192.168.10.5
                                      192.168.10.5      0.0.0.0

                  N/w                 200.100.100.0     0.0.0.255
                  Subnet              200.100.100.32    0.0.0.15
Applying ACL on interface
  Router#conf ter
  Router(config)#interface <type> <no>
  Router(config-if)#ip access-group <ACL no.> <in|out>
  Router(config-if)#exit

Internet
   Router(config)#access-list 25 permit 192.168.10.32 0.0.0.31
   Router(config)#access-list 25 permit 192.168.10.64 0.0.0.3
   Router(config)#access-list 25 permit 192.168.10.68
   Router(config)#access-list 25 permit 192.168.10.69
   Router(config)#access-list 25 permit 192.168.10.70
   Router(config)#interface serial 0
   Router(config-if)#ip access-group 25 out

IP Standard ACL (Named)
        In Numbered ACL editing feature is not available that is we are not able to delete single
rule from the ACL. In Named ACL editing feature is available.
   Router#config ter
   Router(config)#ip access-list standard <name>
   Router(config-std-nacl)#<deny|permit> <source>
   Router(config-std-nacl)#exit
   Router#conf ter
   Router(config)#ip access-list standard abc
   Router(config-std-nacl)#deny 172.16.0.16
   Router(config-std-nacl)#deny 172.16.0.17
   Router(config-std-nacl)#deny 172.16.0.18
   Router(config-std-nacl)#permit any
   Router(config-std-nacl)#exit

To modify the ACL
   Router#conf ter
   Router(config)#ip access-list standard abc
   Router(config-std-nacl)#no deny 172.16.0.17
   Router(config-std-nacl)#exit

IP Extended ACL (Numbered)
         Extended ACL are advanced ACL. ACL, which can control traffic flow on the basis of
five different parameters that are: -
   (i) Source address
   (ii) Destination address
   (iii) Source port
   (iv) Destination port
   (v) Protocol (layer 3/layer 4)
The syntax to create Extended ACL
   Router#conf ter
   Router(config)#access-list <no> <deny|permit> <protocol> <source> [<s.port>]
                              <destination> [<d.port>]
   Router(config)#exit

To display ACL
   Router#show access-lists or
   Router#show access-list <no>


To display ACL applied on interface
   Router#show ip interface
   Router#show ip interface <type> <no>
   Router#show ip interface Ethernet 0


Time-Based ACLs
        In this you can specify a certain time of day and week and then identity that particular
period by giving it a name referenced by a task. The reference function will fall under whatever
time constraints you have dictated. The time period is based upon the router’s clock, but it is
highly recommended that using it in conjunction with Network Time Protocol (NTP)
synchronization.

Router#conf ter
Router(config)#time-range no-http
Router(config-time-range)#periodic <Wednesday|weekdays|weekend> 06:00 to 12:00
Router(config-time-range)#exit

Router(config)#time-range tcp-yes
Router(config-time-range)#periodic weekend 06:00 to 12:00
Router(config-time-range)#exit

Router(config)ip access-list extended time
Router(config-ext-nacl)#deny tcp any any eq www time-range no-http
Router(config-ext-nacl)#permit tcp any any time-range tcp-yes

Router(config-ext-nacl)#interface f0/0
Router(config-if)#ip access-group time in
Router(config-if)#do show time-range
Network Address Translation(NAT)
        NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of
NAT, we are able to translate network layer addresses that are IP addresses of packets. With the
help of Port Address Translation, we are also able to translate port no.s present in transport layer
header.

There are two reasons due to which we use NAT: -

(1) Conserve Live IP address
        On Internet, there are limited no of IP addresses. If our Pc wants to communicate on
Internet then it should have a Live IP address assigned by our ISP. So that IP address request will
depend on no. of PCs that we want to connect on Internet. Due to this, there will be a lot of
wastage in IP addresses. To reduce wastage, we can share live IP addresses between multiple
PCs with the help of NAT.

(2) NAT enhances the network security by hiding PC & devices behind NAT.


Types of NAT

Static NAT
      This NAT is used for servers in which one Live IP is directly mapped to one Local IP.
This NAT will forward on the traffic for the Live IP to the Local PC in the n/w.
       Static NAT Internet
          200.1.1.5 = 192.168.10.6
       Live 200.1.1.5
       Local 192.168.10.6

Dynamic NAT
       Dynamic NAT is used for clients, which want to access Internet. The request from
multiple client IPs are translated with the Live IP obtained from the Pool. It is also called Pool
Based Dynamic NAT.

       Pool => 200.1.1.8 – 200.1.1.12/28
       Internettt
       Local address => 172.16.X.X
       Except => 172.16.0.5
                 172.16.0.6
                 172.16.0.7
Web Server          DNS                Full access        172.16.X.X
172.16.0.5          172.16.0.6         172.16.0.7

Configuring NAT
      Router#conf ter
      Router(config)#int serial 0
      Router(config-if)#ip nat outside
      Router(config-if)#int eth 0
      Router(config-if)#ip nat inside
      Router(config-if)#exit

      Router(config)#ip nat inside source static 172.16.0.7 200.1.1.3
      Router(config)#ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80
      Router(config)#ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53

      Router(config)#access-list 30 deny 172.16.0.5
      Router(config)#access-list 30 deny 172.16.0.6
      Router(config)#access-list 30 deny 172.16.0.7
      Router(config)#access-list 30 permit any
      Router(config)#ip nat pool abc 200.1.1.8 200.1.1.12 netmask 255.255.255.240
      Router(config)#ip nat inside source list 30 pool abc overload


                                                     NAT + PAT
Command for Basic NAT
      `Router(config)#ip nat inside source list 30 interface serial 0
       <exiting interface name>
To display NAT translation
      Router#sh ip nat translations
      (after ping any address, it shows ping details)

To clear IP NAT Translation
      Router#clear ip nat Translation *
SECURING PRIVATE ENVIORNMENT
         BY USING NAT

                 PROJECT REPORT




The project is based on network addressing translation(nat).
The beauty of configuring nat on routers is that it can help
users access internet on private ip address which are
otherwise excluded by internet service provider(isp).
We have used inter VLAN technology to make work efficient
between 3 different and independent organisations. The
vlans have been divided into web servers and internet
clients.
DESCRIPTION
     We have three organisations. Org1, org2 and org3.
Each organisation comprises a router, to route the data from
and to isp. There are manageable switches in each
organisation and we have created separate vlans for servers
and internet clients.
     If we want the communication between the internet
clients and servers then we configure inter vlan concept on
the router. And if we want to block some internet clients
cannot access our servers then we create acl for that
particular user.
     These organisations are linked externally to an isp
which provides live(public) ip addresses to each
organisation, and isp also provides the internet connections
to others.
CONFIGURATION

FOR ORG1




  %SYS-5-CONFIG_I: Configured frROUTER ORG1
  Router>en
  Router#config t
  Enter configuration commands, one per line. End with CNTL/Z.
  Router(config)#hostname ORG1
  ORG1(config)#line console 0
  ORG1(config-line)#password net
  ORG1(config-line)#login
  ORG1(config-line)#exit
  ORG1(config)#line vty 0 4
  ORG1(config-line)#password net
  ORG1(config-line)#login
  ORG1(config-line)#exit
  ORG1(config)#enable password net
  ORG1(config)#enable secret net1
  ORG1(config)#int f0/0
ORG1(config-if)#no sh


      %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
      ORG1(config-if)#exit
      ORG1(config)#int f0/0.1
      %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to
      upRouter(config-subif)#encapsulation dot1q 2
      ORG1(config-subif)#ip nat inside
      ORG1(config-subif)#ip address 10.0.0.1 255.0.0.0
      ORG1(config-subif)#no sh
      ORG1(config-subif)#exit
      ORG1(config)#int f0/0.2
      ORG1(config-subif)#encapsulation dot1q 3
      ORG1(config-subif)#ip nat inside
      ORG1(config-subif)#ip address 192.168.10.1 255.255.255.240
      ORG1(config-subif)#no sh
      ORG1(config-subif)#exit
      ORG1(config)#int s0/0/0
      ORG1(config-if)#ip nat outside
      ORG1(config-if)#clock rate 64000
      ORG1(config-if)#ip address 200.10.10.5 255.255.255.252
      ORG1(config-if)#no sh
      %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
      ORG1(config-if)#exit
      ORG1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0



      We have place our web server in the private area so that the internet client
cannot directly access it. So, we have configured static nat and open port number
80(http) only.


      ORG1(config)#ip nat inside source static tcp 10.0.0.2 80 200.10.10.17 80



     In our organisation our clients want to access internet so we will configure
dynamic nat with overload for clients.
ORG1(config)#access-list 20 permit any
  ORG1(config)#ip nat pool netmax 200.10.10.18 200.10.10.18 netmask
  255.255.255.240
  ORG1(config)#ip nat inside source list 20 pool netmax overload
  ORG1(config)#exit
  ORG1#wr
  Building configuration...
  [OK]
  ORG1#




SWITCH
Switch>en
Switch#vlan database
% Warning: It is recommended to configure VLAN from config mode,
 as VLAN database mode is being deprecated. Please consult user
 documentation for configuring VTP/VLAN in config mode.
Switch(vlan)#vlan 2 name server
VLAN 2 added:
  Name: server
Switch(vlan)#vlan 3 name clients
VLAN 3 added:
  Name: clients
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr
FOR ORG2 ROUTER

  Router>en
  Router#config t
  Enter configuration commands, one per line. End with CNTL/Z.
  Router(config)#hostname ORG2
  ORG2(config)#line console 0
  ORG2(config-line)#password net
  ORG2(config-line)#login
  ORG2(config-line)#exit
  ORG2(config)#line vty 0 4
  ORG2(config-line)#password net
  ORG2(config-line)#login
  ORG2(config-line)#exit
  ORG2(config)#enable password net
  ORG2(config)#enable secret net1
  ORG2(config)#int f0/0
  ORG2(config-if)#no sh
  %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
  ORG2(config-if)#exit
  ORG2(config)#int f0/0.1

  %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to
  upRouter(config-subif)#encapsulation dot1q 2
  ORG2(config-subif)#ip nat inside
  ORG2(config-subif)#ip address 10.0.0.1 255.0.0.0
  ORG2(config-subif)#no sh
  ORG2(config-subif)#exit
  ORG2(config)#int f0/0.2

  ORG2(config-subif)#encapsulation dot1q 3
  ORG2(config-subif)#ip nat inside
  ORG2(config-subif)#ip address 192.168.10.1 255.255.255.240
  ORG2(config-subif)#no sh
  ORG2(config-subif)#exit
  ORG2(config)#int s0/0/0
  ORG2(config-if)#ip nat outside
  ORG2(config-if)#clock rate 64000
  ORG2(config-if)#ip address 200.10.10.9 255.255.255.252
ORG2(config-if)#no sh
  %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
  ORG2(config-if)#exit
  ORG2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0
  ORG2(config)#ip nat inside source static 10.0.0.2 200.10.10.33
  ORG2(config)#access-list 20 permit any
  ORG2(config)#ip nat pool netmax 200.10.10.34 200.10.10.36 netmask
  255.255.255.240
  ORG2(config)#ip nat inside source list 20 pool netmax
  ORG2(config)#exit
  %SYS-5-CONFIG_I: Configured from console by console
  ORG2#wr
  Building configuration...
  [OK]
  ORG2#




SWITCH
  Switch>en
  Switch#vlan database
  % Warning: It is recommended to configure VLAN from config mode,
   as VLAN database mode is being deprecated. Please consult user
   documentation for configuring VTP/VLAN in config mode.
  Switch(vlan)#vlan 2 name server
  VLAN 2 added:
    Name: server
  Switch(vlan)#vlan 3 name clients
  VLAN 3 added:
    Name: clients
  Switch(vlan)#exit
  APPLY completed.
  Exiting....
  Switch#config t
  Enter configuration commands, one per line. End with CNTL/Z.
  Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr
FOR ORG3 ROUTER

   Router>en
   Router#config t
   Enter configuration commands, one per line. End with CNTL/Z.
   Router(config)#hostname ORG3
   ORG3(config)#line console 0
   ORG3(config-line)#password net
   ORG3(config-line)#login
   ORG3(config-line)#exit
   ORG3(config)#line vty 0 4
   ORG3(config-line)#password net
   ORG3(config-line)#login
   ORG3(config-line)#exit
   ORG3(config)#enable password net
   ORG3(config)#enable secret net1
   ORG3(config)#int f0/0
   ORG3(config-if)#no sh
   %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
   ORG3(config-if)#exit
   ORG3(config)#int f0/0.1

   %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to
   upRouter(config-subif)#encapsulation dot1q 2
   ORG3(config-subif)#ip nat inside
   ORG3(config-subif)#ip address 10.0.0.1 255.0.0.0
   ORG3(config-subif)#no sh
   ORG3(config-subif)#exit
   ORG3(config)#int f0/0.2
   ORG3(config-subif)#encapsulation dot1q 3
   ORG3(config-subif)#ip nat inside
   ORG3(config-subif)#ip address 192.168.10.1 255.255.255.240
   ORG3(config-subif)#no sh
   ORG3(config-subif)#exit
   ORG3(config)#int s0/0/0
   ORG3(config-if)#ip nat outside
   ORG3(config-if)#clock rate 64000
   ORG3(config-if)#ip address 200.10.10.13 255.255.255.252
   ORG3(config-if)#no sh
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
  ORG3(config-if)#exit
  ORG3(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0
  ORG3(config)#ip nat inside source static 10.0.0.2 200.10.10.50
  ORG3(config)#access-list 20 permit any
  ORG3(config)#ip nat pool netmax 200.10.10.51 200.10.10.51 netmask
  255.255.255.240
  ORG3(config)#ip nat inside source list 20 pool netmax overload
  ORG3(config)#exit
  %SYS-5-CONFIG_I: Configured from console by console
  ORG3#wr
  Building configuration...
  [OK]
  ORG3#




SWITCH
  Switch>en
  Switch#vlan database
  % Warning: It is recommended to configure VLAN from config mode,
   as VLAN database mode is being deprecated. Please consult user
   documentation for configuring VTP/VLAN in config mode.
  Switch(vlan)#vlan 2 name server
  VLAN 2 added:
    Name: server
  Switch(vlan)#vlan 3 name clients
  VLAN 3 added:
    Name: clients
  Switch(vlan)#exit
  APPLY completed.
  Exiting....
  Switch#config t
  Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr
REFERENCES

 •   Wikipedia
 •   Google
 •   www.edu.ac.in
 •   NETMAX TECHNOLOGIES
 •   CISCO

Más contenido relacionado

La actualidad más candente

Carlos Morales 2016v3_sinRef
Carlos Morales  2016v3_sinRefCarlos Morales  2016v3_sinRef
Carlos Morales 2016v3_sinRefcarlos morales
 
Diaa CV Feb 2017 - LinkedIn
Diaa CV Feb 2017 - LinkedInDiaa CV Feb 2017 - LinkedIn
Diaa CV Feb 2017 - LinkedInDiaa Algazzar
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentialsbeachghim
 
Cover Letter - CV Full - PerRef - Nord Gonzalez
Cover Letter - CV Full - PerRef - Nord GonzalezCover Letter - CV Full - PerRef - Nord Gonzalez
Cover Letter - CV Full - PerRef - Nord GonzalezNord Gonzalez
 
CCNA R&S At A Glance
CCNA R&S At A GlanceCCNA R&S At A Glance
CCNA R&S At A GlanceCNA KFUPM
 
Akash Gupta Network Engineer CV
Akash Gupta  Network Engineer CVAkash Gupta  Network Engineer CV
Akash Gupta Network Engineer CVAKASH GUPTA
 
IT Security Engineer Resume
IT Security Engineer ResumeIT Security Engineer Resume
IT Security Engineer ResumeMahdi Alseddah
 
Network Engineer CCNP CV
Network Engineer CCNP CVNetwork Engineer CCNP CV
Network Engineer CCNP CVAlex Lozano
 
Network security analyst technical resume 2016
Network security analyst   technical resume 2016Network security analyst   technical resume 2016
Network security analyst technical resume 2016Ian Johnston
 
IT_System_Network_Engineer_CV_U
IT_System_Network_Engineer_CV_UIT_System_Network_Engineer_CV_U
IT_System_Network_Engineer_CV_UMahdi Mansour
 
Mohammad Shaltaf Cv
Mohammad Shaltaf CvMohammad Shaltaf Cv
Mohammad Shaltaf Cvm_altriif
 

La actualidad más candente (20)

Murari kumar
Murari kumarMurari kumar
Murari kumar
 
Carlos Morales 2016v3_sinRef
Carlos Morales  2016v3_sinRefCarlos Morales  2016v3_sinRef
Carlos Morales 2016v3_sinRef
 
Diaa CV Feb 2017 - LinkedIn
Diaa CV Feb 2017 - LinkedInDiaa CV Feb 2017 - LinkedIn
Diaa CV Feb 2017 - LinkedIn
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentials
 
Resume - 2016
Resume - 2016Resume - 2016
Resume - 2016
 
Cover Letter - CV Full - PerRef - Nord Gonzalez
Cover Letter - CV Full - PerRef - Nord GonzalezCover Letter - CV Full - PerRef - Nord Gonzalez
Cover Letter - CV Full - PerRef - Nord Gonzalez
 
Jahir cv
Jahir cvJahir cv
Jahir cv
 
Giri - Resume 6+exp
Giri - Resume 6+expGiri - Resume 6+exp
Giri - Resume 6+exp
 
White Paper on SNMPv3
White Paper on SNMPv3White Paper on SNMPv3
White Paper on SNMPv3
 
CCNA R&S At A Glance
CCNA R&S At A GlanceCCNA R&S At A Glance
CCNA R&S At A Glance
 
Akash Gupta Network Engineer CV
Akash Gupta  Network Engineer CVAkash Gupta  Network Engineer CV
Akash Gupta Network Engineer CV
 
IT Security Engineer Resume
IT Security Engineer ResumeIT Security Engineer Resume
IT Security Engineer Resume
 
Network Engineer CCNP CV
Network Engineer CCNP CVNetwork Engineer CCNP CV
Network Engineer CCNP CV
 
CV_Lalit
CV_LalitCV_Lalit
CV_Lalit
 
Network security analyst technical resume 2016
Network security analyst   technical resume 2016Network security analyst   technical resume 2016
Network security analyst technical resume 2016
 
Curriculum Vitae-Yeswanthvadlamoodi2016
Curriculum Vitae-Yeswanthvadlamoodi2016Curriculum Vitae-Yeswanthvadlamoodi2016
Curriculum Vitae-Yeswanthvadlamoodi2016
 
RESUME 2015
RESUME 2015RESUME 2015
RESUME 2015
 
Resume_Ramesh Bhosale
Resume_Ramesh BhosaleResume_Ramesh Bhosale
Resume_Ramesh Bhosale
 
IT_System_Network_Engineer_CV_U
IT_System_Network_Engineer_CV_UIT_System_Network_Engineer_CV_U
IT_System_Network_Engineer_CV_U
 
Mohammad Shaltaf Cv
Mohammad Shaltaf CvMohammad Shaltaf Cv
Mohammad Shaltaf Cv
 

Destacado (20)

Think beyond plastic
Think beyond plasticThink beyond plastic
Think beyond plastic
 
90 златоуст златогорье
90 златоуст златогорье90 златоуст златогорье
90 златоуст златогорье
 
G8injv'.=hwaahk
G8injv'.=hwaahkG8injv'.=hwaahk
G8injv'.=hwaahk
 
เครื่องใช้ไฟฟ้า
เครื่องใช้ไฟฟ้าเครื่องใช้ไฟฟ้า
เครื่องใช้ไฟฟ้า
 
Presentasifiqhzakat 091031123617-phpapp02
Presentasifiqhzakat 091031123617-phpapp02Presentasifiqhzakat 091031123617-phpapp02
Presentasifiqhzakat 091031123617-phpapp02
 
Welcome guys !!!
Welcome guys !!!Welcome guys !!!
Welcome guys !!!
 
Lab maual
Lab maualLab maual
Lab maual
 
Self_PowerPoint
Self_PowerPointSelf_PowerPoint
Self_PowerPoint
 
2013 GMC Yukon Denali Philadelphia
2013 GMC Yukon Denali Philadelphia2013 GMC Yukon Denali Philadelphia
2013 GMC Yukon Denali Philadelphia
 
Teacher orientation inst
Teacher orientation instTeacher orientation inst
Teacher orientation inst
 
Project FLMNH
Project FLMNHProject FLMNH
Project FLMNH
 
Session 04 oh ts social theory, social institutions and power
Session 04 oh ts   social theory, social institutions and powerSession 04 oh ts   social theory, social institutions and power
Session 04 oh ts social theory, social institutions and power
 
Katalog2010
Katalog2010Katalog2010
Katalog2010
 
Mohideen Khader-122316
Mohideen Khader-122316Mohideen Khader-122316
Mohideen Khader-122316
 
Catalogo cancelli e ringhiere modulari profinagency
Catalogo cancelli e ringhiere modulari profinagencyCatalogo cancelli e ringhiere modulari profinagency
Catalogo cancelli e ringhiere modulari profinagency
 
Presentació
PresentacióPresentació
Presentació
 
Catching the shuttle
Catching the shuttleCatching the shuttle
Catching the shuttle
 
разработка
разработкаразработка
разработка
 
Emerging Spaces for Participant Innovation in Museums
Emerging Spaces for Participant Innovation in MuseumsEmerging Spaces for Participant Innovation in Museums
Emerging Spaces for Participant Innovation in Museums
 
Tempo November 2015
Tempo November 2015Tempo November 2015
Tempo November 2015
 

Similar a Nat report1

Vikram_Sharma_M_Resume
Vikram_Sharma_M_ResumeVikram_Sharma_M_Resume
Vikram_Sharma_M_ResumeVikram Sharma
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer NetworkingPulkit Singhal
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewtRanol R C
 
deepak ResumePDF
deepak ResumePDFdeepak ResumePDF
deepak ResumePDFdeep041
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
Apeksha Telecom Profile
Apeksha Telecom ProfileApeksha Telecom Profile
Apeksha Telecom ProfileApekshaTelecom
 
Apeksha Telecom Profile
Apeksha Telecom ProfileApeksha Telecom Profile
Apeksha Telecom ProfileApekshaTelecom
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
CV_May_2016_James_Sutton_Network_Engineer
CV_May_2016_James_Sutton_Network_EngineerCV_May_2016_James_Sutton_Network_Engineer
CV_May_2016_James_Sutton_Network_EngineerJames Sutton
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkRachel Phillips
 
245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wanAshnaWaseem1
 
PREETHI_4.5yrs Exp
PREETHI_4.5yrs ExpPREETHI_4.5yrs Exp
PREETHI_4.5yrs Exppreethi j
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...smumbahelp
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...smumbahelp
 

Similar a Nat report1 (20)

Sunil Resume
Sunil ResumeSunil Resume
Sunil Resume
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
Vikram_Sharma_M_Resume
Vikram_Sharma_M_ResumeVikram_Sharma_M_Resume
Vikram_Sharma_M_Resume
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewt
 
deepak ResumePDF
deepak ResumePDFdeepak ResumePDF
deepak ResumePDF
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Apeksha Telecom Profile
Apeksha Telecom ProfileApeksha Telecom Profile
Apeksha Telecom Profile
 
Apeksha Telecom Profile
Apeksha Telecom ProfileApeksha Telecom Profile
Apeksha Telecom Profile
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
CV_May_2016_James_Sutton_Network_Engineer
CV_May_2016_James_Sutton_Network_EngineerCV_May_2016_James_Sutton_Network_Engineer
CV_May_2016_James_Sutton_Network_Engineer
 
Mohamed_Omar_Cv
Mohamed_Omar_CvMohamed_Omar_Cv
Mohamed_Omar_Cv
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical Network
 
245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan
 
PREETHI_4.5yrs Exp
PREETHI_4.5yrs ExpPREETHI_4.5yrs Exp
PREETHI_4.5yrs Exp
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
ASHISH CV
ASHISH CVASHISH CV
ASHISH CV
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 

Último

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Nat report1

  • 1. SIX WEEKS INDUSTRIAL TRAINING REPORT On “CCNA” Submitted to Guided by Submitted by Mr. Barinder Singh DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING RIMT-INSTITUTE OF ENGINEERING AND TECHNOLOGY MANDI GOBINDGARH-147301
  • 2. ACKNOWLEDGEMENT While presenting this report I would like to express my deep sense of gratitude to entire NETMAX staff that were indispensable part of my training giving me unending guidance, inspiration, encouragement and providing me excellent environment throughout my training at NETMAX TECHNOLOGIES. The training was an extremely productive & enriching experience, not only technically but also from providing some practical skills. I am extremely thankful to Mr.Barinder Singh who had devoted a lot of time in guiding and supervising me during my training. I must place my gratitude towards Prof. Rajneesh Talwar (H.O.D. of E.C.E. Dept.) for their valuable advice and guidance in carrying out this enjoyable and productive experience, which provided me a great opportunity to search new horizons. Ashima Malhotra
  • 3. PREFACE Technology has rapidly grown in past two-three decades. An engineer without practical knowledge and skills cannot survive in this technical era. Theoretical knowledge does matter but it is the practical knowledge that is the difference between the best and the better. Organizations also prefer experienced engineers than fresher ones due to practical knowledge and industrial exposure of the former. The practical training is highly conductive for solid foundation for:- 1. Knowledge and personality 2. Exposure to industrial environment. 3. Confidence building. 4. Enhancement of creativity.
  • 4. TABLE OF CONTENTS Sr. No. DESCRIPTION 1. COMPANY PROFILE 2. INTRODUCTION TO CCNA 3. BASIC 4. IP ADDRESS V4 5. IP ROUTING 6. LAN SWITCHING 7. ACL 8. NAT 9. PROJECT 10. REFERCENCES
  • 5. INTRODUCTION COMPANY PROFILE NETMAX TECHNOLOGIES as an organization is established in 2001 in the field of Network Support, Network training, Software training and Embedded systems. In Education, we have strategic alliance with Pearson VUE and Prometric. We are authorized Testing Partner of REDHAT & CISCO. We are also NOVELL EDUCATION PARTNER with which we provide NOVELL and SUSE LINUX courses. NetMax Technologies also conduct courses in CADENCE based design tools. NETMAX TECHNOLOGIES also provide Technical Research & Development support and consultancy to some electronics companies. Our clients for R&D support in field of embedded systems: • Recorders and Medicare Ltd Chandigarh. • TELEBOX India Ltd. • Lotus Machines Pvt. Ltd. Chandigarh. • Impearl Electronics Pvt. Ltd. Chandigarh. • KANTA Electrical Ltd. Mohali. The partial list of our client for network field is as below: • CEDTI, Mohali • Premier ISP, Chandigarh • Innovative solutions, Chandigarh • Emmtel ISP, Chandigarh • NIPER, Mohali • Navik Technologies, Chandigarh • Software Technology Parks India, Mohali • Glide Internet Services
  • 6. Rana Group • IDS • HFCL Infotel Ltd. • Targus Technologies Pvt Ltd • STPI, Mohali • BBMB • The Tribune • Ind Swift OUR TEAM We are a strong technical team of certified professionals for catering to these solutions and have presence in Chandigarh and Punjab. We have skilled team of engineers who are experienced in design, programming. We are having more than 15 engineers who are having prestigious certifications like CCNA, CCNP, CCSP, CCSA, MCSE, RHCE,C++,C,JAVA & PhP, MySql Programming. Support Area (network solutions): • LINUX / UNIX networks • SUN networks • CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc) • Bandwidth Manager software and hardware • Radio Links • Security Solutions NETMAX TECHNOLOGIES provide the following Courses in IT & Embedded Systems given below: Network Training: • CISCO CCNA, CCNP • RED HAT LINUX 5 • WINDOWS 2000, 2003 (MCP,MCSA & MCSE)
  • 7. MCITP 2008. Software Training: • C++ • C • JAVA ( CORE JAVA & ADVANCE JAVA) • ASP.NET • PHP My sql Programming. We provide Technical support and consultancy to electronics companies in the field of Embedded micro controllers like 8 bit and 16 bit family based embedded system design, analog systems design(including signal conditioning circuits, filter design, etc) ,precision signal amplifier design for applications like ECG, low power design, precision temperature measurement etc .Power electronics including dc/dc converters, ac/dc converters,thyristor firing based circuit, battery charging and monitor circuits etc. Application of Embedded systems and analog control systems in industrial as well as home automation. Our core strengths are our commitment, technical expertise and cost effective solutions. We ensure high service levels and prompt support availability leading to lower downtime. NETMAX TECHNOLOGIES is a leader in education services and developer of innovative embedded solutions. To meet the demands of Post PC era, NeTmax provides complete solutions as well as design-to-order services to satisfy our customers. NETMAX TECHNOLOGIES: • BARINDER SINGH, 9914713373 • HARPREET SINGH, 9814900118 HEAD OFFICE: NETMAX TECHNOLOGIES, SCO 58-59, Sector 34A, Chandigarh. 0172-4644644 Branch Office: NETMAX TECHNOLOGIES, SCO 52 2ND FLOOR LEELA BHAWAN PATIALA. 0175- 5018351,9914713373, 9814900118.
  • 8. INTRODUCTION TO CCNA What is Network? In one network more than one computer connected with each other through centralized device. They can share files and resources with each other. LAN LAN stands for Local Area Network. The scope of the LAN is within one building, one school or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each computer sense the carrier before sending the data over the n/w. if carrier is free then you can transmit otherwise you have to wait or you have to listen. In multiple access each computer have right that they can access each other. If two computers sense the carrier on same time then the collision occur. Each computer, in the network, aware about the collision. Now this stop transmitting and they will use back off algorithm. In which random number is generated. This number or algorithm is used by each computer. Who has short number or small number, he has first priority to transmit the data over the network and other computers will wait for their turn. WAN WAN stands for Wide Area Network, in which two local area networks are connected through public n/w. it may be through telecommunication infrastructure or dedicated lines. For e.g: - ISDN lines, Leased lines etc. In which we can use WAN devices and WAN technology. You can also connect with your remote area through existing Internetwork called Internet. MAN MAN stands for Metropolitan Area Network . When the number of computer and the area covered by computer crosses a cretain limit, we have to create a larger network that is an extension to local area networks. This type of large network is called metropolitan area networks(MAN). MAN is an estension of local area networks that can connet coputers placed in an entire city. The MAN can be created as a single network such as a cable network, covering entire city or a group of serval Local Area Networks. This way, resources can be shared form LAN to LAN and form computer to computer also. Metropolitan Area Network are mainly owned by lrge organization to interconnect all their branches across a city
  • 9. BASIC DEVICES Hub Hub is centralized device, which is used to connect multiple workstations. There are two types of Hub: - (i) Active Hub (ii) Passive Hub it has no special kind of memory. It simply receives the frame (data) and forwards it to all its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one collision domain and one broadcast domain. In case of hub, the media access method is used CSMA/CD (Carrier Sense Multiple Access/Collision Detection). (i) Active Hub In Active hub, it receives the frame regenerate and then forward to all its nodes. (ii) Passive Hub In Passive hub, it simply receives the frame and forward to all its connected nodes. You cannot perform LAN segmentation using hub. Switch Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes. Every port has its own buffer memory. A port has two queues one is input queue and second is output queue. When switch receives the frame, the frame is received in input queue and forward from output queue. So in case of switch there is no chance or place for collisions. In case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance). Switches provide more efficiency, more speed and security. There are two types of switches: - (i) Manageable switches (can be configured with console cable). (ii) Non-manageable switches. We can perform LAN segmentation by using switches.
  • 10. Bridge Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. It has same functionality as performed by switch. We can use bridge between two different topologies. It has fewer ports. Each port has a own buffer memory. It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table. In case of bridge there is one broadcast domain. Router Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. There are two types of routers: - (i) Hardware Routers are developed by Cisco, HP. (ii) Software Routers is configured with the help of routing and remote access. This feature is offered by Microsoft. This feature is by default installed, but you have to enable or configure it. Hardware routers are dedicated routers. They are more efficient. But in case of software routers, it has less features, slow performance. They are not very much efficient. Lan Card Lan card is media access device. Lan card provide us connectivity in the network. There is a RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is another led which is also called heartbeat of Lan card. When any activity occur it may be receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan card. LAN TOPOLOGIES BUS Topology Cable Type – Coaxial Connector Type – BNC (Bayonet Neill-Concelman), T type, Terminator Coaxial – Thick --Maximum length – 500 meters N/w devices 100 Coaxial – Thin --Maximum length – 185 meters
  • 11. STAR Topology Cable type - UTP Connector type - RJ45 Maximum Length – 100 meters (with proper color coding)
  • 12. UTP (Unshielded Twisted Pair) STP (Shielded Twisted Pair) In case of hub media access method will be CSMA/CD. RING Topology Cable - UTP There is token ring method used, so there is no collision chance.
  • 13. Ethernet Family Speed Base band 10 Base 2 200-meter Coaxial cable 10 Base 5 500-meter Thick Coaxial cable 10 Base T 100 meter Twisted Pair (UTP) 10/100(present) Base TX 100 meter UTP 100 Base T4 100 meter UTP 4 Pairs used 100 Base FX up to 4 kms Fiber Optic 1000(Server) Base TX 100 meter UTP 1000 Base FX up to 10 kms Fiber Optic 10000 Base FX Fiber Optic Color Green – Green white Orange – Orange white Blue – Blue white Brown – Brown white Green cable has maximum twists. Pin Configuration Cross Straight 1 3 1 1 2 6 2 2 3 1 3 3 6 2 6 6
  • 14. Straight Cable 1 Orange white - Orange white 2 Orange - Orange 3 Green white - Green white 4 Blue - Blue 5 Blue white - Blue white 6 Green - Green 7 Brown white - Brown white 8 Brown - Brown Cross Cable 1 Orange white - Green white 2 Orange - Green 3 Green white - Orange white 4 Blue - Blue 5 Blue white - Blue white 6 Green - Orange 7 Brown white - Brown white 8 Brown - Brown RJ45 Connector
  • 15. OSI (Open Systems Interconnection) Model OSI model is the layer approach to design, develop and implement network. OSI provides following advantages: - • Designing of network will be standard base. • Development of new technology will be faster. • Devices from multiple vendors can communicate with each other. • Implementation and troubleshooting of network will be easy. (1) Application Layer: - Application layer accepts data and forward into the protocol stack. It creates user interface between application software and protocol stack. (2) Presentation Layer: - This layer decides presentation format of the data. It also able to performs other function like compression/decompression and encryption/decryption (3) Session Layer: - This layer initiate, maintain and terminate sessions between different applications. Due to this layer multiple application software can be executed at the same time. (4) Transport Layer: - Transport layer is responsible for connection oriented and connection less communication. Transport layer also performs other functions like . Error checking • Flow Control Buffering Windowing Multiplexing • Sequencing • Positive Acknowledgement • Response (5) Network Layer This layer performs function like logical addressing and path determination. Each networking device has a physical address that is MAC address. But logical addressing is easier to communicate on large size network.
  • 16. Logical addressing defines network address and host address. This type of addressing is used to simplify implementation of large network. Some examples of logical addressing are: - IP addresses, IPX addresses etc. (6) Data Link Layer The functions of Data Link layer are divided into two sub layers • Logical Link Control • Media Access Control Logical Link Control defines the encapsulation that will be used by the NIC to delivered data to destination. Some examples of Logical Link Control are ARPA (Ethernet), 802.11 wi-fi. Media Access Control defines methods to access the shared media and establish the identity with the help of MAC address. Some examples of Media Access Control are CSMA/CD, Token Passing. (7) Physical Layer Physical Layer is responsible to communicate bits over the media this layer deals with the standard defined for media and signals. This layer may also perform modulation and demodulation as required. Router Architecture LAN Processor I/O Controller WAN Memory Controller RAM BIOS ROM
  • 17. Flash RAM O/S Incomplete IOS NVRAM IOS Startup Configuration Non-Volatile RAM Router Access Modes When we access router command prompt the router will display different modes. According to the modes, privileges and rights are assigned to the user. User mode In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not enable to manage & configure router. Privileged mode In this mode, we can display all information, configuration, perform administration task, debugging, testing and connectivity with other devices. We are not able to perform here configuration editing of the router. The command to enter in this mode is ‘enable’. We have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are configured then only enable secret will work. Global configuration This mode is used for the configuration of global parameters in the router. Global parameters applied to the entire router. For e.g: - router hostname or access list of router The command enter in this mode is ‘configure terminal’. Line configuration mode This mode is used to configure lines like console, vty and auxiliary. There are main types of line that are configured. (i) Console router(config)#line console 0
  • 18. (ii) Auxiliary router(config)#line aux 0 (iii) Telnet or vty router(config)#line vty 0 4 Interface configuration mode This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc. Router(config)#interface <type> <number> Router(config)#interface serial 1 Routing configuration mode This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc. Router(config)#router <protocol> [<option>] Router(config)#router rip Router(config)#router eigrp 10 Configuring Password There are five types of password available in a router (1) Console Password router#configure terminal router(config)#line console 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit to erase password do all steps with no command. (2) Vty Password router>enable router#configure terminal router(config)#line vty 0 4 router(config-line)#password <word> router(config-line)#login router(config-line)#exit (3) Auxiliary Password router#configure terminal router(config)#line Aux 0 router(config-line)#password <word> router(config-line)#login router(config-line)#exit
  • 19. (4) Enable Password router>enable router#configure terminal router(config)#enable password <word> router(config)#exit (5) Enable Secret Password Enable Password is the clear text password. Router>enable Router#configure terminal Router(config)#enable secret <word> Router(config)#exit Encryption all passwords All passwords other than enable secret password are clear text password. We can encrypt all passwords using level 7 algorithm. The command to encrypt all password are Router#configure terminal Router(config)#service password-encryption Managing Configuration There are two types of configuration present in a router (1) Startup Configuration (2) Running Configuration (1) Startup configuration is stored in the NVRAM. Startup configuration is used to save settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM. (2) Running Configuration is present in the Primary RAM wherever we run a command for configuration, this command is written in the running configuration. To save configuration Router#copy running-configuration startup-configuration Or Router#write To display running-configuration Router#show running-configuratio
  • 20. To display startup configuration Router#show startup-configuration To erase old configuration Router#erase startup-configuration Configuring HostName Router#configure terminal Router#hostname <name> <name>#exit or end or /z Configuration Interfaces Interfaces configuration is one of the most important part of the router configuration. By default, all interfaces of Cisco router are in disabled mode. We have to use different commands as our requirement to enable and configure the interface. Configuring IP, Mask and Enabling the Interface Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#ip address <ip> <mask> Router(config-if)#no shutdown Router(config-if)#exit To configure Interface description Router#configure terminal Router(config)#interface <type> <no> Router(config-if)#description <line> To display interface status Router#show interfaces (to show all interfaces) Router#show interface <type> <no> This command will display following parameters about an interface • Status • Mac address • IP address • Subnet mask • Hardware type / manufacturer • Bandwidth • Reliability • Delay • Load ( Tx load Rx load)
  • 21. Encapsulation • ARP type (if applicable) • Keep alive Configuring secondary IP Router#config terminal Router(config)#interface <type> <no> Router(config-if)#IP address 192.168.10.5 255.255.255.0 Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary Router(config-if)#no shutdown (to enable the interface because they always shutdown) Router(config-if)#exit Router#show run (to display secondary IP) To display commands present in history Router#show history To display history size Router#show terminal Configuring Banners Banners are just a message that can appear at different prompts according to the type. Different banners are: - Message of the day (motd) This banner appear at every access method
  • 22. IP ADDRESS V4 IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts one is network address and second is host address. in local area network, we can used private IP address, which is provided by IANA (Internet Assigning Numbering Authority). IP addresses are divided into five classes. Class Range N/w bits Host bits Subnet mask Total IP Valid IP A 1 – 126 8 24 255.0.0.0 16777216 16777214 B 128 – 191 16 16 255.255.0.0 65536 65534 C 192 – 223 24 8 255.255.255.0 256 254 D 224 – 239 it is reserved for multicast. E 240 – 255 it is reserved for research/scientific use. We can use first three classes. IANA provides private IP addresses from first three classes. Class Private IP Range A 10.0.0.0 – 10.255.255.255 B 172.16.0.0 – 172.31.255.255 C 192.168.0.0 – 192.168.255.255 Subnet Mask Subnet mask is also 32-bit address, which tell us how many bits are used for network and how many bits are used for host address. In Subnet mask Network bits are always 1 and Host bits are always 0. IP Addresses invalid or reserve IP Addresses When we are going to assign IP addresses to our computers then we have to follow some rules.
  • 23. Rules: - (1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved for router. (2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network (10th network). (3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default routing is used in case of Stub n/w (means our network has one exit point). (4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting. (5) 127.0.0.1 - This is Loopback address, which is used for self-communication or troubleshooting purpose. C:>ipconfig C:>ipconfig/all It shows all detail.
  • 24. IP ROUTING When we want to connect two or more networks using different n/w addresses then we have to use IP Routing technique. The router will be used to perform routing between the networks. A router will perform following functions for routing. • Path determination • Packet forwarding (1) Path determination The process of obtaining path in routing table is called path determination. There are three different methods to which router can learn path. i) Automatic detection of directly connected n/w. ii) Static & Default routing iii) Dynamic routing (2) Packet forwarding It is a process that is by default enable in router. The router will perform packet forwarding only if route is available in the routing table. Static Routing In this routing, we have to use IP route commands through which we can specify routes for different networks. The administrator will analyze whole internetwork topology and then specify the route for each n/w that is not directly connected to the router. Steps to perform static routing (1) Create a list of all n/w present in internetwork. (2) Remove the n/w address from list, which is directly connected to n/w. (3) Specify each route for each routing n/w by using IP route command. Router(config)#ip route <destination n/w> <mask> <next hop ip> Next hop IP it is the IP address of neighbor router that is directly connected our router. Static Routing Example: - Router#conf ter Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2 Advantages of static routing (1) Fast and efficient. (2) More control over selected path. (3) Less overhead for router.
  • 25. Disadvantages of static routing (1) More overheads on administrator. (2) Load balancing is not easily possible. (3) In case of topology change routing table has to be change manually. Alternate command to specify static route Static route can also specify in following syntax: - Old Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2 Or Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0 Default Routing Default routing means a route for any n/w. these routes are specify with the help of following syntax: - Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop> Or <exit interface> To display routing table Router#sh ip route To check all the interface of a router Router#sh interface brief Dynamic Routing In dynamic routing, we will enable a routing protocol on router. This protocol will send its routing information to the neighbor router. The neighbors will analyze the information and write new routes to the routing table. The routers will pass routing information receive from one router to other router also. If there are more than one path available then routes are compared and best path is selected. Some examples of dynamic protocol are: - RIP, IGRP, EIGRP, OSPF Types of Dynamic Routing Protocols According to the working there are two types of Dynamic Routing Protocols. (1) Distance Vector (2) Link State
  • 26. According to the type of area in which protocol is used there are again two types of protocol: - (1) Interior Routing Protocol (2) Exterior Routing Protocol Autonomous system Autonomous system is the group of contiguous routers and n/w, which will share their routing information directly with each other. If all routers are in single domain and they share their information directly with each other then the size of routing updates will depend on the no. of n/w present in the Internetwork. Update for each n/w may take 150 – 200 bytes information. For example: - if there are 1000 n/ws then size of update will be 200*1000 = 200000 bytes Border Routing The routing information is send periodically so it may consume a large amount of bandwidth in our n/w. AS 500 AS 400 AS 200 Domain Protocols Distance Vector Routing The Routing, which is based on two parameters, that is distance and direction is called Distance Vector Routing. The example of Distance Vector Routing is RIP & IGRP. Operation: - (1) Each Router will send its directly connected information to the neighbor router. This information is send periodically to the neighbors. (2) The neighbor will receive routing updates and process the route according to following conditions: - (i) If update of a new n/w is received then this information is stored in routing table. (ii) If update of a route is received which is already present in routing table then route will be refresh that is route times is reset to zero. (iii) If update is received for a route with lower metric then the route, which is already present in our routing table. The router will discard old route and write the new route in the routing table. (iv) If update is received with higher metric then the route that is already present in routing table, in this case the new update will be discard.
  • 27. (3) A timer is associated with each route. The router will forward routing information on all interfaces and entire routing table is send to the neighbor. There are three types of timers associated with a route. Configuring RIP Router#conf ter Router(config)#router rip Router(config-router)#network <own net address> Router(config-router)#network <own net address> -------------- -------------- Router(config-router)#exit 172.16.0.6 10.0.0.1 172.16.0.5 175.2.1.1 200.100.100.12 Router(config-router)#network 10.0.0.0 Router(config-router)#network 172.16.0.0 Router(config-router)#network 200.100.100.0 175.2.0.0 via 172.16.0.6 Configuring IGRP Router(config)#router igrp <as no>(1 – 65535) Router(config-router)#network <net address> Router(config-router)#network <net address> Router(config-router)#exit Serial E1 modem Serial E1 2048 k 2048 k 256 ksync Configuring following options in IGRP as same as in case of RIP: - (1) Neighbor (2) Passive interface (3) Timer (4) Distance (AD) (5) Maximum path
  • 28. Link State Routing This type of routing is based on link state. Its working is explain as under (1) Each router will send Hello packets to all neighbors using all interfaces. (2) The router from which Hello reply receive are stored in the neighborship table. Hello packets are send periodically to maintain the neighbor table. (3) The router will send link state information to the all neighbors. Link state information from one neighbor is also forwarded to other neighbor. (4) Each router will maintain its link state database created from link state advertisement received from different routers. (5) The router will use best path algorithm to store the path in routing table. Problems of Link State Routing The main problems of link state routing are: - (1) High bandwidth consumption. (2) More hardware resources required that is processor and memory (RAM) The routing protocols, which use link state routing are: - (1) OSPF (2) EIGRP Enhanced Interior Gateway Routing Protocol Features: - * Cisco proprietary * Hybrid protocol Link State Distance Vector * Multicast Updates using Address 224.0.0.10 * Support AS * Support VLSM * Automatic Route Summarization * Unequal path cost load balancing * Metric (32 bit composite) Bandwidth Delay Load Reliability MTU * Neighbor Recovery * Partial updates * Triggered updates * Backup Route
  • 29. Configuring EIGRP Router(config)#router eigrp <as no> Router(config-router)#network <net addr.> Router(config-router)#network <net addr.> Router(config-router)#exit OSPF Terminology Already known topics in this: - (1) Hello packets (2) LSA (Link State Advertisement) (3) Neighbor (4) Neighbor table (5) Topology table (LSA database) Router ID Router ID is the highest IP address of router interfaces. This id is used as the identity of the router. It maintaining link state databases. The first preference for selecting router ID is given to the Logical interfaces. If logical interface is not present then highest IP of physical interface is selected as router id. Highest ip is router id of a router 50.0.0.6 11.0.0.2 13.0.0.1 Area Area is the group of routers & n/ws, which can share their routing information directly with each other. Adjacency A router is called adjacency when neighbor relationship is established. We can also say adjacency relationship is formed between the routers. OSPF Hierarchical Model Area 0 Area 20 Area 70 Area 90 Area Router (Autonomous System Border Router – ASBR) A router, which has all interfaces member of single area, is called area router.
  • 30. Backbone Area Area 0 is called backbone area. All other areas must connect to the backbone area for communication. Backbone Router A router, which has all interfaces members of area 0, is called backbone router. Area Border Router A router, which connects an area with area 0, is called area border router. LSA Flooding in OSPF If there are multiple OSPF routers on multi access n/w then there will be excessive no. of LSA generated by the router and they can choke bandwidth of the network. L K M N A B C D A B C D B A A A Neighbor C C B B D D D C L K M N This problem is solved with the help of electing a router as designated router and backup designated router. Designated Router A router with highest RID (router id) will be designated router for a particular interface. This router is responsible for receiving LSA from non-DR router and forward LSA to the all DR router. Backup Designated Router This router will work as backup for the designated router. In BDR mode, it will receive all information but do not forward this information to other non-DR router.
  • 31. Commands to configure OSPF Router#conf ter Router(config)#router ospf <process no> Router(config-router)#network <net address> <wild mask> area <area id> Router(config-router)#network <net address> <wild mask> area <area id> Router(config-router)#exit Wild Mask – Complement of subnet mask R1 Router(config)#router ospf 33 Router(config-router)#network 200.100.100.32 0.0.0.3 area 0 Router(config-router)#network 200.100.100.64 0.0.0.31 area 0 Router(config-router)#exit R2 Router(config)#router ospf 2 Router(config-router)#network 200.100.100.32 0.0.0.3 area 0 Router(config-router)#network 200.100.100.128 0.0.0.63 area 0 Router(config-router)#exit
  • 32. Access Control List(ACL) ACL are the basic security feature that is required in any network to control the flow of traffic. Most of time our network may have servers and clients for which traffic control is required. We can also use ACL to classify the traffic. ACLs are used in features like QOS (Quality of Service), Prioritize traffic and interesting traffic for ISDN. Classification Access Control List: - Types of ACL based on Protocol: - (1) IP Access Control List (2) IPX Access Control List (3) Appletalk Access Control List Types of ACL based on Feature: - (1) Standard ACL (2) Extended ACL Types of ACL based on Access mode: - (1) Numbered ACL (2) Named ACL Types of ACL based on Order of rules: - (1) Deny, permit (2) Permit, deny IP Standard ACL (Numbered) In Standard ACL, we are only able to specify source address for the filtering of packets. The syntax to create IP standard ACL are: - Router#conf ter Router(config)#access-list <no> <permit|deny> <source> Router(config)#exit <source> Single pc host 192.168.10.5 192.168.10.5 192.168.10.5 0.0.0.0 N/w 200.100.100.0 0.0.0.255 Subnet 200.100.100.32 0.0.0.15
  • 33. Applying ACL on interface Router#conf ter Router(config)#interface <type> <no> Router(config-if)#ip access-group <ACL no.> <in|out> Router(config-if)#exit Internet Router(config)#access-list 25 permit 192.168.10.32 0.0.0.31 Router(config)#access-list 25 permit 192.168.10.64 0.0.0.3 Router(config)#access-list 25 permit 192.168.10.68 Router(config)#access-list 25 permit 192.168.10.69 Router(config)#access-list 25 permit 192.168.10.70 Router(config)#interface serial 0 Router(config-if)#ip access-group 25 out IP Standard ACL (Named) In Numbered ACL editing feature is not available that is we are not able to delete single rule from the ACL. In Named ACL editing feature is available. Router#config ter Router(config)#ip access-list standard <name> Router(config-std-nacl)#<deny|permit> <source> Router(config-std-nacl)#exit Router#conf ter Router(config)#ip access-list standard abc Router(config-std-nacl)#deny 172.16.0.16 Router(config-std-nacl)#deny 172.16.0.17 Router(config-std-nacl)#deny 172.16.0.18 Router(config-std-nacl)#permit any Router(config-std-nacl)#exit To modify the ACL Router#conf ter Router(config)#ip access-list standard abc Router(config-std-nacl)#no deny 172.16.0.17 Router(config-std-nacl)#exit IP Extended ACL (Numbered) Extended ACL are advanced ACL. ACL, which can control traffic flow on the basis of five different parameters that are: - (i) Source address (ii) Destination address (iii) Source port (iv) Destination port (v) Protocol (layer 3/layer 4)
  • 34. The syntax to create Extended ACL Router#conf ter Router(config)#access-list <no> <deny|permit> <protocol> <source> [<s.port>] <destination> [<d.port>] Router(config)#exit To display ACL Router#show access-lists or Router#show access-list <no> To display ACL applied on interface Router#show ip interface Router#show ip interface <type> <no> Router#show ip interface Ethernet 0 Time-Based ACLs In this you can specify a certain time of day and week and then identity that particular period by giving it a name referenced by a task. The reference function will fall under whatever time constraints you have dictated. The time period is based upon the router’s clock, but it is highly recommended that using it in conjunction with Network Time Protocol (NTP) synchronization. Router#conf ter Router(config)#time-range no-http Router(config-time-range)#periodic <Wednesday|weekdays|weekend> 06:00 to 12:00 Router(config-time-range)#exit Router(config)#time-range tcp-yes Router(config-time-range)#periodic weekend 06:00 to 12:00 Router(config-time-range)#exit Router(config)ip access-list extended time Router(config-ext-nacl)#deny tcp any any eq www time-range no-http Router(config-ext-nacl)#permit tcp any any time-range tcp-yes Router(config-ext-nacl)#interface f0/0 Router(config-if)#ip access-group time in Router(config-if)#do show time-range
  • 35. Network Address Translation(NAT) NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we are able to translate network layer addresses that are IP addresses of packets. With the help of Port Address Translation, we are also able to translate port no.s present in transport layer header. There are two reasons due to which we use NAT: - (1) Conserve Live IP address On Internet, there are limited no of IP addresses. If our Pc wants to communicate on Internet then it should have a Live IP address assigned by our ISP. So that IP address request will depend on no. of PCs that we want to connect on Internet. Due to this, there will be a lot of wastage in IP addresses. To reduce wastage, we can share live IP addresses between multiple PCs with the help of NAT. (2) NAT enhances the network security by hiding PC & devices behind NAT. Types of NAT Static NAT This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT will forward on the traffic for the Live IP to the Local PC in the n/w. Static NAT Internet 200.1.1.5 = 192.168.10.6 Live 200.1.1.5 Local 192.168.10.6 Dynamic NAT Dynamic NAT is used for clients, which want to access Internet. The request from multiple client IPs are translated with the Live IP obtained from the Pool. It is also called Pool Based Dynamic NAT. Pool => 200.1.1.8 – 200.1.1.12/28 Internettt Local address => 172.16.X.X Except => 172.16.0.5 172.16.0.6 172.16.0.7
  • 36. Web Server DNS Full access 172.16.X.X 172.16.0.5 172.16.0.6 172.16.0.7 Configuring NAT Router#conf ter Router(config)#int serial 0 Router(config-if)#ip nat outside Router(config-if)#int eth 0 Router(config-if)#ip nat inside Router(config-if)#exit Router(config)#ip nat inside source static 172.16.0.7 200.1.1.3 Router(config)#ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80 Router(config)#ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53 Router(config)#access-list 30 deny 172.16.0.5 Router(config)#access-list 30 deny 172.16.0.6 Router(config)#access-list 30 deny 172.16.0.7 Router(config)#access-list 30 permit any Router(config)#ip nat pool abc 200.1.1.8 200.1.1.12 netmask 255.255.255.240 Router(config)#ip nat inside source list 30 pool abc overload NAT + PAT Command for Basic NAT `Router(config)#ip nat inside source list 30 interface serial 0 <exiting interface name> To display NAT translation Router#sh ip nat translations (after ping any address, it shows ping details) To clear IP NAT Translation Router#clear ip nat Translation *
  • 37. SECURING PRIVATE ENVIORNMENT BY USING NAT PROJECT REPORT The project is based on network addressing translation(nat). The beauty of configuring nat on routers is that it can help users access internet on private ip address which are otherwise excluded by internet service provider(isp). We have used inter VLAN technology to make work efficient between 3 different and independent organisations. The vlans have been divided into web servers and internet clients.
  • 38. DESCRIPTION We have three organisations. Org1, org2 and org3. Each organisation comprises a router, to route the data from and to isp. There are manageable switches in each organisation and we have created separate vlans for servers and internet clients. If we want the communication between the internet clients and servers then we configure inter vlan concept on the router. And if we want to block some internet clients cannot access our servers then we create acl for that particular user. These organisations are linked externally to an isp which provides live(public) ip addresses to each organisation, and isp also provides the internet connections to others.
  • 39. CONFIGURATION FOR ORG1 %SYS-5-CONFIG_I: Configured frROUTER ORG1 Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname ORG1 ORG1(config)#line console 0 ORG1(config-line)#password net ORG1(config-line)#login ORG1(config-line)#exit ORG1(config)#line vty 0 4 ORG1(config-line)#password net ORG1(config-line)#login ORG1(config-line)#exit ORG1(config)#enable password net ORG1(config)#enable secret net1 ORG1(config)#int f0/0
  • 40. ORG1(config-if)#no sh %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up ORG1(config-if)#exit ORG1(config)#int f0/0.1 %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to upRouter(config-subif)#encapsulation dot1q 2 ORG1(config-subif)#ip nat inside ORG1(config-subif)#ip address 10.0.0.1 255.0.0.0 ORG1(config-subif)#no sh ORG1(config-subif)#exit ORG1(config)#int f0/0.2 ORG1(config-subif)#encapsulation dot1q 3 ORG1(config-subif)#ip nat inside ORG1(config-subif)#ip address 192.168.10.1 255.255.255.240 ORG1(config-subif)#no sh ORG1(config-subif)#exit ORG1(config)#int s0/0/0 ORG1(config-if)#ip nat outside ORG1(config-if)#clock rate 64000 ORG1(config-if)#ip address 200.10.10.5 255.255.255.252 ORG1(config-if)#no sh %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down ORG1(config-if)#exit ORG1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0 We have place our web server in the private area so that the internet client cannot directly access it. So, we have configured static nat and open port number 80(http) only. ORG1(config)#ip nat inside source static tcp 10.0.0.2 80 200.10.10.17 80 In our organisation our clients want to access internet so we will configure dynamic nat with overload for clients.
  • 41. ORG1(config)#access-list 20 permit any ORG1(config)#ip nat pool netmax 200.10.10.18 200.10.10.18 netmask 255.255.255.240 ORG1(config)#ip nat inside source list 20 pool netmax overload ORG1(config)#exit ORG1#wr Building configuration... [OK] ORG1# SWITCH
  • 42. Switch>en Switch#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. Switch(vlan)#vlan 2 name server VLAN 2 added: Name: server Switch(vlan)#vlan 3 name clients VLAN 3 added: Name: clients Switch(vlan)#exit APPLY completed. Exiting.... Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#int f0/1 Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int range f0/2 - 3 Switch(config-if-range)#switchport access vlan 3 Switch(config-if-range)#exit Switch(config)#int f0/24 Switch(config-if)#switchport mode trunk Switch(config-if)#exit Switch(config)#exit Switch#wr
  • 43. FOR ORG2 ROUTER Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname ORG2 ORG2(config)#line console 0 ORG2(config-line)#password net ORG2(config-line)#login ORG2(config-line)#exit ORG2(config)#line vty 0 4 ORG2(config-line)#password net ORG2(config-line)#login ORG2(config-line)#exit ORG2(config)#enable password net ORG2(config)#enable secret net1 ORG2(config)#int f0/0 ORG2(config-if)#no sh %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up ORG2(config-if)#exit ORG2(config)#int f0/0.1 %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to upRouter(config-subif)#encapsulation dot1q 2 ORG2(config-subif)#ip nat inside ORG2(config-subif)#ip address 10.0.0.1 255.0.0.0 ORG2(config-subif)#no sh ORG2(config-subif)#exit ORG2(config)#int f0/0.2 ORG2(config-subif)#encapsulation dot1q 3 ORG2(config-subif)#ip nat inside ORG2(config-subif)#ip address 192.168.10.1 255.255.255.240 ORG2(config-subif)#no sh ORG2(config-subif)#exit ORG2(config)#int s0/0/0 ORG2(config-if)#ip nat outside ORG2(config-if)#clock rate 64000 ORG2(config-if)#ip address 200.10.10.9 255.255.255.252
  • 44. ORG2(config-if)#no sh %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down ORG2(config-if)#exit ORG2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0 ORG2(config)#ip nat inside source static 10.0.0.2 200.10.10.33 ORG2(config)#access-list 20 permit any ORG2(config)#ip nat pool netmax 200.10.10.34 200.10.10.36 netmask 255.255.255.240 ORG2(config)#ip nat inside source list 20 pool netmax ORG2(config)#exit %SYS-5-CONFIG_I: Configured from console by console ORG2#wr Building configuration... [OK] ORG2# SWITCH Switch>en Switch#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. Switch(vlan)#vlan 2 name server VLAN 2 added: Name: server Switch(vlan)#vlan 3 name clients VLAN 3 added: Name: clients Switch(vlan)#exit APPLY completed. Exiting.... Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#int f0/1
  • 45. Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int range f0/2 - 3 Switch(config-if-range)#switchport access vlan 3 Switch(config-if-range)#exit Switch(config)#int f0/24 Switch(config-if)#switchport mode trunk Switch(config-if)#exit Switch(config)#exit Switch#wr
  • 46. FOR ORG3 ROUTER Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname ORG3 ORG3(config)#line console 0 ORG3(config-line)#password net ORG3(config-line)#login ORG3(config-line)#exit ORG3(config)#line vty 0 4 ORG3(config-line)#password net ORG3(config-line)#login ORG3(config-line)#exit ORG3(config)#enable password net ORG3(config)#enable secret net1 ORG3(config)#int f0/0 ORG3(config-if)#no sh %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up ORG3(config-if)#exit ORG3(config)#int f0/0.1 %LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to upRouter(config-subif)#encapsulation dot1q 2 ORG3(config-subif)#ip nat inside ORG3(config-subif)#ip address 10.0.0.1 255.0.0.0 ORG3(config-subif)#no sh ORG3(config-subif)#exit ORG3(config)#int f0/0.2 ORG3(config-subif)#encapsulation dot1q 3 ORG3(config-subif)#ip nat inside ORG3(config-subif)#ip address 192.168.10.1 255.255.255.240 ORG3(config-subif)#no sh ORG3(config-subif)#exit ORG3(config)#int s0/0/0 ORG3(config-if)#ip nat outside ORG3(config-if)#clock rate 64000 ORG3(config-if)#ip address 200.10.10.13 255.255.255.252 ORG3(config-if)#no sh
  • 47. %LINK-5-CHANGED: Interface Serial0/0/0, changed state to down ORG3(config-if)#exit ORG3(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0 ORG3(config)#ip nat inside source static 10.0.0.2 200.10.10.50 ORG3(config)#access-list 20 permit any ORG3(config)#ip nat pool netmax 200.10.10.51 200.10.10.51 netmask 255.255.255.240 ORG3(config)#ip nat inside source list 20 pool netmax overload ORG3(config)#exit %SYS-5-CONFIG_I: Configured from console by console ORG3#wr Building configuration... [OK] ORG3# SWITCH Switch>en Switch#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. Switch(vlan)#vlan 2 name server VLAN 2 added: Name: server Switch(vlan)#vlan 3 name clients VLAN 3 added: Name: clients Switch(vlan)#exit APPLY completed. Exiting.... Switch#config t Enter configuration commands, one per line. End with CNTL/Z.
  • 48. Switch(config)#int f0/1 Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int range f0/2 - 3 Switch(config-if-range)#switchport access vlan 3 Switch(config-if-range)#exit Switch(config)#int f0/24 Switch(config-if)#switchport mode trunk Switch(config-if)#exit Switch(config)#exit Switch#wr
  • 49. REFERENCES • Wikipedia • Google • www.edu.ac.in • NETMAX TECHNOLOGIES • CISCO